[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: [Xen-devel] hypercall_page
Hypercall_page is actually a code page, which contains 32 hypercall entry. every entry is something like "mov $__HYPERVISOR_xxx,%eax int $0x82 " It is initialized in hypercall_page_initialise(void *hypercall_page) at the time when control panel creates the domain. Later, domain can simply the corresponding entry to issue a hypercall. For the subroutine of the HYPERVISOR_xxx, usually it is do_xxx. For example, __HYPERVISOR_sched_op should be do_sched_op. For more information, please refer to hypercall_table in xen/arch/x86/x86_{32,64}/entry.S. Thanks Ke T S wrote: > Hi, > > Can someone let me know what exactly the array "hypercall_page " > contains? Are they function pointers? > > How do I know which functions are going to be called when a > HYPERVISOR_xxx is called? > > For instance, when the following asm code is to be executed: > > define _hypercall3(type, sched_op, a1, a2, a3) \ > ({ \ > long __res, __ign1, __ign2, __ign3; \ > asm volatile ( \ > "call hypercall_page + ("STR(__HYPERVISOR_##name)" * > 32)"\ : "=a" (__res), "=b" (__ign1), "=c" (__ign2), > \ "=d" (__ign3) \ > : "1" ((long)(a1)), "2" ((long)(a2)), \ > "3" ((long)(a3)) \ > : "memory" ); \ > (type)__res; \ > }) > > The #define for __HYPERVISOR_sched_op is 6 > > how do I find out which subroutine is the "call" going to call? > > The above asm code is present in /arch/xen/kernel/hypercall.h > > thanks ! > > _________________________________________________________________ > Is your PC infected? Get a FREE online computer virus scan from > McAfee® Security. > http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=3963 > > > _______________________________________________ > Xen-devel mailing list > Xen-devel@xxxxxxxxxxxxxxxxxxx > http://lists.xensource.com/xen-devel _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |