Hi Alex/Scott,
Below is my understanding about the ONE_REG interface requirement for timer
registers.
Define the below 2 ONE_REG interface for TSR access:
KVM_REG_SET_TSR, // Set the specified bits in TSR
KVM_REG_CLEAR_TSR, // Clear the specified bits in TSR
QEMU will use the a
> -Original Message-
> From: Wood Scott-B07421
> Sent: Saturday, February 02, 2013 4:09 AM
> To: Alexander Graf
> Cc: Bhushan Bharat-R65777; kvm-...@vger.kernel.org; kvm@vger.kernel.org
> Subject: Re: [PATCH 8/8] KVM:PPC:booke: Allow debug interrupt injection to
> guest
>
> On 01/31/201
> -Original Message-
> From: Gleb Natapov [mailto:g...@redhat.com]
> Sent: Sunday, February 03, 2013 9:57 PM
> To: Xu, Dongxiao
> Cc: kvm@vger.kernel.org
> Subject: Re: KVM: VMX: disable SMEP feature when guest is in non-paging
> mode
>
> On Fri, Feb 01, 2013 at 08:30:07AM -, Xu wrote:
Changes from v1 to v2:
- Modify commit message and comments according to Gleb's suggestions.
SMEP is disabled if CPU is in non-paging mode in hardware.
However KVM always uses paging mode to emulate guest non-paging
mode with TDP. To emulate this behavior, SMEP needs to be manually
disabled when
Hello all:
I have a CentOS server using KVM to host guest servers.
I am trying to limit the bandwidth usable by a guest server.
I tried to use tc, but that is only limiting the download bandwidth
to a server. It does not seem to filter packets uploaded by the
server.
Is there a tool to limit up
On Wed, Jan 16, 2013 at 01:54:41PM +0530, Bharat Bhushan wrote:
> This patch adds the one_reg interface to get the special instruction
> to be used for setting software breakpoint from userspace.
Since this presumably is constant for any given platform, wouldn't
a capability be more appropriate?
On Thu, Jan 31, 2013 at 03:55:56PM +0200, Gleb Natapov wrote:
> On Thu, Jan 31, 2013 at 11:44:43AM -0200, Marcelo Tosatti wrote:
> > On Thu, Jan 31, 2013 at 03:38:37PM +0200, Gleb Natapov wrote:
> > > On Thu, Jan 31, 2013 at 11:32:45AM -0200, Marcelo Tosatti wrote:
> > > > On Thu, Jan 31, 2013 at 1
On Sun, Feb 3, 2013 at 2:10 PM, Pandarathil, Vijaymohan R
wrote:
> - Create eventfd per vfio device assigned to a guest and register an
> event handler
>
> - This fd is passed to the vfio_pci driver through the SET_IRQ ioctl
>
> - When the device encounters an err
On Sun, Feb 3, 2013 at 2:10 PM, Pandarathil, Vijaymohan R
wrote:
> - New VFIO_SET_IRQ ioctl option to pass the eventfd that is signaled
> when
> an error occurs in the vfio_pci_device
>
> - Register pci_error_handler for the vfio_pci driver
>
> - When the device
Signed-off-by: Gleb Natapov
diff --git a/arch/x86/include/asm/vmx.h b/arch/x86/include/asm/vmx.h
index 694586c..5c9dbad 100644
--- a/arch/x86/include/asm/vmx.h
+++ b/arch/x86/include/asm/vmx.h
@@ -105,7 +105,12 @@
{ EXIT_REASON_APIC_ACCESS, "APIC_ACCESS" }, \
{ EXIT_REASO
- New VFIO_SET_IRQ ioctl option to pass the eventfd that is signaled
when
an error occurs in the vfio_pci_device
- Register pci_error_handler for the vfio_pci driver
- When the device encounters an error, the error handler registered by
the vfio_pci dr
Please use "git send-email --thread --no-chain-reply-to" when sending
patch series.
On Sun, Feb 03, 2013 at 02:10:08PM +, Pandarathil, Vijaymohan R wrote:
>
> Add support for error containment when a VFIO device assigned to a KVM
> guest encounters an error. This is for PCIe devices/drivers t
- Create eventfd per vfio device assigned to a guest and register an
event handler
- This fd is passed to the vfio_pci driver through the SET_IRQ ioctl
- When the device encounters an error, the eventfd is signalled
and the qemu eventfd handler gets inv
Add support for error containment when a VFIO device assigned to a KVM
guest encounters an error. This is for PCIe devices/drivers that support AER
functionality. When the host OS is notified of an error in a device either
through the firmware first approach or through an interrupt handled by the
- Added vfio_device_get_from_dev() as wrapper to get
reference to vfio_device from struct device.
- Added vfio_device_data() as a wrapper to get device_data from
vfio_device.
Signed-off-by: Vijay Mohan Pandarathil
---
drivers/vfio/vfio.c | 41 +++
On Fri, Feb 01, 2013 at 08:30:07AM -, Xu wrote:
> SMEP is disabled if CPU is in non-paging mode in hardware.
> However KVM always uses paging mode to emulate guest non-paging
> mode with HAP.
Not always, only if unrestricted mode is disabled, since vm86 mode, that
is used otherwise, requires pa
https://bugzilla.kernel.org/show_bug.cgi?id=50921
--- Comment #22 from Gleb 2013-02-03 08:48:16 ---
(In reply to comment #21)
> It is queued for 3.8.
Sorry, for 3.9
--
Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email
--- You are receiving this mail because: -
https://bugzilla.kernel.org/show_bug.cgi?id=50921
--- Comment #21 from Gleb 2013-02-03 08:43:20 ---
It is queued for 3.8.
--
Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are watching the assignee of the bug.
18 matches
Mail list logo