search for: might_fault

Displaying 20 results from an estimated 20 matches for "might_fault".

2009 Jan 24
5
[LLVMdev] inline asm semantics: output constraint width smaller than input
...fine get_user(x, ptr) \ ({ \ - int __ret_gu; \ + unsigned long __ret_gu; \ unsigned long __val_gu; \ __chk_user_ptr(ptr); \ might_fault(); \ @@ -176,7 +176,7 @@ extern int __get_user_bad(void); break; \ } \ (x) = (__typeof__(*(ptr)))__val_gu; \ - __ret_gu; \ + (int)__ret_gu;...
2016 Dec 19
2
[PATCH v7 08/11] x86, kvm/x86.c: support vcpu preempted check
...h/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -2844,7 +2844,17 @@ static void kvm_steal_time_set_preempted(struct kvm_vcpu *vcpu) void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu) { + /* + * Disable page faults because we're in atomic context here. + * kvm_write_guest_offset_cached() would call might_fault() + * that relies on pagefault_disable() to tell if there's a + * bug. NOTE: the write to guest memory may not go through if + * during postcopy live migration or if there's heavy guest + * paging. + */ + pagefault_disable(); kvm_steal_time_set_preempted(vcpu); + pagefault_enable();...
2016 Dec 19
2
[PATCH v7 08/11] x86, kvm/x86.c: support vcpu preempted check
...h/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -2844,7 +2844,17 @@ static void kvm_steal_time_set_preempted(struct kvm_vcpu *vcpu) void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu) { + /* + * Disable page faults because we're in atomic context here. + * kvm_write_guest_offset_cached() would call might_fault() + * that relies on pagefault_disable() to tell if there's a + * bug. NOTE: the write to guest memory may not go through if + * during postcopy live migration or if there's heavy guest + * paging. + */ + pagefault_disable(); kvm_steal_time_set_preempted(vcpu); + pagefault_enable();...
2009 Jan 24
0
[LLVMdev] inline asm semantics: output constraint width smaller than input
...\ > ({ \ > - int __ret_gu; \ > + unsigned long __ret_gu; \ > unsigned long __val_gu; \ > __chk_user_ptr(ptr); \ > might_fault(); \ > @@ -176,7 +176,7 @@ extern int __get_user_bad(void); > break; \ > } \ > (x) = (__typeof__(*(ptr)))__val_gu; \ > - __ret_gu; \ &g...
2009 Jan 24
1
[LLVMdev] inline asm semantics: output constraint width smaller than input
...u would get an error at compile time (as suggested in __builtin_choose_expr in gcc's manual), if that branch would ever get expanded. Does that sound right? > >> __typeof__(*(ptr)) __pu_val; \ >> __chk_user_ptr(ptr); \ >> might_fault(); \ >> __pu_val = x; \ >> + /* return value is 0 or -EFAULT, both fit in 1 byte, and \ >> + * are sign-extendable to int */ \ >> switch (sizeof(*(ptr))) { \ >> case 1:...
2016 Dec 19
0
[PATCH v7 08/11] x86, kvm/x86.c: support vcpu preempted check
...m/x86.c > @@ -2844,7 +2844,17 @@ static void kvm_steal_time_set_preempted(struct kvm_vcpu *vcpu) > > void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu) > { > + /* > + * Disable page faults because we're in atomic context here. > + * kvm_write_guest_offset_cached() would call might_fault() > + * that relies on pagefault_disable() to tell if there's a > + * bug. NOTE: the write to guest memory may not go through if > + * during postcopy live migration or if there's heavy guest > + * paging. > + */ > + pagefault_disable(); > kvm_steal_time_set_pree...
2014 Nov 07
2
kernel BUG at drivers/block/virtio_blk.c:172!
...08] [<ffffffff8126de58>] mount_fs+0x38/0x1c0 [ 64.670008] [<ffffffff81202c15>] ? __alloc_percpu+0x15/0x20 [ 64.670008] [<ffffffff812908f8>] vfs_kern_mount+0x68/0x160 [ 64.670008] [<ffffffff81293d6c>] do_mount+0x22c/0xc20 [ 64.670008] [<ffffffff8120d92e>] ? might_fault+0x5e/0xc0 [ 64.670008] [<ffffffff811fcf1b>] ? memdup_user+0x4b/0x90 [ 64.670008] [<ffffffff81294a8e>] SyS_mount+0x9e/0x100 [ 64.670008] [<ffffffff8185e169>] system_call_fastpath+0x12/0x17 [ 64.670008] Code: 00 00 c7 86 78 01 00 00 02 00 00 00 48 c7 86 80 01 00 00 00 00...
2014 Nov 07
2
kernel BUG at drivers/block/virtio_blk.c:172!
...08] [<ffffffff8126de58>] mount_fs+0x38/0x1c0 [ 64.670008] [<ffffffff81202c15>] ? __alloc_percpu+0x15/0x20 [ 64.670008] [<ffffffff812908f8>] vfs_kern_mount+0x68/0x160 [ 64.670008] [<ffffffff81293d6c>] do_mount+0x22c/0xc20 [ 64.670008] [<ffffffff8120d92e>] ? might_fault+0x5e/0xc0 [ 64.670008] [<ffffffff811fcf1b>] ? memdup_user+0x4b/0x90 [ 64.670008] [<ffffffff81294a8e>] SyS_mount+0x9e/0x100 [ 64.670008] [<ffffffff8185e169>] system_call_fastpath+0x12/0x17 [ 64.670008] Code: 00 00 c7 86 78 01 00 00 02 00 00 00 48 c7 86 80 01 00 00 00 00...
2011 Jul 14
0
btrfs panic
...7bfd2>] ? trace_hardirqs_off+0xd/0xf [ 1998.478275] [<ffffffff81071f42>] ? local_clock+0x36/0x4d [ 1998.478275] [<ffffffff810800ab>] ? lock_release_non_nested+0xdb/0x263 [ 1998.478275] [<ffffffff81121996>] do_sync_write+0xcb/0x108 [ 1998.478275] [<ffffffff810f33a4>] ? might_fault+0x5c/0xac [ 1998.478275] [<ffffffff8107ed01>] ? lock_is_held+0x8d/0x98 [ 1998.478275] [<ffffffff8112200f>] vfs_write+0xaf/0x102 [ 1998.478275] [<ffffffff8112347e>] ? fget_light+0x3a/0xa1 [ 1998.478275] [<ffffffff81122222>] sys_write+0x4d/0x74 [ 1998.478275] [<fffffff...
2013 Aug 16
1
[PATCH 3/6] vhost: switch to use vhost_add_used_n()
On Fri, Aug 16, 2013 at 01:16:27PM +0800, Jason Wang wrote: > Let vhost_add_used() to use vhost_add_used_n() to reduce the code duplication. > > Signed-off-by: Jason Wang <jasowang at redhat.com> Does compiler inline it then? Reason I ask, last time I checked put_user inside vhost_add_used was much cheaper than copy_to_user inside vhost_add_used_n, so I wouldn't be surprised
2013 Aug 16
1
[PATCH 3/6] vhost: switch to use vhost_add_used_n()
On Fri, Aug 16, 2013 at 01:16:27PM +0800, Jason Wang wrote: > Let vhost_add_used() to use vhost_add_used_n() to reduce the code duplication. > > Signed-off-by: Jason Wang <jasowang at redhat.com> Does compiler inline it then? Reason I ask, last time I checked put_user inside vhost_add_used was much cheaper than copy_to_user inside vhost_add_used_n, so I wouldn't be surprised
2014 Nov 10
0
kernel BUG at drivers/block/virtio_blk.c:172!
...26de58>] mount_fs+0x38/0x1c0 > [ 64.670008] [<ffffffff81202c15>] ? __alloc_percpu+0x15/0x20 > [ 64.670008] [<ffffffff812908f8>] vfs_kern_mount+0x68/0x160 > [ 64.670008] [<ffffffff81293d6c>] do_mount+0x22c/0xc20 > [ 64.670008] [<ffffffff8120d92e>] ? might_fault+0x5e/0xc0 > [ 64.670008] [<ffffffff811fcf1b>] ? memdup_user+0x4b/0x90 > [ 64.670008] [<ffffffff81294a8e>] SyS_mount+0x9e/0x100 > [ 64.670008] [<ffffffff8185e169>] system_call_fastpath+0x12/0x17 > [ 64.670008] Code: 00 00 c7 86 78 01 00 00 02 00 00 00 48 c7 8...
2011 Sep 05
0
Slow performance
...[<ffffffffa065e0fd>] ocfs2_create+0xa2/0x10a [ocfs2] [<ffffffff8112268f>] vfs_create+0x7e/0x9d [<ffffffff81125794>] do_filp_open+0x302/0x92d [<ffffffff810425cb>] ? should_resched+0xe/0x2f [<ffffffff81437731>] ? _cond_resched+0xe/0x22 [<ffffffff81238109>] ? might_fault+0xe/0x10 [<ffffffff812381f3>] ? __strncpy_from_user+0x20/0x4a [<ffffffff81114bc8>] do_sys_open+0x62/0x109 [<ffffffff81114ca2>] sys_open+0x20/0x22 [<ffffffff81011db2>] system_call_fastpath+0x16/0x1b Checking the bz, these two bugs seems to have similar behavior: http://...
2013 Jan 04
31
xennet: skb rides the rocket: 20 slots
Hi Ian, Today i fired up an old VM with a bittorrent client, trying to download some torrents. I seem to be hitting the unlikely case of "xennet: skb rides the rocket: xx slots" and this results in some dropped packets in domU, I don''t see any warnings in dom0. I have added some extra info, but i don''t have enough knowledge if this could/should be prevented from
2016 Nov 02
13
[PATCH v7 00/11] implement vcpu preempted check
change from v6: fix typos and remove uncessary comments. change from v5: spilt x86/kvm patch into guest/host part. introduce kvm_write_guest_offset_cached. fix some typos. rebase patch onto 4.9.2 change from v4: spilt x86 kvm vcpu preempted check into two patches. add documentation patch. add x86 vcpu preempted check patch under xen add s390 vcpu preempted check patch change from v3:
2016 Nov 02
13
[PATCH v7 00/11] implement vcpu preempted check
change from v6: fix typos and remove uncessary comments. change from v5: spilt x86/kvm patch into guest/host part. introduce kvm_write_guest_offset_cached. fix some typos. rebase patch onto 4.9.2 change from v4: spilt x86 kvm vcpu preempted check into two patches. add documentation patch. add x86 vcpu preempted check patch under xen add s390 vcpu preempted check patch change from v3:
2012 Feb 13
23
Set nodatacow per file?
Hello, is it possible to set nodatacow on a per-file basis? I couldn''t find anything. If not, wouldn''t that be a great feature to get around the performance issues with VM and database storage? Of course cloning should still cause COW. Thanks, Ralf-Peter -- To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in the body of a message to
2016 Mar 18
4
[PATCH] gpu/drm: Use u64_to_user_pointer
Use the newly added u64_to_user_pointer a bit more frequently. Signed-off-by: Joe Perches <joe at perches.com> --- drivers/gpu/drm/armada/armada_gem.c | 2 +- drivers/gpu/drm/nouveau/nouveau_gem.c | 7 ++++--- drivers/gpu/drm/tegra/drm.c | 15 ++++++++------- drivers/gpu/drm/vc4/vc4_bo.c | 4 ++-- drivers/gpu/drm/vc4/vc4_gem.c | 10 +++++-----
2016 Mar 18
4
[PATCH] gpu/drm: Use u64_to_user_pointer
Use the newly added u64_to_user_pointer a bit more frequently. Signed-off-by: Joe Perches <joe at perches.com> --- drivers/gpu/drm/armada/armada_gem.c | 2 +- drivers/gpu/drm/nouveau/nouveau_gem.c | 7 ++++--- drivers/gpu/drm/tegra/drm.c | 15 ++++++++------- drivers/gpu/drm/vc4/vc4_bo.c | 4 ++-- drivers/gpu/drm/vc4/vc4_gem.c | 10 +++++-----
2013 Oct 06
40
[xen] double fault: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC
Greetings, I got the below dmesg and the first bad commit is commit cf39c8e5352b4fb9efedfe7e9acb566a85ed847c Merge: 3398d25 23b7eaf Author: Linus Torvalds <torvalds@linux-foundation.org> Date: Wed Sep 4 17:45:39 2013 -0700 Merge tag ''stable/for-linus-3.12-rc0-tag'' of git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip Pull Xen updates from Konrad