1. 30 1月, 2008 6 次提交
  2. 13 10月, 2007 3 次提交
  3. 21 7月, 2007 1 次提交
    • A
      KVM: MMU: Store nx bit for large page shadows · d55e2cb2
      Avi Kivity 提交于
      We need to distinguish between large page shadows which have the nx bit set
      and those which don't.  The problem shows up when booting a newer smp Linux
      kernel, where the trampoline page (which is in real mode, which uses the
      same shadow pages as large pages) is using the same mapping as a kernel data
      page, which is mapped using nx, causing kvm to spin on that page.
      Signed-off-by: NAvi Kivity <avi@qumranet.com>
      d55e2cb2
  4. 16 7月, 2007 16 次提交
  5. 03 5月, 2007 3 次提交
    • A
      KVM: Per-vcpu statistics · 1165f5fe
      Avi Kivity 提交于
      Make the exit statistics per-vcpu instead of global.  This gives a 3.5%
      boost when running one virtual machine per core on my two socket dual core
      (4 cores total) machine.
      Signed-off-by: NAvi Kivity <avi@qumranet.com>
      1165f5fe
    • A
      KVM: MMU: Fix hugepage pdes mapping same physical address with different access · d28c6cfb
      Avi Kivity 提交于
      The kvm mmu keeps a shadow page for hugepage pdes; if several such pdes map
      the same physical address, they share the same shadow page.  This is a fairly
      common case (kernel mappings on i386 nonpae Linux, for example).
      
      However, if the two pdes map the same memory but with different permissions, kvm
      will happily use the cached shadow page.  If the access through the more
      permissive pde will occur after the access to the strict pde, an endless pagefault
      loop will be generated and the guest will make no progress.
      
      Fix by making the access permissions part of the cache lookup key.
      
      The fix allows Xen pae to boot on kvm and run guest domains.
      
      Thanks to Jeremy Fitzhardinge for reporting the bug and testing the fix.
      Signed-off-by: NAvi Kivity <avi@qumranet.com>
      d28c6cfb
    • A
      KVM: MMU: Remove unnecessary check for pdptr access · ca5aac1f
      Avi Kivity 提交于
      We already special case the pdptr access, so no need to check it again.
      Signed-off-by: NAvi Kivity <avi@qumranet.com>
      ca5aac1f
  6. 04 3月, 2007 2 次提交
  7. 13 2月, 2007 1 次提交
  8. 27 1月, 2007 2 次提交
  9. 23 1月, 2007 1 次提交
    • A
      [PATCH] KVM: fix bogus pagefault on writable pages · fc3dffe1
      Avi Kivity 提交于
      If a page is marked as dirty in the guest pte, set_pte_common() can set the
      writable bit on newly-instantiated shadow pte.  This optimization avoids
      a write fault after the initial read fault.
      
      However, if a write fault instantiates the pte, fix_write_pf() incorrectly
      reports the fault as a guest page fault, and the guest oopses on what appears
      to be a correctly-mapped page.
      
      Fix is to detect the condition and only report a guest page fault on a user
      access to a kernel page.
      
      With the fix, a kvm guest can survive a whole night of running the kernel
      hacker's screensaver (make -j9 in a loop).
      Signed-off-by: NAvi Kivity <avi@qumranet.com>
      Cc: Ingo Molnar <mingo@elte.hu>
      Signed-off-by: NAndrew Morton <akpm@osdl.org>
      Signed-off-by: NLinus Torvalds <torvalds@linux-foundation.org>
      fc3dffe1
  10. 06 1月, 2007 5 次提交