Displaying 20 results from an estimated 5000 matches similar to: "xen hvm profiling"
2009 Jan 07
4
xentrace and MSR_READ/MSR_WRITE
I am trying to learn some more about the way windows does TPR writes,
and tried xentrace for the first time.
I did ''xentrace --time-interval=5 xentrace.out'' to capture some data,
and then ran it through ''xentrace_format'' using the supplied example
defs file. I can see some PF_XEN entries with virt=0xFFFE0080 (address
of TPR), but I want to know the value being
2009 Feb 10
7
hang on restore in 3.3.1
I am having problems with save/restore under 3.3.1 in the GPLPV drivers.
I call hvm_shutdown(xpdd, SHUTDOWN_suspend), but as soon as I lower IRQL
(enabling interrupts), qemu goes to 100% CPU and the DomU load goes
right up too.
Xentrace is showing a whole lot of this going on:
CPU0 200130258143212 (+ 770) hypercall [ rip =
0x000000008020632a, eax = 0xffffffff ]
CPU0 200130258151107 (+
2009 Feb 26
6
Re: Questions on gdbsx
yujiageng734 wrote:
> Hi,
>
> I am trying to use your gdbsx. But I don''t know how to make a 32bit
> dom0 running on 64bit hypervisor. Can you explain this for me? I''m
> extremely grateful to you.
Hmm.. good question. I don''t know, it''s always done for me here. One
option would be to just download OVM from edelivery.oracle.com,
2006 Sep 15
10
[HVM][XENOPROFILE][RFC][0/3] xenoprofile HVM patches
Keir,
The following 3 patches allow HVM (SVM and VT) guests to be passively
profiled using the very latest patches from Renato. These patches apply
to 11470.
Renato''s patches:
http://xenoprof/sourceforge.net oprofile-0.9.1-xen-r2.patch
And also a patch not posted FAIK
(oprofile-0.9.1-fix-hvm-addr-overlap.patch) which is in the attached
tar.bz2 file.
hvm_xenoprofile_1.patch -
The first
2007 Feb 26
4
[PATCH][xentrace][HVM] introduce HVM tracing to unify SVM and VMX tracing
Hello,
this patch introduces HVM tracing: one tracing class for both, SVM and
VMX.
It adds several new trace events. So we can differentiate between them
in the xentrace formats file and format each event''s data items
appropriately. With this patch the xentrace_format output is much more
informative.
The previous simple tracing in SVM and VMX is completely replaced.
Unfortunately I
2008 Nov 24
2
no such file or directory
hello list:
I add some code to xen-3.1.0-src\xen\arch\x86\hvm\vmx\vmx.c to export some information when vmx_vmexit_handler() executed:
-------------------------------------------------------------------------------------------------
--- vmx.c 2007-05-18 22:45:22.000000000 +0800
+++ vmx-patch.c 2008-11-24 14:19:18.000000000 +0800
@@ -50,7 +50,9 @@
#include <asm/hvm/vpt.h>
#include
2013 Aug 22
9
[PATCH v3 0/4] Nested VMX: APIC-v related bug fixing
From: Yang Zhang <yang.z.zhang@Intel.com>
The following patches fix the issue that fail to boot L2 guest on APIC-v
available machine. The main problem is that with APIC-v, virtual interrupt inject
L1 is totally through APIC-v. But if virtual interrupt is arrived when L2 is running,
L1 will detect interrupt through vmexit with reason external interrupt. If this happens,
we should update
2006 Oct 19
0
[HVM][XENOPROFILE][PATCH][1/4] remove do_nmi() from AMD-V vmexit handler
Remove the do_nmi() call from the vmexit logic, as the NMI is held
pending
and will be handled in the context of the host when the STGI instruction
is executed.
This patch only modifies AMD-V code.
This patch is required even without the other Xenoprofile patches
applied.
Applies cleanly to c/s 11831.
Please apply to xen-unstable.hg regardless of the other patches.
We also want these patches
2006 Dec 01
0
[PATCH] A fix for CR8 acceleration on 64bit guest
This patch is a small fix for CR8 acceleration on 64bit guest.
For current CR8 acceleration, we do not call update_tpr_threshold() at
every VMEXIT.
But at some situations, we cannot inject guest interrupts in time. And
at some critical time, it will bring up a blue screen to 64bit Windows
guest.
Try this scenario:
1) At one VMIT, tpr = TPR_THRESHOLD, but tpr < pending IRQ, and we
2023 Jun 28
1
horizontal grouped stacked plots and removing space between bars
I have code like this:
data <- read.csv("test1.csv", stringsAsFactors=FALSE, header=TRUE)
# Graph
myplot=ggplot(data, aes(fill=condition, y=value, x=condition)) +
geom_bar(position="dodge", stat="identity", width=0.5) +
scale_fill_manual(values=c("#7b3294", "#c2a5cf", "#a6dba0", "#008837"))+
2006 Sep 15
0
[HVM][XENOPROFILE][PATCH][2/3] xenoprofile HVM patches
second patch (SVM) for hvm xenoprofile support.
Applies cleanly to 11470.
Signed-off-by: Tom Woller <thomas.woller@amd.com>
Please apply to xen-unstable.hg.
hvm_xenoprofile_2.patch -
The second patch adds the actual xenoprofile fixes for SVM:
1) hvm function (svm_oprofile_get_eip())
This new hvm table function is called from the op_module_athlon.c code,
and returns the proper eip and
2023 Jun 16
1
Issue with crammed Y axis
Hi,
I have a data frame like this:
> dput(df)
structure(list(ID = 1:8, Type = c("gmx mdrun -ntmpi 8 -ntomp 1 -s
benchPEP.tpr -nsteps 10000 -resethway",
"gmx mdrun -ntmpi 8 -ntomp 1 -s benchPEP.tpr -nsteps 10000 -resethway",
"gmx mdrun -ntmpi 8 -s benchPEP.tpr -nsteps 4000 -resetstep 3000",
"gmx mdrun -ntmpi 8 -s benchPEP.tpr -nsteps 4000 -resetstep
2006 Aug 02
1
[PATCH] Cleanup vmx vmexit handler.
Cleanup vmx vmexit handler.
Current code doesn''t handle vmexits caused by triple fault, INIT, SIPI,
etc, which are listed in IA32 Architecture System Programming Guide 2,
Appendix I VMX Basic Exit Reasons, and calls __hvm_bug() when not
handling such cases, actually domain crash should be good enough.
Also various coding style cleanups.
Signed-off-by: Xin Li <xin.b.li@intel.com>
2007 Mar 21
1
[Patch] Add VMX memory-mapped Local APIC access optimization
Some operating systems access the local APIC TPR very frequently, and we
handle that using software-based local APIC virtualization in Xen today.
Such virtualization incurs a number of VM exits from the memory-access
instructions against the APIC page in the guest.
The attached patch enables the TPR shadow feature that provides APIC TPR
virtualization in hardware. Our tests indicate it can
2006 Jul 31
1
[PATCH 5/6] xen, tools: calculate nr_cpus via num_online_cpus
Once Xen calculates nr_nodes properly, all nr_cpu calculations based on
nr_nodes * sockets_per_node * cores_per_socket * threads_per_core are
broken. The easy fix is to replace those calculations with a new field,
nr_cpus in physinfo which is calculated by num_online_cpus(). This
patch does so and attempts to change all users over to nr_cpus field in
physinfo. This patch touches
2006 Oct 30
1
RE: [Patch][RESEND] Add hardware CR8 acceleration for TPRaccessing
Any advice about the patch cr8-acceleration-3.patch?
Hi Keir, could you give some comments? Thanks!
-- Dexuan
-----Original Message-----
From: xen-devel-bounces@lists.xensource.com [mailto:xen-devel-bounces@lists.xensource.com] On Behalf Of Cui, Dexuan
Sent: 2006年10月25日 11:12
To: Keir.Fraser@cl.cam.ac.uk
Cc: xen-devel@lists.xensource.com
Subject: [Xen-devel] [Patch][RESEND] Add hardware CR8
2009 May 18
2
XP SP3 guest high CPU usage
Hi I''m getting very high CPU usage on idle for an XP SP3 guest, which is
doing nothing and is reporting 0% CPU within the guest.
xentop - 14:36:29 Xen 3.2-1
10 domains: 1 running, 9 blocked, 0 paused, 0 crashed, 0 dying, 0 shutdown
Mem: 4192752k total, 2654960k used, 1537792k free CPUs: 4 @ 3000MHz
NAME STATE CPU(sec) CPU(%) MEM(k) MEM(%) MAXMEM(k) MAXMEM(%)
VCPUS
2005 Oct 07
2
R version 2.01.1, Crimson Editor and the "one" from nowhere
Dear List....
sorry to bother you R-gurus with such an "unstatistical" question... but
I face a problem using Crimson Editor with R 2.01.1 that I never had
using R 2.00.1.
I already posted on the Crimson Editor forum but it seems to be VERY few
R-users there....
I successfully used R v2.00.1until now (under Windows XP professionnal,
version 2002, Service Pack 2, P4 processor CPU 1.8
2012 Dec 18
0
[PATCH] nested vmx: nested TPR shadow/threshold emulation
TPR shadow/threshold feature is important to speedup the boot time
for Windows guest. Besides, it is a must feature for certain VMM.
We map virtual APIC page address and TPR threshold from L1 VMCS,
and synch it into shadow VMCS in virtual vmentry.
If TPR_BELOW_THRESHOLD VM exit is triggered by L2 guest, we
inject it into L1 VMM for handling.
Besides, this commit fixes an issue for apic access
2019 Jul 15
3
[PATCH v2] x86/paravirt: Drop {read,write}_cr8() hooks
On 15/07/2019 19:17, Nadav Amit wrote:
>> On Jul 15, 2019, at 8:16 AM, Andrew Cooper <andrew.cooper3 at citrix.com> wrote:
>>
>> There is a lot of infrastructure for functionality which is used
>> exclusively in __{save,restore}_processor_state() on the suspend/resume
>> path.
>>
>> cr8 is an alias of APIC_TASKPRI, and APIC_TASKPRI is saved/restored