This makes a HPTE removal function, kvmppc_do_h_remove(), available
outside book3s_hv_rm_mmu.c. This will be used by the HPT writing
code.
Signed-off-by: Paul Mackerras pau...@samba.org
---
v2: basically unchanged from v1, just rediffed
arch/powerpc/include/asm/kvm_book3s.h |3 +++
This uses a bit in our record of the guest view of the HPTE to record
when the HPTE gets modified. We use a reserved bit for this, and ensure
that this bit is always cleared in HPTE values returned to the guest.
The recording of modified HPTEs is only done if other code indicates
its interest by
A new ioctl, KVM_PPC_GET_HTAB_FD, returns a file descriptor. Reads on
this fd return the contents of the HPT (hashed page table), writes
create and/or remove entries in the HPT. There is a new capability,
KVM_CAP_PPC_HTAB_FD, to indicate the presence of the ioctl. The ioctl
takes an argument
On 11/20/2012 01:58 AM, Marcelo Tosatti wrote:
As requested by Glauber, do not update kvmclock area on vcpu-pcpu
migration, in case the host has stable TSC.
This is to reduce cacheline bouncing.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: vsyscall/arch/x86/kvm/x86.c
This fixes a bug where adding a new guest HPT entry via the H_ENTER
hcall would lose the changed bit in the reverse map information
for the guest physical page being mapped. The result was that the
KVM_GET_DIRTY_LOG could return a zero bit for the page even though
the page had been modified by
On 11/20/2012 01:57 AM, Marcelo Tosatti wrote:
This patchset, based on earlier work by Jeremy Fitzhardinge, implements
paravirtual clock vsyscall support.
It should be possible to implement Xen support relatively easily.
It reduces clock_gettime from 500 cycles to 200 cycles
on my
On 20.11.2012, at 10:01, Paul Mackerras wrote:
This fixes a bug where adding a new guest HPT entry via the H_ENTER
hcall would lose the changed bit in the reverse map information
for the guest physical page being mapped. The result was that the
KVM_GET_DIRTY_LOG could return a zero bit for
On 20.11.2012, at 09:57, Paul Mackerras wrote:
A new ioctl, KVM_PPC_GET_HTAB_FD, returns a file descriptor. Reads on
this fd return the contents of the HPT (hashed page table), writes
create and/or remove entries in the HPT. There is a new capability,
KVM_CAP_PPC_HTAB_FD, to indicate the
On Mon, 19 Nov 2012 14:30:00 +0100
Alexander Graf ag...@suse.de wrote:
On 31.10.2012, at 17:24, Cornelia Huck wrote:
Provide a mechanism for qemu to provide fully virtual subchannels to
the guest. In the KVM case, this relies on the kernel's css support
for I/O and machine check
Peter Maydell peter.mayd...@linaro.org writes:
On 19 November 2012 15:01, Will Deacon will.dea...@arm.com wrote:
On Sat, Nov 10, 2012 at 03:43:13PM +, Christoffer Dall wrote:
+/*
+ * A15-specific CP15 registers.
+ * Important: Must be sorted ascending by CRn, CRM, Op1, Op2
+ */
+static
于 2012年11月20日 08:32, Marcelo Tosatti 写道:
On Fri, Nov 16, 2012 at 06:12:58PM +0800, zhangyanfei wrote:
Hello Marcelo,
Any thoughts?
I thought a function call was OK, but its better to have all code in
vmx.c. Please have an atomic notifier in kexec.c (registered by KVM
module via
Hi Marcelo,
On Tue, Nov 13, 2012 at 12:19:08AM -0200, Marcelo Tosatti wrote:
On Fri, Nov 09, 2012 at 03:17:39PM -0500, Sasha Levin wrote:
On Mon, Nov 5, 2012 at 8:58 PM, Hu Tao hu...@cn.fujitsu.com wrote:
But in the case of panic notification, more dependency means more
chances of
Hi Marcelo,
Sorry for the late reply.
(2012/11/17 4:15), Marcelo Tosatti wrote:
On Wed, Nov 14, 2012 at 05:26:10PM +0900, Yoshihiro YUNOMAE wrote:
Thank you for commenting on my patch set.
(2012/11/14 11:31), Steven Rostedt wrote:
On Tue, 2012-11-13 at 18:03 -0800, David Sharp wrote:
On
Hi Steven,
Sorry for the late reply.
(2012/11/17 0:05), Steven Rostedt wrote:
On Wed, 2012-11-14 at 17:26 +0900, Yoshihiro YUNOMAE wrote:
Thank you for commenting on my patch set.
(2012/11/14 11:31), Steven Rostedt wrote:
On Tue, 2012-11-13 at 18:03 -0800, David Sharp wrote:
On Tue, Nov
On Tue, Nov 20, 2012 at 10:16:24AM +0100, Alexander Graf wrote:
Documentation is out of sync :).
Oops, sorry... :)
Applied all 3 with fixed documentation.
Great, thanks.
Regards,
Paul.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
On Tue, Nov 20, 2012 at 07:58:32AM +0800, Xiao Guangrong wrote:
Little cleanup for reexecute_instruction, also use gpa_to_gfn in
retry_instruction
Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com
---
arch/x86/kvm/x86.c | 13 ++---
1 files changed, 6 insertions(+),
After six and a half years of writing and maintaining KVM, it is time to
move to new things. Update my MAINTAINERS entry to reflect that.
Signed-off-by: Avi Kivity a...@redhat.com
---
CREDITS | 5 +
MAINTAINERS | 1 -
2 files changed, 5 insertions(+), 1 deletion(-)
diff --git a/CREDITS
On 11/20/2012 02:26 PM, Avi Kivity wrote:
After six and a half years of writing and maintaining KVM, it is time to
move to new things. Update my MAINTAINERS entry to reflect that.
Gleb, please send an incremental patch (against kvm.git master)
installing yourself as a new co-maintainer.
--
Updating MAINTAINERS file.
Signed-off-by: Gleb Natapov g...@redhat.com
diff --git a/MAINTAINERS b/MAINTAINERS
index 6b5b0b7..b273360 100644
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -4281,6 +4281,7 @@ F:include/linux/sunrpc/
KERNEL VIRTUAL MACHINE (KVM)
M: Marcelo Tosatti
On 11/20/2012 02:37 PM, Gleb Natapov wrote:
Updating MAINTAINERS file.
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
Linus, please pull from:
git://git.kernel.org/pub/scm/virt/kvm/kvm.git master
to receive this MAINTAINERS update. After many years of maintaining KVM,
I am moving on. It was a real pleasure for me to work with so many talented
and dedicated hackers on this project.
Replacing me will be one
This commit adds the ARM KVM headers. This is not to go to QEMU
upstream -- the correct path there is that the KVM code will be
committed to a mainline upstream kernel, and then upstream QEMU
can do a bulk header update from the upstream kernel, which will
allow us to drop this temporary commit.
ARM Linux (like x86-64 Linux) can use transparent hugepages for
KVM if memory blocks are 2MiB aligned; set QEMU_VMALLOC_ALIGN
accordingly.
Signed-off-by: Peter Maydell peter.mayd...@linaro.org
---
oslib-posix.c |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/oslib-posix.c
Implement support for using the KVM in-kernel GIC for ARM.
Signed-off-by: Peter Maydell peter.mayd...@linaro.org
---
hw/a15mpcore.c |8 ++-
hw/arm/Makefile.objs |1 +
hw/kvm/arm_gic.c | 169 ++
3 files changed, 177 insertions(+),
Round 4 of the QEMU patches to support KVM for
ARM on Cortex-A15 hardware. It's intended for use with
the kernel tree at
git://github.com/virtualopensystems/linux-kvm-arm.git kvm-arm-v14-vgic-timers
Still RFC pending the kernel patches actually being accepted
upstream...
Changes v3 to v4:
*
On Tue, Nov 20, 2012 at 02:39:40PM +0800, Asias He wrote:
On 11/20/2012 04:26 AM, Michael S. Tsirkin wrote:
On Mon, Nov 19, 2012 at 04:53:42PM +0800, Asias He wrote:
vhost-blk is an in-kernel virito-blk device accelerator.
Due to lack of proper in-kernel AIO interface, this version
On Tue, Nov 20, 2012 at 06:31:48AM +, Pandarathil, Vijaymohan R wrote:
Add support for error containment when a PCI pass-thru device assigned to a
KVM
guest encounters an error. This is for PCIe devices/drivers that support AER
functionality. When the OS is notified of an error in a
On 11/20/2012 02:31 PM, Peter Maydell wrote:
ARM Linux (like x86-64 Linux) can use transparent hugepages for
KVM if memory blocks are 2MiB aligned; set QEMU_VMALLOC_ALIGN
accordingly.
Signed-off-by: Peter Maydellpeter.mayd...@linaro.org
---
oslib-posix.c |2 +-
1 file changed, 1
Enable KVM on ARM hosts, now that all the necessary components
for it exist.
Signed-off-by: Peter Maydell peter.mayd...@linaro.org
---
configure |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/configure b/configure
index 780b19a..2438d6d 100755
--- a/configure
+++
From: Christoffer Dall cd...@cs.columbia.edu
Add basic support for KVM on ARM architecture.
Signed-off-by: Christoffer Dall cd...@cs.columbia.edu
[PMM: Minor tweaks and code cleanup, switch to ONE_REG]
Signed-off-by: Peter Maydell peter.mayd...@linaro.org
---
hw/arm_pic.c | 26
Add support for saving and restoring VFP register state from the
kernel. This includes a check that the KVM-created CPU has full
VFP support (as the TCG Cortex-A15 model always does), since for
the moment ARM QEMU doesn't have any way to tweak optional features
on created CPUs.
Signed-off-by:
Add presave/postload hooks to the ARM GIC common base class.
These will be used by the KVM in-kernel GIC subclass to sync
state between kernel and userspace when migrating.
Signed-off-by: Peter Maydell peter.mayd...@linaro.org
Reviewed-by: Andreas Färber afaer...@suse.de
---
hw/arm_gic_common.c
When using an in-kernel GIC with KVM, we need to tell the kernel where
the GIC's memory mapped registers live. Do this by registering a
MemoryListener which tracks where the board model maps the A15's
private peripherals, so we can finish the GIC initialisation
when the GIC is actually mapped.
On Tue, Nov 20, 2012 at 8:54 AM, Alexander Graf ag...@suse.de wrote:
On 11/20/2012 02:31 PM, Peter Maydell wrote:
ARM Linux (like x86-64 Linux) can use transparent hugepages for
KVM if memory blocks are 2MiB aligned; set QEMU_VMALLOC_ALIGN
accordingly.
Signed-off-by: Peter
-Original Message-
From: Stefan Hajnoczi [mailto:stefa...@gmail.com]
Sent: Tuesday, November 20, 2012 5:41 AM
To: Pandarathil, Vijaymohan R
Cc: kvm@vger.kernel.org; linux-...@vger.kernel.org; qemu-de...@nongnu.org;
linux-ker...@vger.kernel.org
Subject: Re: [PATCH 0/4] AER-KVM:
On 11/20/2012 02:55 PM, Christoffer Dall wrote:
On Tue, Nov 20, 2012 at 8:54 AM, Alexander Grafag...@suse.de wrote:
On 11/20/2012 02:31 PM, Peter Maydell wrote:
ARM Linux (like x86-64 Linux) can use transparent hugepages for
KVM if memory blocks are 2MiB aligned; set QEMU_VMALLOC_ALIGN
On 20 November 2012 14:37, Alexander Graf ag...@suse.de wrote:
On 11/20/2012 02:55 PM, Christoffer Dall wrote:
On Tue, Nov 20, 2012 at 8:54 AM, Alexander Grafag...@suse.de wrote:
On 11/20/2012 02:31 PM, Peter Maydell wrote:
ARM Linux (like x86-64 Linux) can use transparent hugepages for
KVM
Juan Quintela quint...@redhat.com wrote:
Hi
Please send in any agenda topics you are interested in.
As there are no topic's call is cancelled.
happy hacking, Juan.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More
Hi,
first, i'm new to kvm. I'm running KVM on a sles 11 sp2, kernel
3.0.13-0.27-default. My guest is an Ubuntu 12.0.4 LTS 64bit.
The guest has attached a CDROM, using an iso-file from a CIFS-Share. I detached
it with the virtual machine manager (0.9.0).
I don't see the cd-rom anymore in the
Hi Sasha,
On Tue, Nov 13, 2012 at 04:37:38AM +, Sasha Levin wrote:
On 11/12/2012 06:57 AM, Will Deacon wrote:
struct kvm {
struct kvm_arch arch;
struct kvm_config cfg;
@@ -49,6 +56,7 @@ struct kvm {
u64 ram_size;
void
On Tue, 2012-11-20 at 11:48 +1100, Alexey Kardashevskiy wrote:
VFIO implements platform independent stuff such as
a PCI driver, BAR access (via read/write on a file descriptor
or direct mapping when possible) and IRQ signaling.
The platform dependent part includes IOMMU initialization
and
On 11/20/2012 08:11 PM, Gleb Natapov wrote:
On Tue, Nov 20, 2012 at 07:58:32AM +0800, Xiao Guangrong wrote:
Little cleanup for reexecute_instruction, also use gpa_to_gfn in
retry_instruction
Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com
---
arch/x86/kvm/x86.c | 13
On 11/20/2012 12:15 PM, Will Deacon wrote:
Hi Sasha,
On Tue, Nov 13, 2012 at 04:37:38AM +, Sasha Levin wrote:
On 11/12/2012 06:57 AM, Will Deacon wrote:
struct kvm {
struct kvm_arch arch;
struct kvm_config cfg;
@@ -49,6 +56,7 @@ struct kvm {
u64
On Tue, Nov 20, 2012 at 06:09:48PM +0800, Hu Tao wrote:
Hi Marcelo,
On Tue, Nov 13, 2012 at 12:19:08AM -0200, Marcelo Tosatti wrote:
On Fri, Nov 09, 2012 at 03:17:39PM -0500, Sasha Levin wrote:
On Mon, Nov 5, 2012 at 8:58 PM, Hu Tao hu...@cn.fujitsu.com wrote:
But in the case of panic
On Wed, Nov 07, 2012 at 10:01:11AM +0800, Xudong Hao wrote:
Romove fpu lazy restore logic, using eager restore totally.
v5 changes from v4:
- remove lazy fpu restore totally, fpu eager restore does not have performance
regression and simple the code.
v4 changes from v3:
- Wrap up some
On Mon, Nov 05, 2012 at 08:12:07PM +0800, Xiao Guangrong wrote:
Then, no mmu specified code exists in the common function and drop two
parameters in set_spte
Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com
arch/x86/kvm/mmu.c | 42
On Tue, Nov 13, 2012 at 04:39:44PM +0800, Xiao Guangrong wrote:
On 11/13/2012 07:12 AM, Marcelo Tosatti wrote:
On Mon, Nov 05, 2012 at 08:10:08PM +0800, Xiao Guangrong wrote:
In order to detecting spte remapping, we can simply check whether the
spte has already been pointing to the pfn even
On Mon, Nov 05, 2012 at 08:11:03PM +0800, Xiao Guangrong wrote:
It is more cleaner if we can update pte_access fist then set spte according
to pte_access, also introduce gfn_need_write_protect to check whether the
gfn need to be write-protected
Signed-off-by: Xiao Guangrong
On Tue, Nov 20, 2012 at 07:36:33PM +0900, Yoshihiro YUNOMAE wrote:
Hi Marcelo,
Sorry for the late reply.
(2012/11/17 4:15), Marcelo Tosatti wrote:
On Wed, Nov 14, 2012 at 05:26:10PM +0900, Yoshihiro YUNOMAE wrote:
Thank you for commenting on my patch set.
(2012/11/14 11:31), Steven
On 11/21/2012 06:18 AM, Marcelo Tosatti wrote:
- child = page_header(pte PT64_BASE_ADDR_MASK);
- drop_parent_pte(child, sptep);
- kvm_flush_remote_tlbs(vcpu-kvm);
How come its safe to drop this case?
We use if (pfn != spte_to_pfn(*sptep))
On 11/21/2012 06:24 AM, Marcelo Tosatti wrote:
On Mon, Nov 05, 2012 at 08:11:03PM +0800, Xiao Guangrong wrote:
It is more cleaner if we can update pte_access fist then set spte according
to pte_access, also introduce gfn_need_write_protect to check whether the
gfn need to be write-protected
On 11/21/2012 06:27 AM, Marcelo Tosatti wrote:
@@ -544,6 +544,21 @@ static int FNAME(page_fault)(struct kvm_vcpu *vcpu,
gva_t addr, u32 error_code,
return 0;
}
+if (write_fault !(walker.pte_access ACC_WRITE_MASK)
+ !is_write_protection(vcpu) !user_fault)
On Wed, Nov 21, 2012 at 07:23:26AM +0800, Xiao Guangrong wrote:
On 11/21/2012 06:18 AM, Marcelo Tosatti wrote:
-child = page_header(pte PT64_BASE_ADDR_MASK);
-drop_parent_pte(child, sptep);
-
Hi Jan !
David (CC) want to make some progress with our in-kernel PIC. From
memory, one of the outcomes of the BOF was that we need to move the
existing enable in-kernel PIC from generic KVM init to machine init in
order to be able to add an argument indicating the model use by the
arch/platform
Dear all
I continue watching a mailing list whether a similar problem is reported
because a problem does not seem to happen to others.
Any information, however small, would be appreciated.
regards
-Original Message-
From: Uehara, Shouta (shouta.ueh...@jp.yokogawa.com)
Sent: Friday,
Currently, kdump just makes all the logical processors leave VMX operation by
executing VMXOFF instruction, so any VMCSs active on the logical processors may
be corrupted. But, sometimes, we need the VMCSs to debug guest images contained
in the host vmcore. To prevent the corruption, we should
This patch adds an atomic notifier list named crash_notifier_list.
When loading kvm-intel module, a notifier will be registered in
the list to enable vmcss loaded on all cpus to be VMCLEAR'd if
needed.
Signed-off-by: Zhang Yanfei zhangyan...@cn.fujitsu.com
---
arch/x86/include/asm/kexec.h |2
The notifier will be registered in crash_notifier_list when loading
kvm-intel module. And the bitmap indicates whether we should do
VMCLEAR operation in kdump. The bits in the bitmap are set/unset
according to different conditions.
Signed-off-by: Zhang Yanfei zhangyan...@cn.fujitsu.com
---
On 11/21/2012 07:51 AM, Marcelo Tosatti wrote:
On Wed, Nov 21, 2012 at 07:23:26AM +0800, Xiao Guangrong wrote:
On 11/21/2012 06:18 AM, Marcelo Tosatti wrote:
-child = page_header(pte PT64_BASE_ADDR_MASK);
-drop_parent_pte(child, sptep);
-
-Original Message-
From: Marcelo Tosatti [mailto:mtosa...@redhat.com]
Sent: Wednesday, November 21, 2012 6:00 AM
To: Hao, Xudong
Cc: a...@redhat.com; kvm@vger.kernel.org
Subject: Re: [PATCH v5] kvm/fpu: Enable fully eager restore kvm FPU
On Wed, Nov 07, 2012 at 10:01:11AM +0800,
On 11/21/2012 09:25 AM, shouta.ueh...@jp.yokogawa.com wrote:
Dear allI
I continue watching a mailing list whether a similar problem is reported
because a problem does not seem to happen to others.
Any information, however small, would be appreciated.
I am digging into it, but did not get
On 11/20/2012 09:37 PM, Michael S. Tsirkin wrote:
On Tue, Nov 20, 2012 at 02:39:40PM +0800, Asias He wrote:
On 11/20/2012 04:26 AM, Michael S. Tsirkin wrote:
On Mon, Nov 19, 2012 at 04:53:42PM +0800, Asias He wrote:
vhost-blk is an in-kernel virito-blk device accelerator.
Due to lack of
On Tue, Nov 20, 2012 at 5:13 PM, Lentes, Bernd
bernd.len...@helmholtz-muenchen.de wrote:
first, i'm new to kvm. I'm running KVM on a sles 11 sp2, kernel
3.0.13-0.27-default. My guest is an Ubuntu 12.0.4 LTS 64bit.
The guest has attached a CDROM, using an iso-file from a CIFS-Share. I
On Mon, Nov 19, 2012 at 8:56 AM, Nikola Ciprich
nikola.cipr...@linuxbox.cz wrote:
on one of our servers, windows 2008 KVM suddenly crashed. I see following
in libvirt log:
*** glibc detected *** /usr/bin/qemu-kvm: double free or corruption (!prev):
0x7fc634008cd0 ***
=== Backtrace:
Hello Stefan,
thanks! here it goes..
*** glibc detected *** /usr/bin/qemu-kvm: double free or corruption
(!prev): 0x7fc634008cd0 ***
=== Backtrace: =
/lib64/libc.so.6(+0x75916)[0x7fc9026f4916]
/lib64/libc.so.6(+0x78443)[0x7fc9026f7443]
This makes a HPTE removal function, kvmppc_do_h_remove(), available
outside book3s_hv_rm_mmu.c. This will be used by the HPT writing
code.
Signed-off-by: Paul Mackerras pau...@samba.org
---
v2: basically unchanged from v1, just rediffed
arch/powerpc/include/asm/kvm_book3s.h |3 +++
This uses a bit in our record of the guest view of the HPTE to record
when the HPTE gets modified. We use a reserved bit for this, and ensure
that this bit is always cleared in HPTE values returned to the guest.
The recording of modified HPTEs is only done if other code indicates
its interest by
A new ioctl, KVM_PPC_GET_HTAB_FD, returns a file descriptor. Reads on
this fd return the contents of the HPT (hashed page table), writes
create and/or remove entries in the HPT. There is a new capability,
KVM_CAP_PPC_HTAB_FD, to indicate the presence of the ioctl. The ioctl
takes an argument
This fixes a bug where adding a new guest HPT entry via the H_ENTER
hcall would lose the changed bit in the reverse map information
for the guest physical page being mapped. The result was that the
KVM_GET_DIRTY_LOG could return a zero bit for the page even though
the page had been modified by
On 20.11.2012, at 10:01, Paul Mackerras wrote:
This fixes a bug where adding a new guest HPT entry via the H_ENTER
hcall would lose the changed bit in the reverse map information
for the guest physical page being mapped. The result was that the
KVM_GET_DIRTY_LOG could return a zero bit for
On 20.11.2012, at 09:57, Paul Mackerras wrote:
A new ioctl, KVM_PPC_GET_HTAB_FD, returns a file descriptor. Reads on
this fd return the contents of the HPT (hashed page table), writes
create and/or remove entries in the HPT. There is a new capability,
KVM_CAP_PPC_HTAB_FD, to indicate the
71 matches
Mail list logo