Displaying 20 results from an estimated 25 matches for "l1e".
Did you mean:
l1
2012 Mar 01
14
[PATCH 0 of 3] RFC Paging support for AMD NPT V2
There has been some progress, but still no joy. Definitely not intended for
inclusion at this point.
Tim, Wei, I added a Xen command line toggle to disable IOMMU and P2M table
sharing.
Tim, I verified that changes to p2m-pt.c don''t break shadow mode (64bit
hypervisor and Win 7 guest).
Hongkaixing, I incorporated your suggestion in patch 2, so I should add your
Signed-off-by eventually.
2011 Nov 29
10
[PATCH 0 of 2] Fix correctness race in xc_mem_paging_prep
ging_prep ensures that an mfn is backing the paged-out gfn, and
transitions to the next state in the paging state machine for this page.
Foreign mappings of the gfn will now succeed. This is the key idea, as it
allows the pager to now map the gfn and fill in its contents.
Unfortunately, it also allows any other foreign mapper to map the gfn and read
its contents. This is particularly dangerous
2013 Oct 10
10
[PATCH 0/4] x86: XSA-67 follow-up
1: correct LDT checks
2: add address validity check to guest_map_l1e()
3: use {rd,wr}{fs,gs}base when available
4: check for canonical address before doing page walks
Signed-off-by: Jan Beulich <jbeulich@suse.com>
2011 Sep 08
5
[PATCH 0 of 2] v2: memshare/xenpaging/xen-access fixes for xen-unstable
The following two patches allow the parallel use of memsharing, xenpaging and
xen-access by using an independent ring buffer for each feature.
Please review.
v2:
- update mem_event_check_ring arguments, check domain rather than domain_id
- check ring_full first because its value was just evaluated
- check if ring buffer is initialized before calling
mem_access_domctl/mem_paging_domctl
2007 Dec 25
1
[VTD][PATCH] Fix addr_to_dma_page() and rmrr mapping issues
Fix addr_to_dma_page() issue to return l1e correctly, and also clean up
rmrr mapping code, make sure setup rmrr identify mapping just once per
domain.
This patch fixes the VT-d bug (Fail to boot smp Linux guest with VT-d
NIC assigned on IA32e platform).
Signed-off-by: Weidong Han <weidong.han@intel.com>
__________________________...
2007 Jan 12
0
[PATCH] xc_ptrace PAE awareness
...pu]) )
- maddr = page_array[maddr >> PAGE_SHIFT] << PAGE_SHIFT;
+ maddr = (uint64_t)page_array[maddr >> PAGE_SHIFT] << PAGE_SHIFT;
return maddr;
}
@@ -225,7 +222,8 @@ map_domain_va_pae(
void *guest_va,
int perm)
{
- unsigned long l3e, l2e, l1e, l2p, l1p, p, va = (unsigned long)guest_va;
+ uint64_t l3e, l2e, l1e, l2p, l1p, p;
+ unsigned long va = (unsigned long)guest_va;
uint64_t *l3, *l2, *l1;
static void *v[MAX_VIRT_CPUS];
@@ -380,12 +378,12 @@ map_domain_va(
if (!paging_enabled(&ctxt[cpu])) {
stati...
2006 Oct 04
4
Can''t set break points with Linux guest in PAE mode
...ice vif8.0 entered promiscuous mode
(XEN) DOM0: (file=mm.c, line=1688) Bad type (saw 28000001 != exp
e0000000) for mfn 96efe (pfn 573)
(XEN) DOM0: (file=mm.c, line=606) Error getting mfn 96efe (pfn 573)
from L1 entry 0000000096efe027 for dom8
(XEN) DOM0: (file=mm.c, line=1266) Bad get_page_from_l1e(): pl1e =
fefa6a30, nl1e = 96efe027, ol1e = 0, gl1mfn = d8538
(XEN) DOM0: (file=mm.c, line=2283) Could not modify L1 entry: va ==
fefa6a30, l1e == 96efe027, mfn == d8538
(I''ve added the two MEM_LOG() calls at line 1266 and 2283.)
Any ideas where I should begin looking? Or is PAE sup...
2011 Jul 18
1
Re: trip to shanghai
...>
> do_mmu_update
> ->mod_l1_entry
> -> if ( !p2m_is_ram(p2mt) || unlikely(mfn == INVALID_MFN) )
> return -EINVAL;
>
> mfn==INVALID_MFN, because :
>
> mod_l1_entry
> ->gfn_to_mfn(p2m_get_hostp2m(pg_dom), l1e_get_pfn(nl1e), &p2mt));
> ->p2m->get_entry
> ->p2m_gfn_to_mfn
> -> if ( gfn > p2m->max_mapped_pfn )
> /* This pfn is higher than the
> highest the p2m map cur...
2007 Oct 03
0
[PATCH 3/3] TLB flushing and IO memory mapping
...Jul 25 14:03:12 2007 +0100
@@ -594,6 +594,14 @@ get_##level##_linear_pagetable(
return 1;
\
}
+
+int iomem_page_test(unsigned long mfn, struct page_info *page)
+{
+ return unlikely(!mfn_valid(mfn)) ||
+ unlikely(page_get_owner(page) == dom_io);
+}
+
+
int
get_page_from_l1e(
l1_pgentry_t l1e, struct domain *d)
@@ -611,8 +619,7 @@ get_page_from_l1e(
return 0;
}
- if ( unlikely(!mfn_valid(mfn)) ||
- unlikely(page_get_owner(page) == dom_io) )
+ if ( iomem_page_test(mfn, page) )
{
/* DOMID_IO reverts to caller for privilege...
2008 Feb 21
2
[PATCH][RFC]Remove lock on first guest table walk
Just found this patch in house which I thought sent out
already. :-)
Still one thing remaining is to special case for UP guest
which suffers overhead from this change...
----
Remove lock on first guest table walk
Existing shadow fault path grabs big lock before walking
guest tables, to ensure consistency with shadow content
lest concurrent change from other vcpu in a bad OS.
But this lock
2012 Dec 10
26
[PATCH 00/11] Add virtual EPT support Xen.
From: Zhang Xiantao <xiantao.zhang@intel.com>
With virtual EPT support, L1 hyerpvisor can use EPT hardware
for L2 guest''s memory virtualization. In this way, L2 guest''s
performance can be improved sharply. According to our testing,
some benchmarks can show > 5x performance gain.
Signed-off-by: Zhang Xiantao <xiantao.zhang@intel.com>
Zhang Xiantao (11):
2007 Jul 02
3
Walking an HVM''s shadow page tables and other memory management questions.
...w (the line #s
won''t match because of the instrumentation).
(XEN) multi.c:236:d1 guest_walk_tables: va: 0x81699000.
(XEN) multi.c:257:d1 guest_walk_tables: get l3e from cache: 0xff1a6ed0.
(XEN) multi.c:263:d1 guest_walk_tables: l3e not present: 0x0.
(XEN) multi.c:574:d1 sh_guest_map_l1e: va:81699000
If I add the /PAE switch to the boot.ini file, then I can get past this
problem. Hence my statement that it appears the hypervisor is assuming
guests are running with at least PAE mode enable, which may not be the
case. Could someone please guide me here?
The 2nd problem I en...
2006 Dec 01
1
[PATCH 2/10] Add support for netfront/netback acceleration drivers
...permit_access(dom0, 0UL, ~0UL, IOMEM_ACCESS_READWRITE);
rc |= irqs_permit_access(dom0, 0, NR_IRQS-1);
/*
diff -r b58bcd6551e2 xen/arch/x86/mm.c
--- a/xen/arch/x86/mm.c Fri Dec 01 16:21:46 2006 +0000
+++ b/xen/arch/x86/mm.c Fri Dec 01 16:22:41 2006 +0000
@@ -552,7 +552,7 @@ get_page_from_l1e(
{
unsigned long mfn = l1e_get_pfn(l1e);
struct page_info *page = mfn_to_page(mfn);
- int okay;
+ int okay, access;
if ( !(l1e_get_flags(l1e) & _PAGE_PRESENT) )
return 1;
@@ -570,11 +570,19 @@ get_page_from_l1e(
if ( d == dom_io )
d = curre...
2011 Jul 21
51
Linux Stubdom Problem
...gt; ->mod_l1_entry
>> -> if ( !p2m_is_ram(p2mt) || unlikely(mfn == INVALID_MFN) )
>> return -EINVAL;
>>
>> mfn==INVALID_MFN, because :
>>
>> mod_l1_entry
>> ->gfn_to_mfn(p2m_get_hostp2m(pg_dom), l1e_get_pfn(nl1e), &p2mt));
>> ->p2m->get_entry
>> ->p2m_gfn_to_mfn
>> -> if ( gfn > p2m->max_mapped_pfn )
>> /* This pfn is higher than the
>> hig...
2008 Feb 22
3
FW: [PATCH][UPDATE]Remove lock on guest table walk
...UPDATE]Remove lock on guest table walk
>From: Tim Deegan
>Sent: 2008年2月21日 22:13
>Hi,
>
>So, the idea seems sound, and avoids the shadow lock altogether on a
>bunch more pagefaults, which is nice.
>
>I think that since PV pagetables are guaranteed to be read-only above
>l1e, the guest_map_l1e and guest_get_eff_l1e functions can be
>allowed to
>drop the shadow lock and call guest_walk_tables with shadow_op == 0.
>That would mean that there are no callers left setting shadow_op to 1,
>and then the shadow_op argument (and the whole mechanism for calling
>...
2008 Nov 04
7
[PATCH 1/1] Xen PV support for hugepages
...nt writeable)
+{
+ if ( writeable )
+ put_page_and_type(page);
+ else
+ put_page(page);
+}
+
/*
* We allow root tables to map each other (a.k.a. linear page tables). It
* needs some special care with reference counts and access permissions:
@@ -656,6 +679,7 @@ get_page_from_l1e(
struct vcpu *curr = current;
struct domain *owner;
int okay;
+ int writeable;
if ( !(l1f & _PAGE_PRESENT) )
return 1;
@@ -698,10 +722,9 @@ get_page_from_l1e(
* contribute to writeable mapping refcounts. (This allows the
* qemu-dm helper process in...
2012 Jun 08
18
[PATCH 0 of 4 RFC] Populate-on-demand: Check pages being returned by the balloon driver
Populate-on-demand: Check pages being returned by the balloon driver
This patch series is the second result of my work last summer on
decreasing fragmentation of superpages in a guests'' p2m when using
populate-on-demand.
This patch series is against 4.1; I''m posting it to get feedback on
the viability of getting a ported version of this patch into 4.2.
As with the previous
2008 Nov 06
1
Panics and freeze using age0
I'm running FreeBSD 7.1-PRERELEASE over Asus P5Q motherboard.
Such board comes with an nic requiring age0 driver.
When the nic is under load, such trasferring big amount of data
over gigabit connection (let's say some gigabyte backups),
the computer hangs, sometimes with panic, sometimes freezing.
Before that i was using an Intel nic with em0 driver
and 7.0-Stable#2.. and that
2008 Feb 20
0
VMX status report. Xen: #17062 & Xen0: #425 -- no new issue
Hi all,
This is today''s xen nightly test report for Xen:#17062 & Xen0:#425.
No new issue today.
Old issues:
==============================================
1) lots of error messages for l1e flags conflict are printed by mtrr.c on PAE host
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1172
2) [Guest Test] SMP VISTA HVM guest might be blue screen when doing
large I/O in dom0.
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1117
3) HVM domain performance would downgrad...
2008 Oct 03
4
fxp performance with POLLING
Hello again :)
With POLLING enabled I experience about 10%-25% performance drop when
copying files over network. Tested with both SAMBA and NFS. Is it normal?
FreeBSD 7.1-PRERELEASE #0: Sat Sep 6 01:52:12 CEST 2008
fxp0: <Intel 82801DB (ICH4) Pro/100 Ethernet> port 0xc800-0xc83f mem
0xe1021000-0xe1021fff irq 20 at device 8.0 on pci1
# ifconfig fxp0
fxp0: