Displaying 20 results from an estimated 100 matches similar to: "[PATCH] x86: ptwr adjustments"
2007 May 14
0
[PATCH] x86: replace some intpte_t * casts
Don''t cast values when other (type safe) mechanisms are available to achieve
the same effect.
Signed-off-by: Jan Beulich <jbeulich@novell.com>
Index: 2007-05-14/xen/arch/x86/mm.c
===================================================================
--- 2007-05-14.orig/xen/arch/x86/mm.c 2007-05-14 08:40:14.000000000 +0200
+++ 2007-05-14/xen/arch/x86/mm.c 2007-05-14 08:40:20.000000000
2005 Mar 14
4
[patch/unstable] page table cleanups
Hi,
In many places xen uses "unsigned long" instead of the l*_pgentry_t
types to pass around page table entries. Here is a patch which fixes
this in a number of places (mostly in shadow mode code). Thats what
I''ve trapped in so far, maybe more of these patches follow.
Fixing this is needed for adding PAE support to xen. In PAE paging mode
the page table entries are 64 bit
2006 Oct 04
4
Can''t set break points with Linux guest in PAE mode
Folks --
One more time with the PAE request, this time I''ve brought up the
Linux kernel w/ a very recent version of Xen. (Just yesterday I
pulled and updated my hg tree.) I still can''t set breakpoints within
the guest domain:
# gdb vmlinux
GNU gdb 6.4-debian
<...>
(gdb) target remote roti.lab.netapp.com:9999
Remote debugging using roti.lab.netapp.com:9999
[New
2008 Mar 31
0
what''s the purpose of line page table (PML4 entry 258)
Hi,
When I read the code of do_update_va_mapping, I find that it update the pte
entry in the line page table by looking up the line page table via
guest_map_l1e() :
2998 <http://lxr.xensource.com/lxr/source/xen/arch/x86/mm.c?a=x86_64#L2998>
int do_update_va_mapping
<http://lxr.xensource.com/lxr/ident?a=x86_64;i=do_update_va_mapping>(unsigned
long va, u64
2007 Mar 20
62
RFC: [0/2] Remove netloop by lazy copying in netback
Hi Keir:
These two patches remove the need for netloop by performing the
copying in netback and only if it is necessary. The rationale
is that most packets will be processed without delay allowing
them to be freed without copying at all. So instead of copying
every packet destined to dom0 we''ll only copy those that linger
longer than a specified amount of time (currently 0.5s).
As it
2006 Mar 15
0
implicit grant unmap hacking [was RE: Grant tables from dom0 userspace?]
> I''d think it would make more sense to store the PTE
> that the grant has been bound to explicitly
Already did that.
> and hook the implicit unmap off of the pte update
> validation code in Xen.
I''m investigating your suggestion with a quick experiment. I put a hack
into ptwr_do_page_fault(), which is one place where the pte address is
available. The hack
2008 Nov 04
7
[PATCH 1/1] Xen PV support for hugepages
This is the latest version of a patch that adds hugepage support to the Xen
hypervisor in a PV environment. It is against the latest xen-unstable tree
on xenbits.xensource.com. I believe this version addresses the comments
made about the previous version of the patch.
Hugepage support must be enabled via the hypervisor command line option
"allowhugepage".
It assumes the guest
2007 May 23
0
Apache CGI Performance Big Degration in Dom0 vs. Native
Hi there,
I ran a test on an Apache server, the workload is a helloworld.c compiled cgi, very simple. OS is SLES 10. The stress tool is ab (apache bench).
The performance looks big degration from native to Dom0:
Running in prefork mode:
Native Dom0
Performance(request/s) 3700 . 650
CPU%
2007 May 23
0
Apache CGI Performance Big Degration in Dom0 vs. Native
Hi there,
I ran a test on an Apache server, the workload is a helloworld.c compiled cgi, very simple. OS is SLES 10. The stress tool is ab (apache bench).
The performance looks big degration from native to Dom0:
Running in prefork mode:
Native Dom0
Performance(request/s) 3700 . 650
CPU%
2011 Jul 18
1
Re: trip to shanghai
CC''ing Tim and xen-devel
On Mon, 18 Jul 2011, Jiageng Yu wrote:
> 2011/7/16 Stefano Stabellini <stefano.stabellini@eu.citrix.com>:
> > On Fri, 15 Jul 2011, Jiageng Yu wrote:
> >> 2011/7/15 Jiageng Yu <yujiageng734@gmail.com>:
> >> > 2011/7/15 Stefano Stabellini <stefano.stabellini@eu.citrix.com>:
> >> >> On Fri, 15 Jul 2011,
2006 Jul 26
5
[Fwd: stack overflow "cause" found]
Xen is compiled with no -O gcc option, meaning no optimization, and the
compiler does the safest thing imaginable. This means that if a
function, say vmx_world_save(), calls the same inline a bazillion times,
the stack will have one block of local variables for each invocation of
that function!
Xen really should not be doing this. We could either uninline some of
these functions, or try gcc -O2
2007 Jul 02
3
Walking an HVM''s shadow page tables and other memory management questions.
Hello,
I''m new to Xen and especially to the hypervisor code. I''m working off a
3.0.4.1 base and have the following questions regarding the memory
management code for an x86, 32-bit platform (capable of supporting PAE).
I''m doing some research into providing grant table hypercall support
from a Windows 2003 HVM. I have made all the necessary changes to allow
the
2009 Sep 02
6
SXCE 121 Kernel Panic while installing NetBSD 5.0.1 PVM DomU
Hi all!
I am running SXCE 121 on a dual quad-core X2200M2 (64 bit of course).
During an installation of a NetBSD 5.0.1 PVM domU, the entire machine
crashed with a kernel panic. Here''s what I managed to salvage from
the LOM console of the machine:
Sep 2 18:55:19 glaurung genunix: /xpvd/xdb@41,51712 (xdb5) offline
Sep 2 18:55:19 glaurung genunix: /xpvd/xdb@41,51728 (xdb6) offline
2013 Dec 06
36
[V6 PATCH 0/7]: PVH dom0....
Hi,
V6: The only change from V5 is in patch #6:
- changed comment to reflect autoxlate
- removed a redundant ASSERT
- reworked logic a bit so that get_page_from_gfn() is called with NULL
for p2m type as before. arm has ASSERT wanting it to be NULL.
Tim: patch 4 needs your approval.
Daniel: patch 5 needs your approval.
These patches implement PVH dom0.
Patches 1 and 2
2006 Dec 01
1
[PATCH 2/10] Add support for netfront/netback acceleration drivers
This set of patches adds the support for acceleration plugins to the
netfront/netback drivers. These plugins are intended to support
virtualisable network hardware that can be directly accessed from the
guest, bypassing dom0.
This is in response to the RFC we posted to xen-devel with an outline
of our approach at the end of September.
To follow will be another set of patches to provide our
2005 Jun 30
0
[PATCH][2/10] Extend the VMX intercept mechanism to include mmio as well as portio.
Extend the VMX intercept mechanism to include mmio as well as portio.
Signed-off-by: Yunhong Jiang <yunhong.jiang@intel.com>
Signed-off-by: Xiaofeng Ling <xiaofeng.ling@intel.com>
Signed-off-by: Arun Sharma <arun.sharma@intel.com>
diff -r febfcd0a1a0a -r 9a43d5c12b95 xen/include/asm-x86/vmx_platform.h
--- a/xen/include/asm-x86/vmx_platform.h Thu Jun 30 03:20:48 2005
+++
2011 Jul 21
51
Linux Stubdom Problem
2011/7/19 Stefano Stabellini <stefano.stabellini@eu.citrix.com>:
> CC''ing Tim and xen-devel
>
> On Mon, 18 Jul 2011, Jiageng Yu wrote:
>> 2011/7/16 Stefano Stabellini <stefano.stabellini@eu.citrix.com>:
>> > On Fri, 15 Jul 2011, Jiageng Yu wrote:
>> >> 2011/7/15 Jiageng Yu <yujiageng734@gmail.com>:
>> >> > 2011/7/15
2017 May 04
4
Xen package security updates for jessie 4.4, XSA-213, XSA-214
Moritz Muehlenhoff writes ("Re: Xen package security updates for jessie 4.4, XSA-213, XSA-214"):
> Yes, the distribution line should be jessie-security, but please send
> a debdiff to team at security.debian.org for a quick review before
> uploading (I have no idea whether dgit supports security-master).
Here is the proposed debdiff (actually, a git diff) for xen in jessie.
My
2007 Sep 28
18
[makedumpfile] extract vmcoreinfo from /proc/vmcore for Xen
Hi,
--- background ----------------------------------------------------
* what the makedumpfile is:
To shorten the size of the dumpfile and the time of creating the
dumpfile, makedumpfile copies only the necessary pages for analysis
to the dumpfile from /proc/vmcore. You can specify the kind of
unnecessary pages with dump_level. If you want to shorten the size
further, enable the
2006 Jul 14
23
[RFC] New shadow paging code
We (Michael Fetterman, George Dunlap and I) have been working over the
last while on a full replacement for Xen''s shadow pagetable support.
This mail contains some design notes, below; a patch against
xen-unstable, giving a snapshot of the current state of the new shadow
code, is at http://www.cl.cam.ac.uk/~tjd21/shadow2.patch
Comments on both are welcome, although the code is not