search for: unshadowing

Displaying 16 results from an estimated 16 matches for "unshadowing".

Did you mean: shadowing
2007 Dec 05
13
[PATCH] unshadow the page table page which are used as data page
The patch deals with the situation which guest OS uses unused page table pages as data pages and write data to them. The pages will still be grabbed by Xen as page table pages, and lots of unnecessary page faults occur. The patch will check if the data guest writes to the page table contains valid mfn or not, if not, we believe it is a data page now and then unshadow the page. The patch
2005 Dec 08
0
[PATCH]Don''t unshadow current used shadow L2 table.
# HG changeset patch # User Xiaofeng Ling <xiaofeng.ling@intel.com> # Node ID cc6e19224d0b755d24358cd15d1a40f894d320b4 # Parent b215584242c43415eccd008b90c812f3d04b398d Don''t unshadow when the shadow l2 is the current used shadow table. Otherwise, when destorying the domain, if the current sl2 is unpinned, the shadow page will be freed without accquire the shadow_lock. This may
2008 Nov 20
10
issues with movnti emulation
We''ve got reports of that change causing HVM data corruption issues. While I can''t see what''s wrong with the patch, I''d suggest at least reverting it from the 3.3 tree (which is what our code is based upon) for the time being. Jan _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com
2011 Dec 15
10
fsincos emulation on AMD CPUs
All, in the light of erratum #573 I''m wondering if we need to tweak or conditionally suppress fsincos emulation. The question is whether there is any possibility for getting the emulator to hit this instruction on AMD (as no real mode emulation ought to be taking place there), i.e. whether there are places where emulation gets continued eagerly in anticipation of the need for emulation
2019 Sep 10
1
[RFC PATCH v6 69/92] kvm: x86: keep the page protected if tracked by the introspection tool
On Fri, Aug 09, 2019 at 07:00:24PM +0300, Adalbert Laz?r wrote: > This patch might be obsolete thanks to single-stepping. sooo should it be skipped from this large patchset to easy review? > > Signed-off-by: Adalbert Laz?r <alazar at bitdefender.com> > --- > arch/x86/kvm/x86.c | 9 +++++++-- > 1 file changed, 7 insertions(+), 2 deletions(-) > > diff --git
2006 Apr 02
1
Greetings, first remarks about trying to do customizable drop-shadows
Hello there everybody! Terrific... a mailing-list for compiz with David on board! Ok, I started off with writing some functions using cairo to draw me the needed elements for drop-shadows (atm stand-alone to focus on the proper generation of the shadow-parts) and currently still fiddle with the tweakable parameters. Right now I have... shadow-radius (e.g. 20 pixels) 2D-offset vector (e.g. 10
2006 Jul 14
23
[RFC] New shadow paging code
...ap the guest pagetables. This should speed up some common faults, as well as reduce cache footprint. * Batch updates. There are times when guests do batch updates to pagetables. At these times, it makes sense to give the guest write access to the pagetables. At first this can be done simply by unshadowing the page entirely. In the future, we can explore whether a a "mark out of sync" mechanism would speed things up. We may be able to have a more extreme optimization for Linux fork(): when we detect Linux doing a fork(), we can unshadow the entire user portion of the guest address space, t...
1997 Sep 28
0
[IPD] Internet Probe Droid
[Mod: while not directly related to linux security, this post of course is approved because it provides a good summary and clear description. Please limit the discussion on this topic to new stuff. In general posts like this will be approved -- alex] Automating brute force attacks with ''Expect" balif and desslok - Abstract - phf,
2009 Apr 22
7
Consult some concepts about shadow paging mechanism
Dear All: I am pretty new to xen-devel, please correct me in the following. Assume we have the following terms GPT: guest page table SPT: shadow page table (Question a) When guest OS is running, is it always using SPT for address translation? If it is the case, how does guest OS refer and modify its own GPT content? It seems that there is a page table entry in SPT for the GPT page. (Question
2019 Aug 09
0
[RFC PATCH v6 69/92] kvm: x86: keep the page protected if tracked by the introspection tool
This patch might be obsolete thanks to single-stepping. Signed-off-by: Adalbert Laz?r <alazar at bitdefender.com> --- arch/x86/kvm/x86.c | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 2c06de73a784..06f44ce8ed07 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -6311,7 +6311,8 @@ static bool
2012 Dec 20
1
Understanding Sockets
Hi, Just trying to consolidate my knowledge of Dovecot and I want to understand various things rather than just key out lines of config in dovecot.conf with the hope of it working. What I wanted to clarify is my understanding the "socket listen" section of the config file. From my limited understanding, this section details how other processes can access the userdb defined in
2015 Oct 26
0
[ANNOUNCE] xorg-server 1.17.3
...      dmx: Add _X_ATTRIBUTE_PRINTF to dmxConfigLog() & dmxConfigOutput()       dmx: move format strings inline so gcc can check       dmx: fix printf format argument warnings       dmx: remove unused variables       dmx: attempt to untangle nested loops using same index variable       dmx: more unshadowing of variables       dmx: glxproxy prototype cleanup       dmx: remove redundant declaration of dmxFontPrivateIndex from dmxfont.h       dmx: remove redundant redeclarations of variables from other headers       dmx: Mark glxIsExtensionSupported as a const char *       dmx: constify GCOps & GCFun...
2015 Sep 02
0
[ANNOUNCE] xorg-server 1.17.99.901
...dmx: Add _X_ATTRIBUTE_PRINTF to dmxConfigLog() & dmxConfigOutput() dmx: move format strings inline so gcc can check dmx: fix printf format argument warnings dmx: remove unused variables dmx: attempt to untangle nested loops using same index variable dmx: more unshadowing of variables dmx: glxproxy prototype cleanup dmx: remove redundant declaration of dmxFontPrivateIndex from dmxfont.h dmx: remove redundant redeclarations of variables from other headers dmx: Mark glxIsExtensionSupported as a const char * dmx: constify GCOps & GCFun...
2011 Jul 08
0
Wine release 1.3.24
The Wine development release 1.3.24 is now available. What's new in this release (see below for details): - Various DirectInput improvements. - Support for line breaking in Uniscribe. - More UI elements in builtin Shell Explorer. - Some more D3DX9 functions. - Improved support for shell known folders. - Various bug fixes. The source is available from the following locations:
2019 Aug 09
117
[RFC PATCH v6 00/92] VM introspection
The KVM introspection subsystem provides a facility for applications running on the host or in a separate VM, to control the execution of other VM-s (pause, resume, shutdown), query the state of the vCPUs (GPRs, MSRs etc.), alter the page access bits in the shadow page tables (only for the hardware backed ones, eg. Intel's EPT) and receive notifications when events of interest have taken place
2019 Aug 09
117
[RFC PATCH v6 00/92] VM introspection
The KVM introspection subsystem provides a facility for applications running on the host or in a separate VM, to control the execution of other VM-s (pause, resume, shutdown), query the state of the vCPUs (GPRs, MSRs etc.), alter the page access bits in the shadow page tables (only for the hardware backed ones, eg. Intel's EPT) and receive notifications when events of interest have taken place