Displaying 20 results from an estimated 20 matches for "might_fault".
2009 Jan 24
5
[LLVMdev] inline asm semantics: output constraint width smaller than input
...fine get_user(x, ptr)                        \
 ({                                    \
-    int __ret_gu;                            \
+    unsigned long __ret_gu;                        \
     unsigned long __val_gu;                        \
     __chk_user_ptr(ptr);                        \
     might_fault();                            \
@@ -176,7 +176,7 @@ extern int __get_user_bad(void);
         break;                            \
     }                                \
     (x) = (__typeof__(*(ptr)))__val_gu;                \
-    __ret_gu;                            \
+    (int)__ret_gu;...
2016 Dec 19
2
[PATCH v7 08/11] x86, kvm/x86.c: support vcpu preempted check
...h/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@ -2844,7 +2844,17 @@ static void kvm_steal_time_set_preempted(struct kvm_vcpu *vcpu)
 
 void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu)
 {
+	/*
+	 * Disable page faults because we're in atomic context here.
+	 * kvm_write_guest_offset_cached() would call might_fault()
+	 * that relies on pagefault_disable() to tell if there's a
+	 * bug. NOTE: the write to guest memory may not go through if
+	 * during postcopy live migration or if there's heavy guest
+	 * paging.
+	 */
+	pagefault_disable();
 	kvm_steal_time_set_preempted(vcpu);
+	pagefault_enable();...
2016 Dec 19
2
[PATCH v7 08/11] x86, kvm/x86.c: support vcpu preempted check
...h/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@ -2844,7 +2844,17 @@ static void kvm_steal_time_set_preempted(struct kvm_vcpu *vcpu)
 
 void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu)
 {
+	/*
+	 * Disable page faults because we're in atomic context here.
+	 * kvm_write_guest_offset_cached() would call might_fault()
+	 * that relies on pagefault_disable() to tell if there's a
+	 * bug. NOTE: the write to guest memory may not go through if
+	 * during postcopy live migration or if there's heavy guest
+	 * paging.
+	 */
+	pagefault_disable();
 	kvm_steal_time_set_preempted(vcpu);
+	pagefault_enable();...
2009 Jan 24
0
[LLVMdev] inline asm semantics: output constraint width smaller than input
...\
>  ({                                    \
> -    int __ret_gu;                            \
> +    unsigned long __ret_gu;                        \
>      unsigned long __val_gu;                        \
>      __chk_user_ptr(ptr);                        \
>      might_fault();                            \
> @@ -176,7 +176,7 @@ extern int __get_user_bad(void);
>          break;                            \
>      }                                \
>      (x) = (__typeof__(*(ptr)))__val_gu;                \
> -    __ret_gu;                            \
&g...
2009 Jan 24
1
[LLVMdev] inline asm semantics: output constraint width smaller than input
...u would get an
error at compile time (as suggested
in __builtin_choose_expr in gcc's manual), if that branch would ever get
expanded. Does that sound right?
>   
>>      __typeof__(*(ptr)) __pu_val;                \
>>      __chk_user_ptr(ptr);                    \
>>      might_fault();                        \
>>      __pu_val = x;                        \
>> +       /* return value is 0 or -EFAULT, both fit in 1 byte, and \
>> +    * are sign-extendable to int */                \
>>      switch (sizeof(*(ptr))) {                \
>>      case 1:...
2016 Dec 19
0
[PATCH v7 08/11] x86, kvm/x86.c: support vcpu preempted check
...m/x86.c
> @@ -2844,7 +2844,17 @@ static void kvm_steal_time_set_preempted(struct kvm_vcpu *vcpu)
>
>  void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu)
>  {
> +	/*
> +	 * Disable page faults because we're in atomic context here.
> +	 * kvm_write_guest_offset_cached() would call might_fault()
> +	 * that relies on pagefault_disable() to tell if there's a
> +	 * bug. NOTE: the write to guest memory may not go through if
> +	 * during postcopy live migration or if there's heavy guest
> +	 * paging.
> +	 */
> +	pagefault_disable();
>  	kvm_steal_time_set_pree...
2014 Nov 07
2
kernel BUG at drivers/block/virtio_blk.c:172!
...08]  [<ffffffff8126de58>] mount_fs+0x38/0x1c0
[   64.670008]  [<ffffffff81202c15>] ? __alloc_percpu+0x15/0x20
[   64.670008]  [<ffffffff812908f8>] vfs_kern_mount+0x68/0x160
[   64.670008]  [<ffffffff81293d6c>] do_mount+0x22c/0xc20
[   64.670008]  [<ffffffff8120d92e>] ? might_fault+0x5e/0xc0
[   64.670008]  [<ffffffff811fcf1b>] ? memdup_user+0x4b/0x90
[   64.670008]  [<ffffffff81294a8e>] SyS_mount+0x9e/0x100
[   64.670008]  [<ffffffff8185e169>] system_call_fastpath+0x12/0x17
[   64.670008] Code: 00 00 c7 86 78 01 00 00 02 00 00 00 48 c7 86 80 01 00 00 00 00...
2014 Nov 07
2
kernel BUG at drivers/block/virtio_blk.c:172!
...08]  [<ffffffff8126de58>] mount_fs+0x38/0x1c0
[   64.670008]  [<ffffffff81202c15>] ? __alloc_percpu+0x15/0x20
[   64.670008]  [<ffffffff812908f8>] vfs_kern_mount+0x68/0x160
[   64.670008]  [<ffffffff81293d6c>] do_mount+0x22c/0xc20
[   64.670008]  [<ffffffff8120d92e>] ? might_fault+0x5e/0xc0
[   64.670008]  [<ffffffff811fcf1b>] ? memdup_user+0x4b/0x90
[   64.670008]  [<ffffffff81294a8e>] SyS_mount+0x9e/0x100
[   64.670008]  [<ffffffff8185e169>] system_call_fastpath+0x12/0x17
[   64.670008] Code: 00 00 c7 86 78 01 00 00 02 00 00 00 48 c7 86 80 01 00 00 00 00...
2011 Jul 14
0
btrfs panic
...7bfd2>] ? trace_hardirqs_off+0xd/0xf
[ 1998.478275]  [<ffffffff81071f42>] ? local_clock+0x36/0x4d
[ 1998.478275]  [<ffffffff810800ab>] ? lock_release_non_nested+0xdb/0x263
[ 1998.478275]  [<ffffffff81121996>] do_sync_write+0xcb/0x108
[ 1998.478275]  [<ffffffff810f33a4>] ? might_fault+0x5c/0xac
[ 1998.478275]  [<ffffffff8107ed01>] ? lock_is_held+0x8d/0x98
[ 1998.478275]  [<ffffffff8112200f>] vfs_write+0xaf/0x102
[ 1998.478275]  [<ffffffff8112347e>] ? fget_light+0x3a/0xa1
[ 1998.478275]  [<ffffffff81122222>] sys_write+0x4d/0x74
[ 1998.478275]  [<fffffff...
2013 Aug 16
1
[PATCH 3/6] vhost: switch to use vhost_add_used_n()
On Fri, Aug 16, 2013 at 01:16:27PM +0800, Jason Wang wrote:
> Let vhost_add_used() to use vhost_add_used_n() to reduce the code duplication.
> 
> Signed-off-by: Jason Wang <jasowang at redhat.com>
Does compiler inline it then?
Reason I ask, last time I checked put_user inside vhost_add_used
was much cheaper than copy_to_user inside vhost_add_used_n,
so I wouldn't be surprised
2013 Aug 16
1
[PATCH 3/6] vhost: switch to use vhost_add_used_n()
On Fri, Aug 16, 2013 at 01:16:27PM +0800, Jason Wang wrote:
> Let vhost_add_used() to use vhost_add_used_n() to reduce the code duplication.
> 
> Signed-off-by: Jason Wang <jasowang at redhat.com>
Does compiler inline it then?
Reason I ask, last time I checked put_user inside vhost_add_used
was much cheaper than copy_to_user inside vhost_add_used_n,
so I wouldn't be surprised
2014 Nov 10
0
kernel BUG at drivers/block/virtio_blk.c:172!
...26de58>] mount_fs+0x38/0x1c0
> [   64.670008]  [<ffffffff81202c15>] ? __alloc_percpu+0x15/0x20
> [   64.670008]  [<ffffffff812908f8>] vfs_kern_mount+0x68/0x160
> [   64.670008]  [<ffffffff81293d6c>] do_mount+0x22c/0xc20
> [   64.670008]  [<ffffffff8120d92e>] ? might_fault+0x5e/0xc0
> [   64.670008]  [<ffffffff811fcf1b>] ? memdup_user+0x4b/0x90
> [   64.670008]  [<ffffffff81294a8e>] SyS_mount+0x9e/0x100
> [   64.670008]  [<ffffffff8185e169>] system_call_fastpath+0x12/0x17
> [   64.670008] Code: 00 00 c7 86 78 01 00 00 02 00 00 00 48 c7 8...
2011 Sep 05
0
Slow performance
...[<ffffffffa065e0fd>] ocfs2_create+0xa2/0x10a [ocfs2]
 [<ffffffff8112268f>] vfs_create+0x7e/0x9d
 [<ffffffff81125794>] do_filp_open+0x302/0x92d
 [<ffffffff810425cb>] ? should_resched+0xe/0x2f
 [<ffffffff81437731>] ? _cond_resched+0xe/0x22
 [<ffffffff81238109>] ? might_fault+0xe/0x10
 [<ffffffff812381f3>] ? __strncpy_from_user+0x20/0x4a
 [<ffffffff81114bc8>] do_sys_open+0x62/0x109
 [<ffffffff81114ca2>] sys_open+0x20/0x22
 [<ffffffff81011db2>] system_call_fastpath+0x16/0x1b
Checking the bz, these two bugs seems to have similar behavior:
http://...
2013 Jan 04
31
xennet: skb rides the rocket: 20 slots
Hi Ian,
Today i fired up an old VM with a bittorrent client, trying to download some torrents.
I seem to be hitting the unlikely case of "xennet: skb rides the rocket: xx slots" and this results in some dropped packets in domU, I don''t see any warnings in dom0.
I have added some extra info, but i don''t have enough knowledge if this could/should be prevented from
2016 Nov 02
13
[PATCH v7 00/11] implement vcpu preempted check
change from v6:
	fix typos and remove uncessary comments.
change from v5:
	spilt x86/kvm patch into guest/host part.
	introduce kvm_write_guest_offset_cached.
	fix some typos.
	rebase patch onto 4.9.2
change from v4:
	spilt x86 kvm vcpu preempted check into two patches.
	add documentation patch.
	add x86 vcpu preempted check patch under xen
	add s390 vcpu preempted check patch 
change from v3:
2016 Nov 02
13
[PATCH v7 00/11] implement vcpu preempted check
change from v6:
	fix typos and remove uncessary comments.
change from v5:
	spilt x86/kvm patch into guest/host part.
	introduce kvm_write_guest_offset_cached.
	fix some typos.
	rebase patch onto 4.9.2
change from v4:
	spilt x86 kvm vcpu preempted check into two patches.
	add documentation patch.
	add x86 vcpu preempted check patch under xen
	add s390 vcpu preempted check patch 
change from v3:
2012 Feb 13
23
Set nodatacow per file?
Hello,
is it possible to set nodatacow on a per-file basis? I couldn''t find 
anything.
If not, wouldn''t that be a great feature to get around the performance 
issues with VM and database storage? Of course cloning should still 
cause COW.
Thanks,
Ralf-Peter
--
To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in
the body of a message to
2016 Mar 18
4
[PATCH] gpu/drm: Use u64_to_user_pointer
Use the newly added u64_to_user_pointer a bit more frequently.
Signed-off-by: Joe Perches <joe at perches.com>
---
 drivers/gpu/drm/armada/armada_gem.c    |  2 +-
 drivers/gpu/drm/nouveau/nouveau_gem.c  |  7 ++++---
 drivers/gpu/drm/tegra/drm.c            | 15 ++++++++-------
 drivers/gpu/drm/vc4/vc4_bo.c           |  4 ++--
 drivers/gpu/drm/vc4/vc4_gem.c          | 10 +++++-----
2016 Mar 18
4
[PATCH] gpu/drm: Use u64_to_user_pointer
Use the newly added u64_to_user_pointer a bit more frequently.
Signed-off-by: Joe Perches <joe at perches.com>
---
 drivers/gpu/drm/armada/armada_gem.c    |  2 +-
 drivers/gpu/drm/nouveau/nouveau_gem.c  |  7 ++++---
 drivers/gpu/drm/tegra/drm.c            | 15 ++++++++-------
 drivers/gpu/drm/vc4/vc4_bo.c           |  4 ++--
 drivers/gpu/drm/vc4/vc4_gem.c          | 10 +++++-----
2013 Oct 06
40
[xen] double fault: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC
Greetings,
I got the below dmesg and the first bad commit is
commit cf39c8e5352b4fb9efedfe7e9acb566a85ed847c
Merge: 3398d25 23b7eaf
Author: Linus Torvalds <torvalds@linux-foundation.org>
Date:   Wed Sep 4 17:45:39 2013 -0700
    Merge tag ''stable/for-linus-3.12-rc0-tag'' of git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip
    
    Pull Xen updates from Konrad