Hi Marcelo,
On 11/13/2012 07:10 AM, Marcelo Tosatti wrote:
On Mon, Nov 05, 2012 at 05:59:26PM +0800, Xiao Guangrong wrote:
Do not drop large spte until it can be insteaded by small pages so that
the guest can happliy read memory through it
The idea is from Avi:
| As I mentioned before,
On 11/13/2012 07:12 AM, Marcelo Tosatti wrote:
On Mon, Nov 05, 2012 at 08:10:08PM +0800, Xiao Guangrong wrote:
In order to detecting spte remapping, we can simply check whether the
spte has already been pointing to the pfn even if the spte is not the
last spte for middle spte is pointing to
On Mon, Nov 12, 2012 at 10:44:51PM -0500, Abhinav Srivastava wrote:
Hi there,
I would like to know if KVM supports interrupt remapping and queued
invalidation. I could not find it in the kvm source code.
I also noticed that these features are in KVM's TODO list. Is that
accurate? Any
On Mon, 12 Nov 2012 23:17:55 -0200
Marcelo Tosatti mtosa...@redhat.com wrote:
Hi Cornelia,
On Wed, Oct 31, 2012 at 05:24:47PM +0100, Cornelia Huck wrote:
Provide a mechanism for qemu to provide fully virtual subchannels to
the guest. In the KVM case, this relies on the kernel's css
Hi Sasha,
On Tue, Nov 13, 2012 at 04:29:33AM +, Sasha Levin wrote:
On 11/12/2012 06:57 AM, Will Deacon wrote:
diff --git a/tools/kvm/devices.c b/tools/kvm/devices.c
new file mode 100644
index 000..f9666b9
--- /dev/null
+++ b/tools/kvm/devices.c
@@ -0,0 +1,24 @@
+#include
Hi Pekka,
On 13 November 2012 07:40 Pekka Enberg wrote:
On Mon, 12 Nov 2012, Will Deacon wrote:
This patch adds initial support for ARMv7 processors (more
specifically,
Cortex-A15) to kvmtool.
Everything is driven by FDT, including dynamic generation of virtio
nodes
for MMIO devices
On Mon, Nov 12, 2012 at 10:40:33PM +, Christoffer Dall wrote:
On Mon, Nov 12, 2012 at 7:52 AM, Christoffer Dall
c.d...@virtualopensystems.com wrote:
On Mon, Nov 12, 2012 at 7:27 AM, Will Deacon will.dea...@arm.com wrote:
Hi Christoffer,
On Mon, Nov 12, 2012 at 12:18:57PM +,
On Tue, Nov 13, 2012 at 12:21 PM, Matt Evans matt.ev...@arm.com wrote:
I *think* Will was going to make some small changes, if you've already merged
it then a follow-up set perhaps?
I only merged the non-ARM specific changes which looked good to me.
But sure, please send an incremental patch
On Tue, Nov 13, 2012 at 04:37:38AM +, Sasha Levin wrote:
On 11/12/2012 06:57 AM, Will Deacon wrote:
+struct kvm_mem_bank {
+ struct list_headlist;
+ unsigned long guest_phys_addr;
+ void*host_addr;
+ unsigned long size;
+};
On Mon, Nov 12, 2012 at 01:58:38PM +0100, Juan Quintela wrote:
Hi
Please send in any agenda topics you are interested in.
- Clarify 1.3 plans for CPU: DeviceState CPU, x86 CPU classes, x86 CPU
properties
(we still want to get any of this included, or all will have to wait for 1.4?)
--
HI,
I'm got confused by the date in this topic.
On Mon, Nov 12, 2012 at 8:58 PM, Juan Quintela quint...@redhat.com wrote:
Hi
Please send in any agenda topics you are interested in.
Later, Juan.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
On Mon, Nov 12, 2012 at 3:54 AM, Dong Aisheng b29...@freescale.com wrote:
On Sat, Nov 10, 2012 at 04:44:44PM +0100, Christoffer Dall wrote:
From: Marc Zyngier marc.zyng...@arm.com
Wire the initial in-kernel MMIO support code for the VGIC, used
for the distributor emulation.
Signed-off-by:
On Mon, Nov 12, 2012 at 3:56 AM, Dong Aisheng b29...@freescale.com wrote:
On Sat, Nov 10, 2012 at 04:44:51PM +0100, Christoffer Dall wrote:
[...]
+int kvm_vgic_set_addr(struct kvm *kvm, unsigned long type, u64 addr)
+{
+ int r = 0;
+ struct vgic_dist *vgic = kvm-arch.vgic;
+
+
I'm very sorry for delayed reply.now SR-IOV works for me in Centos
6.3,thank all of you.
On Fri, Nov 9, 2012 at 11:26 PM, Bjorn Helgaas bhelg...@google.com wrote:
Linux normally uses the resource assignments done by the BIOS, but it
is possible for the kernel to reassign those. We don't have
On Mon, Nov 12, 2012 at 4:29 AM, Dong Aisheng b29...@freescale.com wrote:
On Sat, Nov 10, 2012 at 04:44:58PM +0100, Christoffer Dall wrote:
[...]
@@ -141,7 +519,98 @@ struct mmio_range *find_matching_range(const struct
mmio_range *ranges,
*/
bool vgic_handle_mmio(struct kvm_vcpu *vcpu,
Marcelo Tosatti mtosa...@redhat.com writes:
On Mon, Nov 12, 2012 at 01:58:38PM +0100, Juan Quintela wrote:
Hi
Please send in any agenda topics you are interested in.
Later, Juan.
It would be good to have a status report on qemu-kvm compatibility
(the remaining TODO items are with
Am 13.11.2012 13:29, schrieb Eduardo Habkost:
On Mon, Nov 12, 2012 at 01:58:38PM +0100, Juan Quintela wrote:
Please send in any agenda topics you are interested in.
- Clarify 1.3 plans for CPU:
From my submaintainer POV:
DeviceState CPU,
I was specifically tasked with the qdev split by
Anthony Liguori anth...@codemonkey.ws wrote:
Marcelo Tosatti mtosa...@redhat.com writes:
On Mon, Nov 12, 2012 at 01:58:38PM +0100, Juan Quintela wrote:
Hi
Please send in any agenda topics you are interested in.
Later, Juan.
It would be good to have a status report on qemu-kvm
On Tue, Nov 13, 2012 at 03:48:55PM +0100, Juan Quintela wrote:
Anthony Liguori anth...@codemonkey.ws wrote:
Marcelo Tosatti mtosa...@redhat.com writes:
On Mon, Nov 12, 2012 at 01:58:38PM +0100, Juan Quintela wrote:
Hi
Please send in any agenda topics you are interested in.
On Tue, Nov 13, 2012 at 03:29:37PM +0100, Andreas Färber wrote:
Am 13.11.2012 13:29, schrieb Eduardo Habkost:
On Mon, Nov 12, 2012 at 01:58:38PM +0100, Juan Quintela wrote:
Please send in any agenda topics you are interested in.
- Clarify 1.3 plans for CPU:
From my submaintainer
Ccing live migration developers who should be interested in this work,
On Mon, 12 Nov 2012 21:10:32 -0200
Marcelo Tosatti mtosa...@redhat.com wrote:
On Mon, Nov 05, 2012 at 05:59:26PM +0800, Xiao Guangrong wrote:
Do not drop large spte until it can be insteaded by small pages so that
the
On 11/11/2012 01:21 PM, Greg Kroah-Hartman wrote:
On Sat, Nov 10, 2012 at 09:57:14PM +0800, Jiang Liu wrote:
From: Jiang Liu jiang@huawei.com
There are several requirements to temporarily reject device driver
binding. Possible usage cases as below:
1) We should avoid binding an unsafe
-Original Message-
From: Jason Gao [mailto:pkill.2...@gmail.com]
Sent: Tuesday, November 13, 2012 5:38 AM
To: bhelg...@google.com; Rose, Gregory V; Li, Sibai
Cc: ddut...@redhat.com; Kirsher, Jeffrey T; linux-kernel; netdev; kvm; e1000-
de...@lists.sourceforge.net;
On 11/13/2012 07:16 AM, Will Deacon wrote:
On Tue, Nov 13, 2012 at 04:37:38AM +, Sasha Levin wrote:
On 11/12/2012 06:57 AM, Will Deacon wrote:
+struct kvm_mem_bank {
+ struct list_headlist;
+ unsigned long guest_phys_addr;
+ void*host_addr;
+
On Tue, Nov 13, 2012 at 04:09:05PM +, Sasha Levin wrote:
On 11/13/2012 07:16 AM, Will Deacon wrote:
On Tue, Nov 13, 2012 at 04:37:38AM +, Sasha Levin wrote:
On 11/12/2012 06:57 AM, Will Deacon wrote:
+struct kvm_mem_bank {
+ struct list_headlist;
+ unsigned long
On 11/13/2012 11:04 AM, Li, Sibai wrote:
-Original Message-
From: Jason Gao [mailto:pkill.2...@gmail.com]
Sent: Tuesday, November 13, 2012 5:38 AM
To: bhelg...@google.com; Rose, Gregory V; Li, Sibai
Cc: ddut...@redhat.com; Kirsher, Jeffrey T; linux-kernel; netdev; kvm; e1000-
On Sat, 2012-11-10 at 21:57 +0800, Jiang Liu wrote:
From: Jiang Liu jiang@huawei.com
On error recovery path in function vfio_create_group(), it should
unregister the IOMMU notifier for the new VFIO group. Otherwise it may
cause invalid memory access later when handling bus
On Tue, Nov 13, 2012 at 8:04 AM, Li, Sibai sibai...@intel.com wrote:
Thank you very much,I try pci=realloc in Centos 6.3,and now it works for
me.
thank you Sibai,Our server Dell R710,its BIOS version is just
v.6.3.0 and release date is 07/24/2012,and I also configured intel_iommu=on
in
-Original Message-
From: yhlu.ker...@gmail.com [mailto:yhlu.ker...@gmail.com] On Behalf Of
Yinghai Lu
Sent: Tuesday, November 13, 2012 10:17 AM
To: Li, Sibai
Cc: Jason Gao; bhelg...@google.com; Rose, Gregory V; ddut...@redhat.com;
Kirsher, Jeffrey T; linux-kernel; netdev; kvm;
On Tue, Nov 13, 2012 at 10:25 AM, Li, Sibai sibai...@intel.com wrote:
Never append pci=realloc for both kernel 2.6.32.279 and kernel 3.5.0 above.
well, can you both post boot log with debug ignore_loglevel ?
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a
On Tue, Nov 13, 2012 at 10:28:20AM +, Pekka Enberg wrote:
On Tue, Nov 13, 2012 at 12:21 PM, Matt Evans matt.ev...@arm.com wrote:
I *think* Will was going to make some small changes, if you've already
merged it then a follow-up set perhaps?
I only merged the non-ARM specific changes
Hi Anthony,
Please pull the tag below. I posted the linux-headers update
separately on Oct-15; since it hasn't been applied and should be
non-controversial, I include it again here. Thanks,
Alex
The following changes since commit f5022a135e4309a54d433c69b2a056756b2d0d6b:
aio: fix
update-linux-headers.sh script run against Linux tag v3.7-rc5
Signed-off-by: Alex Williamson alex.william...@redhat.com
---
linux-headers/asm-powerpc/kvm_para.h |6 +++---
linux-headers/asm-s390/kvm_para.h|8 +---
linux-headers/asm-x86/kvm.h | 17 +
This makes use of the new level irqfd support enabling bypass of qemu
userspace both on INTx injection and unmask. This significantly
boosts the performance of devices making use of legacy interrupts (ex.
~60% better netperf TCP_RR scores for an e1000e assigned to a Linux
guest and booted with
We can get rid of our local version now that a helper exists.
Signed-off-by: Alex Williamson alex.william...@redhat.com
---
hw/vfio_pci.c | 24 +---
1 file changed, 1 insertion(+), 23 deletions(-)
diff --git a/hw/vfio_pci.c b/hw/vfio_pci.c
index 4e9c2dd..7c27834 100644
---
On Tue, Nov 13, 2012 at 08:52:54AM +0100, Christian Ehrhardt wrote:
Hi,
thanks for your reply.
On Mon, Nov 12, 2012 at 07:32:37PM -0200, Marcelo Tosatti wrote:
there is a bug in the emulation of the lapic time counter. In particular
what we are seeing is that the time counter of a
On Thu, Nov 01, 2012 at 01:55:04PM +0800, zhangyanfei wrote:
于 2012年10月31日 17:01, Hatayama, Daisuke 写道:
-Original Message-
From: kexec-boun...@lists.infradead.org
[mailto:kexec-boun...@lists.infradead.org] On Behalf Of zhangyanfei
Sent: Wednesday, October 31, 2012 12:34 PM
On Fri, Nov 09, 2012 at 05:02:52PM -0800, John Stultz wrote:
On 10/24/2012 06:13 AM, Marcelo Tosatti wrote:
As suggested by John, export time data similarly to how its
done by vsyscall support. This allows KVM to retrieve necessary
information to implement vsyscall support in KVM guests.
On Wed, Oct 31, 2012 at 05:24:33PM +0100, Cornelia Huck wrote:
Hi,
here's the latest incarnation of my host patches to support channel
I/O on s390.
Most patches have only seen minor fixes, but patch 5 is completely
different since the kvm - user space interface has been reworked.
We
On Tue, Oct 30, 2012 at 04:56:38PM +0100, Cornelia Huck wrote:
Hi,
here's the respin of the virtio-ccw guest support patches
(from http://marc.info/?l=kvmm=135151606921361w=2).
Changes to the last version:
- cc'ed stable for patch 1
- coding style fixes in patches 4 and 5
Cornelia
On Fri, Nov 02, 2012 at 06:33:21PM +0800, Guo Chao wrote:
We should avoid kfree()ing error pointer in kvm_vcpu_ioctl() and
kvm_arch_vcpu_ioctl().
Signed-off-by: Guo Chao y...@linux.vnet.ibm.com
Applied all, thanks.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body
I have a working copy of libvirt 0.10.2 + qemu 1.2 installed on a vanilla
up-to-date (2.6.32-279.9.1) CentOS 6 host, and get very good VM - VM
network performance (both running on the same host) using virtio. I have
cgroups set to cap the VMs at 10Gbps and iperf shows I'm getting exactly
10Gbps.
Hi All,
The following patch set can make disordered trace data of a guest and a host
sorted in chronological order.
In a virtualization environment, it is difficult to analyze performance
problems, such as a delay of I/O request on a guest. This is because multiple
guests operate on the host.
Print TSC_OFFSET information when TSC offset value is written to VMCS for
measuring actual TSC of a guest.
TSC value on a guest is always the host TSC plus the guest's TSC offset.
TSC offset is stored in the VMCS in vmx_write_tsc_offset() or
vmx_adjust_tsc_offset(). KVM executes the former
This tool merges trace data of a guest and a host in chronological order.
Note that this tool is used only for a guest and a host. (not for multiple
guests)
- How to use
1. Get trace data of the host and guest via ssh, virtio-serial, or virtio-trace
2. Get TSC offset after applied patch kvm/vmx:
On Wed, 2012-11-14 at 10:36 +0900, Yoshihiro YUNOMAE wrote:
To merge the data like previous pattern, we apply this patch set. Then, we can
get TSC offset of the guest as follows:
$ dmesg | grep kvm
[ 57.717180] kvm: (2687) write TSC offset 18446743360465545001, now clock ##
On 11/13/2012 06:00 PM, Steven Rostedt wrote:
Using printk to export something like this is IMO a nasty hack.
Can't we create a /sys or /proc file to export the same thing?
Maybe we need a /proc/pid/kvm/* directory?
-hpa
--
To unsubscribe from this list: send the line
On Tue, Nov 13, 2012 at 6:00 PM, Steven Rostedt rost...@goodmis.org wrote:
On Wed, 2012-11-14 at 10:36 +0900, Yoshihiro YUNOMAE wrote:
To merge the data like previous pattern, we apply this patch set. Then, we
can
get TSC offset of the guest as follows:
$ dmesg | grep kvm
[ 57.717180]
On Tue, 2012-11-13 at 18:03 -0800, David Sharp wrote:
On Tue, Nov 13, 2012 at 6:00 PM, Steven Rostedt rost...@goodmis.org wrote:
On Wed, 2012-11-14 at 10:36 +0900, Yoshihiro YUNOMAE wrote:
To merge the data like previous pattern, we apply this patch set. Then, we
can
get TSC offset of
A new ioctl, KVM_PPC_GET_HTAB_FD, returns a file descriptor. Reads on
this fd return the contents of the HPT (hashed page table), writes
create and/or remove entries in the HPT. There is a new capability,
KVM_CAP_PPC_HTAB_FD, to indicate the presence of the ioctl. The ioctl
takes an argument
This makes a HPTE removal function, kvmppc_do_h_remove(), available
outside book3s_hv_rm_mmu.c. This will be used by the HPT writing
code.
Signed-off-by: Paul Mackerras pau...@samba.org
---
arch/powerpc/include/asm/kvm_book3s.h |3 +++
arch/powerpc/kvm/book3s_hv_rm_mmu.c | 19
This restructures the code that creates HPT (hashed page table)
entries so that it can be called in situations where we don't have a
struct vcpu pointer, only a struct kvm pointer. It also fixes a bug
where kvmppc_map_vrma() would corrupt the guest R4 value.
Most of the work of
This uses a bit in our record of the guest view of the HPTE to record
when the HPTE gets modified. We use a reserved bit for this, and ensure
that this bit is always cleared in HPTE values returned to the guest.
The recording of modified HPTEs is only done if other code indicates
its interest by
This series of patches provides an interface by which userspace can
read and write the hashed page table (HPT) of a Book3S HV guest.
The interface is an ioctl which provides a file descriptor which can
be accessed with the read() and write() system calls. The data read
and written is the guest
This series of patches provides an interface by which userspace can
read and write the hashed page table (HPT) of a Book3S HV guest.
The interface is an ioctl which provides a file descriptor which can
be accessed with the read() and write() system calls. The data read
and written is the guest
This makes a HPTE removal function, kvmppc_do_h_remove(), available
outside book3s_hv_rm_mmu.c. This will be used by the HPT writing
code.
Signed-off-by: Paul Mackerras pau...@samba.org
---
arch/powerpc/include/asm/kvm_book3s.h |3 +++
arch/powerpc/kvm/book3s_hv_rm_mmu.c | 19
A new ioctl, KVM_PPC_GET_HTAB_FD, returns a file descriptor. Reads on
this fd return the contents of the HPT (hashed page table), writes
create and/or remove entries in the HPT. There is a new capability,
KVM_CAP_PPC_HTAB_FD, to indicate the presence of the ioctl. The ioctl
takes an argument
This restructures the code that creates HPT (hashed page table)
entries so that it can be called in situations where we don't have a
struct vcpu pointer, only a struct kvm pointer. It also fixes a bug
where kvmppc_map_vrma() would corrupt the guest R4 value.
Most of the work of
This uses a bit in our record of the guest view of the HPTE to record
when the HPTE gets modified. We use a reserved bit for this, and ensure
that this bit is always cleared in HPTE values returned to the guest.
The recording of modified HPTEs is only done if other code indicates
its interest by
59 matches
Mail list logo