similar to: [PATCH]Don''t unshadow current used shadow L2 table.

Displaying 20 results from an estimated 300 matches similar to: "[PATCH]Don''t unshadow current used shadow L2 table."

2005 May 11
4
Should shadow_lock be spin_lock_recursive?
During our testing, we found this code path where xen attempts to grab the shadow_lock, while holding it - leading to a deadlock. >> free_dom_mem-> >> shadow_sync_and_drop_references-> >> shadow_lock -> ..................... first lock >> shadow_remove_all_access-> >> remove_all_access_in_page-> >> put_page-> >>
2007 Dec 05
13
[PATCH] unshadow the page table page which are used as data page
The patch deals with the situation which guest OS uses unused page table pages as data pages and write data to them. The pages will still be grabbed by Xen as page table pages, and lots of unnecessary page faults occur. The patch will check if the data guest writes to the page table contains valid mfn or not, if not, we believe it is a data page now and then unshadow the page. The patch
2007 Jun 09
2
zfs bug
dd if=/dev/zero of=sl1 bs=512 count=256000 dd if=/dev/zero of=sl2 bs=512 count=256000 dd if=/dev/zero of=sl3 bs=512 count=256000 dd if=/dev/zero of=sl4 bs=512 count=256000 zpool create -m /export/test1 test1 raidz /export/sl1 /export/sl2 /export/sl3 zpool add -f test1 /export/sl4 dd if=/dev/zero of=sl4 bs=512 count=256000 zpool scrub test1 panic. and message like on image. This message posted
2005 Nov 29
0
[PATCH]small fix for shadow
# HG changeset patch # User Xiaofeng Ling <xiaofeng.ling@intel.com> # Node ID 188b619dad2998f0625b247ee298def1919696ca # Parent 90d9dff476923318f34c993016c9ada8979ee06d small fix for shadow Signed-off-by:Xiaofeng Ling <xiaofeng.ling@intel.com> diff -r 90d9dff47692 -r 188b619dad29 xen/arch/x86/shadow.c --- a/xen/arch/x86/shadow.c Tue Nov 29 09:44:46 2005 +0800 +++
2009 Mar 23
1
I/O error 32 (share error) while opening executable
Hi, I'm trying to run a win16 delphi application under Wine. At one point of the execution the program tries to open its own exe file and read some data from it. At that point i get an error message dialog: "I/O error 32". A quick google tells me that has to do with sharing of files. So I launch the application with "WINEDEBUG=+file" and here's the log right up
2005 Sep 05
2
[PATCH][1/6] add a hypercall number for virtual device in unmodified guest
add a hypercall number for virtual device in unmodified guest There are 6 patches for para-driver support in vmx guest. This is the first one. Signed-off-by: Xiaofeng Ling <xiaofeng.ling@intel.com> Signed-off-by: Arun Sharma <arun.sharma@intel.com> diff -r 287d36b46fa3 xen/arch/x86/x86_32/entry.S --- a/xen/arch/x86/x86_32/entry.S Tue Aug 30 20:36:49 2005 +++
2005 Jun 29
0
[PATCH] fix xc_domain_memory_increase_reservation return value
in xc_domain_memory_increase_reservation, when do_dom_mem_op return 0, it shall also return -1,I met this problem when I try to allocate domain memory. Signed-off-by: Xiaofeng Ling <xiaofeng.ling@intel.com> diff -Nru a/tools/libxc/xc_domain.c b/tools/libxc/xc_domain.c --- a/tools/libxc/xc_domain.c 2005-06-29 17:16:11 +08:00 +++ b/tools/libxc/xc_domain.c 2005-06-29 17:16:11 +08:00 @@
2005 Sep 05
0
[PATCH][4/6] Add to virtual device operations
Add two virtual device operations: 1.set the callback irq for event channel 2.setup the hypercall paramerter share page. Signed-off-by: Ke Yu <ke.yu@intel.com> Signed-off-by: Xiaofeng Ling <xiaofeng.ling@intel.com> Signed-off-by: Arun Sharma <arun.sharma@intel.com> diff -r 287d36b46fa3 xen/arch/x86/vmx.c --- a/xen/arch/x86/vmx.c Tue Aug 30 20:36:49 2005 +++
2005 Oct 13
0
[PATCH]Send keys in vmx
After you change to the monitor in vmx using ctrl-alt-2, you can send keys to the emulator. Use - to press several keys simultaneously. Example: sendkey ctrl-alt-f1 This patch is useful to send keys that your graphical user interface intercepts at low level, such as ctrl-alt-f1 in X Window. Signed-off-by: Dan Xu <dan.d.xu@intel.com> Signed-off-by: Zhai, Edwin
2005 Oct 14
0
[PATCH]rtc emulation for xenU
There''s an issue on x86_64 whereby booting an unpriv guest using a kernel that has the RTC driver compiled in hangs when the rc scripts run the command hwclock. The patch attached resolves the issue. The patch adds a simple rtc emulation and also on i386, hwclock can get correct date when xenU enabled pirq binding, without this patch, hwclock read will timeout because of lack of update
2004 Oct 09
1
about memory alloc
Hi, I have a question, If I start 2 or more guest linux, does the physical memory of code segment and readonly data segment be reused? What''s the relationship between the physical memory and the number of guest os that can create? xiaofeng ------------------------------------------------------- This SF.net email is sponsored by: IT Product Guide on ITManagersJournal Use IT
2005 Oct 20
3
[PATCH]Cannot send special keys, such as Ctrl+Alt+Del
Here is the patch useful to send special keys that your graphical user interface intercepts at low level, such as ctrl-alt-del in X Window. This patch adds a command "sendkey" to deal with it in the monitor, you can send keys to the vm. Use - to press several keys simultaneously. Example: sendkey ctrl-alt-f1 Signed-off-by: Dan Xu <dan.d.xu@intel.com> Signed-off-by:
2005 Nov 08
1
VMX domain status report Nov. 8 7646
We have test latest xen (ChangeSet 7646) on VT platform with Intel 915 chipset : The VMX can not be created for the known issue http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=388 <http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=382> But it is ok after adding xiaofeng''s patch. IA32: Build&Boot SMP xen0 without problem Can startup XenU with different
2018 Nov 27
2
PJSIP add header on forwarded call
Hi list, to manage an external queue agent the only solution I found is to connect a local account and redirect calls to this account using forward features from the phone (SNOM). The problem I face is that before calling the agent I would like to set extra header. Dialplan to call external agent is this one with (Gosub): [TOOTAiAudio] ; ; Call our gateway exten =
2019 Sep 10
1
[RFC PATCH v6 69/92] kvm: x86: keep the page protected if tracked by the introspection tool
On Fri, Aug 09, 2019 at 07:00:24PM +0300, Adalbert Laz?r wrote: > This patch might be obsolete thanks to single-stepping. sooo should it be skipped from this large patchset to easy review? > > Signed-off-by: Adalbert Laz?r <alazar at bitdefender.com> > --- > arch/x86/kvm/x86.c | 9 +++++++-- > 1 file changed, 7 insertions(+), 2 deletions(-) > > diff --git
2005 Jun 30
0
[PATCH][2/10] Extend the VMX intercept mechanism to include mmio as well as portio.
Extend the VMX intercept mechanism to include mmio as well as portio. Signed-off-by: Yunhong Jiang <yunhong.jiang@intel.com> Signed-off-by: Xiaofeng Ling <xiaofeng.ling@intel.com> Signed-off-by: Arun Sharma <arun.sharma@intel.com> diff -r febfcd0a1a0a -r 9a43d5c12b95 xen/include/asm-x86/vmx_platform.h --- a/xen/include/asm-x86/vmx_platform.h Thu Jun 30 03:20:48 2005 +++
2004 Jul 02
0
[Patch] We resolve the throughput drop problemwhe nr eading filesin OCFS2 volume in the patch "ocfs2-truncate-pages-1.patch"a gainstsvn 1226.
We are also thinking about locking for each read/write, but would its = overhead be too high? We have another idea that is extending the function of flock, lockf, = fcntl to distributed. So any application that need strict data consistent can do a lock = operation on the whole or part of the file. For ordinary application, maybe the current logic is enough. How about it? >-----Original
2004 Sep 07
1
Performance Specs
Hi all. Are there any specs about performance of Asterisk? I want to know how many simultaneous SIP/VoIP connections on one Linux box. I don't care whether official specs or user tested specs. Thanks in advance, Xiaofeng
2009 Oct 23
11
soft lockups during live migrate..
Trying to migrate a 64bit PV guest with 64GB running medium to heavy load on xen 3.4.0, it is showing lot of soft lockups. The softlockups are causing dom0 reboot by the cluster FS. The hardware has 256GB and 32 CPUs. Looking into the hypervisor thru kdb, I see one cpu in sh_resync_all() while all other 31 appear spinning on the shadow_lock. I vaguely remember seeing some thread on this while
2019 Aug 09
0
[RFC PATCH v6 69/92] kvm: x86: keep the page protected if tracked by the introspection tool
This patch might be obsolete thanks to single-stepping. Signed-off-by: Adalbert Laz?r <alazar at bitdefender.com> --- arch/x86/kvm/x86.c | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 2c06de73a784..06f44ce8ed07 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -6311,7 +6311,8 @@ static bool