From: Yang Zhang
Get destination vcpu map from one ioapic entry.
Signed-off-by: Yang Zhang
---
arch/x86/kvm/lapic.c | 40
arch/x86/kvm/lapic.h |3 +++
2 files changed, 27 insertions(+), 16 deletions(-)
diff --git a/arch/x86/kvm/lapic.c b/arch/x86
From: Yang Zhang
Current interrupt coalescing logci which only used by RTC has conflict
with Posted Interrupt.
This patch introduces a new mechinism to use eoi to track interrupt:
When delivering an interrupt to vcpu, the need_eoi set to number of
vcpu that received the interrupt. And decrease i
From: Yang Zhang
Signed-off-by: Yang Zhang
---
virt/kvm/ioapic.h |9 +
1 files changed, 9 insertions(+), 0 deletions(-)
diff --git a/virt/kvm/ioapic.h b/virt/kvm/ioapic.h
index 2001b61..4904ca3 100644
--- a/virt/kvm/ioapic.h
+++ b/virt/kvm/ioapic.h
@@ -34,6 +34,12 @@ struct kvm_vcp
From: Yang Zhang
Add rtc irq to eoi exit bitmap to force vmexit when virtual interrupt
delivery is enabled.
Signed-off-by: Yang Zhang
---
virt/kvm/ioapic.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/virt/kvm/ioapic.c b/virt/kvm/ioapic.c
index 6266d1f..7e47da8 100
From: Yang Zhang
Update destination vcpu map when ioapic entry or apic(id, ldr, dfr) is changed
Signed-off-by: Yang Zhang
---
virt/kvm/ioapic.c | 38 --
1 files changed, 36 insertions(+), 2 deletions(-)
diff --git a/virt/kvm/ioapic.c b/virt/kvm/ioapic.c
i
From: Yang Zhang
Need to know which vcpu writes EOI.
Signed-off-by: Yang Zhang
---
arch/x86/kvm/lapic.c |2 +-
virt/kvm/ioapic.c| 12 ++--
virt/kvm/ioapic.h|3 ++-
3 files changed, 9 insertions(+), 8 deletions(-)
diff --git a/arch/x86/kvm/lapic.c b/arch/x86/kvm/lapic
From: Yang Zhang
Current interrupt coalescing logci which only used by RTC has conflict
with Posted Interrupt.
This patch introduces a new mechinism to use eoi to track interrupt:
When delivering an interrupt to vcpu, the need_eoi set to number of
vcpu that received the interrupt. And decrease it
From: Yang Zhang
reset/restore rtc_status when ioapic reset/restore.
Signed-off-by: Yang Zhang
---
arch/x86/kvm/lapic.c |8
arch/x86/kvm/lapic.h |1 +
virt/kvm/ioapic.c| 33 +
3 files changed, 42 insertions(+), 0 deletions(-)
diff --git a
From: Yang Zhang
RTC interrupt coalesced need to parse ioapic entry to get destionation
vcpu too. Rename it to more common name.
Signed-off-by: Yang Zhang
---
arch/x86/kvm/lapic.c |2 +-
virt/kvm/ioapic.c|6 +++---
virt/kvm/ioapic.h|2 +-
virt/kvm/irq_comm.c |4 ++--
4
On 03/16/2013 10:07 AM, Takuya Yoshikawa wrote:
> On Fri, 15 Mar 2013 23:26:59 +0800
> Xiao Guangrong wrote:
>
>> diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
>> index d3c4787..61a5bb6 100644
>> --- a/arch/x86/kvm/x86.c
>> +++ b/arch/x86/kvm/x86.c
>> @@ -6991,7 +6991,7 @@ void kvm_arch_co
On 03/16/2013 10:13 AM, Takuya Yoshikawa wrote:
> On Fri, 15 Mar 2013 23:29:53 +0800
> Xiao Guangrong wrote:
>
>> +/*
>> + * The caller should protect concurrent access on
>> + * kvm->arch.mmio_invalid_gen. Currently, it is used by
>> + * kvm_arch_commit_memory_region and protected by kvm->slots_
On 03/17/2013 11:02 PM, Gleb Natapov wrote:
> On Fri, Mar 15, 2013 at 11:29:53PM +0800, Xiao Guangrong wrote:
>> This patch tries to introduce a very simple and scale way to invalid all
>> mmio sptes - it need not walk any shadow pages and hold mmu-lock
>>
>> KVM maintains a global mmio invalid gen
On Fri, Mar 15, 2013 at 09:14:07AM +0800, Asias He wrote:
> Currently, vs->vs_endpoint is used indicate if the endpoint is setup or
> not. It is set or cleared in vhost_scsi_set_endpoint() or
> vhost_scsi_clear_endpoint() under the vs->dev.mutex lock. However, when
> we check it in vhost_scsi_handl
On Mon, Mar 18, 2013 at 04:08:50PM +0800, Xiao Guangrong wrote:
> On 03/17/2013 11:02 PM, Gleb Natapov wrote:
> > On Fri, Mar 15, 2013 at 11:29:53PM +0800, Xiao Guangrong wrote:
> >> This patch tries to introduce a very simple and scale way to invalid all
> >> mmio sptes - it need not walk any shad
On Mon, Mar 18, 2013 at 10:19:00AM +0200, Michael S. Tsirkin wrote:
> On Fri, Mar 15, 2013 at 09:14:07AM +0800, Asias He wrote:
> > Currently, vs->vs_endpoint is used indicate if the endpoint is setup or
> > not. It is set or cleared in vhost_scsi_set_endpoint() or
> > vhost_scsi_clear_endpoint() u
On Mon, Mar 18, 2013 at 02:49:25AM +, Zhang, Yang Z wrote:
> Zhang, Yang Z wrote on 2013-03-15:
> > From: Yang Zhang
> >
> > The follwoing patches are adding the Posted Interrupt supporting to KVM:
> > The first patch enables the feature 'acknowledge interrupt on vmexit'.Since
> > it is requi
On Mon, Mar 18, 2013 at 05:14:33PM +0800, Asias He wrote:
> On Mon, Mar 18, 2013 at 10:19:00AM +0200, Michael S. Tsirkin wrote:
> > On Fri, Mar 15, 2013 at 09:14:07AM +0800, Asias He wrote:
> > > Currently, vs->vs_endpoint is used indicate if the endpoint is setup or
> > > not. It is set or cleared
On Mon, Mar 18, 2013 at 03:24:35PM +0800, Yang Zhang wrote:
> From: Yang Zhang
>
> Signed-off-by: Yang Zhang
> ---
> virt/kvm/ioapic.h |9 +
> 1 files changed, 9 insertions(+), 0 deletions(-)
>
> diff --git a/virt/kvm/ioapic.h b/virt/kvm/ioapic.h
> index 2001b61..4904ca3 100644
> -
On Mon, Mar 18, 2013 at 03:24:36PM +0800, Yang Zhang wrote:
> From: Yang Zhang
>
> Update destination vcpu map when ioapic entry or apic(id, ldr, dfr) is changed
>
> Signed-off-by: Yang Zhang
> ---
> virt/kvm/ioapic.c | 38 --
> 1 files changed, 36 inserti
On Mon, Mar 18, 2013 at 03:24:39PM +0800, Yang Zhang wrote:
> From: Yang Zhang
>
> Current interrupt coalescing logci which only used by RTC has conflict
> with Posted Interrupt.
> This patch introduces a new mechinism to use eoi to track interrupt:
> When delivering an interrupt to vcpu, the nee
Gleb Natapov wrote on 2013-03-18:
> On Mon, Mar 18, 2013 at 02:49:25AM +, Zhang, Yang Z wrote:
>> Zhang, Yang Z wrote on 2013-03-15:
>>> From: Yang Zhang
>>>
>>> The follwoing patches are adding the Posted Interrupt supporting to KVM:
>>> The first patch enables the feature 'acknowledge inter
Gleb Natapov wrote on 2013-03-18:
> On Mon, Mar 18, 2013 at 03:24:35PM +0800, Yang Zhang wrote:
>> From: Yang Zhang
>>
>> Signed-off-by: Yang Zhang
>> ---
>> virt/kvm/ioapic.h |9 +
>> 1 files changed, 9 insertions(+), 0 deletions(-)
>> diff --git a/virt/kvm/ioapic.h b/virt/kvm/ioap
Gleb Natapov wrote on 2013-03-18:
> On Mon, Mar 18, 2013 at 03:24:36PM +0800, Yang Zhang wrote:
>> From: Yang Zhang
>>
>> Update destination vcpu map when ioapic entry or apic(id, ldr, dfr) is
>> changed
>>
>> Signed-off-by: Yang Zhang
>> ---
>> virt/kvm/ioapic.c | 38 ++
Gleb Natapov wrote on 2013-03-18:
> On Mon, Mar 18, 2013 at 03:24:39PM +0800, Yang Zhang wrote:
>> From: Yang Zhang
>>
>> Current interrupt coalescing logci which only used by RTC has conflict
>> with Posted Interrupt.
>> This patch introduces a new mechinism to use eoi to track interrupt:
>> Whe
Il 15/03/2013 16:29, Xiao Guangrong ha scritto:
> +/*
> + * spte bits of bit 3 ~ bit 11 are used as low 9 bits of
> + * generation, the bits of bits 52 ~ bit 61 are used as
> + * high 12 bits of generation.
> + */
High 10 bits.
How often does the generation number change? Especially with Takuya'
The following changes since commit 8c6216d7f118a128678270824b6a1286a63863ca:
Revert "ip_gre: make ipgre_tunnel_xmit() not parse network header as IP
unconditionally" (2013-03-16 23:00:41 -0400)
are available in the git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/mst/vhost.g
Hi
Please send in any agenda topics you are interested in.
Later, Juan.
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
On Mon, Mar 18, 2013 at 10:43:16AM +, Zhang, Yang Z wrote:
> >> For TMR issue, since it has nothing to do with APICv, if we really need to
> >> handle
> > it later, then we may need a separate patch to fix it. But currently, we may
> > focused on APICv only.
> >>
> > What do you mean by "TMR
Gleb Natapov wrote on 2013-03-18:
> On Mon, Mar 18, 2013 at 10:43:16AM +, Zhang, Yang Z wrote:
For TMR issue, since it has nothing to do with APICv, if we really need to
> handle
>>> it later, then we may need a separate patch to fix it. But currently, we may
>>> focused on APICv only.
>>>
From: Yang Zhang
We already know the trigger mode of a given interrupt when programming
the ioapice entry. So it's not necessary to set it in each interrupt
delivery.
Signed-off-by: Yang Zhang
---
arch/x86/kvm/lapic.c | 26 ++
arch/x86/kvm/lapic.h |5 ++---
On Mon, Mar 18, 2013 at 07:42:22PM +0800, Yang Zhang wrote:
> From: Yang Zhang
>
> We already know the trigger mode of a given interrupt when programming
> the ioapice entry. So it's not necessary to set it in each interrupt
> delivery.
>
What this patch suppose to go on top of?
> Signed-off-by
On 03/18/2013 05:13 PM, Gleb Natapov wrote:
> On Mon, Mar 18, 2013 at 04:08:50PM +0800, Xiao Guangrong wrote:
>> On 03/17/2013 11:02 PM, Gleb Natapov wrote:
>>> On Fri, Mar 15, 2013 at 11:29:53PM +0800, Xiao Guangrong wrote:
This patch tries to introduce a very simple and scale way to invalid
Gleb Natapov wrote on 2013-03-18:
> On Mon, Mar 18, 2013 at 07:42:22PM +0800, Yang Zhang wrote:
>> From: Yang Zhang
>>
>> We already know the trigger mode of a given interrupt when programming
>> the ioapice entry. So it's not necessary to set it in each interrupt
>> delivery.
>>
> What this pat
On 03/18/2013 07:19 PM, Paolo Bonzini wrote:
> Il 15/03/2013 16:29, Xiao Guangrong ha scritto:
>> +/*
>> + * spte bits of bit 3 ~ bit 11 are used as low 9 bits of
>> + * generation, the bits of bits 52 ~ bit 61 are used as
>> + * high 12 bits of generation.
>> + */
>
> High 10 bits.
Yes, i forgot
On Mon, Mar 18, 2013 at 08:29:29PM +0800, Xiao Guangrong wrote:
> On 03/18/2013 05:13 PM, Gleb Natapov wrote:
> > On Mon, Mar 18, 2013 at 04:08:50PM +0800, Xiao Guangrong wrote:
> >> On 03/17/2013 11:02 PM, Gleb Natapov wrote:
> >>> On Fri, Mar 15, 2013 at 11:29:53PM +0800, Xiao Guangrong wrote:
>
On Mon, Mar 18, 2013 at 08:42:09PM +0800, Xiao Guangrong wrote:
> On 03/18/2013 07:19 PM, Paolo Bonzini wrote:
> > Il 15/03/2013 16:29, Xiao Guangrong ha scritto:
> >> +/*
> >> + * spte bits of bit 3 ~ bit 11 are used as low 9 bits of
> >> + * generation, the bits of bits 52 ~ bit 61 are used as
>
On Sat, Mar 16, 2013 at 12:06:30AM -0500, Steve wrote:
> Here's the issue. I want to communicate between virtual machines, second
> Ethernet virtual port. But I would like to use the host loopback for that so
> as to not be limited to Ethernet port speeds, for large copies, etc. Right
> now, the
On Mon, Mar 18, 2013 at 12:32:51PM +, Zhang, Yang Z wrote:
> Gleb Natapov wrote on 2013-03-18:
> > On Mon, Mar 18, 2013 at 07:42:22PM +0800, Yang Zhang wrote:
> >> From: Yang Zhang
> >>
> >> We already know the trigger mode of a given interrupt when programming
> >> the ioapice entry. So it's
From: Yang Zhang
Current interrupt coalescing logci which only used by RTC has conflict
with Posted Interrupt.
This patch introduces a new mechinism to use eoi to track interrupt:
When delivering an interrupt to vcpu, the need_eoi set to number of
vcpu that received the interrupt. And decrease i
From: Yang Zhang
RTC interrupt coalesced need to parse ioapic entry to get destionation
vcpu too. Rename it to more common name.
Signed-off-by: Yang Zhang
---
arch/x86/kvm/lapic.c |2 +-
virt/kvm/ioapic.c|6 +++---
virt/kvm/ioapic.h|2 +-
virt/kvm/irq_comm.c |4 ++--
4
From: Yang Zhang
Need to know which vcpu writes EOI.
Signed-off-by: Yang Zhang
---
arch/x86/kvm/lapic.c |2 +-
virt/kvm/ioapic.c| 12 ++--
virt/kvm/ioapic.h|3 ++-
3 files changed, 9 insertions(+), 8 deletions(-)
diff --git a/arch/x86/kvm/lapic.c b/arch/x86/kvm/lapic
From: Yang Zhang
Signed-off-by: Yang Zhang
---
virt/kvm/ioapic.h |9 +
1 files changed, 9 insertions(+), 0 deletions(-)
diff --git a/virt/kvm/ioapic.h b/virt/kvm/ioapic.h
index 2001b61..20715d0 100644
--- a/virt/kvm/ioapic.h
+++ b/virt/kvm/ioapic.h
@@ -34,6 +34,12 @@ struct kvm_vcp
From: Yang Zhang
Update destination vcpu map when ioapic entry or apic(id, ldr, dfr) is changed
Signed-off-by: Yang Zhang
---
virt/kvm/ioapic.c | 40 ++--
1 files changed, 38 insertions(+), 2 deletions(-)
diff --git a/virt/kvm/ioapic.c b/virt/kvm/ioapic.c
From: Yang Zhang
Add rtc irq to eoi exit bitmap to force vmexit when virtual interrupt
delivery is enabled.
Signed-off-by: Yang Zhang
---
virt/kvm/ioapic.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/virt/kvm/ioapic.c b/virt/kvm/ioapic.c
index b74c73f..4ddaa07 100
From: Yang Zhang
reset/restore rtc_status when ioapic reset/restore.
Signed-off-by: Yang Zhang
---
arch/x86/kvm/lapic.c |8
arch/x86/kvm/lapic.h |1 +
virt/kvm/ioapic.c| 33 +
3 files changed, 42 insertions(+), 0 deletions(-)
diff --git a
From: Yang Zhang
Current interrupt coalescing logci which only used by RTC has conflict
with Posted Interrupt.
This patch introduces a new mechinism to use eoi to track interrupt:
When delivering an interrupt to vcpu, the need_eoi set to number of
vcpu that received the interrupt. And decrease it
From: Yang Zhang
Get destination vcpu map from one ioapic entry.
Signed-off-by: Yang Zhang
---
arch/x86/kvm/lapic.c | 40
arch/x86/kvm/lapic.h |3 +++
2 files changed, 27 insertions(+), 16 deletions(-)
diff --git a/arch/x86/kvm/lapic.c b/arch/x86
Gleb Natapov wrote on 2013-03-18:
> On Mon, Mar 18, 2013 at 12:32:51PM +, Zhang, Yang Z wrote:
>> Gleb Natapov wrote on 2013-03-18:
>>> On Mon, Mar 18, 2013 at 07:42:22PM +0800, Yang Zhang wrote:
From: Yang Zhang
We already know the trigger mode of a given interrupt when progra
https://bugzilla.kernel.org/show_bug.cgi?id=55201
--- Comment #7 from Jay Ren 2013-03-18 13:02:06 ---
(In reply to comment #5)
> Jay Ren, would you please confirm whether the attached patch fixes the
> problem.
Hi Marcelo, you patch can fix this bug. With your patch, I tested the loop for
On 03/18/2013 08:46 PM, Gleb Natapov wrote:
> On Mon, Mar 18, 2013 at 08:29:29PM +0800, Xiao Guangrong wrote:
>> On 03/18/2013 05:13 PM, Gleb Natapov wrote:
>>> On Mon, Mar 18, 2013 at 04:08:50PM +0800, Xiao Guangrong wrote:
On 03/17/2013 11:02 PM, Gleb Natapov wrote:
> On Fri, Mar 15, 201
On Mon, Mar 18, 2013 at 09:09:43PM +0800, Xiao Guangrong wrote:
> On 03/18/2013 08:46 PM, Gleb Natapov wrote:
> > On Mon, Mar 18, 2013 at 08:29:29PM +0800, Xiao Guangrong wrote:
> >> On 03/18/2013 05:13 PM, Gleb Natapov wrote:
> >>> On Mon, Mar 18, 2013 at 04:08:50PM +0800, Xiao Guangrong wrote:
>
On 03/18/2013 09:19 PM, Gleb Natapov wrote:
> On Mon, Mar 18, 2013 at 09:09:43PM +0800, Xiao Guangrong wrote:
>> On 03/18/2013 08:46 PM, Gleb Natapov wrote:
>>> On Mon, Mar 18, 2013 at 08:29:29PM +0800, Xiao Guangrong wrote:
On 03/18/2013 05:13 PM, Gleb Natapov wrote:
> On Mon, Mar 18, 201
On Mon, Mar 18, 2013 at 09:25:10PM +0800, Xiao Guangrong wrote:
> On 03/18/2013 09:19 PM, Gleb Natapov wrote:
> > On Mon, Mar 18, 2013 at 09:09:43PM +0800, Xiao Guangrong wrote:
> >> On 03/18/2013 08:46 PM, Gleb Natapov wrote:
> >>> On Mon, Mar 18, 2013 at 08:29:29PM +0800, Xiao Guangrong wrote:
>
On 03/18/2013 09:27 PM, Gleb Natapov wrote:
> On Mon, Mar 18, 2013 at 09:25:10PM +0800, Xiao Guangrong wrote:
>> On 03/18/2013 09:19 PM, Gleb Natapov wrote:
>>> On Mon, Mar 18, 2013 at 09:09:43PM +0800, Xiao Guangrong wrote:
On 03/18/2013 08:46 PM, Gleb Natapov wrote:
> On Mon, Mar 18, 201
https://bugzilla.kernel.org/show_bug.cgi?id=55421
Summary: igb VF can't work in KVM guest
Product: Virtualization
Version: unspecified
Kernel Version: 3.9.0-rc1
Platform: All
OS/Version: Linux
Tree: Mainline
Status: N
https://bugzilla.kernel.org/show_bug.cgi?id=55421
--- Comment #1 from Jay Ren 2013-03-18 15:11:16 ---
Created an attachment (id=95741)
--> (https://bugzilla.kernel.org/attachment.cgi?id=95741)
host dmesg
--
Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email
--- You
https://bugzilla.kernel.org/show_bug.cgi?id=55421
--- Comment #2 from Jay Ren 2013-03-18 15:12:02 ---
Created an attachment (id=95751)
--> (https://bugzilla.kernel.org/attachment.cgi?id=95751)
guest dmesg
in the dmesg in guest:
igbvf :00:03.0: irq 26 for MSI/MSI-X
igbvf :00:03.0: I
https://bugzilla.kernel.org/show_bug.cgi?id=55421
--- Comment #3 from Jay Ren 2013-03-18 15:12:33 ---
Created an attachment (id=95761)
--> (https://bugzilla.kernel.org/attachment.cgi?id=95761)
lspci info of the igbvf in guest
--
Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi
- Original Message -
> Hello,
>
> I am having an intermittent issue where one of my KVM guests is
> locking up and when checking the process its running @ 100% cpu.
> The host is CentOS 6.4 running the kernel
> kernel-2.6.32-358.0.1.el6.x86_64.
>
> Would it be worth attempting to compi
On Mar 18, 2013, at 12:04 PM, Jonas Gorski wrote:
> On 15 March 2013 03:09, Sanjay Lal wrote:
>> - Rename KVM_MEMORY_SLOTS -> KVM_USER_MEM_SLOTS
>> - Fix kvm_arch_{prepare,commit}_memory_region()
>> - Also remove kvm_arch_set_memory_region which was unused.
>
> I just stumbled upon the build is
- Original Message -
From: "Andrew Jones"
To: "Phil Daws"
Cc: kvm@vger.kernel.org
Sent: Monday, 18 March, 2013 4:08:48 PM
Subject: Re: KVM guest 100% cpu lock up
- Original Message -
> Hello,
>
> I am having an intermittent issue where one of my KVM guests is
> locking up and
On 15 March 2013 03:09, Sanjay Lal wrote:
> - Rename KVM_MEMORY_SLOTS -> KVM_USER_MEM_SLOTS
> - Fix kvm_arch_{prepare,commit}_memory_region()
> - Also remove kvm_arch_set_memory_region which was unused.
I just stumbled upon the build issue caused by the first item and can
confirm that this patch
On Fri, Mar 15, 2013 at 08:38:56AM +0100, Jan Kiszka wrote:
> From: Jan Kiszka
>
> Very old user space (namely qemu-kvm before kvm-49) didn't set the TSS
> base before running the VCPU. We always warned about this bug, but no
> reports about users actually seeing this are known. Time to finally
>
There is a deadlock in pvclock handling:
cpu0: cpu1:
kvm_gen_update_masterclock()
kvm_guest_time_update()
spin_lock(pvclock_gtod_sync_lock)
local_irq_save(fl
From: "Michael S. Tsirkin"
Date: Mon, 18 Mar 2013 13:20:03 +0200
> The following changes since commit 8c6216d7f118a128678270824b6a1286a63863ca:
>
> Revert "ip_gre: make ipgre_tunnel_xmit() not parse network header as IP
> unconditionally" (2013-03-16 23:00:41 -0400)
>
> are available in the
Hi Marc,
On 03/04/2013 10:47 PM, Marc Zyngier wrote:
> Define the 32bit specific registers (SPSRs, cp15...).
>
> Most CPU registers are directly mapped to a 64bit register
> (r0->x0...). Only the SPSRs have separate registers.
>
> cp15 registers are also mapped into their 64bit counterpart in mo
Hi Marc,
On 03/04/2013 10:47 PM, Marc Zyngier wrote:
> As conditionnal instructions can trap on AArch32, add the thinest
conditional
> possible emulation layer to keep 32bit guests happy.
[...]
> diff --git a/arch/arm64/kvm/emulate.c b/arch/arm64/kvm/emulate.c
> new file mode 100644
> index 00
On Mon, Mar 18, 2013 at 01:54:32PM -0300, Marcelo Tosatti wrote:
>
> There is a deadlock in pvclock handling:
>
> cpu0: cpu1:
> kvm_gen_update_masterclock()
> kvm_guest_time_update()
> spin_lock(pvclock_g
Hi Marc,
Here are a few more preprocessor definition suggestions.
On 03/04/2013 10:47 PM, Marc Zyngier wrote:
> Add fault injection capability for 32bit guests.
>
> Signed-off-by: Marc Zyngier
> ---
> arch/arm64/kvm/inject_fault.c | 79
> ++-
> 1 file c
On 03/04/2013 10:47 PM, Marc Zyngier wrote:
> Wire the init of a 32bit vcpu by allowing 32bit modes in pstate,
> and providing sensible defaults out of reset state.
>
> This feature is of course conditionned by the presence of 32bit
conditioned
> capability on the physical CPU.
[...]
--
Emplo
On Mon, Mar 18, 2013 at 01:01:36PM -0400, David Miller wrote:
> From: "Michael S. Tsirkin"
> Date: Mon, 18 Mar 2013 13:20:03 +0200
>
> > The following changes since commit 8c6216d7f118a128678270824b6a1286a63863ca:
> >
> > Revert "ip_gre: make ipgre_tunnel_xmit() not parse network header as IP
From: "Michael S. Tsirkin"
Date: Mon, 18 Mar 2013 21:54:43 +0200
> On Mon, Mar 18, 2013 at 01:01:36PM -0400, David Miller wrote:
>> From: "Michael S. Tsirkin"
>> Date: Mon, 18 Mar 2013 13:20:03 +0200
>>
>> > The following changes since commit
>> > 8c6216d7f118a128678270824b6a1286a63863ca:
>> >
On Wed, Mar 13, 2013 at 12:59:12PM +0800, Xiao Guangrong wrote:
> The current kvm_mmu_zap_all is really slow - it is holding mmu-lock to
> walk and zap all shadow pages one by one, also it need to zap all guest
> page's rmap and all shadow page's parent spte list. Particularly, things
> become wors
On Sat, 2013-03-16 at 06:37 +0100, Benjamin Herrenschmidt wrote:
> On Sat, 2013-03-16 at 09:34 +0800, Gavin Shan wrote:
> > >Could you explain further how this will be used? How the device is
> > >exposed to a guest is entirely a userspace construct, so why does vfio
> > >need to know or care abou
On Mon, Mar 18, 2013 at 02:10:03PM -0700, Nicholas A. Bellinger wrote:
> On Mon, 2013-03-18 at 21:54 +0200, Michael S. Tsirkin wrote:
> > On Mon, Mar 18, 2013 at 01:01:36PM -0400, David Miller wrote:
> > > From: "Michael S. Tsirkin"
> > > Date: Mon, 18 Mar 2013 13:20:03 +0200
> > >
> > > > The fo
On Sat, 2013-03-16 at 06:30 +0100, Benjamin Herrenschmidt wrote:
> On Fri, 2013-03-15 at 13:41 -0600, Alex Williamson wrote:
> >
> > This basically gives userspace free access to any regions that aren't
> > covered by known capabilities.
>
> And ?
>
> I mean seriously :-) We already had that di
On Mon, 2013-03-18 at 21:54 +0200, Michael S. Tsirkin wrote:
> On Mon, Mar 18, 2013 at 01:01:36PM -0400, David Miller wrote:
> > From: "Michael S. Tsirkin"
> > Date: Mon, 18 Mar 2013 13:20:03 +0200
> >
> > > The following changes since commit
> > > 8c6216d7f118a128678270824b6a1286a63863ca:
> > >
On Fri, 2013-03-15 at 09:45 +0800, Asias He wrote:
> Asias He (2):
> virtio-scsi: Set _DRIVER_OK flag before scsi target scanning
> virtio-scsi: Pack struct virtio_scsi_{req_cmd,resp_cmd}
>
> src/virtio-scsi.c | 5 +++--
> src/virtio-scsi.h | 4 ++--
> 2 files changed, 5 insertions(+), 4 dele
On Mon, 2013-03-18 at 23:14 +0200, Michael S. Tsirkin wrote:
> On Mon, Mar 18, 2013 at 02:10:03PM -0700, Nicholas A. Bellinger wrote:
> > On Mon, 2013-03-18 at 21:54 +0200, Michael S. Tsirkin wrote:
> > > On Mon, Mar 18, 2013 at 01:01:36PM -0400, David Miller wrote:
> > > > From: "Michael S. Tsirki
On Tue, 2013-03-12 at 10:45 +0800, Asias He wrote:
> Changes in v3:
> - Separate the bug fix to another thread
>
> Changes in v2:
> - Remove code duplication in tcm_vhost_{hotplug,hotunplug}
> - Fix racing of vs_events_nr
> - Add flush fix patch to this series
>
>
> Asias He (2):
> tcm_vhost:
On Mon, Mar 18, 2013 at 02:46:12PM -0700, Nicholas A. Bellinger wrote:
> On Tue, 2013-03-12 at 10:45 +0800, Asias He wrote:
> > Changes in v3:
> > - Separate the bug fix to another thread
> >
> > Changes in v2:
> > - Remove code duplication in tcm_vhost_{hotplug,hotunplug}
> > - Fix racing of vs_e
On Fri, Mar 15, 2013 at 8:29 AM, Xiao Guangrong
wrote:
> This patch tries to introduce a very simple and scale way to invalid all
> mmio sptes - it need not walk any shadow pages and hold mmu-lock
>
> KVM maintains a global mmio invalid generation-number which is stored in
> kvm->arch.mmio_invalid
On Mon, 2013-03-18 at 23:53 +0200, Michael S. Tsirkin wrote:
> On Mon, Mar 18, 2013 at 02:46:12PM -0700, Nicholas A. Bellinger wrote:
> > On Tue, 2013-03-12 at 10:45 +0800, Asias He wrote:
> > > Changes in v3:
> > > - Separate the bug fix to another thread
> > >
> > > Changes in v2:
> > > - Remove
On Fri, Mar 15, 2013 at 09:31:06PM +0800, Yang Zhang wrote:
> From: Yang Zhang
>
> The follwoing patches are adding the Posted Interrupt supporting to KVM:
> The first patch enables the feature 'acknowledge interrupt on vmexit'.Since
> it is required by Posted interrupt, we need to enable it firs
On Thu, Mar 14, 2013 at 05:13:46PM -0700, Kevin Hilman wrote:
> The new context tracking subsystem unconditionally includes kvm_host.h
> headers for the guest enter/exit macros. This causes a compile
> failure when KVM is not enabled.
>
> Fix by adding an IS_ENABLED(CONFIG_KVM) check to kvm_host
On Mon, Mar 18, 2013 at 03:19:30PM -0700, Nicholas A. Bellinger wrote:
> On Mon, 2013-03-18 at 23:53 +0200, Michael S. Tsirkin wrote:
> > On Mon, Mar 18, 2013 at 02:46:12PM -0700, Nicholas A. Bellinger wrote:
> > > On Tue, 2013-03-12 at 10:45 +0800, Asias He wrote:
> > > > Changes in v3:
> > > > -
This is on top of Paolo and Nick's work.
Current status:
Basically, tcm_vhost + seabios works now. We still have one more issue,
vhost_verify_ring_mappings fails. The hotplug also works with the latest
tcm_vhost.ko hotplug patch.
Asias He (1):
disable vhost_verify_ring_mappings check
Paolo Bon
From: Paolo Bonzini
Signed-off-by: Paolo Bonzini
---
hw/virtio-scsi.c | 199 +--
hw/virtio-scsi.h | 127
include/qemu/osdep.h | 4 ++
3 files changed, 180 insertions(+), 150 deletions(-)
diff --git a/hw/
From: Paolo Bonzini
The WWPN specified in configfs is passed to "-device vhost-scsi-pci".
The tgpt field of the SET_ENDPOINT ioctl is obsolete now, so it is not
available from the QEMU command-line. Instead, I hardcode it to zero.
Changes in V3:
- Drop ioeventfd vhost_scsi_properties (asias,
---
hw/vhost.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/hw/vhost.c b/hw/vhost.c
index 4d6aee3..0c52ec4 100644
--- a/hw/vhost.c
+++ b/hw/vhost.c
@@ -421,10 +421,12 @@ static void vhost_set_memory(MemoryListener *listener,
return;
}
+#if 0
if (dev->started) {
On Mon, Mar 18, 2013 at 02:26:14PM -0700, Nicholas A. Bellinger wrote:
> On Fri, 2013-03-15 at 09:45 +0800, Asias He wrote:
> > Asias He (2):
> > virtio-scsi: Set _DRIVER_OK flag before scsi target scanning
> > virtio-scsi: Pack struct virtio_scsi_{req_cmd,resp_cmd}
> >
> > src/virtio-scsi.c
On Wed, Mar 13, 2013 at 01:16:59PM +0800, Asias He wrote:
> On Tue, Mar 12, 2013 at 09:21:51AM +0100, Paolo Bonzini wrote:
> > Il 12/03/2013 02:31, Asias He ha scritto:
> > > On Mon, Mar 11, 2013 at 12:36:37PM +0100, Paolo Bonzini wrote:
> > >> Il 11/03/2013 06:09, Asias He ha scritto:
> > >>> This
On Mon, Mar 18, 2013 at 11:30:57AM +0200, Michael S. Tsirkin wrote:
> On Mon, Mar 18, 2013 at 05:14:33PM +0800, Asias He wrote:
> > On Mon, Mar 18, 2013 at 10:19:00AM +0200, Michael S. Tsirkin wrote:
> > > On Fri, Mar 15, 2013 at 09:14:07AM +0800, Asias He wrote:
> > > > Currently, vs->vs_endpoint
On 03/19/2013 04:46 AM, Marcelo Tosatti wrote:
> On Wed, Mar 13, 2013 at 12:59:12PM +0800, Xiao Guangrong wrote:
>> The current kvm_mmu_zap_all is really slow - it is holding mmu-lock to
>> walk and zap all shadow pages one by one, also it need to zap all guest
>> page's rmap and all shadow page's
On 03/19/2013 06:16 AM, Eric Northup wrote:
> On Fri, Mar 15, 2013 at 8:29 AM, Xiao Guangrong
> wrote:
>> This patch tries to introduce a very simple and scale way to invalid all
>> mmio sptes - it need not walk any shadow pages and hold mmu-lock
>>
>> KVM maintains a global mmio invalid generatio
On Tue, 2013-03-19 at 11:24 +0800, Gavin Shan wrote:
> On Mon, Mar 18, 2013 at 03:01:14PM -0600, Alex Williamson wrote:
> >On Sat, 2013-03-16 at 06:37 +0100, Benjamin Herrenschmidt wrote:
> >> On Sat, 2013-03-16 at 09:34 +0800, Gavin Shan wrote:
> >> > >Could you explain further how this will be us
On Mon, 2013-03-18 at 22:18 -0600, Alex Williamson wrote:
> > Yes, EEH firmware call needn't going through VFIO. However, EEH has
> > very close relationship with PCI and so VFIO-PCI does. Eventually, EEH
> > has close relationship with VFIO-PCI :-)
>
> Is there some plan to do more with EEH throu
On Mon, Mar 11, 2013 at 10:43:58AM +0800, Wanlong Gao wrote:
> From: Paolo Bonzini
>
> virtio_scsi_target_state is now empty, but we will find new uses
> for it in the next few patches. However, dropping the sglist lets
> us turn the array-of-pointers into a simple array, which simplifies
> the
On Mon, Mar 11, 2013 at 10:43:57AM +0800, Wanlong Gao wrote:
> This series implements virtio-scsi queue steering, which gives
> performance improvements of up to 50% (measured both with QEMU and
> tcm_vhost backends).
>
> This version rebased on Rusty's virtio ring rework patches.
> We hope this c
99 matches
Mail list logo