Displaying 20 results from an estimated 10000 matches similar to: "[PATCH] Cleanup/fix virt_to_maddr"
2007 Aug 16
4
[PATCH] small mca cleanup
Hi!
The MCG_CAP MSR never returns a negative count of available
error-reporting banks. Thus make nr_mce_banks unsigned.
While here, do some other minor cleanups.
Signed-off-by: Christoph Egger <Christoph.Egger@amd.com>
--
AMD Saxony, Dresden, Germany
Operating System Research Center
Legal Information:
AMD Saxony Limited Liability Company & Co. KG
Sitz (Geschäftsanschrift):
2006 Oct 24
1
[PATCH] libxc: Include path fix
Hi!
There''s a include path mistake when trying to build
tools/libxc on OpenBSD:
gcc -O2 -fomit-frame-pointer -m32 -march=i686 -DNDEBUG -std=gnu99 -Wall
-Wstrict-prototypes -Wno-unused-value -D__XEN_TOOLS__ -Werror
-fno-strict-aliasing -I. -Wp,-MD,.xc_core.o.d -c -o xc_core.o xc_core.c
In file included from xc_private.h:18,
from xg_private.h:16,
2008 Mar 26
3
[PATCH][TOOLS] pygrub: cleanup and support for NetBSD
Hi Keir,
Attached patch gets rid of the global attr variable and adds support for
NetBSD.
Signed-off-by: Christoph Egger <Christoph.Egger@amd.com>
--
AMD Saxony, Dresden, Germany
Operating System Research Center
Legal Information:
AMD Saxony Limited Liability Company & Co. KG
Sitz (Geschäftsanschrift):
Wilschdorfer Landstr. 101, 01109 Dresden, Deutschland
Registergericht
2012 Jun 27
1
[PATCH] x86/hvm: increase struct hvm_vcpu_io's mmio_large_read
Since the emulator now supports a few 256-bit memory operations, this
array needs to follow (and the comments should, too).
To limit growth, re-order the mmio_large_write_* fields so that the
two mmio_large_*_bytes fields end up adjacent to each other.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
--- a/xen/include/asm-x86/hvm/vcpu.h
+++ b/xen/include/asm-x86/hvm/vcpu.h
@@ -59,13 +59,13
2010 Mar 02
2
[PATCH][XEN] p2m cleanup: remove unused function
Hi!
Attached patch removes gfn_to_mfn_current(). It is redundant and effectively
unused.
All remaining users now use proper replacement function.
=> No functional change.
While here, silence stdvga and use page_mode_hap()
consequently.
Signed-off-by: Christoph Egger <Christoph.Egger@amd.com>
--
---to satisfy European Law for business letters:
Advanced Micro Devices GmbH
2013 Jan 21
6
[PATCH v3 0/4] nested vmx: enable VMCS shadowing feature
Changes from v2 to v3:
- Use pfn_to_paddr() to get the address from frame number instead of doing shift directly.
- Remove some unnecessary initialization code and add "static" to vmentry_fields and gpdptr_fields.
- Enable the VMREAD/VMWRITE bitmap only if nested hvm is enabled.
- Use clear_page() to set all 0 to the page instead of memset().
- Use domheap to allocate the
2011 Jun 27
20
[PATCH 0 of 5] v2: Nested-p2m cleanups and locking changes
This patch series tidies up a few bits ofthe nested p2m code.
The main thing it does is reorganize the locking so that most of the
changes to nested p2m tables happen only under the p2m lock, and the
nestedp2m lock is only needed to reassign p2m tables to new cr3 values.
Changes since v1:
- a few minor fixes
- more sensible flushing policy in p2m_get_nestedp2m()
- smoke-tested this time!
2007 Jan 11
4
[PATCH] Cleanup asm-x86/guest_access.h
Hi!
I cleaned up xen/include/asm-x86/guest_access.h. I also fixed a bug in
__copy_field_from_guest(), which seems to me to
be a kind of cut-copy-paste bug.
copy_{to,from}_user() and copy_{to,from}_user_hvm() expect a non-const
argument as the first argument. So I remove the consts from the initializer.
I replace typeof with __typeof__, which is always available in gcc - it is
not, when the
2010 Dec 15
5
[PATCH] svm: support VMCB cleanbits
Hi,
Attached patch implements the VMCB cleanbits SVM feature.
Upcoming AMD CPUs introduce them and they are basically hints
for the CPU which vmcb values can be re-used from the previous
VMRUN instruction.
Each bit represents a certain set of fields in the VMCB.
Setting a bit tells the cpu it can re-use the cached value
from the previous VMRUN.
Clearing a bit tells the cpu to reload the values
2006 Oct 17
6
[PATCH 3/3] Add support for OpenBSD
Hi!
This is the third and last patch.
This patch makes the xen kernel buildable on OpenBSD by adding support for
ProPolice. ProPolice has been added to standard GCC in version 4.1.x under
the name Stack Smashing Protection (SSP).
Cheers
Christoph
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2009 Jul 06
8
[PATCH] Fix xentop on pv-ops domain0
Xentop encounters error in pv-ops domain0, because the VBD path in sysfs changes to "/sys/devices"
Also delete the macro in xenstat_netbsd.c, because it is not used.
Signed-off-by: Dongxiao Xu <dongxiao.xu@intel.com>
Best Regards,
-- Dongxiao
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
2011 Feb 18
2
Re: Xen-devel Digest, Vol 71, Issue 85
Hi all!
Did the nested xen stuff make it into the xen-unstable (4.1-rc1?) tree as
suggested back in January by Tim Deegan?
TIA
________________________________
Date: Fri, 7 Jan 2011 16:01:12 +0000
From: Tim Deegan <Tim.Deegan@citrix.com>
Subject: Re: [Xen-devel] [PATCH 00/12] Nested Virtualization: Overview
To: Christoph Egger <Christoph.Egger@amd.com>
Cc: Keir Fraser
2011 May 26
20
[PATCH] xen: Deal with stdarg.h and -nostdinc
For compiling the xen kernel we use -nostdinc which means
we don''t want to rely on any external headers.
That also counts vor stdarg.h.
Use the external header when we compile the tools.
Adapt libelf-loader.c which is compiled in the kernel
and with the tools.
Signed-off-by: Christoph Egger <Christoph.Egger@amd.com>
--
---to satisfy European Law for business letters:
Advanced
2012 Aug 23
2
[PATCH] nvmx: fix resource relinquish for nested VMX
The previous order of relinquish resource is:
relinquish_domain_resources() -> vcpu_destroy() -> nvmx_vcpu_destroy().
However some L1 resources like nv_vvmcx and io_bitmaps are free in
nvmx_vcpu_destroy(), therefore the relinquish_domain_resources()
will not reduce the refcnt of the domain to 0, therefore the latter
vcpu release functions will not be called.
To fix this issue, we need to
2006 Dec 21
7
[PATCH] Add -Wcast-qual flag
Hi!
The xen-cast.diff adds the -Wcast-qual flag.
The xen-cast-xen.diff makes the hypervisor itself buildable with the new flag
- at least on x86_32 and x86_64.
The xen-cast-tools.diff makes the tools build with the new flag.
Generally, the places with the __UNCONST() hack should be considered to be
reworked. These places may hide bugs.
Christoph
2007 Aug 02
4
[PATCH][ELF] Correct space calculation for symtab when BSD_SYMTAB=yes
Hi!
If there is a string table for section headers, it also gets loaded.
Therefore take it into account in size calculation for kernel symtab.
Also there is no need to call elf_set_verbose() a second time
after elf_init() (First call happens within elf_init()).
Signed-off-by: Christoph Egger <Christoph.Egger@amd.com>
Keir: Can you also apply changeset 15672 and this patch
to Xen
2006 Dec 22
6
[PATCH] two missing bits (was Re: Add -Wcast-qual flag)
Hi!
I catched two pieces with debug and crash_debug enabled.
One of them fixes a build error even without the -Wcast-qual flag.
Patch attached.
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2007 Oct 08
5
3.1.1 RC4?
Keir,
I noticed that a Shadow patch went into the 3.1.1 staging tree today.
Does this mean that we should expect a 4th release candidate before the
3.1.1 release tag is official?
If so - how much testing time are you going to give that release
candidate before deciding whether a release tag, or another RC round is
appropriate?
Ben Guthro
_______________________________________________
2008 Nov 10
5
[PATCH][IOEMU] build fix for BSD
Hi!
Attached patch makes git-ioemu compile on NetBSD.
Signed-off-by: Christoph Egger <Christoph.Egger@amd.com>
P.S.: I''m about sending the pieces to qemu-devel. The changes
in vl.c already went upstream in qemu''s svn c/s 5646.
--
AMD Saxony, Dresden, Germany
Operating System Research Center
Legal Information:
AMD Saxony Limited Liability Company & Co. KG
Sitz
2008 May 13
3
Xen HVM cpuid problem
Hi Keir,
For HVM guests, all cpuid Fn''s going through domain_cpuid()
iterate over the loop and then return 0 for all four registers.
Guests OS''s and cpuid tools in HVM which query for
cpuid Fn 0000.0000 %eax and 8000.0000 %eax, see the value 0 and think,
Xen emulates oldish 386/486 CPUs.
This leads to strange boot failures, "your CPU does not support long mode"
or