Hi,
Getting an error while booting my guest with -initrd option as in :
qemu-kvm -net nic,macaddr=$macaddress -net tap,script=/etc/qemu-ifup
-m 512 -hda /root/kvm/x86/vdisk.img -kernel /root/mvroot/bzImage
-initrd /root/kvm/mv/ramdisk.img -append root=/dev/ram0
No filesystem could mount root,
12.09.2010 13:26, Avi Kivity пишет:
On 09/10/2010 07:17 PM, Michael Tokarev wrote:
Note the changed subject line.
I just did a few tests with linux guest (amd64 2.6.35 kernel).
And it shows the same behavour as win7 (unlike winXP), namely,
high host CPU load when guest is idle.
Not for
14.09.2010 12:26, Brad Campbell wrote:
[]
Just a data point. An idle XP guest for me without -usb sees the host
running at about 8,000 context switches a second. With the guest using
-usb -usbdevice tablet, the host runs at between 15,000 - 18,000 context
switches a second.
Yes, I observed
On 14/09/10 16:33, Michael Tokarev wrote:
14.09.2010 12:26, Brad Campbell wrote:
[]
Just a data point. An idle XP guest for me without -usb sees the host
running at about 8,000 context switches a second. With the guest using
-usb -usbdevice tablet, the host runs at between 15,000 - 18,000
On 11/09/10 00:03, Avi Kivity wrote:
On 09/10/2010 06:03 PM, Michael Tokarev wrote:
Strange. Can you also post a few lines of 'vmstat 1'?
Maybe we'll see a lot of context switches in there.
Not that many. Still running the same w7 guest, still
~25..27% CPU usage reported by top for the kvm
On 09/14/2010 08:51 AM, Michael Tokarev wrote:
12.09.2010 13:26, Avi Kivity пишет:
On 09/10/2010 07:17 PM, Michael Tokarev wrote:
Note the changed subject line.
I just did a few tests with linux guest (amd64 2.6.35 kernel).
And it shows the same behavour as win7 (unlike winXP), namely,
On 09/14/2010 11:06 AM, Avi Kivity wrote:
On 09/14/2010 08:51 AM, Michael Tokarev wrote:
12.09.2010 13:26, Avi Kivity пишет:
On 09/10/2010 07:17 PM, Michael Tokarev wrote:
Note the changed subject line.
I just did a few tests with linux guest (amd64 2.6.35 kernel).
And it shows the same
Am 20.08.2010 10:07, Zachary Amsden wrote:
When CPUs with unstable TSCs enter deep C-state, TSC may stop
running. This causes us to require resynchronization. Since
we can't tell when this may potentially happen, we assume the
worst by forcing re-compensation for it at every point the VCPU
On 09/14/2010 11:10 AM, Jan Kiszka wrote:
Am 20.08.2010 10:07, Zachary Amsden wrote:
When CPUs with unstable TSCs enter deep C-state, TSC may stop
running. This causes us to require resynchronization. Since
we can't tell when this may potentially happen, we assume the
worst by forcing
On 09/13/2010 09:03 PM, Jan Kiszka wrote:
Am 13.09.2010 20:56, Anthony Liguori wrote:
On 09/13/2010 01:52 PM, Jan Kiszka wrote:
Am 13.09.2010 19:54, Avi Kivity wrote:
The symbol KVM_UPSTREAM is used to mark sections of code that are
part of
the upstream kvm implemetation that is not used in
Hi all
I have installed KVM with fedora13 operating system and I have
successfully created guest operating system with virt-install.
Also I have configured routed networking in host machine. Here's my
routed networking configuration
[r...@kvmcluster ~]# virsh net-dumpxml routed
network
14.09.2010 13:08, Avi Kivity wrote:
On 09/14/2010 08:51 AM, Michael Tokarev wrote:
12.09.2010 13:26, Avi Kivity пишет:
Guest: 0 load
Host:
Cpu(s): 5.3%us, 6.7%sy, 0.0%ni, 88.0%id, 0.0%wa, 0.0%hi,
0.0%si, 0.0%st
PID USER PR NI VIRT RES SHR S %CPU %MEMTIME+ COMMAND
On 09/14/2010 12:00 PM, Michael Tokarev wrote:
# strace -p 23020 -p 23023 -c
Process 23020 attached - interrupt to quit
Process 23023 attached - interrupt to quit
^CProcess 23020 detached
Process 23023 detached
% time seconds usecs/call callserrors syscall
-- ---
On Tue, Sep 14, 2010 at 03:28:56PM +0530, Rajiv Rajaian wrote:
Hi all
I have installed KVM with fedora13 operating system and I have
successfully created guest operating system with virt-install.
Also I have configured routed networking in host machine. Here's my
routed networking
14.09.2010 14:07, Avi Kivity пишет:
On 09/14/2010 12:00 PM, Michael Tokarev wrote:
# strace -p 23020 -p 23023 -c
Process 23020 attached - interrupt to quit
Process 23023 attached - interrupt to quit
^CProcess 23020 detached
Process 23023 detached
% time seconds usecs/call calls
On 09/14/2010 12:25 PM, Michael Tokarev wrote:
Not that it is much helpful either. lsof:
qemu-syst 23203 mjt0u CHR 136,9 0t0 12 /dev/pts/9
qemu-syst 23203 mjt1u CHR 136,9 0t0 12 /dev/pts/9
qemu-syst 23203 mjt2u CHR 136,9 0t0 12
Am 14.09.2010 11:27, Avi Kivity wrote:
On 09/14/2010 11:10 AM, Jan Kiszka wrote:
Am 20.08.2010 10:07, Zachary Amsden wrote:
When CPUs with unstable TSCs enter deep C-state, TSC may stop
running. This causes us to require resynchronization. Since
we can't tell when this may potentially
Thanks for your reply Daniel.
Suppose I want to create on more VM with static ip address
144.68.100.0 on host having ip address 10.2.0.25 then do i need to add
one more routing table entry by specifying 10.2.0.25 as gateway or
10.2.0.20 as previous entry is enough to access that VM?
Is there any
Am 14.09.2010 11:29, Avi Kivity wrote:
On 09/13/2010 09:03 PM, Jan Kiszka wrote:
Am 13.09.2010 20:56, Anthony Liguori wrote:
On 09/13/2010 01:52 PM, Jan Kiszka wrote:
Am 13.09.2010 19:54, Avi Kivity wrote:
The symbol KVM_UPSTREAM is used to mark sections of code that are
part of
the
On 09/14/2010 12:40 PM, Jan Kiszka wrote:
For yet unknown reason, this commit breaks Linux guests here if they are
started with only a single VCPU. They hang during boot, obviously no
longer receiving interrupts.
I'm using kvm-kmod against a 2.6.34 host kernel, so this may be a side
On 09/14/2010 12:42 PM, Jan Kiszka wrote:
Am 14.09.2010 11:29, Avi Kivity wrote:
On 09/13/2010 09:03 PM, Jan Kiszka wrote:
Am 13.09.2010 20:56, Anthony Liguori wrote:
On 09/13/2010 01:52 PM, Jan Kiszka wrote:
Am 13.09.2010 19:54, Avi Kivity wrote:
The symbol KVM_UPSTREAM is used to
On Tue, Sep 14, 2010 at 04:13:09PM +0530, Rajiv Rajaian wrote:
Thanks for your reply Daniel.
Suppose I want to create on more VM with static ip address
144.68.100.0 on host having ip address 10.2.0.25 then do i need to add
one more routing table entry by specifying 10.2.0.25 as gateway or
14.09.2010 14:39, Avi Kivity wrote:
On 09/14/2010 12:25 PM, Michael Tokarev wrote:
Not that it is much helpful either. lsof:
qemu-syst 23203 mjt0u CHR 136,9 0t0 12 /dev/pts/9
qemu-syst 23203 mjt1u CHR 136,9 0t0 12 /dev/pts/9
qemu-syst 23203 mjt2u
On Mon, Sep 13, 2010 at 01:43:00PM -0700, Shirley Ma wrote:
This patch induces a new sock flag ZEROCOPY to avoid copy between
userspace and kernel. macvtap is the first user of zero copy between
guest and host kernel. It only uses when the lower device supports high
memory DMA. The first set
On Tue, Sep 14, 2010 at 08:55:57AM +0800, Amos Kong wrote:
On Mon, Sep 13, 2010 at 07:43:22PM +0200, Michael S. Tsirkin wrote:
netdev option in new qemu is mutually exclusive with vlan.
Only pass vlan if netdev option is missing.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
This
Thanks for your kind information Daniel.
Consider this scenario
VM1(144.68.100.1) and VM2(144.68.100.2) running on Host1(10.2.0.20)
and Host2(10.2.0.30) respectively. Is it possible to access the VM1
and VM2 from Host3(10.2.0.100). How to add a static route for this
scenario?? Here I don't need
Thanks for your information Daniel
On Tue, Sep 14, 2010 at 5:46 PM, Daniel P. Berrange berra...@redhat.com wrote:
On Tue, Sep 14, 2010 at 04:58:46PM +0530, Rajiv Rajaian wrote:
Thanks for your kind information Daniel.
Consider this scenario
VM1(144.68.100.1) and VM2(144.68.100.2) running on
On Mon, Jun 14, 2010, Avi Kivity wrote about Re: [PATCH 18/24] Exiting from L2
to L1:
+int switch_back_vmcs(struct kvm_vcpu *vcpu)
+{
IIUC vpids are not exposed to the guest yet? So the VPID should not
change between guest and nested guest.
Right. Removed.
+
+
[linux-perf-users removed from Cc]
14.09.2010 15:02, Michael Tokarev wrote:
14.09.2010 14:39, Avi Kivity wrote:
On 09/14/2010 12:25 PM, Michael Tokarev wrote:
Not that it is much helpful either. lsof:
qemu-syst 23203 mjt0u CHR 136,9 0t0 12 /dev/pts/9
qemu-syst 23203
In mergeable buffer case, we use headcount, log_num
and seg as indexes in same-size arrays, and
we know that headcount = seg and
log_num equals either 0 or seg.
Therefore, the right thing to do is range-check seg,
not headcount as we do now: these will be different
if guest chains s/g descriptors
On 09/14/2010 03:15 PM, Michael Tokarev wrote:
- instrument calls to qemu_mod_timer() in hw/usb-*hci.c. Looks like
these are all 1kHz, but something else is clearly happening.
Ok. There's nothing interesting going on there either,
apparently.
It is using hw/usb-uhci.c. I added a few
14.09.2010 17:25, Avi Kivity wrote:
On 09/14/2010 03:15 PM, Michael Tokarev wrote:
[]
Looking at what hw/usb-uhci.c:uhci_frame_timer() routine
does, it is quite expected to have that many writes and
reads and that many gettimers(). It is polling for events
every 1/1000th of a second,
14.09.2010 17:29, Michael Tokarev wrote:
[]
Please post an strace again, this time with -e trace=select. Looks like
each timer callback results in 50 syscalls, 4 of which are select()s).
I just built 0.13-rc1 to see how that one performs. It is very similar
to 0.12 in this respect. The
On 09/13/2010 10:59 AM, Chris Wright wrote:
Please send in any agenda items you are interested in covering.
- QED and qcow2
Obviously, there have been lots of discussions on the ML. It would be
good to use the call to step back and try to discuss a higher level plan
for moving forward.
The setting of the irq0override flag must be also passed properly
to the KVM_IRQCHIP_IOAPIC.
Signed-off-by: Bernhard Kohl bernhard.k...@nsn.com
---
qemu-kvm-x86.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/qemu-kvm-x86.c b/qemu-kvm-x86.c
index fd974b3..e35c234
On 09/14/2010 03:29 PM, Michael Tokarev wrote:
14.09.2010 17:25, Avi Kivity wrote:
On 09/14/2010 03:15 PM, Michael Tokarev wrote:
[]
Looking at what hw/usb-uhci.c:uhci_frame_timer() routine
does, it is quite expected to have that many writes and
reads and that many gettimers(). It is
0.13
- if all goes well...tomorrow
stable tree
- please look at -stable to see what is missing (bugfixes)
- esp. regressions from 0.12
- looking for dedicated stable maintainer/release manager
- pick this discussion up next week
qed/qcow2
- increase concurrency, performance
- threading vs
14.09.2010 18:45, Avi Kivity пишет:
17:27:23.96 select(13, [0 5 7 9 10 12], [], [], {1, 0}) = 2 (in [5
10], left {0, 98})0.09
17:27:24.000199 select(13, [0 5 7 9 10 12], [], [], {1, 0}) = 1 (in
[12], left {0, 998775})0.001241
17:27:24.001666 select(13, [0 5 7 9 10 12], [], [], {1,
On Tue, 2010-09-14 at 11:12 +0200, Avi Kivity wrote:
+base = (unsigned long)from-iov_base + offset1;
+size = ((base ~PAGE_MASK) + len + ~PAGE_MASK)
PAGE_SHIFT;
+num_pages = get_user_pages_fast(base, size,
0,page[i]);
+if ((num_pages !=
On 09/14/2010 09:47 AM, Chris Wright wrote:
0.13
- if all goes well...tomorrow
To tag, it may be thursday for announcement. I need to run a regression
run tonight.
qed/qcow2
- increase concurrency, performance
To achieve performance, a block driver must: 1) support concurrent
Hello Miachel,
On Tue, 2010-09-14 at 14:05 +0200, Michael S. Tsirkin wrote:
While others pointed out correctness issues with the patch,
I would still like to see the performance numbers, just so we
understand what's possible.
The performance looks good, it either saves the host CPU
On Tuesday 14 September 2010, Shirley Ma wrote:
On Tue, 2010-09-14 at 11:12 +0200, Avi Kivity wrote:
That's what io_submit() is for. Then io_getevents() tells you what
a
while actually was.
This macvtap zero copy uses iov buffers from vhost ring, which is
allocated from guest kernel.
I looked at the macvtap driver and it seems that it should
have the below issue, same as tap.
Arnd?
On Tue, Apr 13, 2010 at 05:59:44PM +0300, Michael S. Tsirkin wrote:
The following situation was observed in the field:
tap1 sends packets, tap2 does not consume them, as a result
tap1 can not be
This patch moves the detection whether a page-fault was
nested or not out of the error code and moves it into a
separate variable in the fault struct.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
arch/x86/include/asm/kvm_host.h |1 +
arch/x86/kvm/mmu.h |1 -
Hi Avi, Marcelo,
this patch-set includes two follow-on patches to the npt virtualization patch
set merged recently. These are the patches requested by Avi in his review of
the v4 npt virtualization patch-set.
Joerg
--
To unsubscribe from this list: send the line unsubscribe kvm in
the
This patch removes the mmu.nx field and uses the equivalent
field mmu.base_role.nxe instead.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
arch/x86/include/asm/kvm_host.h |2 --
arch/x86/kvm/mmu.c | 27 +--
arch/x86/kvm/paging_tmpl.h |4
What's your clock source on the host?
cat /sys/devices/system/clocksource/clocksource0/current_clocksource
With the usbtablet device the host clock source is read 2-3 times for
frequently which for acpi_pm and hpet jack up the CPU.
David
--
To unsubscribe from this list: send the line
Hi,
here is the next round of the svm feature support patches for qemu. Key
change in this version is that it now makes kvm{64|32} the default cpu
definition for qemu when kvm is enabled (as requested by Alex).
Otherwise I removed the NRIP_SAVE feature from the phenom definition and
set
As requested by Alex this patch makes kvm64 the default CPU
model when qemu is started with -enable-kvm.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
hw/pc.c | 19 ++-
1 files changed, 14 insertions(+), 5 deletions(-)
diff --git a/hw/pc.c b/hw/pc.c
index
This patch adds the svm cpuid feature flags to the qemu
intialization path. It also adds the svm features available
on phenom to its cpu-definition and extends the host cpu
type to support all svm features KVM can provide.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
target-i386/cpu.h
This patch cleans the (stack-allocated) cpuid definition to
0 before actually initializing it.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
target-i386/cpuid.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/target-i386/cpuid.c b/target-i386/cpuid.c
index
Qemu supports up to UIO_MAXIOV s/g so we have to match that because guest
drivers may rely on this.
Allocate indirect and log arrays dynamically to avoid using too much contigious
memory and make the length of hdr array to match the header length since each
iovec entry has a least one byte.
Test
Joerg Roedel wrote:
As requested by Alex this patch makes kvm64 the default CPU
model when qemu is started with -enable-kvm.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
hw/pc.c | 19 ++-
1 files changed, 14 insertions(+), 5 deletions(-)
diff --git a/hw/pc.c
This patch adds a test to check if the RSVD bits are checked in
the NPT emulation of KVM.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
x86/svm.c | 18 ++
1 files changed, 18 insertions(+), 0 deletions(-)
diff --git a/x86/svm.c b/x86/svm.c
index 04ca028..03e07e2 100644
This patch adds a test to check if the selective cr0
intercept emulation of the kvm svm emulation works.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
x86/svm.c | 37 -
1 files changed, 36 insertions(+), 1 deletions(-)
diff --git a/x86/svm.c
This patch adds a test to check if NPT faults that occur
while walking the guest page table are reported correctly.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
x86/svm.c | 24
1 files changed, 24 insertions(+), 0 deletions(-)
diff --git a/x86/svm.c
This patch adds a test to check if the US bit is checked in
the NPT emulation of KVM.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
x86/svm.c | 34 +-
1 files changed, 33 insertions(+), 1 deletions(-)
diff --git a/x86/svm.c b/x86/svm.c
index
This patch adds a test to check if the NX bit is checked in
the NPT emulation of KVM.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
x86/svm.c | 37 +
1 files changed, 37 insertions(+), 0 deletions(-)
diff --git a/x86/svm.c b/x86/svm.c
index
Hi Avi,
here is the second version of the new unit-tests for the KVM SVM
emulation. The changes to the previous version are really minor:
* Fixed coding-style
* Fixed comment in the code that builds the nested page table
* Renamed sel_cr0 test to sel_cr0_bug test to add a
This patch adds a test to check if the RW bit is checked in
the NPT emulation of KVM.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
x86/svm.c | 30 ++
1 files changed, 30 insertions(+), 0 deletions(-)
diff --git a/x86/svm.c b/x86/svm.c
index 03e07e2..3421736
This patch adds code to setup a nested page table which is
used for all tests.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
x86/svm.c | 60
1 files changed, 60 insertions(+), 0 deletions(-)
diff --git a/x86/svm.c b/x86/svm.c
14.09.2010 19:51, David S. Ahern пишет:
cat /sys/devices/system/clocksource/clocksource0/current_clocksource
It's tsc (AthlonII CPU). Also available are hpet and acpi_pm.
Switching to hpet or acpi_pm does not have visible effect, at
least not while the guest is running.
Thanks!
/mjt
--
To
On Tue, 2010-09-14 at 17:22 +0200, Michael S. Tsirkin wrote:
I would expect this to hurt performance significantly.
We could do this for asynchronous requests only to avoid the
slowdown.
Is kiocb in sendmsg helpful here? It is not used now.
Shirley
--
To unsubscribe from this list: send the
On 09/14/2010 04:53 PM, Michael Tokarev wrote:
14.09.2010 18:45, Avi Kivity пишет:
17:27:23.96 select(13, [0 5 7 9 10 12], [], [], {1, 0}) = 2 (in [5
10], left {0, 98})0.09
17:27:24.000199 select(13, [0 5 7 9 10 12], [], [], {1, 0}) = 1 (in
[12], left {0, 998775})0.001241
On Tue, Sep 14, 2010 at 11:53:05PM +0800, Jason Wang wrote:
Qemu supports up to UIO_MAXIOV s/g so we have to match that because guest
drivers may rely on this.
Allocate indirect and log arrays dynamically to avoid using too much
contigious
memory and make the length of hdr array to match
On 09/14/10 10:00, Michael Tokarev wrote:
14.09.2010 19:51, David S. Ahern пишет:
cat /sys/devices/system/clocksource/clocksource0/current_clocksource
It's tsc (AthlonII CPU). Also available are hpet and acpi_pm.
Switching to hpet or acpi_pm does not have visible effect, at
least not
On 13/09/2010 19:34, Alex Williamson wrote:
On Mon, Sep 13, 2010 at 4:32 AM, Thibault VINCENT
thibault.vinc...@smartjog.com wrote:
Hello
I'm trying to achieve higher than gigabit transferts over a virtio NIC
with no success, and I can't find a recent bug or discussion about such
an issue.
On Tue, Sep 14, 2010 at 11:58:03AM -0400, Alexander Graf wrote:
+if (kvm_enabled())
+cpu_model = DEFAULT_KVM_CPU_MODEL;
+else
+cpu_model = DEFAULT_QEMU_CPU_MODEL;
Braces :(.
Okay, here is the new patch:
From
14.09.2010 20:00, Avi Kivity wrote:
As I mentioned in other emails in this thread:
o yes, I do have CONFIG_EVENTFD set, and it is being used
too (fd#12 in the above strace).
I thought that was the signalfd.
Uh. Yes, it was, i confused the two. And yes, CONFIG_EVENTFD is
set and used
On Tue, Sep 14, 2010 at 09:00:25AM -0700, Shirley Ma wrote:
On Tue, 2010-09-14 at 17:22 +0200, Michael S. Tsirkin wrote:
I would expect this to hurt performance significantly.
We could do this for asynchronous requests only to avoid the
slowdown.
Is kiocb in sendmsg helpful here? It is
On 09/14/2010 06:29 PM, Michael Tokarev wrote:
14.09.2010 20:00, Avi Kivity wrote:
As I mentioned in other emails in this thread:
o yes, I do have CONFIG_EVENTFD set, and it is being used
too (fd#12 in the above strace).
I thought that was the signalfd.
Uh. Yes, it was, i confused
On 09/14/10 10:29, Michael Tokarev wrote:
For comparison, here's the same strace stats without -usbdevice:
% time seconds usecs/call callserrors syscall
-- --- --- - -
97.700.080237 22 3584
14.09.2010 20:37, Avi Kivity пишет:
On 09/14/2010 06:29 PM, Michael Tokarev wrote:
14.09.2010 20:00, Avi Kivity wrote:
As I mentioned in other emails in this thread:
o yes, I do have CONFIG_EVENTFD set, and it is being used
too (fd#12 in the above strace).
I thought that was
On Tue, 2010-09-14 at 18:29 +0200, Michael S. Tsirkin wrote:
Precisely. This is what the patch from Xin Xiaohui does. That code
already seems to do most of what you are trying to do, right?
I thought host pins guest kernel buffer pages was good enough for TX
thought I didn't look up xiaohui's
On Tue, Sep 14, 2010 at 10:02:25AM -0700, Shirley Ma wrote:
On Tue, 2010-09-14 at 18:29 +0200, Michael S. Tsirkin wrote:
Precisely. This is what the patch from Xin Xiaohui does. That code
already seems to do most of what you are trying to do, right?
I thought host pins guest kernel buffer
On Tue, 2010-09-14 at 20:27 +0200, Michael S. Tsirkin wrote:
As others said, the harder issues for TX are in determining that it's
safe
to unpin the memory, and how much memory is it safe to pin to beging
with. For RX we have some more complexity.
I think unpin the memory is in kfree_skb()
On Tue, Sep 14, 2010 at 11:49:03AM -0700, Shirley Ma wrote:
On Tue, 2010-09-14 at 20:27 +0200, Michael S. Tsirkin wrote:
As others said, the harder issues for TX are in determining that it's
safe
to unpin the memory, and how much memory is it safe to pin to beging
with. For RX we have
On Tue, 2010-09-14 at 21:01 +0200, Michael S. Tsirkin wrote:
On Tue, Sep 14, 2010 at 11:49:03AM -0700, Shirley Ma wrote:
On Tue, 2010-09-14 at 20:27 +0200, Michael S. Tsirkin wrote:
As others said, the harder issues for TX are in determining that
it's
safe
to unpin the memory, and how
On 09/14/2010 12:40 AM, Jan Kiszka wrote:
Am 14.09.2010 11:27, Avi Kivity wrote:
On 09/14/2010 11:10 AM, Jan Kiszka wrote:
Am 20.08.2010 10:07, Zachary Amsden wrote:
When CPUs with unstable TSCs enter deep C-state, TSC may stop
running. This causes us to require
On Tue, 2010-09-14 at 21:01 +0200, Michael S. Tsirkin wrote:
I think that you should be able to simply combine
the two drivers together, add an ioctl to
enable/disable zero copy mode of operation.
That could work. But what's the purpose to have two drivers if one
driver can handle
On Tue, Sep 14, 2010 at 8:38 AM, David S. Ahern daah...@cisco.com wrote:
On 09/14/10 00:35, Nirmal Guhan wrote:
Hi,
Getting an error while booting my guest with -initrd option as in :
qemu-kvm -net nic,macaddr=$macaddress -net tap,script=/etc/qemu-ifup
-m 512 -hda /root/kvm/x86/vdisk.img
On 09/14/10 13:38, Nirmal Guhan wrote:
On Tue, Sep 14, 2010 at 8:38 AM, David S. Ahern daah...@cisco.com wrote:
On 09/14/10 00:35, Nirmal Guhan wrote:
Hi,
Getting an error while booting my guest with -initrd option as in :
qemu-kvm -net nic,macaddr=$macaddress -net
On 14.09.2010, at 17:52, Joerg Roedel wrote:
Hi,
here is the next round of the svm feature support patches for qemu. Key
change in this version is that it now makes kvm{64|32} the default cpu
definition for qemu when kvm is enabled (as requested by Alex).
Otherwise I removed the NRIP_SAVE
This is Amos's patchset rebased, with some cleanups and additions:
- New method to generate MAC address prefixes
- Fix some tests to use new management
- Remove the dependency on address_pools.cfg
- Coding style fixes
We still have to do some work before the patches can be applied,
the good news
From: Amos Kong ak...@redhat.com
Old method uses the addresses in the config files which could lead serious
problem when multiple tests running in different hosts.
This patch adds a new macaddress pool algorithm, it generates the mac prefix
based on mac address of the host, and fix it to
The previous MAC address management breaks up the
physical_resources_check test (the test picks up NIC MAC parameters
from test parameters). Let's fix it by making it retrieve params
from the method VM.get_mac_address()
Signed-off-by: Lucas Meneghel Rodrigues l...@redhat.com
---
Since the previous patch introduces an automated management
mechanism for MAC addresses, let's simplify things a bit
by removing address_pools.cfg parsing from the control files,
as well as just removing address_pools.cfg.sample.
Signed-off-by: Lucas Meneghel Rodrigues l...@redhat.com
---
From: Amos Kong ak...@redhat.com
This test mainly covers TCP sent from host to guest and from guest to host
with repeatedly turn on/off NIC promiscuous mode.
Changes from v1:
- Don't abruptly fail the whole test if we get a failure for a single size
Signed-off-by: Amos Kong ak...@redhat.com
---
From: Amos Kong ak...@redhat.com
This test is the basic test of transfering file between host and guest.
Try to transfer a large file from host to guest, and transfer it back
to host, then compare the files by calculate their md5 hash.
The default file size is 4000M, scp timeout is 1000s. It
From: Amos Kong ak...@redhat.com
Test steps:
1. Get a new mac from pool, and the old mac addr of guest.
2. Execute the mac_change.sh in guest.
3. Relogin to guest and query the interfaces info by `ifconfig`
Signed-off-by: Cao, Chen k...@redhat.com
Signed-off-by: Amos Kong ak...@redhat.com
---
From: Amos Kong ak...@redhat.com
Repeatedly load/unload nic driver, try to transfer file between guest and host
by threads at the same time, and check the md5sum.
Changes from v1:
- Use a new method to get nic driver name
- Use utils.hash_file() to get md5sum
Signed-off-by: Amos Kong
From: Amos Kong ak...@redhat.com
Add network load by netperf, server is launched on guest, execute netperf
client with different protocols on host. if all clients execute successfully,
case will be pass. Test result will be record into result.txt.
Now this case only tests with TCP_RR TCP_CRR
From: Amos Kong ak...@redhat.com
Signed-off-by: Amos Kong ak...@redhat.com
---
client/tests/kvm/kvm_utils.py | 23 +++
1 files changed, 15 insertions(+), 8 deletions(-)
diff --git a/client/tests/kvm/kvm_utils.py b/client/tests/kvm/kvm_utils.py
index bb5c868..71ab7d1 100644
From: Amos Kong ak...@redhat.com
This is an enhancement of existed vlan test. Rename the vlan_tag.py to vlan.py,
it is more reasonable.
. Setup arp from /proc/sys/net/ipv4/conf/all/arp_ignore
. Multiple vlans exist simultaneously
. Test ping between same and different vlans
. Test by TCP data
From: Amos Kong ak...@redhat.com
Framework could not totalise default extra_params and extra_params_vm1 in the
following condition, it's difficult to realise when parsing config file or
calling get_sub_dict*().
extra_params += ' str1'
- case:
extra_params_vm1 += str2
Signed-off-by: Amos Kong
The latest case contains TX/RX/SG/TSO/GSO/GRO/LRO test.
RTL8139 NIC doesn't support TSO, LRO, it's too old, so
drop offload test from rtl8139. LRO, GRO are only
supported by latest kernel, virtio nic doesn't support
receive offloading function.
Initialize the callbacks first and execute all the
From: Amos Kong ak...@redhat.com
This case just snoop tftp packet through tcpdump, it depends on public dhcp
server, better to test it through dnsmasq.
FIXME: Use dnsmasq for pxe test
Signed-off-by: Jason Wang jasow...@redhat.com
Signed-off-by: Amos Kong ak...@redhat.com
---
From: Amos Kong ak...@redhat.com
Use 'ping' to test send/recive multicat packets. Flood ping test is also added.
Limit guest network as 'bridge' mode, because multicast packets could not be
transmitted to guest when using 'user' network.
Add join_mcast.py for joining machine into multicast
The kvm_net_utils.py is a just a place that wraps common network
related commands which is used to do the network-related tests.
Use -1 as the packet ratio for loss analysis.
Use quiet mode when doing the flood ping.
Changes from v1:
- Use None to indicate that the session should be local in
On Tue, Sep 14, 2010 at 05:46:13PM +0200, Joerg Roedel wrote:
This patch removes the mmu.nx field and uses the equivalent
field mmu.base_role.nxe instead.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
arch/x86/include/asm/kvm_host.h |2 --
arch/x86/kvm/mmu.c | 27
1 - 100 of 117 matches
Mail list logo