|
|
|
|
|
|
|
|
|
|
xen-changelog
[Xen-changelog] [xen-4.0-testing] xentrace: restrict trace buffer MFNs
# HG changeset patch
# User Keir Fraser <keir.fraser@xxxxxxxxxx>
# Date 1277918411 -3600
# Node ID 4004f12e5135eec1e77c1f1e67bf70753e729863
# Parent 927dea73c8b2fe5086ab08f9f0f3252af71c88d1
xentrace: restrict trace buffer MFNs
Since they're being passed to Dom0 using an array of uint32_t, they
must be representable as 32-bit quantities, and hence the buffer
allocation must specify an upper address boundary.
Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx>
Acked-by: George Dunlap <george.dunlap@xxxxxxxxxxxxx>
xen-unstable changeset: 21682:7e46fdbe8a11
xen-unstable date: Mon Jun 28 16:27:56 2010 +0100
---
xen/common/trace.c | 3 ++-
1 files changed, 2 insertions(+), 1 deletion(-)
diff -r 927dea73c8b2 -r 4004f12e5135 xen/common/trace.c
--- a/xen/common/trace.c Wed Jun 30 18:19:35 2010 +0100
+++ b/xen/common/trace.c Wed Jun 30 18:20:11 2010 +0100
@@ -129,7 +129,8 @@ static int alloc_trace_bufs(void)
char *rawbuf;
struct t_buf *buf;
- if ( (rawbuf = alloc_xenheap_pages(order, 0)) == NULL )
+ if ( (rawbuf = alloc_xenheap_pages(
+ order, MEMF_bits(32 + PAGE_SHIFT))) == NULL )
{
printk("Xen trace buffers: memory allocation failed\n");
opt_tbuf_size = 0;
_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog
|
<Prev in Thread] |
Current Thread |
[Next in Thread> |
- [Xen-changelog] [xen-4.0-testing] xentrace: restrict trace buffer MFNs,
Xen patchbot-4.0-testing <=
|
|
|
|
|