similar to: [PATCH][SVM] fix guest time/msr64

Displaying 20 results from an estimated 30000 matches similar to: "[PATCH][SVM] fix guest time/msr64"

2006 Mar 01
2
[PATCH][SVM] 32bit msr support/enable 64bit vlapic
Svm patch to add 32bit msr support (combined both 32bit with 64bit functions) and enable vlapic for 64bit. Applies cleanly to 9023. Please apply. Signed-off-by: Tom Woller <thomas.woller@amd.com> _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2006 Mar 28
0
[PATCH][SVM] update guest time code
SVM patch to update guest time with latest hvm modifications. Applies cleanly to 9457. Please apply. Signed-off-by: Tom Woller <thomas.woller@amd.com> _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2006 Feb 28
0
[PATCH][SVM] svm 64bit initial support
SVM patch to add 64bit hv support. This patch only modifies svm files. Tested with c/s 9015 with 32bit hv using UP Dom0, with UP linux and winxpsp1 unmodified guests. Tested with c/s 9015 with 64bit hv using UP Dom0, with 32bit and 64bit UP linux and 32bit winxpsp1. Applies cleanly to 9016. Please apply. Signed-off-by: Tom Woller <thomas.woller@amd.com>
2006 May 30
0
[PATCH][SVM] CPUID cleanup
Attached SVM patch fixes a virtualization of the CPUID NX bit, and cleans up other CPUID bits. Applies cleanly to xen-unstable.hg 10177. Applies to xen-3.0-testing 9696. Please apply to xen-unstable.hg. Please apply to xen-3.0-testing.hg. Tested on top of the KY patches for XCHG (HVM) and SMP SVM support. Keir, Can those 2 patches KY posted last week, also be applied to 3.0.2?
2006 Jul 25
0
[SVM][PATCH] fix CONFIG_PAGING_LEVELS tests
Correct compile time compare of CONFIG_PAGING_LEVELS for 64bit and 32bit PAE guests. This code affects accesses to the CR4 register by the SVM guest. Applies cleanly to 10729 + posted NMI/STGI SVM patch. Please apply to xen-unstable.hg. Signed-off-by: Tom Woller <thomas.woller@amd.com> _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com
2007 Aug 09
1
[PATCH] svm: allow guest to use EFER.FFXSE and EFER.LMSLE
(Applies cleanly only on top of the previously sent SVM/LBR patch.) Signed-off-by: Jan Beulich <jbeulich@novell.com> Index: 2007-08-08/xen/arch/x86/hvm/svm/svm.c =================================================================== --- 2007-08-08.orig/xen/arch/x86/hvm/svm/svm.c 2007-08-08 11:40:11.000000000 +0200 +++ 2007-08-08/xen/arch/x86/hvm/svm/svm.c 2007-08-08 11:43:53.000000000 +0200
2006 Feb 08
2
[PATCH][SVM] tlb control enable
Attached patch for svm will enable a tlb flush for each vmrun. Applies cleanly to 8781:dcc2beb8a1d2 Signed-off-by: Tom Woller <thomas.woller@amd.com> _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2010 Jun 07
0
CentOS5 + 2.6.32.15 PVOPS x86_32 PAE/xen 4rc6 stalls at boot
Hi, It appears my Xen is stalling right before handing off control to the dom0 kernel. I would appreciate any pointers on where to look next, since I''ve already spent a considerable amount of time trying to figure this one out and nothing turns up. One small detail, with my previous .config, I wasn''t seeing the 4 "(XEN) MCE: MSR 417 is not MCA MSR" at the end of the
2006 Sep 29
0
[SVM][PATCH] Remove unnecessary intr assist guest iF check
AMD-V does not require the delaying of interrupt injection if the guest IF_FLAG disallows interrupts. Remove the code in svm_intr_assist() that was checking the guest IF in eflags. This patch fixes the problem with HVM Windows guests, with observing a very slow timer countdown on the initial boot menu, when there is more than one boot option. Kbd response in this same Windows boot menu is also
2006 May 16
0
[PATCH][SVM][5/5] add hsa for ucode
SVM patch to add a host save area per core for the hypervisor and also for the microcode. The microcode area is not guaranteed to be compatible with the vmcb layout, therefore will require it''s own "scratch pad". Consolidate the per core areas into a single structure. Applies cleanly to 10002. Please apply to xen-unstable.hg. Please apply to xen-3.0-testing.hg.
2006 May 16
0
[PATCH][SVM][1/5] cleanup IOIO handling
SVM patch to cleanup IOIO handling, do not use "real" mode but rather the correct "bitness". Applies cleanly to 10002. Please apply to xen-unstable.hg. Please apply to xen-3.0-testing.hg. Signed-off-by: Tom Woller <thomas.woller@amd.com> Signed-off-by: Mats Petersson <mats.petersson@amd.com> _______________________________________________ Xen-devel mailing list
2006 Apr 12
0
[PATCH][SVM][1/5] add init intercept handler
SVM patch to add add init intercept handler. Applies cleanly to 9622. Please apply. Signed-off-by: Tom Woller <thomas.woller@amd.com> _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2016 Sep 23
2
How to enable the svm cpu flag inside a vm?
Hello, I'm trying to get the Android Emulator to run inside a kvm vm on CentOS-6. Apparently the latest Android Emulators cannot run without hardware acceleration so I am trying to get the vm to see the svm cpu flag. Host: $ grep model\ name /proc/cpuinfo | sort -u model name : AMD Phenom(tm) II X4 965 Processor $ grep svm /proc/cpuinfo | sort -u flags : fpu vme de pse tsc msr pae mce cx8
2020 Feb 07
0
[RFC PATCH v7 17/78] KVM: svm: pass struct kvm_vcpu to set_msr_interception()
From: Nicu?or C??u <ncitu at bitdefender.com> This is needed in order to handle clients controlling the MSR related VM-exits. Signed-off-by: Nicu?or C??u <ncitu at bitdefender.com> Signed-off-by: Adalbert Laz?r <alazar at bitdefender.com> --- arch/x86/kvm/svm.c | 27 +++++++++++++++------------ 1 file changed, 15 insertions(+), 12 deletions(-) diff --git a/arch/x86/kvm/svm.c
2006 Oct 19
0
[HVM][SVM][PATCH][1/2] VINTR intercept signal
These two patches affect the interrupt injection logic for AMD-V (only). These patches fix issues with Windows HVM guests during boot menu screen: 1) the timer countdown is no longer very slow 2) kbd response is now no longer slow or non-existent We have also seen an occasional "dma lost interrupt"/expiry errors, and these patches seem to help with these, especially with SUSE10 HVM
2015 Aug 30
0
CPU feature 'svm' not reported inside guest without 'host-passthrough'
Hi, I am confused by the behaviour of the CPU description in my VM. I have a host with an AMD CPU with SVM feature and I want to try nested virtualization on a Fedora22 guest. The host is Fedora22 as well. libvirtd (libvirt) 1.2.13.1 kernel 4.1.6-200.fc22.x86_64 1. I tried 'custom' mode with model qemu64 with required feature 'SVM' but '/proc/cpuinfo' in the guest
2008 Oct 27
0
maximum dimension of SVM in e1701
Does anyone know the maximum dimension that svm can deal with in R? I am working on support vector regression. My data set is 1721*41030 1721 samples 41030 predictors Some information about my machine: cat /proc/cpuinfo processor : 0 vendor_id : GenuineIntel cpu family : 15 model : 4 model name : Intel(R) Xeon(TM) CPU 2.80GHz stepping
2006 Oct 19
2
[HVM][SVM][PATCH][2/2] Delay ExtInt Injection
Patch 2/2 - Add flag to indicate that an exception event needs injecting, and to delay the ext interrupt injection. Remove unnecessary check of RFLAGS.IF for ExtInt injection. Applies cleanly to xen-unstable c/s 11831. Please apply to xen-unstable.hg. We would also want this patch to be in a 3.0.3-1 base whenever that is branched. Signed-off-by: Travis Betak <travis.betak@amd.com>
2013 Sep 02
0
Running libvirt on a virtualized server
Hi everyone I'm trying to create a virtual machine using OpenNebula [1] on a centos 6.4 server, but i'm facing some erros using kvm / libvirt. This server is running on a virtual machine created on XCP. Then, my infrastructure is: XCP 1.6 (hypervisor - dom0) + CentOS 6.4 (running on a XCP VM) + OpenNebula 4.0.1 (installed on CentOS). In the host machine, I have the same infrastructure.
2014 May 29
1
Divide error in kvm_unlock_kick()
Chris Webb <chris at arachsys.com> wrote: > My CPU flags inside the crashing guest look like this: > > fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush > mmx fxsr sse sse2 ht syscall nx mmxext fxsr_opt pdpe1gb lm rep_good nopl > extd_apicid pni pclmulqdq ssse3 fma cx16 sse4_1 sse4_2 x2apic popcnt aes xsave > avx f16c hypervisor lahf_lm