On 10/02/13 14:50, Gleb Natapov wrote:
As 3.8 release is inevitably going closer next branch is going to be
frozen this week. All new patches will be applied to queue only awaiting
for the 3.9-rc1. If you have something for 3.8 please send it asap.
Please consider
s390: Fix handling of iscs
On Thu, Feb 07, 2013 at 01:20:51PM +0100, Cornelia Huck wrote:
Hi,
here's another kvm-s390 bugfix for kvm-next, this time fixing a
thinko in the I/O interrupt injection.
Please apply.
Thanks, applied.
Cornelia Huck (1):
KVM: s390: Fix handling of iscs.
arch/s390/kvm/interrupt.c
On Sun, Feb 10, 2013 at 10:57:18PM +0800, Yang Zhang wrote:
From: Yang Zhang yang.z.zh...@intel.com
Without Posted Interrupt, current code is broken. Just disable by
default until Posted Interrupt is ready.
Thanks, applied.
Signed-off-by: Yang Zhang yang.z.zh...@intel.com
---
On Thu, Feb 07, 2013 at 06:55:57PM +0900, Takuya Yoshikawa wrote:
This field was needed to differentiate memory slots created by the new
API, KVM_SET_USER_MEMORY_REGION, from those by the old equivalent,
KVM_SET_MEMORY_REGION, whose support was dropped long before:
commit
On 2013-02-11 11:07, Nadav Har'El wrote:
On Sun, Feb 10, 2013, Jan Kiszka wrote about [PATCH] KVM: nVMX: Improve I/O
exit handling:
+static bool nested_vmx_exit_handled_io(struct kvm_vcpu *vcpu,
+ struct vmcs12 *vmcs12)
+{
+unsigned long
On Sun, Feb 10, 2013, Jan Kiszka wrote about [PATCH] KVM: nVMX: Improve I/O
exit handling:
+static bool nested_vmx_exit_handled_io(struct kvm_vcpu *vcpu,
+struct vmcs12 *vmcs12)
+{
+ unsigned long exit_qualification;
+ gpa_t bitmap, last_bitmap;
+
Commit 264986e2 extended NetdevTapOptions without updating the
documentation. Hasn't been addressed since. Must fix for 1.4, in my
opinion.
This is the offending patch:
Jason Wang jasow...@redhat.com writes:
Recently, linux support multiqueue tap which could let userspace call
TUNSETIFF
We already pass vmcs12 as argument.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
arch/x86/kvm/vmx.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 64e1233..4339355c 100644
--- a/arch/x86/kvm/vmx.c
+++
This prevents trapping L2 I/O exits if L1 has neither unconditional nor
bitmap-based exiting enabled. Furthermore, it implements basic I/O
bitmap handling. Repeated string accesses are still reported to L1
unconditionally for now.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
Changes in
The series introduces a VFIO support on POWER.
The QEMU support is required, the real mode acceleration patches are coming
later.
Alexey Kardashevskiy (2):
vfio powerpc: enabled on powernv platform
vfio powerpc: implemented IOMMU driver for VFIO
arch/powerpc/include/asm/iommu.h
This patch initializes IOMMU groups based on the IOMMU
configuration discovered during the PCI scan on POWERNV
(POWER non virtualized) platform. The IOMMU groups are
to be used later by VFIO driver (PCI pass through).
It also implements an API for mapping/unmapping pages for
guest PCI drivers and
VFIO implements platform independent stuff such as
a PCI driver, BAR access (via read/write on a file descriptor
or direct mapping when possible) and IRQ signaling.
The platform dependent part includes IOMMU initialization
and handling. This patch implements an IOMMU driver for VFIO
which does
From: Alexey Kardashevskiy a...@ozlabs.ru
The first 2 patches in this set add a multi-tce support feature
(adding/deleting several TCE records at once) in real and virtual mode.
The last 2 patches enable real mode acceleration for VFIO and
extend the multi-tce feature to be available for VFIO
From: Alexey Kardashevskiy a...@ozlabs.ru
he current VFIO-on-POWER implementation supports only user mode
driven mapping, i.e. QEMU is sending requests to map/unmap pages.
However this approach is really slow in really fast hardware so
it is better to be moved to the real mode.
The patch adds an
From: Alexey Kardashevskiy a...@ozlabs.ru
The patch allows the host kernel to handle H_PUT_TCE request
without involving QEMU in it what should save time on switching
from the kernel to QEMU and back.
The patch adds an IOMMU ID parameter into the KVM_CAP_SPAPR_TCE ioctl,
QEMU needs to be fixed
From: Alexey Kardashevskiy a...@ozlabs.ru
The patch adds real mode handlers for H_PUT_TCE_INDIRECT and
H_STUFF_TCE hypercalls for QEMU emulated devices such as virtio
devices or emulated PCI. These calls allow adding multiple entries
(up to 512) into the TCE table in one call which saves time on
From: Alexey Kardashevskiy a...@ozlabs.ru
The lookup_linux_pte() function returns a linux PTE which
is required to convert KVM guest physical address into host real
address in real mode.
This convertion will be used by upcoming support of H_PUT_TCE_INDIRECT
as TCE list address comes from the
https://bugzilla.kernel.org/show_bug.cgi?id=53601
Summary: nVMX meta-bug
Product: Virtualization
Version: unspecified
Platform: All
OS/Version: Linux
Tree: Mainline
Status: NEW
Severity: normal
https://bugzilla.kernel.org/show_bug.cgi?id=53601
Nadav Har'El n...@math.technion.ac.il changed:
What|Removed |Added
Depends on||43068, 45931
https://bugzilla.kernel.org/show_bug.cgi?id=43068
Nadav Har'El n...@math.technion.ac.il changed:
What|Removed |Added
Blocks||53601
--
https://bugzilla.kernel.org/show_bug.cgi?id=45931
Nadav Har'El n...@math.technion.ac.il changed:
What|Removed |Added
Blocks||53601
--
https://bugzilla.kernel.org/show_bug.cgi?id=53611
Summary: nVMX: Add nested EPT
Product: Virtualization
Version: unspecified
Platform: All
OS/Version: Linux
Tree: Mainline
Status: NEW
Severity: normal
https://bugzilla.kernel.org/show_bug.cgi?id=53601
Nadav Har'El n...@math.technion.ac.il changed:
What|Removed |Added
Depends on||53611
--
https://bugzilla.kernel.org/show_bug.cgi?id=53611
Nadav Har'El n...@math.technion.ac.il changed:
What|Removed |Added
Blocks||53601
--
Upstream test device does not implement port 0xd1.
Signed-off-by: Gleb Natapov g...@redhat.com
diff --git a/lib/x86/vm.c b/lib/x86/vm.c
index 71b70fd..2852c6c 100644
--- a/lib/x86/vm.c
+++ b/lib/x86/vm.c
@@ -1,3 +1,4 @@
+#include fwcfg.h
#include vm.h
#include libcflat.h
@@ -185,16 +186,9 @@
https://bugzilla.kernel.org/show_bug.cgi?id=53621
Summary: nVMX: MSR_IA32_FEATURE_CONTROL
Product: Virtualization
Version: unspecified
Platform: All
OS/Version: Linux
Tree: Mainline
Status: NEW
Severity:
https://bugzilla.kernel.org/show_bug.cgi?id=53621
--- Comment #1 from Nadav Har'El n...@math.technion.ac.il 2013-02-11
13:12:57 ---
Created an attachment (id=93111)
-- (https://bugzilla.kernel.org/attachment.cgi?id=93111)
Patch for better MSR_IA32_FEATURE_CONTROL emulation
--
Configure
On 2013-02-11 13:49, bugzilla-dae...@bugzilla.kernel.org wrote:
https://bugzilla.kernel.org/show_bug.cgi?id=53611
Summary: nVMX: Add nested EPT
Product: Virtualization
Version: unspecified
Platform: All
OS/Version: Linux
https://bugzilla.kernel.org/show_bug.cgi?id=53601
Nadav Har'El n...@math.technion.ac.il changed:
What|Removed |Added
Depends on||53621
--
https://bugzilla.kernel.org/show_bug.cgi?id=53621
Nadav Har'El n...@math.technion.ac.il changed:
What|Removed |Added
Blocks||53601
--
Hi,
On Mon, Feb 11, 2013, Jan Kiszka wrote about Re: [Bug 53611] New: nVMX: Add
nested EPT:
On 2013-02-11 13:49, bugzilla-dae...@bugzilla.kernel.org wrote:
https://bugzilla.kernel.org/show_bug.cgi?id=53611
Summary: nVMX: Add nested EPT
Yikes, I didn't realize that these bugzilla
https://bugzilla.kernel.org/show_bug.cgi?id=53631
Summary: nVMX: Support exit/entry MSR load/store
Product: Virtualization
Version: unspecified
Platform: All
OS/Version: Linux
Tree: Mainline
Status: NEW
https://bugzilla.kernel.org/show_bug.cgi?id=53631
Nadav Har'El n...@math.technion.ac.il changed:
What|Removed |Added
Blocks||53601
--
https://bugzilla.kernel.org/show_bug.cgi?id=53601
Nadav Har'El n...@math.technion.ac.il changed:
What|Removed |Added
Depends on||53631
--
https://bugzilla.kernel.org/show_bug.cgi?id=53641
Summary: nVMX: Windows as L2 guest doesn't work
Product: Virtualization
Version: unspecified
Platform: All
OS/Version: Linux
Tree: Mainline
Status: NEW
https://bugzilla.kernel.org/show_bug.cgi?id=53641
Nadav Har'El n...@math.technion.ac.il changed:
What|Removed |Added
Blocks||53601
--
https://bugzilla.kernel.org/show_bug.cgi?id=53601
Nadav Har'El n...@math.technion.ac.il changed:
What|Removed |Added
Depends on||53641
--
On 2013-02-11 14:27, Nadav Har'El wrote:
Hi,
On Mon, Feb 11, 2013, Jan Kiszka wrote about Re: [Bug 53611] New: nVMX: Add
nested EPT:
On 2013-02-11 13:49, bugzilla-dae...@bugzilla.kernel.org wrote:
https://bugzilla.kernel.org/show_bug.cgi?id=53611
Summary: nVMX: Add nested EPT
https://bugzilla.kernel.org/show_bug.cgi?id=53651
Summary: nVMX: L1 crashes with no-kvm-irqchip
Product: Virtualization
Version: unspecified
Platform: All
OS/Version: Linux
Tree: Mainline
Status: NEW
Severity:
https://bugzilla.kernel.org/show_bug.cgi?id=53601
Nadav Har'El n...@math.technion.ac.il changed:
What|Removed |Added
Depends on||53651
--
https://bugzilla.kernel.org/show_bug.cgi?id=53651
Nadav Har'El n...@math.technion.ac.il changed:
What|Removed |Added
Blocks||53601
--
https://bugzilla.kernel.org/show_bug.cgi?id=45931
Nadav Har'El n...@math.technion.ac.il changed:
What|Removed |Added
CC|
On 02/11/2013 11:10 AM, Gleb Natapov wrote:
Upstream test device does not implement port 0xd1.
I remember sending a similar patch a while ago, but it seems like it
didn't get applied.
One thing that does occur to me - we will have to keep testing RHEL5,
RHEL6 and Fedora with their old test
On 2012-12-20 15:57, Gleb Natapov wrote:
According to Intel SDM Vol3 Section 5.5 Privilege Levels and 5.6
Privilege Level Checking When Accessing Data Segments RPL checking is
done during loading of a segment selector, not during data access. We
already do checking during segment selector
Hi
Please send in any agenda topics you are interested in.
Later, Juan.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
On Mon, Feb 11, 2013 at 05:58:24PM +0100, Jan Kiszka wrote:
On 2012-12-20 15:57, Gleb Natapov wrote:
According to Intel SDM Vol3 Section 5.5 Privilege Levels and 5.6
Privilege Level Checking When Accessing Data Segments RPL checking is
done during loading of a segment selector, not during
On 2013-02-11 18:25, Gleb Natapov wrote:
On Mon, Feb 11, 2013 at 05:58:24PM +0100, Jan Kiszka wrote:
On 2012-12-20 15:57, Gleb Natapov wrote:
According to Intel SDM Vol3 Section 5.5 Privilege Levels and 5.6
Privilege Level Checking When Accessing Data Segments RPL checking is
done during
On Mon, Feb 11, 2013 at 06:31:59PM +0100, Jan Kiszka wrote:
On 2013-02-11 18:25, Gleb Natapov wrote:
On Mon, Feb 11, 2013 at 05:58:24PM +0100, Jan Kiszka wrote:
On 2012-12-20 15:57, Gleb Natapov wrote:
According to Intel SDM Vol3 Section 5.5 Privilege Levels and 5.6
Privilege Level
On Mon, Feb 11, 2013 at 07:40:38PM +0200, Gleb Natapov wrote:
On Mon, Feb 11, 2013 at 06:31:59PM +0100, Jan Kiszka wrote:
On 2013-02-11 18:25, Gleb Natapov wrote:
On Mon, Feb 11, 2013 at 05:58:24PM +0100, Jan Kiszka wrote:
On 2012-12-20 15:57, Gleb Natapov wrote:
According to Intel SDM
On 2013-02-11 18:50, Gleb Natapov wrote:
On Mon, Feb 11, 2013 at 07:40:38PM +0200, Gleb Natapov wrote:
On Mon, Feb 11, 2013 at 06:31:59PM +0100, Jan Kiszka wrote:
On 2013-02-11 18:25, Gleb Natapov wrote:
On Mon, Feb 11, 2013 at 05:58:24PM +0100, Jan Kiszka wrote:
On 2012-12-20 15:57, Gleb
On Mon, Feb 11, 2013 at 07:05:50PM +0100, Jan Kiszka wrote:
thus 3.0. We are running on such a 3.0.x host kernel (SLES11.2), and
this issue only triggers on specific hosts with specific guest
configurations. After no longer seeing it with kvm/next, I bisected the
fix to this commit and
On Thu, Feb 7, 2013 at 4:19 PM, Stefan Hajnoczi stefa...@gmail.com wrote:
I believe Google will announce GSoC again this year (there is
no guarantee though) and I have created the wiki page so we can begin
organizing project ideas that students can choose from.
Google Summer of Code 2013 has
On Mon, 2013-02-11 at 22:54 +1100, Alexey Kardashevskiy wrote:
This patch initializes IOMMU groups based on the IOMMU
configuration discovered during the PCI scan on POWERNV
(POWER non virtualized) platform. The IOMMU groups are
to be used later by VFIO driver (PCI pass through).
It also
On Mon, 2013-02-11 at 22:54 +1100, Alexey Kardashevskiy wrote:
VFIO implements platform independent stuff such as
a PCI driver, BAR access (via read/write on a file descriptor
or direct mapping when possible) and IRQ signaling.
The platform dependent part includes IOMMU initialization
and
On 12/02/13 09:16, Alex Williamson wrote:
On Mon, 2013-02-11 at 22:54 +1100, Alexey Kardashevskiy wrote:
This patch initializes IOMMU groups based on the IOMMU
configuration discovered during the PCI scan on POWERNV
(POWER non virtualized) platform. The IOMMU groups are
to be used later by VFIO
On 12/02/13 09:17, Alex Williamson wrote:
On Mon, 2013-02-11 at 22:54 +1100, Alexey Kardashevskiy wrote:
VFIO implements platform independent stuff such as
a PCI driver, BAR access (via read/write on a file descriptor
or direct mapping when possible) and IRQ signaling.
The platform dependent
Such messages in the system log very often cause confusion because users
understand the kvm: unhandled MSR messages as errors.
Switch to trace points, making the information available on demand.
diff --git a/arch/x86/kvm/trace.h b/arch/x86/kvm/trace.h
index fe5e00e..c461368 100644
---
On Tue, 2013-02-12 at 10:19 +1100, Alexey Kardashevskiy wrote:
On 12/02/13 09:16, Alex Williamson wrote:
On Mon, 2013-02-11 at 22:54 +1100, Alexey Kardashevskiy wrote:
@@ -707,11 +709,39 @@ struct iommu_table *iommu_init_table(struct
iommu_table *tbl, int nid)
return tbl;
}
On Tue, 2013-02-12 at 10:45 +1100, Alexey Kardashevskiy wrote:
On 12/02/13 09:17, Alex Williamson wrote:
On Mon, 2013-02-11 at 22:54 +1100, Alexey Kardashevskiy wrote:
VFIO implements platform independent stuff such as
a PCI driver, BAR access (via read/write on a file descriptor
or
From: Alexey Kardashevskiy a...@ozlabs.ru
The patch allows the host kernel to handle H_PUT_TCE request
without involving QEMU in it what should save time on switching
from the kernel to QEMU and back.
The patch adds an IOMMU ID parameter into the KVM_CAP_SPAPR_TCE ioctl,
QEMU needs to be fixed
From: Alexey Kardashevskiy a...@ozlabs.ru
The patch adds real mode handlers for H_PUT_TCE_INDIRECT and
H_STUFF_TCE hypercalls for QEMU emulated devices such as virtio
devices or emulated PCI. These calls allow adding multiple entries
(up to 512) into the TCE table in one call which saves time on
61 matches
Mail list logo