From: Dong, Eddie [EMAIL PROTECTED]
Remove the redundant level check when fetching
shadow pte for present non-present spte.
Signed-off-by: Yaozu (Eddie) Dong [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/x86/kvm/paging_tmpl.h |7 ++-
1 files changed, 2
Add a facility to report on accesses to the local apic tpr even if the
local apic is emulated in the kernel. This is basically a hack that
allows userspace to patch Windows which tends to bang on the tpr a lot.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/x86/kvm/lapic.c | 21
This adds a mechanism for exposing the virtual apic tpr to the guest, and a
protocol for letting the guest update the tpr without causing a vmexit if
conditions allow (e.g. there is no interrupt pending with a higher priority
than the new tpr).
Signed-off-by: Avi Kivity [EMAIL PROTECTED
Since gfn_to_page() is a sleeping function, and we want to make the core mmu
spinlocked, we need to pass the page from the walker context (which can sleep)
to the shadow context (which cannot).
[marcelo: avoid recursive locking of mmap_sem]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch
-mode.
And get rid of the lockless __gfn_to_page.
[avi: move kvm_mmu_pte_write() locking inside the function]
[avi: add locking for real mode]
[avi: fix cmpxchg locking]
Signed-off-by: Marcelo Tosatti [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/x86/kvm/mmu.c
From: Marcelo Tosatti [EMAIL PROTECTED]
Convert the synchronization of the shadow handling to a separate mmu_lock
spinlock.
Also guard fetch() by mmap_sem in read-mode to protect against alias
and memslot changes.
Signed-off-by: Marcelo Tosatti [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL
From: Zhang Xiantao [EMAIL PROTECTED]
Signed-off-by: Zhang Xiantao [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/irq.h | 18 --
drivers/kvm/kvm.h | 18 +++---
drivers/kvm/x86.h |1 -
3 files changed, 19 insertions(+), 18
From: Marcelo Tosatti [EMAIL PROTECTED]
Emulate cmpxchg8b atomically on i386. This is required to avoid a guest
pte walker from seeing a splitted write.
[avi: make it compile]
Signed-off-by: Marcelo Tosatti [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/x86.c
-thru in switch statement]
Signed-off-by: Joerg Roedel [EMAIL PROTECTED]
Signed-off-by: Markus Rechberger [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/svm.c | 13 +
1 files changed, 13 insertions(+), 0 deletions(-)
diff --git a/drivers/kvm/svm.c b
Fifth set of kvm updates scheduled for the 2.6.25 merge window. Please
review. Diffstat below is for this batch only.
I haven't yet implemented the previous comments, so code that is copied from
previous patches may have the same issue.
arch/x86/Kconfig |
This release greatly improves the performance of smp guests. Desktops
users may also enjoy support for widescreen resolutions.
Changes from kvm-58:
- merge qemu-cvs
- -drive cache=[on|off] option
- adds scsi passthrough
- ide lba48 support for 120GB+ disk images
- widescreen resolutions
Balaji Rao wrote:
Hello people!
I am new to the KVM community. I found it really exciting and am interested
in
contributing to the project. I found a TODO list at the site and decided to
work on the following one.
Add a qemu interface for sharing memory between guests. Using a pci
Anthony Liguori wrote:
This patch adds support to QEMU for extboot. It requires that an extboot.bin
binary be copied into the pc-bios directory or else make install will not
function properly.
To use extboot to boot from an arbitrary block device, simply append a
,boot=on to the block
Jeremy Katz wrote:
On Wed, 2008-01-02 at 19:13 +0200, Avi Kivity wrote:
Can you try the option '-no-kvm' both with kvm-57 and kvm-58?
-no-kvm works. I can hit this just booting a live CD both on a 32bit
and a 64bit host. It looks like compatibility with old kernels is
broken
Anthony Liguori wrote:
Hi,
I've posted a repo that contains my initial attempt at backporting the
virtio modules. I've tested against a 2.6.22, 2.6.20, and 2.6.18 kernel
(although I haven't tried the block device against 2.6.18). It requires
Rusty's patch queue plus the three patches I
Guido Guenther wrote:
On Fri, Dec 28, 2007 at 10:53:53PM +0200, Izik Eidus wrote:
Guido Guenther wrote:
[..snip..]
kvm-58 doesn't show this problem, thanks! The host runs stable now.
I'm still seeing network stalls on large transfers in the guest though.
Ifup/ifdown'ing the
Anthony Liguori wrote:
This patch adds support to QEMU for extboot. It requires that an extboot.bin
binary be copied into the pc-bios directory or else make install will not
function properly.
To use extboot to boot from an arbitrary block device, simply append a
,boot=on to the block
Jerry Geis wrote:
I dont exactly know what SDL is.
All I know is when I am at my desk everything is working fine...
Then I go home and use vncviewer machine to remote into my desktop.
Everything runs normal of course but when I select my minimized kvm session,
it maximizes but I cannot click
Zhang, Xiantao wrote:
From 49f958530791c3adcf2ceca922b890bffe62e848 Mon Sep 17 00:00:00 2001
From: Zhang Xiantao [EMAIL PROTECTED]
Date: Thu, 3 Jan 2008 13:42:40 +0800
Subject: [PATCH] kvm: qemu/ia64: Set the number of max virtual processor
to 4 for ia64
Set max number of virtual processors
Zhang, Xiantao wrote:
From 1099b09bcdde9a80c5b0383cd063af6ad9ca18e5 Mon Sep 17 00:00:00 2001
From: Zhang Xiantao [EMAIL PROTECTED]
Date: Thu, 3 Jan 2008 17:22:36 +0800
Subject: [PATCH] kvm: qemu : Add check for guest firmware.
Add the existence check before reading the image.
Applied,
Jerone Young wrote:
# HG changeset patch
# User Jerone Young [EMAIL PROTECTED]
# Date 1199304626 21600
# Node ID 2eddb4bcae5e444ba12b2d8985e494342e505131
# Parent 8161d444f7c37be9bdbfaac338d58301b00f2961
Add powerpc libkvm support code
This patch adds implimentation code need for powerpc
Jerone Young wrote:
That would be my sketchy idea. Though I was going to wait and see what
the feedback would be doing this :-) It can go either way. Since it's
just callbacks it really doesn't matter. But it does affect the
structure size never the less.
So what are everyone thoughs about
Jerone Young wrote:
# HG changeset patch
# User Jerone Young [EMAIL PROTECTED]
# Date 1199306048 21600
# Node ID da73eaf107eb8800f27e3bc045a2de28c476b07d
# Parent bf828ac70dde1dfa4f67e4774a884669306423e6
Fix up kvm-powerpc.h in libkvm
This patch fixes up kvm-powerpc.h. Adds proper
Guido Guenther wrote:
On Thu, Jan 03, 2008 at 07:11:32PM +0100, Guido Guenther wrote:
simulate the pressing of a fixed feature acpi power button. The patch
has one issue though, it currently needs --no-kvm-irqchip (see my other
mail). Please apply if appropriate.
When running
Carlo Marcelo Arenas Belon wrote:
On Tue, Jan 01, 2008 at 06:37:23PM +0200, Avi Kivity wrote:
Carlo Marcelo Arenas Belon wrote:
if nothing is available hp's testdrive have some itanium systems that
could be
used at least to validate the userspace part builds (as I did) :
http
Carlo Marcelo Arenas Belon wrote:
Avi,
now that vgabios has been merged, would be probably a good idea to remove the
unused vgabios BLOBs in the bios directory which were left from the import of
the BOCHS bios (I have a patch but felt bad about sending it out with up to
96K) :
Dong, Eddie wrote:
clean the redundant level check when fetching
shadow pte for present non-present spte.
Applied, thanks.
--
error compiling committee.c: too many arguments to function
-
This SF.net email is
Carlo Marcelo Arenas Belon wrote:
We also need to upload the ia64 firmware for kvm, and make it
available for users use. At least, we need to provide the binary.
beware that actually providing the binary without sources might be a problem
for some distributions (like debian and
Dong, Eddie wrote:
Current shadow code do prefetch in FNAME(prefetch_page), but it is only
used
to choose shadow_notrap_nonpresent_pte or shadow_trap_nonpresent_pte.
At least for L1 shadow, prefetching to get exact shadow L1 pte won't
cause
performance regression (though handling time
Zhang, Xiantao wrote:
Note that we ship x86 binaries for two reasons:
- qemu does it that way, and we inherited it, before the need arose to
make modifications
- obscure tools are needed to build the binaries (iasl and dev86)
Since ia64 doesn't have these issues (is that right?) then we can
Richard W.M. Jones wrote:
I've just got an upgrade to KVM-58 as part of the latest Fedora.
Unfortunately my existing VM (a Windows 2008 Server instance) no
longer boots. In fact it hardly gets anywhere at all. Immediately
after running qemu-kvm, I just get a black screen (no BIOS/boot
Richard W.M. Jones wrote:
Please try reverting the attached patch (or applying it to a working
version).
If that doesn't work, try bios.bin from a working version with a
non-working qemu.
No, I'm afraid that taking kvm-58 and applying that patch reversed (to
remove it) does not work.
Richard W.M. Jones wrote:
Avi Kivity wrote:
If that doesn't work, try bios.bin from a working version with a
non-working qemu.
I've just read the second part now ...
I took bios.bin, vgabios.bin and vgabios-cirrus.bin from KVM-57 and
used them to overwrite the corresponding files in KVM
Richard W.M. Jones wrote:
Avi Kivity wrote:
Richard W.M. Jones wrote:
Avi Kivity wrote:
If that doesn't work, try bios.bin from a working version with a
non-working qemu.
I've just read the second part now ...
I took bios.bin, vgabios.bin and vgabios-cirrus.bin from KVM-57 and
used
Anthony Liguori wrote:
I think we should hold off on this sort of patch at first. I know it
improves performance, but it's very hack-ish. I have a similar patch[1]
that improves performance more but is even more hack-ish.
I think we have to approach this by not special cases virtio-net to
Carlo Marcelo Arenas Belon wrote:
Avi, how would you like patches to fix build issues in ia64 to be handled?,
should be expected that kvm releases build for ia64? is there any system that
could be used as part of a compile farm / testing for ia64?
In theory every commit should compile and
Converting last uses along the way.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/kvm.h |1 -
drivers/kvm/mmu.c | 21 +++--
2 files changed, 3 insertions(+), 19 deletions(-)
diff --git a/drivers/kvm/kvm.h b/drivers/kvm/kvm.h
index 31315bc..1fd8158 100644
Rename the awkwardly named variable.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/mmu.c |8
1 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/drivers/kvm/mmu.c b/drivers/kvm/mmu.c
index 86896da..0cb6580 100644
--- a/drivers/kvm/mmu.c
+++ b/drivers/kvm
Fourth set of kvm updates scheduled for the 2.6.25 merge window. Please
review. Diffstat below is for this batch only.
arch/x86/Kconfig |4 +
drivers/kvm/Kconfig |4 +-
drivers/kvm/i8259.c |1 +
drivers/kvm/ioapic.c | 36 ++--
drivers/kvm/iodev.h |
These are traditionally named 'page', but even more traditionally, that name
is reserved for variables that point to a 'struct page'. Rename them to 'sp'
(for shadow page).
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/mmu.c | 300
We don't want the meaning of guest userspace changing under our feet.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/kvm.h |1 +
drivers/kvm/kvm_main.c |9 +
kernel/fork.c |1 +
3 files changed, 11 insertions(+), 0 deletions(-)
diff --git a/drivers
Kenigsberg [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/x86.c | 331 +++--
drivers/kvm/x86.h |2 +-
include/asm-x86/kvm.h | 21 +++
include/linux/kvm.h |4 +
4 files changed, 348 insertions(+), 10
From: Sheng Yang [EMAIL PROTECTED]
The state of SECONDARY_VM_EXEC_CONTROL shouldn't depend on in-kernel IRQ chip,
this patch fix this.
Signed-off-by: Sheng Yang [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/vmx.c | 17 +++--
1 files changed, 7
mmio was already handled in kvm_arch_vcpu_ioctl_run(), so no need to check
again.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/x86.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/drivers/kvm/x86.c b/drivers/kvm/x86.c
index 2be5936..5e58156 100644
From: Izik Eidus [EMAIL PROTECTED]
Mark guest pages as accessed when removed from the shadow page tables for
better lru processing.
Signed-off-by: Izik Eidus [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/mmu.c |2 ++
1 files changed, 2 insertions(+), 0
From: Zhang Xiantao [EMAIL PROTECTED]
Non-x86 archs don't need this mechanism. Move it to arch, and
keep its interface in common.
Signed-off-by: Zhang Xiantao [EMAIL PROTECTED]
Acked-by: Carsten Otte [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/kvm_main.c | 14
this distinction.
Signed-off-by: Guillaume Thouvenin [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/x86_emulate.c |4 +++-
drivers/kvm/x86_emulate.h |4
2 files changed, 7 insertions(+), 1 deletions(-)
diff --git a/drivers/kvm/x86_emulate.c b/drivers/kvm
From: Sheng Yang [EMAIL PROTECTED]
Previous patches have removed the dependency on cr2; we can now stop passing
it to the emulator and rename uses to 'memop'.
Signed-off-by: Sheng Yang [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/x86.c |1 -
drivers
. libkvm)
for other archs since a size cannot be determined for these
structures.
Signed-off-by: Jerone Young [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
include/linux/Kbuild |2 +-
include/linux/kvm.h |2 ++
2 files changed, 3 insertions(+), 1 deletions(-)
diff --git
From: Zhang Xiantao [EMAIL PROTECTED]
Other archs doesn't need it.
Signed-off-by: Zhang Xiantao [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/kvm_main.c | 29 -
drivers/kvm/x86.c | 29 +
2 files
The rep prefix cleanup left two switch () statements next to each other.
Unify them.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/x86_emulate.c | 50
1 files changed, 23 insertions(+), 27 deletions(-)
diff --git a/drivers/kvm
Currently, make headers_check barfs due to asm/kvm.h, which linux/kvm.h
includes, not existing. Rather than add a zillion asm/kvm.hs, export kvm.h
only if the arch actually supports it.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/x86/Kconfig |4
drivers/kvm/Kconfig |4
From: Zhang Xiantao [EMAIL PROTECTED]
iosapic supports an additional mmio EOI register compared to ioapic.
Signed-off-by: Zhang Xiantao [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/ioapic.c |5 +
1 files changed, 5 insertions(+), 0 deletions(-)
diff
No longer used.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/kvm.h |1 -
drivers/kvm/mmu.c |9 -
2 files changed, 0 insertions(+), 10 deletions(-)
diff --git a/drivers/kvm/kvm.h b/drivers/kvm/kvm.h
index eda82cd..31315bc 100644
--- a/drivers/kvm/kvm.h
+++ b
From: Guillaume Thouvenin [EMAIL PROTECTED]
Add emulation for the cmps instruction. This lets OpenBSD boot on kvm.
Signed-off-by: Guillaume Thouvenin [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/x86_emulate.c | 58
-off-by: Carlo Marcelo Arenas Belon [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/svm.c | 17 +++--
1 files changed, 7 insertions(+), 10 deletions(-)
diff --git a/drivers/kvm/svm.c b/drivers/kvm/svm.c
index 928fb35..04e6b39 100644
--- a/drivers/kvm
From: Hollis Blanchard [EMAIL PROTECTED]
Signed-off-by: Hollis Blanchard [EMAIL PROTECTED]
Acked-by: Carsten Otte [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/iodev.h| 63
drivers/kvm/irq.h |1
From: Hollis Blanchard [EMAIL PROTECTED]
This abstracts the detail of x86 hlt and INIT modes into a function.
Signed-off-by: Hollis Blanchard [EMAIL PROTECTED]
Acked-by: Carsten Otte [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/kvm_main.c |3 +--
drivers/kvm
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/svm.c | 12 ++--
drivers/kvm/vmx.c | 11 +--
2 files changed, 3 insertions(+), 20 deletions(-)
diff --git a/drivers/kvm/svm.c b/drivers/kvm/svm.c
index b896614..8b1cc60 100644
--- a/drivers/kvm/svm.c
+++ b/drivers
With apic in userspace, we must exit to userspace after a cr8 write in order
to update the tpr. But if the apic is in the kernel, the exit is unnecessary.
Noticed by Joerg Roedel.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/vmx.c |2 ++
1 files changed, 2 insertions(+), 0
From: Zhang Xiantao [EMAIL PROTECTED]
Signed-off-by: Zhang Xiantao [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/kvm_main.c | 28 +++-
1 files changed, 15 insertions(+), 13 deletions(-)
diff --git a/drivers/kvm/kvm_main.c b/drivers/kvm
We prepare eflags for the emulated instruction, then clobber it with an 'andl'.
Fix by popping eflags as the last thing in the sequence.
Patch taken from Xen (16143:959b4b92b6bf)
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/x86_emulate.c | 30 +++---
1
, so it gets its own treatment).
This fixes random crashes on Vista x64.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/x86_emulate.c | 27 +++
1 files changed, 15 insertions(+), 12 deletions(-)
diff --git a/drivers/kvm/x86_emulate.c b/drivers/kvm
From: Zhang Xiantao [EMAIL PROTECTED]
Change
dest_Loest_Prio - IOAPIC_LOWEST_PRIORITY
dest_Fixed - IOAPIC_FIXED
the original names are x86 specific, while the ioapic code will be reused
for ia64.
Signed-off-by: Zhang Xiantao [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED
From: Zhang Xiantao [EMAIL PROTECTED]
This patch replaces lapic structure with kvm_vcpu in ioapic.c, making ioapic
independent of the local apic, as required by ia64.
Signed-off-by: Zhang Xiantao [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/ioapic.c | 18
Rechberger [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/x86.c |5 +
1 files changed, 5 insertions(+), 0 deletions(-)
diff --git a/drivers/kvm/x86.c b/drivers/kvm/x86.c
index 6deb052..9db4e32 100644
--- a/drivers/kvm/x86.c
+++ b/drivers/kvm/x86.c
@@ -2236,6
From: Hollis Blanchard [EMAIL PROTECTED]
Signed-off-by: Hollis Blanchard [EMAIL PROTECTED]
Acked-by: Carsten Otte [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/kvm.h | 21 ++---
drivers/kvm/types.h | 41
From: Marcelo Tosatti [EMAIL PROTECTED]
Signed-off-by: Marcelo Tosatti [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/paging_tmpl.h |3 ---
1 files changed, 0 insertions(+), 3 deletions(-)
diff --git a/drivers/kvm/paging_tmpl.h b/drivers/kvm/paging_tmpl.h
This allows us to remove its dependency on pt_element_t.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/paging_tmpl.h | 17 +++--
1 files changed, 7 insertions(+), 10 deletions(-)
diff --git a/drivers/kvm/paging_tmpl.h b/drivers/kvm/paging_tmpl.h
index 179ce9e
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/paging_tmpl.h | 20 +---
1 files changed, 13 insertions(+), 7 deletions(-)
diff --git a/drivers/kvm/paging_tmpl.h b/drivers/kvm/paging_tmpl.h
index 59ba752..1fc4f9b 100644
--- a/drivers/kvm/paging_tmpl.h
+++ b/drivers
From: Hollis Blanchard [EMAIL PROTECTED]
Signed-off-by: Hollis Blanchard [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/i8259.c|1 +
drivers/kvm/irq.h |7 ++-
drivers/kvm/kvm.h |9 -
drivers/kvm/kvm_main.c |3 ---
drivers
Later we may be able to use the virtual tpr feature, but for now,
just trap it.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/svm.c |8 ++--
drivers/kvm/svm.h |1 +
2 files changed, 7 insertions(+), 2 deletions(-)
diff --git a/drivers/kvm/svm.c b/drivers/kvm/svm.c
by setting the nx bit on shadow ptes.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/paging_tmpl.h |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/drivers/kvm/paging_tmpl.h b/drivers/kvm/paging_tmpl.h
index 7688cbf..59ba752 100644
--- a/drivers/kvm
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/mmu.c |2 +-
drivers/kvm/svm.c | 35 ---
drivers/kvm/vmx.c | 32
drivers/kvm/x86.c | 17 -
drivers/kvm/x86.h |4 ++--
5 files changed, 19
Currently rep processing is handled somewhere in the middle of instruction
processing. Move it to a sensible place.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/x86_emulate.c | 70 +++--
1 files changed, 36 insertions(+), 34 deletions
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/mmu.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/kvm/mmu.c b/drivers/kvm/mmu.c
index a91e05b..b4dd726 100644
--- a/drivers/kvm/mmu.c
+++ b/drivers/kvm/mmu.c
@@ -888,9 +888,9 @@ static void
From: [EMAIL PROTECTED] [EMAIL PROTECTED]
Signed-off-by: Nick Piggin [EMAIL PROTECTED]
Cc: kvm-devel@lists.sourceforge.net
Cc: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/kvm_main.c | 42 +++---
1 files
We already set it according to cumulative access permissions.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/paging_tmpl.h |1 -
1 files changed, 0 insertions(+), 1 deletions(-)
diff --git a/drivers/kvm/paging_tmpl.h b/drivers/kvm/paging_tmpl.h
index 211fef8..179ce9e 100644
]
Signed-off-by: Marcelo Tosatti [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/paging_tmpl.h | 36 ++--
1 files changed, 34 insertions(+), 2 deletions(-)
diff --git a/drivers/kvm/paging_tmpl.h b/drivers/kvm/paging_tmpl.h
index
From: Joerg Roedel [EMAIL PROTECTED]
This patch fixes a compile error of the LAPIC code with APIC debugging enabled.
Signed-off-by: Joerg Roedel [EMAIL PROTECTED]
Signed-off-by: Markus Rechberger [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/lapic.c |2 +-
1
Unused.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/paging_tmpl.h |7 +++
1 files changed, 3 insertions(+), 4 deletions(-)
diff --git a/drivers/kvm/paging_tmpl.h b/drivers/kvm/paging_tmpl.h
index ca8d515..2e5a80a 100644
--- a/drivers/kvm/paging_tmpl.h
+++ b/drivers/kvm
When we emulate a guest pte write, we fail to apply the correct inherited
permissions from the parent ptes. Now that we store inherited permissions
in the shadow page, we can use that to update the pte permissions correctly.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/kvm.h
From: Joerg Roedel [EMAIL PROTECTED]
With this patch KVM on SVM will exit to userspace if the guest writes to CR8
and the in-kernel APIC is disabled.
Signed-off-by: Joerg Roedel [EMAIL PROTECTED]
Signed-off-by: Markus Rechberger [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED
Unify the special instruction switch with the regular instruction switch,
and the two byte special instruction switch with the regular two byte
instruction switch. That makes it much easier to find an instruction or
the place an instruction needs to be added in.
Signed-off-by: Avi Kivity [EMAIL
calculations in that.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/mmu.c | 14 +++---
drivers/kvm/paging_tmpl.h | 58 +---
2 files changed, 43 insertions(+), 29 deletions(-)
diff --git a/drivers/kvm/mmu.c b/drivers/kvm/mmu.c
index
.
Signed-off-by: Marcelo Tosatti [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/mmu.c | 12
drivers/kvm/paging_tmpl.h | 29 +
2 files changed, 29 insertions(+), 12 deletions(-)
diff --git a/drivers/kvm/mmu.c b
As set_pte() no longer references either a gpte or the guest walker, we can
move it out of paging mode dependent code (which compiles twice and is
generally nasty).
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/mmu.c | 83
drivers
Zhang, Xiantao wrote:
if nothing is available hp's testdrive have some itanium systems
that could be used at least to validate the userspace part builds
(as I did) :
http://www.testdrive.hp.com/systems/itanium.shtml
I prefer a cross compiler, but if that turns out to
Zhang, Xiantao wrote:
I tried setting up a crosstool environment, but I couldn't get
binutils (2.18 and 2.18.50.0.3) to build (FC6 and F8, both x86_64).
Frankly speaking, I have no experience on it. But seems this page can
help us :
Sam Ravnborg wrote:
On Tue, Jan 01, 2008 at 05:35:47PM +0200, Avi Kivity wrote:
Currently, make headers_check barfs due to asm/kvm.h, which linux/kvm.h
includes, not existing. Rather than add a zillion asm/kvm.hs, export kvm.h
only if the arch actually supports it.
Signed-off-by: Avi
Carlo Marcelo Arenas Belon wrote:
if nothing is available hp's testdrive have some itanium systems that could be
used at least to validate the userspace part builds (as I did) :
http://www.testdrive.hp.com/systems/itanium.shtml
I signed up for an account, but they don't allow ssh
Avi Kivity wrote:
The following patchset, based on Marcelo's original mmu scaling patch,
allows the kvm guest walker to run concurrently. Shadow pagetable
manipulation is still single threaded.
Handling pte writes is similar to an early version of the patchset: the page
is derived from
Marcelo Tosatti wrote:
kvm_mmu_pte_write() already holds mmap_sem in read-mode, so this is not
required (and is deadlock prone actually).
Thanks, I merged your fix into the patch.
--
error compiling committee.c: too many arguments to function
Since gfn_to_page() is a sleeping function, and we want to make the core mmu
spinlocked, we need to pass the page from the walker context (which can sleep)
to the shadow context (which cannot).
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/x86/kvm/mmu.c | 58
The following patchset, based on Marcelo's original mmu scaling patch,
allows the kvm guest walker to run concurrently. Shadow pagetable
manipulation is still single threaded.
Handling pte writes is similar to an early version of the patchset: the page
is derived from the guest pte being
From: Marcelo Tosatti [EMAIL PROTECTED]
Convert the synchronization of the shadow handling to a separate mmu_lock
spinlock.
Also guard fetch() by mmap_sem in read-mode to protect against alias
and memslot changes.
Signed-off-by: Marcelo Tosatti [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL
Carlo Marcelo Arenas Belon wrote:
This patch complement 6eabe2ba30a673c4280df75b28520e0e1f4a2171 so that
all callbacks used for MMIO read/write use the ABI exported in libkvm.h.
This fixes the following warnings was reported at compile time :
main.c:392: warning: initialization from
Carlo Marcelo Arenas Belon wrote:
This reverts commit a2c1905ff7c6faf9253d4185952a5b85036114f7.
It was made obsolete by 3f5daaafad51a2b75171c2a93a28cc55ce205cae
and would redefine MAX_IO_APIC to a smaller value in amd64 that
the one used by asm/apicdef.h for non SMP kernels 2.6.21
Avi Kivity wrote:
From: Marcelo Tosatti [EMAIL PROTECTED]
Do not hold kvm-lock mutex across the entire pagefault code,
only acquire it in places where it is necessary, such as mmu
hash list, active list, rmap and parent pte handling.
Allow concurrent guest walkers by switching walk_addr
Avi Kivity wrote:
Avi Kivity wrote:
From: Marcelo Tosatti [EMAIL PROTECTED]
Do not hold kvm-lock mutex across the entire pagefault code,
only acquire it in places where it is necessary, such as mmu
hash list, active list, rmap and parent pte handling.
Allow concurrent guest walkers
1101 - 1200 of 3824 matches
Mail list logo