Displaying 20 results from an estimated 20000 matches similar to: "[PATCH 00/02] broken page handle wrt migration"
2007 Jan 11
0
[PATCH 6/8] HVM save restore: guest memory handling
[PATCH 6/8] HVM save restore: guest memory handling
Signed-off-by: Zhai Edwin <edwin.zhai@intel.com>
add support for save/restore HVM guest memory
diff -r bb1c450b2739 tools/libxc/xc_hvm_restore.c
--- a/tools/libxc/xc_hvm_restore.c Thu Jan 11 21:03:11 2007 +0800
+++ b/tools/libxc/xc_hvm_restore.c Thu Jan 11 21:05:45 2007 +0800
@@ -31,6 +31,40 @@
#include <xen/hvm/ioreq.h>
2006 Apr 17
1
[patch] calloc arguments
Hi, it looks like a few users of calloc had their arguments backwards. I
checked the other users and they seem fine.
Since one of those is in ioemu code, does that mean we (I?) will be
submitting that bug to qemu upstream?
--
Hollis Blanchard
IBM Linux Technology Center
Fix swapped calloc() arguments.
Signed-off-by: Hollis Blanchard <hollisb@us.ibm.com>
diff -r c4eead8a925b
2008 Sep 28
2
is_mapped() in xc_domain_save()
Hi all,
I think I have a pretty good grasp on domain save/migration code in
xc_domain_save() in Xen 3.2.x, except for the what the is_mapped()
macro is doing in following:
/* Hypercall interfaces operate in PFNs for HVM guests
* and MFNs for PV guests */
if ( hvm )
pfn_type[batch] = n;
else
pfn_type[batch] = pfn_to_mfn(n);
if ( !is_mapped(pfn_type[batch]) )
{
/*
** not currently
2012 Sep 04
1
[PATCH] xen/p2m: Fix one by off error in checking the P2M tree directory.
We would the full P2M top directory from 0->MAX_DOMAIN_PAGES (inclusive).
Which meant that if the kernel was compiled with MAX_DOMAIN_PAGES=512
we would try to use the 512th entry. Fortunately for us the p2m_top_index
has a check for this:
BUG_ON(pfn >= MAX_P2M_PFN);
which we hit and saw this:
(XEN) domain_crash_sync called from entry.S
(XEN) Domain 0 (vcpu#0) crashed on cpu#0:
(XEN)
2014 Feb 27
3
[PATCH] xen/grant-table: Refactor gnttab_[un]map_refs to avoid m2p_override
(This is a continuation of "[PATCH v9] xen/grant-table: Avoid m2p_override
during mapping")
The grant mapping API does m2p_override unnecessarily: only gntdev needs it,
for blkback and future netback patches it just cause a lock contention, as
those pages never go to userspace. Therefore this series does the following:
- the bulk of the original function (everything after the mapping
2014 Feb 27
3
[PATCH] xen/grant-table: Refactor gnttab_[un]map_refs to avoid m2p_override
(This is a continuation of "[PATCH v9] xen/grant-table: Avoid m2p_override
during mapping")
The grant mapping API does m2p_override unnecessarily: only gntdev needs it,
for blkback and future netback patches it just cause a lock contention, as
those pages never go to userspace. Therefore this series does the following:
- the bulk of the original function (everything after the mapping
2013 Aug 27
1
[PATCH] xen/balloon: don't set P2M entry for auto translated guest
In commit cd9151e2: xen/balloon: set a mapping for ballooned out pages
we have the ballooned out page''s mapping set to a scratch page.
That commit also sets the P2M entry of ballooned out page to the scratch
page''s MFN. This is necessary for PV guest but not for HVM guest. On the
other hand, setting the P2M entry would trigger BUG_ON in
__set_phys_to_machine.
The correct thing
2007 Feb 12
0
[PATCH] lift physical address restriction in svae/restore code
Bump this to 44 bits for x86-32 and 52 bits for x86-64.
Signed-off-by: Jan Beulich <jbeulich@novell.com>
Index: 2007-02-07/tools/libxc/xc_linux_restore.c
===================================================================
--- 2007-02-07.orig/tools/libxc/xc_linux_restore.c 2007-01-17 11:16:20.000000000 +0100
+++ 2007-02-07/tools/libxc/xc_linux_restore.c 2007-02-12 09:06:05.000000000 +0100
2013 Sep 19
3
[PATCH] xen/balloon: don't alloc page while non-preemptible
From: David Vrabel <david.vrabel@citrix.com>
get_balloon_scratch_page() disables preemption so we cannot call
alloc_page() in between get/put_balloon_scratch_page(). Shuffle bits
around in decrease_reservation() to avoid this.
Signed-off-by: David Vrabel <david.vrabel@citrix.com>
---
drivers/xen/balloon.c | 23 +++++++++++------------
1 files changed, 11 insertions(+), 12
2008 May 30
2
relationship of the auto_translated_physmap feature and the shadow_mode_translate mode of domain
2012 Jul 24
0
What went in Linux 3.5 from Xen standpoint.
Hey,
Linus released this Saturday v3.5 and there were quite a few
of interesting components/fixes/features that went in!
Going to go down the list of what shortlog provided:
- Less MSR traps when using AMD machines - so better performance. [andre]
- The APIC IPI interface works - which means that ''perf'' in the initial
domain works. So no more lockups. Also with some
2013 Sep 14
3
[xen-unstable bisection] complete build-i386
branch xen-unstable
xen branch xen-unstable
job build-i386
test xen-build
Tree: qemuu git://xenbits.xen.org/staging/qemu-upstream-unstable.git
Tree: xen git://xenbits.xen.org/xen.git
*** Found and reproduced problem changeset ***
Bug is in tree: xen git://xenbits.xen.org/xen.git
Bug introduced: ae763e4224304983a1cde2fbb3d6e0c4d60b2688
Bug not present:
2011 Jul 25
0
[xen-unstable test] 8270: regressions - trouble: broken/fail/pass
flight 8270 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/8270/
Regressions :-(
Tests which did not succeed and are blocking:
test-amd64-amd64-xl-pcipt-intel 5 xen-boot fail REGR. vs. 8256
test-amd64-i386-rhel6hvm-intel 3 host-install(3) broken
test-amd64-amd64-win 3 host-install(3) broken
test-amd64-i386-pv
2013 Nov 06
0
[PATCH v5 5/6] xen/arm: Implement hypercall for dirty page tracing
Add hypercall (shadow op: enable/disable and clean/peek dirtied page
bitmap).
It consists of two parts: dirty page detecting and saving.
For detecting, we setup the guest p2m''s leaf PTE read-only and whenever the
guest
tries to write something, permission fault happens and traps into xen.
The permission-faulted GPA should be saved for the toolstack (when it wants
to see
which pages
2011 Jul 18
1
Re: trip to shanghai
CC''ing Tim and xen-devel
On Mon, 18 Jul 2011, Jiageng Yu wrote:
> 2011/7/16 Stefano Stabellini <stefano.stabellini@eu.citrix.com>:
> > On Fri, 15 Jul 2011, Jiageng Yu wrote:
> >> 2011/7/15 Jiageng Yu <yujiageng734@gmail.com>:
> >> > 2011/7/15 Stefano Stabellini <stefano.stabellini@eu.citrix.com>:
> >> >> On Fri, 15 Jul 2011,
2013 Dec 04
5
[PATCH] arm: xen: foreign mapping PTEs are special.
These mappings are in fact special and require special handling in privcmd,
which already exists. Failure to mark the PTE as special on arm64 causes all sorts of bad PTE fun.
x86 already gets this correct.
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Cc: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Cc: xen-devel@lists.xenproject.org
---
arch/arm/xen/enlighten.c |
2013 Nov 11
0
[GIT PULL] (xen) stable/for-linus-3.13-rc0-tag
Hey Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git stable/for-linus-3.13-rc0-tag
which has tons of fixes and two major features which are concentrated around
the Xen SWIOTLB library.
The short <blurb> is that the tracing facility (just one function) has been
added to SWIOTLB to make it easier to track I/O progress. Additionally under
2007 May 26
1
rate limiting netmask w/ dd-wrt
I''m trying to setup a DD-WRT router (www.dd-wrt.com; embedded micro-device
linux for the uninitiated) to rate limit all the traffic it receives from
its wi-fi interface. I followed the instructions from the cookbook section
on rate limiting (http://lartc.org/howto/lartc.ratelimit.single.html), but
it doesn''t appear to be working. I tested by checking my laptop''s
2009 Sep 29
1
Asterisk on DD-WRT : modules.conf not found
Through the optware-package I have installed Asterisk on an external
USB. Further I have a Linksys WRT610N with DD-WRT v24 mega.
I start asterisk with the following command : /opt/sbin/asterisk -c
I get the following WARNING :
root at DD-WRT:/opt/etc/asterisk# /opt/sbin/asterisk -c
Asterisk 1.4.22.1, Copyright (C) 1999 - 2008 Digium, Inc. and others.
Created by Mark Spencer <markster at
2011 May 06
14
[PATCH 0 of 4] Use superpages on restore/migrate
This patch series restores the use of superpages when restoring or
migrating a VM, while retaining efficient batching of 4k pages when
superpages are not appropriate or available.
Signed-off-by: George Dunlap <george.dunlap@eu.citrix.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel