On 02/21/2012 07:33 PM, Peter Maydell wrote:
Short summary:
* switch wp groups to bitfield rather than int array
* convert sd.c to use memory_region_init_ram() to allocate the wp groups
(being careful to use memory_region_set_dirty() when we touch them)
* we don't need variable-length field
On Tue, Feb 21, 2012 at 09:06:30PM -0500, Jay Mann wrote:
> Hi all,
>
> Is there any video driver for KVM that supports HDCP? I'm trying to
> run windows media center inside a VM and it's saying the "Your
> graphics card or driver doesn't support content protection"
>
qxl doesn't support HDCP.
On 02/21/2012 01:00 AM, Zhang, Yang Z wrote:
>> > Thanks, this looks much better! I'll run it through some tests.
>> >
>> > We also should try to keep migration working from older versions using the
>> > load_old callback.
> Sure, I missed it. Will add it to the version 3.
> Any other comments?
Hi,
We are currently using 2.6.32 kernel and looks like the vhost-net
feature came in 2.6.34.
Using Qemu based I/O seems to be too taxing on our system (network I/O
is the primary application).
We are taking the vhost/net.c code from 2.6.34 kernel, but comparing
to 3.2 kernel, the new code seems
On Sat, 2012-02-04 at 11:08 +0900, Takuya Yoshikawa wrote:
> The latter needs a fundamental change: I heard (from Avi) that we can
> change mmu_lock to mutex_lock if mmu_notifier becomes preemptible.
>
> So I was planning to restart this work when Peter's
> "mm: Preemptibility"
>
Le Sun, Feb 19, 2012 at 11:13:15AM +0200, Gleb Natapov ecrivait :
>
> > http://www.roullier.net/report-no-hpet.txt.gz
> >
> How have you acquired this trace? It does not trace all kvm events only
> those that have "set_irq" in them.
I run : trace-cmd record -b 2 -e kvm -P
> Nothing
Hi Stefan,
see below.
On 21.02.2012 17:27, Stefan Hajnoczi wrote:
> On Tue, Feb 21, 2012 at 3:57 PM, Dongsu Park
> wrote:
..
> I'm not sure if O_DIRECT and Linux AIO to /dev/ram0 is a good idea.
> At least with tmpfs O_DIRECT does not even work - which kind of makes
> sense there because tmp
To complete and because I see another thread on performance
trouble with w2008R2
Le Wed, Feb 22, 2012 at 05:33:56PM +0100, David Cure ecrivait :
>
> > Nothing particularly strange here. ~1745 IRQs are injected into the
> > guest each second. RTC clock is configured to 1kH and other devic
On 2012-02-19 21:13, Thomas Fjellstrom wrote:
> On Sat Feb 18, 2012, Thomas Fjellstrom wrote:
>> On Sat Feb 18, 2012, Jan Kiszka wrote:
>>> On 2012-02-18 09:50, Thomas Fjellstrom wrote:
On Sat Feb 18, 2012, Jan Kiszka wrote:
> On 2012-02-18 05:49, Thomas Fjellstrom wrote:
>> I just upd
On 02/21/2012 08:33 PM, Liu Yu-B13201 wrote:
>>> +bool epapr_para_enabled = false;
>>
>> No need to explicitly initialize to false.
>
> Why not make code more readable?
It's common kernel style to not explicitly initialize global data to
zero or equivalent. Historically this was due to toolchain
On 02/20/2012 04:52 PM, Michael S. Tsirkin wrote:
For a pci bridge device, if we don't override
the name with custom code, the bus will be addressed as
.0, where id is the id specified by the user.
Since PCI Bridge devices have a single bus each, we don't need
the index: address the bus using th
On Wed, Feb 22, 2012 at 4:48 PM, Dongsu Park
wrote:
>> Try turning ioeventfd off for the virtio-blk device:
>>
>> -device virtio-blk-pci,ioeventfd=off,...
>>
>> You might see better performance since ramdisk I/O should be very
>> low-latency. The overhead of using ioeventfd might not make it
>> w
https://bugzilla.kernel.org/show_bug.cgi?id=42812
Summary: kvm module has bogus kernel version check
Product: Virtualization
Version: unspecified
Platform: All
OS/Version: Linux
Tree: Mainline
Status: NEW
Severi
> -Original Message-
> From: Paolo Bonzini [mailto:pbonz...@redhat.com]
> Sent: Wednesday, February 22, 2012 7:19 PM
>
> 0) My alarm tests failed quite badly. :( I attach a patch for kvm-unit-tests
> (repository at git://git.kernel.org/pub/scm/virt/kvm/kvm-unit-tests.git).
> The tests can
On 02/23/2012 02:49 AM, Zhang, Yang Z wrote:
>> > 6) Setting the clock after 500 ms happens not on every set, but only when
>> > moving
>> > out of divider reset (register A bits 5-7 moving from 110 or 111 to 010).
>> > As far as
>> > I can read, SET prevents the registers from changing value, b
The following series implements KVM support for ARM processors,
specifically on the Cortex A-15 platform.
The patch series applies to commit 24c9a7d43e695f0183ba99638edfcd265bc7a0ca
on Catalin Marinas' linux-arm-arch tree.
The patch series further depends on these two patches:
https://lists.cs.co
From: Christoffer Dall
This is a prepatory patch for the KVM/ARM implementation. KVM/ARM will use
the KVM_IRQ_LINE ioctl, which is currently conditional on
__KVM_HAVE_IOAPIC, but ARM obviously doesn't have any IOAPIC support and we
need a separate define.
Signed-off-by: Christoffer Dall
---
ar
From: Christoffer Dall
Targets KVM support for Cortex A-15 processors.
Contains no real functionality but all the framework components,
make files, header files and some tracing functionality.
“Nothing to see here. Move along, move along..."
Most functionality is in arch/arm/kvm/* or arch/arm/
From: Christoffer Dall
Adds support in the identity mapping feature that allows KVM to setup
identity mapping for the Hyp mode with the AP[1] bit set as required by
the specification and also supports freeing created sub pmd's after
finished use.
These two functions:
- hyp_idmap_add(pgd, addr,
From: Christoffer Dall
Sets up the required registers to run code in HYP-mode from the kernel.
By setting the HVBAR the kernel can execute code in Hyp-mode with
the MMU disabled. The HVBAR initially points to initialization code,
which initializes other Hyp-mode registers and enables the MMU
for
From: Christoffer Dall
This commit introduces the framework for guest memory management
through the use of 2nd stage translation. Each VM has a pointer
to a level-1 table (the pgd field in struct kvm_arch) which is
used for the 2nd stage translations. Entries are added when handling
guest faults
Userspace can inject IRQs and FIQs through the KVM_IRQ_LINE VM ioctl.
This ioctl is used since the sematics are in fact two lines that can be
either raised or lowered on the VCPU - the IRQ and FIQ lines.
KVM needs to know which VCPU it must operate on and whether the FIQ or
IRQ line is raised/lowe
From: Christoffer Dall
Provides complete world-switch implementation to switch to other guests
running in non-secure modes. Includes Hyp exception handlers that
capture necessary exception information and stores the information on
the VCPU and KVM structures.
Switching to Hyp mode is done throug
Adds a new important function in the main KVM/ARM code called
handle_exit() which is called from kvm_arch_vcpu_ioctl_run() on returns
from guest execution. This function examines the Hyp-Syndrome-Register
(HSR), which contains information telling KVM what caused the exit from
the guest.
Some of th
From: Christoffer Dall
Handles the guest faults in KVM by mapping in corresponding user pages
in the 2nd stage page tables.
Introduces new ARM-specific kernel memory types, PAGE_KVM_GUEST and
pgprot_guest variables used to map 2nd stage memory for KVM guests.
Signed-off-by: Christoffer Dall
--
From: Christoffer Dall
When the guest accesses I/O memory this will create data abort
exceptions and they are handled by decoding the HSR information
(physical address, read/write, length, register) and forwarding reads
and writes to QEMU which performs the device emulation.
Certain classes of l
When the guest executes a WFI instruction the operation is trapped to
KVM, which emulates the instruction in software. There is no correlation
between a guest executing a WFI instruction and actually putting the
hardware into a low-power mode, since a KVM guest is essentially a
process and the WFI
From: Marc Zyngier
Note: This is an awful hack and will go away as soon as the emulation and
decoding code has been changed to a table-driven approach.
Signed-off-by: Marc Zyngier
---
arch/arm/kvm/emulate.c | 36
1 files changed, 36 insertions(+), 0 delet
On 02/23/2012 02:49 AM, Zhang, Yang Z wrote:
>> Currently they hang very early because UF is not set. I
>> attempted to fix that, but ran into other problems. UIP seems
>> not to be really in sync with the update interrupt, because the
>> 500 ms update tests pass when testing UIP, but not when te
29 matches
Mail list logo