On 09/16/2012 08:07 PM, Avi Kivity wrote:
> 'eperm' is no longer used in the walker loop, so we can eliminate it.
>
Reviewed-by: Xiao Guangrong
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://
This series of 2 patches makes it possible for userspace to save and
restore the complete register state of a Book3S HV guest. Currently
it is not possible to save/restore several SPRs or any of the
floating-point state (including VMX/Altivec and VSX state). This
series extends the [GS]ET_ONE_REG
This enables userspace to get and set all the guest floating-point
state using the KVM_[GS]ET_ONE_REG ioctls. The floating-point state
includes all of the traditional floating-point registers and the
FPSCR (floating point status/control register), all the VMX/Altivec
vector registers and the VSCR
This enables userspace to get and set various SPRs (special-purpose
registers) using the KVM_[GS]ET_ONE_REG ioctls. With this, userspace
can get and set all the SPRs that are part of the guest state, either
through the KVM_[GS]ET_REGS ioctls, the KVM_[GS]ET_SREGS ioctls, or
the KVM_[GS]ET_ONE_REG
On 09/16/2012 08:07 PM, Avi Kivity wrote:
> + /*
> + * On a write fault, fold the dirty bit into accessed_dirty by shifting
> it one
> + * place right.
> + *
> + * On a read fault, do nothing.
> + */
> + accessed_dirty &= pte >> (write_fault >> ilog2(PFERR_WRITE_M
On 09/16/2012 08:07 PM, Avi Kivity wrote:
> Instead of branchy code depending on level, gpte.ps, and mmu configuration,
> prepare everything in a bitmap during mode changes and look it up during
> runtime.
>
Avi,
Can we introduce ignore_bits_mask[] (like rsvd_bits_mask), if pse is not
supported
On 09/15/2012 11:13 PM, Marcelo Tosatti wrote:
> On Fri, Sep 14, 2012 at 05:57:22PM +0800, Xiao Guangrong wrote:
>> We can not directly call kvm_release_pfn_clean to release the pfn
>> since we can meet noslot pfn which is used to cache mmio info into
>> spte
>>
>> Signed-off-by: Xiao Guangrong
>>
On 09/15/2012 11:25 PM, Marcelo Tosatti wrote:
> On Fri, Sep 14, 2012 at 05:59:06PM +0800, Xiao Guangrong wrote:
>> Wrap the common operations into these two functions
>>
>> Signed-off-by: Xiao Guangrong
>
> Why? I think people are used to
>
> spin_lock(lock)
> sequence
> spin_unlock(lock)
Mar
On 09/15/2012 11:31 PM, Marcelo Tosatti wrote:
> On Fri, Sep 14, 2012 at 06:13:11PM +0800, Xiao Guangrong wrote:
>> On 09/14/2012 05:59 PM, Xiao Guangrong wrote:
>>
>>> + return FNAME(prefetch_gpte)(vcpu, sp, spte, gptep[i], true);
>>
>> Sorry, this was wrong. Update this patch.
>>
>> [PA
On 09/16/2012 05:58 PM, Avi Kivity wrote:
> On 09/14/2012 08:59 AM, Xiao Guangrong wrote:
>> On 09/10/2012 05:26 PM, Xiao Guangrong wrote:
>>> On 09/10/2012 05:09 PM, Avi Kivity wrote:
On 09/07/2012 09:16 AM, Xiao Guangrong wrote:
> mmu_notifier is the interface to broadcast the mm events
While it shouldn't happen on regular guests, we sometimes hit it when fuzzing
within the guest, which would cause the lkvm process to exit - which is
undesired.
Our PIT tests were using the debug port to trigger a reboot. Instead of using
that port we now use the reboot line of our i8042 controlle
This patch adds a mmio bar to the qemu standard vga which allows to
access the standard vga registers and bochs dispi interface registers
via mmio.
Cc: Benjamin Herrenschmidt
Signed-off-by: Gerd Hoffmann
---
hw/vga-pci.c | 97 ++
hw/vga.
On 09/17/12 22:12, Peter Lieven wrote:
On 09/17/12 10:41, Kevin Wolf wrote:
Am 16.09.2012 12:13, schrieb Peter Lieven:
Hi,
when trying to block migrate a VM from one node to another, the source
VM crashed with the following assertion:
block.c:3829: bdrv_set_in_use: Assertion `bs->in_use != in_
Am 18.09.2012 12:28, schrieb Peter Lieven:
> On 09/17/12 22:12, Peter Lieven wrote:
>> On 09/17/12 10:41, Kevin Wolf wrote:
>>> Am 16.09.2012 12:13, schrieb Peter Lieven:
Hi,
when trying to block migrate a VM from one node to another, the source
VM crashed with the following ass
On Tue, 2012-09-18 at 11:51 +0200, Gerd Hoffmann wrote:
> This patch adds a mmio bar to the qemu standard vga which allows to
> access the standard vga registers and bochs dispi interface registers
> via mmio.
I had a patch like that somewhere (or is that it ? :-)
I dropped it in favor of a more
On Tue, Sep 18, 2012 at 09:14:55AM +0100, Richard Davies wrote:
> Hi Mel,
>
> Thanks for your latest patch, I attach a perf report below with this on top
> of all previous patches. There is still lock contention, though in a
> different place.
>
> 59.97% qemu-kvm [kernel.kallsyms]
On 09/18/12 12:32, Benjamin Herrenschmidt wrote:
> On Tue, 2012-09-18 at 11:51 +0200, Gerd Hoffmann wrote:
>> This patch adds a mmio bar to the qemu standard vga which allows to
>> access the standard vga registers and bochs dispi interface registers
>> via mmio.
>
> I had a patch like that somewh
Hi Christoffer,
On Sat, Sep 15, 2012 at 04:34:29PM +0100, Christoffer Dall wrote:
> The following series implements KVM support for ARM processors,
> specifically on the Cortex A-15 platform. We feel this is ready to be
> merged.
>
> Work is done in collaboration between Columbia University, Vir
On Sat, Sep 15, 2012 at 04:34:36PM +0100, Christoffer Dall wrote:
> From: Marc Zyngier
>
> The KVM hypervisor mmu code requires access to the mem_type prot_pte
> field when setting up page tables pointing to a device. Unfortunately,
> the mem_type structure is opaque.
>
> Add an accessor (get_me
On Tue, Sep 18, 2012 at 8:21 AM, Will Deacon wrote:
> Hi Christoffer,
>
> On Sat, Sep 15, 2012 at 04:34:29PM +0100, Christoffer Dall wrote:
>> The following series implements KVM support for ARM processors,
>> specifically on the Cortex A-15 platform. We feel this is ready to be
>> merged.
>>
>>
On Sat, Sep 15, 2012 at 04:34:43PM +0100, Christoffer Dall wrote:
> KVM uses the stage-2 page tables and the Hyp page table format,
> so let's define the fields we need to access in KVM.
>
> We use pgprot_guest to indicate stage-2 entries.
>
> Christoffer Dall
> ---
> arch/arm/include/asm/pgtab
On Sat, Sep 15, 2012 at 04:34:49PM +0100, Christoffer Dall wrote:
> From: Marc Zyngier
>
> Add a HYP pgd to the core code (so it can benefit all Linux
> hypervisors).
>
> Populate this pgd with an identity mapping of the code contained
> in the .hyp.idmap.text section
>
> Offer a method to drop
On Sat, Sep 15, 2012 at 04:34:55PM +0100, Christoffer Dall wrote:
> From: Marc Zyngier
>
> Signed-off-by: Marc Zyngier
> ---
> arch/arm/mm/idmap.c |4
> 1 file changed, 4 insertions(+)
Just fold this into the previous patch.
Will
--
To unsubscribe from this list: send the line "unsub
On Sat, Sep 15, 2012 at 04:35:02PM +0100, Christoffer Dall wrote:
> From: Rusty Russell
>
> We want some of these for use in KVM, so pull them out of
> arch/arm/kernel/perf_event_v7.c into their own asm/perf_bits.h.
>
> Signed-off-by: Rusty Russell
> Signed-off-by: Christoffer Dall
> ---
> ar
Juan Quintela wrote:
> Hi
>
> Please send in any agenda items you are interested in covering.
there are no agenda so . call is cancelled.
Happy hacking, Juan.
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordom
On 9/17/12 2:31 AM, Dong Hao wrote:
From: Xiao Guangrong
Then, the code can be shared between kvm events and perf stat
[ Dong Hao : rebase it on acme's git tree ]
Signed-off-by: Xiao Guangrong
Signed-off-by: Dong Hao
---
tools/perf/Makefile |1 +
tools/perf/builtin-stat.c | 56
Hi Steve,
Do you think these patches will make their way into the redhat kernel sometime
soon?
What is the state of support for NFS over RDMA support at redhat?
Thanks,
Andrew
On Sep 11, 2012, at 7:03 PM, Steve Dickson wrote:
>
>
> On 09/04/2012 05:31 AM, Andrew Holway wrote:
>> Hello.
>>
On 09/18/2012 09:14 AM, Paul Mackerras wrote:
This enables userspace to get and set various SPRs (special-purpose
registers) using the KVM_[GS]ET_ONE_REG ioctls. With this, userspace
can get and set all the SPRs that are part of the guest state, either
through the KVM_[GS]ET_REGS ioctls, the KVM
On 18 September 2012 13:47, Will Deacon wrote:
> On Sat, Sep 15, 2012 at 04:34:43PM +0100, Christoffer Dall wrote:
>> +#define L_PTE2_SHAREDL_PTE_SHARED
>> +#define L_PTE2_READ (_AT(pteval_t, 1) << 6) /* HAP[0] */
>> +#define L_PTE2_WRITE (_AT(pteval_t, 1) << 7) /*
Am Dienstag 18 September 2012, 06:42:18 schrieb Veruca Salt:
> Could be that windows is seeing a USB 1 device while needing a USB 2.
> You might solve this by passing through the devices explicitly; go to the
> Qemu console, and type USB-INFO(if I remember rightly) while the device is
> plugged in
> -Original Message-
> From: Avi Kivity [mailto:a...@redhat.com]
> Sent: Friday, September 07, 2012 12:02 AM
> To: Li, Jiongxi
> Cc: kvm@vger.kernel.org
> Subject: Re: [PATCH 1/5]KVM: x86, apicv: add APICv register virtualization
> support
>
> On 09/05/2012 08:41 AM, Li, Jiongxi wrote:
>
Looking at http://lkml.indiana.edu/hypermail/linux/kernel/1205.0/00100.html
The new value for EAX is 0x4001.
This depends on
http://lists.gnu.org/archive/html/qemu-devel/2012-09/msg02497.html
As far as I known it is #5. It depends on (1), (2), (3) and (4).
Based on cpu-queue[1] branch.
(Fr
>From http://lkml.indiana.edu/hypermail/linux/kernel/1205.0/00100.html
EAX should be KVM_CPUID_FEATURES (0x4001) not 0.
---
target-i386/kvm.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/target-i386/kvm.c b/target-i386/kvm.c
index 761a9b1..0c9f5dd 100644
--- a/targ
>From http://lkml.indiana.edu/hypermail/linux/kernel/1205.0/00100.html
EAX should be KVM_CPUID_FEATURES (0x4001) not 0.
If kvm is not configured, the additional option of hypervisor-level=1
(or hypervisor-level=0x4001) needs to be specified to get this.
---
target-i386/cpu.c | 12 ++
On Tue, Sep 18, 2012 at 10:49:52AM -0400, Don Slutz wrote:
> From http://lkml.indiana.edu/hypermail/linux/kernel/1205.0/00100.html
> EAX should be KVM_CPUID_FEATURES (0x4001) not 0.
> ---
> target-i386/kvm.c |2 +-
> 1 files changed, 1 insertions(+), 1 deletions(-)
>
> diff --git a/target
On Tue, Sep 18, 2012 at 10:06 AM, Catalin Marinas
wrote:
> On 18 September 2012 13:47, Will Deacon wrote:
>> On Sat, Sep 15, 2012 at 04:34:43PM +0100, Christoffer Dall wrote:
>>> +#define L_PTE2_SHAREDL_PTE_SHARED
>>> +#define L_PTE2_READ (_AT(pteval_t, 1) << 6) /* HAP[0]
On Tue, Sep 18, 2012 at 04:05:13PM +0100, Christoffer Dall wrote:
> On Tue, Sep 18, 2012 at 10:06 AM, Catalin Marinas
> wrote:
> > On 18 September 2012 13:47, Will Deacon wrote:
> >> On Sat, Sep 15, 2012 at 04:34:43PM +0100, Christoffer Dall wrote:
> >>> +#define L_PTE2_SHAREDL_PT
On Tue, Sep 18, 2012 at 11:07 AM, Catalin Marinas
wrote:
> On Tue, Sep 18, 2012 at 04:05:13PM +0100, Christoffer Dall wrote:
>> On Tue, Sep 18, 2012 at 10:06 AM, Catalin Marinas
>> wrote:
>> > On 18 September 2012 13:47, Will Deacon wrote:
>> >> On Sat, Sep 15, 2012 at 04:34:43PM +0100, Christof
On 16.08.2012 14:47, Richard Davies wrote:
> http://marc.info/?l=qemu-devel&m=134304194329745
>
>
> We have been experiencing this problem for a while now too, using qemu-kvm
> (currently at 1.1.1).
>
> Unfortunately, hv_relaxed doesn't seem to fix it. The following command line
> produces the
Found by http://coccinelle.lip6.fr/
Signed-off-by: Peter Senna Tschudin
---
arch/x86/kernel/alternative.c | 4 ++--
arch/x86/kernel/apic/apic.c| 2 +-
arch/x86/kvm/vmx.c | 2 +-
arch/x86/pci/mmconfig-shared.c | 2 +-
4 files changed, 5 insertions(+), 5 deletions(-)
diff --git a
On Tue, Sep 18, 2012 at 10:49:53AM -0400, Don Slutz wrote:
> From http://lkml.indiana.edu/hypermail/linux/kernel/1205.0/00100.html
> EAX should be KVM_CPUID_FEATURES (0x4001) not 0.
>
> If kvm is not configured, the additional option of hypervisor-level=1
> (or hypervisor-level=0x4001) nee
On Tue, Sep 18, 2012 at 8:23 AM, Will Deacon wrote:
> On Sat, Sep 15, 2012 at 04:34:36PM +0100, Christoffer Dall wrote:
>> From: Marc Zyngier
>>
>> The KVM hypervisor mmu code requires access to the mem_type prot_pte
>> field when setting up page tables pointing to a device. Unfortunately,
>> the
On 9/17/12 2:31 AM, Dong Hao wrote:
From: Xiao Guangrong
Then, the code can be shared between kvm events and perf stat
[ Dong Hao : rebase it on acme's git tree ]
Signed-off-by: Xiao Guangrong
Signed-off-by: Dong Hao
---
tools/perf/Makefile |1 +
tools/perf/builtin-stat.c | 56
On 09/18/12 13:00, Eduardo Habkost wrote:
On Tue, Sep 18, 2012 at 10:49:53AM -0400, Don Slutz wrote:
From http://lkml.indiana.edu/hypermail/linux/kernel/1205.0/00100.html
EAX should be KVM_CPUID_FEATURES (0x4001) not 0.
If kvm is not configured, the additional option of hypervisor-level=1
On 09/13/2012 11:59 AM, Avi Kivity wrote:
On 09/12/2012 09:11 PM, Jiri Slaby wrote:
On 09/12/2012 10:18 AM, Avi Kivity wrote:
On 09/12/2012 11:13 AM, Jiri Slaby wrote:
Please provide the output of vmxcap
(http://goo.gl/c5lUO),
Unrestricted guest no
The big real
On Tue, 18 Sep 2012 21:40:31 +0200
Jiri Slaby wrote:
> On 09/13/2012 11:59 AM, Avi Kivity wrote:
> > On 09/12/2012 09:11 PM, Jiri Slaby wrote:
> >> On 09/12/2012 10:18 AM, Avi Kivity wrote:
> >>> On 09/12/2012 11:13 AM, Jiri Slaby wrote:
>
> > Please provide the output of vmxcap
>
On 09/18/12 11:05, Eduardo Habkost wrote:
On Tue, Sep 18, 2012 at 10:49:52AM -0400, Don Slutz wrote:
From http://lkml.indiana.edu/hypermail/linux/kernel/1205.0/00100.html
EAX should be KVM_CPUID_FEATURES (0x4001) not 0.
---
target-i386/kvm.c |2 +-
1 files changed, 1 insertions(+), 1
On Sat, Sep 15, 2012 at 11:34:36AM -0400, Christoffer Dall wrote:
> From: Marc Zyngier
>
> The KVM hypervisor mmu code requires access to the mem_type prot_pte
> field when setting up page tables pointing to a device. Unfortunately,
> the mem_type structure is opaque.
>
> Add an accessor (get_me
On Tue, Sep 18, 2012 at 5:04 PM, Russell King - ARM Linux
wrote:
> On Sat, Sep 15, 2012 at 11:34:36AM -0400, Christoffer Dall wrote:
>> From: Marc Zyngier
>>
>> The KVM hypervisor mmu code requires access to the mem_type prot_pte
>> field when setting up page tables pointing to a device. Unfortun
On Tue, Sep 18, 2012 at 8:47 AM, Will Deacon wrote:
> On Sat, Sep 15, 2012 at 04:34:43PM +0100, Christoffer Dall wrote:
>> KVM uses the stage-2 page tables and the Hyp page table format,
>> so let's define the fields we need to access in KVM.
>>
>> We use pgprot_guest to indicate stage-2 entries.
On Tue, Sep 18, 2012 at 9:08 AM, Will Deacon wrote:
> On Sat, Sep 15, 2012 at 04:35:02PM +0100, Christoffer Dall wrote:
>> From: Rusty Russell
>>
>> We want some of these for use in KVM, so pull them out of
>> arch/arm/kernel/perf_event_v7.c into their own asm/perf_bits.h.
>>
>> Signed-off-by: Ru
On Mon, Sep 17, 2012 at 09:16:28PM -0600, Alex Williamson wrote:
> To emulate level triggered interrupts, add a resample option to
> KVM_IRQFD. When specified, a new resamplefd is provided that notifies
> the user when the irqchip has been resampled by the VM. This may, for
> instance, indicate a
Hi Andrew,
On Tue, 18 Sep 2012 12:46:46 -0700 Andrew Morton
wrote:
>
> hm, thanks. This will probably take some time to resolve so I think
> I'll drop
>
> mm-move-all-mmu-notifier-invocations-to-be-done-outside-the-pt-lock.patch
> mm-move-all-mmu-notifier-invocations-to-be-done-outside-the-pt-
On Tue, Sep 18, 2012 at 04:06:25PM +0200, Alexander Graf wrote:
> Could you please merge the registers that you share with book3s pr
> into shared code?
OK - that's just DAR and DSISR for this patch, isn't it?
And basically all of the FP/VMX/VSX regs in the second patch?
(Does VSX work in PR KVM?)
On Wed, 19 Sep 2012 10:00:34 +1000 Stephen Rothwell
wrote:
> Hi Andrew,
>
> On Tue, 18 Sep 2012 12:46:46 -0700 Andrew Morton
> wrote:
> >
> > hm, thanks. This will probably take some time to resolve so I think
> > I'll drop
> >
> > mm-move-all-mmu-notifier-invocations-to-be-done-outside-the
Hi Andrew,
On Tue, 18 Sep 2012 17:20:29 -0700 Andrew Morton
wrote:
>
> On Wed, 19 Sep 2012 10:00:34 +1000 Stephen Rothwell
> wrote:
>
> > On Tue, 18 Sep 2012 12:46:46 -0700 Andrew Morton
> > wrote:
> > >
> > > hm, thanks. This will probably take some time to resolve so I think
> > > I'll d
On 09/19/2012 03:18 AM, David Ahern wrote:
> On 9/17/12 2:31 AM, Dong Hao wrote:
>> From: Xiao Guangrong
>>
>> Then, the code can be shared between kvm events and perf stat
>>
>> [ Dong Hao : rebase it on acme's git tree ]
>> Signed-off-by: Xiao Guangrong
>> Signed-off-by: Dong Hao
>> ---
>> t
On Fri, 2012-09-14 at 03:44 +0200, Alexander Graf wrote:
>
> We're slowly moving towards ONE_REG. ARM is already going full steam
> ahead and I'd like to have every new register in PPC be modeled with
> it as well. The old interface broke on us one time too often now :).
>
> As I said, if we run
On 9/18/12 7:53 PM, Xiao Guangrong wrote:
Does not apply to Arnaldo's latest perf/core branch.
The patch has already been applied to this branch:
http://git.kernel.org/?p=linux/kernel/git/acme/linux.git;a=commit;h=0007eceaceb11520071d053acfe06ee3326b1d13
Did not expect that. ok. I'll try patc
Tom Herbert writes:
> On Tue, Sep 11, 2012 at 10:49 PM, Rusty Russell wrote:
>> Perhaps Tom can explain how we avoid out-of-order receive for the
>> accelerated RFS case? It's not clear to me, but we need to be able to
>> do that for virtio-net if it implements accelerated RFS.
>
> AFAIK ooo RX i
Will Deacon writes:
> On Sat, Sep 15, 2012 at 04:35:02PM +0100, Christoffer Dall wrote:
>> From: Rusty Russell
>>
>> We want some of these for use in KVM, so pull them out of
>> arch/arm/kernel/perf_event_v7.c into their own asm/perf_bits.h.
>>
>> Signed-off-by: Rusty Russell
>> Signed-off-by:
On 09/18/12 12:31, Kevin Wolf wrote:
Am 18.09.2012 12:28, schrieb Peter Lieven:
On 09/17/12 22:12, Peter Lieven wrote:
On 09/17/12 10:41, Kevin Wolf wrote:
Am 16.09.2012 12:13, schrieb Peter Lieven:
Hi,
when trying to block migrate a VM from one node to another, the source
VM crashed with th
On Sun, Sep 16, 2012 at 2:32 AM, Nadav Har'El wrote:
> On Sat, Sep 15, 2012, Steven wrote about "Guest mode question":
>> Hi,
>> I have a question about vm execution in the guest mode. Suppose I have
>> two VMs on a machine.
>> Is it possible that both VMs are in the guest mode? Like this
>>
On Wed, Sep 19, 2012 at 11:10:10AM +0930, Rusty Russell wrote:
> Tom Herbert writes:
> > On Tue, Sep 11, 2012 at 10:49 PM, Rusty Russell
> > wrote:
> >> Perhaps Tom can explain how we avoid out-of-order receive for the
> >> accelerated RFS case? It's not clear to me, but we need to be able to
>
64 matches
Mail list logo