24 Oct, 2010

7 commits


02 Aug, 2010

2 commits


01 Aug, 2010

12 commits


19 May, 2010

2 commits

  • When cr0.wp=0, we may shadow a gpte having u/s=1 and r/w=0 with an spte
    having u/s=0 and r/w=1. This allows excessive access if the guest sets
    cr0.wp=1 and accesses through this spte.

    Fix by making cr0.wp part of the base role; we'll have different sptes for
    the two cases and the problem disappears.

    Signed-off-by: Avi Kivity
    Signed-off-by: Marcelo Tosatti

    Avi Kivity
     
  • This file documents cpuid bits used by KVM.

    Signed-off-by: Glauber Costa
    Acked-by: Zachary Amsden
    Signed-off-by: Marcelo Tosatti

    Glauber Costa
     

17 May, 2010

8 commits


25 Apr, 2010

3 commits


01 Mar, 2010

1 commit


27 Dec, 2009

1 commit


03 Dec, 2009

3 commits

  • This new IOCTL exports all yet user-invisible states related to
    exceptions, interrupts, and NMIs. Together with appropriate user space
    changes, this fixes sporadic problems of vmsave/restore, live migration
    and system reset.

    [avi: future-proof abi by adding a flags field]

    Signed-off-by: Jan Kiszka
    Signed-off-by: Avi Kivity

    Jan Kiszka
     
  • When we migrate a kvm guest that uses pvclock between two hosts, we may
    suffer a large skew. This is because there can be significant differences
    between the monotonic clock of the hosts involved. When a new host with
    a much larger monotonic time starts running the guest, the view of time
    will be significantly impacted.

    Situation is much worse when we do the opposite, and migrate to a host with
    a smaller monotonic clock.

    This proposed ioctl will allow userspace to inform us what is the monotonic
    clock value in the source host, so we can keep the time skew short, and
    more importantly, never goes backwards. Userspace may also need to trigger
    the current data, since from the first migration onwards, it won't be
    reflected by a simple call to clock_gettime() anymore.

    [marcelo: future-proof abi with a flags field]
    [jan: fix KVM_GET_CLOCK by clearing flags field instead of checking it]

    Signed-off-by: Glauber Costa
    Signed-off-by: Marcelo Tosatti
    Signed-off-by: Avi Kivity

    Glauber Costa
     
  • Support for Xen PV-on-HVM guests can be implemented almost entirely in
    userspace, except for handling one annoying MSR that maps a Xen
    hypercall blob into guest address space.

    A generic mechanism to delegate MSR writes to userspace seems overkill
    and risks encouraging similar MSR abuse in the future. Thus this patch
    adds special support for the Xen HVM MSR.

    I implemented a new ioctl, KVM_XEN_HVM_CONFIG, that lets userspace tell
    KVM which MSR the guest will write to, as well as the starting address
    and size of the hypercall blobs (one each for 32-bit and 64-bit) that
    userspace has loaded from files. When the guest writes to the MSR, KVM
    copies one page of the blob from userspace to the guest.

    I've tested this patch with a hacked-up version of Gerd's userspace
    code, booting a number of guests (CentOS 5.3 i386 and x86_64, and
    FreeBSD 8.0-RC1 amd64) and exercising PV network and block devices.

    [jan: fix i386 build warning]
    [avi: future proof abi with a flags field]

    Signed-off-by: Ed Swierk
    Signed-off-by: Jan Kiszka
    Signed-off-by: Marcelo Tosatti
    Signed-off-by: Avi Kivity

    Ed Swierk
     

10 Sep, 2009

1 commit