Hi Mario,
On 15/04/14 02:24, Mario Smarduch wrote:
Headers for migration, prototypes
Signed-off-by: Mario Smarduch m.smard...@samsung.com
As a general comment in the whole series: Please take the time to write
decent commit messages. Having the same title for all three patches is
rather
Numa fault is a method which help to achieve auto numa balancing.
When such a page fault takes place, the page fault handler will check
whether the page is placed correctly. If not, migration should be
involved to cut down the distance between the cpu and pages.
A pte with _PAGE_NUMA help to
Yes, you were right, the port was already being used when I was doing:
-chardev socket,host=localhost,port=,server,nowait,id=port1-char \
However, even after using a unix socket for this socket as:
-chardev socket,path=/tmp/g2g,server,nowait,id=port1-char
the VM has booted giving a
On Tue, 04/15 14:03, Jobin Raju George wrote:
Yes, you were right, the port was already being used when I was doing:
-chardev socket,host=localhost,port=,server,nowait,id=port1-char \
However, even after using a unix socket for this socket as:
-chardev
On 15/04/14 02:24, Mario Smarduch wrote:
- Support write protection of entire VM address space
- Split pmds section in migration mode
- Write protect dirty pages on Dirty log read
Signed-off-by: Mario Smarduch m.smard...@samsung.com
---
arch/arm/kvm/mmu.c | 158
On 15/04/14 02:24, Mario Smarduch wrote:
- support QEMU interface for initial VM Write Protect
- QEMU Dirty bit map log retrieval
Signed-off-by: Mario Smarduch m.smard...@samsung.com
---
arch/arm/kvm/arm.c | 62
+++-
1 file changed,
Mario,
On 15/04/14 02:24, Mario Smarduch wrote:
The patch set supports migration dirty bitmap support implementation for
arm-kvm. Spliting of pmd's to pte's as suggested is implemented on demand
when migration is started.
I tested it on 4-way SMP ARMv7, with SMP guests.
2GB VMs with
Adding -net nic to the end of the booting command, I am able to
connect to the internet now and have 10.0.2.15 as the IP address, but
still
ssh username@10.0.2.15
returns
ssh: connect to host 10.0.2.15 port 22: Connection timed out
On Tue, Apr 15, 2014 at 2:25 PM, Fam Zheng f...@redhat.com
On Tue, 04/15 15:49, Jobin Raju George wrote:
Adding -net nic to the end of the booting command, I am able to
connect to the internet now and have 10.0.2.15 as the IP address, but
still
ssh username@10.0.2.15
returns
ssh: connect to host 10.0.2.15 port 22: Connection timed out
Ugh,
Hi Marcelo,
Thanks your time to review it.
On 04/09/2014 10:51 PM, Marcelo Tosatti wrote:
+/*
+ * Please note PT_WRITABLE_MASK is not stable since
+ * 1) fast_page_fault() sets spte from readonly to writable out of mmu-lock
or
+ * 2) kvm_mmu_slot_remove_write_access() and
From: Heiko Carstens heiko.carst...@de.ibm.com
Convert handle_stidp() to new guest access functions.
Signed-off-by: Heiko Carstens heiko.carst...@de.ibm.com
Reviewed-by: Thomas Huth th...@linux.vnet.ibm.com
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
---
arch/s390/kvm/priv.c | 7
From: Heiko Carstens heiko.carst...@de.ibm.com
Convert kvm_s390_store_status_unloaded() to new guest access functions.
Signed-off-by: Heiko Carstens heiko.carst...@de.ibm.com
Reviewed-by: Thomas Huth th...@linux.vnet.ibm.com
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
---
From: Heiko Carstens heiko.carst...@de.ibm.com
Check if siif is available before setting.
Signed-off-by: Heiko Carstens heiko.carst...@de.ibm.com
Reviewed-by: Thomas Huth th...@linux.vnet.ibm.com
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
---
arch/s390/include/asm/sclp.h | 7
From: Dominik Dingel din...@linux.vnet.ibm.com
To enable CMMA and to reset its state we use the vm kvm_device ioctls,
encapsulating attributes within the KVM_S390_VM_MEM_CTRL group.
Signed-off-by: Dominik Dingel din...@linux.vnet.ibm.com
Signed-off-by: Christian Borntraeger
From: David Hildenbrand d...@linux.vnet.ibm.com
When a guest is single-stepped, we want to disable timer interrupts. Otherwise,
the guest will continuously execute the external interrupt handler and make
debugging of code where timer interrupts are enabled almost impossible.
The delivery of
From: Heiko Carstens heiko.carst...@de.ibm.com
Convert handle_prog() to new guest access functions.
Also make the code a bit more readable and look at the return code
of write_guest_lc() which was missing before.
Signed-off-by: Heiko Carstens heiko.carst...@de.ibm.com
Signed-off-by: Christian
From: David Hildenbrand d...@linux.vnet.ibm.com
This patch moves the checks for enabled timer (clock-comparator) interrupts and
pending
timer interrupts into own functions, making the code better readable and easier
to
maintain.
The method kvm_cpu_has_pending_timer is filled with life.
On hard exits (abort, sigkill) we have have some kvm_s390_interrupt_info
structures hanging around. Delete those on exit to avoid memory leaks.
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
CC: sta...@vger.kernel.org
Reviewed-by: Thomas Huth th...@linux.vnet.ibm.com
---
From: Jens Freimann jf...@linux.vnet.ibm.com
per_perc_atmid is currently a two-byte field that combines two
fields, the PER code and the PER Addressing-and-Translation-Mode
Identification (ATMID)
Let's make them accessible indepently and also rename per_cause to
per_code.
Signed-off-by: Jens
From: Michael Mueller m...@linux.vnet.ibm.com
The generically assembled low core labels already contain the
address for the TDB.
Signed-off-by: Michael Mueller m...@linux.vnet.ibm.com
Acked-by: Christian Borntraeger borntrae...@de.ibm.com
Reviewed-by: Cornelia Huck cornelia.h...@de.ibm.com
From: David Hildenbrand d...@linux.vnet.ibm.com
Introduce the methods to emulate the stctl and stctg instruction. Added tracing
code.
Signed-off-by: David Hildenbrand d...@linux.vnet.ibm.com
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
---
arch/s390/include/asm/kvm_host.h | 2 ++
From: David Hildenbrand d...@linux.vnet.ibm.com
Added documentation for diag 501, stating that no subfunctions are provided and
no parameters are used.
Signed-off-by: David Hildenbrand d...@linux.vnet.ibm.com
Reviewed-by: Cornelia Huck cornelia.h...@de.ibm.com
Signed-off-by: Christian
From: Michael Mueller m...@linux.vnet.ibm.com
Factor out the new function handle_itdb(), which copies the ITDB into
guest lowcore to fully handle a TX abort.
Signed-off-by: Michael Mueller m...@linux.vnet.ibm.com
Acked-by: Christian Borntraeger borntrae...@de.ibm.com
Signed-off-by: Christian
From: David Hildenbrand d...@linux.vnet.ibm.com
This patch adds support to debug the guest using the PER facility on s390.
Single-stepping, hardware breakpoints and hardware watchpoints are supported. In
order to use the PER facility of the guest without it noticing it, the control
registers of
From: Heiko Carstens heiko.carst...@de.ibm.com
Convert handle_stsi() to new guest access functions.
Signed-off-by: Heiko Carstens heiko.carst...@de.ibm.com
Reviewed-by: Thomas Huth th...@linux.vnet.ibm.com
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
---
arch/s390/kvm/priv.c | 9
From: Jens Freimann jf...@linux.vnet.ibm.com
This patch adds fields which are currently missing but needed for the correct
injection of interrupts.
This is based on a patch by David Hildenbrand
Signed-off-by: Jens Freimann jf...@linux.vnet.ibm.com
Acked-by: Heiko Carstens
From: David Hildenbrand d...@linux.vnet.ibm.com
Whenever a program interrupt is intercepted, some parameters are stored in the
sie control block. These parameters have to be extracted in order to be
reinjected correctly. This patch also takes care of intercepted PER events which
can occurr in
From: Jens Freimann jf...@linux.vnet.ibm.com
According to the Principles of Operation, at offset 0xA3
in the lowcore we have the Architectural-Mode identification,
not an access identification.
Signed-off-by: Jens Freimann jf...@linux.vnet.ibm.com
Acked-by: Heiko Carstens
From: David Hildenbrand d...@linux.vnet.ibm.com
This patch adds the structs to the kernel headers needed to pass information
from/to userspace in order to debug a guest on s390 with hardware support.
Signed-off-by: David Hildenbrand d...@linux.vnet.ibm.com
Signed-off-by: Christian Borntraeger
From: David Hildenbrand d...@linux.vnet.ibm.com
When a program interrupt was to be delivered until now, no program interrupt
parameters were stored in the low-core of the target vcpu.
This patch enables the delivery of those program interrupt parameters, takes
care of concurrent PER events which
From: Heiko Carstens heiko.carst...@de.ibm.com
Convert handle_tpi() to new guest access functions.
The code now sets up a structure which is copied with a single call to
guest space instead of issuing several separate guest access calls.
This is necessary since the to be copied data may cross a
From: Heiko Carstens heiko.carst...@de.ibm.com
Convert handle_store_prefix() to new guest access functions.
Signed-off-by: Heiko Carstens heiko.carst...@de.ibm.com
Reviewed-by: Thomas Huth th...@linux.vnet.ibm.com
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
---
From: Cornelia Huck cornelia.h...@de.ibm.com
The tpi instruction should be suppressed on addressing and protection
exceptions, so we need to re-inject the dequeued io interrupt in that
case.
Signed-off-by: Cornelia Huck cornelia.h...@de.ibm.com
Signed-off-by: Heiko Carstens
From: Heiko Carstens heiko.carst...@de.ibm.com
Convert handle lctl[g]() to new guest access functions.
Signed-off-by: Heiko Carstens heiko.carst...@de.ibm.com
Reviewed-by: Thomas Huth th...@linux.vnet.ibm.com
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
---
arch/s390/kvm/priv.c |
From: Heiko Carstens heiko.carst...@de.ibm.com
Convert handle_set_clock() to new guest access functions.
Signed-off-by: Heiko Carstens heiko.carst...@de.ibm.com
Reviewed-by: Thomas Huth th...@linux.vnet.ibm.com
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
---
arch/s390/kvm/priv.c
From: Heiko Carstens heiko.carst...@de.ibm.com
Signed-off-by: Heiko Carstens heiko.carst...@de.ibm.com
Reviewed-by: Thomas Huth th...@linux.vnet.ibm.com
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
---
arch/s390/kvm/gaccess.h | 81 -
From: Heiko Carstens heiko.carst...@de.ibm.com
Convert handle_test_block() to new guest access functions.
Signed-off-by: Heiko Carstens heiko.carst...@de.ibm.com
Reviewed-by: Thomas Huth th...@linux.vnet.ibm.com
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
---
From: Heiko Carstens heiko.carst...@de.ibm.com
Add kerneldoc comment to kvm_s390_real_to_abs() and change the code
so it matches the coding style of the rest of gaccess.h.
Signed-off-by: Heiko Carstens heiko.carst...@de.ibm.com
Reviewed-by: Thomas Huth th...@linux.vnet.ibm.com
Signed-off-by:
From: Jens Freimann jf...@linux.vnet.ibm.com
Convert local irqs in __do_deliver_interrupt() to new guest
access functions.
Signed-off-by: Jens Freimann jf...@linux.vnet.ibm.com
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
---
arch/s390/kvm/interrupt.c | 81
From: Heiko Carstens heiko.carst...@de.ibm.com
Convert handle_lpsw[e]() to new guest access functions.
Signed-off-by: Heiko Carstens heiko.carst...@de.ibm.com
Reviewed-by: Thomas Huth th...@linux.vnet.ibm.com
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
---
arch/s390/kvm/priv.c |
From: Heiko Carstens heiko.carst...@de.ibm.com
Convert __sigp_set_prefix() and handle_set_prefix() to new guest
access functions.
Signed-off-by: Heiko Carstens heiko.carst...@de.ibm.com
Reviewed-by: Thomas Huth th...@linux.vnet.ibm.com
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
From: Heiko Carstens heiko.carst...@de.ibm.com
Convert handle_stfl() to new guest access functions.
Signed-off-by: Heiko Carstens heiko.carst...@de.ibm.com
Reviewed-by: Thomas Huth th...@linux.vnet.ibm.com
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
---
arch/s390/kvm/priv.c | 6
From: Jens Freimann jf...@linux.vnet.ibm.com
Add a new data structure and function that allows to inject
all kinds of interrupt as defined in the PoP
Signed-off-by: Jens Freimann jf...@linux.vnet.ibm.com
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
---
From: Heiko Carstens heiko.carst...@de.ibm.com
put_guest_lc, read_guest_lc and write_guest_lc are guest access
functions which shall only be used to access the lowcore of a vcpu.
These functions should be used for e.g. interrupt handlers where no
guest memory access protection facilities, like
From: Heiko Carstens heiko.carst...@de.ibm.com
Signed-off-by: Heiko Carstens heiko.carst...@de.ibm.com
Reviewed-by: Thomas Huth th...@linux.vnet.ibm.com
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
---
arch/s390/include/asm/kvm_host.h | 12 -
arch/s390/kvm/gaccess.c
From: Heiko Carstens heiko.carst...@de.ibm.com
Convert pfault code to new guest access functions.
Signed-off-by: Heiko Carstens heiko.carst...@de.ibm.com
Reviewed-by: Dominik Dingel din...@linux.vnet.ibm.com
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
---
arch/s390/kvm/diag.c
From: Heiko Carstens heiko.carst...@de.ibm.com
Convert __do_deliver_interrupt() to new guest access functions.
Signed-off-by: Heiko Carstens heiko.carst...@de.ibm.com
Reviewed-by: Thomas Huth th...@linux.vnet.ibm.com
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
---
From: Heiko Carstens heiko.carst...@de.ibm.com
The new guest memory access function write_guest() and read_guest() can be
used to access guest memory in an architecture compliant way.
These functions will look at the vcpu's PSW and select the correct address
space for memory access and also
From: Heiko Carstens heiko.carst...@de.ibm.com
Convert handle_store_cpu_address() to new guest access functions.
Signed-off-by: Heiko Carstens heiko.carst...@de.ibm.com
Reviewed-by: Thomas Huth th...@linux.vnet.ibm.com
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
---
From: Heiko Carstens heiko.carst...@de.ibm.com
Introduce a 'struct psw' which makes it easier to decode and test if
certain bits in a psw are set or are not set.
In addition also add a 'psw_bits()' helper define which allows to
directly modify and test a psw_t structure. E.g.
psw_t psw;
From: Heiko Carstens heiko.carst...@de.ibm.com
Make test_vfacility() available for other files. This is needed for the
new guest access functions, which test if certain facilities are available
for a guest.
Signed-off-by: Heiko Carstens heiko.carst...@de.ibm.com
Reviewed-by: Cornelia Huck
From: Heiko Carstens heiko.carst...@de.ibm.com
Add a 'struct kvm_s390_pgm_info pgm' member to kvm_vcpu_arch. This
structure will be used if during instruction emulation in the context
of a vcpu exception data needs to be stored somewhere.
Also add a helper function kvm_s390_inject_prog_cond()
From: Dominik Dingel din...@linux.vnet.ibm.com
We sometimes need to get/set attributes specific to a virtual machine
and so need something else than ONE_REG.
Let's copy the KVM_DEVICE approach, and define the respective ioctls
for the vm file descriptor.
Signed-off-by: Dominik Dingel
From: Heiko Carstens heiko.carst...@de.ibm.com
Add 'union ctlreg0_bits' to easily allow setting and testing bits of
control register 0 bits.
This patch only adds the bits needed for the new guest access functions.
Other bits and control registers can be added when needed.
Signed-off-by: Heiko
From: Dominik Dingel din...@linux.vnet.ibm.com
When userspace reset the guest without notifying kvm, the CMMA state
of the pages might be unused, resulting in guest data corruption.
To avoid this, CMMA must be enabled only if userspace understands
the implications.
CMMA must be enabled before
From: Heiko Carstens heiko.carst...@de.ibm.com
Add kvm_s390_logical_to_effective() helper which converts a guest vcpu's
logical storage address to a guest vcpu effective address by applying the
rules of the vcpu's addressing mode defined by PSW bits 31 and 32
(extendended and basic addressing
Marcelo, Gleb, Paolo,
on top of the latest patch set v2 KVM: s390: memory management and
migration, we have the following bunch of patches ready for kvm/next
(after being re-opened on top of 3.15-rc1) targetting 3.16.
I will send a pull request after kvm/next is ready (either to Marcelo
or to
From: Heiko Carstens heiko.carst...@de.ibm.com
It's quite common (in the s390 guest access code) to test if a guest
physical address points to a valid guest memory area or not.
So add a simple helper function in common code, since this might be
of interest for other architectures as well.
On 09/04/14 16:21, Christian Borntraeger wrote:
Ingo, Arnaldo,
two fixes indentified during kvm on s390 development are available
since commit 538592ff0b008237ae88f5ce5fb1247127dc3ce5:
Merge tag 'perf-core-for-mingo' of
git://git.kernel.org/pub/scm/linux/kernel/git/acme/linux into
On 04/14/2014 07:37 PM, Juan Quintela wrote:
Hi
Please, send any topic that you are interested in covering.
As mentioned in the last email I still have the sysbus -device topic on
the list. If Alexey shows up I would also like to discuss the IOMMU bus
patch and why we need a bus solely for
Am 10.04.2014 17:52, schrieb Peter Maydell:
On 10 April 2014 16:49, Alexander Graf ag...@suse.de wrote:
For the next call, I would propose to revive the platform bus
(aka: how to create non-PCI devices with -device) discussions
to make sure we're all on the same page.
I rather suspect we
On Tue, Apr 15, 2014 at 03:05:02PM +0200, Christian Borntraeger wrote:
On 09/04/14 16:21, Christian Borntraeger wrote:
Ingo, Arnaldo,
two fixes indentified during kvm on s390 development are available
since commit 538592ff0b008237ae88f5ce5fb1247127dc3ce5:
Merge tag
Juan Quintela quint...@redhat.com wrote:
Hi
Please, send any topic that you are interested in covering.
Thanks, Juan.
As there are no topics, no call.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
When entering an exception after an ICEBP, the saved instruction
pointer should point to after the instruction.
This fixes the bug here: https://bugs.launchpad.net/qemu/+bug/1119686
Signed-off-by: Huw Davies h...@codeweavers.com
---
arch/x86/kvm/vmx.c | 3 +++
1 file changed, 3 insertions(+)
Juan Quintela quint...@redhat.com writes:
Juan Quintela quint...@redhat.com wrote:
Hi
Please, send any topic that you are interested in covering.
Thanks, Juan.
As there are no topics, no call.
Did we have a call anyway? IRC log looks like we did...
--
To unsubscribe from this list: send
On 04/15/2014 04:00 PM, Markus Armbruster wrote:
Juan Quintela quint...@redhat.com writes:
Juan Quintela quint...@redhat.com wrote:
Hi
Please, send any topic that you are interested in covering.
Thanks, Juan.
As there are no topics, no call.
Did we have a call anyway? IRC log looks like
On 04/15/2014 04:55 PM, Alexander Graf wrote:
On 04/15/2014 04:00 PM, Markus Armbruster wrote:
Juan Quintela quint...@redhat.com writes:
Juan Quintela quint...@redhat.com wrote:
Hi
Please, send any topic that you are interested in covering.
Thanks, Juan.
As there are no topics, no call.
Some fuller comments below on the parts of the call which
I had opinions on.
On 15 April 2014 15:55, Alexander Graf ag...@suse.de wrote:
2) -device for non-PCI devices
There are 2 reasons we want to create platform devices using -device on
the command line. One is that Xilinx is trying to
On 2014-04-15 15:40, Huw Davies wrote:
When entering an exception after an ICEBP, the saved instruction
pointer should point to after the instruction.
This fixes the bug here: https://bugs.launchpad.net/qemu/+bug/1119686
Signed-off-by: Huw Davies h...@codeweavers.com
---
Alexander Graf ag...@suse.de writes:
On 04/15/2014 04:00 PM, Markus Armbruster wrote:
Juan Quintela quint...@redhat.com writes:
Juan Quintela quint...@redhat.com wrote:
Hi
Please, send any topic that you are interested in covering.
Thanks, Juan.
As there are no topics, no call.
Did we
Hi
Do we have any plan to support migration by multi net card?
Thanks
ChenLiang
Hi
Please, send any topic that you are interested in covering.
Thanks, Juan.
Call details:
15:00 CEST
13:00 UTC
09:00 EDT
Every two weeks
If you need phone number details, contact me
Hi Marc,
Thanks for the feedback, very valuable going forward. I'll clean the patch
up and
repost with much more documentation. One key error you pointed out,
and I overlooked but knew about it, is to error out from get dirty log if
whole
VM can't be WPed, at that point QEMU will abort.
Am 15.04.2014 um 18:56 schrieb Markus Armbruster arm...@redhat.com:
Alexander Graf ag...@suse.de writes:
On 04/15/2014 04:00 PM, Markus Armbruster wrote:
Juan Quintela quint...@redhat.com writes:
Juan Quintela quint...@redhat.com wrote:
Hi
Please, send any topic that you are
Bluetooth headsets are hands-free, wire-free devices that you simply attach
onto your ear, Whether you are driving,walking down the street or around the
home trying to get chores done, holding the phone interrupts your movement and
gives you one less hand to work with.
The freedom Bluetooth
Hi
I'm new to KVM development, and working on a project for an old kernel 2.6.39,
so I followed the README with following steps:
git clone git://git.kiszka.org/kvm-kmod.get
cd kvm-kmod
git submodule update --init
git checkout bed5df
./configure
make sync
However, I got a warning when doing
On 04/15/2014 01:58 AM, Marc Zyngier wrote:
Why do you nuke the whole TLBs for this VM? I assume you're going to
repeatedly call this for all the huge pages, aren't you? Can you delay
this flush to do it only once?
+get_page(virt_to_page(pte));
+return true;
+}
+
+/*
+ *
Hi Eric, Mark -
what repository should I use to pick up Eric patches?
For kvm_vm_ioctl_get_dirty_log() not sure what to make generic
it appears generic enough and it does what it needs to do?
Thanks,
Mario
On 04/15/2014 02:06 AM, Marc Zyngier wrote:
On 15/04/14 02:24, Mario Smarduch
Numa fault is a method which help to achieve auto numa balancing.
When such a page fault takes place, the page fault handler will check
whether the page is placed correctly. If not, migration should be
involved to cut down the distance between the cpu and pages.
A pte with _PAGE_NUMA help to
78 matches
Mail list logo