1. 03 12月, 2009 7 次提交
    • M
      KVM: VMX: fix handle_pause declaration · 9fb41ba8
      Marcelo Tosatti 提交于
      There's no kvm_run argument anymore.
      Signed-off-by: NMarcelo Tosatti <mtosatti@redhat.com>
      9fb41ba8
    • Z
      KVM: VMX: Add support for Pause-Loop Exiting · 4b8d54f9
      Zhai, Edwin 提交于
      New NHM processors will support Pause-Loop Exiting by adding 2 VM-execution
      control fields:
      PLE_Gap    - upper bound on the amount of time between two successive
                   executions of PAUSE in a loop.
      PLE_Window - upper bound on the amount of time a guest is allowed to execute in
                   a PAUSE loop
      
      If the time, between this execution of PAUSE and previous one, exceeds the
      PLE_Gap, processor consider this PAUSE belongs to a new loop.
      Otherwise, processor determins the the total execution time of this loop(since
      1st PAUSE in this loop), and triggers a VM exit if total time exceeds the
      PLE_Window.
      * Refer SDM volume 3b section 21.6.13 & 22.1.3.
      
      Pause-Loop Exiting can be used to detect Lock-Holder Preemption, where one VP
      is sched-out after hold a spinlock, then other VPs for same lock are sched-in
      to waste the CPU time.
      
      Our tests indicate that most spinlocks are held for less than 212 cycles.
      Performance tests show that with 2X LP over-commitment we can get +2% perf
      improvement for kernel build(Even more perf gain with more LPs).
      Signed-off-by: NZhai Edwin <edwin.zhai@intel.com>
      Signed-off-by: NMarcelo Tosatti <mtosatti@redhat.com>
      4b8d54f9
    • J
      KVM: x86: Refactor guest debug IOCTL handling · 355be0b9
      Jan Kiszka 提交于
      Much of so far vendor-specific code for setting up guest debug can
      actually be handled by the generic code. This also fixes a minor deficit
      in the SVM part /wrt processing KVM_GUESTDBG_ENABLE.
      Signed-off-by: NJan Kiszka <jan.kiszka@siemens.com>
      Signed-off-by: NAvi Kivity <avi@redhat.com>
      355be0b9
    • Z
      KVM: Fix hotplug of CPUs · 3230bb47
      Zachary Amsden 提交于
      Both VMX and SVM require per-cpu memory allocation, which is done at module
      init time, for only online cpus.
      
      Backend was not allocating enough structure for all possible CPUs, so
      new CPUs coming online could not be hardware enabled.
      Signed-off-by: NZachary Amsden <zamsden@redhat.com>
      Signed-off-by: NMarcelo Tosatti <mtosatti@redhat.com>
      3230bb47
    • A
      KVM: Activate Virtualization On Demand · 10474ae8
      Alexander Graf 提交于
      X86 CPUs need to have some magic happening to enable the virtualization
      extensions on them. This magic can result in unpleasant results for
      users, like blocking other VMMs from working (vmx) or using invalid TLB
      entries (svm).
      
      Currently KVM activates virtualization when the respective kernel module
      is loaded. This blocks us from autoloading KVM modules without breaking
      other VMMs.
      
      To circumvent this problem at least a bit, this patch introduces on
      demand activation of virtualization. This means, that instead
      virtualization is enabled on creation of the first virtual machine
      and disabled on destruction of the last one.
      
      So using this, KVM can be easily autoloaded, while keeping other
      hypervisors usable.
      Signed-off-by: NAlexander Graf <agraf@suse.de>
      Signed-off-by: NMarcelo Tosatti <mtosatti@redhat.com>
      Signed-off-by: NAvi Kivity <avi@redhat.com>
      10474ae8
    • M
      KVM: VMX: Enhance invalid guest state emulation · 80ced186
      Mohammed Gamal 提交于
      - Change returned handle_invalid_guest_state() to return relevant exit codes
      - Move triggering the emulation from vmx_vcpu_run() to vmx_handle_exit()
      - Return to userspace instead of repeatedly trying to emulate instructions that have already failed
      Signed-off-by: NMohammed Gamal <m.gamal005@gmail.com>
      Signed-off-by: NMarcelo Tosatti <mtosatti@redhat.com>
      80ced186
    • A
      KVM: Don't pass kvm_run arguments · 851ba692
      Avi Kivity 提交于
      They're just copies of vcpu->run, which is readily accessible.
      Signed-off-by: NAvi Kivity <avi@redhat.com>
      851ba692
  2. 04 10月, 2009 1 次提交
  3. 10 9月, 2009 27 次提交
  4. 05 8月, 2009 2 次提交
  5. 28 6月, 2009 1 次提交
  6. 17 6月, 2009 1 次提交
  7. 10 6月, 2009 1 次提交
    • A
      KVM: Add VT-x machine check support · a0861c02
      Andi Kleen 提交于
      VT-x needs an explicit MC vector intercept to handle machine checks in the
      hyper visor.
      
      It also has a special option to catch machine checks that happen
      during VT entry.
      
      Do these interceptions and forward them to the Linux machine check
      handler. Make it always look like user space is interrupted because
      the machine check handler treats kernel/user space differently.
      
      Thanks to Jiang Yunhong for help and testing.
      
      Cc: stable@kernel.org
      Signed-off-by: NAndi Kleen <ak@linux.intel.com>
      Signed-off-by: NHuang Ying <ying.huang@intel.com>
      Signed-off-by: NAvi Kivity <avi@redhat.com>
      a0861c02