similar to: [PATCH] do use set_machinetophys

Displaying 20 results from an estimated 100000 matches similar to: "[PATCH] do use set_machinetophys"

2006 Aug 02
1
[PATCH] Cleanup vmx vmexit handler.
Cleanup vmx vmexit handler. Current code doesn''t handle vmexits caused by triple fault, INIT, SIPI, etc, which are listed in IA32 Architecture System Programming Guide 2, Appendix I VMX Basic Exit Reasons, and calls __hvm_bug() when not handling such cases, actually domain crash should be good enough. Also various coding style cleanups. Signed-off-by: Xin Li <xin.b.li@intel.com>
2005 Oct 31
2
[PATCH] Fix PAE shadow on a machine with RAM above 4G on x86_64 xen
Fix PAE shadow on a machine with RAM above 4G on x86_64 xen. Currently, on a machine with RAM above 4G, we can not run 32bit VMX guest on x86_64 xen, the root cause is that the PAE page table PDPT must below 4G, this patch fixes this issue. Also did some cleanup. Signed-off-by: Xin Li <xin.b.li@intel.com> Signed-off-by: Jun Nakajima <jun.nakajima@intel.com>
2006 Oct 08
0
RE: [PATCH] add RDMSR/WRMSR instruction emulationtoVMXAssist decoder
Can you please check the vcpu status? I suspect one of the vcpu is blocked by halt instruction. Thanks Yunhong Jiang >-----Original Message----- >From: xen-devel-bounces@lists.xensource.com >[mailto:xen-devel-bounces@lists.xensource.com] On Behalf Of Tim Deegan >Sent: 2006年10月5日 23:55 >To: Li, Xin B >Cc: xen-devel@lists.xensource.com >Subject: Re: [Xen-devel] [PATCH] add
2006 Feb 28
0
RE: Re: [PATCH] Fix qemu-dm segfault when multiple HVMdomains
So, Keir, can you please check in this patch? Thanks Yunhong Jiang >-----Original Message----- >From: xen-devel-bounces@lists.xensource.com >[mailto:xen-devel-bounces@lists.xensource.com] On Behalf Of >John Clemens >Sent: Tuesday, February 28, 2006 1:35 AM >To: Jiang, Yunhong >Cc: Li, Xin B; xen-devel@lists.xensource.com >Subject: [Xen-devel] Re: [PATCH] Fix qemu-dm
2006 Mar 02
2
[PATCH ] don''t compile HVM_DBG_LOG into xen by default
Don''t compile HVM_DBG_LOG into xen by default. Signed-off-by: Xin Li <xin.b.li@intel.com> Signed-off-by: Jun Nakajima <jun.nakajima@intel.com> _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2005 Nov 11
3
[PATCH] add MOVSX instr support to VMX MMIO decoder
Add MOVSX instr support to VMX MMIO decoder. Signed-off-by: Xin Li <xin.b.li@intel.com> _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2011 May 30
6
[PATCH] CPUID level 0x00000007:0 (ebx) is word 9, instead of word 7
CPUID level 0x00000007:0 (ebx) is word 9, instead of word 7. ... make it consistent with native Linux. Signed-off-by: Li Xin <xin.li@intel.com> diff -r d7c755c25bb9 xen/include/asm-x86/cpufeature.h --- a/xen/include/asm-x86/cpufeature.h Sat May 28 08:58:08 2011 +0100 +++ b/xen/include/asm-x86/cpufeature.h Tue May 31 07:34:34 2011 +0800 @@ -142,7 +142,7 @@ #define X86_FEATURE_TOPOEXT
2007 Feb 08
2
[PATCH] Split VMCS initialization function
Split VMCS initialization function into guest/host/control 3 parts. Signed-off-by: Xin Li <xin.b.li@intel.com> _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2006 Feb 27
1
[PATCH] Fix qemu-dm segfault when multiple HVM domains ---Was: qemu-dm segfault with multiple HVM domains?
Hi, John Can you try the attached patch ? This issue can be reproduced on SMP platform, while the domain 0 is UP. The reason is, after finishing a dma request, the dma thread will trigger the interrupt and then clear the call back function. When guest get the interrupt , it will try to check the call back function, if it is set, then it will trigger a dma request again. So if the checking for
2006 Apr 13
0
[PATCH] only BSP can really do clear_all_shadow_status
only BSP can really do clear_all_shadow_status. This fixes SMP IA32 VMX guest booting on IA32 xen. Signed-off-by: Xin Li <xin.b.li@intel.com> _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2007 Jul 10
5
[PATCH] vmwrite high 32 bits of 64bit VMCS fields when in PAE mode
vmwrite higher 32 bits of 64bit VMCS fields when in PAE mode. Signed-off-by: Xin Li <xin.b.li@intel.com> _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2005 Sep 29
0
RE: [PATCH] [VT] SMP VMX guest AP bring up need calldo_boot_vcpu in hypervisor
Jun suggested to use another elegant way, pls ignore this one. -Xin >SMP VMX guest AP bring up need call do_boot_vcpu in hypervisor. >Current call to do_boot_vcpu always from domain, however, for SMP VMX >guest AP bring up, it is called from xen hypervisor. >Signed-off-by: Xin Li <xin.b.li@intel.com> > >diff -r f069a06e650f xen/common/domain.c >--- a/xen/common/domain.c
2005 Sep 23
0
[PATCH] [VT] clean up VMX builder
This patch clean up VMX builder. Since now we have vmxloader, old code loading linux kernel directly is not needed. 1. remove linux parameters. 2. remove init ramdisk. 3. remove e820 memmap config file parse. Also e820 map handling code is changed in vmx_setup_platform. 4. remove provisional GDT, and construct_init_guest_vmcs is updated greatly. 5. remove some ugly tailing space. Thanks Keir for
2007 Mar 28
7
[PATCH] Proper use of VMX execution controls MSR.
Better use of VMX execution controls MSR. Signed-off-by: Xin Li<xin.b.li@intel.com> _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2006 Oct 12
9
[PATCH] an obvious fix to PIC IO intercept
an obvious fix to PIC IO intercept. In PIC IO, address from send_pio_req is physical address already. Signed-off-by: Xiaohui Xin <xiaohui.xin@intel.com> Signed-off-by: Xiaowei Yang <xiaowei.yang@intel.com> Signed-off-by: Xin Li <xin.b.li@intel.com> _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com
2006 Jun 21
15
[PATCH] patch to buffer write ioreq
This patch implements a new mechanism to buffer the MMIO_WRITE and PIO_WRITE packet in a queue, and then submit them to qemu-dm in batch. This could save a lot of domain switch time. We implement this as a generic one to do ioreq in batch. However, we only use it to batch the MMIO_WIRTE request for stdvga(0xA0000-0xC0000) in order to solve the win2k boot issue for hvm domain. Without this patch,
2006 Jul 30
1
[PATCH] move e820 ACPI entries into RAM
move e820 ACPI entries into RAM. ACPI RAM maybe used as RAM after ACPI data is parsed, but current e820 entries don''t comply to this. Signed-off-by: Xin Li <xin.b.li@intel.com> _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2006 Jul 17
0
(no subject)
on x86_64, when guest has more than 2G memory, "startx" will cause qemu dm die, this patch fixes it. Signed-off-by: Xin Li <xin.b.li@intel.com> diff -r ecb8ff1fcf1f tools/ioemu/hw/vga.c --- a/tools/ioemu/hw/vga.c Fri Jul 14 18:53:27 2006 +0100 +++ b/tools/ioemu/hw/vga.c Mon Jul 17 22:35:54 2006 +0800 @@ -1392,7 +1392,8 @@ static void vga_draw_graphic(VGAState *s static void
2005 Dec 15
0
[PATCH] check before relinquishing vlapic because VMX domain may crash very early
check before relinquishing vlapic because VMX domain may crash very early. Signed-off-by: Xin Li <xin.b.li@intel.com> Also pls push to xen-3.0-testing.hg. thanks diff -r dc8122d90670 xen/arch/x86/vmx.c --- a/xen/arch/x86/vmx.c Wed Dec 14 18:47:16 2005 +++ b/xen/arch/x86/vmx.c Thu Dec 15 16:18:14 2005 @@ -113,9 +113,10 @@ if ( active_ac_timer(&v->arch.arch_vmx.hlt_timer)
2006 Oct 15
0
[PATCH] Fix MOVS handling memory spanning multiple pages
This patch fixes MOVS handling memory spanning multiple pages. Signed-off-by: Eddie Dong <eddie.dong@intel.com> Signed-off-by: Xiaowei Yang <xiaowei.yang@intel.com> Signed-off-by: Xin Li <xin.b.li@intel.com> Thanks, Xiaowei _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel