Displaying 20 results from an estimated 200 matches similar to: "[PATCH] svm: support EFER.LMSLE for guests"
2007 Aug 09
1
[PATCH] svm: allow guest to use EFER.FFXSE and EFER.LMSLE
(Applies cleanly only on top of the previously sent SVM/LBR patch.)
Signed-off-by: Jan Beulich <jbeulich@novell.com>
Index: 2007-08-08/xen/arch/x86/hvm/svm/svm.c
===================================================================
--- 2007-08-08.orig/xen/arch/x86/hvm/svm/svm.c 2007-08-08 11:40:11.000000000 +0200
+++ 2007-08-08/xen/arch/x86/hvm/svm/svm.c 2007-08-08 11:43:53.000000000 +0200
2010 Aug 05
3
[PATCH 08/14] Nested Virtualization: efer
Signed-off-by: Christoph Egger <Christoph.Egger@amd.com>
--
---to satisfy European Law for business letters:
Advanced Micro Devices GmbH
Einsteinring 24, 85609 Dornach b. Muenchen
Geschaeftsfuehrer: Alberto Bozzo, Andrew Bowd
Sitz: Dornach, Gemeinde Aschheim, Landkreis Muenchen
Registergericht Muenchen, HRB Nr. 43632
_______________________________________________
Xen-devel mailing list
2007 Apr 18
1
No subject
[PATCH] Clean up x86 control register and MSR macros
This patch is based on Rusty's recent cleanup of the EFLAGS-related
macros; it extends the same kind of cleanup to control registers and
MSRs.
It also unifies these between i386 and x86-64; at least with regards
to MSRs, the two had definitely gotten out of sync.
Signed-off-by: H. Peter Anvin <hpa@zytor.com>
diff -urN
2007 Apr 18
1
No subject
[PATCH] Clean up x86 control register and MSR macros
This patch is based on Rusty's recent cleanup of the EFLAGS-related
macros; it extends the same kind of cleanup to control registers and
MSRs.
It also unifies these between i386 and x86-64; at least with regards
to MSRs, the two had definitely gotten out of sync.
Signed-off-by: H. Peter Anvin <hpa@zytor.com>
diff -urN
2007 Apr 18
2
[PATCH] Clean up x86 control register and MSR macros (corrected)
This patch is based on Rusty's recent cleanup of the EFLAGS-related
macros; it extends the same kind of cleanup to control registers and
MSRs.
It also unifies these between i386 and x86-64; at least with regards
to MSRs, the two had definitely gotten out of sync.
Signed-off-by: H. Peter Anvin <hpa@zytor.com>
diff -urN --exclude='o.*' --exclude '*~'
2007 Apr 18
2
[PATCH] Clean up x86 control register and MSR macros (corrected)
This patch is based on Rusty's recent cleanup of the EFLAGS-related
macros; it extends the same kind of cleanup to control registers and
MSRs.
It also unifies these between i386 and x86-64; at least with regards
to MSRs, the two had definitely gotten out of sync.
Signed-off-by: H. Peter Anvin <hpa@zytor.com>
diff -urN --exclude='o.*' --exclude '*~'
2007 Jan 31
7
[PATCH][SVM] remove FFXSR CPUID bit for AMD-V HVM guests
Remove visibility of the FFXSR CPUID bit to an HVM guest.
This patch allows HVM Windows x64 to install/boot on AMD-V platforms.
This patches applies cleanly to xen-unstable 13743.
Please apply to xen-unstable/3.0.5.
If possible, pls apply to xen-3.0.4-testing.
--Tom
thomas.woller@amd.com
AMD Corporation
5204 E. Ben White Blvd. UBC1
Austin, Texas 78741
+1-512-602-0059
2007 Aug 08
2
[PATCH] x86-64: syscall/sysenter support for 32-bit apps
.. for both 32-bit apps in 64-bit pv guests and 32on64.
This patch depends on more than just guest_context saved/restored as guest
state during save/restore/migrate (namely the new fields holding callback
addresses).
Since the 32-bit kernel doesn''t make use of syscall (it would be possible to
do so now, when running on a 64-bit hv), the compat mode guest code path for
syscall
2005 Jul 13
2
RE: Re: [Xen-changelog] Fix NX/XD enable on secondary CPUs.
Whether the processor is in 32 or 64-bit mode, if NX is used, then
EFER_NX needs to be set. If NX isn''t used, then it''s a "Don''t care". I
think bad things happens if you set the NX bit in the page table and
don''t have EFER_NX set...
--
Mats
> -----Original Message-----
> From: xen-devel-bounces@lists.xensource.com
>
2013 Sep 22
1
[PATCH] Nested VMX: Expose unrestricted guest feature to guest
From: Yang Zhang <yang.z.zhang@Intel.com>
With virtual unrestricted guest feature, L2 guest is allowed to run
with PG cleared. Also, allow PAE not set during virtual vmexit emulation.
Signed-off-by: Yang Zhang <yang.z.zhang@Intel.com>
---
xen/arch/x86/hvm/hvm.c | 3 ++-
xen/arch/x86/hvm/vmx/vvmx.c | 3 +++
2 files changed, 5 insertions(+), 1 deletions(-)
diff --git
2013 Apr 19
0
[PATCH] x86/HVM: move per-vendor function tables into .init.data
hvm_enable() copies the table contents rather than storing the pointer,
so there''s no need to keep these tables post-boot.
Also constify the return values of the per-vendor initialization
functions, making clear that once the per-vendor initialization is
complete, the vendor specific tables won''t get modified anymore.
Finally, in hvm_enable(), use the returned pointer for all
2012 Sep 11
0
[PATCH 1/3] x86/hvm: don't use indirect calls without need
Direct calls perform better, so we should prefer them and use indirect
ones only when there indeed is a need for indirection.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
--- a/xen/arch/x86/apic.c
+++ b/xen/arch/x86/apic.c
@@ -1373,7 +1373,7 @@ void error_interrupt(struct cpu_user_reg
void pmu_apic_interrupt(struct cpu_user_regs *regs)
{
ack_APIC_irq();
-
2013 Oct 30
3
[PATCH 4/4] XSA-60 security hole: flush cache when vmentry back to UC guest
From 159251a04afcdcd8ca08e9f2bdfae279b2aa5471 Mon Sep 17 00:00:00 2001
From: Liu Jinsong <jinsong.liu@intel.com>
Date: Thu, 31 Oct 2013 06:38:15 +0800
Subject: [PATCH 4/4] XSA-60 security hole: flush cache when vmentry back to UC guest
This patch flush cache when vmentry back to UC guest, to prevent
cache polluted by hypervisor access guest memory during UC mode.
The elegant way to do this
2008 May 06
4
[PATCH] fixup 3dnow! support
qemu recently added support for 3dnow instructions. Because of
that, 3dnow will be featured among cpuid bits. But this will
break kvm in cpus that don't have those instructions (which includes
my laptop). So we fixup our cpuid before exposing it to the guest.
Signed-off-by: Glauber Costa <gcosta at redhat.com>
---
arch/x86/kvm/x86.c | 22 ++++++++++++++++++----
2008 May 06
4
[PATCH] fixup 3dnow! support
qemu recently added support for 3dnow instructions. Because of
that, 3dnow will be featured among cpuid bits. But this will
break kvm in cpus that don't have those instructions (which includes
my laptop). So we fixup our cpuid before exposing it to the guest.
Signed-off-by: Glauber Costa <gcosta at redhat.com>
---
arch/x86/kvm/x86.c | 22 ++++++++++++++++++----
2007 Mar 05
0
[PATCH 5/5] SVM: Clear VMCB''s EFER.LME when guest disables paging
[SVM] Clear VMCB''s EFER.LME when guest disables paging
Since the guest''s CR0.PG is always set (in shadow paging), EFER.LME must
be cleared along with EFER.LMA when the guest is disabling paging.
Signed-off-by: Travis Betak <travis.betak@amd.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
2005 Jul 13
2
Re: [Xen-changelog] Fix NX/XD enable on secondary CPUs.
Xen patchbot -unstable <patchbot-unstable@lists.xensource.com> writes:
> Fix NX/XD enable on secondary CPUs.
> Signed-off-by: Keir Fraser <keir@xensource.com>
I think I have this problem with PAE as well. Machine is SMP
(hyperthreaded). PAE dom0 boots fine on CPU #0. PAE domU is bound to
CPU #1 by default and boots to the login prompt as well, but only with
NX disabled (and
2007 Apr 18
1
[RFC/PATCH LGUEST X86_64 03/13] lguest64 core
plain text document attachment (lguest64.patch)
This is the main core code for the lguest64.
Have fun, and don't hurt the puppies!
Signed-off-by: Steven Rostedt <srostedt@redhat.com>
Signed-off-by: Glauber de Oliveira Costa <glommer@gmail.com>
Cc: Chris Wright <chrisw@sous-sol.org>
Index: work-pv/arch/x86_64/lguest/Makefile
2007 Apr 18
1
[RFC/PATCH LGUEST X86_64 03/13] lguest64 core
plain text document attachment (lguest64.patch)
This is the main core code for the lguest64.
Have fun, and don't hurt the puppies!
Signed-off-by: Steven Rostedt <srostedt@redhat.com>
Signed-off-by: Glauber de Oliveira Costa <glommer@gmail.com>
Cc: Chris Wright <chrisw@sous-sol.org>
Index: work-pv/arch/x86_64/lguest/Makefile
2006 Nov 29
25
EFER in HVM guests
Is it intentional that
- under SVM, 32-bit guests can freely set EFER.LME
- under VMX, 32-bit guests can''t access EFER at all?
Thanks, Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel