Displaying 20 results from an estimated 60000 matches similar to: "[PATCH 2/3] Add ppc dynamic change handle at dom0 side"
2012 Feb 23
7
[PATCH 2/2] RFC: Xen pad logic
From ba9abf6ee7e5fe0515e2d51b14743c8d5416285c Mon Sep 17 00:00:00 2001
From: Liu, Jinsong <jinsong.liu@intel.com>
Date: Fri, 24 Feb 2012 02:18:02 +0800
Subject: [PATCH 2/2] Xen pad logic
This patch implement Xen pad logic, and when getting pad device
notification, it hypercalls to Xen hypervisor for core parking.
Signed-off-by: Liu, Jinsong <jinsong.liu@intel.com>
---
2007 May 16
0
FW: trap/interrupt gate for hypercall
Sorry, forget to join lists.
Regards,
Jinsong
-----Original Message-----
From: Liu, Jinsong
Sent: 2007年5月16日 8:23
To: ''Keir Fraser''; Tian, Kevin; xen-devel@lists.xensource.com
Subject: RE: [Xen-devel] trap/interrupt gate for hypercall
In native linux, syscall (gate type 15) and its RESTORE_ALL code provides weak fixup mechanism when reload segment register, by sending 0
2012 Feb 28
3
[Patch] X86: expose HLE/RTM features to dom0
X86: expose HLE/RTM features to dom0
Intel recently release 2 new features, HLE and TRM.
Refer to http://software.intel.com/file/41417.
This patch expose them to dom0.
Signed-off-by: Liu, Jinsong <jinsong.liu@intel.com>
diff -r 92e03310878f xen/arch/x86/traps.c
--- a/xen/arch/x86/traps.c Wed Feb 08 21:05:52 2012 +0800
+++ b/xen/arch/x86/traps.c Mon Feb 27 02:23:42 2012 +0800
@@ -857,9
2011 Jul 25
0
[xen-unstable test] 8270: regressions - trouble: broken/fail/pass
flight 8270 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/8270/
Regressions :-(
Tests which did not succeed and are blocking:
test-amd64-amd64-xl-pcipt-intel 5 xen-boot fail REGR. vs. 8256
test-amd64-i386-rhel6hvm-intel 3 host-install(3) broken
test-amd64-amd64-win 3 host-install(3) broken
test-amd64-i386-pv
2013 Dec 02
0
[PATCH v4 3/7] X86: MPX IA32_BNDCFGS msr handle
From 291adaf4ad6174c5641a7239c1801373e92e9975 Mon Sep 17 00:00:00 2001
From: Liu Jinsong <jinsong.liu@intel.com>
Date: Thu, 28 Nov 2013 05:26:06 +0800
Subject: [PATCH v4 3/7] X86: MPX IA32_BNDCFGS msr handle
When MPX supported, a new guest-state field for IA32_BNDCFGS
is added to the VMCS. In addition, two new controls are added:
- a VM-exit control called "clear BNDCFGS"
- a
2008 Jul 24
3
FW: cpufreq info propagation
it seems getting lost, and thus resend.
Thanks,
Kevin
-----Original Message-----
From: Tian, Kevin
Sent: 2008年7月24日 8:39
To: ''Jan Beulich''
Cc: Liu, Jinsong; Keir Fraser; xen-devel@lists.xensource.com; mark.langsdorf@amd.com
Subject: RE: [Xen-devel] cpufreq info propagation
>From: Jan Beulich
>Sent: 2008年7月23日 18:13
>>
>>startup info is viable. But how
2011 Mar 13
0
[xen-4.1-testing test] 6412: regressions - FAIL
flight 6412 xen-4.1-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/6412/
Regressions :-(
Tests which did not succeed and are blocking:
test-amd64-xcpkern-i386-xl-credit2 11 guest-localmigrate fail REGR. vs. 6379
Tests which did not succeed, but are not blocking,
including regressions (tests previously passed) regarded as allowable:
test-amd64-amd64-win 16
2011 Jul 22
0
[PATCH] Dump mce log by ERST when mc panic
Dump mce log by ERST when mc panic
We have implemented basic ERST logic before. Now linux3.0 as dom0 has included APEI logic. Hence it''s time to add mce apei interface and enable APEI ERST feature.
With it, it can save mce log by ERST method when mc panic.
Signed-off-by: Liu, Jinsong <jinsong.liu@intel.com>
diff -r ca2f58c2dfea xen/arch/x86/cpu/mcheck/mce.c
---
2008 Sep 17
5
c/s 18470
This changeset reverts two previous corrections, for reasons that escape
me.
First, the domain map is again being confined to NR_CPUS, which I had
submitted a patch to fix recently (yes, I realize the code has a TODO in
there, but those really get forgotten about far too often).
Second, the platform hypercall was reverted back to require all
information to be passed to Xen in one chunk, whereas
2011 Dec 16
0
[xen-unstable test] 10504: regressions - FAIL
flight 10504 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/10504/
Regressions :-(
Tests which did not succeed and are blocking:
test-amd64-amd64-xl-sedf 14 guest-localmigrate/x10 fail REGR. vs. 10491
test-amd64-i386-win 7 windows-install fail REGR. vs. 10491
test-amd64-amd64-xl-winxpsp3 7 windows-install fail REGR. vs. 10491
2011 Dec 16
0
[xen-unstable test] 10511: regressions - FAIL
flight 10511 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/10511/
Regressions :-(
Tests which did not succeed and are blocking:
test-amd64-amd64-xl-sedf 14 guest-localmigrate/x10 fail in 10504 REGR. vs. 10491
Tests which are failing intermittently (not blocking):
test-amd64-amd64-xl-sedf 13 guest-localmigrate.2 fail pass in 10504
test-i386-i386-win
2013 Oct 22
0
Re: [PATCH V3] xl: HVM domain S3 bugfix
Ian Campbell wrote:
> On Mon, 2013-09-09 at 03:29 +0000, Liu, Jinsong wrote:
>> From 18344216b432648605726b137b348f28ef64a4ef Mon Sep 17 00:00:00
>> 2001
>> From: Liu Jinsong <jinsong.liu@intel.com>
>> Date: Fri, 23 Aug 2013 23:30:23 +0800
>> Subject: [PATCH V3] xl: HVM domain S3 bugfix
>>
>> Currently Xen hvm s3 has a bug coming from the
2020 Sep 15
0
[PATCH RFC v1 08/18] x86/hyperv: handling hypercall page setup for root
Wei Liu <wei.liu at kernel.org> writes:
> On Tue, Sep 15, 2020 at 01:02:08PM +0200, Vitaly Kuznetsov wrote:
>> Wei Liu <wei.liu at kernel.org> writes:
>>
>> > On Tue, Sep 15, 2020 at 12:32:29PM +0200, Vitaly Kuznetsov wrote:
>> >> Wei Liu <wei.liu at kernel.org> writes:
>> >>
>> >> > When Linux is running as the
2020 Sep 15
0
[PATCH RFC v1 08/18] x86/hyperv: handling hypercall page setup for root
Wei Liu <wei.liu at kernel.org> writes:
> On Tue, Sep 15, 2020 at 12:32:29PM +0200, Vitaly Kuznetsov wrote:
>> Wei Liu <wei.liu at kernel.org> writes:
>>
>> > When Linux is running as the root partition, the hypercall page will
>> > have already been setup by Hyper-V. Copy the content over to the
>> > allocated page.
>>
>> And we
2006 Aug 17
5
Re: [XenPPC] Xencomm for xen/ia64
(CCed to xen-devel for completeness. ;)
On Wed, 2006-08-16 at 17:24 +0200, Tristan Gingold wrote:
> I am porting xen-ppc''s xencomm to xen/ia64.
> Currently on xen/ia64 copy_from/to_guest uses guest virtual address. This
> works well as long as the virtual addresses are in the TLB. When not in TLB
> (or vTLB) the hypercall can''t success without domain help. The
2013 Sep 09
1
[PATCH V3] xl: HVM domain S3 bugfix
From 18344216b432648605726b137b348f28ef64a4ef Mon Sep 17 00:00:00 2001
From: Liu Jinsong <jinsong.liu@intel.com>
Date: Fri, 23 Aug 2013 23:30:23 +0800
Subject: [PATCH V3] xl: HVM domain S3 bugfix
Currently Xen hvm s3 has a bug coming from the difference between
qemu-traditioanl and qemu-xen. For qemu-traditional, the way to
resume from hvm s3 is via ''xl trigger'' command.
2020 Sep 15
0
[PATCH RFC v1 08/18] x86/hyperv: handling hypercall page setup for root
Wei Liu <wei.liu at kernel.org> writes:
> When Linux is running as the root partition, the hypercall page will
> have already been setup by Hyper-V. Copy the content over to the
> allocated page.
And we can't setup a new hypercall page by writing something different
to HV_X64_MSR_HYPERCALL, right?
>
> The suspend, resume and cleanup paths remain untouched because they
2020 Sep 16
1
[EXTERNAL] Re: [PATCH RFC v1 08/18] x86/hyperv: handling hypercall page setup for root
>
> On Tue, Sep 15, 2020 at 12:32:29PM +0200, Vitaly Kuznetsov wrote:
> > Wei Liu <wei.liu at kernel.org> writes:
> >
> > > When Linux is running as the root partition, the hypercall page will
> > > have already been setup by Hyper-V. Copy the content over to the
> > > allocated page.
> >
> > And we can't setup a new hypercall
2009 Jan 22
2
[PATCH 4/4] X86 microcode: add S3 micorcode update
X86 microcode: add S3 micorcode update
When wakeup from S3, use per cpu microcode image to update cpu microcode.
Signed-off-by: Liu, Jinsong <jinsong.liu@intel.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2013 Oct 30
3
[PATCH 4/4] XSA-60 security hole: flush cache when vmentry back to UC guest
From 159251a04afcdcd8ca08e9f2bdfae279b2aa5471 Mon Sep 17 00:00:00 2001
From: Liu Jinsong <jinsong.liu@intel.com>
Date: Thu, 31 Oct 2013 06:38:15 +0800
Subject: [PATCH 4/4] XSA-60 security hole: flush cache when vmentry back to UC guest
This patch flush cache when vmentry back to UC guest, to prevent
cache polluted by hypervisor access guest memory during UC mode.
The elegant way to do this