[PATCH] KVM: x86: accessors for guest registers

2008-06-30 Thread Avi Kivity
From: Marcelo Tosatti <[EMAIL PROTECTED]> As suggested by Avi, introduce accessors to read/write guest registers. This simplifies the ->cache_regs/->decache_regs interface, and improves register caching which is important for VMX, where the cost of vmcs_read/vmcs_write is significant. Signed-off-

[PATCH] KVM: s390: Set guest storage limit and offset to sane values

2008-06-30 Thread Avi Kivity
From: Christian Borntraeger <[EMAIL PROTECTED]> Some machines do not accept 16EB as guest storage limit. Lets change the default for the guest storage limit to a sane value. We also should set the guest_origin to what userspace thinks it is. This allows guests starting at an address != 0. Signed-

[PATCH] KVM: s390: rename private structures

2008-06-30 Thread Avi Kivity
From: Christian Borntraeger <[EMAIL PROTECTED]> While doing some tests with our lcrash implementation I have seen a naming conflict with prefix_info in kvm_host.h vs. addrconf.h To avoid future conflicts lets rename private definitions in asm/kvm_host.h by adding the kvm_s390 prefix. Signed-off-

[PATCH] KVM: s390: dont allocate dirty bitmap

2008-06-30 Thread Avi Kivity
From: Carsten Otte <[EMAIL PROTECTED]> This patch #ifdefs the bitmap array for dirty tracking. We don't have dirty tracking on s390 today, and we'd love to use our storage keys to store the dirty information for migration. Therefore, we won't need this array at all, and due to our limited amount o

[PATCH] KVM: Fix memory leak on guest exit

2008-06-30 Thread Avi Kivity
From: Carsten Otte <[EMAIL PROTECTED]> This patch fixes a memory leak, we want to free the physmem when destroying the vm. Signed-off-by: Carsten Otte <[EMAIL PROTECTED]> Signed-off-by: Avi Kivity <[EMAIL PROTECTED]> diff --git a/arch/s390/kvm/kvm-s390.c b/arch/s390/kvm/kvm-s390.c index 4585c8a.

[PATCH] KVM: VMX: Fake emulate Intel perfctr MSRs

2008-06-30 Thread Avi Kivity
From: Chris Lalancette <[EMAIL PROTECTED]> Older linux guests (in this case, 2.6.9) can attempt to access the performance counter MSRs without a fixup section, and injecting a GPF kills the guest. Work around by allowing the guest to write those MSRs. Tested by me on RHEL-4 i386 and x86_64 guest

[PATCH] KVM: move slots_lock acquision down to vapic_exit

2008-06-30 Thread Avi Kivity
From: Marcelo Tosatti <[EMAIL PROTECTED]> There is no need to grab slots_lock if the vapic_page will not be touched. Signed-off-by: Marcelo Tosatti <[EMAIL PROTECTED]> Signed-off-by: Avi Kivity <[EMAIL PROTECTED]> diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 0fbc032..ef53d88 100644

[PATCH] kvm: external module: don't define bool for rhel 5.2

2008-06-30 Thread Avi Kivity
From: Avi Kivity <[EMAIL PROTECTED]> Signed-off-by: Avi Kivity <[EMAIL PROTECTED]> diff --git a/kernel/external-module-compat.h b/kernel/external-module-compat.h index c28d759..8d021d6 100644 --- a/kernel/external-module-compat.h +++ b/kernel/external-module-compat.h @@ -349,10 +349,20 @@ uint64_

[PATCH] kvm: configure: remove configure warning against not using gcc3

2008-06-30 Thread Avi Kivity
From: Carlo Marcelo Arenas Belon <[EMAIL PROTECTED]> complement ff5396cfeacf74ad9611a35e882ff100b10126aci, removing the warning printed by ./configure --help which recommended at configure time against using gcc4 as it wasn't supported by dyngen. Signed-off-by: Carlo Marcelo Arenas Belon <[EMAIL