On 08/22/2009 03:38 AM, Zachary Amsden wrote:
Make vma_kernel_pagesize a kvm compat API; this fixes the build with
new kernels synced to 2.6.31 compiling externally for older systems.
Applied, thanks.
Signed-off-by: Zachary Amsdenzams...@redhat.com
diff --git
On 08/22/2009 12:53 AM, Andre Przywara wrote:
I think this is best left to management software, which has more
information
about the migration pool.
I believe what we want is an automatic tool that will connect to a
list of machines,and determine which qemu cpu type we should use.
Doesn't
On 08/22/2009 12:59 AM, Andre Przywara wrote:
Typically users will want more specialized greatest common denomiator
cpu types; if a site has standardized on recent hardware they will
want the features of that hardware exposed.
Sure, but this was not the purpose of this patch. Currently KVM
On 08/20/2009 08:57 PM, Mark McLoughlin wrote:
- I think /dev/vhost makes more sense - we shouldn't need to add
another character device if we implement kernel backends for other
virtio devices
I'm of the opposite opinion - vhost-net and vhost-blk are related, but
they're a
On 08/21/2009 02:58 PM, Andre Przywara wrote:
To enable cross-vendor migration we use VMCB external variables to hold
the full 64bit value of the SYSENTER MSRs, which get truncated to 32bit
on AMD hardware. Since we didn't intercept these MSRs, these
variables were only used in the emulation
Signed-off-by: Mohammed Gamal m.gamal...@gmail.com
---
arch/x86/kvm/emulate.c | 107 +---
1 files changed, 101 insertions(+), 6 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index 1be5cd6..283237f 100644
---
Signed-off-by: Mohammed Gamal m.gamal...@gmail.com
---
kvm/user/test/x86/realmode.c | 74 ++
1 files changed, 74 insertions(+), 0 deletions(-)
diff --git a/kvm/user/test/x86/realmode.c b/kvm/user/test/x86/realmode.c
index 755b5d1..04c1452 100644
---
Report unhandled instructions in the syslog on emulation failure
Signed-off-by: Mohammed Gamal m.gamal...@gmail.com
---
arch/x86/kvm/emulate.c |3 ++-
1 files changed, 2 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index cc0fe39..52a4b7d 100644
On 08/21/2009 09:16 PM, Gleb Natapov wrote:
On Mon, Aug 17, 2009 at 12:35:47PM +0300, Avi Kivity wrote:
On 08/13/2009 08:19 PM, Gleb Natapov wrote:
This removes assumptions that max GSIs is smaller than number of pins.
Sharing is tracked on pin level not GSI level.
Signed-off-by:
On 08/23/2009 02:36 PM, Gleb Natapov wrote:
The problem is that at this level it is not known if GSI is MSI or not.
Current code dials with this by arbitrary assuming that GSI is MSI if it
is greater then KVM_IOAPIC_NUM_PINS, but this is not enforced when
routing table is installed and
On Sun, Aug 23, 2009 at 02:46:38PM +0300, Avi Kivity wrote:
On 08/23/2009 02:36 PM, Gleb Natapov wrote:
The problem is that at this level it is not known if GSI is MSI or not.
Current code dials with this by arbitrary assuming that GSI is MSI if it
is greater then KVM_IOAPIC_NUM_PINS, but
From: Joerg Roedel joerg.roe...@amd.com
The page walker may be used with nested paging too when accessing mmio
areas. Make it support the additional page-level too.
[ Marcelo: fix reserved bit check for 1gb pte ]
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
Signed-off-by: Marcelo Tosatti
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/mmu.c |3 +
arch/x86/kvm/mmutrace.h| 117
arch/x86/kvm/paging_tmpl.h | 11 +++-
3 files changed, 128 insertions(+), 3 deletions(-)
create mode 100644 arch/x86/kvm/mmutrace.h
From: Joerg Roedel joerg.roe...@amd.com
If userspace knows that the kernel part supports 1GB pages it can enable
the corresponding cpuid bit so that guests actually use GB pages.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
Signed-off-by: Avi Kivity a...@redhat.com
---
From: Joerg Roedel joerg.roe...@amd.com
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/include/asm/kvm_host.h |2 +-
arch/x86/kvm/mmu.c | 83 +++
arch/x86/kvm/paging_tmpl.h |6
From: Joerg Roedel joerg.roe...@amd.com
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/include/asm/kvm_host.h |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/arch/x86/include/asm/kvm_host.h
From: Joerg Roedel joerg.roe...@amd.com
This patch adds support for shadow paging to the 1gb page table code in KVM.
With this code the guest can use 1gb pages even if the host does not support
them.
[ Marcelo: fix shadow page collision on pmd level if a guest 1gb page is mapped
with
From: Gleb Natapov g...@redhat.com
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
---
arch/x86/kvm/i8254.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/i8254.c b/arch/x86/kvm/i8254.c
index 137e548..472653c
From: Gregory Haskins ghask...@novell.com
Today kvm_io_bus_regsiter_dev() returns void and will internally BUG_ON
if it fails. We want to create dynamic MMIO/PIO entries driven from
userspace later in the series, so we need to enhance the code to be more
robust with the following changes:
1)
From: Gregory Haskins ghask...@novell.com
ioeventfd is a mechanism to register PIO/MMIO regions to trigger an eventfd
signal when written to by a guest. Host userspace can register any
arbitrary IO address with a corresponding eventfd and then pass the eventfd
to a specific end-point of interest
From: Mikhail Ershov arce...@gmail.com
Commit f0a3602c20 (KVM: Move interrupt injection logic to x86.c) does not
update the cr8 intercept if the lapic is disabled, so when userspace updates
cr8, the cr8 threshold control is not updated and we are left with illegal
control fields.
Fix by
From: Gleb Natapov g...@redhat.com
Add tracepoint in msi/ioapic/pic set_irq() functions,
in IPI sending and in the point where IRQ is placed into
apic's IRR.
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/i8259.c |3 ++
From: Akinobu Mita akinobu.m...@gmail.com
Use kvm_get_gdt() and kvm_read_ldt() to reduce inline assembly code.
Cc: Avi Kivity a...@redhat.com
Cc: kvm@vger.kernel.org
Signed-off-by: Akinobu Mita akinobu.m...@gmail.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
---
arch/x86/kvm/svm.c |
From: Akinobu Mita akinobu.m...@gmail.com
Use get_desc_base() and get_desc_limit() to get the base address and
limit in desc_struct.
Cc: Avi Kivity a...@redhat.com
Cc: kvm@vger.kernel.org
Signed-off-by: Akinobu Mita akinobu.m...@gmail.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
---
From: Sheng Yang sh...@linux.intel.com
set_cr3() should already cover the TLB flushing.
Signed-off-by: Sheng Yang sh...@linux.intel.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
---
arch/x86/kvm/mmu.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git
From: Marcelo Tosatti mtosa...@redhat.com
Otherwise its possible to starve the host by programming lapic timer
with a very high frequency.
Cc: sta...@kernel.org
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/lapic.c |9 +
From: Jan Kiszka jan.kis...@siemens.com
spin_lock disables preemption, so we can simply read the current cpu.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
---
virt/kvm/kvm_main.c |3 +--
1 files changed, 1 insertions(+), 2 deletions(-)
From: Gleb Natapov g...@redhat.com
Remove kvm_cpu_has_interrupt() and kvm_arch_interrupt_allowed() from
interface between general code and arch code. kvm_arch_vcpu_runnable()
checks for interrupts instead.
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
From: Sheng Yang sh...@linux.intel.com
Now KVM allow guest to modify guest's physical address of EPT's identity
mapping page.
(change from v1, discard unnecessary check, change ioctl to accept parameter
address rather than value)
Signed-off-by: Sheng Yang sh...@linux.intel.com
Signed-off-by:
From: Marcelo Tosatti mtosa...@redhat.com
n_requested_mmu_pages/n_free_mmu_pages are used by
kvm_mmu_change_mmu_pages to calculate the number of pages to zap.
alloc_mmu_pages, called from the vcpu initialization path, modifies this
variables without proper locking, which can result in a negative
From: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
Remove debugfs file if kvm_arch_init() return error
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
Signed-off-by: Avi Kivity a...@redhat.com
---
virt/kvm/kvm_main.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff
From: Gleb Natapov g...@redhat.com
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/x86.c | 21 +
1 files changed, 9 insertions(+), 12 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index
From: Jan Kiszka jan.kis...@web.de
Choose some allowed error values for the cases VMX returned ENOTSUPP so
far as these values could be returned by the KVM_RUN IOCTL.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
---
arch/x86/kvm/vmx.c |
From: Gleb Natapov g...@redhat.com
It is implemented only by x86.
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/include/asm/kvm_host.h |1 +
include/linux/kvm_host.h|1 -
2 files changed, 1 insertions(+), 1 deletions(-)
diff
On 08/23/2009 02:56 PM, Gleb Natapov wrote:
Does msi actually care about the states? I don't think it does.
That is the point. MSI doesn't care, but we don't know if GSI is MSI or
not.
So we toggle the bits needlessly. Just like with edge-triggered interrupts.
If we
From: Gleb Natapov g...@redhat.com
Cosmetic only. No logic is changed by this patch.
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
virt/kvm/ioapic.c | 18 ++
1 files changed, 10 insertions(+), 8 deletions(-)
diff --git
Document the basic API corresponding to the 2.6.22 release.
Signed-off-by: Avi Kivity a...@redhat.com
---
Documentation/kvm/api.txt | 683 +
1 files changed, 683 insertions(+), 0 deletions(-)
create mode 100644 Documentation/kvm/api.txt
diff --git
From: Beth Kon e...@us.ibm.com
When kvm is in hpet_legacy_mode, the hpet is providing the timer
interrupt and the pit should not be. So in legacy mode, the pit timer
is destroyed, but the *state* of the pit is maintained. So if kvm or
the guest tries to modify the state of the pit, this
From: Gleb Natapov g...@redhat.com
They are not used by common code without defines which s390 does not
have.
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
---
arch/s390/include/asm/kvm.h |9 -
1 files changed, 0 insertions(+), 9
From: Gleb Natapov g...@redhat.com
Some Linux versions (f8) try to read EOI register that is write only.
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
---
arch/x86/kvm/lapic.c |8
1 files changed, 4 insertions(+), 4 deletions(-)
From: Gleb Natapov g...@redhat.com
We emulate x2apic in software, so host support is not required.
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/x86.c |3 +++
1 files changed, 3 insertions(+), 0 deletions(-)
diff --git
From: Andre Przywara andre.przyw...@amd.com
Signed-off-by: Andre Przywara andre.przyw...@amd.com
Signed-off-by: Avi Kivity a...@redhat.com
---
Documentation/kernel-parameters.txt | 39 +++
1 files changed, 39 insertions(+), 0 deletions(-)
diff --git
Create, sync, unsync, zap.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/mmu.c | 10 +++--
arch/x86/kvm/mmutrace.h | 103 +++
2 files changed, 109 insertions(+), 4 deletions(-)
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
From: Gleb Natapov g...@redhat.com
Directed EOI is specified by x2APIC, but is available even when lapic is
in xAPIC mode.
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/include/asm/apicdef.h |2 ++
arch/x86/kvm/lapic.c | 38
From: Gleb Natapov g...@redhat.com
This patch implements MSR interface to local apic as defines by x2apic
Intel specification.
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/lapic.c | 217 -
From: Andre Przywara andre.przyw...@amd.com
Some Windows versions check whether the BIOS has setup MMI/O for
config space accesses on AMD Fam10h CPUs, we say no by returning 0 on
reads and only allow disabling of MMI/O CfgSpace setup by igoring 0 writes.
Signed-off-by: Andre Przywara
From: Michael S. Tsirkin m...@redhat.com
Irqfd sets level for interrupt to 1 and then to 0.
For MSI, check level so that a single message is sent.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
virt/kvm/irq_comm.c |4 +++-
1 files changed, 3
From: Joerg Roedel joerg.roe...@amd.com
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/mmu.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index ac121b3..f1f0815
From: Gleb Natapov g...@redhat.com
This will save a couple of IPIs.
Signed-off-by: Gleb Natapov g...@redhat.com
Acked-by: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/x86.c |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git
From: Andre Przywara andre.przyw...@amd.com
Linux guests will try to enable access to the extended PCI config space
via the I/O ports 0xCF8/0xCFC on AMD Fam10h CPU. Since we (currently?)
don't use ECS, simply ignore write and read attempts.
Signed-off-by: Andre Przywara andre.przyw...@amd.com
From: Jan Kiszka jan.kis...@web.de
This reverts commit 6c20e1442bb1c62914bb85b7f4a38973d2a423ba.
To my understanding, it became obsolete with the advent of the more
robust check in mmu_alloc_roots (89da4ff17f). Moreover, it prevents
the conceptually safe pattern
1. set sregs
2. register
From: Andre Przywara andre.przyw...@amd.com
Windows 7 tries to update the CPU's microcode on some processors,
so we ignore the MSR write here. The patchlevel register is already handled
(returning 0), because the MSR number is the same as Intel's.
Signed-off-by: Andre Przywara
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/x86.c | 11 ++-
include/trace/events/kvm.h | 33 +
2 files changed, 43 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index af40e23..d32e3c6 100644
Signed-off-by: Avi Kivity a...@redhat.com
---
include/trace/events/kvm.h | 11 ---
virt/kvm/irq_comm.c|2 +-
2 files changed, 9 insertions(+), 4 deletions(-)
diff --git a/include/trace/events/kvm.h b/include/trace/events/kvm.h
index d74b23d..035232d 100644
---
Third batch of the KVM patch queue.
Akinobu Mita (2):
KVM: x86: use get_desc_base() and get_desc_limit()
KVM: x86: use kvm_get_gdt() and kvm_read_ldt()
Andre Przywara (4):
KVM: Ignore PCI ECS I/O enablement
KVM: handle AMD microcode MSR
KVM: fix MMIO_CONF_BASE MSR access
KVM: add
From: Sheng Yang sh...@linux.intel.com
Some in-famous OS do unaligned writing for APIC MMIO, and the return value
has been missed in recent change, then the OS hangs.
Signed-off-by: Sheng Yang sh...@linux.intel.com
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/lapic.c |2 +-
1
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/trace.h | 14 --
1 files changed, 12 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/trace.h b/arch/x86/kvm/trace.h
index cd8c90d..6c2c87f 100644
--- a/arch/x86/kvm/trace.h
+++ b/arch/x86/kvm/trace.h
@@ -111,6
Avi Kivity wrote:
On 08/22/2009 12:59 AM, Andre Przywara wrote:
Typically users will want more specialized greatest common denomiator
cpu types; if a site has standardized on recent hardware they will
want the features of that hardware exposed.
Sure, but this was not the purpose of this
On 08/20/2009 09:28 PM, Michael S. Tsirkin wrote:
I thought the point was to move assigned devices out of KVM?
Grr. Forgot about that.
That's much more important.
Looks like we'll have do with a separate char device or
something?
We can still tunnel it through userspace.
On (Fri) Aug 21 2009 [23:53:41], Andre Przywara wrote:
Glauber Costa wrote:
On Fri, Aug 21, 2009 at 12:41 PM, Avi Kivitya...@redhat.com wrote:
On 08/21/2009 12:34 AM, Andre Przywara wrote:
In addition to the TCG based qemu64 type let's introduce a kvm64 CPU type,
which is the least common
On Sun, Aug 23, 2009 at 04:01:29PM +0300, Avi Kivity wrote:
On 08/20/2009 09:28 PM, Michael S. Tsirkin wrote:
I thought the point was to move assigned devices out of KVM?
Grr. Forgot about that.
That's much more important.
Looks like we'll have do with a separate char
On 08/23/2009 04:36 PM, Michael S. Tsirkin wrote:
More important here is realization that eventfd is a mutex/semaphore
implementation, not a generic event reporting interface as we are trying
to use it.
Well it is a generic event reporting interface (for example, aio uses it).
--
error
On Sun, Aug 23, 2009 at 04:40:51PM +0300, Avi Kivity wrote:
On 08/23/2009 04:36 PM, Michael S. Tsirkin wrote:
More important here is realization that eventfd is a mutex/semaphore
implementation, not a generic event reporting interface as we are trying
to use it.
Well it is a generic
On 08/23/2009 04:30 PM, Michael S. Tsirkin wrote:
On Sun, Aug 23, 2009 at 04:40:51PM +0300, Avi Kivity wrote:
On 08/23/2009 04:36 PM, Michael S. Tsirkin wrote:
More important here is realization that eventfd is a mutex/semaphore
implementation, not a generic event reporting interface as we are
On Tue, Aug 18, 2009 at 03:11:04PM -0600, Alex Williamson wrote:
On Tue, Aug 18, 2009 at 3:04 PM, Michael S. Tsirkinm...@redhat.com wrote:
Did you assign ip address in host by any chance? You don't want that.
Nope, just up on the host, no IP:
eth10 Link encap:Ethernet HWaddr
On Fri, Aug 21, 2009 at 03:43:07PM -0400, Masami Hiramatsu wrote:
Fix x86 instruction decoder selftest to check only .text because other
sections (e.g. .notes) will have random bytes which don't need to be checked.
Applied these 4 patches in
OK, there is a small issue with networking setup here, but otherwise it
looks like we'll have to debug it in vhost ...
Forgot to ask - dmesg does not show anything interesting, does it?
On Thu, Aug 20, 2009 at 04:05:04PM -0600, Alex Williamson wrote:
On Thu, Aug 20, 2009 at 1:03 AM, Michael S.
Bugs item #2843250, was opened at 2009-08-23 21:24
Message generated for change (Comment added) made by kijiki
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2843250group_id=180599
Please note that this message will contain a full copy of the comment
Return to userspace instead of repeatedly trying to emulate
instructions that have already failed
Signed-off-by: Mohammed Gamal m.gamal...@gmail.com
---
arch/x86/kvm/vmx.c |5 -
1 files changed, 4 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index
On 08/24/2009 12:59 AM, Stephen Donnelly wrote:
On Thu, Aug 20, 2009 at 12:14 AM, Avi Kivitya...@redhat.com wrote:
On 08/13/2009 07:07 AM, Stephen Donnelly wrote:
npages = get_user_pages_fast(addr, 1, 1, page); returns -EFAULT,
presumably because (vma-vm_flags(VM_IO |
-Original Message-
From: Alexander Graf [mailto:a...@csgraf.de]
Sent: Friday, August 21, 2009 8:39 PM
To: Liu Yu-B13201
Cc: Hollis Blanchard; qemu-de...@nongnu.org;
kvm-ppc@vger.kernel.org; jan.kis...@siemens.com;
froy...@codesourcery.com
Subject: Re: [PATCH 4/5] kvmppc:
71 matches
Mail list logo