Please send in any agenda items you are interested in covering.
Yes, usability is a valid topic esp. if you promise to come w/ GUI patches.
thanks,
-chris
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
migration (we didn't end last week)
- monotonic increasing version doesn't capture individual features
(backporting features may not require earlier features, now id is
incorrect)
- use subsections
- can create new namespace within subsection (ide/$featre/$distro)
- would need to
* Hannes Reinecke (h...@suse.de) wrote:
Hi all,
I'm trying to setup a system with device-passthrough for
an ixgbe NIC.
The device itself seems to work, but it isn't using MSI-X.
So some more advanced features like DCB offloading etc
won't work.
Please send the relevant dmesg from the
* Hannes Reinecke (h...@suse.de) wrote:
Chris Wright wrote:
* Hannes Reinecke (h...@suse.de) wrote:
Hi all,
I'm trying to setup a system with device-passthrough for
an ixgbe NIC.
The device itself seems to work, but it isn't using MSI-X.
So some more advanced features like DCB
* Gordan Bobic (gor...@bobich.net) wrote:
Is it possible to use KSM:
1) Without hardware VT support
Yes.
KSM and hardware virtualization support are technically not related.
2) For all memory in a system, without patching all applications to
register with it
No.
Right now, an app must
* Gordan Bobic (gor...@bobich.net) wrote:
Chris Wright wrote:
2) For all memory in a system, without patching all applications to
register with it
No.
Right now, an app must be modified to call madvise(MADV_MERGEABLE).
Further, the core scanning loop that ksmd performs is based on per
* Naresh Rapolu (nrap...@purdue.edu) wrote:
perf tool does not count hardware performance events ( cache misses
etc) in a KVM guest
The guest does not see a PMU. For basic profiling you can use timer
based in guest, but there is not yet support for PMU.
thanks,
-chris
--
To unsubscribe
* Hannes Reinecke (h...@suse.de) wrote:
Ah. So I'll have to shout at Alex Graf.
No problems there :-)
I like that, when in doubt, shout at Alex ;-)
thanks,
-chris
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More
* Badari Pulavarty (pbad...@us.ibm.com) wrote:
I modified my vhost-blk implementation to offload work to
work_queues instead of doing synchronously. Infact, I tried
to spread the work across all the CPUs. But to my surprise,
this did not improve the performance compared to virtio-blk.
I see
* Alexander Graf (ag...@suse.de) wrote:
On 30.03.2010, at 01:00, Kenni Lund wrote:
2010/3/29 Alexander Graf ag...@suse.de:
On 29.03.2010, at 19:23, Kenni Lund wrote:
2010/1/9 Alexander Graf ag...@suse.de:
On 09.01.2010, at 03:45, Ryan C. Underwood wrote:
I have a
* Badari Pulavarty (pbad...@us.ibm.com) wrote:
On Mon, 2010-03-29 at 23:37 +0300, Avi Kivity wrote:
On 03/29/2010 09:20 PM, Chris Wright wrote:
Your io wait time is twice as long and your throughput is about half.
I think the qmeu block submission does an extra attempt at merging
* Kenni Lund (ke...@kelu.dk) wrote:
Client dmesg: http://pastebin.com/uNG4QK5j
Host dmesg: http://pastebin.com/jZu3WKZW
I just verified it and I do get the call trace in the host (which
disables IRQ 19, used by the PCI USB card), exactly at the same second
It looks like IRQ 19 is shared
* Richard Simpson (rs1...@huskydog.org.uk) wrote:
So, is there any way of having the nx bit and the benefits of KVM
acceleration.
WFM here (both current git tree and 0.12.3) w/ either -cpu host or -cpu
qemu64. The code definitly does what you'd expect in both those cases.
thanks,
-chris
--
To
- vhost-blk
Please send in any additional agenda items you are interested in covering.
thanks,
-chris
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
vhost-blk
- started w/ vhost-net, nice and modular
- qemu merging requests, so outperforming (throughput) for sequential write
- random read/write and sequential reads are comparable or better
- can't do e.g. qcow2
- spreading work across all cpu workqueues
- are there cases where we expect
* Kenni Lund (ke...@kelu.dk) wrote:
2010/3/30 Chris Wright chr...@redhat.com:
* Kenni Lund (ke...@kelu.dk) wrote:
Client dmesg: http://pastebin.com/uNG4QK5j
Host dmesg: http://pastebin.com/jZu3WKZW
I just verified it and I do get the call trace in the host (which
disables IRQ 19, used
* Kenni Lund (ke...@kelu.dk) wrote:
2010/3/31 Alexander Graf ag...@suse.de:
The easiest thing coming to mind is to unplug the ivtv card for now. It's
really only to verify that the patch does something useful :-).
This was not sufficient. Same issue with the ivtv card unplugged...if
I
* Kenni Lund (ke...@kelu.dk) wrote:
2010/3/31 Chris Wright chr...@redhat.com:
So I suppose I'll need to get rid of this shared IRQ before I can
conclude anything on the patch in git. Hmm, is there some cleaver way
of fixing this in Linux, or do I have to fix it by changing BIOS IRQ
* Kenni Lund (ke...@kelu.dk) wrote:
2010/3/31 Chris Wright chr...@redhat.com:
* Kenni Lund (ke...@kelu.dk) wrote:
2010/3/31 Chris Wright chr...@redhat.com:
So I suppose I'll need to get rid of this shared IRQ before I can
conclude anything on the patch in git. Hmm, is there some cleaver
* Alexander Graf (ag...@suse.de) wrote:
Kenni Lund wrote:
2010/3/31 Kenni Lund ke...@kelu.dk:
Booting the guest and tuning to a DVB-T channel _works_ !!! :-D Thanks
a lot for your help...I have one more question, though: If I have two
devices (like the ivtv tuner and the USB card)
* Xiong Wang (xiong...@gmail.com) wrote:
I have an ibm X3650M2 box with two onboard broadcom NICs,I assign one
of the NIC to the KVM guest,I can see the NIC in the guest VM,but the
bnx2 driver can not load successfully,
is there any solution to fix this?
This device can not be successfully
Please send in any agenda items you are interested in covering.
thanks,
-chris
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Management stack again
- qemud?
- external mgmt stack, qemu/kvm devs less inclined to care
- Oh, you're using virsh, try #virt on OFTC
- standard libvirt issues
- concern about speed of adopting kvm features
- complicated, XML hard to understand
- being slowed by hv agnositc
- ...
-
* Bernhard Schmidt (be...@birkenwald.de) wrote:
* KSM seems to be largely ineffective (100MB saved - 1.3MB saved)
Am I doing something wrong? Is this a bug? Is this generally impossible
with large pages (which might explain the lower load on the host, if
large pages are not scanned)? Or is
* Avi Kivity (a...@redhat.com) wrote:
On 04/02/2010 08:05 PM, Greg KH wrote:
- access to all config space, but BARs must be translated so
userspace cannot attack the host
Specifically, intermediated access to config space. For example, need
to know about MSI/MSI-X updates in config space.
* Tom Lyon (p...@lyon-about.com) wrote:
On Friday 09 April 2010 02:58:19 am Avi Kivity wrote:
- access to all config space, but BARs must be translated so userspace
cannot attack the host
Please elaborate. All of PCI config? All of PCIe config? Seems like a huge
mess.
All of config
Please send in any agenda items you are interested in covering.
thanks,
-chris
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please send in any agenda items you are interested in covering.
thanks,
-chris
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
call agenda
- send out a bit earlier
- cancel call if no agenda
0.12.4
- expect when Anthony is back online
KVM Forum 2010
- call for papers is out...send in your proposals!
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More
Please send in any agenda items you are interested in covering.
While I don't expect it to be the case this week, if we have a
lack of agenda items I'll cancel the week's call.
thanks,
-chris
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
* Anthony Liguori (anth...@codemonkey.ws) wrote:
On 04/26/2010 12:26 PM, Chris Wright wrote:
Please send in any agenda items you are interested in covering.
While I don't expect it to be the case this week, if we have a
lack of agenda items I'll cancel the week's call.
- qemu management
qemu management interface (and libvirt)
- qemu standardizing guest enumeration itself
- fs w/ QMP sockets in well-known location per guest or qemud for enumeration
- QMP C library
- QMP for runtime guest mgmt, but not guest launch, storage pools, networking
- selinux, cgroups, tc, etc..done in
* Justin M. Forbes (jmfor...@linuxtx.org) wrote:
On Tue, Apr 27, 2010 at 09:11:00AM -0700, Chris Wright wrote:
stable tree policy (push vs. pull and call for stable volunteers)
- historically pull based (cherry picking)
- doesn't scale wwell
- push based...submit patches directly
Please send in any agenda items you are interested in covering.
If we have a lack of agenda items I'll cancel the week's call.
thanks,
-chris
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
KVM Forum topic ideas
- mgmt interface (qemud)
- working breakout sessions are welcome at the Forum
stable tree
- have a volunteer (thanks Justin)
- Anthony will write up proposal which is basically
- bug fixes actively proposed for stable tree
- stable maintainer collects and applies
-
Please send in any agenda items you are interested in covering.
If we have a lack of agenda items I'll cancel the week's call.
thanks,
-chris
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
* Chris Wright (chr...@redhat.com) wrote:
Please send in any agenda items you are interested in covering.
If we have a lack of agenda items I'll cancel the week's call.
No agenda, so no call this week.
thanks,
-chris
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body
* Greg KH (g...@kroah.com) wrote:
On Wed, May 12, 2010 at 12:28:28PM -0700, Chris Wright wrote:
* Greg KH (g...@kroah.com) wrote:
On Wed, May 12, 2010 at 11:47:13AM -0700, Chris Wright wrote:
The PCI config space bin_attr read handler has a hardcoded CAP_SYS_ADMIN
check to verify
alex.william...@redhat.com
Acked-by: Chris Wright chr...@redhat.com
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
check will not allow read access beyond the config header.
With this patch the sysfs file owner is also considered privileged enough
to read all of the config space.
Signed-off-by: Chris Wright chr...@sous-sol.org
---
drivers/pci/pci-sysfs.c |4 +++-
1 files changed, 3 insertions(+), 1
* Alan Cox (a...@lxorguk.ukuu.org.uk) wrote:
On Wed, 12 May 2010 18:29:57 -0700
Chris Wright chr...@sous-sol.org wrote:
The PCI config space bin_attr read handler has a hardcoded CAP_SYS_ADMIN
check to verify privileges before allowing a user to read device
dependent config space
* Avi Kivity (a...@redhat.com) wrote:
On 05/13/2010 07:57 PM, Dirk Gouders wrote:
Hello List,
please don't shout at me if the answer to my question is too obvious,
We won't shout at you.
but in the German Linux Magazine I read an article about passing PCI
devices to KVM guests and the
/libvirt point of view
because it is not prepared to do this setup before dropping privileges
and launching the VM.
thanks,
-chris
--
From: Chris Wright chr...@sous-sol.org
Subject: [PATCH 2/2 v2] pci: check caps from sysfs file open to read device
dependent config space
The PCI config space
* Greg KH (g...@kroah.com) wrote:
On Thu, May 13, 2010 at 10:43:07AM -0700, Chris Wright wrote:
* Alan Cox (a...@lxorguk.ukuu.org.uk) wrote:
I agree with the problem - but IMHO the fix is to require opening the file
checks CAP_SYS_something instead: not to hack the read method and make
* Alex Williamson (alex.william...@redhat.com) wrote:
Remove this check in an effort to allow kvm guests to run without
root privileges. This capability check doesn't seem to add any
security since the device needs to have already been added via the
assign device ioctl and the io actually
Please send in any agenda items you are interested in covering.
If we have a lack of agenda items I'll cancel the week's call.
thanks,
-chris
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
0.13 release
- push out to July 1st
- esp. important to solidy/crispen QMP
- 1 rc to shake out brown paper bag bugs, then final release
block i/o performance (high CPU consumption)
- memset can be removed (patch posted, queued by kwolf)
- cpu_physical_memory_rw known, should gather data
block
* Brian Jackson (i...@theiggy.com) wrote:
On Tuesday 18 May 2010 08:52:36 Anthony Liguori wrote:
On 05/18/2010 01:59 AM, Brian Jackson wrote:
On Monday 17 May 2010 22:23:46 Chris Wright wrote:
Please send in any agenda items you are interested in covering.
If we have a lack
the file was
opened.
Signed-off-by: Chris Wright chr...@redhat.com
---
hw/device-assignment.c | 12
1 files changed, 8 insertions(+), 4 deletions(-)
diff --git a/hw/device-assignment.c b/hw/device-assignment.c
index eb31c78..172f0c9 100644
--- a/hw/device-assignment.c
+++ b/hw/device
* Anthony Liguori (anth...@codemonkey.ws) wrote:
An fd as a qdev property seems like a bad idea to me.
What is your concern?
I'm not sure I have a better suggestion though.
Anything else requires inventing some new commandline options and monitor
comnmands (-pcidevice anyone? ;-). I'm not
* Anthony Liguori (anth...@codemonkey.ws) wrote:
On 05/19/2010 04:10 PM, Chris Wright wrote:
* Anthony Liguori (anth...@codemonkey.ws) wrote:
An fd as a qdev property seems like a bad idea to me.
What is your concern?
qdev properties are supposed to represent device tunables. A file
-by: Alex Williamson alex.william...@redhat.com
Looks good to me.
Acked-by: Chris Wright chr...@redhat.com
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
* Chris Wright (chr...@redhat.com) wrote:
* Alex Williamson (alex.william...@redhat.com) wrote:
We've already got an open fd for PCI config space for the device, we
might as well use it. This also makes sure that if we're making use of
a privileged file descriptor opened for us, we use
Use stdint types to avoid extra reliance on pci/pci.h header.
Cc: Alex Williamson alex.william...@redhat.com
Signed-off-by: Chris Wright chr...@redhat.com
---
hw/device-assignment.c |6 +++---
1 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/hw/device-assignment.c b/hw/device
Williamson alex.william...@redhat.com
[chrisw: kill pci_dev, configure check for header, narrow header requirement]
Signed-off-by: Chris Wright chr...@redhat.com
---
configure | 14 +-
hw/device-assignment.c | 68
hw/device
* Alex Williamson (alex.william...@redhat.com) wrote:
On Wed, 2010-05-19 at 12:00 -0700, Chris Wright wrote:
When libvirt launches a guest it first chowns the relevenat
/sys/bus/pci/.../config file for an assigned device then drops privileges.
This causes an issue for device assignment
Please send in any agenda items you are interested in covering.
If we have a lack of agenda items I'll cancel the week's call.
thanks,
-chris
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
* Alex Williamson (alex.william...@redhat.com) wrote:
PCI_MSIX_TABSIZE is 0x07ff
while not an issue now, i think that only works for little endian
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
* Alex Williamson (alex.william...@redhat.com) wrote:
On Tue, 2010-05-25 at 16:09 -0700, Chris Wright wrote:
* Alex Williamson (alex.william...@redhat.com) wrote:
PCI_MSIX_TABSIZE is 0x07ff
while not an issue now, i think that only works for little endian
Yep. This is consistent
* Mu Lin (m...@juniper.net) wrote:
Is there any method to directly assign a device to Guest OS without VT-d?
Assuming you mean a PCI device, no, there isn't.
Without an IOMMU[1] you can't directly assign a PCI device to a guest
(nor is it safe). There have been patches floating around to
* Mu Lin (m...@juniper.net) wrote:
Do you know where is the patch, I just need something quick and dirty
for now, my shining new board does have VT-d but the BIOS is not ready
yet, I want to have something working now.
Sorry, I don't have a handy pointer. You can search for either pv dma
Please send in any agenda items you are interested in covering.
If we have a lack of agenda items I'll cancel the week's call.
thanks,
-chris
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
* Avi Kivity (a...@redhat.com) wrote:
On 06/02/2010 12:26 AM, Tom Lyon wrote:
I'm not really opposed to multiple devices per domain, but let me point out
how I
ended up here. First, the driver has two ways of mapping pages, one based
on the
iommu api and one based on the dma_map_sg api.
* Avi Kivity (a...@redhat.com) wrote:
The interface would only work for clients which support it: kvm,
vhost, and iommu/devices with restartable dma.
BTW, there is no such thing as restartable dma. There is a provision in
new specs (read: no real hardware) that allows a device to request pages
* Joerg Roedel (j...@8bytes.org) wrote:
On Wed, Jun 02, 2010 at 02:21:00PM +0300, Michael S. Tsirkin wrote:
On Wed, Jun 02, 2010 at 01:12:25PM +0200, Joerg Roedel wrote:
Even if it is bound to a domain the userspace driver could program the
device to do dma to unmapped regions causing
Please send in any agenda items you are interested in covering.
If we have a lack of agenda items I'll cancel the week's call.
thanks,
-chris
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
* Stephen Hemminger (shemmin...@vyatta.com) wrote:
On Mon, 21 Sep 2009 16:37:22 +0930
Rusty Russell ru...@rustcorp.com.au wrote:
Actually this framework can apply to traditional network adapters which
have
just one tx/rx queue pair. And applications using the same user/kernel
* Michael S. Tsirkin (m...@redhat.com) wrote:
KVM does not virtualize low address bits for memory accesses, so we must
require that PCI BAR size is a multiple of 4K for passthrough to work
(this also guarantees that address is 4K aligned).
Users of recent linux kernels can force resource
: *** [compatfd.o] Error 1
Signed-off-by: Chris Wright chr...@redhat.com
---
compatfd.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/compatfd.c b/compatfd.c
index e87bb9e..4a00d95 100644
--- a/compatfd.c
+++ b/compatfd.c
@@ -118,9 +118,9 @@ int qemu_signalfd(const sigset_t
* Alexander Graf (ag...@suse.de) wrote:
@@ -405,7 +511,7 @@ static int assigned_dev_register_regions(PCIRegion
*io_regions,
} else {
pci_dev-v_addrs[i].u.r_virtbase =
mmap(NULL,
- (cur_region-size + 0xFFF)
at
this before (w/ the same intention) and concluded it wasn't a benefit
(of course, I can't recall why now...re-reading libpci, as long as we
force PCI_ACCESS_SYS_BUS_PCI it does the right read).
Anyway, this is a simple, nice cleanup.
Acked-by: Chris Wright chr...@redhat.com
--
To unsubscribe from
* Alexander Graf (ag...@suse.de) wrote:
+static void assign_failed_examine(AssignedDevice *dev)
+{
+char name[PATH_MAX], dir[PATH_MAX], driver[PATH_MAX] = {}, *ns;
+uint16_t vendor_id, device_id;
+int r;
+
+/* XXX implement multidomain */
+sprintf(dir,
* Alexander Graf (ag...@suse.de) wrote:
Chris Wright wrote:
* Alexander Graf (ag...@suse.de) wrote:
+static void assign_failed_examine(AssignedDevice *dev)
+{
+char name[PATH_MAX], dir[PATH_MAX], driver[PATH_MAX] = {}, *ns;
+uint16_t vendor_id, device_id;
+int r
* Michael S. Tsirkin (m...@redhat.com) wrote:
On Tue, Dec 15, 2009 at 11:50:23AM -0800, Chris Wright wrote:
* Alexander Graf (ag...@suse.de) wrote:
@@ -405,7 +511,7 @@ static int
assigned_dev_register_regions(PCIRegion *io_regions,
} else {
pci_dev
* Alexander Graf (ag...@suse.de) wrote:
Michael S. Tsirkin wrote:
Existing code first page aligned address, passes this to mmap,
Did you mean page aligned size?
then adds page offset. I do not know why. Could be e.g. to handle
different libc/kernel versions. If we are not sure it is
not
* Fischer, Anna (anna.fisc...@hp.com) wrote:
I am running Fedora Core 12 with a 2.6.31 kernel. I use the Intel
82576 SR-IOV network card and want to assign its Virtual Functions (VFs)
to separate KVM guests. My guests also run Fedora Core 12 with a 2.6.31
kernel. I use the latest igb driver in
* Dmitri Seletski (drj...@gmail.com) wrote:
Dmitri Seletski wrote:
Hello folks.
My goal is to make my pci based network card work under windows
guest.(obviously using windows drivers)
this is device i am interested in:
01:07.0 Network controller: Atheros Communications Inc. AR5416
* Fischer, Anna (anna.fisc...@hp.com) wrote:
Subject: Re: pci-stub error and MSI-X for KVM guest
This works fine in principle and I can see the PCI device in the
guest under lspci. However, the 82576 VF driver requires the OS
to support MSI-X. My Fedora installation is configured with
This looks like an error case, but it's just a special case to shutdown
the backend. Clarify with a comment.
Signed-off-by: Chris Wright chr...@redhat.com
---
drivers/vhost/net.c |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/drivers/vhost/net.c b/drivers/vhost/net.c
Trivial change, just for readability. The filp is not installed on
failure, so the current code is not incorrect (also vhost_dev_init
currently has no failure case). This just treats setting f-private_data
as something with global scope (sure, true only after fd_install).
Signed-off-by: Chris
* Avi Kivity (a...@redhat.com) wrote:
On 12/23/2009 02:14 PM, Andi Kleen wrote:
http://www.redhat.com/f/pdf/summit/cwright_11_open_source_virt.pdf
See slide 32. This is without vhost-net.
Thanks. Do you also have latency numbers?
No. Copying Chris. This was with the tx mitigation timer
* Peter W. Morreale (pmorre...@novell.com) wrote:
On Wed, 2009-12-23 at 13:14 +0100, Andi Kleen wrote:
http://www.redhat.com/f/pdf/summit/cwright_11_open_source_virt.pdf
See slide 32. This is without vhost-net.
Thanks. Do you also have latency numbers?
It seems like there's
* Anthony Liguori (anth...@codemonkey.ws) wrote:
The poor packet latency of virtio-net is a result of the fact that we
do software timer based TX mitigation. We do this such that we can
decrease the number of exits per-packet and increase throughput. We set
a timer for 250ms and
did (not require an IOMMU, and fail to work
properly).
Cc: Alexander Graf ag...@suse.de
Cc: Dmitri Seletski drj...@gmail.com
Cc: Sheng Yang sh...@linux.intel.com
Signed-off-by: Chris Wright chr...@redhat.com
---
hw/device-assignment.c | 17 +
1 files changed, 9 insertions(+), 8
* Tobias Diedrich ([EMAIL PROTECTED]) wrote:
BUG: unable to handle kernel NULL pointer dereference at 0008
IP: [8021d44f] svm_vcpu_run+0x34/0x351
PGD 7e01b067 PUD 7bc86067 PMD 0
Oops: [1] PREEMPT
CPU 0
Modules linked in: zaurus cdc_ether usbnet snd_hda_intel
* Tobias Diedrich ([EMAIL PROTECTED]) wrote:
PM: Creating hibernation image:
PM: Need to copy 126181 pages
PM: Normal pages needed: 126181 + 1024 + 38, available pages: 397721
x86 PAT enabled: cpu 0, old 0x7040600070406, new 0x7010600070106
svm_cpu_init: svm_data is NULL on 0
Yeah, this is
* Anthony Liguori ([EMAIL PROTECTED]) wrote:
We've already gone down the road of trying to make standard paravirtual
interfaces (via virtio). No one was sufficiently interested in
collaborating. I don't see why other paravirtualizations are going to
be much different.
The point is to
* Anthony Liguori ([EMAIL PROTECTED]) wrote:
And arguably, storing TSC frequency in CPUID is a terrible interface
because the TSC frequency can change any time a guest is entered. It
True for older hardware, newer hardware should fix this. I guess the
point is, the are numbers that are
* Kamble, Nitin A ([EMAIL PROTECTED]) wrote:
From: Avi Kivity [mailto:[EMAIL PROTECTED]
Indeed finer control over cpuid is needed. We need
to support at least three modes:
- default: expose some machine that is likely to be widely supported
- host: expose as much of the host cpu as we can
* Mark Wagner ([EMAIL PROTECTED]) wrote:
I think that are two distinct arguments going on here. My main concern is
that I don't think that this a simple what do we make the default cache
policy
be issue. I think that regardless of the cache policy, if something in the
guest requests
we really know what the One True Usage model is for VF
devices. Chris Wright has some ideas, I have some ideas and Yu Zhao has
some ideas. I bet there's other people who have other ideas too.
I'd love to hear those ideas.
First there's the question of how to represent the VF on the host
commit b41d6cf38e27 (PCI: Check dynids driver_data value for validity)
requires all drivers to include an id table to try and match
driver_data. Before validating driver_data check driver has an id
table.
Cc: Jean Delvare [EMAIL PROTECTED]
Cc: Milton Miller [EMAIL PROTECTED]
Signed-off-by: Chris
/sys/bus/pci/devices/:00:19.0/driver - ../../../bus/pci/drivers/pci-stub
Cc: Kay, Allen M [EMAIL PROTECTED]
Cc: Nakajima, Jun [EMAIL PROTECTED]
Signed-off-by: Chris Wright [EMAIL PROTECTED]
---
drivers/pci/Kconfig|9 +
drivers/pci/Makefile |2 ++
drivers/pci/pci-stub.c
* Greg KH ([EMAIL PROTECTED]) wrote:
On Tue, Nov 25, 2008 at 07:38:39PM -0800, Chris Wright wrote:
When doing device assignment with KVM there's currently nothing to
protect the device from having a driver in the host as well as the guest.
This trivial module just binds the pci device
/sys/bus/pci/devices/:00:19.0/driver - ../../../bus/pci/drivers/pci-stub
Cc: Kay, Allen M [EMAIL PROTECTED]
Cc: Nakajima, Jun [EMAIL PROTECTED]
Signed-off-by: Chris Wright [EMAIL PROTECTED]
Acked-by: Greg Kroah-Hartman [EMAIL PROTECTED]
---
drivers/pci/Kconfig|9 +
drivers/pci
* Jean Delvare ([EMAIL PROTECTED]) wrote:
As a side note, I am curious what PCI driver we do have which has
driver-probe defined but no driver-id_table. Did you hit an actual
issue or are you fixing a theoretical one?
Such a driver was patch 2/2.
http://lkml.org/lkml/2008/11/26/11
It's meant
* Greg KH ([EMAIL PROTECTED]) wrote:
+static int
+igb_virtual(struct pci_dev *pdev, int nr_virtfn)
+{
+ unsigned char my_mac_addr[6] = {0x00, 0xDE, 0xAD, 0xBE, 0xEF, 0xFF};
+ struct net_device *netdev = pci_get_drvdata(pdev);
+ struct igb_adapter *adapter =
* Alan Cox ([EMAIL PROTECTED]) wrote:
+ r = !memcmp(old_digest, sha1_item-sha1val, SHA1_DIGEST_SIZE);
+ mutex_unlock(sha1_lock);
+ if (r) {
+ char *old_addr, *new_addr;
+ old_addr = kmap_atomic(oldpage, KM_USER0);
+ new_addr = kmap_atomic(newpage,
* Alan Cox ([EMAIL PROTECTED]) wrote:
On Tue, 2 Dec 2008 10:07:24 -0800
Chris Wright [EMAIL PROTECTED] wrote:
* Alan Cox ([EMAIL PROTECTED]) wrote:
+ r = !memcmp(old_digest, sha1_item-sha1val, SHA1_DIGEST_SIZE);
+ mutex_unlock(sha1_lock);
+ if (r
* Anthony Liguori (anth...@codemonkey.ws) wrote:
Chris Wright wrote:
* Anthony Liguori (anth...@codemonkey.ws) wrote:
It's available in recent kernels I see! so the fix is easy. Only
problem is how to pass CLONE_IO to pthread_create... We'll have to
make a linux-only change and call clone
1 - 100 of 394 matches
Mail list logo