similar to: [PATCH 00/02] broken page handle wrt migration

Displaying 20 results from an estimated 20000 matches similar to: "[PATCH 00/02] broken page handle wrt migration"

2007 Jan 11
0
[PATCH 6/8] HVM save restore: guest memory handling
[PATCH 6/8] HVM save restore: guest memory handling Signed-off-by: Zhai Edwin <edwin.zhai@intel.com> add support for save/restore HVM guest memory diff -r bb1c450b2739 tools/libxc/xc_hvm_restore.c --- a/tools/libxc/xc_hvm_restore.c Thu Jan 11 21:03:11 2007 +0800 +++ b/tools/libxc/xc_hvm_restore.c Thu Jan 11 21:05:45 2007 +0800 @@ -31,6 +31,40 @@ #include <xen/hvm/ioreq.h>
2006 Apr 17
1
[patch] calloc arguments
Hi, it looks like a few users of calloc had their arguments backwards. I checked the other users and they seem fine. Since one of those is in ioemu code, does that mean we (I?) will be submitting that bug to qemu upstream? -- Hollis Blanchard IBM Linux Technology Center Fix swapped calloc() arguments. Signed-off-by: Hollis Blanchard <hollisb@us.ibm.com> diff -r c4eead8a925b
2008 Sep 28
2
is_mapped() in xc_domain_save()
Hi all, I think I have a pretty good grasp on domain save/migration code in xc_domain_save() in Xen 3.2.x, except for the what the is_mapped() macro is doing in following: /* Hypercall interfaces operate in PFNs for HVM guests * and MFNs for PV guests */ if ( hvm ) pfn_type[batch] = n; else pfn_type[batch] = pfn_to_mfn(n); if ( !is_mapped(pfn_type[batch]) ) { /* ** not currently
2012 Sep 04
1
[PATCH] xen/p2m: Fix one by off error in checking the P2M tree directory.
We would the full P2M top directory from 0->MAX_DOMAIN_PAGES (inclusive). Which meant that if the kernel was compiled with MAX_DOMAIN_PAGES=512 we would try to use the 512th entry. Fortunately for us the p2m_top_index has a check for this: BUG_ON(pfn >= MAX_P2M_PFN); which we hit and saw this: (XEN) domain_crash_sync called from entry.S (XEN) Domain 0 (vcpu#0) crashed on cpu#0: (XEN)
2014 Feb 27
3
[PATCH] xen/grant-table: Refactor gnttab_[un]map_refs to avoid m2p_override
(This is a continuation of "[PATCH v9] xen/grant-table: Avoid m2p_override during mapping") The grant mapping API does m2p_override unnecessarily: only gntdev needs it, for blkback and future netback patches it just cause a lock contention, as those pages never go to userspace. Therefore this series does the following: - the bulk of the original function (everything after the mapping
2014 Feb 27
3
[PATCH] xen/grant-table: Refactor gnttab_[un]map_refs to avoid m2p_override
(This is a continuation of "[PATCH v9] xen/grant-table: Avoid m2p_override during mapping") The grant mapping API does m2p_override unnecessarily: only gntdev needs it, for blkback and future netback patches it just cause a lock contention, as those pages never go to userspace. Therefore this series does the following: - the bulk of the original function (everything after the mapping
2013 Aug 27
1
[PATCH] xen/balloon: don't set P2M entry for auto translated guest
In commit cd9151e2: xen/balloon: set a mapping for ballooned out pages we have the ballooned out page''s mapping set to a scratch page. That commit also sets the P2M entry of ballooned out page to the scratch page''s MFN. This is necessary for PV guest but not for HVM guest. On the other hand, setting the P2M entry would trigger BUG_ON in __set_phys_to_machine. The correct thing
2007 Feb 12
0
[PATCH] lift physical address restriction in svae/restore code
Bump this to 44 bits for x86-32 and 52 bits for x86-64. Signed-off-by: Jan Beulich <jbeulich@novell.com> Index: 2007-02-07/tools/libxc/xc_linux_restore.c =================================================================== --- 2007-02-07.orig/tools/libxc/xc_linux_restore.c 2007-01-17 11:16:20.000000000 +0100 +++ 2007-02-07/tools/libxc/xc_linux_restore.c 2007-02-12 09:06:05.000000000 +0100
2013 Sep 19
3
[PATCH] xen/balloon: don't alloc page while non-preemptible
From: David Vrabel <david.vrabel@citrix.com> get_balloon_scratch_page() disables preemption so we cannot call alloc_page() in between get/put_balloon_scratch_page(). Shuffle bits around in decrease_reservation() to avoid this. Signed-off-by: David Vrabel <david.vrabel@citrix.com> --- drivers/xen/balloon.c | 23 +++++++++++------------ 1 files changed, 11 insertions(+), 12
2008 May 30
2
relationship of the auto_translated_physmap feature and the shadow_mode_translate mode of domain
2012 Jul 24
0
What went in Linux 3.5 from Xen standpoint.
Hey, Linus released this Saturday v3.5 and there were quite a few of interesting components/fixes/features that went in! Going to go down the list of what shortlog provided: - Less MSR traps when using AMD machines - so better performance. [andre] - The APIC IPI interface works - which means that ''perf'' in the initial domain works. So no more lockups. Also with some
2013 Sep 14
3
[xen-unstable bisection] complete build-i386
branch xen-unstable xen branch xen-unstable job build-i386 test xen-build Tree: qemuu git://xenbits.xen.org/staging/qemu-upstream-unstable.git Tree: xen git://xenbits.xen.org/xen.git *** Found and reproduced problem changeset *** Bug is in tree: xen git://xenbits.xen.org/xen.git Bug introduced: ae763e4224304983a1cde2fbb3d6e0c4d60b2688 Bug not present:
2011 Jul 25
0
[xen-unstable test] 8270: regressions - trouble: broken/fail/pass
flight 8270 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/8270/ Regressions :-( Tests which did not succeed and are blocking: test-amd64-amd64-xl-pcipt-intel 5 xen-boot fail REGR. vs. 8256 test-amd64-i386-rhel6hvm-intel 3 host-install(3) broken test-amd64-amd64-win 3 host-install(3) broken test-amd64-i386-pv
2013 Nov 06
0
[PATCH v5 5/6] xen/arm: Implement hypercall for dirty page tracing
Add hypercall (shadow op: enable/disable and clean/peek dirtied page bitmap). It consists of two parts: dirty page detecting and saving. For detecting, we setup the guest p2m''s leaf PTE read-only and whenever the guest tries to write something, permission fault happens and traps into xen. The permission-faulted GPA should be saved for the toolstack (when it wants to see which pages
2011 Jul 18
1
Re: trip to shanghai
CC''ing Tim and xen-devel On Mon, 18 Jul 2011, Jiageng Yu wrote: > 2011/7/16 Stefano Stabellini <stefano.stabellini@eu.citrix.com>: > > On Fri, 15 Jul 2011, Jiageng Yu wrote: > >> 2011/7/15 Jiageng Yu <yujiageng734@gmail.com>: > >> > 2011/7/15 Stefano Stabellini <stefano.stabellini@eu.citrix.com>: > >> >> On Fri, 15 Jul 2011,
2013 Dec 04
5
[PATCH] arm: xen: foreign mapping PTEs are special.
These mappings are in fact special and require special handling in privcmd, which already exists. Failure to mark the PTE as special on arm64 causes all sorts of bad PTE fun. x86 already gets this correct. Signed-off-by: Ian Campbell <ian.campbell@citrix.com> Cc: Stefano Stabellini <stefano.stabellini@eu.citrix.com> Cc: xen-devel@lists.xenproject.org --- arch/arm/xen/enlighten.c |
2013 Nov 11
0
[GIT PULL] (xen) stable/for-linus-3.13-rc0-tag
Hey Linus, Please git pull the following tag: git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git stable/for-linus-3.13-rc0-tag which has tons of fixes and two major features which are concentrated around the Xen SWIOTLB library. The short <blurb> is that the tracing facility (just one function) has been added to SWIOTLB to make it easier to track I/O progress. Additionally under
2007 May 26
1
rate limiting netmask w/ dd-wrt
I''m trying to setup a DD-WRT router (www.dd-wrt.com; embedded micro-device linux for the uninitiated) to rate limit all the traffic it receives from its wi-fi interface. I followed the instructions from the cookbook section on rate limiting (http://lartc.org/howto/lartc.ratelimit.single.html), but it doesn''t appear to be working. I tested by checking my laptop''s
2009 Sep 29
1
Asterisk on DD-WRT : modules.conf not found
Through the optware-package I have installed Asterisk on an external USB. Further I have a Linksys WRT610N with DD-WRT v24 mega. I start asterisk with the following command : /opt/sbin/asterisk -c I get the following WARNING : root at DD-WRT:/opt/etc/asterisk# /opt/sbin/asterisk -c Asterisk 1.4.22.1, Copyright (C) 1999 - 2008 Digium, Inc. and others. Created by Mark Spencer <markster at
2011 May 06
14
[PATCH 0 of 4] Use superpages on restore/migrate
This patch series restores the use of superpages when restoring or migrating a VM, while retaining efficient batching of 4k pages when superpages are not appropriate or available. Signed-off-by: George Dunlap <george.dunlap@eu.citrix.com> _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel