similar to: [PATCH][2/5] x86-64-longs.patch

Displaying 20 results from an estimated 20000 matches similar to: "[PATCH][2/5] x86-64-longs.patch"

2005 Apr 19
0
[PATCH][1/5] x86-64-eax.patch
vmx_vmcs.c: fix inline asms for x86-64 Signed-Off-By: Benjamin Liu <benjamin.liu@intel.com> Signed-Off-By: Arun Sharma <arun.sharma@intel.com> diff -Nru a/xen/arch/x86/vmx_vmcs.c b/xen/arch/x86/vmx_vmcs.c --- a/xen/arch/x86/vmx_vmcs.c 2005-04-18 16:49:37 -07:00 +++ b/xen/arch/x86/vmx_vmcs.c 2005-04-18 16:49:37 -07:00 @@ -187,7 +187,7 @@ vmx_setup_platform(ed, ec);
2007 Jan 11
6
[PATCH 4/8] HVM save restore: vcpu context support
[PATCH 4/8] HVM save restore: vcpu context support Signed-off-by: Zhai Edwin <edwin.zhai@intel.com> save/restore HVM vcpu context such as vmcs diff -r ee20d1905bde xen/arch/x86/domain.c --- a/xen/arch/x86/domain.c Thu Jan 11 16:40:55 2007 +0800 +++ b/xen/arch/x86/domain.c Thu Jan 11 16:46:59 2007 +0800 @@ -573,6 +573,7 @@ int arch_set_info_guest( else {
2005 Aug 11
0
[PATCH][VT][1/15] Fix config file parsing for VMX domains.
Fix config file parsing for VMX domains. If we define "vif" in the config file, image.py will raise error "vmx: missing vbd configuration". The reason is "vif" is dealt with as a "vbd" device. This patch fixes this issue by dealing with "vbd" and "vif " separately, removing "macaddr" arg and parsing mac address from
2005 Jun 09
0
[PATCH] vmx-doirq-vector.patch
do_IRQ() expects a vector instead of an irq now due to a recent change. With this patch, VMX domains can boot again. Signed-off-by: Arun Sharma <arun.sharma@intel.com> --- a/xen/arch/x86/vmx.c Wed Jun 8 23:08:01 2005 +++ b/xen/arch/x86/vmx.c Thu Jun 9 01:03:30 2005 @@ -1262,8 +1262,7 @@ if (vector == LOCAL_TIMER_VECTOR) { smp_apic_timer_interrupt(&regs);
2005 Sep 05
2
[PATCH][1/6] add a hypercall number for virtual device in unmodified guest
add a hypercall number for virtual device in unmodified guest There are 6 patches for para-driver support in vmx guest. This is the first one. Signed-off-by: Xiaofeng Ling <xiaofeng.ling@intel.com> Signed-off-by: Arun Sharma <arun.sharma@intel.com> diff -r 287d36b46fa3 xen/arch/x86/x86_32/entry.S --- a/xen/arch/x86/x86_32/entry.S Tue Aug 30 20:36:49 2005 +++
2005 Jul 04
0
[PATCH] MSR save/restore for x86_64 VMX domains
To avoid MSR save/restore at every VM exit/entry time, we restore the x86_64 specific MSRs at domain switch time if modified. In VMX domains, we modify those upon requests from the guests to that end. Note that IA32_EFER.LME and IA32_EFER.LMA are saved/restored by H/W on every VM exit. For the usual domains (i.e. dom0 and domU), those MSRs are not modified once set at initialization time, so we
2005 Sep 05
0
[PATCH][4/6] Add to virtual device operations
Add two virtual device operations: 1.set the callback irq for event channel 2.setup the hypercall paramerter share page. Signed-off-by: Ke Yu <ke.yu@intel.com> Signed-off-by: Xiaofeng Ling <xiaofeng.ling@intel.com> Signed-off-by: Arun Sharma <arun.sharma@intel.com> diff -r 287d36b46fa3 xen/arch/x86/vmx.c --- a/xen/arch/x86/vmx.c Tue Aug 30 20:36:49 2005 +++
2005 Apr 30
0
[PATCH] vmx-mach-to-phys.patch
VMX domains need to setup their machine to physical maps. Signed-off-by: Arun Sharma <arun.sharma@intel.com> --- 1.21/tools/libxc/xc_vmx_build.c 2005-04-28 11:04:44 -07:00 +++ edited/tools/libxc/xc_vmx_build.c 2005-04-29 18:28:13 -07:00 @@ -313,6 +313,16 @@ munmap(vl1tab, PAGE_SIZE); munmap(vl2tab, PAGE_SIZE); + /* Write the machine->phys table entries. */ + for (
2005 Jun 30
0
[PATCH][9/10] Support VMX guests with 512M/1G memory.
Support VMX guests with 512M/1G memory. Signed-off-by: Edwin Zhai <edwin.zhai@intel.com> Signed-off-by: Arun Sharma <arun.sharma@intel.com> diff -r f6e5bd774f51 -r 13e02f197018 tools/ioemu/configure diff -r 2d6fd3bba3c2 -r 2d289d7ab961 tools/ioemu/configure --- a/tools/ioemu/configure Thu Jun 30 05:24:52 2005 +++ b/tools/ioemu/configure Thu Jun 30 05:26:09 2005 @@ -490,6 +490,8 @@
2005 Jun 30
0
[PATCH][2/10] Extend the VMX intercept mechanism to include mmio as well as portio.
Extend the VMX intercept mechanism to include mmio as well as portio. Signed-off-by: Yunhong Jiang <yunhong.jiang@intel.com> Signed-off-by: Xiaofeng Ling <xiaofeng.ling@intel.com> Signed-off-by: Arun Sharma <arun.sharma@intel.com> diff -r febfcd0a1a0a -r 9a43d5c12b95 xen/include/asm-x86/vmx_platform.h --- a/xen/include/asm-x86/vmx_platform.h Thu Jun 30 03:20:48 2005 +++
2005 Jun 30
0
[PATCH] Device model path cleanup
Device model path cleanup. Remove bochsrc which is no longer needed. Signed-off-by: Arun Sharma <arun.sharma@intel.com> --- a/tools/examples/xmexample.vmx Thu Jun 30 18:41:11 2005 +++ b/tools/examples/xmexample.vmx Thu Jun 30 18:59:08 2005 @@ -89,10 +89,10 @@ # New stuff -device_model = ''/usr/bin/qemu-dm'' +device_model = ''/usr/lib/xen/bin/qemu-dm''
2012 Sep 14
0
[ PATCH v3 2/3] xen: enable Virtual-interrupt delivery
Change from v2: re-written code in ''vmx_intr_assist'' into if()/else if() sequence to make code change easy to review. Virtual interrupt delivery avoids Xen to inject vAPIC interrupts manually, which is fully taken care of by the hardware. This needs some special awareness into existing interrupr injection path: For pending interrupt from vLAPIC, instead of direct injection, we
2005 May 24
0
[PATCH] qemu-unregister-c0000.patch
QEMU fixes - VMX domain owns 0xcxxxx. - guard the fprintf with a log level check Signed-off-by: Arun Sharma <arun.sharma@intel.com> --- 1.1/tools/ioemu/hw/pc.c 2005-05-19 15:04:52 -07:00 +++ edited/tools/ioemu/hw/pc.c 2005-05-23 16:37:18 -07:00 @@ -419,11 +419,11 @@ ret = load_image(buf, phys_ram_base + vga_bios_offset); #endif +#ifndef NOBIOS /* setup basic memory access
2005 Apr 02
1
[PATCH] VMX support for MMIO/PIO in VM8086 mode
Memory mapped and port I/O is currently broken under VMX when the partition is running in VM8086 mode. The reason is that the instruction decoding support uses 32-bit opcode/address decodes rather 16-bit decodes. This patch fixes that. In addition, the patch adds support for the "stos" instruction decoding because this is a frequently used way to clear MMIO areas such as the screen. As
2005 Nov 03
0
[PATCH] vmx-platform-vmread.patch
Simplified vmx_platform.c by removing obsolete code and redundant vmread''s. Signed-Off-By: Leendert van Doorn <leendert@watson.ibm.com> diff -r 9cdfcecf4968 xen/arch/x86/vmx_platform.c --- a/xen/arch/x86/vmx_platform.c Wed Nov 2 16:29:32 2005 +++ b/xen/arch/x86/vmx_platform.c Wed Nov 2 21:12:02 2005 @@ -366,20 +366,15 @@ return DECODE_success; } -static int
2013 Jan 29
1
[PATCH v4 1/2] Xen: Fix live migration while enabling APICV
SVI should be restored in case guest is processing virtual interrupt while saveing a domain state. Otherwise SVI would be missed when virtual interrupt delivery is enabled. Signed-off-by: Jiongxi Li <jiongxi.li@intel.com> diff --git a/xen/arch/x86/hvm/vlapic.c b/xen/arch/x86/hvm/vlapic.c index ee2294c..38ff216 100644 --- a/xen/arch/x86/hvm/vlapic.c +++ b/xen/arch/x86/hvm/vlapic.c @@
2012 May 14
7
[PATCH v3] Fix the mistake of exception execution
Fix the mistake for debug exception(#DB), overflow exception(#OF; generated by INTO) and int 3(#BP) instruction emulation. For INTn (CD ib), it should use type 4 (software interrupt). For INT3 (CC; NOT CD ib with ib=3) and INTO (CE; NOT CD ib with ib=4), it should use type 6 (software exception). For other exceptions (#DE, #DB, #BR, #UD, #NM, #TS, #NP, #SS, #GP, #PF, #MF, #AC, #MC, and #XM), it
2008 Mar 14
4
[PATCH] vmx: fix debugctl handling
I recently realized that the original way of dealing with the DebugCtl MSR on VMX failed to make use of the dedicated guest VMCS field. This is being fixed with this patch. What is puzzling me to a certain degree is that while there is a guest VMCS field for this MSR, there''s no equivalent host load field, but there''s also no indication that the MSR would be cleared during a
2012 Sep 11
0
[PATCH 1/3] x86/hvm: don't use indirect calls without need
Direct calls perform better, so we should prefer them and use indirect ones only when there indeed is a need for indirection. Signed-off-by: Jan Beulich <jbeulich@suse.com> --- a/xen/arch/x86/apic.c +++ b/xen/arch/x86/apic.c @@ -1373,7 +1373,7 @@ void error_interrupt(struct cpu_user_reg void pmu_apic_interrupt(struct cpu_user_regs *regs) { ack_APIC_irq(); -
2016 Sep 02
0
CentOS Digest, Vol 140, Issue 1
On Thu, Sep 1, 2016 at 5:30 PM, <centos-request at centos.org> wrote: > Send CentOS mailing list submissions to > centos at centos.org > > To subscribe or unsubscribe via the World Wide Web, visit > https://lists.centos.org/mailman/listinfo/centos > or, via email, send a message with subject or body 'help' to > centos-request at