31 Mar, 2011
1 commit
-
Fixes generated by 'codespell' and manually reviewed.
Signed-off-by: Lucas De Marchi
19 Mar, 2011
1 commit
-
* 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jikos/trivial: (47 commits)
doc: CONFIG_UNEVICTABLE_LRU doesn't exist anymore
Update cpuset info & webiste for cgroups
dcdbas: force SMI to happen when expected
arch/arm/Kconfig: remove one to many l's in the word.
asm-generic/user.h: Fix spelling in comment
drm: fix printk typo 'sracth'
Remove one to many n's in a word
Documentation/filesystems/romfs.txt: fixing link to genromfs
drivers:scsi Change printk typo initate -> initiate
serial, pch uart: Remove duplicate inclusion of linux/pci.h header
fs/eventpoll.c: fix spelling
mm: Fix out-of-date comments which refers non-existent functions
drm: Fix printk typo 'failled'
coh901318.c: Change initate to initiate.
mbox-db5500.c Change initate to initiate.
edac: correct i82975x error-info reported
edac: correct i82975x mci initialisation
edac: correct commented info
fs: update comments to point correct document
target: remove duplicate include of target/target_core_device.h from drivers/target/target_core_hba.c
...Trivial conflict in fs/eventpoll.c (spelling vs addition)
18 Mar, 2011
1 commit
-
The goal of this document shall be
- overview of all locks used in KVM core
- provide details on the scope of each lock
- explain the lock type, specifically of a raw spin locks
- provide a lock ordering guideSigned-off-by: Jan Kiszka
Signed-off-by: Avi Kivity
15 Feb, 2011
1 commit
-
Signed-off-by: Paul Bolle
Reviewed-by: Jesper Juhl
Signed-off-by: Jiri Kosina
14 Jan, 2011
1 commit
-
* 'kvm-updates/2.6.38' of git://git.kernel.org/pub/scm/virt/kvm/kvm: (142 commits)
KVM: Initialize fpu state in preemptible context
KVM: VMX: when entering real mode align segment base to 16 bytes
KVM: MMU: handle 'map_writable' in set_spte() function
KVM: MMU: audit: allow audit more guests at the same time
KVM: Fetch guest cr3 from hardware on demand
KVM: Replace reads of vcpu->arch.cr3 by an accessor
KVM: MMU: only write protect mappings at pagetable level
KVM: VMX: Correct asm constraint in vmcs_load()/vmcs_clear()
KVM: MMU: Initialize base_role for tdp mmus
KVM: VMX: Optimize atomic EFER load
KVM: VMX: Add definitions for more vm entry/exit control bits
KVM: SVM: copy instruction bytes from VMCB
KVM: SVM: implement enhanced INVLPG intercept
KVM: SVM: enhance mov DR intercept handler
KVM: SVM: enhance MOV CR intercept handler
KVM: SVM: add new SVM feature bit names
KVM: cleanup emulate_instruction
KVM: move complete_insn_gp() into x86.c
KVM: x86: fix CR8 handling
KVM guest: Fix kvm clock initialization when it's configured out
...
12 Jan, 2011
3 commits
-
Adds API documentation for KVM_[DE]ASSIGN_PCI_DEVICE,
KVM_[DE]ASSIGN_DEV_IRQ, KVM_SET_GSI_ROUTING, KVM_ASSIGN_SET_MSIX_NR, and
KVM_ASSIGN_SET_MSIX_ENTRY.Acked-by: Alex Williamson
Acked-by: Michael S. Tsirkin
Signed-off-by: Jan Kiszka
Signed-off-by: Marcelo Tosatti -
If guest can detect that it runs in non-preemptable context it can
handle async PFs at any time, so let host know that it can send async
PF even if guest cpu is not in userspace.Acked-by: Rik van Riel
Signed-off-by: Gleb Natapov
Signed-off-by: Marcelo Tosatti -
Guest enables async PF vcpu functionality using this MSR.
Reviewed-by: Rik van Riel
Signed-off-by: Gleb Natapov
Signed-off-by: Marcelo Tosatti
02 Nov, 2010
1 commit
-
"gadget", "through", "command", "maintain", "maintain", "controller", "address",
"between", "initiali[zs]e", "instead", "function", "select", "already",
"equal", "access", "management", "hierarchy", "registration", "interest",
"relative", "memory", "offset", "already",Signed-off-by: Uwe Kleine-König
Signed-off-by: Jiri Kosina
24 Oct, 2010
7 commits
-
Signed-off-by: Avi Kivity
-
This documents how to detect additional features inside the magic
page when a guest maps it.Signed-off-by: Alexander Graf
-
This adds some documentation for the KVM_INTERRUPT special cases that
PowerPC now implements.Signed-off-by: Alexander Graf
-
This is the guest side of the mtsr acceleration. Using this a guest can now
call mtsrin with almost no overhead as long as it ensures that it only uses
it with (MSR_IR|MSR_DR) == 0. Linux does that, so we're good.Signed-off-by: Alexander Graf
-
Basic informational document about x86 timekeeping and how KVM
is affected.Signed-off-by: Zachary Amsden
Signed-off-by: Marcelo Tosatti -
We need to tell the guest the opcodes that make up a hypercall through
interfaces that are controlled by userspace. So we need to add a call
for userspace to allow it to query those opcodes so it can pass them
on.This is required because the hypercall opcodes can change based on
the hypervisor conditions. If we're running in hardware accelerated
hypervisor mode, a hypercall looks different from when we're running
without hardware acceleration.Signed-off-by: Alexander Graf
Signed-off-by: Avi Kivity -
We just introduced a new PV interface that screams for documentation. So here
it is - a shiny new and awesome text file describing the internal works of
the PPC KVM paravirtual interface.Signed-off-by: Alexander Graf
Signed-off-by: Avi Kivity
02 Aug, 2010
2 commits
-
Signed-off-by: Avi Kivity
Signed-off-by: Marcelo Tosatti -
Signed-off-by: Avi Kivity
Signed-off-by: Marcelo Tosatti
01 Aug, 2010
12 commits
-
Signed-off-by: Avi Kivity
Signed-off-by: Marcelo Tosatti -
Equivalent (and better) functionality is provided by user-allocated memory
regions.Signed-off-by: Avi Kivity
-
As advertised in feature-removal-schedule.txt. Equivalent support is provided
by overlapping memory regions.Signed-off-by: Avi Kivity
-
Signed-off-by: Jason Wang
Signed-off-by: Marcelo Tosatti -
This patch enable save/restore of xsave state.
Signed-off-by: Sheng Yang
Signed-off-by: Marcelo Tosatti -
This patch adds a file that documents the usage of KVM-specific
MSRs.Signed-off-by: Glauber Costa
Reviewed-by: Randy Dunlap
Signed-off-by: Marcelo Tosatti -
Signed-off-by: Avi Kivity
Signed-off-by: Marcelo Tosatti -
Signed-off-by: Avi Kivity
-
When sp->role.direct is set, sp->gfns does not contain any essential
information, leaf sptes reachable from this sp are for a continuous
guest physical memory range (a linear range).
So sp->gfns[i] (if it was set) equals to sp->gfn + i. (PT_PAGE_TABLE_LEVEL)
Obviously, it is not essential information, we can calculate it when need.It means we don't need sp->gfns when sp->role.direct=1,
Thus we can save one page usage for every kvm_mmu_page.Note:
Access to sp->gfns must be wrapped by kvm_mmu_page_get_gfn()
or kvm_mmu_page_set_gfn().
It is only exposed in FNAME(sync_page).Signed-off-by: Lai Jiangshan
Signed-off-by: Avi Kivity -
There's no member "cr4_nxe" in struct kvm_mmu_page_role, it names "nxe" now.
Update mmu document.Signed-off-by: Gui Jianfeng
Signed-off-by: Marcelo Tosatti -
Signed-off-by: Avi Kivity
-
Signed-off-by: Avi Kivity
19 May, 2010
2 commits
-
When cr0.wp=0, we may shadow a gpte having u/s=1 and r/w=0 with an spte
having u/s=0 and r/w=1. This allows excessive access if the guest sets
cr0.wp=1 and accesses through this spte.Fix by making cr0.wp part of the base role; we'll have different sptes for
the two cases and the problem disappears.Signed-off-by: Avi Kivity
Signed-off-by: Marcelo Tosatti -
This file documents cpuid bits used by KVM.
Signed-off-by: Glauber Costa
Acked-by: Zachary Amsden
Signed-off-by: Marcelo Tosatti
17 May, 2010
8 commits
-
Reported by Andrew Jones.
Signed-off-by: Avi Kivity
Signed-off-by: Marcelo Tosatti -
Acked-by: Pekka Enberg
Signed-off-by: Avi Kivity
Signed-off-by: Marcelo Tosatti -
Signed-off-by: Avi Kivity
-
Signed-off-by: Avi Kivity
-
MOL uses its own hypercall interface to call back into userspace when
the guest wants to do something.So let's implement that as an exit reason, specify it with a CAP and
only really use it when userspace wants us to.The only user of it so far is MOL.
Signed-off-by: Alexander Graf
Signed-off-by: Avi Kivity -
Some times we don't want all capabilities to be available to all
our vcpus. One example for that is the OSI interface, implemented
in the next patch.In order to have a generic mechanism in how to enable capabilities
individually, this patch introduces a new ioctl that can be used
for this purpose. That way features we don't want in all guests or
userspace configurations can just not be enabled and we're good.Signed-off-by: Alexander Graf
Signed-off-by: Avi Kivity -
Signed-off-by: Avi Kivity
-
Acked-by: Pekka Enberg
Signed-off-by: Avi Kivity