search for: frame_table

Displaying 8 results from an estimated 8 matches for "frame_table".

2005 Dec 30
0
RE: Guest-visible phys2mach part of Xen arch-neutral API? was: Uses of &frame_table[xfn]
>From: Keir Fraser >Sent: 2005年12月30日 4:34 > >On 29 Dec 2005, at 18:51, Magenheimer, Dan (HP Labs Fort Collins) wrote: > >> So then is p==m in dom0 (and driver domains) an unacceptable design >> alternative for (non-x86) Xen architectures? If it is acceptable, >> then the question remains: > >I think *that* is the critical question here. My feeling is that
2005 Dec 29
1
RE: Guest-visible phys2mach part of Xen arch-neutral API? was: Uses of &frame_table[xfn]
> > Note that the current physical=machine in domain0 is not a > > design requirement, just the current implementation. The question > > at hand isn''t whether Xen/ia64 domain0 should be mapped > > physical=machine, > > but -- if it is not -- whether the mapping should be guest-visible. > > The mapping will need to be guest-visible to allow correct
2007 May 29
0
Fw: [RFC] makedumpfile: xen extraction
...} +/* + * for Xen extraction + */ +unsigned long long +kvtop_xen_ia64(struct DumpInfo *info, unsigned long kvaddr) +{ + unsigned long long addr, dirp, entry; + + if (!is_xen_vaddr(kvaddr)) + return 0; + + if (is_direct(kvaddr)) + return (unsigned long)kvaddr - DIRECTMAP_VIRT_START; + + if (!is_frame_table_vaddr(kvaddr)) + return 0; + + addr = kvaddr - VIRT_FRAME_TABLE_ADDR; + + dirp = SYMBOL(frametable_pg_dir) - DIRECTMAP_VIRT_START; + dirp += ((addr >> PGDIR_SHIFT) & (PTRS_PER_PGD - 1)) * sizeof(unsigned long long); + if (!readpmem(info, dirp, &entry, sizeof(entry))) + return FALSE;...
2005 Nov 29
0
[PATCH]small fix for shadow
...6d small fix for shadow Signed-off-by:Xiaofeng Ling <xiaofeng.ling@intel.com> diff -r 90d9dff47692 -r 188b619dad29 xen/arch/x86/shadow.c --- a/xen/arch/x86/shadow.c Tue Nov 29 09:44:46 2005 +0800 +++ b/xen/arch/x86/shadow.c Tue Nov 29 09:44:46 2005 +0800 @@ -1333,7 +1333,7 @@ i = (frame_table[readonly_gmfn].u.inuse.type_info & PGT_va_mask) >> PGT_va_shift; - if ( (i >= 0 && i <= L1_PAGETABLE_ENTRIES) && + if ( (i >= 0 && i < L1_PAGETABLE_ENTRIES) && !l1e_has_changed(pt[i], match, flags) &am...
2005 Mar 14
4
[patch/unstable] page table cleanups
...l2_pgentry_val(gpde) & ~PAGE_MASK) + | (sl1mfn << PAGE_SHIFT) + | _PAGE_RW | _PAGE_ACCESSED | _PAGE_DIRTY); + l2_pgentry_val(gpde) |= _PAGE_ACCESSED; /* N.B. PDEs do not have a dirty bit. */ /* Detect linear p.t. mappings and write-protect them. */ if ( (frame_table[sl1mfn].u.inuse.type_info & PGT_type_mask) == PGT_l2_page_table ) { if ( !shadow_mode_translate(d) ) - spde = gpde & ~_PAGE_RW; + spde = mk_l2_pgentry(l2_pgentry_val(gpde) & ~_PAGE_RW); } } @@ -723,39 +72...
2005 Apr 02
1
[PATCH] VMX support for MMIO/PIO in VM8086 mode
...regs) +static int mov_to_cr(int gp, int cr, struct xen_regs *regs) { unsigned long value; unsigned long old_cr; @@ -454,8 +477,21 @@ d->arch.arch_vmx.cpu_cr3, mfn); /* undo the get_page done in the para virt case */ put_page_and_type(&frame_table[old_base_mfn]); + } else { + if ((value & X86_CR0_PE) == 0) { + unsigned long eip; - } + __vmread(GUEST_EIP, &eip); + VMX_DBG_LOG(DBG_LEVEL_1, + "Disabling CR0.PE at %%eip 0x%lx", eip); + if (vm86assist(d)) { + __vm...
2012 Jan 09
39
[PATCH v4 00/25] xen: ARMv7 with virtualization extensions
Hello everyone, this is the fourth version of the patch series that introduces ARMv7 with virtualization extensions support in Xen. The series allows Xen and Dom0 to boot on a Cortex-A15 based Versatile Express simulator. See the following announce email for more informations about what we are trying to achieve, as well as the original git history: See
2011 Dec 06
57
[PATCH RFC 00/25] xen: ARMv7 with virtualization extensions
Hello everyone, this is the very first version of the patch series that introduces ARMv7 with virtualization extensions support in Xen. The series allows Xen and Dom0 to boot on a Cortex-A15 based Versatile Express simulator. See the following announce email for more informations about what we are trying to achieve, as well as the original git history: See