발신자 : kvm@vger.kernel.org
수신자 : SEMIANGEL
제목 : Returned mail: Data format error
첨부 파일명 : attachment.zip(attachment.exe)
검사 결과 : attachment.zip/attachment.exe ( Win32/MyDoom.worm.M ) - 압축 파일(압축을 푼 후
다시 검사하십시오.)
attachment.zip - 삭제
안녕하세요.
매일경제신문사 메일서버 관리자입니다.
보내주신 메일에서 바이러스가 발견되었습니다.
치료가 가능하면
On Mon, Nov 26, 2012 at 05:44:29AM +, Zhang, Yang Z wrote:
Avi Kivity wrote on 2012-11-25:
On 11/25/2012 03:03 PM, Gleb Natapov wrote:
On Sun, Nov 25, 2012 at 02:55:26PM +0200, Avi Kivity wrote:
On 11/22/2012 05:22 PM, Gleb Natapov wrote:
On Wed, Nov 21, 2012 at 04:09:38PM +0800, Yang
Hi
Please send in any agenda topics you are interested in.
Later, Juan.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
On Mon, Nov 26, 2012 at 03:51:04AM +, Zhang, Yang Z wrote:
Gleb Natapov wrote on 2012-11-25:
On Wed, Nov 21, 2012 at 04:09:39PM +0800, Yang Zhang wrote:
Posted Interrupt allows vAPICV interrupts to inject into guest directly
without any vmexit.
- When delivering a interrupt to
On Fri, Nov 23, 2012 at 08:24:32PM +0100, Nikola Ciprich wrote:
Please also post the exact package version you are using - the line
numbers change between releases and depend on which patches have been
applied to the source tree. The distro exact package version allows me
to download the
On Fri, Nov 23, 2012 at 10:34:16AM -0800, Vincent Li wrote:
On Thu, Nov 22, 2012 at 11:29 PM, Stefan Hajnoczi stefa...@gmail.com wrote:
On Wed, Nov 21, 2012 at 03:36:50PM -0800, Vincent Li wrote:
We have users running on redhat based distro (Kernel
2.6.32-131.21.1.el6.x86_64 ) with kvm,
Hi Marcelo,
(2012/11/24 7:46), Marcelo Tosatti wrote:
On Thu, Nov 22, 2012 at 02:21:20PM +0900, Yoshihiro YUNOMAE wrote:
Hi Marcelo,
(2012/11/21 7:51), Marcelo Tosatti wrote:
On Tue, Nov 20, 2012 at 07:36:33PM +0900, Yoshihiro YUNOMAE wrote:
Hi Marcelo,
Sorry for the late reply.
On Sat, Nov 24, 2012 at 06:40:39PM +0200, Shlomi Tsadok wrote:
I'm looking for a way to configure the guest networking(including IP)
dynamically, using a custom script, right after VM creation.
Is there a similar feature in KVM/Libvirt as the Invoke-VMScript in of
VMware's PowerCLI?
It
https://bugzilla.kernel.org/show_bug.cgi?id=50921
Alan a...@lxorguk.ukuu.org.uk changed:
What|Removed |Added
CC||a...@lxorguk.ukuu.org.uk
In some special scenarios like #vcpu = #pcpu, PLE handler may
prove very costly, because there is no need to iterate over vcpus
and do unsuccessful yield_to burning CPU.
The first patch optimizes all the yield_to by bailing out when there
is no need to continue in yield_to (i.e., when there is
From: Peter Zijlstra pet...@infradead.org
In case of undercomitted scenarios, especially in large guests
yield_to overhead is significantly high. when run queue length of
source and target is one, take an opportunity to bail out and return
-ESRCH. This return condition can be further exploited to
From: Raghavendra K T raghavendra...@linux.vnet.ibm.com
yield_to returns -ESRCH, When source and target of yield_to
run queue length is one. When we see three successive failures of
yield_to we assume we are in potential undercommit case and abort
from PLE handler.
The assumption is backed by low
Gleb Natapov wrote on 2012-11-26:
On Mon, Nov 26, 2012 at 03:51:04AM +, Zhang, Yang Z wrote:
Gleb Natapov wrote on 2012-11-25:
On Wed, Nov 21, 2012 at 04:09:39PM +0800, Yang Zhang wrote:
Posted Interrupt allows vAPICV interrupts to inject into guest directly
without any vmexit.
- When
On 24.11.2012, at 10:32, Paul Mackerras wrote:
On Sat, Nov 24, 2012 at 10:05:37AM +0100, Alexander Graf wrote:
On 23.11.2012, at 23:13, Paul Mackerras pau...@samba.org wrote:
On Fri, Nov 23, 2012 at 04:47:45PM +0100, Alexander Graf wrote:
On 22.11.2012, at 10:28, Paul Mackerras
On 23.11.2012, at 23:07, Paul Mackerras wrote:
On Fri, Nov 23, 2012 at 04:43:03PM +0100, Alexander Graf wrote:
On 22.11.2012, at 10:28, Paul Mackerras wrote:
- With the possibility of the host paging out guest pages, the use of
H_LOCAL by an SMP guest is dangerous since the guest could
https://bugzilla.kernel.org/show_bug.cgi?id=50921
--- Comment #13 from Lucio Crusca lu...@sulweb.org 2012-11-26 13:13:56 ---
@Alan: see comment #5, since then I've always tested with and without vbox
modules.
@Gleb: can't run on 3.5.0 right now, I'll take the stack trace ASAP.
--
On 23.11.2012, at 22:42, Paul Mackerras wrote:
On Fri, Nov 23, 2012 at 03:13:09PM +0100, Alexander Graf wrote:
On 22.11.2012, at 10:25, Paul Mackerras wrote:
+ /* Do they have an SLB shadow buffer registered? */
+ slb = vcpu-arch.slb_shadow.pinned_addr;
+ if (!slb)
+
On 05.11.2012, at 04:40, Paul Mackerras wrote:
Here are some fixes for PR-style KVM. With these I can successfully
run a pseries (PAPR) guest under PR KVM on a POWER7. (This is all
running inside a HV KVM virtual machine.) The patches are against
Alex Graf's kvm-ppc-next branch.
Thanks a
On Mon, Nov 26, 2012 at 05:37:54PM +0530, Raghavendra K T wrote:
From: Peter Zijlstra pet...@infradead.org
In case of undercomitted scenarios, especially in large guests
yield_to overhead is significantly high. when run queue length of
source and target is one, take an opportunity to bail
On Mon, Nov 26, 2012 at 05:38:04PM +0530, Raghavendra K T wrote:
From: Raghavendra K T raghavendra...@linux.vnet.ibm.com
yield_to returns -ESRCH, When source and target of yield_to
run queue length is one. When we see three successive failures of
yield_to we assume we are in potential
On Mon, Nov 26, 2012 at 12:29:54PM +, Zhang, Yang Z wrote:
Gleb Natapov wrote on 2012-11-26:
On Mon, Nov 26, 2012 at 03:51:04AM +, Zhang, Yang Z wrote:
Gleb Natapov wrote on 2012-11-25:
On Wed, Nov 21, 2012 at 04:09:39PM +0800, Yang Zhang wrote:
Posted Interrupt allows vAPICV
On 16.10.2012, at 07:01, Michael Ellerman wrote:
Signed-off-by: Michael Ellerman mich...@ellerman.id.au
Thanks, applied to kvm-ppc-next.
Alex
---
MAINTAINERS |1 +
1 file changed, 1 insertion(+)
diff --git a/MAINTAINERS b/MAINTAINERS
index e73060f..32dc107 100644
---
On Mon, Nov 26, 2012 at 02:43:02PM +0100, Andrew Jones wrote:
On Mon, Nov 26, 2012 at 05:38:04PM +0530, Raghavendra K T wrote:
From: Raghavendra K T raghavendra...@linux.vnet.ibm.com
yield_to returns -ESRCH, When source and target of yield_to
run queue length is one. When we see three
On Thu, 2012-11-22 at 11:56 +, Sethi Varun-B16395 wrote:
-Original Message-
From: linux-kernel-ow...@vger.kernel.org [mailto:linux-kernel-
ow...@vger.kernel.org] On Behalf Of Alex Williamson
Sent: Tuesday, November 20, 2012 11:50 PM
To: Alexey Kardashevskiy
Cc: Benjamin
Zhang Yanfei zhangyan...@cn.fujitsu.com writes:
This patch adds an atomic notifier list named crash_notifier_list.
Currently, when loading kvm-intel module, a notifier will be registered
in the list to enable vmcss loaded on all cpus to be VMCLEAR'd if
needed.
crash_notifier_list ick gag
On Mon, Nov 19, 2012 at 10:26:41PM +0200, Michael S. Tsirkin wrote:
Userspace bits:
-
1) LKVM
The latest vhost-blk userspace bits for kvm tool can be found here:
g...@github.com:asias/linux-kvm.git blk.vhost-blk
2) QEMU
The latest vhost-blk userspace
On Fri, 2012-11-23 at 13:02 +1100, Alexey Kardashevskiy wrote:
On 22/11/12 22:56, Sethi Varun-B16395 wrote:
-Original Message-
From: linux-kernel-ow...@vger.kernel.org [mailto:linux-kernel-
ow...@vger.kernel.org] On Behalf Of Alex Williamson
Sent: Tuesday, November 20, 2012
On Fri, 2012-11-23 at 11:06 +0800, yi li wrote:
Hi Guys,
there have a issue about smp_affinity cannot work correctly on guest
os when PCI passthrough device using msi/msi-x with KVM.
My reason:
pcpu will occur a lot of ipi interrupt to find the vcpu to handle the
irq. so the guest os
Marcelo Tosatti mtosa...@redhat.com writes:
The following changes since commit 1ccbc2851282564308f790753d7158487b6af8e2:
qemu-sockets: Fix parsing of the inet option 'to'. (2012-11-21 12:07:59
+0400)
are available in the git repository at:
hi Alex,
the qemu-kvm version 1.2.
Thanks.
YiLi
2012/11/26 Alex Williamson alex.william...@redhat.com:
On Fri, 2012-11-23 at 11:06 +0800, yi li wrote:
Hi Guys,
there have a issue about smp_affinity cannot work correctly on guest
os when PCI passthrough device using msi/msi-x with KVM.
My
On Mon, Nov 26, 2012 at 09:08:54AM -0600, Eric W. Biederman wrote:
Zhang Yanfei zhangyan...@cn.fujitsu.com writes:
This patch adds an atomic notifier list named crash_notifier_list.
Currently, when loading kvm-intel module, a notifier will be registered
in the list to enable vmcss loaded
Gleb Natapov g...@redhat.com writes:
On Mon, Nov 26, 2012 at 09:08:54AM -0600, Eric W. Biederman wrote:
Zhang Yanfei zhangyan...@cn.fujitsu.com writes:
This patch adds an atomic notifier list named crash_notifier_list.
Currently, when loading kvm-intel module, a notifier will be
On Mon, Nov 26, 2012 at 11:43:10AM -0600, Eric W. Biederman wrote:
Gleb Natapov g...@redhat.com writes:
On Mon, Nov 26, 2012 at 09:08:54AM -0600, Eric W. Biederman wrote:
Zhang Yanfei zhangyan...@cn.fujitsu.com writes:
This patch adds an atomic notifier list named crash_notifier_list.
On Mon, 2012-11-26 at 08:18 -0700, Alex Williamson wrote:
On Fri, 2012-11-23 at 13:02 +1100, Alexey Kardashevskiy wrote:
On 22/11/12 22:56, Sethi Varun-B16395 wrote:
-Original Message-
From: linux-kernel-ow...@vger.kernel.org [mailto:linux-kernel-
ow...@vger.kernel.org]
Gleb Natapov g...@redhat.com writes:
On Mon, Nov 26, 2012 at 11:43:10AM -0600, Eric W. Biederman wrote:
Gleb Natapov g...@redhat.com writes:
On Mon, Nov 26, 2012 at 09:08:54AM -0600, Eric W. Biederman wrote:
Zhang Yanfei zhangyan...@cn.fujitsu.com writes:
This patch adds an atomic
On Fri, 2012-11-23 at 20:03 +1100, Alexey Kardashevskiy wrote:
VFIO implements platform independent stuff such as
a PCI driver, BAR access (via read/write on a file descriptor
or direct mapping when possible) and IRQ signaling.
The platform dependent part includes IOMMU initialization
and
Resending these as the mail seems to have not fully worked last Wed.
Marcelo,
I have addressed your comments for this patch set (V3), the following patch for
QEMU-KVM and for adding a test
case for tsc_adjust also to follow today.
Thanks,
Will
Will Auld (2):
Add code to track call
In order to track who initiated the call (host or guest) to modify an msr
value I have changed function call parameters along the call path. The
specific change is to add a struct pointer parameter that points to (index,
data, caller) information rather than having this information passed as
CPUID.7.0.EBX[1]=1 indicates IA32_TSC_ADJUST MSR 0x3b is supported
Basic design is to emulate the MSR by allowing reads and writes to a guest
vcpu specific location to store the value of the emulated MSR while adding
the value to the vmcs tsc_offset. In this way the IA32_TSC_ADJUST value will
be
CPUID.7.0.EBX[1]=1 indicates IA32_TSC_ADJUST MSR 0x3b is supported
Basic design is to emulate the MSR by allowing reads and writes to the
hypervisor vcpu specific locations to store the value of the emulated MSRs.
In this way the IA32_TSC_ADJUST value will be included in all reads to
the TSC MSR
Comments are still not addressed.
On Mon, Nov 26, 2012 at 10:40:51AM -0800, Will Auld wrote:
In order to track who initiated the call (host or guest) to modify an msr
value I have changed function call parameters along the call path. The
specific change is to add a struct pointer parameter
I have several general questions about this patch...
On 11/21/2012 06:33 PM, Sanjay Lal wrote:
The following patchset implements KVM support for MIPS32R2 processors,
using Trap Emulate, with basic runtime binary translation to improve
performance. The goal has been to keep the Guest kernel
Hello,
Am 26.11.2012 19:42, schrieb Will Auld:
CPUID.7.0.EBX[1]=1 indicates IA32_TSC_ADJUST MSR 0x3b is supported
Basic design is to emulate the MSR by allowing reads and writes to the
hypervisor vcpu specific locations to store the value of the emulated MSRs.
In this way the
On Tue, 2012-11-27 at 00:47 +0800, yi li wrote:
hi Alex,
the qemu-kvm version 1.2.
And is the device making use of MSI-X or MSI interrupts. MSI-X should
work on 1.2, MSI does not yet support vector updates for affinity, but
patches are welcome. Thanks,
Alex
2012/11/26 Alex Williamson
On Sun, Nov 25, 2012 at 6:17 PM, George-Cristian Bîrzan g...@birzan.org wrote:
On Sun, Nov 25, 2012 at 5:19 PM, Gleb Natapov g...@redhat.com wrote:
What Windows is this? Can you try changing -cpu host to -cpu
host,+hv_relaxed?
This is on Windows Server 2008 R2 (sorry, forgot to mention that I
https://bugzilla.kernel.org/show_bug.cgi?id=50891
Alex Williamson alex.william...@redhat.com changed:
What|Removed |Added
CC|
Gleb, Marcelo,
Sorry Gleb, I did not see comments from you but I have now found them. In doing
so I also found one form Marcelo that I missed.
What I believe is now outstanding to be addressed are:
From Gleb:
- You've changed function pointer signature here, but emulator_set_msr()
remained
On 10/22/2012 10:33 AM, Rik van Riel wrote:
On 10/16/2012 10:23 PM, Michael Wolf wrote:
In the case of where you have a system that is running in a
capped or overcommitted environment the user may see steal time
being reported in accounting tools such as top or vmstat. This can
cause confusion
On Thu, 2012-11-22 at 10:52 +0200, Alex Lyakas wrote:
Hi Alex,
thanks for your response.
I printed out the vector and entry values of dev-host_msix_entries[i]
within assigned_device_enable_host_msix() before call to
request_threaded_irq(). I see that they are all 0s:
kernel: [
On 11/24/2012 09:44 PM, bugzilla-dae...@bugzilla.kernel.org wrote:
https://bugzilla.kernel.org/show_bug.cgi?id=50921
--- Comment #5 from Lucio Crusca lu...@sulweb.org 2012-11-24 13:44:16 ---
Here the first tests results:
vbox modules do not make a difference (tried rmmod vboxpci
https://bugzilla.kernel.org/show_bug.cgi?id=50921
--- Comment #14 from Anonymous Emailer anonym...@kernel-bugs.osdl.org
2012-11-26 20:10:11 ---
Reply-To: xiaoguangr...@linux.vnet.ibm.com
On 11/24/2012 09:44 PM, bugzilla-dae...@bugzilla.kernel.org wrote:
On Mon, Nov 26, 2012 at 2:58 AM, Stefan Hajnoczi stefa...@gmail.com wrote:
On Fri, Nov 23, 2012 at 10:34:16AM -0800, Vincent Li wrote:
On Thu, Nov 22, 2012 at 11:29 PM, Stefan Hajnoczi stefa...@gmail.com wrote:
On Wed, Nov 21, 2012 at 03:36:50PM -0800, Vincent Li wrote:
We have users running
Sorry, forgot to CC Lucio Crusca.
On 11/27/2012 04:09 AM, Xiao Guangrong wrote:
On 11/24/2012 09:44 PM, bugzilla-dae...@bugzilla.kernel.org wrote:
https://bugzilla.kernel.org/show_bug.cgi?id=50921
--- Comment #5 from Lucio Crusca lu...@sulweb.org 2012-11-24 13:44:16 ---
Here the first
https://bugzilla.kernel.org/show_bug.cgi?id=50921
--- Comment #15 from Anonymous Emailer anonym...@kernel-bugs.osdl.org
2012-11-26 20:29:28 ---
Reply-To: xiaoguangr...@linux.vnet.ibm.com
Sorry, forgot to CC Lucio Crusca.
On 11/27/2012 04:09 AM, Xiao Guangrong wrote:
On 11/24/2012 09:44
On Mon, Nov 26, 2012 at 07:42:28PM +, Auld, Will wrote:
Gleb, Marcelo,
Sorry Gleb, I did not see comments from you but I have now found them. In
doing so I also found one form Marcelo that I missed.
What I believe is now outstanding to be addressed are:
From Gleb:
- You've changed
In the case of where you have a system that is running in a
capped or overcommitted environment the user may see steal time
being reported in accounting tools such as top or vmstat. This can
cause confusion for the end user. To ease the confusion this patch set
adds the idea of consigned
Modify the amount of stealtime that the kernel reports via the /proc interface.
Steal time will now be broken down into steal_time and consigned_time.
Consigned_time will represent the amount of time that is expected to be lost
due to overcommitment of the physical cpu or by using cpu capping.
Add a consigned field. This field will hold the time lost due to capping or
overcommit.
The rest of the time will still show up in the steal-time field.
Signed-off-by: Michael Wolf m...@linux.vnet.ibm.com
---
arch/x86/include/asm/paravirt.h |4 ++--
Add the code to send the consigned time from the host to the guest.
Signed-off-by: Michael Wolf m...@linux.vnet.ibm.com
---
arch/x86/include/asm/kvm_host.h |1 +
arch/x86/include/asm/kvm_para.h |3 ++-
arch/x86/include/asm/paravirt.h |4 ++--
arch/x86/kernel/kvm.c |3
Add a timer to the host. This will define the period. During a period
the first n ticks will go into the consigned bucket. Any other ticks that
occur within the period will be placed in the stealtime bucket.
Signed-off-by: Michael Wolf m...@linux.vnet.ibm.com
---
Add an ioctl to communicate the consign limit to the host.
Signed-off-by: Michael Wolf m...@linux.vnet.ibm.com
---
arch/x86/kvm/x86.c |6 ++
include/linux/kvm_host.h |2 ++
include/uapi/linux/kvm.h |2 ++
virt/kvm/kvm_main.c |7 +++
4 files changed, 17
Add the code to send the consigned time from the host to the guest.
Signed-off-by: Michael Wolf m...@linux.vnet.ibm.com
---
arch/x86/include/asm/kvm_host.h |1 +
arch/x86/include/asm/kvm_para.h |3 ++-
arch/x86/include/asm/paravirt.h |4 ++--
arch/x86/kernel/kvm.c |3
Add a timer to the host. This will define the period. During a period
the first n ticks will go into the consigned bucket. Any other ticks that
occur within the period will be placed in the stealtime bucket.
Signed-off-by: Michael Wolf m...@linux.vnet.ibm.com
---
In the case of where you have a system that is running in a
capped or overcommitted environment the user may see steal time
being reported in accounting tools such as top or vmstat. This can
cause confusion for the end user. To ease the confusion this patch set
adds the idea of consigned
Modify the amount of stealtime that the kernel reports via the /proc interface.
Steal time will now be broken down into steal_time and consigned_time.
Consigned_time will represent the amount of time that is expected to be lost
due to overcommitment of the physical cpu or by using cpu capping.
Add a consigned field. This field will hold the time lost due to capping or
overcommit.
The rest of the time will still show up in the steal-time field.
Signed-off-by: Michael Wolf m...@linux.vnet.ibm.com
---
arch/x86/include/asm/paravirt.h |4 ++--
On Mon, Nov 26, 2012 at 02:10:33PM +0100, Alexander Graf wrote:
On 23.11.2012, at 23:07, Paul Mackerras wrote:
On Fri, Nov 23, 2012 at 04:43:03PM +0100, Alexander Graf wrote:
On 22.11.2012, at 10:28, Paul Mackerras wrote:
- With the possibility of the host paging out guest pages,
On Mon, Nov 26, 2012 at 02:15:16PM +0100, Alexander Graf wrote:
On 23.11.2012, at 22:42, Paul Mackerras wrote:
On Fri, Nov 23, 2012 at 03:13:09PM +0100, Alexander Graf wrote:
On 22.11.2012, at 10:25, Paul Mackerras wrote:
+ /* Do they have an SLB shadow buffer registered? */
+
On 26.11.2012, at 22:33, Paul Mackerras wrote:
On Mon, Nov 26, 2012 at 02:15:16PM +0100, Alexander Graf wrote:
On 23.11.2012, at 22:42, Paul Mackerras wrote:
On Fri, Nov 23, 2012 at 03:13:09PM +0100, Alexander Graf wrote:
On 22.11.2012, at 10:25, Paul Mackerras wrote:
+ /* Do they
On 26.11.2012, at 22:48, Paul Mackerras wrote:
On Mon, Nov 26, 2012 at 02:10:33PM +0100, Alexander Graf wrote:
On 23.11.2012, at 23:07, Paul Mackerras wrote:
On Fri, Nov 23, 2012 at 04:43:03PM +0100, Alexander Graf wrote:
On 22.11.2012, at 10:28, Paul Mackerras wrote:
- With the
On 26.11.2012, at 22:55, Alexander Graf wrote:
On 26.11.2012, at 22:33, Paul Mackerras wrote:
On Mon, Nov 26, 2012 at 02:15:16PM +0100, Alexander Graf wrote:
On 23.11.2012, at 22:42, Paul Mackerras wrote:
On Fri, Nov 23, 2012 at 03:13:09PM +0100, Alexander Graf wrote:
On
https://bugzilla.kernel.org/show_bug.cgi?id=50921
--- Comment #16 from Lucio Crusca lu...@sulweb.org 2012-11-26 22:14:15 ---
@xiaoguangrong: YOU ARE THE MAN! 'emulate_invalid_guest_state = 0' did the
trick, now I have win2000 running in a 3.6.7 kvm guest! Thanks.
Still guessing why it works
On 11/25/2012 11:22 PM, Paolo Bonzini wrote:
Il 21/11/2012 23:41, H. Peter Anvin ha scritto:
From: H. Peter Anvin h...@linux.intel.com
In __emulate_1op_rax_rdx, we use +a and +d which are input/output
constraints, and *then* use a and d as input constraints. This is
incorrect, but happens
On Mon, Nov 26, 2012 at 11:03:48PM +0100, Alexander Graf wrote:
On 26.11.2012, at 22:55, Alexander Graf wrote:
On 26.11.2012, at 22:33, Paul Mackerras wrote:
On Mon, Nov 26, 2012 at 02:15:16PM +0100, Alexander Graf wrote:
On 23.11.2012, at 22:42, Paul Mackerras wrote:
On
On Mon, Nov 26, 2012 at 11:03:19PM +0100, Alexander Graf wrote:
On 26.11.2012, at 22:48, Paul Mackerras wrote:
On Mon, Nov 26, 2012 at 02:10:33PM +0100, Alexander Graf wrote:
On 23.11.2012, at 23:07, Paul Mackerras wrote:
On Fri, Nov 23, 2012 at 04:43:03PM +0100, Alexander Graf
On Tue, Nov 20, 2012 at 07:59:53AM +0800, Xiao Guangrong wrote:
The current reexecute_instruction can not well detect the failed instruction
emulation. It allows guest to retry all the instructions except it accesses
on error pfn.
For example, some cases are nested-write-protect - if the
On Tue, Nov 20, 2012 at 07:59:10AM +0800, Xiao Guangrong wrote:
Currently, reexecute_instruction refused to retry all instructions. If
nested npt is used, the emulation may be caused by shadow page, it can
be fixed by dropping the shadow page
Signed-off-by: Xiao Guangrong
On Mon, Nov 26, 2012 at 08:05:10PM +0900, Yoshihiro YUNOMAE wrote:
500h. event tsc_write tsc_offset=-3000
Then a guest trace containing events with a TSC timestamp.
Which tsc_offset to use?
(that is the problem, which unless i am mistaken can only be solved
easily if the guest can convert
On Tue, Nov 27, 2012 at 12:16:28AM +0100, Alexander Graf wrote:
On 24.11.2012, at 09:37, Paul Mackerras wrote:
Currently, if a machine check interrupt happens while we are in the
guest, we exit the guest and call the host's machine check handler,
which tends to cause the host to panic.
On 27.11.2012, at 00:16, Paul Mackerras wrote:
On Mon, Nov 26, 2012 at 11:03:19PM +0100, Alexander Graf wrote:
On 26.11.2012, at 22:48, Paul Mackerras wrote:
On Mon, Nov 26, 2012 at 02:10:33PM +0100, Alexander Graf wrote:
On 23.11.2012, at 23:07, Paul Mackerras wrote:
On Fri, Nov
On 27.11.2012, at 00:18, Paul Mackerras wrote:
On Tue, Nov 27, 2012 at 12:16:28AM +0100, Alexander Graf wrote:
On 24.11.2012, at 09:37, Paul Mackerras wrote:
Currently, if a machine check interrupt happens while we are in the
guest, we exit the guest and call the host's machine check
On Tue, Nov 20, 2012 at 02:09:46PM +, Pandarathil, Vijaymohan R wrote:
-Original Message-
From: Stefan Hajnoczi [mailto:stefa...@gmail.com]
Sent: Tuesday, November 20, 2012 5:41 AM
To: Pandarathil, Vijaymohan R
Cc: kvm@vger.kernel.org; linux-...@vger.kernel.org;
On Mon, Nov 26, 2012 at 02:48:50PM -0800, H. Peter Anvin wrote:
On 11/25/2012 11:22 PM, Paolo Bonzini wrote:
Il 21/11/2012 23:41, H. Peter Anvin ha scritto:
From: H. Peter Anvin h...@linux.intel.com
In __emulate_1op_rax_rdx, we use +a and +d which are input/output
constraints, and
On 11/26/2012 03:48 PM, Marcelo Tosatti wrote:
Gleb, Marcelo: are you going to apply this or would you prefer I took it
in x86/urgent?
-hpa
Feel free to merge it through x86/urgent.
I presume that's an Acked-by?
-hpa
--
To unsubscribe from this list: send the line
On Tue, Nov 27, 2012 at 12:20:08AM +0100, Alexander Graf wrote:
Hrm. Promise to run checkpatch yourself next time and I'll fix it up for you
this time ;)
OK, will do, thanks. :)
Paul.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
On Mon, 2012-11-26 at 11:04 -0700, Alex Williamson wrote:
Ok, I see tces are put on shutdown via tce_iommu_detach_group, so you're
more concerned about the guest simply mapping over top of it's own
mappings. Is that common? Is it common enough for every multi-page
mapping to assume it will
Alex,
Thanks for your reply, and i will check it agiain with msi-x.
YiLi
2012/11/27 Alex Williamson alex.william...@redhat.com:
On Tue, 2012-11-27 at 00:47 +0800, yi li wrote:
hi Alex,
the qemu-kvm version 1.2.
And is the device making use of MSI-X or MSI interrupts. MSI-X should
work
On Mon, Nov 26, 2012 at 03:49:36PM -0800, H. Peter Anvin wrote:
On 11/26/2012 03:48 PM, Marcelo Tosatti wrote:
Gleb, Marcelo: are you going to apply this or would you prefer I took it
in x86/urgent?
-hpa
Feel free to merge it through x86/urgent.
I presume that's an
https://bugzilla.kernel.org/show_bug.cgi?id=50891
--- Comment #2 from liyi yiliker...@gmail.com 2012-11-27 00:57:28 ---
sorry, i am not clearly it.
1:i am sure the device using the MSI-X, the test is failed.
check the attribute, entry-msi_attrib.is_msix is 1.
pls, the qemu kvm version
This reversion, V4, addresses a couple of issues I missed from Gleb and Marcelo.
Thanks, Will
Will Auld (2):
Add code to track call origin for msr assignment.
Enabling IA32_TSC_ADJUST for KVM guest VM support
arch/x86/include/asm/cpufeature.h | 1 +
arch/x86/include/asm/kvm_host.h | 15
于 2012年11月27日 02:18, Eric W. Biederman 写道:
Gleb Natapov g...@redhat.com writes:
On Mon, Nov 26, 2012 at 11:43:10AM -0600, Eric W. Biederman wrote:
Gleb Natapov g...@redhat.com writes:
On Mon, Nov 26, 2012 at 09:08:54AM -0600, Eric W. Biederman wrote:
Zhang Yanfei zhangyan...@cn.fujitsu.com
In order to track who initiated the call (host or guest) to modify an msr
value I have changed function call parameters along the call path. The
specific change is to add a struct pointer parameter that points to (index,
data, caller) information rather than having this information passed as
CPUID.7.0.EBX[1]=1 indicates IA32_TSC_ADJUST MSR 0x3b is supported
Basic design is to emulate the MSR by allowing reads and writes to a guest
vcpu specific location to store the value of the emulated MSR while adding
the value to the vmcs tsc_offset. In this way the IA32_TSC_ADJUST value will
be
CPUID.7.0.EBX[1]=1 indicates IA32_TSC_ADJUST MSR 0x3b is supported
Basic design is to emulate the MSR by allowing reads and writes to the
hypervisor vcpu specific locations to store the value of the emulated MSRs.
In this way the IA32_TSC_ADJUST value will be included in all reads to
the TSC MSR
Andreas,
Thanks. I just sent the update patch (V3) to address your comments.
Will
-Original Message-
From: kvm-ow...@vger.kernel.org [mailto:kvm-ow...@vger.kernel.org] On
Behalf Of Andreas Färber
Sent: Monday, November 26, 2012 11:05 AM
To: Auld, Will
Cc: Will Auld; qemu-devel;
Zhang Yanfei zhangyan...@cn.fujitsu.com writes:
So in summary,
1. a specific callback function instead of a notifier?
Yes.
2. Instead of calling vmclear_local_loaded_vmcss, the vmclear operation
will just call the vmclear on every vmcss loaded on the cpu?
like below:
static
Am 27.11.2012 02:40, schrieb Will Auld:
CPUID.7.0.EBX[1]=1 indicates IA32_TSC_ADJUST MSR 0x3b is supported
Basic design is to emulate the MSR by allowing reads and writes to the
hypervisor vcpu specific locations to store the value of the emulated MSRs.
In this way the IA32_TSC_ADJUST value
于 2012年11月27日 09:49, Eric W. Biederman 写道:
Zhang Yanfei zhangyan...@cn.fujitsu.com writes:
So in summary,
1. a specific callback function instead of a notifier?
Yes.
2. Instead of calling vmclear_local_loaded_vmcss, the vmclear operation
will just call the vmclear on every vmcss
Sorry, let me figure this out and resend.
Thanks,
Will
-Original Message-
From: kvm-ow...@vger.kernel.org [mailto:kvm-ow...@vger.kernel.org] On
Behalf Of Andreas Färber
Sent: Monday, November 26, 2012 5:51 PM
To: Auld, Will
Cc: Will Auld; qemu-devel; Gleb; mtosa...@redhat.com;
CPUID.7.0.EBX[1]=1 indicates IA32_TSC_ADJUST MSR 0x3b is supported
Basic design is to emulate the MSR by allowing reads and writes to the
hypervisor vcpu specific locations to store the value of the emulated MSRs.
In this way the IA32_TSC_ADJUST value will be included in all reads to
the TSC MSR
1 - 100 of 136 matches
Mail list logo