On 02/24/12 19:54, Pekka Enberg wrote:
Hi,
I played around with the --debug-ioport command line option and was able
to cheat my way past SeaBIOS POST phase. Should SeaBIOS automatically pick
up virtio devices and attempt to boot them?
Yes, it can handle virtio-blk (and soon virtio-scsi
Hi,
So looking at SeaBIOS code, it seems to me we could simply make LKVM
lie to it by claiming to be coreboot and get away with it, no? We'd
basically avoid all the PCI allocation passes and such.
I doubt this is going to fly if you want seabios boot from a
virtio-blk-pci device ...
On 02/27/2012 11:09 AM, Prateek Sharma wrote:
Hello,
I know this is not the right forum for this, but i am looking for
the recent specification/documentation of the AMD NPT and SVM
features. All i can find is the old pacifica document dating back to
2005, and only the NPT whitepaper.
The
So that we can call it in kernel.
Signed-off-by: Liu Yu yu@freescale.com
---
arch/powerpc/kernel/head_fsl_booke.S | 23 ++-
1 files changed, 6 insertions(+), 17 deletions(-)
diff --git a/arch/powerpc/kernel/head_fsl_booke.S
b/arch/powerpc/kernel/head_fsl_booke.S
index
Like book3s did for fp switch,
instead of switch SPE between host and guest,
the patch switch SPE state between qemu and guest.
In this way, we can simulate a host loadup SPE when load guest SPE state,
and let host to decide when to giveup SPE state.
Therefor it cooperates better with host SPE
On Mon, Feb 27, 2012 at 11:44:57AM +0100, Gerd Hoffmann wrote:
Hi,
So looking at SeaBIOS code, it seems to me we could simply make LKVM
lie to it by claiming to be coreboot and get away with it, no? We'd
basically avoid all the PCI allocation passes and such.
I doubt this is going to
Alexander Graf hat am Mon 27. Feb, 01:30 (+0100) geschrieben:
On 27.02.2012, at 01:08, Jörg Sommer wrote:
Alexander Graf hat am Sun 26. Feb, 12:43 (+0100) geschrieben:
On 25.02.2012, at 15:51, Jörg Sommer wrote:
Jörg Sommer hat am Tue 21. Feb, 09:32 (+0100) geschrieben:
Alexander Graf
This is a tiny, but important, patch to vhost.
Vhost's worker thread only called schedule() when it had no work to do, and
it wanted to go to sleep. But if there's always work to do, e.g., the guest
is running a network-intensive program like netperf with small message sizes,
schedule() was
Hi
Please send in any agenda items you are interested in covering.
Cheers,
Juan.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
On 02/20/12 23:52, Michael S. Tsirkin wrote:
Here's a new version of the patch.
TODOs:
- windows guest testing
Changes from v2:
- added slot id capability
- migration support
- misc fixes
- fix checkpatch errors
64bit prefetch memory window works now:
00:10.0 PCI bridge: Red Hat,
On 2012-02-27 04:01, Wen Congyang wrote:
We can know the guest is paniced when the guest runs on xen.
But we do not have such feature on kvm. This patch implemnts
this feature, and the implementation is the same as xen:
register panic notifier, and call hypercall when the guest
is paniced.
Jan Kiszka wrote:
On 2012-01-07 19:23, Liu, Jinsong wrote:
Jan Kiszka wrote:
On 2012-01-05 18:07, Liu, Jinsong wrote:
Sorry, it remains bogus to expose the tsc deadline timer feature
on machines pc-1.1. That's just like we introduced kvmclock
only to pc-0.14 onward. The reason is that guest
On Mon, Feb 27, 2012 at 3:15 AM, Gleb Natapov g...@redhat.com wrote:
AFAIK kvm-tool initialize PCI by itself so it actually may work (and,
very likely, the best thing to do).
we're going in circles. kvm-tool does not set the base address of some
of the BARs and seabios does not do it quite
On Thu, 2012-02-23 at 17:48 +, Stefano Stabellini wrote:
We need a register to pass the hypercall number because we might not
know it at compile time and HVC only takes an immediate argument.
Among the available registers r12 seems to be the best choice because it
is defined as
-Original Message-
From: kvm-ow...@vger.kernel.org [mailto:kvm-ow...@vger.kernel.org] On Behalf
Of
Alexander Graf
Sent: Friday, February 24, 2012 7:56 PM
To: kvm-...@vger.kernel.org
Cc: kvm@vger.kernel.org; linuxppc-...@lists.ozlabs.org; Wood Scott-B07421
Subject: [PATCH 24/37]
On Mon, Feb 27, 2012 at 08:24:02AM -0800, ron minnich wrote:
On Mon, Feb 27, 2012 at 3:15 AM, Gleb Natapov g...@redhat.com wrote:
AFAIK kvm-tool initialize PCI by itself so it actually may work (and,
very likely, the best thing to do).
we're going in circles. kvm-tool does not set the
On Mon, Feb 27, 2012 at 8:38 AM, Gleb Natapov g...@redhat.com wrote:
Then make kvm-tool set it. Why do you need coreboot/seabios for that?
First thing we looked at. For a number of reasons it seems ugly.
Either we can pick a bunch of fixed base addresses for the kvm-tool
resources, and track
On 2012-02-27 17:05, Liu, Jinsong wrote:
Jan Kiszka wrote:
On 2012-01-07 19:23, Liu, Jinsong wrote:
Jan Kiszka wrote:
On 2012-01-05 18:07, Liu, Jinsong wrote:
Sorry, it remains bogus to expose the tsc deadline timer feature
on machines pc-1.1. That's just like we introduced kvmclock
only
On 02/27/2012 05:22 AM, Juan Quintela wrote:
Hi
Please send in any agenda items you are interested in covering.
Given all the threads on snapshot/mirror/migrate/reopen in the blockdev
layer, that sounds like a worthwhile topic to discuss on a phone call.
--
Eric Blake ebl...@redhat.com
On Mon, Feb 27, 2012 at 08:46:10AM -0800, ron minnich wrote:
On Mon, Feb 27, 2012 at 8:38 AM, Gleb Natapov g...@redhat.com wrote:
Then make kvm-tool set it. Why do you need coreboot/seabios for that?
First thing we looked at. For a number of reasons it seems ugly.
That is not ugly, this is
I'm less interested in this argument than getting something that
works, however it happens, so I'll let it stop with the comment that i
don't agree with you :-)
thanks
ron
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More
On 02/27/2012 05:34 PM, Bhushan Bharat-R65777 wrote:
+}
+
+/*
+ * Common checks before entering the guest world. Call with interrupts
+ * disabled.
+ *
+ * returns !0 if a signal is pending and check_signal is true */
+static int kvmppc_prepare_to_enter(struct kvm_vcpu *vcpu, bool
On Thu, Feb 23, 2012 at 05:48:22PM +, Stefano Stabellini wrote:
We need a register to pass the hypercall number because we might not
know it at compile time and HVC only takes an immediate argument.
Among the available registers r12 seems to be the best choice because it
is defined as
On Mon, Feb 27, 2012 at 04:27:23PM +, Ian Campbell wrote:
On Thu, 2012-02-23 at 17:48 +, Stefano Stabellini wrote:
We need a register to pass the hypercall number because we might not
know it at compile time and HVC only takes an immediate argument.
Among the available registers
On 02/27/2012 06:33 PM, Alexander Graf wrote:
On 02/27/2012 05:34 PM, Bhushan Bharat-R65777 wrote:
+}
+
+/*
+ * Common checks before entering the guest world. Call with
interrupts
+ * disabled.
+ *
+ * returns !0 if a signal is pending and check_signal is true */
+static int
-Original Message-
From: Alexander Graf [mailto:ag...@suse.de]
Sent: Monday, February 27, 2012 11:53 PM
To: Bhushan Bharat-R65777
Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.org;
linuxppc-...@lists.ozlabs.org;
Wood Scott-B07421
Subject: Re: [PATCH 24/37] KVM: PPC: booke: rework
Currently boot and snapshot parameters are either 'yes' or not present.
This patch enables specify 'yes', 'no' or not present. 'no' option
is necessarily eg. when -snapshot is present and we want to override
the 'snapshot=off' value on one device.
Signed-off-by: Lukas Doktor ldok...@redhat.com
Adds option to create raw images with dd (non-sparse file unlike
qemu-img one).
Signed-off-by: Lukas Doktor ldok...@redhat.com
---
client/virt/virt_vm.py | 38 ++
1 files changed, 26 insertions(+), 12 deletions(-)
diff --git a/client/virt/virt_vm.py
Currently subtests.cfg is proceeded and then all other configs. My test
needs to override smp parameter in some variant which is currently
impossible.
Using words current order means: we define subtests variants, than we
specify base and guest and other details. In the end we limit what
we want
On 02/27/2012 04:59 AM, Olivia Yin wrote:
So that we can call it in kernel.
Signed-off-by: Liu Yu yu@freescale.com
Explain why we want this, and point out that this makes it similar to
load_up_fpu.
---
arch/powerpc/kernel/head_fsl_booke.S | 23 ++-
1 files
On 02/24/2012 08:26 AM, Alexander Graf wrote:
-void kvmppc_core_prepare_to_enter(struct kvm_vcpu *vcpu)
+int kvmppc_core_prepare_to_enter(struct kvm_vcpu *vcpu)
{
unsigned long *pending = vcpu-arch.pending_exceptions;
unsigned long old_pending = vcpu-arch.pending_exceptions;
@@
On Mon, 2012-02-27 at 18:03 +, Dave Martin wrote:
On Mon, Feb 27, 2012 at 04:27:23PM +, Ian Campbell wrote:
On Thu, 2012-02-23 at 17:48 +, Stefano Stabellini wrote:
We need a register to pass the hypercall number because we might not
know it at compile time and HVC only takes
On 02/26/2012 05:59 AM, Alexander Graf wrote:
On 25.02.2012, at 00:40, Scott Wood wrote:
On 02/24/2012 08:26 AM, Alexander Graf wrote:
+static void kvmppc_fill_pt_regs(struct kvm_vcpu *vcpu, struct pt_regs
*regs)
{
- int r = RESUME_HOST;
+ int i;
- /* update before a new
On Mon, 2012-02-27 at 17:53 +, Dave Martin wrote:
On Thu, Feb 23, 2012 at 05:48:22PM +, Stefano Stabellini wrote:
We need a register to pass the hypercall number because we might not
know it at compile time and HVC only takes an immediate argument.
Among the available registers
On 02/23/2012 03:22 AM, Liu Yu wrote:
diff --git a/drivers/virt/Kconfig b/drivers/virt/Kconfig
index 2dcdbc9..99ebdde 100644
--- a/drivers/virt/Kconfig
+++ b/drivers/virt/Kconfig
@@ -15,6 +15,7 @@ if VIRT_DRIVERS
config FSL_HV_MANAGER
tristate Freescale hypervisor management driver
On 02/23/2012 03:22 AM, Liu Yu wrote:
+static int __init epapr_paravirt_init(void)
+{
+ struct device_node *hyper_node;
+ const u32 *insts;
+ int len, i;
+
+ hyper_node = of_find_node_by_path(/hypervisor);
+ if (!hyper_node)
+ return -ENODEV;
+
+
On 27 February 2012 16:27, Ian Campbell ian.campb...@citrix.com wrote:
R12 is not accessible from the 16 bit T1 Thumb encoding of mov
immediate (which can only target r0..r7).
Since we support only ARMv7+ there are T2 and T3 encodings available
which do allow direct mov of an immediate into
On Fri, 2012-02-10 at 19:17 +0100, Jan Kiszka wrote:
PCI 2.3 allows to generically disable IRQ sources at device level. This
enables us to share legacy IRQs of such devices with other host devices
when passing them to a guest.
The new IRQ sharing feature introduced here is optional, user
Il 27/02/2012 18:21, Eric Blake ha scritto:
Please send in any agenda items you are interested in covering.
Given all the threads on snapshot/mirror/migrate/reopen in the blockdev
layer, that sounds like a worthwhile topic to discuss on a phone call.
I put a description of the existing
On 02/27/2012 03:58 PM, Paolo Bonzini wrote:
Il 27/02/2012 18:21, Eric Blake ha scritto:
Please send in any agenda items you are interested in covering.
Given all the threads on snapshot/mirror/migrate/reopen in the blockdev
layer, that sounds like a worthwhile topic to discuss on a phone
On 2012-02-27 22:05, Alex Williamson wrote:
On Fri, 2012-02-10 at 19:17 +0100, Jan Kiszka wrote:
PCI 2.3 allows to generically disable IRQ sources at device level. This
enables us to share legacy IRQs of such devices with other host devices
when passing them to a guest.
The new IRQ sharing
Il 27/02/2012 23:06, Anthony Liguori ha scritto:
Thanks! One thing I'm having trouble following on your proposal: What
commands are valid within
blockdev-start-transaction/blockdev-commit-transaction?
If I do:
blockdev-start-transaction
stop
drive-reopen
drive-mirror
https://bugzilla.kernel.org/show_bug.cgi?id=42829
Summary: KVM Guest with virtio network driver loses network
connectivity
Product: Virtualization
Version: unspecified
Kernel Version: 3.3.0-rc5
Platform: All
OS/Version:
On Mon, 2012-02-27 at 23:07 +0100, Jan Kiszka wrote:
On 2012-02-27 22:05, Alex Williamson wrote:
On Fri, 2012-02-10 at 19:17 +0100, Jan Kiszka wrote:
PCI 2.3 allows to generically disable IRQ sources at device level. This
enables us to share legacy IRQs of such devices with other host
On 2012-02-28 00:15, Alex Williamson wrote:
On Mon, 2012-02-27 at 23:07 +0100, Jan Kiszka wrote:
On 2012-02-27 22:05, Alex Williamson wrote:
On Fri, 2012-02-10 at 19:17 +0100, Jan Kiszka wrote:
PCI 2.3 allows to generically disable IRQ sources at device level. This
enables us to share legacy
From ecd8be962f69393c183f941bfdbd7a7d3876d442 Mon Sep 17 00:00:00 2001
From: Liu, Jinsong jinsong@intel.com
Date: Mon, 27 Feb 2012 05:19:32 +0800
Subject: [PATCH] KVM: expose Intel cpu new features to guest
Intel recently release 2 new features, HLE and TRM.
Refer to
At 02/27/2012 11:08 PM, Jan Kiszka Wrote:
On 2012-02-27 04:01, Wen Congyang wrote:
We can know the guest is paniced when the guest runs on xen.
But we do not have such feature on kvm. This patch implemnts
this feature, and the implementation is the same as xen:
register panic notifier, and
Hi Scott,
This had been reviewed before and accepted by internal tree.
http://linux.freescale.net/patchwork/patch/11100/
http://git.am.freescale.net/gitolite/gitweb.cgi/sdk/kvm.git/commit/?h=for-sdk1.2id=c5088844dc665dbdae4fa51b8d58dc203bacc17e
I didn't change anything except the line.
I just
Yin Olivia-R63875 would like to recall the message, [PATCH 1/2] powerpc/e500:
make load_up_spe a normal fuction.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
So that we can call it in kernel.
Signed-off-by: Liu Yu yu@freescale.com
---
arch/powerpc/kernel/head_fsl_booke.S | 23 ++-
1 files changed, 6 insertions(+), 17 deletions(-)
diff --git a/arch/powerpc/kernel/head_fsl_booke.S
b/arch/powerpc/kernel/head_fsl_booke.S
index
Like book3s did for fp switch,
instead of switch SPE between host and guest,
the patch switch SPE state between qemu and guest.
In this way, we can simulate a host loadup SPE when load guest SPE state,
and let host to decide when to giveup SPE state.
Therefor it cooperates better with host SPE
On Mon, Feb 27, 2012 at 4:59 AM, Olivia Yin hong-hua@freescale.com wrote:
So that we can call it in kernel.
And why would we want that?
--
Timur Tabi
Linux kernel developer at Freescale
--
To unsubscribe from this list: send the line unsubscribe kvm-ppc in
the body of a message to
-Original Message-
From: kvm-ow...@vger.kernel.org [mailto:kvm-ow...@vger.kernel.org] On Behalf
Of
Alexander Graf
Sent: Friday, February 24, 2012 7:56 PM
To: kvm-ppc@vger.kernel.org
Cc: k...@vger.kernel.org; linuxppc-...@lists.ozlabs.org; Wood Scott-B07421
Subject: [PATCH 24/37]
-Original Message-
From: Alexander Graf [mailto:ag...@suse.de]
Sent: Monday, February 27, 2012 11:53 PM
To: Bhushan Bharat-R65777
Cc: kvm-ppc@vger.kernel.org; k...@vger.kernel.org;
linuxppc-...@lists.ozlabs.org;
Wood Scott-B07421
Subject: Re: [PATCH 24/37] KVM: PPC: booke:
On 02/24/2012 08:26 AM, Alexander Graf wrote:
-void kvmppc_core_prepare_to_enter(struct kvm_vcpu *vcpu)
+int kvmppc_core_prepare_to_enter(struct kvm_vcpu *vcpu)
{
unsigned long *pending = vcpu-arch.pending_exceptions;
unsigned long old_pending = vcpu-arch.pending_exceptions;
@@
On 02/23/2012 03:22 AM, Liu Yu wrote:
diff --git a/drivers/virt/Kconfig b/drivers/virt/Kconfig
index 2dcdbc9..99ebdde 100644
--- a/drivers/virt/Kconfig
+++ b/drivers/virt/Kconfig
@@ -15,6 +15,7 @@ if VIRT_DRIVERS
config FSL_HV_MANAGER
tristate Freescale hypervisor management driver
Hi Scott,
This had been reviewed before and accepted by internal tree.
http://linux.freescale.net/patchwork/patch/11100/
http://git.am.freescale.net/gitolite/gitweb.cgi/sdk/kvm.git/commit/?h=for-sdk1.2id=c5088844dc665dbdae4fa51b8d58dc203bacc17e
I didn't change anything except the line.
I just
Yin Olivia-R63875 would like to recall the message, [PATCH 1/2] powerpc/e500:
make load_up_spe a normal fuction.
--
To unsubscribe from this list: send the line unsubscribe kvm-ppc in
the body of a message to majord...@vger.kernel.org
More majordomo info at
58 matches
Mail list logo