Displaying 5 results from an estimated 5 matches for "nv_vmswitch_in_progress".
2013 Sep 22
1
[PATCH] Nested VMX: Expose unrestricted guest feature to guest
...b/xen/arch/x86/hvm/vmx/vvmx.c
index f385c02..d55d60c 100644
--- a/xen/arch/x86/hvm/vmx/vvmx.c
+++ b/xen/arch/x86/hvm/vmx/vvmx.c
@@ -1341,6 +1341,7 @@ static void virtual_vmexit(struct cpu_user_regs *regs)
nestedhvm_vcpu_exit_guestmode(v);
nvcpu->nv_vmexit_pending = 0;
+ nvcpu->nv_vmswitch_in_progress = 1;
lm_l2 = !!hvm_long_mode_enabled(v);
lm_l1 = !!(__get_vvmcs(nvcpu->nv_vvmcx, VM_EXIT_CONTROLS) &
@@ -1371,6 +1372,7 @@ static void virtual_vmexit(struct cpu_user_regs *regs)
if ( cpu_has_vmx_virtual_intr_delivery )
nvmx_update_apicv(v);
+ nvcpu->nv_vmswi...
2012 May 24
11
[PATCH 0/3] XEN: fix vmx exception mistake
This series of patches fix the mistake for debug exception(#DB), overflow
exception(#OF) and INT3(#BP), INTn instruction emulation.
Introduce new function vmx_inject_sw_exception() which deliver the software
excetion, software interrupt and privileged software exception. Split hardware
exception as a seperate function(old function vmx_inject_hw_exception()).
Also Passed down intruction length
2011 Jun 27
20
[PATCH 0 of 5] v2: Nested-p2m cleanups and locking changes
This patch series tidies up a few bits ofthe nested p2m code.
The main thing it does is reorganize the locking so that most of the
changes to nested p2m tables happen only under the p2m lock, and the
nestedp2m lock is only needed to reassign p2m tables to new cr3 values.
Changes since v1:
- a few minor fixes
- more sensible flushing policy in p2m_get_nestedp2m()
- smoke-tested this time!
2012 May 30
12
[PATCH v2 0/4] XEN: fix vmx exception mistake
Changes from v1:
- Define new struct hvm_trap to represent information of trap, include
instruction length.
- Renames hvm_inject_exception to hvm_inject_trap. Then define a couple of
wrappers around that function for existing callers, so that their parameter
lists actually *shrink*.
This series of patches fix the mistake for debug exception(#DB), overflow
exception(#OF) and INT3(#BP),
2013 Mar 12
14
vpmu=1 and running 'perf top' within a PVHVM guest eventually hangs dom0 and hypervisor has stuck vCPUS. Romley-EP (model=45, stepping=2)
...>: jne 0xffff82c4c01d4d5a <vmx_vmexit_handler+5914>
Which I think translates to roughly:
2323 local_irq_enable();
2324
2325 /* XXX: This looks ugly, but we need a mechanism to ensure
2326 * any pending vmresume has really happened
2327 */
2328 vcpu_nestedhvm(v).nv_vmswitch_in_progress = 0;
2329 if ( nestedhvm_vcpu_in_guestmode(v) )
2330 {
2331 if ( nvmx_n2_vmexit_handler(regs, exit_reason) )
2332 goto out;
2333 }
Which does not make much sense. There is no loop here? Thoughts?
Here is what the interesting VCPUs show:
(XEN) *** Dumping CPU28 ho...