Displaying 20 results from an estimated 5000 matches similar to: "[PATCH] x86: minor adjustment to asm constraint in get_page()"
2007 May 29
0
Fw: [RFC] makedumpfile: xen extraction
Hi,
I sent the following e-mail to kexec-mailing list (kexec@lists.infradead.org)
since subjects of makedumpfile are discussed on the mailing list.
I want to inform this to xen developers since I think this function is
useful for xen developers.
Thanks.
Itsuro Oda
(see https://sourceforge.net/projects/makedumpfile/
about makedumpfile command.)
Forwarded by Itsuro ODA
2011 Sep 23
2
Some problems about xenpaging
Hi, Olaf
we have tested the xenpaging feature and found some problems.
(1) the test case like this : when we start a VM with POD enable, the xenpaging is started at the same time.
this case will cause many problems ,finally, we fixed the BUG, the patch is attached below.
(2) there is a very serious problem. we have observed many VM crash examples, the error code is not always the same.
2007 Oct 03
0
[PATCH 3/3] TLB flushing and IO memory mapping
Signed-off-by: Kieran Mansley <kmansley@solarflare.com>
Allow iomem permissions to be set up through grant table ops
diff -r 749b60ccc177 xen/arch/x86/mm.c
--- a/xen/arch/x86/mm.c Wed Jul 25 14:03:08 2007 +0100
+++ b/xen/arch/x86/mm.c Wed Jul 25 14:03:12 2007 +0100
@@ -594,6 +594,14 @@ get_##level##_linear_pagetable(
return 1;
\
}
+
+int iomem_page_test(unsigned long mfn,
2009 Jan 26
24
page ref/type count overflows
With pretty trivial user mode programs being able to crash the kernel due to
the ref counter widths in Xen being more narrow than in Linux, I started an
attempt to put together a kernel side fix. While addressing the plain
hypercalls is pretty strait forward, dealing with multicalls (both when using
them for lazy mmu mode batching and when explicitly using them in e.g.
netback - the backends are
2007 Nov 27
4
spurious warnings from get_page() via gnttab_copy() during frontend shutdown
In testing our implementation of the hypervisor copy based backend-
>frontend networking changes, we see what I believe are spurious
warning messages during the shutdown of the frontend domain:
(XEN) /export/build/schuster/xvm-gate/xen.hg/xen/include/asm/mm.h:
189:d0 Error pfn 30e290: rd=ffff830000fcf100, od=ffff830000fcf100,
caf=00000000, taf=0000000000000000
(XEN) Xen call trace:
2013 Nov 14
4
[PATCH] xen/arm: Allow balooning working with 1:1 memory mapping
With the lake of iommu, dom0 must have a 1:1 memory mapping for all
these guest physical address. When the ballon decides to give back a
page to the kernel, this page must have the same address as previously.
Otherwise, we will loose the 1:1 mapping and will break DMA-capable
device.
Signed-off-by: Julien Grall <julien.grall@linaro.org>
CC: Keir Fraser <keir@xen.org>
CC: Jan Beulich
2013 Jul 14
0
[LLVMdev] [PATCH] x86/asm: avoid mnemonics without type suffix
(resent without HTML)
On 07/14/2013 05:56 AM, Ramkumar Ramachandra wrote:
> 1c54d77 (x86: partial unification of asm-x86/bitops.h, 2008-01-30)
> changed a bunch of btrl/btsl instructions to btr/bts, with the following
> justification:
>
> The inline assembly for the bit operations has been changed to remove
> explicit sizing hints on the instructions, so the assembler will
2008 Nov 04
7
[PATCH 1/1] Xen PV support for hugepages
This is the latest version of a patch that adds hugepage support to the Xen
hypervisor in a PV environment. It is against the latest xen-unstable tree
on xenbits.xensource.com. I believe this version addresses the comments
made about the previous version of the patch.
Hugepage support must be enabled via the hypervisor command line option
"allowhugepage".
It assumes the guest
2018 Dec 13
2
[PATCH] kbuild, x86: revert macros in extended asm workarounds
Revert the following commits:
- 5bdcd510c2ac9efaf55c4cbd8d46421d8e2320cd
("x86/jump-labels: Macrofy inline assembly code to work around GCC inlining bugs")
- d5a581d84ae6b8a4a740464b80d8d9cf1e7947b2
("x86/cpufeature: Macrofy inline assembly code to work around GCC inlining bugs")
- 0474d5d9d2f7f3b11262f7bf87d0e7314ead9200.
("x86/extable: Macrofy inline assembly
2018 Dec 13
2
[PATCH] kbuild, x86: revert macros in extended asm workarounds
Revert the following commits:
- 5bdcd510c2ac9efaf55c4cbd8d46421d8e2320cd
("x86/jump-labels: Macrofy inline assembly code to work around GCC inlining bugs")
- d5a581d84ae6b8a4a740464b80d8d9cf1e7947b2
("x86/cpufeature: Macrofy inline assembly code to work around GCC inlining bugs")
- 0474d5d9d2f7f3b11262f7bf87d0e7314ead9200.
("x86/extable: Macrofy inline assembly
2013 Jul 14
9
[LLVMdev] [PATCH] x86/asm: avoid mnemonics without type suffix
1c54d77 (x86: partial unification of asm-x86/bitops.h, 2008-01-30)
changed a bunch of btrl/btsl instructions to btr/bts, with the following
justification:
The inline assembly for the bit operations has been changed to remove
explicit sizing hints on the instructions, so the assembler will pick
the appropriate instruction forms depending on the architecture and
the context.
Unfortunately,
2012 Nov 15
1
[RFC/PATCH v4] XENMEM_claim_pages (subop of existing) hypercall
This is a fourth cut of the hypervisor patch of the proposed
XENMEM_claim_pages hypercall/subop, taking into account
feedback from Jan and Keir and IanC, plus some fixes found
via runtime debugging (using privcmd only) and some
added comments/cleanup.
[Logistical note: I will be out tomorrow (Friday) plus US
holidays next week so my responsiveness to comments may be
slower for awhile. --djm]
2008 Dec 15
8
[PATCH 0/2] MCA support with page offlining
Hi all,
I had posted about MCA support for Intel64 before. It had only a
function to log the MCA error data received from hypervisor.
http://lists.xensource.com/archives/html/xen-devel/2008-09/msg00876.html
I attach patches that support not only error logging but also Page
Offlining function. The page where an MCA occurs will offline and not
reuse. A new flag ''PGC_reserved''
2006 Sep 29
0
[PATCH 2/6] xen: add per-node bucks to page allocator
This patch adds a per-node bucket to the heap structure in Xen. During
heap initialization the patch determines which bucket to place the
memory. We reserve guard pages between node boundaries in the case that
said boundary isn''t already guarded by the MAX_ORDER boundary to prevent
the buddy allocator from merging pages between nodes.
--
Ryan Harper
Software Engineer; Linux Technology
2013 Jul 15
1
[LLVMdev] [PATCH] x86/asm: avoid mnemonics without type suffix
On 07/14/2013 12:23 PM, Jeremy Fitzhardinge wrote:
> (resent without HTML)
>
> On 07/14/2013 05:56 AM, Ramkumar Ramachandra wrote:
>> 1c54d77 (x86: partial unification of asm-x86/bitops.h, 2008-01-30)
>> changed a bunch of btrl/btsl instructions to btr/bts, with the following
>> justification:
>>
>> The inline assembly for the bit operations has been
2013 Dec 06
0
[Patch v2] xen/tmem: Fix uses of unmatched __map_domain_page()
__map_domain_page() *must* be matched with an unmap_domain_page(). These five
static inline functions each map a page (or two), then throw away the context
needed to unmap it.
Each of the changes are limited to their respective functions. In two cases,
this involved replacing a large amount of pointer arithmetic with memcpy()
(all callers were relying on memcpy() semantics of positive/negative
2009 Jul 16
0
Re: Xen-devel Digest, Vol 52, Issue 178
Hi, all
I want to reduce the checkpoint size of a VM by memory exclusion. I try to find out all the free pages by reference count at VMM-level, As they declared that:
/* Page is on a free list: ((count_info & PGC_count_mask) == 0). */ , in struct page_info which is defined in /xen/include/asm-x86/mm.h, but unfortunately, all the pages in a idle VM accords with this condition.
2008 Apr 21
1
[PATCH] x86-64: emulation support for cmpxchg16b
With the x86 instruction emulator no pretty complete, I''d like to
re-submit this patch to support cmpxchg16b on x86-64 and at once rename
the underlying emulator callback function pointer (making clear that if
implemented, it is to operate on two longs rather than two 32-bit
values). At the same time it fixes an apparently wrong emulator context
initialization in the shadow code.
2013 Dec 17
0
[PATCH net-next 2/3] virtio-net: use per-receive queue page frag alloc for mergeable bufs
The virtio-net driver currently uses netdev_alloc_frag() for GFP_ATOMIC
mergeable rx buffer allocations. This commit migrates virtio-net to use
per-receive queue page frags for GFP_ATOMIC allocation. This change unifies
mergeable rx buffer memory allocation, which now will use skb_refill_frag()
for both atomic and GFP-WAIT buffer allocations.
To address fragmentation concerns, if after buffer
2013 Dec 06
36
[V6 PATCH 0/7]: PVH dom0....
Hi,
V6: The only change from V5 is in patch #6:
- changed comment to reflect autoxlate
- removed a redundant ASSERT
- reworked logic a bit so that get_page_from_gfn() is called with NULL
for p2m type as before. arm has ASSERT wanting it to be NULL.
Tim: patch 4 needs your approval.
Daniel: patch 5 needs your approval.
These patches implement PVH dom0.
Patches 1 and 2