search for: count_info

Displaying 18 results from an estimated 18 matches for "count_info".

Did you mean: mount_info
2011 Jan 17
8
[PATCH 0 of 3] Miscellaneous populate-on-demand bugs
This patch series includes a series of bugs related to p2m, ept, and PoD code which were found as part of our XenServer product testing. Each of these fixes actual bugs, and the 3.4-based version of the patch has been tested thoroughly. (There may be bugs in porting the patches, but most of them are simple enough as to make it unlikely.) Each patch is conceptually independent, so they can each
2009 Jan 26
24
page ref/type count overflows
With pretty trivial user mode programs being able to crash the kernel due to the ref counter widths in Xen being more narrow than in Linux, I started an attempt to put together a kernel side fix. While addressing the plain hypercalls is pretty strait forward, dealing with multicalls (both when using them for lazy mmu mode batching and when explicitly using them in e.g. netback - the backends are
2008 Dec 15
8
[PATCH 0/2] MCA support with page offlining
...d from hypervisor. http://lists.xensource.com/archives/html/xen-devel/2008-09/msg00876.html I attach patches that support not only error logging but also Page Offlining function. The page where an MCA occurs will offline and not reuse. A new flag ''PGC_reserved'' was added in page count_info to mark the impacted page. I know that it is better to implement the page offlining for general purpose, but I implemented for MCA specialized in this first step. And I also implement the MCA handler of Dom0 which support to shutdown the remote domain where a MCA occurred. If the MCA occurred on...
2007 May 29
0
Fw: [RFC] makedumpfile: xen extraction
...; /* ia64 */ + SYMBOL_INIT(xen_pstart, "xen_pstart"); /* ia64 */ + SYMBOL_INIT(frametable_pg_dir, "frametable_pg_dir"); /* ia64 */ + + return TRUE; +} + +int +get_structure_info_xen(struct DumpInfo *info) +{ + SIZE_INIT(page_info, "page_info"); + OFFSET_INIT(page_info.count_info, "page_info", "count_info"); + /* _domain is the first member of union u */ + OFFSET_INIT(page_info._domain, "page_info", "u"); + + SIZE_INIT(domain, "domain"); + OFFSET_INIT(domain.domain_id, "domain", "domain_id"); + OFFSET_INI...
2007 Sep 28
18
[makedumpfile] extract vmcoreinfo from /proc/vmcore for Xen
Hi, --- background ---------------------------------------------------- * what the makedumpfile is: To shorten the size of the dumpfile and the time of creating the dumpfile, makedumpfile copies only the necessary pages for analysis to the dumpfile from /proc/vmcore. You can specify the kind of unnecessary pages with dump_level. If you want to shorten the size further, enable the
2017 May 04
4
Xen package security updates for jessie 4.4, XSA-213, XSA-214
...nnh at google.com> +Signed-off-by: Jan Beulich <jbeulich at suse.com> +Reviewed-by: Andrew Cooper <andrew.cooper3 at citrix.com> + +--- + +--- xen-4.4.1.orig/xen/arch/x86/mm.c ++++ xen-4.4.1/xen/arch/x86/mm.c +@@ -4227,6 +4227,17 @@ int steal_page( + y = cmpxchg(&page->count_info, x, x & ~PGC_count_mask); + } while ( y != x ); + ++ /* ++ * With the sole reference dropped temporarily, no-one can update type ++ * information. Type count also needs to be zero in this case, but e.g. ++ * PGT_seg_desc_page may still have PGT_validated set, which we need t...
2017 May 04
3
Bug#861660: Xen package security updates for jessie 4.4, XSA-213, XSA-214
Moritz Muehlenhoff writes ("Re: Xen package security updates for jessie 4.4, XSA-213, XSA-214"): > On Thu, May 04, 2017 at 05:06:07PM +0100, Ian Jackson wrote: > > I have fixed these in stretch but the jessie package remains unfixed. > > I think I may be able to find some backports somewhere. Would that be > > useful ? Is anyone else working on this ? > >
2011 Sep 23
2
Some problems about xenpaging
...esn''t get modified under Xen''s feet */ page = mfn_to_page(mfn); if ( unlikely(!get_page(page, d)) ) - return -EINVAL; + goto out; /* Decrement guest domain''s ref count of the page */ if ( test_and_clear_bit(_PGC_allocated, &page->count_info) ) put_page(page); /* Remove mapping from p2m table */ - p2m_lock(d->arch.p2m); set_p2m_entry(d, gfn, _mfn(PAGING_MFN), 0, p2m_ram_paged); - p2m_unlock(d->arch.p2m); /* Put the page back so it gets freed */ put_page(page); + + ret = 0; +out: +...
2008 Jun 12
0
[PATCH] x86: minor adjustment to asm constraint in get_page()
...tile ( - LOCK_PREFIX "cmpxchg8b %3" - : "=d" (nd), "=a" (y), "=c" (d), + LOCK_PREFIX "cmpxchg8b %2" + : "=d" (nd), "=a" (y), "=m" (*(volatile u64 *)(&page->count_info)) : "0" (d), "1" (x), "c" (d), "b" (nx) ); } _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2006 Feb 09
11
X86_64 "assert" when booting 64-bit image.
...d->id=%d gpfn=%lx gmfn=%lx stype=%lx c=%x t=%" P\ Rtype_info " " 1217:4799: "mfn_out_of_sync(gmfn)=%d mfn_is_page_table(gmfn)\ =%d\n", 1218:4877: d->domain_id, gpfn, gmfn, stype, 1219:8400: pfn_to_page(gmfn)->count_info, 1220:8400: pfn_to_page(gmfn)->u.inuse.type_info, 1221:4799: mfn_out_of_sync(gmfn), mfn_is_page_table(gmfn)); 1222:4799: BUG(); 1223:4799: } 1224:4799: 1225:4799: // Undo the affects of the above call to ___shadow_status()'...
2011 Apr 06
1
Xen page sharing
...gref=0 bad? If I keep this condition the control is never transferred to ''memshr_vbd_issue_ro_request'' or ''memshr_vbd_complete_ro_request'' [interface.c] as gref is always 0 everytime I run my DomUs. And if I remove this condition, the check ''(page->count_info != (PGC_allocated | (2 + expected_refcnt)))'' fails in ''page_make_sharable'' [mm.c] 7. Also we had to pass domain_id to the function ''''__tap_ctl_spawn()" [tap-ctl-spawn.c] that execs tapdisk, so that vbd_info.domid is set when tapdisk2 calls '...
2013 Dec 06
36
[V6 PATCH 0/7]: PVH dom0....
Hi, V6: The only change from V5 is in patch #6: - changed comment to reflect autoxlate - removed a redundant ASSERT - reworked logic a bit so that get_page_from_gfn() is called with NULL for p2m type as before. arm has ASSERT wanting it to be NULL. Tim: patch 4 needs your approval. Daniel: patch 5 needs your approval. These patches implement PVH dom0. Patches 1 and 2
2009 Jul 16
0
Re: Xen-devel Digest, Vol 52, Issue 178
Hi, all I want to reduce the checkpoint size of a VM by memory exclusion. I try to find out all the free pages by reference count at VMM-level, As they declared that: /* Page is on a free list: ((count_info & PGC_count_mask) == 0). */ , in struct page_info which is defined in /xen/include/asm-x86/mm.h, but unfortunately, all the pages in a idle VM accords with this condition. I prints out the reference count of all memory pages, all of them are equal to or bigger than 2. Anyone can tell me the...
2012 Nov 15
1
[RFC/PATCH v4] XENMEM_claim_pages (subop of existing) hypercall
...mm.c index fad3d33..7e55908 100644 --- a/xen/arch/x86/mm.c +++ b/xen/arch/x86/mm.c @@ -3841,7 +3841,7 @@ int donate_page( { if ( d->tot_pages >= d->max_pages ) goto fail; - d->tot_pages++; + domain_increase_tot_pages(d, 1); } page->count_info = PGC_allocated | 1; diff --git a/xen/arch/x86/mm/mem_sharing.c b/xen/arch/x86/mm/mem_sharing.c index 5103285..943a3b5 100644 --- a/xen/arch/x86/mm/mem_sharing.c +++ b/xen/arch/x86/mm/mem_sharing.c @@ -639,7 +639,7 @@ static int page_make_sharable(struct domain *d, } page_set_owner(page...
2007 Jul 02
3
Walking an HVM''s shadow page tables and other memory management questions.
Hello, I''m new to Xen and especially to the hypervisor code. I''m working off a 3.0.4.1 base and have the following questions regarding the memory management code for an x86, 32-bit platform (capable of supporting PAE). I''m doing some research into providing grant table hypercall support from a Windows 2003 HVM. I have made all the necessary changes to allow the
2012 Jan 09
39
[PATCH v4 00/25] xen: ARMv7 with virtualization extensions
Hello everyone, this is the fourth version of the patch series that introduces ARMv7 with virtualization extensions support in Xen. The series allows Xen and Dom0 to boot on a Cortex-A15 based Versatile Express simulator. See the following announce email for more informations about what we are trying to achieve, as well as the original git history: See
2011 Dec 06
57
[PATCH RFC 00/25] xen: ARMv7 with virtualization extensions
Hello everyone, this is the very first version of the patch series that introduces ARMv7 with virtualization extensions support in Xen. The series allows Xen and Dom0 to boot on a Cortex-A15 based Versatile Express simulator. See the following announce email for more informations about what we are trying to achieve, as well as the original git history: See
2012 Jan 04
98
RFC: Still TODO for 4.2?
What are the outstanding things to do before we think we can start on the 4.2 -rc''s? Does anyone have a timetable in mind? hypervisor: * ??? - Keir, Tim, Jan? tools: * libxl stable API -- we would like 4.2 to define a stable API which downstream''s can start to rely on not changing. Aspects of this are: * event handling (IanJ working