Displaying 16 results from an estimated 16 matches for "unshadowing".
Did you mean:
shadowing
2007 Dec 05
13
[PATCH] unshadow the page table page which are used as data page
The patch deals with the situation which guest OS uses unused page table
pages as data pages and write data to them. The pages will still be
grabbed by Xen as page table pages, and lots of unnecessary page faults
occur.
The patch will check if the data guest writes to the page table contains
valid mfn or not, if not, we believe it is a data page now and then
unshadow the page.
The patch
2005 Dec 08
0
[PATCH]Don''t unshadow current used shadow L2 table.
# HG changeset patch
# User Xiaofeng Ling <xiaofeng.ling@intel.com>
# Node ID cc6e19224d0b755d24358cd15d1a40f894d320b4
# Parent b215584242c43415eccd008b90c812f3d04b398d
Don''t unshadow when the shadow l2 is the current used shadow table.
Otherwise, when destorying the domain, if the current sl2 is unpinned,
the shadow page will be freed without accquire the shadow_lock.
This may
2008 Nov 20
10
issues with movnti emulation
We''ve got reports of that change causing HVM data corruption issues. While
I can''t see what''s wrong with the patch, I''d suggest at least reverting it from
the 3.3 tree (which is what our code is based upon) for the time being.
Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
2011 Dec 15
10
fsincos emulation on AMD CPUs
All,
in the light of erratum #573 I''m wondering if we need to tweak or
conditionally suppress fsincos emulation. The question is whether there
is any possibility for getting the emulator to hit this instruction on AMD
(as no real mode emulation ought to be taking place there), i.e.
whether there are places where emulation gets continued eagerly
in anticipation of the need for emulation
2019 Sep 10
1
[RFC PATCH v6 69/92] kvm: x86: keep the page protected if tracked by the introspection tool
On Fri, Aug 09, 2019 at 07:00:24PM +0300, Adalbert Laz?r wrote:
> This patch might be obsolete thanks to single-stepping.
sooo should it be skipped from this large patchset to easy
review?
>
> Signed-off-by: Adalbert Laz?r <alazar at bitdefender.com>
> ---
> arch/x86/kvm/x86.c | 9 +++++++--
> 1 file changed, 7 insertions(+), 2 deletions(-)
>
> diff --git
2006 Apr 02
1
Greetings, first remarks about trying to do customizable drop-shadows
Hello there everybody!
Terrific... a mailing-list for compiz with David on board! Ok, I
started off with writing some functions using cairo to draw me the
needed elements for drop-shadows (atm stand-alone to focus on the proper
generation of the shadow-parts) and currently still fiddle with the
tweakable parameters. Right now I have...
shadow-radius (e.g. 20 pixels)
2D-offset vector (e.g. 10
2006 Jul 14
23
[RFC] New shadow paging code
...ap the guest pagetables. This
should speed up some common faults, as well as reduce cache footprint.
* Batch updates. There are times when guests do batch updates to
pagetables. At these times, it makes sense to give the guest write access
to the pagetables. At first this can be done simply by unshadowing the
page entirely. In the future, we can explore whether a a "mark out of sync"
mechanism would speed things up. We may be able to have a more extreme
optimization for Linux fork(): when we detect Linux doing a fork(), we can
unshadow the entire user portion of the guest address space, t...
1997 Sep 28
0
[IPD] Internet Probe Droid
[Mod: while not directly related to linux security, this post of course is
approved because it provides a good summary and clear description. Please
limit the discussion on this topic to new stuff. In general posts like this
will be approved -- alex]
Automating brute force attacks with ''Expect"
balif and desslok
- Abstract -
phf,
2009 Apr 22
7
Consult some concepts about shadow paging mechanism
Dear All:
I am pretty new to xen-devel, please correct me in the following.
Assume we have the following terms
GPT: guest page table
SPT: shadow page table
(Question a) When guest OS is running, is it always using SPT for
address translation? If it is the case, how does guest OS refer and
modify its own GPT content? It seems that there is a page table entry
in SPT for the GPT page.
(Question
2019 Aug 09
0
[RFC PATCH v6 69/92] kvm: x86: keep the page protected if tracked by the introspection tool
This patch might be obsolete thanks to single-stepping.
Signed-off-by: Adalbert Laz?r <alazar at bitdefender.com>
---
arch/x86/kvm/x86.c | 9 +++++++--
1 file changed, 7 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 2c06de73a784..06f44ce8ed07 100644
--- a/arch/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@ -6311,7 +6311,8 @@ static bool
2012 Dec 20
1
Understanding Sockets
Hi,
Just trying to consolidate my knowledge of Dovecot and I want to
understand various things rather than just key out lines of config in
dovecot.conf with the hope of it working.
What I wanted to clarify is my understanding the "socket listen" section
of the config file. From my limited understanding, this section details
how other processes can access the userdb defined in
2015 Oct 26
0
[ANNOUNCE] xorg-server 1.17.3
... dmx: Add _X_ATTRIBUTE_PRINTF to dmxConfigLog() & dmxConfigOutput()
dmx: move format strings inline so gcc can check
dmx: fix printf format argument warnings
dmx: remove unused variables
dmx: attempt to untangle nested loops using same index variable
dmx: more unshadowing of variables
dmx: glxproxy prototype cleanup
dmx: remove redundant declaration of dmxFontPrivateIndex from dmxfont.h
dmx: remove redundant redeclarations of variables from other headers
dmx: Mark glxIsExtensionSupported as a const char *
dmx: constify GCOps & GCFun...
2015 Sep 02
0
[ANNOUNCE] xorg-server 1.17.99.901
...dmx: Add _X_ATTRIBUTE_PRINTF to dmxConfigLog() & dmxConfigOutput()
dmx: move format strings inline so gcc can check
dmx: fix printf format argument warnings
dmx: remove unused variables
dmx: attempt to untangle nested loops using same index variable
dmx: more unshadowing of variables
dmx: glxproxy prototype cleanup
dmx: remove redundant declaration of dmxFontPrivateIndex from dmxfont.h
dmx: remove redundant redeclarations of variables from other headers
dmx: Mark glxIsExtensionSupported as a const char *
dmx: constify GCOps & GCFun...
2011 Jul 08
0
Wine release 1.3.24
The Wine development release 1.3.24 is now available.
What's new in this release (see below for details):
- Various DirectInput improvements.
- Support for line breaking in Uniscribe.
- More UI elements in builtin Shell Explorer.
- Some more D3DX9 functions.
- Improved support for shell known folders.
- Various bug fixes.
The source is available from the following locations:
2019 Aug 09
117
[RFC PATCH v6 00/92] VM introspection
The KVM introspection subsystem provides a facility for applications running
on the host or in a separate VM, to control the execution of other VM-s
(pause, resume, shutdown), query the state of the vCPUs (GPRs, MSRs etc.),
alter the page access bits in the shadow page tables (only for the hardware
backed ones, eg. Intel's EPT) and receive notifications when events of
interest have taken place
2019 Aug 09
117
[RFC PATCH v6 00/92] VM introspection
The KVM introspection subsystem provides a facility for applications running
on the host or in a separate VM, to control the execution of other VM-s
(pause, resume, shutdown), query the state of the vCPUs (GPRs, MSRs etc.),
alter the page access bits in the shadow page tables (only for the hardware
backed ones, eg. Intel's EPT) and receive notifications when events of
interest have taken place