From: Mark McLoughlin mar...@redhat.com
Fixes:
qemu-kvm.h:110: warning: function declaration isn’t a prototype
Signed-off-by: Mark McLoughlin mar...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/qemu/kvm-tpr-opt.c b/qemu/kvm-tpr-opt.c
index f2a3a1e..b3d26aa 100644
---
From: Marcelo Tosatti mtosa...@redhat.com
The destructor for huge pages uses the backing inode for adjusting
hugetlbfs accounting.
Hugepage mappings are destroyed by exit_mmap, after
mmu_notifier_release, so there are no notifications through
unmap_hugepage_range at this point.
The hugetlbfs
Hi,
while trying to run a current openSUSE in VMWare ESX in KVM (using NPT),
some KVM code seems to be stuck in an endless loop. The qemu process
hangs, I can't attach gdb to it and the kernel module seems to be
hanging in a place where I don't see any looping code. One CPU is
definitely stuck in
Current AMD CPUs support masking of CPUID bits. Using this functionality,
a VMM can limit what features are exposed to the guest, even if it's not
using SVM/VMX.
While I'm not aware of any open source hypervisor that uses these MSRs
atm, VMware ESX does and patches exist for Xen, where trapping
Eduardo Habkost wrote:
marker_synchronize_unregister() is available only on 2.6.28. However,
its definition is very simple, so we can define it if it is missing.
This fixes compilation of kvm_trace.c against older kernels.
Applied, thanks.
--
error compiling committee.c: too many
Marcelo Tosatti wrote:
Ok, the bug seems to be gone now. Avi, can you apply the kernel patch
please?
Done.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More
Alexander Graf wrote:
Current AMD CPUs support masking of CPUID bits. Using this functionality,
a VMM can limit what features are exposed to the guest, even if it's not
using SVM/VMX.
While I'm not aware of any open source hypervisor that uses these MSRs
atm, VMware ESX does and patches exist
On 07.01.2009, at 11:07, Avi Kivity wrote:
Alexander Graf wrote:
Current AMD CPUs support masking of CPUID bits. Using this
functionality,
a VMM can limit what features are exposed to the guest, even if
it's not
using SVM/VMX.
While I'm not aware of any open source hypervisor that uses
Mark McLoughlin wrote:
Fixes:
qemu-kvm.h:110: warning: function declaration isn’t a prototype
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
Alexander Graf wrote:
Note that Intel has similar functionality, called FlexMigration IIRC,
likely using different MSRs.
Hum. I'll take a look at it to see if that's as easy to implement then.
It's probably easy (well supporting both might be tricky) but if you
don't have a real test case
Fixes:
qemu-kvm.h:110: warning: function declaration isn’t a prototype
Signed-off-by: Mark McLoughlin mar...@redhat.com
---
qemu/kvm-tpr-opt.c |2 +-
qemu/qemu-kvm.h|2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/qemu/kvm-tpr-opt.c b/qemu/kvm-tpr-opt.c
index
Alexander Graf wrote:
Hi,
while trying to run a current openSUSE in VMWare ESX in KVM (using NPT),
some KVM code seems to be stuck in an endless loop. The qemu process
hangs, I can't attach gdb to it and the kernel module seems to be
hanging in a place where I don't see any looping code. One
Alexander Graf wrote:
Using this patch it works. But if I read it correctly, that doesn't
actually fix anything but only treats NPT/EPT special, which it
shouldn't, should it?
The patch doesn't fix the bug but is nevertheless correct. cr4.pge only
matters to the mmu if using the shadow mmu;
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
include/linux/kvm_host.h |3 ++
virt/kvm/ioapic.c| 84
virt/kvm/irq_comm.c | 86 --
3 files changed, 86 insertions(+), 87 deletions(-)
Avi's purpose, to use single kvm_set_irq() to deal with all interrupt, including
MSI. So here is it.
struct gsi_route_entry is a mapping from a special gsi(with KVM_GSI_MSG_MASK) to
MSI/MSI-X message address/data. And the struct can also be extended for other
purpose.
Now we support up to 256
On Wed, Jan 07, 2009 at 12:19:26PM +0200, Avi Kivity wrote:
Alexander Graf wrote:
Using this patch it works. But if I read it correctly, that doesn't
actually fix anything but only treats NPT/EPT special, which it
shouldn't, should it?
The patch doesn't fix the bug but is nevertheless
Update from v2:
Change API to gsi_route.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
qemu/hw/device-assignment.c | 20
1 files changed, 12 insertions(+), 8 deletions(-)
diff --git a/qemu/hw/device-assignment.c b/qemu/hw/device-assignment.c
index d5eb7b2..f357d17 100644
--- a/qemu/hw/device-assignment.c
This framework can be easily extended to support device capability, like
MSI/MSI-x.
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
qemu/hw/pci.c | 85 +
qemu/hw/pci.h | 30
2 files changed, 115 insertions(+), 0
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
qemu/hw/device-assignment.c | 111 ---
qemu/hw/device-assignment.h |7 +++
2 files changed, 111 insertions(+), 7 deletions(-)
diff --git a/qemu/hw/device-assignment.c b/qemu/hw/device-assignment.c
Which is used later for capability detection.
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
qemu/Makefile.target |1 +
qemu/configure | 20
2 files changed, 21 insertions(+), 0 deletions(-)
diff --git a/qemu/Makefile.target b/qemu/Makefile.target
index
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
libkvm/libkvm.c | 27 +++
libkvm/libkvm.h |8
2 files changed, 35 insertions(+), 0 deletions(-)
diff --git a/libkvm/libkvm.c b/libkvm/libkvm.c
index 0408fdb..6d53f38 100644
--- a/libkvm/libkvm.c
+++
Try to figure out device capability in update_dev_cap(). Now we are only care
about MSI capability.
The function pci_find_cap_offset original function wrote by Allen for Xen.
Notice the function need root privilege to work. This depends on libpci to work.
Signed-off-by: Allen Kay
Alexander Graf wrote:
Well if I could take the FlexMigration design into account when putting
variables in the vcpu context, that'd be great. But I can't seem to find
it in the Intel documentation, so I'll leave it for now.
Not real documentation (tell me if you find some!), but this code shows
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
virt/kvm/irq_comm.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/virt/kvm/irq_comm.c b/virt/kvm/irq_comm.c
index 7460e7f..f5e2d2c 100644
--- a/virt/kvm/irq_comm.c
+++ b/virt/kvm/irq_comm.c
@@ -39,7 +39,7 @@ void
Convert MSI userspace interface to support gsi_msg mapping(and nobody should
be the user of the old interface...).
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
include/linux/kvm_host.h |1 -
virt/kvm/kvm_main.c | 79 ++
2 files
Would be used with bit ops, and would be easily extended if KVM_MAX_VCPUS is
increased.
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
arch/x86/kvm/lapic.c |8
include/linux/kvm_host.h |2 +-
virt/kvm/ioapic.c|4 ++--
virt/kvm/ioapic.h|4 ++--
Prepare to merge with kvm_set_irq().
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
virt/kvm/kvm_main.c |8
1 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
index 0a59245..717e1b0 100644
--- a/virt/kvm/kvm_main.c
+++
It's also convenient when we extend KVM supported vcpu number in the future.
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
arch/x86/kvm/lapic.c |7 ---
virt/kvm/ioapic.c| 24 +---
virt/kvm/irq_comm.c | 17 +
3 files changed, 26
Update from v3:
Addressed Avi's comment, improve struct gsi_route_entry and use a pair of
ioctl to handle them(including some specific interrupt routing) all. Now only
support MSI/MSI-X.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
Using kvm_set_irq to handle all interrupt injection.
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
include/linux/kvm_host.h |2 +-
virt/kvm/irq_comm.c | 79 +++--
virt/kvm/kvm_main.c | 79
On 07.01.2009, at 12:16, Andre Przywara wrote:
Alexander Graf wrote:
Well if I could take the FlexMigration design into account when
putting
variables in the vcpu context, that'd be great. But I can't seem to
find
it in the Intel documentation, so I'll leave it for now.
Not real
Marcelo Tosatti wrote:
Let me shoot at one direction: a shadow page with PGE bit in either
state is created. Later that shadow page is nuked (via mmu notifiers,
for example).
I doubt that mmu notifiers were invoked in this case (the bug would be
very rare); in any case we flush the tlb.
On 07.01.2009, at 11:15, Avi Kivity wrote:
Alexander Graf wrote:
Hi,
while trying to run a current openSUSE in VMWare ESX in KVM (using
NPT),
some KVM code seems to be stuck in an endless loop. The qemu process
hangs, I can't attach gdb to it and the kernel module seems to be
hanging in a
Alexander Graf wrote:
I have CONFIG_LOCKDEP_SUPPORT=y. How do I make it detect that it's
actually locking itself up?
Btw: The issue seems to be easily reproducible :-)
Perhaps CONFIG_PROVE_LOCKING and CONFIG_LOCKDEP. _SUPPORT just
indicates the arch can do it if you want, IIUC.
--
error
Avi Kivity wrote:
Alexander Graf wrote:
I have CONFIG_LOCKDEP_SUPPORT=y. How do I make it detect that it's
actually locking itself up?
Btw: The issue seems to be easily reproducible :-)
Perhaps CONFIG_PROVE_LOCKING and CONFIG_LOCKDEP. _SUPPORT just
indicates the arch can do it if you
On Wed, Jan 07, 2009 at 01:32:41PM +0200, Avi Kivity wrote:
Marcelo Tosatti wrote:
Let me shoot at one direction: a shadow page with PGE bit in either
state is created. Later that shadow page is nuked (via mmu notifiers,
for example).
I doubt that mmu notifiers were invoked in this case
Alexander Graf wrote:
Avi Kivity wrote:
Alexander Graf wrote:
I have CONFIG_LOCKDEP_SUPPORT=y. How do I make it detect that it's
actually locking itself up?
Btw: The issue seems to be easily reproducible :-)
Perhaps CONFIG_PROVE_LOCKING and CONFIG_LOCKDEP. _SUPPORT just
I am using kvm-82 on a 64-bit host and giving my virtual machines routed tap
devices and utilizing proxy arp to provide them connectivity.
My host has two ethernet adapters, one connected to the WAN and the other is a
private link to another server with a private IP address.
Even though I'm
This patch series implements Address Translation Service support for
the Intel IOMMU. ATS provides ability for the PCI Endpoint to request
the DMA address translation from the IOMMU and cache the translation
in the Endpoint to alleviate IOMMU pressure and improve the hardware
performance in the
The ATS spec can be found at http://www.pcisig.com/specifications/iov/ats/
(it requires membership).
Signed-off-by: Yu Zhao yu.z...@intel.com
---
drivers/pci/pci.c| 68 ++
include/linux/pci.h | 15 ++
include/linux/pci_regs.h
Parse the Root Port ATS Capability Reporting Structure in DMA Remapping
Reporting Structure ACPI table.
Signed-off-by: Yu Zhao yu.z...@intel.com
---
drivers/pci/dmar.c | 114 --
include/linux/dmar.h|9 +++
include/linux/intel-iommu.h
Check fault register after submitting an queue invalidation request.
Signed-off-by: Yu Zhao yu.z...@intel.com
---
drivers/pci/dmar.c | 59 +++--
drivers/pci/intr_remapping.c | 21 --
include/linux/intel-iommu.h |4 ++-
3 files
Support device IOTLB invalidation to flush the translation cached in the
Endpoint.
Signed-off-by: Yu Zhao yu.z...@intel.com
---
drivers/pci/dmar.c | 63 --
include/linux/intel-iommu.h | 13 -
2 files changed, 72 insertions(+), 4
Make iommu_flush_iotlb_psi() and flush_unmaps() easier to read.
Signed-off-by: Yu Zhao yu.z...@intel.com
---
drivers/pci/intel-iommu.c | 46 +---
1 files changed, 22 insertions(+), 24 deletions(-)
diff --git a/drivers/pci/intel-iommu.c
Support device IOTLB (i.e. ATS) for both native and KVM environments.
Signed-off-by: Yu Zhao yu.z...@intel.com
---
drivers/pci/intel-iommu.c | 97 +-
include/linux/intel-iommu.h |1 +
2 files changed, 95 insertions(+), 3 deletions(-)
diff --git
Hi Sheng,
On Wed, Jan 07, 2009 at 06:42:37PM +0800, Sheng Yang wrote:
Avi's purpose, to use single kvm_set_irq() to deal with all interrupt,
including
MSI. So here is it.
struct gsi_route_entry is a mapping from a special gsi(with KVM_GSI_MSG_MASK)
to
MSI/MSI-X message address/data. And
Bugs item #2030703, was opened at 2008-07-29 05:05
Message generated for change (Comment added) made by roy-anonymous
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2030703group_id=180599
Please note that this message will contain a full copy of the
Bugs item #2490866, was opened at 2009-01-07 05:10
Message generated for change (Comment added) made by roy-anonymous
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2490866group_id=180599
Please note that this message will contain a full copy of the
virtio-net: Add load/save for status bits
Signed-off-by: Alex Williamson alex.william...@hp.com
---
hw/virtio-net.c | 10 --
1 files changed, 8 insertions(+), 2 deletions(-)
diff --git a/hw/virtio-net.c b/hw/virtio-net.c
index bfb7510..77e3077 100644
--- a/hw/virtio-net.c
+++
virti-net: Enable filtering based on MAC, promisc, broadcast and allmulti
Signed-off-by: Alex Williamson alex.william...@hp.com
---
hw/virtio-net.c | 22 ++
1 files changed, 22 insertions(+), 0 deletions(-)
diff --git a/hw/virtio-net.c b/hw/virtio-net.c
index
virtio-net: Add additional MACs via a filter table
Signed-off-by: Alex Williamson alex.william...@hp.com
---
hw/virtio-net.c | 27 +--
hw/virtio-net.h |4
2 files changed, 29 insertions(+), 2 deletions(-)
diff --git a/hw/virtio-net.c b/hw/virtio-net.c
index
Bugs item #2030703, was opened at 2008-07-28 23:05
Message generated for change (Comment added) made by martinmaurer
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2030703group_id=180599
Please note that this message will contain a full copy of the
This series is based on some of the work Mark McLoughlin has been doing,
so isn't going to apply until that makes it into the tree. The goal is
to enable MAC filtering at the qemu/kvm level for virtio-net packets. I
start by adding the capability to set the MAC address, naming the bits
in the
virtio-net: Allow setting the MAC address via set_config
Rename get_config for simplicity
Signed-off-by: Alex Williamson alex.william...@hp.com
---
hw/virtio-net.c | 21 +++--
1 files changed, 19 insertions(+), 2 deletions(-)
diff --git a/hw/virtio-net.c b/hw/virtio-net.c
virtio-net: Name the status bits, adding promisc and allmulti
Signed-off-by: Alex Williamson alex.william...@hp.com
---
hw/virtio-net.c | 36
hw/virtio-net.h | 11 ++-
2 files changed, 34 insertions(+), 13 deletions(-)
diff --git
This series builds on some of the patches Mark McLoughlin has sent out
recently, so likely won't apply to any current trees until those get
upstream. The goal is to enable MAC filtering at the kvm/qemu level for
virtio-net packets. Promiscuous and allmulti mode are handled by adding
bits to
virtio_net: Enable setting MAC, promisc, and allmulti mode
Signed-off-by: Alex Williamson alex.william...@hp.com
---
drivers/net/virtio_net.c | 79
include/linux/virtio_net.h | 11 ++
2 files changed, 82 insertions(+), 8 deletions(-)
diff
virtio_net: Add MAC fitler table support
Signed-off-by: Alex Williamson alex.william...@hp.com
---
drivers/net/virtio_net.c | 52 +---
include/linux/virtio_net.h |6 -
2 files changed, 54 insertions(+), 4 deletions(-)
diff --git
Alex Williamson wrote:
virtio-net: Name the status bits, adding promisc and allmulti
Signed-off-by: Alex Williamson alex.william...@hp.com
---
hw/virtio-net.c | 36
hw/virtio-net.h | 11 ++-
2 files changed, 34 insertions(+), 13 deletions(-)
Alex Williamson wrote:
virtio-net: Add load/save for status bits
Signed-off-by: Alex Williamson alex.william...@hp.com
---
hw/virtio-net.c | 10 --
1 files changed, 8 insertions(+), 2 deletions(-)
diff --git a/hw/virtio-net.c b/hw/virtio-net.c
index bfb7510..77e3077 100644
---
On Wed, 2009-01-07 at 12:09 -0600, Anthony Liguori wrote:
Alex Williamson wrote:
virtio-net: Name the status bits, adding promisc and allmulti
I'd prefer the use of #define's like we have today. bit fields have
really weird packing and ordering properties across architectures.
Ok,
Alex Williamson wrote:
This series builds on some of the patches Mark McLoughlin has sent out
recently, so likely won't apply to any current trees until those get
upstream. The goal is to enable MAC filtering at the kvm/qemu level for
virtio-net packets. Promiscuous and allmulti mode are
Hi Rusty,
On Fri, 2008-12-12 at 18:34 +1030, Rusty Russell wrote:
On Thursday 11 December 2008 05:04:44 Mark McLoughlin wrote:
On Tue, 2008-12-09 at 21:11 -0600, Anthony Liguori wrote:
Rusty Russell wrote:
On Wednesday 10 December 2008 08:02:14 Anthony Liguori wrote:
It would be
On Wed, 2009-01-07 at 12:14 -0600, Anthony Liguori wrote:
Alex Williamson wrote:
As noted in the RFC thread adding the kvm/qemu backing, this does
increase the size of the virtio-net device I/O port space, up to 1kB
with PCI rounding if we add a 4k entry VLAN bitmap. A 64 device limit
Alex Williamson wrote:
On Wed, 2009-01-07 at 12:14 -0600, Anthony Liguori wrote:
Alex Williamson wrote:
As noted in the RFC thread adding the kvm/qemu backing, this does
increase the size of the virtio-net device I/O port space, up to 1kB
with PCI rounding if we add a 4k entry VLAN
On 07.01.2009, at 14:53, Avi Kivity a...@redhat.com wrote:
Alexander Graf wrote:
Avi Kivity wrote:
Alexander Graf wrote:
I have CONFIG_LOCKDEP_SUPPORT=y. How do I make it detect that it's
actually locking itself up?
Btw: The issue seems to be easily reproducible :-)
Perhaps
On Fri, Dec 26, 2008 at 04:00:28PM -0500, John Morrissey wrote:
I'm encountering a kernel BUG() in guests using SCSI-interfaced disk
images. I've tried with the Debian packaging of KVM 79 and 82; both
exhibit the same behavior (disclaimer: Debian has about a dozen patches in
their kvm
On Wed, Jan 07, 2009 at 06:42:41PM +0800, Sheng Yang wrote:
Using kvm_set_irq to handle all interrupt injection.
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
include/linux/kvm_host.h |2 +-
virt/kvm/irq_comm.c | 79 +++--
Bugs item #2030703, was opened at 2008-07-29 00:05
Message generated for change (Comment added) made by thekozmo
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2030703group_id=180599
Please note that this message will contain a full copy of the comment
Better separate the bitmap patches from this series to ease merging of
the MSI changes.
On Wed, Jan 07, 2009 at 06:42:45PM +0800, Sheng Yang wrote:
Would be used with bit ops, and would be easily extended if KVM_MAX_VCPUS is
increased.
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
Bugs item #2493108, was opened at 2009-01-08 12:53
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2493108group_id=180599
Please note that this message will contain a full copy of
Hi all
This piece of code puzzled me at all time:
virt/kvm/kvm_main.c:assigned_device_update_intx()
if (airq-host_irq)
adev-host_irq = airq-host_irq;
else
adev-host_irq = adev-dev-irq;
I don't know why we can let
vtd.c has been renamed to iommu.c, need to change it in Kbuild accordingly.
Signed-off-by: Wei Huang wei.w.hu...@intel.com
---
kernel/x86/Kbuild |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/kernel/x86/Kbuild b/kernel/x86/Kbuild
index c4723b1..48339b4 100644
---
74 matches
Mail list logo