Displaying 12 results from an estimated 12 matches for "domain_crash_synchronous".
2005 Apr 02
1
[PATCH] VMX support for MMIO/PIO in VM8086 mode
...case 0x64: //FS
case 0x65: //GS
+ thread_inst->seg_sel = *inst;
break;
case 0x66: //32bit->16bit
thread_inst->op_size = WORD;
break;
case 0x67:
+ printf("Not handling 0x67 (yet)\n");
+ domain_crash_synchronous();
break;
default:
return inst;
@@ -165,7 +175,7 @@
}
}
-static inline unsigned long get_immediate(const unsigned char *inst, int op_size)
+static inline unsigned long get_immediate(int op16, const unsigned char *inst, int op_size)
{
int...
2007 Jan 05
0
[IA64]: noreturn cannot be used if function may return
....c
////////////////////////////////////
-void die_if_kernel(char *str, struct pt_regs *regs, long err) /* __attribute__ ((noreturn)) */
+void die_if_kernel(char *str, struct pt_regs *regs, long err)
{
if (user_mode(regs))
return;
@@ -88,7 +88,7 @@ void die_if_kernel(char *str, struct pt_
domain_crash_synchronous();
}
-void vmx_die_if_kernel(char *str, struct pt_regs *regs, long err) /* __attribute__ ((noreturn)) */
+void vmx_die_if_kernel(char *str, struct pt_regs *regs, long err)
{
if (vmx_user_mode(regs))
return;
_______________________________________________
Xen-devel mailing list
Xen-devel@l...
2005 Nov 03
0
[PATCH] vmx-platform-vmread.patch
..._decode(inst, &mmio_inst) == DECODE_failure) {
+ if (vmx_decode(vm86, inst, &mmio_inst) == DECODE_failure) {
printf("mmio opcode: va 0x%lx, gpa 0x%lx, len %ld:",
va, gpa, inst_len);
for (i = 0; i < inst_len; i++)
@@ -765,7 +755,6 @@
domain_crash_synchronous();
}
- store_cpu_user_regs(regs);
regs->eip += inst_len; /* advance %eip */
switch (mmio_inst.instr) {
@@ -783,16 +772,12 @@
/* determine non-MMIO address */
if (vm86) {
- unsigned long seg;
-
- __vmread(GUEST_ES_SELECTOR, &seg)...
2005 Jun 30
0
[PATCH][2/10] Extend the VMX intercept mechanism to include mmio as well as portio.
...// Write to MMIO
if (mmio_inst.operand[0] & IMMEDIATE) {
@@ -728,6 +728,7 @@
if (!strncmp((char *)mmio_inst.i_name, "stos", 4)) {
send_mmio_req(gpa, &mmio_inst,
inst_decoder_regs->eax, IOREQ_WRITE, 0);
+ return;
}
domain_crash_synchronous();
diff -r febfcd0a1a0a -r 9a43d5c12b95 xen/arch/x86/vmx_intercept.c
--- a/xen/arch/x86/vmx_intercept.c Thu Jun 30 03:20:48 2005
+++ b/xen/arch/x86/vmx_intercept.c Thu Jun 30 04:08:50 2005
@@ -31,14 +31,17 @@
#ifdef CONFIG_VMX
-/* for intercepting io request after vm_exit, return value: 0--not...
2007 Apr 13
18
A different probklem with save/restore on C/S 14823.
I''m not seeing the problem that Fan Zhao is reporting, instead I get
this one. Not sure if ti''s the same one or a different problem... This
happens with my simple-guest [i.e. not using hvmloader, as I described
before]. This worked fine yesterday.
(XEN) event_channel.c:178:d0 EVTCHNOP failure: domain 0, error -22, line
178
(XEN) bad shared page: 0
(XEN) domain_crash_sync called
2011 Nov 08
48
Need help with fixing the Xen waitqueue feature
The patch ''mem_event: use wait queue when ring is full'' I just sent out
makes use of the waitqueue feature. There are two issues I get with the
change applied:
I think I got the logic right, and in my testing vcpu->pause_count drops
to zero in p2m_mem_paging_resume(). But for some reason the vcpu does
not make progress after the first wakeup. In my debugging there is one
2012 Oct 02
18
[PATCH 0/3] x86: adjust entry frame generation
This set of patches converts the way frames gets created from
using PUSHes/POPs to using MOVes, thus allowing (in certain
cases) to avoid saving/restoring part of the register set.
While the place where the (small) win from this comes from varies
between CPUs, the net effect is a 1 to 2% reduction on a
combined interruption entry and exit when the full state save
can be avoided.
1: use MOV
2013 Jan 23
132
[PATCH 00/45] initial arm v8 (64-bit) support
First off, Apologies for the massive patch series...
This series boots a 32-bit dom0 kernel to a command prompt on an ARMv8
(AArch64) model. The kernel is the same one as I am currently using with
the 32 bit hypervisor
I haven''t yet tried starting a guest or anything super advanced like
that ;-). Also there is not real support for 64-bit domains at all,
although in one or two places I
2013 Feb 22
48
[PATCH v3 00/46] initial arm v8 (64-bit) support
This round implements all of the review comments from V2 and all patches
are now acked. Unless there are any objections I intend to apply later
this morning.
Ian.
2007 May 29
24
RFC: MCA/MCE concept
Hello!
The current MCA/MCE support in Xen is that it dumps the error and panics.
In the following concept I propose here, there are two places where Xen has to
react on.
I) Xen receives a MCE from the CPU and
II) Xen receives Dom0 instructions via Hypercall
The term "self-healing" below is used in the sense of using the most propriate
technique(s) to handle an error such as MPR
2012 Jan 09
39
[PATCH v4 00/25] xen: ARMv7 with virtualization extensions
Hello everyone,
this is the fourth version of the patch series that introduces ARMv7
with virtualization extensions support in Xen.
The series allows Xen and Dom0 to boot on a Cortex-A15 based Versatile
Express simulator.
See the following announce email for more informations about what we
are trying to achieve, as well as the original git history:
See
2011 Dec 06
57
[PATCH RFC 00/25] xen: ARMv7 with virtualization extensions
Hello everyone,
this is the very first version of the patch series that introduces ARMv7
with virtualization extensions support in Xen.
The series allows Xen and Dom0 to boot on a Cortex-A15 based Versatile
Express simulator.
See the following announce email for more informations about what we
are trying to achieve, as well as the original git history:
See