From: Amit Shah amit.s...@redhat.com
The KVM list moved to vger.kernel.org last year
Signed-off-by: Amit Shah amit.s...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/Documentation/ioctl/ioctl-number.txt
b/Documentation/ioctl/ioctl-number.txt
index 7bb0d93..3223e12 100644
On Fri, Aug 14, 2009 at 01:40:36PM +0200, Arnd Bergmann wrote:
On Thursday 13 August 2009, Michael S. Tsirkin wrote:
What it is: vhost net is a character device that can be used to reduce
the number of system calls involved in virtio networking.
Existing virtio net code is used in the guest
* Anthony Liguori anth...@codemonkey.ws wrote:
Ingo Molnar wrote:
* Gregory Haskins ghask...@novell.com wrote:
This will generally be used for hypervisors to publish any host-side
virtual devices up to a guest. The guest will have the opportunity
to consume any devices present on the
On 08/15/2009 01:32 PM, Ingo Molnar wrote:
This will generally be used for hypervisors to publish any host-side
virtual devices up to a guest. The guest will have the opportunity
to consume any devices present on the vbus-proxy as if they were
platform devices, similar to existing buses like
On 08/16/2009 04:09 AM, Mohammed Gamal wrote:
+static void emulate_push_sreg(struct x86_emulate_ctxt *ctxt, int seg)
+{
+ struct decode_cache *c =ctxt-decode;
+ c-src.ptr = (unsigned long *)c-regs[seg];
+ emulate_push(ctxt);
+}
+
This can't be right. c-regs[] is the
On 08/16/2009 03:54 AM, Mohammed Gamal wrote:
Signed-off-by: Mohammed Gamalm.gamal...@gmail.com
---
kvm/user/test/x86/realmode.c | 16
1 files changed, 16 insertions(+), 0 deletions(-)
diff --git a/kvm/user/test/x86/realmode.c b/kvm/user/test/x86/realmode.c
index
On 08/13/2009 05:35 PM, Amit Shah wrote:
The KVM list moved to vger.kernel.org last year
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
From: Gleb Natapov g...@redhat.com
When reinjecting a software interrupt or exception, use the correct
instruction length provided by the hardware instead of a hardcoded 1.
Fixes problems running the suse 9.1 livecd boot loader.
Problem introduced by commit f0a3602c20 (KVM: Move interrupt
is_dirty_pte() is used on guest ptes, not shadow ptes, so it needs to avoid
shadow_dirty_mask and use PT_DIRTY_MASK instead.
Misdetecting dirty pages could lead to unnecessarily setting the dirty bit
under EPT.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/mmu.c |2 +-
1 files
Since the guest and host ptes can have wildly different format, adjust
the pte accessor names to indicate on which type of pte they operate on.
No functional changes.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/mmu.c | 16
arch/x86/kvm/mmu.h |
From: Gleb Natapov g...@redhat.com
Archs are free to use vcpu_id as they see fit. For x86 it is used as
vcpu's apic id. New ioctl is added to configure boot vcpu id that was
assumed to be 0 till now.
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
rmode is only used in vmx, so move it to vmx.c
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/include/asm/kvm_host.h | 10 -
arch/x86/kvm/vmx.c | 78 ++-
2 files changed, 44 insertions(+), 44 deletions(-)
diff --git
From: Marcelo Tosatti mtosa...@redhat.com
Protect irq injection/acking data structures with a separate irq_lock
mutex. This fixes the following deadlock:
CPU A CPU B
kvm_vm_ioctl_deassign_dev_irq()
mutex_lock(kvm-lock);worker_thread()
-
We use shadow_pte and spte inconsistently, switch to the shorter spelling.
Rename set_shadow_pte() to __set_spte() to avoid a conflict with the
existing set_spte(), and to indicate its lowlevelness.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/mmu.c | 102
From: Gleb Natapov g...@redhat.com
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/ia64/kvm/kvm-ia64.c | 29 ++---
arch/powerpc/kvm/powerpc.c | 16 ++--
arch/s390/kvm/kvm-s390.c | 33
From: Gleb Natapov g...@redhat.com
Use it instead of open code vcpu_id zero is BSP assumption.
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/ia64/kvm/kvm-ia64.c |2 +-
arch/ia64/kvm/vcpu.c |2 +-
arch/x86/kvm/i8254.c |4 ++--
Somehow the VM ioctls got unsorted; resort.
Signed-off-by: Avi Kivity a...@redhat.com
---
include/linux/kvm.h | 10 +-
1 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/include/linux/kvm.h b/include/linux/kvm.h
index 632a856..f1dada0 100644
--- a/include/linux/kvm.h
+++
From: Gregory Haskins ghask...@novell.com
We modernize the io_device code so that we use container_of() instead of
dev-private, and move the vtable to a separate ops structure
(theoretically allows better caching for multiple instances of the same
ops structure)
Signed-off-by: Gregory Haskins
Instead of checking whether we'll wrap around, calculate how many entries
are available, and check whether we have enough (just one) for the pending
mmio.
By itself, this doesn't change anything, but it paves the way for making
this function lockless.
Signed-off-by: Avi Kivity a...@redhat.com
From: Christian Ehrhardt ehrha...@linux.vnet.ibm.com
This patch relocates the variables kvm-s390 uses to track guest mem addr/size.
As discussed dropping the variables at struct kvm_arch level allows to use the
common vcpu-request based mechanism to reload guest memory if e.g. changes
via
From: Stephen Rothwell s...@canb.auug.org.au
Fixes a couple of warnings like this one:
WARNING: arch/powerpc/kvm/kvm-440.o(.text+0x1e8c): Section mismatch in
reference from the function kvmppc_44x_exit() to the function
.exit.text:kvmppc_booke_exit()
The function kvmppc_44x_exit() references a
From: Liu Yu yu@freescale.com
Latest kernel started to use these two registers.
Signed-off-by: Liu Yu yu@freescale.com
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/powerpc/kvm/e500_emulate.c |3 +++
arch/powerpc/kvm/emulate.c |2 ++
2 files changed, 5 insertions(+), 0
From: Jaswinder Singh Rajput jaswin...@kernel.org
Replace 0xc0010010 with MSR_K8_SYSCFG and 0xc0010015 with MSR_K7_HWCR.
Signed-off-by: Jaswinder Singh Rajput jaswinderraj...@gmail.com
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/x86.c |4 ++--
1 files changed, 2
From: Nitin A Kamble nitin.a.kam...@intel.com
Unrestricted Guest feature is added in the VMX specification.
Intel Westmere and onwards processors will support this feature.
It allows kvm guests to run real mode and unpaged mode
code natively in the VMX mode when EPT is turned on. With the
From: Marcelo Tosatti mtosa...@redhat.com
Introduce irq_lock, and use to protect ioapic data structures.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
include/linux/kvm_host.h |3 ++-
virt/kvm/ioapic.c|5 +
From: Jan Kiszka jan.kis...@siemens.com
None of the interface services the LAPIC emulation provides need to be
exported to modules, and kvm_lapic_get_base is even totally unused
today.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
Signed-off-by: Avi Kivity a...@redhat.com
---
From: Liu Yu yu@freescale.com
According to commit 70fe3af8403f85196bb74f22ce4813db7dfedc1a.
Signed-off-by: Liu Yu yu@freescale.com
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/powerpc/kvm/e500_tlb.c | 10 +-
arch/powerpc/kvm/e500_tlb.h |6 +++---
2 files changed, 8
Instead of reloading the pdptrs on every entry and exit (vmcs writes on vmx,
guest memory access on svm) extract them on demand.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/include/asm/kvm_host.h |4
arch/x86/kvm/kvm_cache_regs.h |9 +
arch/x86/kvm/mmu.c
From: Marcelo Tosatti mtosa...@redhat.com
isr_ack is protected by kvm_pic-lock.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/i8259.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/i8259.c
From: Marcelo Tosatti mtosa...@redhat.com
Move coalesced_mmio locking to its own device, instead of relying on
kvm-lock.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
virt/kvm/coalesced_mmio.c | 10 --
virt/kvm/coalesced_mmio.h |1
From: Gleb Natapov g...@redhat.com
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/i8254.c |2 +-
arch/x86/kvm/kvm_timer.h |2 +-
arch/x86/kvm/lapic.c |2 +-
arch/x86/kvm/timer.c |2 +-
4 files changed, 4
Instead of reading the PDPTRs from memory after every exit (which is slow
and wrong, as the PDPTRs are stored on the cpu), sync the PDPTRs from
memory to the VMCS before entry, and from the VMCS to memory after exit.
Do the same for cr3.
Signed-off-by: Avi Kivity a...@redhat.com
---
From: Gregory Haskins ghask...@novell.com
We invoke kfree() on a data member instead of the structure. This works today
because the kvm_io_device is the first element of the private structure, but
this could change in the future, so lets clean this up.
Signed-off-by: Gregory Haskins
From: Liu Yu yu@freescale.com
Signed-off-by: Liu Yu yu@freescale.com
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/powerpc/include/asm/kvm_host.h |1 -
arch/powerpc/kvm/e500.c |3 ---
arch/powerpc/kvm/emulate.c |2 +-
3 files changed, 1
From: Gregory Haskins ghask...@novell.com
We currently publish the i8254 resources to the pio_bus before the devices
are fully initialized. Since we hold the pit_lock, its probably not
a real issue. But lets clean this up anyway.
Reported-by: Avi Kivity a...@redhat.com
Signed-off-by: Gregory
kvm_svm.h is only included from svm.c, so fold it in.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/kvm_svm.h | 54
arch/x86/kvm/svm.c | 42 -
2 files changed, 41 insertions(+), 55
From: Andre Przywara andre.przyw...@amd.com
Since AMD does not support sysenter in 64bit mode, the VMCB fields storing
the MSRs are truncated to 32bit upon VMRUN/#VMEXIT. So store the values
in a separate 64bit storage to avoid truncation.
Signed-off-by: Christoph Egger christoph.eg...@amd.com
Instead of returning -ENOTSUPP, exit normally but indicate the hardware
exit reason.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/vmx.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index d726dec..959cb59 100644
From: Sheng Yang sh...@linux.intel.com
We only trap one page for MSI-X entry now, so it's 4k/(128/8) = 256 entries at
most.
Signed-off-by: Sheng Yang sh...@linux.intel.com
Signed-off-by: Avi Kivity a...@redhat.com
---
include/linux/kvm.h |2 +-
1 files changed, 1 insertions(+), 1
From: Christian Ehrhardt ehrha...@linux.vnet.ibm.com
If signal pending is true we exit without updating kvm_run, userspace
currently just does nothing and jumps to kvm_run again.
Since we did not set an exit_reason we might end up with a random one
(whatever was the last exit). Therefore it was
From: Sheng Yang sh...@linux.intel.com
Disable interrupt at interrupt handler and enable it when guest ack is for
the level triggered interrupt, to prevent reinjected interrupt. MSI/MSI-X don't
need it.
One possible problem is multiply same vector interrupt injected between irq
handler and
vmx_set_cr3() will call vmx_tlb_flush(), which will flush the ept context.
So there is no need to call ept_sync_context() explicitly.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/vmx.c |1 -
1 files changed, 0 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/vmx.c
From: Jaswinder Singh Rajput jaswin...@kernel.org
Use standard msr-index.h's MSR declaration.
MSR_IA32_TSC is better than MSR_IA32_TIME_STAMP_COUNTER as it also solves
80 column issue.
Signed-off-by: Jaswinder Singh Rajput jaswinderraj...@gmail.com
Signed-off-by: Avi Kivity a...@redhat.com
---
From: Christian Ehrhardt ehrha...@linux.vnet.ibm.com
To ensure vcpu's come out of guest context in certain cases this patch adds a
s390 specific way to kick them out of guest context. Currently it kicks them
out to rerun the vcpu_run path in the s390 code, but the mechanism itself is
expandable
From: Gregory Haskins ghask...@novell.com
KVM provides a complete virtual system environment for guests, including
support for injecting interrupts modeled after the real exception/interrupt
facilities present on the native platform (such as the IDT on x86).
Virtual interrupts can come from a
From: Gleb Natapov g...@redhat.com
The problem exists only on VMX. Also currently we skip this step if
there is pending exception. The patch fixes this too.
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/vmx.c |8
The jump target should not be sign extened; use an unsigned decode flag.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/x86_emulate.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c
index
From: Huang Ying ying.hu...@intel.com
The related MSRs are emulated. MCE capability is exported via
extension KVM_CAP_MCE and ioctl KVM_X86_GET_MCE_CAP_SUPPORTED. A new
vcpu ioctl command KVM_X86_SETUP_MCE is used to setup MCE emulation
such as the mcg_cap. MCE is injected via vcpu ioctl command
Here is the first of four batches containing the KVM changes for 2.6.32.
The 2.6.32 cycle will see scalability improvements, support for new hardware
features, improvements in nested svm support, and eventfd-based
infrastructure for connecting kvm guests to components in the host kernel,
host
Absolute jumps use zero extended immediate operands.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/x86_emulate.c | 15 +++
1 files changed, 15 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c
index 616de46..a30d5fc
Reduce Kconfig code duplication.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/ia64/kvm/Kconfig|7 ++-
arch/powerpc/kvm/Kconfig |3 +--
arch/s390/kvm/Kconfig|6 +-
arch/x86/kvm/Kconfig |7 ++-
virt/kvm/Kconfig |7 +++
5 files changed,
From: Christoph Hellwig h...@infradead.org
Use proper foo-y style list additions to cleanup all the conditionals,
move module selection after compound object selection and remove the
superflous comment.
Signed-off-by: Christoph Hellwig h...@lst.de
Signed-off-by: Avi Kivity a...@redhat.com
---
From: Mark McLoughlin mar...@redhat.com
If we run out of cpuid entries for extended request types
we should return -E2BIG, just like we do for the standard
request types.
Signed-off-by: Mark McLoughlin mar...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/x86.c |4
On 08/16/2009 12:55 PM, Thomas Fjellstrom wrote:
I'm wondering if kvm supports automatic memory ballooning. I've had a kvm
guest running for a couple days, and the balloon driver was loaded, and I
could manually change the amount of ram it had allocated in the console, but
it never seemed to
On 08/14/2009 01:11 AM, Gordan Bobic wrote:
With the recent talk of the trim SATA instruction becoming supported
in the upcoming versions of Windows and claims from Intel that support
for it in their SSDs is imminent, it occurs to me that this would be
equally useful in virtual disk emulation.
Any help will be really appeciated.
Regards,
Qian
2009/8/13 Zhang Qian zhq527...@gmail.com:
Hi,
It seems that KVM has supported memory ballooning since KVM-75, can
you please tell me how to enable it?
Another question is, the kernel version of my RHEL 5.3 box is
2.6.18-128.el5, can I
On 08/10/2009 03:48 PM, Michael S. Tsirkin wrote:
kvm_para.h contains userspace interface and so
should be exported.
Doesn't it need asm/kvm_para.h as well?
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
On 08/10/2009 03:59 PM, Michael S. Tsirkin wrote:
kvm_para.h contains userspace interface and so
should be exported.
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
On Sun, Aug 16, 2009 at 03:09:55PM +0300, Avi Kivity wrote:
On 08/10/2009 03:48 PM, Michael S. Tsirkin wrote:
kvm_para.h contains userspace interface and so
should be exported.
Doesn't it need asm/kvm_para.h as well?
Yes, that was v2.
--
error compiling committee.c: too many
On 08/16/2009 02:58 PM, Zhang Qian wrote:
Any help will be really appeciated.
You can use 'balloon TARGET' command in the monitor in order to ask the
balloon driver reach this number (either inflate or deflate).
'info balloon' is used to retrieve current overall allocation.
Regards,
Qian
On 08/13/2009 09:33 AM, Shirley Ma wrote:
Guest virtio_net receives packets from its pre-allocated vring
buffers, then it delivers these packets to upper layer protocols
as skb buffs. So it's not necessary to pre-allocate skb for each
mergable buffer, then frees it when it's useless.
This patch
On Sun August 16 2009, Avi Kivity wrote:
On 08/16/2009 12:55 PM, Thomas Fjellstrom wrote:
I'm wondering if kvm supports automatic memory ballooning. I've had a kvm
guest running for a couple days, and the balloon driver was loaded, and I
could manually change the amount of ram it had
Support build on rhel 5.3 where we have syscall for eventfd but not
userspace wrapper.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
compat/sys/eventfd.h | 13 +
configure|1 +
2 files changed, 14 insertions(+), 0 deletions(-)
create mode 100644
On 08/16/2009 05:18 PM, Thomas Fjellstrom wrote:
On Sun August 16 2009, Avi Kivity wrote:
On 08/16/2009 12:55 PM, Thomas Fjellstrom wrote:
I'm wondering if kvm supports automatic memory ballooning. I've had a kvm
guest running for a couple days, and the balloon driver was loaded, and
On 08/16/2009 05:18 PM, Thomas Fjellstrom wrote:
On Sun August 16 2009, Avi Kivity wrote:
On 08/16/2009 12:55 PM, Thomas Fjellstrom wrote:
I'm wondering if kvm supports automatic memory ballooning. I've had a kvm
guest running for a couple days, and the balloon driver was loaded, and I
could
Signed-off-by: Mohammed Gamal m.gamal...@gmail.com
---
kvm/user/test/x86/realmode.c | 17 +
1 files changed, 17 insertions(+), 0 deletions(-)
diff --git a/kvm/user/test/x86/realmode.c b/kvm/user/test/x86/realmode.c
index 755b5d1..041f0a5 100644
---
Signed-off-by: Mohammed Gamal m.gamal...@gmail.com
---
arch/x86/kvm/emulate.c | 14 +-
1 files changed, 13 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index 2eb807a..7688c0b 100644
--- a/arch/x86/kvm/emulate.c
+++
Bugs item #2832401, was opened at 2009-08-04 18:34
Message generated for change (Settings changed) made by jiajun
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2832401group_id=180599
Please note that this message will contain a full copy of the comment
Hi All,
This Weekly KVM Testing Report against lastest kvm.git
7597fa7922136a354824f3360831f13bc98dea4e and qemu-kvm.git
1c45eec341763ed38270a3d1f230044fdfeefb16. There is no new bug found this week.
The migration bug is fixed.
One Fixed issue:
Greetings!
looking at the i8259 implementation found in qemu
as well as in the in-kernel kvm implementation, I
see that on pic_reset() special_fully_nested_mode
is set to zero, but the intel(r) 8259A manual says
on page 15:
Fully Nested Mode
This mode is entered after initialization
Hi KVM experts,
Our user case needs to run KVM and application on host together. To
reserve some CPU resource for application, we want to limit the CPU
usage of KVM. Without KVM CPU usage limitation, the idle CPU of host OS
becomes 0% in peak time.
I have searched this topic on internet, but
71 matches
Mail list logo