Displaying 3 results from an estimated 3 matches for "prink".
Did you mean:
printk
2006 Mar 15
0
implicit grant unmap hacking [was RE: Grant tables from dom0 userspace?]
...itly
Already did that.
> and hook the implicit unmap off of the pte update
> validation code in Xen.
I''m investigating your suggestion with a quick experiment. I put a hack
into ptwr_do_page_fault(), which is one place where the pte address is
available. The hack simply does a prink() when detecting a pte with the
_PAGE_GNTTAB bit set. I never see the printk() when the OS squashes the
mapping PTE. Instead, I get the backtrace I already mentioned, namely:
(XEN) [<ff13603e>] put_page_from_l1e+0xd0/0x1af
(XEN) [<ff13a891>] revalidate_l1+0x159/0x168
(XEN) [...
2003 Oct 04
0
chattr +j ==> Oops
...Assertion failure in journal_revoke() at revoke.c:329:
"!(__builtin_constant_p(BH_Revoked) ?
constant_test_bit((BH_Revoked),(&bh->b_state)) :
variable_test_bit((BH_Revoked),(&bh->b_state)))"
Kernel panic: kernel BUG at revoke.c:329!
I was able to use dmesg(1) to see the prink() the laptop generated
but was unable to copy it down. It did reference journal... and
var was remounted ro, so I presume it is a similar issue.
I thought the earlier issues with data != ordered were corrected?
Do known issues remain, or is this something new?
-JimC
2007 Mar 28
2
[PATCH 2/3] User-space grant table device - main driver
A character device for accessing (in user-space) pages that have been
granted by other domains.
Signed-off-by: Derek Murray <Derek.Murray@cl.cam.ac.uk>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel