On 08/08/2011 08:43 PM, Peter Maydell wrote:
On 8 August 2011 18:06, Avi Kivitya...@redhat.com wrote:
Somewhat clumsy since it needs a variable sized region.
@@ -119,7 +120,7 @@ void omap_sdrc_reset(struct omap_sdrc_s *s);
struct omap_gpmc_s;
struct omap_gpmc_s
Avi Kivity wrote:
Also related chips.
Reviewed-by: Richard Henderson r...@twiddle.net
Reviewed-by: Anthony Liguori aligu...@us.ibm.com
Signed-off-by: Avi Kivity a...@redhat.com
---
hw/lance.c | 31 ++-
hw/pcnet-pci.c | 74
On 08/09/2011 09:55 AM, Bob Breuer wrote:
static void lance_cleanup(VLANClientState *nc)
@@ -117,13 +116,11 @@ static int lance_init(SysBusDevice *dev)
SysBusPCNetState *d = FROM_SYSBUS(SysBusPCNetState, dev);
PCNetState *s =d-state;
-s-mmio_index =
-
The conversion passed the wrong opaque pointer, causing a crash on first use.
Pass the correct opaque.
Signed-off-by: Avi Kivity a...@redhat.com
---
hw/lance.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/hw/lance.c b/hw/lance.c
index 8e20360..d83e7f5 100644
---
On Tue, Aug 09, 2011 at 09:54:22AM +0300, Avi Kivity wrote:
The conversion passed the wrong opaque pointer, causing a crash on first use.
Pass the correct opaque.
I've applied this, thanks.
Signed-off-by: Avi Kivity a...@redhat.com
---
hw/lance.c |2 +-
1 files changed, 1
On 9 August 2011 07:34, Avi Kivity a...@redhat.com wrote:
Also, my patchset focuses on mechanical transformations. It is already
risky enough in terms of regressions, I'm not going to rewrite/improve all
of qemu; if you want those callbacks removed, you will have to remove them
yourself.
On 08/09/2011 10:37 AM, Peter Maydell wrote:
On 9 August 2011 07:34, Avi Kivitya...@redhat.com wrote:
Also, my patchset focuses on mechanical transformations. It is already
risky enough in terms of regressions, I'm not going to rewrite/improve all
of qemu; if you want those callbacks
On 8 August 2011 18:06, Avi Kivity a...@redhat.com wrote:
diff --git a/hw/tusb6010.h b/hw/tusb6010.h
new file mode 100644
index 000..6faa94d
--- /dev/null
+++ b/hw/tusb6010.h
@@ -0,0 +1,10 @@
+#ifndef TUSB6010_H
+#define TUSB6010_H
+
+typedef struct TUSBState TUSBState;
+TUSBState
On 9 August 2011 08:41, Avi Kivity a...@redhat.com wrote:
On 08/09/2011 10:37 AM, Peter Maydell wrote:
On 9 August 2011 07:34, Avi Kivitya...@redhat.com wrote:
Also, my patchset focuses on mechanical transformations. It is already
risky enough in terms of regressions, I'm not going to
On 08/09/2011 11:07 AM, Peter Maydell wrote:
On 9 August 2011 08:41, Avi Kivitya...@redhat.com wrote:
On 08/09/2011 10:37 AM, Peter Maydell wrote:
On 9 August 2011 07:34, Avi Kivitya...@redhat.comwrote:
Also, my patchset focuses on mechanical transformations. It is already
On Tue, Aug 09, 2011 at 12:17:50PM +0800, Zhi Yong Wu wrote:
The patch introduce one block queue for QEMU block layer.
Signed-off-by: Zhi Yong Wu wu...@linux.vnet.ibm.com
---
block/blk-queue.c | 141
+
block/blk-queue.h | 73
On Tue, Aug 9, 2011 at 4:46 PM, Ram Pai linux...@us.ibm.com wrote:
On Tue, Aug 09, 2011 at 12:17:50PM +0800, Zhi Yong Wu wrote:
The patch introduce one block queue for QEMU block layer.
Signed-off-by: Zhi Yong Wu wu...@linux.vnet.ibm.com
---
block/blk-queue.c | 141
On 08/09/2011 11:44 AM, Avi Kivity wrote:
...isn't this just throwing away the warnings on bad-width accesses?
It is; will fix.
Reading the original code, it seems broken:
uint32_t omap_badwidth_read32(void *opaque, target_phys_addr_t addr)
{
uint32_t ret;
OMAP_32B_REG(addr);
On Tue, Aug 09, 2011 at 12:17:51PM +0800, Zhi Yong Wu wrote:
Note:
1.) When bps/iops limits are specified to a small value such as 511
bytes/s, this VM will hang up. We are considering how to handle this senario.
2.) When dd command is issued in guest, if its option bs is set to a
Avoid #include hell.
Signed-off-by: Avi Kivity a...@redhat.com
---
v1.1: add copyright/license blurb
hw/devices.h |7 ---
hw/nseries.c |1 +
hw/tusb6010.c |2 +-
hw/tusb6010.h | 25 +
4 files changed, 27 insertions(+), 8 deletions(-)
create mode
Somewhat clumsy since it needs a variable sized region.
Signed-off-by: Avi Kivity a...@redhat.com
---
v1.1: set access size validity for omap gpmc region to allow only 32-bit
accesses
hw/omap.h |3 ++-
hw/omap_gpmc.c | 56
On Tue, Aug 9, 2011 at 4:57 PM, Ram Pai linux...@us.ibm.com wrote:
On Tue, Aug 09, 2011 at 12:17:51PM +0800, Zhi Yong Wu wrote:
Note:
1.) When bps/iops limits are specified to a small value such as 511
bytes/s, this VM will hang up. We are considering how to handle this senario.
On 08/08/2011 10:18 PM, John Paul Walters wrote:
On Jul 21, 2011, at 2:10 AM, Avi Kivity wrote:
On 07/21/2011 02:20 AM, John Paul Walters wrote:
Hi,
We have a 256 core SGI Ultraviolet machine running RHEL 6.1 with qemu-kvm
0.13, and we'd like to be able to start large guest VMs of up to
On 08/07/2011 05:06 PM, Thomas Fjellstrom wrote:
Occasionally when there's heavy cpu and/or io load, a kvm guest will lock up
for minutes at a time, last occurrence was for about 12 minutes or so, and the
guest itself reported:
[1992982.639514] Clocksource tsc unstable (delta = -747307707123
On 08/06/2011 01:39 PM, Christoffer Dall wrote:
Adds support in the identity mapping feature that allows KVM to setup
identity mapping for the Hyp mode with the AP[1] bit set as required by
the specification and also supports freeing created sub pmd's after
finished use.
These two functions:
Hi
Please send in any agenda items you are interested in covering.
Later, Juan.
PD. I was on vacation, and I forget to send the call for agenda
before. Sorry.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo
On 9 August 2011 10:02, Avi Kivity a...@redhat.com wrote:
+static const MemoryRegionOps omap_gpmc_ops = {
+ .read = omap_gpmc_read,
+ .write = omap_gpmc_write,
+ .endianness = DEVICE_NATIVE_ENDIAN,
+ .valid = {
+ .min_access_size = 4,
+ .max_access_size = 4,
+
On 08/09/2011 12:23 PM, Peter Maydell wrote:
On 9 August 2011 10:02, Avi Kivitya...@redhat.com wrote:
+static const MemoryRegionOps omap_gpmc_ops = {
+.read = omap_gpmc_read,
+.write = omap_gpmc_write,
+.endianness = DEVICE_NATIVE_ENDIAN,
+.valid = {
+
On Aug 9, 2011, at 11:20 AM, Avi Kivity wrote:
On 08/06/2011 01:39 PM, Christoffer Dall wrote:
Adds support in the identity mapping feature that allows KVM to setup
identity mapping for the Hyp mode with the AP[1] bit set as required by
the specification and also supports freeing created sub
From: walimis walimis...@gmail.com
replace debug with pause for kvm pause.
Signed-off-by: walimis walimis...@gmail.com
---
tools/kvm/builtin-pause.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/tools/kvm/builtin-pause.c b/tools/kvm/builtin-pause.c
index
From: walimis walimis...@gmail.com
kvm --help and --version are not implemented, so remove them to
avoid ambiguous.
Signed-off-by: walimis walimis...@gmail.com
---
tools/kvm/builtin-help.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/tools/kvm/builtin-help.c
On Tue, Aug 09, 2011 at 10:20:27AM +0100, Avi Kivity wrote:
On 08/06/2011 01:39 PM, Christoffer Dall wrote:
Adds support in the identity mapping feature that allows KVM to setup
identity mapping for the Hyp mode with the AP[1] bit set as required by
the specification and also supports
On 9 August 2011 10:26, Avi Kivity a...@redhat.com wrote:
On 08/09/2011 12:23 PM, Peter Maydell wrote:
On 9 August 2011 10:02, Avi Kivitya...@redhat.com wrote:
+static const MemoryRegionOps omap_gpmc_ops = {
+ .read = omap_gpmc_read,
+ .write = omap_gpmc_write,
+
On 08/06/2011 01:39 PM, Christoffer Dall wrote:
This commit introduces the framework for guest memory management
through the use of 2nd stage translation. Each VM has a pointer
to a level-1 tabled (the pgd field in struct kvm_arch) which is
used for the 2nd stage translations. Entries are added
On 08/06/2011 01:39 PM, Christoffer Dall wrote:
Userspace can inject IRQs and FIQs through the KVM_IRQ_LINE VM ioctl.
This ioctl is used since the sematics are in fact two lines that can be
either raised or lowered on the VCPU - the IRQ and FIQ lines.
KVM needs to know which VCPU it must
On Mon, 8 Aug 2011, Avi Kivity wrote:
fixes BAR sizing as well.
I'm fine with this version, thanks.
[..snip..]
--
mailto:av1...@comtv.ru
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
On Mon, 8 Aug 2011, Avi Kivity wrote:
Fine with this too, thanks.
[..snip..]
--
mailto:av1...@comtv.ru
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
This patch fix kvm-unit-tests hanging and incorrect PT_ACCESSED_MASK
bit set in the case of SMEP fault.
Signed-off-by: Yang, Wei wei.y.y...@intel.com
---
arch/x86/kvm/paging_tmpl.h | 22 +-
1 files changed, 13 insertions(+), 9 deletions(-)
diff --git
This patch changes './kvm list' to retrieve process name from
'/proc/pid/stat' instead of '/proc/pid/comm' as it appears the latter
does not exist by default on several systems.
Reported-by: pradeep psuri...@linux.vnet.ibm.com
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
On Mon, 8 Aug 2011, Peter Maydell wrote:
On 8 August 2011 13:56, Avi Kivity a...@redhat.com wrote:
QEMU deals with a lot of fixed width integer types; their names
(uint64_t etc) are clumsy to use and take up a lot of space.
Following Linux, introduce shorter names, for example U64 for
Hi Christoffer,
These are for mapping host memory, not guest memory, right?
yes (or to be exact - hypervisor memory). The point is that there are special
hardware requirements for translation tables used in Hyp-mode not otherwise
satisfied by the normal page tables.
In function
ACK nice work.
May be cgroup_common should be more general and placed in client/common_lib
and can work general tools for manipulating with cgroups.
- Original Message -
[new] cgroup_common.py
* library for handling cgroups
Signed-off-by: Lukas Doktor ldok...@redhat.com
---
On 08/06/2011 01:39 PM, Christoffer Dall wrote:
Provides complete world-switch implementation to switch to other guests
runinng in non-secure modes. Includes Hyp exception handlers that
captures necessary exception information and stores the information on
the VCPU and KVM structures.
Switching
On 08/06/2011 01:39 PM, Christoffer Dall wrote:
Adds a new important function in the main KVM/ARM code called
handle_exit() which is called from kvm_arch_vcpu_ioctl_run() on returns
from guest execution. This function examines the Hyp-Syndrome-Register
(HSR), which contains information telling
On Aug 9, 2011, at 12:23 PM, Alexey Smirnov wrote:
Hi Christoffer,
These are for mapping host memory, not guest memory, right?
yes (or to be exact - hypervisor memory). The point is that there are
special hardware requirements for translation tables used in Hyp-mode not
otherwise
On Aug 9, 2011, at 11:57 AM, Avi Kivity wrote:
On 08/06/2011 01:39 PM, Christoffer Dall wrote:
This commit introduces the framework for guest memory management
through the use of 2nd stage translation. Each VM has a pointer
to a level-1 tabled (the pgd field in struct kvm_arch) which is
On 08/06/2011 01:39 PM, Christoffer Dall wrote:
Handles the guest faults in KVM by mapping in corresponding user pages
in the 2nd stage page tables.
Introduces new ARM-specific kernel memory types, PAGE_KVM_GUEST and
pgprot_guest variables used to map 2nd stage memory for KVM guests.
+static
On Aug 9, 2011, at 12:07 PM, Avi Kivity wrote:
On 08/06/2011 01:39 PM, Christoffer Dall wrote:
Userspace can inject IRQs and FIQs through the KVM_IRQ_LINE VM ioctl.
This ioctl is used since the sematics are in fact two lines that can be
either raised or lowered on the VCPU - the IRQ and FIQ
Add documentation of the new 'nested' parameter to
'Documentation/kernel-parameters.txt'.
Cc: Avi Kivity a...@redhat.com
Cc: Marcelo Tosatti mtosa...@redhat.com
Cc: Nadav Har'El n...@il.ibm.com
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
Documentation/kernel-parameters.txt |4
On Aug 9, 2011, at 1:09 PM, Avi Kivity wrote:
On 08/06/2011 01:39 PM, Christoffer Dall wrote:
Provides complete world-switch implementation to switch to other guests
runinng in non-secure modes. Includes Hyp exception handlers that
captures necessary exception information and stores the
On Aug 9, 2011, at 1:17 PM, Avi Kivity wrote:
On 08/06/2011 01:39 PM, Christoffer Dall wrote:
Adds a new important function in the main KVM/ARM code called
handle_exit() which is called from kvm_arch_vcpu_ioctl_run() on returns
from guest execution. This function examines the
On Aug 9, 2011, at 1:24 PM, Avi Kivity wrote:
On 08/06/2011 01:39 PM, Christoffer Dall wrote:
Handles the guest faults in KVM by mapping in corresponding user pages
in the 2nd stage page tables.
Introduces new ARM-specific kernel memory types, PAGE_KVM_GUEST and
pgprot_guest variables
On 08/06/2011 01:40 PM, Christoffer Dall wrote:
When the guest accesses I/O memory this will create data abort
exceptions and they are handled by decoding the HSR information
(physical address, read/write, length, register) and forwarding reads
and writes to QEMU which performs the device
On 08/09/2011 02:27 PM, Christoffer Dall wrote:
+
+ if (irq_level-level) {
+ vcpu-arch.virt_irq |= mask;
+ vcpu-arch.wait_for_interrupts = 0;
+ } else
+ vcpu-arch.virt_irq= ~mask;
+
This seems to be non-smp-safe? Do you need atomic
On Aug 9, 2011, at 1:34 PM, Avi Kivity wrote:
On 08/06/2011 01:40 PM, Christoffer Dall wrote:
When the guest accesses I/O memory this will create data abort
exceptions and they are handled by decoding the HSR information
(physical address, read/write, length, register) and forwarding reads
On 08/09/2011 02:34 PM, Christoffer Dall wrote:
+
+/**
+ * emulate_cp15_c15_access -- emulates cp15 accesses for CRn == 15
+ * @vcpu: The VCPU pointer
+ * @p:The coprocessor parameters struct pointer holding trap inst.
details
+ *
+ * The CP15 c15 register is implementation
On Aug 9, 2011, at 1:37 PM, Avi Kivity wrote:
On 08/09/2011 02:27 PM, Christoffer Dall wrote:
+
+if (irq_level-level) {
+vcpu-arch.virt_irq |= mask;
+vcpu-arch.wait_for_interrupts = 0;
+} else
+
On Aug 9, 2011, at 1:39 PM, Avi Kivity wrote:
On 08/09/2011 02:34 PM, Christoffer Dall wrote:
+
+/**
+ * emulate_cp15_c15_access -- emulates cp15 accesses for CRn == 15
+ * @vcpu: The VCPU pointer
+ * @p:The coprocessor parameters struct pointer holding trap inst.
On 08/06/2011 01:38 PM, Christoffer Dall wrote:
The following series implements KVM support for ARM processors,
specifically on the Cortex A-15 platform.
The patch series applies to the arm-lpae branch of ARM Ltd's kernel
tree. This is Version 4 of the patch series, but the first two versions
On 08/09/2011 02:39 PM, Christoffer Dall wrote:
+
+static u32 ls_instr[NUM_LS_INSTR][2] = {
+ {0x0470, 0x0d70}, /* LDRBT */
+ {0x0430, 0x0d70}, /* LDRT */
+ {0x0410, 0x0c50}, /* LDR */
+ {0x0450, 0x0c50}, /* LDRB */
+
On August 9, 2011, Avi Kivity wrote:
On 08/07/2011 05:06 PM, Thomas Fjellstrom wrote:
Occasionally when there's heavy cpu and/or io load, a kvm guest will lock
up for minutes at a time, last occurrence was for about 12 minutes or
so, and the guest itself reported:
[1992982.639514]
On Tue, Aug 9, 2011 at 5:17 AM, Zhi Yong Wu wu...@linux.vnet.ibm.com wrote:
Makefile.objs | 2 +-
block.c | 347
+++--
block.h | 6 +-
block/blk-queue.c | 141 ++
block/blk-queue.h | 73
On Tue, Aug 9, 2011 at 5:17 AM, Zhi Yong Wu wu...@linux.vnet.ibm.com wrote:
Signed-off-by: Zhi Yong Wu wu...@linux.vnet.ibm.com
---
Makefile.objs | 2 +-
blockdev.c | 39 +++
qemu-config.c | 24
qemu-option.c |
On 08/09/2011 03:03 PM, Thomas Fjellstrom wrote:
Your guest isn't using kvmclock for some reason. Is it compiled in the
guest kernel? What are the contents of
/sys/devices/system/clocksource/clocksource0/available_clocksource and
On 08/09/2011 04:21 AM, Juan Quintela wrote:
Hi
Please send in any agenda items you are interested in covering.
I think we can skip since many people will be in Vancouver next week and
we'll have plenty to talk about then.
Just a couple reminders, for KVM Forum speakers, please post your
Peter Maydell peter.mayd...@linaro.org wrote:
On 8 August 2011 13:56, Avi Kivity a...@redhat.com wrote:
QEMU deals with a lot of fixed width integer types; their names
(uint64_t etc) are clumsy to use and take up a lot of space.
Following Linux, introduce shorter names, for example U64 for
On Tue, Aug 09, 2011 at 09:52:17AM +0300, Avi Kivity wrote:
On 08/09/2011 09:55 AM, Bob Breuer wrote:
static void lance_cleanup(VLANClientState *nc)
@@ -117,13 +116,11 @@ static int lance_init(SysBusDevice *dev)
SysBusPCNetState *d = FROM_SYSBUS(SysBusPCNetState, dev);
On 08/09/2011 03:42 PM, Michael S. Tsirkin wrote:
On Tue, Aug 09, 2011 at 09:52:17AM +0300, Avi Kivity wrote:
On 08/09/2011 09:55 AM, Bob Breuer wrote:
static void lance_cleanup(VLANClientState *nc)
@@ -117,13 +116,11 @@ static int lance_init(SysBusDevice *dev)
On Tue, Aug 09, 2011 at 03:44:35PM +0300, Avi Kivity wrote:
On 08/09/2011 03:42 PM, Michael S. Tsirkin wrote:
On Tue, Aug 09, 2011 at 09:52:17AM +0300, Avi Kivity wrote:
On 08/09/2011 09:55 AM, Bob Breuer wrote:
static void lance_cleanup(VLANClientState *nc)
@@ -117,13 +116,11 @@
On Tue, Aug 9, 2011 at 5:17 AM, Zhi Yong Wu wu...@linux.vnet.ibm.com wrote:
+/* The APIs for block request queue on qemu block layer.
+ */
+
+static void qemu_block_queue_cancel(BlockDriverAIOCB *acb)
+{
+ qemu_aio_release(acb);
+}
+
+static AIOPool block_queue_pool = {
+
On 08/09/2011 03:48 PM, Michael S. Tsirkin wrote:
But in some cases, we can't, and the it's a pain having to wrap
MemoryRegion in another structure containing an opaque.
I guess, even though that wrapping structure would
use a proper type, not an opaque.
Yes, of course - that's what the
On 08/09/2011 12:41 PM, Peter Maydell wrote:
On 9 August 2011 10:26, Avi Kivitya...@redhat.com wrote:
On 08/09/2011 12:23 PM, Peter Maydell wrote:
On 9 August 2011 10:02, Avi Kivitya...@redhat.comwrote:
+static const MemoryRegionOps omap_gpmc_ops = {
+.read =
Somewhat clumsy since it needs a variable sized region.
Signed-off-by: Avi Kivity a...@redhat.com
---
v1.2: drop v1.1 changes, instead forward invalid size accesses to original
omap_badwidth_*() functions
v1.1: set access size validity for omap gpmc region to allow only 32-bit
On Tue, 9 Aug 2011, Liming Wang wrote:
From: walimis walimis...@gmail.com
kvm --help and --version are not implemented, so remove them to
avoid ambiguous.
Signed-off-by: walimis walimis...@gmail.com
The patch looks good but unfortunately I have to ask you to resend with
proper
On Tue, 9 Aug 2011, Liming Wang wrote:
From: walimis walimis...@gmail.com
replace debug with pause for kvm pause.
Signed-off-by: walimis walimis...@gmail.com
---
tools/kvm/builtin-pause.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/tools/kvm/builtin-pause.c
Anthony Liguori anth...@codemonkey.ws wrote:
On 08/09/2011 04:21 AM, Juan Quintela wrote:
Hi
Please send in any agenda items you are interested in covering.
I think we can skip since many people will be in Vancouver next week
and we'll have plenty to talk about then.
Just a couple
Fix build error with --disable-cpu-emulation which did
break in 4183a43d1405fbb9da3ccb3dcff223266a36df9f
Signed-off-by: Arjan Koers 0h61vkll2...@xutrox.com
---
target-i386/fake-exec.c |4 +---
1 files changed, 1 insertions(+), 3 deletions(-)
diff --git a/target-i386/fake-exec.c
kvm --help and --version are not implemented, so remove them to
avoid ambiguous.
Signed-off-by: walimis walimis...@gmail.com
---
tools/kvm/builtin-help.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/tools/kvm/builtin-help.c b/tools/kvm/builtin-help.c
index
On August 9, 2011, Avi Kivity wrote:
On 08/09/2011 03:03 PM, Thomas Fjellstrom wrote:
Your guest isn't using kvmclock for some reason. Is it compiled in
the guest kernel? What are the contents of
/sys/devices/system/clocksource/clocksource0/available_clocksource and
On 08/09/2011 05:31 PM, Thomas Fjellstrom wrote:
On August 9, 2011, Avi Kivity wrote:
On 08/09/2011 03:03 PM, Thomas Fjellstrom wrote:
Your guest isn't using kvmclock for some reason. Is it compiled in
the guest kernel? What are the contents of
On August 9, 2011, Avi Kivity wrote:
On 08/09/2011 05:31 PM, Thomas Fjellstrom wrote:
On August 9, 2011, Avi Kivity wrote:
On 08/09/2011 03:03 PM, Thomas Fjellstrom wrote:
Your guest isn't using kvmclock for some reason. Is it
compiled in the guest kernel? What are the
On 08/09/2011 05:46 PM, Thomas Fjellstrom wrote:
Does it matter that I have several vms running? Is there a way to limit
it to tracing the single kvm process that's been locking up?
You can use trace-cmd record -F ... qemu ... but that misses out on
events the run from workqueues.
On August 9, 2011, Avi Kivity wrote:
On 08/09/2011 05:46 PM, Thomas Fjellstrom wrote:
Does it matter that I have several vms running? Is there a way to
limit it to tracing the single kvm process that's been locking up?
You can use trace-cmd record -F ... qemu ... but that
* Sasha Levin levinsasha...@gmail.com wrote:
This patch changes './kvm list' to retrieve process name from
'/proc/pid/stat' instead of '/proc/pid/comm' as it appears the latter
does not exist by default on several systems.
Reported-by: pradeep psuri...@linux.vnet.ibm.com
Signed-off-by:
On Tue, Aug 9, 2011 at 5:53 PM, Ingo Molnar mi...@elte.hu wrote:
* Sasha Levin levinsasha...@gmail.com wrote:
This patch changes './kvm list' to retrieve process name from
'/proc/pid/stat' instead of '/proc/pid/comm' as it appears the latter
does not exist by default on several systems.
This patch uses (the not yet merged) overlayfs to allow booting complex
distribution rootfs and provide
a COW layer within the rootfs.
We use overlayfs for two reasons:
- Overwrite the /etc/fstab file so that the mounter will use the virtio-9p
device as root instead of
/dev/vda.
- Provide a
* Pekka Enberg penb...@kernel.org wrote:
On Tue, Aug 9, 2011 at 5:53 PM, Ingo Molnar mi...@elte.hu wrote:
* Sasha Levin levinsasha...@gmail.com wrote:
This patch changes './kvm list' to retrieve process name from
'/proc/pid/stat' instead of '/proc/pid/comm' as it appears the latter
On August 9, 2011, Avi Kivity wrote:
On 08/09/2011 05:46 PM, Thomas Fjellstrom wrote:
Does it matter that I have several vms running? Is there a way to
limit it to tracing the single kvm process that's been locking up?
You can use trace-cmd record -F ... qemu ... but that
On Tue, 2011-08-09 at 17:56 +0300, Pekka Enberg wrote:
On Tue, Aug 9, 2011 at 5:53 PM, Ingo Molnar mi...@elte.hu wrote:
* Sasha Levin levinsasha...@gmail.com wrote:
This patch changes './kvm list' to retrieve process name from
'/proc/pid/stat' instead of '/proc/pid/comm' as it appears
On Tue, Aug 9, 2011 at 5:57 PM, Sasha Levin levinsasha...@gmail.com wrote:
This patch uses (the not yet merged) overlayfs to allow booting complex
distribution rootfs and provide
a COW layer within the rootfs.
We use overlayfs for two reasons:
- Overwrite the /etc/fstab file so that the
https://bugzilla.kernel.org/show_bug.cgi?id=40752
Summary: BUG: unable to handle kernel paging request at
bc20
Product: Virtualization
Version: unspecified
Kernel Version: 3.0
Platform: All
OS/Version: Linux
kvm --help and --version are not implemented, so remove them to
avoid ambiguous.
Signed-off-by: Liming Wang walimis...@gmail.com
---
tools/kvm/builtin-help.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/tools/kvm/builtin-help.c b/tools/kvm/builtin-help.c
index
On Tue, Aug 9, 2011 at 6:02 PM, Sasha Levin levinsasha...@gmail.com wrote:
On Tue, 2011-08-09 at 17:56 +0300, Pekka Enberg wrote:
On Tue, Aug 9, 2011 at 5:53 PM, Ingo Molnar mi...@elte.hu wrote:
* Sasha Levin levinsasha...@gmail.com wrote:
This patch changes './kvm list' to retrieve
On Tue, Aug 9, 2011 at 5:17 AM, Zhi Yong Wu wu...@linux.vnet.ibm.com wrote:
Note:
1.) When bps/iops limits are specified to a small value such as 511
bytes/s, this VM will hang up. We are considering how to handle this senario.
If an I/O request is larger than the limit itself then I
This patch makes BAR 1 16k, instead of BAR0 - which is the PIO bar.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/hw/vesa.c |2 +-
tools/kvm/pci.c |2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/tools/kvm/hw/vesa.c b/tools/kvm/hw/vesa.c
index
This patch updates 'kvm run' to boot to host filesystem via 9p '/bin/sh' by
default:
$ ./kvm run
# kvm run -k ../../arch/x86/boot/bzImage -m 320 -c 2 --name guest-3462
[0.00] Linux version 3.1.0-rc1+ (penberg@tiger) (gcc version 4.4.3
(Ubuntu 4.4.3-4ubuntu5) ) #7 SMP PREEMPT Tue
On Tue, Aug 9, 2011 at 6:33 PM, Pekka Enberg penb...@kernel.org wrote:
This patch updates 'kvm run' to boot to host filesystem via 9p '/bin/sh' by
default:
Ingo, I think you're the only one that relied on the old behavior. Are
you OK with this new default?
--
To unsubscribe from this list: send
* Pekka Enberg penb...@kernel.org wrote:
On Tue, Aug 9, 2011 at 6:33 PM, Pekka Enberg penb...@kernel.org wrote:
This patch updates 'kvm run' to boot to host filesystem via 9p
'/bin/sh' by default:
Ingo, I think you're the only one that relied on the old behavior.
Are you OK with this
* Sasha Levin levinsasha...@gmail.com wrote:
This patch makes BAR 1 16k, instead of BAR0 - which is the PIO bar.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/hw/vesa.c |2 +-
tools/kvm/pci.c |2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
This
* walimis walimis...@gmail.com wrote:
kvm --help and --version are not implemented, so remove them to
avoid ambiguous.
would be nice to implement them: 'kvm --help' should probably map to
'kvm help', and 'kvm --version' should output something similar to
what 'perf --version' does:
$ perf
On Tue, 9 Aug 2011, Ingo Molnar wrote:
kvm --help and --version are not implemented, so remove them to
avoid ambiguous.
would be nice to implement them: 'kvm --help' should probably map to
'kvm help', and 'kvm --version' should output something similar to
what 'perf --version' does:
$ perf
Hi,
Just joined this list, looking for leads to solve a similar-sounding problem
(guest processes hanging for seconds or minutes when host IO load is high).
I'll say more in a separate email, but I caught the end of this thread and
wanted to ask about kvm-clock.
Naively I'd have thought that
We have a few traps where we cache the instruction that cause the trap
for analysis later on. Since we now need to be able to distinguish
between SC 0 and SC 1 system calls and the only way to find out which
is which is by looking at the instruction, we also read out the instruction
causing the
When running a PAPR guest, some things change. The privilege level drops
from hypervisor to supervisor, SDR1 gets treated differently and we interpret
hypercalls. For bisectability sake, add the flag now, but only enable it when
all the support code is there.
Signed-off-by: Alexander Graf
Now that Book3S PV mode can also run PAPR guests, we can add a PAPR cap and
enable it for all Book3S targets. Enabling that CAP switches KVM into PAPR
mode.
Signed-off-by: Alexander Graf ag...@suse.de
---
arch/powerpc/kvm/powerpc.c |5 +
include/linux/kvm.h|1 +
2 files
1 - 100 of 165 matches
Mail list logo