On 08/25/2013 07:53 PM, Michael S. Tsirkin wrote:
On Fri, Aug 23, 2013 at 04:55:49PM +0800, Jason Wang wrote:
On 08/20/2013 10:48 AM, Jason Wang wrote:
On 08/16/2013 06:02 PM, Michael S. Tsirkin wrote:
On Fri, Aug 16, 2013 at 01:16:30PM +0800, Jason Wang wrote:
We used to limit the max
On Fri, Aug 23, 2013 at 05:34:47PM +0530, Raghavendra K T wrote:
Signed-off-by: Raghavendra K T raghavendra...@linux.vnet.ibm.com
---
While adding documentation for pvspinlock, I found that these two should
be updated. I have based this on top of pvspinlock kvm host patchset (V12)
I would
On 2013-08-25 17:26, Arthur Chunqi Li wrote:
This patch contains the following two changes:
1. Fix the bug in nested preemption timer support. If vmexit L2-L0
with some reasons not emulated by L1, preemption timer value should
be save in such exits.
2. Add support of Save VMX-preemption timer
Il 25/08/2013 17:04, Alexander Graf ha scritto:
On 24.08.2013, at 21:14, Yann Droneaud wrote:
KVM uses anon_inode_get() to allocate file descriptors as part
of some of its ioctls. But those ioctls are lacking a flag argument
allowing userspace to choose options for the newly opened file
Il 23/08/2013 13:33, Andrew Jones ha scritto:
Does smp_cpus map to the current
number of cpus, or to the number of possible cpus? If it maps to the number
of possible cpus, then this is the right place. If the former, then I guess
it'll take more thought. I'ved added Igor (still on vacation)
- Original Message -
Il 23/08/2013 13:33, Andrew Jones ha scritto:
Does smp_cpus map to the current
number of cpus, or to the number of possible cpus? If it maps to the number
of possible cpus, then this is the right place. If the former, then I guess
it'll take more thought.
On Mon, Aug 26, 2013 at 02:09:57AM +, Chris Leduc wrote:
-Original Message-
From: Gleb Natapov [mailto:g...@redhat.com]
Sent: Sunday, August 25, 2013 1:52 AM
To: Chris Leduc
Cc: kvm@vger.kernel.org
Subject: Re: Partial huge page backing with KVM/qemu
On Sat, Aug
Le 26.08.2013 09:39, Paolo Bonzini a écrit :
Il 25/08/2013 17:04, Alexander Graf ha scritto:
On 24.08.2013, at 21:14, Yann Droneaud wrote:
This patch set O_CLOEXEC flag on all file descriptors created
with anon_inode_getfd() to not leak file descriptors across exec().
Signed-off-by: Yann
Il 26/08/2013 10:23, Yann Droneaud ha scritto:
Sounds a lot like InfiniBand subsystem behavor: IB file descriptors
are of no use accross exec() since memory mappings tied to those fds
won't be available in the new process:
https://lkml.org/lkml/2013/7/8/380
this is needed by both guest and host.
Originally-from: Srivatsa Vaddagiri va...@linux.vnet.ibm.com
Signed-off-by: Raghavendra K T raghavendra...@linux.vnet.ibm.com
Acked-by: Gleb Natapov g...@redhat.com
Acked-by: Ingo Molnar mi...@kernel.org
---
arch/x86/include/uapi/asm/kvm_para.h | 1 +
Note that we are using APIC_DM_REMRD which has reserved usage.
In future if APIC_DM_REMRD usage is standardized, then we should
find some other way or go back to old method.
Suggested-by: Gleb Natapov g...@redhat.com
Signed-off-by: Raghavendra K T raghavendra...@linux.vnet.ibm.com
Acked-by: Gleb
This series forms the kvm host part of paravirtual spinlock
based against kvm tree.
Please refer to https://lkml.org/lkml/2013/8/9/265 for
kvm guest and Xen, x86 part merged to -tip spinlocks.
Please note that:
kvm uapi: Add KICK_CPU and PV_UNHALT definition to uapi is a common patch
for
KVM_HC_KICK_CPU hypercall added to wakeup halted vcpu in paravirtual spinlock
enabled guest.
KVM_FEATURE_PV_UNHALT enables guest to check whether pv spinlock can be enabled
in guest.
Thanks Vatsa for rewriting KVM_HC_KICK_CPU
Cc: Rob Landley r...@landley.net
Signed-off-by: Srivatsa Vaddagiri
On Mon, Aug 26, 2013 at 3:23 PM, Jan Kiszka jan.kis...@web.de wrote:
On 2013-08-25 17:26, Arthur Chunqi Li wrote:
This patch contains the following two changes:
1. Fix the bug in nested preemption timer support. If vmexit L2-L0
with some reasons not emulated by L1, preemption timer value
On Mon, Aug 26, 2013 at 02:18:32PM +0530, Raghavendra K T wrote:
This series forms the kvm host part of paravirtual spinlock
based against kvm tree.
Please refer to https://lkml.org/lkml/2013/8/9/265 for
kvm guest and Xen, x86 part merged to -tip spinlocks.
Please note that:
kvm
On Sat, Aug 24, 2013 at 10:14:06PM +0200, Yann Droneaud wrote:
Hi,
Following a patchset asking to change calls to get_unused_flag() [1]
to use O_CLOEXEC, Alex Williamson [2][3] decided to change VFIO
to use the flag.
Since it's a related subsystem to KVM, using O_CLOEXEC for
file
On 08/26/2013 03:34 PM, Gleb Natapov wrote:
On Mon, Aug 26, 2013 at 02:18:32PM +0530, Raghavendra K T wrote:
This series forms the kvm host part of paravirtual spinlock
based against kvm tree.
Please refer to https://lkml.org/lkml/2013/8/9/265 for
kvm guest and Xen, x86 part merged to
On Sun, Aug 25, 2013 at 04:27:14PM +0100, Alexander Graf wrote:
On 25.08.2013, at 16:18, Peter Maydell wrote:
On 25 August 2013 15:48, Gleb Natapov g...@redhat.com wrote:
On Sun, Aug 25, 2013 at 03:29:17PM +0100, Peter Maydell wrote:
Smiley noted, but this is pretty unlikely since it's
This allows guests to have a different timebase origin from the host.
This is needed for migration, where a guest can migrate from one host
to another and the two hosts might have a different timebase origin.
However, the timebase seen by the guest must not go backwards, and
should go forwards
Here are 3 patches that add two PMU (performance monitor unit)
registers to the set being context-switched on guest entry and exit,
and implement a per-guest timebase offset that is needed when we
migrate a guest from one host to another that has a different timebase
origin. The first patch just
Currently we are not saving and restoring the SIAR and SDAR registers in
the PMU (performance monitor unit) on guest entry and exit. The result
is that performance monitoring tools in the guest could get false
information about where a program was executing and what data it was
accessing at the
This adds one_reg register numbers for two performance monitor registers
that exist on POWER7 and later processors (SIAR and SDAR) and three that
will be introduced on POWER8 (MMCR2, MMCRS and SIER).
Signed-off-by: Paul Mackerras pau...@samba.org
---
Documentation/virtual/kvm/api.txt | 5 +
On 08/26/2013 12:37 PM, Michael S. Tsirkin wrote:
I would change the description to merely say what the CPUID bits
mean, and what they mean is exactly that an MSR is valid.
Use KVM_FEATURE_ASYNC_PF as a template.
Thank you for the review.
Changing the doc accordingly by adding msr info. Please
subscribe kvm
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Hi all
I am using IVSHMEM to mmap /dev/mem into guest. The mmap works fine on
QEMU without KVM support enabled, but with KVM i get kernel errors:
* (with EPT enabled)
[ 746.940720] [ cut here ]
[ 746.948612] kernel BUG at
On Sun, Aug 25, 2013 at 09:26:47PM -0400, Chris Metcalf wrote:
On 8/25/2013 7:39 AM, Gleb Natapov wrote:
On Mon, Aug 12, 2013 at 04:24:11PM -0400, Chris Metcalf wrote:
This change provides the initial framework support for KVM on tilegx.
Basic virtual disk and networking is supported.
On Wed, Aug 14, 2013 at 10:51:14AM +1000, Benjamin Herrenschmidt wrote:
On Thu, 2013-08-01 at 14:44 +1000, Alexey Kardashevskiy wrote:
This is to reserve a capablity number for upcoming support
of H_PUT_TCE_INDIRECT and H_STUFF_TCE pseries hypercalls
which support mulptiple DMA map/unmap
Hi Anatoly,
On Mon, Aug 26, 2013 at 12:58:25PM +0100, Anatoly Burakov wrote:
Hi all
I am using IVSHMEM to mmap /dev/mem into guest. The mmap works fine on
QEMU without KVM support enabled, but with KVM i get kernel errors:
* (with EPT enabled)
[ 746.940720]
To je Vám oznámit, e jste byl vybrán pro pen#283;ní cenu
1,600,000.00 GB liber Chevron ropy / Organizace spojených národ#367; pro
rozvoj
Program (UNDP) Chcete-li zahájit zpracování vaí cenu, kontaktujte: Mr.D.
Matt, E-mail: derickm...@googlemail.com
Kontaktujte jej, a poskytne mu na tajnou PIN
I've been trying to track down the cause of some serious performance
issues with a Windows 2008R2 KVM guest. So far, I've been unable to
determine what exactly is causing the issue.
When the guest is under load, I see very high kernel CPU usage, as well
as terrible guest performance. The
Hi,
1. Try the latest vanilla kernel on the host (Linux 3.10.5). This way
you can rule out fixed bugs in vhost_net or tap.
For the last two weeks it went fine for a couple of days each time. This
evening was really bad again: uptimes of 5-10 minutes. This is with
3.11-rc4.
2. Get the
On Tue, Aug 20, 2013 at 02:31:57PM -0700, Andrew Morton wrote:
On Fri, 16 Aug 2013 23:09:06 + Nicholas A. Bellinger
n...@linux-iscsi.org wrote:
From: Kent Overstreet k...@daterainc.com
Percpu frontend for allocating ids. With percpu allocation (that works),
it's impossible to
On Wed, Aug 21, 2013 at 06:25:58PM +, Christoph Lameter wrote:
On Fri, 16 Aug 2013, Nicholas A. Bellinger wrote:
+ spinlock_t lock;
Remove the spinlock.
As Andrew noted, the spinlock is needed because of tag stealing. (You
don't think I'd stick a spinlock on a
On 25.08.2013 13:45, Gleb Natapov wrote:
On Fri, Aug 09, 2013 at 09:14:13PM +0200, Stefan Pietsch wrote:
On 04.08.2013 14:44, Gleb Natapov wrote:
On Fri, Aug 02, 2013 at 08:24:38AM +0200, Stefan Pietsch wrote:
On 31.07.2013 11:20, Gleb Natapov wrote:
On Wed, Jul 31, 2013 at 11:10:01AM +0200,
On 8/26/2013 3:15 PM, Brian Rak wrote:
I've been trying to track down the cause of some serious performance
issues with a Windows 2008R2 KVM guest. So far, I've been unable to
determine what exactly is causing the issue.
When the guest is under load, I see very high kernel CPU usage, as
Hi all
I am participating in a project which try to port vhost_net on Xen。
By change the memory copy and notify mechanism ,currently virtio-net
with vhost_net could run on Xen with good performance。TCP receive
throughput of single vnic from 2.77Gbps up to 6Gps。In VM receive
side,I instead
Dear Sir/Madam,
Please note that my client would like to invest in your country and if you
can assist us to invest in a profitable areas that would yield profits
kindly get back to me for a detailed information on how to proceed with
this project.
If you are really interested to assist do
On Mon, 2013-08-26 at 15:37 +0300, Gleb Natapov wrote:
Gleb, any chance you can put this (and the next one) into a tree to
lock in the numbers ?
Applied it. Sorry for slow response, was on vocation and still go
through the email backlog.
Thanks. Since it's not in a topic branch that I
On Tue, 2013-08-27 at 14:19 +1000, Benjamin Herrenschmidt wrote:
On Mon, 2013-08-26 at 15:37 +0300, Gleb Natapov wrote:
Gleb, any chance you can put this (and the next one) into a tree to
lock in the numbers ?
Applied it. Sorry for slow response, was on vocation and still go
through
On Tue, Aug 27, 2013 at 11:32:31AM +0800, Qin Chuanyu wrote:
Hi all
I am participating in a project which try to port vhost_net on Xen。
By change the memory copy and notify mechanism ,currently
virtio-net with vhost_net could run on Xen with good
performance。TCP receive throughput of
Il 25/08/2013 17:04, Alexander Graf ha scritto:
On 24.08.2013, at 21:14, Yann Droneaud wrote:
KVM uses anon_inode_get() to allocate file descriptors as part
of some of its ioctls. But those ioctls are lacking a flag argument
allowing userspace to choose options for the newly opened file
Le 26.08.2013 09:39, Paolo Bonzini a écrit :
Il 25/08/2013 17:04, Alexander Graf ha scritto:
On 24.08.2013, at 21:14, Yann Droneaud wrote:
This patch set O_CLOEXEC flag on all file descriptors created
with anon_inode_getfd() to not leak file descriptors across exec().
Signed-off-by: Yann
Il 26/08/2013 10:23, Yann Droneaud ha scritto:
Sounds a lot like InfiniBand subsystem behavor: IB file descriptors
are of no use accross exec() since memory mappings tied to those fds
won't be available in the new process:
https://lkml.org/lkml/2013/7/8/380
On Sat, Aug 24, 2013 at 10:14:06PM +0200, Yann Droneaud wrote:
Hi,
Following a patchset asking to change calls to get_unused_flag() [1]
to use O_CLOEXEC, Alex Williamson [2][3] decided to change VFIO
to use the flag.
Since it's a related subsystem to KVM, using O_CLOEXEC for
file
On 26.08.2013, at 05:28, Aneesh Kumar K.V wrote:
Alexander Graf ag...@suse.de writes:
On 23.08.2013, at 04:31, Aneesh Kumar K.V wrote:
Alexander Graf ag...@suse.de writes:
On 22.08.2013, at 12:37, Aneesh Kumar K.V wrote:
From: Aneesh Kumar K.V aneesh.ku...@linux.vnet.ibm.com
Currently we are not saving and restoring the SIAR and SDAR registers in
the PMU (performance monitor unit) on guest entry and exit. The result
is that performance monitoring tools in the guest could get false
information about where a program was executing and what data it was
accessing at the
This adds one_reg register numbers for two performance monitor registers
that exist on POWER7 and later processors (SIAR and SDAR) and three that
will be introduced on POWER8 (MMCR2, MMCRS and SIER).
Signed-off-by: Paul Mackerras pau...@samba.org
---
Documentation/virtual/kvm/api.txt | 5 +
This allows guests to have a different timebase origin from the host.
This is needed for migration, where a guest can migrate from one host
to another and the two hosts might have a different timebase origin.
However, the timebase seen by the guest must not go backwards, and
should go forwards
Here are 3 patches that add two PMU (performance monitor unit)
registers to the set being context-switched on guest entry and exit,
and implement a per-guest timebase offset that is needed when we
migrate a guest from one host to another that has a different timebase
origin. The first patch just
Alexander Graf ag...@suse.de writes:
On 26.08.2013, at 05:28, Aneesh Kumar K.V wrote:
Alexander Graf ag...@suse.de writes:
On 23.08.2013, at 04:31, Aneesh Kumar K.V wrote:
Alexander Graf ag...@suse.de writes:
On 22.08.2013, at 12:37, Aneesh Kumar K.V wrote:
From: Aneesh Kumar K.V
On Wed, Aug 14, 2013 at 10:51:14AM +1000, Benjamin Herrenschmidt wrote:
On Thu, 2013-08-01 at 14:44 +1000, Alexey Kardashevskiy wrote:
This is to reserve a capablity number for upcoming support
of H_PUT_TCE_INDIRECT and H_STUFF_TCE pseries hypercalls
which support mulptiple DMA map/unmap
On Mon, 2013-08-26 at 15:37 +0300, Gleb Natapov wrote:
Gleb, any chance you can put this (and the next one) into a tree to
lock in the numbers ?
Applied it. Sorry for slow response, was on vocation and still go
through the email backlog.
Thanks. Since it's not in a topic branch that I
52 matches
Mail list logo