Hello. I'm have two questions:
1) Is that possible to modify some files in already running virtual
machine without login to it via ssh or something else?
2) If i create with qemu-img base qcow2 image install to it operation
system with minimal packages. After that i create use image with -o
Summary: upstream qemu commit b560a9ab broke -pcidevice and pci_add host
in two ways:
* Use without options id and name is broken when option host contains
':'. That's because id defaults to host. I recommend to fix it
incompatibly: don't default id to host. The alternative is to get
i want to get details process about kvm handler page fault.help wanted.
While we sync many unsync sp at one time(in mmu_sync_children()),
we may mapping the spte writable, it's dangerous, if one unsync
sp's mapping gfn is another unsync page's gfn.
For example:
SP1.pte[0] = P
SP2.gfn's pfn = P
[SP1.pte[0] = SP2.gfn's pfn]
First, we write protected SP1 and SP2, but
In no-direct mapping, we mark sp is 'direct' when we mapping the
guest's larger page, but its access is encoded form upper page-struct
entire not include the last mapping, it will cause access conflict.
For example, have this mapping:
[W]
/ PDE1 - |---|
P[W] | | LPA
If the mapping is writable but the dirty flag is not set, we will find
the read-only direct sp and setup the mapping, then if the write #PF
occur, we will mark this mapping writable in the read-only direct sp,
now, other real read-only mapping will happily write it without #PF.
It may hurt
After remove a rmap, we should flush all vcpu's tlb
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
---
arch/x86/kvm/mmu.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index 24290f8..a0c5c31 100644
---
Cleanup this function that we are already get the direct sp's access
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
---
arch/x86/kvm/paging_tmpl.h | 19 ---
1 files changed, 8 insertions(+), 11 deletions(-)
diff --git a/arch/x86/kvm/paging_tmpl.h
Introduce gfn_to_pfn_atomic(), it's the fast path and can used in atomic
context, the later patch will use it
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
---
arch/x86/mm/gup.c|2 ++
include/linux/kvm_host.h |1 +
virt/kvm/kvm_main.c | 32
This function not only return the gfn's hva but also the page number
after @gfn in the slot
It's used in the later patch
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
---
include/linux/kvm_host.h |1 +
virt/kvm/kvm_main.c | 13 -
2 files changed, 13
Introduce this function to topup prefetch cache
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
---
arch/x86/kvm/mmu.c | 25 +
1 files changed, 21 insertions(+), 4 deletions(-)
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index a0c5c31..6673484
Support prefetch ptes when intercept guest #PF, avoid to #PF by later
access
If we meet any failure in the prefetch path, we will exit it and
not try other ptes to avoid become heavy path
Note: this speculative will mark page become dirty but it not really
accessed, the same issue is in other
Combine guest pte read between guest pte walk and pte prefetch
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
---
arch/x86/kvm/paging_tmpl.h | 48 ++-
1 files changed, 33 insertions(+), 15 deletions(-)
diff --git a/arch/x86/kvm/paging_tmpl.h
Trace pte prefetch, it can help us to improve the prefetch's performance
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
---
arch/x86/kvm/mmu.c | 45 +--
arch/x86/kvm/mmutrace.h| 33
Your questioned is answered here:
http://www.spinics.net/lists/kvm/msg37526.html
And check this paper out:
http://ozlabs.org/~rusty/virtio-spec/virtio-paper.pdf
The general concept to remember is that QEMU and KVM just execute the
input as binary streamit does not know what functions it is
On Tue, Jun 29, 2010 at 6:25 PM, Eduard - Gabriel Munteanu
eduard.munte...@linux360.ro wrote:
On the other hand, we could just leave it alone for now. Changing
mappings during DMA is stupid anyway: I don't think the guest can
recover the results of DMA safely, even though it might be used on
On 30.06.2010, at 10:17, Peter Teoh wrote:
Your questioned is answered here:
http://www.spinics.net/lists/kvm/msg37526.html
And check this paper out:
http://ozlabs.org/~rusty/virtio-spec/virtio-paper.pdf
The general concept to remember is that QEMU and KVM just execute the
input as
jerry wu wrote:
i want to get details process about kvm handler page fault.help
wanted.N嫥叉靣笡y氊b瞂千v豝�)藓{.n�+壏ぞhФ洝塄}财爖�j:+v墾�珣赙zZ+€�+zf"穐殘啳嗃i�z�畐ア�?櫒璀��)撷fl===
Please sent mail with the correct encode, refer to:
Documentation/email-clients.txt
--
To unsubscribe from this list: send
(2010/06/30 15:53), Markus Armbruster wrote:
Summary: upstream qemu commit b560a9ab broke -pcidevice and pci_add host
in two ways:
* Use without options id and name is broken when option host contains
':'. That's because id defaults to host. I recommend to fix it
incompatibly: don't
Bugs item #3022896, was opened at 2010-06-29 18:39
Message generated for change (Comment added) made by jessorensen
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=3022896group_id=180599
Please note that this message will contain a full copy of the comment
Book3s suffered from my really bad shadow MMU implementation so far. So
I finally got around to implement a combined hash and list mechanism that
allows for much faster lookup of mapped pages.
To show that it really is faster, I tried to run simple process spawning
code inside the guest with and
We just introduced generic functions to handle shadow pages on PPC.
This patch makes the respective backends make use of them, getting
rid of a lot of duplicate code along the way.
Signed-off-by: Alexander Graf ag...@suse.de
---
v2 - v3:
- use hlist
- use global kmem cache
---
Currently the shadow paging code keeps an array of entries it knows about.
Whenever the guest invalidates an entry, we loop through that entry,
trying to invalidate matching parts.
While this is a really simple implementation, it is probably the most
ineffective one possible. So instead, let's
On Wed, Jun 30, 2010 at 12:14:12AM -0600, Alex Williamson wrote:
On Tue, 2010-06-08 at 14:21 -0700, Tom Lyon wrote:
The VFIO driver is used to allow privileged AND non-privileged processes
to
implement user-level device drivers for any well-behaved PCI, PCI-X, and
PCIe
devices.
Hi
On Wed, 2010-06-30 at 16:36 +0300, Michael S. Tsirkin wrote:
On Wed, Jun 30, 2010 at 12:14:12AM -0600, Alex Williamson wrote:
On Tue, 2010-06-08 at 14:21 -0700, Tom Lyon wrote:
The VFIO driver is used to allow privileged AND non-privileged
processes to
implement user-level device
From: Jes Sorensen jes.soren...@redhat.com
MSR_P6_EVNTSEL0 and MSR_P6_PERFCTR0 are used to probe for the P6 PMU
for older family 6 CPUs, which is also the default in QEMU. Ie. per
default we get the noise of these warnings in dmesg, confusing users
for no reason.
Signed-off-by: Jes Sorensen
On Wed, Jun 30, 2010 at 4:17 AM, Peter Teoh htmldevelo...@gmail.com wrote:
Your questioned is answered here:
http://www.spinics.net/lists/kvm/msg37526.html
And check this paper out:
http://ozlabs.org/~rusty/virtio-spec/virtio-paper.pdf
The general concept to remember is that QEMU and KVM
On Wed, Jun 30, 2010 at 10:59 AM, Balachandar bala1...@gmail.com wrote:
On Wed, Jun 30, 2010 at 4:17 AM, Peter Teoh htmldevelo...@gmail.com wrote:
Your questioned is answered here:
http://www.spinics.net/lists/kvm/msg37526.html
And check this paper out:
On 06/30/2010 03:56 AM, Alexander Graf wrote:
On 30.06.2010, at 10:17, Peter Teoh wrote:
Your questioned is answered here:
http://www.spinics.net/lists/kvm/msg37526.html
And check this paper out:
http://ozlabs.org/~rusty/virtio-spec/virtio-paper.pdf
The general concept to remember is
On 06/30/2010 10:02 AM, Balachandar wrote:
On Wed, Jun 30, 2010 at 10:59 AM, Balachandarbala1...@gmail.com wrote:
On Wed, Jun 30, 2010 at 4:17 AM, Peter Teohhtmldevelo...@gmail.com wrote:
Your questioned is answered here:
http://www.spinics.net/lists/kvm/msg37526.html
And check
By default, HPET is enabled on qemu and no time drift
mitigation is being made for it. So, add -no-hpet
if qemu supports it, during windows timedrift tests.
Signed-off-by: Lucas Meneghel Rodrigues l...@redhat.com
---
client/tests/kvm/kvm_vm.py |9 +
Thank you Alex for the reply, very glad to know you!!!
On Wed, Jun 30, 2010 at 4:56 PM, Alexander Graf ag...@suse.de wrote:
On 30.06.2010, at 10:17, Peter Teoh wrote:
Your questioned is answered here:
http://www.spinics.net/lists/kvm/msg37526.html
And check this paper out:
On 30.06.2010, at 18:28, Peter Teoh wrote:
Thank you Alex for the reply, very glad to know you!!!
On Wed, Jun 30, 2010 at 4:56 PM, Alexander Graf ag...@suse.de wrote:
On 30.06.2010, at 10:17, Peter Teoh wrote:
Your questioned is answered here:
just to clarify further.
On Wed, Jun 30, 2010 at 11:10 PM, Anthony Liguori anth...@codemonkey.ws wrote:
On 06/30/2010 03:56 AM, Alexander Graf wrote:
On 30.06.2010, at 10:17, Peter Teoh wrote:
Your questioned is answered here:
http://www.spinics.net/lists/kvm/msg37526.html
And check
On Tue, Jun 29, 2010 at 11:51:54AM -0600, Alex Williamson wrote:
Commit 96abccb5 cleared assigned_irq_data.flags when an irq is disabled,
but what we really want is to clear assigned_dev-irq_requested_type.
Signed-off-by: Alex Williamson alex.william...@redhat.com
Found-by: Juan Quintela
On Wed, Jun 30, 2010 at 12:25:16PM +0800, Sheng Yang wrote:
It would buy us the ability to schedule compared to smp_call_function().
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
But I am not sure if it worth the complexity. Anyway WBINVD itself can't be
interrupted, so the benefit
On Wed, Jun 30, 2010 at 12:25:15PM +0800, Sheng Yang wrote:
Some guest device driver may leverage the Non-Snoop I/O, and explicitly
WBINVD or CLFLUSH to a RAM space. Since migration may occur before WBINVD or
CLFLUSH, we need to maintain data consistency either by:
1: flushing cache (wbinvd)
Reply inline.
On 6/29/10, Brian Jackson i...@theiggy.com wrote:
On Monday, June 28, 2010 12:28:52 pm BuraphaLinux Server wrote:
Hello,
I have tried qemu_kvm 0.12.4 release and also git from about 1/2
an hour ago. In both cases, I crash in the post_kvm_run() function on
the line about:
On 06/28/2010 12:28 PM, BuraphaLinux Server wrote:
Hello,
I have tried qemu_kvm 0.12.4 release and also git from about 1/2
an hour ago. In both cases, I crash in the post_kvm_run() function on
the line about:
pthread_mutex_lock(qemu_mutex);
The command I use to run qemu worked great
On 6/29/10, Avi Kivity a...@redhat.com wrote:
On 06/28/2010 08:28 PM, BuraphaLinux Server wrote:
Hello,
I have tried qemu_kvm 0.12.4 release and also git from about 1/2
an hour ago. In both cases, I crash in the post_kvm_run() function on
the line about:
On 7/1/10, Anthony Liguori anth...@codemonkey.ws wrote:
On 06/28/2010 12:28 PM, BuraphaLinux Server wrote:
Hello,
I have tried qemu_kvm 0.12.4 release and also git from about 1/2
an hour ago. In both cases, I crash in the post_kvm_run() function on
the line about:
On Wed, Jun 30, 2010 at 04:03:28PM +0800, Xiao Guangrong wrote:
If the mapping is writable but the dirty flag is not set, we will find
the read-only direct sp and setup the mapping, then if the write #PF
occur, we will mark this mapping writable in the read-only direct sp,
now, other real
On Wed, Jun 30, 2010 at 04:08:05PM +0800, Xiao Guangrong wrote:
Support prefetch ptes when intercept guest #PF, avoid to #PF by later
access
If we meet any failure in the prefetch path, we will exit it and
not try other ptes to avoid become heavy path
Note: this speculative will mark page
From: Michael S. Tsirkin m...@redhat.com
Date: Tue, 29 Jun 2010 16:04:39 +0300
Since using the module involves updating the management tools
as well, if we go down this route it will be much less painful
for everyone to do push it upstream.
Ok, you can make your case to Patrick McHardy and if
On Mon, Jun 21, 2010 at 06:14:17PM +0900, Hidetoshi Seto wrote:
(2010/06/21 17:19), Avi Kivity wrote:
On 06/21/2010 08:24 AM, Hidetoshi Seto wrote:
I think some people have noticed that:
$ ./configure
$ make
$ git status
# On branch master
# Untracked files:
# (use git add
On 06/29/2010 08:04 AM, Michael S. Tsirkin wrote:
On Tue, Jun 29, 2010 at 12:36:47AM -0700, David Miller wrote:
From: Michael S. Tsirkinm...@redhat.com
Date: Mon, 28 Jun 2010 13:08:07 +0300
Userspace virtio server has the following hack
so guests rely on it, and we have to replicate
Thanks, Alex!
Am incorporating...
On Tuesday 29 June 2010 11:14:12 pm Alex Williamson wrote:
On Tue, 2010-06-08 at 14:21 -0700, Tom Lyon wrote:
The VFIO driver is used to allow privileged AND non-privileged processes
to
implement user-level device drivers for any well-behaved PCI, PCI-X,
On Wed, Jun 30, 2010 at 05:08:11PM -0500, Anthony Liguori wrote:
On 06/29/2010 08:04 AM, Michael S. Tsirkin wrote:
On Tue, Jun 29, 2010 at 12:36:47AM -0700, David Miller wrote:
From: Michael S. Tsirkinm...@redhat.com
Date: Mon, 28 Jun 2010 13:08:07 +0300
Userspace virtio server has the
On Wed, Jun 30, 2010 at 03:17:55PM -0700, Tom Lyon wrote:
Thanks, Alex!
Am incorporating...
I get it there's no chance you'll drop the virtualization
from the driver then?
--
MST
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
On Wednesday 30 June 2010 03:32:56 pm Michael S. Tsirkin wrote:
On Wed, Jun 30, 2010 at 03:17:55PM -0700, Tom Lyon wrote:
Thanks, Alex!
Am incorporating...
I get it there's no chance you'll drop the virtualization
from the driver then?
I think it'll get a whole lot simpler by depending
This patch allows IOMMU users to determine whether the hardware and software
support safe, isolated interrupt remapping. Not all Intel IOMMUs have the
hardware, and the software for AMD is not there yet.
Signed-off-by: Tom Lyon p...@cisco.com
---
MST has convinced me that any user level
On 06/30/2010 05:31 PM, Michael S. Tsirkin wrote:
On Wed, Jun 30, 2010 at 05:08:11PM -0500, Anthony Liguori wrote:
On 06/29/2010 08:04 AM, Michael S. Tsirkin wrote:
On Tue, Jun 29, 2010 at 12:36:47AM -0700, David Miller wrote:
From: Michael S. Tsirkinm...@redhat.com
Date:
Marcelo Tosatti wrote:
-if (is_shadow_present_pte(*sptep) !is_large_pte(*sptep))
-continue;
+if (is_shadow_present_pte(*sptep) !is_large_pte(*sptep)) {
+struct kvm_mmu_page *child;
+unsigned
Marcelo Tosatti wrote:
+
+addr = gfn_to_hva_many(vcpu-kvm, gfn, entry);
+if (kvm_is_error_hva(addr))
+return -1;
+
+entry = min(entry, (int)(end - start));
+ret = __get_user_pages_fast(addr, entry, 1, pages);
+
QMP/qmp-commands.txt is a generated file.
Signed-off-by: Hidetoshi Seto seto.hideto...@jp.fujitsu.com
---
.gitignore |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/.gitignore b/.gitignore
index ce66ed5..a32b7c4 100644
--- a/.gitignore
+++ b/.gitignore
@@ -28,6 +28,7 @@
# This patch is for qemu-kvm.git
The vapic.bin is a generated binary file.
Signed-off-by: Hidetoshi Seto seto.hideto...@jp.fujitsu.com
---
.gitignore |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/.gitignore b/.gitignore
index ddc248b..26eba20 100644
--- a/.gitignore
(2010/07/01 6:33), Aurelien Jarno wrote:
On Mon, Jun 21, 2010 at 06:14:17PM +0900, Hidetoshi Seto wrote:
(2010/06/21 17:19), Avi Kivity wrote:
On 06/21/2010 08:24 AM, Hidetoshi Seto wrote:
I think some people have noticed that:
$ ./configure
$ make
$ git status
# On branch master
#
On Tue, 2010-06-08 at 14:21 -0700, Tom Lyon wrote:
+int vfio_dma_unmap_dm(struct vfio_listener *listener, struct vfio_dma_map
*dmp)
+{
+ unsigned long start, npage;
+ struct dma_map_page *mlp;
+ struct list_head *pos, *pos2;
+ int ret;
+
+ start = dmp-vaddr
On Wednesday 30 June 2010 09:16:23 pm Alex Williamson wrote:
On Tue, 2010-06-08 at 14:21 -0700, Tom Lyon wrote:
+int vfio_dma_unmap_dm(struct vfio_listener *listener, struct vfio_dma_map
*dmp)
+{
+ unsigned long start, npage;
+ struct dma_map_page *mlp;
+ struct list_head *pos,
On Wed, 2010-06-30 at 21:30 -0700, Tom Lyon wrote:
On Wednesday 30 June 2010 09:16:23 pm Alex Williamson wrote:
On Tue, 2010-06-08 at 14:21 -0700, Tom Lyon wrote:
+int vfio_dma_unmap_dm(struct vfio_listener *listener, struct
vfio_dma_map *dmp)
+{
+ unsigned long start, npage;
+
60 matches
Mail list logo