summaryrefslogtreecommitdiffstats
path: root/drivers/kvm
Commit message (Collapse)AuthorAgeFilesLines
...
* KVM: Correct kvm_init() error paths not freeing bad_pge.Zhang Xiantao2008-01-301-13/+15
| | | | | Signed-off-by: Zhang Xiantao <xiantao.zhang@intel.com> Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: Portability: Move KVM_INTERRUPT vcpu ioctl to x86.cZhang Xiantao2008-01-302-29/+29
| | | | | | | Other archs doesn't need it. Signed-off-by: Zhang Xiantao <xiantao.zhang@intel.com> Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: x86 emulator: unify four switch statements into twoAvi Kivity2008-01-301-174/+168
| | | | | | | | | Unify the special instruction switch with the regular instruction switch, and the two byte special instruction switch with the regular two byte instruction switch. That makes it much easier to find an instruction or the place an instruction needs to be added in. Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: x86 emulator: unify two switchesAvi Kivity2008-01-301-27/+23
| | | | | | | The rep prefix cleanup left two switch () statements next to each other. Unify them. Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: x86 emulator: Move rep processing before instruction executionAvi Kivity2008-01-301-34/+36
| | | | | | | Currently rep processing is handled somewhere in the middle of instruction processing. Move it to a sensible place. Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: x86 emulator: cmps instructionGuillaume Thouvenin2008-01-301-2/+56
| | | | | | | Add emulation for the cmps instruction. This lets OpenBSD boot on kvm. Signed-off-by: Guillaume Thouvenin <guillaume.thouvenin@ext.bull.net> Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: x86 emulator: Rename 'cr2' to 'memop'Sheng Yang2008-01-303-11/+9
| | | | | | | | Previous patches have removed the dependency on cr2; we can now stop passing it to the emulator and rename uses to 'memop'. Signed-off-by: Sheng Yang <sheng.yang@intel.com> Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: MMU: mark pages that were inserted to the shadow pages table as accessedIzik Eidus2008-01-301-0/+2
| | | | | | | | Mark guest pages as accessed when removed from the shadow page tables for better lru processing. Signed-off-by: Izik Eidus <izike@qumranet.com> Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: Remove misleading check for mmio during event injectionAvi Kivity2008-01-301-1/+1
| | | | | | | mmio was already handled in kvm_arch_vcpu_ioctl_run(), so no need to check again. Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: x86 emulator: address size and operand size overrides are stickyAvi Kivity2008-01-301-7/+12
| | | | | | | Current implementation is to toggle, which is incorrect. Patch ported from corresponding Xen code. Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: x86 emulator: Make a distinction between repeat prefixes F3 and F2Guillaume Thouvenin2008-01-302-1/+7
| | | | | | | | | | cmps and scas instructions accept repeat prefixes F3 and F2. So in order to emulate those prefixed instructions we need to be able to know if prefixes are REP/REPE/REPZ or REPNE/REPNZ. Currently kvm doesn't make this distinction. This patch introduces this distinction. Signed-off-by: Guillaume Thouvenin <guillaume.thouvenin@ext.bull.net> Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: Portability: Move unalias_gfn to arch dependent fileZhang Xiantao2008-01-302-14/+14
| | | | | | | | | Non-x86 archs don't need this mechanism. Move it to arch, and keep its interface in common. Signed-off-by: Zhang Xiantao <xiantao.zhang@intel.com> Acked-by: Carsten Otte <cotte@de.ibm.com> Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: VMX: Remove the secondary execute control dependency on irqchipSheng Yang2008-01-301-10/+7
| | | | | | | | The state of SECONDARY_VM_EXEC_CONTROL shouldn't depend on in-kernel IRQ chip, this patch fix this. Signed-off-by: Sheng Yang <sheng.yang@intel.com> Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: Enhance guest cpuid managementDan Kenigsberg2008-01-302-10/+323
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The current cpuid management suffers from several problems, which inhibit passing through the host feature set to the guest: - No way to tell which features the host supports While some features can be supported with no changes to kvm, others need explicit support. That means kvm needs to vet the feature set before it is passed to the guest. - No support for indexed or stateful cpuid entries Some cpuid entries depend on ecx as well as on eax, or on internal state in the processor (running cpuid multiple times with the same input returns different output). The current cpuid machinery only supports keying on eax. - No support for save/restore/migrate The internal state above needs to be exposed to userspace so it can be saved or migrated. This patch adds extended cpuid support by means of three new ioctls: - KVM_GET_SUPPORTED_CPUID: get all cpuid entries the host (and kvm) supports - KVM_SET_CPUID2: sets the vcpu's cpuid table - KVM_GET_CPUID2: gets the vcpu's cpuid table, including hidden state [avi: fix original KVM_SET_CPUID not removing nx on non-nx hosts as it did before] Signed-off-by: Dan Kenigsberg <danken@qumranet.com> Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: Disallow fork() and similar games when using a VMAvi Kivity2008-01-302-0/+10
| | | | | | We don't want the meaning of guest userspace changing under our feet. Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: MMU: Rename 'release_page'Avi Kivity2008-01-301-4/+4
| | | | | | Rename the awkwardly named variable. Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: MMU: Rename variables of type 'struct kvm_mmu_page *'Avi Kivity2008-01-301-154/+146
| | | | | | | | These are traditionally named 'page', but even more traditionally, that name is reserved for variables that point to a 'struct page'. Rename them to 'sp' (for "shadow page"). Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: Remove gpa_to_hpa()Avi Kivity2008-01-302-19/+3
| | | | | | Converting last uses along the way. Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: MMU: Remove gva_to_hpa()Avi Kivity2008-01-302-10/+0
| | | | | | No longer used. Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: MMU: Simplify nonpaging_map()Avi Kivity2008-01-301-14/+10
| | | | | | Instead of passing an hpa, pass a regular struct page. Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: MMU: Introduce gfn_to_gpa()Avi Kivity2008-01-302-2/+6
| | | | | | | | Converting a frame number to an address is tricky since the data type changes size. Introduce a function to do it. This fixes an actual bug when accessing guest ptes. Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: MMU: Adjust page_header_update_slot() to accept a gfn instead of a gpaAvi Kivity2008-01-302-5/+5
| | | | Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: MMU: Merge set_pte() and set_pte_common()Avi Kivity2008-01-301-20/+6
| | | | | | | Since set_pte() is now the only caller of set_pte_common(), merge the two functions. Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: MMU: Remove set_pde()Avi Kivity2008-01-301-21/+4
| | | | | | It is now identical to set_pte(). Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: MMU: Remove extra gaddr parameter from set_pte_common()Avi Kivity2008-01-302-20/+10
| | | | | | Similar information is available in the gfn parameter, so use that. Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: MMU: Move pse36 handling to the guest walkerAvi Kivity2008-01-302-3/+9
| | | | Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: MMU: Introduce and use gpte_to_gfn()Avi Kivity2008-01-301-8/+20
| | | | | | Instead of repretitively open-coding this. Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: MMU: Code cleanupIzik Eidus2008-01-301-10/+10
| | | | | Signed-off-by: Izik Eidus <izike@qumranet.com> Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: Don't bother the mmu if cr3 load doesn't change cr3Avi Kivity2008-01-303-1/+27
| | | | | | | If the guest requests just a tlb flush, don't take the vm lock and drop the mmu context pointlessly. Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: MMU: Avoid unnecessary remote tlb flushes when guest updates a pteAvi Kivity2008-01-301-1/+26
| | | | | | | | If all we're doing is increasing permissions on a pte (typical for demand paging), then there's not need to flush remote tlbs. Worst case they'll get a spurious page fault. Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: Add statistic for remote tlb flushesAvi Kivity2008-01-303-0/+5
| | | | Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: MMU: Implement guest page fault bypass for nonpaeAvi Kivity2008-01-301-3/+6
| | | | | | | | I spent an hour worrying why I see so many guest page faults on FC6 i386. Turns out bypass wasn't implemented for nonpae. Implement it so it doesn't happen again. Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: Split vcpu creation to avoid vcpu_load() before preemption setupAvi Kivity2008-01-303-9/+12
| | | | | | | | Split kvm_arch_vcpu_create() into kvm_arch_vcpu_create() and kvm_arch_vcpu_setup(), enabling preemption notification between the two. This mean that we can now do vcpu_load() within kvm_arch_vcpu_setup(). Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: Portability: Split kvm_set_memory_region() to have an arch calloutZhang Xiantao2008-01-303-33/+60
| | | | | | | | Moving !user_alloc case to kvm_arch to avoid unnecessary code logic in non-x86 platform. Signed-off-by: Zhang Xiantao <xiantao.zhang@intel.com> Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: Recalculate mmu pages needed for every memory region changeZhang Xiantao2008-01-303-17/+24
| | | | | | | | Instead of incrementally changing the mmu cache size for every memory slot operation, recalculate it from scratch. This is simpler and safer. Signed-off-by: Zhang Xiantao <xiantao.zhang@intel.com> Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: x86 emulator: prefetch up to 15 bytes of the instruction executedAvi Kivity2008-01-302-2/+43
| | | | | | | Instead of fetching one byte at a time, prefetch 15 bytes (or until the next page boundary) to avoid guest page table walks. Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: x86 emulator: retire ->write_std()Avi Kivity2008-01-302-21/+0
| | | | | | | | Theoretically used to acccess memory known to be ordinary RAM, it was never implemented. It is questionable whether it is possible to implement it correctly. Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: MMU: Selectively set PageDirty when releasing guest memoryIzik Eidus2008-01-305-19/+33
| | | | | | | | | Improve dirty bit setting for pages that kvm release, until now every page that we released we marked dirty, from now only pages that have potential to get dirty we mark dirty. Signed-off-by: Izik Eidus <izike@qumranet.com> Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: MMU: Fix potential memory leak with smp real-modeIzik Eidus2008-01-301-1/+3
| | | | | | | | When we map a page, we check whether some other vcpu mapped it for us and if so, bail out. But we should decrease the refcount on the page as we do so. Signed-off-by: Izik Eidus <izike@qumranet.com> Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: Move misplaced commentHollis Blanchard2008-01-301-4/+4
| | | | | Signed-off-by: Hollis Blanchard <hollisb@us.ibm.com> Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: Correct consistent typo: "destory" -> "destroy"Hollis Blanchard2008-01-303-3/+3
| | | | | Signed-off-by: Hollis Blanchard <hollisb@us.ibm.com> Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: Remove unused "rmap_overflow" variableHollis Blanchard2008-01-301-1/+0
| | | | | Signed-off-by: Hollis Blanchard <hollisb@us.ibm.com> Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: MMU: Remove unused variableAvi Kivity2008-01-301-1/+0
| | | | Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: Simplify kvm_clear_guest_page()Izik Eidus2008-01-301-16/+2
| | | | | | | | Use kvm_write_guest_page() with empty_zero_page, instead of doing kmap and memset. Signed-off-by: Izik Eidus <izike@qumranet.com> Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: MMU: Change guest pte access to kvm_{read,write}_guest()Izik Eidus2008-01-301-19/+5
| | | | | | | Things are simpler and more regular this way. Signed-off-by: Izik Eidus <izike@qumranet.com> Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: VMX: Force seg.base == (seg.sel << 4) in real modeJan Kiszka2008-01-301-1/+2
| | | | | | | | | Ensure that segment.base == segment.selector << 4 when entering the real mode on Intel so that the CPU will not bark at us. This fixes some old protected mode demo from http://www.x86.org/articles/pmbasics/tspec_a1_doc.htm. Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com> Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: Portability: Move some function declarations to x86.hZhang Xiantao2008-01-302-84/+84
| | | | | Signed-off-by: Zhang Xiantao <xiantao.zhang@intel.com> Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: Move some static inline functions out from kvm.h into x86.hZhang Xiantao2008-01-302-109/+110
| | | | | Signed-off-by: Zhang Xiantao <xiantao.zhang@intel.com> Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: Portability: Move vcpu regs enumeration definition to x86.hZhang Xiantao2008-01-302-35/+35
| | | | | Signed-off-by: Zhang Xiantao <xiantao.zhang@intel.com> Signed-off-by: Avi Kivity <avi@qumranet.com>
* KVM: Portability: Move struct kvm_x86_ops definition to x86.hZhang Xiantao2008-01-302-69/+67
| | | | | Signed-off-by: Zhang Xiantao <xiantao.zhang@intel.com> Signed-off-by: Avi Kivity <avi@qumranet.com>
OpenPOWER on IntegriCloud