Displaying 6 results from an estimated 6 matches for "hvm_set_guest_tsc".
Did you mean:
hvm_get_guest_tsc
2012 Sep 20
1
[PATCH 2/3] Implement tsc adjust feature
...lso adds (or subtracts) value X
from the TSC;
Signed-off-by: Liu, Jinsong <jinsong.liu@intel.com>
diff -r d5c677159abb xen/arch/x86/hvm/hvm.c
--- a/xen/arch/x86/hvm/hvm.c Thu Sep 20 21:50:56 2012 +0800
+++ b/xen/arch/x86/hvm/hvm.c Thu Sep 20 23:34:04 2012 +0800
@@ -244,6 +244,7 @@
void hvm_set_guest_tsc(struct vcpu *v, u64 guest_tsc)
{
uint64_t tsc;
+ uint64_t delta_tsc;
if ( v->domain->arch.vtsc )
{
@@ -255,10 +256,23 @@
rdtscll(tsc);
}
- v->arch.hvm_vcpu.cache_tsc_offset = guest_tsc - tsc;
+ delta_tsc = guest_tsc - tsc;
+
+ v->arch.hvm_vc...
2012 Mar 20
5
[hybrid]: hang in update_wall_time
Hi Ian/Stefano:
I changed over to the PV clock for hybrid liked we talked at the
hackathon. I still have the hang in update_wall_time() after dom0
switches to xen as clocksource.
The source of hang seems to be in xen stime_local_stamp in cpu_time that
suddenly jumps to a large 64bit value. I''ve been chasing to figure
where that happens, and why for the hybrid and not PV. It appears the
2013 Nov 20
2
[PATCH] hvm: reset TSC to 0 after domain resume from S3
...hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -3736,8 +3736,13 @@ static void hvm_s3_suspend(struct domain *d)
static void hvm_s3_resume(struct domain *d)
{
+ struct vcpu *v;
if ( test_and_clear_bool(d->arch.hvm_domain.is_s3_suspended) )
+ {
+ for_each_vcpu( d, v )
+ hvm_set_guest_tsc( v, 0 );
domain_unpause(d);
+ }
}
static int hvmop_set_isa_irq_level(
--
1.8.4.rc3
2012 Dec 20
4
[PATCH V2] mem_event: Add support for MEM_EVENT_REASON_MSR
Add the new MEM_EVENT_REASON_MSR event type. Works similarly
to the other register events, except event.gla always contains
the MSR type (in addition to event.gfn, which holds the value).
Signed-off-by: Razvan Cojocaru <rzvncj@gmail.com>
Acked-by: Tim Deegan <tim@xen.org>
diff -r b04de677de31 -r e33d3d37dfbf xen/arch/x86/hvm/hvm.c
--- a/xen/arch/x86/hvm/hvm.c Tue Dec 18 18:16:52 2012
2012 Sep 11
0
[PATCH 1/3] x86/hvm: don't use indirect calls without need
...ysenter_cs;
@@ -330,7 +332,7 @@ static void svm_load_cpu_state(struct vc
vmcb->cstar = data->msr_cstar;
vmcb->sfmask = data->msr_syscall_mask;
v->arch.hvm_vcpu.guest_efer = data->msr_efer;
- hvm_update_guest_efer(v);
+ svm_update_guest_efer(v);
hvm_set_guest_tsc(v, data->tsc);
}
@@ -426,12 +428,7 @@ static int svm_guest_x86_mode(struct vcp
return (likely(vmcb->cs.attr.fields.db) ? 4 : 2);
}
-static void svm_update_host_cr3(struct vcpu *v)
-{
- /* SVM doesn''t have a HOST_CR3 equivalent to update. */
-}
-
-static void svm_update_gu...
2013 Feb 05
21
[PATCH] x86/hvm: fix corrupt ACPI PM-Timer during live migration
The value of ACPI PM-Timer may be broken on save unless the timer mode
is delay_for_missed_ticks.
With other timer modes, vcpu->arch.hvm_vcpu.guest_time is always zero
and the adjustment from its value is wrong.
This patch fixes the saved value of ACPI PM-Timer:
- don''t adjust the PM-Timer if vcpu->arch.hvm_vcpu.guest_time is zero.
- consolidate calculations of PM-Timer to one