Displaying 20 results from an estimated 200 matches similar to: "[PATCH] Enable PCI passthrough with stub domain."
2012 Dec 12
2
[PATCH v7 1/2] xen: unify domain locking in domctl code
These two patches were originally part of the XSM series that I have
posted, and remain prerequisites for that series. However, they are
independent of the XSM changes and are a useful simplification
regardless of the use of XSM.
The Acked-bys on these patches were provided before rebasing them over
the copyback changes in 26268:1b72138bddda, which had minor conflicts
that I resolved.
[PATCH
2012 Nov 05
25
[PATCH] IOMMU: don't disable bus mastering on faults for devices used by Xen or Dom0
Under the assumption that in these cases recurring faults aren''t a
security issue and it can be expected that the drivers there are going
to try to take care of the problem.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
--- a/xen/drivers/passthrough/amd/iommu_init.c
+++ b/xen/drivers/passthrough/amd/iommu_init.c
@@ -625,6 +625,18 @@ static void parse_event_log_entry(struct
2008 Sep 26
2
RE: [Xen-changelog] [xen-unstable] x86: Properly synchronise updates to pirq-to-vector mapping.
@@ -491,16 +512,15 @@ int pirq_guest_bind(struct vcpu *v, int
int rc = 0;
cpumask_t cpumask = CPU_MASK_NONE;
+ WARN_ON(!spin_is_locked(&v->domain->evtchn_lock));
I find this WARN_ON() is triggered harmlessly when I assign device to HVM guest.
The call trace is XEN_DOMCTL_bind_pt_irq -> pt_irq_create_bind_vtd() -> pirq_guest_bind().
Should we
2008 Sep 23
9
Xen crash on dom0 shutdown
There is a BUG_ON() at xen/arch/x86/physdev.c:169 which appears to
be dependent upon guest behavior (should close event channel before
un-mapping pirq), rather than on internal hypervisor state. In 2.6.18,
this likely goes unnoticed because pci_device_shutdown() only calls all
the driver shutdown routines. In newer kernels, however, it also calls
pci_msi_shutdown() and pci_msix_shutdown(), which
2005 Aug 25
1
question about custom contrasts in ANOVA
Hi,
I have a problem in which I have test score data on students from a number
of schools. In each school I have a measure of whether or not they
received special programming. I am interested in the interaction between
school and attendance to the programming, but in a very select set of
comparisons. I'd like to cast the test as one in which students in each
school who attend are
2012 Nov 15
1
[RFC/PATCH v4] XENMEM_claim_pages (subop of existing) hypercall
This is a fourth cut of the hypervisor patch of the proposed
XENMEM_claim_pages hypercall/subop, taking into account
feedback from Jan and Keir and IanC, plus some fixes found
via runtime debugging (using privcmd only) and some
added comments/cleanup.
[Logistical note: I will be out tomorrow (Friday) plus US
holidays next week so my responsiveness to comments may be
slower for awhile. --djm]
2011 Sep 21
0
[PATCH] x86: IO-APIC code has no dependency on PCI
The IRQ handling code requires pcidevs_lock to be held only for MSI
interrupts.
As the handling of which was now fully moved into msi.c (i.e. while
applying fine without, the patch needs to be applied after the one
titled "x86: split MSI IRQ chip"), io_apic.c now also doesn''t need to
include PCI headers anymore.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
---
2012 Feb 24
10
[PATCH 0 of 2] [RFC] Patches to work with processor-passthru driver (v1).
These two patches provide the neccessary infrastructure changes
for the processor-passthru driver [www.spinics.net/lists/linux-acpi/msg34655.html]
to properly function.
The first one is quite easy - we just modprobe the processor-passthru driver.
The second allows it to work under AMD machines by exposing the PM RDMSR
to dom0. It has been tested with 2.6.32 kernel as well to make sure it does
2008 Sep 19
8
[PATCH] x86: add hypercall to query current underlying pCPU''s frequency
Signed-off-by: Jan Beulich <jbeulich@novell.com>
Index: 2008-09-19/xen/arch/x86/platform_hypercall.c
===================================================================
--- 2008-09-19.orig/xen/arch/x86/platform_hypercall.c 2008-09-19 14:12:02.000000000 +0200
+++ 2008-09-19/xen/arch/x86/platform_hypercall.c 2008-09-19 14:12:56.000000000 +0200
@@ -21,7 +21,7 @@
#include <xen/acpi.h>
2012 Feb 14
1
[PATCH] x86: don't allow Dom0 to map MSI-X table writably
With the traditional qemu tree fixed to not use PROT_WRITE anymore in
the mmap() call for this region, and with the upstream qemu tree not
being capable of handling passthrough, yet, there''s no need to treat
Dom specially here anymore.
This continues to leave unaddressed the case where PV guests map the
MSI-X table page(s) before setting up the first MSI-X interrupt (see
the original c/s
2013 May 21
12
[PATCH] fix XSA-46 regression with xend/xm
The hypervisor side changes for XSA-46 require the tool stack to now
always map the guest pIRQ before granting access permission to the
underlying host IRQ (GSI). This in particular requires that pciif.py
no longer can skip this step (assuming qemu would do it) for HVM
guests.
This in turn exposes, however, an inconsistency between xend and qemu:
The former wants to always establish 1:1 mappings
2013 Feb 21
4
help please - running a guest from an iSCSI disk ? getting more diagnostics than "cannot make domain: -3" ? how to make domain0 "privileged" ?
Good day -
This is my first post to this list , and I''m new to Xen - any help on
this issue would be much appreciated .
I downloaded, built and installed xen-4.2.1 (hypervisor and tools) on
an x86_64 ArchLinux box
updated to latest software as of today.
I am trying to bring up a Linux guest from a remote iSCSI disk.
The iSCSI-initiator (open-iscsi) logs in to the remote target OK and
2011 Jan 22
53
Xen 4.1 rc1 test report
Hi, All
Intel QA conducted a full validation for xen 4.1 rc1, it includes VT-x, VT-d, SRIOV, RAS, TXT and xl tools testing. 24 issues were exposed. Refer the bug list, please.
We already assigned 14 bugs to Intel developers (which has an ''Intel'' tag in the bug title), most of the rest 10 bugs are related xl command. For the these bugs, need community''s help to fix
2010 Jan 09
3
101th domU fails to start with "SETVCPUCONTEXT failed"
Hello there,
We (a small hosting community) are running a steadily growing number of Xen
domUs on a quad dualcore Xeon server with 64GB ram. We''ve got 100 running
domUs at the moment. Trying to create a new one results in this error:
Error: (1, ''Internal error'', ''launch_vm: SETVCPUCONTEXT failed (rc=-1)\n'')
If I shut down another domain, I can
2012 May 25
0
[PATCH 3/3] gnttab: cleanup
- introduce local variables (shortcuts for frequently used <dom>->grant_table)
- adjust first parameter of mapcount()
- drop lock acquisition from gnttab_get_version()
- remove hard tabs and adjust formatting
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Tested-by: Andrew Thomas <andrew.thomas@oracle.com>
--- a/xen/common/grant_table.c
+++ b/xen/common/grant_table.c
@@
2013 Jun 10
35
Xen 4.3 development update
There are basically three issues we''re waiting to sort out (see below
for more info):
* XSA-55
* cpu hotplug in qemu-upsream
* The MMIO hole issue
Unfortuantely, there is considerable uncertainty about how long it
will take for each of those to complete. We''re hoping to be able to
release maybe on the 19th,
This information will be mirrored on the Xen 4.3 Roadmap wiki page:
2011 Sep 23
0
[xen-unstable test] 9061: regressions - FAIL
flight 9061 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/9061/
Regressions :-(
Tests which did not succeed and are blocking:
test-amd64-i386-rhel6hvm-amd 5 xen-boot fail REGR. vs. 8995
Tests which are failing intermittently (not blocking):
test-amd64-i386-pv 5 xen-boot fail pass in 9054
test-i386-i386-pv
2010 Feb 26
0
[Xen-devel] Crash during boot in Debian lenny default dom0 kernel (2.6.26-2-xen-686) / bugfix patch
Hello,
More information and a patch for the bug.
-- Pasi
----- Forwarded message from George Dunlap <George.Dunlap at eu.citrix.com> -----
From: George Dunlap <George.Dunlap at eu.citrix.com>
To: Jan Beulich <JBeulich at novell.com>
Cc: Sander Eikelenboom <linux at eikelenboom.it>,
Jeremy Fitzhardinge <jeremy at goop.org>,
Yunhong Jiang <yunhong.jiang at
2016 Nov 08
4
[PATCH 1/3] generator: c: move internal functions
Move the generate_all_structs and generate_all_headers functions,
previously internal within the implementation of generate_guestfs_h, to
be usable by other functions in the same "C" module (but not public).
Only code motion.
---
generator/c.ml | 163 +++++++++++++++++++++++++++++----------------------------
1 file changed, 82 insertions(+), 81 deletions(-)
diff --git a/generator/c.ml
2000 Jan 16
0
ANNOUNCE: 1.2.1pre26
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I have uploaded openssh-1.2.1pre26. Please use a mirror:
http://violet.ibs.com.au/openssh/files/MIRRORS.html
Major changes:
- IPv6 support. I have merged the IPv6 support from OpenBSD CVS and
the function replacements from KIKUCHI Takahiro
<kick at kyoto.wide.ad.jp>. It compiles and works OK for me on
Redhat Linux 6.1 (which has