debuggers.hg

annotate xen/include/asm-x86/x86_32/domain_page.h @ 3632:fec8b1778268

bitkeeper revision 1.1159.212.60 (41febc4bKKSkh9u-Zes9v2CmBuLZxA)

More bootstrap fixes for x86/64. Next thing to do is sort out the IDT and
get traps.c working; then we can get rid of a bunch of dummy labels from
end of boot/x86_64.S. We're also going to need some kind of entry.S before
we can safely enable interrupts. Also bear in mind that not all of physical
RAM may be mapped (only first 1GB) and no m2p table is yet allocated or
mapped. Plenty to be done!
author kaf24@viper.(none)
date Mon Jan 31 23:16:27 2005 +0000 (2005-01-31)
parents
children bbe8541361dd
rev   line source
kaf24@3632 1 /******************************************************************************
kaf24@3632 2 * domain_page.h
kaf24@3632 3 *
kaf24@3632 4 * Allow temporary mapping of domain page frames into Xen space.
kaf24@3632 5 */
kaf24@3632 6
kaf24@3632 7 #ifndef __ASM_DOMAIN_PAGE_H__
kaf24@3632 8 #define __ASM_DOMAIN_PAGE_H__
kaf24@3632 9
kaf24@3632 10 #include <xen/config.h>
kaf24@3632 11 #include <xen/sched.h>
kaf24@3632 12
kaf24@3632 13 extern unsigned long *mapcache;
kaf24@3632 14 #define MAPCACHE_ENTRIES 1024
kaf24@3632 15
kaf24@3632 16 /*
kaf24@3632 17 * Maps a given physical address, returning corresponding virtual address.
kaf24@3632 18 * The entire page containing that VA is now accessible until a
kaf24@3632 19 * corresponding call to unmap_domain_mem().
kaf24@3632 20 */
kaf24@3632 21 extern void *map_domain_mem(unsigned long pa);
kaf24@3632 22
kaf24@3632 23 /*
kaf24@3632 24 * Pass a VA within a page previously mapped with map_domain_mem().
kaf24@3632 25 * That page will then be removed from the mapping lists.
kaf24@3632 26 */
kaf24@3632 27 extern void unmap_domain_mem(void *va);
kaf24@3632 28
kaf24@3632 29 #endif /* __ASM_DOMAIN_PAGE_H__ */