-Original Message-
From: iommu-boun...@lists.linux-foundation.org [mailto:iommu-
boun...@lists.linux-foundation.org] On Behalf Of Alex Williamson
Sent: Friday, May 24, 2013 10:55 PM
To: alex.william...@redhat.com
Cc: io...@lists.linux-foundation.org; chegu_vi...@hp.com; qemu-
Il 21/05/2013 05:06, Alexey Kardashevskiy ha scritto:
This adds real mode handlers for the H_PUT_TCE_INDIRECT and
H_STUFF_TCE hypercalls for QEMU emulated devices such as virtio
devices or emulated PCI.
Do you mean vio? virtio (without getting into whether that's good or
bad) will bypass the
Il 25/05/2013 04:45, David Gibson ha scritto:
+ case KVM_CREATE_SPAPR_TCE_IOMMU: {
+ struct kvm_create_spapr_tce_iommu create_tce_iommu;
+ struct kvm *kvm = filp-private_data;
+
+ r = -EFAULT;
+ if (copy_from_user(create_tce_iommu, argp,
+
On Sat, May 25, 2013 at 06:44:15AM +0800, Amos Kong wrote:
We can easily reach the 1000 limit by start VM with a couple
hundred I/O devices (multifunction=on). The hardcode limit
already been adjusted 3 times (6 ~ 200 ~ 300 ~ 1000).
In userspace, we already have maximum file descriptor to
On Fri, 2013-05-24 at 16:41 -0300, Marcelo Tosatti wrote:
On Fri, May 24, 2013 at 06:11:16AM -0400, Vadim Rozenfeld wrote:
Is there a better option?
If setting TscSequence to zero makes Windows fall back to the MSR this is a
better option.
+1
This is why MS has two different
On Mon, 20 May 2013, David Daney wrote:
That's rather risky as the implementation of this register (and its
presence in the first place) is processor-specific. Do you maintain a
list of PRId values the use of this register is safe with?
FWIW: The MIPS-VZ architecture module
On Mon, 2013-05-27 at 08:41 +, Sethi Varun-B16395 wrote:
-Original Message-
From: iommu-boun...@lists.linux-foundation.org [mailto:iommu-
boun...@lists.linux-foundation.org] On Behalf Of Alex Williamson
Sent: Friday, May 24, 2013 10:55 PM
To: alex.william...@redhat.com
On 05/27/2013 08:23 PM, Paolo Bonzini wrote:
Il 25/05/2013 04:45, David Gibson ha scritto:
+ case KVM_CREATE_SPAPR_TCE_IOMMU: {
+ struct kvm_create_spapr_tce_iommu create_tce_iommu;
+ struct kvm *kvm = filp-private_data;
+
+ r = -EFAULT;
+ if
On 05/27/2013 08:08 PM, Paolo Bonzini wrote:
Il 21/05/2013 05:06, Alexey Kardashevskiy ha scritto:
This adds real mode handlers for the H_PUT_TCE_INDIRECT and
H_STUFF_TCE hypercalls for QEMU emulated devices such as virtio
devices or emulated PCI.
Do you mean vio? virtio (without getting
Il 27/05/2013 16:26, Alexey Kardashevskiy ha scritto:
On 05/27/2013 08:23 PM, Paolo Bonzini wrote:
Il 25/05/2013 04:45, David Gibson ha scritto:
+ case KVM_CREATE_SPAPR_TCE_IOMMU: {
+ struct kvm_create_spapr_tce_iommu create_tce_iommu;
+ struct kvm *kvm = filp-private_data;
+
Il 08/05/2013 12:10, Paolo Bonzini ha scritto:
The idea of the VIRTIO_BALLOON_F_MUST_TELL_HOST feature is to let drivers
skip usage of the deflate queue when leaking the balloon (silent
deflation). Guests may benefit from silent deflate by aggressively
inflating the balloon; they know that
Fix issues observed with the new layout code, seen
when implementing device in qemu:
- use of uXX in uapi header
- incorrect readonly tag on one field
- unconditional warning breaks builds with -Werr
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
This patch is on
On Mon, May 27, 2013 at 05:55:05PM +0200, Paolo Bonzini wrote:
Il 08/05/2013 12:10, Paolo Bonzini ha scritto:
The idea of the VIRTIO_BALLOON_F_MUST_TELL_HOST feature is to let drivers
skip usage of the deflate queue when leaking the balloon (silent
deflation). Guests may benefit from
Il 27/05/2013 18:04, Michael S. Tsirkin ha scritto:
I don't think we need a new feature. Hosts do not in practice
treat the feature as negative (that is, required), whatever the spec
says. Further, windows guests don't treat it is such either.
Windows guests not treating as such is what makes
On Sun, May 26, 2013 at 05:21:30PM +0300, Michael S. Tsirkin wrote:
If the changes look good, would sched maintainers
please consider merging them through sched/core because of the
interaction with the scheduler?
Please review, and consider for 3.11.
I'll stick them in my queue, we'll see
Providing a devname:kvm module alias enables automatic loading of
the kvm module when /dev/kvm is opened.
Signed-off-by: Cornelia Huck cornelia.h...@de.ibm.com
---
arch/s390/kvm/kvm-s390.c | 9 +
1 file changed, 9 insertions(+)
diff --git a/arch/s390/kvm/kvm-s390.c
This patch enables automatically loading the kvm module when /dev/kvm
is opened, allowing distros to stop loading the module statically.
I think it is trivial enough for 3.10; otherwise, please queue this for 3.11.
Cornelia Huck (1):
KVM: s390: Add devname:kvm alias.
arch/s390/kvm/kvm-s390.c
On Mon, May 27, 2013 at 06:09:54PM +0200, Paolo Bonzini wrote:
Il 27/05/2013 18:04, Michael S. Tsirkin ha scritto:
I don't think we need a new feature. Hosts do not in practice
treat the feature as negative (that is, required), whatever the spec
says. Further, windows guests don't treat it
https://bugzilla.kernel.org/show_bug.cgi?id=58771
--- Comment #1 from Chris ccorm...@gmail.com 2013-05-27 18:37:46 ---
Apologies, mentions of Kernel 2.8.x above should be 2.6.
--
Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email
--- You are receiving this mail
On Tue, May 14, 2013 at 4:11 AM, Marc Zyngier marc.zyng...@arm.com wrote:
At the moment, when mapping a device into Stage-2 for a guest,
we override whatever the guest uses by forcing a device memory
type in Stage-2.
While this is not exactly wrong, this isn't really the spirit of
the
Hi all!
I'm trying libvirt and virt-manager and I found that if I install a
virtual machine with SCSI disks, the installation is done without
problems but when it boots, it is unable to boot from these disks. If I
use bus=sata or bus=virtio, this problem does not happen.
I also tried installing
Il 27/05/2013 22:53, Daniel Guillermo Bareiro ha scritto:
Hi all!
I'm trying libvirt and virt-manager and I found that if I install a
virtual machine with SCSI disks, the installation is done without
problems but when it boots, it is unable to boot from these disks. If I
use bus=sata or
28.05.2013 00:59, Paolo Bonzini wrote:
Thank you Paolo for forwarding this email to me.
Il 27/05/2013 22:53, Daniel Guillermo Bareiro ha scritto:
Hi all!
I'm trying libvirt and virt-manager and I found that if I install a
virtual machine with SCSI disks, the installation is done without
On Sun, May 26, 2013 at 11:26:49AM +0300, Gleb Natapov wrote:
On Fri, May 24, 2013 at 05:23:07PM -0300, Marcelo Tosatti wrote:
Hi Xiao,
On Thu, May 23, 2013 at 03:55:52AM +0800, Xiao Guangrong wrote:
The current kvm_mmu_zap_all is really slow - it is holding mmu-lock to
walk and zap
On 05/27/2013 04:37 AM, Marcelo Tosatti wrote:
On Sun, May 26, 2013 at 11:26:49AM +0300, Gleb Natapov wrote:
On Fri, May 24, 2013 at 05:23:07PM -0300, Marcelo Tosatti wrote:
Hi Xiao,
On Thu, May 23, 2013 at 03:55:52AM +0800, Xiao Guangrong wrote:
The current kvm_mmu_zap_all is really slow -
Hi Alex,
Maik Broemme mbroe...@parallels.com wrote:
Hi Alex,
Alex Williamson alex.william...@redhat.com wrote:
Good to hear. It looks like you have the same motherboard as my AMD
test system. An HD7850 in that system runs quite reliably with the
branches above although I do
On Tue, May 14, 2013 at 12:11:34PM +0100, Marc Zyngier wrote:
The KVM/ARM MMU code doesn't take care of invalidating TLBs before
freeing a {pte,pmd} table. This could cause problems if the page
is reallocated and then speculated into by another CPU.
Reported-by: Catalin Marinas
On Tue, May 14, 2013 at 12:11:35PM +0100, Marc Zyngier wrote:
__kvm_tlb_flush_vmid has been renamed to __kvm_tlb_flush_vmid_ipa,
and the old prototype should have been removed when the code was
modified.
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
arch/arm/include/asm/kvm_asm.h |
On Tue, May 14, 2013 at 12:11:36PM +0100, Marc Zyngier wrote:
Patch 5a677ce044f1 (ARM: KVM: switch to a dual-step HYP init code)
introduced code that flushes page tables to the point of coherency.
This is overkill (point of unification is enough and already done),
and actually not required if
On Tue, May 14, 2013 at 12:11:37PM +0100, Marc Zyngier wrote:
HYP PGDs are passed around as phys_addr_t, except just before calling
into the hypervisor init code, where they are cast to a rather weird
unsigned long long.
Just keep them around as phys_addr_t, which is what makes the most
On Tue, May 14, 2013 at 12:11:38PM +0100, Marc Zyngier wrote:
Admitedly, reading a MMIO register to load PC is very weird.
Writing PC to a MMIO register is probably even worse. But
the architecture doesn't forbid any of these, and injecting
a Prefetch Abort is the wrong thing to do anyway.
On Tue, May 14, 2013 at 12:11:39PM +0100, Marc Zyngier wrote:
S2_PGD_SIZE defines the number of pages used by a stage-2 PGD
and is unused, except for a VM_BUG_ON check that missuses the
define.
As the check is very unlikely to ever triggered except in
circumstances where KVM is the least of
On Tue, May 14, 2013 at 12:11:39PM +0100, Marc Zyngier wrote:
S2_PGD_SIZE defines the number of pages used by a stage-2 PGD
and is unused, except for a VM_BUG_ON check that missuses the
define.
As the check is very unlikely to ever triggered except in
circumstances where KVM is the least of
On Tue, 2013-05-28 at 03:40 +0200, Maik Broemme wrote:
Hi Alex,
Maik Broemme mbroe...@parallels.com wrote:
Hi Alex,
Alex Williamson alex.william...@redhat.com wrote:
Good to hear. It looks like you have the same motherboard as my AMD
test system. An HD7850 in that system
Michael S. Tsirkin m...@redhat.com writes:
Fix issues observed with the new layout code, seen
when implementing device in qemu:
- use of uXX in uapi header
- incorrect readonly tag on one field
- unconditional warning breaks builds with -Werr
Signed-off-by: Michael S.
On Mon, 2013-05-20 at 23:11 +0200, Knut Omang wrote:
On Sun, 2013-05-19 at 22:15 -0600, Alex Williamson wrote:
On Sun, 2013-05-19 at 17:35 +0200, Knut Omang wrote:
On Mon, 2013-05-13 at 16:23 -0600, Alex Williamson wrote:
On Mon, 2013-05-13 at 22:55 +0200, Knut Omang wrote:
Hi all,
Il 21/05/2013 05:06, Alexey Kardashevskiy ha scritto:
This adds real mode handlers for the H_PUT_TCE_INDIRECT and
H_STUFF_TCE hypercalls for QEMU emulated devices such as virtio
devices or emulated PCI.
Do you mean vio? virtio (without getting into whether that's good or
bad) will bypass the
Il 25/05/2013 04:45, David Gibson ha scritto:
+ case KVM_CREATE_SPAPR_TCE_IOMMU: {
+ struct kvm_create_spapr_tce_iommu create_tce_iommu;
+ struct kvm *kvm = filp-private_data;
+
+ r = -EFAULT;
+ if (copy_from_user(create_tce_iommu, argp,
+
On 05/27/2013 08:23 PM, Paolo Bonzini wrote:
Il 25/05/2013 04:45, David Gibson ha scritto:
+ case KVM_CREATE_SPAPR_TCE_IOMMU: {
+ struct kvm_create_spapr_tce_iommu create_tce_iommu;
+ struct kvm *kvm = filp-private_data;
+
+ r = -EFAULT;
+ if
39 matches
Mail list logo