On 11/02/2012 05:00 PM, Marcelo Tosatti wrote:
On Fri, Nov 02, 2012 at 02:23:06PM +0400, Glauber Costa wrote:
On 11/02/2012 01:39 AM, Marcelo Tosatti wrote:
On Thu, Nov 01, 2012 at 06:28:31PM +0400, Glauber Costa wrote:
On 11/01/2012 02:47 AM, Marcelo Tosatti wrote:
Allow a guest to register
On Fri, Nov 02, 2012 at 01:42:41PM +0400, Glauber Costa wrote:
On 11/01/2012 02:47 AM, Marcelo Tosatti wrote:
+ info = pvclock_get_vsyscall_time_info(cpu);
+
+ low = (int)__pa(info) | 1;
+ high = ((u64)__pa(per_cpu(hv_clock, cpu)) 32);
+ ret =
Hi,
I just want to enable 64 bit bars for KVM usage, seabios 1.7.0 is
used in current qemu-kvm, which not handle 64 bit bars yet. I cloned
seabios code from kernel.org(seems no 64 bit bars supporting), but I
was not taking notice of the tree on http://git.qemu.org/, yes it has
already done
-Original Message-
From: Gerd Hoffmann [mailto:kra...@redhat.com]
Sent: Monday, November 05, 2012 5:08 PM
To: Hao, Xudong
Cc: ke...@koconnor.net; seab...@seabios.org; kvm@vger.kernel.org;
a...@redhat.com
Subject: Re: [PATCH] seabios/pci: enable 64 bit bar on seabios
Hi,
I
Hello all,
I would like to introduce my new project and see if there are people
on this list who would like to meet up at KVM Summit this week and
give me some feedback.
I have a new project called Snabb Switch and it's an open source
ethernet switch for hypervisors. I'm aiming for a specific
Do not drop large spte until it can be insteaded by small pages so that
the guest can happliy read memory through it
The idea is from Avi:
| As I mentioned before, write-protecting a large spte is a good idea,
| since it moves some work from protect-time to fault-time, so it reduces
| jitter.
Use min() to cleanup mapping_level
Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com
---
arch/x86/kvm/mmu.c |3 +--
1 files changed, 1 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index 1d8869c..692ebb1 100644
--- a/arch/x86/kvm/mmu.c
+++
In order to detecting spte remapping, we can simply check whether the
spte has already been pointing to the pfn even if the spte is not the
last spte for middle spte is pointing to the kernel pfn which can not
be mapped to userspace
Also, update slot and stat.lpages iff the spte is not remapped
It is more cleaner if we can update pte_access fist then set spte according
to pte_access, also introduce gfn_need_write_protect to check whether the
gfn need to be write-protected
Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com
---
arch/x86/kvm/mmu.c | 109
Then, no mmu specified code exists in the common function and drop two
parameters in set_spte
Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com
---
arch/x86/kvm/mmu.c | 42 +++---
arch/x86/kvm/paging_tmpl.h | 25
It is only used in debug code, so drop it
Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com
---
arch/x86/kvm/mmu.c | 16 +++-
arch/x86/kvm/paging_tmpl.h |9 -
2 files changed, 11 insertions(+), 14 deletions(-)
diff --git a/arch/x86/kvm/mmu.c
On 31/10/12 11:32, Alexander Graf wrote:
On 23.10.2012, at 08:20, Christian Borntraeger borntrae...@de.ibm.com wrote:
On 22/10/12 23:14, Alexander Graf wrote:
Hi Christian,
During our normal Factory kernel builds, s390x seems to choke:
Am 31.10.2012 um 15:08 schrieb ronnie sahlberg:
On Tue, Oct 30, 2012 at 10:48 PM, Stefan Hajnoczi stefa...@gmail.com wrote:
On Tue, Oct 30, 2012 at 10:09 PM, ronnie sahlberg
ronniesahlb...@gmail.com wrote:
About half a year there was an issue where recent kernels had added
support to start
On 11/5/12 8:08 AM, Christian Borntraeger wrote:
On 31/10/12 11:32, Alexander Graf wrote:
On 23.10.2012, at 08:20, Christian Borntraeger borntrae...@de.ibm.com
wrote:
On 22/10/12 23:14, Alexander Graf wrote:
Hi Christian,
During our normal Factory kernel builds, s390x seems to choke:
On Tue, Oct 30, 2012 at 10:30:02PM -0400, Sasha Levin wrote:
On Tue, Oct 30, 2012 at 9:48 PM, Wen Congyang we...@cn.fujitsu.com wrote:
At 10/31/2012 09:12 AM, Marcelo Tosatti Wrote:
It has been asked earlier why a simple virtio device is not usable
for this (with no response IIRC).
1.
Hi,
we have been using PCI passthrough with the Mellanox IB interface
(MT27500 Family [ConnectX-3]) on Debian 6.0.6, kernel 3.2.23 and
qemu-kvm-1.0 (both from backports). It worked fine until latest
update in backports to qemu-kvm-1.1.2. With newer versions IB device
probe in guest fails leaving
16 matches
Mail list logo