Displaying 4 results from an estimated 4 matches for "hvm_get_guest_tim".
Did you mean:
hvm_get_guest_time
2013 Feb 05
21
[PATCH] x86/hvm: fix corrupt ACPI PM-Timer during live migration
The value of ACPI PM-Timer may be broken on save unless the timer mode
is delay_for_missed_ticks.
With other timer modes, vcpu->arch.hvm_vcpu.guest_time is always zero
and the adjustment from its value is wrong.
This patch fixes the saved value of ACPI PM-Timer:
- don''t adjust the PM-Timer if vcpu->arch.hvm_vcpu.guest_time is zero.
- consolidate calculations of PM-Timer to one
2008 Dec 29
1
Guest time and TSCs since changeset 17716
Changeset 17716 provides monotonically increasing guest time for HVM
domains, by using the per-domain pl_time structure. hvm_get_guest_time
and hvm_set_guest_time were changed to use this. Previously, the guest
time was stored directly in the TSC offset fields of the vmx/smv control
structures.
Since pt_freeze_time and pt_thaw_time use hvm_get/set_guest_time, they
now no longer freeze TSC time for a guest. So, for timer_mode 0, T...
2007 Jan 11
6
[PATCH 4/8] HVM save restore: vcpu context support
...truct hvmcpu_context *ctxt);
+
/*
* Examine specifics of the guest state:
* 1) determine whether paging is enabled,
@@ -157,6 +164,35 @@ hvm_load_cpu_guest_regs(struct vcpu *v,
hvm_funcs.load_cpu_guest_regs(v, r);
}
+void hvm_set_guest_time(struct vcpu *v, u64 gtime);
+u64 hvm_get_guest_time(struct vcpu *v);
+
+static inline void
+hvm_save_cpu_context(
+ struct vcpu *v, struct hvmcpu_context *ctxt)
+{
+ hvm_funcs.save_cpu_ctxt(v, ctxt);
+
+ /* save guest time */
+ ctxt->gtime = hvm_get_guest_time(v);
+
+ /* set valid flag to recover whole vmcs when restore */
+...
2008 Jul 01
25
Guest TSC and Xen (Intel and AMD feedback please)
Various versions of Linux under various circumstances select
TSC as the primary clocksource for the kernel. This is
especially true for uniprocessor kernels, but also in some
cases for multiprocessor kernels. In most cases, this
is because a processor bit (tsc_invariant? constant_tsc?)
is passed through directly from the hardware via Xen and
tested by the hvm guest and the result implies that