> +static int dev_is_mpassthru(struct net_device *dev)
>
>bool return value should be better here.
>
>--
>Regards,
>Changli Gao(xiao...@gmail.com)
Thanks, would fix that.
Thanks
Xiaohui
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.k
> > The idea is simple, just to pin the guest VM user space and then let
> > host NIC driver has the chance to directly DMA to it.
> >
> >Isn't it much easier to map the RX ring of the network device into the
> >guest's address space, have DMA map calls translate guest addresses to
> >physical/DMA
On Wed, 2010-04-28 at 17:47 +0800, Avi Kivity wrote:
> On 04/28/2010 05:56 AM, Huang Ying wrote:
> >
> >>>
> >>> Just want to use the side effect of copy_from_user, SIGBUS will be sent
> >>> to current process because the page touched is marked as poisoned. That
> >>> is, failure is expected, s
On Thu, 2010-04-29 at 00:33 +0800, Avi Kivity wrote:
> On 04/28/2010 09:08 AM, Huang Ying wrote:
> >
> > There is some test script and document for this in:
> >
> > git://git.kernel.org/pub/scm/utils/cpu/mce/mce-test.git
> >
> > test script is in "kvm" directory, testing document is kvm/README
> >
Hi,
I have been toying around with kvm / libvirt / virt-manager and it's migration
feature.
Both host machines are running a 2.6.33 Kernel.
One host is a Dual Quad Core Intel Xeon E5520 @ 2.27GHz and the other is a
Dual Quad Core Intel E5420 @ 2.50GHz.
Migrating Linux machines works great bu
On Wed, Apr 28, 2010 at 11:16:15PM +0300, Michael S. Tsirkin wrote:
> Bugzilla: 585940
> Upstream status: applied on qemu-kvm.git,
> commit 992cc816c42f2e93db033919a9ddbfcd1da4
Please disregard, sent to this list in error.
Sorry about the noise.
--
To unsubscribe from this list: send the line
On Wednesday, April 28, 2010 03:08:24 pm Axel Kittenberger wrote:
> Hello,
>
> This is a question I was not able to answer with a search. I've been
> using kvm now quite successfully as server side solution. Now I want to
> use it on a particular desktop to have a Windows 7 Guest on a native
> Lin
This patch adds mergeable receive buffer support to vhost_net.
Signed-off-by: David L Stevens
diff -ruNp net-next-v0/drivers/vhost/net.c net-next-v7/drivers/vhost/net.c
--- net-next-v0/drivers/vhost/net.c 2010-04-24 21:36:54.0 -0700
+++ net-next-v7/drivers/vhost/net.c 2010-04-28
Bugzilla: 585940
Upstream status: applied on qemu-kvm.git,
commit 992cc816c42f2e93db033919a9ddbfcd1da4
When vhost-net is disabled on reboot, we set msix mask notifier
to NULL to disable further mask/unmask notifications.
Code currently tries to pass this NULL to notifier,
leading to a crash.
Hello,
This is a question I was not able to answer with a search. I've been
using kvm now quite successfully as server side solution. Now I want to
use it on a particular desktop to have a Windows 7 Guest on a native
Linux system. Well this desktop has two Screens, and I'm sure its
expected t
On Wed, Apr 28, 2010 at 02:43:05PM -0300, Marcelo Tosatti wrote:
> > Signed-off-by: Michael S. Tsirkin
>
> Applied, thanks.
Can you tell me what commit id it has pls (for backport to rhel6).
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@v
Hi,
I noticed that certain guests (for example, Ubuntu 9.04, Ubuntu 9.10,
and the Ubuntu 10.04 release candidate) show dramatically (~100x) slower
graphical output when running under qemu-kvm-0.12.1.1 than under
qemu-kvm-0.11.1.
Other guests, notably Windows XP and Windows Vista, run fine unde
On Wed, Apr 28, 2010 at 07:57:01PM +0800, Lai Jiangshan wrote:
>
> I think users will enable tdp when their hardwares support ept or npt.
> This patch can reduce about 50% kvm mmu memory usage for they.
>
> This simple patch use the fact that:
>
> When sp->role.direct is set, sp->gfns does not c
On Wed, Apr 28, 2010 at 12:27:38PM +0300, Michael S. Tsirkin wrote:
> When vhost-net is disabled on reboot, we set msix mask notifier
> to NULL to disable further mask/unmask notifications.
> Code currently tries to pass this NULL to notifier,
> leading to a crash. The right thing to do is
> to ad
On 04/28/2010 09:08 AM, Huang Ying wrote:
There is some test script and document for this in:
git://git.kernel.org/pub/scm/utils/cpu/mce/mce-test.git
test script is in "kvm" directory, testing document is kvm/README
This is a good candidate for kvm-autotest. We'll get little user
cove
On Wed, Apr 28, 2010 at 11:54:31AM +0800, Xiao Guangrong wrote:
> Changlog v3:
>
> Those changes all form Avi's suggestion, thanks.
>
> - use smart way to fix the bug in patch 1
> - remove duplicates code in patch 5
> - check error code and fix forgot release page in patch 9
> - sync shadow pages
On Wed, Apr 28, 2010 at 01:22:14PM -0300, Marcelo Tosatti wrote:
> On Wed, Apr 28, 2010 at 10:39:06AM -0500, Anthony Liguori wrote:
> > On 04/26/2010 12:59 PM, Marcelo Tosatti wrote:
> > >This is now done via the initialization's qemu_system_reset call.
> > >
> > >Signed-off-by: Avi Kivity
> > >---
On 04/28/2010 11:22 AM, Marcelo Tosatti wrote:
On Wed, Apr 28, 2010 at 10:39:06AM -0500, Anthony Liguori wrote:
On 04/26/2010 12:59 PM, Marcelo Tosatti wrote:
This is now done via the initialization's qemu_system_reset call.
Signed-off-by: Avi Kivity
---
kvm-all.c |1 -
1 file
On Tue, Apr 27, 2010 at 03:56:04PM +0300, Gleb Natapov wrote:
> Test that ljmp with operand in IO memory works.
>
> Signed-off-by: Gleb Natapov
Applied both, thanks.
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majo
On Tue, Apr 27, 2010 at 03:10:49PM +0800, Huang Ying wrote:
> In common cases, guest SRAO MCE will cause corresponding poisoned page
> be un-mapped in host and SIGBUS be sent to QEMU-KVM, then QEMU-KVM
> will relay the MCE to guest OS.
>
> But it is possible that the poisoned page is accessed in g
On Wed, Apr 28, 2010 at 10:39:06AM -0500, Anthony Liguori wrote:
> On 04/26/2010 12:59 PM, Marcelo Tosatti wrote:
> >This is now done via the initialization's qemu_system_reset call.
> >
> >Signed-off-by: Avi Kivity
> >---
> > kvm-all.c |1 -
> > 1 files changed, 0 insertions(+), 1 deletions(-
Add (set|get)_msr callbacks to x86_emulate_ops instead of calling
them directly.
Signed-off-by: Gleb Natapov
---
arch/x86/include/asm/kvm_emulate.h |2 ++
arch/x86/kvm/emulate.c | 36 ++--
arch/x86/kvm/x86.c |2 ++
3 files cha
ljmp/lcall instruction operand contains address and segment.
It can be 10 bytes long. Currently we decode it as two different
operands. Fix it by introducing new kind of operand that can hold
entire far address.
Signed-off-by: Gleb Natapov
---
arch/x86/include/asm/kvm_emulate.h |6 +++-
arch
Add (set|get)_dr callbacks to x86_emulate_ops instead of calling
them directly.
Signed-off-by: Gleb Natapov
---
arch/x86/include/asm/kvm_emulate.h |2 ++
arch/x86/include/asm/kvm_host.h|4
arch/x86/kvm/emulate.c |7 +--
arch/x86/kvm/x86.c |
Currently emulator returns -1 when emulation failed or IO is needed.
Caller tries to guess whether emulation failed by looking at other
variables. Make it easier for caller to recognise error condition by
always returning -1 in case of failure. For this new emulator
internal return value X86EMUL_IO
Make set_cr() callback return error if it fails instead of injecting #GP
behind emulator's back.
Signed-off-by: Gleb Natapov
---
arch/x86/include/asm/kvm_emulate.h |2 +-
arch/x86/kvm/emulate.c | 10 ++-
arch/x86/kvm/x86.c | 148 ++--
On VMX it is expensive to call get_cached_descriptor() just to get segment
base since multiple vmcs_reads are done instead of only one. Introduce
new call back get_cached_segment_base() for efficiency.
Signed-off-by: Gleb Natapov
---
arch/x86/include/asm/kvm_emulate.h |1 +
arch/x86/kvm/emul
Make (get|set)_dr() callback return error if it fails instead of
injecting exception behind emulator's back.
Signed-off-by: Gleb Natapov
---
arch/x86/kvm/emulate.c | 11 ++--
arch/x86/kvm/x86.c | 63 ---
2 files changed, 45 insertions(+), 2
Use callbacks from x86_emulate_ops to access segments instead of calling
into kvm directly.
Signed-off-by: Gleb Natapov
---
arch/x86/kvm/emulate.c | 200 +---
1 files changed, 105 insertions(+), 95 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/a
Return new RIP as part of instruction emulation result instead of
updating KVM's RIP from x86 emulator code.
Signed-off-by: Gleb Natapov
---
arch/x86/kvm/emulate.c |7 ---
arch/x86/kvm/x86.c |4 +++-
2 files changed, 7 insertions(+), 4 deletions(-)
diff --git a/arch/x86/kvm/emul
Currently X86EMUL_PROPAGATE_FAULT, X86EMUL_RETRY_INSTR and
X86EMUL_CMPXCHG_FAILED have the same value so caller cannot
distinguish why function such as emulator_cmpxchg_emulated()
(which can return both X86EMUL_PROPAGATE_FAULT and
X86EMUL_CMPXCHG_FAILED) failed.
Signed-off-by: Gleb Natapov
---
a
Fill in run->mmio details in (read|write)_emulated function just like
pio does. There is no point in filling only vcpu fields there just to
copy them into vcpu->run a little bit later.
Signed-off-by: Gleb Natapov
---
arch/x86/kvm/x86.c | 25 +
1 files changed, 9 inserti
Removes the need for set_flags() callback.
Signed-off-by: Gleb Natapov
---
arch/x86/include/asm/kvm_emulate.h |1 -
arch/x86/kvm/emulate.c |1 -
arch/x86/kvm/x86.c |7 +--
3 files changed, 1 insertions(+), 8 deletions(-)
diff --git a/arch/x86/include/
If emulation failed return immediately.
Signed-off-by: Gleb Natapov
---
arch/x86/kvm/x86.c | 31 +++
1 files changed, 15 insertions(+), 16 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 696b34b..445769b 100644
--- a/arch/x86/kvm/x86.c
+++ b
It is not called directly outside of the file it's defined in anymore.
Signed-off-by: Gleb Natapov
---
arch/x86/include/asm/kvm_host.h |5 -
arch/x86/kvm/x86.c |1 -
2 files changed, 0 insertions(+), 6 deletions(-)
diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86
Emulator shouldn't access vcpu directly.
Signed-off-by: Gleb Natapov
---
arch/x86/kvm/emulate.c | 19 ++-
arch/x86/kvm/x86.c | 20 +---
2 files changed, 19 insertions(+), 20 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index 4
Return error to x86 emulator instead of injection exception behind its back.
Signed-off-by: Gleb Natapov
---
arch/x86/include/asm/kvm_emulate.h |3 +++
arch/x86/kvm/emulate.c | 12 +++-
arch/x86/kvm/x86.c | 28 ++--
3 files chan
Emulator shouldn't access vcpu directly.
Signed-off-by: Gleb Natapov
---
arch/x86/kvm/emulate.c | 15 ---
arch/x86/kvm/x86.c | 16 +---
2 files changed, 13 insertions(+), 18 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index 5d786d5..
Return exception as a result of instruction emulation and handle
injection in KVM code.
Signed-off-by: Gleb Natapov
---
arch/x86/include/asm/kvm_emulate.h |6 ++
arch/x86/kvm/emulate.c | 124 ++--
arch/x86/kvm/x86.c | 20 +-
This is the next round of emulator cleanups. Make it even more detached
from kvm. First patch introduces IO read cache which is needed to
correctly emulate instructions that require more then one IO read exit
during emulation.
ChangeLog;
v1->v2:
- add x86_emulator_ops callback to get cached se
emulate_sysexit() should use shadowed registers copy instead of
looking into vcpu state directly.
Signed-off-by: Gleb Natapov
---
arch/x86/kvm/emulate.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index eee5b4d..5d78
Make it more explicit what we are checking for.
Signed-off-by: Gleb Natapov
---
arch/x86/kvm/emulate.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index ea5c6fd..fbc555b 100644
--- a/arch/x86/kvm/emulate.c
+++ b/arch
This instruction does not need generic decoding for its dst operand.
Signed-off-by: Gleb Natapov
---
arch/x86/kvm/emulate.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index 6f40337..efb7853 100644
--- a/arch/x86/kvm/e
Dst operand is already initialized during decoding stage. No need to
reinitialize.
Signed-off-by: Gleb Natapov
---
arch/x86/kvm/emulate.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index efb7853..ea5c6fd 100644
---
Introduce read cache which is needed for instruction that require more
then one exit to userspace. After returning from userspace the instruction
will be re-executed with cached read value.
Signed-off-by: Gleb Natapov
---
arch/x86/include/asm/kvm_emulate.h |1 +
arch/x86/kvm/emulate.c
On Tue, Apr 20, 2010 at 12:26:27AM +0300, Michael S. Tsirkin wrote:
> On Fri, Feb 19, 2010 at 12:22:20AM +0200, Michael S. Tsirkin wrote:
> > I took a stub at documenting CMD and FLUSH request types in virtio
> > block.
>
> Any comments?
Rusty?
--
To unsubscribe from this list: send the line "uns
Bit 4 of the page-fault error code can only be set if efer.nx=1.
Signed-off-by: Avi Kivity
---
kvm/user/test/x86/access.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/kvm/user/test/x86/access.c b/kvm/user/test/x86/access.c
index 5addd15..3338fbc 100644
--- a/kvm/user
There are so many tests, no point in reporting successful ones. Leave the
capability optional in case a failure triggers a kvm or testsuite crash before
the report is complete and we need to see which test failed.
Signed-off-by: Avi Kivity
---
kvm/user/test/x86/access.c | 15 +--
Some processors only set accessed bits if the translation is valid; allow
this behaviour. This squelchs errors running with EPT.
Signed-off-by: Avi Kivity
---
kvm/user/test/x86/access.c | 25 -
1 files changed, 20 insertions(+), 5 deletions(-)
diff --git a/kvm/user/te
Signed-off-by: Avi Kivity
---
kvm/user/test/x86/access.c | 10 --
1 files changed, 8 insertions(+), 2 deletions(-)
diff --git a/kvm/user/test/x86/access.c b/kvm/user/test/x86/access.c
index 5eadff8..dbc1213 100644
--- a/kvm/user/test/x86/access.c
+++ b/kvm/user/test/x86/access.c
@@ -55
The mmu access unit test fails when testing real processor (e.g. with npt or
ept). In one case this was because the test was too restrictive (more than
one result is allowed) and in another both the test and kvm shadow mmu are
faulty.
This patchset fixes the test. Another patch will follow fixin
Signed-off-by: Avi Kivity
---
kvm/user/test/x86/access.c | 60 +++-
1 files changed, 37 insertions(+), 23 deletions(-)
diff --git a/kvm/user/test/x86/access.c b/kvm/user/test/x86/access.c
index dbc1213..0906691 100644
--- a/kvm/user/test/x86/access.c
+++
On 04/26/2010 12:59 PM, Marcelo Tosatti wrote:
This is now done via the initialization's qemu_system_reset call.
Signed-off-by: Avi Kivity
---
kvm-all.c |1 -
1 files changed, 0 insertions(+), 1 deletions(-)
diff --git a/kvm-all.c b/kvm-all.c
index 9c8aa7d..eabb097 100644
--- a/kvm-all.c
On Tue, Apr 27, 2010 at 04:35:06PM +0300, Avi Kivity wrote:
> Perhaps have
>
>struct kvm_mmu base_mmu;
>struct kvm_mmu nested_mmu;
>struct kvm_mmu *mmu;
Okay, the pointer is only used in the gva_to_gpa path which is the
minority of mmu context usages. I will introduce a
struc
Hi there,
I am reading the snapshot source code of qemu-kvm-0.12.3, and am
puzzled by the thread synchronization issue in qcow2.c and
qcow2-cluster.c. Could someone please enlighten me? Thanks!
Specifically, I found that BDRVQcowState.cluster_allocs, which is a
QLIST_HEAD, may be accessed concurr
On Tue, Apr 27, 2010 at 03:37:40PM +0300, Avi Kivity wrote:
> On 04/27/2010 01:38 PM, Joerg Roedel wrote:
> >This patch adds the functions to do a nested l2_gva to
> >l1_gpa page table walk.
> >
> >Signed-off-by: Joerg Roedel
> >---
> > arch/x86/include/asm/kvm_host.h |4
> > arch/x86/kvm
Currently we run with EFER.NX=1 on the guest even if the guest value is 0.
This is fine with shadow, since we check bit 63 when instantiating a page
table, and fault if bit 63 is set while EFER.NX is clear.
This doesn't work with EPT, since we no longer get the change to check guest
ptes. So we n
vmx and svm vcpus have different contents and therefore may have different
alignmment requirements. Let each specify its required alignment.
Signed-off-by: Avi Kivity
---
arch/ia64/kvm/vmm.c |2 +-
arch/powerpc/kvm/44x.c|2 +-
arch/powerpc/kvm/book3s.c |3 ++-
arch/powerpc
When EPT is enabled, we cannot emulate EFER.NX=0 through the shadow page
tables. This causes accesses through ptes with bit 63 set to succeed instead
of failing a reserved bit check.
Signed-off-by: Avi Kivity
---
arch/x86/kvm/vmx.c | 11 +++
1 files changed, 11 insertions(+), 0 deleti
Signed-off-by: Avi Kivity
---
arch/x86/include/asm/vmx.h |8 +++-
1 files changed, 7 insertions(+), 1 deletions(-)
diff --git a/arch/x86/include/asm/vmx.h b/arch/x86/include/asm/vmx.h
index fb9a080..4497318 100644
--- a/arch/x86/include/asm/vmx.h
+++ b/arch/x86/include/asm/vmx.h
@@ -25,6
Signed-off-by: Avi Kivity
---
arch/x86/include/asm/vmx.h |4
1 files changed, 4 insertions(+), 0 deletions(-)
diff --git a/arch/x86/include/asm/vmx.h b/arch/x86/include/asm/vmx.h
index 4497318..9e6779f 100644
--- a/arch/x86/include/asm/vmx.h
+++ b/arch/x86/include/asm/vmx.h
@@ -122,6 +1
Some guest msr values cannot be used on the host (for example. EFER.NX=0),
so we need to switch them atomically during guest entry or exit.
Add a facility to program the vmx msr autoload registers accordingly.
Signed-off-by: Avi Kivity
---
arch/x86/kvm/vmx.c | 49 +
On 04/26/2010 01:04 PM, Jason Wang wrote:
> This patch tries to get the content of guest serial and log it into
> the debug directoy of the testcase through a dedicated thread which is
> created in the preprocessing and ended in the postprocessing. The
> params of serial_mode must be set to "dump"
On 04/28/2010 12:33 PM, Gleb Natapov wrote:
On Wed, Apr 28, 2010 at 11:59:54AM +0300, Avi Kivity wrote:
On 04/27/2010 03:15 PM, Gleb Natapov wrote:
Use callbacks from x86_emulate_ops to access segments instead of calling
into kvm directly.
-static unsigned long seg_base(struct x86_
On 04/26/2010 01:04 PM, Jason Wang wrote:
> As we have the ability to dump the content from serial console or use
> a session through it, we need to redirect the console to serial
> through unattended files to make use of it.
>
> Signed-off-by: Jason Wang
> ---
> client/tests/kvm/unattended/Fedo
On 04/28/2010 02:57 PM, Lai Jiangshan wrote:
I think users will enable tdp when their hardwares support ept or npt.
This patch can reduce about 50% kvm mmu memory usage for they.
Good one!
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: se
On 04/26/2010 01:04 PM, Jason Wang wrote:
> This patch introduces a new method which is used to log into the guest
> through the guest serial console. The serial_mode must be set to
> "session" in order to make use of this patch.
In what cases would we want to use this feature? The serial console
On 04/26/2010 01:04 PM, Jason Wang wrote:
> If the screendump and scrialdump threads are created after the
> process(), we may lose the progress tracking of guest shutting
> down. So this patch creates them before calling process() in preprocess.
>
> Signed-off-by: Jason Wang
> ---
> client/test
I think users will enable tdp when their hardwares support ept or npt.
This patch can reduce about 50% kvm mmu memory usage for they.
This simple patch use the fact that:
When sp->role.direct is set, sp->gfns does not contain any essential
information, leaf sptes reachable from this sp are for a
On 04/28/2010 02:03 PM, Joerg Roedel wrote:
On Tue, Apr 27, 2010 at 03:34:10PM +0300, Avi Kivity wrote:
On 04/27/2010 01:38 PM, Joerg Roedel wrote:
This patch introduces a mmu-callback to translate gpa
addresses in the walk_addr code. This is later used to
translate l2_gpa addresses i
On 04/26/2010 01:03 PM, Jason Wang wrote:
> In order to let the serial console work, we must let the
> remote_login() send the username when needed.
>
> Signed-off-by: Jason Wang
> ---
> client/tests/kvm/kvm_utils.py | 14 ++
> 1 files changed, 10 insertions(+), 4 deletions(-)
>
>
On 04/26/2010 01:03 PM, Jason Wang wrote:
> Sometimes we need to send an assist string to a session in order to
> get the prompt especially when re-connecting to an already logged
> serial session. This patch send the assist string before doing the
> pattern matching of remote_login.
Can you give
On 04/28/2010 01:52 PM, Joerg Roedel wrote:
On Tue, Apr 27, 2010 at 03:34:10PM +0300, Avi Kivity wrote:
On 04/27/2010 01:38 PM, Joerg Roedel wrote:
This patch introduces a mmu-callback to translate gpa
addresses in the walk_addr code. This is later used to
translate l2_gpa addresses i
On 04/27/2010 04:46 PM, Takuya Yoshikawa wrote:
(2010/04/27 22:18), Avi Kivity wrote:
Furthermore, the reduced allocations seem to produce good effects for
other cases too. Actually, I observed that the time for the ioctl was
more stable than the original one and the average time for dirty slot
On 04/26/2010 01:03 PM, Jason Wang wrote:
> Current matching re ^\s*[Ll]ogin:\s*$ is not suitable for the serial
> console, so change it to [Ll]ogin:.
>
> Signed-off-by: Jason Wang
> ---
> client/tests/kvm/kvm_utils.py |2 +-
> 1 files changed, 1 insertions(+), 1 deletions(-)
>
> diff --git
On Tue, Apr 27, 2010 at 03:34:10PM +0300, Avi Kivity wrote:
> On 04/27/2010 01:38 PM, Joerg Roedel wrote:
> >This patch introduces a mmu-callback to translate gpa
> >addresses in the walk_addr code. This is later used to
> >translate l2_gpa addresses into l1_gpa addresses.
> >
> >+static inline gfn
On Tue, Apr 27, 2010 at 03:34:10PM +0300, Avi Kivity wrote:
> On 04/27/2010 01:38 PM, Joerg Roedel wrote:
> >This patch introduces a mmu-callback to translate gpa
> >addresses in the walk_addr code. This is later used to
> >translate l2_gpa addresses into l1_gpa addresses.
> >
> >+static inline gfn
On Wed, Apr 28, 2010 at 12:41:51PM +0200, Jes Sorensen wrote:
> On 04/28/10 12:30, Gleb Natapov wrote:
> > On Wed, Apr 28, 2010 at 11:31:00AM +0200, Jes Sorensen wrote:
> >> On 04/22/10 03:12, Kevin O'Connor wrote:
> >> Generating the more complex tables dynamically would be preferred, but
> >> it
On 04/28/10 12:30, Gleb Natapov wrote:
> On Wed, Apr 28, 2010 at 11:31:00AM +0200, Jes Sorensen wrote:
>> On 04/22/10 03:12, Kevin O'Connor wrote:
>> Generating the more complex tables dynamically would be preferred, but
>> it requires like half an AML compiler in Seabios, so it kinda stalled
>> th
On 04/28/2010 06:54 AM, Xiao Guangrong wrote:
Changlog v3:
Reviewed-by: Avi Kivity
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at
On Wed, Apr 28, 2010 at 11:31:00AM +0200, Jes Sorensen wrote:
> On 04/22/10 03:12, Kevin O'Connor wrote:
> > As I understand it, the hotplug support was only in the kvm copy of
> > bochs bios. It also limited the number of cpus one could use (I think
> > 16).
> >
> > The current smp support in Se
On 04/28/2010 07:17 AM, Takuya Yoshikawa wrote:
(2010/04/27 22:46), Takuya Yoshikawa wrote:
(2010/04/27 22:18), Avi Kivity wrote:
Furthermore, the reduced allocations seem to produce good effects for
other cases too. Actually, I observed that the time for the ioctl was
more stable than the ori
When vhost-net is disabled on reboot, we set msix mask notifier
to NULL to disable further mask/unmask notifications.
Code currently tries to pass this NULL to notifier,
leading to a crash. The right thing to do is
to add explicit APIs to enable/disable notifications.
Now when disabling notificati
On Wed, Apr 28, 2010 at 11:59:54AM +0300, Avi Kivity wrote:
> On 04/27/2010 03:15 PM, Gleb Natapov wrote:
> >Use callbacks from x86_emulate_ops to access segments instead of calling
> >into kvm directly.
> >
> >
> >
> >-static unsigned long seg_base(struct x86_emulate_ctxt *ctxt, int seg)
> >+stati
Hi,
Can anyone shed some light on a questions I have if possible?
I know KVM uses dnsmasq for DHCP and DNS, but is it possible to not
use this and use another DHCP server to dish out IP addresses? Now if
my understanding is right, there is just a NAT created to access the
VM? How is this d
"Michael S. Tsirkin" wrote:
> When vhost-net is disabled on reboot, we set msix mask notifier
> to NULL to disable further mask/unmask notifications.
> Code currently tries to pass this NULL to notifier,
> leading to a crash. The right thing to do is
> to add explicit APIs to enable/disable notif
On 04/27/2010 03:15 PM, Gleb Natapov wrote:
Return error to x86 emulator instead of injection exception behind its back.
Signed-off-by: Gleb Natapov
---
arch/x86/include/asm/kvm_emulate.h |3 +++
arch/x86/kvm/emulate.c | 12 +++-
arch/x86/kvm/x86.c |
On 04/28/2010 05:56 AM, Huang Ying wrote:
Just want to use the side effect of copy_from_user, SIGBUS will be sent
to current process because the page touched is marked as poisoned. That
is, failure is expected, so the return value is not checked.
What if the failure doesn't happen?
Hi Marcelo, Avi,
I updated the patch as follows.
Changelog:
1. Inserted one "r = -ENOMEM;" line following Avi's advice.
2. Little change of explanation about performance improvements.
I'm now testing and cleaning up my next patch series based on this,
so please apply this if this makes sense a
On 04/22/10 03:12, Kevin O'Connor wrote:
> As I understand it, the hotplug support was only in the kvm copy of
> bochs bios. It also limited the number of cpus one could use (I think
> 16).
>
> The current smp support in SeaBIOS doesn't limit the number of cpus.
>
> So, there has been reluctance
On 04/28/2010 07:37 AM, Gerhard Wiesinger wrote:
Hello,
I saw that KVM git repository is not updated from QEMU repository very
often. Is it possible to integrate QEMU git tree into KVM git
regularly as qemu git tree is very dynamic. E.g. last commit was more
than 2 weeks ago. I think it is ne
On Wed, Apr 28, 2010 at 12:11:41PM +0300, Avi Kivity wrote:
> On 04/27/2010 03:15 PM, Gleb Natapov wrote:
> >Return error to x86 emulator instead of injection exception behind its back.
> >
> >Signed-off-by: Gleb Natapov
> >---
> > arch/x86/include/asm/kvm_emulate.h |3 +++
> > arch/x86/kvm/em
On 04/27/2010 03:15 PM, Gleb Natapov wrote:
Use callbacks from x86_emulate_ops to access segments instead of calling
into kvm directly.
-static unsigned long seg_base(struct x86_emulate_ctxt *ctxt, int seg)
+static unsigned long seg_base(struct x86_emulate_ctxt *ctxt,
+
On 04/27/2010 03:15 PM, Gleb Natapov wrote:
This initialization is no longer needed.
Signed-off-by: Gleb Natapov
---
arch/x86/kvm/x86.c |2 --
1 files changed, 0 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index ed15b20..29e2d3b 100644
--- a/arch/x8
On 04/27/2010 03:15 PM, Gleb Natapov wrote:
Make set_cr() callback return error if it fails instead of injecting #GP
behind emulator's back.
-void kvm_set_cr0(struct kvm_vcpu *vcpu, unsigned long cr0)
+static int _kvm_set_cr0(struct kvm_vcpu *vcpu, unsigned long cr0)
{
standard practic
95 matches
Mail list logo