Carsten Otte wrote:
> Zhang, Xiantao wrote:
>> +static struct kvm_vcpu *lid_to_vcpu(struct kvm *kvm, unsigned long
>> id, +unsigned long eid) +{
>> +ia64_lid_t lid;
>> +int i;
>> +
>> +for (i = 0; i < KVM_MAX_VCPUS; i++) {
>> +if (kvm->vcpus[i]) {
>>
Carsten Otte wrote:
> Zhang, Xiantao wrote:
>> +static struct kvm_vcpu *lid_to_vcpu(struct kvm *kvm, unsigned long
>> id, +unsigned long eid) +{
>> +ia64_lid_t lid;
>> +int i;
>> +
>> +for (i = 0; i < KVM_MAX_VCPUS; i++) {
>> +if (kvm->vcpus[i]) {
>>
Carsten Otte wrote:
> Zhang, Xiantao wrote:
>> +typedef union context {
>> +/* 8K size */
>> +chardummy[KVM_CONTEXT_SIZE];
>> +struct {
>> +unsigned long psr;
>> +unsigned long pr;
>> +unsigned long caller_unat;
>> +u
Jes Sorensen wrote:
> Zhang, Xiantao wrote:
>>> From 62895ff991d48398a77afdbf7f2bef127e802230 Mon Sep 17 00:00:00
>>> 2001
>> From: Xiantao Zhang <[EMAIL PROTECTED]>
>> Date: Fri, 28 Mar 2008 09:49:57 +0800
>> Subject: [PATCH] KVM: IA64: Add kvm arch-specific core code for
>> kvm/ia64.
>>
>> kvm
Jes Sorensen wrote:
> Hi Xiantao,
Hi, Jes
I fixed the coding style issues. Thanks!
> More comments.
>
> Zhang, Xiantao wrote:
>>> From 696b9eea9f5001a7b7a07c0e58514aa10306b91a Mon Sep 17 00:00:00
>>> 2001
>> From: Xiantao Zhang <[EMAIL PROTECTED]>
>> Date: Fri, 28 Mar 2008 09:51:36 +080
Carsten Otte wrote:
> Zhang, Xiantao wrote:
>> +/* mca_insert_tr
>> + *
>> + * Switch rid when TR reload and needed!
>> + * iord: 1: itr, 2: itr;
>> + *
>> +*/
>> +static void mca_insert_tr(u64 iord)
>> +{
>> +
>> +int i;
>> +u64 old_rr;
>> +struct ia64_tr_entry *p;
>> +unsigned
With the title combination, the guest takes nearly 100% of my real CPU
time and still only sees one CPU. Is this a known problem, and does it
have a known solution?
Thanks in Advance,
--
Dave Abrahams
Boost Consulting
http://boost-consulting.com
--
This patch refactors the in-kernel PIT to be a logically separate device.
Signed-off-by: Anthony Liguori <[EMAIL PROTECTED]>
diff --git a/qemu/hw/i8254.c b/qemu/hw/i8254.c
index e215f8b..bcd9dba 100644
--- a/qemu/hw/i8254.c
+++ b/qemu/hw/i8254.c
@@ -30,6 +30,9 @@
//#define DEBUG_PIT
+#define
This patch is mostly code motion to move the newly refactored
in-kernel PIT device to a separate file.
Signed-off-by: Anthony Liguori <[EMAIL PROTECTED]>
diff --git a/qemu/Makefile.target b/qemu/Makefile.target
index e29bbeb..a947147 100644
--- a/qemu/Makefile.target
+++ b/qemu/Makefile.target
@@
Hello,
The "reserved RAM" can be mapped by virtualization software with
/dev/mem to create a 1:1 mapping between guest physical (bus) address
and host physical (bus) address. Please let me know if something like
this can be merged in -mm (this is the minimal possible change to
achieve the feature)
Marcelo Tosatti wrote:
> QEMU/KVM: ftruncate() is not supported by hugetlbfs on older hosts
>
> Signed-off-by: Marcelo Tosatti <[EMAIL PROTECTED]>
>
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
This is the kvm-userland.git patch overwriting the ranges in the
virtualized e820 map with /dev/mem. All is validated through
/proc/iomem, so shall the hardware e820 map be weird, there will be
zero risk of corruption, simply it will fail to startup with a verbose
error.
The bios has to be rebuilt
This is the kvm.git patch to enable -reserved-ram (without this kvm
will simply gracefully fail to emulate the illegal instruction inside
the bad_page). This trick avoids altering the ioctl api with libkvm,
in short if get_user_pages fails on a host kernel with reserved ram
config option enabled, i
On Fri, Mar 28, 2008 at 09:41:06AM +0300, Avi Kivity wrote:
> >mmap() should fail if anything goes wrong with ftruncate and the file
> >length is not extented on tmpfs.
> >
> >--- vl.c.orig 2008-03-27 18:51:31.0 -0300
> >+++ vl.c2008-03-27 18:52:40.0 -0300
> >@@ -8749,11 +
Hello,
These three patches (one against host kernel, one against kvm.git, one
against kvm-userland.git) forces KVM to map all RAM mapped in the
virtualized e820 map provided to the guest with gfn = hfn. In turn
it's now possible to give direct hardware access to the guest, all DMA
will work fine o
> +/**
>
> + VCPU control register access routines
> +
>
> **/
> +static inline u64 vcpu_get_itir(VCPU *vcpu)
> +{
> + return ((u64)VCPU(vcpu, itir
Jes Sorensen wrote:
> I'm a little wary of the performance impact of this change. Doing a
> cpumask compare on all smp_call_function calls seems a little expensive.
> Maybe it's just noise in the big picture compared to the actual cost of
> the IPIs, but I thought I'd bring it up.
>
> Keep in mind
Zhang, Xiantao wrote:
> +static struct kvm_vcpu *lid_to_vcpu(struct kvm *kvm, unsigned long id,
> + unsigned long eid)
> +{
> + ia64_lid_t lid;
> + int i;
> +
> + for (i = 0; i < KVM_MAX_VCPUS; i++) {
> + if (kvm->vcpus[i]) {
> + lid.v
From: Dong, Eddie <[EMAIL PROTECTED]>
A guest partial guest pte write will leave shadow_trap_nonpresent_pte
in spte, which generates a vmexit at the next guest access through that pte.
This patch improves this by reading the full guest pte in advance and thus
being able to update the spte and eli
From: Jan Engelhardt <[EMAIL PROTECTED]>
Signed-off-by: Jan Engelhardt <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
virt/kvm/kvm_main.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
index b2e1289..045
Certain x86 instructions use bits 3:5 of the byte following the opcode as an
opcode extension, with the decode sometimes depending on bits 6:7 as well.
Add support for this in the main decoding table rather than an ad-hock
adaptation per opcode.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
a
Opcodes 0x80-0x83
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
arch/x86/kvm/x86_emulate.c | 25 +++--
1 files changed, 23 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c
index ef6de16..22900f7 100644
--- a/arch/x86/kvm
From: Dong, Eddie <[EMAIL PROTECTED]>
Signed-off-by: Yaozu (Eddie) Dong <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
arch/x86/kvm/mmu.c | 10 +-
include/asm-x86/kvm_host.h |3 ++-
2 files changed, 7 insertions(+), 6 deletions(-)
diff --git a/arch/x8
From: Ryan Harper <[EMAIL PROTECTED]>
Looking at Intel Volume 3b, page 148, table 20-11 and noticed
that the field name is 'Deliver' not 'Deliever'. Attached patch changes
the define name and its user in vmx.c
Signed-off-by: Ryan Harper <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTE
These are the first forty of about a hundred patches I have queued for 2.6.26.
Note that a few will go through git-s390, maybe a couple through x86.git, and
a few to 2.6.25-rc.
The ia64 patches are not included as they are being reviewed, but I hope to have
them merged in time for the 2.6.26 merge
From: Joerg Roedel <[EMAIL PROTECTED]>
This patch contains the changes to the KVM MMU necessary for support of the
Nested Paging feature in AMD Barcelona and Phenom Processors.
Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
arch/x86/kvm/mmu.c |
From: Joerg Roedel <[EMAIL PROTECTED]>
This patch changes the kvm-amd module to allocate the SVM MSR permission map
per VCPU instead of a global map for all VCPUs. With this we have more
flexibility allowing specific guests to access virtualized MSRs. This is
required for LBR virtualization.
Sign
From: Andrea Arcangeli <[EMAIL PROTECTED]>
With CONFIG_PREEMPT=n, this is needed in order to disable the fault-in
code from sleeping.
Signed-off-by: Andrea Arcangeli <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
virt/kvm/kvm_main.c |2 ++
1 files changed, 2 insertions
From: Hollis Blanchard <[EMAIL PROTECTED]>
This allows kvm_host.h to be #included even when struct preempt_notifier is
undefined. This is needed to build ppc asm-offsets.h.
Signed-off-by: Hollis Blanchard <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
include/linux/kvm_hos
From: Joerg Roedel <[EMAIL PROTECTED]>
By moving the SVM feature detection from the each_cpu code to the hardware
setup code it runs only once. As an additional advance the feature check is now
available earlier in the module setup process.
Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
Signed-o
From: Joerg Roedel <[EMAIL PROTECTED]>
To allow access to the EFER register in 32bit KVM the EFER specific code has to
be exported to the x86 generic code. This patch does this in a backwards
compatible manner.
[avi: add check for EFER-less hosts]
Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
From: Joerg Roedel <[EMAIL PROTECTED]>
This patch contains the SVM architecture dependent changes for KVM to enable
support for the Nested Paging feature of AMD Barcelona and Phenom processors.
Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
arch
From: Joerg Roedel <[EMAIL PROTECTED]>
The generic x86 code has to know if the specific implementation uses Nested
Paging. In the generic code Nested Paging is called Two Dimensional Paging
(TDP) to avoid confusion with (future) TDP implementations of other vendors.
This patch exports the availabi
From: Joerg Roedel <[EMAIL PROTECTED]>
This patch aligns the bits the guest can set in the EFER register with the
features in the host processor. Currently it lets EFER.NX disabled if the
processor does not support it and enables EFER.LME and EFER.LMA only for KVM on
64 bit hosts.
Signed-off-by:
From: Joerg Roedel <[EMAIL PROTECTED]>
To disable the use of the Nested Paging feature even if it is available in
hardware this patch adds a module parameter. Nested Paging can be disabled by
passing npt=0 to the kvm_amd module.
Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
Signed-off-by: Avi K
From: Joerg Roedel <[EMAIL PROTECTED]>
Let SVM detect if the Nested Paging feature is available on the hardware.
Disable it to keep this patch series bisectable.
Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
arch/x86/kvm/svm.c |8
From: Joerg Roedel <[EMAIL PROTECTED]>
This patch implements the Last Branch Record Virtualization (LBRV) feature of
the AMD Barcelona and Phenom processors into the kvm-amd module. It will only
be enabled if the guest enables last branch recording in the DEBUG_CTL MSR. So
there is no increased wo
From: Joerg Roedel <[EMAIL PROTECTED]>
This patch give the SVM and VMX implementations the ability to add some bits
the guest can set in its EFER register.
Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
arch/x86/kvm/x86.c | 11
From: Joerg Roedel <[EMAIL PROTECTED]>
This patch makes the EFER register accessible on a 32bit KVM host. This is
necessary to boot 32 bit PAE guests under SVM.
Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
arch/x86/kvm/x86.c | 10 --
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
arch/x86/kvm/x86.c |3 +++
include/linux/kvm.h |1 +
2 files changed, 4 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 955d2ee..b7c32f6 100644
--- a/arch/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@
From: Joerg Roedel <[EMAIL PROTECTED]>
Change the parameter of the init_vmcb() function in the kvm-amd module from
struct vmcb to struct vcpu_svm.
Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
Signed-off-by: Markus Rechberger <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
include/linux/kvm_host.h |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h
index f4deb99..eb88d32 100644
--- a/include/linux/kvm_host.h
+++ b/include/linux/kvm_host.h
@@ -2
From: Glauber de Oliveira Costa <[EMAIL PROTECTED]>
This is the guest part of kvm clock implementation
It does not do tsc-only timing, as tsc can have deltas
between cpus, and it did not seem worthy to me to keep
adjusting them.
We do use it, however, for fine-grained adjustment.
Other than that
From: Joerg Roedel <[EMAIL PROTECTED]>
The load_pdptrs() function is required in the SVM module for NPT support.
Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
arch/x86/kvm/x86.c |1 +
include/asm-x86/kvm_host.h |2 ++
2 files ch
The second page is only needed on archs that support pio.
Noted by Carsten Otte.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
virt/kvm/kvm_main.c |5 -
1 files changed, 4 insertions(+), 1 deletions(-)
diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
index 121e65c..7972e3a 100
With NPT support, scalability is much improved.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
include/linux/kvm_host.h |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h
index b90ca36..f4deb99 100644
--- a/include/linu
From: Harvey Harrison <[EMAIL PROTECTED]>
Change jmp_rel() to a function as well.
Signed-off-by: Harvey Harrison <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
arch/x86/kvm/x86_emulate.c | 56 ---
1 files changed, 26 insertions(+),
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
arch/x86/kvm/x86.c |3 +++
include/linux/kvm.h |1 +
2 files changed, 4 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 256c0fc..955d2ee 100644
--- a/arch/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@
From: Harvey Harrison <[EMAIL PROTECTED]>
Signed-off-by: Harvey Harrison <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
arch/x86/kvm/x86_emulate.c | 48 ++-
1 files changed, 29 insertions(+), 19 deletions(-)
diff --git a/arch/x86/k
From: Harvey Harrison <[EMAIL PROTECTED]>
Replaces open-coded mask calculation in macros.
Signed-off-by: Harvey Harrison <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
arch/x86/kvm/x86_emulate.c | 11 ---
1 files changed, 8 insertions(+), 3 deletions(-)
diff --g
From: Joerg Roedel <[EMAIL PROTECTED]>
The mapping function for the nonpaging case in the softmmu does basically the
same as required for Nested Paging. Make this function generic so it can be
used for both.
Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECT
From: Glauber de Oliveira Costa <[EMAIL PROTECTED]>
This is the host part of kvm clocksource implementation. As it does
not include clockevents, it is a fairly simple implementation. We
only have to register a per-vcpu area, and start writing to it periodically.
The area is binary compatible with
This adds group decode support for opcode 0x8f.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
arch/x86/kvm/x86_emulate.c |8 +++-
1 files changed, 7 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c
index 46ecf34..cf1ce7c 100644
--- a/
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
virt/kvm/kvm_main.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
index 04595fe..121e65c 100644
--- a/virt/kvm/kvm_main.c
+++ b/virt/kvm/kvm_main.c
@@ -678,8 +678,10 @@ static in
Currently an mmio guest pte is encoded in the shadow pagetable as a
not-present trapping pte, with the SHADOW_IO_MARK bit set. However
nothing is ever done with this information, so maintaining it is a
useless complication.
This patch moves the check for mmio to before shadow ptes are instantiate
From: Sheng Yang <[EMAIL PROTECTED]>
To allow TLB entries to be retained across VM entry and VM exit, the VMM
can now identify distinct address spaces through a new virtual-processor ID
(VPID) field of the VMCS.
[avi: drop vpid_sync_all()]
[avi: add "cc" to asm constraints]
Signed-off-by: Sheng
This adds group decoding support for opcodes 0xf6, 0xf7 (group 3).
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
arch/x86/kvm/x86_emulate.c | 34 ++
1 files changed, 10 insertions(+), 24 deletions(-)
diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86
Add group decoding support for opcode 0xfe (group 4) and 0xff (group 5).
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
arch/x86/kvm/x86_emulate.c | 40 ++--
1 files changed, 10 insertions(+), 30 deletions(-)
diff --git a/arch/x86/kvm/x86_emulate.c b/arch
This adds group decoding for opcode 0x0f 0x01 (group 7).
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
arch/x86/kvm/x86_emulate.c |9 +++--
1 files changed, 7 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c
index 7310368..ef6de16 100
Zhang, Xiantao wrote:
> +typedef union context {
> + /* 8K size */
> + chardummy[KVM_CONTEXT_SIZE];
> + struct {
> + unsigned long psr;
> + unsigned long pr;
> + unsigned long caller_unat;
> + unsigned long pad;
Zhang, Xiantao wrote:
> +/* mca_insert_tr
> + *
> + * Switch rid when TR reload and needed!
> + * iord: 1: itr, 2: itr;
> + *
> +*/
> +static void mca_insert_tr(u64 iord)
> +{
> +
> + int i;
> + u64 old_rr;
> + struct ia64_tr_entry *p;
> + unsigned long psr;
> + int cpu = smp
Farkas Levente wrote:
> hi,
> while kvm-62 works for us kmv-64 is hang at random position and even
> if it's start it's not able to login neither from net (can't connect)
> nor from console (through virt-manager's vnc i can give root username
> but after the password nothing happened). attached
Hi Xiantao,
More comments.
Zhang, Xiantao wrote:
>>From 696b9eea9f5001a7b7a07c0e58514aa10306b91a Mon Sep 17 00:00:00 2001
> From: Xiantao Zhang <[EMAIL PROTECTED]>
> Date: Fri, 28 Mar 2008 09:51:36 +0800
> Subject: [PATCH] KVM:IA64 : Add head files for kvm/ia64
>
> ia64_regs: some defintions for
hi,
while kvm-62 works for us kmv-64 is hang at random position and even if
it's start it's not able to login neither from net (can't connect) nor
from console (through virt-manager's vnc i can give root username but
after the password nothing happened). attached a screenshot of the boot
hang
Zhang, Xiantao wrote:
>>From 62895ff991d48398a77afdbf7f2bef127e802230 Mon Sep 17 00:00:00 2001
> From: Xiantao Zhang <[EMAIL PROTECTED]>
> Date: Fri, 28 Mar 2008 09:49:57 +0800
> Subject: [PATCH] KVM: IA64: Add kvm arch-specific core code for
> kvm/ia64.
>
> kvm_ia64.c is created to handle kvm ia6
Hi Xiantao,
Some more nit-picking, though some of this is a bit more important
to fixup.
Cheers,
Jes
> +typedef struct thash_data {
Urgh! argh! Please avoid typedefs unless you really need them, see
Chapter 5 of Documentation/CodingStyle for details.
> diff --git a/include/asm-ia64/kvm_host.h
Akio Takebe wrote:
> Hi, Xiantao
>
>> +3. Get Guest Firmware named as Flash.fd, and put it under right
>> place: + (1) If you have the guest firmware (binary)released by
Intel
>> Corp for Xen, you can use it directly.
>> +(2) If you want to build a guest firmware form source code.
>> Pleas
Hi, Xiantao
>+3. Get Guest Firmware named as Flash.fd, and put it under right place:
>+ (1) If you have the guest firmware (binary)released by Intel
>Corp for Xen, you can use it directly.
>+ (2) If you want to build a guest firmware form source code.
>Please download the source from
>+
Jes Sorensen wrote:
> Zhang, Xiantao wrote:
>>> From 697d50286088e98da5ac8653c80aaa96c81abf87 Mon Sep 17 00:00:00
>>> 2001
>> From: Xiantao Zhang <[EMAIL PROTECTED]>
>> Date: Mon, 31 Mar 2008 09:50:24 +0800
>> Subject: [PATCH] KVM:IA64: Implement smp_call_function_mask for ia64
>>
>> This functio
各位老总:您们好!
诚祝:您们在2008年里;有鼠不尽的快乐!鼠不尽的收获!鼠不尽的钞票!
鼠不尽的幸福!鼠不尽的美满生活!愿:您们阖家欢乐!幸福安康!
我是(深圳市珊湖岛进出口有限公司)的负责人;可以提供:出口报关单,
核销单等等一系列手续;代理:出口报关,商检,境内外运输..等等;还可
以代办
Jes Sorensen wrote:
> Hi Xiantao,
>
> I general I think the code in this patch is fine. I have a couple of
> nit-picking comments:
>
>> +if (target_mask&0x1) {
>
> The formatting here isn't quite what most of the kernel does. It would
> be better if you added spaces so it's a little easier t
On Mon, Mar 31, 2008 at 09:35:00AM +0300, Avi Kivity wrote:
> This can be done by taking mmu_lock in _begin and releasing it in _end,
> unless there's a lock dependency issue.
The main problem is if want to be able to co-exit with XPMEM methods
registered in the same notifier chain for the same M
Zhang, Xiantao wrote:
>>From 697d50286088e98da5ac8653c80aaa96c81abf87 Mon Sep 17 00:00:00 2001
> From: Xiantao Zhang <[EMAIL PROTECTED]>
> Date: Mon, 31 Mar 2008 09:50:24 +0800
> Subject: [PATCH] KVM:IA64: Implement smp_call_function_mask for ia64
>
> This function provides more flexible interface
Hi All,
This is today's KVM test result against kvm.git
2ac530fcd40ad730d4cc7961768e412eaf9b7caa and kvm-userspace.git
5ef6cd806d5c8dd3ad2d1dfe01752103702fc34f.
Issue list
1. Booting four guests likely fails
https://sourceforge.net/tracker/?func
On Mon, 2008-03-31 at 10:17 +0200, Alexander Graf wrote:
> On Mar 31, 2008, at 9:43 AM, Avi Kivity wrote:
>
> > Alexander Graf wrote:
> >>
> >> I am experiencing 7-8ms ping latencies (native 0.1ms) on x86_64 as
> >> well, when pinging the virtual machine. Maybe it's not related to
> >> PowerPC? I
Автoмoбиль в Вашей opганизации
oднoдневный cеминаp / 2 апpеля 2008 г
Пpoгpамма:
1. Пoкупка автoмoбиля, пеpеoфopмление и пocтанoвка на учет - чтo нужнo знать
бухгалтеpу.
2. Пеpвичные дoкументы пo учету автoтpанcпopта в opганизации. Фopмиpoвание
инвентаpнoгo oбъекта "автoмoбиль". Фopмы oc-1, o
Hi Xiantao,
I general I think the code in this patch is fine. I have a couple of
nit-picking comments:
> + if (target_mask&0x1) {
The formatting here isn't quite what most of the kernel does. It would
be better if you added spaces so it's a little easier to read, ie:
if (target_mask
>From 6b731c15afa8cec84f16408c421c286f1dd1b7d3 Mon Sep 17 00:00:00 2001
From: Xiantao Zhang <[EMAIL PROTECTED]>
Date: Wed, 12 Mar 2008 13:45:40 +0800
Subject: [PATCH] KVM:IA64 : Add TLB virtulization support.
vtlb.c includes tlb/VHPT virtulization.
Signed-off-by: Anthony Xu <[EMAIL PROTECTED]>
Sig
>From 03259a60f3c8104cd61f523f9ddeccce0e635782 Mon Sep 17 00:00:00 2001
From: Xiantao Zhang <[EMAIL PROTECTED]>
Date: Fri, 28 Mar 2008 09:48:10 +0800
Subject: [PATCH] KVM: IA64: Add header files for kvm/ia64.
Three header files are added:
asm-ia64/kvm.h
asm-ia64/kvm_host.h
asm-ia64/kvm_para.h
Sign
>From b04624ce5ff919d776bf1d64b157d67410c6bc27 Mon Sep 17 00:00:00 2001
From: Xiantao Zhang <[EMAIL PROTECTED]>
Date: Wed, 12 Mar 2008 13:57:33 +0800
Subject: [PATCH] KVM:IA64 : How to boot up guests on kvm/ia64
Signed-off-by: Xiantao Zhang <[EMAIL PROTECTED]>
---
Documentation/ia64/kvm-howto.txt
Alexander Graf wrote:
>
> On Mar 31, 2008, at 9:43 AM, Avi Kivity wrote:
>
>> Alexander Graf wrote:
>>>
>>> I am experiencing 7-8ms ping latencies (native 0.1ms) on x86_64 as
>>> well, when pinging the virtual machine. Maybe it's not related to
>>> PowerPC? Is it supposed to be that slow?
>>
>> If
>From e9f15f3838626eacface8a863394e6b8825182be Mon Sep 17 00:00:00 2001
From: Xiantao Zhang <[EMAIL PROTECTED]>
Date: Wed, 12 Mar 2008 13:42:18 +0800
Subject: [PATCH] KVM:IA64 : Add kvm sal/pal virtulization support.
Some sal/pal calls would be traped to kvm for virtulization
from guest firmware.
>From 9b38270a4c01d8cfe85cd022e22a6f5c0efe45e7 Mon Sep 17 00:00:00 2001
From: Xiantao Zhang <[EMAIL PROTECTED]>
Date: Fri, 28 Mar 2008 14:58:47 +0800
Subject: [PATCH] KVM:IA64 Enable kvm build for ia64
Update the related Makefile and KConfig for kvm build
Signed-off-by: Xiantao Zhang <[EMAIL PROTE
>From b0f8c3bf3b020077c14bebd9d052cec455ccedaf Mon Sep 17 00:00:00 2001
From: Xiantao Zhang <[EMAIL PROTECTED]>
Date: Wed, 12 Mar 2008 13:50:13 +0800
Subject: [PATCH] KVM:IA64 : Generate offset values for assembly code
use.
asm-offsets.c will generate offset values used for assembly code
for some
>From a2bf407dd4dbcec75a076b9ed9a6d22ab98c54b7 Mon Sep 17 00:00:00 2001
From: Xiantao Zhang <[EMAIL PROTECTED]>
Date: Wed, 12 Mar 2008 13:49:38 +0800
Subject: [PATCH] KVM:IA64: add optimization for some virtulization
faults
optvfault.S adds optimization for some performance-critical
virtualization
>From cb572f8887ccfb939457c79fb2d2893ead2a3632 Mon Sep 17 00:00:00 2001
From: Xiantao Zhang <[EMAIL PROTECTED]>
Date: Mon, 31 Mar 2008 10:08:09 +0800
Subject: [PATCH] KVM:IA64 : Add mmio decoder for kvm/ia64.
mmio.c includes mmio decoder routines.
Signed-off-by: Anthony Xu <[EMAIL PROTECTED]>
Sign
>From f0a80c40029b18df15ae2da7e4784a8881fe4c06 Mon Sep 17 00:00:00 2001
From: Xiantao Zhang <[EMAIL PROTECTED]>
Date: Wed, 12 Mar 2008 13:44:37 +0800
Subject: [PATCH] KVM:IA64 : VMM module interfaces.
vmm.c adds the interfaces with kvm/module, and initialize global data
area.
Signed-off-by: Xianta
>From 697d50286088e98da5ac8653c80aaa96c81abf87 Mon Sep 17 00:00:00 2001
From: Xiantao Zhang <[EMAIL PROTECTED]>
Date: Mon, 31 Mar 2008 09:50:24 +0800
Subject: [PATCH] KVM:IA64: Implement smp_call_function_mask for ia64
This function provides more flexible interface for smp
infrastructure.
Signed-o
This version included the review comments from community. Thanks for
your feedback! :-)
The whole git repo is located at
git://git.kernel.org/pub/scm/linux/kernel/git/xiantao/kvm-ia64.git
kvm-ia64-mc8.
Documentation/ia64/kvm-howto.txt | 71 +
arch/ia64/Kconfig|6
arch/i
>From 32013d1407ccbacf962031c308f31494b3f24aa3 Mon Sep 17 00:00:00 2001
From: Xiantao Zhang <[EMAIL PROTECTED]>
Date: Sat, 29 Mar 2008 09:23:37 +0800
Subject: [PATCH] KVM:IA64 Add API for allocating Dynamic TR resource.
Dynamic TR resource should be managed in the uniform way.
Add two interfaces f
On Mar 31, 2008, at 9:43 AM, Avi Kivity wrote:
> Alexander Graf wrote:
>>
>> I am experiencing 7-8ms ping latencies (native 0.1ms) on x86_64 as
>> well, when pinging the virtual machine. Maybe it's not related to
>> PowerPC? Is it supposed to be that slow?
>
> If you have a really old host kernel
[EMAIL PROTECTED] wrote:
> Hi,
>
> Selon "Zhang, Xiantao" <[EMAIL PROTECTED]>:
>
>>> From 5f82ea88c095cf89cbae920944c05e578f35365f Mon Sep 17 00:00:00
>>> 2001
>> From: Xiantao Zhang <[EMAIL PROTECTED]>
>> Date: Wed, 12 Mar 2008 14:48:09 +0800
>> Subject: [PATCH] kvm/ia64: Add mmio decoder for k
Alexander Graf wrote:
>
> I am experiencing 7-8ms ping latencies (native 0.1ms) on x86_64 as
> well, when pinging the virtual machine. Maybe it's not related to
> PowerPC? Is it supposed to be that slow?
If you have a really old host kernel, or a misconfigured one, it can
happen. What's your h
On Mar 31, 2008, at 6:52 AM, Christian Ehrhardt wrote:
> Avi Kivity wrote:
>> Hollis Blanchard wrote:
>>> I'm pleased to report that we now have working network support in
>>> the
>>> guest, via the virtio-net driver. In fact, we can use NFS for the
>>> guest's root filesystem. :) Boot log atta
94 matches
Mail list logo