Displaying 20 results from an estimated 100 matches similar to: "[PATCH 0/4] x86: XSA-67 follow-up"
2013 Sep 23
57
[PATCH RFC v13 00/20] Introduce PVH domU support
This patch series is a reworking of a series developed by Mukesh
Rathor at Oracle. The entirety of the design and development was done
by him; I have only reworked, reorganized, and simplified things in a
way that I think makes more sense. The vast majority of the credit
for this effort therefore goes to him. This version is labelled v13
because it is based on his most recent series, v11.
2013 Aug 23
2
[PATCH] Nested VMX: Allow to set CR4.OSXSAVE if guest has xsave feature
From: Yang Zhang <yang.z.zhang@Intel.com>
We exposed the xsave feature to guest, but we didn''t allow guest
to set CR4.OSXSAVE when guest running in nested mode. This will
cause win 7 guest fail to use XP mode. In this patch, we allow guest
to set CR4.OSXSAVE in nested mode when it has the xsave feature.
Signed-off-by: Yang Zhang <yang.z.zhang@Intel.com>
---
2015 Dec 21
2
Cannot allocate vector of size
Hola a tod en s,
Soy nuevo en R-help-es, por lo que perdonadme si debería haber mandado este email a una sección en particular.
Quería consultaros un error que me aparece en R al hacer una matriz de disimilitud a partir de una tabla con 6000 columnas x 11000 filas. El mensaje que da R es "cannot allocate vector of size 10Gb", y me resulta extraño ya que tengo 64 Gb de RAM disponible.
2007 Jun 27
0
[PATCH 1/10] Provide basic Xen PM infrastructure
Basic infrastructure for Xen S3 support with a common CPU
context save/restore logic for both 32bit and 64bit.
Wakeup code is split into two parts:
- the first locates after trampoline code, to share all the
tricks on the latter, like relocation base and identy mapping
- the 2nd part locates in xen code segment, to do the actual
CPU context restore
Signed-off-by Ke Yu
2011 Nov 24
0
[PATCH 6/6] X86: implement PCID/INVPCID for hvm
X86: implement PCID/INVPCID for hvm
This patch handle PCID/INVPCID for hvm:
For hap hvm, we enable PCID/INVPCID, since no need to intercept INVPCID, and we just set INVPCID non-root behavior as running natively;
For shadow hvm, we disable PCID/INVPCID, otherwise we need to emulate INVPCID at vmm by setting INVPCID non-root behavior as vmexit.
Signed-off-by: Liu, Jinsong
2015 Dec 22
2
Cannot allocate vector of size
Hola Rubén,
Totalmente de acuerdo con los consejos de Carlos. Ten en cuenta que
aunque R disponga de varios (bastantes) GB de memoria, algunos de los
objetos que va creando durante el proceso pueden consumirla por
completo. Es decir, que aunque tu ordenador tenga 64GB de RAM, es
posible que no queden 10 GB libres para almacenar un objeto (porque ya
hay demasiados objetos grandes en la
2012 Apr 05
5
lastest xen unstable crash
Hi everyone,
I was trying to build a new machine but the system keeps rebooting.
I used the lasted unstable version from xen-unstable.hg.
I have tried with Fedora 16 (kernel 3.3.0-8) and Xubuntu 11.10 (3.0.0.17-generic).
The output to my serial console is attached.
Cheers,
Francisco
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
2013 Mar 21
27
[PATCH 0/4] xen/arm: guest SMP support
Hi all,
this small patch series implement guest SMP support for ARM, using the
ARM PSCI interface for secondary cpu bringup.
Stefano Stabellini (4):
xen/arm: basic PSCI support, implement cpu_on
xen/arm: support for guest SGI
xen/arm: support vcpu_op hypercalls
xen: move VCPUOP_register_vcpu_info to common code
xen/arch/arm/domain.c | 66 ++++++++++++++++++++++++
2015 Dec 22
2
Cannot allocate vector of size
Yo creo que el problema principal está en betapart.core(), que crea y
mantiene simultáneamente en memoria varios objetos de alrededor de 1 Gb
que luego combina en una lista... Probablemente es entre las líneas el
código de betaper.core donde hay que ir eliminando objetos.
Saludos,
Marcelino
El 22/12/2015 a las 18:26, Carlos J. Gil Bellosta escribió:
> Hola, ¿qué tal?
>
> Yo no
2013 Nov 26
6
[PATCH v5] x86: properly handle MSI-X unmask operation from guests
patch revision history
----------------------
v1: Initial patch to handle this issue involving changing the hypercall interface
v2:Totally handled inside hypervisor.
v3:Change some logics of handling msi-x pending unmask operations.
v4:Some changes related to coding style according to Andrew Cooper''s comments
v5:Some changes according to Jan''s comments, including
a) remove
2013 Nov 22
10
[PATCH v4] x86: properly handle MSI-X unmask operation from guests
patch revision history
----------------------
v1: Initial patch to handle this issue involving changing the hypercall interface
v2:Totally handled inside hypervisor.
v3:Change some logics of handling msi-x pending unmask operations.
v4:Some changes related to coding style according to Andrew Cooper''s comments
From 51c5b7f1f9c8f319da8adf021b39e18fbd3bf314 Mon Sep 17 00:00:00 2001
From:
2015 Dec 23
2
Cannot allocate vector of size
Antes de nada, me gustaría daros las gracias por toda vuestra ayuda.
He estado probando todo lo que me habéis dicho a la vez, y no hay manera, sigo teniendo el problema con el espacio.
En cuanto al tamaño de la base de datos, es más grande de lo que puse, me equivoqué y puse el tamaño de una base anterior con la que estuve trabajando, la actual tiene 36866 filas x 6500 columnas.
He seguido todas
2014 Sep 25
3
[5/5] ARM: tegra: jetson-tk1: enable GK20A GPU
Playing a bit with todays linux-next on my jetson, it seems this patch is
still required for enabling the GPU. Is there anything blocking it (firmware
not available yet in liux-firmware?)
On Mon, May 19, 2014 at 06:24:10PM +0900, Alexandre Courbot wrote:
> Signed-off-by: Alexandre Courbot <acourbot at nvidia.com>
> ---
> arch/arm/boot/dts/tegra124-jetson-tk1.dts | 8 +++++++-
>
2012 Apr 21
6
[PATCH] xen: Add GS base to HVM VCPU context
Add GS base to the HVM VCPU context returned by xc_vcpu_getcontext()
Signed-off-by: Aravindh Puthiyaparambil <aravindh@virtuata.com>
diff -r e62ab14d44af -r babbb3e0f4d3 xen/arch/x86/domctl.c
--- a/xen/arch/x86/domctl.c Fri Apr 20 11:36:02 2012 -0700
+++ b/xen/arch/x86/domctl.c Fri Apr 20 17:55:49 2012 -0700
@@ -1592,6 +1592,12 @@ void arch_get_info_guest(struct vcpu *v,
2013 Sep 23
11
[PATCH v4 0/4] x86/HVM: miscellaneous improvements
The first and third patches are cleaned up versions of an earlier v3
submission by Yang.
1: Nested VMX: check VMX capability before read VMX related MSRs
2: VMX: clean up capability checks
3: Nested VMX: fix IA32_VMX_CR4_FIXED1 msr emulation
4: x86: make hvm_cpuid() tolerate NULL pointers
Signed-off-by: Jan Beulich <jbeulich@suse.com>
2013 Nov 18
6
[PATCH RFC v2] pvh: clearly specify used parameters in vcpu_guest_context
The aim of this patch is to define a stable way in which PVH is
going to do AP bringup.
Since we are running inside of a HVM container, PVH should only need
to set flags, cr3 and user_regs in order to bring up a vCPU, the rest
can be set once the vCPU is started using the bare metal methods.
Additionally, the guest can also set cr0 and cr4, and those values
will be appended to the default values
2013 Jun 04
12
[PATCH 0/4] XSA-52..54 follow-up
The first patch really isn''t as much of a follow-up than what triggered
the security issues to be noticed in the first place.
1: x86: preserve FPU selectors for 32-bit guest code
2: x86: fix XCR0 handling
3: x86/xsave: adjust state management
4: x86/fxsave: bring in line with recent xsave adjustments
The first two I would see as candidates for 4.3 (as well as
subsequent backporting,
2007 Aug 08
2
[PATCH] x86-64: syscall/sysenter support for 32-bit apps
.. for both 32-bit apps in 64-bit pv guests and 32on64.
This patch depends on more than just guest_context saved/restored as guest
state during save/restore/migrate (namely the new fields holding callback
addresses).
Since the 32-bit kernel doesn''t make use of syscall (it would be possible to
do so now, when running on a 64-bit hv), the compat mode guest code path for
syscall
2017 Dec 14
2
[bug report] null ptr deref in nouveau_platform_probe (tegra186-p2771-0000)
With linux-next-2017-12-14, I get a crash when nouveau is loaded by
systemd-udevd.
[ 12.050625] Unable to handle kernel NULL pointer dereference at virtual
address 00000058
[ 12.050627] Mem abort info:
[ 12.050628] ESR = 0x96000004
[ 12.050630] Exception class = DABT (current EL), IL = 32 bits
[ 12.050631] SET = 0, FnV = 0
[ 12.050632] EA = 0, S1PTW = 0
[ 12.050633] Data
2007 Apr 18
1
No subject
[PATCH] Clean up x86 control register and MSR macros
This patch is based on Rusty's recent cleanup of the EFLAGS-related
macros; it extends the same kind of cleanup to control registers and
MSRs.
It also unifies these between i386 and x86-64; at least with regards
to MSRs, the two had definitely gotten out of sync.
Signed-off-by: H. Peter Anvin <hpa@zytor.com>
diff -urN