On Thu, May 09, 2013 at 08:21:41PM -0300, Marcelo Tosatti wrote:
kvmclock updates which are isolated to a given vcpu, such as vcpu-cpu
migration, should not allow system_timestamp from the rest of the vcpus
to remain static. Otherwise ntp frequency correction applies to one
vcpu's
On Mon, May 13, 2013 at 10:30:33PM -0300, Marcelo Tosatti wrote:
On Thu, May 02, 2013 at 10:14:32PM -0300, Marcelo Tosatti wrote:
On Sun, Apr 28, 2013 at 02:00:41PM +0200, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
Since the arrival of posted interrupt support we can no
On Mon, May 13, 2013 at 01:21:40PM -0700, Sanjay Lal wrote:
Explain kvm_mips_map_page() changes here please. The text from the cover
letter does not go into git history.
Signed-off-by: Sanjay Lal sanj...@kymasys.com
---
arch/mips/kvm/kvm_tlb.c | 38 +-
On Mon, 2013-05-13 at 16:30 -0700, Eric Northup wrote:
On Mon, May 13, 2013 at 4:45 AM, Vadim Rozenfeld vroze...@redhat.com wrote:
Signed-off: Peter Lieven p...@dlh.net
Signed-off: Gleb Natapov g...@redhat.com
Signed-off: Vadim Rozenfeld vroze...@redhat.com
The following patch allows to
Bernd wrote:
Hi,
i'm new to kvm. I managed to migrate a vm from VMWare Server
1.09 to kvm. I'm running kvm 0.15.1-0.23.1 on a SLES 11 SP2
64bit host.
The vm is booting properly. But i can't configure a tablet,
what is recommended for having a smooth mouse pointer. The
tablet is included
On 05/13/2013 04:32 PM, nitesh narayan lal wrote:
Hi,
I am doing the virtio performance analysis on PowerPC,with the updated
QEMU I had observed that the EMUL_MTSPR instruction counts in KVM Exit
Sounds you are saying this behaviour is only reproduced after you update QEMU.
If so, you can use
This patch series fixes a number of of KVM/ARM issues that have either
been spotted during the review of the arm64 code, or while reworking
related code.
Only the first patch fixes a potential (if unlikely) problem, the
others are either cosmetic or performance related.
Tested on TC-2, based on
The KVM/ARM MMU code doesn't take care of invalidating TLBs before
freeing a {pte,pmd} table. This could cause problems if the page
is reallocated and then speculated into by another CPU.
Reported-by: Catalin Marinas catalin.mari...@arm.com
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
At the moment, when mapping a device into Stage-2 for a guest,
we override whatever the guest uses by forcing a device memory
type in Stage-2.
While this is not exactly wrong, this isn't really the spirit of
the architecture. The hardware shouldn't have to cope for a broken
guest mapping to a
__kvm_tlb_flush_vmid has been renamed to __kvm_tlb_flush_vmid_ipa,
and the old prototype should have been removed when the code was
modified.
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
arch/arm/include/asm/kvm_asm.h | 2 --
1 file changed, 2 deletions(-)
diff --git
S2_PGD_SIZE defines the number of pages used by a stage-2 PGD
and is unused, except for a VM_BUG_ON check that missuses the
define.
As the check is very unlikely to ever triggered except in
circumstances where KVM is the least of our worries, just kill
both the define and the VM_BUG_ON check.
Admitedly, reading a MMIO register to load PC is very weird.
Writing PC to a MMIO register is probably even worse. But
the architecture doesn't forbid any of these, and injecting
a Prefetch Abort is the wrong thing to do anyway.
Remove this check altogether, and let the adventurous guest
wander
HYP PGDs are passed around as phys_addr_t, except just before calling
into the hypervisor init code, where they are cast to a rather weird
unsigned long long.
Just keep them around as phys_addr_t, which is what makes the most
sense.
Reported-by: Catalin Marinas catalin.mari...@arm.com
Patch 5a677ce044f1 (ARM: KVM: switch to a dual-step HYP init code)
introduced code that flushes page tables to the point of coherency.
This is overkill (point of unification is enough and already done),
and actually not required if running on a SMP capable platform
(the HW PTW can snoop other
As KVM/arm64 is looming on the horizon, it makes sense to move some
of the common code to a single location in order to reduce duplication.
The code could live anywhere. Actually, most of KVM is already built
with a bunch of ugly ../../.. hacks in the various Makefiles, so we're
not exactly
As requested by the KVM maintainers, remove the addprefix used to
refer to the main KVM code from the arch code, and replace it with
a KVM variable that does the same thing.
Cc: Paolo Bonzini pbonz...@redhat.com
Cc: Gleb Natapov g...@redhat.com
Cc: Christoffer Dall cd...@cs.columbia.edu
Cc:
As KVM/arm64 is looming on the horizon, it makes sense to move some
of the common code to a single location in order to reduce duplication.
The code could live anywhere. Actually, most of KVM is already built
with a bunch of ugly ../../.. hacks in the various Makefiles, so we're
not exactly
Il 14/05/2013 14:30, Marc Zyngier ha scritto:
As requested by the KVM maintainers, remove the addprefix used to
refer to the main KVM code from the arch code, and replace it with
a KVM variable that does the same thing.
Cc: Paolo Bonzini pbonz...@redhat.com
Cc: Gleb Natapov g...@redhat.com
Il 14/05/2013 14:30, Marc Zyngier ha scritto:
As KVM/arm64 is looming on the horizon, it makes sense to move some
of the common code to a single location in order to reduce duplication.
The code could live anywhere. Actually, most of KVM is already built
with a bunch of ugly ../../.. hacks
Il 09/05/2013 02:53, Jun Nakajima ha scritto:
+#endif
walker-fault.address = addr;
walker-fault.nested_page_fault = mmu != vcpu-arch.walk_mmu;
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index ca49e19..a44e7fd 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
On Tue, May 14, 2013 at 12:11:36PM +0100, Marc Zyngier wrote:
Patch 5a677ce044f1 (ARM: KVM: switch to a dual-step HYP init code)
introduced code that flushes page tables to the point of coherency.
This is overkill (point of unification is enough and already done),
and actually not required if
On 14/05/13 13:37, Paolo Bonzini wrote:
Il 14/05/2013 14:30, Marc Zyngier ha scritto:
As requested by the KVM maintainers, remove the addprefix used to
refer to the main KVM code from the arch code, and replace it with
a KVM variable that does the same thing.
Cc: Paolo Bonzini
On Tue, May 14, 2013 at 12:05:13PM +0300, Gleb Natapov wrote:
On Thu, May 09, 2013 at 08:21:41PM -0300, Marcelo Tosatti wrote:
kvmclock updates which are isolated to a given vcpu, such as vcpu-cpu
migration, should not allow system_timestamp from the rest of the vcpus
to remain static.
Thanks! Acked-by: Xiantao Zhang xiantao.zh...@intel.com
-Original Message-
From: Marc Zyngier [mailto:marc.zyng...@arm.com]
Sent: Tuesday, May 14, 2013 8:31 PM
To: linux-arm-ker...@lists.infradead.org; kvm...@lists.cs.columbia.edu;
kvm@vger.kernel.org
Cc: Paolo Bonzini; Gleb
As KVM/arm64 is looming on the horizon, it makes sense to move some
of the common code to a single location in order to reduce duplication.
The code could live anywhere. Actually, most of KVM is already built
with a bunch of ugly ../../.. hacks in the various Makefiles, so we're
not exactly
As KVM/arm64 is looming on the horizon, it makes sense to move some
of the common code to a single location in order to reduce duplication.
The code could live anywhere. Actually, most of KVM is already built
with a bunch of ugly ../../.. hacks in the various Makefiles, so we're
not exactly
As requested by the KVM maintainers, remove the addprefix used to
refer to the main KVM code from the arch code, and replace it with
a KVM variable that does the same thing.
Cc: Paolo Bonzini pbonz...@redhat.com
Cc: Gleb Natapov g...@redhat.com
Cc: Christoffer Dall cd...@cs.columbia.edu
Acked-by:
Juan Quintela quint...@redhat.com wrote:
Hi
Please send in any agenda topics you are interested in.
As there is no agenda no call.
have a nice day, Juan.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info
This series contains the fourth version of KVM for arm64.
It depends on the following branche:
- git://git.kernel.org/pub/scm/linux/kernel/git/maz/arm-platforms.git
kvm-arm/fixes
a small number of fixes and other files being moved around
The code is unsurprisingly extremely similar to the
Add HYP and S2 page flags, for both normal and device memory.
Reviewed-by: Christopher Covington c...@codeaurora.org
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
arch/arm64/include/asm/memory.h| 5 +
arch/arm64/include/asm/pgtable-hwdef.h | 19 +++
Implement the injection of a fault (undefined, data abort or
prefetch abort) into a 64bit guest.
Reviewed-by: Christopher Covington c...@codeaurora.org
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
arch/arm64/kvm/inject_fault.c | 126 ++
1 file
Provide the kvm.h file that defines the user space visible
interface.
Reviewed-by: Christopher Covington c...@codeaurora.org
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
arch/arm64/include/uapi/asm/kvm.h | 117 ++
1 file changed, 117 insertions(+)
Define the arm64 specific MMU backend:
- HYP/kernel VA offset
- S2 4/64kB definitions
- S2 page table populating and flushing
- icache cleaning
Reviewed-by: Christopher Covington c...@codeaurora.org
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
arch/arm64/include/asm/kvm_mmu.h | 135
Provide the reset code for a virtual CPU booted in 64bit mode.
Reviewed-by: Christopher Covington c...@codeaurora.org
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
arch/arm64/kvm/reset.c | 77 ++
1 file changed, 77 insertions(+)
create mode
Provide the architecture dependent structures for VM and
vcpu abstractions.
Reviewed-by: Christopher Covington c...@codeaurora.org
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
arch/arm64/include/asm/kvm_host.h | 186 ++
1 file changed, 186
Define the necessary structures to perform an MMIO access.
Reviewed-by: Christopher Covington c...@codeaurora.org
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
arch/arm64/include/asm/kvm_mmio.h | 59 +++
1 file changed, 59 insertions(+)
create mode
Add support for the in-kernel GIC emulation.
Reviewed-by: Christopher Covington c...@codeaurora.org
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
arch/arm64/kvm/hyp.S | 88
1 file changed, 88 insertions(+)
diff --git
Handle the exit of a VM, decoding the exit reason from HYP mode
and calling the corresponding handler.
Reviewed-by: Christopher Covington c...@codeaurora.org
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
arch/arm64/kvm/handle_exit.c | 119 +++
1
Let userspace play with the guest registers.
Reviewed-by: Christopher Covington c...@codeaurora.org
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
arch/arm64/kvm/guest.c | 253 +
1 file changed, 253 insertions(+)
create mode 100644
The HYP mode world switch in all its glory.
Implements save/restore of host/guest registers, EL2 trapping,
IPA resolution, and additional services (tlb invalidation).
Reviewed-by: Christopher Covington c...@codeaurora.org
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
Provide EL2 with page tables and stack, and set the vectors
to point to the full blown world-switch code.
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
arch/arm64/include/asm/kvm_host.h | 13 +
arch/arm64/kvm/hyp-init.S | 112 ++
2 files
Provide 64bit system register handling, modeled after the cp15
handling for ARM.
Reviewed-by: Christopher Covington c...@codeaurora.org
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
arch/arm64/include/asm/kvm_coproc.h | 51 +++
arch/arm64/include/uapi/asm/kvm.h | 29 ++
Add the support code for CPU specific system registers. Not much
here yet.
Reviewed-by: Christopher Covington c...@codeaurora.org
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
arch/arm64/kvm/sys_regs_generic_v8.c | 85
1 file changed, 85 insertions(+)
Implements helpers for dealing with the EL2 syndrome register as
well as accessing the vcpu registers.
Reviewed-by: Christopher Covington c...@codeaurora.org
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
arch/arm64/include/asm/kvm_emulate.h | 158 +++
1
Define all the useful bitfields for EL2 registers.
Reviewed-by: Christopher Covington c...@codeaurora.org
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
arch/arm64/include/asm/kvm_arm.h | 245 +++
1 file changed, 245 insertions(+)
create mode 100644
Add the necessary infrastructure for identity-mapped HYP page
tables. Idmap-ed code must be in the .hyp.idmap.text linker
section.
The rest of the HYP ends up in .hyp.text.
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
arch/arm64/kernel/vmlinux.lds.S | 20
1 file
Define the saved/restored registers for 64bit guests.
Reviewed-by: Christopher Covington c...@codeaurora.org
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
arch/arm64/include/asm/kvm_asm.h | 68
1 file changed, 68 insertions(+)
create mode 100644
Unsurprisingly, the arm64 userspace API is extremely similar to
the 32bit one, the only significant difference being the ONE_REG
register mapping.
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
Documentation/virtual/kvm/api.txt | 58 ++-
1 file changed,
Elect myself as the KVM/arm64 maintainer.
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
MAINTAINERS | 9 +
1 file changed, 9 insertions(+)
diff --git a/MAINTAINERS b/MAINTAINERS
index 3d7782b..d7e7bbb 100644
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -4700,6 +4700,15 @@ F:
Wire the init of a 32bit vcpu by allowing 32bit modes in pstate,
and providing sensible defaults out of reset state.
This feature is of course conditioned by the presence of 32bit
capability on the physical CPU, and is checked by the KVM_CAP_ARM_EL1_32BIT
capability.
Signed-off-by: Marc Zyngier
HYP mode has access to some of the kernel pages. Document the
memory mapping and the offset between kernel VA and HYP VA.
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
Documentation/arm64/memory.txt | 7 +++
1 file changed, 7 insertions(+)
diff --git a/Documentation/arm64/memory.txt
Provide the necessary infrastructure to trap coprocessor accesses that
occur when running 32bit guests.
Also wire SMC and HVC trapped in 32bit mode while were at it.
Reviewed-by: Christopher Covington c...@codeaurora.org
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
Enable handling of CPU specific 32bit coprocessor access. Not much
here either.
Reviewed-by: Christopher Covington c...@codeaurora.org
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
arch/arm64/kvm/sys_regs_generic_v8.c | 10 ++
1 file changed, 10 insertions(+)
diff --git
Allow registers specific to 32bit guests to be saved/restored
during the world switch.
Reviewed-by: Christopher Covington c...@codeaurora.org
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
arch/arm64/kvm/hyp.S | 70
1 file changed, 70
Reviewed-by: Christopher Covington c...@codeaurora.org
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
arch/arm64/Kconfig | 2 ++
arch/arm64/Makefile | 2 +-
arch/arm64/kvm/Kconfig | 59 +
arch/arm64/kvm/Makefile | 23
Add fault injection capability for 32bit guests.
Reviewed-by: Christopher Covington c...@codeaurora.org
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
arch/arm64/kvm/inject_fault.c | 79 ++-
1 file changed, 78 insertions(+), 1 deletion(-)
diff --git
Allow access to the 32bit register file through the usual API.
Reviewed-by: Christopher Covington c...@codeaurora.org
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
arch/arm64/include/asm/kvm_emulate.h | 15 +++-
arch/arm64/kvm/Makefile | 2 +-
arch/arm64/kvm/regmap.c
Add support for the in-kernel timer emulation.
Reviewed-by: Christopher Covington c...@codeaurora.org
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
arch/arm64/kvm/hyp.S | 56 +++
virt/kvm/arm/arch_timer.c | 1 +
2 files changed, 57
Define the 32bit specific registers (SPSRs, cp15...).
Most CPU registers are directly mapped to a 64bit register
(r0-x0...). Only the SPSRs have separate registers.
cp15 registers are also mapped into their 64bit counterpart in most
cases.
Reviewed-by: Christopher Covington c...@codeaurora.org
Wire the PSCI backend into the exit handling code.
Reviewed-by: Christopher Covington c...@codeaurora.org
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
arch/arm64/include/asm/kvm_host.h | 2 +-
arch/arm64/include/asm/kvm_psci.h | 23 +++
As conditional instructions can trap on AArch32, add the thinest
possible emulation layer to keep 32bit guests happy.
Reviewed-by: Christopher Covington c...@codeaurora.org
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
arch/arm64/include/asm/kvm_emulate.h | 13 ++-
On 13.05.2013 13:45, Vadim Rozenfeld wrote:
Signed-off: Peter Lieven p...@dlh.net
Signed-off: Gleb Natapov g...@redhat.com
Signed-off: Vadim Rozenfeld vroze...@redhat.com
The following patch allows to activate Hyper-V
reference time counter
---
arch/x86/include/asm/kvm_host.h| 2 ++
Hi,
I'm new to KVM. I'm doing some test on nested Virtualization with Xen
and KVM. I tried to test the Xen hypervisor as L1 over KVM ( Linux
3.9.0) and I found this in
xm dmesg log ( for the complete log, see the attached file).
(XEN) VMX: CPU0 has
On Fri, May 3, 2013 at 9:53 AM, Michael Ellerman mich...@ellerman.id.au wrote:
On Wed, 2013-05-01 at 16:50 +0100, Will Deacon wrote:
Hi guys,
This RFC series does a number of things, but the main goal is to allow
re-use of the emulation code under hw/ on architectures other than x86.
It also
I applied the series. Thanks a lot Sasha!
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
On Mon, May 13, 2013 at 1:58 AM, Will Deacon will.dea...@arm.com wrote:
On Mon, May 13, 2013 at 06:17:37AM +0100, Christoffer Dall wrote:
On Thu, May 02, 2013 at 04:17:53PM +0100, Will Deacon wrote:
or just *pte = XX;
That won't work with STRICT_M_TYPECHECKS though will it?
Depends if XX
scsi.c includes vhost.c which uses memcpy_fromiovec.
This patch fixes this build failure.
From Randy Dunlap:
'''
on x86_64:
ERROR: memcpy_fromiovec [drivers/vhost/vhost_scsi.ko] undefined!
It needs to depend on NET since net/core/ provides that function.
'''
Reported-by:
-Original Message-
From: kvm-ow...@vger.kernel.org [mailto:kvm-ow...@vger.kernel.org]
On Behalf Of Alex Palesandro
Sent: Tuesday, May 14, 2013 10:51 PM
To: kvm@vger.kernel.org
Subject: Fwd: Xen as L1 support
Hi,
I'm new to KVM. I'm doing some test on nested Virtualization with
On Wed, 2013-05-15 at 08:59 +0800, Asias He wrote:
scsi.c includes vhost.c which uses memcpy_fromiovec.
This patch fixes this build failure.
From Randy Dunlap:
'''
on x86_64:
ERROR: memcpy_fromiovec [drivers/vhost/vhost_scsi.ko] undefined!
It needs to depend on NET
On Tue, May 14, 2013 at 08:10:20PM -0700, Nicholas A. Bellinger wrote:
On Wed, 2013-05-15 at 08:59 +0800, Asias He wrote:
scsi.c includes vhost.c which uses memcpy_fromiovec.
This patch fixes this build failure.
From Randy Dunlap:
'''
on x86_64:
ERROR:
Hi Tiejun,
It was just an observation made by me, but I checked it again and I
observed that its not consistent. I didn't get the same thing what I
had observed earlier in the next trial.
Although right now I will keep my analysis going and will keep the
list updated as I will find something.
A small update:
Yesterday, I also ran a simple libguestfs test[1], which creates a
light weight appliance (i.e. an L2) guest , with and without nesting
to see some over-head.
Summary:
-
L0 (bare-metal):
- guestfish run: ~ 3 seconds
L1 (guest):
- w/o nesting, guestfish
Asias He as...@redhat.com writes:
scsi.c includes vhost.c which uses memcpy_fromiovec.
This patch fixes this build failure.
From Randy Dunlap:
'''
on x86_64:
ERROR: memcpy_fromiovec [drivers/vhost/vhost_scsi.ko] undefined!
It needs to depend on NET since net/core/
On 05/13/2013 04:32 PM, nitesh narayan lal wrote:
Hi,
I am doing the virtio performance analysis on PowerPC,with the updated
QEMU I had observed that the EMUL_MTSPR instruction counts in KVM Exit
Sounds you are saying this behaviour is only reproduced after you update QEMU.
If so, you can use
74 matches
Mail list logo