OBS User unknown
2008-11-08 19:32:12 +00:00
committed by Git OBS Bridge
parent 9911a53e56
commit 09450d07be
41 changed files with 1828 additions and 680 deletions

View File

@@ -42,7 +42,7 @@ Index: xen-3.3.1-testing/xen/arch/x86/hvm/hvm.c
hvm_funcs.domain_destroy(d);
rtc_deinit(d);
stdvga_deinit(d);
@@ -645,8 +647,14 @@ int hvm_vcpu_initialise(struct vcpu *v)
@@ -644,8 +646,14 @@ int hvm_vcpu_initialise(struct vcpu *v)
{
int rc;
@@ -57,7 +57,7 @@ Index: xen-3.3.1-testing/xen/arch/x86/hvm/hvm.c
if ( (rc = hvm_funcs.vcpu_initialise(v)) != 0 )
goto fail2;
@@ -693,12 +701,14 @@ int hvm_vcpu_initialise(struct vcpu *v)
@@ -692,12 +700,14 @@ int hvm_vcpu_initialise(struct vcpu *v)
hvm_funcs.vcpu_destroy(v);
fail2:
vlapic_destroy(v);
@@ -72,7 +72,7 @@ Index: xen-3.3.1-testing/xen/arch/x86/hvm/hvm.c
hvm_vcpu_cacheattr_destroy(v);
vlapic_destroy(v);
hvm_funcs.vcpu_destroy(v);
@@ -1647,7 +1657,7 @@ void hvm_cpuid(unsigned int input, unsig
@@ -1645,7 +1655,7 @@ void hvm_cpuid(unsigned int input, unsig
struct vcpu *v = current;
if ( cpuid_hypervisor_leaves(input, eax, ebx, ecx, edx) )
@@ -81,7 +81,7 @@ Index: xen-3.3.1-testing/xen/arch/x86/hvm/hvm.c
domain_cpuid(v->domain, input, *ecx, eax, ebx, ecx, edx);
@@ -1659,6 +1669,8 @@ void hvm_cpuid(unsigned int input, unsig
@@ -1657,6 +1667,8 @@ void hvm_cpuid(unsigned int input, unsig
if ( vlapic_hw_disabled(vcpu_vlapic(v)) )
__clear_bit(X86_FEATURE_APIC & 31, edx);
}
@@ -90,7 +90,7 @@ Index: xen-3.3.1-testing/xen/arch/x86/hvm/hvm.c
}
void hvm_rdtsc_intercept(struct cpu_user_regs *regs)
@@ -1749,6 +1761,8 @@ int hvm_msr_read_intercept(struct cpu_us
@@ -1747,6 +1759,8 @@ int hvm_msr_read_intercept(struct cpu_us
break;
default:
@@ -99,7 +99,7 @@ Index: xen-3.3.1-testing/xen/arch/x86/hvm/hvm.c
return hvm_funcs.msr_read_intercept(regs);
}
@@ -1837,6 +1851,8 @@ int hvm_msr_write_intercept(struct cpu_u
@@ -1835,6 +1849,8 @@ int hvm_msr_write_intercept(struct cpu_u
break;
default:
@@ -108,7 +108,7 @@ Index: xen-3.3.1-testing/xen/arch/x86/hvm/hvm.c
return hvm_funcs.msr_write_intercept(regs);
}
@@ -1963,6 +1979,10 @@ int hvm_do_hypercall(struct cpu_user_reg
@@ -1961,6 +1977,10 @@ int hvm_do_hypercall(struct cpu_user_reg
case 0:
break;
}
@@ -119,7 +119,7 @@ Index: xen-3.3.1-testing/xen/arch/x86/hvm/hvm.c
if ( (eax >= NR_hypercalls) || !hvm_hypercall32_table[eax] )
{
@@ -2464,6 +2484,15 @@ long do_hvm_op(unsigned long op, XEN_GUE
@@ -2462,6 +2482,15 @@ long do_hvm_op(unsigned long op, XEN_GUE
rc = -EINVAL;
break;