Displaying 20 results from an estimated 100 matches similar to: "[PATCH 2/5] Interrupts subarch cleanup.patch"
2007 Apr 18
7
[RFC, PATCH 5/24] i386 Vmi code patching
The VMI ROM detection and code patching mechanism is illustrated in
setup.c. There ROM is a binary block published by the hypervisor, and
and there are certainly implications of this. ROMs certainly have a
history of being proprietary, very differently licensed pieces of
software, and mostly under non-free licenses. Before jumping to the
conclusion that this is a bad thing, let us consider more
2007 Apr 18
7
[RFC, PATCH 5/24] i386 Vmi code patching
The VMI ROM detection and code patching mechanism is illustrated in
setup.c. There ROM is a binary block published by the hypervisor, and
and there are certainly implications of this. ROMs certainly have a
history of being proprietary, very differently licensed pieces of
software, and mostly under non-free licenses. Before jumping to the
conclusion that this is a bad thing, let us consider more
2007 Apr 18
2
[RFC, PATCH 14/24] i386 Vmi reboot fixes
Fix reboot to work with the VMI. We must support fallback to the standard
BIOS reboot mechanism. Turns out that this is required by kexec, and a good
idea for native hardware. We simply insert the NOP VMI reboot hook before
calling the BIOS reboot. While here, fix SMP reboot issues as well. The
problem is the halt() macro in VMI has been defined to be equivalent to
safe_halt(), which enables
2007 Apr 18
2
[RFC, PATCH 14/24] i386 Vmi reboot fixes
Fix reboot to work with the VMI. We must support fallback to the standard
BIOS reboot mechanism. Turns out that this is required by kexec, and a good
idea for native hardware. We simply insert the NOP VMI reboot hook before
calling the BIOS reboot. While here, fix SMP reboot issues as well. The
problem is the halt() macro in VMI has been defined to be equivalent to
safe_halt(), which enables
2006 Jan 31
0
Re: [Xen-changelog] Update linux sparse tree to subarch layout.
Looks like the subarch tree has been checked in. Does this mean 3.0.1
has been pushed out to include more? Or do we release 3.0.1 once the new
tree is fully tested?
Jun
---
Intel Open Source Technology Center
----
From: xen-changelog-bounces@lists.xensource.com
[mailto:xen-changelog-bounces@lists.xensource.com] On Behalf Of Xen
patchbot -unstable
Sent: Monday, January 30, 2006 4:08 PM
To:
2007 Apr 18
0
[RFC PATCH 09/33] Add start-of-day setup hooks to subarch
> On Tue, 2006-07-18 at 00:00 -0700, Chris Wright wrote:
> > plain text document attachment (i386-setup)
> > Implement the start-of-day subarchitecture setup hooks for booting on
> > Xen. Add subarch macros for determining loader type and initrd
> > location.
>
> > diff -r a5848bce3730 arch/i386/kernel/setup.c
> > --- a/arch/i386/kernel/setup.c Thu Jun 22
2007 Apr 18
0
[PATCH 2/5] Add subarch mmu queue flush hook
Add one more MMU hook to the sub-arch layer.
update_mmu_cache() - already defined. This is conveniently used to indicate
NP->P transitions which should be reflected in an external TLB, and serves
to indicate all points where the page tables must be synchronized. Required
for lazy updates in shadow mode.
There is only one case where an extra flush is needed, in the i386 specific
page fault
2007 Apr 18
0
[PATCH 2/5] Add subarch mmu queue flush hook
Add one more MMU hook to the sub-arch layer.
update_mmu_cache() - already defined. This is conveniently used to indicate
NP->P transitions which should be reflected in an external TLB, and serves
to indicate all points where the page tables must be synchronized. Required
for lazy updates in shadow mode.
There is only one case where an extra flush is needed, in the i386 specific
page fault
2006 Nov 04
1
Customizing routing error messages
I have found various methods showing how this can be done.
What is still unclear is whether there is a different behavior between
development and production. So far I am only working in dev.
Here is the scenario in development:
I enter a bad URL, for example /bad_controller/no_action, I get
a Routing Error - Recognition failed for "/bad_controller/no_action"
What I would like to see
2007 Apr 18
0
[PATCH 11/12] subarch-desc
i386 Transparent paravirtualization subarch patch #5
This change encapsulates descriptor and task register management.
Diffs against: 2.6.13-rc4-mm1
Signed-off-by: Zachary Amsden <zach@vmware.com>
Index: linux-2.6.13/include/asm-i386/desc.h
===================================================================
--- linux-2.6.13.orig/include/asm-i386/desc.h 2005-08-08 17:31:59.000000000 -0700
2007 Apr 18
0
[PATCH 11/12] subarch-desc
i386 Transparent paravirtualization subarch patch #5
This change encapsulates descriptor and task register management.
Diffs against: 2.6.13-rc4-mm1
Signed-off-by: Zachary Amsden <zach@vmware.com>
Index: linux-2.6.13/include/asm-i386/desc.h
===================================================================
--- linux-2.6.13.orig/include/asm-i386/desc.h 2005-08-08 17:31:59.000000000 -0700
2011 Apr 04
0
[PATCH] xen: drop anti-dependency on X86_VISWS
This seems to have been added in f0f32fccbffa to avoid a conflict arising from
the long deceased ARCH_SETUP() macro and subsequently pushed down to the XEN
option.
As far as I can tell the conflict is no longer present and by dropping the
dependency I was able to build a kernel which has both CONFIG_XEN and
CONFIG_X86_VISWS enabled and boot it on Xen. I didn't try it on the VISWS
platform.
2011 Apr 04
0
[PATCH] xen: drop anti-dependency on X86_VISWS
This seems to have been added in f0f32fccbffa to avoid a conflict arising from
the long deceased ARCH_SETUP() macro and subsequently pushed down to the XEN
option.
As far as I can tell the conflict is no longer present and by dropping the
dependency I was able to build a kernel which has both CONFIG_XEN and
CONFIG_X86_VISWS enabled and boot it on Xen. I didn't try it on the VISWS
platform.
2007 Apr 18
3
[PATCH] no paravirt for X86_VOYAGER or X86_VISWS
From: Randy Dunlap <randy.dunlap@oracle.com>
Since Voyager and Visual WS already define ARCH_SETUP,
it looks like PARAVIRT shouldn't be offered for them.
In file included from arch/i386/kernel/setup.c:63:
include/asm-i386/mach-visws/setup_arch.h:8:1: warning: "ARCH_SETUP" redefined
In file included from include/asm/msr.h:5,
from include/asm/processor.h:17,
2007 Apr 18
3
[PATCH] no paravirt for X86_VOYAGER or X86_VISWS
From: Randy Dunlap <randy.dunlap@oracle.com>
Since Voyager and Visual WS already define ARCH_SETUP,
it looks like PARAVIRT shouldn't be offered for them.
In file included from arch/i386/kernel/setup.c:63:
include/asm-i386/mach-visws/setup_arch.h:8:1: warning: "ARCH_SETUP" redefined
In file included from include/asm/msr.h:5,
from include/asm/processor.h:17,
2008 Jan 18
2
[PATCH 2/3] Make IRQ handlers typesafe.
This patch lets interrupt handler functions have their natural type
(ie. exactly match the data pointer type); for transition it allows
the old irq_handler_t type as well.
To do this it uses a gcc extension, cast-to-union, which allows a type
to be cast to any type within the union. When used in a wrapper
macro, it's a simple way of allowing one of several types.
(Some drivers now need to
2008 Jan 18
2
[PATCH 2/3] Make IRQ handlers typesafe.
This patch lets interrupt handler functions have their natural type
(ie. exactly match the data pointer type); for transition it allows
the old irq_handler_t type as well.
To do this it uses a gcc extension, cast-to-union, which allows a type
to be cast to any type within the union. When used in a wrapper
macro, it's a simple way of allowing one of several types.
(Some drivers now need to
2007 Apr 18
0
[RFC, PATCH 23/24] i386 Vmi timer patch
In a virtualized environment, virtual machines will time share the system
with each other and with other processes running on the host system.
Therefore, a VM's virtual CPUs (VCPUs) will be executing on the host's
physical CPUs (pcpus) for only some portion of time.
The VMI exposes a paravirtual view of time to the guest operating systems
so that they may operate more effectively in a
2007 Apr 18
0
[RFC, PATCH 23/24] i386 Vmi timer patch
In a virtualized environment, virtual machines will time share the system
with each other and with other processes running on the host system.
Therefore, a VM's virtual CPUs (VCPUs) will be executing on the host's
physical CPUs (pcpus) for only some portion of time.
The VMI exposes a paravirtual view of time to the guest operating systems
so that they may operate more effectively in a
2017 Feb 07
0
Clang option to provide list of target-subarchs.
Thank you for the feedback.
> How is this going to work with --target-subarchs? Is there going to be a --no-target-subarchs flag to disable subarchs? What will the semantics of this be, exactly?
The large number of subarchs expected makes an inclusive only flag desirable and an exclusive flag impractical. Also, since subarchs will age more quickly than archs, who knows what old crufty