Displaying 20 results from an estimated 41 matches for "start_info_t".
Did you mean:
start_info
2013 May 06
6
Re: [XenARM] Question about booting parameter of Mini-OS for ARM
...i wrote:
> >> Hi all,
> >>
> >> I''m reading Mini-OS''s codes and to estimate the amount of work porting it to
> >> ARM (Ian''s GSoC idea this year).
> >>
> >> While Xen is booting Mini-OS on x86 platform, it passes the start_info_t to
> >> the guest through ESI register. And Mini-OS would use this structure as the
> >> argument of start_kernel. However, I didn''t see codes handle the
> >> start_info_t on ARM side. Instead, I see a more standard protocal when
> >> booting ARM'...
2005 May 31
0
[PATCH] Store page and evtchn in start_info_t
Hi all,
This is a trivial patch which adds the two fields to start_info_t for
the shared page and event channel port for the share. Feel free to
destroy this in any way. The python binding just fills zeros in for the
moment, making it harmless.
Mike Wray has a nicer version in his tree, but this is the minimal
version. (Thanks to Mike for the .esp fix, too).
Cheers,...
2006 Oct 27
0
[PATCH]mini-os: handle start_info_t pointer
Hi Gregor,
on ia64 the start_info_t pointer is stored within shared_info_t structure.
So it makes sense to initialize the pointer within arch_init(), which is
different from x86.
With this patch the &si is given to arch_init().
Please have a look!
Thanks.
Dietmar.
_______________________________________________
Xen-devel maili...
2012 Nov 28
4
[minios] Add xenbus shutdown control support
...eason = SHUTDOWN_reboot;
+ else
+ /* Unknown */
+ shutdown_reason = SHUTDOWN_crash;
+ wmb();
+ do_shutdown = 1;
+ wmb();
+ wake_up(&shutdown_queue);
+}
+
+
/* This should be overridden by the application we are linked against. */
__attribute__((weak)) int app_main(start_info_t *si)
{
@@ -126,6 +160,8 @@
/* Init XenBus */
init_xenbus();
+ create_thread("shutdown", shutdown_thread, NULL);
+
/* Call (possibly overridden) app_main() */
app_main(&start_info);
diff -r fdf241ea6ff4 extras/mini-os/test.c
--- a/extras/mini-os/test.c Wed N...
2013 Oct 28
5
FreeBSD PVH guest support
...the loader gives for rflags. */
+ pushq $PSL_KERNEL
+ popfq
+
+ /* Parameters for the xen init function */
+ movq %rsi, %rdi /* shared_info (arg 1) */
+ movq %rsp, %rsi /* xenstack (arg 2) */
+
+ /* Use our own stack */
+ movq $bootstack,%rsp
+ xorl %ebp, %ebp
+
+ /* u_int64_t hammer_time_xen(start_info_t *si, u_int64_t xenstack); */
+ call hammer_time_xen
+ movq %rax, %rsp /* set up kstack for mi_startup() */
+ call mi_startup /* autoconfiguration, mountroot etc */
+
+ /* NOTREACHED */
+0: hlt
+ jmp 0b
+#endif
diff --git a/sys/amd64/amd64/machdep.c b/sys/amd64/amd64/machdep.c
index 2b2e47f..b649...
2013 Jul 18
15
[PATCH v5 0/5] xen: public interface and foreign struct check changes for arm
I last posted this back in April to critical acclaim (AKA near total
silence).
I''m not sure who looks after tools/include/xen-foreign. I had thought it
was Jan but I think I was confused and was thinking of the semi-related
xen/include/compat stuff. IOW I think nobody felt "responsible".
Unless there''s any objection lets just treat this as coming under tools.
The
2006 Dec 01
0
[PATCH 3/10] Add support for netfront/netback acceleration drivers
...not 4MB aligned then the address is
rounded down.
+ * 4. This the order of bootstrap elements in the initial virtual
region:
+ * a. relocated kernel image
+ * b. initial ram disk [mod_start, mod_len]
+ * c. list of allocated page frames [mfn_list, nr_pages]
+ * d. start_info_t structure [register ESI (x86)]
+ * e. bootstrap page tables [pt_base, CR3 (x86)]
+ * f. bootstrap stack [register ESP (x86)]
+ * 5. Bootstrap elements are packed together, but each is 4kB-aligned.
+ * 6. The initial ram disk may be omitted.
+ * 7. The list...
2012 Nov 26
13
[PATCH 0 of 4] Minios improvements for app development
This patch series contains a set of patches making minios rather easier
to use, from an application development point of view.
Overview of patches:
1 Command line argument parsing support, from Xen.
2 Weak console handler function.
3 Build system tweaks for application directories.
4 Trailing whitespace cleanup. (because it is very messy)
Patch 4 is likely to be more controversial than
2005 Aug 30
4
Re: [Xen-changelog] New console transport and update xenconsoled.
.../* MACHINE page number of shared page. */
>+ u16 store_evtchn; /* Event channel for store communication. */
>+ unsigned long console_mfn; /* MACHINE address of console page. */
>+ u16 console_evtchn; /* Event channel for console messages. */
> } start_info_t;
>
> /* These flags are passed in the ''flags'' field of start_info_t. */
>diff -r e69cbfee4011 -r 8fe8a99b1c2a linux-2.6-xen-sparse/drivers/xen/console/xencons_ring.c
>--- /dev/null Tue Aug 30 08:47:51 2005
>+++ b/linux-2.6-xen-sparse/drivers/xen/console/xencons_rin...
2012 Jan 25
26
[PATCH v4 00/23] Xenstore stub domain
Changes from v3:
- mini-os configuration files moved into stubdom/
- mini-os extra console support now a config option
- Fewer #ifdefs
- grant table setup uses hypercall bounce
- Xenstore stub domain syslog support re-enabled
Changes from v2:
- configuration support added to mini-os build system
- add mini-os support for conditionally compiling frontends, xenbus
-
2006 Oct 04
0
[PATCH,RFC 6/17] 32-on-64 shared info handling
...============================================================
--- 2006-10-04.orig/xen/arch/x86/setup.c 2006-10-04 15:10:46.000000000 +0200
+++ 2006-10-04/xen/arch/x86/setup.c 2006-10-04 15:11:03.000000000 +0200
@@ -437,14 +437,13 @@ void __init __start_xen(multiboot_info_t
BUILD_BUG_ON(sizeof(start_info_t) > PAGE_SIZE);
BUILD_BUG_ON(sizeof(shared_info_t) > PAGE_SIZE);
- BUILD_BUG_ON(sizeof(vcpu_info_t) != 64);
+ BUILD_BUG_ON(sizeof(struct vcpu_info) != 64);
#ifdef CONFIG_COMPAT
BUILD_BUG_ON(sizeof(((struct compat_platform_op *)0)->u) !=
sizeof(((struct c...
2007 Apr 18
20
[patch 00/20] XEN-paravirt: Xen guest implementation for paravirt_ops interface
This patch series implements the Linux Xen guest in terms of the
paravirt-ops interface. The features in implemented this patch series
are:
* domU only
* UP only (most code is SMP-safe, but there's no way to create a new vcpu)
* writable pagetables, with late pinning/early unpinning
(no shadow pagetable support)
* supports both PAE and non-PAE modes
* xen console
* virtual block
2007 Apr 18
20
[patch 00/20] XEN-paravirt: Xen guest implementation for paravirt_ops interface
This patch series implements the Linux Xen guest in terms of the
paravirt-ops interface. The features in implemented this patch series
are:
* domU only
* UP only (most code is SMP-safe, but there's no way to create a new vcpu)
* writable pagetables, with late pinning/early unpinning
(no shadow pagetable support)
* supports both PAE and non-PAE modes
* xen console
* virtual block
2007 Apr 18
20
[patch 00/20] XEN-paravirt: Xen guest implementation for paravirt_ops interface
This patch series implements the Linux Xen guest in terms of the
paravirt-ops interface. The features in implemented this patch series
are:
* domU only
* UP only (most code is SMP-safe, but there's no way to create a new vcpu)
* writable pagetables, with late pinning/early unpinning
(no shadow pagetable support)
* supports both PAE and non-PAE modes
* xen console
* virtual block
2007 Apr 18
24
[patch 00/24] Xen-paravirt_ops: Xen guest implementation for paravirt_ops interface
Hi Andi,
This patch series implements the Linux Xen guest as a paravirt_ops
backend. The features in implemented this patch series are:
* domU only
* UP only (most code is SMP-safe, but there's no way to create a new vcpu)
* writable pagetables, with late pinning/early unpinning
(no shadow pagetable support)
* supports both PAE and non-PAE modes
* xen hvc console (console=hvc0)
*
2007 Apr 18
24
[patch 00/24] Xen-paravirt_ops: Xen guest implementation for paravirt_ops interface
Hi Andi,
This patch series implements the Linux Xen guest as a paravirt_ops
backend. The features in implemented this patch series are:
* domU only
* UP only (most code is SMP-safe, but there's no way to create a new vcpu)
* writable pagetables, with late pinning/early unpinning
(no shadow pagetable support)
* supports both PAE and non-PAE modes
* xen hvc console (console=hvc0)
*
2007 Apr 18
24
[patch 00/24] Xen-paravirt_ops: Xen guest implementation for paravirt_ops interface
Hi Andi,
This patch series implements the Linux Xen guest as a paravirt_ops
backend. The features in implemented this patch series are:
* domU only
* UP only (most code is SMP-safe, but there's no way to create a new vcpu)
* writable pagetables, with late pinning/early unpinning
(no shadow pagetable support)
* supports both PAE and non-PAE modes
* xen hvc console (console=hvc0)
*
2007 Apr 18
25
[patch 00/21] Xen-paravirt: Xen guest implementation for paravirt_ops interface
Hi Andi,
This patch series implements the Linux Xen guest in terms of the
paravirt-ops interface. The features in implemented this patch series
are:
* domU only
* UP only (most code is SMP-safe, but there's no way to create a new vcpu)
* writable pagetables, with late pinning/early unpinning
(no shadow pagetable support)
* supports both PAE and non-PAE modes
* xen console
* virtual
2007 Apr 18
25
[patch 00/21] Xen-paravirt: Xen guest implementation for paravirt_ops interface
Hi Andi,
This patch series implements the Linux Xen guest in terms of the
paravirt-ops interface. The features in implemented this patch series
are:
* domU only
* UP only (most code is SMP-safe, but there's no way to create a new vcpu)
* writable pagetables, with late pinning/early unpinning
(no shadow pagetable support)
* supports both PAE and non-PAE modes
* xen console
* virtual
2007 Apr 18
25
[patch 00/21] Xen-paravirt: Xen guest implementation for paravirt_ops interface
Hi Andi,
This patch series implements the Linux Xen guest in terms of the
paravirt-ops interface. The features in implemented this patch series
are:
* domU only
* UP only (most code is SMP-safe, but there's no way to create a new vcpu)
* writable pagetables, with late pinning/early unpinning
(no shadow pagetable support)
* supports both PAE and non-PAE modes
* xen console
* virtual