Displaying 20 results from an estimated 9000 matches similar to: "[PATCH] Dom0: Fix bad pte at booting time"
2007 Feb 14
2
[PATCH 8/8] 2.6.17: scan DMI early
While shuffling quite a few things around, this gets us closer to native,
which clearly had a reason to do the DMI scan early.
Signed-off-by: Jan Beulich <jbeulich@novell.com>
Index: head-2007-02-08/arch/i386/mm/ioremap-xen.c
===================================================================
--- head-2007-02-08.orig/arch/i386/mm/ioremap-xen.c 2007-02-08 17:07:13.000000000 +0100
+++
2009 May 31
1
Fwd: BUG: Documentation/lguest/lguest.c bad paths for includes cause make to fail
Pardon my unorganized cc:'s.
---------- Forwarded message ----------
From: Charles 'Mack' Rhinelander <mrhinelander at gmail.com>
Date: Sun, May 31, 2009 at 1:39 AM
Subject: Fwd: BUG: Documentation/lguest/lguest.c bad paths for
includes cause make to fail
To: linux-kernel at vger.kernel.org
Cc: Andrew Morton <akpm at osdl.org>, lguest at ozlabs.org
---------- Forwarded
2009 May 31
1
Fwd: BUG: Documentation/lguest/lguest.c bad paths for includes cause make to fail
Pardon my unorganized cc:'s.
---------- Forwarded message ----------
From: Charles 'Mack' Rhinelander <mrhinelander at gmail.com>
Date: Sun, May 31, 2009 at 1:39 AM
Subject: Fwd: BUG: Documentation/lguest/lguest.c bad paths for
includes cause make to fail
To: linux-kernel at vger.kernel.org
Cc: Andrew Morton <akpm at osdl.org>, lguest at ozlabs.org
---------- Forwarded
2008 Nov 26
0
Source code of DomU/Dom0 context switch resulting from writing DomU''s PTE?
Hi:
>From some of my test I learn that when a DomU modifies its page table entry (PTE), then a context switch should happen to sync the guest page table (GPT) and shadow page table (SPT). I want to learn this part of codes, so could any one here tell me how I can find these codes? I mean codes aiming at: Updating guest PTE --> DomU/Dom0 context switch-->sync PTs
Thanks!
2007 Apr 18
0
[RFC/PATCH PV_OPS X86_64 08/17] paravirt_ops - memory managment
plain text document attachment (xx-paravirt-mm.patch)
Memory management for paravirt_ops.
Signed-off-by: Steven Rostedt srostedt@redhat.com
Signed-off-by: Glauber de Oliveira Costa <gcosta@redhat.com>
Index: clean-start/arch/x86_64/mm/fault.c
===================================================================
--- clean-start.orig/arch/x86_64/mm/fault.c
+++
2007 Apr 18
0
[RFC/PATCH PV_OPS X86_64 08/17] paravirt_ops - memory managment
plain text document attachment (xx-paravirt-mm.patch)
Memory management for paravirt_ops.
Signed-off-by: Steven Rostedt srostedt@redhat.com
Signed-off-by: Glauber de Oliveira Costa <gcosta@redhat.com>
Index: clean-start/arch/x86_64/mm/fault.c
===================================================================
--- clean-start.orig/arch/x86_64/mm/fault.c
+++
2007 Apr 18
1
[RFC/PATCH LGUEST X86_64 01/13] HV VM Fix map area for HV.
plain text document attachment (hvvm.patch)
OK, some explaination is needed here. The goal of lguest with paravirt
ops, is to have one kernel that can be loaded both as a host and a guest.
To do this, we need to map an area in virtual memory that both the host
and guest share. But I don't want any conflicts with the guest.
One solution is just to do a single area for boot up, and then
use the
2007 Apr 18
1
[RFC/PATCH LGUEST X86_64 01/13] HV VM Fix map area for HV.
plain text document attachment (hvvm.patch)
OK, some explaination is needed here. The goal of lguest with paravirt
ops, is to have one kernel that can be loaded both as a host and a guest.
To do this, we need to map an area in virtual memory that both the host
and guest share. But I don't want any conflicts with the guest.
One solution is just to do a single area for boot up, and then
use the
2009 Mar 30
0
[PATCH] x86: disable stack-protector for __restore_processor_state()
The __restore_processor_state() fn restores %gs on resume from S3. As
such, it cannot be protected by the stack-protector guard since %gs will
not be correct on function entry.
There are only a few other fns in this file and it should not negatively
impact kernel security that they will also have the stack-protector
guard removed (and so it's not worth moving them to another file).
Without
2009 Mar 30
0
[PATCH] x86: disable stack-protector for __restore_processor_state()
The __restore_processor_state() fn restores %gs on resume from S3. As
such, it cannot be protected by the stack-protector guard since %gs will
not be correct on function entry.
There are only a few other fns in this file and it should not negatively
impact kernel security that they will also have the stack-protector
guard removed (and so it's not worth moving them to another file).
Without
2018 Mar 19
0
get_user_pages returning 0 (was Re: kernel BUG at drivers/vhost/vhost.c:LINE!)
On Mon, Mar 19, 2018 at 4:29 PM, David Sterba <dsterba at suse.cz> wrote:
> On Mon, Mar 19, 2018 at 05:09:28PM +0200, Michael S. Tsirkin wrote:
>> Hello!
>> The following code triggered by syzbot
>>
>> r = get_user_pages_fast(log, 1, 1, &page);
>> if (r < 0)
>> return r;
>> BUG_ON(r != 1);
>>
2018 Apr 24
0
[PATCH 1/6] virtio_console: don't tie bufs to a vq
On Sat, Apr 21, 2018 at 09:30:05AM +0200, Greg Kroah-Hartman wrote:
> On Fri, Apr 20, 2018 at 09:18:01PM +0300, Michael S. Tsirkin wrote:
> > an allocated buffer doesn't need to be tied to a vq -
> > only vq->vdev is ever used. Pass the function the
> > just what it needs - the vdev.
> >
> > Signed-off-by: Michael S. Tsirkin <mst at redhat.com>
>
2013 Jul 14
0
[LLVMdev] [PATCH] x86: disambiguate unqualified btr, bts
Stephen Checkoway wrote:
> [...]
Thanks for the absolutely splendid analysis!
> For the memory, immediate form without the suffix, it seems like the options are
> 1. If the immediate value is in [0,15], use btsl/btrl since it saves a byte, otherwise error;
> 2. Follow both gas's behavior and the Solaris assembler manual Jim Grosbach linked to which stated that unsuffixed
2008 May 08
2
[PATCH/RFC] stop_machine: make stop_machine_run more virtualization friendly
On kvm I have seen some rare hangs in stop_machine when I used more guest
cpus than hosts cpus. e.g. 32 guest cpus on 1 host cpu triggered the
hang quite often. I could also reproduce the problem on a 4 way z/VM host with
a 64 way guest.
It turned out that the guest was consuming all available cpus mostly for
spinning on scheduler locks like rq->lock. This is expected as the threads are
2008 May 08
2
[PATCH/RFC] stop_machine: make stop_machine_run more virtualization friendly
On kvm I have seen some rare hangs in stop_machine when I used more guest
cpus than hosts cpus. e.g. 32 guest cpus on 1 host cpu triggered the
hang quite often. I could also reproduce the problem on a 4 way z/VM host with
a 64 way guest.
It turned out that the guest was consuming all available cpus mostly for
spinning on scheduler locks like rq->lock. This is expected as the threads are
2008 Jun 30
2
[PATCH] Fix the return value of blkdev_name_to_number
Fix the return value of blkdev_name_to_number().
- Function blkdev_name_to_number() should return both devname and
devnum,
otherwise it may cause "unpack non-sequence" error.
Signed-off-by: Dongxiao Xu <dongxiao.xu@intel.com>
Best Regards,
-- Dongxiao
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
2008 May 13
1
[PATCH]Fix the issue that guest cannot boot if set empty cdrom in config file
Hi, Keir,
This attached patch fixes the issue that guest can not boot if set
empty cdrom in configuration file.
(For example, disk = [ ''file:/images/a.img'', '',hdc:cdrom,r'' ])
This is because function "uname = config.get(''uname'', '''')" returns ''''
but not None if uname is not in config
2007 Apr 18
0
[PATCH 5/5] Mmu header movement.patch
Move header includes for the nopud / nopmd types to the location of the
actual pte / pgd type definitions. This allows generic 4-level page
type code to be written before the split 2/3 level page table headers are
included.
Signed-off-by: Zachary Amsden <zach@vmware.com>
diff -r 8233e2c507d3 include/asm-i386/page.h
--- a/include/asm-i386/page.h Thu Oct 19 03:11:37 2006 -0700
+++
2007 Apr 18
0
[PATCH 5/5] Mmu header movement.patch
Move header includes for the nopud / nopmd types to the location of the
actual pte / pgd type definitions. This allows generic 4-level page
type code to be written before the split 2/3 level page table headers are
included.
Signed-off-by: Zachary Amsden <zach@vmware.com>
diff -r 8233e2c507d3 include/asm-i386/page.h
--- a/include/asm-i386/page.h Thu Oct 19 03:11:37 2006 -0700
+++
2013 Dec 04
0
[RFC PATCH v3 18/19] smp, tile: kill SMP single function call interrupt
Commit 9a46ad6d6df3b54 "smp: make smp_call_function_many() use logic
similar to smp_call_function_single()" has unified the way to handle
single and multiple cross-CPU function calls. Now only one intterupt
is needed for architecture specific code to support generic SMP function
call interfaces, so kill the redundant single function call interrupt.
Cc: Andrew Morton <akpm at