1. 24 3月, 2009 17 次提交
  2. 15 2月, 2009 1 次提交
  3. 31 12月, 2008 6 次提交
  4. 15 10月, 2008 7 次提交
  5. 11 9月, 2008 2 次提交
  6. 27 7月, 2008 2 次提交
  7. 20 7月, 2008 5 次提交
    • A
      KVM: Prefix some x86 low level function with kvm_, to avoid namespace issues · d6e88aec
      Avi Kivity 提交于
      Fixes compilation with CONFIG_VMI enabled.
      Signed-off-by: NAvi Kivity <avi@qumranet.com>
      d6e88aec
    • J
      KVM: SVM: fix suspend/resume support · 0da1db75
      Joerg Roedel 提交于
      On suspend the svm_hardware_disable function is called which frees all svm_data
      variables. On resume they are not re-allocated. This patch removes the
      deallocation of svm_data from the hardware_disable function to the
      hardware_unsetup function which is not called on suspend.
      Signed-off-by: NJoerg Roedel <joerg.roedel@amd.com>
      Signed-off-by: NAvi Kivity <avi@qumranet.com>
      0da1db75
    • A
      KVM: Remove decache_vcpus_on_cpu() and related callbacks · 7cc88830
      Avi Kivity 提交于
      Obsoleted by the vmx-specific per-cpu list.
      Signed-off-by: NAvi Kivity <avi@qumranet.com>
      7cc88830
    • A
      KVM: Handle virtualization instruction #UD faults during reboot · 4ecac3fd
      Avi Kivity 提交于
      KVM turns off hardware virtualization extensions during reboot, in order
      to disassociate the memory used by the virtualization extensions from the
      processor, and in order to have the system in a consistent state.
      Unfortunately virtual machines may still be running while this goes on,
      and once virtualization extensions are turned off, any virtulization
      instruction will #UD on execution.
      
      Fix by adding an exception handler to virtualization instructions; if we get
      an exception during reboot, we simply spin waiting for the reset to complete.
      If it's a true exception, BUG() so we can have our stack trace.
      Signed-off-by: NAvi Kivity <avi@qumranet.com>
      4ecac3fd
    • C
      KVM: SVM: Fake MSR_K7 performance counters · 14ae51b6
      Chris Lalancette 提交于
      Attached is a patch that fixes a guest crash when booting older Linux kernels.
      The problem stems from the fact that we are currently emulating
      MSR_K7_EVNTSEL[0-3], but not emulating MSR_K7_PERFCTR[0-3].  Because of this,
      setup_k7_watchdog() in the Linux kernel receives a GPF when it attempts to
      write into MSR_K7_PERFCTR, which causes an OOPs.
      
      The patch fixes it by just "fake" emulating the appropriate MSRs, throwing
      away the data in the process.  This causes the NMI watchdog to not actually
      work, but it's not such a big deal in a virtualized environment.
      
      When we get a write to one of these counters, we printk_ratelimit() a warning.
      I decided to print it out for all writes, even if the data is 0; it doesn't
      seem to make sense to me to special case when data == 0.
      
      Tested by myself on a RHEL-4 guest, and Joerg Roedel on a Windows XP 64-bit
      guest.
      Signed-off-by: NChris Lalancette <clalance@redhat.com>
      Signed-off-by: NAvi Kivity <avi@qumranet.com>
      14ae51b6