Am 08.10.2014 16:55, schrieb Alexander Graf:
>
>
> On 08.10.14 16:09, Jason Herne wrote:
>> Christian Borntraeger wrote on 09/22/2014
>> 05:08:34 AM:
>> ...
>>> Actually, I would expect something different (more or less something
>>> like standby/resume).
>>>
>>> In fact Jasons code that we have
A recent bug fix to the MSIx handling in vfio added references
to functions that may not be defined if MSI is disabled in the kernel,
resulting in this link error:
drivers/built-in.o: In function `vfio_msi_set_vector_signal':
:(.text+0x450808): undefined reference to `get_cached_msi_msg'
:(.text+0
Il 09/10/2014 06:14, Nicholas A. Bellinger ha scritto:
> AFAICT from qemu code, the ioctl VHOST_SCSI_CLEAR_ENDPOINT is always
> called during shutdown in order to release the endpoint and drop this
> new configfs dependency.
As far as I can see, the only path leading to the ioctl is
vhost_scsi_set
WARNING: CPU: 1 PID: 10358 at
/root/cathy/kvm/arch/x86/kvm/../../../virt/kvm/kvm_main.c:3289
kvm_init+0x234/0x282 [kvm]()
Modules linked in: kvm_intel(O+) kvm(O) nfsv3 nfs_acl auth_rpcgss oid_registry
nfsv4 dns_resolver nfs fscache lockd sunrpc pci_stub bridge stp llc autofs4
8021q cpufreq_onde
On Wed, Oct 01, 2014 at 10:56:34AM +0200, Andrea Arcangeli wrote:
> From: Andres Lagar-Cavilla
This needs a changelog
> Reviewed-by: Radim Krčmář
> Signed-off-by: Andres Lagar-Cavilla
> Signed-off-by: Andrea Arcangeli
> ---
> include/linux/mm.h | 1 +
> mm/gup.c | 4
> 2 f
Il 09/10/2014 12:30, Wanpeng Li ha scritto:
> WARNING: CPU: 1 PID: 10358 at
> /root/cathy/kvm/arch/x86/kvm/../../../virt/kvm/kvm_main.c:3289
> kvm_init+0x234/0x282 [kvm]()
> Modules linked in: kvm_intel(O+) kvm(O) nfsv3 nfs_acl auth_rpcgss
> oid_registry nfsv4 dns_resolver nfs fscache lockd sunr
On Wed, Oct 01, 2014 at 10:56:35AM +0200, Andrea Arcangeli wrote:
> +static inline long __get_user_pages_locked(struct task_struct *tsk,
> +struct mm_struct *mm,
> +unsigned long start,
> +
Il 09/10/2014 10:49, Paolo Bonzini ha scritto:
>
> It does not happen if you close QEMU with SIGTERM, ctrl-c, or with the
> "quit" command, because no attempt is done to bring down the VM data
> structures (or free memory, or close file descriptors) in case of a
> fatal exit. The kernel should do
On Wed, Oct 01, 2014 at 10:56:35AM +0200, Andrea Arcangeli wrote:
> +static inline long __get_user_pages_locked(struct task_struct *tsk,
> +struct mm_struct *mm,
> +unsigned long start,
> +
On Wed, Oct 01, 2014 at 10:56:36AM +0200, Andrea Arcangeli wrote:
> Just an optimization.
Does it make sense to split the thing in two? One where you apply
_unlocked and then one where you apply _fast?
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to ma
On Wed, Oct 08, 2014 at 10:47:04AM +0100, Catalin Marinas wrote:
> On Tue, Oct 07, 2014 at 08:39:54PM +0100, Christoffer Dall wrote:
> > I came up with the following based on your feedback, but I personally
> > don't find it a lot easier to read than what I had already. Suggestions
> > are welcome
Just do not pass it, which is roughly the same behavior that KVM had
until 3.17. Passing a non-existing flag could have unanticipated
effects.
Signed-off-by: Paolo Bonzini
---
external-module-compat-comm.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/external-module-compa
Patches are relative to next branch of kvm-kmod.git.
Paolo
Paolo Bonzini (3):
FOLL_TRIED is not available before 3.18
the MMU notifier clear_flush_young callback changed in 3.18
redefine is_zero_pfn to not rely on zero_pfn
external-module-compat-comm.h | 5 -
sync
Passing end=start+1 is the easiest way to call the new callback from
the old API. That is how kvm_handle_hva is implemented on top of
kvm_handle_hva_range. So, now that kvm_age_hva calls kvm_handle_hva_range
instead of kvm_handle_hva, you can apply the same trick to the caller
of kvm_age_hva.
Si
zero_pfn is not exported before 3.17.
Signed-off-by: Paolo Bonzini
---
external-module-compat-comm.h | 3 +++
1 file changed, 3 insertions(+)
diff --git a/external-module-compat-comm.h b/external-module-compat-comm.h
index dff603f..c20b1ed 100644
--- a/external-module-compat-comm.h
+++ b/extern
On Thu, Oct 09, 2014 at 12:01:37PM +0100, Christoffer Dall wrote:
> On Wed, Oct 08, 2014 at 10:47:04AM +0100, Catalin Marinas wrote:
> > On Tue, Oct 07, 2014 at 08:39:54PM +0100, Christoffer Dall wrote:
> > > +static inline int kvm_prealloc_hwpgd(struct kvm *kvm, pgd_t *pgd)
> > > +{
> > > +
On Oct 8, 2014, at 1:06 PM, Radim Krčmář wrote:
>
> And it would get one from the currently pending timer.
>
> What about the following patch?
> (The introduced else branch could use some abstractions.)
>
> --8<---
> KVM: x86: fix deadline tsc interrupt injection
>
> The check in kvm_set_lap
When read access is performed using a readable code segment, the "conforming"
and "non-conforming" checks should not be done. As a result, read using
non-conforming readable code segment fails.
This is according to Intel SDM 5.6.1 ("Accessing Data in Code Segments").
One exception is the case of
This patch series adds support for ARMv8 dirty page logging. It applies on top
of ARMv7 patch series. Similar ARMv8 to dirty page log read is moved to generic
layer and tlb flush has architecture specific flush.
Testing:
- ARMv8 - Tested on Foundation Model.
- ARMv7 - retested on Exynos 5
This patch introduces header updates for ARMv8 dirty page logging.
Signed-off-by: Mario Smarduch
---
arch/arm64/include/asm/kvm_asm.h | 1 +
arch/arm64/include/asm/kvm_host.h | 1 +
arch/arm64/include/asm/kvm_mmu.h | 20
arch/arm64/include/asm/pgtable-hwde
This patch enables ARMv8 dirty page logging and unifies ARMv7/ARMv8 code.
Signed-off-by: Mario Smarduch
---
arch/arm/include/asm/kvm_host.h | 12
arch/arm/kvm/arm.c | 9 -
arch/arm/kvm/mmu.c | 17 +++--
arch/arm64/kvm/Kconfig |
This patch adds HYP VM TLB FLush function.
Signed-off-by: Mario Smarduch
---
arch/arm64/kvm/hyp.S | 22 ++
1 file changed, 22 insertions(+)
diff --git a/arch/arm64/kvm/hyp.S b/arch/arm64/kvm/hyp.S
index b0d1512..117a91c 100644
--- a/arch/arm64/kvm/hyp.S
+++ b/arch/arm64/kvm/
22 matches
Mail list logo