<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/Documentation/kvm, branch v2.6.35.9</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/Documentation/kvm?h=v2.6.35.9</id>
<link rel='self' href='https://git.amat.us/linux/atom/Documentation/kvm?h=v2.6.35.9'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2010-05-19T08:41:09Z</updated>
<entry>
<title>KVM: MMU: Segregate shadow pages with different cr0.wp</title>
<updated>2010-05-19T08:41:09Z</updated>
<author>
<name>Avi Kivity</name>
<email>avi@redhat.com</email>
</author>
<published>2010-05-12T08:48:18Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=3dbe141595faa48a067add3e47bba3205b79d33c'/>
<id>urn:sha1:3dbe141595faa48a067add3e47bba3205b79d33c</id>
<content type='text'>
When cr0.wp=0, we may shadow a gpte having u/s=1 and r/w=0 with an spte
having u/s=0 and r/w=1.  This allows excessive access if the guest sets
cr0.wp=1 and accesses through this spte.

Fix by making cr0.wp part of the base role; we'll have different sptes for
the two cases and the problem disappears.

Signed-off-by: Avi Kivity &lt;avi@redhat.com&gt;
Signed-off-by: Marcelo Tosatti &lt;mtosatti@redhat.com&gt;
</content>
</entry>
<entry>
<title>KVM: Add cpuid.txt file</title>
<updated>2010-05-19T08:41:07Z</updated>
<author>
<name>Glauber Costa</name>
<email>glommer@redhat.com</email>
</author>
<published>2010-05-11T16:17:47Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=09c9e81366b9167b88ff05cf29fa94dc3553eb3d'/>
<id>urn:sha1:09c9e81366b9167b88ff05cf29fa94dc3553eb3d</id>
<content type='text'>
This file documents cpuid bits used by KVM.

Signed-off-by: Glauber Costa &lt;glommer@redhat.com&gt;
Acked-by: Zachary Amsden &lt;zamsden@redhat.com&gt;
Signed-off-by: Marcelo Tosatti &lt;mtosatti@redhat.com&gt;
</content>
</entry>
<entry>
<title>KVM: Minor MMU documentation edits</title>
<updated>2010-05-17T09:19:32Z</updated>
<author>
<name>Avi Kivity</name>
<email>avi@redhat.com</email>
</author>
<published>2010-04-26T08:59:21Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=c4bd09b28907ca17cdb307c32bbcc9882c280feb'/>
<id>urn:sha1:c4bd09b28907ca17cdb307c32bbcc9882c280feb</id>
<content type='text'>
Reported by Andrew Jones.

Signed-off-by: Avi Kivity &lt;avi@redhat.com&gt;
Signed-off-by: Marcelo Tosatti &lt;mtosatti@redhat.com&gt;
</content>
</entry>
<entry>
<title>KVM: Document KVM_GET_MP_STATE and KVM_SET_MP_STATE</title>
<updated>2010-05-17T09:19:30Z</updated>
<author>
<name>Avi Kivity</name>
<email>avi@redhat.com</email>
</author>
<published>2010-04-25T12:51:46Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=b843f065481488fd1d1f4ff2179aaf4f300a1358'/>
<id>urn:sha1:b843f065481488fd1d1f4ff2179aaf4f300a1358</id>
<content type='text'>
Acked-by: Pekka Enberg &lt;penberg@cs.helsinki.fi&gt;
Signed-off-by: Avi Kivity &lt;avi@redhat.com&gt;
Signed-off-by: Marcelo Tosatti &lt;mtosatti@redhat.com&gt;
</content>
</entry>
<entry>
<title>KVM: Document mmu</title>
<updated>2010-05-17T09:19:12Z</updated>
<author>
<name>Avi Kivity</name>
<email>avi@redhat.com</email>
</author>
<published>2010-04-21T13:08:20Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=039091875ce4629d83db64c055528e7b86337d50'/>
<id>urn:sha1:039091875ce4629d83db64c055528e7b86337d50</id>
<content type='text'>
Signed-off-by: Avi Kivity &lt;avi@redhat.com&gt;
</content>
</entry>
<entry>
<title>KVM: Document replacements for KVM_EXIT_HYPERCALL</title>
<updated>2010-05-17T09:17:22Z</updated>
<author>
<name>Avi Kivity</name>
<email>avi@redhat.com</email>
</author>
<published>2010-04-01T11:39:21Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=647dc49eebad2c30f823cae2bd8204b66c739f9c'/>
<id>urn:sha1:647dc49eebad2c30f823cae2bd8204b66c739f9c</id>
<content type='text'>
Signed-off-by: Avi Kivity &lt;avi@redhat.com&gt;
</content>
</entry>
<entry>
<title>KVM: PPC: Add OSI hypercall interface</title>
<updated>2010-05-17T09:17:10Z</updated>
<author>
<name>Alexander Graf</name>
<email>agraf@suse.de</email>
</author>
<published>2010-03-24T20:48:30Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=ad0a048b096ac819f28667602285453468a8d8f9'/>
<id>urn:sha1:ad0a048b096ac819f28667602285453468a8d8f9</id>
<content type='text'>
MOL uses its own hypercall interface to call back into userspace when
the guest wants to do something.

So let's implement that as an exit reason, specify it with a CAP and
only really use it when userspace wants us to.

The only user of it so far is MOL.

Signed-off-by: Alexander Graf &lt;agraf@suse.de&gt;
Signed-off-by: Avi Kivity &lt;avi@redhat.com&gt;
</content>
</entry>
<entry>
<title>KVM: Add support for enabling capabilities per-vcpu</title>
<updated>2010-05-17T09:17:09Z</updated>
<author>
<name>Alexander Graf</name>
<email>agraf@suse.de</email>
</author>
<published>2010-03-24T20:48:29Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=71fbfd5f38f73515f1516a68fbe04dba198b70f0'/>
<id>urn:sha1:71fbfd5f38f73515f1516a68fbe04dba198b70f0</id>
<content type='text'>
Some times we don't want all capabilities to be available to all
our vcpus. One example for that is the OSI interface, implemented
in the next patch.

In order to have a generic mechanism in how to enable capabilities
individually, this patch introduces a new ioctl that can be used
for this purpose. That way features we don't want in all guests or
userspace configurations can just not be enabled and we're good.

Signed-off-by: Alexander Graf &lt;agraf@suse.de&gt;
Signed-off-by: Avi Kivity &lt;avi@redhat.com&gt;
</content>
</entry>
<entry>
<title>KVM: Document KVM_SET_TSS_ADDR</title>
<updated>2010-05-17T09:16:47Z</updated>
<author>
<name>Avi Kivity</name>
<email>avi@redhat.com</email>
</author>
<published>2010-03-25T10:27:30Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=8a5416db832895b84b85ad0bcbb11d1cce0d3d37'/>
<id>urn:sha1:8a5416db832895b84b85ad0bcbb11d1cce0d3d37</id>
<content type='text'>
Signed-off-by: Avi Kivity &lt;avi@redhat.com&gt;
</content>
</entry>
<entry>
<title>KVM: Document KVM_SET_USER_MEMORY_REGION</title>
<updated>2010-05-17T09:16:46Z</updated>
<author>
<name>Avi Kivity</name>
<email>avi@redhat.com</email>
</author>
<published>2010-03-25T10:16:48Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=0f2d8f4dd0663defff8c1738d33478c1fb65a4f5'/>
<id>urn:sha1:0f2d8f4dd0663defff8c1738d33478c1fb65a4f5</id>
<content type='text'>
Acked-by: Pekka Enberg &lt;penberg@cs.helsinki.fi&gt;
Signed-off-by: Avi Kivity &lt;avi@redhat.com&gt;
</content>
</entry>
</feed>
