8547e28bd5
23233-hvm-cr-access.patch 23234-svm-decode-assist-base.patch 23235-svm-decode-assist-crs.patch 23236-svm-decode-assist-invlpg.patch 23238-svm-decode-assist-insn-fetch.patch 23303-cpufreq-misc.patch 23304-amd-oprofile-strings.patch 23305-amd-fam15-xenoprof.patch 23306-amd-fam15-vpmu.patch 23334-amd-fam12+14-vpmu.patch 23338-vtd-force-intremap.patch - fate#310957 - Update to Xen 4.1.1-rc1 c/s 23064 - xentrace: dynamic tracebuffer allocation xen-unstable.xentrace.dynamic_tbuf.patch xen-unstable.xentrace.empty_t_info_pages.patch xen-unstable.xentrace.verbose.patch xen-unstable.xentrace.no_gdprintk.patch xen-unstable.xentrace.comments.patch xen-unstable.xentrace.printk_prefix.patch xen-unstable.xentrace.remove_debug_printk.patch xen-unstable.xentrace.t_info_pages-formula.patch xen-unstable.xentrace.register_cpu_notifier-boot_time.patch xen-unstable.xentrace.t_info_page-overflow.patch xen-unstable.xentrace.t_info_first_offset.patch xen-unstable.xentrace.data_size__read_mostly.patch xen-unstable.xentrace.__insert_record-dst-type.patch OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=124
58 lines
2.1 KiB
Diff
58 lines
2.1 KiB
Diff
xenpaging: do not bounce p2mt to xenpaging
|
|
|
|
Do not bounce p2mt to xenpaging because p2m_mem_paging_populate and
|
|
p2m_mem_paging_resume dont make use of p2mt. Only pages of type
|
|
p2m_ram_rw will be paged-out, and during page-in this type has to be
|
|
restored.
|
|
|
|
Signed-off-by: Olaf Hering <olaf@aepfle.de>
|
|
|
|
---
|
|
tools/xenpaging/xenpaging.c | 4 ----
|
|
xen/arch/x86/mm/p2m.c | 1 -
|
|
2 files changed, 5 deletions(-)
|
|
|
|
Index: xen-4.1.1-testing/tools/xenpaging/xenpaging.c
|
|
===================================================================
|
|
--- xen-4.1.1-testing.orig/tools/xenpaging/xenpaging.c
|
|
+++ xen-4.1.1-testing/tools/xenpaging/xenpaging.c
|
|
@@ -657,7 +657,6 @@ int main(int argc, char *argv[])
|
|
|
|
/* Prepare the response */
|
|
rsp.gfn = req.gfn;
|
|
- rsp.p2mt = req.p2mt;
|
|
rsp.vcpu_id = req.vcpu_id;
|
|
rsp.flags = req.flags;
|
|
|
|
@@ -674,10 +673,8 @@ int main(int argc, char *argv[])
|
|
else
|
|
{
|
|
DPRINTF("page already populated (domain = %d; vcpu = %d;"
|
|
- " p2mt = %x;"
|
|
" gfn = %"PRIx64"; paused = %d)\n",
|
|
paging->mem_event.domain_id, req.vcpu_id,
|
|
- req.p2mt,
|
|
req.gfn, req.flags & MEM_EVENT_FLAG_VCPU_PAUSED);
|
|
|
|
/* Tell Xen to resume the vcpu */
|
|
@@ -686,7 +683,6 @@ int main(int argc, char *argv[])
|
|
{
|
|
/* Prepare the response */
|
|
rsp.gfn = req.gfn;
|
|
- rsp.p2mt = req.p2mt;
|
|
rsp.vcpu_id = req.vcpu_id;
|
|
rsp.flags = req.flags;
|
|
|
|
Index: xen-4.1.1-testing/xen/arch/x86/mm/p2m.c
|
|
===================================================================
|
|
--- xen-4.1.1-testing.orig/xen/arch/x86/mm/p2m.c
|
|
+++ xen-4.1.1-testing/xen/arch/x86/mm/p2m.c
|
|
@@ -2975,7 +2975,6 @@ void p2m_mem_paging_populate(struct p2m_
|
|
|
|
/* Send request to pager */
|
|
req.gfn = gfn;
|
|
- req.p2mt = p2mt;
|
|
req.vcpu_id = v->vcpu_id;
|
|
|
|
mem_event_put_request(d, &req);
|