search for: hypercall_pag

Displaying 20 results from an estimated 193 matches for "hypercall_pag".

Did you mean: hypercall_page
2008 Oct 23
5
Why using hypercall_page ?
Hello, I am studing Xen hypercall now. I found that hypercall is invoked via hypercall_page, which is only filled with (in no-hypervisor-kernel-mode ): mov $i, %eax int $0x82 ret Why not invoked the hypercall directly by "int $0x82" ? What''s the advantage of using hypercall_page? Thanks, Wu _______________________________________________ Xen-devel mailing list Xen...
2006 Apr 13
0
RE: hypercall_page
Hypercall_page is actually a code page, which contains 32 hypercall entry. every entry is something like "mov $__HYPERVISOR_xxx,%eax int $0x82 " It is initialized in hypercall_page_initialise(void *hypercall_page) at the time when control panel creates the domain. Later, domain can simply the co...
2010 Jul 28
23
HVM hypercalls
Hi I need to use hypercalls from HVM domain (e.g. HYPERVISOR_add_to_physmap). However, it does not work when I am trying to invoke it from HVM Linux guest. Basically, I don''t see that anything happens on hypervisor''s side. I also grep''ed the guest code for ''vmmcall''/''vmcall'' and did not find anything. Is it possible to do it at all?
2013 Dec 10
5
hypercall implementation
I am learning xen's memory management recently. I find most docs is how to use the hypercall related memory management. Can somesome tell me where is the implementation of the them in the xen source. Or some docs explaining it will be ideal. 年少不惧江湖老,放歌四海任逍遥。未解前路多少事,欲与青天试比高。 _______________________________________________ Xen-users mailing list Xen-users@lists.xen.org
2009 Apr 18
2
libata-core kernel errors
...03a6cca>] evtchn_do_upcall+0x13b/0x1fb Apr 18 01:10:00 xenmaster kernel: [<ffffffff8025f8d6>] do_hypervisor_callback+0x1e/0x2c Apr 18 01:10:00 xenmaster kernel: <EOI> [<ffffffff8026df02>] monotonic_clock+0x35/0x7b Apr 18 01:10:00 xenmaster kernel: [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000 Apr 18 01:10:00 xenmaster kernel: [<ffffffff802063aa>] hypercall_page+0x3aa/0x1000 Apr 18 01:10:00 xenmaster kernel: [<ffffffff8026e4e5>] raw_safe_halt+0x84/0xa8 Apr 18 01:10:00 xenmaster kernel: [<ffffffff8026ba22>] xen_idle+0x38/0x4a Apr 18 01:10:00 xenmaster ke...
2010 Nov 01
5
[PATCH 03/10] staging: hv: Convert camel cased struct fields in hv.h to lower cases
...@@ -28,11 +28,11 @@ #include "vmbus_private.h" /* The one and only */ -struct hv_context gHvContext = { - .SynICInitialized = false, - .HypercallPage = NULL, - .SignalEventParam = NULL, - .SignalEventBuffer = NULL, +struct hv_context g_hv_context = { + .synic_initialized = false, + .hypercall_page = NULL, + .signal_event_param = NULL, + .signal_event_buffer = NULL, }; /* @@ -134,7 +134,7 @@ static u64 HvDoHypercall(u64 Control, void *Input, void *Output) u64 hvStatus = 0; u64 inputAddress = (Input) ? virt_to_phys(Input) : 0; u64 outputAddress = (Output) ? virt_to_phys(Output) : 0...
2010 Nov 01
5
[PATCH 03/10] staging: hv: Convert camel cased struct fields in hv.h to lower cases
...@@ -28,11 +28,11 @@ #include "vmbus_private.h" /* The one and only */ -struct hv_context gHvContext = { - .SynICInitialized = false, - .HypercallPage = NULL, - .SignalEventParam = NULL, - .SignalEventBuffer = NULL, +struct hv_context g_hv_context = { + .synic_initialized = false, + .hypercall_page = NULL, + .signal_event_param = NULL, + .signal_event_buffer = NULL, }; /* @@ -134,7 +134,7 @@ static u64 HvDoHypercall(u64 Control, void *Input, void *Output) u64 hvStatus = 0; u64 inputAddress = (Input) ? virt_to_phys(Input) : 0; u64 outputAddress = (Output) ? virt_to_phys(Output) : 0...
2008 Jul 31
0
xend crashing due to change in virt_kend value...??
...og when xend crashes.... xc_dom_parse_image: called xc_dom_find_loader: trying ELF-generic loader ... OK elf_parse_binary: phdr: paddr=0x0 memsz=0x1dfa4 elf_parse_binary: memory: 0x0 -> 0x1dfa4 elf_xen_parse: __xen_guest: "GUEST_OS=Mini-OS,XEN_VER=xen-3.0,VIRT_BASE=0x0,ELF_PADDR_OFFSET=0x0,HYPERCALL_PAGE=0x2,PAE=yes,LOADER=generic" elf_xen_parse_guest_info: GUEST_OS="Mini-OS" elf_xen_parse_guest_info: XEN_VER="xen-3.0" elf_xen_parse_guest_info: VIRT_BASE="0x0" elf_xen_parse_guest_info: ELF_PADDR_OFFSET="0x0" elf_xen_parse_guest_info: HYPERCALL_PAGE=&quo...
2007 Aug 19
4
[PATCH] Xen i386 xen-head.S fix sections mixup
...00 +++ linux-2.6-lttng/arch/i386/xen/xen-head.S 2007-08-19 22:46:19.000000000 -0400 @@ -13,6 +13,7 @@ ENTRY(startup_xen) cld movl $(init_thread_union+THREAD_SIZE),%esp jmp xen_start_kernel + .previous .pushsection ".bss.page_aligned" .align PAGE_SIZE_asm @@ -34,5 +35,6 @@ ENTRY(hypercall_page) ELFNOTE(Xen, XEN_ELFNOTE_PAE_MODE, .asciz "no") #endif ELFNOTE(Xen, XEN_ELFNOTE_LOADER, .asciz "generic") + .previous #endif /*CONFIG_XEN */ -- Mathieu Desnoyers Computer Engineering Ph.D. Student, Ecole Polytechnique de Montreal OpenPGP key fingerprint...
2007 Aug 19
4
[PATCH] Xen i386 xen-head.S fix sections mixup
...00 +++ linux-2.6-lttng/arch/i386/xen/xen-head.S 2007-08-19 22:46:19.000000000 -0400 @@ -13,6 +13,7 @@ ENTRY(startup_xen) cld movl $(init_thread_union+THREAD_SIZE),%esp jmp xen_start_kernel + .previous .pushsection ".bss.page_aligned" .align PAGE_SIZE_asm @@ -34,5 +35,6 @@ ENTRY(hypercall_page) ELFNOTE(Xen, XEN_ELFNOTE_PAE_MODE, .asciz "no") #endif ELFNOTE(Xen, XEN_ELFNOTE_LOADER, .asciz "generic") + .previous #endif /*CONFIG_XEN */ -- Mathieu Desnoyers Computer Engineering Ph.D. Student, Ecole Polytechnique de Montreal OpenPGP key fingerprint...
2007 Aug 19
4
[PATCH] Xen i386 xen-head.S fix sections mixup
...00 +++ linux-2.6-lttng/arch/i386/xen/xen-head.S 2007-08-19 22:46:19.000000000 -0400 @@ -13,6 +13,7 @@ ENTRY(startup_xen) cld movl $(init_thread_union+THREAD_SIZE),%esp jmp xen_start_kernel + .previous .pushsection ".bss.page_aligned" .align PAGE_SIZE_asm @@ -34,5 +35,6 @@ ENTRY(hypercall_page) ELFNOTE(Xen, XEN_ELFNOTE_PAE_MODE, .asciz "no") #endif ELFNOTE(Xen, XEN_ELFNOTE_LOADER, .asciz "generic") + .previous #endif /*CONFIG_XEN */ -- Mathieu Desnoyers Computer Engineering Ph.D. Student, Ecole Polytechnique de Montreal OpenPGP key fingerprint...
2012 Jul 03
13
[PATCH] various Xen fixes for v3.6 (v1).
I am working on some other bugs and perf issues - and while working I noticed that both sparse and Coverity have reported some issues with Xen drivers. Please see attached various bug-fixes that I am proposing for 3.6.
2012 Nov 06
1
[PATCH] xen/events: xen/events: fix RCU warning
...ier_call_chain+0x16/0x20 [ 2.514381] [<ffffffff810777c3>] exit_idle+0x43/0x50 [ 2.514441] [<ffffffff81568865>] xen_evtchn_do_upcall+0x25/0x50 [ 2.514503] [<ffffffff81aa690e>] xen_do_hypervisor_callback+0x1e/0x30 [ 2.514562] <EOI> [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000 [ 2.514662] [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000 [ 2.514722] [<ffffffff81061540>] ? xen_safe_halt+0x10/0x20 [ 2.514782] [<ffffffff81075cfa>] ? default_idle+0xba/0x570 [ 2.514841] [<ffffffff810778af>] ? cpu_idle+0xdf/0x140 [ 2.51...
2012 Nov 06
1
[PATCH] xen/events: xen/events: fix RCU warning
...ier_call_chain+0x16/0x20 [ 2.514381] [<ffffffff810777c3>] exit_idle+0x43/0x50 [ 2.514441] [<ffffffff81568865>] xen_evtchn_do_upcall+0x25/0x50 [ 2.514503] [<ffffffff81aa690e>] xen_do_hypervisor_callback+0x1e/0x30 [ 2.514562] <EOI> [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000 [ 2.514662] [<ffffffff810013aa>] ? hypercall_page+0x3aa/0x1000 [ 2.514722] [<ffffffff81061540>] ? xen_safe_halt+0x10/0x20 [ 2.514782] [<ffffffff81075cfa>] ? default_idle+0xba/0x570 [ 2.514841] [<ffffffff810778af>] ? cpu_idle+0xdf/0x140 [ 2.51...
2011 Feb 22
4
[PATCH 1/6] Staging: hv: vmbus_drv.c Replaced DPRINT with native pr_XXX
This group of patches removes all DPRINT from hv_vmbus.ko. It is divided in several patches due to size. All DPRINT calls have been removed, and where needed have been replaced with pr_XX native calls. Many debug DPRINT calls have been removed outright. The amount of clutter this driver prints has been significantly reduced. Signed-off-by: Hank Janssen <hjanssen at microsoft.com>
2011 Feb 22
4
[PATCH 1/6] Staging: hv: vmbus_drv.c Replaced DPRINT with native pr_XXX
This group of patches removes all DPRINT from hv_vmbus.ko. It is divided in several patches due to size. All DPRINT calls have been removed, and where needed have been replaced with pr_XX native calls. Many debug DPRINT calls have been removed outright. The amount of clutter this driver prints has been significantly reduced. Signed-off-by: Hank Janssen <hjanssen at microsoft.com>
2007 Apr 18
0
[PATCH 3/5] XEN: Update ELF notes to xen-head.S to the new interface
...Aug 23 15:12:48 2006 +0100 +++ b/arch/i386/paravirt-xen/xen-head.S Wed Aug 23 15:14:47 2006 +0100 @@ -2,6 +2,7 @@ place in head.S */ #include <linux/elfnote.h> +#include <xen/interface/elfnote.h> #define VIRT_ENTRY_OFFSET 0x1000 .org VIRT_ENTRY_OFFSET @@ -56,19 +57,16 @@ ENTRY(hypercall_page) .byte 0 .previous -#define XEN_INFO 0 /* name=value pair */ -#define XEN_ENTRY 1 /* entrypoint */ -#define XEN_HYPERCALL 2 /* hypercall page address (not pfn) */ - - ELFNOTE "Xen", XEN_INFO, .asciz "GUEST_OS=linux" - ELFNOTE "Xen", XEN_INFO, .asciz "GUEST...
2014 Oct 13
2
kernel crashes after soft lockups in xen domU
...s_x86_64 snd aes_generic soundcore cryptd pcspkr ext4 crc16 jbd2 mbcache dm_mod xen_netfront xen_blkfront [354008.100894] [354008.100898] Pid: 24848, comm: apache2 Not tainted 3.2.0-4-amd64 #1 Debian 3.2.60-1+deb7u3 [354008.100904] RIP: e030:[<ffffffff8100122a>] [<ffffffff8100122a>] hypercall_page+0x22a/0x1000 [354008.100914] RSP: e02b:ffff8802f0b41c00 EFLAGS: 00000246 [354008.100918] RAX: 0000000000040001 RBX: ffff8802ffff0200 RCX: ffffffff8100122a [354008.100922] RDX: ffffffffffffffc8 RSI: 0000000000000000 RDI: 0000000000000000 [354008.100927] RBP: 000000000000000e R08: 000000000000020...
2011 Sep 01
3
DOM0 Hang on a large box....
...me why :)), and an HVM guest is started with over 1.5T RAM and 128 vcpus. The system hangs without much activity after couple hours. Xen 4.0.2 and 2.6.32 based 64bit dom0. During hang I discovered: Most of dom0 vcpus are in double_lock_balance spinning on one of the locks: @ ffffffff800083aa: 0:hypercall_page+3aa pop %r11 @ ffffffff802405eb: 0:xen_spin_wait+19b test %eax, %eax @ ffffffff8035969b: 0:_spin_lock+10b test %al, %al @ ffffffff800342f5: 0:double_lock_balance+65 mov %rbx, %rdi @ ffffffff80356fc0: 0:thread_retu...
2012 Sep 18
1
Back trace from rcutree.c after resuming from S3
...gt;] do_softirq+0x41/0x7e [ 142.851566] [<ffffffff81070e66>] irq_exit+0x3f/0x9a [ 142.851573] [<ffffffff812e95c9>] xen_evtchn_do_upcall+0x2c/0x39 [ 142.851580] [<ffffffff8162f0ae>] xen_do_hypervisor_callback+0x1e/0x30 [ 142.851588] <EOI> [<ffffffff8100122a>] ? hypercall_page+0x22a/0x1000 [ 142.851601] [<ffffffff8100122a>] ? hypercall_page+0x22a/0x1000 [ 142.851609] [<ffffffff8102eee9>] ? xen_force_evtchn_callback+0xd/0xf [ 142.851618] [<ffffffff8102f552>] ? check_events+0x12/0x20 [ 142.851627] [<ffffffff8102f53f>] ? xen_restore_fl_direc...