Displaying 10 results from an estimated 10 matches for "ptwr_do_page_fault".
2007 Apr 27
1
VMASST_TYPE_writable_pagetables on translated domains?
Isn''t the writeable page table support intended only for non-translated domains?
If so, shouldn''t fixup_page_fault() check for this, or the setting of the assist bit
and the PG_translate be respectively validated? If not, aren''t there bits missing
in ptwr_do_page_fault()?
Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2006 Mar 15
0
implicit grant unmap hacking [was RE: Grant tables from dom0 userspace?]
...39;'d think it would make more sense to store the PTE
> that the grant has been bound to explicitly
Already did that.
> and hook the implicit unmap off of the pte update
> validation code in Xen.
I''m investigating your suggestion with a quick experiment. I put a hack
into ptwr_do_page_fault(), which is one place where the pte address is
available. The hack simply does a prink() when detecting a pte with the
_PAGE_GNTTAB bit set. I never see the printk() when the OS squashes the
mapping PTE. Instead, I get the backtrace I already mentioned, namely:
(XEN) [<ff13603e>] put_...
2006 Jul 26
5
[Fwd: stack overflow "cause" found]
...do_physdev_op: 328
0xffff8300001521d1 do_physdev_op: 328
0xffff8300001ab28c vmx_store_cpu_guest_regs: 312
0xffff8300001ab65a vmx_store_cpu_guest_regs: 312
0xffff830000173b36 alloc_shadow_page: 304
0xffff83000014f60d ptwr_do_page_fault: 296
0xffff83000014febb ptwr_do_page_fault: 296
0xffff83000014da12 arch_memory_op: 288
0xffff83000017de6f shadow_direct_map_fault: 288
0xffff8300001a3766 svm_dump_inst: 288
0xffff8300001ad51e vmx_io_instruction...
2008 Jun 06
4
Query regarding x86_emulate_memop() function
Hi there,
I have a question regarding the functionality of x86_emulate_memop (Xen 3.1) or x86_emulate (Xen 3.2) function. This function gets called from sh_page_fault() function which is invoked when Xen receives a page fault.
Since I am not clear completely about the emulation operation performed by Xen, I have following questions with a below mentioned scenario?
1) Suppose I have a memory
2007 May 14
0
[PATCH] x86: ptwr adjustments
...if ( !UPDATE_ENTRY(l1, pl1e, ol1e, nl1e, mfn, v) )
BUG();
}
unmap_domain_page(pl1e);
/* Finally, drop the old PTE. */
- put_page_from_l1e(gl1e_to_ml1e(d, ol1e), d);
+ put_page_from_l1e(ol1e, d);
return X86EMUL_OKAY;
}
@@ -3365,17 +3366,13 @@ int ptwr_do_page_fault(struct vcpu *v, u
LOCK_BIGLOCK(d);
- /*
- * Attempt to read the PTE that maps the VA being accessed. By checking for
- * PDE validity in the L2 we avoid many expensive fixups in __get_user().
- */
+ /* Attempt to read the PTE that maps the VA being accessed. */
guest...
2007 May 23
0
Apache CGI Performance Big Degration in Dom0 vs. Native
...f 0x00 (Unhalted core cycles) count 100000
samples % image name app name symbol name
492796 20.0510 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 do_update_va_mapping
268506 10.9251 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 ptwr_do_page_fault
81074 3.2988 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 test_all_events
72424 2.9468 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 get_page_from_l1e
66056 2.6877 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 handle_exception
61031 2.48...
2007 May 23
0
Apache CGI Performance Big Degration in Dom0 vs. Native
...f 0x00 (Unhalted core cycles) count 100000
samples % image name app name symbol name
492796 20.0510 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 do_update_va_mapping
268506 10.9251 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 ptwr_do_page_fault
81074 3.2988 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 test_all_events
72424 2.9468 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 get_page_from_l1e
66056 2.6877 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 handle_exception
61031 2.48...
2005 Sep 01
0
RE: [PATCH] Re: SMP dom0 with 8 cpus of i386
Is this PAE or non-PAE?
Please can you try forceing emulation mode by toggling the "#if 0" in
arch/x86/mm.c ptwr_do_page_fault
The other thing to try is modifying set_pte_pfn_ma to call xen_l1_update
rather than set_pte. You could try set_pte_at too.
This will help narrow down the issue.
Thanks,
Ian
> Keir, Ian,
> With PCI mmconfig option on, and with the PCI express
> enabled BIOS, the dom0 kernel reads t...
2008 Feb 01
4
[PATCH] x86: adjust reserved bit page fault handling
One could even debate whether reserved bit faults are always fatal (and
should never be propagated to the guest)...
Signed-off-by: Jan Beulich <jbeulich@novell.com>
Index: 2008-01-28/xen/arch/x86/traps.c
===================================================================
--- 2008-01-28.orig/xen/arch/x86/traps.c 2008-01-28 11:31:44.000000000 +0100
+++ 2008-01-28/xen/arch/x86/traps.c
2009 Sep 02
6
SXCE 121 Kernel Panic while installing NetBSD 5.0.1 PVM DomU
...d_op+4d1
ffff828c8024f5f8 xpv:handle_exception+45
ffff828c8024f6d8 xpv:map_pages_to_xen+471
ffff828c8024f768 xpv:get_page_from_l1e+464
ffff828c8024f7c8 xpv:ptwr_emulated_update+142
ffff828c8024f848 xpv:ptwr_emulated_cmpxchg+a9
ffff828c8024f878 xpv:x86_emulate+525f
ffff828c8024fe68 xpv:ptwr_do_page_fault+12e
ffff828c8024fed8 xpv:do_page_fault+208
ffff828c8024ff18 xpv:handle_exception+45
ffffff003e031a90 unix:hati_pte_map+123 ()
ffffff003e031b10 unix:hati_load_common+15d ()
ffffff003e031bd0 unix:hat_devload+198 ()
ffffff003e031c80 xnb:xnb_to_peer+12c ()
ffffff003e031d40 xnb:xnb_copy_to...