On 02/21/2012 07:33 PM, Peter Maydell wrote:
Short summary:
* switch wp groups to bitfield rather than int array
* convert sd.c to use memory_region_init_ram() to allocate the wp groups
(being careful to use memory_region_set_dirty() when we touch them)
* we don't need variable-length
On Tue, Feb 21, 2012 at 09:06:30PM -0500, Jay Mann wrote:
Hi all,
Is there any video driver for KVM that supports HDCP? I'm trying to
run windows media center inside a VM and it's saying the Your
graphics card or driver doesn't support content protection
qxl doesn't support HDCP.
On 02/21/2012 01:00 AM, Zhang, Yang Z wrote:
Thanks, this looks much better! I'll run it through some tests.
We also should try to keep migration working from older versions using the
load_old callback.
Sure, I missed it. Will add it to the version 3.
Any other comments?
Here they
Hi,
We are currently using 2.6.32 kernel and looks like the vhost-net
feature came in 2.6.34.
Using Qemu based I/O seems to be too taxing on our system (network I/O
is the primary application).
We are taking the vhost/net.c code from 2.6.34 kernel, but comparing
to 3.2 kernel, the new code
On Sat, 2012-02-04 at 11:08 +0900, Takuya Yoshikawa wrote:
The latter needs a fundamental change: I heard (from Avi) that we can
change mmu_lock to mutex_lock if mmu_notifier becomes preemptible.
So I was planning to restart this work when Peter's
mm: Preemptibility
Le Sun, Feb 19, 2012 at 11:13:15AM +0200, Gleb Natapov ecrivait :
http://www.roullier.net/report-no-hpet.txt.gz
How have you acquired this trace? It does not trace all kvm events only
those that have set_irq in them.
I run : trace-cmd record -b 2 -e kvm -P process_pid
Hi Stefan,
see below.
On 21.02.2012 17:27, Stefan Hajnoczi wrote:
On Tue, Feb 21, 2012 at 3:57 PM, Dongsu Park
dongsu.p...@profitbricks.com wrote:
...snip...
I'm not sure if O_DIRECT and Linux AIO to /dev/ram0 is a good idea.
At least with tmpfs O_DIRECT does not even work - which kind of
To complete and because I see another thread on performance
trouble with w2008R2
Le Wed, Feb 22, 2012 at 05:33:56PM +0100, David Cure ecrivait :
Nothing particularly strange here. ~1745 IRQs are injected into the
guest each second. RTC clock is configured to 1kH and other devices
On 2012-02-19 21:13, Thomas Fjellstrom wrote:
On Sat Feb 18, 2012, Thomas Fjellstrom wrote:
On Sat Feb 18, 2012, Jan Kiszka wrote:
On 2012-02-18 09:50, Thomas Fjellstrom wrote:
On Sat Feb 18, 2012, Jan Kiszka wrote:
On 2012-02-18 05:49, Thomas Fjellstrom wrote:
I just updated my kvm host,
On 02/21/2012 08:33 PM, Liu Yu-B13201 wrote:
+bool epapr_para_enabled = false;
No need to explicitly initialize to false.
Why not make code more readable?
It's common kernel style to not explicitly initialize global data to
zero or equivalent. Historically this was due to toolchain issues
On 02/20/2012 04:52 PM, Michael S. Tsirkin wrote:
For a pci bridge device, if we don't override
the name with custom code, the bus will be addressed as
id.0, where id is the id specified by the user.
Since PCI Bridge devices have a single bus each, we don't need
the index: address the bus using
On Wed, Feb 22, 2012 at 4:48 PM, Dongsu Park
dongsu.p...@profitbricks.com wrote:
Try turning ioeventfd off for the virtio-blk device:
-device virtio-blk-pci,ioeventfd=off,...
You might see better performance since ramdisk I/O should be very
low-latency. The overhead of using ioeventfd might
https://bugzilla.kernel.org/show_bug.cgi?id=42812
Summary: kvm module has bogus kernel version check
Product: Virtualization
Version: unspecified
Platform: All
OS/Version: Linux
Tree: Mainline
Status: NEW
-Original Message-
From: Paolo Bonzini [mailto:pbonz...@redhat.com]
Sent: Wednesday, February 22, 2012 7:19 PM
0) My alarm tests failed quite badly. :( I attach a patch for kvm-unit-tests
(repository at git://git.kernel.org/pub/scm/virt/kvm/kvm-unit-tests.git).
The tests can be
On 02/23/2012 02:49 AM, Zhang, Yang Z wrote:
6) Setting the clock after 500 ms happens not on every set, but only when
moving
out of divider reset (register A bits 5-7 moving from 110 or 111 to 010).
As far as
I can read, SET prevents the registers from changing value, but keeps the
The following series implements KVM support for ARM processors,
specifically on the Cortex A-15 platform.
The patch series applies to commit 24c9a7d43e695f0183ba99638edfcd265bc7a0ca
on Catalin Marinas' linux-arm-arch tree.
The patch series further depends on these two patches:
From: Christoffer Dall c.d...@virtualopensystems.com
This is a prepatory patch for the KVM/ARM implementation. KVM/ARM will use
the KVM_IRQ_LINE ioctl, which is currently conditional on
__KVM_HAVE_IOAPIC, but ARM obviously doesn't have any IOAPIC support and we
need a separate define.
From: Christoffer Dall c.d...@virtualopensystems.com
Targets KVM support for Cortex A-15 processors.
Contains no real functionality but all the framework components,
make files, header files and some tracing functionality.
“Nothing to see here. Move along, move along...
Most functionality is
From: Christoffer Dall c.d...@virtualopensystems.com
Adds support in the identity mapping feature that allows KVM to setup
identity mapping for the Hyp mode with the AP[1] bit set as required by
the specification and also supports freeing created sub pmd's after
finished use.
These two
From: Christoffer Dall c.d...@virtualopensystems.com
Sets up the required registers to run code in HYP-mode from the kernel.
By setting the HVBAR the kernel can execute code in Hyp-mode with
the MMU disabled. The HVBAR initially points to initialization code,
which initializes other Hyp-mode
From: Christoffer Dall c.d...@virtualopensystems.com
This commit introduces the framework for guest memory management
through the use of 2nd stage translation. Each VM has a pointer
to a level-1 table (the pgd field in struct kvm_arch) which is
used for the 2nd stage translations. Entries are
Userspace can inject IRQs and FIQs through the KVM_IRQ_LINE VM ioctl.
This ioctl is used since the sematics are in fact two lines that can be
either raised or lowered on the VCPU - the IRQ and FIQ lines.
KVM needs to know which VCPU it must operate on and whether the FIQ or
IRQ line is
From: Christoffer Dall c.d...@virtualopensystems.com
Provides complete world-switch implementation to switch to other guests
running in non-secure modes. Includes Hyp exception handlers that
capture necessary exception information and stores the information on
the VCPU and KVM structures.
Adds a new important function in the main KVM/ARM code called
handle_exit() which is called from kvm_arch_vcpu_ioctl_run() on returns
from guest execution. This function examines the Hyp-Syndrome-Register
(HSR), which contains information telling KVM what caused the exit from
the guest.
Some of
From: Christoffer Dall c.d...@virtualopensystems.com
Handles the guest faults in KVM by mapping in corresponding user pages
in the 2nd stage page tables.
Introduces new ARM-specific kernel memory types, PAGE_KVM_GUEST and
pgprot_guest variables used to map 2nd stage memory for KVM guests.
From: Christoffer Dall c.d...@virtualopensystems.com
When the guest accesses I/O memory this will create data abort
exceptions and they are handled by decoding the HSR information
(physical address, read/write, length, register) and forwarding reads
and writes to QEMU which performs the device
When the guest executes a WFI instruction the operation is trapped to
KVM, which emulates the instruction in software. There is no correlation
between a guest executing a WFI instruction and actually putting the
hardware into a low-power mode, since a KVM guest is essentially a
process and the WFI
From: Marc Zyngier marc.zyng...@arm.com
Note: This is an awful hack and will go away as soon as the emulation and
decoding code has been changed to a table-driven approach.
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
arch/arm/kvm/emulate.c | 36
1
On 02/23/2012 02:49 AM, Zhang, Yang Z wrote:
Currently they hang very early because UF is not set. I
attempted to fix that, but ran into other problems. UIP seems
not to be really in sync with the update interrupt, because the
500 ms update tests pass when testing UIP, but not when testing
On 02/21/2012 08:33 PM, Liu Yu-B13201 wrote:
+bool epapr_para_enabled = false;
No need to explicitly initialize to false.
Why not make code more readable?
It's common kernel style to not explicitly initialize global data to
zero or equivalent. Historically this was due to toolchain issues
30 matches
Mail list logo