e1cf889d | 08-Jul-2022 |
Wei Liu <liuwe@microsoft.com> |
hypervisor: use UserMemoryRegion in the Vm trait
Signed-off-by: Dev Rajput <t-devrajput@microsoft.com> Signed-off-by: Wei Liu <liuwe@microsoft.com> |
5894b537 | 08-Jul-2022 |
Wei Liu <liuwe@microsoft.com> |
hypervisor: transform between UserMemoryRegion and hypervisor structs
Signed-off-by: Dev Rajput <t-devrajput@microsoft.com> Signed-off-by: Wei Liu <liuwe@microsoft.com> |
fabc940b | 08-Jul-2022 |
Wei Liu <liuwe@microsoft.com> |
hypervisor: add UserMemoryRegion and flags
Signed-off-by: Dev Rajput <t-devrajput@microsoft.com> Signed-off-by: Wei Liu <liuwe@microsoft.com> |
84bbaf06 | 08-Jul-2022 |
Wei Liu <liuwe@microsoft.com> |
hypervisor: turn boot_msr_entries into a trait method
This allows dispatching to either KVM or MSHV automatically.
No functional change.
Signed-off-by: Wei Liu <liuwe@microsoft.com> |
adf58817 | 30-Jun-2022 |
Rob Bradford <robert.bradford@intel.com> |
build: #[allow(clippy::significant_drop_in_scrutinee) in some crates
This check is new in the beta version of clippy and exists to avoid potential deadlocks by highlighting when the test in an if or
build: #[allow(clippy::significant_drop_in_scrutinee) in some crates
This check is new in the beta version of clippy and exists to avoid potential deadlocks by highlighting when the test in an if or for loop is something that holds a lock. In many cases we would need to make significant refactorings to be able to pass this check so disable in the affected crates.
Signed-off-by: Rob Bradford <robert.bradford@intel.com>
show more ...
|
2716bc33 | 30-Jun-2022 |
Rob Bradford <robert.bradford@intel.com> |
build: Fix beta clippy issue (derive_partial_eq_without_eq)
warning: you are deriving `PartialEq` and can implement `Eq` --> vmm/src/serial_manager.rs:59:30 | 59 | #[derive(Debug, Clone, Copy,
build: Fix beta clippy issue (derive_partial_eq_without_eq)
warning: you are deriving `PartialEq` and can implement `Eq` --> vmm/src/serial_manager.rs:59:30 | 59 | #[derive(Debug, Clone, Copy, PartialEq)] | ^^^^^^^^^ help: consider deriving `Eq` as well: `PartialEq, Eq` | = help: for further information visit https://rust-lang.github.io/rust-clippy/master/index.html#derive_partial_eq_without_eq
Signed-off-by: Rob Bradford <robert.bradford@intel.com>
show more ...
|
2f514523 | 23-Jun-2022 |
Wei Liu <liuwe@microsoft.com> |
hypervisor: emulator: use matches!
No functional change. Just make the code a bit nicer to read.
Signed-off-by: Wei Liu <liuwe@microsoft.com> |
a64bdcf3 | 20-Jun-2022 |
Wei Liu <liuwe@microsoft.com> |
hypervisor: drop Send+Sync bounds for PlatformEmulator
Signed-off-by: Wei Liu <liuwe@microsoft.com> |
ada85f68 | 07-Jun-2022 |
Jinank Jain <jinankjain@microsoft.com> |
hypervisor: mshv: Override hypervisor R/W behavior for unknown MSR
By default Microsoft Hypervisor send a GP to the guest if it tries read/write an unimplemented MSR from the hypervisor prospective.
hypervisor: mshv: Override hypervisor R/W behavior for unknown MSR
By default Microsoft Hypervisor send a GP to the guest if it tries read/write an unimplemented MSR from the hypervisor prospective. Instead change this behavior to ignore read/write operations for unimplemented MSRs
Signed-off-by: Jinank Jain <jinankjain@microsoft.com>
show more ...
|
a7a15d56 | 06-Jun-2022 |
Michael Zhao <michael.zhao@arm.com> |
aarch64: Move `setup_regs` to `hypervisor`
`setup_regs` of AArch64 calls KVM sepecific code. Now move it to `hypervisor` crate.
Signed-off-by: Michael Zhao <michael.zhao@arm.com> |
5d45d6d0 | 01-Jun-2022 |
Michael Zhao <michael.zhao@arm.com> |
vmm: Move GIC unit test to `hypervisor` crate
Signed-off-by: Michael Zhao <michael.zhao@arm.com> |
957d3a74 | 01-Jun-2022 |
Michael Zhao <michael.zhao@arm.com> |
aarch64: Simplify GIC related structs definition
Combined the `GicDevice` struct in `arch` crate and the `Gic` struct in `devices` crate.
After moving the KVM specific code for GIC in `arch`, a ver
aarch64: Simplify GIC related structs definition
Combined the `GicDevice` struct in `arch` crate and the `Gic` struct in `devices` crate.
After moving the KVM specific code for GIC in `arch`, a very thin wapper layer `GicDevice` was left in `arch` crate. It is easy to combine it with the `Gic` in `devices` crate.
Signed-off-by: Michael Zhao <michael.zhao@arm.com>
show more ...
|
b8dbb266 | 31-May-2022 |
Michael Zhao <michael.zhao@arm.com> |
hypervisor: Refactor `save_pending_tables` of Vgic
Signed-off-by: Michael Zhao <michael.zhao@arm.com> |
3fe7d61a | 30-May-2022 |
Michael Zhao <michael.zhao@arm.com> |
hypervisor: Remove some redundant parameters
Signed-off-by: Michael Zhao <michael.zhao@arm.com> |
c2862b69 | 29-May-2022 |
Michael Zhao <michael.zhao@arm.com> |
hypervisor: Move GitV3Its code from `arch`
Signed-off-by: Michael Zhao <michael.zhao@arm.com> |
03b01c02 | 27-May-2022 |
Michael Zhao <michael.zhao@arm.com> |
hypervisor: Define `Vgic` trait
Defined `Vgic` trait as the hypervisor agnostic interface for a virtual GIC.
Signed-off-by: Michael Zhao <michael.zhao@arm.com> |
3a0429c9 | 17-May-2022 |
Maksym Pavlenko <pavlenko.maksym@gmail.com> |
cargo: Clean up serde dependencies
There is no need to include serde_derive separately, as it can be specified as serde feature instead.
Signed-off-by: Maksym Pavlenko <pavlenko.maksym@gmail.com> |
8ab3aaee | 10-May-2022 |
Rob Bradford <robert.bradford@intel.com> |
hypervisor: emulator: Remove some glob use imports
Signed-off-by: Rob Bradford <robert.bradford@intel.com> |
218be264 | 11-May-2022 |
Rob Bradford <robert.bradford@intel.com> |
hypervisor: Explicitly `pub use` at the hypervisor crate top-level
Explicitly re-export types from the hypervisor specific modules. This makes it much clearer what the common functionality that is e
hypervisor: Explicitly `pub use` at the hypervisor crate top-level
Explicitly re-export types from the hypervisor specific modules. This makes it much clearer what the common functionality that is exposed is.
Signed-off-by: Rob Bradford <robert.bradford@intel.com>
show more ...
|
4ff0686d | 11-May-2022 |
Rob Bradford <robert.bradford@intel.com> |
hypervisor: mshv: Move CpuIdEntry alias into x86_64 module
This is consistent with kvm and correctly reflects the architectural dependency.
Signed-off-by: Rob Bradford <robert.bradford@intel.com> |
288cea91 | 11-May-2022 |
Rob Bradford <robert.bradford@intel.com> |
hypervisor: Make hypervisor module private
All the required functionality is already exported from the hypervisor crate so for consistency make this module private.
Signed-off-by: Rob Bradford <rob
hypervisor: Make hypervisor module private
All the required functionality is already exported from the hypervisor crate so for consistency make this module private.
Signed-off-by: Rob Bradford <robert.bradford@intel.com>
show more ...
|
d3f66f87 | 11-May-2022 |
Rob Bradford <robert.bradford@intel.com> |
hypervisor: Make vm module private
And thus only export what is necessary through a `pub use`. This is consistent with some of the other modules and makes it easier to understand what the external i
hypervisor: Make vm module private
And thus only export what is necessary through a `pub use`. This is consistent with some of the other modules and makes it easier to understand what the external interface of the hypervisor crate is.
Signed-off-by: Rob Bradford <robert.bradford@intel.com>
show more ...
|
3ffc105f | 10-May-2022 |
Rob Bradford <robert.bradford@intel.com> |
hypervisor, vm-device: Relocate InterruptSourceConfig
Move this enum from vm-device to hypervisor crate so that hypervisor crate does not gain an extra dependency.
Signed-off-by: Rob Bradford <robe
hypervisor, vm-device: Relocate InterruptSourceConfig
Move this enum from vm-device to hypervisor crate so that hypervisor crate does not gain an extra dependency.
Signed-off-by: Rob Bradford <robert.bradford@intel.com>
show more ...
|
3f9e8d67 | 10-May-2022 |
Rob Bradford <robert.bradford@intel.com> |
hypervisor: Move creation of irq routing struct to hypervisor crate
This removes the requirement to leak as many datastructures from the hypervisor crate into the vmm crate.
Signed-off-by: Rob Brad
hypervisor: Move creation of irq routing struct to hypervisor crate
This removes the requirement to leak as many datastructures from the hypervisor crate into the vmm crate.
Signed-off-by: Rob Bradford <robert.bradford@intel.com>
show more ...
|
387d5687 | 04-May-2022 |
Rob Bradford <robert.bradford@intel.com> |
vmm, hypervisor: Clean up nomenclature around offloading VM operations
The trait and functionality is about operations on the VM rather than the VMM so should be named appropriately. This clashed wi
vmm, hypervisor: Clean up nomenclature around offloading VM operations
The trait and functionality is about operations on the VM rather than the VMM so should be named appropriately. This clashed with with existing struct for the concrete implementation that was renamed appropriately.
Signed-off-by: Rob Bradford <robert.bradford@intel.com>
show more ...
|