From: Jan Kiszka jan.kis...@siemens.com
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
arch/x86/kvm/svm.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index fad4038..1a5757a 100644
--- a/arch/x86/kvm/svm.c
+++
On 10/24/2010 11:13 AM, Jan Kiszka wrote:
From: Jan Kiszkajan.kis...@siemens.com
Applied, thanks. I'll go and set up a buildbot for i386.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message
SCI is level triggered. cpu/pci hotplug should behave appropriately.
Signed-off-by: Gleb Natapov g...@redhat.com
---
hw/acpi_piix4.c | 16 +++-
1 files changed, 7 insertions(+), 9 deletions(-)
diff --git a/hw/acpi_piix4.c b/hw/acpi_piix4.c
index 1db5ee3..de3bb88 100644
---
Signed-off-by: Gleb Natapov g...@redhat.com
---
hw/acpi_piix4.c |5 +++--
1 files changed, 3 insertions(+), 2 deletions(-)
diff --git a/hw/acpi_piix4.c b/hw/acpi_piix4.c
index 1c8e4e2..1db5ee3 100644
--- a/hw/acpi_piix4.c
+++ b/hw/acpi_piix4.c
@@ -39,6 +39,7 @@
#define PCI_BASE 0xae00
- Remove the VM.mac_prefix attribute
- Remove the 'root_dir' parameter from generate_mac_address() and
free_mac_address()
- Remove the 'prefix' parameter from generate_mac_address()
- Remove the explicit setting and clearing of bits in the most significant
byte (it is fixed to 0x9A anyway)
-
Use VM.get_mac_address() instead of kvm_utils.get_mac_ip_pair_from_dict().
Signed-off-by: Michael Goldish mgold...@redhat.com
---
client/tests/kvm/kvm_vm.py |6 +-
1 files changed, 1 insertions(+), 5 deletions(-)
diff --git a/client/tests/kvm/kvm_vm.py b/client/tests/kvm/kvm_vm.py
index
The vnc_port attribute is only unique among VMs that use a VNC display. Other
VMs don't bother to look for a free VNC port and don't occupy one, so vnc_port
can't be considered unique. The last 11 characters of self.instance make up a
fairly unique string which can be used instead. (The whole
This patch removes all code related to the old manual method
(address_pools.cfg).
Note that now running in TAP mode requires an external DHCP server that accepts
*any* MAC address, because MAC addresses are randomly generated and cannot be
manually configured.
Signed-off-by: Michael Goldish
- Replace MonitorSendError with MonitorSocketError.
- Embed socket.error messages in MonitorSocketError messages.
- Catch exceptions raised while receiving data (in addition to those raised
while sending data).
Signed-off-by: Michael Goldish mgold...@redhat.com
---
- Refactor migration code so that the '-incoming ...' strings are hardcoded
only in a single location (kvm_test_utils.py).
- Wrap the removal of the gzipped state file in a finally: clause.
- Get rid of the 'for_migration' and 'extra_params' parameters of VM.create()
and introduce
Is there any chance someone will decide to switch over to the American spelling?
Signed-off-by: Michael Goldish mgold...@redhat.com
---
client/tests/kvm/kvm_test_utils.py |6 --
1 files changed, 4 insertions(+), 2 deletions(-)
diff --git a/client/tests/kvm/kvm_test_utils.py
On Friday 22 October 2010 22:53:13 Marcelo Tosatti wrote:
On Wed, Oct 20, 2010 at 04:26:30PM +0800, Sheng Yang wrote:
The feature wouldn't be enabled until later patch set msix_flags_enabled.
It would be enabled along with mask support in kernel.
Signed-off-by: Sheng Yang
Add save/restore of MSR for migration and cpuid bit.
Signed-off-by: Gleb Natapov g...@redhat.com
--
v1-v2
- use vmstate subsection to migrate new msr.
v2-v3
- rebase onto uq/master
- protect use of MSR_KVM_ASYNC_PF_EN with ifdef KVM_CAP_ASYNC_PF
diff --git a/target-i386/cpu.h
On Sun, Oct 24, 2010 at 08:19:09PM +0800, Sheng Yang wrote:
You need a guarantee that MSIX per-vector mask is used for
disable_irq/enable_irq, right? I can't see how this provides it.
This one meant to directly operate the mask/unmask bit of the MSI-X table, to
emulate the mask/unmask
Linus, the repository and branch
git://git.kernel.org/pub/scm/virt/kvm/kvm.git kvm-updates/2.6.37
contains the kvm updates for the 2.6.37 merge window. Major changes
this time around include powerpc paravirtualization, a virtual tsc
rework, and exposing npt to the guest for fast nested
This allows Linux to mask cpuid bits if, for example, nx is enabled on only
some cpus.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/x86.c |9 +
1 files changed, 9 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 48ce015..54fda7e
Instead of querying cpuid directly, use the Linux accessors (boot_cpu_has,
etc.). This allows the things like the clearcpuid kernel command line to
work (when it's fixed wrt scattered cpuid bits).
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/svm.c | 15 +--
1 files
Use the host's cpuid facilities to see if features are supporte. This
allows the clearcpuid boot parameter to work, and allows Linux to disable
nx if it is not enabled on all cpus.
Avi Kivity (2):
KVM: SVM: Replace svm_has() by standard Linux cpuid accessors
KVM: Mask KVM_GET_SUPPORTED_CPUID
On 10/24/2010 12:05 AM, Marcelo Tosatti wrote:
Presumably you did a line-by-line verification that nothing is lost?
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
On 10/24/2010 01:00 PM, Gleb Natapov wrote:
register_ioport_write(GPE_BASE, 4, 1, gpe_writeb, s);
register_ioport_read(GPE_BASE, 4, 1, gpe_readb, s);
-register_ioport_write(PROC_BASE, 32, 1, gpe_writeb, gpe);
-register_ioport_read(PROC_BASE, 32, 1, gpe_readb, gpe);
+
Callback gets pointer to PIIX4PMState as parameter now instead of gpe.
Signed-off-by: Gleb Natapov g...@redhat.com
---
hw/acpi_piix4.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/hw/acpi_piix4.c b/hw/acpi_piix4.c
index 1c8e4e2..03abc61 100644
--- a/hw/acpi_piix4.c
Signed-off-by: Gleb Natapov g...@redhat.com
---
hw/acpi_piix4.c |5 +++--
1 files changed, 3 insertions(+), 2 deletions(-)
diff --git a/hw/acpi_piix4.c b/hw/acpi_piix4.c
index 03abc61..dfabc75 100644
--- a/hw/acpi_piix4.c
+++ b/hw/acpi_piix4.c
@@ -39,6 +39,7 @@
#define PCI_BASE 0xae00
SCI is level triggered. cpu/pci hotplug should behave appropriately.
Signed-off-by: Gleb Natapov g...@redhat.com
---
hw/acpi_piix4.c | 12 +---
1 files changed, 5 insertions(+), 7 deletions(-)
diff --git a/hw/acpi_piix4.c b/hw/acpi_piix4.c
index dfabc75..de3bb88 100644
---
On 10/24/2010 04:32 PM, Gleb Natapov wrote:
SCI is level triggered. cpu/pci hotplug should behave appropriately.
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
Add tracepoint for userspace exit.
Signed-off-by: Gleb Natapov g...@redhat.com
---
ChangeLog:
v1-v2
log error case too.
diff --git a/include/trace/events/kvm.h b/include/trace/events/kvm.h
index 9c2cc6a..c86f4e8 100644
--- a/include/trace/events/kvm.h
+++ b/include/trace/events/kvm.h
@@
Signed-off-by: Avi Kivity a...@redhat.com
---
hw/acpi_piix4.c | 30 ++
1 files changed, 18 insertions(+), 12 deletions(-)
diff --git a/hw/acpi_piix4.c b/hw/acpi_piix4.c
index f74f34c..5772667 100644
--- a/hw/acpi_piix4.c
+++ b/hw/acpi_piix4.c
@@ -52,6 +52,7 @@
A recent qemu - qemu-kvm merge broke cpu hotplug without the compiler
complaining because of the type-unsafeness of the ioport callbacks. This
patchset adds a type-safe variant of ioport callbacks and coverts a sample
ioport. Converting the other 300-odd registrations is left as an excercise
to
The current ioport callbacks are not type-safe, in that they accept an opaque
pointer as an argument whose type must match the argument to the registration
function; this is not checked by the compiler.
This patch adds an alternative that is type-safe. Instead of an opaque
argument, both
On 10/24/2010 05:34 PM, Avi Kivity wrote:
Currently the old and new methods exist side by side; once the old way is gone,
we can also save a bunch of memory since the new method requires one pointer
per ioport instead of 6.
Actually, 1:7, we replace 3 read callbacks, 3 write callbacks, and 1
On 10/24/2010 04:49 PM, Gleb Natapov wrote:
Add tracepoint for userspace exit.
+
+TRACE_EVENT(kvm_userspace_exit,
+ TP_PROTO(__u32 reason, int errno),
+ TP_ARGS(reason, errno),
+
+ TP_STRUCT__entry(
+ __field(__u32, reason )
+
srcu_idx is easy to misuse as it can not be used
in nested srcu_read_lock calls. Switch to local
index to make correctness easier to verify.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
Lightly tested.
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index 311f6da..edb9dfa 100644
On Sun, Oct 24, 2010 at 07:01:30PM +0200, Avi Kivity wrote:
On 10/24/2010 04:49 PM, Gleb Natapov wrote:
Add tracepoint for userspace exit.
+
+TRACE_EVENT(kvm_userspace_exit,
+TP_PROTO(__u32 reason, int errno),
+TP_ARGS(reason, errno),
+
+TP_STRUCT__entry(
+
On 10/24/2010 07:24 PM, Gleb Natapov wrote:
On Sun, Oct 24, 2010 at 07:01:30PM +0200, Avi Kivity wrote:
On 10/24/2010 04:49 PM, Gleb Natapov wrote:
Add tracepoint for userspace exit.
+
+TRACE_EVENT(kvm_userspace_exit,
+ TP_PROTO(__u32 reason, int errno),
+
On 10/24/2010 05:34 PM, Avi Kivity wrote:
A recent qemu - qemu-kvm merge broke cpu hotplug without the compiler
complaining because of the type-unsafeness of the ioport callbacks. This
patchset adds a type-safe variant of ioport callbacks and coverts a sample
ioport. Converting the other
On Sun, Oct 24, 2010 at 07:27:21PM +0200, Avi Kivity wrote:
On 10/24/2010 07:24 PM, Gleb Natapov wrote:
On Sun, Oct 24, 2010 at 07:01:30PM +0200, Avi Kivity wrote:
On 10/24/2010 04:49 PM, Gleb Natapov wrote:
Add tracepoint for userspace exit.
+
On 10/24/2010 07:35 PM, Paolo Bonzini wrote:
On 10/24/2010 05:34 PM, Avi Kivity wrote:
A recent qemu - qemu-kvm merge broke cpu hotplug without the compiler
complaining because of the type-unsafeness of the ioport callbacks.
This
patchset adds a type-safe variant of ioport callbacks and
On Sun, Oct 24, 2010 at 3:34 PM, Avi Kivity a...@redhat.com wrote:
The current ioport callbacks are not type-safe, in that they accept an
opaque
pointer as an argument whose type must match the argument to the registration
function; this is not checked by the compiler.
This patch adds an
On Sun, Oct 24, 2010 at 03:46:22PM +0200, Avi Kivity wrote:
On 10/24/2010 12:05 AM, Marcelo Tosatti wrote:
Presumably you did a line-by-line verification that nothing is lost?
Yes, missing parts were sent upstream in the last uq/master pull
request (which is already merged).
--
To
Hey Linus,
On Sun, 24 Oct 2010 15:29:12 +0200 Avi Kivity a...@redhat.com wrote:
Linus, the repository and branch
git://git.kernel.org/pub/scm/virt/kvm/kvm.git kvm-updates/2.6.37
contains the kvm updates for the 2.6.37 merge window. Major changes
this time around include powerpc
I have observed the following bug trigger:
1. userspace calls GET_DIRTY_LOG
2. kvm_mmu_slot_remove_write_access is called and makes a page ro
3. page fault happens and makes the page writeable
fault is logged in the bitmap appropriately
4. kvm_vm_ioctl_get_dirty_log swaps slot pointers
a lot
40 matches
Mail list logo