Displaying 12 results from an estimated 12 matches similar to: "[PATCH][10/10] Use copy_from_user when accessing guest_pt"
2005 Nov 29
0
[PATCH]small fix for shadow
# HG changeset patch
# User Xiaofeng Ling <xiaofeng.ling@intel.com>
# Node ID 188b619dad2998f0625b247ee298def1919696ca
# Parent 90d9dff476923318f34c993016c9ada8979ee06d
small fix for shadow
Signed-off-by:Xiaofeng Ling <xiaofeng.ling@intel.com>
diff -r 90d9dff47692 -r 188b619dad29 xen/arch/x86/shadow.c
--- a/xen/arch/x86/shadow.c Tue Nov 29 09:44:46 2005 +0800
+++
2006 Jul 01
3
Page fault is 4 times faster with XI shadow mechanism
Hello Han,
I am pleased you approve of the design and implementation of the XI shadow
mechanism. And I appreciate the time and care you''ve taken in reviewing this
substantial body of new code.
You asked about performance statistics. With the current XI patch, we are
seeing the following:
- page faults times for XI are about 4 times faster than non-XI:
10.56 (non-XI) vs 2.43
2005 Mar 14
4
[patch/unstable] page table cleanups
Hi,
In many places xen uses "unsigned long" instead of the l*_pgentry_t
types to pass around page table entries. Here is a patch which fixes
this in a number of places (mostly in shadow mode code). Thats what
I''ve trapped in so far, maybe more of these patches follow.
Fixing this is needed for adding PAE support to xen. In PAE paging mode
the page table entries are 64 bit
2011 Mar 06
1
[PATCH] vhost: copy_from_user -> __copy_from_user
copy_from_user is pretty high on perf top profile,
replacing it with __copy_from_user helps.
It's also safe because we do access_ok checks during setup.
Signed-off-by: Michael S. Tsirkin <mst at redhat.com>
---
drivers/vhost/vhost.c | 2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/drivers/vhost/vhost.c b/drivers/vhost/vhost.c
index ade0568..01701b8 100644
---
2011 Mar 06
1
[PATCH] vhost: copy_from_user -> __copy_from_user
copy_from_user is pretty high on perf top profile,
replacing it with __copy_from_user helps.
It's also safe because we do access_ok checks during setup.
Signed-off-by: Michael S. Tsirkin <mst at redhat.com>
---
drivers/vhost/vhost.c | 2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/drivers/vhost/vhost.c b/drivers/vhost/vhost.c
index ade0568..01701b8 100644
---
2015 Feb 04
1
[PATCH v3 18/18] vhost: vhost_scsi_handle_vq() should just use copy_from_user()
From: Al Viro <viro at zeniv.linux.org.uk>
it has just verified that it asks no more than the length of the
first segment of iovec.
And with that the last user of stuff in lib/iovec.c is gone.
RIP.
Cc: Michael S. Tsirkin <mst at redhat.com>
Cc: Nicholas A. Bellinger <nab at linux-iscsi.org>
Cc: kvm at vger.kernel.org
Cc: virtualization at lists.linux-foundation.org
2015 Feb 04
1
[PATCH v3 18/18] vhost: vhost_scsi_handle_vq() should just use copy_from_user()
From: Al Viro <viro at zeniv.linux.org.uk>
it has just verified that it asks no more than the length of the
first segment of iovec.
And with that the last user of stuff in lib/iovec.c is gone.
RIP.
Cc: Michael S. Tsirkin <mst at redhat.com>
Cc: Nicholas A. Bellinger <nab at linux-iscsi.org>
Cc: kvm at vger.kernel.org
Cc: virtualization at lists.linux-foundation.org
2020 Apr 07
0
[vhost:vhost 32/44] drivers/gpu/drm/virtio/virtgpu_ioctl.c:113:7: error: implicit declaration of function 'copy_from_user'; did you mean 'sg_copy_from_buffer'?
tree: https://git.kernel.org/pub/scm/linux/kernel/git/mst/vhost.git vhost
head: 4e6ebec0de18aaea5f5f814b25bfcae3751c6369
commit: 013a472de94693ba05696d59e7df3224c20a22e6 [32/44] virtio: stop using legacy struct vring in kernel
config: m68k-allmodconfig (attached as .config)
compiler: m68k-linux-gcc (GCC) 9.3.0
reproduce:
wget
2006 Jun 30
5
[PATCH - proposed] XI Shadow Page Table Mechanism]
Hi, Robert,
I found out another confusing code snippet:
in void xi_invl_mfn(struct domain *d, unsigned long mfn)
if (ext && pfn < ext->large_page_aligned_size)
According to the code, it should be
if (ext && (pfn>>SPT_ENTRIES_ORDER) < ext->large_page_aligned_size)
If I made any mistake, please point it out.
2012 Dec 10
26
[PATCH 00/11] Add virtual EPT support Xen.
From: Zhang Xiantao <xiantao.zhang@intel.com>
With virtual EPT support, L1 hyerpvisor can use EPT hardware
for L2 guest''s memory virtualization. In this way, L2 guest''s
performance can be improved sharply. According to our testing,
some benchmarks can show > 5x performance gain.
Signed-off-by: Zhang Xiantao <xiantao.zhang@intel.com>
Zhang Xiantao (11):
2006 Feb 09
11
X86_64 "assert" when booting 64-bit image.
I can boot a 64-bit HVM image on my SVM-system, and it goes quite a long
way before it crashes (due to not finding the hard-disk image and thus
no root FS - which I think may well be the configuration file).
But if I set debug=y in the Rules.mk, I don''t get very far at all - it
crashes well before it gets to any user-mode (Ring3) - in fact, I think
it''s crashing pretty much as
2013 Sep 23
57
[PATCH RFC v13 00/20] Introduce PVH domU support
This patch series is a reworking of a series developed by Mukesh
Rathor at Oracle. The entirety of the design and development was done
by him; I have only reworked, reorganized, and simplified things in a
way that I think makes more sense. The vast majority of the credit
for this effort therefore goes to him. This version is labelled v13
because it is based on his most recent series, v11.