Hello,
I'm using libvirt to manage my KVM instances. I created a VM with
qemu-kvm-0.12, later upgraded to qemu-kvm-0.14 and took a snapshot using
libvirt. As the original VM was created with qemu-kvm-0.12, libvirt
stored pc-0.12 with its XML data. Now I upgraded to qemu-kvm-1.1.2, where
VFIO implements platform independent stuff such as
a PCI driver, BAR access (via read/write on a file descriptor
or direct mapping when possible) and IRQ signaling.
The platform dependent part includes IOMMU initialization
and handling. This patch implements an IOMMU driver for VFIO
which does
The series includes IOMMU implementation and necessary IOMMU groups
initialization.
Alexey Kardashevskiy (2):
vfio powerpc: implemented IOMMU driver for VFIO
vfio powerpc: enabled on powernv platform
arch/powerpc/include/asm/iommu.h |6 +
arch/powerpc/kernel/iommu.c | 141
This patch initializes IOMMU groups based on the IOMMU
configuration discovered during the PCI scan on POWERNV
(POWER non virtualized) platform. The IOMMU groups are
to be used later by VFIO driver (PCI pass through).
It also implements an API for mapping/unmapping pages for
guest PCI drivers and
On Fri, Nov 23, 2012 at 01:17:36PM +0800, Jason Wang wrote:
...
specifying the number of the last transmit and receive queue that
is going to be used; thus out of transmitq0..transmitqn and
receiveq0..receiveqn where n=virtqueue_pairs will be used.
In this description, looks like n+1
On Thu, 22 Nov 2012, Will Deacon wrote:
Hello,
This is version two of the patches I originally posted here:
http://www.spinics.net/lists/kvm/msg82447.html
Changes since version one include:
- MAX_MEMORY no longer needlessly page-aligned for ARM
- Use xread instead of
Gleb Natapov wrote on 2012-11-22:
On Wed, Nov 21, 2012 at 04:09:36PM +0800, Yang Zhang wrote:
Virtual interrupt delivery avoids KVM to inject vAPIC interrupts
manually, which is fully taken care of by the hardware. This needs
some special awareness into existing interrupr injection path:
-
Add RFS support to virtio network device.
Add a new feature flag VIRTIO_NET_F_RFS for this feature, a new
configuration field max_virtqueue_pairs to detect supported number of
virtqueues as well as a new command VIRTIO_NET_CTRL_RFS to program
packet steering for unidirectional protocols.
---
The following changes since commit 1ccbc2851282564308f790753d7158487b6af8e2:
qemu-sockets: Fix parsing of the inet option 'to'. (2012-11-21 12:07:59 +0400)
are available in the git repository at:
git://git.kernel.org/pub/scm/virt/kvm/qemu-kvm.git uq/master
Bruce Rogers (1):
Legacy
From: Bruce Rogers brog...@suse.com
The options no-kvm, no-kvm-pit, no-kvm-pit-reinjection, and no-kvm-irqchip
should be marked as having no argument.
Signed-off-by: Bruce Rogers brog...@suse.com
Reviewed-by: Jan Kiszka jan.kis...@siemens.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
On Fri, Nov 23, 2012 at 9:26 AM, Stefan Hajnoczi stefa...@gmail.com wrote:
Hi George-Cristian,
On IRC you mentioned you found a solution. Any updates? Are you still
seeing the performance problem?
It wasn't a solution, I just thought I knew why. I was thinking the
73Mbps were coming in at
On 22.11.2012, at 10:25, Paul Mackerras wrote:
Currently, if a machine check interrupt happens while we are in the
guest, we exit the guest and call the host's machine check handler,
which tends to cause the host to panic. Some machine checks can be
triggered by the guest; for example, if
Hi Sasha,
On Thu, Nov 22, 2012 at 06:44:34PM +, Sasha Levin wrote:
On 11/22/2012 10:58 AM, Will Deacon wrote:
Commit 29fc7c5a4f516d388fb6e1f6d24bfb04b8093e54 upstream.
rb_erase_augmented() is a static function annotated with
__always_inline. This causes a compile failure when
On Fri, Nov 23, 2012 at 11:22:24AM +, Pekka Enberg wrote:
On Thu, 22 Nov 2012, Will Deacon wrote:
This is version two of the patches I originally posted here:
http://www.spinics.net/lists/kvm/msg82447.html
[...]
I applied patches 1-7. I'll wait for a new revision of the final
This patch adds initial support for ARMv7 processors (more specifically,
Cortex-A15) to kvmtool.
Everything is driven by FDT, including dynamic generation of virtio nodes
for MMIO devices (PCI is not used due to lack of a suitable host-bridge).
The virtual timers and virtual interrupt controller
On 23/11/12 14:40, Will Deacon wrote:
This patch adds initial support for ARMv7 processors (more specifically,
Cortex-A15) to kvmtool.
Everything is driven by FDT, including dynamic generation of virtio nodes
for MMIO devices (PCI is not used due to lack of a suitable host-bridge).
The
On Sat, Nov 10, 2012 at 03:46:05PM +, Christoffer Dall wrote:
From: Marc Zyngier marc.zyng...@arm.com
If we're booted in HYP mode, it is possible that we'll run some
kind of virtualized environment. In this case, it is a better to
switch to the physical timers, and leave the virtual
On Sat, Nov 10, 2012 at 03:46:12PM +, Christoffer Dall wrote:
From: Marc Zyngier marc.zyng...@arm.com
Add some very minimal architected timer related infrastructure.
For the moment, we just provide empty structures, and enable/disable
access to the physical timer across world switch.
On 22.11.2012, at 10:28, Paul Mackerras wrote:
When we change or remove a HPT (hashed page table) entry, we can do
either a global TLB invalidation (tlbie) that works across the whole
machine, or a local invalidation (tlbiel) that only affects this core.
Currently we do local invalidations
On 22.11.2012, at 10:28, Paul Mackerras wrote:
Currently, if the guest does an H_PROTECT hcall requesting that the
permissions on a HPT entry be changed to allow writing, we make the
requested change even if the page is marked read-only in the host
Linux page tables. This is a problem since
On 22.11.2012, at 10:24, Paul Mackerras wrote:
This series of patches fixes various bugs that we have found recently.
The bugs fixed in patches 1, 3 and 4 are also vulnerabilities where
the guest could cause the host to crash or could access host memory
inappropriately. The bug fixed in
On Sat, Nov 10, 2012 at 03:46:19PM +, Christoffer Dall wrote:
From: Marc Zyngier marc.zyng...@arm.com
We can inject a timer interrupt into the guest as a result of
three possible events:
- The virtual timer interrupt has fired while we were still
executing the guest
- The timer
On Sat, Nov 10, 2012 at 03:46:25PM +, Christoffer Dall wrote:
From: Marc Zyngier marc.zyng...@arm.com
Do the necessary save/restore dance for the timers in the world
switch code. In the process, allow the guest to read the physical
counter, which is useful for its own clock_event_device.
On Sat, Nov 10, 2012 at 03:46:32PM +, Christoffer Dall wrote:
From: Marc Zyngier marc.zyng...@arm.com
It is now possible to select CONFIG_KVM_ARM_TIMER to enable the
KVM architected timer support.
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
Signed-off-by: Christoffer Dall
Am 23.11.2012 13:41, schrieb Marcelo Tosatti:
From: Bruce Rogers brog...@suse.com
The options no-kvm, no-kvm-pit, no-kvm-pit-reinjection, and no-kvm-irqchip
should be marked as having no argument.
Signed-off-by: Bruce Rogers brog...@suse.com
Reviewed-by: Jan Kiszka jan.kis...@siemens.com
On 23/11/12 16:17, Will Deacon wrote:
On Sat, Nov 10, 2012 at 03:46:19PM +, Christoffer Dall wrote:
From: Marc Zyngier marc.zyng...@arm.com
We can inject a timer interrupt into the guest as a result of
three possible events:
- The virtual timer interrupt has fired while we were still
On Fri, Nov 23, 2012 at 04:52:12PM +, Marc Zyngier wrote:
On 23/11/12 16:17, Will Deacon wrote:
diff --git a/arch/arm/kvm/reset.c b/arch/arm/kvm/reset.c
index b80256b..7463f5b 100644
--- a/arch/arm/kvm/reset.c
+++ b/arch/arm/kvm/reset.c
@@ -37,6 +37,12 @@ static struct kvm_regs
On 23/11/12 16:30, Will Deacon wrote:
On Sat, Nov 10, 2012 at 03:46:25PM +, Christoffer Dall wrote:
From: Marc Zyngier marc.zyng...@arm.com
Do the necessary save/restore dance for the timers in the world
switch code. In the process, allow the guest to read the physical
counter, which is
On 23/11/12 17:00, Will Deacon wrote:
On Fri, Nov 23, 2012 at 04:52:12PM +, Marc Zyngier wrote:
On 23/11/12 16:17, Will Deacon wrote:
diff --git a/arch/arm/kvm/reset.c b/arch/arm/kvm/reset.c
index b80256b..7463f5b 100644
--- a/arch/arm/kvm/reset.c
+++ b/arch/arm/kvm/reset.c
@@ -37,6
On Thu, Nov 22, 2012 at 11:29 PM, Stefan Hajnoczi stefa...@gmail.com wrote:
On Wed, Nov 21, 2012 at 03:36:50PM -0800, Vincent Li wrote:
We have users running on redhat based distro (Kernel
2.6.32-131.21.1.el6.x86_64 ) with kvm, when customer made cron job
script to copy large files between kvm
Please also post the exact package version you are using - the line
numbers change between releases and depend on which patches have been
applied to the source tree. The distro exact package version allows me
to download the source tree that was used to build this binary and check
the
I am trying to use nested KVM (VMX) to set up Red Hat Enterprise
Virtualization (RHEV) on a single Fedora 17 host. The host hardware is
an Intel DQ67SW board with a Core i7 2600 processor.
I have successfully set up the environment, but I have experienced at
least 2 host kernel panics.
On Fri, Nov 23, 2012 at 04:43:03PM +0100, Alexander Graf wrote:
On 22.11.2012, at 10:28, Paul Mackerras wrote:
- With the possibility of the host paging out guest pages, the use of
H_LOCAL by an SMP guest is dangerous since the guest could possibly
retain and use a stale TLB entry
On Fri, Nov 23, 2012 at 03:13:09PM +0100, Alexander Graf wrote:
On 22.11.2012, at 10:25, Paul Mackerras wrote:
+ /* Do they have an SLB shadow buffer registered? */
+ slb = vcpu-arch.slb_shadow.pinned_addr;
+ if (!slb)
+ return;
Mind to explain this case? What
On Fri, Nov 23, 2012 at 04:47:45PM +0100, Alexander Graf wrote:
On 22.11.2012, at 10:28, Paul Mackerras wrote:
Currently, if the guest does an H_PROTECT hcall requesting that the
permissions on a HPT entry be changed to allow writing, we make the
requested change even if the page is
On Thu, Nov 22, 2012 at 02:21:20PM +0900, Yoshihiro YUNOMAE wrote:
Hi Marcelo,
(2012/11/21 7:51), Marcelo Tosatti wrote:
On Tue, Nov 20, 2012 at 07:36:33PM +0900, Yoshihiro YUNOMAE wrote:
Hi Marcelo,
Sorry for the late reply.
(2012/11/17 4:15), Marcelo Tosatti wrote:
On Wed, Nov 14,
On 22.11.2012, at 10:25, Paul Mackerras wrote:
Currently, if a machine check interrupt happens while we are in the
guest, we exit the guest and call the host's machine check handler,
which tends to cause the host to panic. Some machine checks can be
triggered by the guest; for example, if
On 22.11.2012, at 10:28, Paul Mackerras wrote:
When we change or remove a HPT (hashed page table) entry, we can do
either a global TLB invalidation (tlbie) that works across the whole
machine, or a local invalidation (tlbiel) that only affects this core.
Currently we do local invalidations
On 22.11.2012, at 10:28, Paul Mackerras wrote:
Currently, if the guest does an H_PROTECT hcall requesting that the
permissions on a HPT entry be changed to allow writing, we make the
requested change even if the page is marked read-only in the host
Linux page tables. This is a problem since
On Fri, Nov 23, 2012 at 04:43:03PM +0100, Alexander Graf wrote:
On 22.11.2012, at 10:28, Paul Mackerras wrote:
- With the possibility of the host paging out guest pages, the use of
H_LOCAL by an SMP guest is dangerous since the guest could possibly
retain and use a stale TLB entry
On Fri, Nov 23, 2012 at 03:13:09PM +0100, Alexander Graf wrote:
On 22.11.2012, at 10:25, Paul Mackerras wrote:
+ /* Do they have an SLB shadow buffer registered? */
+ slb = vcpu-arch.slb_shadow.pinned_addr;
+ if (!slb)
+ return;
Mind to explain this case? What
41 matches
Mail list logo