search for: p2m_is_ram

Displaying 9 results from an estimated 9 matches for "p2m_is_ram".

2012 Jun 08
18
[PATCH 0 of 4 RFC] Populate-on-demand: Check pages being returned by the balloon driver
Populate-on-demand: Check pages being returned by the balloon driver This patch series is the second result of my work last summer on decreasing fragmentation of superpages in a guests'' p2m when using populate-on-demand. This patch series is against 4.1; I''m posting it to get feedback on the viability of getting a ported version of this patch into 4.2. As with the previous
2011 Sep 23
2
Some problems about xenpaging
...m_mem_paging_drop_page(d, gpfn+i); + p2m_pod_cache_add(d, page, 0); + steal_for_cache = ( p2md->pod.entry_count > p2md->pod.count ); + nonpod--; + ram--; + } + /* for other ram types */ else if ( steal_for_cache && p2m_is_ram(t) ) { struct page_info *page; 2) fix the race between POD and xenpaging situation can be described as the follow xenpaging POD mfn = gfn_to_mfn() mfn = gfn_to_mfn() check p2m type check p2mt p2m_...
2011 Nov 29
10
[PATCH 0 of 2] Fix correctness race in xc_mem_paging_prep
ging_prep ensures that an mfn is backing the paged-out gfn, and transitions to the next state in the paging state machine for this page. Foreign mappings of the gfn will now succeed. This is the key idea, as it allows the pager to now map the gfn and fill in its contents. Unfortunately, it also allows any other foreign mapper to map the gfn and read its contents. This is particularly dangerous
2012 Mar 01
14
[PATCH 0 of 3] RFC Paging support for AMD NPT V2
There has been some progress, but still no joy. Definitely not intended for inclusion at this point. Tim, Wei, I added a Xen command line toggle to disable IOMMU and P2M table sharing. Tim, I verified that changes to p2m-pt.c don''t break shadow mode (64bit hypervisor and Win 7 guest). Hongkaixing, I incorporated your suggestion in patch 2, so I should add your Signed-off-by eventually.
2011 Jul 18
1
Re: trip to shanghai
.... Maybe this hypercall is failing > > in your case? > > > Hi, > > I continue to invesgate this bug and find hypercall_mmu_update in > qemu_remap_bucket(xc_map_foreign_bulk) is failing: > > do_mmu_update > ->mod_l1_entry > -> if ( !p2m_is_ram(p2mt) || unlikely(mfn == INVALID_MFN) ) > return -EINVAL; > > mfn==INVALID_MFN, because : > > mod_l1_entry > ->gfn_to_mfn(p2m_get_hostp2m(pg_dom), l1e_get_pfn(nl1e), &p2mt)); > ->p2m->get_entry >...
2009 Aug 06
2
[PATCH] hvm emul: fix cmpxchg emulation to use an atomic operation
...FN ) + { + hvm_inject_exception(TRAP_page_fault, pfec, vaddr); + return _mfn(BAD_GVA_TO_GFN); + } + + /* Translate the GFN to an MFN */ + mfn = gfn_to_mfn(v->domain, gfn, &p2mt); + + if ( p2mt == p2m_ram_ro ) + return _mfn(READONLY_GFN); + if ( !p2m_is_ram(p2mt) ) + return _mfn(BAD_GFN_TO_MFN); + + ASSERT(mfn_valid(mfn_x(mfn))); + + return mfn; +} + +/* Check that the user is allowed to perform this write. + * Returns a mapped pointer to write to, or NULL for error. */ +#define MAPPING_UNHANDLEABLE ((void *)(unsigned long)X86EMUL_UNHAND...
2012 Dec 12
2
[PATCH v7 1/2] xen: unify domain locking in domctl code
These two patches were originally part of the XSM series that I have posted, and remain prerequisites for that series. However, they are independent of the XSM changes and are a useful simplification regardless of the use of XSM. The Acked-bys on these patches were provided before rebasing them over the copyback changes in 26268:1b72138bddda, which had minor conflicts that I resolved. [PATCH
2011 Jul 21
51
Linux Stubdom Problem
...t; > in your case? >> >> >> Hi, >> >>    I continue to invesgate this bug and find hypercall_mmu_update in >> qemu_remap_bucket(xc_map_foreign_bulk) is failing: >> >> do_mmu_update >>       ->mod_l1_entry >>              ->  if ( !p2m_is_ram(p2mt) || unlikely(mfn == INVALID_MFN) ) >>                          return -EINVAL; >> >>    mfn==INVALID_MFN, because : >> >> mod_l1_entry >>       ->gfn_to_mfn(p2m_get_hostp2m(pg_dom), l1e_get_pfn(nl1e), &p2mt)); >>               ->p2m->get_e...
2012 Jan 09
39
[PATCH v4 00/25] xen: ARMv7 with virtualization extensions
Hello everyone, this is the fourth version of the patch series that introduces ARMv7 with virtualization extensions support in Xen. The series allows Xen and Dom0 to boot on a Cortex-A15 based Versatile Express simulator. See the following announce email for more informations about what we are trying to achieve, as well as the original git history: See