Hi Gerd,
On 08.06.2011 14:49, Gerd Hoffmann wrote:
Hi,
The sound device shows up under Windows7 and drivers are installed
automatically. Unfortunately it does not work. All the players I tried,
did not even start playing the sound file, although they detected the
DirectSound Device.
iso
Iordan Iordanov ior...@cdf.toronto.edu writes:
Does KVM support or plan to support differencing disks (where there is
a read-only source disk, and each person running a virtual machine can
save block-level changes that their virtual machine is making to the
disk in a separate differencing
On 06/09/2011 05:43 AM, Li, Xin wrote:
Do we have test cases with guest.wp=0 in KVM test suite?
Yes, see x86/access.c, AC_CPU_CR0_WP.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
Jan Kiszka jan.kis...@siemens.com writes:
[...]
Something else I may have missed?
Nothing critical, I'm just hoping someone finds the time to fix
sysconfigs loading when starting qemu from a build directory. :)
There's nice to have, important, critical, and really annoying. This
one's
On 2011-06-09 08:19, André Weidemann wrote:
Hi Gerd,
On 08.06.2011 14:49, Gerd Hoffmann wrote:
Hi,
The sound device shows up under Windows7 and drivers are installed
automatically. Unfortunately it does not work. All the players I tried,
did not even start playing the sound file, although
On 06/07/2011 03:59 PM, Xiao Guangrong wrote:
We already get the guest physical address, so use it to read guest data
directly to avoid walking guest page table again
Signed-off-by: Xiao Guangrongxiaoguangr...@cn.fujitsu.com
---
arch/x86/kvm/x86.c |3 +--
1 files changed, 1
On 06/09/2011 01:28 AM, Rusty Russell wrote:
after some preliminary discussion on the QEMU mailing list, I present a
draft specification for a virtio-based SCSI host (controller, HBA, you
name it).
OK, I'm impressed. This is very well written and it doesn't make any of
the obvious
On 06/07/2011 04:03 PM, Xiao Guangrong wrote:
Split kvm_mmu_free_page to kvm_mmu_free_lock_parts and
kvm_mmu_free_unlock_parts
One is used to free the parts which is under mmu lock and the other is
used to free the parts which can allow be freed out of mmu lock
It is used by later patch
Hi Jan,
On 09.06.2011 08:53, Jan Kiszka wrote:
On 2011-06-09 08:19, André Weidemann wrote:
Hi Gerd,
On 08.06.2011 14:49, Gerd Hoffmann wrote:
Hi,
The sound device shows up under Windows7 and drivers are installed
automatically. Unfortunately it does not work. All the players I tried,
did
On 2011-06-09 09:08, André Weidemann wrote:
Hi Jan,
On 09.06.2011 08:53, Jan Kiszka wrote:
On 2011-06-09 08:19, André Weidemann wrote:
Hi Gerd,
On 08.06.2011 14:49, Gerd Hoffmann wrote:
Hi,
The sound device shows up under Windows7 and drivers are installed
automatically. Unfortunately
On 06/07/2011 04:06 PM, Xiao Guangrong wrote:
Modify the default value to identify nontrap shadow pte and mmio shadow pte
whill will be introduced in later patch
Signed-off-by: Xiao Guangrongxiaoguangr...@cn.fujitsu.com
---
arch/x86/kvm/vmx.c |2 +-
1 files changed, 1 insertions(+), 1
From: Amos Kong ak...@redhat.com
Date: Thu, 09 Jun 2011 07:46:06 +0800
Perf shows a relatively high rate (about 8%) race in
spin_lock_irqsave() when doing netperf between external host and
guest. It's mainly becuase the lock contention between the
tun_do_read() and tun_xmit_skb(), so this
On 06/07/2011 04:07 PM, Xiao Guangrong wrote:
The idea is from Avi:
| We could cache the result of a miss in an spte by using a reserved bit, and
| checking the page fault error code (or seeing if we get an ept violation or
| ept misconfiguration), so if we get repeated mmio on a page, we don't
On 06/07/2011 03:58 PM, Xiao Guangrong wrote:
The idea of this patchset is from Avi:
| We could cache the result of a miss in an spte by using a reserved bit, and
| checking the page fault error code (or seeing if we get an ept violation or
| ept misconfiguration), so if we get repeated mmio on
On 06/07/2011 09:46 PM, Alex Williamson wrote:
Revert KVM: Save/restore state of assigned PCI device
From: Alex Williamsonalex.william...@redhat.com
This reverts ed78661f2614d3c9f69c23e280db3bafdabdf5bb as it assumes
the saved PCI state will remain valid for the entire length of time
that it
On 06/06/2011 10:57 PM, Jan Kiszka wrote:
Can we just drop a definition like this? When did we last use this?
(in fact I can't find when we *ever* used this)
The kernel interface was present between in 2.6.29 only. The fact that
we simply dropped that API (replacing it with the current
On 06/08/2011 09:10 PM, Iordan Iordanov wrote:
Hi,
As the subject suggests, we are wondering whether there is any way to
restrict certain classes of users from performing any action other
than powering a VM up and down, and resetting it?
If this can't be done with KVM, does anybody have
On 06/08/2011 06:27 AM, Vaibhav Nipunage wrote:
Hello,
I am trying to understand the kvm code. I am writing simple code in
which I want to send some message or notification from the guest to
host (qemu-kvm).
I thought of implementing some hypercalls in which, on some condition
this hypercall
On 05/27/2011 12:05 PM, Nikola Ciprich wrote:
Hello Avi,
Try appending ,cache=none to the -drive parameter?
nope, unfortunately same result :(
n.
Does installing the same guest software into a new image work?
--
error compiling committee.c: too many arguments to function
--
To unsubscribe
Hello,
On Thu, Jun 09, 2011 at 08:51:05AM +0930, Rusty Russell wrote:
On Wed, 08 Jun 2011 09:08:29 -0400, Mark Wu d...@redhat.com wrote:
Hi Rusty,
Yes, I can't figure out an instance of disk probing in parallel either, but
as
per the following commit, I think we still need use lock for
On 06/09/2011 05:14 AM, Tejun Heo wrote:
Hello,
On Thu, Jun 09, 2011 at 08:51:05AM +0930, Rusty Russell wrote:
On Wed, 08 Jun 2011 09:08:29 -0400, Mark Wu d...@redhat.com wrote:
Hi Rusty,
Yes, I can't figure out an instance of disk probing in parallel either, but
as
per the following
On 06/08/2011 03:45 AM, Alexander Graf wrote:
KVM has an ioctl to define which signal mask should be used while running
inside VCPU_RUN. At least for big endian systems, this mask is different
on 32-bit and 64-bit systems (though the size is identical).
Add a compat wrapper that converts the
This patch set tries to do some of the cleanups suggested by Ingo.
http://www.spinics.net/lists/kvm/msg55458.html
The end result may include a bit of my taste. So any comments will be
appreciated.
Thanks,
Takuya
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of
From: Takuya Yoshikawa yoshikawa.tak...@oss.ntt.co.jp
Avoid two step jumps to the error handling part. This eliminates the
use of the variables present and rsvd_fault.
We also mark the variables write/user/fetch_fault with const to show
these do not change in the function.
These were suggested
From: Takuya Yoshikawa yoshikawa.tak...@oss.ntt.co.jp
This will help us split out the big body of the walk loop later.
Signed-off-by: Takuya Yoshikawa yoshikawa.tak...@oss.ntt.co.jp
---
arch/x86/kvm/paging_tmpl.h | 16 +++-
1 files changed, 7 insertions(+), 9 deletions(-)
diff
From: Takuya Yoshikawa yoshikawa.tak...@oss.ntt.co.jp
This will help us split out the big body of the walk loop later.
The only functional change is when we return from walk_addr_generic()
with with an error. The original code did not change these but the new
one may change. But this should be
From: Takuya Yoshikawa yoshikawa.tak...@oss.ntt.co.jp
The code has clearly suffered from over inlining. So make the body of
the walk loop a separate function: do_walk().
This will make it easy to do more cleanups and optimizations later.
This was suggested by Ingo Molnar.
Cc: Ingo Molnar
* Takuya Yoshikawa takuya.yoshik...@gmail.com wrote:
+/*
+ * do_walk() returns one of these.
+ *
+ * WALK_NEXT:Continue the walk loop.
+ * WALK_DONE:Break from the walk loop.
+ * WALK_RETRY: Retry walk.
+ * WALK_NOT_PRESENT: Set
On 2011-06-09 17:13, malc wrote:
On Thu, 9 Jun 2011, Jan Kiszka wrote:
On 2011-06-09 09:08, Andr? Weidemann wrote:
Hi Jan,
On 09.06.2011 08:53, Jan Kiszka wrote:
On 2011-06-09 08:19, Andr? Weidemann wrote:
Hi Gerd,
On 08.06.2011 14:49, Gerd Hoffmann wrote:
Hi,
The sound device shows
On 06/09/2011 02:24 PM, Avi Kivity wrote:
On 06/08/2011 03:45 AM, Alexander Graf wrote:
KVM has an ioctl to define which signal mask should be used while running
inside VCPU_RUN. At least for big endian systems, this mask is different
on 32-bit and 64-bit systems (though the size is identical).
On Thu, 9 Jun 2011, Jan Kiszka wrote:
On 2011-06-09 17:13, malc wrote:
On Thu, 9 Jun 2011, Jan Kiszka wrote:
[..snip..]
Sound output over (at least) ALSA is not smoothly working in polled
mode. It's similar to [1], which is yet unsolved.
Jan
[1]
On Thu, 9 Jun 2011, Jan Kiszka wrote:
On 2011-06-09 09:08, Andr? Weidemann wrote:
Hi Jan,
On 09.06.2011 08:53, Jan Kiszka wrote:
On 2011-06-09 08:19, Andr? Weidemann wrote:
Hi Gerd,
On 08.06.2011 14:49, Gerd Hoffmann wrote:
Hi,
The sound device shows up under Windows7 and
On 2011-06-09 18:09, malc wrote:
On Thu, 9 Jun 2011, Jan Kiszka wrote:
On 2011-06-09 17:13, malc wrote:
On Thu, 9 Jun 2011, Jan Kiszka wrote:
[..snip..]
Sound output over (at least) ALSA is not smoothly working in polled
mode. It's similar to [1], which is yet unsolved.
Jan
[1]
On Tue, Jun 07, 2011 at 11:24:49AM +0300, Avi Kivity wrote:
On 06/06/2011 08:27 PM, Marcelo Tosatti wrote:
Only decache guest CR3 value if vcpu-arch.cr3 is stale.
Fixes loadvm with live guest.
@@ -2049,7 +2049,9 @@ static void ept_update_paging_mode_cr0(unsigned long
*hw_cr0,
On Wed, Jun 08, 2011 at 04:11:05PM +0200, Jan Kiszka wrote:
kvm_arch_get_supported_cpuid checks for global cpuid restrictions, it
does not require any CPUState reference. Changing its interface allows
to call it before any VCPU is initialized.
I'm wondering if it wouldn't be simpler to keep
On 2011-06-09 19:33, Eduardo Habkost wrote:
On Wed, Jun 08, 2011 at 04:11:05PM +0200, Jan Kiszka wrote:
kvm_arch_get_supported_cpuid checks for global cpuid restrictions, it
does not require any CPUState reference. Changing its interface allows
to call it before any VCPU is initialized.
I'm
On Thu, Jun 09, 2011 at 07:41:03PM +0200, Jan Kiszka wrote:
snip
I'm wondering if it wouldn't be simpler to keep the existing interface
but just initialize CPUState-kvm_state earlier (today it is initialized
only on kvm_init_vcpu(), although the kvm_state global is initialized
much
On 2011-06-09 20:08, Eduardo Habkost wrote:
On Thu, Jun 09, 2011 at 07:41:03PM +0200, Jan Kiszka wrote:
snip
I'm wondering if it wouldn't be simpler to keep the existing interface
but just initialize CPUState-kvm_state earlier (today it is initialized
only on kvm_init_vcpu(), although the
On Tue, Jun 07, 2011 at 09:04:34PM +0800, Xiao Guangrong wrote:
Using rcu to protect shadow pages table to be freed, so we can safely walk it,
it should run fast and is needed by mmio page fault
A couple of question below.
Thanx, Paul
On Thu, Jun 09, 2011 at 01:02:13AM +0800, Brad Campbell wrote:
On 08/06/11 11:59, Eric Dumazet wrote:
Well, a bisection definitely should help, but needs a lot of time in
your case.
Yes. compile, test, crash, walk out to the other building to press
reset, lather, rinse, repeat.
I need
host kernel: 2.6.39-rc2+
qemu-kvm : 05f1737582ab6c075476bde931c5eafbc62a9349
(gdb) r -monitor stdio -m 800 ~/RHEL-Server-6.0-64-virtio.qcow2 -snapshot
-device virtio-net-pci,netdev=he -netdev tap,vhost=on,id=he
(qemu) [New Thread 0x7fffbe7dd700 (LWP 10410)]
[New Thread 0x7fffbdfdc700 (LWP
On 06/09/2011 03:28 PM, Avi Kivity wrote:
Maybe it's time to kill off bypass_guest_pf=1. It's not as effective as it
used to be, since unsync pages always use shadow_trap_nonpresent_pte, and
since we convert between the two nonpresent_ptes during sync and unsync.
Reasonable!
diff
On 06/09/2011 03:07 PM, Avi Kivity wrote:
On 06/07/2011 04:03 PM, Xiao Guangrong wrote:
Split kvm_mmu_free_page to kvm_mmu_free_lock_parts and
kvm_mmu_free_unlock_parts
One is used to free the parts which is under mmu lock and the other is
used to free the parts which can allow be freed out
On 06/09/2011 02:59 PM, Avi Kivity wrote:
This breaks is addr/bytes spans a page boundary.
(the current code is also broken, but only for mmio; the new code is broken
for ram as well).
We need a gva_to_gpa() that returns a range of pages.
Thanks for you point it out, will fix it in
On 06/09/2011 03:39 PM, Avi Kivity wrote:
First, I think we should consider dropping bypass_guest_pf completely, just
so we have less things to think about.
I agree.
I'm also not sure RCU is enough protection - we can unlink a page in the
middle of a hierarchy,
I think it is ok, it
On 06/10/2011 04:09 AM, Paul E. McKenney wrote:
On Tue, Jun 07, 2011 at 09:04:34PM +0800, Xiao Guangrong wrote:
Using rcu to protect shadow pages table to be freed, so we can safely walk
it,
it should run fast and is needed by mmio page fault
A couple of question below.
Thanks for your
46 matches
Mail list logo