similar to: MOORHUNT

Displaying 20 results from an estimated 10000 matches similar to: "MOORHUNT"

2010 Sep 16
2
Re: Error on every tyr of installation of .exe files
mandos at Mand0s:~/.wine/drive_c/Arquivos de programas/MoorHunt$ wine start MoorHunt.exe fixme:exec:SHELL_execute flags ignored: 0x00000100 mandos at Mand0s:~/.wine/drive_c/Arquivos de programas/MoorHunt$ fixme:sync:CreateMemoryResourceNotification (0) stub err:ole:CoGetContextToken apartment not initialised fixme:imm:ImmDisableIME (-1): stub fixme:ntdll:find_reg_tz_info Can't find matching
2012 Jun 27
0
Re: [PATCH 2 of 4] xen, pod: Zero-check recently populated pages (checklast)
> # HG changeset patch > # User George Dunlap <george.dunlap@eu.citrix.com> > # Date 1340815812 -3600 > # Node ID ea827c449088a1017b6e5a9564eb33df70f8a9c6 > # Parent b4e1fec1c98f6cbad666a972f473854518c25500 > xen,pod: Zero-check recently populated pages (checklast) > > When demand-populating pages due to guest accesses, check recently > populated > pages to see
2013 Sep 06
2
[PATCH] xen: arm: improve VMID allocation.
The VMID field is 8 bits. Rather than allowing only up to 256 VMs per host reboot before things start "acting strange" instead maintain a simple bitmap of used VMIDs and allocate them statically to guests upon creation. This limits us to 256 concurrent VMs which is a reasonable improvement. Eventually we will want a proper scheme to allocate VMIDs on context switch. The existing code
2013 Feb 28
1
[PATCH] x86/mm: fix invalid unlinking of nested p2m tables
Commit 90805dc (c/s 26387:4056e5a3d815) ("EPT: Make ept data stucture or operations neutral") makes nested p2m tables be unlinked from the host p2m table before their destruction (in p2m_teardown_nestedp2m). However, by this time the host p2m table has already been torn down, leading to a possible race condition where another allocation between the two kinds of table being torn down can
2013 Nov 06
0
[PATCH v5 5/6] xen/arm: Implement hypercall for dirty page tracing
Add hypercall (shadow op: enable/disable and clean/peek dirtied page bitmap). It consists of two parts: dirty page detecting and saving. For detecting, we setup the guest p2m''s leaf PTE read-only and whenever the guest tries to write something, permission fault happens and traps into xen. The permission-faulted GPA should be saved for the toolstack (when it wants to see which pages
2011 Sep 23
2
Some problems about xenpaging
Hi, Olaf we have tested the xenpaging feature and found some problems. (1) the test case like this : when we start a VM with POD enable, the xenpaging is started at the same time. this case will cause many problems ,finally, we fixed the BUG, the patch is attached below. (2) there is a very serious problem. we have observed many VM crash examples, the error code is not always the same.
2012 Sep 04
1
[PATCH] xen/p2m: Fix one by off error in checking the P2M tree directory.
We would the full P2M top directory from 0->MAX_DOMAIN_PAGES (inclusive). Which meant that if the kernel was compiled with MAX_DOMAIN_PAGES=512 we would try to use the 512th entry. Fortunately for us the p2m_top_index has a check for this: BUG_ON(pfn >= MAX_P2M_PFN); which we hit and saw this: (XEN) domain_crash_sync called from entry.S (XEN) Domain 0 (vcpu#0) crashed on cpu#0: (XEN)
2012 Mar 15
3
[PATCH] arm: allocate top level p2m page for all non-idle VCPUs
Not just dom0. Signed-off-by: Ian Campbell <ian.campbell@citrix.com> --- xen/arch/arm/domain.c | 3 +++ xen/arch/arm/domain_build.c | 3 --- xen/arch/arm/p2m.c | 2 +- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c index 5702399..4b38790 100644 --- a/xen/arch/arm/domain.c +++ b/xen/arch/arm/domain.c @@
2012 Mar 29
0
[PATCH v2 2/2] m2p_find_override: use list_for_each_entry_safe
Use list_for_each_entry_safe and remove the spin_lock acquisition in m2p_find_override: getting stale entries is OK because we should never get an m2p_find_override call looking for an entry that we are about to add or delete. Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com> --- arch/x86/xen/p2m.c | 9 ++------- 1 files changed, 2 insertions(+), 7 deletions(-) diff
2006 Feb 06
0
RE: [Xen-ia64-devel] RE: [BUNDLE] Testing a simplerinter-domain transport
Yang, Fred wrote: > Dan, > >> From Xen summit, isn''t it to be more P2M liked approach due to > consideration on driver domain and domain0 needs to get P2M for > VBD/VNIF? > > Don''t remember there is decision on taking Hypercall only approach and > dropped P2M table lookup. Any justification here? To me having an array like x86 xenlinux is much
2011 Mar 15
6
[PATCH] ept: Fix bug in changeset 22526:7a5ee3800417
This fixes a bug in changeset 22526:7a5ee3800417, where the wrong value is read when deciding whether to flush the VTd tables. The effect is minor: in situations where the p2m entry is changed but the mfn is the same, the VTd tables will be unnecessarily flushed. old_entry is left untouched in the second case, since having a present old_entry will cause the an unnecessary check to be taken at
2013 Aug 27
1
[PATCH] xen/balloon: don't set P2M entry for auto translated guest
In commit cd9151e2: xen/balloon: set a mapping for ballooned out pages we have the ballooned out page''s mapping set to a scratch page. That commit also sets the P2M entry of ballooned out page to the scratch page''s MFN. This is necessary for PV guest but not for HVM guest. On the other hand, setting the P2M entry would trigger BUG_ON in __set_phys_to_machine. The correct thing
2014 Feb 27
3
[PATCH] xen/grant-table: Refactor gnttab_[un]map_refs to avoid m2p_override
(This is a continuation of "[PATCH v9] xen/grant-table: Avoid m2p_override during mapping") The grant mapping API does m2p_override unnecessarily: only gntdev needs it, for blkback and future netback patches it just cause a lock contention, as those pages never go to userspace. Therefore this series does the following: - the bulk of the original function (everything after the mapping
2014 Feb 27
3
[PATCH] xen/grant-table: Refactor gnttab_[un]map_refs to avoid m2p_override
(This is a continuation of "[PATCH v9] xen/grant-table: Avoid m2p_override during mapping") The grant mapping API does m2p_override unnecessarily: only gntdev needs it, for blkback and future netback patches it just cause a lock contention, as those pages never go to userspace. Therefore this series does the following: - the bulk of the original function (everything after the mapping
2007 Nov 07
1
How to set multi backends (with same type)
hi..... i don't know if its posible. i have two ldap directories, and i want use them to use as my dovecot users backend... so i have two configurations files... "dovecot-ldap1.conf" and " dovecot-ldap2.conf" and i try setting like: Test 1: (simil postfix ) :D This dont work auth default { : : passdb ldap { args=
2007 Apr 03
2
Question regarding the number of P2M l3e entries
In p2m.c (line 197 and line 550), the code assumes the number of L3 P2M table entries is 8 (under PAE mode). According to Intel and AMD specs, it is 4. Could someone explain this discrepancy? Is it a bug? -Wei _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2009 Jun 10
2
winetricks doesn't work for me
It's been a long time since I used winetricks, but either I'm doing something wrong, or ??? I run Karmic Koala. susan at ubuntu:~$ sh winetricks mono22 Executing wget -nd -c --read-timeout=300 --retry-connrefused --header Accept-Encoding: gzip,deflate ftp://ftp.novell.com/pub/mono/archive/2.2/windows-installer/5/mono-2.2-gtksharp-2.12.7-win32-5.exe --2009-06-10 07:43:22--
2011 Jul 18
1
Re: trip to shanghai
CC''ing Tim and xen-devel On Mon, 18 Jul 2011, Jiageng Yu wrote: > 2011/7/16 Stefano Stabellini <stefano.stabellini@eu.citrix.com>: > > On Fri, 15 Jul 2011, Jiageng Yu wrote: > >> 2011/7/15 Jiageng Yu <yujiageng734@gmail.com>: > >> > 2011/7/15 Stefano Stabellini <stefano.stabellini@eu.citrix.com>: > >> >> On Fri, 15 Jul 2011,
2010 Sep 19
1
odd gfn number checking in p2m.c
Hello, how can a gfn become 0x555555 as checked in p2m.c:guest_physmap_add_entry() and p2m_alloc_table()? Looking further in p2m.c, audit_p2m() checks only for a 32bit value. So where is that magic number set, and why is it not a define to simplify grepping for users of that value? Olaf _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com
2007 Jan 11
0
[PATCH 6/8] HVM save restore: guest memory handling
[PATCH 6/8] HVM save restore: guest memory handling Signed-off-by: Zhai Edwin <edwin.zhai@intel.com> add support for save/restore HVM guest memory diff -r bb1c450b2739 tools/libxc/xc_hvm_restore.c --- a/tools/libxc/xc_hvm_restore.c Thu Jan 11 21:03:11 2007 +0800 +++ b/tools/libxc/xc_hvm_restore.c Thu Jan 11 21:05:45 2007 +0800 @@ -31,6 +31,40 @@ #include <xen/hvm/ioreq.h>