On Fri, 29 May 2009 01:45:27 pm john cooper wrote:
virtio_blk-serial-4.patch
Hate to ask dumb questions, but is there a scsi equivalent of this? It'd be
nice if we could avoid being ATA-specific in the long run...
Also, why u16?
Thanks,
Rusty.
+/* return ATA identify data
+ */
+static
Any comments on the patchset? Thanks.
Regards,
Weidong
Han, Weidong wrote:
Support source-id checking for interrupt remapping, and then
isolates interrupts for guests/VMs with assigned devices.
Eric raised pci rebalance issue with VT-d. Yes, it's an issue now.
Linux needs to handle pci
Michael S. Tsirkin wrote:
On Sun, May 31, 2009 at 11:30:48PM +0300, Avi Kivity wrote:
Michael S. Tsirkin wrote:
Version N of irqfd actually had the kernel create the fd, due to
concerns about eventfd's flexibility (thread wakeup vs function
call). As it turned out these concerns
Zhang, Xiantao wrote:
Avi Kivity wrote:
Jes Sorensen wrote:
Ok,
Trying once more. After spending a couple of hours trying to follow
the QEMU dma codeflow, I have convinced myself Avi is right and those
two functions don't need to do the flushing as they all end up
calling
pav wrote:
Hello,
I am looking for a simple way to get a bidirectional event notification
interface between qemu/kvm and host userspace processes. Just a kick,
messages/data not required.
What I basically need is a way to have an interested host process
informed by a custom qemu device
Lucas Meneghel Rodrigues wrote:
On Sun, 2009-05-24 at 17:48 +0300, Avi Kivity wrote:
Mike Burns wrote:
Signed-off-by: Mike Burns mbu...@redhat.com
---
client/tests/kvm_runtest_2/kvm_install.py |7 ++-
1 files changed, 6 insertions(+), 1 deletions(-)
diff --git
Mike Burns wrote:
Avi Kivity wrote:
Michael Goldish wrote:
Drawbacks:
- requires some initial work to be done by the user -- the user has
to define exactly where each test should run
For me, this is a major drawback. I'd really like a fire-and-forget
solution. If I have to
Also use enable/disable bit from ACPI MADT entries to track CPU hot
plug. This removes assumptions about APIC ids from AML code and simplify
cup hotplug handling.
Signed-off-by: Gleb Natapov g...@redhat.com
diff --git a/kvm/bios/acpi-dsdt.dsl b/kvm/bios/acpi-dsdt.dsl
index c756fed..69e1426
Michael S. Tsirkin wrote:
On Sun, May 31, 2009 at 11:30:48PM +0300, Avi Kivity wrote:
Michael S. Tsirkin wrote:
Version N of irqfd actually had the kernel create the fd, due to
concerns about eventfd's flexibility (thread wakeup vs function
call). As it turned out these
Gregory Haskins wrote:
A potential compromise is to investigate the POLLHUP technique that
Davide mentioned so that kvmfd can get notified of the closure without
needing an additional explicit ioctl to do it. Note that we already
have irqfd in the tree so I assume we would need to do this in a
Avi Kivity wrote:
Gregory Haskins wrote:
A potential compromise is to investigate the POLLHUP technique that
Davide mentioned so that kvmfd can get notified of the closure without
needing an additional explicit ioctl to do it. Note that we already
have irqfd in the tree so I assume we would
Avi Kivity wrote:
Gregory Haskins wrote:
This is closer to how the original series worked, but Avi asked for a
data-match token and thus the cookie was born. I think the rationale is
that we can't predict whether the same eventfd will be registered more
than once, and thus we need a way to
Currently the EPT code re-loads the PDPTRs after every exit, even though
they usually are not needed. Moreover, the PDPTRs are reloaded from memory,
even though they are supposed to be kept on processor registers independent
from memory. The NPT case is similar.
This patchset makes the PDPTRs
Instead of reloading the pdptrs on every entry and exit (vmcs writes on vmx,
guest memory access on svm) extract them on demand.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/include/asm/kvm_host.h |4
arch/x86/kvm/kvm_cache_regs.h | 10 ++
arch/x86/kvm/mmu.c
Instead of reading the PDPTRs from memory after every exit (which is slow
and wrong, as the PDPTRs are stored on the cpu), sync the PDPTRs from
memory to the VMCS before entry, and from the VMCS to memory after exit.
Do the same for cr3.
Signed-off-by: Avi Kivity a...@redhat.com
---
vmx_set_cr3() will call vmx_tlb_flush(), which will flush the ept context.
So there is no need to call ept_sync_context() explicitly.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/vmx.c |1 -
1 files changed, 0 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/vmx.c
On 05/31/2009 10:24 PM, Lucas Meneghel Rodrigues wrote:
The test was just commited. Stage 1 of the upstream merge complete.
Please let me know if you have any doubts. Happy hacking!
Please credit Dror Russo for his contribution (see below).
Dror has been contributing since kvm-autotest early
Avi Kivity wrote:
john cooper wrote:
Hit this yesterday when configure hung attempting
to pull the version from a kernel's .config.
Looks right, but missing a signoff.
Signed-off-by: john cooper john.coo...@redhat.com
diff --git a/configure b/configure
index 493c178..1fd133c 100755
Hello,
I have always created my guests by hand with qemu-kvm syntax.
Is there a way to control and manage KVM guests with libvirt without being
forced to create the guest with virtmanager or with virtsh ?
what if I post a guest from XEN to KVM, how to manage it with libvirt ?
thanks
Rick
--
john cooper wrote:
Avi Kivity wrote:
john cooper wrote:
Hit this yesterday when configure hung attempting
to pull the version from a kernel's .config.
Looks right, but missing a signoff.
Signed-off-by: john cooper john.coo...@redhat.com
diff --git a/configure
On Mon, Jun 1, 2009 at 9:41 AM, Riccardo Veraldi
riccardo.vera...@cnaf.infn.it wrote:
Hello,
I have always created my guests by hand with qemu-kvm syntax.
Is there a way to control and manage KVM guests with libvirt without being
forced to create the guest with virtmanager or with virtsh ?
On 05/10/2009 08:15 PM, sudhir kumar wrote:
Hi Uri,
Any comments?
-- Forwarded message --
From: sudhir kumarsmalik...@gmail.com
The kvm-autotest shows the following PASS results for migration,
while the VM was crashed and test should have failed.
Here is the sequence of test
On 05/12/2009 06:34 PM, Mike Burns wrote:
From: Michael Burnsmbu...@redhat.com
Signed-off-by: Michael Burnsmbu...@redhat.com
---
client/tests/kvm_runtest_2/control| 18 +-
client/tests/kvm_runtest_2/kvm_install.py | 15 +++
2 files changed, 32
Ok, patch applied. Thanks for pointing this out, Uri.
On Mon, 2009-06-01 at 12:41 -0300, Lucas Meneghel Rodrigues wrote:
When preparing the kvm test for inclusion on autotest, I did
forget to add the name of Dror Russo (dru...@redhat.com) as
one of the rightful authors of the test. This patch
On Mon, Jun 1, 2009 at 11:02 AM, Riccardo Veraldi
riccardo.vera...@cnaf.infn.it wrote:
thank you very much.
How do I know all the XML tag options ??
how to convert from comand line quemu options into XML tags ?
and here to put XML file ?
you'll have to play around a little with a test
* Avi Kivity a...@redhat.com [2009-04-28 05:53]:
Michael S. Tsirkin wrote:
Or maybe, add a s/CONFIG_KVM_TRACE/CONFIG_KMOD_KVM_TRACE/ to make the
two options independent.
You decide.
Well, I think it's less confusing.
I also wonder what happens if one tries to build on
a
(This is v3 of the series, applies to kvm.git/master:7ff90748)
This is in prep for some more substantial mmio/pio work for iosignalfd,
coming later.
[ Changelog:
v3:
*) Addressed feedback from Chris Wright w.r.t. patch 2/3
*) Rebased to kvm.git/master:7ff90748
]
---
Gregory
It would appear that we are invoking kfree() on the wrong pointer in the
destructor for the coalesced_mmio device. This could result in a potential
leak during shutdown. This works today because the kvm_io_device is
the first element of the private structure, but this could change in
the future,
We modernize the io_device code so that we use container_of() instead of
dev-private, and move the vtable to a separate ops structure
(theoretically allows better caching for multiple instances of the same
ops structure)
Signed-off-by: Gregory Haskins ghask...@novell.com
---
We currently publish the i8254 resources to the pio_bus before the devices
are fully initialized. Since we hold the pit_lock, its probably not
a real issue. But lets clean this up anyway.
Found-by: Avi Kivity a...@redhat.com
Signed-off-by: Gregory Haskins ghask...@novell.com
---
Ryan Harper wrote:
I also wonder what happens if one tries to build on
a machine with kvm built into kernel. Ideally one would get
a clear error message.
kvm-kmod is really designed for those running on pre-kvm distro kernels,
and for those testing newer kvm versions on distro kernels.
Javier Guerra wrote:
On Mon, Jun 1, 2009 at 11:02 AM, Riccardo Veraldi
riccardo.vera...@cnaf.infn.it wrote:
thank you very much.
How do I know all the XML tag options ??
how to convert from comand line quemu options into XML tags ?
and here to put XML file ?
you'll have to play
* Gregory Haskins (ghask...@novell.com) wrote:
It would appear that we are invoking kfree() on the wrong pointer in the
destructor for the coalesced_mmio device. This could result in a potential
leak during shutdown. This works today because the kvm_io_device is
the first element of the
* Gregory Haskins (ghask...@novell.com) wrote:
We modernize the io_device code so that we use container_of() instead of
dev-private, and move the vtable to a separate ops structure
(theoretically allows better caching for multiple instances of the same
ops structure)
Signed-off-by: Gregory
* Gregory Haskins (ghask...@novell.com) wrote:
We currently publish the i8254 resources to the pio_bus before the devices
are fully initialized. Since we hold the pit_lock, its probably not
a real issue. But lets clean this up anyway.
Found-by: Avi Kivity a...@redhat.com
Signed-off-by:
Avi Kivity wrote:
pav wrote:
I understand I could use a unix socket and qemu_chr_open() and
friends for this, but isn't a full-blown socket a bit of an overkill
for a simple kick interface?
Not at all. Send a byte to have the other side wake up.
FWIW: you could also use an eventfd
Gregory Haskins wrote:
Avi Kivity wrote:
pav wrote:
I understand I could use a unix socket and qemu_chr_open() and
friends for this, but isn't a full-blown socket a bit of an overkill
for a simple kick interface?
Not at all. Send a byte to have the other side wake up.
On 05/21/2009 03:29 AM, Mike Burns wrote:
See comment in control file for details of implementation
Signed-off-by: Mike Burnsmbu...@redhat.com
---
client/tests/kvm_runtest_2/control|6 ++
client/tests/kvm_runtest_2/kvm_install.py | 11 +--
2 files changed, 15
* Avi Kivity a...@redhat.com [2009-06-01 12:04]:
Ryan Harper wrote:
I also wonder what happens if one tries to build on
a machine with kvm built into kernel. Ideally one would get
a clear error message.
kvm-kmod is really designed for those running on pre-kvm distro kernels,
and
Ryan Harper wrote:
So:
LINUX= is for the kvm sources (further controlled by whatever branch
is checked out)
--kerneldir= is for the host kernel
Ah, excellent, I didn't see it documented on the Code page of the wiki
and I blindly assumed that it went away. Thanks for correction.
Ryan Harper wrote:
% cd kvm
% git checkout -f 2.6.29-stable origins/maint/2.6.29
% cd ../kvm-kmod.git
% ./configure
% make LINUX=../kvm sync
./sync -v kvm-devel -l ../kvm
Traceback (most recent call last):
File ./sync, line 207, in module
source_sync(arch)
File ./sync, line 200, in
Avi Kivity wrote:
Lucas Meneghel Rodrigues wrote:
On Sun, 2009-05-24 at 17:48 +0300, Avi Kivity wrote:
Mike Burns wrote:
Signed-off-by: Mike Burns mbu...@redhat.com
---
client/tests/kvm_runtest_2/kvm_install.py |7 ++-
1 files changed, 6 insertions(+), 1 deletions(-)
diff
Uri Lublin wrote:
On 05/12/2009 06:34 PM, Mike Burns wrote:
From: Michael Burnsmbu...@redhat.com
Signed-off-by: Michael Burnsmbu...@redhat.com
---
client/tests/kvm_runtest_2/control| 18 +-
client/tests/kvm_runtest_2/kvm_install.py | 15 +++
2
On Mon, 2009-06-01 at 11:06 -0700, Nitin A Kamble wrote:
On Sun, 2009-05-31 at 01:39 -0700, Avi Kivity wrote:
Instead of changing all the checks like this, you can make rmode.active
be false when unrestricted guest is enabled. We can interpret
rmode.active as emulating real mode via
Nitin A Kamble wrote:
Avi,
How about renaming rmode.active to rmode.vm86_active ?
Sure. But if you do that, then do it in a separate patch please.
--
Do not meddle in the internals of kernels, for they are subtle and quick to
panic.
--
To unsubscribe from this list: send the line
* Avi Kivity a...@redhat.com [2009-06-01 13:20]:
Ryan Harper wrote:
% cd kvm
% git checkout -f 2.6.29-stable origins/maint/2.6.29
% cd ../kvm-kmod.git
% ./configure
% make LINUX=../kvm sync
./sync -v kvm-devel -l ../kvm
Traceback (most recent call last):
File ./sync, line 207, in module
Uri Lublin wrote:
Hi Mike,
Can you load those kernel modules before running kvm-autotest (something
like a setup script) ? And clean up when the run completes (cleanup
script) ?
This can problay be done with the pre_command and post_command
parameters that I added in my previous patch.
Import of modules present inside the kvm test is broken due to
a path that wasn't converted when the test got renamed from
kvm_runtest_2 to kvm. Fixing the problem.
Signed-off-by: Lucas Meneghel Rodrigues l...@redhat.com
---
client/tests/kvm/control |4 ++--
1 files changed, 2 insertions(+),
On Fri, May 29, 2009 at 02:13:46PM +0530, Jaswinder Singh Rajput wrote:
On Fri, 2009-05-29 at 09:48 +0200, Christian Bornträger wrote:
Am Freitag 29 Mai 2009 09:18:14 schrieb Jaswinder Singh Rajput:
Adding localversion avoids confusion in kernel images :
like Linux version 2.6.30-rc7
Ryan Harper wrote:
though it would be nice to have something to indicate the
version we synced, right now all modules that are built this way, dmesg
reports:
loaded kvm module (kvm-devel
I committed something to use 'git describe' when appropriate.
--
I have a truly marvellous patch that
Steven Rostedt wrote:
This patch is only for KVM tree and not for linus tree.
Lets assume 100 developers are working on kvm tree and they use kvm tree
on 2 PCs. So count becomes 200.
Like in my case I have dozen of kernel trees so I keep on swapping
config between kernels. And I also need to
On Mon, 1 Jun 2009, Avi Kivity wrote:
localversion would show up in linux-next, not sure if that's a problem. On
the other hand, I'm not sure what it's worth.
If a localversion file with -kvm showed up in linux-next, I would
consider that a problem.
-- Steve
--
To unsubscribe from this
Marcelo Tosatti wrote:
On Sun, May 31, 2009 at 03:14:36PM +0300, Avi Kivity wrote:
Marcelo Tosatti wrote:
Move coalesced_mmio locking to its own device, instead of relying on
kvm-lock.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: kvm-irqlock/virt/kvm/coalesced_mmio.c
* Christoph Hellwig h...@infradead.org wrote:
+ if (n NR_REGPARMS) {
+ switch (n) {
+ case 0: return regs-ax;
+ case 1: return regs-dx;
+ case 2: return regs-cx;
+ }
Normal kernel style would be
switch (n) {
Add x86 instruction decoder to arch-specific libraries. This decoder
can decode x86 instructions used in kernel into prefix, opcode, modrm,
sib, displacement and immediates. This can also show the length of
instructions.
This version introduces instruction attributes for decoding instructions.
Hi,
Here are the patches of kprobe-based event tracer for x86, version 9,
which allows you to probe various kernel events through ftrace interface.
The tracer supports per-probe filtering which allows you to set filters
on each probe and shows formats of each probe. I think this is more
generic
Add dynamic ftrace_event_call support to ftrace. Trace engines can adds new
ftrace_event_call to ftrace on the fly. Each operator functions of the call
takes a ftrace_event_call data structure as an argument, because these
functions may be shared among several ftrace_event_calls.
Changes from v8:
Cleanup fix_riprel() in arch/x86/kernel/kprobes.c by using x86 instruction
decoder.
Signed-off-by: Masami Hiramatsu mhira...@redhat.com
Cc: Ananth N Mavinakayanahalli ana...@in.ibm.com
Cc: Jim Keniston jkeni...@us.ibm.com
Cc: Ingo Molnar mi...@elte.hu
---
arch/x86/kernel/kprobes.c | 128
Add a user-space selftest of x86 instruction decoder at kernel build time.
When CONFIG_X86_DECODER_SELFTEST=y, Kbuild builds a test harness of x86
instruction decoder and performs it after building vmlinux.
The test compares the results of objdump and x86 instruction decoder
code and check there
Add following APIs for accessing registers and stack entries from pt_regs.
- regs_query_register_offset(const char *name)
Query the offset of name register.
- regs_query_register_name(unsigned offset)
Query the name of register by its offset.
- regs_get_register(struct pt_regs *regs,
Add kprobes-based event tracer on ftrace.
This tracer is similar to the events tracer which is based on Tracepoint
infrastructure. Instead of Tracepoint, this tracer is based on kprobes(kprobe
and kretprobe). It probes anywhere where kprobes can probe(this means, all
functions body except for
Ensure safeness of inserting kprobes by checking whether the specified
address is at the first byte of a instruction on x86.
This is done by decoding probed function from its head to the probe point.
Signed-off-by: Masami Hiramatsu mhira...@redhat.com
Cc: Ananth N Mavinakayanahalli
Fixes a couple of warnings like this one:
WARNING: arch/powerpc/kvm/kvm-440.o(.text+0x1e8c): Section mismatch in
reference from the function kvmppc_44x_exit() to the function
.exit.text:kvmppc_booke_exit()
The function kvmppc_44x_exit() references a function in an exit section.
Often the
Bugs item #2789729, was opened at 2009-05-10 08:09
Message generated for change (Comment added) made by jiajun
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2789729group_id=180599
Please note that this message will contain a full copy of the comment
There's nothing kvm specific in get_cpu function. Remove it from
kvm ifdef. Buy us a cleaner code, and may help us with any attempt
of integrating this on the future.
Signed-off-by: Glauber Costa glom...@redhat.com
---
hw/acpi.c | 12 +++-
1 files changed, 3 insertions(+), 9
There's nothing kvm specific in get_cpu function. Remove it from
kvm ifdef. Buy us a cleaner code, and may help us with any attempt
of integrating this on the future.
Signed-off-by: Glauber Costa glom...@redhat.com
---
hw/acpi.c | 12 +++-
1 files changed, 3 insertions(+), 9
Fixes a couple of warnings like this one:
WARNING: arch/powerpc/kvm/kvm-440.o(.text+0x1e8c): Section mismatch in
reference from the function kvmppc_44x_exit() to the function
.exit.text:kvmppc_booke_exit()
The function kvmppc_44x_exit() references a function in an exit section.
Often the
67 matches
Mail list logo