On 04/07/12 07:49, zhenzhong.duan wrote:
When populate pages across a mem boundary at bootup, the page count
populated isn't correct. This is due to mem populated to non-mem
region and ignored.
Pfn range is also wrongly aligned when mem boundary isn't page aligned.
Also need consider the
On 08/09/12 10:52, Dan Carpenter wrote:
If m.num is too large then the m.num * sizeof(*m.arr) multiplication
could overflow and the access_ok() check wouldn't test the right size.
m.num is range checked later on so it doesn't matter that the
access_ok() checks might be wrong. A bit subtle,
On 10/09/12 10:03, Jan Beulich wrote:
On 08.09.12 at 11:58, Dan Carpenter dan.carpen...@oracle.com wrote:
When we use this pointer, we cast away the const modifier and modify the
data. I think it was an accident to declare it as const.
NAK - the const is very valid here, as the v2 interface
On 04/01/13 14:22, Daniel Kiper wrote:
On Wed, Jan 02, 2013 at 11:26:43AM +, Andrew Cooper wrote:
On 27/12/12 18:02, Eric W. Biederman wrote:
Andrew Cooperandrew.coop...@citrix.com writes:
On 27/12/2012 07:53, Eric W. Biederman wrote:
The syscall ABI still has the wrong semantics.
Aka
On 04/01/13 17:01, Daniel Kiper wrote:
On Fri, Jan 04, 2013 at 02:38:44PM +, David Vrabel wrote:
On 04/01/13 14:22, Daniel Kiper wrote:
On Wed, Jan 02, 2013 at 11:26:43AM +, Andrew Cooper wrote:
On 27/12/12 18:02, Eric W. Biederman wrote:
Andrew Cooperandrew.coop...@citrix.com writes
On 11/01/13 13:22, Daniel Kiper wrote:
On Thu, Jan 10, 2013 at 02:19:55PM +, David Vrabel wrote:
On 04/01/13 17:01, Daniel Kiper wrote:
My .5 cents:
- We should focus on KEXEC_CMD_kexec_load and KEXEC_CMD_kexec_unload;
probably we should introduce KEXEC_CMD_kexec_load2
On 08/02/2013 20:34, Tim Gardner wrote:
This buffer overflow was introduced with
91e0c5f3dad47838cb2ecc1865ce789a0b7182b1
(2.6.24).
There's no buffer overflow here. xen_mc_flush() resets b-cbidx.
David
arch/x86/xen/multicalls.c |3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
On 26/02/14 15:14, Waiman Long wrote:
This patch adds para-virtualization support to the queue spinlock code
by enabling the queue head to kick the lock holder CPU, if known,
in when the lock isn't released for a certain amount of time. It
also enables the mutual monitoring of the queue head
On 26/02/14 15:14, Waiman Long wrote:
Locking is always an issue in a virtualized environment as the virtual
CPU that is waiting on a lock may get scheduled out and hence block
any progress in lock acquisition even when the lock has been freed.
One solution to this problem is to allow unfair
On 27/02/14 13:11, Paolo Bonzini wrote:
Il 27/02/2014 13:11, David Vrabel ha scritto:
This patch adds para-virtualization support to the queue spinlock code
by enabling the queue head to kick the lock holder CPU, if known,
in when the lock isn't released for a certain amount of time
On 27/02/14 15:50, Paolo Bonzini wrote:
Il 27/02/2014 16:22, Raghavendra K T ha scritto:
On 02/27/2014 08:15 PM, Paolo Bonzini wrote:
[...]
But neither of the VCPUs being kicked here are halted -- they're either
running or runnable (descheduled by the hypervisor).
/me actually looks at
On 04/03/14 15:15, Waiman Long wrote:
On 03/03/2014 05:55 AM, Paolo Bonzini wrote:
Il 28/02/2014 18:06, Waiman Long ha scritto:
On 02/26/2014 12:07 PM, Konrad Rzeszutek Wilk wrote:
On Wed, Feb 26, 2014 at 10:14:24AM -0500, Waiman Long wrote:
Locking is always an issue in a virtualized
On 12/03/14 18:54, Waiman Long wrote:
Locking is always an issue in a virtualized environment as the virtual
CPU that is waiting on a lock may get scheduled out and hence block
any progress in lock acquisition even when the lock has been freed.
One solution to this problem is to allow unfair
On 12/03/14 18:54, Waiman Long wrote:
This patch adds para-virtualization support to the queue spinlock in
the same way as was done in the PV ticket lock code. In essence, the
lock waiters will spin for a specified number of times (QSPIN_THRESHOLD
= 2^14) and then halted itself. The queue head
On 29/10/14 13:45, Paolo Bonzini wrote:
On 10/29/2014 11:37 AM, Andrew Cooper wrote:
While testing various nested combinations, XenServer has found that
modern Windows Server versions must have the hypervisor bit hidden from
them for them to be happy running HyperV, despite the fact that
On 29/10/14 05:19, Andy Lutomirski wrote:
CPUID leaf 4F02H: miscellaneous features
[...]
### CommonHV RNG
If CPUID.4F02H.EAX is nonzero, then it contains an MSR index used to
communicate with a hypervisor random number generator. This
On 20/01/15 20:12, Waiman Long wrote:
This patch adds the necessary XEN specific code to allow XEN to
support the CPU halting and kicking operations needed by the queue
spinlock PV code.
Xen is a word, please don't capitalize it.
+void xen_lock_stats(int stat_types)
+{
+ if (stat_types
) {
add_stats(RELEASED_SLOW_KICKED, 1);
xen_send_IPI_one(cpu, XEN_SPIN_UNLOCK_VECTOR);
break;
Acked-by: David Vrabel david.vra...@citrix.com
Although some of the ACCESS_ONCE to READ_ONCE changes are cosmetic and
are perhaps best left out
On 03/03/15 09:40, Luis R. Rodriguez wrote:
Andrey,
I believe that on Xen we should disable kasan, would like confirmation
Why? This is the first of heard of this.
from someone on xen-devel though. Here's the thing though -- if true
-- I'd like to do it *properly*, where *properly* means
On 07/04/15 03:55, Waiman Long wrote:
This patch adds the necessary Xen specific code to allow Xen to
support the CPU halting and kicking operations needed by the queue
spinlock PV code.
This basically looks the same as the version I wrote, except I think you
broke it.
+static void
On 17/11/15 13:44, Juergen Gross wrote:
> The only member of that structure is startup_ipi_hook which is always
> set to paravirt_nop.
Reviewed-by: David Vrabel <david.vra...@citrix.com>
David
___
Virtualization mailing list
Virtualization
On 07/12/15 16:19, Stefano Stabellini wrote:
> Hi all,
>
> this patch series introduces support for running Linux on top of Xen
> inside a virtual machine with virtio devices (nested virt scenario).
> The problem is that Linux virtio drivers use virt_to_phys to get the
> guest pseudo-physical
On 07/12/15 16:19, Stefano Stabellini wrote:
> Signed-off-by: Stefano Stabellini <stefano.stabell...@eu.citrix.com>
Can you add a brief description about why these are being moved? Then,
assuming this is needed in the end:
Acked-by: David Vrabel <david.vra...@citrix
non-SMP guest runs on an SMP host.
>
> Switch to virt_xxx barriers which serve this exact purpose.
Acked-by: David Vrabel <david.vra...@citrix.com>
David
___
Virtualization mailing list
Virtualization@lists.linux-foundation.org
https://lists.linuxf
non-SMP guest runs on an SMP host.
>
> Switch to virt_xxx barriers which serve this exact purpose.
Acked-by: David Vrabel <david.vra...@citrix.com>
If you're feeling particularly keen there's a rmb() consume_one_event()
in drivers/xen/events/events_fifo.c that can be converted
On 20/12/15 09:25, Michael S. Tsirkin wrote:
>
> I noticed that drivers/xen/xenbus/xenbus_comms.c uses
> full memory barriers to communicate with the other side.
> For example:
>
> /* Must write data /after/ reading the consumer index. * */
> mb();
>
>
witch to the virt_rmb barrier which serves this exact purpose.
>
> Pull in asm/barrier.h here to make sure the file is self-contained.
>
> Suggested-by: David Vrabel <david.vra...@citrix.com>
> Signed-off-by: Michael S. Tsirkin <m...@redhat.com>
Acked-b
On 29/01/16 02:31, Andy Lutomirski wrote:
> Signed-off-by: Andy Lutomirski
> ---
> drivers/virtio/virtio_ring.c | 12
> 1 file changed, 12 insertions(+)
>
> diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c
> index c169c6444637..305c05cc249a
On 03/02/16 05:46, Andy Lutomirski wrote:
> Signed-off-by: Andy Lutomirski
You forgot the previous Reviewed-by tags.
David
___
Virtualization mailing list
Virtualization@lists.linux-foundation.org
On 01/02/16 18:00, Andy Lutomirski wrote:
> Signed-off-by: Andy Lutomirski <l...@kernel.org>
Reviewed-by: David Vrabel <david.vra...@citrix.com>
Thanks.
David
___
Virtualization mailing list
Virtualization@lists.linux-found
On 21/03/16 13:42, Jan Beulich wrote:
>
> Also don't you need to call smp_processor_id() after preempt_disable()?
I suggest using get_cpu()/put_cpu() here.
David
___
Virtualization mailing list
Virtualization@lists.linux-foundation.org
On 05/04/16 11:01, Juergen Gross wrote:
>
> No, I don't think this is a good idea. In the EINVAL or EBUSY case a
> simple Xen admin command might be enough to make the next call succeed.
> I don't want to disable pinning in this case.
Ok.
Acked-by: David Vrabel <david.vra...@cit
On 05/04/16 06:10, Juergen Gross wrote:
> Import the actual version of include/xen/interface/sched.h from Xen.
Acked-by: David Vrabel <david.vra...@citrix.com>
David
___
Virtualization mailing list
Virtualization@lists.linux-foundation.
On 05/04/16 06:10, Juergen Gross wrote:
> Some hardware models (e.g. Dell Studio 1555 laptops) require calls to
> the firmware to be issued on cpu 0 only. As Dom0 might have to use
> these calls, add xen_pin_vcpu() to achieve this functionality.
>
> In case either the domain doesn't have the
34 matches
Mail list logo