Displaying 20 results from an estimated 10000 matches similar to: "[PATCH][SVM][5/5] add hsa for ucode"
2006 May 16
0
[PATCH][SVM][1/5] cleanup IOIO handling
SVM patch to cleanup IOIO handling, do not use "real" mode but rather
the correct "bitness".
Applies cleanly to 10002.
Please apply to xen-unstable.hg.
Please apply to xen-3.0-testing.hg.
Signed-off-by: Tom Woller <thomas.woller@amd.com>
Signed-off-by: Mats Petersson <mats.petersson@amd.com>
_______________________________________________
Xen-devel mailing list
2006 Feb 08
2
[PATCH][SVM] tlb control enable
Attached patch for svm will enable a tlb flush for each vmrun.
Applies cleanly to 8781:dcc2beb8a1d2
Signed-off-by: Tom Woller <thomas.woller@amd.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2006 May 30
0
[PATCH][SVM] CPUID cleanup
Attached SVM patch fixes a virtualization of the CPUID NX bit, and
cleans up other CPUID bits.
Applies cleanly to xen-unstable.hg 10177.
Applies to xen-3.0-testing 9696.
Please apply to xen-unstable.hg.
Please apply to xen-3.0-testing.hg.
Tested on top of the KY patches for XCHG (HVM) and SMP SVM support.
Keir,
Can those 2 patches KY posted last week, also be applied to 3.0.2?
2006 Oct 19
2
[HVM][SVM][PATCH][2/2] Delay ExtInt Injection
Patch 2/2 -
Add flag to indicate that an exception event needs injecting, and to
delay
the ext interrupt injection.
Remove unnecessary check of RFLAGS.IF for ExtInt injection.
Applies cleanly to xen-unstable c/s 11831.
Please apply to xen-unstable.hg.
We would also want this patch to be in a 3.0.3-1 base whenever that is
branched.
Signed-off-by: Travis Betak <travis.betak@amd.com>
2020 Aug 24
0
[PATCH v6 01/76] KVM: SVM: nested: Don't allocate VMCB structures on stack
From: Joerg Roedel <jroedel at suse.de>
Do not allocate a vmcb_control_area and a vmcb_save_area on the stack,
as these structures will become larger with future extenstions of
SVM and thus the svm_set_nested_state() function will become a too large
stack frame.
Signed-off-by: Joerg Roedel <jroedel at suse.de>
---
arch/x86/kvm/svm/nested.c | 47
2006 Jul 25
0
[SVM][PATCH] fix CONFIG_PAGING_LEVELS tests
Correct compile time compare of CONFIG_PAGING_LEVELS for 64bit and 32bit
PAE guests.
This code affects accesses to the CR4 register by the SVM guest.
Applies cleanly to 10729 + posted NMI/STGI SVM patch.
Please apply to xen-unstable.hg.
Signed-off-by: Tom Woller <thomas.woller@amd.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
2020 Feb 07
0
[RFC PATCH v7 17/78] KVM: svm: pass struct kvm_vcpu to set_msr_interception()
From: Nicu?or C??u <ncitu at bitdefender.com>
This is needed in order to handle clients controlling the MSR related
VM-exits.
Signed-off-by: Nicu?or C??u <ncitu at bitdefender.com>
Signed-off-by: Adalbert Laz?r <alazar at bitdefender.com>
---
arch/x86/kvm/svm.c | 27 +++++++++++++++------------
1 file changed, 15 insertions(+), 12 deletions(-)
diff --git a/arch/x86/kvm/svm.c
2006 Feb 28
0
[PATCH][SVM] svm 64bit initial support
SVM patch to add 64bit hv support.
This patch only modifies svm files.
Tested with c/s 9015 with 32bit hv using UP Dom0, with UP linux and
winxpsp1 unmodified guests.
Tested with c/s 9015 with 64bit hv using UP Dom0, with 32bit and 64bit
UP linux and 32bit winxpsp1.
Applies cleanly to 9016.
Please apply.
Signed-off-by: Tom Woller <thomas.woller@amd.com>
2012 Sep 11
0
[PATCH 1/3] x86/hvm: don't use indirect calls without need
Direct calls perform better, so we should prefer them and use indirect
ones only when there indeed is a need for indirection.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
--- a/xen/arch/x86/apic.c
+++ b/xen/arch/x86/apic.c
@@ -1373,7 +1373,7 @@ void error_interrupt(struct cpu_user_reg
void pmu_apic_interrupt(struct cpu_user_regs *regs)
{
ack_APIC_irq();
-
2007 Aug 09
1
[PATCH] svm: allow guest to use EFER.FFXSE and EFER.LMSLE
(Applies cleanly only on top of the previously sent SVM/LBR patch.)
Signed-off-by: Jan Beulich <jbeulich@novell.com>
Index: 2007-08-08/xen/arch/x86/hvm/svm/svm.c
===================================================================
--- 2007-08-08.orig/xen/arch/x86/hvm/svm/svm.c 2007-08-08 11:40:11.000000000 +0200
+++ 2007-08-08/xen/arch/x86/hvm/svm/svm.c 2007-08-08 11:43:53.000000000 +0200
2020 Apr 28
0
[PATCH v3 03/75] KVM: SVM: Use __packed shorthand
From: Borislav Petkov <bp at alien8.de>
I guess we can do that ontop.
Signed-off-by: Joerg Roedel <jroedel at suse.de>
---
arch/x86/include/asm/svm.h | 16 ++++++++--------
1 file changed, 8 insertions(+), 8 deletions(-)
diff --git a/arch/x86/include/asm/svm.h b/arch/x86/include/asm/svm.h
index e4e9f6bacfaa..9adbf69f003c 100644
--- a/arch/x86/include/asm/svm.h
+++
2020 Jul 14
0
[PATCH v4 03/75] KVM: SVM: Use __packed shorthand
From: Borislav Petkov <bp at alien8.de>
Use the shorthand to make it more readable.
No functional changes.
Signed-off-by: Joerg Roedel <jroedel at suse.de>
---
arch/x86/include/asm/svm.h | 16 ++++++++--------
1 file changed, 8 insertions(+), 8 deletions(-)
diff --git a/arch/x86/include/asm/svm.h b/arch/x86/include/asm/svm.h
index 0420250b008b..af91ced0f370 100644
---
2020 Aug 24
0
[PATCH v6 04/76] KVM: SVM: Use __packed shorthand
From: Borislav Petkov <bp at alien8.de>
Use the shorthand to make it more readable.
No functional changes.
Signed-off-by: Borislav Petkov <bp at alien8.de>
Signed-off-by: Joerg Roedel <jroedel at suse.de>
---
arch/x86/include/asm/svm.h | 12 ++++++------
1 file changed, 6 insertions(+), 6 deletions(-)
diff --git a/arch/x86/include/asm/svm.h b/arch/x86/include/asm/svm.h
index
2006 Mar 01
2
[PATCH][SVM] 32bit msr support/enable 64bit vlapic
Svm patch to add 32bit msr support (combined both 32bit with 64bit
functions)
and enable vlapic for 64bit.
Applies cleanly to 9023.
Please apply.
Signed-off-by: Tom Woller <thomas.woller@amd.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2006 Apr 12
0
[PATCH][SVM][1/5] add init intercept handler
SVM patch to add add init intercept handler.
Applies cleanly to 9622.
Please apply.
Signed-off-by: Tom Woller <thomas.woller@amd.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2006 Mar 28
0
[PATCH][SVM] update guest time code
SVM patch to update guest time with latest hvm modifications.
Applies cleanly to 9457.
Please apply.
Signed-off-by: Tom Woller <thomas.woller@amd.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2006 Mar 22
0
[PATCH][SVM] fix guest time/msr64
SVM patch to fix guest time, including 64bit msr code - allowing 64bit
linux guests to enable APIC (ie. apic=1 now works in guest config file).
Applies cleanly to 9383 changeset.
Please apply.
Signed-off-by: Tom Woller <thomas.woller@amd.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2006 Sep 29
0
[SVM][PATCH] Remove unnecessary intr assist guest iF check
AMD-V does not require the delaying of interrupt injection if the guest
IF_FLAG disallows interrupts. Remove the code in svm_intr_assist() that
was checking the guest IF in eflags.
This patch fixes the problem with HVM Windows guests, with observing a
very slow timer countdown on the initial boot menu, when there is more
than one boot option. Kbd response in this same Windows boot menu is
also
2006 Oct 19
0
[HVM][SVM][PATCH][1/2] VINTR intercept signal
These two patches affect the interrupt injection logic for AMD-V (only).
These patches fix issues with Windows HVM guests during boot menu
screen:
1) the timer countdown is no longer very slow
2) kbd response is now no longer slow or non-existent
We have also seen an occasional "dma lost interrupt"/expiry errors, and
these patches seem to help with these, especially with SUSE10 HVM
2020 Aug 24
0
[PATCH v6 02/76] KVM: SVM: Add GHCB definitions
From: Tom Lendacky <thomas.lendacky at amd.com>
Extend the vmcb_safe_area with SEV-ES fields and add a new
'struct ghcb' which will be used for guest-hypervisor communication.
Signed-off-by: Tom Lendacky <thomas.lendacky at amd.com>
Signed-off-by: Joerg Roedel <jroedel at suse.de>
---
arch/x86/include/asm/svm.h | 45 +++++++++++++++++++++++++++++++++++++-