Displaying 15 results from an estimated 15 matches similar to: "[PATCH] make all performance counter per-cpu"
2009 Jul 15
0
[PATCH] rename for_each_cpu() to for_each_possible_cpu()
... to be more precise in naming, and also to match Linux.
Signed-off-by: Jan Beulich <jbeulich@novell.com>
--- 2009-07-10.orig/xen/arch/ia64/linux-xen/perfmon.c 2009-05-27 13:54:05.000000000 +0200
+++ 2009-07-10/xen/arch/ia64/linux-xen/perfmon.c 2009-07-15 10:02:08.000000000 +0200
@@ -7313,7 +7313,7 @@ xenpfm_context_create(XEN_GUEST_HANDLE(p
goto out;
/* XXX fmt */
-
2009 Jul 07
0
[PATCH] [VMX] Add support for Pause-Loop Exiting
[VMX] Add support for Pause-Loop Exiting
New NHM processors will support Pause-Loop Exiting by adding 2 VM-execution
control fields:
PLE_Gap - upper bound on the amount of time between two successive
executions of PAUSE in a loop.
PLE_Window - upper bound on the amount of time a guest is allowed to execute in
a PAUSE loop
If the time, between this execution of PAUSE
2008 Mar 31
0
what''s the purpose of line page table (PML4 entry 258)
Hi,
When I read the code of do_update_va_mapping, I find that it update the pte
entry in the line page table by looking up the line page table via
guest_map_l1e() :
2998 <http://lxr.xensource.com/lxr/source/xen/arch/x86/mm.c?a=x86_64#L2998>
int do_update_va_mapping
<http://lxr.xensource.com/lxr/ident?a=x86_64;i=do_update_va_mapping>(unsigned
long va, u64
2008 Feb 01
4
[PATCH] x86: adjust reserved bit page fault handling
One could even debate whether reserved bit faults are always fatal (and
should never be propagated to the guest)...
Signed-off-by: Jan Beulich <jbeulich@novell.com>
Index: 2008-01-28/xen/arch/x86/traps.c
===================================================================
--- 2008-01-28.orig/xen/arch/x86/traps.c 2008-01-28 11:31:44.000000000 +0100
+++ 2008-01-28/xen/arch/x86/traps.c
2013 May 07
1
[PATCH V2] xen/arm: implement smp_call_function
From: Julien Grall <julien.grall@citrix.com>
Move smp_call_function and on_selected_cpus to common code.
Signed-off-by: Julien Grall <julien.grall@citrix.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
Acked-by: Keir Fraser <keir@xen.org>
---
Changes in V2:
- Add copyright header in xen/common/smp.c
xen/arch/arm/gic.c | 3 ++
xen/arch/arm/smp.c
2007 Jun 28
5
One question on MMIO
In sh_page_fault(), there are some code like following, why we think it
is mmio only when paging_vcpu_mode_translate(v)?
Thanks
Yunhong Jiang
/* What mfn is the guest trying to access? */
gfn = guest_l1e_get_gfn(gw.eff_l1e);
gmfn = vcpu_gfn_to_mfn(v, gfn);
mmio = (is_hvm_domain(d)
&& paging_vcpu_mode_translate(v)
&&
2017 May 04
4
Xen package security updates for jessie 4.4, XSA-213, XSA-214
Moritz Muehlenhoff writes ("Re: Xen package security updates for jessie 4.4, XSA-213, XSA-214"):
> Yes, the distribution line should be jessie-security, but please send
> a debdiff to team at security.debian.org for a quick review before
> uploading (I have no idea whether dgit supports security-master).
Here is the proposed debdiff (actually, a git diff) for xen in jessie.
My
2008 Sep 11
5
[PATCH] Fix arguments passed to SHADOW_PRINTK
Hi.
When I compiled xen-3.3-testing with DEBUG_TRACE_DUMP in xen/include/xen/lib.h
turned on, I got some errors at SHADOW_PRINTK.
The following patch will fix the arguments passed to SHADOW_PRINTK in
xen/arch/x86/mm/shadow/common.c and xen/arch/x86/mm/shadow/multi.c.
Although I haven''t tested, it is the same for xen-unstable.hg
Thanks,
Yoshi
Signed-off-by: Yoshi Tamura
2006 Jan 22
4
SeBackupPrivilege
We're using Samba 3.0.21a-1 on a CentOS 4.2 server (kernel
2.6.9-22.0.2.ELsmp); everything works more or less fine,
it's functioning as the PDC with an OpenLDAP back end (setup
essentially straight from the Idealx.org playbook), etc.
We're trying to mount Windows shares to back them up, and
getting "permission denied" errors when trying to read
certain files from those
2007 Mar 15
12
performance counters
In order to be meaningful and usable together with other measuring methods,
their use in my opinion should impose as little overhead as possible. With that,
I wonder why per-cpu counters use atomic operations.
Thanks, Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2012 Oct 02
18
[PATCH 0/3] x86: adjust entry frame generation
This set of patches converts the way frames gets created from
using PUSHes/POPs to using MOVes, thus allowing (in certain
cases) to avoid saving/restoring part of the register set.
While the place where the (small) win from this comes from varies
between CPUs, the net effect is a 1 to 2% reduction on a
combined interruption entry and exit when the full state save
can be avoided.
1: use MOV
2007 May 14
3
install opt-samba-base on aix 5.3
I am trying to install samba 3.0.24 on aix 5.3. I have downlaoded the binaries
from samba.org and I am using the directions found at:
http://us4.samba.org/samba/ftp/Binary_Packages/AIX/
The directions dont specify installing the base. WHen I try to install the
pware 3.0.24, it fails due to required packages missing.
I do not see a way to get opt-samba-base installed.
Included below is the
2007 Aug 20
3
[PATCH 2/4] Introduce a new fields "gtime" and "cgtime" in task_struct and signal_struct
[PATCH 2/4] like for cpustat, introduce the "gtime" (guest time of the task=
) and
"cgtime" (guest time of the task children) fields for the
tasks. Modify signal_struct and task_struct. Modify /proc/<pid>/stat to dis=
play
these new fields.
Signed-off-by: Laurent Vivier <Laurent.Vivier@bull.net>
-- =
------------- Laurent.Vivier@bull.net --------------
2007 Aug 20
3
[PATCH 2/4] Introduce a new fields "gtime" and "cgtime" in task_struct and signal_struct
[PATCH 2/4] like for cpustat, introduce the "gtime" (guest time of the task=
) and
"cgtime" (guest time of the task children) fields for the
tasks. Modify signal_struct and task_struct. Modify /proc/<pid>/stat to dis=
play
these new fields.
Signed-off-by: Laurent Vivier <Laurent.Vivier@bull.net>
-- =
------------- Laurent.Vivier@bull.net --------------
2011 Jan 21
11
[PATCH]x86:x2apic: Disable x2apic on x86-32 permanently
x86:x2apic: Disable x2apic on x86-32 permanently
x2apic initialization on x86_32 uses vcpu pointer before it is initialized. As x2apic is unlikely to be used on x86_32, this patch disables x2apic permanently on x86_32. It also asserts the sanity of vcpu pointer before dereference to prevent further misuse.
Signed-off-by: Fengzhe Zhang <fengzhe.zhang@intel.com>
diff -r 02c0af2bf280