On Wed, Nov 2, 2011 at 7:41 AM, Sasha Levin wrote:
> This patch hooks AIO support into virtio-blk, allowing for faster IO.
>
> Signed-off-by: Sasha Levin
Applied the whole series, thanks a lot Sasha!
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to ma
At 11/02/2011 03:11 AM, Michael S. Tsirkin Write:
> So here's the plan: move all hotplug handling out
> to ssdt, this way it'll keep working even with a
> user-supplied dsdt. Next step we can patch
> this ssdt at runtime.
>
> There's little point in this change alone, so posting as RFC,
> will rep
This patch hooks AIO support into virtio-blk, allowing for faster IO.
Signed-off-by: Sasha Levin
---
tools/kvm/disk/core.c | 39 ++-
tools/kvm/disk/qcow.c |4 +++
tools/kvm/disk/raw.c | 36 +++
This patch adds basic native vectored AIO functions.
These functions should be optimized to process multiple io
requests at once.
Signed-off-by: Sasha Levin
---
tools/kvm/Makefile |7 +++
tools/kvm/config/feature-tests.mak | 10 ++
tools/kvm/include/kvm/read-wr
This patch connects the completion processing in virtio-blk to the completion
notification coming from disk image.
Signed-off-by: Sasha Levin
---
tools/kvm/virtio/blk.c | 10 ++
1 files changed, 6 insertions(+), 4 deletions(-)
diff --git a/tools/kvm/virtio/blk.c b/tools/kvm/virtio/blk
This patch splits IO request processing from completion notification.
Signed-off-by: Sasha Levin
---
tools/kvm/disk/core.c |6 +-
tools/kvm/include/kvm/disk-image.h |4 +-
tools/kvm/include/kvm/virtio-blk.h |1 +
tools/kvm/virtio/blk.c | 111
It is no longer needed due to previous changes.
Signed-off-by: Sasha Levin
---
tools/kvm/disk/qcow.c |9 -
1 files changed, 0 insertions(+), 9 deletions(-)
diff --git a/tools/kvm/disk/qcow.c b/tools/kvm/disk/qcow.c
index ba65ab6..f9598de 100644
--- a/tools/kvm/disk/qcow.c
+++ b/tool
This patch adds an optional callback to be called when a disk op completes.
Currently theres not much use for it, but it is the infrastructure for adding
aio support.
Signed-off-by: Sasha Levin
---
tools/kvm/disk/core.c | 22 ++
tools/kvm/disk/qcow.c
In case a read or write op ptr is missing simply ignore it instead of
critically failing. This provides an easier way to prevent read or write
in specific scenarios.
Signed-off-by: Sasha Levin
---
tools/kvm/disk/core.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/t
This patch modifies the definition and usage of ops for read only, mmap and
regular IO.
There is no longer a mix between iov and mmap, and read only no longer implies
mmap (although it will try to use it first).
This allows for more flexibility defining different ops for different
scenarios.
Sig
Signed-off-by: Sasha Levin
---
tools/kvm/disk/core.c | 48 ++
tools/kvm/disk/qcow.c | 47 +++--
tools/kvm/disk/raw.c | 50 +---
tools/kvm/include/kvm/disk-imag
Signed-off-by: Sasha Levin
---
tools/kvm/disk/qcow.c |8
tools/kvm/disk/raw.c |2 +-
tools/kvm/include/kvm/disk-image.h |7 +--
3 files changed, 10 insertions(+), 7 deletions(-)
diff --git a/tools/kvm/disk/qcow.c b/tools/kvm/disk/qcow.c
index 1
Hi,
In case of direct io, without the interrupt remapping in IOMMU (intel
VT-d or AMD IOMMU), hypervisor needs to inject interrupt for guest
when the guest is scheduled to specific CPU. At the beginning I
thought with IOMMU's interrupt remapping, the hardware can directly
forward the interrupt to
On Wed, 2011-11-02 at 11:39 +1030, Rusty Russell wrote:
> On Tue, 1 Nov 2011 14:42:23 +0200, "Michael S. Tsirkin"
> wrote:
> > On Tue, Nov 01, 2011 at 02:33:33PM +0200, Sasha Levin wrote:
> > > Unless Michael pointed this patch out, it would have broken (at least)
> > > the kvm tool in a non obvi
On Tue, 1 Nov 2011 14:42:23 +0200, "Michael S. Tsirkin" wrote:
> On Tue, Nov 01, 2011 at 02:33:33PM +0200, Sasha Levin wrote:
> > A proper solution would be for example a configuration in the PIO config
> > space which points to the MMIO BAR to use instead.
>
> I think it makes sense to put the c
On Tue, 1 Nov 2011 16:40:45 +0200, "Michael S. Tsirkin" wrote:
> On Thu, Oct 06, 2011 at 11:18:28AM -0200, Michael S. Tsirkin wrote:
> > On Thu, Oct 06, 2011 at 12:15:36PM +1030, Rusty Russell wrote:
> > > On Wed, 05 Oct 2011 15:54:05 -0400, Christoph Hellwig
> > > wrote:
> > > > Split virtqueue
The host side pv mmu support has been marked for feature removal in
January 2011. It's not in use, is slower than shadow or hardware
assisted paging, and a maintenance burden. It's November 2011, time to
remove it.
Signed-off-by: Chris Wright
---
- v2 rebase to b796a09c
Documentation/feature
This has not been used for some years now. It's time to remove it.
Signed-off-by: Chris Wright
---
- v2 rebase to b796a09c
arch/x86/kernel/kvm.c | 181 -
1 files changed, 0 insertions(+), 181 deletions(-)
diff --git a/arch/x86/kernel/kvm.c b/a
This feature hasn't been in use for some years now. The host side bits
are deprecated for almost a year. The guest side would only get used
on old hosts, and it's slower than shadow or hw assisted paging.
Time to remove it.
Chris Wright (2):
KVM Guest: remove KVM guest pv mmu support
On Tue, Nov 1, 2011 at 11:10 AM, Jorge Lucangeli Obes
wrote:
> On Tue, Nov 1, 2011 at 9:29 AM, Gerd Hoffmann wrote:
>> Hi,
>>
>>> (outside-OK) $ qemu-system-x86_64 -version
>>> QEMU emulator version 0.15.0 (qemu-kvm-0.15.0)
>>>
>>> (inside-slow) $ qemu-system-x86_64 -version
>>> QEMU PC emulator
On Tue, Nov 01, 2011 at 09:11:40PM +0200, Michael S. Tsirkin wrote:
> So here's the plan: move all hotplug handling out
> to ssdt, this way it'll keep working even with a
> user-supplied dsdt. Next step we can patch
> this ssdt at runtime.
>
> There's little point in this change alone, so posting
On Tue, 01 Nov 2011, Anthony Liguori wrote:
> On 10/31/2011 03:07 PM, Eric B Munson wrote:
> >Now that we have a flag that will tell the guest it was suspended, create an
> >interface for that communication using a KVM ioctl.
> >
> >Signed-off-by: Eric B Munson
> >---
> >Changes from V1:
> > Add
On Tue, 01 Nov 2011, Anthony Liguori wrote:
> On 11/01/2011 02:51 PM, Eric B Munson wrote:
> >On Tue, 01 Nov 2011, Anthony Liguori wrote:
> >
> >>On 10/31/2011 03:07 PM, Eric B Munson wrote:
> >>>The KVM_GUEST_PAUSED flag will prevent a guest from compaining about a soft
> >>>lockup but it can mas
On Tue, 01 Nov 2011, Anthony Liguori wrote:
> On 10/31/2011 03:07 PM, Eric B Munson wrote:
> >When a host stops or suspends a VM it will set a flag to show this. The
> >watchdog will use these functions to determine if a softlockup is real, or
> >the
> >result of a suspended VM.
> >
> >Signed-of
On 11/01/2011 02:51 PM, Eric B Munson wrote:
On Tue, 01 Nov 2011, Anthony Liguori wrote:
On 10/31/2011 03:07 PM, Eric B Munson wrote:
The KVM_GUEST_PAUSED flag will prevent a guest from compaining about a soft
lockup but it can mask real soft lockups if the flag isn't cleared when it is
no lon
On Tue, 01 Nov 2011, Anthony Liguori wrote:
> On 10/31/2011 03:07 PM, Eric B Munson wrote:
> >The KVM_GUEST_PAUSED flag will prevent a guest from compaining about a soft
> >lockup but it can mask real soft lockups if the flag isn't cleared when it is
> >no longer relevant. This patch adds a kvm i
On 10/31/2011 03:07 PM, Eric B Munson wrote:
The KVM_GUEST_PAUSED flag will prevent a guest from compaining about a soft
lockup but it can mask real soft lockups if the flag isn't cleared when it is
no longer relevant. This patch adds a kvm ioctl that the hypervisor will use
when it resumes a gu
On 10/31/2011 03:07 PM, Eric B Munson wrote:
Now that we have a flag that will tell the guest it was suspended, create an
interface for that communication using a KVM ioctl.
Signed-off-by: Eric B Munson
---
Changes from V1:
Add kvm_set_host_stopped to arch/x86/jvm/x86.c instead of kvmclock.c
On 10/31/2011 03:07 PM, Eric B Munson wrote:
When a host stops or suspends a VM it will set a flag to show this. The
watchdog will use these functions to determine if a softlockup is real, or the
result of a suspended VM.
Signed-off-by: Eric B Munson
---
arch/x86/include/asm/pvclock.h |2
On 10/31/2011 03:07 PM, Eric B Munson wrote:
This flag will be used to check if the vm was stopped by the host when a soft
lockup was detected.
Signed-off-by: Eric B Munson
Adding Jeremy since the pvclock ABI is shared across Xen and KVM.
Regards,
Anthony Liguori
---
arch/x86/include/asm
So here's the plan: move all hotplug handling out
to ssdt, this way it'll keep working even with a
user-supplied dsdt. Next step we can patch
this ssdt at runtime.
There's little point in this change alone, so posting as RFC,
will repost with the patching part when it's ready,
posting now to prese
On 2011-11-01 17:15, Roedel, Joerg wrote:
> On Tue, Nov 01, 2011 at 11:49:42AM -0400, Jan Kiszka wrote:
>> On 2011-11-01 16:30, Roedel, Joerg wrote:
>>> On Tue, Nov 01, 2011 at 09:39:49AM -0400, Jan Kiszka wrote:
> So SVM does not guarantee that an intercept during a task-switch can be
> re
On Tue, Nov 1, 2011 at 9:29 AM, Gerd Hoffmann wrote:
> Hi,
>
>> (outside-OK) $ qemu-system-x86_64 -version
>> QEMU emulator version 0.15.0 (qemu-kvm-0.15.0)
>>
>> (inside-slow) $ qemu-system-x86_64 -version
>> QEMU PC emulator version 0.12.5 (qemu-kvm-0.12.5)
>>
>> However, running outside the ch
On Tue, Nov 01, 2011 at 10:20:04AM -0600, David Ahern wrote:
>
>
> On 11/01/2011 10:13 AM, Gleb Natapov wrote:
> > On Tue, Nov 01, 2011 at 09:49:19AM -0600, David Ahern wrote:
> >> On 10/30/2011 10:53 AM, Gleb Natapov wrote:
> >>> KVM needs to know perf capability to decide which PMU it can expos
Hi,
> (outside-OK) $ qemu-system-x86_64 -version
> QEMU emulator version 0.15.0 (qemu-kvm-0.15.0)
>
> (inside-slow) $ qemu-system-x86_64 -version
> QEMU PC emulator version 0.12.5 (qemu-kvm-0.12.5)
>
> However, running outside the chroot was also OK with 0.12.3.
>
> What could be causing this
On 11/01/2011 10:40 AM, Gleb Natapov wrote:
If PERF_EVENTS is disabled in the host kernel will KVM return the right
thing for the guest that might have PERF_EVENTS enabled?
>>> With correct implementation of perf_get_x86_pmu_capability() it should.
>>> PERF_EVENTS disable version s
On Tue, Nov 1, 2011 at 6:06 PM, Sasha Levin wrote:
> This patch hooks AIO support into virtio-blk, allowing for faster IO.
>
> Signed-off-by: Sasha Levin
It turns out libaio is not installed on my Fedora 15 by default. Can
we do CONFIG_HAS_LIBAIO thing like we do with SDL, please?
On Tue, Nov 01, 2011 at 10:24:41AM -0600, David Ahern wrote:
>
>
> On 11/01/2011 10:18 AM, Gleb Natapov wrote:
> > On Tue, Nov 01, 2011 at 09:49:27AM -0600, David Ahern wrote:
> >> On 10/30/2011 10:53 AM, Gleb Natapov wrote:
> >>> From: Avi Kivity
> >>>
> >>> Provide a CPUID leaf that describes
hi,
here is what i understand how mmio is handled in kvm.
- mmio range is registered with kvm from userspace.
- this range is then write-protected in kernel
- mmio write will be handled as page-fault inside kernel
- so there is no userspace is involved when mmio write is handled.
please can some
This patch adds an option to provide information about redirection
of terminal redirection to a PTY device within 'kvm stat'.
Usage:
'kvm stat -p [term] -n [instance_name]'
Will print information about redirection of terminal 'term' int instance
'instance_name'.
Cc: Osier Yang
Signed-of
On 11/01/2011 10:18 AM, Gleb Natapov wrote:
> On Tue, Nov 01, 2011 at 09:49:27AM -0600, David Ahern wrote:
>> On 10/30/2011 10:53 AM, Gleb Natapov wrote:
>>> From: Avi Kivity
>>>
>>> Provide a CPUID leaf that describes the emulated PMU.
>>>
>>> Signed-off-by: Avi Kivity
>>> Signed-off-by: Gleb
On 11/01/2011 10:13 AM, Gleb Natapov wrote:
> On Tue, Nov 01, 2011 at 09:49:19AM -0600, David Ahern wrote:
>> On 10/30/2011 10:53 AM, Gleb Natapov wrote:
>>> KVM needs to know perf capability to decide which PMU it can expose to a
>>> guest.
>>>
>>> Signed-off-by: Gleb Natapov
>>> ---
>>> arch/
On Tue, Nov 01, 2011 at 09:49:27AM -0600, David Ahern wrote:
> On 10/30/2011 10:53 AM, Gleb Natapov wrote:
> > From: Avi Kivity
> >
> > Provide a CPUID leaf that describes the emulated PMU.
> >
> > Signed-off-by: Avi Kivity
> > Signed-off-by: Gleb Natapov
> > ---
> > arch/x86/kvm/x86.c | 23
On 11/01/2011 03:58 AM, Avi Kivity wrote:
> On 10/31/2011 10:12 PM, Scott Wood wrote:
+4.59 KVM_DIRTY_TLB
+
+Capability: KVM_CAP_SW_TLB
+Architectures: ppc
+Type: vcpu ioctl
+Parameters: struct kvm_dirty_tlb (in)
+Returns: 0 on success, -1 on error
+
+st
On Tue, Nov 01, 2011 at 11:49:42AM -0400, Jan Kiszka wrote:
> On 2011-11-01 16:30, Roedel, Joerg wrote:
> > On Tue, Nov 01, 2011 at 09:39:49AM -0400, Jan Kiszka wrote:
> >>> So SVM does not guarantee that an intercept during a task-switch can be
> >>> restarted.
> >>
> >> Not a bug but still a defi
On Tue, Nov 01, 2011 at 09:49:19AM -0600, David Ahern wrote:
> On 10/30/2011 10:53 AM, Gleb Natapov wrote:
> > KVM needs to know perf capability to decide which PMU it can expose to a
> > guest.
> >
> > Signed-off-by: Gleb Natapov
> > ---
> > arch/x86/include/asm/perf_event.h | 11 +++
On 11/01/2011 12:17 PM, kvm-autotest wrote:
Job ID: 2011
Job name: Upstream qemu-kvm.git sanity 11-01-2011 00:04:02
Summary: Host: Status: Completed
Status: 1 Completed
Execution time (HH:MM:SS): 01:17:02
User tests executed: 19
User tests passed: 18
User tests failed: 1
User tests success rate:
This patch hooks AIO support into virtio-blk, allowing for faster IO.
Signed-off-by: Sasha Levin
---
tools/kvm/disk/core.c | 35 +--
tools/kvm/disk/qcow.c |4
tools/kvm/disk/raw.c | 20
tool
This patch adds basic native vectored AIO functions.
These functions should be optimized to process multiple io
requests at once.
Signed-off-by: Sasha Levin
---
tools/kvm/Makefile |1 +
tools/kvm/include/kvm/read-write.h |6 ++
tools/kvm/read-write.c |
This patch connects the completion processing in virtio-blk to the completion
notification coming from disk image.
Signed-off-by: Sasha Levin
---
tools/kvm/virtio/blk.c | 10 ++
1 files changed, 6 insertions(+), 4 deletions(-)
diff --git a/tools/kvm/virtio/blk.c b/tools/kvm/virtio/blk
This patch splits IO request processing from completion notification.
Signed-off-by: Sasha Levin
---
tools/kvm/disk/core.c |6 +-
tools/kvm/include/kvm/disk-image.h |4 +-
tools/kvm/include/kvm/virtio-blk.h |1 +
tools/kvm/virtio/blk.c | 111
It is no longer needed due to previous changes.
Signed-off-by: Sasha Levin
---
tools/kvm/disk/qcow.c |9 -
1 files changed, 0 insertions(+), 9 deletions(-)
diff --git a/tools/kvm/disk/qcow.c b/tools/kvm/disk/qcow.c
index ba65ab6..f9598de 100644
--- a/tools/kvm/disk/qcow.c
+++ b/tool
In case a read or write op ptr is missing simply ignore it instead of
critically failing. This provides an easier way to prevent read or write
in specific scenarios.
Signed-off-by: Sasha Levin
---
tools/kvm/disk/core.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/t
This patch adds an optional callback to be called when a disk op completes.
Currently theres not much use for it, but it is the infrastructure for adding
aio support.
Signed-off-by: Sasha Levin
---
tools/kvm/disk/core.c | 22 ++
tools/kvm/disk/qcow.c
This patch modifies the definition and usage of ops for read only, mmap and
regular IO.
There is no longer a mix between iov and mmap, and read only no longer implies
mmap (although it will try to use it first).
This allows for more flexibility defining different ops for different
scenarios.
Sig
Signed-off-by: Sasha Levin
---
tools/kvm/disk/core.c | 48 ++
tools/kvm/disk/qcow.c | 47 +++--
tools/kvm/disk/raw.c | 50 +---
tools/kvm/include/kvm/disk-imag
Signed-off-by: Sasha Levin
---
tools/kvm/disk/qcow.c |8
tools/kvm/disk/raw.c |2 +-
tools/kvm/include/kvm/disk-image.h |7 +--
3 files changed, 10 insertions(+), 7 deletions(-)
diff --git a/tools/kvm/disk/qcow.c b/tools/kvm/disk/qcow.c
index 1
On Sun, Oct 30, 2011 at 7:41 AM, Avi Kivity wrote:
> On 10/20/2011 05:30 AM, Jorge Lucangeli Obes wrote:
>> https://docs.google.com/leaf?id=0B78o7gMWkuFeNmJlYzNiNWYtMGQ4MS00NzhiLWIyNTMtY2NlNWEzNzQ5NGYx&hl=en_US
>>
>>
>
> The logs show lots of accesses to the vga region at 0xa instead of
> the
On 2011-11-01 16:30, Roedel, Joerg wrote:
> On Tue, Nov 01, 2011 at 09:39:49AM -0400, Jan Kiszka wrote:
>>> So SVM does not guarantee that an intercept during a task-switch can be
>>> restarted.
>>
>> Not a bug but still a deficit as it makes hardware-assisted task
>> switching practically useless,
On 10/30/2011 10:53 AM, Gleb Natapov wrote:
> From: Avi Kivity
>
> Provide a CPUID leaf that describes the emulated PMU.
>
> Signed-off-by: Avi Kivity
> Signed-off-by: Gleb Natapov
> ---
> arch/x86/kvm/x86.c | 23 ++-
> 1 files changed, 22 insertions(+), 1 deletions(-)
>
On 10/30/2011 10:53 AM, Gleb Natapov wrote:
> KVM needs to know perf capability to decide which PMU it can expose to a
> guest.
>
> Signed-off-by: Gleb Natapov
> ---
> arch/x86/include/asm/perf_event.h | 11 +++
> arch/x86/kernel/cpu/perf_event.c | 11 +++
> arch/x
On Tue, Nov 01, 2011 at 09:39:49AM -0400, Jan Kiszka wrote:
> > So SVM does not guarantee that an intercept during a task-switch can be
> > restarted.
>
> Not a bug but still a deficit as it makes hardware-assisted task
> switching practically useless, no?
Not entirely. For hypervisors that can g
On Thu, Oct 06, 2011 at 11:18:28AM -0200, Michael S. Tsirkin wrote:
> On Thu, Oct 06, 2011 at 12:15:36PM +1030, Rusty Russell wrote:
> > On Wed, 05 Oct 2011 15:54:05 -0400, Christoph Hellwig
> > wrote:
> > > Split virtqueue_kick to be able to do the actual notification outside the
> > > lock prot
Hi there,
I'm generating some slides on guest debugging via kvm. What's the
current state for Book-E and Book-S? Works out of box, mostly usable, or
to be implemented? Is anyone using it?
Thanks,
Jan
signature.asc
Description: OpenPGP digital signature
On Tue, Nov 01, 2011 at 02:30:41PM +0200, Gleb Natapov wrote:
> >
> > > +
> > > +static void kvm_perf_overflow(struct perf_event *perf_event,
> > > + struct perf_sample_data *data,
> > > + struct pt_regs *regs)
> > > +{
> > > + struct kvm_pmc *pmc = perf
On Mon, Oct 31, 2011 at 08:09:31PM +0100, Juan Quintela wrote:
>
> Hi
>
> Please send in any agenda items you are interested in covering.
>
> Thanks, Juan.
>
> PD. Tomorrow is a Spanish holiday, so I would not attend the call.
As there are no agenda items, todays call is cancelled.
Justin
--
On 2011-11-01 12:13, Roedel, Joerg wrote:
> On Tue, Oct 18, 2011 at 01:37:32PM -0400, Avi Kivity wrote:
>> On 10/18/2011 06:35 PM, Roedel, Joerg wrote:
>>> On Tue, Oct 18, 2011 at 12:23:11PM -0400, Jan Kiszka wrote:
AMD processors apparently have a bug in the hardware task switching
suppo
On Tue, 2011-11-01 at 14:42 +0200, Michael S. Tsirkin wrote:
> On Tue, Nov 01, 2011 at 02:33:33PM +0200, Sasha Levin wrote:
> > On Tue, 2011-11-01 at 13:45 +0200, Michael S. Tsirkin wrote:
> > > On Tue, Nov 01, 2011 at 10:39:08AM +1030, Rusty Russell wrote:
> > > > * [new tag] ru...@rustco
On Tue, Nov 01, 2011 at 02:33:33PM +0200, Sasha Levin wrote:
> On Tue, 2011-11-01 at 13:45 +0200, Michael S. Tsirkin wrote:
> > On Tue, Nov 01, 2011 at 10:39:08AM +1030, Rusty Russell wrote:
> > > * [new tag] ru...@rustcorp.com.au-v3.1-7196-gac5be1e ->
> > > ru...@rustcorp.com.au-v3.1-719
On Tue, 2011-11-01 at 13:45 +0200, Michael S. Tsirkin wrote:
> On Tue, Nov 01, 2011 at 10:39:08AM +1030, Rusty Russell wrote:
> > * [new tag] ru...@rustcorp.com.au-v3.1-7196-gac5be1e ->
> > ru...@rustcorp.com.au-v3.1-7196-gac5be1e
> >
> > The following changes since commit 839d8810747bbf
On Tue, Nov 01, 2011 at 12:47:18PM +0200, Avi Kivity wrote:
> On 10/30/2011 06:53 PM, Gleb Natapov wrote:
> > From: Avi Kivity
>
> This has changed significantly, so please update the authorship. You
> can say 'based on original patch by ...' to provide due credit.
>
> > Use perf_events to emul
On 10/31/11 10:39 AM, "Rose, Gregory V" wrote:
>> -Original Message-
>> From: Roopa Prabhu [mailto:ropra...@cisco.com]
>> Sent: Monday, October 31, 2011 10:09 AM
>> To: Rose, Gregory V; net...@vger.kernel.org
>> Cc: s...@us.ibm.com; dragos.tatu...@gmail.com; kvm@vger.kernel.org;
>> a..
On Tue, Nov 01, 2011 at 12:51:53PM +0200, Avi Kivity wrote:
> On 10/30/2011 06:53 PM, Gleb Natapov wrote:
> > From: Avi Kivity
> >
> > Provide a CPUID leaf that describes the emulated PMU.
> >
> > Signed-off-by: Avi Kivity
> > Signed-off-by: Gleb Natapov
> > ---
> > arch/x86/kvm/x86.c | 23 ++
On Tue, Nov 1, 2011 at 1:43 PM, Sasha Levin wrote:
> How would you implement the fallback thing we have in RO images now?
> declare all those ops as global variables?
Yes.
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More
On Tue, 2011-11-01 at 13:30 +0200, Pekka Enberg wrote:
> Hi Sasha,
>
> On Sun, Oct 30, 2011 at 7:35 PM, Sasha Levin wrote:
> >> > This makes passing different ops structures easier since you don't have
> >> > to keep them somewhere else after initializing disk_image.
> >> >
> >> > Signed-off-by:
On Tue, Nov 01, 2011 at 10:39:08AM +1030, Rusty Russell wrote:
> * [new tag] ru...@rustcorp.com.au-v3.1-7196-gac5be1e ->
> ru...@rustcorp.com.au-v3.1-7196-gac5be1e
>
> The following changes since commit 839d8810747bbf39e0a5a7f223b67bffa7945f8d:
>
> Merge branch 'i2c-for-linus' of
> g
Hi Sasha,
On Sun, Oct 30, 2011 at 7:35 PM, Sasha Levin wrote:
>> > This makes passing different ops structures easier since you don't have
>> > to keep them somewhere else after initializing disk_image.
>> >
>> > Signed-off-by: Sasha Levin
On Tue, 2011-11-01 at 08:44 +0200, Pekka Enberg wrote:
On Tue, 2011-11-01 at 08:44 +0200, Pekka Enberg wrote:
> On Sun, Oct 30, 2011 at 7:35 PM, Sasha Levin wrote:
> > This makes passing different ops structures easier since you don't have
> > to keep them somewhere else after initializing disk_image.
> >
> > Signed-off-by: Sasha Levin
>
> Why do we
On Tue, Oct 18, 2011 at 01:37:32PM -0400, Avi Kivity wrote:
> On 10/18/2011 06:35 PM, Roedel, Joerg wrote:
> > On Tue, Oct 18, 2011 at 12:23:11PM -0400, Jan Kiszka wrote:
> > > AMD processors apparently have a bug in the hardware task switching
> > > support when NPT is enabled. If the task switch
On 10/30/2011 06:53 PM, Gleb Natapov wrote:
> From: Avi Kivity
>
> Provide a CPUID leaf that describes the emulated PMU.
>
> Signed-off-by: Avi Kivity
> Signed-off-by: Gleb Natapov
> ---
> arch/x86/kvm/x86.c | 23 ++-
> 1 files changed, 22 insertions(+), 1 deletions(-)
>
>
On 10/30/2011 06:53 PM, Gleb Natapov wrote:
> KVM needs to know perf capability to decide which PMU it can expose to a
> guest.
>
> Signed-off-by: Gleb Natapov
> ---
> arch/x86/include/asm/perf_event.h | 11 +++
> arch/x86/kernel/cpu/perf_event.c | 11 +++
> arch/x8
On 10/30/2011 06:53 PM, Gleb Natapov wrote:
> From: Avi Kivity
This has changed significantly, so please update the authorship. You
can say 'based on original patch by ...' to provide due credit.
> Use perf_events to emulate an architectural PMU, version 2.
> +
> +/* mapping between fixed pmc
On 11/01/2011 10:58 AM, Avi Kivity wrote:
> > > We already have another mechanism for such shared memory,
> > > mmap(vcpu_fd). x86 uses it for the coalesced mmio region as well as the
> > > traditional kvm_run area. Please consider using it.
> >
> > What does it buy us, other than needing a separ
On 10/31/2011 08:52 PM, Scott Wood wrote:
> On 10/31/2011 07:50 AM, Avi Kivity wrote:
> > On 10/31/2011 09:53 AM, Alexander Graf wrote:
> >> +/* sesel is index into the set, not the whole array */
> >> +static void write_stlbe(struct kvmppc_vcpu_e500 *vcpu_e500,
> >> + struct tlbe
On 10/31/2011 10:12 PM, Scott Wood wrote:
> >> +4.59 KVM_DIRTY_TLB
> >> +
> >> +Capability: KVM_CAP_SW_TLB
> >> +Architectures: ppc
> >> +Type: vcpu ioctl
> >> +Parameters: struct kvm_dirty_tlb (in)
> >> +Returns: 0 on success, -1 on error
> >> +
> >> +struct kvm_dirty_tlb {
> >> + __u64 bitmap;
>
85 matches
Mail list logo