On Wed, 2010-04-28 at 00:12 +0800, Marcelo Tosatti wrote:
On Tue, Apr 27, 2010 at 03:10:49PM +0800, Huang Ying wrote:
In common cases, guest SRAO MCE will cause corresponding poisoned page
be un-mapped in host and SIGBUS be sent to QEMU-KVM, then QEMU-KVM
will relay the MCE to guest OS.
On 04/27/2010 03:15 PM, Gleb Natapov wrote:
Make set_cr() callback return error if it fails instead of injecting #GP
behind emulator's back.
-void kvm_set_cr0(struct kvm_vcpu *vcpu, unsigned long cr0)
+static int _kvm_set_cr0(struct kvm_vcpu *vcpu, unsigned long cr0)
{
standard
On 04/27/2010 03:15 PM, Gleb Natapov wrote:
This initialization is no longer needed.
Signed-off-by: Gleb Natapovg...@redhat.com
---
arch/x86/kvm/x86.c |2 --
1 files changed, 0 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index ed15b20..29e2d3b
On 04/27/2010 03:15 PM, Gleb Natapov wrote:
Use callbacks from x86_emulate_ops to access segments instead of calling
into kvm directly.
-static unsigned long seg_base(struct x86_emulate_ctxt *ctxt, int seg)
+static unsigned long seg_base(struct x86_emulate_ctxt *ctxt,
+
On Wed, Apr 28, 2010 at 12:11:41PM +0300, Avi Kivity wrote:
On 04/27/2010 03:15 PM, Gleb Natapov wrote:
Return error to x86 emulator instead of injection exception behind its back.
Signed-off-by: Gleb Natapovg...@redhat.com
---
arch/x86/include/asm/kvm_emulate.h |3 +++
On 04/28/2010 07:37 AM, Gerhard Wiesinger wrote:
Hello,
I saw that KVM git repository is not updated from QEMU repository very
often. Is it possible to integrate QEMU git tree into KVM git
regularly as qemu git tree is very dynamic. E.g. last commit was more
than 2 weeks ago. I think it is
On 04/22/10 03:12, Kevin O'Connor wrote:
As I understand it, the hotplug support was only in the kvm copy of
bochs bios. It also limited the number of cpus one could use (I think
16).
The current smp support in SeaBIOS doesn't limit the number of cpus.
So, there has been reluctance to
Hi Marcelo, Avi,
I updated the patch as follows.
Changelog:
1. Inserted one r = -ENOMEM; line following Avi's advice.
2. Little change of explanation about performance improvements.
I'm now testing and cleaning up my next patch series based on this,
so please apply this if this makes sense
On 04/28/2010 05:56 AM, Huang Ying wrote:
Just want to use the side effect of copy_from_user, SIGBUS will be sent
to current process because the page touched is marked as poisoned. That
is, failure is expected, so the return value is not checked.
What if the failure doesn't
On 04/27/2010 03:15 PM, Gleb Natapov wrote:
Return error to x86 emulator instead of injection exception behind its back.
Signed-off-by: Gleb Natapovg...@redhat.com
---
arch/x86/include/asm/kvm_emulate.h |3 +++
arch/x86/kvm/emulate.c | 12 +++-
arch/x86/kvm/x86.c
Michael S. Tsirkin m...@redhat.com wrote:
When vhost-net is disabled on reboot, we set msix mask notifier
to NULL to disable further mask/unmask notifications.
Code currently tries to pass this NULL to notifier,
leading to a crash. The right thing to do is
to add explicit APIs to
Hi,
Can anyone shed some light on a questions I have if possible?
I know KVM uses dnsmasq for DHCP and DNS, but is it possible to not
use this and use another DHCP server to dish out IP addresses? Now if
my understanding is right, there is just a NAT created to access the
VM? How is this
On Wed, Apr 28, 2010 at 11:59:54AM +0300, Avi Kivity wrote:
On 04/27/2010 03:15 PM, Gleb Natapov wrote:
Use callbacks from x86_emulate_ops to access segments instead of calling
into kvm directly.
-static unsigned long seg_base(struct x86_emulate_ctxt *ctxt, int seg)
+static unsigned
When vhost-net is disabled on reboot, we set msix mask notifier
to NULL to disable further mask/unmask notifications.
Code currently tries to pass this NULL to notifier,
leading to a crash. The right thing to do is
to add explicit APIs to enable/disable notifications.
Now when disabling
On 04/28/2010 07:17 AM, Takuya Yoshikawa wrote:
(2010/04/27 22:46), Takuya Yoshikawa wrote:
(2010/04/27 22:18), Avi Kivity wrote:
Furthermore, the reduced allocations seem to produce good effects for
other cases too. Actually, I observed that the time for the ioctl was
more stable than the
On Wed, Apr 28, 2010 at 11:31:00AM +0200, Jes Sorensen wrote:
On 04/22/10 03:12, Kevin O'Connor wrote:
As I understand it, the hotplug support was only in the kvm copy of
bochs bios. It also limited the number of cpus one could use (I think
16).
The current smp support in SeaBIOS
On 04/28/2010 06:54 AM, Xiao Guangrong wrote:
Changlog v3:
Reviewed-by: Avi Kivity a...@redhat.com
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More
On 04/28/10 12:30, Gleb Natapov wrote:
On Wed, Apr 28, 2010 at 11:31:00AM +0200, Jes Sorensen wrote:
On 04/22/10 03:12, Kevin O'Connor wrote:
Generating the more complex tables dynamically would be preferred, but
it requires like half an AML compiler in Seabios, so it kinda stalled
there
On Wed, Apr 28, 2010 at 12:41:51PM +0200, Jes Sorensen wrote:
On 04/28/10 12:30, Gleb Natapov wrote:
On Wed, Apr 28, 2010 at 11:31:00AM +0200, Jes Sorensen wrote:
On 04/22/10 03:12, Kevin O'Connor wrote:
Generating the more complex tables dynamically would be preferred, but
it requires
On Tue, Apr 27, 2010 at 03:34:10PM +0300, Avi Kivity wrote:
On 04/27/2010 01:38 PM, Joerg Roedel wrote:
This patch introduces a mmu-callback to translate gpa
addresses in the walk_addr code. This is later used to
translate l2_gpa addresses into l1_gpa addresses.
+static inline gfn_t
On Tue, Apr 27, 2010 at 03:34:10PM +0300, Avi Kivity wrote:
On 04/27/2010 01:38 PM, Joerg Roedel wrote:
This patch introduces a mmu-callback to translate gpa
addresses in the walk_addr code. This is later used to
translate l2_gpa addresses into l1_gpa addresses.
+static inline gfn_t
On 04/26/2010 01:03 PM, Jason Wang wrote:
Current matching re ^\s*[Ll]ogin:\s*$ is not suitable for the serial
console, so change it to [Ll]ogin:.
Signed-off-by: Jason Wang jasow...@redhat.com
---
client/tests/kvm/kvm_utils.py |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
On 04/27/2010 04:46 PM, Takuya Yoshikawa wrote:
(2010/04/27 22:18), Avi Kivity wrote:
Furthermore, the reduced allocations seem to produce good effects for
other cases too. Actually, I observed that the time for the ioctl was
more stable than the original one and the average time for dirty
On 04/28/2010 01:52 PM, Joerg Roedel wrote:
On Tue, Apr 27, 2010 at 03:34:10PM +0300, Avi Kivity wrote:
On 04/27/2010 01:38 PM, Joerg Roedel wrote:
This patch introduces a mmu-callback to translate gpa
addresses in the walk_addr code. This is later used to
translate l2_gpa addresses
On 04/26/2010 01:03 PM, Jason Wang wrote:
Sometimes we need to send an assist string to a session in order to
get the prompt especially when re-connecting to an already logged
serial session. This patch send the assist string before doing the
pattern matching of remote_login.
Can you give an
On 04/26/2010 01:03 PM, Jason Wang wrote:
In order to let the serial console work, we must let the
remote_login() send the username when needed.
Signed-off-by: Jason Wang jasow...@redhat.com
---
client/tests/kvm/kvm_utils.py | 14 ++
1 files changed, 10 insertions(+), 4
On 04/28/2010 02:03 PM, Joerg Roedel wrote:
On Tue, Apr 27, 2010 at 03:34:10PM +0300, Avi Kivity wrote:
On 04/27/2010 01:38 PM, Joerg Roedel wrote:
This patch introduces a mmu-callback to translate gpa
addresses in the walk_addr code. This is later used to
translate l2_gpa addresses
I think users will enable tdp when their hardwares support ept or npt.
This patch can reduce about 50% kvm mmu memory usage for they.
This simple patch use the fact that:
When sp-role.direct is set, sp-gfns does not contain any essential
information, leaf sptes reachable from this sp are for a
On 04/26/2010 01:04 PM, Jason Wang wrote:
If the screendump and scrialdump threads are created after the
process(), we may lose the progress tracking of guest shutting
down. So this patch creates them before calling process() in preprocess.
Signed-off-by: Jason Wang jasow...@redhat.com
---
On 04/26/2010 01:04 PM, Jason Wang wrote:
This patch introduces a new method which is used to log into the guest
through the guest serial console. The serial_mode must be set to
session in order to make use of this patch.
In what cases would we want to use this feature? The serial console is
On 04/28/2010 02:57 PM, Lai Jiangshan wrote:
I think users will enable tdp when their hardwares support ept or npt.
This patch can reduce about 50% kvm mmu memory usage for they.
Good one!
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list:
Some guest msr values cannot be used on the host (for example. EFER.NX=0),
so we need to switch them atomically during guest entry or exit.
Add a facility to program the vmx msr autoload registers accordingly.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/vmx.c | 49
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/include/asm/vmx.h |4
1 files changed, 4 insertions(+), 0 deletions(-)
diff --git a/arch/x86/include/asm/vmx.h b/arch/x86/include/asm/vmx.h
index 4497318..9e6779f 100644
--- a/arch/x86/include/asm/vmx.h
+++
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/include/asm/vmx.h |8 +++-
1 files changed, 7 insertions(+), 1 deletions(-)
diff --git a/arch/x86/include/asm/vmx.h b/arch/x86/include/asm/vmx.h
index fb9a080..4497318 100644
--- a/arch/x86/include/asm/vmx.h
+++
When EPT is enabled, we cannot emulate EFER.NX=0 through the shadow page
tables. This causes accesses through ptes with bit 63 set to succeed instead
of failing a reserved bit check.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/vmx.c | 11 +++
1 files changed, 11
vmx and svm vcpus have different contents and therefore may have different
alignmment requirements. Let each specify its required alignment.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/ia64/kvm/vmm.c |2 +-
arch/powerpc/kvm/44x.c|2 +-
arch/powerpc/kvm/book3s.c |3
Currently we run with EFER.NX=1 on the guest even if the guest value is 0.
This is fine with shadow, since we check bit 63 when instantiating a page
table, and fault if bit 63 is set while EFER.NX is clear.
This doesn't work with EPT, since we no longer get the change to check guest
ptes. So we
On Tue, Apr 27, 2010 at 03:37:40PM +0300, Avi Kivity wrote:
On 04/27/2010 01:38 PM, Joerg Roedel wrote:
This patch adds the functions to do a nested l2_gva to
l1_gpa page table walk.
Signed-off-by: Joerg Roedeljoerg.roe...@amd.com
---
arch/x86/include/asm/kvm_host.h |4
Hi there,
I am reading the snapshot source code of qemu-kvm-0.12.3, and am
puzzled by the thread synchronization issue in qcow2.c and
qcow2-cluster.c. Could someone please enlighten me? Thanks!
Specifically, I found that BDRVQcowState.cluster_allocs, which is a
QLIST_HEAD, may be accessed
On Tue, Apr 27, 2010 at 04:35:06PM +0300, Avi Kivity wrote:
Perhaps have
struct kvm_mmu base_mmu;
struct kvm_mmu nested_mmu;
struct kvm_mmu *mmu;
Okay, the pointer is only used in the gva_to_gpa path which is the
minority of mmu context usages. I will introduce a
struct
On 04/26/2010 12:59 PM, Marcelo Tosatti wrote:
This is now done via the initialization's qemu_system_reset call.
Signed-off-by: Avi Kivitya...@redhat.com
---
kvm-all.c |1 -
1 files changed, 0 insertions(+), 1 deletions(-)
diff --git a/kvm-all.c b/kvm-all.c
index 9c8aa7d..eabb097 100644
Signed-off-by: Avi Kivity a...@redhat.com
---
kvm/user/test/x86/access.c | 60 +++-
1 files changed, 37 insertions(+), 23 deletions(-)
diff --git a/kvm/user/test/x86/access.c b/kvm/user/test/x86/access.c
index dbc1213..0906691 100644
---
Signed-off-by: Avi Kivity a...@redhat.com
---
kvm/user/test/x86/access.c | 10 --
1 files changed, 8 insertions(+), 2 deletions(-)
diff --git a/kvm/user/test/x86/access.c b/kvm/user/test/x86/access.c
index 5eadff8..dbc1213 100644
--- a/kvm/user/test/x86/access.c
+++
Some processors only set accessed bits if the translation is valid; allow
this behaviour. This squelchs errors running with EPT.
Signed-off-by: Avi Kivity a...@redhat.com
---
kvm/user/test/x86/access.c | 25 -
1 files changed, 20 insertions(+), 5 deletions(-)
diff
There are so many tests, no point in reporting successful ones. Leave the
capability optional in case a failure triggers a kvm or testsuite crash before
the report is complete and we need to see which test failed.
Signed-off-by: Avi Kivity a...@redhat.com
---
kvm/user/test/x86/access.c | 15
Bit 4 of the page-fault error code can only be set if efer.nx=1.
Signed-off-by: Avi Kivity a...@redhat.com
---
kvm/user/test/x86/access.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/kvm/user/test/x86/access.c b/kvm/user/test/x86/access.c
index 5addd15..3338fbc
On Tue, Apr 20, 2010 at 12:26:27AM +0300, Michael S. Tsirkin wrote:
On Fri, Feb 19, 2010 at 12:22:20AM +0200, Michael S. Tsirkin wrote:
I took a stub at documenting CMD and FLUSH request types in virtio
block.
Any comments?
Rusty?
--
To unsubscribe from this list: send the line
Introduce read cache which is needed for instruction that require more
then one exit to userspace. After returning from userspace the instruction
will be re-executed with cached read value.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/kvm_emulate.h |1 +
Dst operand is already initialized during decoding stage. No need to
reinitialize.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/emulate.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index
This instruction does not need generic decoding for its dst operand.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/emulate.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index 6f40337..efb7853 100644
---
Make it more explicit what we are checking for.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/emulate.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index ea5c6fd..fbc555b 100644
---
This is the next round of emulator cleanups. Make it even more detached
from kvm. First patch introduces IO read cache which is needed to
correctly emulate instructions that require more then one IO read exit
during emulation.
ChangeLog;
v1-v2:
- add x86_emulator_ops callback to get cached
emulate_sysexit() should use shadowed registers copy instead of
looking into vcpu state directly.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/emulate.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
Return exception as a result of instruction emulation and handle
injection in KVM code.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/kvm_emulate.h |6 ++
arch/x86/kvm/emulate.c | 124 ++--
arch/x86/kvm/x86.c
Return error to x86 emulator instead of injection exception behind its back.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/kvm_emulate.h |3 +++
arch/x86/kvm/emulate.c | 12 +++-
arch/x86/kvm/x86.c | 28
Emulator shouldn't access vcpu directly.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/emulate.c | 19 ++-
arch/x86/kvm/x86.c | 20 +---
2 files changed, 19 insertions(+), 20 deletions(-)
diff --git a/arch/x86/kvm/emulate.c
It is not called directly outside of the file it's defined in anymore.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/kvm_host.h |5 -
arch/x86/kvm/x86.c |1 -
2 files changed, 0 insertions(+), 6 deletions(-)
diff --git
If emulation failed return immediately.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/x86.c | 31 +++
1 files changed, 15 insertions(+), 16 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 696b34b..445769b 100644
---
Return new RIP as part of instruction emulation result instead of
updating KVM's RIP from x86 emulator code.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/emulate.c |7 ---
arch/x86/kvm/x86.c |4 +++-
2 files changed, 7 insertions(+), 4 deletions(-)
diff --git
Use callbacks from x86_emulate_ops to access segments instead of calling
into kvm directly.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/emulate.c | 200 +---
1 files changed, 105 insertions(+), 95 deletions(-)
diff --git
Make (get|set)_dr() callback return error if it fails instead of
injecting exception behind emulator's back.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/emulate.c | 11 ++--
arch/x86/kvm/x86.c | 63 ---
2 files changed, 45
On VMX it is expensive to call get_cached_descriptor() just to get segment
base since multiple vmcs_reads are done instead of only one. Introduce
new call back get_cached_segment_base() for efficiency.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/kvm_emulate.h |1 +
Make set_cr() callback return error if it fails instead of injecting #GP
behind emulator's back.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/kvm_emulate.h |2 +-
arch/x86/kvm/emulate.c | 10 ++-
arch/x86/kvm/x86.c | 148
Add (set|get)_dr callbacks to x86_emulate_ops instead of calling
them directly.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/kvm_emulate.h |2 ++
arch/x86/include/asm/kvm_host.h|4
arch/x86/kvm/emulate.c |7 +--
arch/x86/kvm/x86.c
Currently emulator returns -1 when emulation failed or IO is needed.
Caller tries to guess whether emulation failed by looking at other
variables. Make it easier for caller to recognise error condition by
always returning -1 in case of failure. For this new emulator
internal return value
ljmp/lcall instruction operand contains address and segment.
It can be 10 bytes long. Currently we decode it as two different
operands. Fix it by introducing new kind of operand that can hold
entire far address.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/kvm_emulate.h |
Add (set|get)_msr callbacks to x86_emulate_ops instead of calling
them directly.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/kvm_emulate.h |2 ++
arch/x86/kvm/emulate.c | 36 ++--
arch/x86/kvm/x86.c |2
On Wed, Apr 28, 2010 at 10:39:06AM -0500, Anthony Liguori wrote:
On 04/26/2010 12:59 PM, Marcelo Tosatti wrote:
This is now done via the initialization's qemu_system_reset call.
Signed-off-by: Avi Kivitya...@redhat.com
---
kvm-all.c |1 -
1 files changed, 0 insertions(+), 1
On Tue, Apr 27, 2010 at 03:10:49PM +0800, Huang Ying wrote:
In common cases, guest SRAO MCE will cause corresponding poisoned page
be un-mapped in host and SIGBUS be sent to QEMU-KVM, then QEMU-KVM
will relay the MCE to guest OS.
But it is possible that the poisoned page is accessed in guest
On Tue, Apr 27, 2010 at 03:56:04PM +0300, Gleb Natapov wrote:
Test that ljmp with operand in IO memory works.
Signed-off-by: Gleb Natapov g...@redhat.com
Applied both, thanks.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
On 04/28/2010 11:22 AM, Marcelo Tosatti wrote:
On Wed, Apr 28, 2010 at 10:39:06AM -0500, Anthony Liguori wrote:
On 04/26/2010 12:59 PM, Marcelo Tosatti wrote:
This is now done via the initialization's qemu_system_reset call.
Signed-off-by: Avi Kivitya...@redhat.com
---
kvm-all.c |
On Wed, Apr 28, 2010 at 01:22:14PM -0300, Marcelo Tosatti wrote:
On Wed, Apr 28, 2010 at 10:39:06AM -0500, Anthony Liguori wrote:
On 04/26/2010 12:59 PM, Marcelo Tosatti wrote:
This is now done via the initialization's qemu_system_reset call.
Signed-off-by: Avi Kivitya...@redhat.com
On Wed, Apr 28, 2010 at 11:54:31AM +0800, Xiao Guangrong wrote:
Changlog v3:
Those changes all form Avi's suggestion, thanks.
- use smart way to fix the bug in patch 1
- remove duplicates code in patch 5
- check error code and fix forgot release page in patch 9
- sync shadow pages in a
On 04/28/2010 09:08 AM, Huang Ying wrote:
There is some test script and document for this in:
git://git.kernel.org/pub/scm/utils/cpu/mce/mce-test.git
test script is in kvm directory, testing document is kvm/README
This is a good candidate for kvm-autotest. We'll get little user
On Wed, Apr 28, 2010 at 12:27:38PM +0300, Michael S. Tsirkin wrote:
When vhost-net is disabled on reboot, we set msix mask notifier
to NULL to disable further mask/unmask notifications.
Code currently tries to pass this NULL to notifier,
leading to a crash. The right thing to do is
to add
On Wed, Apr 28, 2010 at 07:57:01PM +0800, Lai Jiangshan wrote:
I think users will enable tdp when their hardwares support ept or npt.
This patch can reduce about 50% kvm mmu memory usage for they.
This simple patch use the fact that:
When sp-role.direct is set, sp-gfns does not contain
Hi,
I noticed that certain guests (for example, Ubuntu 9.04, Ubuntu 9.10,
and the Ubuntu 10.04 release candidate) show dramatically (~100x) slower
graphical output when running under qemu-kvm-0.12.1.1 than under
qemu-kvm-0.11.1.
Other guests, notably Windows XP and Windows Vista, run fine
On Wed, Apr 28, 2010 at 02:43:05PM -0300, Marcelo Tosatti wrote:
Signed-off-by: Michael S. Tsirkin m...@redhat.com
Applied, thanks.
Can you tell me what commit id it has pls (for backport to rhel6).
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
Bugzilla: 585940
Upstream status: applied on qemu-kvm.git,
commit 992cc816c42f2e93db033919a9ddbfcd1da4
When vhost-net is disabled on reboot, we set msix mask notifier
to NULL to disable further mask/unmask notifications.
Code currently tries to pass this NULL to notifier,
leading to a crash.
Hello,
This is a question I was not able to answer with a search. I've been
using kvm now quite successfully as server side solution. Now I want to
use it on a particular desktop to have a Windows 7 Guest on a native
Linux system. Well this desktop has two Screens, and I'm sure its
expected
This patch adds mergeable receive buffer support to vhost_net.
Signed-off-by: David L Stevens dlstev...@us.ibm.com
diff -ruNp net-next-v0/drivers/vhost/net.c net-next-v7/drivers/vhost/net.c
--- net-next-v0/drivers/vhost/net.c 2010-04-24 21:36:54.0 -0700
+++
On Wednesday, April 28, 2010 03:08:24 pm Axel Kittenberger wrote:
Hello,
This is a question I was not able to answer with a search. I've been
using kvm now quite successfully as server side solution. Now I want to
use it on a particular desktop to have a Windows 7 Guest on a native
Linux
On Wed, Apr 28, 2010 at 11:16:15PM +0300, Michael S. Tsirkin wrote:
Bugzilla: 585940
Upstream status: applied on qemu-kvm.git,
commit 992cc816c42f2e93db033919a9ddbfcd1da4
Please disregard, sent to this list in error.
Sorry about the noise.
--
To unsubscribe from this list: send the line
Hi,
I have been toying around with kvm / libvirt / virt-manager and it's migration
feature.
Both host machines are running a 2.6.33 Kernel.
One host is a Dual Quad Core Intel Xeon E5520 @ 2.27GHz and the other is a
Dual Quad Core Intel E5420 @ 2.50GHz.
Migrating Linux machines works great
On Wed, 2010-04-28 at 17:47 +0800, Avi Kivity wrote:
On 04/28/2010 05:56 AM, Huang Ying wrote:
Just want to use the side effect of copy_from_user, SIGBUS will be sent
to current process because the page touched is marked as poisoned. That
is, failure is expected, so the return value
The idea is simple, just to pin the guest VM user space and then let
host NIC driver has the chance to directly DMA to it.
Isn't it much easier to map the RX ring of the network device into the
guest's address space, have DMA map calls translate guest addresses to
physical/DMA addresses
+static int dev_is_mpassthru(struct net_device *dev)
bool return value should be better here.
--
Regards,
Changli Gao(xiao...@gmail.com)
Thanks, would fix that.
Thanks
Xiaohui
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
87 matches
Mail list logo