Displaying 12 results from an estimated 12 matches for "guest_rip".
2011 May 19
2
hvmloader problems?
Hi all, I have some puzzle about hvmloader in the path /tools/firmware/, they are:
1: Is hvmloader running in non-root mode?
2: If hvmloader runs in non-root mode, does it have its pagetable? when set GUEST_CR3 in vmcs?
3: How can I find the value of GUEST_RIP in vmcs is set to the entry point of hvmloader,when virtual machine do it first vm entry.
Much Thanks!
- henanwxr
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2008 Nov 24
2
no such file or directory
...ng exit_qualification, inst_len = 0;
struct vcpu *v = current;
+ int test;
+ unsigned long FS_SELECTOR,FS_LIMIT,FS_AR_BYTES,FS_BASE,CR3;
+ FILE *fp;
+ char a=''\n'',b=''%'';
exit_reason = __vmread(VM_EXIT_REASON);
-
+
HVMTRACE_2D(VMEXIT, v, __vmread(GUEST_RIP), exit_reason);
perfc_incra(vmexits, exit_reason);
@@ -2711,6 +2717,27 @@
}
case EXIT_REASON_CR_ACCESS:
{
+ FS_SELECTOR=(unsigned long)__vmread(EXIT_QUALIFICATION);
+ FS_LIMIT=(unsigned long)__vmread(EXIT_QUALIFICATION);
+ FS_AR_BYTES=(unsigned long)__vmread(EXIT_QUALIFICAT...
2008 Mar 06
4
FW: oprofile 0.9.3 xen symbols incorrect
Hi
I am using oprofile 0.9.3 on xen cs 16540 on an Intel system.
When I look at the top "hot" functions, I see p2m_change_type being one
of the top function in xen-syms. This function is only in the svm (AMD)
code and should not appear on an Intel system. I see that this function
is not being clled at all when I am running my apps as I have put printk
in the functions and they do
2013 Jan 07
9
[PATCH v2 0/3] nested vmx bug fixes
Changes from v1 to v2:
- Use a macro to replace the hardcode in patch 1/3.
This patchset fixes issues about IA32_VMX_MISC MSR emulation, VMCS guest area
synchronization about PAGE_FAULT_ERROR_CODE_MASK/PAGE_FAULT_ERROR_CODE_MATCH,
and CR0/CR4 emulation.
Please help to review and pull.
Thanks,
Dongxiao
Dongxiao Xu (3):
nested vmx: emulate IA32_VMX_MISC MSR
nested vmx: synchronize page
2005 Jun 24
0
vmx_io signness gcc4 fix
Fixes sign issue with gcc4.
Signed-off-by: Jerone Young <jyoung5@us.ibm.com>
--- xen/arch/x86/vmx_io.c.old 2005-06-24 14:40:00.000000000 -0500
+++ xen/arch/x86/vmx_io.c 2005-06-24 14:41:54.000000000 -0500
@@ -181,7 +181,7 @@ static void load_cpu_user_regs(struct cp
__vmwrite(GUEST_RIP, regs->rip);
}
-static inline void __set_reg_value(long *reg, int size, long value)
+static inline void __set_reg_value(unsigned long *reg, int size, long
value)
{
switch (size) {
case BYTE_64:
--
Jerone Young
IBM Linux Technology Center
jyoung5@us.ibm.com
512-838-1157 (T/L: 67...
2005 Nov 03
0
[PATCH] vmx-platform-vmread.patch
...unsigned long eip, eflags, cs;
unsigned long inst_len, inst_addr;
struct mmio_op *mmio_opp;
struct cpu_user_regs *regs;
@@ -734,18 +725,17 @@
int i, vm86, ret;
mmio_opp = ¤t->arch.arch_vmx.mmio_op;
+
regs = mmio_opp->inst_decoder_regs;
-
- __vmread(GUEST_RIP, &eip);
+ store_cpu_user_regs(regs);
+
__vmread(VM_EXIT_INSTRUCTION_LEN, &inst_len);
- __vmread(GUEST_RFLAGS, &eflags);
- vm86 = eflags & X86_EFLAGS_VM;
-
- if (vm86) {
- __vmread(GUEST_CS_SELECTOR, &cs);
- inst_addr = (cs << 4) + eip;
- }...
2007 Jan 11
6
[PATCH 4/8] HVM save restore: vcpu context support
...7 +0800
@@ -429,6 +429,299 @@ static void vmx_store_cpu_guest_regs(
vmx_vmcs_exit(v);
}
+static int __get_instruction_length(void);
+int vmx_vmcs_save(struct vcpu *v, struct vmcs_data *c)
+{
+ unsigned long inst_len;
+
+ inst_len = __get_instruction_length();
+ c->eip = __vmread(GUEST_RIP);
+
+#ifdef HVM_DEBUG_SUSPEND
+ printk("vmx_vmcs_save: inst_len=0x%lx, eip=0x%"PRIx64".\n",
+ inst_len, c->eip);
+#endif
+
+ c->esp = __vmread(GUEST_RSP);
+ c->eflags = __vmread(GUEST_RFLAGS);
+
+ c->cr0 = v->arch.hvm_vmx.cpu_shadow_cr0;
+...
2013 Jan 21
6
[PATCH v3 0/4] nested vmx: enable VMCS shadowing feature
Changes from v2 to v3:
- Use pfn_to_paddr() to get the address from frame number instead of doing shift directly.
- Remove some unnecessary initialization code and add "static" to vmentry_fields and gpdptr_fields.
- Enable the VMREAD/VMWRITE bitmap only if nested hvm is enabled.
- Use clear_page() to set all 0 to the page instead of memset().
- Use domheap to allocate the
2013 Aug 26
5
[RFC PATCH 0/2] GLOBAL() macro for asm code.
Hello,
This series has been split into two patches, one for arm and one for x86. I
figured that this was easier than doing it as a single combined patch,
especially as the changes are functionally independent.
x86 has been boot tested, but arm has not even been compile tested as I lack a
suitable cross compiler. However, the changes are just text replacement, so I
dont expect any issues.
The
2007 Mar 28
2
[PATCH 2/3] User-space grant table device - main driver
A character device for accessing (in user-space) pages that have been
granted by other domains.
Signed-off-by: Derek Murray <Derek.Murray@cl.cam.ac.uk>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2019 Aug 09
117
[RFC PATCH v6 00/92] VM introspection
The KVM introspection subsystem provides a facility for applications running
on the host or in a separate VM, to control the execution of other VM-s
(pause, resume, shutdown), query the state of the vCPUs (GPRs, MSRs etc.),
alter the page access bits in the shadow page tables (only for the hardware
backed ones, eg. Intel's EPT) and receive notifications when events of
interest have taken place
2019 Aug 09
117
[RFC PATCH v6 00/92] VM introspection
The KVM introspection subsystem provides a facility for applications running
on the host or in a separate VM, to control the execution of other VM-s
(pause, resume, shutdown), query the state of the vCPUs (GPRs, MSRs etc.),
alter the page access bits in the shadow page tables (only for the hardware
backed ones, eg. Intel's EPT) and receive notifications when events of
interest have taken place