search for: mem_log

Displaying 12 results from an estimated 12 matches for "mem_log".

2007 Dec 10
0
[PATCH] avoid duplication of domain ID in messages
...============================ --- 2007-12-10.orig/xen/arch/x86/mm.c 2007-12-05 17:13:57.000000000 +0100 +++ 2007-12-10/xen/arch/x86/mm.c 2007-12-10 09:22:53.000000000 +0100 @@ -2028,8 +2028,7 @@ static int set_foreigndom(domid_t domid) if ( unlikely(domid == d->domain_id) ) { - MEM_LOG("Dom %u tried to specify itself as foreign domain", - d->domain_id); + MEM_LOG("Cannot specify itself as foreign domain"); okay = 0; } else if ( unlikely(paging_mode_translate(d)) ) @@ -2045,7 +2044,7 @@ static int set_foreigndom(domid...
2008 Jul 24
2
[RFC] i386 highmem assist hypercalls
...k; } + case MMUEXT_CLEAR_PAGE: + { + unsigned char *ptr; + + okay = get_page_and_type_from_pagenr(mfn, PGT_writable_page, + FOREIGNDOM); + if ( unlikely(!okay) ) + { + MEM_LOG("Error while clearing mfn %lx", mfn); + break; + } + + /* A page is dirtied when it''s being cleared. */ + paging_mark_dirty(d, mfn); + + ptr = fixmap_domain_page(mfn); + clear_page(ptr); + fixunmap_d...
2006 Oct 04
4
Can''t set break points with Linux guest in PAE mode
...rom L1 entry 0000000096efe027 for dom8 (XEN) DOM0: (file=mm.c, line=1266) Bad get_page_from_l1e(): pl1e = fefa6a30, nl1e = 96efe027, ol1e = 0, gl1mfn = d8538 (XEN) DOM0: (file=mm.c, line=2283) Could not modify L1 entry: va == fefa6a30, l1e == 96efe027, mfn == d8538 (I''ve added the two MEM_LOG() calls at line 1266 and 2283.) Any ideas where I should begin looking? Or is PAE support languishing? -- Randy _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2008 Oct 17
6
[PATCH, RFC] i386: highmem access assistance hypercalls
...} + case MMUEXT_CLEAR_PAGE: + { + unsigned char *ptr; + + okay = !get_page_and_type_from_pagenr(mfn, PGT_writable_page, + FOREIGNDOM, 0); + if ( unlikely(!okay) ) + { + MEM_LOG("Error while clearing mfn %lx", mfn); + break; + } + + /* A page is dirtied when it''s being cleared. */ + paging_mark_dirty(d, mfn); + + ptr = fixmap_domain_page(mfn); + clear_page(ptr); + fixunmap_d...
2006 Dec 01
1
[PATCH 2/10] Add support for netfront/netback acceleration drivers
...d = current->domain; - if ( !iomem_access_permitted(d, mfn, mfn) ) + if ( (access = iomem_access_permitted(d, mfn, mfn)) + == IOMEM_ACCESS_NOACCESS ) { if ( mfn != (PADDR_MASK >> PAGE_SHIFT) ) /* INVALID_MFN? */ MEM_LOG("Non-privileged (%u) attempt to map I/O space % 08lx", d->domain_id, mfn); + return 0; + } + + /* If access is IOMEM_ACCESS_READONLY, the l1e_get_flags below + should not have _PAGE_RW set */ + if(access == IOMEM_ACCES...
2008 Nov 04
7
[PATCH 1/1] Xen PV support for hugepages
...? get_page_and_type(page, d, PGT_writable_page) - : get_page(page, d)); + writeable = (l1f & _PAGE_RW) && + !( unlikely(paging_mode_external(d) && (d != curr->domain)) ); + okay = get_data_page(page, d, writeable); if ( !okay ) { MEM_LOG("Error getting mfn %lx (pfn %lx) from L1 entry %" PRIpte @@ -759,11 +782,43 @@ get_page_from_l2e( MEM_LOG("Bad L2 flags %x", l2e_get_flags(l2e) & L2_DISALLOW_MASK); return -EINVAL; } + if ( l2e_get_flags(l2e) & _PAGE_PSE ) + { + unsign...
2013 Oct 10
10
[PATCH 0/4] x86: XSA-67 follow-up
1: correct LDT checks 2: add address validity check to guest_map_l1e() 3: use {rd,wr}{fs,gs}base when available 4: check for canonical address before doing page walks Signed-off-by: Jan Beulich <jbeulich@suse.com>
2007 Mar 20
62
RFC: [0/2] Remove netloop by lazy copying in netback
Hi Keir: These two patches remove the need for netloop by performing the copying in netback and only if it is necessary. The rationale is that most packets will be processed without delay allowing them to be freed without copying at all. So instead of copying every packet destined to dom0 we''ll only copy those that linger longer than a specified amount of time (currently 0.5s). As it
2013 Dec 06
36
[V6 PATCH 0/7]: PVH dom0....
Hi, V6: The only change from V5 is in patch #6: - changed comment to reflect autoxlate - removed a redundant ASSERT - reworked logic a bit so that get_page_from_gfn() is called with NULL for p2m type as before. arm has ASSERT wanting it to be NULL. Tim: patch 4 needs your approval. Daniel: patch 5 needs your approval. These patches implement PVH dom0. Patches 1 and 2
2004 Feb 11
48
Kernel panic while compiling kernel
I know you Xen developers are beginning to hate me ;) but... While trying to compile 2.4.24 under DOM0, quickly after issuing ''make dep'' I got: Kernel panic: Failed mmu update: c015bf80, 4 I suspect this address probably isn''t to helpful but this is all I have. I am currently booted in 2.4.21-SuSE and compiling the 2.4.24 regarding another thread here. Regarding
2007 Jul 02
3
Walking an HVM''s shadow page tables and other memory management questions.
Hello, I''m new to Xen and especially to the hypervisor code. I''m working off a 3.0.4.1 base and have the following questions regarding the memory management code for an x86, 32-bit platform (capable of supporting PAE). I''m doing some research into providing grant table hypercall support from a Windows 2003 HVM. I have made all the necessary changes to allow the
2005 Mar 14
4
[patch/unstable] page table cleanups
...ear_offset(l1va)]; + ptep = &linear_pg_table[l1_linear_offset(l1va)]; /* * STEP 1. Write-protect the p.t. page so no more updates can occur. */ - if ( unlikely(__get_user(pte, ptep)) ) + if ( unlikely(__copy_from_user(&pte, ptep, sizeof(pte))) ) { MEM_LOG("ptwr: Could not read pte at %p\n", ptep); /* @@ -2325,17 +2328,17 @@ void ptwr_flush(const int which) } PTWR_PRINTK("[%c] disconnected_l1va at %p is %p\n", PTWR_PRINT_WHICH, ptep, pte); - pte &= ~_PAGE_RW; + l1_pgentry_val(pte) &amp...