similar to: (no subject)

Displaying 20 results from an estimated 5000 matches similar to: "(no subject)"

2006 Oct 08
0
RE: [PATCH] add RDMSR/WRMSR instruction emulationtoVMXAssist decoder
Can you please check the vcpu status? I suspect one of the vcpu is blocked by halt instruction. Thanks Yunhong Jiang >-----Original Message----- >From: xen-devel-bounces@lists.xensource.com >[mailto:xen-devel-bounces@lists.xensource.com] On Behalf Of Tim Deegan >Sent: 2006年10月5日 23:55 >To: Li, Xin B >Cc: xen-devel@lists.xensource.com >Subject: Re: [Xen-devel] [PATCH] add
2020 Feb 07
0
[RFC PATCH v7 11/78] KVM: x86: add .control_cr3_intercept() to struct kvm_x86_ops
This function is needed for the KVMI_VCPU_CONTROL_CR command. Co-developed-by: Nicu?or C??u <ncitu at bitdefender.com> Signed-off-by: Nicu?or C??u <ncitu at bitdefender.com> Signed-off-by: Adalbert Laz?r <alazar at bitdefender.com> --- arch/x86/include/asm/kvm_host.h | 6 ++++++ arch/x86/kvm/svm.c | 14 ++++++++++++++ arch/x86/kvm/vmx/vmx.c | 26
2020 Jul 21
0
[PATCH v9 10/84] KVM: x86: add .control_cr3_intercept() to struct kvm_x86_ops
This function is needed for the KVMI_VCPU_CONTROL_CR command, when the introspection tool has to intercept the read/write access to CR3. Co-developed-by: Nicu?or C??u <ncitu at bitdefender.com> Signed-off-by: Nicu?or C??u <ncitu at bitdefender.com> Signed-off-by: Adalbert Laz?r <alazar at bitdefender.com> --- arch/x86/include/asm/kvm_host.h | 6 ++++++ arch/x86/kvm/svm/svm.c
2005 Sep 27
0
[PATCH][VT] add "wbinvd" instruction emulattion for real mode code
This patch adds "wbinvd" instruction emulation for vm86 mode. This is needed when we bring up AP of SMP VMX guest. Signed-off-by: Xin Li <xin.b.li@intel.com> diff -r 94c6fc048d8e tools/firmware/vmxassist/vm86.c --- a/tools/firmware/vmxassist/vm86.c Fri Sep 23 11:52:43 2005 +++ b/tools/firmware/vmxassist/vm86.c Tue Sep 27 17:17:25 2005 @@ -752,6 +752,9 @@
2006 Jul 31
0
[PATCH] Fix gdtr access on vmxassist
Hi, Keir: the gdtr information in oldctx is an address for guest, not for vmxassist. When access descriptor on guest gdt, we need to go through guest page table if guest enable paging. This error may happen if guest enable PE/PG in one instruction. This patch fix this issue. Signed-off-by: Yunhong Jiang <yunhong.jiang@intel.com> Signed-off-by: Xin Li <xin.b.li@intel.com> Thanks
2006 Dec 28
0
[PATCH] Fix regs set/get decoding in VMXAssist
Fix regs set/get decoding in VMXAssist. Signed-off-by: Yunhong Jiang <yunhong.jiang@intel.com> Signed-off-by: Xin Li <xin.b.li@intel.com> _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2007 Jun 24
4
It seems the "machine check exception handling" breaks HVM guest
Hi Jan Beulich, > changeset 15414: 3cf5052ba5e5 x86: machine check exception handling With the c/s, when creating HVM guest, I can only see a white Qemu window. :( Can you have a look? Thanks. PS: the serial log follows: (XEN) HVM1: pci dev 02:0 bar 14 size 00001000: f2000000 (XEN) HVM1: pci dev 03:0 bar 10 size 00000100: 0000c101 (XEN) HVM1: pci dev 03:0 bar 14 size 01000000:
2007 Jul 24
0
fedora7 can not boot in hvm domain of xen3.1
Hi, all I am new to xen, and just try to use the HVM feature of xen3.1. two issues i met: 1. fedora 7 guest can not boot grub is displaying the boot menu, but hang there. and from "xm top", seems the guest exhauses all the cpu. 2. sdl doesn''t work, i always need to use vnc client to connect to the console here are some info about my system. * cat /proc/cpuinfo * cat xm.hvm (my
2020 Jul 21
0
[PATCH v9 11/84] KVM: x86: add .cr3_write_intercepted()
From: Nicu?or C??u <ncitu at bitdefender.com> This function will be used to allow the introspection tool to disable the CR3-write interception when it is no longer interested in these events, but only if nothing else depends on these VM-exits. Signed-off-by: Nicu?or C??u <ncitu at bitdefender.com> Signed-off-by: Adalbert Laz?r <alazar at bitdefender.com> ---
2006 Oct 06
0
RE: Installing Redhat 7,3 with hvm
Not yet, but I don''t see any reason for it to work any differently. I simply used vmware because it was convenient. -Adam | -----Original Message----- | From: Simon Gao [mailto:gao@schrodinger.com] | Sent: Thursday, October 05, 2006 11:22 AM | To: Adam Crews -X (acrews - Xerox at Cisco) | Cc: xen-users@lists.xensource.com; Mike Freemon | Subject: Re: [Xen-users]
2008 Jun 27
1
[PATCH] [HVM] Fix lmsw handling
The lmsw instruction can be used to set CR0_PE, but can never clear it, once set. Currently, as far as I can see, there is no provision to keep lmsw from clearing CR0_PE, either in the vmx code or in x86_emulate code (which is used by SVM to emulate lmsw). This patch fixes this issue. Signed-off-by: Trolle Selander <trolle.selander@eu.citrix.com>
2006 Oct 05
1
RE: Installing Redhat 7,3 with hvm
If anyone is still interested in this old thread, I have a rh7.3 image running under hvm. It''s a hack, but here''s what I did: Install rh7.3 in a vmware machine with vmware server. Booted off a live cd, ( I used a gentoo installer CD, but any live cd should work) Created a lvm volume on my Xen dom0 >From the liveCD, I use dd to copy the disk image to the lvm image (dd
2006 May 18
0
HVM Domain booting Vista
Hi , since changeset 9996 i managed to install and boot a HVM Domain with Windows XP and Windows 2000. Now i tried Vista :-) it starts to boot from cd and the i get the following error in the log : (XEN) (GUEST: 8) HVM Loader (XEN) (GUEST: 8) Loading ROMBIOS ... (XEN) (GUEST: 8) Loading Cirrus VGABIOS ... (XEN) (GUEST: 8) Loading VMXAssist ... (XEN) (GUEST: 8) VMX go ... (XEN) (GUEST: 8)
2007 Apr 18
1
[RFC, PATCH 8/24] i386 Vmi syscall assembly
Illustration of how VMI inlines are used to greatly limit the impact of code change in low level assembler code. Spinlocks, system calls, and the fault handling paths are affected by adding some padding bytes to convert the native instructions into a hook point for the hypervisor to insert shim code. These changes are sufficient to glue the Linux low level entry points to hypervisor event
2007 Apr 18
1
[RFC, PATCH 8/24] i386 Vmi syscall assembly
Illustration of how VMI inlines are used to greatly limit the impact of code change in low level assembler code. Spinlocks, system calls, and the fault handling paths are affected by adding some padding bytes to convert the native instructions into a hook point for the hypervisor to insert shim code. These changes are sufficient to glue the Linux low level entry points to hypervisor event
2006 Aug 07
1
3.0.2 hvmloader
Hello! I want to run windows in xen. My linux distrution in ubuntu 6.06 amd 64. I downloaded and installed xen 3.0.2 from binaries. I found that hvmloader is not included in binary distribution :-( So I try to compile it from sources. I get following error: cpp -P -DDEBUG -DTEXTADDR=0x000D0000 vmxassist.ld > vmxassist.tmp ld -o vmxassist -m elf_i386 -nostdlib --fatal-warnings -N -T
2008 Jan 10
1
[PATCH] Added CLTS instruction emulation in vmxassist
Trivial change to emulate CLTS instruction in vmxassist. Relevant file - tools/firmware/vmxassist/vm86.c Signed-off-by: Kamala Narasimhan <kamala.narasimhan@citrix.com> Kamala _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2005 Jun 02
0
[PATCH] vmx assist moved to a new address
To accomodate Intel''s ACPI support, VMX assist now lives at 0xD0000. Leendert Signed-Off-By: Leendert van Doorn <leendert@watson.ibm.com> --- xeno-unstable.orig/xen/include/public/vmx_assist.h 2005-04-22 02:26:10.000000000 -0400 +++ xeno-unstable.mine/xen/include/public/vmx_assist.h 2005-05-31 13:22:39.000000000 -0400 @@ -21,7 +21,7 @@ #ifndef _VMX_ASSIST_H_ #define
2007 Apr 18
1
[PATCH 2/2] Transparent privilege levels in entry.S
i386 Transparent Paravirtualization Patch #2 Changes required to low level fault / system call code for supporting transparent paravirtualization where the kernel may be running at non-zero CPL. The testing of VM_MASK and CS together uses a neat trick which is now extended to support CPL 0,1,2 kernels. Note that assembly code must test against __ESPFIX_SS, the 16-bit stack on interrupts and
2007 Apr 18
1
[PATCH 2/2] Transparent privilege levels in entry.S
i386 Transparent Paravirtualization Patch #2 Changes required to low level fault / system call code for supporting transparent paravirtualization where the kernel may be running at non-zero CPL. The testing of VM_MASK and CS together uses a neat trick which is now extended to support CPL 0,1,2 kernels. Note that assembly code must test against __ESPFIX_SS, the 16-bit stack on interrupts and