[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] AMD support of hvm_vcpu.single_step



On Wed, 11 Jun 2014 11:56:15 -0400
Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx> wrote:

> On 06/10/2014 05:49 PM, Mukesh Rathor wrote:
> > Hi AMD folks,
> >
> > I am unable to see support of single step on amd platform. On intel,
> > hvm_vcpu.single_step will cause MTF to be set in vmx_intr_assist:
> >
> >      /* Block event injection when single step with MTF. */
> >      if ( unlikely(v->arch.hvm_vcpu.single_step) )
> >      {
> >          v->arch.hvm_vmx.exec_control |=
> > CPU_BASED_MONITOR_TRAP_FLAG; vmx_update_cpu_exec_control(v);
> >          return;
> >      }
> >
> > I don't see equivalent on amd?
> 
> I think HW performs TF bit manipulations that your patch is
> suggesting (per 13.1.4 of APMv2)

It only clears it, not set it. Patch on the way.

thanks
mukesh


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.