Displaying 9 results from an estimated 9 matches for "put_page_from_l1e".
Did you mean:
get_page_from_l1e
2007 May 14
0
[PATCH] x86: ptwr adjustments
...ge_to_mfn(page));
+ pl1e = map_domain_page(mfn);
pl1e = (l1_pgentry_t *)((unsigned long)pl1e + (addr & ~PAGE_MASK));
if ( do_cmpxchg )
{
@@ -3285,21 +3286,21 @@ static int ptwr_emulated_update(
if ( !okay )
{
unmap_domain_page(pl1e);
- put_page_from_l1e(gl1e_to_ml1e(d, nl1e), d);
+ put_page_from_l1e(nl1e, d);
return X86EMUL_CMPXCHG_FAILED;
}
}
else
{
ol1e = *pl1e;
- if ( !UPDATE_ENTRY(l1, pl1e, ol1e, nl1e, page_to_mfn(page), v) )
+ if ( !UPDATE_ENTRY(l1, pl1e, ol1e, nl1e, mfn,...
2008 Nov 04
7
[PATCH 1/1] Xen PV support for hugepages
This is the latest version of a patch that adds hugepage support to the Xen
hypervisor in a PV environment. It is against the latest xen-unstable tree
on xenbits.xensource.com. I believe this version addresses the comments
made about the previous version of the patch.
Hugepage support must be enabled via the hypervisor command line option
"allowhugepage".
It assumes the guest
2006 Mar 15
0
implicit grant unmap hacking [was RE: Grant tables from dom0 userspace?]
...ault(), which is one place where the pte address is
available. The hack simply does a prink() when detecting a pte with the
_PAGE_GNTTAB bit set. I never see the printk() when the OS squashes the
mapping PTE. Instead, I get the backtrace I already mentioned, namely:
(XEN) [<ff13603e>] put_page_from_l1e+0xd0/0x1af
(XEN) [<ff13a891>] revalidate_l1+0x159/0x168
(XEN) [<ff13aac1>] ptwr_flush+0x221/0x32f
(XEN) [<ff13b6a7>] cleanup_writable_pagetable+0x5c/0x7d
(XEN) [<ff137c20>] do_mmuext_op+0x85/0x8c1
(XEN) [<ff149e0f>] hypercall+0x8f/0xaf
I was hoping that...
2007 May 23
0
Apache CGI Performance Big Degration in Dom0 vs. Native
...me symbol name
71855 4.6699 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 get_page_from_l1e
71812 4.6672 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 handle_exception
58634 3.8107 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 put_page_from_l1e
56301 3.6591 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 do_update_va_mapping
49543 3.2199 vmlinux-2.6.16.46-0.10-xenpae vmlinux-2.6.16.46-0.10-xenpae _spin_lock
Domain 0, Prefork:
CPU: Core 2, speed 2666.75 MHz (estimated)
Counted CPU_CLK_UNHALTED events (Clock cycles wh...
2007 May 23
0
Apache CGI Performance Big Degration in Dom0 vs. Native
...me symbol name
71855 4.6699 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 get_page_from_l1e
71812 4.6672 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 handle_exception
58634 3.8107 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 put_page_from_l1e
56301 3.6591 xen-syms-pae-3.0.4_13138-0.33 xen-syms-pae-3.0.4_13138-0.33 do_update_va_mapping
49543 3.2199 vmlinux-2.6.16.46-0.10-xenpae vmlinux-2.6.16.46-0.10-xenpae _spin_lock
Domain 0, Prefork:
CPU: Core 2, speed 2666.75 MHz (estimated)
Counted CPU_CLK_UNHALTED events (Clock cycles wh...
2005 Mar 14
4
[patch/unstable] page table cleanups
...{
/* overwrote different mfn? */
- if (((_ol1e ^ _nl1e) & (PADDR_MASK & PAGE_MASK)) != 0)
+ if (((l1_pgentry_val(_ol1e) ^ l1_pgentry_val(_nl1e))
+ & (PADDR_MASK & PAGE_MASK)) != 0)
{
rc = 0;
put_page_from_l1e(ol1e, d);
}
else
- rc = ((_ol1e & _PAGE_RW) ? GNTUPDVA_prev_rw
- : GNTUPDVA_prev_ro );
+ rc = ((l1_pgentry_val(_ol1e) & _PAGE_RW)
+ ? GNTUPDVA_prev_rw
+ : GNTUPDVA_prev_ro );...
2007 Sep 28
18
[makedumpfile] extract vmcoreinfo from /proc/vmcore for Xen
Hi,
--- background ----------------------------------------------------
* what the makedumpfile is:
To shorten the size of the dumpfile and the time of creating the
dumpfile, makedumpfile copies only the necessary pages for analysis
to the dumpfile from /proc/vmcore. You can specify the kind of
unnecessary pages with dump_level. If you want to shorten the size
further, enable the
2006 Jul 14
23
[RFC] New shadow paging code
We (Michael Fetterman, George Dunlap and I) have been working over the
last while on a full replacement for Xen''s shadow pagetable support.
This mail contains some design notes, below; a patch against
xen-unstable, giving a snapshot of the current state of the new shadow
code, is at http://www.cl.cam.ac.uk/~tjd21/shadow2.patch
Comments on both are welcome, although the code is not
2007 Mar 20
62
RFC: [0/2] Remove netloop by lazy copying in netback
Hi Keir:
These two patches remove the need for netloop by performing the
copying in netback and only if it is necessary. The rationale
is that most packets will be processed without delay allowing
them to be freed without copying at all. So instead of copying
every packet destined to dom0 we''ll only copy those that linger
longer than a specified amount of time (currently 0.5s).
As it