On 10/5/17, 6:13 AM, "Andrew Cooper" wrote:
On 05/10/17 14:04, Sergey Dyasli wrote:
> On Thu, 2017-10-05 at 03:27 -0600, Jan Beulich wrote:
> On 05.10.17 at 10:18, wrote:
>>> --- a/xen/arch/x86/hvm/vmx/entry.S
>>> +++
> On Sep 13, 2016, at 9:10 AM, Nakajima, Jun <jun.nakaj...@intel.com> wrote:
>
>
>> On Sep 13, 2016, at 2:05 AM, Andrew Cooper <andrew.coop...@citrix.com> wrote:
>>
>> On 13/09/16 08:51, Jan Beulich wrote:
>>>>>> On 12.09.16 at 19:
> On Sep 13, 2016, at 2:05 AM, Andrew Cooper wrote:
>
> On 13/09/16 08:51, Jan Beulich wrote:
> On 12.09.16 at 19:28, wrote:
>> Please try to get quoting right - your response was rather hard to
>> follow.
>>
>>> On Sep 12, 2016, at 2:00
On Sep 12, 2016, at 2:00 AM, Jan Beulich
> wrote:
On 12.09.16 at 10:47,
> wrote:
c/s 350bc1a9d4 "x86: support newer Intel CPU models" changed the set of
MSRs read by Xeon Broadwell hardware
BTW, we use "package ID", rather than "socket ID" in the SDM.
Assignment of the package IDs on a system is a BIOS matter. Basically
BIOS needs to assign package IDs to resolve APIC ID collision at early
boot time, and the convention is up to the vendor/or the specific
system configuration agents.
On Mon, Jul 20, 2015 at 4:57 PM, Ed White edmund.h.wh...@intel.com wrote:
In preparation for selectively enabling #VE in a later patch, set
suppress #VE on all EPTE's.
Suppress #VE should always be the default condition for two reasons:
it is generally not safe to deliver #VE into a guest
On Wed, Jul 1, 2015 at 11:09 AM, Ed White edmund.h.wh...@intel.com wrote:
Implement and hook up the code to enable VMX support of VMFUNC and #VE.
VMFUNC leaf 0 (EPTP switching) emulation is added in a later patch.
Signed-off-by: Ed White edmund.h.wh...@intel.com
Acked-by: Jun Nakajima
On Wed, Jul 1, 2015 at 11:09 AM, Ed White edmund.h.wh...@intel.com wrote:
Currently, neither is enabled globally but may be enabled on a per-VCPU
basis by the altp2m code.
Remove the check for EPTE bit 63 == zero in ept_split_super_page(), as
that bit is now hardware-defined.
Signed-off-by:
On Wed, Jul 1, 2015 at 11:09 AM, Ed White edmund.h.wh...@intel.com wrote:
In preparation for selectively enabling #VE in a later patch, set
suppress #VE on all EPTE's.
Suppress #VE should always be the default condition for two reasons:
it is generally not safe to deliver #VE into a guest