Displaying 20 results from an estimated 10000 matches similar to: "[SVM][PATCH] fix CONFIG_PAGING_LEVELS tests"
2006 Sep 15
0
[HVM][XENOPROFILE][PATCH][2/3] xenoprofile HVM patches
second patch (SVM) for hvm xenoprofile support.
Applies cleanly to 11470.
Signed-off-by: Tom Woller <thomas.woller@amd.com>
Please apply to xen-unstable.hg.
hvm_xenoprofile_2.patch -
The second patch adds the actual xenoprofile fixes for SVM:
1) hvm function (svm_oprofile_get_eip())
This new hvm table function is called from the op_module_athlon.c code,
and returns the proper eip and
2006 Sep 15
10
[HVM][XENOPROFILE][RFC][0/3] xenoprofile HVM patches
Keir,
The following 3 patches allow HVM (SVM and VT) guests to be passively
profiled using the very latest patches from Renato. These patches apply
to 11470.
Renato''s patches:
http://xenoprof/sourceforge.net oprofile-0.9.1-xen-r2.patch
And also a patch not posted FAIK
(oprofile-0.9.1-fix-hvm-addr-overlap.patch) which is in the attached
tar.bz2 file.
hvm_xenoprofile_1.patch -
The first
2007 Aug 09
0
[PATCH] x86/hvm: miscellaneous CPUID handling changes
- use __clear_bit() rather than clear_bit()
- use switch statements instead of long series of if-s
- eliminate pointless casts
(Applies cleanly only on top of the previously sent SVM/EFER patch.)
Signed-off-by: Jan Beulich <jbeulich@novell.com>
Index: 2007-08-08/xen/arch/x86/hvm/hvm.c
===================================================================
---
2006 Oct 19
0
[HVM][XENOPROFILE][PATCH][1/4] remove do_nmi() from AMD-V vmexit handler
Remove the do_nmi() call from the vmexit logic, as the NMI is held
pending
and will be handled in the context of the host when the STGI instruction
is executed.
This patch only modifies AMD-V code.
This patch is required even without the other Xenoprofile patches
applied.
Applies cleanly to c/s 11831.
Please apply to xen-unstable.hg regardless of the other patches.
We also want these patches
2006 Feb 28
0
[PATCH][SVM] svm 64bit initial support
SVM patch to add 64bit hv support.
This patch only modifies svm files.
Tested with c/s 9015 with 32bit hv using UP Dom0, with UP linux and
winxpsp1 unmodified guests.
Tested with c/s 9015 with 64bit hv using UP Dom0, with 32bit and 64bit
UP linux and 32bit winxpsp1.
Applies cleanly to 9016.
Please apply.
Signed-off-by: Tom Woller <thomas.woller@amd.com>
2006 May 30
0
[PATCH][SVM] CPUID cleanup
Attached SVM patch fixes a virtualization of the CPUID NX bit, and
cleans up other CPUID bits.
Applies cleanly to xen-unstable.hg 10177.
Applies to xen-3.0-testing 9696.
Please apply to xen-unstable.hg.
Please apply to xen-3.0-testing.hg.
Tested on top of the KY patches for XCHG (HVM) and SMP SVM support.
Keir,
Can those 2 patches KY posted last week, also be applied to 3.0.2?
2006 Feb 08
2
[PATCH][SVM] tlb control enable
Attached patch for svm will enable a tlb flush for each vmrun.
Applies cleanly to 8781:dcc2beb8a1d2
Signed-off-by: Tom Woller <thomas.woller@amd.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2006 Mar 01
2
[PATCH][SVM] 32bit msr support/enable 64bit vlapic
Svm patch to add 32bit msr support (combined both 32bit with 64bit
functions)
and enable vlapic for 64bit.
Applies cleanly to 9023.
Please apply.
Signed-off-by: Tom Woller <thomas.woller@amd.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2006 May 16
0
[PATCH][SVM][5/5] add hsa for ucode
SVM patch to add a host save area per core for the hypervisor and also
for the microcode. The microcode area is not guaranteed to be
compatible with the vmcb layout, therefore will require it''s own
"scratch pad". Consolidate the per core areas into a single structure.
Applies cleanly to 10002.
Please apply to xen-unstable.hg.
Please apply to xen-3.0-testing.hg.
2006 May 16
0
[PATCH][SVM][1/5] cleanup IOIO handling
SVM patch to cleanup IOIO handling, do not use "real" mode but rather
the correct "bitness".
Applies cleanly to 10002.
Please apply to xen-unstable.hg.
Please apply to xen-3.0-testing.hg.
Signed-off-by: Tom Woller <thomas.woller@amd.com>
Signed-off-by: Mats Petersson <mats.petersson@amd.com>
_______________________________________________
Xen-devel mailing list
2006 Apr 12
0
[PATCH][SVM][1/5] add init intercept handler
SVM patch to add add init intercept handler.
Applies cleanly to 9622.
Please apply.
Signed-off-by: Tom Woller <thomas.woller@amd.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2006 Mar 28
0
[PATCH][SVM] update guest time code
SVM patch to update guest time with latest hvm modifications.
Applies cleanly to 9457.
Please apply.
Signed-off-by: Tom Woller <thomas.woller@amd.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2006 Mar 22
0
[PATCH][SVM] fix guest time/msr64
SVM patch to fix guest time, including 64bit msr code - allowing 64bit
linux guests to enable APIC (ie. apic=1 now works in guest config file).
Applies cleanly to 9383 changeset.
Please apply.
Signed-off-by: Tom Woller <thomas.woller@amd.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2006 Oct 19
0
[HVM][SVM][PATCH][1/2] VINTR intercept signal
These two patches affect the interrupt injection logic for AMD-V (only).
These patches fix issues with Windows HVM guests during boot menu
screen:
1) the timer countdown is no longer very slow
2) kbd response is now no longer slow or non-existent
We have also seen an occasional "dma lost interrupt"/expiry errors, and
these patches seem to help with these, especially with SUSE10 HVM
2006 Oct 19
2
[HVM][SVM][PATCH][2/2] Delay ExtInt Injection
Patch 2/2 -
Add flag to indicate that an exception event needs injecting, and to
delay
the ext interrupt injection.
Remove unnecessary check of RFLAGS.IF for ExtInt injection.
Applies cleanly to xen-unstable c/s 11831.
Please apply to xen-unstable.hg.
We would also want this patch to be in a 3.0.3-1 base whenever that is
branched.
Signed-off-by: Travis Betak <travis.betak@amd.com>
2006 Sep 29
0
[SVM][PATCH] Remove unnecessary intr assist guest iF check
AMD-V does not require the delaying of interrupt injection if the guest
IF_FLAG disallows interrupts. Remove the code in svm_intr_assist() that
was checking the guest IF in eflags.
This patch fixes the problem with HVM Windows guests, with observing a
very slow timer countdown on the initial boot menu, when there is more
than one boot option. Kbd response in this same Windows boot menu is
also
2006 Feb 24
2
[PATCH][discuss] evtchn race condition
Keir,
below/attached patch is necessary to allow SVM partitions to boot
unmodified guests with xen-unstable.hg c/s 8961. c/s 8822 and 8828
(some necessary evtchn modifications) cause SVM partitions to fail with
"lost interrupt" hda error during boot.
We currently do not understand why these modifications are necessary and
in fact, a race occurs with one part of the patch (added
2007 Jan 31
7
[PATCH][SVM] remove FFXSR CPUID bit for AMD-V HVM guests
Remove visibility of the FFXSR CPUID bit to an HVM guest.
This patch allows HVM Windows x64 to install/boot on AMD-V platforms.
This patches applies cleanly to xen-unstable 13743.
Please apply to xen-unstable/3.0.5.
If possible, pls apply to xen-3.0.4-testing.
--Tom
thomas.woller@amd.com
AMD Corporation
5204 E. Ben White Blvd. UBC1
Austin, Texas 78741
+1-512-602-0059
2014 May 28
2
Divide error in kvm_unlock_kick()
Running a 3.14.4 x86-64 SMP guest kernel on qemu-2.0, with kvm enabled and
-cpu host on a 3.14.4 AMD Opteron host, I'm seeing a reliable kernel panic from
the guest shortly after boot. I think is happening in kvm_unlock_kick() in the
paravirt_ops code:
divide error: 0000 [#1] PREEMPT SMP
Modules linked in:
CPU: 1 PID: 0 Comm: swapper/1 Not tainted 3.14.4-guest #16
Hardware name: QEMU
2014 May 28
2
Divide error in kvm_unlock_kick()
Running a 3.14.4 x86-64 SMP guest kernel on qemu-2.0, with kvm enabled and
-cpu host on a 3.14.4 AMD Opteron host, I'm seeing a reliable kernel panic from
the guest shortly after boot. I think is happening in kvm_unlock_kick() in the
paravirt_ops code:
divide error: 0000 [#1] PREEMPT SMP
Modules linked in:
CPU: 1 PID: 0 Comm: swapper/1 Not tainted 3.14.4-guest #16
Hardware name: QEMU