On 08/03/2012 05:40 AM, Jens Axboe wrote:
On 08/02/2012 08:25 AM, Asias He wrote:
Hi folks,
This version added REQ_FLUSH and REQ_FUA support as suggested by Christoph and
rebased against latest linus's tree.
Jens, could you please consider picking up the dependencies 1/4 and
2/4 in your tree.
Current kvmppc_booke_handlers uses the same macro (KVM_HANDLER) and
all handlers are considered to be the same size. This will not be
the case if we want to use different macros for different handlers.
This patch improves the kvmppc_booke_handler so that it can
support different macros for
From: Bharat Bhushan bharat.bhus...@freescale.com
IAC/DAC are defined as 32 bit while they are 64 bit wide. So ONE_REG
interface is added to set/get them.
Signed-off-by: Bharat Bhushan bharat.bhus...@freescale.com
---
arch/powerpc/include/asm/kvm.h | 12 ++
Installed debug handler will be used for guest debug support and
debug facility emulation features (patches for these features
will follow this patch).
Signed-off-by: Liu Yu yu@freescale.com
[bharat.bhus...@freescale.com: Substantial changes]
Signed-off-by: Bharat Bhushan
On 08/03/2012 06:28 AM, Michael S. Tsirkin wrote:
On Thu, Aug 02, 2012 at 02:25:55PM +0800, Asias He wrote:
diff --git a/drivers/block/virtio_blk.c b/drivers/block/virtio_blk.c
index c0bbeb4..95cfeed 100644
--- a/drivers/block/virtio_blk.c
+++ b/drivers/block/virtio_blk.c
@@ -14,6 +14,9 @@
Il 02/08/2012 22:21, Erik Lotspeich ha scritto:
Hi,
I haven't seen this question asked before. Is it possible to mount an
audio CD is a raw mode to that a VM instance can access the audio
tracks as if it were a physical CD-ROM drive? It seems that the current
implementation presents a
There are two bugs:
- the 'error page' is forgot to be released
[ it is unneeded after commit a2766325cf9f9, for backport, we
still do kvm_release_pfn_clean for the error pfn ]
- guest pages are always released regardless of the unmapped page
(e,g, caused by hwpoison)
Signed-off-by: Xiao
After that, the exported and un-inline function, get_fault_pfn,
can be removed
Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com
---
arch/x86/kvm/mmu.c |2 +-
include/linux/kvm_host.h |3 ++-
virt/kvm/kvm_main.c | 12 +++-
3 files changed, 6
Then, get_hwpoison_pfn and is_hwpoison_pfn can be removed
Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com
---
arch/x86/kvm/mmu.c |2 +-
include/linux/kvm_host.h |2 +-
virt/kvm/kvm_main.c | 13 +
3 files changed, 3 insertions(+), 14 deletions(-)
Then, remove get_bad_pfn
Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com
---
include/linux/kvm_host.h |1 +
virt/kvm/kvm_main.c |7 +--
2 files changed, 2 insertions(+), 6 deletions(-)
diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h
index
These functions are exported and can not inline, move them
to kvm_host.h to eliminate the overload of function call
Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com
---
include/linux/kvm_host.h | 19 ---
virt/kvm/kvm_main.c | 18 --
2 files
Remove it since it is not used anymore
Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com
---
include/linux/kvm_host.h |2 --
1 files changed, 0 insertions(+), 2 deletions(-)
diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h
index f604d1d..bdf2182 100644
---
It is used to eliminate the overload of function call and cleanup
the code
Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com
---
include/linux/kvm_host.h |9 +++--
virt/kvm/async_pf.c |2 +-
virt/kvm/kvm_main.c | 13 +
3 files changed, 9
After commit a2766325cf9f9, the error pfn is replaced by the
error code, it need not be released anymore
[ The patch has been compiling tested for powerpc ]
Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com
---
arch/powerpc/kvm/e500_tlb.c |1 -
arch/x86/kvm/mmu.c |
After commit a2766325cf9f9, the error page is replaced by the
error code, it need not be released anymore
[ The patch has been compiling tested for powerpc ]
Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com
---
arch/powerpc/kvm/44x_tlb.c |1 -
arch/powerpc/kvm/book3s_pr.c |
Currently, we use the error code as error pfn to indicat the error
condition, it is not straightforward and it will not work on PAE
32-bit cpu with huge memory, since the valid physical address
can be at most 52 bits
For the normal pfn, the highest 12 bits should be zero, so we can
mask these
On 08/02/2012 09:14 PM, Marcelo Tosatti wrote:
On Sun, Jul 29, 2012 at 04:18:58PM +0800, Xiao Guangrong wrote:
After commit a2766325cf9f9, the error pfn is replaced by the
error code, it need not be released anymore
[ The patch is compiling tested for powerpc ]
Signed-off-by: Xiao Guangrong
On 08/03/2012 05:25 AM, Nadav Har'El wrote:
On Thu, Aug 02, 2012, Xiao Guangrong wrote about Re: [PATCH 02/10] nEPT: Add
EPT tables support to paging_tmpl.h:
+ #ifdef CONFIG_X86_64
+ #define PT_MAX_FULL_LEVELS 4
+ #define CMPXCHG cmpxchg
+ #else
+ #define CMPXCHG cmpxchg64
+
Marcelo, Paul,
Thanks for your review!
On 08/03/2012 08:01 AM, Paul Mackerras wrote:
On Thu, Aug 02, 2012 at 10:15:27AM -0300, Marcelo Tosatti wrote:
Remind me what is the guarantee that -Exxx does not clash with
a valid pfn number?
A pfn number is an address PAGE_SHIFT, so it will have
From: Jan Kiszka jan.kis...@siemens.com
Drop pci_map_irq/piix_get_irq in favor of upstream's new interface. This
should also properly model disabling of the line at PCI host controller
level.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
hw/device-assignment.c | 29
From: Jan Kiszka jan.kis...@siemens.com
Replace the hack in pci_default_write_config with upstream's generic
callback mechanism to get informed about changes on the PCI INTx
routing.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
hw/Makefile.objs |3 +--
hw/device-assignment.c |
Subject: Re: Nested kvm_intel broken on pre 3.3 hosts
No, you're backporting the entire feature. All we need is to expose
RDPMC intercept to the guest.
Oh well, I thought that was the thing you asked for...
It should be sufficient to backport the bits in
nested_vmx_setup_ctls_msrs() and
No, you're backporting the entire feature. All we need is to expose
RDPMC intercept to the guest.
Oh well, I thought that was the thing you asked for...
It should be sufficient to backport the bits in
nested_vmx_setup_ctls_msrs() and nested_vmx_exit_handled().
Ok, how about that? It is
The code creating the symlink from linux-headers/asm to the
architecture specific linux-headers/asm-$arch directory was
implicitly hardcoding a list of KVM supporting architectures.
Add a default case for the common Linux architecture name and
QEMU CPU name match case, so future architectures will
On Fri, 2012-08-03 at 12:52 +0200, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
Replace the hack in pci_default_write_config with upstream's generic
callback mechanism to get informed about changes on the PCI INTx
routing.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
From: Jan Kiszka jan.kis...@siemens.com
Drop pci_map_irq/piix_get_irq in favor of upstream's new interface. This
should also properly model disabling of the line at PCI host controller
level.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
Changes in v2:
- always set intx_route.irq to -1
On 2012-08-03 17:35, Alex Williamson wrote:
On Fri, 2012-08-03 at 12:52 +0200, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
Replace the hack in pci_default_write_config with upstream's generic
callback mechanism to get informed about changes on the PCI INTx
routing.
On Fri, 2012-08-03 at 19:02 +0200, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
Drop pci_map_irq/piix_get_irq in favor of upstream's new interface. This
should also properly model disabling of the line at PCI host controller
level.
Signed-off-by: Jan Kiszka
On Wed, Aug 01, 2012 at 05:01:42PM +0300, Gleb Natapov wrote:
When MSR_KVM_PV_EOI_EN was added to msrs_to_save array
KVM_SAVE_MSRS_BEGIN was not updated accordingly.
Signed-off-by: Gleb Natapov g...@redhat.com
Applied, thanks.
--
To unsubscribe from this list: send the line unsubscribe kvm
Linus,
Please pull from
git://git.kernel.org/pub/scm/virt/kvm/kvm.git master
To receive the following KVM _bug fixes_:
- Fix DS/ES segment register corruption on x86_32.
- Fix kvmclock wallclock migration offset.
- Fix PIT interrupt ACK vs system reset logic bug.
Avi Kivity (1):
On Fri, Aug 03, 2012 at 02:41:13PM -0300, Marcelo Tosatti wrote:
On Fri, Aug 03, 2012 at 06:20:18AM +1000, Benjamin Herrenschmidt wrote:
On Thu, 2012-08-02 at 15:35 +0300, Avi Kivity wrote:
This is actually documented in api.txt, though not in relation to
reset:
NOTE: For
On Fri, Aug 03, 2012 at 11:25:44AM +0530, Nikunj A Dadhania wrote:
On Thu, 2 Aug 2012 16:56:28 -0300, Marcelo Tosatti mtosa...@redhat.com
wrote:
+ case MSR_KVM_VCPU_STATE:
+ vcpu-arch.v_state.vs_page = gfn_to_page(vcpu-kvm, data
PAGE_SHIFT);
+
On Fri, Aug 03, 2012 at 11:07:13AM +0530, Nikunj A Dadhania wrote:
On Thu, 2 Aug 2012 17:16:41 -0300, Marcelo Tosatti mtosa...@redhat.com
wrote:
On Thu, Aug 02, 2012 at 05:14:02PM -0300, Marcelo Tosatti wrote:
On Tue, Jul 31, 2012 at 04:19:02PM +0530, Nikunj A. Dadhania wrote:
From:
On Tue, Jul 31, 2012 at 07:18:17PM +0800, riegama...@gmail.com wrote:
From: Dunrong Huang riegama...@gmail.com
Add a helper function for fetching max cpus supported by kvm.
Make QEMU exit with an error message if smp_cpus exceeds limit
of VCPU count retrieved by invoking this helper
On Fri, Aug 03, 2012 at 01:51:25PM +0100, Peter Maydell wrote:
The code creating the symlink from linux-headers/asm to the
architecture specific linux-headers/asm-$arch directory was
implicitly hardcoding a list of KVM supporting architectures.
Add a default case for the common Linux
On Fri, Aug 03, 2012 at 03:36:52PM +0800, Xiao Guangrong wrote:
There are two bugs:
- the 'error page' is forgot to be released
[ it is unneeded after commit a2766325cf9f9, for backport, we
still do kvm_release_pfn_clean for the error pfn ]
- guest pages are always released regardless
kvm_guest_time_update unconditionally clears hv_clock.flags field,
so the notification never reaches the guest.
Fix it by allowing PVCLOCK_GUEST_STOPPED to passthrough.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/arch/x86/include/asm/kvm_host.h
On Fri, 2012-08-03 at 14:41 -0300, Marcelo Tosatti wrote:
Hrm, except that doing KVM_RUN with a signal is very cumbersome to do
and I couldn't quite find the logic in qemu to do it ... but I might
just have missed it. I can see indeed that in the migration case you
want to actually
On Fri, 2012-08-03 at 15:05 -0300, Marcelo Tosatti wrote:
See kvm_arch_process_async_events() call to qemu_system_reset_request()
in target-i386/kvm.c.
The whole thing is fragile, though: we rely on the order events
are processed inside KVM_RUN, in x86:
1) If there is pending MMIO,
Installed debug handler will be used for guest debug support and
debug facility emulation features (patches for these features
will follow this patch).
Signed-off-by: Liu Yu yu@freescale.com
[bharat.bhus...@freescale.com: Substantial changes]
Signed-off-by: Bharat Bhushan
Ten komunikat jest z gospodarzem centrum wszystkich naszych właścicieli kont.
Jesteśmy w trakcie modernizacji naszej bazy danych i e-mail centrum na ten rok
2012. Jesteśmy usunięcie wszystkich
niewykorzystane konto aby utworzyć więcej miejsca dla nowych raz i aby zapobiec
spamu. Tuż przed Ta
On Jul 9, 2012, at 8:04 AM, Varun Sethi wrote:
Added CPU_FTR_EMB_HV feature check for e550.
Signed-off-by: Varun Sethi varun.se...@freescale.com
Signed-off-by: Mihai Caraman mihai.cara...@freescale.com
---
arch/powerpc/kernel/cpu_setup_fsl_booke.S |6 ++
1 files changed, 6
On Fri, Aug 03, 2012 at 06:20:18AM +1000, Benjamin Herrenschmidt wrote:
On Thu, 2012-08-02 at 15:35 +0300, Avi Kivity wrote:
This is actually documented in api.txt, though not in relation to
reset:
NOTE: For KVM_EXIT_IO, KVM_EXIT_MMIO and KVM_EXIT_OSI, the
corresponding operations
On Fri, Aug 03, 2012 at 02:41:13PM -0300, Marcelo Tosatti wrote:
On Fri, Aug 03, 2012 at 06:20:18AM +1000, Benjamin Herrenschmidt wrote:
On Thu, 2012-08-02 at 15:35 +0300, Avi Kivity wrote:
This is actually documented in api.txt, though not in relation to
reset:
NOTE: For
On Fri, 2012-08-03 at 15:05 -0300, Marcelo Tosatti wrote:
See kvm_arch_process_async_events() call to qemu_system_reset_request()
in target-i386/kvm.c.
The whole thing is fragile, though: we rely on the order events
are processed inside KVM_RUN, in x86:
1) If there is pending MMIO,
45 matches
Mail list logo