[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-ia64-devel] [PATCH 0/2] FPSWA emulation support



Hi all,

These patches supports FPSWA emulation to the dom0/domU.

Patch's summary:
 - [1/2] This patch support FPSWA emulation.
  -- If the FP fault/trap occurred in the dom0/domU, Xen call FPSWA.
   --- If FPSWA succeed, Xen doesn't inject the FP fault/trap to 
       the dom0/domU. Xen resume next instruction in the dom0/domU.
   --- If FPSWA fail, Xen inject the FP fault/tarp to the dom0/domU, 
       and save the fpswa_ret_t to the struct arch_vcpu.
  -- If the FP fault/trap occurred in Xen, Xen call FPSWA.
   --- If FPSWA succeed, Xen resume next instruction in Xen.
   --- If FPSWA fail, Xen does the panic.
  -- A trap_init() initializes *fpswa_interface.
  -- A fpswa.h copied from the Linux/kernel.

 - [2/2] This patch support FPSWA hypercall to the dom0/domU.
  -- FPSWA hypercall uses 2 bundles in the hypercall patch table.
     1st bundle for the pseude-entry-point, 2nd bundle for the 
     hypercall patch.
  -- The set_virtual_address_map emulation of EFI changes the 
     fpswa_interface_t and the pseude-entry-point to virtual address.
  -- When the Linux/kernel on the dom0/domU received the FP 
     fault/trap, the Linux/kernel calls FPSWA. And it's a hypercall 
     to Xen. Xen returns the fpswa_ret_t saved in the struct 
     arch_vcpu to the vcpu r8-r11 of the dom0/domU.

Signed-off-by: Masaki Kanno <kanno.masaki@xxxxxxxxxxxxxx>

Best regards,
 Kan



_______________________________________________
Xen-ia64-devel mailing list
Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ia64-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.