[PATCH 0/15] KVM: Make the instruction emulator aware of Nested Virtualization v4

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

this is version 4 of this patch-set. The main change to the previous
version is that now the intruction permission checks for interceptable
instructions are seperated to make the checks before the actual
intercept condition is checked.
For this I added the check_perm call-back to the opcode structure and
populated it where necessary.
One check was put into a new flag: 'Prot'. This is used for all
instructions that are only recognized in protected mode.
As usual, any feedback is appreciated.

Regards,
	Joerg

Diffstat:

 arch/x86/include/asm/kvm_emulate.h |   90 ++++++++
 arch/x86/include/asm/kvm_host.h    |   22 ++
 arch/x86/kvm/emulate.c             |  423 ++++++++++++++++++++++++++++++-----
 arch/x86/kvm/svm.c                 |  264 ++++++++++++++++++-----
 arch/x86/kvm/vmx.c                 |    9 +
 arch/x86/kvm/x86.c                 |   25 +-
 6 files changed, 707 insertions(+), 126 deletions(-)

Shortlog:

Avi Kivity (2):
      KVM: x86 emulator: add framework for instruction intercepts
      KVM: x86 emulator: add SVM intercepts

Joerg Roedel (13):
      KVM: x86 emulator: Don't write-back cpu-state on X86EMUL_INTERCEPTED
      KVM: x86 emulator: Add check_perm callback
      KVM: x86 emulator: Add flag to check for protected mode instructions
      KVM: x86: Add x86 callback for intercept check
      KVM: SVM: Add intercept check for emulated cr accesses
      KVM: SVM: Add intercept check for accessing dr registers
      KVM: SVM: Add intercept checks for descriptor table accesses
      KVM: SVM: Add intercept checks for SVM instructions
      KVM: SVM: Add intercept checks for remaining group7 instructions
      KVM: SVM: Add intercept checks for remaining twobyte instructions
      KVM: SVM: Add intercept checks for one-byte instructions
      KVM: SVM: Add checks for IO instructions
      KVM: SVM: Remove nested sel_cr0_write handling code


--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux