b94eda4466
5347b524-evtchn-eliminate-64k-ports-limitation.patch 53aac342-x86-HVM-consolidate-and-sanitize-CR4-guest-reserved-bit-determination.patch 53b16cd4-VT-d-ATS-correct-and-clean-up-dev_invalidate_iotlb.patch 53b56de1-properly-reference-count-DOMCTL_-un-pausedomain-hypercalls.patch 53cfdcc7-avoid-crash-when-doing-shutdown-with-active-cpupools.patch 53cfddaf-x86-mem_event-validate-the-response-vcpu_id-before-acting-on-it.patch 53cfdde4-x86-mem_event-prevent-underflow-of-vcpu-pause-counts.patch - bnc#886801 - xl vncviewer: The first domu can be accessed by any id 53c9151b-Fix-xl-vncviewer-accesses-port-0-by-any-invalid-domid.patch - Upstream pygrub bug fix 5370e03b-pygrub-fix-error-handling-if-no-valid-partitions-are-found.patch - Fix pygrub to handle old 32 bit VMs pygrub-boot-legacy-sles.patch (Mike Latimer) - Remove xen-vmresync utility. It is an old Platespin Orchestrate utility that should have never been included in the Xen package. Updated xen.spec - Rework xen-destroy utility included in xen-utils bnc#885292 and bnc#886063 Updated xen-utils-0.1.tar.bz2 - bnc#886063 - Xen monitor fails (xl list --long output different from xm list --long output) - bnc#885292 - VirtualDomain: pid_status does not know how to check status on SLE12 OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=322
60 lines
2.1 KiB
Diff
60 lines
2.1 KiB
Diff
# Commit 8f7f6ab879a9ad9d2bf66b8c6b46a0653086b79f
|
|
# Date 2014-04-11 11:25:56 +0200
|
|
# Author Jan Beulich <jbeulich@suse.com>
|
|
# Committer Jan Beulich <jbeulich@suse.com>
|
|
evtchn: eliminate 64k ports limitation
|
|
|
|
The introduction of FIFO event channels claimed to support over 100k
|
|
ports, but failed to widen a number of 16-bit variables/operations.
|
|
|
|
Signed-off-by: Jan Beulich <jbeulich@suse.com>
|
|
Reviewed-by: David Vrabel <david.vrabel@citrix.com>
|
|
Acked-by: Keir Fraser <keir@xen.org>
|
|
|
|
--- a/xen/common/event_channel.c
|
|
+++ b/xen/common/event_channel.c
|
|
@@ -275,12 +275,12 @@ static long evtchn_bind_interdomain(evtc
|
|
goto out;
|
|
|
|
lchn->u.interdomain.remote_dom = rd;
|
|
- lchn->u.interdomain.remote_port = (u16)rport;
|
|
+ lchn->u.interdomain.remote_port = rport;
|
|
lchn->state = ECS_INTERDOMAIN;
|
|
evtchn_port_init(ld, lchn);
|
|
|
|
rchn->u.interdomain.remote_dom = ld;
|
|
- rchn->u.interdomain.remote_port = (u16)lport;
|
|
+ rchn->u.interdomain.remote_port = lport;
|
|
rchn->state = ECS_INTERDOMAIN;
|
|
|
|
/*
|
|
--- a/xen/include/xen/sched.h
|
|
+++ b/xen/include/xen/sched.h
|
|
@@ -86,13 +86,13 @@ struct evtchn
|
|
domid_t remote_domid;
|
|
} unbound; /* state == ECS_UNBOUND */
|
|
struct {
|
|
- u16 remote_port;
|
|
+ evtchn_port_t remote_port;
|
|
struct domain *remote_dom;
|
|
} interdomain; /* state == ECS_INTERDOMAIN */
|
|
struct {
|
|
- u16 irq;
|
|
- u16 next_port;
|
|
- u16 prev_port;
|
|
+ u32 irq;
|
|
+ evtchn_port_t next_port;
|
|
+ evtchn_port_t prev_port;
|
|
} pirq; /* state == ECS_PIRQ */
|
|
u16 virq; /* state == ECS_VIRQ */
|
|
} u;
|
|
@@ -190,7 +190,7 @@ struct vcpu
|
|
atomic_t pause_count;
|
|
|
|
/* IRQ-safe virq_lock protects against delivering VIRQ to stale evtchn. */
|
|
- u16 virq_to_evtchn[NR_VIRQS];
|
|
+ evtchn_port_t virq_to_evtchn[NR_VIRQS];
|
|
spinlock_t virq_lock;
|
|
|
|
/* Bitmask of CPUs on which this VCPU may run. */
|