On 2014-10-22 22:34, Benjamin Herrenschmidt wrote:
> On Wed, 2014-10-22 at 16:17 +0200, Jan Kiszka wrote:
>> I thought about this again, and I'm not sure anymore if we can use
>> ACPI
>> to "black-list" the incompatible virtio devices. Reason: hotplug. To
>> my
>> understanding, the ACPI DRHD table
On Wed, Oct 22, 2014 at 12:17:33PM +0200, Paolo Bonzini wrote:
> On 10/22/2014 11:35 AM, Chao Peng wrote:
> > Expose Intel AVX-512 feature bits to guest. Also add checks for
> > xcr0 AVX512 related bits according to spec:
> > http://download-software.intel.com/sites/default/files/managed/71/2e/3194
> -Original Message-
> From: Paolo Bonzini [mailto:paolo.bonz...@gmail.com] On Behalf Of Paolo
> Bonzini
> Sent: Wednesday, October 22, 2014 2:40 AM
> To: Wu, Feng; kvm@vger.kernel.org
> Cc: Xiao Guangrong
> Subject: Re: A question about HTL VM-Exit handling time
>
>
>
> On 10/16/2014
On Wed, Oct 22, 2014 at 04:35:07PM -0400, David Xu wrote:
> 2014-10-15 14:30 GMT-04:00 David Xu :
> > 2014-09-29 5:04 GMT-04:00 Michael S. Tsirkin :
> >> On Wed, Sep 24, 2014 at 02:40:53PM -0400, David Xu wrote:
> >>> Hi Michael,
> >>>
> >>> I found this interesting project from KVM TODO website:
>
Add AVX512 feature bits, register definition and corresponding
xsave/vmstate support.
Signed-off-by: Chao Peng
---
target-i386/cpu.c | 10 --
target-i386/cpu.h | 61 ++
target-i386/kvm.c | 19 +++
target-i386/machine.c | 87
This patch adds support to track VM dirty pages, between dirty log reads. Pages
that have been dirtied since last log read are write protected again, in
preparation of next dirty log read. In addition ARMv7 dirty log read function
is pushed up to generic layer.
Signed-off-by: Mario Smarduch
---
This patch adds support for handling 2nd stage page faults during migration,
it disables faulting in huge pages, and dissolves huge pages to page tables.
In case migration is canceled huge pages are used again.
Reviewed-by: Christoffer Dall
Signed-off-by: Mario Smarduch
---
arch/arm/kvm/mmu.c |
Patch adds support for initial write protection of VM memlsot. This patch
series assumes that huge PUDs will not be used in 2nd stage tables, which is
awlays valid on ARMv7.
Signed-off-by: Mario Smarduch
---
arch/arm/include/asm/kvm_host.h |2 +
arch/arm/include/asm/kvm_mmu.h
This patch adds ARMv7 architecture TLB Flush function.
Acked-by: Christoffer Dall
Signed-off-by: Mario Smarduch
---
arch/arm/include/asm/kvm_asm.h |1 +
arch/arm/include/asm/kvm_host.h | 12
arch/arm/kvm/Kconfig|1 +
arch/arm/kvm/interrupts.S | 11 +++
This patch adds support for architecture implemented VM TLB flush, currently
ARMv7 defines HAVE_KVM_ARCH_TLB_FLUSH_ALL. This leaves other architectures
unaffected using the generic version. In subsequent patch ARMv7 defines
HAVE_KVM_ARCH_TLB_FLUSH_ALL and it's own TLB flush interface.
Signed-off-
This patch series introduces dirty page logging for ARMv7 and adds some degree
of generic dirty logging support for x86, armv7 and later armv8.
I implemented Alex's suggestion after he took a look at the patches at kvm
forum to simplify the generic/arch split - leaving mips, powerpc, s390,
(ia6
This patch defines KVM_GENERIC_DIRTYLOG, and moves dirty log read function
to it's own file virt/kvm/dirtylog.c. x86 is updated to use the generic
dirty log interface, selecting KVM_GENERIC_DIRTYLOG in its Kconfig and
makefile. No other architectures are affected, each uses it's own version.
This
2014-10-15 14:30 GMT-04:00 David Xu :
> 2014-09-29 5:04 GMT-04:00 Michael S. Tsirkin :
>> On Wed, Sep 24, 2014 at 02:40:53PM -0400, David Xu wrote:
>>> Hi Michael,
>>>
>>> I found this interesting project from KVM TODO website:
>>>
>>> allow handling short packets from softirq or VCPU context
>>>
On Wed, 2014-10-22 at 16:17 +0200, Jan Kiszka wrote:
> I thought about this again, and I'm not sure anymore if we can use
> ACPI
> to "black-list" the incompatible virtio devices. Reason: hotplug. To
> my
> understanding, the ACPI DRHD tables won't change during runtime when a
> device shows up or
On 10/22/2014 09:10 PM, Andy Lutomirski wrote:
> On Tue, Oct 7, 2014 at 5:16 PM, Andy Lutomirski wrote:
>> CR4.TSD is guest-owned; don't trap writes to it in VMX guests. This
>> avoids a VM exit on context switches into or out of a PR_TSC_SIGSEGV
>> task.
>
> Friendly ping. I suspect this got l
On Wed, 22 Oct 2014 21:45:52 +0200 Dominik Dingel
wrote:
> > > +#ifndef mm_forbids_zeropage
> > > +#define mm_forbids_zeropage(X) (0)
> > > +#endif
> >
> > Can we document this please? What it does, why it does it. We should
> > also specify precisely which arch header file is responsible fo
On Wed, 22 Oct 2014 12:22:23 -0700
Andrew Morton wrote:
> On Wed, 22 Oct 2014 13:09:28 +0200 Dominik Dingel
> wrote:
>
> > Add a new function stub to allow architectures to disable for
> > an mm_structthe backing of non-present, anonymous pages with
> > read-only empty zero pages.
> >
> > ...
On Wed, 22 Oct 2014 13:09:28 +0200 Dominik Dingel
wrote:
> Add a new function stub to allow architectures to disable for
> an mm_structthe backing of non-present, anonymous pages with
> read-only empty zero pages.
>
> ...
>
> --- a/include/linux/mm.h
> +++ b/include/linux/mm.h
> @@ -56,6 +56,10
On Tue, Oct 7, 2014 at 5:16 PM, Andy Lutomirski wrote:
> CR4.TSD is guest-owned; don't trap writes to it in VMX guests. This
> avoids a VM exit on context switches into or out of a PR_TSC_SIGSEGV
> task.
Friendly ping. I suspect this got lost in KVM Forum, etc.
--Andy
>
> I think that this fi
On 10/22/2014 05:33 PM, John Snow wrote:
>
> I've been working on improving the AHCI device emulation for QEMU but
> have recently run into an issue where Windows 8 guests -- upon trying to
> resume from hibernation -- manage to trigger an infinite IRQ injection
> loop where it seems that the IR
On Wed, Oct 22, 2014 at 6:46 PM, Alex Williamson
wrote:
> On Wed, 2014-10-22 at 15:54 +0200, Antonios Motakis wrote:
>> On Tue, Oct 21, 2014 at 6:34 PM, Alex Williamson
>> wrote:
>> > On Mon, 2014-10-13 at 15:10 +0200, Antonios Motakis wrote:
>> >> This patch enables the IOCTLs VFIO_DEVICE_GET_RE
On Wed, 2014-10-22 at 15:55 +0200, Antonios Motakis wrote:
> On Tue, Oct 21, 2014 at 6:51 PM, Alex Williamson
> wrote:
> > On Mon, 2014-10-13 at 15:10 +0200, Antonios Motakis wrote:
> >> Allow to memory map the MMIO regions of the device so userspace can
> >> directly access them. PIO regions are
On Wed, 2014-10-22 at 15:54 +0200, Antonios Motakis wrote:
> On Tue, Oct 21, 2014 at 6:34 PM, Alex Williamson
> wrote:
> > On Mon, 2014-10-13 at 15:10 +0200, Antonios Motakis wrote:
> >> This patch enables the IOCTLs VFIO_DEVICE_GET_REGION_INFO ioctl call,
> >> which allows the user to learn about
On 10/20/14 2:09 AM, Steven wrote:
Hi, Eric,
I am trying to understand how KVM allocates physical pages to the
guest and your slides clarify a lot of questions.
(https://events.linuxfoundation.org/slides/2011/linuxcon-japan/lcj2011_guangrong.pdf)
However, I still have some difficulty in figuri
Hello all;
I've been working on improving the AHCI device emulation for QEMU but
have recently run into an issue where Windows 8 guests -- upon trying to
resume from hibernation -- manage to trigger an infinite IRQ injection
loop where it seems that the IRQ never quite properly gets cleared.
On Wed, Oct 22, 2014 at 04:28:34PM +0200, Cornelia Huck wrote:
> On Wed, 22 Oct 2014 17:02:26 +0300
> "Michael S. Tsirkin" wrote:
>
> > On Tue, Oct 07, 2014 at 04:39:45PM +0200, Cornelia Huck wrote:
> > > From: Rusty Russell
> > >
> > > [Cornelia Huck: we don't need the vq->vring.num -> vq->rin
On Wed, Oct 22, 2014 at 04:17:40PM +0200, Jan Kiszka wrote:
> On 2014-10-22 10:44, Michael S. Tsirkin wrote:
> > On Wed, Oct 08, 2014 at 11:04:28AM +0200, Cornelia Huck wrote:
> >> On Tue, 07 Oct 2014 18:24:22 -0700
> >> Andy Lutomirski wrote:
> >>
> >>> On 10/07/2014 07:39 AM, Cornelia Huck wrote
On Wed, 22 Oct 2014 17:02:26 +0300
"Michael S. Tsirkin" wrote:
> On Tue, Oct 07, 2014 at 04:39:45PM +0200, Cornelia Huck wrote:
> > From: Rusty Russell
> >
> > [Cornelia Huck: we don't need the vq->vring.num -> vq->ring_mask change]
> > Signed-off-by: Rusty Russell
> > Signed-off-by: Cornelia
On 2014-10-22 10:44, Michael S. Tsirkin wrote:
> On Wed, Oct 08, 2014 at 11:04:28AM +0200, Cornelia Huck wrote:
>> On Tue, 07 Oct 2014 18:24:22 -0700
>> Andy Lutomirski wrote:
>>
>>> On 10/07/2014 07:39 AM, Cornelia Huck wrote:
This patchset aims to get us some way to implement virtio-1 compl
On 10/22/2014 01:09 PM, Dominik Dingel wrote:
> s390 has the special notion of storage keys which are some sort of page flags
> associated with physical pages and live outside of direct addressable memory.
> These storage keys can be queried and changed with a special set of
> instructions.
> Th
Reviewed-by: Paolo Bonzini
On 10/22/2014 01:09 PM, Dominik Dingel wrote:
> Add a new function stub to allow architectures to disable for
> an mm_structthe backing of non-present, anonymous pages with
> read-only empty zero pages.
>
> Signed-off-by: Dominik Dingel
> ---
> include/linux/mm.h | 4
Reviewed-by: Paolo Bonzini
On 10/22/2014 01:09 PM, Dominik Dingel wrote:
> As soon as storage keys are enabled we need to stop working on zero page
> mappings to prevent inconsistencies between storage keys and pgste.
>
> Otherwise following data corruption could happen:
> 1) guest enables stora
Reviewed-by: Paolo Bonzini
(missing R-b on patch 1 is _not_ a mistake :))
Paolo
On 10/22/2014 01:09 PM, Dominik Dingel wrote:
> When storage keys are enabled unmerge already merged pages and prevent
> new pages from being merged.
>
> Signed-off-by: Dominik Dingel
> Acked-by: Christian Borntra
On Tue, Oct 07, 2014 at 04:39:45PM +0200, Cornelia Huck wrote:
> From: Rusty Russell
>
> [Cornelia Huck: we don't need the vq->vring.num -> vq->ring_mask change]
> Signed-off-by: Rusty Russell
> Signed-off-by: Cornelia Huck
> ---
> drivers/virtio/virtio_ring.c | 195
> +++
On Tue, Oct 21, 2014 at 7:55 PM, Alex Williamson
wrote:
> On Mon, 2014-10-13 at 15:10 +0200, Antonios Motakis wrote:
>> The virqfd functionality that is used by VFIO_PCI to implement interrupt
>> masking and unmasking via an eventfd, is generic enough and can be reused
>> by another driver. Move i
On Tue, Oct 21, 2014 at 6:51 PM, Alex Williamson
wrote:
> On Mon, 2014-10-13 at 15:10 +0200, Antonios Motakis wrote:
>> Allow to memory map the MMIO regions of the device so userspace can
>> directly access them. PIO regions are not being handled at this point.
>>
>> Signed-off-by: Antonios Motaki
On Tue, Oct 21, 2014 at 6:34 PM, Alex Williamson
wrote:
> On Mon, 2014-10-13 at 15:10 +0200, Antonios Motakis wrote:
>> This patch enables the IOCTLs VFIO_DEVICE_GET_REGION_INFO ioctl call,
>> which allows the user to learn about the available MMIO resources of
>> a device.
>>
>> Signed-off-by: An
On Tue, Oct 21, 2014 at 7:47 PM, Alex Williamson
wrote:
> On Mon, 2014-10-13 at 15:10 +0200, Antonios Motakis wrote:
>> Adds support to mask interrupts, and also for automasked interrupts.
>> Level sensitive interrupts are exposed as automasked interrupts and
>> are masked and disabled automatical
s390 has the special notion of storage keys which are some sort of page flags
associated with physical pages and live outside of direct addressable memory.
These storage keys can be queried and changed with a special set of
instructions.
The mentioned instructions behave quite nicely under virtual
As soon as storage keys are enabled we need to stop working on zero page
mappings to prevent inconsistencies between storage keys and pgste.
Otherwise following data corruption could happen:
1) guest enables storage key
2) guest sets storage key for not mapped page X
-> change goes to PGSTE
3)
Replace the s390 specific page table walker for the pgste updates
with a call to the common code walk_page_range function.
There are now two pte modification functions, one for the reset
of the CMMA state and another one for the initialization of the
storage keys.
Signed-off-by: Dominik Dingel
--
When storage keys are enabled unmerge already merged pages and prevent
new pages from being merged.
Signed-off-by: Dominik Dingel
Acked-by: Christian Borntraeger
---
arch/s390/include/asm/pgtable.h | 2 +-
arch/s390/kvm/priv.c| 17 -
arch/s390/mm/pgtable.c
Add a new function stub to allow architectures to disable for
an mm_structthe backing of non-present, anonymous pages with
read-only empty zero pages.
Signed-off-by: Dominik Dingel
---
include/linux/mm.h | 4
mm/huge_memory.c | 2 +-
mm/memory.c| 2 +-
3 files changed, 6 insertion
On Wed, 22 Oct 2014 12:09:31 +0200
Paolo Bonzini wrote:
> On 10/22/2014 10:30 AM, Dominik Dingel wrote:
> > As use_skey is already the condition on which we call s390_enable_skey
> > we need to introduce a new flag for the mm->context on which we decide
> > if zero page mapping is allowed.
>
> C
On 10/22/2014 11:35 AM, Chao Peng wrote:
> Expose Intel AVX-512 feature bits to guest. Also add checks for
> xcr0 AVX512 related bits according to spec:
> http://download-software.intel.com/sites/default/files/managed/71/2e/319433-017.pdf
>
> Signed-off-by: Chao Peng
The patch looks good, but yo
On 10/22/2014 10:30 AM, Dominik Dingel wrote:
> As use_skey is already the condition on which we call s390_enable_skey
> we need to introduce a new flag for the mm->context on which we decide
> if zero page mapping is allowed.
Can you explain better why "mm->context.use_skey = 1" cannot be done
be
On 10/22/2014 10:30 AM, Dominik Dingel wrote:
> As use_skey is already the condition on which we call s390_enable_skey
> we need to introduce a new flag for the mm->context on which we decide
> if zero page mapping is allowed.
Can you explain better why "mm->context.use_skey = 1" cannot be done
be
Expose Intel AVX-512 feature bits to guest. Also add checks for
xcr0 AVX512 related bits according to spec:
http://download-software.intel.com/sites/default/files/managed/71/2e/319433-017.pdf
Signed-off-by: Chao Peng
---
arch/x86/include/asm/xsave.h |1 +
arch/x86/kvm/cpuid.c |3
On Tue, Oct 07, 2014 at 04:39:44PM +0200, Cornelia Huck wrote:
> Provide helper functions that convert from/to LE for virtio devices that
> are not operating in legacy mode. We check for the VERSION_1 feature bit
> to determine that.
>
> Based on original patches by Rusty Russell and Thomas Huth.
On Wed, Oct 08, 2014 at 11:04:28AM +0200, Cornelia Huck wrote:
> On Tue, 07 Oct 2014 18:24:22 -0700
> Andy Lutomirski wrote:
>
> > On 10/07/2014 07:39 AM, Cornelia Huck wrote:
> > > This patchset aims to get us some way to implement virtio-1 compliant
> > > and transitional devices in qemu. Branc
On Wed, Oct 22, 2014 at 10:24:17AM +0200, Cornelia Huck wrote:
> On Wed, 22 Oct 2014 01:09:40 +0300
> "Michael S. Tsirkin" wrote:
>
> > This adds wrappers to switch between native endian-ness
> > (virtio 0.9) and virtio endian-ness (virtio 1.0).
> > Add new typedefs as well, so that we can check
Add a new function stub to allow architectures to disable for
an mm_structthe backing of non-present, anonymous pages with
read-only empty zero pages.
Signed-off-by: Dominik Dingel
---
include/linux/mm.h | 4
mm/huge_memory.c | 2 +-
mm/memory.c| 2 +-
3 files changed, 6 insertion
As soon as storage keys are enabled we need to stop working on zero page
mappings to prevent inconsistencies between storage keys and pgste.
Otherwise following data corruption could happen:
1) guest enables storage key
2) guest sets storage key for not mapped page X
-> change goes to PGSTE
3)
When storage keys are enabled unmerge already merged pages and prevent
new pages from being merged.
Signed-off-by: Dominik Dingel
Acked-by: Christian Borntraeger
---
arch/s390/include/asm/pgtable.h | 2 +-
arch/s390/kvm/priv.c| 17 -
arch/s390/mm/pgtable.c
s390 has the special notion of storage keys which are some sort of page flags
associated with physical pages and live outside of direct addressable memory.
These storage keys can be queried and changed with a special set of
instructions.
The mentioned instructions behave quite nicely under virtual
Replace the s390 specific page table walker for the pgste updates
with a call to the common code walk_page_range function.
There are now two pte modification functions, one for the reset
of the CMMA state and another one for the initialization of the
storage keys.
Signed-off-by: Dominik Dingel
--
On Wed, 22 Oct 2014 01:09:40 +0300
"Michael S. Tsirkin" wrote:
> This adds wrappers to switch between native endian-ness
> (virtio 0.9) and virtio endian-ness (virtio 1.0).
> Add new typedefs as well, so that we can check
> statically that we didn't miss any accesses.
> All callers simply pass in
57 matches
Mail list logo