similar to: [PATCH] Substitue the duplicate spin_lock_irqsave to spin_lock in the vt-d code path

Displaying 20 results from an estimated 10000 matches similar to: "[PATCH] Substitue the duplicate spin_lock_irqsave to spin_lock in the vt-d code path"

2007 Oct 17
7
[VTD][RESEND]add a timer for the shared interrupt issue for vt-d
Keir, It''s a resending patch for the timeout mechanism to deal with the shared interrupt issue for vt-d enabled hvm guest. We modify the patch following your comments last time and make some other small fix: 1) We don''t touch the locking around the hvm_dpci_eoi(). 2) Remove the HZ from the TIME_OUT_PERIOD macro which may confuse others. 3) Add some
2009 Jul 18
0
[PATCH 5/6] fs/btrfs: convert nested spin_lock_irqsave to spin_lock
From: Julia Lawall <julia@diku.dk> If spin_lock_irqsave is called twice in a row with the same second argument, the interrupt state at the point of the second call overwrites the value saved by the first call. Indeed, the second call does not need to save the interrupt state, so it is changed to a simple spin_lock. The semantic match that finds this problem is as follows:
2009 Jan 22
8
[PATCH 2/2] Enhance MTRR/PAT virtualization for EPT & VT-d enabled both
The patch attached is to set effective memory type for EPT according to the VT-d snoop control capability, and also includes some cleansup for EPT & VT-d both enabled. Signed-off-by: Zhai, Edwin Edwin.Zhai@intel.com<mailto:Edwin.Zhai@intel.com> Signed-off-by: Xin, Xiaohui xiaohui.xin@intel.com<mailto:xiaohui.xin@intel.com> _______________________________________________
2007 Sep 30
6
[VTD][PATCH] a time out mechanism for the shared interrupt issue for vtd
Attached is a patch for shared interrupt between dom0 and HVM domain for vtd. Most of problem is caused by that we should inject interrupt to both domains and the physical interrupt deassertion then may be delayed by the device assigned to the HVM. The patch adds a timer, and the time out value is sufficient large to tolerant the delaying used to wait for the physical interrupt deassertion.
2005 Sep 01
0
[PATCH][VT]Make 32-bit VMX guest work on 64-bit host
Ian, Keir, This patch is to boot 32-bit VMX guest on the 64-bit host. Double-compile is used to make both 64-bit guest and 32-bit guest can work, the shadow page-table uses current 64-bit shadow code''s structure to simulate 32-bit guest''s 2-level page-table. Signed-off-by: Chengyuan Li <chengyuan.li@intel.com> Signed-off-by: Xiaohui Xin <xiaohui.xin@intel.com>
2006 Aug 31
2
[PATCH]Add CR8 virtualization
This patch adds CR8 virtualization. It''s the initial patch for booting HVM x64 Windows guest, and just let every CR8 access issues vmexit. And later we will do acceleration to it. Signed-off-by: Xiaohui Xin <xiaohui.xin@intel.com> _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2008 Mar 11
3
[PATCH 1/4] virtio: Use spin_lock_irqsave/restore for virtio-pci
From: Anthony Liguori <aliguori at us.ibm.com> virtio-pci acquires its spin lock in an interrupt context so it's necessary to use spin_lock_irqsave/restore variants. This patch fixes guest SMP when using virtio devices in KVM. Signed-off-by: Anthony Liguori <aliguori at us.ibm.com> Signed-off-by: Rusty Russell <rusty at rustcorp.com.au> --- drivers/virtio/virtio_pci.c |
2008 Mar 11
3
[PATCH 1/4] virtio: Use spin_lock_irqsave/restore for virtio-pci
From: Anthony Liguori <aliguori at us.ibm.com> virtio-pci acquires its spin lock in an interrupt context so it's necessary to use spin_lock_irqsave/restore variants. This patch fixes guest SMP when using virtio devices in KVM. Signed-off-by: Anthony Liguori <aliguori at us.ibm.com> Signed-off-by: Rusty Russell <rusty at rustcorp.com.au> --- drivers/virtio/virtio_pci.c |
2006 Oct 12
9
[PATCH] an obvious fix to PIC IO intercept
an obvious fix to PIC IO intercept. In PIC IO, address from send_pio_req is physical address already. Signed-off-by: Xiaohui Xin <xiaohui.xin@intel.com> Signed-off-by: Xiaowei Yang <xiaowei.yang@intel.com> Signed-off-by: Xin Li <xin.b.li@intel.com> _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com
2007 Dec 05
13
[PATCH] unshadow the page table page which are used as data page
The patch deals with the situation which guest OS uses unused page table pages as data pages and write data to them. The pages will still be grabbed by Xen as page table pages, and lots of unnecessary page faults occur. The patch will check if the data guest writes to the page table contains valid mfn or not, if not, we believe it is a data page now and then unshadow the page. The patch
2006 Dec 01
0
[PATCH] A fix for CR8 acceleration on 64bit guest
This patch is a small fix for CR8 acceleration on 64bit guest. For current CR8 acceleration, we do not call update_tpr_threshold() at every VMEXIT. But at some situations, we cannot inject guest interrupts in time. And at some critical time, it will bring up a blue screen to 64bit Windows guest. Try this scenario: 1) At one VMIT, tpr = TPR_THRESHOLD, but tpr < pending IRQ, and we
2006 Feb 18
4
[PATCH] HVM x86_32 PAE guest support on 64-bit Xen
The patch enables x86_32 PAE unmodified guests on 64-bit Xen when the hvm feature is present. We tested only Linux at this point, and we''ll improve the functionality as we test other guests. The SVM needs the equivalent changes to the vmc.c to get this functionality working, but this patch does not break the build. Signed-off-by: Jun Nakajima <jun.nakajima@intel.com>
2008 May 09
14
[PATCH] patch to support super page (2M) with EPT
Attached are the patches to support super page with EPT. We only support 2M size. And shadow may still work fine with 4K pages. The patches can be split into 3 parts. Apply order is as attached. tool.diff To allocate 2M physical contiguous memory in guest except the first 2M and the last 2M. The first 2M covers special memory, and Xen use the last few pages in guest memory to do special
2007 May 15
3
[PATCH 1/12] Add suspend/resume to devices owned by Xen
Add suspend/resume to devices owned by Xen. Signed-off-by Ke Yu <ke.yu@intel.com> Signed-off-by Kevin Tian <kevin.tian@intel.com> diff -r 3ef0510e44d0 xen/arch/x86/apic.c --- a/xen/arch/x86/apic.c Tue May 08 10:21:23 2007 +0100 +++ b/xen/arch/x86/apic.c Mon May 14 15:05:28 2007 -0400 @@ -579,6 +579,95 @@ void __devinit setup_local_APIC(void) apic_pm_activate(); } +static
2002 Jun 16
1
Can NOT start R in windows2000 (PR#1678)
Full_Name: Xin Tian Version: 1.5.0 or 1.4.0 OS: windows 2000 Submission from: (NULL) (165.230.240.114) I tried to install R 1.5.0 or R 1.4.0 to my PC with windows2000. After installation, whenever I clicked R icon, it returned to me an error message: "Rgui.exe has generated errors and will be closed by windows. You will need to restart the program. An error log is being created."
2004 Sep 09
0
rate_engine substitue db field?
Is anyone familiar with the Trollphone's LCR package? There is a field in the egress table labeled substitue. Placing a $1 there results in the correct dial extension being passed. However how is this field used to substitute replacement dial extensions... in other words as an example, lets say my EXTEN as passed to and back from the rate_engine is 01144123456789 and I want to have a
2005 Nov 22
0
WFQ substitue
Hi, I wanted to implemente WFQ, but it is not implemented on tc. Is there any way of making something like WFQ with which is implemented on tc?? What I exactly want to do, is to select flows by IP and port destination, and priorize them, but I don''t need (and don''t really want) to fix any rate... Has anyone got any clue??? Thank you Bye
2005 Sep 23
0
[PATCH] [VT] clean up VMX builder
This patch clean up VMX builder. Since now we have vmxloader, old code loading linux kernel directly is not needed. 1. remove linux parameters. 2. remove init ramdisk. 3. remove e820 memmap config file parse. Also e820 map handling code is changed in vmx_setup_platform. 4. remove provisional GDT, and construct_init_guest_vmcs is updated greatly. 5. remove some ugly tailing space. Thanks Keir for
2005 Sep 29
0
RE: [PATCH] [VT] SMP VMX guest AP bring up need calldo_boot_vcpu in hypervisor
Jun suggested to use another elegant way, pls ignore this one. -Xin >SMP VMX guest AP bring up need call do_boot_vcpu in hypervisor. >Current call to do_boot_vcpu always from domain, however, for SMP VMX >guest AP bring up, it is called from xen hypervisor. >Signed-off-by: Xin Li <xin.b.li@intel.com> > >diff -r f069a06e650f xen/common/domain.c >--- a/xen/common/domain.c
2010 Mar 11
0
[PATCH] VT-d: various initialization fixes
Detect invalid/unsupported configurations in iommu_alloc() - offsets read from hardware must not lead to exceeding a single page (since only that much gets mapped). This covers the apparently not uncommon case of the address pointed to by a DMAR reading as all ones (Linux for example also checks for this). Further correct error handling of that function: Without storing the allocated "struct