From: Marcelo Tosatti mtosa...@redhat.com
Always invalidate spte and flush TLBs when changing page size, to make
sure different sized translations for the same address are never cached
in a CPU's TLB.
Currently the only case where this occurs is when a non-leaf spte pointer is
overwritten by a
In common cases, guest SRAO MCE will cause corresponding poisoned page
be un-mapped and SIGBUS be sent to QEMU-KVM, then QEMU-KVM will relay
the MCE to guest OS.
But it is reported that if the poisoned page is accessed in guest
after un-mapped and before MCE is relayed to guest OS, QEMU-KVM will
Apply the cpumask and cgroup of the initializing task to the created
vhost poller.
Based on Sridhar Samudrala's patch. Li Zefan spotted a bug in error
path, fixed.
Cc: Michael S. Tsirkin m...@redhat.com
Cc: Sridhar Samudrala samudrala.srid...@gmail.com
Cc: Li Zefan l...@cn.fujitsu.com
---
On 05/31/2010 03:07 AM, Li Zefan wrote:
04:24, Tejun Heo wrote:
From: Sridhar Samudrala samudrala.srid...@gmail.com
Add a new kernel API to attach a task to current task's cgroup
in all the active hierarchies.
Signed-off-by: Sridhar Samudrala s...@us.ibm.com
Acked-by: Li Zefan
On 05/30/10 13:22, Michael S. Tsirkin wrote:
On Fri, May 28, 2010 at 11:56:54AM +0200, Jes Sorensen wrote:
It looks pretty good to me, however one thing I have been thinking of
while reading through it:
Rather than storing a pointer within the ring struct, pointing into a
position within the
poller = kthread_create(vhost_poller, dev, vhost-%d, current-pid);
- if (IS_ERR(poller))
- return PTR_ERR(poller);
+ if (IS_ERR(poller)) {
+ ret = PTR_ERR(poller);
+ goto out;
here...
+ }
+
+ ret = sched_getaffinity(current-pid,
On Thu, 27 May 2010 05:20:35 am Michael S. Tsirkin wrote:
Here's a rewrite of the original patch with a new layout.
I haven't tested it yet so no idea how this performs, but
I think this addresses the cache bounce issue raised by Avi.
Posting for early flames/comments.
Sorry, not without some
The containing function is called from several places. At one of them, in
the function __sigp_stop, the spin lock fi-lock is held.
[...]
Signed-off-by: Julia Lawall ju...@diku.dk
Acked-by: Christian Borntraeger borntrae...@de.ibm.com
[...]
--- a/arch/s390/kvm/sigp.c
+++
There's no need to calculate quadrant if tdp is enabled.
Signed-off-by: Gui Jianfeng guijianf...@cn.fujitsu.com
---
arch/x86/kvm/mmu.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index 0bb9f17..431863b 100644
---
Hi,
Also it's worth mentioning that I am still running C: on QEMU IDE
emulation, as I could not quite figure out how to boot for a megasas LD
with option-rom. What QEMU CLI ops where requried to make this work
again..?
-option-rom $file
or
-device megasas,romfile=$file
cheers,
Gerd
On 05/31/10 03:42, Nicholas A. Bellinger wrote:
From: Nicholas Bellingern...@linux-iscsi.org
Greetings Gerd, Kevin and Co,
Attached are two patches to add the necesary CDB parsing to determine
SCSIRequest-cmd.xfer
(length) and SCSIRequest-cmd.mode (direction) for Persistent Reservation IN/OUT
Apply the cpumask and cgroup of the initializing task to the created
vhost poller.
Based on Sridhar Samudrala's patch. Li Zefan spotted a bug in error
path (twice), fixed (twice).
Cc: Michael S. Tsirkin m...@redhat.com
Cc: Sridhar Samudrala samudrala.srid...@gmail.com
Cc: Li Zefan
On 05/31/2010 09:28 AM, Huang Ying wrote:
In common cases, guest SRAO MCE will cause corresponding poisoned page
be un-mapped and SIGBUS be sent to QEMU-KVM, then QEMU-KVM will relay
the MCE to guest OS.
But it is reported that if the poisoned page is accessed in guest
after un-mapped and
On 05/31/2010 05:13 AM, Xiao Guangrong wrote:
Avi Kivity wrote:
On 05/30/2010 03:37 PM, Xiao Guangrong wrote:
Using kvm_mmu_prepare_zap_page() and kvm_mmu_commit_zap_page() to
split kvm_mmu_zap_page() function, then we can:
- traverse hlist safely
- easily to gather remote tlb
On 05/31/2010 05:00 AM, Xiao Guangrong wrote:
+
+#define for_each_gfn_indirect_sp(kvm, sp, gfn, pos, n)\
+ hlist_for_each_entry_safe(sp, pos, n,\
+kvm-arch.mmu_page_hash[kvm_page_table_hashfn(gfn)], hash_link)\
+if (sp-gfn == gfn
Only test legal action so far, we can extend it later.
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
kvm/test/config-x86-common.mak |5 +-
kvm/test/x86/xsave.c | 173
2 files changed, 177 insertions(+), 1 deletions(-)
create mode
On Thursday 27 May 2010 18:02:31 Avi Kivity wrote:
On 05/27/2010 12:48 PM, Sheng Yang wrote:
This patch enable save/restore of xsave state.
Signed-off-by: Sheng Yangsh...@linux.intel.com
---
arch/x86/include/asm/kvm.h | 29
arch/x86/kvm/x86.c | 79
On 05/31/2010 02:21 PM, Sheng Yang wrote:
Need to reserve way more space here for future xsave growth. I think at
least 4K. LRB wa 32x512bit = 1K (though it probably isn't a candidate
for vmx). Would be good to get an opinion from your processor architects.
I don't think we need to detail
On 05/30/2010 06:19 PM, Marcelo Tosatti wrote:
On Sun, May 30, 2010 at 01:28:19PM +0300, Avi Kivity wrote:
On 05/28/2010 03:44 PM, Marcelo Tosatti wrote:
Always invalidate spte and flush TLBs when changing page size, to make
sure different sized translations for the same address are
On 05/30/2010 05:53 PM, Michael S. Tsirkin wrote:
So what I suggested is failing any kind of access until iommu
is assigned.
So, the kernel driver must be aware of the iommu. In which case it may
as well program it.
--
I have a truly marvellous patch that fixes the bug which this
From: Dexuan Cui dexuan@intel.com
This patch enable guest to use XSAVE/XRSTOR instructions.
We assume that host_xcr0 would use all possible bits that OS supported.
And we loaded xcr0 in the same way we handled fpu - do it as late as we can.
Signed-off-by: Dexuan Cui dexuan@intel.com
On Mon, May 31, 2010 at 05:16:42PM +0930, Rusty Russell wrote:
On Thu, 27 May 2010 05:20:35 am Michael S. Tsirkin wrote:
Here's a rewrite of the original patch with a new layout.
I haven't tested it yet so no idea how this performs, but
I think this addresses the cache bounce issue raised
On Mon, May 31, 2010 at 09:36:00AM +0200, Jes Sorensen wrote:
On 05/30/10 13:22, Michael S. Tsirkin wrote:
On Fri, May 28, 2010 at 11:56:54AM +0200, Jes Sorensen wrote:
It looks pretty good to me, however one thing I have been thinking of
while reading through it:
Rather than storing a
On Sun, May 30, 2010 at 12:14:21PM +0300, Avi Kivity wrote:
On 05/27/2010 07:02 PM, Glauber Costa wrote:
+
+Custom MSR list
+
+
+The current supported Custom MSR list is:
+
+MSR_KVM_WALL_CLOCK: 0x11
+
+ data: physical address of a memory area.
Which must be in guest RAM
On 05/31/2010 04:49 PM, Glauber Costa wrote:
How are we failing to meet it? All guests align to at least four bytes.
static struct pvclock_wall_clock wall_clock;
Unless there is something that the compiler does that I should take for granted,
there is no alignment directive in there,
On 05/30, Tejun Heo wrote:
This conversion is to make each vhost use a dedicated kthread so that
resource control via cgroup can be applied.
Personally, I agree. I think This is better than play with workqueue thread.
A couple of simple questions after the quick glance at the unapplied
Hello,
On 05/31/2010 04:39 PM, Oleg Nesterov wrote:
On 05/30, Tejun Heo wrote:
This conversion is to make each vhost use a dedicated kthread so that
resource control via cgroup can be applied.
Personally, I agree. I think This is better than play with workqueue thread.
Yeap, I think so
On Sun, May 30, 2010 at 10:24:01PM +0200, Tejun Heo wrote:
Replace vhost_workqueue with per-vhost kthread. Other than callback
argument change from struct work_struct * to struct vhost_poll *,
there's no visible change to vhost_poll_*() interface.
I would prefer a substructure vhost_work,
On 05/31, Tejun Heo wrote:
On 05/31/2010 04:39 PM, Oleg Nesterov wrote:
What I can't understand is why we do have -queue_seq and -done_seq.
Isn't the single bool poll-active enough? vhost_poll_queue() sets
-active == T, vhost_poller() clears it before wake_up_all(poll-done).
I might
Hello,
On 05/31/2010 05:31 PM, Oleg Nesterov wrote:
I might have slightly over engineered this part not knowing the
expected workload. -queue_seq/-done_seq pair is to guarantee that
flushers never get starved.
Ah, indeed.
Well, afaics we do not need 2 counters anyway, both
Hello,
On 05/31/2010 05:22 PM, Michael S. Tsirkin wrote:
On Sun, May 30, 2010 at 10:24:01PM +0200, Tejun Heo wrote:
Replace vhost_workqueue with per-vhost kthread. Other than callback
argument change from struct work_struct * to struct vhost_poll *,
there's no visible change to
On poniedziaĆek, 24 maja 2010 o 10:23:11 Hao, Xudong wrote:
Hi all
I build latest kvm 37dec075a7854f0f550540bf3b9bbeef37c11e2a, based on
kernel 2.6.34, after kvm and kvm_intel module loaded, then /etc/init.d/kvm
start, a few minutes later, the system will panic.
I created a Bugzilla entry
On Mon, May 31, 2010 at 05:45:07PM +0200, Tejun Heo wrote:
Hello,
On 05/31/2010 05:22 PM, Michael S. Tsirkin wrote:
On Sun, May 30, 2010 at 10:24:01PM +0200, Tejun Heo wrote:
Replace vhost_workqueue with per-vhost kthread. Other than callback
argument change from struct work_struct * to
+/*
+ * Map usr buffer at specific IO virtual address
+ */
+static int vfio_dma_map_iova(
+ mlp = kzalloc(sizeof *mlp, GFP_KERNEL);
Not good at that point. I think you need to allocate it first, error if
it can't be allocated and then do the work and free it on error ?
+ mlp =
On Mon, May 31, 2010 at 02:50:29PM +0300, Avi Kivity wrote:
On 05/30/2010 05:53 PM, Michael S. Tsirkin wrote:
So what I suggested is failing any kind of access until iommu
is assigned.
So, the kernel driver must be aware of the iommu. In which case it may
as well program it.
It's a
On Mon, May 24, 2010 at 04:12:14PM +0300, Michael S. Tsirkin wrote:
This fixes /tmp usage in make-release script for security.
Also, create output directory if it does not exist.
This also adds a 'tarball' optin to specify output file name.
Finally, remote output file before gzip to avoid
Am 31.05.2010 um 11:52 schrieb Gerd Hoffmann kra...@redhat.com:
Hi,
Also it's worth mentioning that I am still running C: on QEMU IDE
emulation, as I could not quite figure out how to boot for a
megasas LD
with option-rom. What QEMU CLI ops where requried to make this work
again..?
Hi Kevin,
here is an updated patch for the ceph/rbd driver. I hope that everything
is fine now.
Regards,
Christian
This is a block driver for the distributed file system Ceph
(http://ceph.newdream.net/). This driver uses librados (which
is part of the Ceph server) for direct access to the
This patch address bug report in https://bugs.launchpad.net/qemu/+bug/530077.
Failed vmentries were handled with handle_unhandled() which prints a rather
unfriendly message to the user. This patch separates handling vmentry failures
from unknown exit reasons and prints a friendly message to the
The vmexit handler returns KVM_EXIT_UNKNOWN since there is no handler
for vmentry failures. This intercepts vmentry failures and returns
KVM_FAIL_ENTRY to userspace instead.
Signed-off-by: Mohammed Gamal m.gamal...@gmail.com
---
arch/x86/kvm/vmx.c |7 +++
1 files changed, 7
Instead of instantiating a whole thread_struct on the stack use only the
required parts of it.
Signed-off-by: Andreas Schwab sch...@linux-m68k.org
Tested-by: Alexander Graf ag...@suse.de
---
arch/powerpc/include/asm/kvm_fpu.h | 27 +
arch/powerpc/kernel/ppc_ksyms.c |
On 31.05.2010, at 21:59, Andreas Schwab wrote:
Instead of instantiating a whole thread_struct on the stack use only the
required parts of it.
Signed-off-by: Andreas Schwab sch...@linux-m68k.org
Tested-by: Alexander Graf ag...@suse.de
Avi or Marcelo, please pull this in through kvm.git.
On Mon, May 24, 2010 at 04:12:14PM +0300, Michael S. Tsirkin wrote:
This fixes /tmp usage in make-release script for security.
Also, create output directory if it does not exist.
This also adds a 'tarball' optin to specify output file name.
Finally, remote output file before gzip to avoid
On Mon, May 24, 2010 at 10:53:49AM -0600, Alex Williamson wrote:
On Wed, 2010-05-19 at 12:00 -0700, Chris Wright wrote:
When libvirt launches a guest it first chowns the relevenat
/sys/bus/pci/.../config file for an assigned device then drops privileges.
This causes an issue for device
On Mon, May 31, 2010 at 09:59:13PM +0200, Andreas Schwab wrote:
Instead of instantiating a whole thread_struct on the stack use only the
required parts of it.
...
+_GLOBAL(kvm_cvt_fd)
+ lfd 0,0(r5) /* load up fpscr value */
+ MTFSF_L(0)
+ lfs 0,0(r3)
+
On 01.06.2010, at 00:40, Paul Mackerras wrote:
On Mon, May 31, 2010 at 09:59:13PM +0200, Andreas Schwab wrote:
Instead of instantiating a whole thread_struct on the stack use only the
required parts of it.
...
+_GLOBAL(kvm_cvt_fd)
+lfd 0,0(r5) /* load up fpscr
Avi Kivity wrote:
It would be better to rewrite kvm_mmu_zap_page() in terms of
prepare/commit in the patch so we don't have two copies of the same
thing (also easier to review).
OK, i'll do it in the next version.
This is a good idea, but belongs in a separate patch? We can
Would use it later for XSAVE related CPUID.
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
kvm.h |2 +-
qemu-kvm-x86.c|8
target-i386/kvm.c | 19 +++
3 files changed, 16 insertions(+), 13 deletions(-)
diff --git a/kvm.h b/kvm.h
index
We can support it in KVM now. The 0xd leaf is queried from KVM.
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
target-i386/cpuid.c | 21 +
1 files changed, 21 insertions(+), 0 deletions(-)
diff --git a/target-i386/cpuid.c b/target-i386/cpuid.c
index eebf038..ec47950
Avi Kivity wrote:
On 05/31/2010 05:00 AM, Xiao Guangrong wrote:
+
+#define for_each_gfn_indirect_sp(kvm, sp, gfn, pos, n)\
+ hlist_for_each_entry_safe(sp, pos, n,\
+kvm-arch.mmu_page_hash[kvm_page_table_hashfn(gfn)], hash_link)\
+if (sp-gfn
Signed-off-by: Joe Perches j...@perches.com
---
arch/powerpc/kernel/nvram_64.c |3 +--
arch/powerpc/kvm/book3s.c |4 ++--
2 files changed, 3 insertions(+), 4 deletions(-)
diff --git a/arch/powerpc/kernel/nvram_64.c b/arch/powerpc/kernel/nvram_64.c
index 9cf197f..99c6dab 100644
---
Please send in any agenda items you are interested in covering.
If we have a lack of agenda items I'll cancel the week's call.
thanks,
-chris
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
Maciej Rutecki wrote:
On poniedziaĆek, 24 maja 2010 o 10:23:11 Hao, Xudong wrote:
Hi all
I build latest kvm 37dec075a7854f0f550540bf3b9bbeef37c11e2a, based on
kernel 2.6.34, after kvm and kvm_intel module loaded, then
/etc/init.d/kvm start, a few minutes later, the system will panic.
I
Tried working on it a bit more. Now it complains that it cannot find IOMMU.
This is an Intel Montevina chipset with DMA remapping support (VT-d).
Any pointers as to why it is not finding the support?
The message is coming from hw/device-assignment.c after the call to
kvm_check_extension for IOMMU
Instead of instantiating a whole thread_struct on the stack use only the
required parts of it.
Signed-off-by: Andreas Schwab sch...@linux-m68k.org
Tested-by: Alexander Graf ag...@suse.de
---
arch/powerpc/include/asm/kvm_fpu.h | 27 +
arch/powerpc/kernel/ppc_ksyms.c |
On 31.05.2010, at 21:59, Andreas Schwab wrote:
Instead of instantiating a whole thread_struct on the stack use only the
required parts of it.
Signed-off-by: Andreas Schwab sch...@linux-m68k.org
Tested-by: Alexander Graf ag...@suse.de
Avi or Marcelo, please pull this in through kvm.git.
On Mon, May 31, 2010 at 09:59:13PM +0200, Andreas Schwab wrote:
Instead of instantiating a whole thread_struct on the stack use only the
required parts of it.
...
+_GLOBAL(kvm_cvt_fd)
+ lfd 0,0(r5) /* load up fpscr value */
+ MTFSF_L(0)
+ lfs 0,0(r3)
+
On 01.06.2010, at 00:40, Paul Mackerras wrote:
On Mon, May 31, 2010 at 09:59:13PM +0200, Andreas Schwab wrote:
Instead of instantiating a whole thread_struct on the stack use only the
required parts of it.
...
+_GLOBAL(kvm_cvt_fd)
+lfd 0,0(r5) /* load up fpscr
Signed-off-by: Joe Perches j...@perches.com
---
arch/powerpc/kernel/nvram_64.c |3 +--
arch/powerpc/kvm/book3s.c |4 ++--
2 files changed, 3 insertions(+), 4 deletions(-)
diff --git a/arch/powerpc/kernel/nvram_64.c b/arch/powerpc/kernel/nvram_64.c
index 9cf197f..99c6dab 100644
---
59 matches
Mail list logo