Hi,
we have been using PCI passthrough with the Mellanox IB interface
(MT27500 Family [ConnectX-3]) on Debian 6.0.6, kernel 3.2.23 and
qemu-kvm-1.0 (both from backports). It worked fine until latest
update in backports to qemu-kvm-1.1.2. With newer versions IB device
probe in guest fails leaving f
On Tue, Oct 30, 2012 at 10:30:02PM -0400, Sasha Levin wrote:
> On Tue, Oct 30, 2012 at 9:48 PM, Wen Congyang wrote:
> > At 10/31/2012 09:12 AM, Marcelo Tosatti Wrote:
> >> It has been asked earlier why a simple virtio device is not usable
> >> for this (with no response IIRC).
> >
> > 1. We can't
On 11/5/12 8:08 AM, Christian Borntraeger wrote:
> On 31/10/12 11:32, Alexander Graf wrote:
>>
>>
>> On 23.10.2012, at 08:20, Christian Borntraeger
>> wrote:
>>
>>> On 22/10/12 23:14, Alexander Graf wrote:
Hi Christian,
During our normal Factory kernel builds, s390x seems to choke:
Am 31.10.2012 um 15:08 schrieb ronnie sahlberg:
> On Tue, Oct 30, 2012 at 10:48 PM, Stefan Hajnoczi wrote:
>> On Tue, Oct 30, 2012 at 10:09 PM, ronnie sahlberg
>> wrote:
>>> About half a year there was an issue where recent kernels had added
>>> support to start using new scsi opcodes, but the
On 31/10/12 11:32, Alexander Graf wrote:
>
>
> On 23.10.2012, at 08:20, Christian Borntraeger wrote:
>
>> On 22/10/12 23:14, Alexander Graf wrote:
>>> Hi Christian,
>>>
>>> During our normal Factory kernel builds, s390x seems to choke:
>>>
>>> /home/abuild/rpmbuild/BUILD/kernel-default-3.7.rc2/
It is only used in debug code, so drop it
Signed-off-by: Xiao Guangrong
---
arch/x86/kvm/mmu.c | 16 +++-
arch/x86/kvm/paging_tmpl.h |9 -
2 files changed, 11 insertions(+), 14 deletions(-)
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index 4229e78..1fa
Then, no mmu specified code exists in the common function and drop two
parameters in set_spte
Signed-off-by: Xiao Guangrong
---
arch/x86/kvm/mmu.c | 42 +++---
arch/x86/kvm/paging_tmpl.h | 25 -
2 files changed, 31 insertion
It is more cleaner if we can update pte_access fist then set spte according
to pte_access, also introduce gfn_need_write_protect to check whether the
gfn need to be write-protected
Signed-off-by: Xiao Guangrong
---
arch/x86/kvm/mmu.c | 109
1
In order to detecting spte remapping, we can simply check whether the
spte has already been pointing to the pfn even if the spte is not the
last spte for middle spte is pointing to the kernel pfn which can not
be mapped to userspace
Also, update slot and stat.lpages iff the spte is not remapped
S
Use min() to cleanup mapping_level
Signed-off-by: Xiao Guangrong
---
arch/x86/kvm/mmu.c |3 +--
1 files changed, 1 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index 1d8869c..692ebb1 100644
--- a/arch/x86/kvm/mmu.c
+++ b/arch/x86/kvm/mmu.c
@@ -831,8 +83
Do not drop large spte until it can be insteaded by small pages so that
the guest can happliy read memory through it
The idea is from Avi:
| As I mentioned before, write-protecting a large spte is a good idea,
| since it moves some work from protect-time to fault-time, so it reduces
| jitter. Thi
Hello all,
I would like to introduce my new project and see if there are people
on this list who would like to meet up at KVM Summit this week and
give me some feedback.
I have a new project called Snabb Switch and it's an open source
ethernet switch for hypervisors. I'm aiming for a specific poi
> -Original Message-
> From: Gerd Hoffmann [mailto:kra...@redhat.com]
> Sent: Monday, November 05, 2012 5:08 PM
> To: Hao, Xudong
> Cc: ke...@koconnor.net; seab...@seabios.org; kvm@vger.kernel.org;
> a...@redhat.com
> Subject: Re: [PATCH] seabios/pci: enable 64 bit bar on seabios
>
> Hi,
Hi,
> I just want to enable 64 bit bars for KVM usage, seabios 1.7.0 is
> used in current qemu-kvm, which not handle 64 bit bars yet. I cloned
> seabios code from kernel.org(seems no 64 bit bars supporting), but I
> was not taking notice of the tree on http://git.qemu.org/, yes it has
> already
On Fri, Nov 02, 2012 at 01:42:41PM +0400, Glauber Costa wrote:
> On 11/01/2012 02:47 AM, Marcelo Tosatti wrote:
> > + info = pvclock_get_vsyscall_time_info(cpu);
> > +
> > + low = (int)__pa(info) | 1;
> > + high = ((u64)__pa(&per_cpu(hv_clock, cpu)) >> 32);
> > + ret = native_write_msr_safe
On 11/02/2012 05:00 PM, Marcelo Tosatti wrote:
> On Fri, Nov 02, 2012 at 02:23:06PM +0400, Glauber Costa wrote:
>> On 11/02/2012 01:39 AM, Marcelo Tosatti wrote:
>>> On Thu, Nov 01, 2012 at 06:28:31PM +0400, Glauber Costa wrote:
On 11/01/2012 02:47 AM, Marcelo Tosatti wrote:
> Allow a gues
16 matches
Mail list logo