Displaying 20 results from an estimated 20 matches for "might_fault".
2009 Jan 24
5
[LLVMdev] inline asm semantics: output constraint width smaller than input
...fine get_user(x, ptr) \
({ \
- int __ret_gu; \
+ unsigned long __ret_gu; \
unsigned long __val_gu; \
__chk_user_ptr(ptr); \
might_fault(); \
@@ -176,7 +176,7 @@ extern int __get_user_bad(void);
break; \
} \
(x) = (__typeof__(*(ptr)))__val_gu; \
- __ret_gu; \
+ (int)__ret_gu;...
2016 Dec 19
2
[PATCH v7 08/11] x86, kvm/x86.c: support vcpu preempted check
...h/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@ -2844,7 +2844,17 @@ static void kvm_steal_time_set_preempted(struct kvm_vcpu *vcpu)
void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu)
{
+ /*
+ * Disable page faults because we're in atomic context here.
+ * kvm_write_guest_offset_cached() would call might_fault()
+ * that relies on pagefault_disable() to tell if there's a
+ * bug. NOTE: the write to guest memory may not go through if
+ * during postcopy live migration or if there's heavy guest
+ * paging.
+ */
+ pagefault_disable();
kvm_steal_time_set_preempted(vcpu);
+ pagefault_enable();...
2016 Dec 19
2
[PATCH v7 08/11] x86, kvm/x86.c: support vcpu preempted check
...h/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@ -2844,7 +2844,17 @@ static void kvm_steal_time_set_preempted(struct kvm_vcpu *vcpu)
void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu)
{
+ /*
+ * Disable page faults because we're in atomic context here.
+ * kvm_write_guest_offset_cached() would call might_fault()
+ * that relies on pagefault_disable() to tell if there's a
+ * bug. NOTE: the write to guest memory may not go through if
+ * during postcopy live migration or if there's heavy guest
+ * paging.
+ */
+ pagefault_disable();
kvm_steal_time_set_preempted(vcpu);
+ pagefault_enable();...
2009 Jan 24
0
[LLVMdev] inline asm semantics: output constraint width smaller than input
...\
> ({ \
> - int __ret_gu; \
> + unsigned long __ret_gu; \
> unsigned long __val_gu; \
> __chk_user_ptr(ptr); \
> might_fault(); \
> @@ -176,7 +176,7 @@ extern int __get_user_bad(void);
> break; \
> } \
> (x) = (__typeof__(*(ptr)))__val_gu; \
> - __ret_gu; \
&g...
2009 Jan 24
1
[LLVMdev] inline asm semantics: output constraint width smaller than input
...u would get an
error at compile time (as suggested
in __builtin_choose_expr in gcc's manual), if that branch would ever get
expanded. Does that sound right?
>
>> __typeof__(*(ptr)) __pu_val; \
>> __chk_user_ptr(ptr); \
>> might_fault(); \
>> __pu_val = x; \
>> + /* return value is 0 or -EFAULT, both fit in 1 byte, and \
>> + * are sign-extendable to int */ \
>> switch (sizeof(*(ptr))) { \
>> case 1:...
2016 Dec 19
0
[PATCH v7 08/11] x86, kvm/x86.c: support vcpu preempted check
...m/x86.c
> @@ -2844,7 +2844,17 @@ static void kvm_steal_time_set_preempted(struct kvm_vcpu *vcpu)
>
> void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu)
> {
> + /*
> + * Disable page faults because we're in atomic context here.
> + * kvm_write_guest_offset_cached() would call might_fault()
> + * that relies on pagefault_disable() to tell if there's a
> + * bug. NOTE: the write to guest memory may not go through if
> + * during postcopy live migration or if there's heavy guest
> + * paging.
> + */
> + pagefault_disable();
> kvm_steal_time_set_pree...
2014 Nov 07
2
kernel BUG at drivers/block/virtio_blk.c:172!
...08] [<ffffffff8126de58>] mount_fs+0x38/0x1c0
[ 64.670008] [<ffffffff81202c15>] ? __alloc_percpu+0x15/0x20
[ 64.670008] [<ffffffff812908f8>] vfs_kern_mount+0x68/0x160
[ 64.670008] [<ffffffff81293d6c>] do_mount+0x22c/0xc20
[ 64.670008] [<ffffffff8120d92e>] ? might_fault+0x5e/0xc0
[ 64.670008] [<ffffffff811fcf1b>] ? memdup_user+0x4b/0x90
[ 64.670008] [<ffffffff81294a8e>] SyS_mount+0x9e/0x100
[ 64.670008] [<ffffffff8185e169>] system_call_fastpath+0x12/0x17
[ 64.670008] Code: 00 00 c7 86 78 01 00 00 02 00 00 00 48 c7 86 80 01 00 00 00 00...
2014 Nov 07
2
kernel BUG at drivers/block/virtio_blk.c:172!
...08] [<ffffffff8126de58>] mount_fs+0x38/0x1c0
[ 64.670008] [<ffffffff81202c15>] ? __alloc_percpu+0x15/0x20
[ 64.670008] [<ffffffff812908f8>] vfs_kern_mount+0x68/0x160
[ 64.670008] [<ffffffff81293d6c>] do_mount+0x22c/0xc20
[ 64.670008] [<ffffffff8120d92e>] ? might_fault+0x5e/0xc0
[ 64.670008] [<ffffffff811fcf1b>] ? memdup_user+0x4b/0x90
[ 64.670008] [<ffffffff81294a8e>] SyS_mount+0x9e/0x100
[ 64.670008] [<ffffffff8185e169>] system_call_fastpath+0x12/0x17
[ 64.670008] Code: 00 00 c7 86 78 01 00 00 02 00 00 00 48 c7 86 80 01 00 00 00 00...
2011 Jul 14
0
btrfs panic
...7bfd2>] ? trace_hardirqs_off+0xd/0xf
[ 1998.478275] [<ffffffff81071f42>] ? local_clock+0x36/0x4d
[ 1998.478275] [<ffffffff810800ab>] ? lock_release_non_nested+0xdb/0x263
[ 1998.478275] [<ffffffff81121996>] do_sync_write+0xcb/0x108
[ 1998.478275] [<ffffffff810f33a4>] ? might_fault+0x5c/0xac
[ 1998.478275] [<ffffffff8107ed01>] ? lock_is_held+0x8d/0x98
[ 1998.478275] [<ffffffff8112200f>] vfs_write+0xaf/0x102
[ 1998.478275] [<ffffffff8112347e>] ? fget_light+0x3a/0xa1
[ 1998.478275] [<ffffffff81122222>] sys_write+0x4d/0x74
[ 1998.478275] [<fffffff...
2013 Aug 16
1
[PATCH 3/6] vhost: switch to use vhost_add_used_n()
On Fri, Aug 16, 2013 at 01:16:27PM +0800, Jason Wang wrote:
> Let vhost_add_used() to use vhost_add_used_n() to reduce the code duplication.
>
> Signed-off-by: Jason Wang <jasowang at redhat.com>
Does compiler inline it then?
Reason I ask, last time I checked put_user inside vhost_add_used
was much cheaper than copy_to_user inside vhost_add_used_n,
so I wouldn't be surprised
2013 Aug 16
1
[PATCH 3/6] vhost: switch to use vhost_add_used_n()
On Fri, Aug 16, 2013 at 01:16:27PM +0800, Jason Wang wrote:
> Let vhost_add_used() to use vhost_add_used_n() to reduce the code duplication.
>
> Signed-off-by: Jason Wang <jasowang at redhat.com>
Does compiler inline it then?
Reason I ask, last time I checked put_user inside vhost_add_used
was much cheaper than copy_to_user inside vhost_add_used_n,
so I wouldn't be surprised
2014 Nov 10
0
kernel BUG at drivers/block/virtio_blk.c:172!
...26de58>] mount_fs+0x38/0x1c0
> [ 64.670008] [<ffffffff81202c15>] ? __alloc_percpu+0x15/0x20
> [ 64.670008] [<ffffffff812908f8>] vfs_kern_mount+0x68/0x160
> [ 64.670008] [<ffffffff81293d6c>] do_mount+0x22c/0xc20
> [ 64.670008] [<ffffffff8120d92e>] ? might_fault+0x5e/0xc0
> [ 64.670008] [<ffffffff811fcf1b>] ? memdup_user+0x4b/0x90
> [ 64.670008] [<ffffffff81294a8e>] SyS_mount+0x9e/0x100
> [ 64.670008] [<ffffffff8185e169>] system_call_fastpath+0x12/0x17
> [ 64.670008] Code: 00 00 c7 86 78 01 00 00 02 00 00 00 48 c7 8...
2011 Sep 05
0
Slow performance
...[<ffffffffa065e0fd>] ocfs2_create+0xa2/0x10a [ocfs2]
[<ffffffff8112268f>] vfs_create+0x7e/0x9d
[<ffffffff81125794>] do_filp_open+0x302/0x92d
[<ffffffff810425cb>] ? should_resched+0xe/0x2f
[<ffffffff81437731>] ? _cond_resched+0xe/0x22
[<ffffffff81238109>] ? might_fault+0xe/0x10
[<ffffffff812381f3>] ? __strncpy_from_user+0x20/0x4a
[<ffffffff81114bc8>] do_sys_open+0x62/0x109
[<ffffffff81114ca2>] sys_open+0x20/0x22
[<ffffffff81011db2>] system_call_fastpath+0x16/0x1b
Checking the bz, these two bugs seems to have similar behavior:
http://...
2013 Jan 04
31
xennet: skb rides the rocket: 20 slots
Hi Ian,
Today i fired up an old VM with a bittorrent client, trying to download some torrents.
I seem to be hitting the unlikely case of "xennet: skb rides the rocket: xx slots" and this results in some dropped packets in domU, I don''t see any warnings in dom0.
I have added some extra info, but i don''t have enough knowledge if this could/should be prevented from
2016 Nov 02
13
[PATCH v7 00/11] implement vcpu preempted check
change from v6:
fix typos and remove uncessary comments.
change from v5:
spilt x86/kvm patch into guest/host part.
introduce kvm_write_guest_offset_cached.
fix some typos.
rebase patch onto 4.9.2
change from v4:
spilt x86 kvm vcpu preempted check into two patches.
add documentation patch.
add x86 vcpu preempted check patch under xen
add s390 vcpu preempted check patch
change from v3:
2016 Nov 02
13
[PATCH v7 00/11] implement vcpu preempted check
change from v6:
fix typos and remove uncessary comments.
change from v5:
spilt x86/kvm patch into guest/host part.
introduce kvm_write_guest_offset_cached.
fix some typos.
rebase patch onto 4.9.2
change from v4:
spilt x86 kvm vcpu preempted check into two patches.
add documentation patch.
add x86 vcpu preempted check patch under xen
add s390 vcpu preempted check patch
change from v3:
2012 Feb 13
23
Set nodatacow per file?
Hello,
is it possible to set nodatacow on a per-file basis? I couldn''t find
anything.
If not, wouldn''t that be a great feature to get around the performance
issues with VM and database storage? Of course cloning should still
cause COW.
Thanks,
Ralf-Peter
--
To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in
the body of a message to
2016 Mar 18
4
[PATCH] gpu/drm: Use u64_to_user_pointer
Use the newly added u64_to_user_pointer a bit more frequently.
Signed-off-by: Joe Perches <joe at perches.com>
---
drivers/gpu/drm/armada/armada_gem.c | 2 +-
drivers/gpu/drm/nouveau/nouveau_gem.c | 7 ++++---
drivers/gpu/drm/tegra/drm.c | 15 ++++++++-------
drivers/gpu/drm/vc4/vc4_bo.c | 4 ++--
drivers/gpu/drm/vc4/vc4_gem.c | 10 +++++-----
2016 Mar 18
4
[PATCH] gpu/drm: Use u64_to_user_pointer
Use the newly added u64_to_user_pointer a bit more frequently.
Signed-off-by: Joe Perches <joe at perches.com>
---
drivers/gpu/drm/armada/armada_gem.c | 2 +-
drivers/gpu/drm/nouveau/nouveau_gem.c | 7 ++++---
drivers/gpu/drm/tegra/drm.c | 15 ++++++++-------
drivers/gpu/drm/vc4/vc4_bo.c | 4 ++--
drivers/gpu/drm/vc4/vc4_gem.c | 10 +++++-----
2013 Oct 06
40
[xen] double fault: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC
Greetings,
I got the below dmesg and the first bad commit is
commit cf39c8e5352b4fb9efedfe7e9acb566a85ed847c
Merge: 3398d25 23b7eaf
Author: Linus Torvalds <torvalds@linux-foundation.org>
Date: Wed Sep 4 17:45:39 2013 -0700
Merge tag ''stable/for-linus-3.12-rc0-tag'' of git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip
Pull Xen updates from Konrad