[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-changelog] [xen-4.2-testing] nested vmx: enable IA32E mode while do VM entry


  • To: xen-changelog@xxxxxxxxxxxxxxxxxxx
  • From: Xen patchbot-4.2-testing <patchbot@xxxxxxx>
  • Date: Thu, 20 Dec 2012 04:33:11 +0000
  • Delivery-date: Thu, 20 Dec 2012 04:33:18 +0000
  • List-id: "Change log for Mercurial \(receive only\)" <xen-changelog.lists.xen.org>

# HG changeset patch
# User Dongxiao Xu <dongxiao.xu@xxxxxxxxx>
# Date 1355918238 -3600
# Node ID 907dcffd028495578a4b4ef4a3694b1c98920521
# Parent  44ec641fcbd5931270b22ef88e401c3621df8cb9
nested vmx: enable IA32E mode while do VM entry

Some VMMs may check the platform capability to judge whether long
mode guest is supported. Therefore we need to expose this bit to
guest VMM.

Xen on Xen works fine in current solution because Xen doesn't
check this capability but directly set it in VMCS if guest
supports long mode.

Signed-off-by: Dongxiao Xu <dongxiao.xu@xxxxxxxxx>
Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
xen-unstable changeset: 26255:1ed1507fa040
xen-unstable date: Thu Dec  6 16:57:26 UTC 2012
---


diff -r 44ec641fcbd5 -r 907dcffd0284 xen/arch/x86/hvm/vmx/vvmx.c
--- a/xen/arch/x86/hvm/vmx/vvmx.c       Wed Dec 19 12:56:35 2012 +0100
+++ b/xen/arch/x86/hvm/vmx/vvmx.c       Wed Dec 19 12:57:18 2012 +0100
@@ -1351,7 +1351,7 @@ int nvmx_msr_read_intercept(unsigned int
     case MSR_IA32_VMX_ENTRY_CTLS:
         /* bit 0-8, and 12 must be 1 (refer G5 of SDM) */
         data = 0x11ff;
-        data = (data << 32) | data;
+        data = ((data | VM_ENTRY_IA32E_MODE) << 32) | data;
         break;
 
     case IA32_FEATURE_CONTROL_MSR:

_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.