From: Avi Kivity <[EMAIL PROTECTED]>
We now detect event injection using the interrupt and exception queues,
not the IDT-Vectoring info field.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 67b02c0..c4510fe 100644
--- a/arch/x86/kvm/vmx.c
From: Alexander Graf <[EMAIL PROTECTED]>
Netware writes to DEBUGCTL and reads from the DEBUGCTL and LAST*IP MSRs
without further checks and is really confused to receive a #GP during that.
To make it happy we should just make them stubs, which is exactly what SVM
already does.
Writes to DEBUGCTL
From: Avi Kivity <[EMAIL PROTECTED]>
Recent changes to the page zapping code made it vulnerable to changes
to invalid shadow ptes (which are nonsensical anyway). Detect those
and skip them.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index
From: Avi Kivity <[EMAIL PROTECTED]>
An invalid page may still contain sptes, as the current vcpu may not have
had the chance to unload its root after the page was marked invalid.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index 33cc39c..2b
From: Ingo Molnar <[EMAIL PROTECTED]>
x86 -tip testing found this build bug:
arch/x86/kvm/built-in.o:(.text.fixup+0x1): relocation truncated to fit:
R_X86_64_32 against `.text'
arch/x86/kvm/built-in.o:(.text.fixup+0xb): relocation truncated to fit:
R_X86_64_32 against `.text'
arch/x86/kvm/bu
From: Avi Kivity <[EMAIL PROTECTED]>
Conflicts:
arch/powerpc/kvm/Makefile
arch/x86/kvm/mmu.c
arch/x86/kvm/svm.c
arch/x86/kvm/vmx.c
arch/x86/kvm/x86.c
arch/x86/kvm/x86_emulate.c
include/asm-x86/kvm.h
include/asm-x86/kvm_host.h
From: Sheng Yang <[EMAIL PROTECTED]>
Signed-off-by: Sheng Yang <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 2071e3f..77729c0 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@ -3321,7 +3321,7 @@ static int __
From: Sheng Yang <[EMAIL PROTECTED]>
As well as move set base/mask ptes to vmx_init().
Signed-off-by: Sheng Yang <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 77729c0..67b02c0 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arc
From: H. Peter Anvin <[EMAIL PROTECTED]>
extboot's use of interrupt vectors $0x2b and $0x2c is unsafe, as these
interrupt vectors fall in the OS-use range (0x20-0x3f). Furthermore,
it's unnecessary: we can keep a local pointer instead of hooking
another interrupt as long as we can write to our ow
From: H. Peter Anvin <[EMAIL PROTECTED]>
this allows extboot to place its int13 chain in the code segment.
Signed-off-by: H. Peter Anvin <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
diff --git a/qemu/hw/pc.c b/qemu/hw/pc.c
index 26e3540..3a8269b 100644
--- a/qemu/hw/pc.c
+++
From: Avi Kivity <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
diff --git a/kernel/external-module-compat.h b/kernel/external-module-compat.h
index dfd90cf..49751fc 100644
--- a/kernel/external-module-compat.h
+++ b/kernel/external-module-compat.h
@@ -746,3 +746,14 @@ static i
From: Avi Kivity <[EMAIL PROTECTED]>
Conflicts:
qemu/configure
qemu/console.c
qemu/hw/e1000.c
qemu/hw/eepro100.c
qemu/hw/ne2000.c
qemu/hw/pc.c
qemu/hw/rtl8139.c
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
--
To unsubscribe from this list:
From: Marcelo Tosatti <[EMAIL PROTECTED]>
Early Windows 2003 SMP initialization contains a
mov imm32, r/m32
instruction that is patched by tpr optimization. Problem is rsp, used by
the patched instruction, is zero, so the guest gets a double fault and
dies.
Avoid any patching at all if rsp is
13 matches
Mail list logo