On 08/23/2012 12:37 AM, Andrea Arcangeli wrote:
On Wed, Aug 22, 2012 at 11:51:17AM +0800, Xiao Guangrong wrote:
Hmm, in KSM code, i found this code in replace_page:
set_pte_at_notify(mm, addr, ptep, mk_pte(kpage, vma-vm_page_prot));
It is possible to establish a writable pte, no?
Hugh
On Sun, Aug 19, 2012 at 02:34:31PM +0300, Avi Kivity wrote:
The sub-register used to access the stack (sp, esp, or rsp) is not
determined by the address size attribute like other memory references,
but by the stack segment's B bit (if not in x86_64 mode).
Fix by using the existing
Linus,
Please pull from
git://git.kernel.org/pub/scm/virt/kvm/kvm.git master
To receive the following KVM bug fixes:
Alan Cox (1):
ppc: e500_tlb memset clears nothing
Alexander Graf (1):
KVM: PPC: Add cache flush on page map
Avi Kivity (1):
KVM: x86 emulator: use stack
On 08/23/2012 03:50 AM, Andrea Arcangeli wrote:
Hi Andrew,
On Wed, Aug 22, 2012 at 12:15:35PM -0700, Andrew Morton wrote:
On Wed, 22 Aug 2012 18:29:55 +0200
Andrea Arcangeli aarca...@redhat.com wrote:
On Wed, Aug 22, 2012 at 02:03:41PM +0800, Xiao Guangrong wrote:
On 08/21/2012 11:06 PM,
The build error was caused by that builtin functions are calling
the functions implemented in modules. That was introduced by the
following commit.
commit 4d8b81abc47b83a1939e59df2fdb0e98dfe0eedd
The patches fix that to convert the gfn to hva in direct way.
Signed-off-by: Gavin Shan
From 57a28ee5e7662ca28ba4c793aa037d64bd082dee Mon Sep 17 00:00:00 2001
From: Feng Tang feng.t...@intel.com
Date: Wed, 22 Aug 2012 15:41:51 +0800
Subject: [PATCH 1/2] PCI: Use local parameter pci_device_id for
pci_get_subsys/class()
This fixes a kernel warning https://lkml.org/lkml/2012/7/31/682
From 9f2f3bbdf65f669e091c72b9648a4a0394ce28f5 Mon Sep 17 00:00:00 2001
From: Feng Tang feng.t...@intel.com
Date: Thu, 23 Aug 2012 14:55:48 +0800
Subject: [PATCH 2/2] PCI: Remove the obsolete no_pci_devices() check
In function pci_get_subsys() there is a check:
/*
*
Hi,
I am looking for the recommended approach for accessing KVM driver data from
other kernel components. In my case, I need to set some global variable/state
in KVM driver from one of the NMI handlers. I see that using kvm_x86_ops is
one option. I can define a new function as part of
Dear Christoffer Dall,
In you code, kvm_alloc_stage2_pgd function allocates page table and memset.
isn't it necessary to clean the data cache after memset?
For reference, pgd_alloc cleans the area with clean_dcache_area.
There's some situation that cleaning is not necessary, and
On Sun, Aug 19, 2012 at 12:32:36PM +0300, Avi Kivity wrote:
On 08/17/2012 08:29 PM, Marcelo Tosatti wrote:
On Thu, Aug 16, 2012 at 05:54:49PM +0300, Avi Kivity wrote:
Instead of populating the the entire register file, read in registers
as they are accessed, and write back only the modified
On Thu, 23 Aug 2012 15:42:49 +0800
Gavin Shan sha...@linux.vnet.ibm.com wrote:
The build error was caused by that builtin functions are calling
the functions implemented in modules. That was introduced by the
following commit.
commit 4d8b81abc47b83a1939e59df2fdb0e98dfe0eedd
The patches
-Original Message-
From: kvm-ow...@vger.kernel.org [mailto:kvm-ow...@vger.kernel.org] On
Behalf Of Avi Kivity
Sent: Monday, August 20, 2012 6:43 PM
To: Roedel, Joerg
Cc: Hao, Xudong; kvm@vger.kernel.org; Zhang, Xiantao
Subject: Re: [PATCH] kvm/fpu: Enable fully eager restore kvm FPU
On Thu, Aug 23, 2012 at 4:26 AM, Asias He asias.he...@gmail.com wrote:
Respect guest tcp window size and stop sending tcp segments to guest
if guest's receive window is closed.
This fixes the TCP hang I'm seeing where guest and host are transferring
big chuck of data.
Awesome!
This problem
On Thu, Aug 23, 2012 at 5:31 PM, Pekka Enberg penb...@kernel.org wrote:
On Thu, Aug 23, 2012 at 4:26 AM, Asias He asias.he...@gmail.com wrote:
Respect guest tcp window size and stop sending tcp segments to guest
if guest's receive window is closed.
This fixes the TCP hang I'm seeing where
On Thu, Aug 23, 2012 at 12:36 PM, Asias He asias.he...@gmail.com wrote:
while (1) {
+ pos = payload;
ret = read(sk-fd, payload, UIP_MAX_TCP_PAYLOAD);
if (ret = 0 || ret UIP_MAX_TCP_PAYLOAD)
goto out;
-
On 2012-08-23 04:32, Wen Congyang wrote:
If the target is x86/x86_64, the guest's kernel will write 0x01 to the
port KVM_PV_EVENT_PORT when it is panciked. This patch introduces a new
qom device kvm_pv_ioport to listen this I/O port, and deal with panicked
event according to panicked_action's
The memory subsystem will now take care of flushing whenever affected
regions are accessed or the memory mapping changes.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
kvm-all.c |2 --
1 files changed, 0 insertions(+), 2 deletions(-)
diff --git a/kvm-all.c b/kvm-all.c
index
Flush pending coalesced MMIO before performing mapping or state changes
that could affect the event orderings or route the buffered requests to
a wrong region.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
memory.c |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git
Instead of flushing pending coalesced MMIO requests on every vmexit,
this provides a mechanism to selectively flush when memory regions
related to the coalesced one are accessed. This first of all includes
the coalesced region itself but can also applied to other regions, e.g.
of the same device,
Wrap also simple operations consisting only of a single step with
memory_region_transaction_begin/commit. This allows to perform
additional steps like coalesced MMIO flushing from a single place.
This requires dropping some micro-optimizations: The skipping of
topology updates after updating
Simplify the code as we are using now only a subset of the original
features of memory_region_update_topology.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
memory.c | 39 +++
1 files changed, 11 insertions(+), 28 deletions(-)
diff --git a/memory.c
This is just a repost, now targeting uq/master as agreed. No changes
compared to v2 except that i82378: Remove bogus MMIO coalescing was
dropped as it is already in QEMU upstream by now.
Original description:
We currently flush the coalesced MMIO buffer on every vmexit to
userspace. KVM only
In preparation of stopping to flush coalesced MMIO unconditionally on
vmexits, mark VGA MMIO and PIO regions as synchronous /wrt coalesced
MMIO and flush the buffer explicitly on PIO accesses that do not use
generic memory regions yet.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
In case an invalid or disabled gpa is written to the SYSTEM_TIME
MSR, do not retain its value. This is not documented behaviour,
nor should be supported.
Also clear it on system reset. Not doing so can hide bugs.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git
On Tue, Aug 21, 2012 at 05:51:35PM +0800, Xiao Guangrong wrote:
mmu_notifier is the interface to broadcast the mm events to KVM, the
tracepoints introduced in this patch can trace all these events, it is
very helpful for us to notice and fix the bug caused by mm
Signed-off-by: Xiao Guangrong
On Tue, Aug 21, 2012 at 12:27:51PM +0200, Jan Kiszka wrote:
On 2012-08-21 10:25, Peter Maydell wrote:
On 21 August 2012 09:19, Jan Kiszka jan.kis...@siemens.com wrote:
On 2012-08-15 13:08, Peter Maydell wrote:
Move the init of the irqchip_inject_ioctl field of KVMState out of
On Tue, Aug 21, 2012 at 04:56:43PM +0530, Nikunj A. Dadhania wrote:
From: Nikunj A. Dadhania nik...@linux.vnet.ibm.com
Hypervisor code to indicate guest running/pre-empteded status through
msr. The page is now pinned during MSR write time and use
kmap_atomic/kunmap_atomic to access the
On Tue, Aug 21, 2012 at 04:55:52PM +0530, Nikunj A. Dadhania wrote:
Remote flushing api's does a busy wait which is fine in bare-metal
scenario. But with-in the guest, the vcpus might have been pre-empted
or blocked. In this scenario, the initator vcpu would end up
busy-waiting for a long
On Tue, Aug 21, 2012 at 04:56:35PM +0530, Nikunj A. Dadhania wrote:
From: Nikunj A. Dadhania nik...@linux.vnet.ibm.com
The patch adds guest code for msr between guest and hypervisor. The
msr will export the vcpu running/pre-empted information to the guest
from host. This will enable guest to
Hi all,
I got this error when I compile the source tarball qemu-kvm-1.1.1.tar.gz and
qemu-kvm-1.1.0.tar.gz and as well as codes clone from
git://git.kernel.org/pub/scm/virt/kvm/qemu-kvm.git,
the compile command I used is ./configure make.
I google this error but find nothing, I have no idea
On 08/23/2012 05:24 PM, Marcelo Tosatti wrote:
On Tue, Aug 21, 2012 at 05:51:35PM +0800, Xiao Guangrong wrote:
mmu_notifier is the interface to broadcast the mm events to KVM, the
tracepoints introduced in this patch can trace all these events, it is
very helpful for us to notice and fix the
This pach makes tcp between 'guest ip' and 'host virtual ip' work in UIP mode.
(The defulat guest ip is 192.168.33.15, host virtual ip is 192.168.33.1)
guest$ wget http://192.168.33.1/file
guest$ ssh 192.168.33.1
Without this patch, user has to figure out the ip address of host's
interface
Respect guest tcp window size and stop sending tcp segments to guest
if guest's receive window is closed.
This fixes the TCP hang I'm seeing where guest and host are transferring
big chuck of data.
This problem was not triggered when guest and external host
communicates, probably because guest
https://bugzilla.kernel.org/show_bug.cgi?id=34282
Alan a...@lxorguk.ukuu.org.uk changed:
What|Removed |Added
Status|NEW |RESOLVED
On Thu, Aug 23, 2012 at 08:30:15PM +0800, Xiao Guangrong wrote:
On 08/23/2012 05:24 PM, Marcelo Tosatti wrote:
On Tue, Aug 21, 2012 at 05:51:35PM +0800, Xiao Guangrong wrote:
mmu_notifier is the interface to broadcast the mm events to KVM, the
tracepoints introduced in this patch can trace
On Thu, Aug 23, 2012 at 01:02:28PM +0200, Jan Kiszka wrote:
This is just a repost, now targeting uq/master as agreed. No changes
compared to v2 except that i82378: Remove bogus MMIO coalescing was
dropped as it is already in QEMU upstream by now.
Original description:
We currently flush
On Sat, Aug 18, 2012 at 06:32:25AM +1000, Benjamin Herrenschmidt wrote:
On Fri, 2012-08-17 at 15:39 -0300, Marcelo Tosatti wrote:
On Fri, Aug 17, 2012 at 05:06:18PM +1000, Benjamin Herrenschmidt wrote:
On Wed, 2012-08-15 at 14:59 -0300, Marcelo Tosatti wrote:
The guest should not
On 23 August 2012 10:13, Marcelo Tosatti mtosa...@redhat.com wrote:
On Tue, Aug 21, 2012 at 12:27:51PM +0200, Jan Kiszka wrote:
On 2012-08-21 10:25, Peter Maydell wrote:
On 21 August 2012 09:19, Jan Kiszka jan.kis...@siemens.com wrote:
As it's not yet merged, some late comment:
On Thu, Aug 23, 2012 at 4:12 AM, Min-gyu Kim mingyu84@samsung.com wrote:
Dear Christoffer Dall,
Hi Min-gyu
(it's not considered best practice to top-post in these types of
mailing list, please post inline or bottom-post in the future).
In you code, kvm_alloc_stage2_pgd function allocates
Hi Christoffer,
[snip]
diff --git a/arch/arm/kvm/init.S b/arch/arm/kvm/init.S
index 1dc8926..4db26cb 100644
--- a/arch/arm/kvm/init.S
+++ b/arch/arm/kvm/init.S
@@ -15,5 +15,135 @@
* along with this program; if not, write to the Free Software
* Foundation, 51 Franklin Street, Fifth
On Thu, Aug 23, 2012 at 11:08 AM, Lei Wen adrian.w...@gmail.com wrote:
Hi Christoffer,
[snip]
diff --git a/arch/arm/kvm/init.S b/arch/arm/kvm/init.S
index 1dc8926..4db26cb 100644
--- a/arch/arm/kvm/init.S
+++ b/arch/arm/kvm/init.S
@@ -15,5 +15,135 @@
* along with this program; if not,
Hi,
I'm using a KVM guest to stream audio using darkice to an icecast2 server on the
same guest. The guest uses an emulated ES1370 sound card to capture the host's
audio input (ASUS Xonar DX) using the ALSA backend. After 1 or 2 days, the
qemu-kvm process locks up, using up 100% CPU, apparently
[likely not kvm related, CC'ing the appropriate community]
On 2012-08-23 18:16, Mike Gerber wrote:
Hi,
I'm using a KVM guest to stream audio using darkice to an icecast2 server on
the
same guest. The guest uses an emulated ES1370 sound card to capture the host's
audio input (ASUS Xonar
On Fri, Aug 17, 2012 at 08:58:48AM +0200, Jan Kiszka wrote:
With this series, we are getting very close to obsoleting qemu-kvm. It
refactors hw/device-assignment.c and the associated KVM helper functions
into a form that should allow merging them into QEMU. Once the series is
acceptable for
On Wed, Aug 22, 2012 at 05:46:52PM +0900, Aritoki TAKADA wrote:
Hello,
I'm planning to configure timekeeping between KVM host and guest,
but I'm confused by different suggestions.
The point is whether NTP should be working on guest or not.
Here are the suggestions I found.
Red Hat
This is an RFC regarding the reporting of stealtime. In the case of
where you have a system that is running with partial processors such as
KVM the user may see steal time being reported in accounting tools such
as top or vmstat. This can cause confusion for the end user. To
ease the confusion
This setting will later be used to compute an expected steal time.
Signed-off-by: Michael Wolf m...@linux.vnet.ibm.com
---
Documentation/sysctl/kernel.txt | 14 ++
fs/proc/stat.c |1 +
kernel/sysctl.c | 10 ++
3 files changed, 25
Stealtime will be adjusted based on the cpu entitlement setting. The user
will supply the cpu_entitlement which is the percentage of cpu the guest can
expect to receive. The expected steal time is based on the expected steal
percentage which is 100 - cpu_entitlement. If steal_time is less than
If the hypercall is not implemented on the host a default value of
100 will be used. This value will be stored in
/proc/sys/kernel/cpu_entitlements.
Signed-off-by: Michael Wolf m...@linux.vnet.ibm.com
---
arch/x86/kvm/x86.c |8
fs/proc/stat.c |9 +
From: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com
Changelog:
- rebased it on Arnaldo's git tree perf/core branch
the change from Arnaldo's comments:
- directly get event from evsel-tp_format
- remove die() and return the proper error code
- rename thread-private to thread-priv
the change
From: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com
'perf kvm stat record/report' will use kvm_exit and kvm_mmio(read...) to
calculate mmio read emulated time for the old kernel, in order to trace
mmio read event more exactly, we add kvm_mmio_begin to trace the time when
mmio read begins, also,
From: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com
Add 'perf kvm stat' support to analyze kvm vmexit/mmio/ioport smartly
Usage:
- kvm stat
run a command and gather performance counter statistics, it is the alias of
perf stat
- trace kvm events:
perf kvm stat record, or, if other
From: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com
Exporting KVM exit information to userspace to be consumed by perf.
[ Dong Hao haod...@linux.vnet.ibm.com: rebase it on acme's git tree ]
Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com
Signed-off-by: Dong Hao
Alex, what do you think about this?
On Thu, 23 Aug 2012 16:35:15 +0800
Gavin Shan sha...@linux.vnet.ibm.com wrote:
On Thu, Aug 23, 2012 at 05:24:00PM +0900, Takuya Yoshikawa wrote:
On Thu, 23 Aug 2012 15:42:49 +0800
Gavin Shan sha...@linux.vnet.ibm.com wrote:
The build error was caused by
On 08/24/2012 09:54 AM, Takuya Yoshikawa wrote:
Alex, what do you think about this?
On Thu, 23 Aug 2012 16:35:15 +0800
Gavin Shan sha...@linux.vnet.ibm.com wrote:
On Thu, Aug 23, 2012 at 05:24:00PM +0900, Takuya Yoshikawa wrote:
On Thu, 23 Aug 2012 15:42:49 +0800
Gavin Shan
On Saturday 18 August 2012 22:04:20 Neal Murphy wrote:
I've been using KVM for a few years now. I've had little trouble with it.
But now it's got me treed. I cannot get a KVM-enabled Linux 3.2.27 kernel
to boot in qemu-kvm unless I specify '-no-kvm'. I've used a
similarly-built and -
On Thu, Aug 23, 2012 at 12:30 AM, Marcelo Tosatti mtosa...@redhat.com wrote:
Please pull from
git://git.kernel.org/pub/scm/virt/kvm/kvm.git master
To receive the following KVM bug fixes:
I'm not seeing what you claim is there. This commit seems to be
missing: forgot to push?
Avi Kivity
On 08/24/2012 03:14 AM, Michael Wolf wrote:
This is an RFC regarding the reporting of stealtime. In the case of
where you have a system that is running with partial processors such as
KVM the user may see steal time being reported in accounting tools such
as top or vmstat. This can cause
On Thu, 23 Aug 2012 08:46:22 -0300, Marcelo Tosatti mtosa...@redhat.com wrote:
On Tue, Aug 21, 2012 at 04:56:43PM +0530, Nikunj A. Dadhania wrote:
From: Nikunj A. Dadhania nik...@linux.vnet.ibm.com
Hypervisor code to indicate guest running/pre-empteded status through
msr. The page is now
On Thu, 23 Aug 2012 06:36:43 -0300, Marcelo Tosatti mtosa...@redhat.com wrote:
On Tue, Aug 21, 2012 at 04:56:35PM +0530, Nikunj A. Dadhania wrote:
+void kvm_disable_vcpu_state(void)
+{
+ if (!has_vcpu_state)
+ return;
+
+ wrmsr(MSR_KVM_VCPU_STATE, 0, 0);
wrmsrl
On 08/24/2012 09:54 AM, Takuya Yoshikawa wrote:
Alex, what do you think about this?
On Thu, 23 Aug 2012 16:35:15 +0800
Gavin Shan sha...@linux.vnet.ibm.com wrote:
On Thu, Aug 23, 2012 at 05:24:00PM +0900, Takuya Yoshikawa wrote:
On Thu, 23 Aug 2012 15:42:49 +0800
Gavin Shan
61 matches
Mail list logo