From: Eduardo Habkost ehabk...@redhat.com
This should have no effect, it is just to make the code clearer.
Signed-off-by: Eduardo Habkost ehabk...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 364263a..1773017 100644
---
From: Avi Kivity a...@redhat.com
Merge the user-return-notifier infrastructure.
Signed-off-by: Avi Kivity a...@redhat.com
--
To unsubscribe from this list: send the line unsubscribe kvm-commits in
the body of a message to majord...@vger.kernel.org
More majordomo info at
From: Eduardo Habkost ehabk...@redhat.com
The svm_set_cr0() call will initialize save-cr0 properly even when npt is
enabled, clearing the NW and CD bits as expected, so we don't need to
initialize it manually for npt_enabled anymore.
Signed-off-by: Eduardo Habkost ehabk...@redhat.com
From: Avi Kivity a...@redhat.com
When CONFIG_USER_RETURN_NOTIFIER is set, we need to link
kernel/user-return-notifier.o.
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/kernel/Makefile b/kernel/Makefile
index b8d4cd8..0ae57a8 100644
--- a/kernel/Makefile
+++ b/kernel/Makefile
@@ -95,6
From: Eduardo Habkost ehabk...@redhat.com
svm_vcpu_reset() was not properly resetting the contents of the guest-visible
cr0 register, causing the following issue:
https://bugzilla.redhat.com/show_bug.cgi?id=525699
Without resetting cr0 properly, the vcpu was running the SIPI bootstrap routine
From: Avi Kivity a...@redhat.com
Currently MSR_KERNEL_GS_BASE is saved and restored as part of the
guest/host msr reloading. Since we wish to lazy-restore all the other
msrs, save and reload MSR_KERNEL_GS_BASE explicitly instead of using
the common code.
Signed-off-by: Avi Kivity
From: Avi Kivity a...@redhat.com
So we can extend it later.
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/Documentation/kvm/api.txt b/Documentation/kvm/api.txt
index f504e0b..36594ba 100644
--- a/Documentation/kvm/api.txt
+++ b/Documentation/kvm/api.txt
@@ -608,8 +608,8 @@ page of a
From: Hollis Blanchard holl...@us.ibm.com
The old BUILD_BUG_ON implementation didn't work with __builtin_constant_p().
Fixing that revealed this test had been inverted for a long time without
anybody noticing...
Signed-off-by: Hollis Blanchard holl...@us.ibm.com
Signed-off-by: Avi Kivity
From: Avi Kivity a...@redhat.com
The various syscall-related MSRs are fairly expensive to switch. Currently
we switch them on every vcpu preemption, which is far too often:
- if we're switching to a kernel thread (idle task, threaded interrupt,
kernel-mode virtio server (vhost-net), for
From: Gleb Natapov g...@redhat.com
Probably introduced by a bad merge.
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index be968f1..2ef3906 100644
--- a/arch/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@
From: Avi Kivity a...@redhat.com
--
To unsubscribe from this list: send the line unsubscribe kvm-commits in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
From: Gleb Natapov g...@redhat.com
If TSS we are switching to resides in high memory task switch will fail
since address will be truncated. Windows2k3 does this sometimes when
running with more then 4G
Cc: sta...@kernel.org
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity
12 matches
Mail list logo