Asias He (3):
tcm_vhost: Introduce iov_num_pages
tcm_vhost: Optimize gup in vhost_scsi_map_to_sgl
tcm_vhost: Use iov_num_pages to calculate sgl_count
drivers/vhost/tcm_vhost.c | 47 +--
1 file changed, 29 insertions(+), 18 deletions(-)
--
1.8.1
Add a helper to calculate the number of pages needed for a iov entry.
Signed-off-by: Asias He as...@redhat.com
---
drivers/vhost/tcm_vhost.c | 6 ++
1 file changed, 6 insertions(+)
diff --git a/drivers/vhost/tcm_vhost.c b/drivers/vhost/tcm_vhost.c
index 3720604..ca35c16 100644
---
We can get all the pages in one time instead of calling
gup N times.
Signed-off-by: Asias He as...@redhat.com
---
drivers/vhost/tcm_vhost.c | 33 -
1 file changed, 20 insertions(+), 13 deletions(-)
diff --git a/drivers/vhost/tcm_vhost.c
On Thu, Jan 17, 2013 at 01:07:21PM -0800, Nicholas A. Bellinger wrote:
Hi MST Co,
On Thu, 2013-01-17 at 18:43 +0200, Michael S. Tsirkin wrote:
On Fri, Sep 07, 2012 at 06:48:14AM +, Nicholas A. Bellinger wrote:
From: Nicholas Bellinger n...@linux-iscsi.org
Hello Anthony Co,
On Sun, 20 Jan 2013 18:35:51 -0500, Christoffer Dall
c.d...@virtualopensystems.com wrote:
On Thu, Jan 17, 2013 at 10:55 AM, Marc Zyngier marc.zyng...@arm.com
wrote:
On 16/01/13 17:59, Christoffer Dall wrote:
From: Marc Zyngier marc.zyng...@arm.com
Implement the PSCI specification (ARM DEN
On Fri, Jan 18, 2013 at 07:23:53AM -0500, Ben Collins wrote:
On Jan 18, 2013, at 7:14 AM, Alexander Graf ag...@suse.de wrote:
On 18.01.2013, at 11:55, Gleb Natapov wrote:
On Fri, Jan 18, 2013 at 12:48:25AM +0100, Alexander Graf wrote:
Hi Marcelo / Gleb,
This is my current patch
On Mon, Jan 21, 2013 at 04:39:24AM +0100, Andreas Färber wrote:
Am 17.01.2013 21:59, schrieb Eduardo Habkost:
Currently, the pc-1.4 machine init function enables PV EOI and then
calls the pc-1.2 machine init function. The problem with this approach
is that now we can't enable any additional
Currenly mac is programmed byte by byte. This means that we
have an intermediate step where mac is wrong.
Third patch introduced a new vq control command to set mac
address, it's atomic.
V2: check return of sending command, delay eth_mac_addr()
V3: restore software address when fail to set
We want to send vq command to set mac address in
virtnet_set_mac_address(), so do this function moving.
Fixed a little issue of coding style.
Signed-off-by: Amos Kong ak...@redhat.com
---
drivers/net/virtio_net.c | 89 ++---
1 files changed, 44
From: Stefan Hajnoczi stefa...@gmail.com
When we set mac address, software mac address in system and hardware mac
address all need to be updated. Current eth_mac_addr() doesn't allow
callers to implement error handling nicely.
This patch split eth_mac_addr() to prepare part and real commit part,
Currently we write MAC address to pci config space byte by byte,
this means that we have an intermediate step where mac is wrong.
This patch introduced a new control command to set MAC address,
it's atomic.
VIRTIO_NET_F_CTRL_MAC_ADDR is a new feature bit for compatibility.
Signed-off-by: Amos
On Jan 21, 2013, at 5:40 AM, Gleb Natapov g...@redhat.com wrote:
On Fri, Jan 18, 2013 at 07:23:53AM -0500, Ben Collins wrote:
On Jan 18, 2013, at 7:14 AM, Alexander Graf ag...@suse.de wrote:
On 18.01.2013, at 11:55, Gleb Natapov wrote:
On Fri, Jan 18, 2013 at 12:48:25AM +0100,
Hi,
Could anyone shed a light what happened to Kemari project and are there any
upcoming development planned in order to provide continous non-blocking VM
checkpointing and VM HA with state replication?
Kind regards,
--
--
Andres Toomsalu,
Am 17.01.2013 21:59, schrieb Eduardo Habkost:
I am hoping to get this bug fixed in 1.4. I didn't get much feedback on the
RFC
I sent last week, though.
Igor argued that APIC ID should be set by the board and not by the CPU itself,
but I am not doing that because:
- I want to keep the bug
Hi
Please send in any agenda topics you are interested in.
Later, Juan.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Am 18.01.2013 18:46, schrieb Eric Blake:
On 01/18/2013 09:40 AM, Eduardo Habkost wrote:
On Fri, Jan 18, 2013 at 09:11:42AM -0700, Eric Blake wrote:
On 01/18/2013 07:20 AM, Eduardo Habkost wrote:
Could you suggest a text for me to add please?
Nicholas A. Bellinger n...@linux-iscsi.org writes:
Hi MST Co,
On Thu, 2013-01-17 at 18:43 +0200, Michael S. Tsirkin wrote:
On Fri, Sep 07, 2012 at 06:48:14AM +, Nicholas A. Bellinger wrote:
From: Nicholas Bellinger n...@linux-iscsi.org
Hello Anthony Co,
This is the fourth
Since vmx_get_cpl() always returns 0 when VCPU is in real mode it is no
longer needed. Also reset CPL cache to zero during transaction to
protected mode since transaction may happen while CS.selectors 3 != 0,
but in reality CPL is 0.
Signed-off-by: Gleb Natapov g...@redhat.com
---
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/vmx.c |3 +++
1 file changed, 3 insertions(+)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index edfbe94..f942b20 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@ -3488,6 +3488,9 @@ static bool
There is no reason for it. If state is suitable for vmentry it
will be detected during guest entry and no emulation will happen.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/vmx.c |3 ---
1 file changed, 3 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/vmx.c |3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 9d2ec88..edfbe94 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@ -3269,7 +3269,8 @@ static void
Gleb Natapov (9):
KVM: VMX: remove special CPL cache access during transition to real
mode.
KVM: VMX: reset CPL only on CS register write.
KVM: VMX: if unrestricted guest is enabled vcpu state is always
valid.
KVM: VMX: remove hack that disables emulation on vcpu reset/init
KVM:
If emulate_invalid_guest_state=false vmx-emulation_required is never
actually used, but it ends up to be always set to true since
handle_invalid_guest_state(), the only place it is reset back to
false, is never called. This, besides been not very clean, makes vmexit
and vmentry path to check
Usability is returned in unusable field, so not need to clobber entire
AR. Callers have to know how to deal with unusable segments already
since if emulate_invalid_guest_state=true AR is not zeroed.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/vmx.c |2 --
1 file changed, 2
vmx-rmode.vm86_active is never true is unrestricted guest is enabled.
Make it more explicit that neither enter_pmode() nor enter_rmode() is
called in this case.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/vmx.c | 14 ++
1 file changed, 6 insertions(+), 8
If VMX reports segment as unusable, zero descriptor passed by the emulator
before returning. Such descriptor will be considered not present by the
emulator.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/x86.c |4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git
The function deals with code segment too.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/vmx.c | 14 +++---
1 file changed, 7 insertions(+), 7 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 77212d1..9bc68c7 100644
--- a/arch/x86/kvm/vmx.c
+++
On Sun, Jan 20, 2013 at 06:35:51PM -0500, Christoffer Dall wrote:
On Thu, Jan 17, 2013 at 10:55 AM, Marc Zyngier marc.zyng...@arm.com wrote:
On 16/01/13 17:59, Christoffer Dall wrote:
From: Marc Zyngier marc.zyng...@arm.com
Implement the PSCI specification (ARM DEN 0022A) to control
On 01/21/2013 06:14 AM, Andreas Färber wrote:
glibc is already responsible from converting the 'unsigned long
int' of the user declaration back into the 'unsigned int' that the
kernel expects for the second argument. The third argument (when
present), is generally treated as a pointer (of
On Mon, Jan 21, 2013 at 5:04 AM, Marc Zyngier marc.zyng...@arm.com wrote:
On Sun, 20 Jan 2013 18:35:51 -0500, Christoffer Dall
c.d...@virtualopensystems.com wrote:
On Thu, Jan 17, 2013 at 10:55 AM, Marc Zyngier marc.zyng...@arm.com
wrote:
On 16/01/13 17:59, Christoffer Dall wrote:
From: Marc
On Sat, Jan 19, 2013 at 09:54:26AM +0800, ak...@redhat.com wrote:
From: Michael S. Tsirkin m...@redhat.com
Virtio-net code makes assumption about virtqueue descriptor layout
(e.g. sg[0] is the header, sg[1] is the data buffer).
This patch makes code not rely on the layout of descriptors.
On Sat, Jan 19, 2013 at 09:54:27AM +0800, ak...@redhat.com wrote:
@@ -350,6 +351,18 @@ static int virtio_net_handle_mac(VirtIONet *n, uint8_t
cmd,
struct virtio_net_ctrl_mac mac_data;
size_t s;
+if (cmd == VIRTIO_NET_CTRL_MAC_ADDR_SET) {
+if (iov_size(iov, iov_cnt)
On Sun, Jan 20, 2013 at 10:43:08AM +0800, ak...@redhat.com wrote:
From: Stefan Hajnoczi stefa...@gmail.com
When we set mac address, software mac address in system and hardware mac
address all need to be updated. Current eth_mac_addr() doesn't allow
callers to implement error handling nicely.
On Mon, 21 Jan 2013 09:50:18 -0500, Christoffer Dall
c.d...@virtualopensystems.com wrote:
On Mon, Jan 21, 2013 at 5:04 AM, Marc Zyngier marc.zyng...@arm.com
wrote:
On Sun, 20 Jan 2013 18:35:51 -0500, Christoffer Dall
c.d...@virtualopensystems.com wrote:
On Thu, Jan 17, 2013 at 10:55 AM, Marc
On Mon, Jan 21, 2013 at 12:43 PM, Marc Zyngier marc.zyng...@arm.com wrote:
On Mon, 21 Jan 2013 09:50:18 -0500, Christoffer Dall
c.d...@virtualopensystems.com wrote:
On Mon, Jan 21, 2013 at 5:04 AM, Marc Zyngier marc.zyng...@arm.com
wrote:
On Sun, 20 Jan 2013 18:35:51 -0500, Christoffer Dall
On Mon, 21 Jan 2013 12:54:22 -0500, Christoffer Dall
c.d...@virtualopensystems.com wrote:
On Mon, Jan 21, 2013 at 12:43 PM, Marc Zyngier marc.zyng...@arm.com
wrote:
On Mon, 21 Jan 2013 09:50:18 -0500, Christoffer Dall
c.d...@virtualopensystems.com wrote:
On Mon, Jan 21, 2013 at 5:04 AM, Marc
Hi Fengguang,
I already forwarded these on Thursday. You should have got a mail
about it because I CC'd the kbuild list.
regards,
dan carpenter
On Thu, Jan 17, 2013 at 09:20:49AM +0800, Fengguang Wu wrote:
Hi Alex,
FYI, there are new smatch warnings show up in
tree:
On 21 January 2013 18:08, Marc Zyngier marc.zyng...@arm.com wrote:
I still have hope for QEMU to move forward and eventually generate a DT
based on the host capabilities.
We might improve our modify the DT the user passed us code, but
I don't currently anticipate generate a DT from scratch. In
On Mon, Jan 21, 2013 at 1:08 PM, Marc Zyngier marc.zyng...@arm.com wrote:
On Mon, 21 Jan 2013 12:54:22 -0500, Christoffer Dall
c.d...@virtualopensystems.com wrote:
On Mon, Jan 21, 2013 at 12:43 PM, Marc Zyngier marc.zyng...@arm.com
wrote:
On Mon, 21 Jan 2013 09:50:18 -0500, Christoffer Dall
From: Amos Kong ak...@redhat.com
Date: Mon, 21 Jan 2013 19:17:20 +0800
Currenly mac is programmed byte by byte. This means that we
have an intermediate step where mac is wrong.
Third patch introduced a new vq control command to set mac
address, it's atomic.
V2: check return of sending
On Mon, Jan 21, 2013 at 04:05:27PM +0800, Asias He wrote:
We can get all the pages in one time instead of calling
gup N times.
Signed-off-by: Asias He as...@redhat.com
---
drivers/vhost/tcm_vhost.c | 33 -
1 file changed, 20 insertions(+), 13 deletions(-)
On Wed, Jan 16, 2013 at 06:21:11PM +0800, Yang Zhang wrote:
From: Yang Zhang yang.z.zh...@intel.com
basically to benefit from apicv, we need to enable virtualized x2apic mode.
Currently, we only enable it when guest is really using x2apic.
Also, clear MSR bitmap for corresponding x2apic
On Mon, Jan 21, 2013 at 05:59:07PM -0200, Marcelo Tosatti wrote:
On Wed, Jan 16, 2013 at 06:21:11PM +0800, Yang Zhang wrote:
From: Yang Zhang yang.z.zh...@intel.com
basically to benefit from apicv, we need to enable virtualized x2apic mode.
Currently, we only enable it when guest is
On Wed, Jan 16, 2013 at 06:21:12PM +0800, Yang Zhang wrote:
From: Yang Zhang yang.z.zh...@intel.com
Virtual interrupt delivery avoids KVM to inject vAPIC interrupts
manually, which is fully taken care of by the hardware. This needs
some special awareness into existing interrupr injection
On Mon, Jan 21, 2013 at 07:03:00AM +0200, Gleb Natapov wrote:
@@ -115,6 +116,42 @@ static void update_handled_vectors(struct kvm_ioapic
*ioapic)
smp_wmb();
}
+void set_eoi_exitmap(struct kvm_vcpu *vcpu)
+{
This function is exported from the file and need to have more
On Mon, Jan 21, 2013 at 07:05:43PM -0200, Marcelo Tosatti wrote:
+ struct vcpu_vmx *vmx = to_vmx(vcpu);
+
+ if (WARN_ONCE((vector 255),
+ KVM VMX: vector (%d) out of range\n, vector))
+ return;
Please remove the WARN_ON, inject triple fault if this happens
On Mon, Jan 21, 2013 at 07:21:13PM -0200, Marcelo Tosatti wrote:
On Mon, Jan 21, 2013 at 10:21:14PM +0200, Gleb Natapov wrote:
}
+
+ vcpu-arch.apic_base = value;
Simpler to have
if (apic_x2apic_mode(apic)) {
...
On Mon, Jan 21, 2013 at 10:21:14PM +0200, Gleb Natapov wrote:
}
+
+ vcpu-arch.apic_base = value;
Simpler to have
if (apic_x2apic_mode(apic)) {
...
kvm_x86_ops-set_virtual_x2apic_mode(vcpu, true);
} else {
kvm_x86_ops-set_virtual_x2apic_mode(vcpu, false);
Hi Linus,
The following changes since commit 406089d01562f1e2bf9f089fd7637009ebaad589:
Merge tag 'trace-3.8-rc3-regression-fix' of
git://git.kernel.org/pub/scm/linux/kernel/git/rostedt/linux-trace (2013-01-14
20:22:16 -0800)
are available in the git repository at:
Hi Dan and Alex,
On Mon, Jan 21, 2013 at 09:17:51PM +0300, Dan Carpenter wrote:
Hi Fengguang,
I already forwarded these on Thursday. You should have got a mail
about it because I CC'd the kbuild list.
Yes it is! Sorry for the duplicated report!
Fengguang
--
To unsubscribe from this list:
On 01/22/2013 02:57 AM, Marcelo Tosatti wrote:
On Mon, Jan 21, 2013 at 04:05:27PM +0800, Asias He wrote:
We can get all the pages in one time instead of calling
gup N times.
Signed-off-by: Asias He as...@redhat.com
---
drivers/vhost/tcm_vhost.c | 33 -
1
On Mon, Jan 21, 2013 at 11:34:20PM +0200, Gleb Natapov wrote:
On Mon, Jan 21, 2013 at 07:21:13PM -0200, Marcelo Tosatti wrote:
On Mon, Jan 21, 2013 at 10:21:14PM +0200, Gleb Natapov wrote:
}
+
+ vcpu-arch.apic_base = value;
Simpler to have
if
On Mon, Jan 21, 2013 at 11:18:28PM +0200, Gleb Natapov wrote:
On Mon, Jan 21, 2013 at 07:05:43PM -0200, Marcelo Tosatti wrote:
+ struct vcpu_vmx *vmx = to_vmx(vcpu);
+
+ if (WARN_ONCE((vector 255),
+ KVM VMX: vector (%d) out of range\n, vector))
+ return;
On Mon, Jan 21, 2013 at 08:16:18PM -0200, Marcelo Tosatti wrote:
On Mon, Jan 21, 2013 at 11:34:20PM +0200, Gleb Natapov wrote:
On Mon, Jan 21, 2013 at 07:21:13PM -0200, Marcelo Tosatti wrote:
On Mon, Jan 21, 2013 at 10:21:14PM +0200, Gleb Natapov wrote:
}
+
+
On Fri, Jan 18, 2013 at 12:48:25AM +0100, Alexander Graf wrote:
Hi Marcelo / Gleb,
This is my current patch queue for ppc against 3.8. Please pull.
It contains a bug fix for an issue that Ben Collins ran into, where
a guest would just abort because it traps during an unknown instruction.
On Sun, Jan 13, 2013 at 11:44:12PM +0800, Xiao Guangrong wrote:
Little cleanup for reexecute_instruction, also use gpa_to_gfn in
retry_instruction
Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com
Applied series, thanks.
--
To unsubscribe from this list: send the line
Add a helper to calculate the number of pages needed for a iov entry.
Signed-off-by: Asias He as...@redhat.com
---
drivers/vhost/tcm_vhost.c | 6 ++
1 file changed, 6 insertions(+)
diff --git a/drivers/vhost/tcm_vhost.c b/drivers/vhost/tcm_vhost.c
index 3720604..ca35c16 100644
---
Changes in v2:
- Use GFP_KERNEL instead of GFP_ATOMIC
- Handle pages pinned less than wanted
Asias He (3):
tcm_vhost: Introduce iov_num_pages
tcm_vhost: Use iov_num_pages to calculate sgl_count
tcm_vhost: Optimize gup in vhost_scsi_map_to_sgl
drivers/vhost/tcm_vhost.c | 68
We can get all the pages in one time instead of calling
gup N times.
Signed-off-by: Asias He as...@redhat.com
---
drivers/vhost/tcm_vhost.c | 54 ++-
1 file changed, 30 insertions(+), 24 deletions(-)
diff --git a/drivers/vhost/tcm_vhost.c
Signed-off-by: Asias He as...@redhat.com
---
drivers/vhost/tcm_vhost.c | 8 +++-
1 file changed, 3 insertions(+), 5 deletions(-)
diff --git a/drivers/vhost/tcm_vhost.c b/drivers/vhost/tcm_vhost.c
index ca35c16..796a6b0 100644
--- a/drivers/vhost/tcm_vhost.c
+++ b/drivers/vhost/tcm_vhost.c
@@
Marcelo Tosatti wrote on 2013-01-22:
On Mon, Jan 21, 2013 at 08:16:18PM -0200, Marcelo Tosatti wrote:
On Mon, Jan 21, 2013 at 11:34:20PM +0200, Gleb Natapov wrote:
On Mon, Jan 21, 2013 at 07:21:13PM -0200, Marcelo Tosatti wrote:
On Mon, Jan 21, 2013 at 10:21:14PM +0200, Gleb Natapov wrote:
Marcelo Tosatti wrote on 2013-01-22:
On Mon, Jan 21, 2013 at 11:18:28PM +0200, Gleb Natapov wrote:
On Mon, Jan 21, 2013 at 07:05:43PM -0200, Marcelo Tosatti wrote:
+ struct vcpu_vmx *vmx = to_vmx(vcpu);
+
+ if (WARN_ONCE((vector 255),
+ KVM VMX: vector (%d) out of range\n,
Am 22.01.2013 02:43, schrieb Marcelo Tosatti:
On Thu, Jan 17, 2013 at 06:59:27PM -0200, Eduardo Habkost wrote:
Signed-off-by: Eduardo Habkost ehabk...@redhat.com
---
Cc: kvm@vger.kernel.org
Cc: Michael S. Tsirkin m...@redhat.com
Cc: Gleb Natapov g...@redhat.com
Cc: Marcelo Tosatti
From: Yang Zhang yang.z.zh...@intel.com
The acknowledge interrupt on exit feature controls processor behavior
for external interrupt acknowledgement. When this control is set, the
processor acknowledges the interrupt controller to acquire the
interrupt vector on VM exit.
After enabling this
From: Raghavendra K T raghavendra...@linux.vnet.ibm.com
yield_to returns -ESRCH, When source and target of yield_to
run queue length is one. When we see three successive failures of
yield_to we assume we are in potential undercommit case and abort
from PLE handler.
The assumption is backed by low
In some special scenarios like #vcpu = #pcpu, PLE handler may
prove very costly, because there is no need to iterate over vcpus
and do unsuccessful yield_to burning CPU.
The first patch optimizes all the yield_to by bailing out when there
is no need to continue in yield_to (i.e., when there is
From: Peter Zijlstra pet...@infradead.org
In case of undercomitted scenarios, especially in large guests
yield_to overhead is significantly high. when run queue length of
source and target is one, take an opportunity to bail out and return
-ESRCH. This return condition can be further exploited to
On Fri, Jan 18, 2013 at 07:23:53AM -0500, Ben Collins wrote:
On Jan 18, 2013, at 7:14 AM, Alexander Graf ag...@suse.de wrote:
On 18.01.2013, at 11:55, Gleb Natapov wrote:
On Fri, Jan 18, 2013 at 12:48:25AM +0100, Alexander Graf wrote:
Hi Marcelo / Gleb,
This is my current patch
On Jan 21, 2013, at 5:40 AM, Gleb Natapov g...@redhat.com wrote:
On Fri, Jan 18, 2013 at 07:23:53AM -0500, Ben Collins wrote:
On Jan 18, 2013, at 7:14 AM, Alexander Graf ag...@suse.de wrote:
On 18.01.2013, at 11:55, Gleb Natapov wrote:
On Fri, Jan 18, 2013 at 12:48:25AM +0100,
On Fri, Jan 18, 2013 at 12:48:25AM +0100, Alexander Graf wrote:
Hi Marcelo / Gleb,
This is my current patch queue for ppc against 3.8. Please pull.
It contains a bug fix for an issue that Ben Collins ran into, where
a guest would just abort because it traps during an unknown instruction.
70 matches
Mail list logo