Displaying 20 results from an estimated 700 matches similar to: "Question on local_irq_save/local_irq_retore"
2012 Oct 02
2
The entry of Xen's exception handler
Hi, I am trying to understand the exception handler of Xen. In
xen/arch/x86/x86_64/entry.S, the entry of the page fault handler is :
ENTRY(page_fault)
movl $TRAP_page_fault,4(%rsp)
jmp handle_exception
Here I did not get why to put the exception vector ($TRAP_page_fault) to
stack before calling handle_exception?
Thanks,
--
Xinxin
2007 Apr 18
0
[RFC, PATCH 13/24] i386 Vmi system header
Fairly straightforward code motion in system.h into the sub-arch
layer. Affected functionality include control register accessors,
which are virtualizable but with great overhead due to the #GP
cost; wbinvd, and most importantly, halt and interrupt control,
which is non-virtualizable.
Since read_cr4_safe can never fault on a VMI kernel (P5+ processor
is required for VMI), we can omit the fault
2007 Apr 18
0
[RFC, PATCH 13/24] i386 Vmi system header
Fairly straightforward code motion in system.h into the sub-arch
layer. Affected functionality include control register accessors,
which are virtualizable but with great overhead due to the #GP
cost; wbinvd, and most importantly, halt and interrupt control,
which is non-virtualizable.
Since read_cr4_safe can never fault on a VMI kernel (P5+ processor
is required for VMI), we can omit the fault
2007 Apr 18
1
[RFC] [PATCH] Split host arch headers for UML's benefit
The patch below fixes the recent UML compilation failure in -rc5-mm1
without making the UML build reach further into the i386 headers. It
splits the i386 ptrace.h and system.h into UML-usable and UML-unusable
pieces.
The string "abi" is in there because I did ptrace.h first, and that
involves separating the ptrace ABI stuff from everything else (if
pt_regs is not considered part of
2007 Apr 18
1
[RFC] [PATCH] Split host arch headers for UML's benefit
The patch below fixes the recent UML compilation failure in -rc5-mm1
without making the UML build reach further into the i386 headers. It
splits the i386 ptrace.h and system.h into UML-usable and UML-unusable
pieces.
The string "abi" is in there because I did ptrace.h first, and that
involves separating the ptrace ABI stuff from everything else (if
pt_regs is not considered part of
2007 Apr 18
1
[PATCH 7/21] i386 Losing fs gs to bios
I discovered an even more subtle problem; the PnP BIOS code is saving
the %fs and %gs segments in inline assembler, yet it also uses the same
hack for patching in a fake real mode selector for the BIOS data area.
Note that the protected mode selector 0x40 overlaps the user TLS area in
the GDT; this means that badly timed PnP BIOS calls could come in, save
%fs, come back, and restore %fs -- to
2007 Apr 18
1
[PATCH 7/21] i386 Losing fs gs to bios
I discovered an even more subtle problem; the PnP BIOS code is saving
the %fs and %gs segments in inline assembler, yet it also uses the same
hack for patching in a fake real mode selector for the BIOS data area.
Note that the protected mode selector 0x40 overlaps the user TLS area in
the GDT; this means that badly timed PnP BIOS calls could come in, save
%fs, come back, and restore %fs -- to
2011 Jun 03
1
[LLVMdev] Thinking about "whacky" backends
-------- Original Message --------
Subject: Re: [LLVMdev] Thinking about "whacky" backends
Date: Fri, 03 Jun 2011 14:44:05 -0400
From: Nate Fries <nfries88 at yahoo.com>
To: Joachim Durchholz <jo at durchholz.org>
On 6/3/2011 1:38 PM, Joachim Durchholz wrote:
> Am 01.06.2011 23:25, schrieb Nate Fries:
>> That said, it seems like it ought to be possible to do
2012 Nov 14
0
[PATCH] x86/nmi: self_nmi() should not unconditionally enable interrupts
It seems that all current callers have interrupts enabled, making the
code currently safe but dangerous. Also, fix a trailing whitespace issue.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
diff -r 8b93ac0c93f3 -r f3adcb7d84ea xen/arch/x86/nmi.c
--- a/xen/arch/x86/nmi.c
+++ b/xen/arch/x86/nmi.c
@@ -482,13 +482,14 @@ void nmi_watchdog_tick(struct cpu_user_r
* 8-3 and 8-4 in
2007 Nov 26
0
[PATCH] [Mini-OS] Make gnttab allocation/free safe
Add a semaphore to protect gnttab_list from exhaustion, and disable
callbacks during allocation/free. Fix the network frontend accordingly.
Signed-off-by: Samuel Thibault <samuel.thibault@citrix.com>
diff -r bb961bda7eff extras/mini-os/gnttab.c
--- a/extras/mini-os/gnttab.c Sun Nov 25 21:24:48 2007 +0000
+++ b/extras/mini-os/gnttab.c Mon Nov 26 11:50:31 2007 +0000
@@ -18,6 +18,7 @@
2010 Sep 26
1
compare a vector and a row of a matrix
From: xxgreat@hotmail.com
To: r-help-bounces@r-project.org
Subject: compare a vector and a row of a matrix
Date: Sun, 26 Sep 2010 23:23:52 +0800
Hi Everyone:
I am trying to compare a vector and rows of a matrix
for example
> xn <- c(1,2,4,4,5,5,5,6)
>yn <- c(1,2,5,7,1,2,3,1)
>mtrx <- cbind(xn, yn)
when I tried, say, > c (1,4), the result was TRUE, TRUE.
2010 Sep 29
1
get response from a glm
Hi everyone:
¡¡I am new to R and I have a really basic question.
I have already got a generalized linear model from some dataset, say y=b0 + b1X1 + b2X2. Then I want to get the value of y provided, say, X1=1, X2=2. And the confidence Intervals of this y.
I know I can just calculate that since I know the model already. But is there some code that can calculate those automatically?
2010 Sep 27
1
compare two matrices
Hi everyone:
I have a kinda easy question but i do not know how to solve that in a simple way.
I want to compare the rows of two matrices.
col1 <- c(1,2,3,4,5,6)
col2 <- c(6,5,4,3,2,1)
m <- cbind(col1, col2)
col3 <- c(1,3,2,6)
col4 <- c(6,3,5,1)
n <- cbind(col3, col4)
In matrix n, for example the first row is (1,6), it is also some row
2007 Jun 27
1
[PATCH 7/10] SMP support to Xen PM
Add SMP support to Xen host S3
Signed-off-by Kevin Tian <kevin.tian@intel.com>
diff -r 1539f5a2b3ba xen/arch/x86/acpi/power.c
--- a/xen/arch/x86/acpi/power.c Tue Jun 26 18:05:22 2007 -0400
+++ b/xen/arch/x86/acpi/power.c Tue Jun 26 19:44:36 2007 -0400
@@ -25,6 +25,7 @@
#include <xen/sched.h>
#include <xen/domain.h>
#include <xen/console.h>
+#include
2020 Aug 06
0
[PATCH] x86/paravirt: Add missing noinstr to arch_local*() helpers
On Thu, Aug 06, 2020 at 09:47:23AM +0200, Marco Elver wrote:
> Testing my hypothesis that raw then nested non-raw
> local_irq_save/restore() breaks IRQ state tracking -- see the reproducer
> below. This is at least 1 case I can think of that we're bound to hit.
Aaargh!
> diff --git a/init/main.c b/init/main.c
> index 15bd0efff3df..0873319dcff4 100644
> --- a/init/main.c
2020 Aug 12
0
[PATCH] x86/paravirt: Add missing noinstr to arch_local*() helpers
On Wed, Aug 12, 2020 at 10:06:50AM +0200, Marco Elver wrote:
> On Tue, Aug 11, 2020 at 10:17PM +0200, peterz at infradead.org wrote:
> > On Tue, Aug 11, 2020 at 11:46:51AM +0200, peterz at infradead.org wrote:
> >
> > > So let me once again see if I can't find a better solution for this all.
> > > Clearly it needs one :/
> >
> > So the below boots
2020 Aug 11
0
[PATCH] x86/paravirt: Add missing noinstr to arch_local*() helpers
On 11.08.20 09:00, Marco Elver wrote:
> On Fri, 7 Aug 2020 at 17:19, Marco Elver <elver at google.com> wrote:
>> On Fri, Aug 07, 2020 at 02:08PM +0200, Marco Elver wrote:
>>> On Fri, 7 Aug 2020 at 14:04, J?rgen Gro? <jgross at suse.com> wrote:
>>>>
>>>> On 07.08.20 13:38, Marco Elver wrote:
>>>>> On Fri, Aug 07, 2020 at 12:35PM
2018 Nov 06
0
[PATCH v15 23/26] sched: early boot clock
(added various kvm/virtualization lists in Cc as well as qemu as I don't
know who's "wrong" here)
Pavel Tatashin wrote on Thu, Jul 19, 2018:
> Allow sched_clock() to be used before schec_clock_init() is called.
> This provides with a way to get early boot timestamps on machines with
> unstable clocks.
This isn't something I understand, but bisect tells me this
2020 Sep 15
0
[PATCH RFC v1 09/18] x86/hyperv: provide a bunch of helper functions
Wei Liu <wei.liu at kernel.org> writes:
> They are used to deposit pages into Microsoft Hypervisor and bring up
> logical and virtual processors.
>
> Signed-off-by: Lillian Grassin-Drake <ligrassi at microsoft.com>
> Signed-off-by: Sunil Muthuswamy <sunilmut at microsoft.com>
> Signed-off-by: Nuno Das Neves <nudasnev at microsoft.com>
>
2007 Apr 18
0
[PATCH 7/12] gdt-accessor
Index: linux-2.6.13/include/asm-i386/desc.h
===================================================================
--- linux-2.6.13.orig/include/asm-i386/desc.h 2005-08-08 17:15:56.000000000 -0700
+++ linux-2.6.13/include/asm-i386/desc.h 2005-08-08 17:16:07.000000000 -0700
@@ -21,6 +21,8 @@
extern struct desc_struct cpu_gdt_table[GDT_ENTRIES];
DECLARE_PER_CPU(struct desc_struct,