it.
--
regards
Yang, Sheng
So maybe just add an ioctl to get and to clear pending bits.
Maybe set for symmetry.
For live migration too. But if they live in memory, no need for
get/set, just specify the address.
--
error compiling committee.c: too many arguments to function
for kernel part to work
alone...
http://www.mail-archive.com/kvm@vger.kernel.org/msg44368.html
--
regards
Yang, Sheng
static int msix_mmio_write(struct kvm_io_device *this, gpa_t addr, int len,
const void *val)
{
struct kvm_assigned_dev_kernel *adev
/kvm/msg44795.html
--
regards
Yang, Sheng
static int msix_mmio_write(struct kvm_io_device *this, gpa_t addr, int len,
const void *val)
{
struct kvm_assigned_dev_kernel *adev =
container_of(this, struct kvm_assigned_dev_kernel
() of the 4th patch for QEmu? I suppose
something wrong with it. I would try to reproduce it here.
And if you only use one vf, how about the gain?
--
regards
Yang, Sheng
2010/12/1 Yang, Sheng sheng.y...@intel.com:
On Wednesday 01 December 2010 16:41:38 lidong chen wrote:
I used sr-iov, give each vm
On Wednesday 01 December 2010 17:02:57 Yang, Sheng wrote:
On Wednesday 01 December 2010 16:54:16 lidong chen wrote:
yes, i patch qemu as well.
and i found the address of second vf is not in mmio range. the first
one is fine.
So looks like something wrong with MMIO register part. Could
. If you can see the mask bit accessing in kernel from both devices.
--
regards
Yang, Sheng
#ifdef KVM_CAP_MSIX_MASK
if (cap_mask) {
memset(msix_mmio, 0, sizeof msix_mmio);
msix_mmio.id = calc_assigned_dev_id(r_dev-h_busnr,
r_dev-h_devfn
the last one.
Please check the PCI spec.
--
regards
Yang, Sheng
2010/11/30 Yang, Sheng sheng.y...@intel.com:
On Tuesday 30 November 2010 17:10:11 lidong chen wrote:
sr-iov also meet this problem, MSIX mask waste a lot of cpu resource.
I test kvm with sriov, which the vf driver could
. and we can see how xen deal with MSIX mask.
if this problem sloved, maybe with MSIX enabled, the performace is better.
Please refer to my posted patches for this issue.
http://www.spinics.net/lists/kvm/msg44992.html
--
regards
Yang, Sheng
2010/11/23 Avi Kivity a...@redhat.com:
On 11/23/2010
On Tuesday 30 November 2010 22:15:29 Avi Kivity wrote:
On 11/26/2010 04:35 AM, Yang, Sheng wrote:
Shouldn't kvm also service reads from the pending bitmask?
Of course KVM should service reading from pending bitmask. For
assigned device, it's kernel who would set the pending bit
On Wednesday 24 November 2010 09:59:23 Yang, Sheng wrote:
On Tuesday 23 November 2010 22:06:20 Avi Kivity wrote:
On 11/23/2010 03:57 PM, Yang, Sheng wrote:
Yeah, but won't be included in this patchset.
What API changes are needed? I'd like to see the complete API.
I am
On Tuesday 23 November 2010 15:54:40 Avi Kivity wrote:
On 11/23/2010 08:35 AM, Yang, Sheng wrote:
On Tuesday 23 November 2010 14:17:28 Avi Kivity wrote:
On 11/23/2010 08:09 AM, Yang, Sheng wrote:
Hi Avi,
I've purposed the following API for mask bit support
On Tuesday 23 November 2010 20:47:33 Avi Kivity wrote:
On 11/23/2010 10:30 AM, Yang, Sheng wrote:
On Tuesday 23 November 2010 15:54:40 Avi Kivity wrote:
On 11/23/2010 08:35 AM, Yang, Sheng wrote:
On Tuesday 23 November 2010 14:17:28 Avi Kivity wrote:
On 11/23/2010 08:09 AM
On Tuesday 23 November 2010 20:04:16 Michael S. Tsirkin wrote:
On Tue, Nov 23, 2010 at 02:09:52PM +0800, Yang, Sheng wrote:
Hi Avi,
I've purposed the following API for mask bit support.
The main point is, QEmu can know which entries are enabled(by
pci_enable_msix
On Tuesday 23 November 2010 22:06:20 Avi Kivity wrote:
On 11/23/2010 03:57 PM, Yang, Sheng wrote:
Yeah, but won't be included in this patchset.
What API changes are needed? I'd like to see the complete API.
I am not sure about it. But I suppose the structure should
];
};
--
regards
Yang, Sheng
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org
On Tuesday 23 November 2010 14:17:28 Avi Kivity wrote:
On 11/23/2010 08:09 AM, Yang, Sheng wrote:
Hi Avi,
I've purposed the following API for mask bit support.
The main point is, QEmu can know which entries are enabled(by
pci_enable_msix()). And for enabled entries, kernel own
using
scripts/checkpatch.pl
to check it.
--
regards
Yang, Sheng
+
+ if (ktimer-t_ops-is_periodic(ktimer)) {
+ hrtimer_add_expires_ns(ktimer-timer, ktimer-period);
+ return HRTIMER_RESTART;
+ }
+ else
+ return HRTIMER_NORESTART;
+}
Also need
On Tuesday 25 May 2010 22:01:50 Jan Kiszka wrote:
Memory allocation may fail. Propagate such errors.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
Reviewed-by: Sheng Yang sh...@linux.intel.com
--
regards
Yang, Sheng
arch/x86/include/asm/kvm_host.h |2 +-
arch/x86/kvm/svm.c
,
assigned_dev-guest_irq, 1);
Or could we make kvm_set_irq() atomic? Though the code path is a little long
for spinlock.
- spin_unlock_irq(assigned_dev-assigned_dev_lock);
}
static irqreturn_t kvm_assigned_dev_intr(int irq, void *dev_id)
--
regards
Yang, Sheng
--
To unsubscribe from
is kvm_notify_acked_irq() with RCU.
--
regards
Yang, Sheng
[a016ce13] ? kvm_ioapic_update_eoi+0x73/0xd0 [kvm]
[a0192689] ? apic_reg_write+0x569/0x700 [kvm]
[a0192939] ? apic_mmio_write+0x69/0x70 [kvm]
[a0178fec] ? emulator_write_emulated_onepage+0xac/0x1b0 [kvm
.
Acked-by: Sheng Yang sh...@linux.intel.com
--
regards
Yang, Sheng
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: b/arch/x86/kvm/vmx.c
===
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@ -1748,6 +1748,7 @@ static
On Monday 27 July 2009 17:08:42 Jan Kiszka wrote:
[ carrying this to LKML ]
Yang, Sheng wrote:
On Monday 27 July 2009 03:16:27 H. Peter Anvin wrote:
Jan Kiszka wrote:
Avi Kivity wrote:
On 07/24/2009 12:41 PM, Jan Kiszka wrote:
I vaguely recall that someone promised to add a feature
of struct vmcs_config entries(that's pin_based_exec_ctrl,
cpu_based_exec_ctrl, and cpu_based_2nd_exec_ctrl) through
sys/module/kvm_intel/? Put every feature to cpuinfo seems not that necessary
for such a big list.
--
regards
Yang, Sheng
--
To unsubscribe from this list: send the line unsubscribe
to v2.6.30...
--
regards
Yang, Sheng
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
because we want older version QEmu can
also work with EPT.
Yes, we need a new CAP for address. Would do it soon.
--
regards
Yang, Sheng
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http
On Tuesday 23 June 2009 00:09:28 Alex Williamson wrote:
On Mon, 2009-06-22 at 13:32 +0800, Yang, Sheng wrote:
On Friday 19 June 2009 21:44:40 Alex Williamson wrote:
On Fri, 2009-06-19 at 15:27 +0800, Yang, Sheng wrote:
On Friday 19 June 2009 00:28:41 Alex Williamson wrote:
The one
On Friday 19 June 2009 21:44:40 Alex Williamson wrote:
On Fri, 2009-06-19 at 15:27 +0800, Yang, Sheng wrote:
On Friday 19 June 2009 00:28:41 Alex Williamson wrote:
The one oddity I noticed is that even when the enable bit is clear, the
guest can read the ROM. I don't know
On Friday 19 June 2009 00:28:41 Alex Williamson wrote:
On Thu, 2009-06-18 at 13:30 +0800, Yang, Sheng wrote:
On Tuesday 16 June 2009 00:29:17 Alex Williamson wrote:
The PCI code already knows about option ROMs, so we just need to
mmap some space for it, load it with a copy of the contents
, both untested)
Maybe we can put cpuid_max_physaddr as a field in vcpu struct?
--
regards
Yang, Sheng
Index: kvm/arch/x86/kvm/x86.c
===
--- kvm.orig/arch/x86/kvm/x86.c
+++ kvm/arch/x86/kvm/x86.c
@@ -722,11 +722,53 @@ static
think the
guest would be killed for QEmu would receive a SIGSEGV? I am not sure if it's
too severe...
--
regards
Yang, Sheng
---
hw/device-assignment.c | 60
hw/device-assignment.h |
5 +---
2 files changed, 46 insertions(+), 19
and print useful information for diagnostics.
Looks fine to me, thanks!
--
regards
Yang, Sheng
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
? Thanks,
This part again...
I think simply move kvm_deassign_irq() out of critical region is OK, and I
also add the lock which seems missing in deassign_guest_irq(). Would post a
patch soon.
--
regards
Yang, Sheng
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body
already fixed by you.
Continue to check the code...
--
regards
Yang, Sheng
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
On Wednesday 13 May 2009 12:10:34 Alex Williamson wrote:
On Tue, 2009-05-12 at 21:42 -0600, Alex Williamson wrote:
On Wed, 2009-05-13 at 11:30 +0800, Yang, Sheng wrote:
+ kvm-used_gsi_bitmap = malloc(gsi_bytes);
+ if (!kvm-used_gsi_bitmap
(i 3);
3 or 5?
I am a little confused by these magic numbers, including 0x1f...
I think there are something can indicate the length of unsigned long in
QEmu(sorry, can't find it now...), so how about using ffsl() and get other
constants based on it?
--
regards
Yang, Sheng
(and I have
some misunderstandings with ZhaoYu for I thought we are agree on the reason,
but after confirm with him, he didn't agree). I am doing more investigations
to find the real cause.
--
regards
Yang, Sheng
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body
On Monday 09 March 2009 11:42:05 Yang, Sheng wrote:
On Sunday 08 March 2009 22:30:16 Avi Kivity wrote:
Matthew Wilcox wrote:
On Tue, Feb 24, 2009 at 12:47:38PM +0200, Avi Kivity wrote:
Do those patches allow using a VF on the host (in other words, does
the kernel emulate config space
On Saturday 28 February 2009 01:54:31 Marcelo Tosatti wrote:
On Fri, Feb 27, 2009 at 12:17:01PM +0800, Yang, Sheng wrote:
On Friday 27 February 2009 07:50:54 Marcelo Tosatti wrote:
Can someone with HW test this please?
Good catch! The patch works fine on my side.
Can it be a per
for trouble (could not spot any obvious
problem, but better not have to, its fragile).
Well, my original purpose is a FIFO between interrupt handler and work(for
MSI-X), but seems too complex... And I also don't see any problem for now...
--
regards
Yang, Sheng
diff --git a/include/linux/kvm_host.h
are needed for MSI-X(seems we need
one ack notifier for one vector in MSI-X).
--
regards
Yang, Sheng
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
(-kvm-pit-no-reinject or something).
I agree that it should go with a user space option to disable rejection, as
it's hard to overcome the problem that we delayed interrupt injection...
--
regards
Yang, Sheng
Comments or better ideas?
diff --git a/arch/x86/kvm/i8254.c b/arch/x86/kvm/i8254.c
will give a update if I got more infos.
--
regards
Yang, Sheng
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Amit's patch is there. (I will conclude the change of userspace in the first
mail).
--
regards
Yang, Sheng
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
On Saturday 13 September 2008 16:55:27 Avi Kivity wrote:
Avi Kivity wrote:
Yang, Sheng wrote:
On Thursday 04 September 2008 11:30:20 Yang, Sheng wrote:
From ebe4ea311305d2910dcdcff2510662da0dc2c742 Mon Sep 17 00:00:00 2001
From: Sheng Yang [EMAIL PROTECTED]
Date: Thu, 4 Sep 2008 03:11
.
--
regards
Yang, Sheng
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Desktop in the company also down, have
to post patch with outlook)...
Thanks!
--
regards
Yang, Sheng
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
From e6b784985c14afe9805bfc8706858884b0259ab5 Mon Sep 17 00:00:00 2001
From: Sheng Yang [EMAIL PROTECTED]
Date: Thu, 2 Oct 2008 14:20:22 +0800
Subject: [PATCH 1/2] KVM: Separate interrupt sources
Keep a record of current interrupt state before update, and don't
assert/deassert repeatly. So that
From eab008da232cd9cc09dd8071bd15796c8e46f6bd Mon Sep 17 00:00:00 2001
From: Sheng Yang [EMAIL PROTECTED]
Date: Thu, 2 Oct 2008 14:21:06 +0800
Subject: [PATCH 2/2] KVM: Implement OR logic on guest shared IRQ line
Now IOAPIC and PIC treat every kvm_set_irq() as from one separate interrupt
source,
On Wednesday 24 September 2008 17:51:24 Avi Kivity wrote:
Yang, Sheng wrote:
2. shared guest pci interrupts
That's a correctness issue. No matter how many interrupts we have, we
may have sharing issues. Of course with only three the issue is very
pressing since we will get sharing
On Wednesday 24 September 2008 16:38:35 Avi Kivity wrote:
Yang, Sheng wrote:
- Shared Interrupt support
I still don't know who would do this. It's very important for VT-d real
usable. If nobody interested in it, I would pick it up, but after Oct. 6
(after National Holiday
if it would affect the pending
transaction, also not sure all device support this (though they should
support).
--
regards
Yang, Sheng
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo
... But at least, I think a physical continuous one should be
much different from any working ones...
--
regards
Yang, Sheng
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
, step 4 enter no-fill cache mode(set CR0.CD
bit and clean NW bit), step 12 re-enabled the caching(clear this two bits).
We based on these behaviors to detect MTRR update.
(Forgot to raise the bug to Avi, recalled it now...)
--
regards
Yang, Sheng
--
To unsubscribe from this list: send the line
. :)
--
regards
Yang, Sheng
/Jd
--- On Wed, 9/24/08, Yang, Sheng [EMAIL PROTECTED] wrote:
From: Yang, Sheng [EMAIL PROTECTED]
Subject: Re: KVM Migration fails
To: kvm@vger.kernel.org, [EMAIL PROTECTED] [EMAIL PROTECTED]
Date: Wednesday, September 24, 2008, 11:23 PM
On Thursday 25 September
and
device got this problem, like irq.
--
regards
Yang, Sheng
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
pick it up, but after Oct. 6
(after National Holiday in China).
--
regards
Yang, Sheng
- Add dummy driver to hide/unbind passthrough device from host
kernel
If I omit some good features or you have some good proposals, please feel
free to add them to this list. If you are interest
, that is pre-assigned
device shared IRQ with other devices.
Why share guest interrupts is a prerequisite...
--
regards
Yang, Sheng
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo
On Wednesday 24 September 2008 16:38:35 Avi Kivity wrote:
Yang, Sheng wrote:
- MSI support (WIP)
- MTRR/PAT support of EPT (WIP)
- MTRR/PAT support of shadow (WIP)
- Basic FLR support (WIP)
Above four are my works. All of them work now. But more job
On Wednesday 24 September 2008 16:53:15 Avi Kivity wrote:
Yang, Sheng wrote:
Shared guest interrupts is a prerequisite for merging into mainline.
Without this, device assignment is useless in anything but a benchmark
scenario. I won't push device assignment for 2.6.28 without
On Wednesday 24 September 2008 17:22:53 Avi Kivity wrote:
Yang, Sheng wrote:
We only have three pci interrupts at this point (though this could be
easily extended); if you start the guest with a non-trivial number of
devices, you will have shared guest interrupts.
(of course, when I
On Tuesday 23 September 2008 23:04:48 Jan Kiszka wrote:
Yang, Sheng wrote:
On Friday 19 September 2008 20:03:02 Jan Kiszka wrote:
LINT0 of the LAPIC can be used to route PIT events as NMI watchdog
ticks into the guest. This patch aligns the in-kernel irqchip emulation
with the user space
I am afraid I got this when try to enable VT-d.
create_userspace_phys_mem: Invalid argument
assigned_dev_iomem_map: Error: create new mapping failed
Can you have a look at it? (and the patch you sent to Weidong don't got this
problem.)
Thanks.
--
regards
Yang, Sheng
Signed-off-by: Amit Shah
On Thursday 25 September 2008 12:54:46 Yang, Sheng wrote:
On Tuesday 23 September 2008 22:54:53 Amit Shah wrote:
From: Or Sagi [EMAIL PROTECTED]
From: Nir Peleg [EMAIL PROTECTED]
From: Amit Shah [EMAIL PROTECTED]
From: Ben-Ami Yassour [EMAIL PROTECTED]
From: Weidong Han [EMAIL PROTECTED
version of Windows(IRQ_NOT_EQUAL_OR_LESS). I
don't remember the exactly situation there, but you may have a try.
--
regards
Yang, Sheng
Signed-off-by: Jan Kiszka [EMAIL PROTECTED]
---
arch/x86/kvm/i8254.c | 15 +++
arch/x86/kvm/irq.h |1 +
arch/x86/kvm/lapic.c | 32
]
--
regards
Yang, Sheng
+ if (kvm_run-request_nmi_window !vcpu-arch.nmi_pending) {
+ kvm_run-exit_reason = KVM_EXIT_NMI_WINDOW_OPEN;
+ return 0;
+ }
+
return 1;
}
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body
may not be a issue import by this patchset? Seems need more
debug...
The patchset is OK for me, except I don't know when we would need that timeout
one (buggy guest?...), and we may also root cause this issue or ensure that
it's not a regression.
--
regards
Yang, Sheng
--
To unsubscribe from
On Tuesday 23 September 2008 17:15:09 Gleb Natapov wrote:
On Tue, Sep 23, 2008 at 05:08:09PM +0800, Yang, Sheng wrote:
We still get here with vmx-soft_vnmi_blocked = 1. Trying to find
out how.
We should only come along here with vnmi blocked on reinjection
(after a fault
On Tuesday 23 September 2008 17:45:44 Gleb Natapov wrote:
On Tue, Sep 23, 2008 at 05:42:02PM +0800, Yang, Sheng wrote:
That is exactly what I am using. Run it with SMP hal and do
hibernate.
Oh... Finally found how to enable that hibernate option
And this hibernate works
On Tuesday 23 September 2008 17:37:00 Yang, Sheng wrote:
On Tuesday 23 September 2008 17:26:55 Gleb Natapov wrote:
On Tue, Sep 23, 2008 at 05:24:50PM +0800, Yang, Sheng wrote:
On Tuesday 23 September 2008 17:15:09 Gleb Natapov wrote:
On Tue, Sep 23, 2008 at 05:08:09PM +0800, Yang, Sheng
On Tuesday 23 September 2008 17:26:55 Gleb Natapov wrote:
On Tue, Sep 23, 2008 at 05:24:50PM +0800, Yang, Sheng wrote:
On Tuesday 23 September 2008 17:15:09 Gleb Natapov wrote:
On Tue, Sep 23, 2008 at 05:08:09PM +0800, Yang, Sheng wrote:
We still get here with vmx-soft_vnmi_blocked
investigating on the issues you met...
--
regards
Yang, Sheng
And is it safe to
assume VMX == LAPIC available and usable?
Yes.
However, this is how it would look like.
I'd define a send_nmi_self() instead, to allow the implementation to
change (x2apic/etc).
Yet untested, /me has
think it's quite tricky. If you still have
interest, you may try it, but I can't guarantee the result...
Thanks.
--
regards
Yang, Sheng
TiA,
Jan
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http
On Thursday 11 September 2008 16:50:37 Avi Kivity wrote:
Yang, Sheng wrote:
From: Sheng Yang [EMAIL PROTECTED]
Date: Thu, 31 Jul 2008 13:43:58 +0800
Subject: [PATCH] KVM: Fix QEmu interrupted HLT emulation
QEmu can interrupt VCPU from HLT emulation without setting mp_state
On Thursday 04 September 2008 11:30:20 Yang, Sheng wrote:
From ebe4ea311305d2910dcdcff2510662da0dc2c742 Mon Sep 17 00:00:00 2001
From: Sheng Yang [EMAIL PROTECTED]
Date: Thu, 4 Sep 2008 03:11:48 +0800
Subject: [PATCH] KVM: VMX: Move private memory slot position
PCI device assignment would
things on Nehalem. I would work on
clearing up the code according to the latest spec soon (yeah, we also only
got it for days...)
--
regards
Yang, Sheng
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http
get both files rejected.
So I take the headers from the KVM 1/2 Patchfile and use these a
iova.h and intel-iommu.h. Kernel compiles without errors.
2) What known bug is in the latest userspace patchfile? (Told by
Yang, Sheng)
I think it's mentioned by Ben that userspace patch refer
Hi Avi
It seems something wrong with my git-send-email, and I can't got my post from
kvm@vger.kernel.org, so resend it. Sorry for inconvenient.
Thanks!
--
From: Sheng Yang [EMAIL PROTECTED]
Date: Mon, 1 Sep 2008 13:22:09 +0800
Subject: [PATCH] KVM: VMX: Always return 0 for clear_flush_young()
.)
Can this interrupt be shared with an other IRQ?
Oh, no, not currently...
The device's IRQ should not be shared with other, we haven't implement shared
IRQ logic, but soon.
--
regards
Yang, Sheng
Gregor
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body
From: Sheng Yang [EMAIL PROTECTED]
Date: Mon, 1 Sep 2008 17:28:59 +0800
Subject: [PATCH] KVM: MMU: Fix overflow of SHADOW_PT_INDEX with EPT in 32pae
EPT is 4 level by default in 32pae (48bits), but virtual address only
got 32 bits. This result in SHADOW_PT_INDEX() overflow when try to
fetch level
On Sunday 31 August 2008 23:13:54 Avi Kivity wrote:
[EMAIL PROTECTED] wrote:
From: Sheng Yang [EMAIL PROTECTED]
We use a fake A/D bit for EPT, to keep epte behaviour consistent with
shadow spte. But it's not that good for MMU notifier. Now we can only
expect return young=0 for
On Thursday 21 August 2008 09:45:29 Yang, Sheng wrote:
On Thursday 21 August 2008 00:43:22 Muli Ben-Yehuda wrote:
On Wed, Aug 20, 2008 at 06:04:26PM +0300, Avi Kivity wrote:
Other noteworthy changes: speedups of both virtio-net and qcow2
with cache=off. Two important works-in-progress
to remind Ben about that, but forgot it...
--
regards
Yang, Sheng
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
On Wednesday 13 August 2008 11:48:02 Yang, Sheng wrote:
From 50a27ca42a565579e78e3545ca097a65a88cbadd Mon Sep 17 00:00:00
2001 From: Sheng Yang [EMAIL PROTECTED]
Date: Wed, 13 Aug 2008 11:35:17 +0800
Subject: [PATCH] kvm: qemu: Add missing DEPLIBS in Makefile.target
Seems this flags
From 4993375c0d67fd5eb47891dee48300880aceff1e Mon Sep 17 00:00:00 2001
From: Sheng Yang [EMAIL PROTECTED]
Date: Wed, 13 Aug 2008 15:39:29 +0800
Subject: [PATCH] kvm: Fix kvm startup script
Signed-off-by: Sheng Yang [EMAIL PROTECTED]
---
kvm | 16 +---
1 files changed, 13
From bb7cc3fd1e549d38d6bda10a06feda9339de9d3e Mon Sep 17 00:00:00 2001
From: Sheng Yang [EMAIL PROTECTED]
Date: Wed, 13 Aug 2008 14:29:43 +0800
Subject: [PATCH] KVM: trace: Add event mask support
Allow user space application to specify one or morefilter masks to
limit the events being captured
On Wednesday 13 August 2008 16:04:59 Avi Kivity wrote:
Yang, Sheng wrote:
From bb7cc3fd1e549d38d6bda10a06feda9339de9d3e Mon Sep 17 00:00:00
2001 From: Sheng Yang [EMAIL PROTECTED]
Date: Wed, 13 Aug 2008 14:29:43 +0800
Subject: [PATCH] KVM: trace: Add event mask support
Allow user
On Thursday 07 August 2008 22:14:46 Ben-Ami Yassour wrote:
From: Kay, Allen M [EMAIL PROTECTED]
This patch extends the VT-d driver to support KVM
Seems OK to me.
Avi, is this patch good enough to send to PCI guys to have a review?
--
regards
Yang, Sheng
[Ben: fixed memory pinning
+++ b/include/asm-x86/kvm_host.h
@@ -354,6 +354,7 @@ struct kvm_arch{
*/
struct list_head active_mmu_pages;
struct list_head assigned_dev_head;
+ struct dmar_domain *intel_iommu_domain;
Need wrapped by CONFIG_DMAR?
--
regards
Yang, Sheng
--
To unsubscribe from
On Wednesday 13 August 2008 17:46:03 Avi Kivity wrote:
Yang, Sheng wrote:
On Thursday 07 August 2008 22:14:47 Ben-Ami Yassour wrote:
Based on a patch by: Kay, Allen M [EMAIL PROTECTED]
This patch enables pci device assignment based on VT-d support.
When a device is assigned to the guest
From 50a27ca42a565579e78e3545ca097a65a88cbadd Mon Sep 17 00:00:00 2001
From: Sheng Yang [EMAIL PROTECTED]
Date: Wed, 13 Aug 2008 11:35:17 +0800
Subject: [PATCH] kvm: qemu: Add missing DEPLIBS in Makefile.target
Seems this flags is missing during merging long ago... And this result
in updating of
On Sunday 03 August 2008 03:30:41 Sebastian Herbszt wrote:
Yang, Sheng wrote:
Please refer to my another patch comment. Basicly, AP is running
HLT in 0x10038, but it can exit due to some reason, here QEmu
want to raise it up . But after AP exit from HLT, it can't return
to it because
assigned device list here to avoid this kind
of thing happen. Also, we may need a lock here to prevent racy with
assign_device().
--
regards
Yang, Sheng
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http
On Thursday 31 July 2008 14:41:04 Avi Kivity wrote:
Yang, Sheng wrote:
On Thursday 31 July 2008 10:43:20 Yang, Sheng wrote:
From ba05b3c821400127074f65ee4d172fabbe3524cd Mon Sep 17
00:00:00 2001 From: Sheng Yang [EMAIL PROTECTED]
Date: Thu, 31 Jul 2008 10:39:24 +0800
Subject: [PATCH
On Friday 01 August 2008 05:15:11 Sebastian Herbszt wrote:
Yang, Sheng wrote:
Rather than 0x1, which can be overrided by userspace program
like grub.
Could you please explain this problem?
If i don't misunderstand this smp_ap_boot_code_start from
rombios32start.S gets copied
From 8019bdd0c7e2933a4d6f7e046d1cc2ded221784e Mon Sep 17 00:00:00 2001
From: Sheng Yang [EMAIL PROTECTED]
Date: Wed, 30 Jul 2008 21:45:58 +0800
Subject: [PATCH] KVM: Fix exiting from HLT emulation with
MP_STATE_HALTED
VCPU can be forced exit from HLT emulation without setting mp_state to
From ba05b3c821400127074f65ee4d172fabbe3524cd Mon Sep 17 00:00:00 2001
From: Sheng Yang [EMAIL PROTECTED]
Date: Thu, 31 Jul 2008 10:39:24 +0800
Subject: [PATCH] kvm: bios: Put AP boot up code to 0x1000
Rather than 0x1, which can be overrided by userspace program like
grub.
Signed-off-by:
need a update of it...
--
regards
Yang, Sheng
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
On Wednesday 30 July 2008 21:55:19 Yang, Sheng wrote:
From 8019bdd0c7e2933a4d6f7e046d1cc2ded221784e Mon Sep 17 00:00:00
2001 From: Sheng Yang [EMAIL PROTECTED]
Date: Wed, 30 Jul 2008 21:45:58 +0800
Subject: [PATCH] KVM: Fix exiting from HLT emulation with
MP_STATE_HALTED
Recall this patch
From: Sheng Yang [EMAIL PROTECTED]
Date: Thu, 31 Jul 2008 13:43:58 +0800
Subject: [PATCH] KVM: Fix QEmu interrupted HLT emulation
QEmu can interrupt VCPU from HLT emulation without setting mp_state to
MP_STATE_RUNNABLE, when it kick vcpus which are doing HLT emulation to
do something like stop
in struct kvm_pic, and
modify all irq_request() calling(three of them in all) with (void
*)kvm.
It's not a must, I just think it's clearer...
--
regards
Yang, Sheng
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http
1 - 100 of 127 matches
Mail list logo