12 Oct, 2015

1 commit


30 May, 2014

1 commit

  • Old guests try to use the magic page, but map their trampoline code inside
    of an NX region.

    Since we can't fix those old kernels, try to detect whether the guest is sane
    or not. If not, just disable NX functionality in KVM so that old guests at
    least work at all. For newer guests, add a bit that we can set to keep NX
    functionality available.

    Signed-off-by: Alexander Graf

    Alexander Graf
     

01 Jan, 2014

1 commit


14 Aug, 2012

1 commit


30 May, 2012

1 commit

  • If there is pending critical or machine check interrupt then guest
    would like to capture it when guest enable MSR.CE and MSR_ME respectively.
    Also as mostly MSR_CE and MSR_ME are updated with rfi/rfci/rfmii
    which anyway traps so removing the the paravirt optimization for MSR.CE
    and MSR.ME.

    Signed-off-by: Bharat Bhushan
    Signed-off-by: Alexander Graf

    Bharat Bhushan
     

05 Mar, 2012

1 commit

  • Instead of keeping separate copies of struct kvm_vcpu_arch_shared (one in
    the code, one in the docs) that inevitably fail to be kept in sync
    (already sr[] is missing from the doc version), just point to the header
    file as the source of documentation on the contents of the magic page.

    Signed-off-by: Scott Wood
    Acked-by: Avi Kivity
    Signed-off-by: Alexander Graf
    Signed-off-by: Avi Kivity

    Scott Wood
     

12 Jul, 2011

1 commit

  • This is a shared page used for paravirtualization. It is always present
    in the guest kernel's effective address space at the address indicated
    by the hypercall that enables it.

    The physical address specified by the hypercall is not used, as
    e500 does not have real mode.

    Signed-off-by: Scott Wood
    Signed-off-by: Alexander Graf

    Scott Wood
     

07 May, 2011

1 commit