>>On Wednesday 10 February 2010, Xin Xiaohui wrote:
> >The idea is simple, just to pin the guest VM user space and then
> >let host NIC driver has the chance to directly DMA to it.
> >The patches are based on vhost-net backend driver. We add a device
> >which provides proto_ops as sendmsg/recvmsg
On Thu, Feb 11, 2010 at 12:51:33AM +0100, Matteo Ghezzi wrote:
> Hi,
> i got a new Xeon E5520 (4 cores, 8 threads), and I'm testing some
> Windows guests.
> My configuration is as follows:
> - Arch Linux
> - Kernel 2.6.32.7
> - Qemu-Kvm 0.12.2
>
> 1st test: identify the correct line for smp in my
As our configuration system generates a list of dicts
with test parameters, and that list might be potentially
*very* large, keeping all this information in memory might
be a problem for smaller virtualization hosts due to
the memory pressure created. Tests made on my 4GB laptop
show that most of t
Eric,
Thanks. I will look into that. But don't stop there.
Please comments more. :-)
Thanks
Xiaohui
-Original Message-
From: Eric Dumazet [mailto:eric.duma...@gmail.com]
Sent: Wednesday, February 10, 2010 11:18 PM
To: Xin, Xiaohui
Cc: net...@vger.kernel.org; kvm@vger.kernel.org; linux-k
Just remove redundant semicolon.
Signed-off-by: Wei Yongjun
---
arch/x86/kvm/emulate.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index 31f4526..8a52616 100644
--- a/arch/x86/kvm/emulate.c
+++ b/arch/x86/kvm/emulate.c
Hi,
i got a new Xeon E5520 (4 cores, 8 threads), and I'm testing some
Windows guests.
My configuration is as follows:
- Arch Linux
- Kernel 2.6.32.7
- Qemu-Kvm 0.12.2
1st test: identify the correct line for smp in my case, I tried with:
-smp 8,cores=4,threads=8 in this way only Windows 2003 Server
On Wed, Feb 10, 2010 at 02:48:41PM +0530, Puja Gupta wrote:
> Hello friends,
>I have downloaded package qemu-kvm_0.11.0-0ubuntu6_i386.deb
> and when i double click it,it tells 'Error: Dependency is not
> satisfiable: bridge-utils'.i tried by downloading the package again
> but still pro
Signed-off-by: Paolo Bonzini
---
osdep.c | 32
qemu-common.h |1 +
vl.c |9 +
3 files changed, 38 insertions(+), 4 deletions(-)
diff --git a/osdep.c b/osdep.c
index 9059f01..9e4b17b 100644
--- a/osdep.c
+++ b/osdep.c
@@ -37,6 +37,
On Wed, 10 Feb 2010 11:30:39 pm Michael S. Tsirkin wrote:
> Add documentation for indirect descriptors
Thanks, that's awesome!
I added an entry to the Reserved Feature table in appendix B, and applied
it. We're now at 0.8.5.
Cheers,
Rusty.
--
To unsubscribe from this list: send the line "unsubs
Again, no need to loop if less than a full buffer is read, the next
read would return EAGAIN.
Signed-off-by: Paolo Bonzini
---
qemu-kvm.c | 16 +---
1 files changed, 5 insertions(+), 11 deletions(-)
diff --git a/qemu-kvm.c b/qemu-kvm.c
index 669a784..50e1303 100644
--- a/qemu-kvm.
Upstream has no compatfd.[ch], so move the code to the most similar
place.
Signed-off-by: Paolo Bonzini
---
compatfd.c| 26 --
compatfd.h|2 --
osdep.c | 32
qemu-common.h |1 +
4 files changed, 33 insertions(+),
Cherry-picked from upstream f582af5.
Signed-off-by: Paolo Bonzini
---
osdep.c |7 ---
1 files changed, 4 insertions(+), 3 deletions(-)
diff --git a/osdep.c b/osdep.c
index e613e4b..616e821 100644
--- a/osdep.c
+++ b/osdep.c
@@ -28,14 +28,15 @@
#include
#include
#include
+
+/* Need
No need to loop if < 8 bytes are written, since that will happen only
for pipes and is harmless. eventfd writes of 8 bytes will always succeed
or fail with EAGAIN.
Signed-off-by: Paolo Bonzini
---
qemu-kvm.c | 34 --
1 files changed, 12 insertions(+), 22 deleti
This patch series morphs the code in qemu-kvm's eventfd so that it looks
like the code in upstream qemu. Patch 4 is not yet in upstream QEMU,
I'm submitting it first to qemu-kvm to avoid conflicts.
Paolo Bonzini (4):
morph qemu_kvm_notify_work into qemu.git's qemu_event_increment
morph io_thr
Bugs item #2941537, was opened at 2010-01-28 04:57
Message generated for change (Comment added) made by iggy_cav
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=2941537&group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #2907597, was opened at 2009-12-02 10:57
Message generated for change (Comment added) made by iggy_cav
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=2907597&group_id=180599
Please note that this message will contain a full copy of the comment
On 02/01/2010 01:02 PM, john cooper wrote:
[target-x86_64.conf was unintentionally omitted from the earlier patch]
This is a reimplementation of prior versions which adds
the ability to define cpu models for contemporary processors.
The added models are likewise selected via -cpu,
and are intend
On Wed, 2010-02-10 at 11:54 -0600, Ryan Harper wrote:
> * Lucas Meneghel Rodrigues [2010-02-10 11:14]:
> > On Wed, 2010-02-10 at 21:53 +0530, yogi wrote:
> > > Hello everyone,
> > >
> > > I like to submit a set of patches to enable installing multiple guests
> > > in parallel.
> >
> > Hi Yogi, g
On 02/08/2010 10:10 AM, Tom Lendacky wrote:
Fix a race condition where qemu finds that there are not enough virtio
ring buffers available and the guest make more buffers available before
qemu can enable notifications.
Signed-off-by: Tom Lendacky
Signed-off-by: Anthony Liguori
Applied. Tha
On 02/03/2010 10:00 AM, David S. Ahern wrote:
This fixes a segfault due to buffer overrun in the usb-serial device.
The memcpy was incrementing the start location by recv_used yet, the
computation of first_size (how much to write at the end of the buffer
before wrapping to the front) was not acco
On 02/03/2010 09:49 AM, David S. Ahern wrote:
I have streaming audio devices working within qemu-kvm. This is a port
of the changes to qemu.
Streaming audio generates a series of isochronous requests that are
repetitive and time sensitive. The URBs need to be submitted in
consecutive USB frames
On 02/03/2010 10:18 AM, David S. Ahern wrote:
Add a tty close callback. Right now if a guest device that is connected
to a tty-based chardev in the host is removed, the tty is not closed.
With this patch it is closed.
Example use case is connecting an emulated USB serial cable in the guest
to tt
On 01/28/2010 08:15 PM, Sheng Yang wrote:
Commit 03cbdac7 "Disable fall-back to read-only when cannot open drive's
file for read-write" result in read-only image can't be used as backed
image in qemu-img.
Cc: Naphtali Sprei
Signed-off-by: Sheng Yang
Applied. Thanks.
Regards,
Anthony Lig
On Wed, 2010-02-10 at 15:13 -0200, Lucas Meneghel Rodrigues wrote:
> On Wed, 2010-02-10 at 21:53 +0530, yogi wrote:
> > Hello everyone,
> >
> > I like to submit a set of patches to enable installing multiple guests
> > in parallel.
>
> Hi Yogi, great to receive your patches!
>
> > To install mul
* Lucas Meneghel Rodrigues [2010-02-10 11:14]:
> On Wed, 2010-02-10 at 21:53 +0530, yogi wrote:
> > Hello everyone,
> >
> > I like to submit a set of patches to enable installing multiple guests
> > in parallel.
>
> Hi Yogi, great to receive your patches!
>
> > To install multiple guests in par
On Wed, 2010-02-10 at 15:22 -0200, Lucas Meneghel Rodrigues wrote:
> On Wed, 2010-02-10 at 21:59 +0530, yogi wrote:
> > >From 0aa8ed40de86eb8ad5b324177b2e0986e1c32c77 Mon Sep 17 00:00:00 2001
> > From: yogananth subramanian
> > Date: Wed, 10 Feb 2010 09:45:58 -0500
> > Subject: [PATCH 3/5] kvm tes
They have no place in common code.
Signed-off-by: Avi Kivity
---
arch/x86/include/asm/kvm_host.h | 13 -
arch/x86/kvm/vmx.c | 13 +
2 files changed, 13 insertions(+), 13 deletions(-)
diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm
ept_update_paging_mode_cr4() accesses vcpu->arch.cr4 directly, which usually
needs to be accessed via kvm_read_cr4(). In this case, we can't, since cr4
is in the process of being updated. Instead of adding inane comments, fold
the function into its caller (vmx_set_cr4), so it can use the not-yet-
From: Sheng Yang
Sometime, we need to adjust some state in order to reflect guest CPUID
setting, e.g. if we don't expose rdtscp to guest, we won't want to enable
it on hardware. cpuid_update() is introduced for this purpose.
Also export kvm_find_cpuid_entry() for later use.
Signed-off-by: Sheng
We make no use of cr4.pge if ept is enabled, but the guest does (to flush
global mappings, as with vmap()), so give the guest ownership of this bit.
Signed-off-by: Avi Kivity
---
arch/x86/kvm/vmx.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arc
Signed-off-by: Avi Kivity
---
virt/kvm/coalesced_mmio.h |5 +
1 files changed, 5 insertions(+), 0 deletions(-)
diff --git a/virt/kvm/coalesced_mmio.h b/virt/kvm/coalesced_mmio.h
index 4b49f27..e703346 100644
--- a/virt/kvm/coalesced_mmio.h
+++ b/virt/kvm/coalesced_mmio.h
@@ -1,3 +1,6 @@
From: Joerg Roedel
The tsc_offset adjustment in svm_vcpu_load is executed
unconditionally even if Linux considers the host tsc as
stable. This causes a Linux guest detecting an unstable tsc
in any case.
This patch removes the tsc_offset adjustment if the host tsc
is stable. The guest will now get
Some bits of cr4 can be owned by the guest on vmx, so when we read them,
we copy them to the vcpu structure. In preparation for making the set of
guest-owned bits dynamic, use helpers to access these bits so we don't need
to know where the bit resides.
No changes to svm since all bits are host-ow
From: Sheng Yang
It's no longer necessary.
Signed-off-by: Sheng Yang
Signed-off-by: Avi Kivity
---
arch/x86/kvm/vmx.c |2 --
1 files changed, 0 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 694baed..f8f2fdc 100644
--- a/arch/x86/kvm/vmx.c
+++ b/
From: Sheng Yang
shared_msr_global saved host value of relevant MSRs, but it have an
assumption that all MSRs it tracked shared the value across the different
CPUs. It's not true with some MSRs, e.g. MSR_TSC_AUX.
Extend it to per CPU to provide the support of MSR_TSC_AUX, and more
alike MSRs.
N
s390 doesn't have mmio, this will simplify ifdefing it out.
Signed-off-by: Avi Kivity
---
arch/ia64/kvm/Kconfig|1 +
arch/powerpc/kvm/Kconfig |1 +
arch/x86/kvm/Kconfig |1 +
virt/kvm/Kconfig |3 +++
4 files changed, 6 insertions(+), 0 deletions(-)
diff --git a/a
From: Sheng Yang
Before enabling, execution of "rdtscp" in guest would result in #UD.
Signed-off-by: Sheng Yang
Signed-off-by: Avi Kivity
---
arch/x86/include/asm/kvm_host.h |1 +
arch/x86/include/asm/vmx.h |1 +
arch/x86/kvm/svm.c |7
arch/x86/kvm/vmx.c
They aren't related.
Signed-off-by: Avi Kivity
---
virt/kvm/kvm_main.c | 18 +++---
1 files changed, 7 insertions(+), 11 deletions(-)
diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
index a944be3..92f5c98 100644
--- a/virt/kvm/kvm_main.c
+++ b/virt/kvm/kvm_main.c
@@ -374,17
From: Alexander Graf
We're using a switch table to find the irqprio that belongs to a specific
interrupt vector. This table is part of the interrupt inject logic.
Since we'll add a new function to stop interrupts, let's move this table
out of the injection logic into a separate function.
Signed
From: Alexander Graf
Because we now emulate the DEC interrupt according to real life behavior,
there's no need to keep the AGGRESSIVE_DEC hack around.
Let's just remove it.
Signed-off-by: Alexander Graf
Acked-by: Acked-by: Hollis Blanchard
Signed-off-by: Avi Kivity
---
arch/powerpc/kvm/book
From: Wu Fengguang
Signed-off-by: Wu Fengguang
Signed-off-by: Marcelo Tosatti
---
Documentation/kvm/api.txt | 12 ++--
1 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/Documentation/kvm/api.txt b/Documentation/kvm/api.txt
index 2811e45..c6416a3 100644
--- a/Documentatio
From: Marcelo Tosatti
Signed-off-by: Marcelo Tosatti
---
arch/x86/kvm/x86.c | 49 +
1 files changed, 41 insertions(+), 8 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 6a795be..2d7c040 100644
--- a/arch/x86/kvm/x86.c
++
- add destructor function
- move related allocation into constructor
- add stubs for !CONFIG_KVM_MMIO
Signed-off-by: Avi Kivity
---
virt/kvm/coalesced_mmio.c | 25 +++--
virt/kvm/coalesced_mmio.h | 10 ++
virt/kvm/kvm_main.c |7 +--
3 files changed,
Signed-off-by: Avi Kivity
---
virt/kvm/kvm_main.c | 20 +++-
1 files changed, 15 insertions(+), 5 deletions(-)
diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
index 92f5c98..c10d117 100644
--- a/virt/kvm/kvm_main.c
+++ b/virt/kvm/kvm_main.c
@@ -341,6 +341,20 @@ static co
From: Marcelo Tosatti
Have a pointer to an allocated region inside x86's kvm_arch.
Signed-off-by: Marcelo Tosatti
---
arch/x86/include/asm/kvm_host.h |8 ++--
arch/x86/kvm/x86.c | 21 -
2 files changed, 22 insertions(+), 7 deletions(-)
diff --git a/a
With slots_lock converted to rcu, the entire kvm hotpath on modern processors
(with npt or ept) now scales beautifully. Increase the maximum vcpu count to
64 to reflect this.
Signed-off-by: Avi Kivity
Signed-off-by: Marcelo Tosatti
---
arch/x86/include/asm/kvm_host.h |2 +-
1 files changed
From: Alexander Graf
Progress on KVM for Embedded PowerPC has stalled, but for Book3S there's quite
a lot of work to do and going on.
So in agreement with Hollis and Avi, we should switch maintainers for PowerPC.
Signed-off-by: Alexander Graf
Acked-by: Hollis Blanchard
Signed-off-by: Avi Kivi
From: Marcelo Tosatti
Which takes a memslot pointer instead of using kvm->memslots.
To be used by SRCU convertion later.
Signed-off-by: Marcelo Tosatti
---
include/linux/kvm_host.h |2 ++
virt/kvm/kvm_main.c | 33 +
2 files changed, 27 insertions(+),
From: Marcelo Tosatti
Use two steps for memslot deletion: mark the slot invalid (which stops
instantiation of new shadow pages for that slot, but allows destruction),
then instantiate the new empty slot.
Also simplifies kvm_handle_hva locking.
Signed-off-by: Marcelo Tosatti
---
arch/ia64/kvm/
When the guest acknowledges an interrupt, it sends an EOI message to the local
apic, which broadcasts it to the ioapic. To handle the EOI, we need to take
the ioapic mutex.
On large guests, this causes a lot of contention on this mutex. Since large
guests usually don't route interrupts via the i
From: Marcelo Tosatti
Required for SRCU convertion later.
Signed-off-by: Marcelo Tosatti
---
arch/ia64/kvm/kvm-ia64.c | 16 ++---
arch/powerpc/kvm/powerpc.c | 18 ---
arch/s390/kvm/kvm-s390.c | 25 +---
arch/x86/kvm/x86.c | 51 +++
Some exit reasons missed their strings; fill out the table.
Signed-off-by: Avi Kivity
Signed-off-by: Marcelo Tosatti
---
arch/x86/kvm/vmx.c | 58 +++-
1 files changed, 39 insertions(+), 19 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86
From: Alexander Graf
We treated the DEC interrupt like an edge based one. This is not true for
Book3s. The DEC keeps firing until mtdec is issued again and thus clears
the interrupt line.
So let's implement this logic in KVM too. This patch moves the line clearing
from the firing of the interrup
From: Marcelo Tosatti
Have a pointer to an allocated region inside struct kvm.
[alex: fix ppc book 3s]
Signed-off-by: Alexander Graf
Signed-off-by: Marcelo Tosatti
---
arch/ia64/kvm/kvm-ia64.c | 10 ++
arch/powerpc/kvm/book3s.c |2 +-
arch/x86/kvm/mmu.c| 11 ++---
From: Alexander Graf
When we're loading bolted entries into the SLB again, we're checking if an
entry is in use and only slbmte it when it is.
Unfortunately, the check always goes to the skip label of the first entry,
resulting in an endless loop when it actually gets triggered.
Signed-off-by:
From: Marcelo Tosatti
Signed-off-by: Marcelo Tosatti
---
arch/ia64/kvm/kvm-ia64.c |4 ++--
arch/powerpc/kvm/book3s.c |4 ++--
arch/x86/kvm/i8254.c |2 +-
arch/x86/kvm/i8259.c |4 ++--
arch/x86/kvm/vmx.c|8
arch/x86/kvm/x86.c| 16
From: Marcelo Tosatti
Signed-off-by: Marcelo Tosatti
---
arch/ia64/kvm/kvm-ia64.c |4 +-
arch/x86/kvm/i8254.c |6 +-
arch/x86/kvm/i8259.c |4 +-
arch/x86/kvm/x86.c| 13 +++---
include/linux/kvm_host.h | 27 ++--
virt/kvm/coalesced_mmio.c |4 +-
vi
From: Marcelo Tosatti
Signed-off-by: Marcelo Tosatti
---
arch/ia64/kvm/kvm-ia64.c | 15 ++-
arch/s390/kvm/kvm-s390.h | 10 +++---
arch/x86/kvm/mmu.c |7 +++
arch/x86/kvm/vmx.c |6 +++---
arch/x86/kvm/x86.c | 43
From: Marcelo Tosatti
So its possible to iommu map a memslot before making it visible to
kvm.
Signed-off-by: Marcelo Tosatti
---
include/linux/kvm_host.h |3 +--
virt/kvm/iommu.c | 13 ++---
virt/kvm/kvm_main.c |2 +-
3 files changed, 8 insertions(+), 10 deletion
From: Marcelo Tosatti
Using a similar two-step procedure as for memslots.
Signed-off-by: Marcelo Tosatti
---
arch/x86/include/asm/kvm_host.h |4 ++
arch/x86/kvm/x86.c | 60 +--
include/linux/kvm_host.h|6
virt/kvm/kvm_main
From: Sheng Yang
KVM need vsyscall_init() to initialize MSR_TSC_AUX before it read the value.
Per Avi's suggestion, this patch raised vsyscall priority on hotplug notifier
chain, to 30.
CC: Ingo Molnar
CC: linux-ker...@vger.kernel.org
Signed-off-by: Sheng Yang
Signed-off-by: Avi Kivity
---
a
From: Marcelo Tosatti
Windows 2003 uses task switch to triple fault and reboot (the other
exception being reserved pdptrs bits).
Signed-off-by: Marcelo Tosatti
---
arch/x86/kvm/x86.c | 11 +++
1 files changed, 11 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x
This is the first of four batches of patches for the 2.6.34 merge window. KVM
changes for this cycle include:
- rdtscp support
- powerpc server-class updates
- much improved large-guest scaling (now up to 64 vcpus)
- improved guest fpu handling
- initial Hyper-V emulation
- better swapping
From: Sheng Yang
We don't support these instructions, but guest can execute them even if the
feature('monitor') haven't been exposed in CPUID. So we would trap and inject
a #UD if guest try this way.
Cc: sta...@kernel.org
Signed-off-by: Sheng Yang
Signed-off-by: Avi Kivity
---
arch/x86/includ
Instead of specifying the bits which we want to trap on, specify the bits
which we allow the guest to change transparently. This is safer wrt future
changes to cr4.
Signed-off-by: Avi Kivity
---
arch/x86/kvm/vmx.c | 10 ++
1 files changed, 6 insertions(+), 4 deletions(-)
diff --git a
From: Eddie Dong
Move Double-Fault generation logic out of page fault
exception generating function to cover more generic case.
Signed-off-by: Eddie Dong
Signed-off-by: Gleb Natapov
Signed-off-by: Marcelo Tosatti
---
arch/x86/kvm/x86.c | 89 +++--
In the past we've had errors of single-bit in the other two cases; the
printk() may confirm it for the third case (many->many).
Signed-off-by: Avi Kivity
---
arch/x86/kvm/mmu.c |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index
On Wed, 2010-02-10 at 21:59 +0530, yogi wrote:
> >From 0aa8ed40de86eb8ad5b324177b2e0986e1c32c77 Mon Sep 17 00:00:00 2001
> From: yogananth subramanian
> Date: Wed, 10 Feb 2010 09:45:58 -0500
> Subject: [PATCH 3/5] kvm test: unattended: add support for parallel
> install of suse and other guest OS
On Wed, 2010-02-10 at 21:53 +0530, yogi wrote:
> Hello everyone,
>
> I like to submit a set of patches to enable installing multiple guests
> in parallel.
Hi Yogi, great to receive your patches!
> To install multiple guests in parallel the role of the host and the
> guest need to be changed. In
Bugs item #2944508, was opened at 2010-02-02 03:46
Message generated for change (Comment added) made by iggy_cav
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=2944508&group_id=180599
Please note that this message will contain a full copy of the comment
* Yogananth Subramanian [2010-02-10 10:30]:
> >From 0aa8ed40de86eb8ad5b324177b2e0986e1c32c77 Mon Sep 17 00:00:00 2001
> From: yogananth subramanian
> Date: Wed, 10 Feb 2010 09:45:58 -0500
> Subject: [PATCH 3/5] kvm test: unattended: add support for parallel
> install of suse and other guest OS
>
On 02/10/2010 07:07 PM, Gleb Natapov wrote:
On Wed, Feb 10, 2010 at 07:01:46PM +0200, Avi Kivity wrote:
On 02/10/2010 06:52 PM, Alexander Graf wrote:
Hrm, trying to read the thread I'm still somewhat lost. What exactly do
you want to document?
The problem: if KVM_RUN exits w
On 02/10/2010 07:03 PM, Alexander Graf wrote:
I see. Yes, that works for PPC Book3S too. We check for signals on the
beginning of vcpu_run. I'm not sure about BookE though.
Either way - wouldn't it make more sense to just move the check to
generic code?
Well, the check happens very deep i
On Wed, Feb 10, 2010 at 07:01:46PM +0200, Avi Kivity wrote:
> On 02/10/2010 06:52 PM, Alexander Graf wrote:
> >
> >Hrm, trying to read the thread I'm still somewhat lost. What exactly do
> >you want to document?
> >
>
> The problem: if KVM_RUN exits with KVM_EXIT_MMIO or KVM_EXIT_IO,
> then the in
Avi Kivity wrote:
> On 02/10/2010 06:52 PM, Alexander Graf wrote:
>>
>> Hrm, trying to read the thread I'm still somewhat lost. What exactly do
>> you want to document?
>>
>>
>
> The problem: if KVM_RUN exits with KVM_EXIT_MMIO or KVM_EXIT_IO, then
> the internal state is inconsistent. The ins
On 02/10/2010 06:52 PM, Alexander Graf wrote:
Hrm, trying to read the thread I'm still somewhat lost. What exactly do
you want to document?
The problem: if KVM_RUN exits with KVM_EXIT_MMIO or KVM_EXIT_IO, then
the internal state is inconsistent. The instruction is only half
completed,
On Wed, Feb 10, 2010 at 06:57:05PM +0200, Avi Kivity wrote:
> On 02/10/2010 03:45 AM, Takuya Yoshikawa wrote:
> >This patch set consists of macro replacements
> >and some fixes of fault handling in the x86
> >emulator.
> >
> >
> >Suggested by Marcelo, I separated these two
> >works and tried to mak
On 02/10/2010 03:45 AM, Takuya Yoshikawa wrote:
This patch set consists of macro replacements
and some fixes of fault handling in the x86
emulator.
Suggested by Marcelo, I separated these two
works and tried to make it clear what effects
each patch will produce: if you think that
reordering som
netperf results showed about 20% transmission gain with this patch for
virtio_net.
Thanks
Shirley
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Avi Kivity wrote:
> On 02/10/2010 06:47 PM, Alexander Graf wrote:
>
Because on PPC, you usually run PPC32 userspace code on a PPC64 kernel.
Unlike with x86, there's no real benefit in using 64 bit userspace.
>>> btw, does 32-bit ppc qemu supp
On 02/10/2010 06:47 PM, Alexander Graf wrote:
>>> Because on PPC, you usually run PPC32 userspace code on a PPC64 kernel.
>>> Unlike with x86, there's no real benefit in using 64 bit userspace.
>>>
>>>
>>>
>> btw, does 32-bit ppc qemu support large memory guests? It doesn't on
>> x86
Avi Kivity wrote:
> On 02/10/2010 06:25 PM, Marcelo Tosatti wrote:
>> On Wed, Feb 10, 2010 at 09:02:00AM +0200, Avi Kivity wrote:
>>
>>> On 02/09/2010 10:58 PM, Marcelo Tosatti wrote:
>>>
You're right... this should be enough to avoid a stop with uncomplete
PIO (and this is what h
On Wed, Feb 10, 2010 at 06:25:42PM +0200, Avi Kivity wrote:
> On 02/10/2010 03:50 AM, Takuya Yoshikawa wrote:
> >This patch injects page fault when reading descriptor in
> >load_guest_segment_descriptor() fails with FAULT.
> >
> >Effects of this injection: This function is used by
> >kvm_load_segme
Avi Kivity wrote:
> On 02/10/2010 06:43 PM, Alexander Graf wrote:
>
>>> Out of curiousity, why? It seems like an odd interface.
>>>
>>>
>>>
>> Because on PPC, you usually run PPC32 userspace code on a PPC64 kernel.
>> Unlike with x86, there's no real benefit in using 64 bit usersp
On 02/10/2010 06:43 PM, Alexander Graf wrote:
>
>> Out of curiousity, why? It seems like an odd interface.
>>
>>
> Because on PPC, you usually run PPC32 userspace code on a PPC64 kernel.
> Unlike with x86, there's no real benefit in using 64 bit userspace.
>
btw, does 32-bit ppc qemu su
On 02/10/2010 06:35 PM, Anthony Liguori wrote:
> On 02/10/2010 10:00 AM, Alexander Graf wrote:
>
>> On PPC the bitmap is Little Endian.
>>
>>
> Out of curiousity, why? It seems like an odd interface.
>
>
Exactly this issue. If you specify it as unsigned long native endian,
there is a
Anthony Liguori wrote:
> On 02/10/2010 10:00 AM, Alexander Graf wrote:
>
>> On PPC the bitmap is Little Endian.
>>
>>
>
> Out of curiousity, why? It seems like an odd interface.
>
Because on PPC, you usually run PPC32 userspace code on a PPC64 kernel.
Unlike with x86, there's no real
On Wed, Feb 10, 2010 at 06:25:42PM +0200, Avi Kivity wrote:
> On 02/10/2010 03:50 AM, Takuya Yoshikawa wrote:
> >This patch injects page fault when reading descriptor in
> >load_guest_segment_descriptor() fails with FAULT.
> >
> >Effects of this injection: This function is used by
> >kvm_load_segme
On 02/10/2010 06:25 PM, Marcelo Tosatti wrote:
On Wed, Feb 10, 2010 at 09:02:00AM +0200, Avi Kivity wrote:
On 02/09/2010 10:58 PM, Marcelo Tosatti wrote:
You're right... this should be enough to avoid a stop with uncomplete
PIO (and this is what happens for MMIO already). The signal w
On 02/10/2010 10:00 AM, Alexander Graf wrote:
> On PPC the bitmap is Little Endian.
>
Out of curiousity, why? It seems like an odd interface.
Regards,
Anthony Liguori
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More
>From e9eb6ba4aa481646ac4fddb32c85423e529ff717 Mon Sep 17 00:00:00 2001
From: yogananth subramanian
Date: Wed, 10 Feb 2010 10:53:45 -0500
Subject: [PATCH 5/5] kvm test: support for sles11 parallel install
Adds new entry "SUSE" in test_base file for sles and also
contains autoinst file for doing u
>From 2dbcd5801c31e35a01a671082ba0a461e9d44a5c Mon Sep 17 00:00:00 2001
From: yogananth subramanian
Date: Wed, 10 Feb 2010 10:02:07 -0500
Subject: [PATCH 4/5] kvm test: kickstart: modified ks.cfg file to suport
parallel install
The guest acts as a server, rather then a client and this enables
doi
>From 0aa8ed40de86eb8ad5b324177b2e0986e1c32c77 Mon Sep 17 00:00:00 2001
From: yogananth subramanian
Date: Wed, 10 Feb 2010 09:45:58 -0500
Subject: [PATCH 3/5] kvm test: unattended: add support for parallel
install of suse and other guest OS
File extension of the unattended file ".suse", in case o
>From 76aff8427266035867e9c73f8c2c7037a7113d1e Mon Sep 17 00:00:00 2001
From: yogananth subramanian
Date: Wed, 10 Feb 2010 08:00:06 -0500
Subject: [PATCH 2/5] kvm test: test_base: enabling parallel install
Have added a new port redirection entry "guest_port_unattend_shell"
for the host to communi
>From b2ddf7e9d434ea33619ced976f61e59d2d20ab71 Mon Sep 17 00:00:00 2001
From: yogananth subramanian
Date: Wed, 10 Feb 2010 06:15:29 -0500
Subject: [PATCH 1/5] kvm test: unattended install: change host role from
server to client
By changing the role of the host from server to client, we can do
una
On Wed, Feb 10, 2010 at 09:02:00AM +0200, Avi Kivity wrote:
> On 02/09/2010 10:58 PM, Marcelo Tosatti wrote:
> >You're right... this should be enough to avoid a stop with uncomplete
> >PIO (and this is what happens for MMIO already). The signal will not
> >be dequeued, so KVM will complete_pio and
On Wed, 2010-02-10 at 11:13 -0500, Jiri Zupka wrote:
> FIX:
> Patch is based on The previous version [PATCH] KVM test: KSM (kernel shared
> memory) test
> developed overcommit Lucas Meneghel Rodrigues.
> The only fix is change of behavior with large overcommit. Python has a
> problem in
On 02/10/2010 03:50 AM, Takuya Yoshikawa wrote:
This patch injects page fault when reading descriptor in
load_guest_segment_descriptor() fails with FAULT.
Effects of this injection: This function is used by
kvm_load_segment_descriptor() which is necessary for the
following instructions.
- mov
On Fri, 2010-01-29 at 18:17 +0800, Feng Yang wrote:
> Add check_image.py in scripts folder. It will performance qemu-img info
> and qemu-img check.
> Add check_image.py as post command of qcow2 variant.
Hi Feng, thanks for your patch! See some comments below:
> Signed-off-by: Feng Yang
> ---
>
Hello everyone,
I like to submit a set of patches to enable installing multiple guests
in parallel.
To install multiple guests in parallel the role of the host and the
guest need to be changed. In this patch host acts as a client and the
guest acts as server, enabling us to install multiple guest
1 - 100 of 134 matches
Mail list logo