Displaying 20 results from an estimated 2000 matches similar to: "[HVM][SVM][PATCH][2/2] Delay ExtInt Injection"
2006 Oct 19
0
[HVM][SVM][PATCH][1/2] VINTR intercept signal
These two patches affect the interrupt injection logic for AMD-V (only).
These patches fix issues with Windows HVM guests during boot menu
screen:
1) the timer countdown is no longer very slow
2) kbd response is now no longer slow or non-existent
We have also seen an occasional "dma lost interrupt"/expiry errors, and
these patches seem to help with these, especially with SUSE10 HVM
2007 Jan 31
7
[PATCH][SVM] remove FFXSR CPUID bit for AMD-V HVM guests
Remove visibility of the FFXSR CPUID bit to an HVM guest.
This patch allows HVM Windows x64 to install/boot on AMD-V platforms.
This patches applies cleanly to xen-unstable 13743.
Please apply to xen-unstable/3.0.5.
If possible, pls apply to xen-3.0.4-testing.
--Tom
thomas.woller@amd.com
AMD Corporation
5204 E. Ben White Blvd. UBC1
Austin, Texas 78741
+1-512-602-0059
2006 Feb 08
2
[PATCH][SVM] tlb control enable
Attached patch for svm will enable a tlb flush for each vmrun.
Applies cleanly to 8781:dcc2beb8a1d2
Signed-off-by: Tom Woller <thomas.woller@amd.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2006 Feb 24
2
[PATCH][discuss] evtchn race condition
Keir,
below/attached patch is necessary to allow SVM partitions to boot
unmodified guests with xen-unstable.hg c/s 8961. c/s 8822 and 8828
(some necessary evtchn modifications) cause SVM partitions to fail with
"lost interrupt" hda error during boot.
We currently do not understand why these modifications are necessary and
in fact, a race occurs with one part of the patch (added
2006 Sep 29
0
[SVM][PATCH] Remove unnecessary intr assist guest iF check
AMD-V does not require the delaying of interrupt injection if the guest
IF_FLAG disallows interrupts. Remove the code in svm_intr_assist() that
was checking the guest IF in eflags.
This patch fixes the problem with HVM Windows guests, with observing a
very slow timer countdown on the initial boot menu, when there is more
than one boot option. Kbd response in this same Windows boot menu is
also
2007 Mar 05
0
[PATCH 5/5] SVM: Clear VMCB''s EFER.LME when guest disables paging
[SVM] Clear VMCB''s EFER.LME when guest disables paging
Since the guest''s CR0.PG is always set (in shadow paging), EFER.LME must
be cleared along with EFER.LMA when the guest is disabling paging.
Signed-off-by: Travis Betak <travis.betak@amd.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
2006 Feb 28
0
[PATCH][SVM] svm 64bit initial support
SVM patch to add 64bit hv support.
This patch only modifies svm files.
Tested with c/s 9015 with 32bit hv using UP Dom0, with UP linux and
winxpsp1 unmodified guests.
Tested with c/s 9015 with 64bit hv using UP Dom0, with 32bit and 64bit
UP linux and 32bit winxpsp1.
Applies cleanly to 9016.
Please apply.
Signed-off-by: Tom Woller <thomas.woller@amd.com>
2006 Mar 01
2
[PATCH][SVM] 32bit msr support/enable 64bit vlapic
Svm patch to add 32bit msr support (combined both 32bit with 64bit
functions)
and enable vlapic for 64bit.
Applies cleanly to 9023.
Please apply.
Signed-off-by: Tom Woller <thomas.woller@amd.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2006 May 16
0
[PATCH][SVM][5/5] add hsa for ucode
SVM patch to add a host save area per core for the hypervisor and also
for the microcode. The microcode area is not guaranteed to be
compatible with the vmcb layout, therefore will require it''s own
"scratch pad". Consolidate the per core areas into a single structure.
Applies cleanly to 10002.
Please apply to xen-unstable.hg.
Please apply to xen-3.0-testing.hg.
2006 Jul 25
0
[SVM][PATCH] fix CONFIG_PAGING_LEVELS tests
Correct compile time compare of CONFIG_PAGING_LEVELS for 64bit and 32bit
PAE guests.
This code affects accesses to the CR4 register by the SVM guest.
Applies cleanly to 10729 + posted NMI/STGI SVM patch.
Please apply to xen-unstable.hg.
Signed-off-by: Tom Woller <thomas.woller@amd.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
2006 May 16
0
[PATCH][SVM][1/5] cleanup IOIO handling
SVM patch to cleanup IOIO handling, do not use "real" mode but rather
the correct "bitness".
Applies cleanly to 10002.
Please apply to xen-unstable.hg.
Please apply to xen-3.0-testing.hg.
Signed-off-by: Tom Woller <thomas.woller@amd.com>
Signed-off-by: Mats Petersson <mats.petersson@amd.com>
_______________________________________________
Xen-devel mailing list
2006 Apr 12
0
[PATCH][SVM][1/5] add init intercept handler
SVM patch to add add init intercept handler.
Applies cleanly to 9622.
Please apply.
Signed-off-by: Tom Woller <thomas.woller@amd.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2006 Mar 28
0
[PATCH][SVM] update guest time code
SVM patch to update guest time with latest hvm modifications.
Applies cleanly to 9457.
Please apply.
Signed-off-by: Tom Woller <thomas.woller@amd.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2006 Mar 22
0
[PATCH][SVM] fix guest time/msr64
SVM patch to fix guest time, including 64bit msr code - allowing 64bit
linux guests to enable APIC (ie. apic=1 now works in guest config file).
Applies cleanly to 9383 changeset.
Please apply.
Signed-off-by: Tom Woller <thomas.woller@amd.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2006 May 30
0
[PATCH][SVM] CPUID cleanup
Attached SVM patch fixes a virtualization of the CPUID NX bit, and
cleans up other CPUID bits.
Applies cleanly to xen-unstable.hg 10177.
Applies to xen-3.0-testing 9696.
Please apply to xen-unstable.hg.
Please apply to xen-3.0-testing.hg.
Tested on top of the KY patches for XCHG (HVM) and SMP SVM support.
Keir,
Can those 2 patches KY posted last week, also be applied to 3.0.2?
2006 Oct 19
0
[HVM][XENOPROFILE][PATCH][3/4] oprofile HVM specific functionality
Add xenoprofile function to oprofile to obtain the mode, adding check
for hvm guest.
Applies cleanly to xen-unstable c/s 11831.
Please apply to xen-unstable.hg.
We also want these patches to be in a 3.0.3-1 base whenever that is
branched.
Signed-off-by: Tom Woller <thomas.woller@amd.com>
--Tom
_______________________________________________
Xen-devel mailing list
2006 Oct 19
0
[HVM][XENOPROFILE][PATCH][1/4] remove do_nmi() from AMD-V vmexit handler
Remove the do_nmi() call from the vmexit logic, as the NMI is held
pending
and will be handled in the context of the host when the STGI instruction
is executed.
This patch only modifies AMD-V code.
This patch is required even without the other Xenoprofile patches
applied.
Applies cleanly to c/s 11831.
Please apply to xen-unstable.hg regardless of the other patches.
We also want these patches
2006 Sep 15
10
[HVM][XENOPROFILE][RFC][0/3] xenoprofile HVM patches
Keir,
The following 3 patches allow HVM (SVM and VT) guests to be passively
profiled using the very latest patches from Renato. These patches apply
to 11470.
Renato''s patches:
http://xenoprof/sourceforge.net oprofile-0.9.1-xen-r2.patch
And also a patch not posted FAIK
(oprofile-0.9.1-fix-hvm-addr-overlap.patch) which is in the attached
tar.bz2 file.
hvm_xenoprofile_1.patch -
The first
2008 Mar 20
0
[RFC/PATCH 03/15] preparation: address of the 64bit extint parm in lowcore
From: Christian Borntraeger <borntraeger at de.ibm.com>
The address 0x11b8 is used by z/VM for pfault and diag 250 I/O to
provide a 64 bit extint parameter. virtio uses the same address, so
its time to update the lowcore structure.
Acked-by: Martin Schwidefsky <schwidefsky at de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger at de.ibm.com>
Signed-off-by: Carsten
2010 Nov 14
1
score test for logistic regression
Dear R experts,
I'm trying to find a code to calculate the p-value from the score test for the logistic regression. My fit is like this: logit=beta0+beta1*x1+beta2*x2 +....+ betak* xk. And my H0 is beta1=beta2=...=betak =0.
Any help will be highly appreciated. Thank you!
Ying