Displaying 6 results from an estimated 6 matches for "do_machine_check".
2012 Nov 22
41
[PATCH V3] vmx/nmi: Do not use self_nmi() in VMEXIT handler
...489c2926698 -r d7ea938044ac xen/arch/x86/hvm/vmx/vmx.c
--- a/xen/arch/x86/hvm/vmx/vmx.c
+++ b/xen/arch/x86/hvm/vmx/vmx.c
@@ -2269,6 +2269,14 @@ void vmx_vmexit_handler(struct cpu_user_
vector = intr_info & INTR_INFO_VECTOR_MASK;
if ( vector == TRAP_machine_check )
do_machine_check(regs);
+ else if ( vector == TRAP_nmi &&
+ ( (intr_info & INTR_INFO_INTR_TYPE_MASK) ==
+ (X86_EVENTTYPE_NMI << 8) ) )
+ /* Must be called before interrupts are enabled to ensure
+ * the NMI handler code is run before th...
2008 Feb 01
4
[PATCH] x86: adjust reserved bit page fault handling
...m>
Index: 2008-01-28/xen/arch/x86/traps.c
===================================================================
--- 2008-01-28.orig/xen/arch/x86/traps.c 2008-01-28 11:31:44.000000000 +0100
+++ 2008-01-28/xen/arch/x86/traps.c 2008-01-30 11:47:39.000000000 +0100
@@ -823,6 +823,17 @@ asmlinkage void do_machine_check(struct
machine_check_vector(regs, regs->error_code);
}
+static inline void reserved_bit_page_fault(int guest, unsigned long addr,
+ struct cpu_user_regs *regs)
+{
+ if ( guest )
+ gdprintk(XENLOG_ERR, "reserved bit in page table e...
2012 Nov 26
13
[PATCH 0 of 4] Minios improvements for app development
This patch series contains a set of patches making minios rather easier
to use, from an application development point of view.
Overview of patches:
1 Command line argument parsing support, from Xen.
2 Weak console handler function.
3 Build system tweaks for application directories.
4 Trailing whitespace cleanup. (because it is very messy)
Patch 4 is likely to be more controversial than
2013 Mar 12
14
vpmu=1 and running 'perf top' within a PVHVM guest eventually hangs dom0 and hypervisor has stuck vCPUS. Romley-EP (model=45, stepping=2)
...ndler+511>: cmp $0x12,%r15d
0xffff82c4c01d3843 <vmx_vmexit_handler+515>: jne 0xffff82c4c01d3867 <vmx_vmexit_handler+551>
0xffff82c4c01d3845 <vmx_vmexit_handler+517>: mov %r12,%rdi
0xffff82c4c01d3848 <vmx_vmexit_handler+520>: callq 0xffff82c4c01849f1 <do_machine_check>
0xffff82c4c01d384d <vmx_vmexit_handler+525>: jmp 0xffff82c4c01d3867 <vmx_vmexit_handler+551>
0xffff82c4c01d384f <vmx_vmexit_handler+527>: mov %r12,%rdi
0xffff82c4c01d3852 <vmx_vmexit_handler+530>: callq 0xffff82c4c01849f1 <do_machine_check>
0xfff...
2020 Feb 11
83
[RFC PATCH 00/62] Linux as SEV-ES Guest Support
Hi,
here is the first public post of the patch-set to enable Linux to run
under SEV-ES enabled hypervisors. The code is mostly feature-complete,
but there are still a couple of bugs to fix. Nevertheless, given the
size of the patch-set, I think it is about time to ask for initial
feedback of the changes that come with it. To better understand the code
here is a quick explanation of SEV-ES first.
2020 Feb 11
83
[RFC PATCH 00/62] Linux as SEV-ES Guest Support
Hi,
here is the first public post of the patch-set to enable Linux to run
under SEV-ES enabled hypervisors. The code is mostly feature-complete,
but there are still a couple of bugs to fix. Nevertheless, given the
size of the patch-set, I think it is about time to ask for initial
feedback of the changes that come with it. To better understand the code
here is a quick explanation of SEV-ES first.