On 04/26/2010 06:58 AM, Xiao Guangrong wrote:
Avi Kivity wrote:
On 04/25/2010 10:00 AM, Xiao Guangrong wrote:
Two cases maybe happen in kvm_mmu_get_page() function:
- one case is, the goal sp is already in cache, if the sp is unsync,
we only need update it to assure this
On Fri, 2010-04-23 at 13:50 +0300, Avi Kivity wrote:
On 04/22/2010 01:27 PM, Liu Yu-B13201 wrote:
I met this error when built kernel. Anything wrong?
CC init/main.o
In file included from include/linux/ftrace_event.h:8,
from include/trace/syscall.h:6,
On 04/26/2010 04:14 AM, Rusty Burchfield wrote:
When trying to boot installer iso's on this platform I get the
following error about 40 times per second in my kern.log.
kernel: [ 4857.828875] handle_exception: unexpected, vectoring info
0x880e intr info 0x8b0d
These options have no
On 04/26/2010 06:10 AM, Xiao Guangrong wrote:
Avi Kivity wrote:
On 04/25/2010 10:00 AM, Xiao Guangrong wrote:
If the guest is 32-bit, we should use 'quadrant' to adjust gpa
offset
Changlog v2:
- when level is PT_DIRECTORY_LEVEL, the 'offset' should be
'role.quadrant 8',
Hi Avi,
Avi Kivity kirjoitti:
I noticed that QEMU uses KVM_SET_MP_STATE but the ioctl() is
completely undocumented. I assume it has something to do with
multiprocessor but I am unable to work out the details unless I take a
peek at arch/x86/kvm.
Patch sent.
Two more interesting but
I tried to separate direct and indirect page allocation to reduce memory
usage with tdp, but that turned out too messy (and not much of a win - we
allocate 8K per page outside the struct kvm_mmu_page). However the cleanups
on the way are worthwhile.
Avi Kivity (5):
KVM: MMU: Rearrange struct
This is incremented by a maximum of 4 for every vcpu, so we are far from
overflow. 16 bits improve struct packing.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/include/asm/kvm_host.h |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git
Put all members required for direct pages together, to reduce cache footprint
for those pages.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/include/asm/kvm_host.h | 15 ---
1 files changed, 8 insertions(+), 7 deletions(-)
diff --git a/arch/x86/include/asm/kvm_host.h
Reduce code duplication.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/mmu.c | 44 +---
1 files changed, 21 insertions(+), 23 deletions(-)
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index ddfa865..4da4ff1 100644
---
We currently use cr3, which is a random number for direct maps. Use zero
instead (the start of the linear range mapped by the root).
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/mmu.c |9 +
1 files changed, 5 insertions(+), 4 deletions(-)
diff --git
Fir direct maps, root_gfn or cr3 are meaningless. This hasn't bitten us
because no sane guest sets cr3 outside its own memory even in real mode.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/mmu.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git
Reported by Andrew Jones.
Signed-off-by: Avi Kivity a...@redhat.com
---
Documentation/kvm/mmu.txt | 10 +-
1 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/Documentation/kvm/mmu.txt b/Documentation/kvm/mmu.txt
index da04671..0cc28fb 100644
--- a/Documentation/kvm/mmu.txt
On 04/26/2010 11:48 AM, Avi Kivity wrote:
I tried to separate direct and indirect page allocation to reduce memory
usage with tdp, but that turned out too messy (and not much of a win - we
allocate 8K per page outside the struct kvm_mmu_page). However the cleanups
on the way are worthwhile.
On 04/23/2010 02:11 PM, Avi Kivity wrote:
All feedback would be welcome, since I'm new to this system! A
strawman patch follows.
Patch is correct, but I have already fixed this in a more extensive
patch set (that also folds the 32-bit and 64-bit cases together, etc.)
and I'm too lazy to
Hi Avi,
I want you look at this patch before discussing about our patch set.
This patch sould itself worth it, I belive, and shows how much improvements
we can expect from our dirty bitmap works.
Note: this will not conflict with our future works!
Thanks,
Takuya
** Simple test **
1. What we
Although we always allocate a new dirty bitmap in x86's get_dirty_log(),
it is only used as a zero-source of copy_to_user() and freed right after
that when memslot is clean. This patch uses clear_user() instead of doing
this unnecessary zero-source allocation.
Performance improvement: as we can
The guest console is useful for troubleshooting the failure cases
especially for the one who has calltrace. And the session through it
is also useful for the networking related test cases ( consider the
test which could shutdown or crash the guest network ). so this
patchset first redirects the
Sometimes we need to send an assist string to a session in order to
get the prompt especially when re-connecting to an already logged
serial session. This patch send the assist string before doing the
pattern matching of remote_login.
Signed-off-by: Jason Wang jasow...@redhat.com
---
In order to let the serial console work, we must let the
remote_login() send the username when needed.
Signed-off-by: Jason Wang jasow...@redhat.com
---
client/tests/kvm/kvm_utils.py | 14 ++
1 files changed, 10 insertions(+), 4 deletions(-)
diff --git
Current matching re ^\s*[Ll]ogin:\s*$ is not suitable for the serial
console, so change it to [Ll]ogin:.
Signed-off-by: Jason Wang jasow...@redhat.com
---
client/tests/kvm/kvm_utils.py |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/client/tests/kvm/kvm_utils.py
This patch redirect the guest serial to the unix domain socket which
would be used by the following patches to dump its content or use it
as a session.
Signed-off-by: Jason Wang jasow...@redhat.com
---
client/tests/kvm/kvm_vm.py | 19 ---
1 files changed, 12 insertions(+), 7
This patch tries to get the content of guest serial and log it into
the debug directoy of the testcase through a dedicated thread which is
created in the preprocessing and ended in the postprocessing. The
params of serial_mode must be set to dump in order to make use of
this feature.
Need to raise the error when met the unknown type of shell_client in
kvm_vm.remote_login() in order to avoid the traceback.
Signed-off-by: Jason Wang jasow...@redhat.com
---
client/tests/kvm/kvm_vm.py |4 +++-
1 files changed, 3 insertions(+), 1 deletions(-)
diff --git
This patch introduces a new method which is used to log into the guest
through the guest serial console. The serial_mode must be set to
session in order to make use of this patch.
Signed-off-by: Jason Wang jasow...@redhat.com
---
client/tests/kvm/kvm_vm.py | 25 +
1
If the screendump and scrialdump threads are created after the
process(), we may lose the progress tracking of guest shutting
down. So this patch creates them before calling process() in preprocess.
Signed-off-by: Jason Wang jasow...@redhat.com
---
client/tests/kvm/kvm_preprocessing.py |5
As we have the ability to dump the content from serial console or use
a session through it, we need to redirect the console to serial
through unattended files to make use of it.
Signed-off-by: Jason Wang jasow...@redhat.com
---
client/tests/kvm/unattended/Fedora-10.ks |2 +-
On Monday 26 April 2010, I wrote:
host:
cat /sys/devices/system/clocksource/clocksource0/current_clocksource
tsc
guest:
cat /sys/devices/system/clocksource/clocksource0/current_clocksource
kvm-clock
Forgotten some info which might be essential:
Kernel (host and guest): 2.6.32-trunk-amd64
userspace
Current method may or may not work for various kinds of
distribution. So this patch enable the ability to use customized
commands to get the version of kvm and its userspace. kvm_ver_cmd is
used for kvm verison and kvm_userspace_ver_cmd is for its userspace.
Signed-off-by: Jason Wang
KSM may have various control interface for different distributions,so
this patch launch ksm through pre_command instead of the hard-coded
bits in the test. User may specify their owner suitable commands or
paramteres.
Signed-off-by: Jason Wang jasow...@redhat.com
---
Remove the duplicated KERNEL vmlinuz in unattended.py
Signed-off-by: Jason Wang jasow...@redhat.com
---
client/tests/kvm/scripts/unattended.py |1 -
1 files changed, 0 insertions(+), 1 deletions(-)
diff --git a/client/tests/kvm/scripts/unattended.py
b/client/tests/kvm/scripts/unattended.py
Hello all,
from the various sources google comes up with, it seems kvm_clock is now the
preferred clock source for kvm guests. I was hoping it would keep the time
synced with the host, but apparentely it doesn't. I'm seeing a pretty steady 1
sec diff between host and guest. The host is synced
Avi Kivity wrote:
On 04/23/2010 12:59 PM, Yoshiaki Tamura wrote:
Avi Kivity wrote:
On 04/21/2010 08:57 AM, Yoshiaki Tamura wrote:
Currently buf size is fixed at 32KB. It would be useful if it could
be flexible.
Why is this needed? The real buffering is in the kernel anyways; this is
only
Anthony Liguori wrote:
On 04/22/2010 11:02 PM, Yoshiaki Tamura wrote:
Anthony Liguori wrote:
On 04/21/2010 12:57 AM, Yoshiaki Tamura wrote:
For fool proof purpose, qemu_put_vector_parepare should be called
before qemu_put_vector. Then, if qemu_put_* functions except this is
called after
Anthony Liguori wrote:
On 04/22/2010 10:37 PM, Yoshiaki Tamura wrote:
Anthony Liguori wrote:
On 04/21/2010 12:57 AM, Yoshiaki Tamura wrote:
QEMUFile currently doesn't support writev(). For sending multiple
data, such as pages, using writev() should be more efficient.
Signed-off-by: Yoshiaki
Anthony Liguori wrote:
On 04/22/2010 08:53 PM, Yoshiaki Tamura wrote:
Anthony Liguori wrote:
On 04/22/2010 08:16 AM, Yoshiaki Tamura wrote:
2010/4/22 Dor Laordl...@redhat.com:
On 04/22/2010 01:35 PM, Yoshiaki Tamura wrote:
Dor Laor wrote:
On 04/21/2010 08:57 AM, Yoshiaki Tamura wrote:
Hi
Avi Kivity wrote:
On 04/21/2010 08:57 AM, Yoshiaki Tamura wrote:
Kemari starts synchronizing VMs when QEMU handles I/O requests.
Without this patch VCPU state is already proceeded before
synchronization, and after failover to the VM on the receiver, it
hangs because of this.
We discussed
subscribe kvm
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Hi,
I wonder if anyone is able to help me?
I am trying to get a system setup that consits of:
1x Centos 5.4 Host machine
1x kvm virtual guest which will be a build server with dhcp running.
x number of guests, built from the build virtual machine.
the problem I have is that kvm currently has
On Mon, Apr 26, 2010 at 7:10 AM, Anthony Davis
t...@specialistdevelopment.com wrote:
the problem I have is that kvm currently has dhcp running and setting up
NATs etc...
I need to stop this, but still allow my current virtual machines access out,
how would be the best way to do this?
use
Quoting Javier Guerra Giraldez jav...@guerrag.com:
On Mon, Apr 26, 2010 at 7:10 AM, Anthony Davis
t...@specialistdevelopment.com wrote:
the problem I have is that kvm currently has dhcp running and setting up
NATs etc...
I need to stop this, but still allow my current virtual machines access
On 04/26/2010 10:48 AM, Pekka Enberg wrote:
Two more interesting but undocumented ioctls:
- KVM_SET_IDENTITY_MAP_ADDR
- KVM_SET_BOOT_CPU_ID
I'll post patches.
Little background: we're debugging a KVM_EXIT_UNKNOWN problem for the
largest bug-free kernel on Core i5 machine. I've been
When vhost-net is disabled on reboot, we set msix mask notifier
to NULL to disable further mask/unmask notifications.
Code currently tries to pass this NULL to notifier,
leading to a crash. The right thing to do is:
- if vector is masked, we don't need to notify backend,
just disable future
On Sun, Apr 25, 2010 at 05:17:55PM +0300, Avi Kivity wrote:
On 04/25/2010 04:57 PM, Jan Kiszka wrote:
It's still a good idea. The current API assumes that there will be only
one slot-based client (or that multiple clients will keep the refcount
themselves).
After the bytemap - multiple
Hi all
Is it possible to configure jumbo frames (mtu=9000) on a kvm guest
using virtio net drivers?
Thanks.
--
CL Martinez
carlopmart {at} gmail {d0t} com
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info
Alex,
You don't need to run ntp on each guest. You can enable rtc support in
the guest kernel and on the hypervisor. Run ntp client on the hypervisor
via cron, and use hwclock -w on the hypervisor after you run ntp, to
sync the hardware clock to the system clock (which is now updated by
On Mon, Apr 26, 2010 at 10:32:51AM -0400, John Buswell wrote:
You don't need to run ntp on each guest. You can enable rtc support in
the guest kernel and on the hypervisor. Run ntp client on the hypervisor
via cron, and use hwclock -w on the hypervisor after you run ntp, to
sync the
Athanasius wrote:
On Mon, Apr 26, 2010 at 10:32:51AM -0400, John Buswell wrote:
You don't need to run ntp on each guest. You can enable rtc support in
the guest kernel and on the hypervisor. Run ntp client on the hypervisor
via cron, and use hwclock -w on the hypervisor after you run ntp,
On Fri, Apr 16, 2010 at 02:41:37PM -0600, Bruce Rogers wrote:
The boot option is missing from the documentation for the -drive parameter.
If there is a better way to descibe it, I'm all ears.
Signed-off-by: Bruce Rogers brog...@novell.com
diff --git a/qemu-options.hx b/qemu-options.hx
Please send in any agenda items you are interested in covering.
While I don't expect it to be the case this week, if we have a
lack of agenda items I'll cancel the week's call.
thanks,
-chris
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
On Fri, Apr 23, 2010 at 01:58:22PM +0800, Gui Jianfeng wrote:
Currently, in kvm_mmu_change_mmu_pages(kvm, page), used_pages-- is
performed after calling
kvm_mmu_zap_page() in spite of that whether page is actually reclaimed.
Because root sp won't
be reclaimed by kvm_mmu_zap_page(). So
Hi,
This is the last series I've sent, with comments from you merged.
The first 5 patches are the same, only with the suggested fixes.
I am leaving documentation out, since the basics won't change, and
we're still discussing the details.
Patch 6 is new, and is the guest side of the skipping
In recent stress tests, it was found that pvclock-based systems
could seriously warp in smp systems. Using ingo's time-warp-test.c,
I could trigger a scenario as bad as 1.5mi warps a minute in some systems.
(to be fair, it wasn't that bad in most of them). Investigating further, I
found out that
This patch removes one padding byte and transform it into a flags
field. New versions of guests using pvclock will query these flags
upon each read.
Flags, however, will only be interpreted when the guest decides to.
It uses the pvclock_valid_flags function to signal that a specific
set of flags
If the HV told us we can fully trust the TSC, skip any
correction
Signed-off-by: Glauber Costa glom...@redhat.com
---
arch/x86/include/asm/kvm_para.h|5 +
arch/x86/include/asm/pvclock-abi.h |1 +
arch/x86/kernel/kvmclock.c |3 +++
arch/x86/kernel/pvclock.c |
We now added a new set of clock-related msrs in replacement of the old
ones. In theory, we could just try to use them and get a return value
indicating they do not exist, due to our use of kvm_write_msr_save.
However, kvm clock registration happens very early, and if we ever
try to write to a
Since we're changing the msrs kvmclock uses, we have to communicate
that to the guest, through cpuid. We can add a new KVM_CAP to the
hypervisor, and then patch userspace to recognize it.
And if we ever add a new cpuid bit in the future, we have to do that again,
which create some complexity and
Avi pointed out a while ago that those MSRs falls into the pentium
PMU range. So the idea here is to add new ones, and after a while,
deprecate the old ones.
Signed-off-by: Glauber Costa glom...@redhat.com
---
arch/x86/include/asm/kvm_para.h |4
arch/x86/kvm/x86.c |7
On 04/26/2010 12:26 PM, Chris Wright wrote:
Please send in any agenda items you are interested in covering.
While I don't expect it to be the case this week, if we have a
lack of agenda items I'll cancel the week's call.
- qemu management interface (and libvirt)
- stable tree policy (push
On Thu, Apr 22, 2010 at 05:33:57PM +0800, Gui Jianfeng wrote:
sp-unsync is bool now, so update trace event declaration.
Signed-off-by: Gui Jianfeng guijianf...@cn.fujitsu.com
---
arch/x86/kvm/mmutrace.h |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git
Gleb,
I'm getting a build warning with latest 2.6.32.12 due to Fix segment
descriptor loading. load_segment_descriptor_to_kvm_desct is unused
after that patch. I assume it's just forgotten code and did not
accidentally become unused, right?
The fact that 2.6.33.3 does not generate this makes me
To be used by next patch.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
---
bswap.h |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/bswap.h b/bswap.h
index aace9b7..956f3fa 100644
--- a/bswap.h
+++ b/bswap.h
@@ -205,8 +205,10 @@ static inline void
From: Sheng Yang sh...@linux.intel.com
If we use larger BIOS image than current 256KB, we would need move reserved
TSS and EPT identity mapping pages. Currently TSS support this, but not
EPT.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
This is now done via the initialization's qemu_system_reset call.
Signed-off-by: Avi Kivity a...@redhat.com
---
kvm-all.c |1 -
1 files changed, 0 insertions(+), 1 deletions(-)
diff --git a/kvm-all.c b/kvm-all.c
index 9c8aa7d..eabb097 100644
--- a/kvm-all.c
+++ b/kvm-all.c
@@ -208,7 +208,6
Which is significantly faster.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
---
kvm-all.c | 53 +
1 files changed, 37 insertions(+), 16 deletions(-)
diff --git a/kvm-all.c b/kvm-all.c
index eabb097..ef45418 100644
--- a/kvm-all.c
+++
From: Jan Kiszka jan.kis...@siemens.com
Make use of the new KVM_GET/SET_DEBUGREGS to save/restore the x86 debug
registers.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
---
kvm-all.c | 11 ++
kvm.h |1 +
Which allows drivers to register an mmaped region into ram block mappings.
To be used by device assignment driver.
CC: Cam Macdonell c...@cs.ualberta.ca
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
---
cpu-common.h |1 +
exec.c | 28
2 files
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
---
hw/vga.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/hw/vga.c b/hw/vga.c
index 845dbcc..db72115 100644
--- a/hw/vga.c
+++ b/hw/vga.c
@@ -1618,8 +1618,8 @@ void vga_dirty_log_stop(VGACommonState *s)
The following changes since commit a303f9e37b87ced34e966dc2c0b7f86bc5e74035:
Blue Swirl (1):
sh4: remove dead assignments, spotted by clang analyzer
are available in the git repository at:
git://git.kernel.org/pub/scm/virt/kvm/qemu-kvm.git uq/master
Jan Kiszka (1):
KVM: x86:
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
target-i386/helper.c |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/target-i386/helper.c b/target-i386/helper.c
index 3835835..c9508a8 100644
--- a/target-i386/helper.c
+++
Since it accesses data protected by the lock.
Signed-off-by: Avi Kivity a...@redhat.com
---
cpus.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/cpus.c b/cpus.c
index 8450ee4..2bf87d2 100644
--- a/cpus.c
+++ b/cpus.c
@@ -401,6 +401,7 @@ static void
Port qemu-kvm's KVM_EXIT_INTERNAL_ERROR handling to upstream.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
kvm-all.c | 31 +++
1 files changed, 31 insertions(+), 0 deletions(-)
diff --git a/kvm-all.c b/kvm-all.c
On 04/26/2010 10:46 AM, Glauber Costa wrote:
This patch removes one padding byte and transform it into a flags
field. New versions of guests using pvclock will query these flags
upon each read.
Is this necessary? Why not just make the pvclock driver maintain a
local flag set, and have the
On 04/26/2010 12:59 PM, Marcelo Tosatti wrote:
Which allows drivers to register an mmaped region into ram block mappings.
To be used by device assignment driver.
This is not kvm specific and not required by this pull request so it
shouldn't really be part of the pull. Something like
On Mon, Apr 26, 2010 at 11:11:57AM -0700, Jeremy Fitzhardinge wrote:
On 04/26/2010 10:46 AM, Glauber Costa wrote:
This patch removes one padding byte and transform it into a flags
field. New versions of guests using pvclock will query these flags
upon each read.
Is this necessary?
On Mon, Apr 26, 2010 at 01:27:30PM -0500, Anthony Liguori wrote:
On 04/26/2010 12:59 PM, Marcelo Tosatti wrote:
Which allows drivers to register an mmaped region into ram block mappings.
To be used by device assignment driver.
This doesn't make much sense to me.
Do you use this like:
On Mon, Apr 26, 2010 at 01:29:06PM -0500, Anthony Liguori wrote:
On 04/26/2010 12:59 PM, Marcelo Tosatti wrote:
Which allows drivers to register an mmaped region into ram block mappings.
To be used by device assignment driver.
This is not kvm specific and not required by this pull request
On 04/26/2010 01:49 PM, Marcelo Tosatti wrote:
On Mon, Apr 26, 2010 at 01:27:30PM -0500, Anthony Liguori wrote:
On 04/26/2010 12:59 PM, Marcelo Tosatti wrote:
Which allows drivers to register an mmaped region into ram block mappings.
To be used by device assignment driver.
On 04/26/2010 01:50 PM, Marcelo Tosatti wrote:
On Mon, Apr 26, 2010 at 01:29:06PM -0500, Anthony Liguori wrote:
On 04/26/2010 12:59 PM, Marcelo Tosatti wrote:
Which allows drivers to register an mmaped region into ram block mappings.
To be used by device assignment driver.
On Sun, Apr 25, 2010 at 03:51:46PM +0300, Avi Kivity wrote:
Signed-off-by: Avi Kivity a...@redhat.com
---
Documentation/kvm/api.txt | 44
1 files changed, 44 insertions(+), 0 deletions(-)
Applied, thanks.
--
To unsubscribe from this list: send
On Mon, Apr 26, 2010 at 01:57:37PM -0500, Anthony Liguori wrote:
On 04/26/2010 01:50 PM, Marcelo Tosatti wrote:
On Mon, Apr 26, 2010 at 01:29:06PM -0500, Anthony Liguori wrote:
On 04/26/2010 12:59 PM, Marcelo Tosatti wrote:
Which allows drivers to register an mmaped region into ram block
On 04/26/2010 02:14 PM, Marcelo Tosatti wrote:
On Mon, Apr 26, 2010 at 01:57:37PM -0500, Anthony Liguori wrote:
On 04/26/2010 01:50 PM, Marcelo Tosatti wrote:
On Mon, Apr 26, 2010 at 01:29:06PM -0500, Anthony Liguori wrote:
On 04/26/2010 12:59 PM, Marcelo Tosatti wrote:
On Sun, Apr 25, 2010 at 4:19 AM, xiaohui@intel.com wrote:
From: Xin Xiaohui xiaohui@intel.com
Signed-off-by: Xin Xiaohui xiaohui@intel.com
Signed-off-by: Zhao Yu yzha...@gmail.com
Reviewed-by: Jeff Dike jd...@linux.intel.com
---
include/linux/netdevice.h | 19
This patch adds mergeable receive buffer support to vhost_net.
+-DLS
Signed-off-by: David L Stevens dlstev...@us.ibm.com
diff -ruNp net-next-v0/drivers/vhost/net.c net-next-v6/drivers/vhost/net.c
--- net-next-v0/drivers/vhost/net.c 2010-04-24
On Thu, Apr 22, 2010 at 02:15:14PM -0700, Eric Northup wrote:
I've been reading the x86's mmu.c recently and had been wondering
about something. Avi's recent mmu documentation (thanks!) seems to
have confirmed my understanding of how the shadow paging is supposed
to be working. In TDP mode,
On Mon, Apr 26, 2010 at 02:20:42PM -0500, Anthony Liguori wrote:
On 04/26/2010 02:14 PM, Marcelo Tosatti wrote:
On Mon, Apr 26, 2010 at 01:57:37PM -0500, Anthony Liguori wrote:
On 04/26/2010 01:50 PM, Marcelo Tosatti wrote:
On Mon, Apr 26, 2010 at 01:29:06PM -0500, Anthony Liguori wrote:
On
On Mon, Apr 26, 2010 at 02:20:52PM -0700, David L Stevens wrote:
This patch adds mergeable receive buffer support to vhost_net.
+-DLS
Signed-off-by: David L Stevens dlstev...@us.ibm.com
OK, looks good. I still think iovec handling is a bit off,
as
On Mon, Apr 26, 2010 at 06:30:00PM -0300, Marcelo Tosatti wrote:
@@ -2089,6 +2089,10 @@ static int mmu_alloc_roots(struct kvm_vcpu *vcpu)
root_gfn = 0;
if (mmu_check_root(vcpu, root_gfn))
return 1;
+ if
* Anthony Liguori (anth...@codemonkey.ws) wrote:
On 04/26/2010 12:26 PM, Chris Wright wrote:
Please send in any agenda items you are interested in covering.
While I don't expect it to be the case this week, if we have a
lack of agenda items I'll cancel the week's call.
- qemu management
On Mon, Apr 26, 2010 at 11:59:21AM +0300, Avi Kivity wrote:
Reported by Andrew Jones.
Signed-off-by: Avi Kivity a...@redhat.com
---
Documentation/kvm/mmu.txt | 10 +-
1 files changed, 5 insertions(+), 5 deletions(-)
Applied, thanks.
--
To unsubscribe from this list: send the
On 04/26/2010 05:12 PM, Chris Wright wrote:
* Anthony Liguori (anth...@codemonkey.ws) wrote:
On 04/26/2010 12:26 PM, Chris Wright wrote:
Please send in any agenda items you are interested in covering.
While I don't expect it to be the case this week, if we have a
lack of agenda
On Mon, Apr 26, 2010 at 2:46 PM, Marcelo Tosatti mtosa...@redhat.com wrote:
Doh, and your patch does not. But it does not apply to kvm.git -next
branch, can you regenerate please?
--
For TDP mode, avoid creating multiple page table roots for the single
guest-to-host physical address map by
On Mon, 26 Apr 2010 12:51:08 -0500
Anthony Liguori anth...@codemonkey.ws wrote:
On 04/26/2010 12:26 PM, Chris Wright wrote:
Please send in any agenda items you are interested in covering.
While I don't expect it to be the case this week, if we have a
lack of agenda items I'll cancel the
Hi there,
The following students have been accepted to work with QEMU for GSoC 2010:
Student: Corentin Chary
Title: Add more sophisticated encodings to VNC server
Mentor: Anthony Liguori
Student: Eduard - Gabriel Munteanu
Title: AMD IOMMU emulation
Mentor: Joerg Roedel
Student: Miguel Di
On 04/26/2010 07:46 AM, Glauber Costa wrote:
Hi,
This is the last series I've sent, with comments from you merged.
The first 5 patches are the same, only with the suggested fixes.
I am leaving documentation out, since the basics won't change, and
we're still discussing the details.
Patch 6 is
kvm_mmu_remove_one_alloc_mmu_page() assumes kvm_mmu_zap_page() only reclaims
only one sp, but that's not the case. This will cause mmu shrinker returns
a wrong number. This patch fix the counting error.
Signed-off-by: Gui Jianfeng guijianf...@cn.fujitsu.com
---
arch/x86/kvm/mmu.c | 10
On Mon, Apr 26, 2010 at 10:15:58PM -0300, Luiz Capitulino wrote:
On Mon, 26 Apr 2010 12:51:08 -0500
Anthony Liguori anth...@codemonkey.ws wrote:
On 04/26/2010 12:26 PM, Chris Wright wrote:
Please send in any agenda items you are interested in covering.
While I don't expect it to be
Hi,
This patch may conflict with the patch I posted on April 19.
http://www.mail-archive.com/qemu-de...@nongnu.org/msg29941.html
If Marcelo's is going to be merged, I need to rebase the above to it.
It would be helpful if you could tell me the plan.
Thanks,
Yoshi
2010/4/27 Marcelo Tosatti
97 matches
Mail list logo