Hello Sasha,
On 07/28/2012 02:35 PM, Sasha Levin wrote:
On 07/28/2012 04:21 AM, Asias He wrote:
This patch introduces bio-based IO path for virtio-blk.
Compared to request-based IO path, bio-based IO path uses driver
provided -make_request_fn() method to bypasses the IO scheduler. It
handles
Il 29/07/2012 22:40, Michael S. Tsirkin ha scritto:
Did you set the affinity manually in your experiments, or perhaps there
is a difference between scsi and networking... (interrupt mitigation?)
You need to run irqbalancer in guest to make it actually work. Do you?
Yes, of course, now on
Il 29/07/2012 22:29, Michael S. Tsirkin ha scritto:
On Sun, Jul 29, 2012 at 10:03:45PM +0200, Paolo Bonzini wrote:
Il 29/07/2012 22:00, Michael S. Tsirkin ha scritto:
I've been looking at adding caching for IRQs so that we don't need to
scan all VCPUs on each interrupt. One issue I had a
On Sun, Jul 29, 2012 at 11:00:58PM +0300, Michael S. Tsirkin wrote:
I've been looking at adding caching for IRQs so that we don't need to
scan all VCPUs on each interrupt. One issue I had a problem with, is
how the cache structure can be used from both a thread (to fill out the
cache) and
Il 30/07/2012 01:50, Rusty Russell ha scritto:
Also, being the first user of chained scatterlist doesn't exactly give
me warm fuzzies.
We're far from the first user: they've been in the kernel for well over
7 years. They were introduced for the block layer, but they tended to
ignore
Il 30/07/2012 06:43, Asias He ha scritto:
Yes. Something like this:
qemu -drive file=foo.img,cache=writeback/unsafe
is not safe against power losses also?
cache=writeback and cache=none are safe, cache=unsafe isn't.
I think we can add REQ_FLUSH REQ_FUA support to bio path and that
Hi
Please send in any agenda items you are interested in covering.
Thanks, Juan.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
-Original Message-
From: Wood Scott-B07421
Sent: Friday, July 27, 2012 7:00 AM
To: Bhushan Bharat-R65777
Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.org; ag...@suse.de; Bhushan
Bharat-
R65777
Subject: Re: [PATCH 2/2] KVM: PPC: booke/bookehv: Add guest debug support
On
There are several ways that qemu and kvm can communicate.
One of them is the ioctl to /dev/kvm and it is documented in
Documentation/virtual/kvm/api.txt.
But there's other ways also: like the pages that are mmap-ed from
kvm_vcpu_fault function,
As far as I know, there is no documentation on
Sorry for sending garbage mail
There are several ways that qemu and kvm can communicate.
One of them is the ioctl to /dev/kvm and it is documented in
Documentation/virtual/kvm/api.txt.
But there's other ways also: like the pages that are mmap-ed from
On 07/29/2012 11:00 PM, Michael S. Tsirkin wrote:
I've been looking at adding caching for IRQs so that we don't need to
scan all VCPUs on each interrupt. One issue I had a problem with, is
how the cache structure can be used from both a thread (to fill out the
cache) and interrupt (to
On 07/30/2012 10:12 AM, Paolo Bonzini wrote:
Il 30/07/2012 01:50, Rusty Russell ha scritto:
Also, being the first user of chained scatterlist doesn't exactly give
me warm fuzzies.
We're far from the first user: they've been in the kernel for well over
7 years. They were introduced for the
Il 30/07/2012 09:34, Juan Quintela ha scritto:
Hi
Please send in any agenda items you are interested in covering.
How/when to merge the new error series.
My proposal: make soft feature freeze shorter, delay rc0 slightly, only
take care of errors in the meanwhile.
Paolo
--
To
From 4df5da62cb49b71c9a70072341dcb0557768c520 Mon Sep 17 00:00:00 2001
From: Paul Mackerras pau...@samba.org
Date: Mon, 30 Jul 2012 16:40:54 +1000
Subject: [PATCH] KVM: PPC: Book3S HV: Handle memory slot deletion and
modification correctly
At present the HV style of KVM doesn't handle deletion
Current kvmppc_booke_handlers uses the same macro (KVM_HANDLER) and
all handlers are considered to be the same size. This will not be
the case if we want to use different macros for different handlers.
This patch improves the kvmppc_booke_handler so that it can
support different macros for
Installed debug handler will be used for guest debug support and
debug facility emulation features (patches for these features
will follow this patch).
Signed-off-by: Liu Yu yu@freescale.com
[bharat.bhus...@freescale.com: Substantial changes]
Signed-off-by: Bharat Bhushan
On 27.07.2012, at 08:18, Benjamin Herrenschmidt wrote:
Right now, whenever we exit for an hcall, upon return, we fetch
some register values from the structure that carries the hcall
results and update the vcpu accordingly.
However, if the hypercall chooses instead to update the registers
Having an annoying bug on i386 kvm I decided to debug it buy running an
i386 guest on my x86_64 host, use 9p to access a guest image, and run it
using nested kvm.
However, 9p appears to be broken: first, the configure test fails (patch
sent). Second, while mount works, ls on the mount point
The following changes since commit f7da9cdf45cbbad5029d4858dcbc0134e06084ed:
Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net (2012-07-28
06:00:39 -0700)
are available in the git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/rusty/linux-2.6-for-linus.git
On 07/29/2012 11:44 AM, Michael S. Tsirkin wrote:
On Sat, Jul 21, 2012 at 02:02:58PM +0200, Sasha Levin wrote:
On 07/20/2012 03:40 PM, Michael S. Tsirkin wrote:
- err = init_vqs(vi);
+ if (virtio_has_feature(vdev, VIRTIO_NET_F_CTRL_VQ))
+ vi-has_cvq = true;
+
How about we disable
On Mon, Jul 30, 2012 at 09:31:06AM +0200, Paolo Bonzini wrote:
You only need to add REQ_FLUSH support. The virtio-blk protocol does
not support REQ_FUA, because there's no easy way to do it in userspace.
A bio-based driver needs to handle both REQ_FLUSH and REQ_FUA as it does
not get the
On Mon, Jul 30, 2012 at 12:43:12PM +0800, Asias He wrote:
I think we can add REQ_FLUSH REQ_FUA support to bio path and that
deserves another patch.
Adding it is a requirement for merging the code.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
On Mon, Jul 30, 2012 at 11:25:51AM +0930, Rusty Russell wrote:
I consider this approach a half-way step. Quick attempts on my laptop
and I couldn't find a case where the bio path was a loss, but in theory
if the host wasn't doing any reordering and it was a slow device, you'd
want the guest
On 07/29/12 20:10, Chris Clayton wrote:
Possible culprit: b2da15ac26a0c00.
That commit isn't in qermu-kvm-1.1.1.
It is in kernel.
Sorry, so it is.
With kernel 3.5.0 with b2da15ac26a0c00 reverted, I have just had 15
clean invocations of vanilla qemu-kvm-1.1.1. So that commit would seem
On 07/30/2012 05:00 PM, Chris Clayton wrote:
On 07/29/12 20:10, Chris Clayton wrote:
Possible culprit: b2da15ac26a0c00.
That commit isn't in qermu-kvm-1.1.1.
It is in kernel.
Sorry, so it is.
With kernel 3.5.0 with b2da15ac26a0c00 reverted, I have just had 15
clean invocations of
On 07/30/12 15:03, Avi Kivity wrote:
On 07/30/2012 05:00 PM, Chris Clayton wrote:
On 07/29/12 20:10, Chris Clayton wrote:
Possible culprit: b2da15ac26a0c00.
That commit isn't in qermu-kvm-1.1.1.
It is in kernel.
Sorry, so it is.
With kernel 3.5.0 with b2da15ac26a0c00 reverted, I have
And now for something completely different.
So this series (or rather the last patch of it) takes different approach
to rep ins optimization. Instead of writing separate fast path for
it do the fast path inside emulator itself. This way nobody can say the
code is not reused!
Patch 1,2 are now,
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/kvm_emulate.h | 22 ++
arch/x86/kvm/emulate.c |4 +++-
2 files changed, 13 insertions(+), 13 deletions(-)
diff --git a/arch/x86/include/asm/kvm_emulate.h
Remove unneeded segment argument. Address structure already has correct
segment which was put there during decode.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/emulate.c | 11 ---
1 file changed, 4 insertions(+), 7 deletions(-)
diff --git a/arch/x86/kvm/emulate.c
Optimize rep ins by allowing emulator to write back more than one
datum at a time. Introduce new operand type OP_MEM_STR which tells
writeback() that dst contains pointer to an array that should be written
back as opposite to just one data element.
Signed-off-by: Gleb Natapov g...@redhat.com
---
Current code assumes that IO exit was due to instruction emulation
and handles execution back to emulator directly. This patch adds new
userspace IO exit completion callback that can be set by any other code
that caused IO exit to userspace.
Signed-off-by: Gleb Natapov g...@redhat.com
---
Juan Quintela quint...@redhat.com writes:
Hi
Minutes of Today call.
ahci: agraf
- how to enable it?
* today is too difficult (alex)
* get it to work as everything else (markus)
And big discussion ensued. Markus alex will reply with details.
No agreement, and too subtle
On Sun, 2012-07-29 at 18:01 +0300, Michael S. Tsirkin wrote:
On Tue, Jul 24, 2012 at 02:43:14PM -0600, Alex Williamson wrote:
In order to inject a level interrupt from an external source using an
irqfd, we need to allocate a new irq_source_id. This allows us to
assert and (later) de-assert
On Sun, 2012-07-29 at 17:54 +0300, Michael S. Tsirkin wrote:
On Tue, Jul 24, 2012 at 02:43:22PM -0600, Alex Williamson wrote:
This new ioctl enables an eventfd to be triggered when an EOI is
written for a specified irqchip pin. The first user of this will
be external device assignment
On 07/30/2012 05:07 PM, Chris Clayton wrote:
With kernel 3.5.0 with b2da15ac26a0c00 reverted, I have just had 15
clean invocations of vanilla qemu-kvm-1.1.1. So that commit would seem
to be the problem.
Just to be sure, I've run some more tests today. No crashes occurred in
20 runs of
Hello List,
I am a KVM newbie and studying KVM mmu code.
On the existing guest, I am trying to track all guest writes by
marking page table entry as read-only in EPT entry [ I am using Intel
machine with vmx and ept support ]. Looks like EPT support re-uses
shadow page table(SPT) code and hence
Hello Stefan,
Stefan Hajnoczi stefanha at gmail.com writes:
On Wed, Jan 11, 2012 at 4:18 PM, Bernd Schubert
bernd.schubert at itwm.fraunhofer.de wrote:
On 01/11/2012 05:04 PM, Stefan Hajnoczi wrote:
Try pinging the host's IP address from inside the guest. Run tcpdump
on the guest's tap
On 07/30/2012 07:33 PM, Bernd Schubert wrote:
Hello Stefan,
Stefan Hajnoczi stefanha at gmail.com writes:
On Wed, Jan 11, 2012 at 4:18 PM, Bernd Schubert
bernd.schubert at itwm.fraunhofer.de wrote:
On 01/11/2012 05:04 PM, Stefan Hajnoczi wrote:
Try pinging the host's IP address from inside
From: Dunrong Huang riegama...@gmail.com
Add a helper function for fetching max cpus supported by kvm.
Make QEMU exit with an error message if smp_cpus exceeds limit
of VCPU count retrieved by invoking this helper function.
Signed-off-by: Dunrong Huang riegama...@gmail.com
---
kvm-all.c | 25
I tried to go through KVM code to check how KVM handles nested guest's
ioctl calls. Does L0 handles nested guest's ioctl calls or it passes
it to L1 guest to handle it?
Can anyone please help me with this?
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
I've been searching around trying to figure out if there's any benefit
to having a qcow2 backing file created with preallocation=metadata
set. That is, if there's any benefit to using a qcow2 file that is
based on a qcow2 backing file with preallocation=metadata turned on. I
know you can't turn on
On 07/30/2012 02:37 AM, Bhushan Bharat-R65777 wrote:
-Original Message-
From: Wood Scott-B07421
Sent: Friday, July 27, 2012 7:00 AM
To: Bhushan Bharat-R65777
Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.org; ag...@suse.de; Bhushan
Bharat-
R65777
Subject: Re: [PATCH 2/2] KVM:
On Mon, Jul 30, 2012 at 03:35:39PM +0300, Avi Kivity wrote:
Having an annoying bug on i386 kvm I decided to debug it buy running an
i386 guest on my x86_64 host, use 9p to access a guest image, and run it
using nested kvm.
However, 9p appears to be broken: first, the configure test fails
From: Nicholas Bellinger n...@linux-iscsi.org
This patch contains the post RFC-v5 (post-merge) changes, this includes:
- Add locking comment
- Move vhost_scsi_complete_cmd ahead of TFO callbacks in order to
drop forward declarations
- Drop extra '!= NULL' usage in
On Sun, 2012-07-29 at 16:47 +0300, Avi Kivity wrote:
On 07/26/2012 08:40 PM, Alex Williamson wrote:
On Thu, 2012-07-26 at 19:34 +0300, Avi Kivity wrote:
On 07/25/2012 08:03 PM, Alex Williamson wrote:
+/*
+ * Resource setup
+ */
+static void vfio_unmap_bar(VFIODevice *vdev, int
Commit b38c77d82e4 moved the MTMSR_EERI macro from the KVM code to generic
ppc_asm.h code. However, while adding it in the headers for the ppc32 case,
it missed out to remove the former definition in the KVM code.
This patch fixes compilation on server type PPC32 targets with CONFIG_KVM
enabled.
On Fri, 2012-07-27 at 15:32 +1000, Paul Mackerras wrote:
On Wed, Jul 25, 2012 at 08:53:06AM -0600, Alex Williamson wrote:
Hi Linus,
This series includes the VFIO userspace driver interface for the
3.6 kernel merge window. This driver is intended to provide a
secure interface for
On Mon, Jul 30, 2012 at 07:39:31PM +0300, Avi Kivity wrote:
On 07/30/2012 05:07 PM, Chris Clayton wrote:
With kernel 3.5.0 with b2da15ac26a0c00 reverted, I have just had 15
clean invocations of vanilla qemu-kvm-1.1.1. So that commit would seem
to be the problem.
Just to be sure, I've
On Sun, Jul 22, 2012 at 05:41:00PM +0300, Avi Kivity wrote:
The current code will update the PPR on almost any APIC read; however
that's only required if we read the PPR.
kvm_update_ppr() shows up in some profiles, albeit with a low usage (~1%).
This should reduce it further (it will still
On Mon, Jul 30, 2012 at 10:22:10AM -0600, Alex Williamson wrote:
On Sun, 2012-07-29 at 17:54 +0300, Michael S. Tsirkin wrote:
On Tue, Jul 24, 2012 at 02:43:22PM -0600, Alex Williamson wrote:
This new ioctl enables an eventfd to be triggered when an EOI is
written for a specified irqchip
On Tue, 2012-07-31 at 03:01 +0300, Michael S. Tsirkin wrote:
On Mon, Jul 30, 2012 at 10:22:10AM -0600, Alex Williamson wrote:
On Sun, 2012-07-29 at 17:54 +0300, Michael S. Tsirkin wrote:
On Tue, Jul 24, 2012 at 02:43:22PM -0600, Alex Williamson wrote:
This new ioctl enables an eventfd to
On Mon, Jul 30, 2012 at 06:26:31PM -0600, Alex Williamson wrote:
On Tue, 2012-07-31 at 03:01 +0300, Michael S. Tsirkin wrote:
On Mon, Jul 30, 2012 at 10:22:10AM -0600, Alex Williamson wrote:
On Sun, 2012-07-29 at 17:54 +0300, Michael S. Tsirkin wrote:
On Tue, Jul 24, 2012 at 02:43:22PM
On 07/30/2012 06:11 AM, Bharat Bhushan wrote:
+1: /* debug interrupt happened in guest */
+ mfspr r4, \scratch
+ mtcrr3
+ mr r3, r4
+ mfspr r4, SPRN_SPRG_THREAD
+ lwz r4, THREAD_KVM_VCPU(r4)
+ stw r3, VCPU_GPR(r4)(r4)
+ stw r5,
On Tue, 2012-07-31 at 03:36 +0300, Michael S. Tsirkin wrote:
On Mon, Jul 30, 2012 at 06:26:31PM -0600, Alex Williamson wrote:
On Tue, 2012-07-31 at 03:01 +0300, Michael S. Tsirkin wrote:
On Mon, Jul 30, 2012 at 10:22:10AM -0600, Alex Williamson wrote:
On Sun, 2012-07-29 at 17:54 +0300,
Hi Linus,
Here is the PULL request for the initial merge of tcm_vhost based on
RFC-v5 code with MST's ACK appended to the initial merge commit.
As promised, the commit is available from two different branches for you
to consider merging as for-3.6 code.
The 'for-next-merge' branch based on
On 07/31/2012 01:18 AM, Sunil wrote:
Hello List,
I am a KVM newbie and studying KVM mmu code.
On the existing guest, I am trying to track all guest writes by
marking page table entry as read-only in EPT entry [ I am using Intel
machine with vmx and ept support ]. Looks like EPT support
On Mon, Jul 30, 2012 at 4:17 PM, Alex Williamson
alex.william...@redhat.com wrote:
I'm pretty anxious to find out as well. Linus, ping, any thoughts on
including this in 3.6? Thanks,
I just pulled it, but then I unpulled again when I realized it's not a
signed tag and it's on github.
From 4df5da62cb49b71c9a70072341dcb0557768c520 Mon Sep 17 00:00:00 2001
From: Paul Mackerras pau...@samba.org
Date: Mon, 30 Jul 2012 16:40:54 +1000
Subject: [PATCH] KVM: PPC: Book3S HV: Handle memory slot deletion and
modification correctly
At present the HV style of KVM doesn't handle deletion
Current kvmppc_booke_handlers uses the same macro (KVM_HANDLER) and
all handlers are considered to be the same size. This will not be
the case if we want to use different macros for different handlers.
This patch improves the kvmppc_booke_handler so that it can
support different macros for
Installed debug handler will be used for guest debug support and
debug facility emulation features (patches for these features
will follow this patch).
Signed-off-by: Liu Yu yu@freescale.com
[bharat.bhus...@freescale.com: Substantial changes]
Signed-off-by: Bharat Bhushan
On 07/30/2012 02:37 AM, Bhushan Bharat-R65777 wrote:
-Original Message-
From: Wood Scott-B07421
Sent: Friday, July 27, 2012 7:00 AM
To: Bhushan Bharat-R65777
Cc: kvm-ppc@vger.kernel.org; k...@vger.kernel.org; ag...@suse.de; Bhushan
Bharat-
R65777
Subject: Re: [PATCH 2/2] KVM:
Commit b38c77d82e4 moved the MTMSR_EERI macro from the KVM code to generic
ppc_asm.h code. However, while adding it in the headers for the ppc32 case,
it missed out to remove the former definition in the KVM code.
This patch fixes compilation on server type PPC32 targets with CONFIG_KVM
enabled.
On 07/30/2012 06:11 AM, Bharat Bhushan wrote:
+1: /* debug interrupt happened in guest */
+ mfspr r4, \scratch
+ mtcrr3
+ mr r3, r4
+ mfspr r4, SPRN_SPRG_THREAD
+ lwz r4, THREAD_KVM_VCPU(r4)
+ stw r3, VCPU_GPR(r4)(r4)
+ stw r5,
63 matches
Mail list logo