Bugs item #1985977, was opened at 2008-06-06 10:42
Message generated for change (Comment added) made by yunfeng
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1985977&group_id=180599
Please note that this message will contain a full copy of the comment t
I think I have cleared the issue regarding the reverse mapping.
I missed the fact, that the write permission is associated with the PTE.
I thought that it was associated only with the kernel structures
maintaining the physical page-frame.
But I want to confirm whether a shadowed guest page re
Avi Kivity wrote:
> Glauber Costa wrote:
>> There's no need to polute the already poluted CPUState
>> with "ready_for_interrupt_injection". We can compute it
>> in the few times we use it, and be fine.
>>
>
>> #define CPUState CPUIA64State
>> diff --git a/qemu/target-ia64/op_helper.c
>> b/qemu/t
Gerd Hoffmann wrote:
Avi Kivity wrote:
The unshadow-on-userspace-access heuristic is broken. Since it is also
bad for Xenner, try removing the following lines:
spte |= PT_WRITABLE_MASK;
Well, that line should better not be removed. I get a hang otherwise,
guess due to running
Hi Andrea,
On Thu, Jun 05, 2008 at 06:47:17PM +0200, Andrea Arcangeli wrote:
> latest version, I removed ->release already before posting the last
> one because by the time vm destroy runs no more guest mode can run, so
> sptes are irrelevant and no cpu can follow the secondary tlb anymore
> becau
Marcelo Tosatti wrote:
This is a get_user_pages() with hugetlb-vma's bug, not KVM's problem,
fixed by:
commit 5b23dbe8173c212d6a326e35347b038705603d39
Author: Adam Litke <[EMAIL PROTECTED]>
Date: Wed Nov 14 16:59:33 2007 -0800
I'd say so. Just to close the loop here, attached is a trivial
pa
Muli,
The userpsace branch is located at:
git.kernel.org/pub/scm/linux/kernel/git/amit/kvm-userspace.git vtd
I forgot to send out the userspace patch last night. :-)
Allen
>-Original Message-
>From: Muli Ben-Yehuda [mailto:[EMAIL PROTECTED]
>Sent: Tuesday, June 10, 2008 5:53 AM
>To: K
Added vtd.o to Kbuild.
Signed-off-by: Allen M. Kay <[EMAIL PROTECTED]>
-
Vt-d userspace branch located at:
git.kernel.org/pub/scm/linux/kernel/git/amit/kvm-userspace.git vtd
vtd_userspace.patch
Description: vtd_userspace.patch
1 file changed, 2 insertions(+)
qemu/Makefile.target |2 ++
This patch adds a make file dependency for compiling exec.c with archs that
still have dyngen dependencies.
This allows powerpc qemu to now compile without the --disable-cpu-emulation
flag.
Signed-off-by: Jerone Young <[EMAIL PROT
These patches remove all traces of --disable-cpu-emulation configuration flag.
Signed-off-by: Jerone Young <[EMAIL PROTECTED]>
6 files changed, 2 insertions(+), 227 deletions(-)
qemu/Makefile.target |6 --
qemu/configure | 13 -
qemu/target-i386/fake-exec.c | 54 --
6 files changed, 227 deletions(-)
qemu/Makefile.target |4 -
qemu/configure | 13 -
qemu/target-i386/fake-exec.c | 54 -
qemu/target-ia64/fake-exec.c | 44 -
qemu/target-ppc/fake-exec.c | 104 -
On Tue, Jun 10, 2008 at 12:33:49AM +0200, Andrea Arcangeli wrote:
> On Sun, Jun 08, 2008 at 11:35:49PM -0300, Marcelo Tosatti wrote:
> >
> > kvm_mmu_pte_write() does not handle 32-bit non-PAE large page backed
> > guests properly. It will instantiate two 2MB sptes pointing to the same
> > physical
On Tue, Jun 10, 2008 at 10:24:06AM -0500, Anthony Liguori wrote:
> If you add the MMIO page to the IOMMU table, then the behavior is
> going to be identical to what occurs on bare metal which IMHO is a
> good thing. Why jump through hoops to change what may or may not be
> an error condition inste
Muli Ben-Yehuda wrote:
On Tue, Jun 10, 2008 at 10:02:45AM -0500, Anthony Liguori wrote:
Why? Wouldn't MMIO pages have to be mapped in the VT-d page table
in order to support pass-through? It certainly can't hurt, can it?
By MMIO pages we refer to pages which are mapped (or can mappe
On Tue, Jun 10, 2008 at 10:02:45AM -0500, Anthony Liguori wrote:
> Why? Wouldn't MMIO pages have to be mapped in the VT-d page table
> in order to support pass-through? It certainly can't hurt, can it?
By MMIO pages we refer to pages which are mapped (or can mapped) to
device MMIO regions. In o
Muli Ben-Yehuda wrote:
On Tue, Jun 10, 2008 at 09:26:04AM -0500, Anthony Liguori wrote:
Checking against pfn_valid() isn't enough to differentiate between
RAM and MMIO areas. I think the consensus was that we also need to
check PageReserved(), i.e.,
if (pfn_valid(pfn) && !PageReserved(pfn_t
On Tue, Jun 10, 2008 at 09:26:04AM -0500, Anthony Liguori wrote:
>> Checking against pfn_valid() isn't enough to differentiate between
>> RAM and MMIO areas. I think the consensus was that we also need to
>> check PageReserved(), i.e.,
>>
>> if (pfn_valid(pfn) && !PageReserved(pfn_to_page(pfn))) .
Hi all,
I was reading the "The shadowy depths of the KVM MMU" presentation by
Avi Kivity.
From my understanding of shadow page-table,
Guest Page Table : maps GV -> GP
Shadow Page Table : maps GV -> HP
What is meant by shadowed guest page ? (Does it refer to : the guest PT
pages that h
You can find attached to this e-mail an etherboot ROM supporting
virtio-net device.
Laurent
--
- [EMAIL PROTECTED] ---
"The best way to predict the future is to invent it."
- Alan Kay
pxe-virtio.bin
Description: Binary data
This patch allows to boot from network using the virtio-net adapter
provided by KVM.
It applies on etherboot-5.4 sources from
git://git.etherboot.org/scm/etherboot.git
[why etherboot-5.4 ?
because it doesn't hang like gPXE and ROM size is only 32 KB]
Signed-off-by: Laurent Vivier <[EMAIL PROTE
Muli Ben-Yehuda wrote:
On Mon, Jun 09, 2008 at 05:43:15PM -0700, Kay, Allen M wrote:
vt-d specific files in KVM for contructing vt-d page tables and
programming vt-d context entries.
Hi Allen,
Some comments below, patches will follow up.
Signed-off-by: Allen M. Kay <[EMAIL PROTE
If we're not gonna do anything (case in which failure is already
reported), we do not need to even bother with calculating the linear rip.
This is a nitpick, but I saw it while doing some testing, so here's
the patch.
Signed-off-by: Glauber Costa <[EMAIL PROTECTED]>
---
arch/x86/kvm/x86.c |4
Chris Lalancette wrote:
> Attached is a patch for fake emulating Intel perfctr MSRs, similar to the
> recent
> patch to fake emulate the AMD perfctr MSRs. This is needed for a reason
> similar
> for the previous patch; older linux guests (in this case, 2.6.9) can attempt
> to
> access the MSR's
On Mon, Jun 09, 2008 at 05:39:12PM -0700, Kay, Allen M wrote:
> Following four patches contains changes for enabling VT-d PCI
> passthrough. The patches are located at:
>
> git.kernel.org/pub/scm/linux/kernel/git/amit/kvm.git vtd
Allen, which userspace tree did you test this against (branch and
On Mon, Jun 09, 2008 at 05:43:15PM -0700, Kay, Allen M wrote:
> vt-d specific files in KVM for contructing vt-d page tables and
> programming vt-d context entries.
Hi Allen,
Some comments below, patches will follow up.
> Signed-off-by: Allen M. Kay <[EMAIL PROTECTED]>
>
> diff --git a/arch/x86
On Mon, Jun 09, 2008 at 05:41:29PM -0700, Kay, Allen M wrote:
> Modification to intel-iommu.c to support vt-d page table and context
> table mapping in kvm. Mods to dmar.c and iova.c are due to header
> file moves to include/linux.
Hi Allen,
Minor comments below, patches to follow up.
> Signed
hi
in the wiki i read that migration fro amd to intel and back should work.
i tried it several times an i get an error (kernel 2.6.25 / kvm-69):
host a) /usr/bin/kvm -drive file=drive0.qcow2,media=disk,boot=on,if=ide
-net tap,ifname=vnet2 -net nic,model=e1000,macaddr=00:16:3e:7d:8e:96
-monit
Thanks for comments
Basically we are on the same page, while I didn't find your patch about
irq assignment, can you post it in this thread again, thx?
Below patch makes all PCI devices use level-trigger , active low
interrupt, it worked well when running linux guest, I didn't try windows
guest yet
On Jun 10, 2008, at 8:33 AM, Xu, Anthony wrote:
Avi Kivity wrote:
I suggest modifying the firmware to report the interrupts as active
high. Since Xen does not emulate polarity, the change will not
affect
it and the firmware can continue to be shared. I'd also recommend
fixing Xen to emul
29 matches
Mail list logo