search for: unshadow

Displaying 16 results from an estimated 16 matches for "unshadow".

2007 Dec 05
13
[PATCH] unshadow the page table page which are used as data page
...age table pages as data pages and write data to them. The pages will still be grabbed by Xen as page table pages, and lots of unnecessary page faults occur. The patch will check if the data guest writes to the page table contains valid mfn or not, if not, we believe it is a data page now and then unshadow the page. The patch improves the VT-D NIC performance a lot. Signed-off-by: Xin Xiaohui <xiaohui.xin@intel.com> _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2005 Dec 08
0
[PATCH]Don''t unshadow current used shadow L2 table.
# HG changeset patch # User Xiaofeng Ling <xiaofeng.ling@intel.com> # Node ID cc6e19224d0b755d24358cd15d1a40f894d320b4 # Parent b215584242c43415eccd008b90c812f3d04b398d Don''t unshadow when the shadow l2 is the current used shadow table. Otherwise, when destorying the domain, if the current sl2 is unpinned, the shadow page will be freed without accquire the shadow_lock. This may also improve the performance due to avoiding uncessary unshadow. Signed-off-by: Xiaofeng Ling <xia...
2008 Nov 20
10
issues with movnti emulation
We''ve got reports of that change causing HVM data corruption issues. While I can''t see what''s wrong with the patch, I''d suggest at least reverting it from the 3.3 tree (which is what our code is based upon) for the time being. Jan _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com
2011 Dec 15
10
fsincos emulation on AMD CPUs
All, in the light of erratum #573 I''m wondering if we need to tweak or conditionally suppress fsincos emulation. The question is whether there is any possibility for getting the emulator to hit this instruction on AMD (as no real mode emulation ought to be taking place there), i.e. whether there are places where emulation gets continued eagerly in anticipation of the need for emulation
2019 Sep 10
1
[RFC PATCH v6 69/92] kvm: x86: keep the page protected if tracked by the introspection tool
...ect_shadow_pages > + && !kvmi_tracked_gfn(vcpu, gpa_to_gfn(gpa))) > kvm_mmu_unprotect_page(vcpu->kvm, gpa_to_gfn(gpa)); > > return true; > @@ -6322,7 +6323,8 @@ static bool reexecute_instruction(struct kvm_vcpu *vcpu, gva_t cr2, > * and it failed try to unshadow page and re-enter the > * guest to let CPU execute the instruction. > */ > - kvm_mmu_unprotect_page(vcpu->kvm, gpa_to_gfn(gpa)); > + if (!kvmi_tracked_gfn(vcpu, gpa_to_gfn(gpa))) > + kvm_mmu_unprotect_page(vcpu->kvm, gpa_to_gfn(gpa)); > > /* > * If the ac...
2006 Apr 02
1
Greetings, first remarks about trying to do customizable drop-shadows
...bottom, bottom-right) depeding on the length of the offset-vector being =, < or > to the radius. I am also not sure how to attack the problem of rounded corners of the windows decoration-frame. If the shadow-textures will align with the outter edges of the decoration-frame there will be "unshadowed" gaps at the rounded corners. If I have the shadow-textures overlap a bit inwards it might look funny if the windows opacity changes to transparent. Right now the only solution for this is to fill the inner part of the drop-shadow with a rectangle having the start-color. But this solution ca...
2006 Jul 14
23
[RFC] New shadow paging code
...agetables physically contiguous in memory using a "buddy" allocator. This allows us to use only one mfn value to designate the entire group of mfns. * We allocate a fixed amount of shadow memory at domain creation. This is shared by all vcpus. When we need more shadow pages, we begin to unshadow pages to free up more memory in approximately an LRU fashion. * We keep the p2m maps for HVM domains in a pagetable format, so that we can use them as the pagetables fo HVM guests in paging-disabled mode. So far, we have had several successes. Demand-paging accesses have been sped up by doing emu...
1997 Sep 28
0
[IPD] Internet Probe Droid
...OK great. But what does it scan?? - The original purpose of ipd was to scan for phf, which is a well known exploit, so read an advisory if you need any more information. However, the basic engine can be used to scan anything! It''s been rewritten to record Sendmail versions, attempt to get unshadowed password files from anonymous ftp logins, and it could even be setup to attempt to login to servers with default passwords... which ''middlefinger'' does, exploiting finger data. See the next section for more on that. - Information about phf Scanning - ipd...
2009 Apr 22
7
Consult some concepts about shadow paging mechanism
Dear All: I am pretty new to xen-devel, please correct me in the following. Assume we have the following terms GPT: guest page table SPT: shadow page table (Question a) When guest OS is running, is it always using SPT for address translation? If it is the case, how does guest OS refer and modify its own GPT content? It seems that there is a page table entry in SPT for the GPT page. (Question
2019 Aug 09
0
[RFC PATCH v6 69/92] kvm: x86: keep the page protected if tracked by the introspection tool
...ect_shadow_pages) + if (indirect_shadow_pages + && !kvmi_tracked_gfn(vcpu, gpa_to_gfn(gpa))) kvm_mmu_unprotect_page(vcpu->kvm, gpa_to_gfn(gpa)); return true; @@ -6322,7 +6323,8 @@ static bool reexecute_instruction(struct kvm_vcpu *vcpu, gva_t cr2, * and it failed try to unshadow page and re-enter the * guest to let CPU execute the instruction. */ - kvm_mmu_unprotect_page(vcpu->kvm, gpa_to_gfn(gpa)); + if (!kvmi_tracked_gfn(vcpu, gpa_to_gfn(gpa))) + kvm_mmu_unprotect_page(vcpu->kvm, gpa_to_gfn(gpa)); /* * If the access faults on its page table, it can no...
2012 Dec 20
1
Understanding Sockets
Hi, Just trying to consolidate my knowledge of Dovecot and I want to understand various things rather than just key out lines of config in dovecot.conf with the hope of it working. What I wanted to clarify is my understanding the "socket listen" section of the config file. From my limited understanding, this section details how other processes can access the userdb defined in
2015 Oct 26
0
[ANNOUNCE] xorg-server 1.17.3
...      dmx: Add _X_ATTRIBUTE_PRINTF to dmxConfigLog() & dmxConfigOutput()       dmx: move format strings inline so gcc can check       dmx: fix printf format argument warnings       dmx: remove unused variables       dmx: attempt to untangle nested loops using same index variable       dmx: more unshadowing of variables       dmx: glxproxy prototype cleanup       dmx: remove redundant declaration of dmxFontPrivateIndex from dmxfont.h       dmx: remove redundant redeclarations of variables from other headers       dmx: Mark glxIsExtensionSupported as a const char *       dmx: constify GCOps & GC...
2015 Sep 02
0
[ANNOUNCE] xorg-server 1.17.99.901
...dmx: Add _X_ATTRIBUTE_PRINTF to dmxConfigLog() & dmxConfigOutput() dmx: move format strings inline so gcc can check dmx: fix printf format argument warnings dmx: remove unused variables dmx: attempt to untangle nested loops using same index variable dmx: more unshadowing of variables dmx: glxproxy prototype cleanup dmx: remove redundant declaration of dmxFontPrivateIndex from dmxfont.h dmx: remove redundant redeclarations of variables from other headers dmx: Mark glxIsExtensionSupported as a const char * dmx: constify GCOps & GC...
2011 Jul 08
0
Wine release 1.3.24
...t: SetActionMap constructing a dataformat for keyboard and mouse. dinput: SetActionMap and queue_event setting mapped data. include: Corrected the value of the DIEDFL_ATTACHEDONLY flag. Maarten Lankhorst (1): winegstreamer: Fix setcaps call. Marcus Meissner (19): oleaut32: Unshadow cmp to make code work (Coverity). shell32: Remove superflous NULL check (Coverity). strmbase: Move NULL check up a bit (Coverity). quartz: Removed useless NULL check (Coverity). ole32: Access the array entry, not the array (Coverity). gameux: Revert NULL ptr check and...
2019 Aug 09
117
[RFC PATCH v6 00/92] VM introspection
The KVM introspection subsystem provides a facility for applications running on the host or in a separate VM, to control the execution of other VM-s (pause, resume, shutdown), query the state of the vCPUs (GPRs, MSRs etc.), alter the page access bits in the shadow page tables (only for the hardware backed ones, eg. Intel's EPT) and receive notifications when events of interest have taken place
2019 Aug 09
117
[RFC PATCH v6 00/92] VM introspection
The KVM introspection subsystem provides a facility for applications running on the host or in a separate VM, to control the execution of other VM-s (pause, resume, shutdown), query the state of the vCPUs (GPRs, MSRs etc.), alter the page access bits in the shadow page tables (only for the hardware backed ones, eg. Intel's EPT) and receive notifications when events of interest have taken place