From: Mark McLoughlin [EMAIL PROTECTED]
virtio_next_desc() is only used in virtqueue_pop(), so move them
alongside one another.
Signed-off-by: Mark McLoughlin [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
diff --git a/qemu/hw/virtio.c b/qemu/hw/virtio.c
index 8fac354..fe0a120
From: Mark McLoughlin [EMAIL PROTECTED]
Split virtqueue_push() into two logical steps - adding an element
to the used ring and notifying the other side of added elements.
This is needed because with the mergeable receive buffers scheme we
will add buffers to the used ring as we copy the packet
From: Avi Kivity [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
diff --git a/user/test/x86/emulator.c b/user/test/x86/emulator.c
index c9f7e97..3abbb3d 100644
--- a/user/test/x86/emulator.c
+++ b/user/test/x86/emulator.c
@@ -136,6 +136,7 @@ void test_pop(void *mem)
From: Avi Kivity [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c
index 2555762..70242f5 100644
--- a/arch/x86/kvm/x86_emulate.c
+++ b/arch/x86/kvm/x86_emulate.c
@@ -1063,9 +1063,9 @@ static int emulate_pop(struct
From: Avi Kivity [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c
index 70242f5..702de98 100644
--- a/arch/x86/kvm/x86_emulate.c
+++ b/arch/x86/kvm/x86_emulate.c
@@ -1389,14 +1389,11 @@ special_insn:
* Wu Fengguang ([EMAIL PROTECTED]) wrote:
On Thu, Nov 27, 2008 at 03:23:06AM +0200, Lai Jiangshan wrote:
Wu Fengguang wrote:
[updated patch to include Documentation/markers.txt changes]
Add document and comments on marker_synchronize_unregister(): it
should be called before freeing
On Thu, Nov 27, 2008 at 10:00:03AM +0200, Mathieu Desnoyers wrote:
* Wu Fengguang ([EMAIL PROTECTED]) wrote:
+
+marker_synchronize_unregister() must be called before the first occurrence
of
You should probably say
.. must be called between probe unregistration and the first
On Wednesday, November 26, 2008 8:43 PM [EMAIL PROTECTED] wrote:
Xu, Jiajun wrote:
The call trace messages in guest:
###
Kernel BUG at block/elevator.c:560
invalid opcode: [1] SMP
last sysfs file: /block/hda/removable
This suggests something happened to /dev/hda.
From ee96ecb2c86e820278f3332d32a452f31c72dc30 Mon Sep 17 00:00:00 2001
From: Xiantao Zhang [EMAIL PROTECTED]
Date: Thu, 27 Nov 2008 17:23:27 +0800
Subject: [PATCH] KVM: Qemu: Build fix for !CONFIG_GDBSTUB case.
Once CONFIG_GDBSTUB not configured, compile will generate error.
Signed-off-by:
From 1b89616f99abc8e0983ef58a1f984f31a52fe828 Mon Sep 17 00:00:00 2001
From: Xiantao Zhang [EMAIL PROTECTED]
Date: Thu, 27 Nov 2008 17:24:51 +0800
Subject: [PATCH] KVM: Qemu: push_nmi should be only used by I386 Arch.
Use TARGET_I386 to exclude other archs.
Signed-off-by: Xiantao Zhang [EMAIL
From b1fc7f3303d9e141e27bff593fb05ada59910b09 Mon Sep 17 00:00:00 2001
From: Xiantao Zhang [EMAIL PROTECTED]
Date: Thu, 27 Nov 2008 17:27:05 +0800
Subject: [PATCH] KVM: external module: Fix for printk support.
kvm-intel module added printk support in kernel, this patch
fix build failure with it.
Please drop the previous one.
Xiantao
From c86bee60542097fd2064cb4ae4e0d6a555b1e688 Mon Sep 17 00:00:00 2001
From: Xiantao Zhang [EMAIL PROTECTED]
Date: Thu, 27 Nov 2008 17:39:13 +0800
Subject: [PATCH] KVM: external module: Fix for printk support.
kvm-intel module added printk support in
On Tue, Nov 25, 2008 at 08:17:00PM +0100, Alexander Graf wrote:
The current generation of virtualization extensions only supports one VM
layer.
While we can't change that, it is pretty easy to emulate the CPU's behavior
and implement the virtualization opcodes ourselves.
This patchset does
Xu, Jiajun wrote:
On Wednesday, November 26, 2008 8:43 PM [EMAIL PROTECTED] wrote:
Xu, Jiajun wrote:
The call trace messages in guest:
###
Kernel BUG at block/elevator.c:560
invalid opcode: [1] SMP
last sysfs file: /block/hda/removable
This suggests
This is the kernel part of the guest debugging / debug register
emulation patch series.
Changes since last round:
- Reinject both soft *and* hard exceptions in vmx_complete_interrupts()
Find the patches also at git://git.kiszka.org/linux-kvm.git gdb-queue
Jan
--
Siemens AG, Corporate
When single-stepping, we have to ensure that the INT1 can make it
through even if the guest itself is uninterruptible due to MOV SS or
STI. VMENTRY will fail otherwise.
Signed-off-by: Jan Kiszka [EMAIL PROTECTED]
---
arch/x86/kvm/vmx.c | 10 --
1 files changed, 8 insertions(+), 2
Add the remaining bits to make use of debug registers also for guest
debugging, thus enabling the use of hardware breakpoints and
watchpoints.
Signed-off-by: Jan Kiszka [EMAIL PROTECTED]
---
arch/x86/kvm/svm.c |5 +
arch/x86/kvm/vmx.c |5 +
arch/x86/kvm/x86.c | 14
VMX differentiates between processor and software generated exceptions
when injecting them into the guest. Extend vmx_queue_exception
accordingly (and refactor related constants) so that we can use this
service reliably for the new guest debugging framework.
Signed-off-by: Jan Kiszka [EMAIL
This rips out the support for KVM_DEBUG_GUEST and introduces a new IOCTL
instead: KVM_SET_GUEST_DEBUG. The IOCTL payload consists of a generic
part, controlling the main switch and the single-step feature. The
arch specific part adds an x86 interface for intercepting both types of
debug exceptions
So far KVM only had basic x86 debug register support, once introduced to
realize guest debugging that way. The guest itself was not able to use
those registers.
This patch now adds (almost) full support for guest self-debugging via
hardware registers. It refactors the code, moving generic parts
Bugs item #2351676, was opened at 2008-11-26 19:59
Message generated for change (Comment added) made by technologov
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2351676group_id=180599
Please note that this message will contain a full copy of the comment
Older set_debugreg macros did not allow to pass the register number as
constant (without additional typcasting). Catch this as the latest kvm
debug changes make use of this property.
Signed-off-by: Jan Kiszka [EMAIL PROTECTED]
---
kernel/x86/external-module-compat.h | 10 ++
1 files
Zhang, Xiantao wrote:
From 1b89616f99abc8e0983ef58a1f984f31a52fe828 Mon Sep 17 00:00:00 2001
From: Xiantao Zhang [EMAIL PROTECTED]
Date: Thu, 27 Nov 2008 17:24:51 +0800
Subject: [PATCH] KVM: Qemu: push_nmi should be only used by I386 Arch.
Use TARGET_I386 to exclude other archs.
Wu Fengguang wrote:
Below is the updated patch.
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at
This patch switches both libkvm as well as the qemu pieces over to the
new guest debug interface. It comes with full support for software-based
breakpoints (via guest code modification), hardware-assisted breakpoints
and watchpoints (x86-only so far).
Breakpoint management is done inside
On Thu, 2008-11-27 at 14:45 +0200, Avi Kivity wrote:
Mark McLoughlin wrote:
Hi,
The mergeable receive buffers scheme has been in the Linux
virtio_net driver in net-next-2.6 for a while now, so it's probably
safe to assume what's there now is the final iteration of the ABI.
Zhang, Xiantao wrote:
From ee96ecb2c86e820278f3332d32a452f31c72dc30 Mon Sep 17 00:00:00 2001
From: Xiantao Zhang [EMAIL PROTECTED]
Date: Thu, 27 Nov 2008 17:23:27 +0800
Subject: [PATCH] KVM: Qemu: Build fix for !CONFIG_GDBSTUB case.
Once CONFIG_GDBSTUB not configured, compile will generate
This switches cpu_break/watchpoint_* to TAILQ wrappers, simplifying the
code and also fixing a use after release issue in
cpu_break/watchpoint_remove_all.
Signed-off-by: Jan Kiszka [EMAIL PROTECTED]
---
qemu/cpu-defs.h |9 ++--
qemu/cpu-exec.c |2 -
Mark McLoughlin wrote:
Hi,
The mergeable receive buffers scheme has been in the Linux
virtio_net driver in net-next-2.6 for a while now, so it's probably
safe to assume what's there now is the final iteration of the ABI.
The following patches implement support for the scheme in
Host debug registers are now properly saved and restored before/after
entering the guest.
Signed-off-by: Jan Kiszka [EMAIL PROTECTED]
---
kernel/x86/external-module-compat.h |2 --
kernel/x86/hack-module.awk |4
kernel/x86/preempt.c|6 --
3 files
Now that QEMU merged the core parts of my gdbstub rework, it's time to
post corresponding KVM support for review and (hopefully) inclusion. The
user space series still comes with two QEMU patches, but those are
already merged upstream, KVM just need to merge latest SVN head.
Changes since last
This patchset supports VT-d multiple device assignment for KVM.
Main changes from V1 to V2:
Fixed all comments from Avi and Fenghua.
Main changes on patch 1:
- implement independent low level functions for kvm, then won't impact native
VT-d.
- add reference count of iommu which used by domain
-
This patch changes to use new APIs for KVM VT-d, and add device deassignment
for hotplug.
Signed-off-by: Weidong Han [EMAIL PROTECTED]
---
include/linux/kvm.h |5 ++
include/linux/kvm_host.h | 23 --
virt/kvm/kvm_main.c | 49 -
virt/kvm/vtd.c
Add TAILQ iterator that allows to safely remove elements while walking
the list.
Signed-off-by: Jan Kiszka [EMAIL PROTECTED]
---
qemu/sys-queue.h |5 +
1 files changed, 5 insertions(+), 0 deletions(-)
diff --git a/qemu/sys-queue.h b/qemu/sys-queue.h
index 3d0773e..ad5c8fb 100644
---
Am Dienstag, 25. November 2008 schrieb Avi Kivity:
I agree with your analysis, and also that the anon_inodes change is
useful. If it's acceptable to the vfs/anon_inode maintainers, I'll
apply the patch.
I think it is a good idea to strip the fs specific changes into a separate
patch for
Excerpts from Avi Kivity's message of Qua Nov 26 14:00:42 -0200 2008:
Jan Kiszka wrote:
Avi Kivity wrote:
snip
If the user specified $kerneldir, it should be in the form
/lib/modules/$version/build, no?
This is not sufficiently generic. KVM should to accept arbitrary paths
to
On Thu, Nov 27, 2008 at 09:49:13PM +0800, Han, Weidong wrote:
This patch changes to use new APIs for KVM VT-d, and add device deassignment
for hotplug.
Somehow we always step on each others feed :-)
I just wrote a patch series to factor the VT-d API into a generic one
which I can plug into for
Signed-off-by: Joerg Roedel [EMAIL PROTECTED]
---
drivers/pci/intel-iommu.c | 24
1 files changed, 24 insertions(+), 0 deletions(-)
diff --git a/drivers/pci/intel-iommu.c b/drivers/pci/intel-iommu.c
index 5c8baa4..b958b6f 100644
--- a/drivers/pci/intel-iommu.c
+++
Signed-off-by: Joerg Roedel [EMAIL PROTECTED]
---
drivers/pci/intel-iommu.c | 32
1 files changed, 32 insertions(+), 0 deletions(-)
diff --git a/drivers/pci/intel-iommu.c b/drivers/pci/intel-iommu.c
index b958b6f..a90c832 100644
--- a/drivers/pci/intel-iommu.c
Impace: file renamed
The code in the vtd.c file can be reused for other IOMMUs as well. So
rename it to make it clear that it handle more than VT-d.
Signed-off-by: Joerg Roedel [EMAIL PROTECTED]
---
arch/ia64/kvm/Makefile |2 +-
arch/x86/kvm/Makefile |2 +-
virt/kvm/iommu.c |
This patch introduces the API to abstract the exported VT-d functions
for KVM into a generic API. This way the AMD IOMMU implementation can
plug into this API later.
Signed-off-by: Joerg Roedel [EMAIL PROTECTED]
---
include/linux/iommu.h | 100 +
Signed-off-by: Joerg Roedel [EMAIL PROTECTED]
---
drivers/pci/intel-iommu.c | 13 +
1 files changed, 13 insertions(+), 0 deletions(-)
diff --git a/drivers/pci/intel-iommu.c b/drivers/pci/intel-iommu.c
index 8fa0269..71b4d2f 100644
--- a/drivers/pci/intel-iommu.c
+++
These two IOMMUs can implement the current version of this API. So
select the API if one or both of these IOMMU drivers is selected.
Signed-off-by: Joerg Roedel [EMAIL PROTECTED]
---
arch/ia64/Kconfig |3 +++
arch/x86/Kconfig |3 +++
drivers/base/Makefile |1 +
3 files
Hi,
this patch series makes the current KVM device passthrough code generic
enough so that other IOMMU implementation can also plug into this code.
It works by factoring the functions Vt-d code exports to KVM into a
generic interface which allows different backends.
This a basic implementation
Signed-off-by: Joerg Roedel [EMAIL PROTECTED]
---
drivers/base/iommu.c | 94 ++
1 files changed, 94 insertions(+), 0 deletions(-)
create mode 100644 drivers/base/iommu.c
diff --git a/drivers/base/iommu.c b/drivers/base/iommu.c
new file mode
Signed-off-by: Joerg Roedel [EMAIL PROTECTED]
---
drivers/pci/intel-iommu.c | 22 ++
1 files changed, 22 insertions(+), 0 deletions(-)
diff --git a/drivers/pci/intel-iommu.c b/drivers/pci/intel-iommu.c
index a90c832..8fa0269 100644
--- a/drivers/pci/intel-iommu.c
+++
On Thu, Nov 27, 2008 at 04:40:45PM +0100, Joerg Roedel wrote:
Hi,
this patch series makes the current KVM device passthrough code generic
enough so that other IOMMU implementation can also plug into this code.
It works by factoring the functions Vt-d code exports to KVM into a
generic
Bugs item #2353811, was opened at 2008-11-27 16:44
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2353811group_id=180599
Please note that this message will contain a full copy of
Joerg Roedel wrote:
Impace: file renamed
impact?
The code in the vtd.c file can be reused for other IOMMUs as well. So
rename it to make it clear that it handle more than VT-d.
Signed-off-by: Joerg Roedel [EMAIL PROTECTED]
---
arch/ia64/kvm/Makefile |2 +-
arch/x86/kvm/Makefile |
Hi all,
somebodu has tested kvm-79 under rhel5.2?? Any bugs or errors?? I will try to
install two windows 2003 r2 guests and two rhel5.2 on this server ...
Thanks.
--
CL Martinez
carlopmart {at} gmail {d0t} com
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of
On Thu, Nov 27, 2008 at 06:32:56PM +0200, Avi Kivity wrote:
Joerg Roedel wrote:
Impace: file renamed
impact?
Yeah, patches for x86 should have such a line in the description. I just
added it here too because of the many x86-patches I did in the last
time. Depending on the way this will
* Wu Fengguang ([EMAIL PROTECTED]) wrote:
On Thu, Nov 27, 2008 at 10:00:03AM +0200, Mathieu Desnoyers wrote:
* Wu Fengguang ([EMAIL PROTECTED]) wrote:
+
+marker_synchronize_unregister() must be called before the first
occurrence of
You should probably say
.. must be
On Thu, 27 Nov 2008, Christian Borntraeger wrote:
Am Dienstag, 25. November 2008 schrieb Avi Kivity:
I agree with your analysis, and also that the anon_inodes change is
useful. If it's acceptable to the vfs/anon_inode maintainers, I'll
apply the patch.
I think it is a good idea to
+ if (fops-owner !try_module_get(fops-owner))
+ return -ENOENT;
+
error = get_unused_fd_flags(flags);
if (error 0)
return error;
What if get_unused_fd_flags() (or the following error-returing ops) fails
after a successful try_module_get()?
Right,
On Thu, 27 Nov 2008, Christian Borntraeger wrote:
+ if (fops-owner !try_module_get(fops-owner))
+ return -ENOENT;
+
error = get_unused_fd_flags(flags);
if (error 0)
return error;
What if get_unused_fd_flags() (or the following error-returing ops)
Hi,
this patch series introduces multiple NUMA nodes support within KVM guests.
This will improve the performance of guests which are bigger than one
node (number of VCPUs and/or amount of memory) and also allows better
balancing by taking better usage of each node's memory.
It also improves
The attached patch parses a list of host nodes given on the command line
and passes it on to lower levels (namely qemu-kvm.c)
Signed-off-by: Andre Przywara [EMAIL PROTECTED]
--
Andre Przywara
AMD-Operating System Research Center (OSRC), Dresden, Germany
Tel: +49 351 277-84917
to satisfy
According to the host node map given on the command line the VCPUs are
pinned to the respective node (allowing at least scheduling between the
cores belonging to this node). The mmap'ed guest memory will be bound to
the correct host nodes (this will of course not take effect until the
memory
According to the number of nodes passed in the CMOS RAM (offset 0x3e)
the BIOS code generates a SRAT (System Resources Affinity Table) to
describe which (V)CPU and which part of memory is assigned to a certain
node. This will then be read and hopefully honored by the guest OS.
Signed-off-by:
Jan Kiszka wrote:
Zhang, Xiantao wrote:
From ee96ecb2c86e820278f3332d32a452f31c72dc30 Mon Sep 17 00:00:00
2001 From: Xiantao Zhang [EMAIL PROTECTED]
Date: Thu, 27 Nov 2008 17:23:27 +0800
Subject: [PATCH] KVM: Qemu: Build fix for !CONFIG_GDBSTUB case.
Once CONFIG_GDBSTUB not configured,
Joerg Roedel wrote:
On Thu, Nov 27, 2008 at 09:49:13PM +0800, Han, Weidong wrote:
This patch changes to use new APIs for KVM VT-d, and add device
deassignment for hotplug.
Somehow we always step on each others feed :-)
I just wrote a patch series to factor the VT-d API into a generic one
Jan Kiszka wrote:
Zhang, Xiantao wrote:
From 1b89616f99abc8e0983ef58a1f984f31a52fe828 Mon Sep 17 00:00:00
2001 From: Xiantao Zhang [EMAIL PROTECTED]
Date: Thu, 27 Nov 2008 17:24:51 +0800
Subject: [PATCH] KVM: Qemu: push_nmi should be only used by I386
Arch.
Use TARGET_I386 to exclude
Joerg Roedel wrote:
This patch introduces the API to abstract the exported VT-d functions
for KVM into a generic API. This way the AMD IOMMU implementation can
plug into this API later.
Signed-off-by: Joerg Roedel [EMAIL PROTECTED]
---
include/linux/iommu.h | 100
Joerg Roedel wrote:
Signed-off-by: Joerg Roedel [EMAIL PROTECTED]
---
drivers/base/iommu.c | 94
++ 1 files changed,
94 insertions(+), 0 deletions(-) create mode 100644
drivers/base/iommu.c
diff --git a/drivers/base/iommu.c
Bugs item #2327497, was opened at 2008-11-22 07:53
Message generated for change (Comment added) made by jiajun
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2327497group_id=180599
Please note that this message will contain a full copy of the comment
Hi,
Yes I have tested kvm-79 on RHEL 5.2 i386 host (with kernel
2.6.18-92.1.18.el5PAE) and Yes it is working properly
(only tested with Linux guests).
In order to build a bridged network configuration for VMs and
host, I just had to build the *tunctl* command (got sources from
UML project
66 matches
Mail list logo