similar to: [PATCH] a clean up to vmx.c

Displaying 20 results from an estimated 50000 matches similar to: "[PATCH] a clean up to vmx.c"

2005 Sep 23
0
[PATCH] [VT] clean up VMX builder
This patch clean up VMX builder. Since now we have vmxloader, old code loading linux kernel directly is not needed. 1. remove linux parameters. 2. remove init ramdisk. 3. remove e820 memmap config file parse. Also e820 map handling code is changed in vmx_setup_platform. 4. remove provisional GDT, and construct_init_guest_vmcs is updated greatly. 5. remove some ugly tailing space. Thanks Keir for
2005 Sep 29
0
RE: [PATCH] [VT] SMP VMX guest AP bring up need calldo_boot_vcpu in hypervisor
Jun suggested to use another elegant way, pls ignore this one. -Xin >SMP VMX guest AP bring up need call do_boot_vcpu in hypervisor. >Current call to do_boot_vcpu always from domain, however, for SMP VMX >guest AP bring up, it is called from xen hypervisor. >Signed-off-by: Xin Li <xin.b.li@intel.com> > >diff -r f069a06e650f xen/common/domain.c >--- a/xen/common/domain.c
2006 Aug 02
1
[PATCH] Cleanup vmx vmexit handler.
Cleanup vmx vmexit handler. Current code doesn''t handle vmexits caused by triple fault, INIT, SIPI, etc, which are listed in IA32 Architecture System Programming Guide 2, Appendix I VMX Basic Exit Reasons, and calls __hvm_bug() when not handling such cases, actually domain crash should be good enough. Also various coding style cleanups. Signed-off-by: Xin Li <xin.b.li@intel.com>
2005 Dec 15
0
[PATCH] check before relinquishing vlapic because VMX domain may crash very early
check before relinquishing vlapic because VMX domain may crash very early. Signed-off-by: Xin Li <xin.b.li@intel.com> Also pls push to xen-3.0-testing.hg. thanks diff -r dc8122d90670 xen/arch/x86/vmx.c --- a/xen/arch/x86/vmx.c Wed Dec 14 18:47:16 2005 +++ b/xen/arch/x86/vmx.c Thu Dec 15 16:18:14 2005 @@ -113,9 +113,10 @@ if ( active_ac_timer(&v->arch.arch_vmx.hlt_timer)
2005 Nov 11
3
[PATCH] add MOVSX instr support to VMX MMIO decoder
Add MOVSX instr support to VMX MMIO decoder. Signed-off-by: Xin Li <xin.b.li@intel.com> _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2005 Sep 01
0
[PATCH][VT]Make 32-bit VMX guest work on 64-bit host
Ian, Keir, This patch is to boot 32-bit VMX guest on the 64-bit host. Double-compile is used to make both 64-bit guest and 32-bit guest can work, the shadow page-table uses current 64-bit shadow code''s structure to simulate 32-bit guest''s 2-level page-table. Signed-off-by: Chengyuan Li <chengyuan.li@intel.com> Signed-off-by: Xiaohui Xin <xiaohui.xin@intel.com>
2007 Mar 28
7
[PATCH] Proper use of VMX execution controls MSR.
Better use of VMX execution controls MSR. Signed-off-by: Xin Li<xin.b.li@intel.com> _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2006 Oct 08
0
RE: [PATCH] add RDMSR/WRMSR instruction emulationtoVMXAssist decoder
Can you please check the vcpu status? I suspect one of the vcpu is blocked by halt instruction. Thanks Yunhong Jiang >-----Original Message----- >From: xen-devel-bounces@lists.xensource.com >[mailto:xen-devel-bounces@lists.xensource.com] On Behalf Of Tim Deegan >Sent: 2006年10月5日 23:55 >To: Li, Xin B >Cc: xen-devel@lists.xensource.com >Subject: Re: [Xen-devel] [PATCH] add
2020 Jul 21
0
[PATCH v9 11/84] KVM: x86: add .cr3_write_intercepted()
From: Nicu?or C??u <ncitu at bitdefender.com> This function will be used to allow the introspection tool to disable the CR3-write interception when it is no longer interested in these events, but only if nothing else depends on these VM-exits. Signed-off-by: Nicu?or C??u <ncitu at bitdefender.com> Signed-off-by: Adalbert Laz?r <alazar at bitdefender.com> ---
2020 Feb 07
0
[RFC PATCH v7 11/78] KVM: x86: add .control_cr3_intercept() to struct kvm_x86_ops
This function is needed for the KVMI_VCPU_CONTROL_CR command. Co-developed-by: Nicu?or C??u <ncitu at bitdefender.com> Signed-off-by: Nicu?or C??u <ncitu at bitdefender.com> Signed-off-by: Adalbert Laz?r <alazar at bitdefender.com> --- arch/x86/include/asm/kvm_host.h | 6 ++++++ arch/x86/kvm/svm.c | 14 ++++++++++++++ arch/x86/kvm/vmx/vmx.c | 26
2020 Jul 21
0
[PATCH v9 10/84] KVM: x86: add .control_cr3_intercept() to struct kvm_x86_ops
This function is needed for the KVMI_VCPU_CONTROL_CR command, when the introspection tool has to intercept the read/write access to CR3. Co-developed-by: Nicu?or C??u <ncitu at bitdefender.com> Signed-off-by: Nicu?or C??u <ncitu at bitdefender.com> Signed-off-by: Adalbert Laz?r <alazar at bitdefender.com> --- arch/x86/include/asm/kvm_host.h | 6 ++++++ arch/x86/kvm/svm/svm.c
2005 Oct 31
2
[PATCH] Fix PAE shadow on a machine with RAM above 4G on x86_64 xen
Fix PAE shadow on a machine with RAM above 4G on x86_64 xen. Currently, on a machine with RAM above 4G, we can not run 32bit VMX guest on x86_64 xen, the root cause is that the PAE page table PDPT must below 4G, this patch fixes this issue. Also did some cleanup. Signed-off-by: Xin Li <xin.b.li@intel.com> Signed-off-by: Jun Nakajima <jun.nakajima@intel.com>
2006 Oct 24
1
RE: [Patch] Add hardware CR8 acceleration for TPRaccessing
Thanks for your advice. I will re-organize the patch. Thanks -- Dexuan -----Original Message----- From: Li, Xin B Sent: 2006年10月24日 18:08 To: Petersson, Mats; Cui, Dexuan; Betak, Travis Cc: xen-devel@lists.xensource.com Subject: RE: [Xen-devel] [Patch] Add hardware CR8 acceleration for TPRaccessing >> From: xen-devel-bounces@lists.xensource.com >>
2005 Oct 03
1
RE: [PATCH] [VT] SMP VMX guest AP bring up need calldo_boot_vcpu in hypervisor
Hi Keir, this patch changes common code of xen hypervisor, but seems we have to, because current call to do_boot_vcpu is always from domains, however, for SMP VMX guest AP bring up, we need call it from xen hypervisor, so we''d like to split it. What''s your opinion? _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com
2006 Jul 14
4
VMX status report 10680:f692a0a476c5
We have tested the latest xen on VT platform with Intel 915/E8500 chipset. Here is the test summary: Issues: - Cannot boot Four VMX at same time on IA32 host - Cannot boot Windows XP SP1/SP2 on IA32e host - Create IA32-PAE VMX on IA32e host will make VMX kernel panic - Create IA32 VMX on IA32e host will make VMX hang - Destroying VMX with 4G memory may make xend hang on IA-32e IA-32: -
2005 Sep 27
0
[PATCH][VT] add "wbinvd" instruction emulattion for real mode code
This patch adds "wbinvd" instruction emulation for vm86 mode. This is needed when we bring up AP of SMP VMX guest. Signed-off-by: Xin Li <xin.b.li@intel.com> diff -r 94c6fc048d8e tools/firmware/vmxassist/vm86.c --- a/tools/firmware/vmxassist/vm86.c Fri Sep 23 11:52:43 2005 +++ b/tools/firmware/vmxassist/vm86.c Tue Sep 27 17:17:25 2005 @@ -752,6 +752,9 @@
2006 Apr 13
0
[PATCH] only BSP can really do clear_all_shadow_status
only BSP can really do clear_all_shadow_status. This fixes SMP IA32 VMX guest booting on IA32 xen. Signed-off-by: Xin Li <xin.b.li@intel.com> _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2005 Jul 04
0
[PATCH] MSR save/restore for x86_64 VMX domains
To avoid MSR save/restore at every VM exit/entry time, we restore the x86_64 specific MSRs at domain switch time if modified. In VMX domains, we modify those upon requests from the guests to that end. Note that IA32_EFER.LME and IA32_EFER.LMA are saved/restored by H/W on every VM exit. For the usual domains (i.e. dom0 and domU), those MSRs are not modified once set at initialization time, so we
2006 Feb 18
4
[PATCH] HVM x86_32 PAE guest support on 64-bit Xen
The patch enables x86_32 PAE unmodified guests on 64-bit Xen when the hvm feature is present. We tested only Linux at this point, and we''ll improve the functionality as we test other guests. The SVM needs the equivalent changes to the vmc.c to get this functionality working, but this patch does not break the build. Signed-off-by: Jun Nakajima <jun.nakajima@intel.com>
2017 Sep 25
0
[PATCH v1 4/4] KVM/vmx: enable lbr for the guest
Passthrough the LBR stack to the guest, and auto switch the stack MSRs upon VMEntry and VMExit. Signed-off-by: Wei Wang <wei.w.wang at intel.com> --- arch/x86/kvm/vmx.c | 50 ++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 50 insertions(+) diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index 5f5c2f1..35e02a7 100644 --- a/arch/x86/kvm/vmx.c +++ b/arch/x86/kvm/vmx.c