01 Mar, 2010

23 commits


25 Jan, 2010

3 commits

  • kvm didn't clear irqfd counter on deassign, as a result we could get a
    spurious interrupt when irqfd is assigned back. this leads to poor
    performance and, in theory, guest crash.

    Signed-off-by: Michael S. Tsirkin
    Signed-off-by: Avi Kivity

    Michael S. Tsirkin
     
  • Otherwise memory beyond irq_states[16] might be accessed.

    Noticed by Juan Quintela.

    Cc: stable@kernel.org
    Signed-off-by: Marcelo Tosatti
    Acked-by: Juan Quintela
    Signed-off-by: Avi Kivity

    Marcelo Tosatti
     
  • Looks like repeatedly binding same fd to multiple gsi's with irqfd can
    use up a ton of kernel memory for irqfd structures.

    A simple fix is to allow each fd to only trigger one gsi: triggering a
    storm of interrupts in guest is likely useless anyway, and we can do it
    by binding a single gsi to many interrupts if we really want to.

    Cc: stable@kernel.org
    Signed-off-by: Michael S. Tsirkin
    Acked-by: Acked-by: Gregory Haskins
    Signed-off-by: Avi Kivity

    Michael S. Tsirkin
     

27 Dec, 2009

2 commits


23 Dec, 2009

1 commit

  • It seems a couple places such as arch/ia64/kernel/perfmon.c and
    drivers/infiniband/core/uverbs_main.c could use anon_inode_getfile()
    instead of a private pseudo-fs + alloc_file(), if only there were a way
    to get a read-only file. So provide this by having anon_inode_getfile()
    create a read-only file if we pass O_RDONLY in flags.

    Signed-off-by: Roland Dreier
    Signed-off-by: Al Viro

    Roland Dreier
     

09 Dec, 2009

1 commit


03 Dec, 2009

10 commits

  • Usually userspace will freeze the guest so we can inspect it, but some
    internal state is not available. Add extra data to internal error
    reporting so we can expose it to the debugger. Extra data is specific
    to the suberror.

    Signed-off-by: Avi Kivity

    Avi Kivity
     
  • Otherwise kvm might attempt to dereference a NULL pointer.

    Signed-off-by: Marcelo Tosatti
    Signed-off-by: Avi Kivity

    Marcelo Tosatti
     
  • With big endian userspace, we can't quite figure out if a pointer
    is 32 bit (shifted >> 32) or 64 bit when we read a 64 bit pointer.

    This is what happens with dirty logging. To get the pointer interpreted
    correctly, we thus need Arnd's patch to implement a compat layer for
    the ioctl:

    A better way to do this is to add a separate compat_ioctl() method that
    converts this for you.

    Based on initial patch from Arnd Bergmann.

    Signed-off-by: Arnd Bergmann
    Signed-off-by: Alexander Graf
    Signed-off-by: Marcelo Tosatti
    Signed-off-by: Avi Kivity

    Arnd Bergmann
     
  • find_first_zero_bit works with bit numbers, not bytes.

    Fixes

    https://sourceforge.net/tracker/?func=detail&aid=2847560&group_id=180599&atid=893831

    Reported-by: "Xu, Jiajun"
    Cc: stable@kernel.org
    Signed-off-by: Marcelo Tosatti

    Marcelo Tosatti
     
  • Introduce kvm_vcpu_on_spin, to be used by VMX/SVM to yield processing
    once the cpu detects pause-based looping.

    Signed-off-by: "Zhai, Edwin"
    Signed-off-by: Marcelo Tosatti

    Zhai, Edwin
     
  • Stanse found 2 lock imbalances in kvm_request_irq_source_id and
    kvm_free_irq_source_id. They omit to unlock kvm->irq_lock on fail paths.

    Fix that by adding unlock labels at the end of the functions and jump
    there from the fail paths.

    Signed-off-by: Jiri Slaby
    Cc: Marcelo Tosatti
    Signed-off-by: Avi Kivity

    Jiri Slaby
     
  • X86 CPUs need to have some magic happening to enable the virtualization
    extensions on them. This magic can result in unpleasant results for
    users, like blocking other VMMs from working (vmx) or using invalid TLB
    entries (svm).

    Currently KVM activates virtualization when the respective kernel module
    is loaded. This blocks us from autoloading KVM modules without breaking
    other VMMs.

    To circumvent this problem at least a bit, this patch introduces on
    demand activation of virtualization. This means, that instead
    virtualization is enabled on creation of the first virtual machine
    and disabled on destruction of the last one.

    So using this, KVM can be easily autoloaded, while keeping other
    hypervisors usable.

    Signed-off-by: Alexander Graf
    Signed-off-by: Marcelo Tosatti
    Signed-off-by: Avi Kivity

    Alexander Graf
     
  • Signed-off-by: Avi Kivity

    Avi Kivity
     
  • The only thing it protects now is interrupt injection into lapic and
    this can work lockless. Even now with kvm->irq_lock in place access
    to lapic is not entirely serialized since vcpu access doesn't take
    kvm->irq_lock.

    Signed-off-by: Gleb Natapov
    Signed-off-by: Avi Kivity

    Gleb Natapov
     
  • The allows removal of irq_lock from the injection path.

    Signed-off-by: Gleb Natapov
    Signed-off-by: Avi Kivity

    Gleb Natapov