search for: put_page_from_l1e

Displaying 9 results from an estimated 9 matches for "put_page_from_l1e".

Did you mean: get_page_from_l1e
2007 May 14
0
[PATCH] x86: ptwr adjustments
...ge_to_mfn(page)); + pl1e = map_domain_page(mfn); pl1e = (l1_pgentry_t *)((unsigned long)pl1e + (addr & ~PAGE_MASK)); if ( do_cmpxchg ) { @@ -3285,21 +3286,21 @@ static int ptwr_emulated_update( if ( !okay ) { unmap_domain_page(pl1e); - put_page_from_l1e(gl1e_to_ml1e(d, nl1e), d); + put_page_from_l1e(nl1e, d); return X86EMUL_CMPXCHG_FAILED; } } else { ol1e = *pl1e; - if ( !UPDATE_ENTRY(l1, pl1e, ol1e, nl1e, page_to_mfn(page), v) ) + if ( !UPDATE_ENTRY(l1, pl1e, ol1e, nl1e, mfn,...
2008 Nov 04
7
[PATCH 1/1] Xen PV support for hugepages
This is the latest version of a patch that adds hugepage support to the Xen hypervisor in a PV environment. It is against the latest xen-unstable tree on xenbits.xensource.com. I believe this version addresses the comments made about the previous version of the patch. Hugepage support must be enabled via the hypervisor command line option "allowhugepage". It assumes the guest
2006 Mar 15
0
implicit grant unmap hacking [was RE: Grant tables from dom0 userspace?]
...ault(), which is one place where the pte address is available. The hack simply does a prink() when detecting a pte with the _PAGE_GNTTAB bit set. I never see the printk() when the OS squashes the mapping PTE. Instead, I get the backtrace I already mentioned, namely: (XEN) [<ff13603e>] put_page_from_l1e+0xd0/0x1af (XEN) [<ff13a891>] revalidate_l1+0x159/0x168 (XEN) [<ff13aac1>] ptwr_flush+0x221/0x32f (XEN) [<ff13b6a7>] cleanup_writable_pagetable+0x5c/0x7d (XEN) [<ff137c20>] do_mmuext_op+0x85/0x8c1 (XEN) [<ff149e0f>] hypercall+0x8f/0xaf I was hoping that...
2007 May 23
0
Apache CGI Performance Big Degration in Dom0 vs. Native
...me symbol name 71855 4.6699 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 get_page_from_l1e 71812 4.6672 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 handle_exception 58634 3.8107 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 put_page_from_l1e 56301 3.6591 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 do_update_va_mapping 49543 3.2199 vmlinux-2.6.16.46-0.10-xenpae vmlinux-2.6.16.46-0.10-xenpae _spin_lock Domain 0, Prefork: CPU: Core 2, speed 2666.75 MHz (estimated) Counted CPU_CLK_UNHALTED events (Clock cycles wh...
2007 May 23
0
Apache CGI Performance Big Degration in Dom0 vs. Native
...me symbol name 71855 4.6699 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 get_page_from_l1e 71812 4.6672 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 handle_exception 58634 3.8107 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 put_page_from_l1e 56301 3.6591 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 do_update_va_mapping 49543 3.2199 vmlinux-2.6.16.46-0.10-xenpae vmlinux-2.6.16.46-0.10-xenpae _spin_lock Domain 0, Prefork: CPU: Core 2, speed 2666.75 MHz (estimated) Counted CPU_CLK_UNHALTED events (Clock cycles wh...
2005 Mar 14
4
[patch/unstable] page table cleanups
...{ /* overwrote different mfn? */ - if (((_ol1e ^ _nl1e) & (PADDR_MASK & PAGE_MASK)) != 0) + if (((l1_pgentry_val(_ol1e) ^ l1_pgentry_val(_nl1e)) + & (PADDR_MASK & PAGE_MASK)) != 0) { rc = 0; put_page_from_l1e(ol1e, d); } else - rc = ((_ol1e & _PAGE_RW) ? GNTUPDVA_prev_rw - : GNTUPDVA_prev_ro ); + rc = ((l1_pgentry_val(_ol1e) & _PAGE_RW) + ? GNTUPDVA_prev_rw + : GNTUPDVA_prev_ro );...
2007 Sep 28
18
[makedumpfile] extract vmcoreinfo from /proc/vmcore for Xen
Hi, --- background ---------------------------------------------------- * what the makedumpfile is: To shorten the size of the dumpfile and the time of creating the dumpfile, makedumpfile copies only the necessary pages for analysis to the dumpfile from /proc/vmcore. You can specify the kind of unnecessary pages with dump_level. If you want to shorten the size further, enable the
2006 Jul 14
23
[RFC] New shadow paging code
We (Michael Fetterman, George Dunlap and I) have been working over the last while on a full replacement for Xen''s shadow pagetable support. This mail contains some design notes, below; a patch against xen-unstable, giving a snapshot of the current state of the new shadow code, is at http://www.cl.cam.ac.uk/~tjd21/shadow2.patch Comments on both are welcome, although the code is not
2007 Mar 20
62
RFC: [0/2] Remove netloop by lazy copying in netback
Hi Keir: These two patches remove the need for netloop by performing the copying in netback and only if it is necessary. The rationale is that most packets will be processed without delay allowing them to be freed without copying at all. So instead of copying every packet destined to dom0 we''ll only copy those that linger longer than a specified amount of time (currently 0.5s). As it