On Wednesday 20 October 2010 17:46:47 Avi Kivity wrote:
On 10/20/2010 10:26 AM, Sheng Yang wrote:
It would be work with KVM_CAP_DEVICE_MSIX_MASK, which we would enable in
the last patch.
+struct kvm_assigned_msix_mmio {
+ __u32 assigned_dev_id;
+ __u64 base_addr;
m...@mjw.se :
Anyone run kvm on it?
Find out the CPU specs and you'll be able to discover it it's possible.
--
Architecte Informatique chez Blueline/Gulfsat:
Administration Systeme, Recherche Developpement
+261 34 56 000 19
--
To unsubscribe
On Thursday 21 October 2010 03:02:24 Marcelo Tosatti wrote:
On Wed, Oct 20, 2010 at 04:26:24PM +0800, Sheng Yang wrote:
Here is v2.
Changelog:
v1-v2
The major change from v1 is I've added the in-kernel MSI-X mask emulation
support, as well as adding shortcuts for reading MSI-X
On 10/21/2010 03:57 AM, Feng Yang wrote:
- Michael Goldish mgold...@redhat.com wrote:
From: Michael Goldish mgold...@redhat.com
To: Feng Yang fy...@redhat.com
Cc: autot...@test.kernel.org, kvm@vger.kernel.org
Sent: Wednesday, October 20, 2010 6:48:42 PM GMT +08:00 Beijing / Chongqing
On Wednesday 20 October 2010 17:51:01 Avi Kivity wrote:
On 10/20/2010 10:26 AM, Sheng Yang wrote:
Here is v2.
Changelog:
v1-v2
The major change from v1 is I've added the in-kernel MSI-X mask emulation
support, as well as adding shortcuts for reading MSI-X table.
I've
On 10/21/2010 12:03 AM, Anthony Liguori wrote:
The timeout of qemu_kvm_eat_signal is always zero.
So then qemu_kvm_eat_signal purely polls and it will happily keep
polling as long as there is a signal pending.
So what's the point of doing a sigtimedwait() and dropping qemu_mutex?
I agree
On Thursday 21 October 2010 06:35:11 Michael S. Tsirkin wrote:
On Wed, Oct 20, 2010 at 04:26:31PM +0800, Sheng Yang wrote:
It would be work with KVM_CAP_DEVICE_MSIX_MASK, which we would enable in
the last patch.
Signed-off-by: Sheng Yang sh...@linux.intel.com
Merge this with patch 8 -
On 10/21/2010 03:14 AM, Alexander Graf wrote:
I agree that some agent code for basic stuff like live snapshot
sync with the filesystem is small enough and worth to host within
qemu. Maybe we do need more than one project?
No, please. That's exactly what I don't want to see. The
From: Michael S. Tsirkin m...@redhat.com
Date: Tue, 19 Oct 2010 16:59:01 +0200
David,
Not sure if it's too late for 2.6.36 - in case it's not, the following tree
includes a last minute bugfix for vhost-net, found by code inspection.
It is on top of net-2.6.
Thanks!
The following changes
This patch removes following warnings:
target-i386/kvm.c: In function 'kvm_put_msrs':
target-i386/kvm.c:782: error: unused variable 'i'
target-i386/kvm.c: In function 'kvm_get_msrs':
target-i386/kvm.c:1083: error: label at end of compound statement
Signed-off-by: Hidetoshi Seto
On Thu, Oct 21, 2010 at 03:10:19PM +0800, Sheng Yang wrote:
On Thursday 21 October 2010 03:02:24 Marcelo Tosatti wrote:
On Wed, Oct 20, 2010 at 04:26:24PM +0800, Sheng Yang wrote:
Here is v2.
Changelog:
v1-v2
The major change from v1 is I've added the in-kernel MSI-X
On Wednesday 20 October 2010 16:26:32 Sheng Yang wrote:
This patch enable per-vector mask for assigned devices using MSI-X.
The basic idea of kernel and QEmu's responsibilities are:
1. Because QEmu owned the irq routing table, so the change of table should
still
go to the QEmu, like we did in
This makes it easy to change the way of allocating/freeing dirty bitmaps.
Signed-off-by: Takuya Yoshikawa yoshikawa.tak...@oss.ntt.co.jp
Signed-off-by: Fernando Luis Vazquez Cao ferna...@oss.ntt.co.jp
---
virt/kvm/kvm_main.c | 30 +++---
1 files changed, 23
On 10/21/2010 03:51 AM, Takuya Yoshikawa wrote:
(2010/10/20 18:34), Takuya Yoshikawa wrote:
** NOT TESTED WELL YET **
Currently, we are using vmalloc() for all dirty bitmaps even though
they are small enough, say 256 bytes or less.
So we use kmalloc() if dirty bitmap size is less than or
Currently x86's kvm_vm_ioctl_get_dirty_log() needs to allocate a bitmap by
vmalloc() which will be used in the next logging and this has been causing
bad effect to VGA and live-migration: vmalloc() consumes extra systime,
triggers tlb flush, etc.
This patch resolves this issue by pre-allocating
(2010/10/21 17:38), Avi Kivity wrote:
On 10/21/2010 03:51 AM, Takuya Yoshikawa wrote:
(2010/10/20 18:34), Takuya Yoshikawa wrote:
** NOT TESTED WELL YET **
Currently, we are using vmalloc() for all dirty bitmaps even though
they are small enough, say 256 bytes or less.
So we use kmalloc() if
On Thu, Oct 21, 2010 at 04:30:02PM +0800, Sheng Yang wrote:
On Wednesday 20 October 2010 16:26:32 Sheng Yang wrote:
This patch enable per-vector mask for assigned devices using MSI-X.
The basic idea of kernel and QEmu's responsibilities are:
1. Because QEmu owned the irq routing table, so
And restruct this block to call kvm_mce_in_exception() only when it is
required.
Signed-off-by: Hidetoshi Seto seto.hideto...@jp.fujitsu.com
---
target-i386/kvm.c | 16 ++--
1 files changed, 10 insertions(+), 6 deletions(-)
diff --git a/target-i386/kvm.c b/target-i386/kvm.c
index
There is no reason why SRAO event received by the main thread
is the only one that being broadcasted.
According to the x86 ASDM vol.3A 15.10.4.1,
MCE signal is broadcast on processor version 06H_EH or later.
This change is required to handle SRAR in smp guests.
Signed-off-by: Hidetoshi Seto
On 10/21/2010 10:45 AM, Takuya Yoshikawa wrote:
Well, 4K single buffer is 128MB worth of RAM. This won't help live
migration much, but will help vga dirty logging, which is active at
all times and uses much smaller memory slots. So I think it's
worthwhile.
Thanks, the patch I sent now
(2010/10/21 18:04), Avi Kivity wrote:
On 10/21/2010 10:45 AM, Takuya Yoshikawa wrote:
Well, 4K single buffer is 128MB worth of RAM. This won't help live migration
much, but will help vga dirty logging, which is active at all times and uses
much smaller memory slots. So I think it's
On 10/21/2010 08:46 AM, Sheng Yang wrote:
+ r = -EOPNOTSUPP;
If the guest assigned the device to another guest, it allows the nested
guest to kill the non-nested guest. Need to exit in a graceful fashion.
Don't understand... It wouldn't result in kill but return to
On Thu, Oct 21, 2010 at 11:27:30AM +0200, Avi Kivity wrote:
On 10/21/2010 08:46 AM, Sheng Yang wrote:
+ r = -EOPNOTSUPP;
If the guest assigned the device to another guest, it allows the nested
guest to kill the non-nested guest. Need to exit in a graceful fashion.
On 10/21/2010 11:24 AM, Michael S. Tsirkin wrote:
On Thu, Oct 21, 2010 at 11:27:30AM +0200, Avi Kivity wrote:
On 10/21/2010 08:46 AM, Sheng Yang wrote:
+ r = -EOPNOTSUPP;
If the guest assigned the device to another guest, it allows the nested
guest to kill
On 10/21/2010 04:00 AM, Kevin O'Connor wrote:
On Wed, Oct 20, 2010 at 11:34:41AM +0200, Gleb Natapov wrote:
In PIIX4 SCI (irq9) is active high. Seabios marks it so in interrupt
override table, but some OSes (FreeBSD) require the same information to
be present in DSDT too. Make it so.
Saving guest registers is just a memory copy, and does not need to be in the
critical section. Move outside the critical section to improve latency a
bit.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/svm.c | 10 +-
1 files changed, 5 insertions(+), 5 deletions(-)
diff
This patchset moves svm towards a lightweight vmload/vmsave path. It was
hindered by CVE-2010-3698 which was discovered during its development, and
by the lack of per-cpu IDT in Linux, which makes it more or less useless.
However, even so it's a slight improvement, and merging it will reduce the
ldt is never used in the kernel context; same goes for fs (x86_64) and gs
(i386). So save/restore them in the heavyweight exit path instead
of the lightweight path.
By itself, this doesn't buy us much, but it paves the way for moving vmload
and vmsave to the heavyweight exit path, since they
This abstraction only serves to obfuscate. Remove.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/svm.c | 25 ++---
1 files changed, 6 insertions(+), 19 deletions(-)
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index ec392d6..fad4038 100644
---
More members will join it soon.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/svm.c |8 +---
1 files changed, 5 insertions(+), 3 deletions(-)
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index 9d703e2..451590e 100644
--- a/arch/x86/kvm/svm.c
+++ b/arch/x86/kvm/svm.c
On 10/20/2010 02:16 PM, Dor Laor wrote:
On 10/20/2010 10:21 AM, Alexander Graf wrote:
On 19.10.2010, at 17:14, Chris Wright wrote:
Guest Agent
- have one coming RSN (poke Anthony for details)
Would there be a chance to have a single agent for everyone, so that
we actually form a Qemu agent
On 10/21/2010 12:22 PM, Andrew Beekhof wrote:
On 10/20/2010 02:16 PM, Dor Laor wrote:
On 10/20/2010 10:21 AM, Alexander Graf wrote:
On 19.10.2010, at 17:14, Chris Wright wrote:
Guest Agent
- have one coming RSN (poke Anthony for details)
Would there be a chance to have a single agent for
On Thu, Oct 21, 2010 at 11:47:18AM +0200, Avi Kivity wrote:
On 10/21/2010 11:24 AM, Michael S. Tsirkin wrote:
On Thu, Oct 21, 2010 at 11:27:30AM +0200, Avi Kivity wrote:
On 10/21/2010 08:46 AM, Sheng Yang wrote:
+r = -EOPNOTSUPP;
If the guest assigned the
Kernel 2.6.36 is baked, and so is the corresponding kvm-kmod now. A few
fixes went in since -rc6, see below.
This release also marks the end of life for the kvm-kmod-2.6.35 series -
although there are a few unreleased kvm-kmod fixes in git. But the very
same patches can be obtained via .36 now,
On 10/21/2010 02:45 AM, Paolo Bonzini wrote:
On 10/21/2010 03:14 AM, Alexander Graf wrote:
I agree that some agent code for basic stuff like live snapshot
sync with the filesystem is small enough and worth to host within
qemu. Maybe we do need more than one project?
No, please. That's exactly
On 10/21/2010 03:02 PM, Anthony Liguori wrote:
On 10/21/2010 02:45 AM, Paolo Bonzini wrote:
On 10/21/2010 03:14 AM, Alexander Graf wrote:
I agree that some agent code for basic stuff like live snapshot
sync with the filesystem is small enough and worth to host within
qemu. Maybe we do need
Hi Andrew,
On 10/21/2010 05:22 AM, Andrew Beekhof wrote:
Hello from the Matahari tech-lead...
Is there any documentation on the capabilities provided guest agent
Anthony is creating? Perhaps we can combine efforts.
Mike should be posting today or tomorrow.
Also happy to provide more
On Thu, Oct 21, 2010 at 08:09:44AM -0500, Anthony Liguori wrote:
Hi Andrew,
On 10/21/2010 05:22 AM, Andrew Beekhof wrote:
Hello from the Matahari tech-lead...
Is there any documentation on the capabilities provided guest agent
Anthony is creating? Perhaps we can combine efforts.
Mike
On 10/21/2010 08:18 AM, Daniel P. Berrange wrote:
On Thu, Oct 21, 2010 at 08:09:44AM -0500, Anthony Liguori wrote:
Hi Andrew,
On 10/21/2010 05:22 AM, Andrew Beekhof wrote:
Hello from the Matahari tech-lead...
Is there any documentation on the capabilities provided guest agent
As a preparation for providing little-endian bitops for all architectures,
This removes generic_ prefix from little-endian bitops function names
in asm-generic/bitops/le.h.
s/generic_find_next_le_bit/find_next_le_bit/
s/generic_find_next_zero_le_bit/find_next_zero_le_bit/
No need to include asm-generic/bitops/le.h as all architectures
provide little-endian bit operations now.
Signed-off-by: Akinobu Mita akinobu.m...@gmail.com
Cc: Avi Kivity a...@redhat.com
Cc: Marcelo Tosatti mtosa...@redhat.com
Cc: kvm@vger.kernel.org
---
No change from previous submission
On Thursday 21 October 2010, Akinobu Mita wrote:
As a preparation for providing little-endian bitops for all architectures,
This removes generic_ prefix from little-endian bitops function names
in asm-generic/bitops/le.h.
s/generic_find_next_le_bit/find_next_le_bit/
Add save/restore of MSR for migration and cpuid bit.
Signed-off-by: Gleb Natapov g...@redhat.com
---
v1-v2
- use vmstate subsection to migrate new msr.
diff --git a/qemu-kvm-x86.c b/qemu-kvm-x86.c
index 59aacd0..145c863 100644
--- a/qemu-kvm-x86.c
+++ b/qemu-kvm-x86.c
@@ -678,6 +678,9 @@
On 10/21/2010 03:32 PM, Anthony Liguori wrote:
On 10/21/2010 08:18 AM, Daniel P. Berrange wrote:
On Thu, Oct 21, 2010 at 08:09:44AM -0500, Anthony Liguori wrote:
Hi Andrew,
On 10/21/2010 05:22 AM, Andrew Beekhof wrote:
Hello from the Matahari tech-lead...
Is there any documentation on the
On Thu, Oct 21, 2010 at 05:08:45PM +0200, Gleb Natapov wrote:
Add save/restore of MSR for migration and cpuid bit.
Signed-off-by: Gleb Natapov g...@redhat.com
---
v1-v2
- use vmstate subsection to migrate new msr.
diff --git a/qemu-kvm-x86.c b/qemu-kvm-x86.c
index 59aacd0..145c863
On Thu, Oct 21, 2010 at 05:47:06PM +0900, Hidetoshi Seto wrote:
There is no reason why SRAO event received by the main thread
is the only one that being broadcasted.
According to the x86 ASDM vol.3A 15.10.4.1,
MCE signal is broadcast on processor version 06H_EH or later.
This change is
Hi,
Am trying to create a VM using qemu-kvm with two interfaces(fedora12
is the host and vm) and running into an issue. Given below is the
command :
qemu-kvm -net nic,macaddr=$macaddress,model=pcnet -net
tap,script=/etc/qemu-ifup -net nic,model=pcnet -net
tap,script=/etc/qemu-ifup -m 1024 -hda
Hi Andrew,
On 10/21/2010 10:43 AM, Andrew Beekhof wrote:
In that case we've done a bad job of the wiki.
Windows and other distributions are a key part of the Matahari vision.
Matahari is two things
- an architecture, and
- an implementation of the most common API sets
Each set of APIs (ie.
* Anthony Liguori (anth...@codemonkey.ws) wrote:
So there's no doubt in my mind that if you need a way to inventory
physical and virtual systems, something like Matahari becomes a very
appealing option to do that.
But that's not the problem space I'm trying to tackle.
An example of the
On Wed, Oct 20, 2010 at 06:34:54PM +0200, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
May otherwise generates build warnings about unused
kvm_read_and_reset_pf_reason if included without CONFIG_KVM_GUEST
enabled.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
On Wed, Oct 20, 2010 at 05:56:17PM +0200, Andi Kleen wrote:
From: Andi Kleen a...@linux.intel.com
gcc 4.5 with some special options is able to duplicate the VMX
context switch asm in vmx_vcpu_run(). This results in a compile error
because the inline asm sequence uses an on local label. The
commit 2bba4446746add456ceeb0e8359a43032a2ea333
Author: Alexander Graf ag...@suse.de
Date: Thu Dec 18 15:38:32 2008 +0100
Enable nested SVM support in userspace
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
---
target-i386/kvm.c |5 +
1 files changed, 5 insertions(+), 0
From: Hidetoshi Seto seto.hideto...@jp.fujitsu.com
And restruct this block to call kvm_mce_in_exception() only when it is
required.
Signed-off-by: Hidetoshi Seto seto.hideto...@jp.fujitsu.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
---
target-i386/kvm.c | 16 ++--
1
From: Hidetoshi Seto seto.hideto...@jp.fujitsu.com
There is no reason why SRAO event received by the main thread
is the only one that being broadcasted.
According to the x86 ASDM vol.3A 15.10.4.1,
MCE signal is broadcast on processor version 06H_EH or later.
This change is required to handle
And add kvm_has_msr_hsave_pa(), to avoid warnings on older
kernels without support.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
---
target-i386/kvm.c | 41 ++---
1 files changed, 30 insertions(+), 11 deletions(-)
diff --git a/target-i386/kvm.c
From: Hidetoshi Seto seto.hideto...@jp.fujitsu.com
This patch removes following warnings:
target-i386/kvm.c: In function 'kvm_put_msrs':
target-i386/kvm.c:782: error: unused variable 'i'
target-i386/kvm.c: In function 'kvm_get_msrs':
target-i386/kvm.c:1083: error: label at end of compound
The following changes since commit 633aa0acfe2c4d3e56acfe28c912796bf54de6d3:
Fix pci hotplug to generate level triggered interrupt. (2010-10-20 17:23:28
-0500)
are available in the git repository at:
git://git.kernel.org/pub/scm/virt/kvm/qemu-kvm.git uq/master
Hidetoshi Seto (3):
commit 6389c45441269baa2873e6feafebd17105ddeaf6
Author: Jan Kiszka jan.kis...@siemens.com
Date: Mon Mar 1 18:17:26 2010 +0100
qemu-kvm: Cleanup/fix TSC and PV clock writeback
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
---
target-i386/kvm.c | 10 +-
1 files changed, 9
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
---
target-i386/kvm.c | 30 --
1 files changed, 20 insertions(+), 10 deletions(-)
diff --git a/target-i386/kvm.c b/target-i386/kvm.c
index e2f7e2e..ae0a034 100644
--- a/target-i386/kvm.c
+++ b/target-i386/kvm.c
@@
On 10/21/2010 06:25 PM, Anthony Liguori wrote:
Hi Andrew,
On 10/21/2010 10:43 AM, Andrew Beekhof wrote:
In that case we've done a bad job of the wiki.
Windows and other distributions are a key part of the Matahari vision.
Matahari is two things
- an architecture, and
- an implementation of
: guest TSC will not be
reliable
The host being tested in this case was RHEL 5.5 i386. Command line of
the install test:
/usr/local/autotest/tests/kvm/qemu -name 'vm1' -monitor
unix:'/tmp/monitor-humanmonitor1-20101021-160403-PrKT',server,nowait -qmp
unix:'/tmp/monitor-qmpmonitor1-20101021-160403-PrKT
Hi. I want to build two KVM servers sharing an iSCSI
storage backend. The goal is if one server falls the
other starts all the guests.
I've been searching for documents about best practices
with KVM and iSCSI. I already read
http://pve.proxmox.com/wiki/Storage_Model
as adviced but I'd
On 10/21/2010 09:49 AM, Lucas Meneghel Rodrigues wrote:
Hi folks,
I was doing some work at one of our host machines, the one that runs
upstream (Fedora 14, kvm.git as the kernel and qemu-kvm.git as
userspace), and I noticed the kernel message:
kvm: unreliable cycle conversion on adjustable
On Thu, Oct 21, 2010 at 9:23 AM, Nirmal Guhan vavat...@gmail.com wrote:
Hi,
Am trying to create a VM using qemu-kvm with two interfaces(fedora12
is the host and vm) and running into an issue. Given below is the
command :
qemu-kvm -net nic,macaddr=$macaddress,model=pcnet -net
On Thu, Oct 21, 2010 at 05:40:33PM +0900, Takuya Yoshikawa wrote:
Currently x86's kvm_vm_ioctl_get_dirty_log() needs to allocate a bitmap by
vmalloc() which will be used in the next logging and this has been causing
bad effect to VGA and live-migration: vmalloc() consumes extra systime,
The Buildbot has detected a new failure of disable_kvm_i386_debian_5_0 on
qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/disable_kvm_i386_debian_5_0/builds/601
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build:
The Buildbot has detected a new failure of disable_kvm_x86_64_debian_5_0 on
qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/disable_kvm_x86_64_debian_5_0/builds/600
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build:
The Buildbot has detected a new failure of disable_kvm_i386_out_of_tree on
qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/disable_kvm_i386_out_of_tree/builds/549
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build:
The Buildbot has detected a new failure of disable_kvm_x86_64_out_of_tree on
qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/disable_kvm_x86_64_out_of_tree/builds/549
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build:
On Thursday 21 October 2010 16:39:07 Michael S. Tsirkin wrote:
On Thu, Oct 21, 2010 at 04:30:02PM +0800, Sheng Yang wrote:
On Wednesday 20 October 2010 16:26:32 Sheng Yang wrote:
This patch enable per-vector mask for assigned devices using MSI-X.
The basic idea of kernel and QEmu's
70 matches
Mail list logo