Displaying 11 results from an estimated 11 matches for "hypercall_t".
Did you mean:
hypercall
2006 Mar 14
7
[PATCH] ia64 build fixes
Keir,
The patch below is necessary to get ia64 building on current
xen-unstable.hg. Thanks,
Alex
Signed-off-by: Alex Williamson <alex.williamson@hp.com>
---
diff -r 3983e4f1b054 xen/arch/ia64/Rules.mk
--- a/xen/arch/ia64/Rules.mk Sun Mar 12 10:03:33 2006 +0100
+++ b/xen/arch/ia64/Rules.mk Mon Mar 13 09:36:01 2006 -0700
@@ -12,7 +12,7 @@ CPPFLAGS += -I$(BASEDIR)/include -I$(BA
2008 Mar 18
7
A question related with symbol reference?
...en_version" is:
DO(xen_version) (int cmd, XEN_GUEST_HANDLE(void) arg)
{
....
}
according to the " #define DO(fn) long do_##fn ", the expanded form is "do_xen_version (...)".
then, in the "xen-3.1.0-src\xen\arch\x86\x86_32\entry.S", there is an item in the "hypercall_table", like this:
ENTRY(hypercall_table)
....
.long do_xen_version
....
as we all known, for a symbol reference of function there need to be a header file contained, or a "global" declaration.
By searching the header files, i found the file, "xen-3.1.0-src\xen\include\xen\hyp...
2005 Sep 05
2
[PATCH][1/6] add a hypercall number for virtual device in unmodified guest
...arch/x86/x86_32/entry.S Fri Sep 2 22:46:13 2005
@@ -812,6 +812,7 @@
.long do_ni_hypercall /* 25 */
.long do_mmuext_op
.long do_acm_op /* 27 */
+ .long do_virtual_device_op /* virutal device op for VMX */
.rept NR_hypercalls-((.-hypercall_table)/4)
.long do_ni_hypercall
.endr
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2008 Mar 07
6
where is the location of definition of "do_xen_version"?
...n/arch/x86/x86_64/entry.S: .byte 2 /* do_xen_version */
Binary file ./xen/arch/x86/built_in.o matches
Binary file ./xen/arch/x86/hvm/hvm.o matches
Binary file ./xen/arch/x86/hvm/built_in.o matches
./xen/arch/ia64/linux-xen/entry.S: data8 do_xen_version
./xen/arch/powerpc/powerpc64/hypercall_table.S: .quad do_xen_version
Binary file ./dist/install/boot/xen-syms-3.1.0 matches
./tools/libxc/xc_private.c: rc = do_xen_version(xc_handle, cmd, arg);
./tools/libxc/xc_private.h:static inline int do_xen_version(int xc_handle, int cmd, void *dest)
but the "do_xen_version" is n...
2012 Sep 04
2
[PATCH] valgrind: Support for ioctls used by Xen toolstack processes.
...[const] = { { vgSysWrap_xen_##name##_before, NULL }, nr_args }
+#define HYPXY(const, name, nr_args) \
+ [const] = { { vgSysWrap_xen_##name##_before, \
+ vgSysWrap_xen_##name##_after }, \
+ nr_args }
+
+static XenHypercallTableEntry hypercall_table[] = {
+ // __HYPERVISOR_set_trap_table // 0
+ // __HYPERVISOR_mmu_update // 1
+ // __HYPERVISOR_set_gdt // 2
+ // __HYPERVISOR_stack_switch...
2006 Apr 13
0
RE: hypercall_page
...ypercall_page) at the time when control panel creates the domain. Later, domain can simply the corresponding entry to issue a hypercall.
For the subroutine of the HYPERVISOR_xxx, usually it is do_xxx. For example, __HYPERVISOR_sched_op should be do_sched_op. For more information, please refer to hypercall_table in xen/arch/x86/x86_{32,64}/entry.S.
Thanks
Ke
T S wrote:
> Hi,
>
> Can someone let me know what exactly the array "hypercall_page "
> contains? Are they function pointers?
>
> How do I know which functions are going to be called when a
> HYPERVISOR_xxx is cal...
2012 Feb 13
0
[PATCH 05/14] arm: implement exception and hypercall entries.
...p15, 0, r11, c3, c0, 0
+
+ cpsid i
+
+ add r8, r8, #8
+ ldmia r8, {r13, r14}^
+ ldmia sp, {r0-r12}
+ ldr sp, [sp, #CTXT_SSP]
+ msr spsr, #PSR_MODE_USR
+ movs pc, lr
+
+invoke_hypercall:
+ ldr r12, [lr, #-4]
+ bic r12, r12, #0xff000000
+
+ adr r14, 1f
+ adr r11, hypercall_table
+ ldr pc, [r11, r12, lsl #2]
+
+1:
+ str r0, [sp, #CTXT_R0]
+
+ b return_to_guest
+
+ENTRY(return_to_guest)
+ cpsie i
+ bl do_softirq
+
+ cci r8
+ ldr r10, [r8, #OFFSET_VCPU]
+
+ ldr r11, [r10, #OFFSET_VCPU_INFO]
+ ldr r9, [r11, #(OFFSET_ARCH_VCPU_INFO + OFFSET_TCPSR)]
+
+ tst r9, #VPS...
2007 Mar 27
0
[PATCH] make all performance counter per-cpu
...07-03-19.orig/xen/arch/x86/x86_64/compat/entry.S 2007-03-19 13:23:52.000000000 +0100
+++ 2007-03-19/xen/arch/x86/x86_64/compat/entry.S 2007-03-27 12:12:29.000000000 +0200
@@ -57,7 +57,7 @@ ENTRY(compat_hypercall)
movl UREGS_rbx(%rsp),%edi /* Arg 1 */
#endif
leaq compat_hypercall_table(%rip),%r10
- PERFC_INCR(PERFC_hypercalls, %rax)
+ PERFC_INCR(PERFC_hypercalls, %rax, %rbx)
callq *(%r10,%rax,8)
#ifndef NDEBUG
/* Deliberately corrupt parameter regs used by this hypercall. */
Index: 2007-03-19/xen/arch/x86/x86_64/entry.S
=======================...
2017 May 04
4
Xen package security updates for jessie 4.4, XSA-213, XSA-214
...,30 +1243,31 @@ static bool_t check_multicall_32bit_clea
+ return true;
+ }
+
+-void do_multicall_call(struct multicall_entry *multi)
++enum mc_disposition do_multicall_call(struct multicall_entry *multi)
+ {
+ arm_hypercall_fn_t call = NULL;
+
+ if ( multi->op >= ARRAY_SIZE(arm_hypercall_table) )
+ {
+ multi->result = -ENOSYS;
+- return;
++ return mc_continue;
+ }
+
+ call = arm_hypercall_table[multi->op].fn;
+ if ( call == NULL )
+ {
+ multi->result = -ENOSYS;
+- return;
++ return mc_continue;
+ }
+
+...
2017 May 04
3
Bug#861660: Xen package security updates for jessie 4.4, XSA-213, XSA-214
Moritz Muehlenhoff writes ("Re: Xen package security updates for jessie 4.4, XSA-213, XSA-214"):
> On Thu, May 04, 2017 at 05:06:07PM +0100, Ian Jackson wrote:
> > I have fixed these in stretch but the jessie package remains unfixed.
> > I think I may be able to find some backports somewhere. Would that be
> > useful ? Is anyone else working on this ?
>
>
2007 Feb 20
9
[PATCH 0/8] Domain Groups: Introduction
...xend/XendError.py | 4
tools/python/xen/xend/server/XMLRPCServer.py | 34 ++
tools/python/xen/xm/create.py | 8
tools/python/xen/xm/main.py | 161 +++++++++++
xen/arch/ia64/xen/xensetup.c | 7
xen/arch/powerpc/powerpc64/hypercall_table.S | 1
xen/arch/powerpc/setup.c | 7
xen/arch/x86/setup.c | 7
xen/arch/x86/x86_32/entry.S | 2
xen/arch/x86/x86_64/entry.S | 2
xen/common/Makefile | 2
xen/comm...