From: Avi Kivity a...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/Documentation/kvm/api.txt b/Documentation/kvm/api.txt
index 9d6e647..2cc0120 100644
--- a/Documentation/kvm/api.txt
+++ b/Documentation/kvm/api.txt
@@ -795,6 +795,24 @@ It is recommended to use this API
From: Alexander Graf ag...@suse.de
Book3S knows how to convert floats to doubles and vice versa. BookE doesn't.
So let's make sure we don't export them on BookE.
This fixes a link error on BookE with CONFIG_KVM=y.
Signed-off-by: Alexander Graf ag...@suse.de
Signed-off-by: Avi Kivity
From: Avi Kivity a...@redhat.com
Acked-by: Pekka Enberg penb...@cs.helsinki.fi
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/Documentation/kvm/api.txt b/Documentation/kvm/api.txt
index d170cb4..9d6e647 100644
--- a/Documentation/kvm/api.txt
+++ b/Documentation/kvm/api.txt
@@ -749,6
From: Alexander Graf ag...@suse.de
When trying to read or store vcpu register data, we should also make
sure the vcpu is actually loaded, so we're 100% sure we get the correct
values.
Signed-off-by: Alexander Graf ag...@suse.de
Signed-off-by: Avi Kivity a...@redhat.com
diff --git
From: Alexander Graf ag...@suse.de
Mac OS X has some applications - namely the Finder - that require alignment
interrupts to work properly. So we need to implement them.
But the spec for 970 and 750 also looks different. While 750 requires the
DSISR and DAR fields to reflect some instruction
From: Avi Kivity a...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
--
To unsubscribe from this list: send the line unsubscribe kvm-commits in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
From: Alexander Graf ag...@suse.de
On PowerPC we can go into MMU Split Mode. That means that either
data relocation is on but instruction relocation is off or vice
versa.
That mode didn't work properly, as we weren't always flushing
entries when going into a new split mode, potentially mapping
From: Alexander Graf ag...@suse.de
BookE KVM doesn't know about QPRs, so let's not try to access then.
This fixes a build error on BookE KVM.
Signed-off-by: Alexander Graf ag...@suse.de
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/powerpc/kvm/powerpc.c
From: Alexander Graf ag...@suse.de
BATs can't only be written to, you can also read them out!
So let's implement emulation for reading BAT values again.
While at it, I also made BAT setting flush the segment cache,
so we're absolutely sure there's no MMU state left when writing
BATs.
From: Sridhar Samudrala s...@us.ibm.com
This patch increases the current hardcoded limit of NR_IOBUS_DEVS
from 6 to 200. We are hitting this limit when creating a guest with more
than 1 virtio-net device using vhost-net backend. Each virtio-net
device requires 2 such devices to service
From: Alexander Graf ag...@suse.de
Mac OS X uses the dcba instruction. According to the specification it doesn't
guarantee any functionality, so let's just emulate it as nop.
Signed-off-by: Alexander Graf ag...@suse.de
Signed-off-by: Avi Kivity a...@redhat.com
diff --git
From: Alexander Graf ag...@suse.de
Cell can't handle MSR_FE0 and MSR_FE1 too well. It gets dog slow.
So let's just override the guest whenever we see one of the two and mask them
out. See commit ddf5f75a16b3e7460ffee881795aa168dffcd0cf for reference.
Signed-off-by: Alexander Graf ag...@suse.de
From: Andre Przywara andre.przyw...@amd.com
There is a quirk for AMD K8 CPUs in many Linux kernels (see
arch/x86/kernel/cpu/mcheck/mce.c:__mcheck_cpu_apply_quirks()) that
clears bit 10 in that MCE related MSR. KVM can only cope with all
zeros or all ones, so it will inject a #GP into the guest,
From: Avi Kivity a...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/Documentation/kvm/api.txt b/Documentation/kvm/api.txt
index 6f36235..baa8fde 100644
--- a/Documentation/kvm/api.txt
+++ b/Documentation/kvm/api.txt
@@ -974,7 +974,9 @@ pending operations.
From: Alexander Graf ag...@suse.de
We get MMIOs with the weirdest instructions. But every time we do,
we need to improve our emulator to implement them.
So let's do that - this time it's lbzux and lhax's round.
Signed-off-by: Alexander Graf ag...@suse.de
Signed-off-by: Avi Kivity
From: Alexander Graf ag...@suse.de
Userspace can tell us that it wants to trigger an interrupt. But
so far it can't tell us that it wants to stop triggering one.
So let's interpret the parameter to the ioctl that we have anyways
to tell us if we want to raise or lower the interrupt line.
From: Alexander Graf ag...@suse.de
This patch makes the VSID of mapped pages always reflecting all special cases
we have, like split mode.
It also changes the tlbie mask to 0x0000 according to the spec. The mask
we used before was incorrect.
Signed-off-by: Alexander Graf ag...@suse.de
This patch does:
- 'sp' parameter in inspect_spte_fn() is not used, so remove it
- fix 'kvm' and 'slots' is not defined in count_rmaps()
- fix a bug in inspect_spte_has_rmap()
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
---
arch/x86/kvm/mmu.c | 15 ---
1 files
The read only spte mapping can't hurt shadow page cache,
so, no need to record it.
Using bit9 to record whether the spte is re-mapped
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
---
arch/x86/kvm/mmu.c | 17 +++--
arch/x86/kvm/mmu.h |1 +
2 files changed, 16
On 01.04.2010, at 10:51, Avi Kivity wrote:
On 03/24/2010 10:48 PM, Alexander Graf wrote:
Some times we don't want all capabilities to be available to all
our vcpus. One example for that is the OSI interface, implemented
in the next patch.
In order to have a generic mechanism in how to
Avi Kivity wrote:
We've considered this in the past, it makes sense. The big question is
whether any guests actually map the same page table through PDEs with
different permissions (mapping the same page table through multiple PDEs
is very common, but always with the same
The vhost-net backend now only supports synchronous send/recv
operations. The patch provides multiple submits and asynchronous
notifications. This is needed for zero-copy case.
Signed-off-by: Xin Xiaohui xiaohui@intel.com
---
Michael,
Now, I made vhost to alloc/destroy the kiocb, and
Add a device to utilize the vhost-net backend driver for
copy-less data transfer between guest FE and host NIC.
It pins the guest user space to the host memory and
provides proto_ops as sendmsg/recvmsg to vhost-net.
Signed-off-by: Xin Xiaohui xiaohui@intel.com
Signed-off-by: Zhao Yu
On 04/01/2010 12:06 PM, Alexander Graf wrote:
On 01.04.2010, at 10:51, Avi Kivity wrote:
On 03/24/2010 10:48 PM, Alexander Graf wrote:
Some times we don't want all capabilities to be available to all
our vcpus. One example for that is the OSI interface, implemented
in the next
On 03/24/2010 10:48 PM, Alexander Graf wrote:
Some times we don't want all capabilities to be available to all
our vcpus. One example for that is the OSI interface, implemented
in the next patch.
In order to have a generic mechanism in how to enable capabilities
individually, this patch
On 03/31/2010 12:12 PM, Michael S. Tsirkin wrote:
$ echo 4 /sys/.../msix/allocate
$ # subdirectories 0 1 2 3 magically appear
$ # bind fd 13 to msix
There's no way to know, when qemu starts, how many vectors will be used
by driver. So I think we can just go ahead and
On Thu, Apr 01, 2010 at 05:27:18PM +0800, Xin Xiaohui wrote:
Add a device to utilize the vhost-net backend driver for
copy-less data transfer between guest FE and host NIC.
It pins the guest user space to the host memory and
provides proto_ops as sendmsg/recvmsg to vhost-net.
Signed-off-by:
On 04/01/2010 01:59 PM, Michael S. Tsirkin wrote:
On Thu, Apr 01, 2010 at 11:58:29AM +0300, Avi Kivity wrote:
On 03/31/2010 12:12 PM, Michael S. Tsirkin wrote:
$ echo 4 /sys/.../msix/allocate
$ # subdirectories 0 1 2 3 magically appear
$ # bind fd 13 to msix
Wenhao Xu xuwenhao2...@gmail.com wrote:
Hi, Juan,
I am fresh to both QEMU and KVM. But so far, I notice that QEMU
uses KVM_SET_USER_MEMORY_REGION to set memory region that KVM can
use and uses cpu_register_physical_memory_offset to register the same
memory to QEMU emulator, which
On 03/31/2010 02:48 AM, Sridhar Samudrala wrote:
This patch increases the current hardcoded limit of NR_IOBUS_DEVS
from 6 to 200. We are hitting this limit when creating a guest with more
than 1 virtio-net device using vhost-net backend. Each virtio-net
device requires 2 such devices to service
On Wed, Mar 31, 2010 at 05:08:38PM -0700, Tom Lyon wrote:
uio_pci_generic has previously been discussed on the KVM list, but this patch
has nothing to do with KVM, so it is also going to LKML.
But since you send it to the KVM list it should be suitable for KVM too,
no?
The point of this
I get this on a 32-bit build test:
arch/powerpc/kvm/powerpc.c: In function 'kvmppc_complete_mmio_load':
arch/powerpc/kvm/powerpc.c:338: error: 'struct kvm_vcpu_arch' has no
member named 'qpr'
arch/powerpc/kvm/powerpc.c:342: error: 'struct kvm_vcpu_arch' has no
member named 'qpr'
This is on
BookE KVM doesn't know about QPRs, so let's not try to access then.
This fixes a build error on BookE KVM.
Signed-off-by: Alexander Graf ag...@suse.de
---
arch/powerpc/kvm/powerpc.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/arch/powerpc/kvm/powerpc.c
Book3S knows how to convert floats to doubles and vice versa. BookE doesn't.
So let's make sure we don't export them on BookE.
This fixes a link error on BookE with CONFIG_KVM=y.
Signed-off-by: Alexander Graf ag...@suse.de
---
arch/powerpc/kernel/ppc_ksyms.c |2 ++
1 files changed, 2
Avi Kivity wrote:
I get this on a 32-bit build test:
arch/powerpc/kvm/powerpc.c: In function 'kvmppc_complete_mmio_load':
arch/powerpc/kvm/powerpc.c:338: error: 'struct kvm_vcpu_arch' has no
member named 'qpr'
arch/powerpc/kvm/powerpc.c:342: error: 'struct kvm_vcpu_arch' has no
member named
On Thursday 01 April 2010 02:09:09 am Avi Kivity wrote:
On 04/01/2010 03:08 AM, Tom Lyon wrote:
uio_pci_generic has previously been discussed on the KVM list, but this
patch has nothing to do with KVM, so it is also going to LKML.
(needs to go to lkml even if it was for kvm)
The point of
On Thursday 01 April 2010 05:52:18 am Joerg Roedel wrote:
On Wed, Mar 31, 2010 at 05:08:38PM -0700, Tom Lyon wrote:
uio_pci_generic has previously been discussed on the KVM list, but this
patch has nothing to do with KVM, so it is also going to LKML.
But since you send it to the KVM list it
On Thursday 01 April 2010 07:25:04 am Michael S. Tsirkin wrote:
On Wed, Mar 31, 2010 at 05:08:38PM -0700, Tom Lyon wrote:
uio_pci_generic has previously been discussed on the KVM list, but this
patch has nothing to do with KVM, so it is also going to LKML.
The point of this patch is to
On Thu, Apr 01, 2010 at 08:40:34AM -0700, Tom Lyon wrote:
On Thursday 01 April 2010 05:52:18 am Joerg Roedel wrote:
The point of this patch is to beef up the uio_pci_generic driver so that
a non-privileged user process can run a user level driver for most PCIe
devices. This can only be
On Thursday 01 April 2010 08:54:14 am Avi Kivity wrote:
On 04/01/2010 06:39 PM, Tom Lyon wrote:
- support for MSI and MSI-X interrupts (the intel 82599 VFs support
only MSI-X)
How does a userspace program receive those interrupts?
Same as other UIO drivers - by read()ing an event
On 04/01/2010 06:39 PM, Tom Lyon wrote:
- support for MSI and MSI-X interrupts (the intel 82599 VFs support only
MSI-X)
How does a userspace program receive those interrupts?
Same as other UIO drivers - by read()ing an event counter.
IIRC the usual event counter is
On 04/01/2010 11:52 AM, Xiao Guangrong wrote:
The read only spte mapping can't hurt shadow page cache,
so, no need to record it.
We do need to keep track of read-only mappings, that's how swapping
works. See commit ca335c8f08d.
--
error compiling committee.c: too many arguments to
On 04/01/2010 03:08 AM, Tom Lyon wrote:
uio_pci_generic has previously been discussed on the KVM list, but this patch
has nothing to do with KVM, so it is also going to LKML.
(needs to go to lkml even if it was for kvm)
The point of this patch is to beef up the uio_pci_generic driver so
On Wed, Mar 31, 2010 at 03:04:43PM -0700, David Stevens wrote:
Michael S. Tsirkin m...@redhat.com wrote on 03/31/2010 05:02:28 AM:
attached patch seems to be whiespace damaged as well.
Does the origin pass checkpatch.pl for you?
Yes, but I probably broke it in the transfer --
On 03/30/2010 05:52 PM, Cam Macdonell wrote:
Ah, the usual ioctls are ugly, go away.
It could be done via sysfs:
$ cat /sys/.../msix/max-interrupts
256
$ echo 4 /sys/.../msix/allocate
$ # subdirectories 0 1 2 3 magically appear
$ # bind fd 13 to msix
$ echo 13
On 03/24/2010 10:48 PM, Alexander Graf wrote:
Mac-on-Linux has always lacked PPC64 host support. This is going to
change now!
This patchset contains minor patches to enable MOL, but is mostly about
bug fixes that came out of running Mac OS X. With this set and the
current svn version of MOL I
On 03/31/2010 07:56 AM, Neo Jia wrote:
hi,
I am running official kvm-88 release
That's pretty old. Suggest trying the latest kvm-kmod release (or
latest kernel.org release with its native kvm modules) and qemu-kvm-0.12.3.
with my own 32-bit .so library
dlopen'ed by qemu-kvm. So it has
On 04/01/2010 07:06 PM, Tom Lyon wrote:
On Thursday 01 April 2010 08:54:14 am Avi Kivity wrote:
On 04/01/2010 06:39 PM, Tom Lyon wrote:
- support for MSI and MSI-X interrupts (the intel 82599 VFs support
only MSI-X)
How does a userspace program receive those interrupts?
On Wed, Mar 31, 2010 at 05:08:38PM -0700, Tom Lyon wrote:
uio_pci_generic has previously been discussed on the KVM list, but this patch
has nothing to do with KVM, so it is also going to LKML.
The point of this patch is to beef up the uio_pci_generic driver so that a
non-privileged user
On 04/01/2010 04:33 PM, Alexander Graf wrote:
Avi Kivity wrote:
I get this on a 32-bit build test:
arch/powerpc/kvm/powerpc.c: In function 'kvmppc_complete_mmio_load':
arch/powerpc/kvm/powerpc.c:338: error: 'struct kvm_vcpu_arch' has no
member named 'qpr'
arch/powerpc/kvm/powerpc.c:342:
On Thu, Apr 01, 2010 at 11:58:29AM +0300, Avi Kivity wrote:
On 03/31/2010 12:12 PM, Michael S. Tsirkin wrote:
$ echo 4 /sys/.../msix/allocate
$ # subdirectories 0 1 2 3 magically appear
$ # bind fd 13 to msix
There's no way to know, when qemu starts, how many vectors will
On Thu, Apr 01, 2010 at 05:14:56PM +0800, Xin Xiaohui wrote:
The vhost-net backend now only supports synchronous send/recv
operations. The patch provides multiple submits and asynchronous
notifications. This is needed for zero-copy case.
Signed-off-by: Xin Xiaohui xiaohui@intel.com
---
On 03/31/2010 02:31 PM, Juan Quintela wrote:
Wenhao Xuxuwenhao2...@gmail.com wrote:
Hi, Juan,
I am fresh to both QEMU and KVM. But so far, I notice that QEMU
uses KVM_SET_USER_MEMORY_REGION to set memory region that KVM can
use and uses cpu_register_physical_memory_offset to register
On 04/01/2010 12:05 PM, Xiao Guangrong wrote:
We've considered this in the past, it makes sense. The big question is
whether any guests actually map the same page table through PDEs with
different permissions (mapping the same page table through multiple PDEs
is very common, but always with
On Thu, Apr 01, 2010 at 05:25:04PM +0300, Michael S. Tsirkin wrote:
On Wed, Mar 31, 2010 at 05:08:38PM -0700, Tom Lyon wrote:
uio_pci_generic has previously been discussed on the KVM list, but this
patch
has nothing to do with KVM, so it is also going to LKML.
The point of this patch
On 03/31/2010 11:26 AM, Alexander Graf wrote:
Howdy,
Apparently there was just the very first case of someone requiring my patch to
enable BAR regions 4k. To enable people to use those devices with a released
version, I'd suggest cherry-picking these commits into 0.12-stable:
commit
kvm-ow...@vger.kernel.org wrote on 04/01/2010 03:54:15 AM:
On Wed, Mar 31, 2010 at 03:04:43PM -0700, David Stevens wrote:
+ head.iov_base = (void
*)vhost_get_vq_desc(net-dev,
vq,
+ vq-iov, ARRAY_SIZE(vq-iov), out, in,
NULL,
NULL);
On Wed, Mar 31, 2010 at 05:08:38PM -0700, Tom Lyon wrote:
uio_pci_generic has previously been discussed on the KVM list, but this patch
has nothing to do with KVM, so it is also going to LKML.
Just a side note: It would be nice if you Cc:'ed the UIO maintainers (Greg
and me) on patches like
On Thursday 01 April 2010 09:07:47 am Joerg Roedel wrote:
On Thu, Apr 01, 2010 at 08:40:34AM -0700, Tom Lyon wrote:
On Thursday 01 April 2010 05:52:18 am Joerg Roedel wrote:
The point of this patch is to beef up the uio_pci_generic driver so
that a non-privileged user process can run a
On Thursday 01 April 2010 09:10:57 am Avi Kivity wrote:
On 04/01/2010 07:06 PM, Tom Lyon wrote:
On Thursday 01 April 2010 08:54:14 am Avi Kivity wrote:
On 04/01/2010 06:39 PM, Tom Lyon wrote:
- support for MSI and MSI-X interrupts (the intel 82599 VFs support
only MSI-X)
How does a
Does current qemu-kvm (qemu v0.12.3) use the irqchip, pit of KVM? I
cannot find any KVM_CREATE_IRQCHIP and KVM_CREATE_PIT in the qemu
code.
Concerning the interface between qemu and kvm, I have the following confusion:
1. How irqchip and pit of KVM collaborating with the irq and pit
emulation of
On Thu, Apr 01, 2010 at 12:18:27PM -0700, Tom Lyon wrote:
On Thursday 01 April 2010 09:07:47 am Joerg Roedel wrote:
For the KVM use-case we need to be able to specify the io virtual
address for a given process virtual address. This is not possible with
the dma-api interface. So if we want
On Thu, Apr 01, 2010 at 12:24:45PM -0700, Tom Lyon wrote:
For my purposes, collapsing all the MSI-Xs into one MSI-look-alike is fine,
because I'd be using MSI anyways if I could. The weird Intel 82599 VF only
supports MSI-X.
For KVM this is not fine. The device should look in the guest as
On Thursday 01 April 2010 08:54:14 am Avi Kivity wrote:
On 04/01/2010 06:39 PM, Tom Lyon wrote:
- support for MSI and MSI-X interrupts (the intel 82599 VFs support
only MSI-X)
How does a userspace program receive those interrupts?
Same as other UIO drivers - by read()ing an event
For the write logging, do you have a function in hand that we can
recompute the log? If that, I think I can use it to recompute the
log info when the logging is suddenly enabled.
For the outstanding requests, do you mean all the user buffers have
submitted before the logging ioctl changed?
65 matches
Mail list logo