WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-ia64-devel

[Xen-ia64-devel] [PATCH 0/2] FPSWA emulation support

To: xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-ia64-devel] [PATCH 0/2] FPSWA emulation support
From: Masaki Kanno <kanno.masaki@xxxxxxxxxxxxxx>
Date: Thu, 18 May 2006 19:36:43 +0900
Delivery-date: Thu, 18 May 2006 03:37:22 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-ia64-devel-request@lists.xensource.com?subject=help>
List-id: Discussion of the ia64 port of Xen <xen-ia64-devel.lists.xensource.com>
List-post: <mailto:xen-ia64-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ia64-devel>, <mailto:xen-ia64-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ia64-devel>, <mailto:xen-ia64-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-ia64-devel-bounces@xxxxxxxxxxxxxxxxxxx
Hi all,

These patches supports FPSWA emulation to the dom0/domU.

Patch's summary:
 - [1/2] This patch support FPSWA emulation.
  -- If the FP fault/trap occurred in the dom0/domU, Xen call FPSWA.
   --- If FPSWA succeed, Xen doesn't inject the FP fault/trap to 
       the dom0/domU. Xen resume next instruction in the dom0/domU.
   --- If FPSWA fail, Xen inject the FP fault/tarp to the dom0/domU, 
       and save the fpswa_ret_t to the struct arch_vcpu.
  -- If the FP fault/trap occurred in Xen, Xen call FPSWA.
   --- If FPSWA succeed, Xen resume next instruction in Xen.
   --- If FPSWA fail, Xen does the panic.
  -- A trap_init() initializes *fpswa_interface.
  -- A fpswa.h copied from the Linux/kernel.

 - [2/2] This patch support FPSWA hypercall to the dom0/domU.
  -- FPSWA hypercall uses 2 bundles in the hypercall patch table.
     1st bundle for the pseude-entry-point, 2nd bundle for the 
     hypercall patch.
  -- The set_virtual_address_map emulation of EFI changes the 
     fpswa_interface_t and the pseude-entry-point to virtual address.
  -- When the Linux/kernel on the dom0/domU received the FP 
     fault/trap, the Linux/kernel calls FPSWA. And it's a hypercall 
     to Xen. Xen returns the fpswa_ret_t saved in the struct 
     arch_vcpu to the vcpu r8-r11 of the dom0/domU.

Signed-off-by: Masaki Kanno <kanno.masaki@xxxxxxxxxxxxxx>

Best regards,
 Kan



_______________________________________________
Xen-ia64-devel mailing list
Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ia64-devel

<Prev in Thread] Current Thread [Next in Thread>