Displaying 9 results from an estimated 9 matches for "shadow_ops".
Did you mean:
shadow_op
2008 Feb 21
2
[PATCH][RFC]Remove lock on first guest table walk
Just found this patch in house which I thought sent out
already. :-)
Still one thing remaining is to special case for UP guest
which suffers overhead from this change...
----
Remove lock on first guest table walk
Existing shadow fault path grabs big lock before walking
guest tables, to ensure consistency with shadow content
lest concurrent change from other vcpu in a bad OS.
But this lock
2008 Feb 22
3
FW: [PATCH][UPDATE]Remove lock on guest table walk
Is there any trouble with mailing list? I didn''t see my mail sent back
after almost 8hrs. :-(
Thanks,
Kevin
-----Original Message-----
From: Tian, Kevin
Sent: 2008年2月22日 10:33
To: ''Tim Deegan''
Cc: xen-devel@lists.xensource.com
Subject: [PATCH][UPDATE]Remove lock on guest table walk
>From: Tim Deegan
>Sent: 2008年2月21日 22:13
>Hi,
>
>So, the idea seems
2007 May 04
0
[PATCH] 3/4 "nemesis" scheduling domains for Xen
Implements tool interfaces for scheduling domains. libxenctrl, xm, and xend.
signed-off-by: Mike D. Day <ncmike@us.ibm.com>
--
libxc/xc_domain.c | 85 +++++++++++++++++++++++++++++++++---
libxc/xenctrl.h | 43 ++++++++++++++++--
python/xen/xend/XendDomain.py | 78 +++++++++++++++++++++++++++++++++
python/xen/xend/server/SrvDomain.py |
2005 Sep 01
0
[PATCH][VT]Make 32-bit VMX guest work on 64-bit host
...imulate 32-bit guest''s 2-level page-table.
Signed-off-by: Chengyuan Li <chengyuan.li@intel.com>
Signed-off-by: Xiaohui Xin <xiaohui.xin@intel.com>
Signed-off-by: Jun Nakajima <jun.nakajima@intel.com>
b/xen/arch/x86/shadow_guest32.c | 18 +
b/xen/include/asm-x86/shadow_ops.h | 130 +++++++++
xen/arch/x86/Makefile | 2
xen/arch/x86/shadow.c | 516
++++++++++++++++++++++++++++--------
xen/arch/x86/shadow_public.c | 93 +++++-
xen/arch/x86/vmx.c | 22 +
xen/include/asm-x86/page-guest32.h | 5
xen/include/...
2012 Oct 01
5
How to get the checkpoint size in remus code?
Hi,
I''m doing my master research and I need to adapt remus code. Now... I wanna
get the checkpoint size (memory + disk) on each period. Does someone know
what function does this? I think some *fd *object''s function in remus code
could just get the memory size.
Does someone help me?
Thanks
_______________________________________________
Xen-devel mailing list
2012 Dec 12
2
[PATCH v7 1/2] xen: unify domain locking in domctl code
These two patches were originally part of the XSM series that I have
posted, and remain prerequisites for that series. However, they are
independent of the XSM changes and are a useful simplification
regardless of the use of XSM.
The Acked-bys on these patches were provided before rebasing them over
the copyback changes in 26268:1b72138bddda, which had minor conflicts
that I resolved.
[PATCH
2013 Nov 06
0
[PATCH v5 5/6] xen/arm: Implement hypercall for dirty page tracing
Add hypercall (shadow op: enable/disable and clean/peek dirtied page
bitmap).
It consists of two parts: dirty page detecting and saving.
For detecting, we setup the guest p2m''s leaf PTE read-only and whenever the
guest
tries to write something, permission fault happens and traps into xen.
The permission-faulted GPA should be saved for the toolstack (when it wants
to see
which pages
2006 Dec 01
0
[PATCH 3/10] Add support for netfront/netback acceleration drivers
This set of patches adds the support for acceleration plugins to the
netfront/netback drivers. These plugins are intended to support
virtualisable network hardware that can be directly accessed from the
guest, bypassing dom0.
This is in response to the RFC we posted to xen-devel with an outline
of our approach at the end of September.
To follow will be another set of patches to provide our
2006 Jul 14
23
[RFC] New shadow paging code
We (Michael Fetterman, George Dunlap and I) have been working over the
last while on a full replacement for Xen''s shadow pagetable support.
This mail contains some design notes, below; a patch against
xen-unstable, giving a snapshot of the current state of the new shadow
code, is at http://www.cl.cam.ac.uk/~tjd21/shadow2.patch
Comments on both are welcome, although the code is not