Displaying 10 results from an estimated 10 matches for "start_vmx".
Did you mean:
start_vm
2008 Jan 11
4
GP exception on vmxon
...anybody help me on this? The following is the context
1. After booting up to the program, I disable A20M.
2. allocate a 4kb-aligned vmxon region and calculate its physical
address.
3. setup identity page table and enter protected page mode. In this
step I also set x86_cr0_ne ( cr0.bit5)
4. call start_vmx. This start_vmx function is similar to the one in
xen3.1.0
a. test cpuid with eax = 1. ecx.vmxe(bit5) is 1.
b. Test IA32_FEATURE_CONTROL_MSR, result is 0x05, so bit 0
and bit 2 are both 1.
c. Set cr4.vmxe (bit13) to 1
d. Call vmx_init_vmcs_config(). This function is the same
as in xen3.1.0.
e...
2013 Apr 19
0
[PATCH] x86/HVM: move per-vendor function tables into .init.data
...gt;
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -113,7 +113,7 @@ static struct notifier_block cpu_nfb = {
static int __init hvm_enable(void)
{
- struct hvm_function_table *fns = NULL;
+ const struct hvm_function_table *fns = NULL;
if ( cpu_has_vmx )
fns = start_vmx();
@@ -126,8 +126,8 @@ static int __init hvm_enable(void)
hvm_funcs = *fns;
hvm_enabled = 1;
- printk("HVM: %s enabled\n", hvm_funcs.name);
- if ( !hvm_funcs.hap_supported )
+ printk("HVM: %s enabled\n", fns->name);
+ if ( !fns->hap_supported )...
2008 Mar 21
0
bug Dual Xeon Quad Core E5310 Kernel Panic (hangs on boot)
...:
machine: IBM x3400 (MT7976) with 2 Xeon E5310 and 4GB of RAM
xen version: 4.01 Enterprise
problem: Installation CD doesn''t boot, it locks on this error:
---------------------------------------------------------------------------
Xen call trace shows codes about:
vmx_ini_vmcs_config
start_vmx
identify_cpu
smp_store_cpu_info
smp_callin
start_secondary
*********************
Panic on CPU n:
Xen BUG at vncs.c:124
*********************
Reboot in five seconds...
---------------------------------------------------------------------------
screenshot of error at: http://valtellinux.it/xen/xe...
2006 Sep 29
1
[PATCH] hvm: clear vmxe if vmxoff
...,10 @@ static void vmx_ctxt_switch_to(struct vc
static void stop_vmx(void)
{
- if (read_cr4() & X86_CR4_VMXE)
+ if (read_cr4() & X86_CR4_VMXE) {
__vmxoff();
+ clear_in_cr4(X86_CR4_VMXE);
+ }
}
void vmx_migrate_timers(struct vcpu *v)
@@ -806,12 +808,14 @@ int start_vmx(void)
if ( (vmcs = vmx_alloc_host_vmcs()) == NULL )
{
+ clear_in_cr4(X86_CR4_VMXE);
printk("Failed to allocate host VMCS\n");
return 0;
}
if ( __vmxon(virt_to_maddr(vmcs)) )
{
+ clear_in_cr4(X86_CR4_VMXE);
printk("...
2012 Aug 23
2
[PATCH] nvmx: fix resource relinquish for nested VMX
...rcepts_trap = nvmx_intercepts_exception,
.nhvm_vcpu_vmexit_trap = nvmx_vmexit_trap,
- .nhvm_intr_blocked = nvmx_intr_blocked
+ .nhvm_intr_blocked = nvmx_intr_blocked,
+ .nhvm_domain_relinquish_resources = nvmx_domain_relinquish_resources
};
struct hvm_function_table * __init start_vmx(void)
diff --git a/xen/arch/x86/hvm/vmx/vvmx.c b/xen/arch/x86/hvm/vmx/vvmx.c
index 2e0b79d..1f610eb 100644
--- a/xen/arch/x86/hvm/vmx/vvmx.c
+++ b/xen/arch/x86/hvm/vmx/vvmx.c
@@ -57,6 +57,9 @@ void nvmx_vcpu_destroy(struct vcpu *v)
{
struct nestedvcpu *nvcpu = &vcpu_nestedhvm(v);
+ i...
2013 Apr 09
39
[PATCH 0/4] Add posted interrupt supporting
From: Yang Zhang <yang.z.zhang@Intel.com>
The follwoing patches are adding the Posted Interrupt supporting to Xen:
Posted Interrupt allows vAPIC interrupts to inject into guest directly
without any vmexit.
- When delivering a interrupt to guest, if target vcpu is running,
update Posted-interrupt requests bitmap and send a notification event
to the vcpu. Then the vcpu will handle this
2012 Sep 14
0
[ PATCH v3 2/3] xen: enable Virtual-interrupt delivery
...nquish_resources = nvmx_domain_relinquish_resources
+ .nhvm_domain_relinquish_resources = nvmx_domain_relinquish_resources,
+ .update_eoi_exit_bitmap = vmx_update_eoi_exit_bitmap,
+ .virtual_intr_delivery_enabled = vmx_virtual_intr_delivery_enabled
};
struct hvm_function_table * __init start_vmx(void)
@@ -2284,6 +2302,17 @@ static int vmx_handle_apic_write(void)
return vlapic_apicv_write(current, offset);
}
+/*
+ * When "Virtual Interrupt Delivery" is enabled, this function is used
+ * to handle EOI-induced VM exit
+ */
+void vmx_handle_EOI_induced_exit(struct vlapic *vla...
2007 Jul 19
6
Anyone succeeds HVM on latest x86-64 xen
I tried latest xen and linux-xen staging tree, but failed to run HVM
domain on x86-64 environment. domU creation is OK.
However the weird thing is not HVM domain itself. Instead system
crashed on dom0 context. I saw once with some stack dump that
xen''s page fault handler is executed on a dom0''s stack which then
causes nested page fault due to unable to fetch vcpu pointer.
2012 Dec 10
26
[PATCH 00/11] Add virtual EPT support Xen.
From: Zhang Xiantao <xiantao.zhang@intel.com>
With virtual EPT support, L1 hyerpvisor can use EPT hardware
for L2 guest''s memory virtualization. In this way, L2 guest''s
performance can be improved sharply. According to our testing,
some benchmarks can show > 5x performance gain.
Signed-off-by: Zhang Xiantao <xiantao.zhang@intel.com>
Zhang Xiantao (11):
2011 Nov 17
29
[PATCH 00 of 17] Documentation updates
The following series flushes my documentation queue and replaces
previous postings of those patches.
The main difference is that the xl cfg file is now formatted using POD
instead of markdown and presented as a manpage.
I have setup a cron job to build docs/html and publish it at
http://xenbits.xen.org/docs/unstable/ (it''s a bit bare right now).
The motivation for some of these patches