search for: ptwr_do_page_fault

Displaying 10 results from an estimated 10 matches for "ptwr_do_page_fault".

2007 Apr 27
1
VMASST_TYPE_writable_pagetables on translated domains?
Isn''t the writeable page table support intended only for non-translated domains? If so, shouldn''t fixup_page_fault() check for this, or the setting of the assist bit and the PG_translate be respectively validated? If not, aren''t there bits missing in ptwr_do_page_fault()? Jan _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2006 Mar 15
0
implicit grant unmap hacking [was RE: Grant tables from dom0 userspace?]
...39;'d think it would make more sense to store the PTE > that the grant has been bound to explicitly Already did that. > and hook the implicit unmap off of the pte update > validation code in Xen. I''m investigating your suggestion with a quick experiment. I put a hack into ptwr_do_page_fault(), which is one place where the pte address is available. The hack simply does a prink() when detecting a pte with the _PAGE_GNTTAB bit set. I never see the printk() when the OS squashes the mapping PTE. Instead, I get the backtrace I already mentioned, namely: (XEN) [<ff13603e>] put_...
2006 Jul 26
5
[Fwd: stack overflow "cause" found]
...do_physdev_op: 328 0xffff8300001521d1 do_physdev_op: 328 0xffff8300001ab28c vmx_store_cpu_guest_regs: 312 0xffff8300001ab65a vmx_store_cpu_guest_regs: 312 0xffff830000173b36 alloc_shadow_page: 304 0xffff83000014f60d ptwr_do_page_fault: 296 0xffff83000014febb ptwr_do_page_fault: 296 0xffff83000014da12 arch_memory_op: 288 0xffff83000017de6f shadow_direct_map_fault: 288 0xffff8300001a3766 svm_dump_inst: 288 0xffff8300001ad51e vmx_io_instruction...
2008 Jun 06
4
Query regarding x86_emulate_memop() function
Hi there, I have a question regarding the functionality of x86_emulate_memop (Xen 3.1) or x86_emulate (Xen 3.2) function. This function gets called from sh_page_fault() function which is invoked when Xen receives a page fault. Since I am not clear completely about the emulation operation performed by Xen, I have following questions with a below mentioned scenario? 1) Suppose I have a memory
2007 May 14
0
[PATCH] x86: ptwr adjustments
...if ( !UPDATE_ENTRY(l1, pl1e, ol1e, nl1e, mfn, v) ) BUG(); } unmap_domain_page(pl1e); /* Finally, drop the old PTE. */ - put_page_from_l1e(gl1e_to_ml1e(d, ol1e), d); + put_page_from_l1e(ol1e, d); return X86EMUL_OKAY; } @@ -3365,17 +3366,13 @@ int ptwr_do_page_fault(struct vcpu *v, u LOCK_BIGLOCK(d); - /* - * Attempt to read the PTE that maps the VA being accessed. By checking for - * PDE validity in the L2 we avoid many expensive fixups in __get_user(). - */ + /* Attempt to read the PTE that maps the VA being accessed. */ guest...
2007 May 23
0
Apache CGI Performance Big Degration in Dom0 vs. Native
...f 0x00 (Unhalted core cycles) count 100000 samples % image name app name symbol name 492796 20.0510 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 do_update_va_mapping 268506 10.9251 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 ptwr_do_page_fault 81074 3.2988 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 test_all_events 72424 2.9468 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 get_page_from_l1e 66056 2.6877 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 handle_exception 61031 2.48...
2007 May 23
0
Apache CGI Performance Big Degration in Dom0 vs. Native
...f 0x00 (Unhalted core cycles) count 100000 samples % image name app name symbol name 492796 20.0510 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 do_update_va_mapping 268506 10.9251 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 ptwr_do_page_fault 81074 3.2988 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 test_all_events 72424 2.9468 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 get_page_from_l1e 66056 2.6877 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 handle_exception 61031 2.48...
2005 Sep 01
0
RE: [PATCH] Re: SMP dom0 with 8 cpus of i386
Is this PAE or non-PAE? Please can you try forceing emulation mode by toggling the "#if 0" in arch/x86/mm.c ptwr_do_page_fault The other thing to try is modifying set_pte_pfn_ma to call xen_l1_update rather than set_pte. You could try set_pte_at too. This will help narrow down the issue. Thanks, Ian > Keir, Ian, > With PCI mmconfig option on, and with the PCI express > enabled BIOS, the dom0 kernel reads t...
2008 Feb 01
4
[PATCH] x86: adjust reserved bit page fault handling
One could even debate whether reserved bit faults are always fatal (and should never be propagated to the guest)... Signed-off-by: Jan Beulich <jbeulich@novell.com> Index: 2008-01-28/xen/arch/x86/traps.c =================================================================== --- 2008-01-28.orig/xen/arch/x86/traps.c 2008-01-28 11:31:44.000000000 +0100 +++ 2008-01-28/xen/arch/x86/traps.c
2009 Sep 02
6
SXCE 121 Kernel Panic while installing NetBSD 5.0.1 PVM DomU
...d_op+4d1 ffff828c8024f5f8 xpv:handle_exception+45 ffff828c8024f6d8 xpv:map_pages_to_xen+471 ffff828c8024f768 xpv:get_page_from_l1e+464 ffff828c8024f7c8 xpv:ptwr_emulated_update+142 ffff828c8024f848 xpv:ptwr_emulated_cmpxchg+a9 ffff828c8024f878 xpv:x86_emulate+525f ffff828c8024fe68 xpv:ptwr_do_page_fault+12e ffff828c8024fed8 xpv:do_page_fault+208 ffff828c8024ff18 xpv:handle_exception+45 ffffff003e031a90 unix:hati_pte_map+123 () ffffff003e031b10 unix:hati_load_common+15d () ffffff003e031bd0 unix:hat_devload+198 () ffffff003e031c80 xnb:xnb_to_peer+12c () ffffff003e031d40 xnb:xnb_copy_to...