search for: hypercall_table

Displaying 11 results from an estimated 11 matches for "hypercall_table".

2006 Mar 14
7
[PATCH] ia64 build fixes
Keir, The patch below is necessary to get ia64 building on current xen-unstable.hg. Thanks, Alex Signed-off-by: Alex Williamson <alex.williamson@hp.com> --- diff -r 3983e4f1b054 xen/arch/ia64/Rules.mk --- a/xen/arch/ia64/Rules.mk Sun Mar 12 10:03:33 2006 +0100 +++ b/xen/arch/ia64/Rules.mk Mon Mar 13 09:36:01 2006 -0700 @@ -12,7 +12,7 @@ CPPFLAGS += -I$(BASEDIR)/include -I$(BA
2008 Mar 18
7
A question related with symbol reference?
...en_version" is: DO(xen_version) (int cmd, XEN_GUEST_HANDLE(void) arg) { .... } according to the " #define DO(fn) long do_##fn ", the expanded form is "do_xen_version (...)". then, in the "xen-3.1.0-src\xen\arch\x86\x86_32\entry.S", there is an item in the "hypercall_table", like this: ENTRY(hypercall_table) .... .long do_xen_version .... as we all known, for a symbol reference of function there need to be a header file contained, or a "global" declaration. By searching the header files, i found the file, "xen-3.1.0-src\xen\include\xen\hyperca...
2005 Sep 05
2
[PATCH][1/6] add a hypercall number for virtual device in unmodified guest
...arch/x86/x86_32/entry.S Fri Sep 2 22:46:13 2005 @@ -812,6 +812,7 @@ .long do_ni_hypercall /* 25 */ .long do_mmuext_op .long do_acm_op /* 27 */ + .long do_virtual_device_op /* virutal device op for VMX */ .rept NR_hypercalls-((.-hypercall_table)/4) .long do_ni_hypercall .endr _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2008 Mar 07
6
where is the location of definition of "do_xen_version"?
...n/arch/x86/x86_64/entry.S: .byte 2 /* do_xen_version */ Binary file ./xen/arch/x86/built_in.o matches Binary file ./xen/arch/x86/hvm/hvm.o matches Binary file ./xen/arch/x86/hvm/built_in.o matches ./xen/arch/ia64/linux-xen/entry.S: data8 do_xen_version ./xen/arch/powerpc/powerpc64/hypercall_table.S: .quad do_xen_version Binary file ./dist/install/boot/xen-syms-3.1.0 matches ./tools/libxc/xc_private.c: rc = do_xen_version(xc_handle, cmd, arg); ./tools/libxc/xc_private.h:static inline int do_xen_version(int xc_handle, int cmd, void *dest) but the "do_xen_version" is not i...
2012 Sep 04
2
[PATCH] valgrind: Support for ioctls used by Xen toolstack processes.
...[const] = { { vgSysWrap_xen_##name##_before, NULL }, nr_args } +#define HYPXY(const, name, nr_args) \ + [const] = { { vgSysWrap_xen_##name##_before, \ + vgSysWrap_xen_##name##_after }, \ + nr_args } + +static XenHypercallTableEntry hypercall_table[] = { + // __HYPERVISOR_set_trap_table // 0 + // __HYPERVISOR_mmu_update // 1 + // __HYPERVISOR_set_gdt // 2 + // __HYPERVISOR_stack_switch...
2006 Apr 13
0
RE: hypercall_page
...ypercall_page) at the time when control panel creates the domain. Later, domain can simply the corresponding entry to issue a hypercall. For the subroutine of the HYPERVISOR_xxx, usually it is do_xxx. For example, __HYPERVISOR_sched_op should be do_sched_op. For more information, please refer to hypercall_table in xen/arch/x86/x86_{32,64}/entry.S. Thanks Ke T S wrote: > Hi, > > Can someone let me know what exactly the array "hypercall_page " > contains? Are they function pointers? > > How do I know which functions are going to be called when a > HYPERVISOR_xxx is called?...
2012 Feb 13
0
[PATCH 05/14] arm: implement exception and hypercall entries.
...p15, 0, r11, c3, c0, 0 + + cpsid i + + add r8, r8, #8 + ldmia r8, {r13, r14}^ + ldmia sp, {r0-r12} + ldr sp, [sp, #CTXT_SSP] + msr spsr, #PSR_MODE_USR + movs pc, lr + +invoke_hypercall: + ldr r12, [lr, #-4] + bic r12, r12, #0xff000000 + + adr r14, 1f + adr r11, hypercall_table + ldr pc, [r11, r12, lsl #2] + +1: + str r0, [sp, #CTXT_R0] + + b return_to_guest + +ENTRY(return_to_guest) + cpsie i + bl do_softirq + + cci r8 + ldr r10, [r8, #OFFSET_VCPU] + + ldr r11, [r10, #OFFSET_VCPU_INFO] + ldr r9, [r11, #(OFFSET_ARCH_VCPU_INFO + OFFSET_TCPSR)] + + tst r9, #VPSR_I_...
2007 Mar 27
0
[PATCH] make all performance counter per-cpu
...07-03-19.orig/xen/arch/x86/x86_64/compat/entry.S 2007-03-19 13:23:52.000000000 +0100 +++ 2007-03-19/xen/arch/x86/x86_64/compat/entry.S 2007-03-27 12:12:29.000000000 +0200 @@ -57,7 +57,7 @@ ENTRY(compat_hypercall) movl UREGS_rbx(%rsp),%edi /* Arg 1 */ #endif leaq compat_hypercall_table(%rip),%r10 - PERFC_INCR(PERFC_hypercalls, %rax) + PERFC_INCR(PERFC_hypercalls, %rax, %rbx) callq *(%r10,%rax,8) #ifndef NDEBUG /* Deliberately corrupt parameter regs used by this hypercall. */ Index: 2007-03-19/xen/arch/x86/x86_64/entry.S ===========================...
2017 May 04
4
Xen package security updates for jessie 4.4, XSA-213, XSA-214
...,30 +1243,31 @@ static bool_t check_multicall_32bit_clea + return true; + } + +-void do_multicall_call(struct multicall_entry *multi) ++enum mc_disposition do_multicall_call(struct multicall_entry *multi) + { + arm_hypercall_fn_t call = NULL; + + if ( multi->op >= ARRAY_SIZE(arm_hypercall_table) ) + { + multi->result = -ENOSYS; +- return; ++ return mc_continue; + } + + call = arm_hypercall_table[multi->op].fn; + if ( call == NULL ) + { + multi->result = -ENOSYS; +- return; ++ return mc_continue; + } + + if...
2017 May 04
3
Bug#861660: Xen package security updates for jessie 4.4, XSA-213, XSA-214
Moritz Muehlenhoff writes ("Re: Xen package security updates for jessie 4.4, XSA-213, XSA-214"): > On Thu, May 04, 2017 at 05:06:07PM +0100, Ian Jackson wrote: > > I have fixed these in stretch but the jessie package remains unfixed. > > I think I may be able to find some backports somewhere. Would that be > > useful ? Is anyone else working on this ? > >
2007 Feb 20
9
[PATCH 0/8] Domain Groups: Introduction
...xend/XendError.py | 4 tools/python/xen/xend/server/XMLRPCServer.py | 34 ++ tools/python/xen/xm/create.py | 8 tools/python/xen/xm/main.py | 161 +++++++++++ xen/arch/ia64/xen/xensetup.c | 7 xen/arch/powerpc/powerpc64/hypercall_table.S | 1 xen/arch/powerpc/setup.c | 7 xen/arch/x86/setup.c | 7 xen/arch/x86/x86_32/entry.S | 2 xen/arch/x86/x86_64/entry.S | 2 xen/common/Makefile | 2 xen/common/d...