Displaying 20 results from an estimated 30000 matches similar to: "[PATCH] CPUID: leaf 4 sub-index goes in %ecx, not %ebx"
2011 Jul 04
0
[PATCH] Don''t expose CPUID time leaf when not using PVRDTSCP
# HG changeset patch
# User Paul Durrant <paul.durrant@citrix.com>
# Date 1309796247 -3600
# Node ID 6ce0dbc6f955707bf814d62a16a2b4382d957332
# Parent 7e4404a8f5f9bc111a80f15a2bce35378b39f2f1
Don''t expose CPUID time leaf when not using PVRDTSCP
Some versions of Oracle''s Solaris PV drivers make a check that the maximal
Xen hypervisor CPUID leaf is <= base leaf + 2 and
2011 May 30
6
[PATCH] CPUID level 0x00000007:0 (ebx) is word 9, instead of word 7
CPUID level 0x00000007:0 (ebx) is word 9, instead of word 7.
... make it consistent with native Linux.
Signed-off-by: Li Xin <xin.li@intel.com>
diff -r d7c755c25bb9 xen/include/asm-x86/cpufeature.h
--- a/xen/include/asm-x86/cpufeature.h Sat May 28 08:58:08 2011 +0100
+++ b/xen/include/asm-x86/cpufeature.h Tue May 31 07:34:34 2011 +0800
@@ -142,7 +142,7 @@
#define X86_FEATURE_TOPOEXT
2009 Nov 17
4
''lowest common denominator'' cpuid feature set
I want to be able to test live migration... I have an intel box and an
amd box, so live migration between them won''t ''just work''. From what
I''ve read though, I should be able to use cpuid to turn off all the cpu
features which might be different between them. Is this do-able? I''m
willing to accept any resulting loss of performance etc.
James
2005 Dec 13
0
[PATCH] Mask off the reserved features in cpuid (ecx = 1)
The patch prevents new potential features from being exposed to the
guests when not virtualized properly. Guests can attempt to set the
control registers, etc. (and get #GP and panic) if they are aware of the
new feature and the cpuid says it''s available.
Signed-off-by: <jun.nakajima@intel.com>
Jun
---
Intel Open Source Technology Center
2011 May 18
1
Re: [PATCH] x86: clear CPUID output of leaf 0xd for Dom0 when xs
Hi Jan,
I was wondering if we should not let the code fall through and clear all registers to zero but rather clear just the one bit we care about? My concern is that a future Intel revision may expand this function and return other information besides that XSAVEOPT, which would then be wiped out by the fall-through code. I''m thinking something like this. Let me know if I have
2008 Sep 03
1
[PATCH] Fix guest_handle_okay/guest_handle_subrange_okay
The guest handle checks should use paging_* predicates, not shadow_*.
Also tidy up a few places where p2m definitions were being imported
via asm/guest_access.h -> asm/shadow.h -> asm/p2m.h
Signed-off-by: Tim Deegan <Tim.Deegan@citrix.com>
--
Tim Deegan <Tim.Deegan@citrix.com>
Principal Software Engineer, Citrix Systems (R&D) Ltd.
[Company #02300071, SL9 0DZ, UK.]
2012 Feb 24
0
[xen-unstable test] 12043: regressions - FAIL
flight 12043 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/12043/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-rhel6hvm-amd 7 redhat-install fail REGR. vs. 12031
test-amd64-i386-rhel6hvm-intel 7 redhat-install fail REGR. vs. 12031
test-amd64-i386-xl-winxpsp3-vcpus1 7
2008 Oct 01
5
[RFC] CPUID usage for interaction between Hypervisors and Linux.
Hi,
Please find below the proposal for the generic use of cpuid space
allotted for hypervisors. Apart from this cpuid space another thing
worth noting would be that, Intel & AMD reserve the MSRs from 0x40000000
- 0x400000FF for software use. Though the proposal doesn't talk about
MSR's right now, we should be aware of these reservations as we may want
to extend the way we use CPUID to
2008 Oct 01
5
[RFC] CPUID usage for interaction between Hypervisors and Linux.
Hi,
Please find below the proposal for the generic use of cpuid space
allotted for hypervisors. Apart from this cpuid space another thing
worth noting would be that, Intel & AMD reserve the MSRs from 0x40000000
- 0x400000FF for software use. Though the proposal doesn't talk about
MSR's right now, we should be aware of these reservations as we may want
to extend the way we use CPUID to
2011 Feb 18
2
Re: Xen-devel Digest, Vol 71, Issue 85
Hi all!
Did the nested xen stuff make it into the xen-unstable (4.1-rc1?) tree as
suggested back in January by Tim Deegan?
TIA
________________________________
Date: Fri, 7 Jan 2011 16:01:12 +0000
From: Tim Deegan <Tim.Deegan@citrix.com>
Subject: Re: [Xen-devel] [PATCH 00/12] Nested Virtualization: Overview
To: Christoph Egger <Christoph.Egger@amd.com>
Cc: Keir Fraser
2008 Feb 28
0
[PATCH] Shadow audit fix
Shadow audit: paging-disabled shadows no longer need special treatment
when translating the frame numbers found in the entries.
multi.c | 31 +++++++++----------------------
1 file changed, 9 insertions(+), 22 deletions(-)
Signed-off-by: Tim Deegan <Tim.Deegan@citrix.com>
--
Tim Deegan <Tim.Deegan@citrix.com>
Principal Software Engineer, Citrix Systems (R&D) Ltd.
[Company
2008 Mar 10
0
[PATCH] SVM: handle page faults in emaulted instruction fetches
Deal with failures in hvm_copy_from_guest_virt when fetching instructions
in the various SVM emulation paths. Since we know that the instruction
was fetchable by the hardware, we can usually just return from the VMEXIT
and try again; whatever caused us to fail will cause the hardware to
fail next time and we''ll get the correct exit code.
Signed-off-by: Tim Deegan
2011 Jul 26
0
[xen-4.1-testing test] 8285: trouble: broken/fail/pass
flight 8285 xen-4.1-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/8285/
Failures and problems with tests :-(
Tests which did not succeed and are blocking:
test-amd64-i386-rhel6hvm-intel 3 host-install(3) broken
build-i386-oldkern 2 host-install(2) broken
test-amd64-i386-win-vcpus1 3 host-install(3) broken
2011 Jul 25
0
[xen-4.1-testing test] 8273: regressions - trouble: blocked/broken/fail/pass
flight 8273 xen-4.1-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/8273/
Regressions :-(
Tests which did not succeed and are blocking:
build-amd64 4 xen-build fail REGR. vs. 8257
build-amd64-pvops 4 kernel-build fail REGR. vs. 8257
build-amd64-oldkern 4 xen-build fail REGR. vs. 8257
2012 Apr 30
4
[PATCHv2] x86info: dump kvm cpuid's
The following makes 'x86info -r' dump hypervisor leaf cpu ids
(for kvm this is signature+features) when running in a vm.
On the guest we see the signature and the features:
eax in: 0x40000000, eax = 00000000 ebx = 4b4d564b ecx = 564b4d56 edx = 0000004d
eax in: 0x40000001, eax = 0100007b ebx = 00000000 ecx = 00000000 edx = 00000000
Hypervisor flag is checked to avoid output changes when
2012 Apr 30
4
[PATCHv2] x86info: dump kvm cpuid's
The following makes 'x86info -r' dump hypervisor leaf cpu ids
(for kvm this is signature+features) when running in a vm.
On the guest we see the signature and the features:
eax in: 0x40000000, eax = 00000000 ebx = 4b4d564b ecx = 564b4d56 edx = 0000004d
eax in: 0x40000001, eax = 0100007b ebx = 00000000 ecx = 00000000 edx = 00000000
Hypervisor flag is checked to avoid output changes when
2013 Aug 23
0
[xen-unstable test] 18753: regressions - FAIL
flight 18753 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/18753/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-win7-amd64 8 guest-saverestore fail REGR. vs. 18750
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-pcipt-intel 9 guest-start fail
2011 May 27
0
[PATCH] Fix the filename of the archive produced by ''make deb''
# HG changeset patch
# User Tim Deegan <Tim.Deegan@citrix.com>
# Date 1306492673 -3600
# Node ID c794fc4cc712c0c84757ecfc2435c0838642731e
# Parent 73ba1d95d1ec59246e2f0a8e8a1136cd5f9d98c2
Fix the filename of the archive produced by ''make deb''
Signed-off-by: Tim Deegan <Tim.Deegan@citrix.com>
diff -r 73ba1d95d1ec -r c794fc4cc712 tools/misc/mkdeb
---
2012 Apr 30
2
x86info: dump kvm cpuid's
On Mon, Apr 30, 2012 at 11:43:19AM +0300, Gleb Natapov wrote:
> On Sun, Apr 29, 2012 at 01:10:21PM +0300, Michael S. Tsirkin wrote:
> > The following makes 'x86info -r' dump kvm cpu ids
> > (signature+features) when running in a vm.
> >
> > On the guest we see the signature and the features:
> > eax in: 0x40000000, eax = 00000000 ebx = 4b4d564b ecx =
2012 Apr 30
2
x86info: dump kvm cpuid's
On Mon, Apr 30, 2012 at 11:43:19AM +0300, Gleb Natapov wrote:
> On Sun, Apr 29, 2012 at 01:10:21PM +0300, Michael S. Tsirkin wrote:
> > The following makes 'x86info -r' dump kvm cpu ids
> > (signature+features) when running in a vm.
> >
> > On the guest we see the signature and the features:
> > eax in: 0x40000000, eax = 00000000 ebx = 4b4d564b ecx =