Am 27.01.2012 20:52, schrieb Gleb Natapov:
On Fri, Jan 27, 2012 at 08:23:33PM +0100, Kevin Wolf wrote:
I believe this should work with both VMX and SVM now. Gleb, Jörg, can one of
you test this with SVM? I did some testing on my buggy processor and it looks
as good as it gets, but it would be
On 01/20/2012 05:45 PM, Paolo Bonzini wrote:
This is the first implementation of the virtio-scsi driver, a virtual
HBA that will be supported by KVM. It implements a subset of the spec,
in particular it does not implement asynchronous notifications for either
LUN reset/removal/addition or
On Mon, Jan 30, 2012 at 09:48:33AM +0100, Kevin Wolf wrote:
Am 27.01.2012 20:52, schrieb Gleb Natapov:
On Fri, Jan 27, 2012 at 08:23:33PM +0100, Kevin Wolf wrote:
I believe this should work with both VMX and SVM now. Gleb, Jörg, can one
of
you test this with SVM? I did some testing on my
On 2012-01-29 14:18, Sergei Trofimovich wrote:
From: Sergei Trofimovich sly...@gentoo.org
$ ./configure --target-list=alpha-softmmu make
CCalpha-softmmu/i8259.o
cc1: warnings being treated as errors
/home/slyfox/dev/git/qemu-kvm/hw/i8259.c: In function
On 2012-01-28 15:21, Alex Williamson wrote:
Patch 1 2 here are independent of the rest, but I include them
here to avoid conflicts. The first patch enables exposing MMIO
BARs as their native width to the guest. I added a config option
for this with the default to use the existing behavior
On Thu, Jan 26, 2012 at 12:46:18PM +0200, Avi Kivity wrote:
On 01/24/2012 04:56 PM, Vasilis Liaskovitis wrote:
On Tue, Jan 24, 2012 at 11:28:41AM +0100, Jan Kiszka wrote:
On 2012-01-24 11:10, Vasilis Liaskovitis wrote:
Add stub functions for CPU eject callback. Define cpu_acpi_eject
On Mon, Jan 30, 2012 at 10:55:41AM +0200, Gleb Natapov wrote:
On Mon, Jan 30, 2012 at 09:48:33AM +0100, Kevin Wolf wrote:
Am 27.01.2012 20:52, schrieb Gleb Natapov:
On Fri, Jan 27, 2012 at 08:23:33PM +0100, Kevin Wolf wrote:
I believe this should work with both VMX and SVM now. Gleb,
On 01/27/2012 09:23 PM, Kevin Wolf wrote:
Task switches can switch between Protected Mode and VM86. The current
mode must be updated during the task switch emulation so that the new
segment selectors are interpreted correctly and privilege checks
succeed.
VMX code calculates the CPL from the
Am 30.01.2012 09:55, schrieb Gleb Natapov:
On Mon, Jan 30, 2012 at 09:48:33AM +0100, Kevin Wolf wrote:
Am 27.01.2012 20:52, schrieb Gleb Natapov:
On Fri, Jan 27, 2012 at 08:23:33PM +0100, Kevin Wolf wrote:
I believe this should work with both VMX and SVM now. Gleb, Jörg, can one
of
you test
On 01/27/2012 09:23 PM, Kevin Wolf wrote:
Currently, all task switches check privileges against the DPL of the
TSS. This is only correct for jmp/call to a TSS. If a task gate is used,
the DPL of this take gate is used for the check instead. Exceptions,
external interrupts and iret shouldn't
On 01/30/2012 12:35 PM, Kevin Wolf wrote:
Am 30.01.2012 09:55, schrieb Gleb Natapov:
On Mon, Jan 30, 2012 at 09:48:33AM +0100, Kevin Wolf wrote:
Am 27.01.2012 20:52, schrieb Gleb Natapov:
On Fri, Jan 27, 2012 at 08:23:33PM +0100, Kevin Wolf wrote:
I believe this should work with both VMX
On Mon, Jan 30, 2012 at 11:35:00AM +0100, Kevin Wolf wrote:
Am 30.01.2012 09:55, schrieb Gleb Natapov:
On Mon, Jan 30, 2012 at 09:48:33AM +0100, Kevin Wolf wrote:
Am 27.01.2012 20:52, schrieb Gleb Natapov:
On Fri, Jan 27, 2012 at 08:23:33PM +0100, Kevin Wolf wrote:
I believe this should
On Mon, Jan 30, 2012 at 12:45:15PM +0200, Avi Kivity wrote:
On 01/30/2012 12:35 PM, Kevin Wolf wrote:
Am 30.01.2012 09:55, schrieb Gleb Natapov:
On Mon, Jan 30, 2012 at 09:48:33AM +0100, Kevin Wolf wrote:
Am 27.01.2012 20:52, schrieb Gleb Natapov:
On Fri, Jan 27, 2012 at 08:23:33PM
On Mon, Jan 30, 2012 at 12:24:11PM +0200, Avi Kivity wrote:
+
ctxt-ops-set_segment(ctxt, selector, desc, base3, seg);
}
@@ -2273,6 +2281,24 @@ static int load_state_from_tss32(struct
x86_emulate_ctxt *ctxt,
return emulate_gp(ctxt, 0);
ctxt-_eip = tss-eip;
Am 30.01.2012 11:24, schrieb Avi Kivity:
On 01/27/2012 09:23 PM, Kevin Wolf wrote:
Task switches can switch between Protected Mode and VM86. The current
mode must be updated during the task switch emulation so that the new
segment selectors are interpreted correctly and privilege checks
On Mon, Jan 30, 2012 at 12:05:37PM +0100, Kevin Wolf wrote:
+
+ /*
+ * If we're switching between Protected Mode and VM86, we need to make
+ * sure to update the mode before loading the segment descriptors so
+ * that the selectors are interpreted correctly.
+ *
+ * Need
Am 30.01.2012 11:39, schrieb Avi Kivity:
On 01/27/2012 09:23 PM, Kevin Wolf wrote:
Currently, all task switches check privileges against the DPL of the
TSS. This is only correct for jmp/call to a TSS. If a task gate is used,
the DPL of this take gate is used for the check instead. Exceptions,
On 01/30/2012 12:50 PM, Gleb Natapov wrote:
On Mon, Jan 30, 2012 at 12:45:15PM +0200, Avi Kivity wrote:
On 01/30/2012 12:35 PM, Kevin Wolf wrote:
Am 30.01.2012 09:55, schrieb Gleb Natapov:
On Mon, Jan 30, 2012 at 09:48:33AM +0100, Kevin Wolf wrote:
Am 27.01.2012 20:52, schrieb Gleb
On 01/30/2012 12:56 PM, Gleb Natapov wrote:
On Mon, Jan 30, 2012 at 12:24:11PM +0200, Avi Kivity wrote:
+
ctxt-ops-set_segment(ctxt, selector, desc, base3, seg);
}
@@ -2273,6 +2281,24 @@ static int load_state_from_tss32(struct
x86_emulate_ctxt *ctxt,
return
On Mon, Jan 30, 2012 at 02:02:14PM +0200, Avi Kivity wrote:
On 01/30/2012 12:56 PM, Gleb Natapov wrote:
On Mon, Jan 30, 2012 at 12:24:11PM +0200, Avi Kivity wrote:
+
ctxt-ops-set_segment(ctxt, selector, desc, base3, seg);
}
@@ -2273,6 +2281,24 @@ static int
On Mon, Jan 30, 2012 at 01:59:34PM +0200, Avi Kivity wrote:
On 01/30/2012 12:50 PM, Gleb Natapov wrote:
On Mon, Jan 30, 2012 at 12:45:15PM +0200, Avi Kivity wrote:
On 01/30/2012 12:35 PM, Kevin Wolf wrote:
Am 30.01.2012 09:55, schrieb Gleb Natapov:
On Mon, Jan 30, 2012 at 09:48:33AM
On Mon, Jan 30, 2012 at 01:59:34PM +0200, Avi Kivity wrote:
It's best to make it independent (like svm, and force vmx to emulate
this behaviour). Real mode forces cpl to 0, vm86 forces cpl to 3,
protected mode (and I think long mode) uses cs.rpl.
This is what vmx does, not svm.
On 01/30/2012 01:05 PM, Kevin Wolf wrote:
Am 30.01.2012 11:24, schrieb Avi Kivity:
On 01/27/2012 09:23 PM, Kevin Wolf wrote:
Task switches can switch between Protected Mode and VM86. The current
mode must be updated during the task switch emulation so that the new
segment selectors are
On 01/30/2012 02:04 PM, Gleb Natapov wrote:
On Mon, Jan 30, 2012 at 02:02:14PM +0200, Avi Kivity wrote:
On 01/30/2012 12:56 PM, Gleb Natapov wrote:
On Mon, Jan 30, 2012 at 12:24:11PM +0200, Avi Kivity wrote:
+
ctxt-ops-set_segment(ctxt, selector, desc, base3, seg);
}
On 01/30/2012 02:16 PM, Gleb Natapov wrote:
On Mon, Jan 30, 2012 at 01:59:34PM +0200, Avi Kivity wrote:
On 01/30/2012 12:50 PM, Gleb Natapov wrote:
On Mon, Jan 30, 2012 at 12:45:15PM +0200, Avi Kivity wrote:
On 01/30/2012 12:35 PM, Kevin Wolf wrote:
Am 30.01.2012 09:55, schrieb Gleb
On 01/30/2012 02:31 PM, Gleb Natapov wrote:
On Mon, Jan 30, 2012 at 01:59:34PM +0200, Avi Kivity wrote:
It's best to make it independent (like svm, and force vmx to emulate
this behaviour). Real mode forces cpl to 0, vm86 forces cpl to 3,
protected mode (and I think long mode) uses
On Mon, Jan 30, 2012 at 03:28:07PM +0200, Avi Kivity wrote:
On 01/30/2012 02:31 PM, Gleb Natapov wrote:
On Mon, Jan 30, 2012 at 01:59:34PM +0200, Avi Kivity wrote:
It's best to make it independent (like svm, and force vmx to emulate
this behaviour). Real mode forces cpl to 0, vm86
On 01/30/2012 03:29 PM, Gleb Natapov wrote:
On Mon, Jan 30, 2012 at 03:28:07PM +0200, Avi Kivity wrote:
On 01/30/2012 02:31 PM, Gleb Natapov wrote:
On Mon, Jan 30, 2012 at 01:59:34PM +0200, Avi Kivity wrote:
It's best to make it independent (like svm, and force vmx to emulate
On Mon, 2012-01-30 at 11:11 +0100, Jan Kiszka wrote:
On 2012-01-28 15:21, Alex Williamson wrote:
Patch 1 2 here are independent of the rest, but I include them
here to avoid conflicts. The first patch enables exposing MMIO
BARs as their native width to the guest. I added a config option
Am 30.01.2012 14:23, schrieb Avi Kivity:
On 01/30/2012 01:05 PM, Kevin Wolf wrote:
Am 30.01.2012 11:24, schrieb Avi Kivity:
On 01/27/2012 09:23 PM, Kevin Wolf wrote:
Task switches can switch between Protected Mode and VM86. The current
mode must be updated during the task switch emulation so
Hi, I've encountered interesting problem.
This happens with Linux 3.1.4, libvirt 0.9.6, qemu-kvm 0.15.1 and Linux
3.2.1, libvirt 0.9.9, qemu-kvm 1.0.
It seems guest OS NIC does not respect MTU that has been set on
interface when using e1000 or virtio drivers, everything works well when
On 01/30/2012 04:01 PM, Kevin Wolf wrote:
Am 30.01.2012 14:23, schrieb Avi Kivity:
On 01/30/2012 01:05 PM, Kevin Wolf wrote:
Am 30.01.2012 11:24, schrieb Avi Kivity:
On 01/27/2012 09:23 PM, Kevin Wolf wrote:
Task switches can switch between Protected Mode and VM86. The current
mode must
On 01/17/2012 08:40 PM, Eric B Munson wrote:
Now that we have a flag that will tell the guest it was suspended, create an
interface for that communication using a KVM ioctl.
diff --git a/Documentation/virtual/kvm/api.txt
b/Documentation/virtual/kvm/api.txt
index e1d94bf..1931e5c 100644
On 01/27/2012 10:45 PM, Eric B Munson wrote:
Just poking to make sure this set hasn't fallen through the cracks.
Sorry, was on vacation and am still recovering.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
On 01/30/2012 05:07 PM, Avi Kivity wrote:
+Parameters: None
+Returns: 0 on success, -1 on error
+
+This signals to the host kernel that the specified guest is being paused by
+userspace. The host will set a flag in the pvclock structure that is
checked
+from the soft lockup
Am 30.01.2012 15:32, schrieb Avi Kivity:
On 01/30/2012 04:01 PM, Kevin Wolf wrote:
Am 30.01.2012 14:23, schrieb Avi Kivity:
On 01/30/2012 01:05 PM, Kevin Wolf wrote:
Am 30.01.2012 11:24, schrieb Avi Kivity:
On 01/27/2012 09:23 PM, Kevin Wolf wrote:
Task switches can switch between Protected
On Mon, 30 Jan 2012, Avi Kivity wrote:
On 01/17/2012 08:40 PM, Eric B Munson wrote:
Now that we have a flag that will tell the guest it was suspended, create an
interface for that communication using a KVM ioctl.
diff --git a/Documentation/virtual/kvm/api.txt
On Mon, 30 Jan 2012, Avi Kivity wrote:
On 01/30/2012 05:07 PM, Avi Kivity wrote:
+Parameters: None
+Returns: 0 on success, -1 on error
+
+This signals to the host kernel that the specified guest is being paused
by
+userspace. The host will set a flag in the pvclock structure
Le Mon, Jan 23, 2012 at 09:28:37AM +0100, David Cure ecrivait :
I use several kvm box, and no problem at all except for 1
application that have bad response time.
The VM runs Windows 2008R2 and the application is an
client-server app develop with progress software and talk to
On 01/30/2012 05:26 PM, Kevin Wolf wrote:
My bet is that it will be 3 if eflags.vm=1 and unchanged otherwise --
the cpl update happens when the segment cache is updated. But that's
just a guess.
Does even anyone see the new CPL in error cases? An exception is thrown
immediately, so cs
On 01/30/2012 05:32 PM, Eric B Munson wrote:
Can you point me to the discussion that moved this to be a vm ioctl? In
general vm ioctls that do things for all vcpus are racy, like here.
You're accessing variables that are protected by the vcpu mutex, and not
taking the mutex (nor can
On Mon, 30 Jan 2012 16:26:06 +0100
Kevin Wolf kw...@redhat.com wrote:
The other case is what we're looking at, task switch. To actually
update cpl, set_segment() needs to look at cr0.pe and eflags, but these
might not have been committed yet. It's all solvable but the solution
involves
On 2012-01-30 16:07, Avi Kivity wrote:
On 01/17/2012 08:40 PM, Eric B Munson wrote:
Now that we have a flag that will tell the guest it was suspended, create an
interface for that communication using a KVM ioctl.
diff --git a/Documentation/virtual/kvm/api.txt
On Monday, January 30, 2012 09:36:55 AM David Cure wrote:
Le Mon, Jan 23, 2012 at 09:28:37AM +0100, David Cure ecrivait :
I use several kvm box, and no problem at all except for 1
application that have bad response time.
The VM runs Windows 2008R2 and the application is an
Le Mon, Jan 30, 2012 at 10:20:34AM -0600, Brian Jackson ecrivait :
Without more info or some way to reproduce the problem, it would be pointless
for one of the devs to spend much time on it.
yes for sure.
But I mean there is some way to trace at the KVM level what happens
On 01/30/2012 06:18 PM, Jan Kiszka wrote:
This looks racy. The vcpu can remove its kvmclock concurrently with
this access, and src will be NULL.
There is no race here (src is member of the vcpu), but arch.time might
have become invalid. KVM_REQ_CLOCK_UPDATE instead of mark_page_dirty
On Mon, 30 Jan 2012 11:08:37 +0100
Jan Kiszka jan.kis...@siemens.com wrote:
On 2012-01-29 14:18, Sergei Trofimovich wrote:
From: Sergei Trofimovich sly...@gentoo.org
$ ./configure --target-list=alpha-softmmu make
CCalpha-softmmu/i8259.o
cc1: warnings being treated
On 01/30/2012 06:51 PM, David Cure wrote:
Le Mon, Jan 30, 2012 at 10:20:34AM -0600, Brian Jackson ecrivait :
Without more info or some way to reproduce the problem, it would be
pointless
for one of the devs to spend much time on it.
yes for sure.
But I mean there is
Binarus wrote:
Dear all,
it seems that I am unable to pass multiple cores / CPUs to KVM
guests. Whatever I do, the guests only report one CPU / core.
...
/usr/bin/qemu-system-x86_64 -M pc -cpu host -smp cores=2,threads=1,sockets=1
-drive file=/dev/sda6,if=virtio,cache=none,index=0 -drive
We need to prioritize our matching when setting MSI-X vector
entries. Unused entries should only be used if we don't find
an exact match or else we risk duplicating entries. This was
causing an ENOSPC return when trying to mask and unmask MSI-X
vectors based on guest MSI-X table updates.
On 2012-01-30 19:06, Alex Williamson wrote:
We need to prioritize our matching when setting MSI-X vector
entries. Unused entries should only be used if we don't find
an exact match or else we risk duplicating entries. This was
causing an ENOSPC return when trying to mask and unmask MSI-X
On Mon, 2012-01-30 at 19:24 +0100, Jan Kiszka wrote:
On 2012-01-30 19:06, Alex Williamson wrote:
We need to prioritize our matching when setting MSI-X vector
entries. Unused entries should only be used if we don't find
an exact match or else we risk duplicating entries. This was
causing
hi
Please send in any agenda items you are interested in covering.
Cheers,
Juan.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
We need to prioritize our matching when setting MSI-X vector
entries. Unused entries should only be used if we don't find
an exact match or else we risk duplicating entries. This was
causing an ENOSPC return when trying to mask and unmask MSI-X
vectors based on guest MSI-X table updates.
The
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 2012-01-30 18:15, Sergei Trofimovich wrote:
On Mon, 30 Jan 2012 11:08:37 +0100 Jan Kiszka
jan.kis...@siemens.com wrote:
On 2012-01-29 14:18, Sergei Trofimovich wrote:
From: Sergei Trofimovich sly...@gentoo.org
$ ./configure
On 20 January 2012 02:59, Christoffer Dall
c.d...@virtualopensystems.com wrote:
There's a new list of issues available at:
https://github.com/virtualopensystems/linux-kvm-arm/issues
Thanks for putting this up. Here's a couple more for you :-)
* Support guest kernels configured for LPAE
At
On 30.01.2012, at 23:46, Peter Maydell wrote:
On 20 January 2012 02:59, Christoffer Dall
c.d...@virtualopensystems.com wrote:
There's a new list of issues available at:
https://github.com/virtualopensystems/linux-kvm-arm/issues
Thanks for putting this up. Here's a couple more for you
Am 30.01.2012 19:55, schrieb Juan Quintela:
Please send in any agenda items you are interested in covering.
QOM roadmap update:
* Series 3/4 is on the list.
- Please officially designate a merge date (Friday?).
- To make review sensible, I ask for a hard device freeze until merged.
I.e., no
On 01/30/2012 05:41 PM, Andreas Färber wrote:
Am 30.01.2012 19:55, schrieb Juan Quintela:
Please send in any agenda items you are interested in covering.
QOM roadmap update:
* Series 3/4 is on the list.
- Please officially designate a merge date (Friday?).
- To make review sensible, I ask
On 31.01.2012, at 00:53, Anthony Liguori wrote:
On 01/30/2012 05:41 PM, Andreas Färber wrote:
Am 30.01.2012 19:55, schrieb Juan Quintela:
Please send in any agenda items you are interested in covering.
QOM roadmap update:
* Series 3/4 is on the list.
- Please officially designate a
Added s390 and ppc developers to Cc,
(2012/01/30 14:35), Takuya Yoshikawa wrote:
Some members of kvm_memory_slot are not used by every architecture.
This patch is the first step to make this difference clear by
introducing kvm_memory_slot::arch; lpage_info is moved into it.
I am planning to
https://bugzilla.kernel.org/show_bug.cgi?id=42563
--- Comment #7 from Jay Ren yongjie@intel.com 2012-01-31 01:37:57 ---
(In reply to comment #6)
(In reply to comment #5)
(In reply to comment #4)
Yes. With 'ignore_msrs=y' added when loading kvm module, rhel5.x guest
can boot
HI,
Can anyone let me know know the difference between VMXON region and
VMCS region? relationship?
It will be appreciated if you can make some comments.
--
Regards,
Zhi Yong Wu
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
Commit d3923126a24212f1e746a84a575dadbd9f259418 added a bunch of
nice error checking around ioevent__init() but the init may gracefully
fail if ioevents simply aren't supported (PPC64 KVM).
This commit adds a new return code for the init -- positive, but
identifiable as 'not success 0'.
This series adds support for a PPC64 platform, SPAPR, on top of the previous
more general PPC64 CPU support. This platform is paravirtualised, with most
of the MMU hypercalls being dealt with in the kernel. Userland needs to
describe the environment to the machine with a device tree, cope with
Allocate a page table and point SDR1 to it in order to support the -PR
PPC64 KVM mode. (The alternative, -HV mode, is available only on a small
set of machines.)
This patch also removes the previous dependency on mapping guest RAM with
huge pages; PR KVM doesn't require them so the user isn't
The generated DT is the bare minimum structure required for SPAPR (on which
subsequent patches for VIO, XICS, PCI etc. will build); root node, cpus, memory.
The DT contains CPU-specific configuration; a very simple 'cpu info' mechanism
is added to recognise/differentiate DT entries for POWER7 and
This adds the console code, plus VIO HV terminal nodes are added to
the device tree so the guest kernel will pick it up.
Signed-off-by: Matt Evans m...@ozlabs.org
---
tools/kvm/Makefile |1 +
tools/kvm/powerpc/kvm.c | 33
tools/kvm/powerpc/spapr_hvcons.c
This is the final piece of the puzzle for PPC SPAPR PCI; this
function splits MMIO accesses into the two PHB windows directs
things to MMIO/IO emulation as appropriate.
Signed-off-by: Matt Evans m...@ozlabs.org
---
tools/kvm/Makefile |1 +
This patch adds the basic structure for HV calls, their registration and some of
the simpler calls. A similar layout for RTAS calls is also added, again with
some of the simpler RTAS calls used by the guest. The SPAPR RTAS stub is
generated inline. Also, nodes for RTAS are added to the device
This provides the PCI bridge, definitions for the address layout of the windows
and wires in IRQs. Once PCI devices are all registered, they are enumerated and
DT nodes generated for each.
Signed-off-by: Matt Evans m...@ozlabs.org
---
tools/kvm/powerpc/include/kvm/kvm-arch.h |3 +
This patch adds XICS emulation code (heavily borrowed from QEMU), and wires
this into kvm_cpu__irq() to fire a CPU IRQ via KVM. A device tree entry is
also added. IPIs work, xics_alloc_irqnum() is added to allocate an external
IRQ (which will later be used by the PHB PCI code) and finally,
On 31/01/12 02:17, Takuya Yoshikawa wrote:
Added s390 and ppc developers to Cc,
(2012/01/30 14:35), Takuya Yoshikawa wrote:
Some members of kvm_memory_slot are not used by every architecture.
This patch is the first step to make this difference clear by
introducing kvm_memory_slot::arch;
On Tue, Jan 31, 2012 at 8:34 AM, Matt Evans m...@ozlabs.org wrote:
+static struct cpu_info cpu_power7_info = {
+ POWER7,
+ power7_page_sizes_prop, sizeof(power7_page_sizes_prop),
+ power7_segment_sizes_prop, sizeof(power7_segment_sizes_prop),
+ 32, /* SLB
SPAPR support includes various in-kernel hypercalls, improving performance
by cutting out the exit to userspace. H_BULK_REMOVE is implemented in this
patch.
Signed-off-by: Matt Evans m...@ozlabs.org
---
Alex, my zomg, ls SIGILLs! on IRC was due to a former broken version of
this patch
This series adds support for a PPC64 platform, SPAPR, on top of the previous
more general PPC64 CPU support. This platform is paravirtualised, with most
of the MMU hypercalls being dealt with in the kernel. Userland needs to
describe the environment to the machine with a device tree, cope with
Allocate a page table and point SDR1 to it in order to support the -PR
PPC64 KVM mode. (The alternative, -HV mode, is available only on a small
set of machines.)
This patch also removes the previous dependency on mapping guest RAM with
huge pages; PR KVM doesn't require them so the user isn't
The generated DT is the bare minimum structure required for SPAPR (on which
subsequent patches for VIO, XICS, PCI etc. will build); root node, cpus, memory.
The DT contains CPU-specific configuration; a very simple 'cpu info' mechanism
is added to recognise/differentiate DT entries for POWER7 and
This adds the console code, plus VIO HV terminal nodes are added to
the device tree so the guest kernel will pick it up.
Signed-off-by: Matt Evans m...@ozlabs.org
---
tools/kvm/Makefile |1 +
tools/kvm/powerpc/kvm.c | 33
tools/kvm/powerpc/spapr_hvcons.c
This is the final piece of the puzzle for PPC SPAPR PCI; this
function splits MMIO accesses into the two PHB windows directs
things to MMIO/IO emulation as appropriate.
Signed-off-by: Matt Evans m...@ozlabs.org
---
tools/kvm/Makefile |1 +
This provides the PCI bridge, definitions for the address layout of the windows
and wires in IRQs. Once PCI devices are all registered, they are enumerated and
DT nodes generated for each.
Signed-off-by: Matt Evans m...@ozlabs.org
---
tools/kvm/powerpc/include/kvm/kvm-arch.h |3 +
On Tue, Jan 31, 2012 at 8:34 AM, Matt Evans m...@ozlabs.org wrote:
+static struct cpu_info cpu_power7_info = {
+ POWER7,
+ power7_page_sizes_prop, sizeof(power7_page_sizes_prop),
+ power7_segment_sizes_prop, sizeof(power7_segment_sizes_prop),
+ 32, /* SLB
82 matches
Mail list logo