Displaying 8 results from an estimated 8 matches for "propagate_page_fault".
2008 Feb 01
4
[PATCH] x86: adjust reserved bit page fault handling
...struct cpu_user_regs *regs)
+{
+ if ( guest )
+ gdprintk(XENLOG_ERR, "reserved bit in page table entry: ");
+ else
+ dprintk(XENLOG_ERR, "reserved bit in page table entry: ");
+ show_page_walk(addr);
+ show_execution_state(regs);
+}
+
void propagate_page_fault(unsigned long addr, u16 error_code)
{
struct trap_info *ti;
@@ -852,6 +863,8 @@ void propagate_page_fault(unsigned long
v->domain->domain_id, v->vcpu_id, error_code);
show_page_walk(addr);
}
+ else if ( unlikely(error_code & PFEC_reserved_bit) )...
2013 Oct 10
10
[PATCH 0/4] x86: XSA-67 follow-up
1: correct LDT checks
2: add address validity check to guest_map_l1e()
3: use {rd,wr}{fs,gs}base when available
4: check for canonical address before doing page walks
Signed-off-by: Jan Beulich <jbeulich@suse.com>
2007 Jul 29
2
Execution Flow when Guest Page Fault
I would like to know approximately the overall execution flow when the guest O/S page fault - how is the page fault transfer to a page fault in the host O/S?
Thanks.
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2013 Sep 23
57
[PATCH RFC v13 00/20] Introduce PVH domU support
This patch series is a reworking of a series developed by Mukesh
Rathor at Oracle. The entirety of the design and development was done
by him; I have only reworked, reorganized, and simplified things in a
way that I think makes more sense. The vast majority of the credit
for this effort therefore goes to him. This version is labelled v13
because it is based on his most recent series, v11.
2005 Mar 14
4
[patch/unstable] page table cleanups
...act->pin -= (flags & GNTMAP_readonly) ?
Index: xen/include/asm/mm.h
===================================================================
--- xen.orig/include/asm/mm.h 2005-03-10 11:55:10.000000000 +0100
+++ xen/include/asm/mm.h 2005-03-12 14:39:26.000000000 +0100
@@ -340,7 +340,7 @@ void propagate_page_fault(unsigned long
* Caller must own d''s BIGLOCK, is responsible for flushing the TLB,
* and have already get_page''d */
int update_grant_va_mapping(unsigned long va,
- unsigned long val,
+ l1_pgentry_t val,...
2006 Oct 04
0
[PATCH,RFC 6/17] 32-on-64 shared info handling
...06:22.000000000 +0200
+++ 2006-10-04/xen/arch/x86/traps.c 2006-10-04 15:11:03.000000000 +0200
@@ -57,6 +57,7 @@
#include <asm/i387.h>
#include <asm/debugger.h>
#include <asm/msr.h>
+#include <asm/shared.h>
#include <asm/x86_emulate.h>
/*
@@ -688,7 +689,7 @@ void propagate_page_fault(unsigned long
struct trap_bounce *tb = &v->arch.trap_bounce;
v->arch.guest_context.ctrlreg[2] = addr;
- v->vcpu_info->arch.cr2 = addr;
+ arch_set_cr2(v, addr);
/* Re-set error_code.user flag appropriately for the guest. */
error_code &= ~...
2012 May 24
11
[PATCH 0/3] XEN: fix vmx exception mistake
This series of patches fix the mistake for debug exception(#DB), overflow
exception(#OF) and INT3(#BP), INTn instruction emulation.
Introduce new function vmx_inject_sw_exception() which deliver the software
excetion, software interrupt and privileged software exception. Split hardware
exception as a seperate function(old function vmx_inject_hw_exception()).
Also Passed down intruction length
2012 May 30
12
[PATCH v2 0/4] XEN: fix vmx exception mistake
Changes from v1:
- Define new struct hvm_trap to represent information of trap, include
instruction length.
- Renames hvm_inject_exception to hvm_inject_trap. Then define a couple of
wrappers around that function for existing callers, so that their parameter
lists actually *shrink*.
This series of patches fix the mistake for debug exception(#DB), overflow
exception(#OF) and INT3(#BP),