From: Marcelo Tosatti [EMAIL PROTECTED]
The write protect verification in set_spte is unnecessary for page sync.
Its guaranteed that, if the unsync spte was writable, the target page
does not have a write protected shadow (if it had, the spte would have
been write protected under mmu_lock by
From: Avi Kivity [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
diff --git a/kernel/include-compat/asm-x86/msidef.h
b/kernel/include-compat/asm-x86/msidef.h
new file mode 100644
index 000..6706b30
--- /dev/null
+++ b/kernel/include-compat/asm-x86/msidef.h
@@ -0,0 +1,55 @@
From: Jan Kiszka [EMAIL PROTECTED]
Fix condition for the !kvm_enabled() case.
Signed-off-by: Jan Kiszka [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
diff --git a/qemu/hw/apic.c b/qemu/hw/apic.c
index 8836784..6657276 100644
--- a/qemu/hw/apic.c
+++ b/qemu/hw/apic.c
@@ -436,7
From: Sheng Yang [EMAIL PROTECTED]
Distinguish common part for device assignment and INTx part, perparing for
refactor later.
Signed-off-by: Sheng Yang [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
index 4727c08..8966fd1
From: Sheng Yang [EMAIL PROTECTED]
The function is used to dispatch MSI to lapic according to MSI message
address and message data.
Signed-off-by: Sheng Yang [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
index
From: Sheng Yang [EMAIL PROTECTED]
Prepared for kvm_arch_assigned_device_msi_dispatch().
Signed-off-by: Sheng Yang [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
diff --git a/include/linux/kvm.h b/include/linux/kvm.h
index 44fd7fa..bb283c3 100644
--- a/include/linux/kvm.h
+++
From: Jan Kiszka [EMAIL PROTECTED]
Change halt callback in testsuite to conform with latest refactorings.
Signed-off-by: Jan Kiszka [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
diff --git a/user/main.c b/user/main.c
index 70c1da2..dceec99 100644
--- a/user/main.c
+++
From: Sheng Yang [EMAIL PROTECTED]
We enable guest MSI and host MSI support in this patch. The userspace want to
enable MSI should set KVM_DEV_IRQ_ASSIGN_ENABLE_MSI in the assigned_irq's flag.
Function would return -ENOTTY if can't enable MSI, userspace shouldn't set MSI
Enable bit when
From: Glauber Costa [EMAIL PROTECTED]
Currently, we only set the KVM paravirt signature in case
of CONFIG_KVM_GUEST. However, it is possible to have it turned
off, while CONFIG_KVM_CLOCK is turned on. This is also a paravirt
case, and should be shown accordingly.
Signed-off-by: Glauber Costa
From: Sheng Yang [EMAIL PROTECTED]
Separate INTx enabling part to a independence function, so that we can add MSI
enabling part easily.
Signed-off-by: Sheng Yang [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
index
From: Avi Kivity [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c
index 8f60ace..5f87d3e 100644
--- a/arch/x86/kvm/x86_emulate.c
+++ b/arch/x86/kvm/x86_emulate.c
@@ -359,6 +359,12 @@ static u16 group2_table[] = {
From: Mark McLoughlin [EMAIL PROTECTED]
If you run header-sync against a kernel which has asm/kvm.h but not
e.g. asm/vmx.h then $(wildcard $(headers-new)) returns a string with
expanded kvm.h path and the vmx.h glob removed. We then pass the
original globs to rsync causing that to fail when vmx.h
Hi Chris,
On Tue, 25 Nov 2008 19:36:10 -0800, Chris Wright wrote:
commit b41d6cf38e27 (PCI: Check dynids driver_data value for validity)
requires all drivers to include an id table to try and match
driver_data. Before validating driver_data check driver has an id
table.
Sorry for missing
Sheng Yang wrote:
Hi
MSI patchset v6 is coming...
v5-v6
Addressed all comments from Avi on v5. I also set msi2intx=0 in non-x86
architecture machines.
Applied all, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line
On Wed, Nov 26, 2008 at 11:22:03AM +0100, Bj?rn Mork wrote:
Trying to track the current KVM head as closely as possible, I often
find myself wondering which KVM version a particular guest instance is
running. The attached patch adds this information to the monitor
command info version:
Jan Kiszka wrote:
Cleanup redundant check for an open NMI window before injecting. This
will no longer be supported by the kernel, and it was broken by design
anyway.
This change still allows to run the user space against older kernel
modules.
Hm. For interrupts we need to check, since
Add more comments to marker_synchronize_unregister() in order to
reduce the chance of misusing.
Based on comments from Lai Jiangshan [EMAIL PROTECTED].
Cc: Lai Jiangshan [EMAIL PROTECTED]
Cc: Mathieu Desnoyers [EMAIL PROTECTED]
Signed-off-by: Wu Fengguang [EMAIL PROTECTED]
---
I'm still not
Xu, Jiajun wrote:
The call trace messages in guest:
###
Kernel BUG at block/elevator.c:560
invalid opcode: [1] SMP
last sysfs file: /block/hda/removable
This suggests something happened to /dev/hda. Could be a timeout or
something. Are there any messages in the log
Guillaume Thouvenin wrote:
It's the only code with shld instruction. I don't see how you can have
three different shld instructions here. I'm sure that I'm missing
something here because for me, when we emulate the shld instruction, the
code produced is the same. I mean that src.val and dst.val
On Wednesday 26 November 2008, Gleb Natapov wrote:
The interfaces that are being considered are netlink socket (only datagram
semantics, linux specific), new socket family or character device with
different minor number for each channel. Which one better suits for
the purpose? Is there other
Hello Avi,
here are two fixes for kvm on s390.
[PATCH 1/2] kvm-s390: Fix refcounting and allow module unload
[PATCH 2/2] kvm-s390: Fix memory leak of vcpu-run
None of the fixed problems is severe. So I guess this should be scheduled for
the next merge window. Thanks
Christian
--
To
From: Christian Borntraeger [EMAIL PROTECTED]
Currently it is impossible to unload the kvm module on s390.
This patch fixes kvm_arch_destroy_vm to release all cpus.
This make it possible to unload the module.
In addition we stop messing with the module refcount in arch code.
Signed-off-by:
From: Christian Borntraeger [EMAIL PROTECTED]
The s390 backend of kvm never calls kvm_vcpu_uninit. This causes
a memory leak of vcpu-run pages.
Lets call kvm_vcpu_uninit in kvm_arch_vcpu_destroy to free
the vcpu-run.
Signed-off-by: Christian Borntraeger [EMAIL PROTECTED]
Acked-by: Carsten Otte
Avi Kivity [EMAIL PROTECTED] wrote:
Can't the version be determined directly from kernedir itself? e.g.
kerneldir is /lib/modules/$version/build?
How do you get $version if you are crosscompiling? In this case the
usual way of asking uname doesn't work. Instead you somehow need to get
the
On Wed, Nov 26, 2008 at 01:17:55PM +0200, Avi Kivity wrote:
Wu Fengguang wrote:
Add marker_synchronize_unregister() before module unloading.
This prevents possible trace calls into unloaded module text.
Signed-off-by: Wu Fengguang [EMAIL PROTECTED]
---
diff --git a/virt/kvm/kvm_main.c
On Wed, Nov 26, 2008 at 07:46:19PM +0800, Wu Fengguang wrote:
On Wed, Nov 26, 2008 at 01:17:55PM +0200, Avi Kivity wrote:
Wu Fengguang wrote:
Add marker_synchronize_unregister() before module unloading.
This prevents possible trace calls into unloaded module text.
Signed-off-by: Wu
Wu Fengguang wrote:
Add marker_synchronize_unregister() before module unloading.
This prevents possible trace calls into unloaded module text.
Signed-off-by: Wu Fengguang [EMAIL PROTECTED]
---
diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
index a87f45e..64f38b3 100644
---
Marcelo Tosatti wrote:
Here it goes.
KVM: MMU: optimize set_spte for page sync
The write protect verification in set_spte is unnecessary for page sync.
Its guaranteed that, if the unsync spte was writable, the target page
does not have a write protected shadow (if it had, the spte would have
On Wed, Nov 26, 2008 at 8:55 AM, Daniel P. Berrange [EMAIL PROTECTED] wrote:
On Wed, Nov 26, 2008 at 11:22:03AM +0100, Bj?rn Mork wrote:
Trying to track the current KVM head as closely as possible, I often
find myself wondering which KVM version a particular guest instance is
running. The
Han, Weidong wrote:
This patch changes to use new APIs for KVM VT-d, and add device deassignment
for hotplug.
index 44fd7fa..558bc32 100644
--- a/include/linux/kvm.h
+++ b/include/linux/kvm.h
@@ -425,6 +425,8 @@ struct kvm_trace_rec {
struct
Bugs item #2215532, was opened at 2008-11-01 22:58
Message generated for change (Comment added) made by jiajun
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2215532group_id=180599
Please note that this message will contain a full copy of the comment
Simplifies the current code, but more especially, simplifies the
implementation of the mergeable receive buffers scheme.
Signed-off-by: Mark McLoughlin [EMAIL PROTECTED]
---
qemu/hw/virtio-net.c | 27 ++-
1 files changed, 18 insertions(+), 9 deletions(-)
diff --git
The mergeable receive buffer scheme will introduce a new function
which peeks at how much buffer space is available in the queue.
Split out some helper functions from virtqueue_pop() for that purpose.
Signed-off-by: Mark McLoughlin [EMAIL PROTECTED]
---
qemu/hw/virtio.c | 45
virtio_next_desc() is only used in virtqueue_pop(), so move them
alongside one another.
Signed-off-by: Mark McLoughlin [EMAIL PROTECTED]
---
qemu/hw/virtio.c | 30 +++---
1 files changed, 15 insertions(+), 15 deletions(-)
diff --git a/qemu/hw/virtio.c
Currently, in order to receive large packets, the guest must allocate
max-sized packet buffers and pass them to the host. Each of these
max-sized packets occupy 20 ring entries, which means we can only
transfer a maximum of 12 packets in a single batch with a 256 entry
ring.
When receiving
Split virtqueue_push() into two logical steps - adding an element
to the used ring and notifying the other side of added elements.
This is needed because with the mergeable receive buffers scheme we
will add buffers to the used ring as we copy the packet data into them
but we only want to notify
SR-IOV drivers of Intel 82576 NIC are available. There are two parts
of the drivers: Physical Function driver and Virtual Function driver.
The PF driver is based on the IGB driver and is used to control PF to
allocate hardware specific resources and interface with the SR-IOV core.
The VF driver is
On Wed, Nov 26, 2008 at 04:07:01PM +0300, Evgeniy Polyakov wrote:
On Wed, Nov 26, 2008 at 02:39:19PM +0200, Gleb Natapov ([EMAIL PROTECTED])
wrote:
The interfaces that are being considered are netlink socket (only datagram
semantics, linux specific), new socket family or character device
Trying to track the current KVM head as closely as possible, I often
find myself wondering which KVM version a particular guest instance is
running. The attached patch adds this information to the monitor
command info version:
(qemu) info version
0.9.1 (kvm-79)
Signed-off-by: Bjørn Mork
Hello,
I'd like to ask what would be the best user space interface for generic
guest-host communication channel. The channel will be used to pass
mouse events to/from a guest or by managements software to communicate
with agents running in a guests or for something similar.
The interfaces that
This patch makes the IGB driver allocate hardware resource (rx/tx queues)
for Virtual Functions. All operations in this patch are hardware specific.
---
drivers/net/igb/Makefile|2 +-
drivers/net/igb/e1000_82575.c |1 +
drivers/net/igb/e1000_82575.h | 61
This patch integrates the IGB driver with the SR-IOV core. It shows how
the SR-IOV API is used to support the capability. Obviously people does
not need to put much effort to integrate the PF driver with SR-IOV core.
All SR-IOV standard stuff are handled by SR-IOV core and PF driver only
concerns
* Jean Delvare ([EMAIL PROTECTED]) wrote:
As a side note, I am curious what PCI driver we do have which has
driver-probe defined but no driver-id_table. Did you hit an actual
issue or are you fixing a theoretical one?
Such a driver was patch 2/2.
http://lkml.org/lkml/2008/11/26/11
It's meant
Hi all,
Recently I have installed a ubuntu server to use as a virtual host. I need to
install two Windows 2003 R2 SP2 guests on it, and I would like to use virtio
drivers for networking but I see that these drivers only exists for Windows XP
and Windows 2000, is it correct?? can I use it for
On Wed, Nov 26, 2008 at 1:47 PM, carlopmart [EMAIL PROTECTED] wrote:
Hi all,
Recently I have installed a ubuntu server to use as a virtual host. I need
to install two Windows 2003 R2 SP2 guests on it, and I would like to use
virtio drivers for networking but I see that these drivers only
Maik Hentsche wrote:
If the user specified $kerneldir, it should be in the form
/lib/modules/$version/build, no?
Ah sorry, I did not know of this requirement. My kerneldir
is /tmp/linux (I build inside chroot).
I took it from the depmod manpage, but if you're building from
Jan Kiszka wrote:
Hm. For interrupts we need to check, since the interrupt might be
deasserted or masked while the window is closed.
Is there no way that this can happen for NMIs?
In our emulation, but I also think in real life, there is no way to
deassert an NMI. Therefore, our user
Mark McLoughlin wrote:
If you run header-sync against a kernel which has asm/kvm.h but not
e.g. asm/vmx.h then $(wildcard $(headers-new)) returns a string with
expanded kvm.h path and the vmx.h glob removed. We then pass the
original globs to rsync causing that to fail when vmx.h can't be
found:
Bugs item #2351433, was opened at 2008-11-26 17:39
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2351433group_id=180599
Please note that this message will contain a full copy of
Bugs item #2351433, was opened at 2008-11-26 17:39
Message generated for change (Comment added) made by hughesj
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2351433group_id=180599
Please note that this message will contain a full copy of the comment
Subject: Re: Using virtio drivers under Windows 2003 R2 SP2 guest
On Wed, Nov 26, 2008 at 1:47 PM, carlopmart [EMAIL PROTECTED]
wrote:
Hi all,
Recently I have installed a ubuntu server to use as a virtual host. I
need
to install two Windows 2003 R2 SP2 guests on it, and I would like
On Wed, Nov 26, 2008 at 10:21:56PM +0800, Yu Zhao wrote:
This patch integrates the IGB driver with the SR-IOV core. It shows how
the SR-IOV API is used to support the capability. Obviously people does
not need to put much effort to integrate the PF driver with SR-IOV core.
All SR-IOV standard
On Wed, Nov 26, 2008 at 10:40:43PM +0800, Yu Zhao wrote:
The attachment is the VF driver for Intel 82576 NIC.
Please don't attach things as tarballs, we can't review or easily read
them at all.
Care to resend it?
thanks,
greg k-h
--
To unsubscribe from this list: send the line unsubscribe kvm
On Wed, Nov 26, 2008 at 10:03:03PM +0800, Yu Zhao wrote:
SR-IOV drivers of Intel 82576 NIC are available. There are two parts
of the drivers: Physical Function driver and Virtual Function driver.
The PF driver is based on the IGB driver and is used to control PF to
allocate hardware specific
* Greg KH ([EMAIL PROTECTED]) wrote:
+static int
+igb_virtual(struct pci_dev *pdev, int nr_virtfn)
+{
+ unsigned char my_mac_addr[6] = {0x00, 0xDE, 0xAD, 0xBE, 0xEF, 0xFF};
+ struct net_device *netdev = pci_get_drvdata(pdev);
+ struct igb_adapter *adapter =
Bugs item #2351676, was opened at 2008-11-26 12:59
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2351676group_id=180599
Please note that this message will contain a full copy of
Bugs item #2351433, was opened at 2008-11-26 17:39
Message generated for change (Comment added) made by hughesj
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2351433group_id=180599
Please note that this message will contain a full copy of the comment
On Wed, 2008-11-26 at 12:11 -0600, Hollis Blanchard wrote:
From: Anthony Liguori [EMAIL PROTECTED]
Hmm, this is not my patch. :) Let me try again...
--
Hollis Blanchard
IBM Linux Technology Center
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
TARGET_PAGE_SIZE should only be used internal to qemu, not in guest/host
interfaces. The virtio frontend code in Linux uses two constants (PFN shift
and vring alignment) for the interface, so update qemu to match.
I've tested this with PowerPC KVM and confirmed that it fixes virtio problems
when
On Tue, 2008-11-25 at 15:57 -0600, Anthony Liguori wrote:
This has been posted before but I believe it now has addressed all outstanding
concerns. I'd like to apply it if there are no objections.
This patch adds virtio-blk support to QEMU. virtio-blk is a paravirtual disk
controller that
On Wed, 2008-11-26 at 12:22 -0600, Hollis Blanchard wrote:
diff --git a/hw/virtio.h b/hw/virtio.h
index 1df8f83..c23f38c 100644
--- a/hw/virtio.h
+++ b/hw/virtio.h
@@ -47,6 +47,11 @@
/* This means don't interrupt guest when buffer consumed. */
#define VRING_AVAIL_F_NO_INTERRUPT1
Avi Kivity wrote:
Han, Weidong wrote:
In order to support multiple device assignment for KVM, this patch
does following main changes:
- extend dmar_domain to own multiple devices from different
iommus, use a bitmap of iommus to replace iommu pointer in
dmar_domain.
- add a flag
On 11/26/2008 8:58:59 AM, Greg KH wrote:
On Wed, Nov 26, 2008 at 10:21:56PM +0800, Yu Zhao wrote:
This patch integrates the IGB driver with the SR-IOV core. It shows
how the SR-IOV API is used to support the capability. Obviously
people does not need to put much effort to integrate the PF
On Wed, Nov 26, 2008 at 11:27:10AM -0800, Nakajima, Jun wrote:
On 11/26/2008 8:58:59 AM, Greg KH wrote:
On Wed, Nov 26, 2008 at 10:21:56PM +0800, Yu Zhao wrote:
This patch integrates the IGB driver with the SR-IOV core. It shows
how the SR-IOV API is used to support the capability.
Yu Zhao wrote:
SR-IOV drivers of Intel 82576 NIC are available. There are two parts
of the drivers: Physical Function driver and Virtual Function driver.
The PF driver is based on the IGB driver and is used to control PF to
allocate hardware specific resources and interface with the SR-IOV core.
Hi Chris,
On Wed, 26 Nov 2008 07:19:40 -0800, Chris Wright wrote:
* Jean Delvare ([EMAIL PROTECTED]) wrote:
As a side note, I am curious what PCI driver we do have which has
driver-probe defined but no driver-id_table. Did you hit an actual
issue or are you fixing a theoretical one?
[updated patch to include Documentation/markers.txt changes]
Add document and comments on marker_synchronize_unregister(): it
should be called before freeing resources that the probes depend on.
Based on comments from Lai Jiangshan and Mathieu Desnoyers.
Cc: Lai Jiangshan [EMAIL PROTECTED]
Cc:
Wu Fengguang wrote:
[updated patch to include Documentation/markers.txt changes]
Add document and comments on marker_synchronize_unregister(): it
should be called before freeing resources that the probes depend on.
Based on comments from Lai Jiangshan and Mathieu Desnoyers.
Cc: Lai
On Thu, Nov 27, 2008 at 03:23:06AM +0200, Lai Jiangshan wrote:
Wu Fengguang wrote:
[updated patch to include Documentation/markers.txt changes]
Add document and comments on marker_synchronize_unregister(): it
should be called before freeing resources that the probes depend on.
Based
Bugs item #2327497, was opened at 2008-11-22 07:53
Message generated for change (Comment added) made by jiajun
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2327497group_id=180599
Please note that this message will contain a full copy of the comment
On Monday 24 November 2008 19:50:35 Sheng Yang wrote:
Signed-off-by: Sheng Yang [EMAIL PROTECTED]
Oh, hold this one for a moment...
I don't want to deal with compatible problem of deliver msi_msg, so I would
send out gsi-msi mapping patch and update the userspace patch.
--
regards
Yang,
71 matches
Mail list logo