From: Sheng Yang sh...@linux.intel.com
Convert KVM to use generic FPU API.
Signed-off-by: Sheng Yang sh...@linux.intel.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h
index d93601c..d08bb4a 100644
---
From: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
Split kvm_sync_page() into kvm_sync_page() and kvm_sync_page_transient()
to clarify the code address Avi's suggestion
kvm_sync_page_transient() function only update shadow page but not mark
it sync and not write protect sp-gfn. it will be used by
From: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
Two cases maybe happen in kvm_mmu_get_page() function:
- one case is, the goal sp is already in cache, if the sp is unsync,
we only need update it to assure this mapping is valid, but not
mark it sync and not write-protect sp-gfn since it not
From: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
Only unsync pages need updated at invlpg time since other shadow
pages are write-protected
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/paging_tmpl.h
From: Joerg Roedel joerg.roe...@amd.com
This patch implements a workaround for AMD erratum 383 into
KVM. Without this erratum fix it is possible for a guest to
kill the host machine. This patch implements the suggested
workaround for hypervisors which will be published by the
next revision guide
From: Sheng Yang sh...@linux.intel.com
Also add some constants.
Signed-off-by: Sheng Yang sh...@linux.intel.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/include/asm/i387.h b/arch/x86/include/asm/i387.h
index 8002e9c..9610628 100644
--- a/arch/x86/include/asm/i387.h
+++
On 05/20/2010 01:33 AM, Michael S. Tsirkin wrote:
Virtio is already way too bouncy due to the indirection between the
avail/used rings and the descriptor pool. A device with out of order
completion (like virtio-blk) will quickly randomize the unused
descriptor indexes, so every descriptor
On 05/20/2010 01:27 AM, Michael S. Tsirkin wrote:
On Wed, May 19, 2010 at 08:04:51PM +0300, Avi Kivity wrote:
On 05/18/2010 04:19 AM, Michael S. Tsirkin wrote:
With PUBLISH_USED_IDX, guest tells us which used entries
it has consumed. This can be used to reduce the number
of
On 05/19/2010 11:02 PM, Udo Lembke wrote:
Unrelated, what are your smp issues?
If i use one cpu i got a good io-performance:
e.g. over 500MB/s at the profile install of the io-benchmark
h2benchw.exe.
( aio=threads | SAS-Raid-0 |
ftp://ftp.heise.de/pub/ct/ctsi/h2benchw.zip | hwbenchw.exe -p
Commit 3d53f5c36ff6 introduced a segfault by erroneously making fw_cfg a
'void **' and passing it around in different ways.
Signed-off-by: Eduard - Gabriel Munteanu eduard.munte...@linux360.ro
---
hw/pc.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/hw/pc.c
On 05/20/2010 08:01 AM, Rusty Russell wrote:
A device with out of order
completion (like virtio-blk) will quickly randomize the unused
descriptor indexes, so every descriptor fetch will require a bounce.
In contrast, if the rings hold the descriptors themselves instead of
pointers, we bounce
Avi Kivity schrieb:
On 05/19/2010 11:02 PM, Udo Lembke wrote:
Unrelated, what are your smp issues?
If i use one cpu i got a good io-performance:
e.g. over 500MB/s at the profile install of the io-benchmark
h2benchw.exe.
( aio=threads | SAS-Raid-0 |
Hello
since kernel 2.6.28 or 2.6.29, I don't remember exactly, whenever I try to run
KVM in my laptop, I get my computer totally frozen.
I'd try:
- -no-kvm flag: works, but very slow
- -cpu qemu32,-nx: frozen
- -no-acpi flag: frozen
I'd try with several kernels (ubuntu and openssuse
Michael Tokarev wrote:
20.05.2010 02:30, Anthony Liguori wrote:
On 05/19/2010 05:29 PM, Andre Przywara wrote:
Michael Tokarev wrote:
...
Also, thanks to Andre Przywara, whole winNT thing works but it requires
-cpu qemu64,level=1 (or level=2 or =3), -- _not_ with default CPU. This
[]
It'd
On 05/19/10 02:58, Natalia Portillo wrote:
Hi,
- We'll try to migrate as many confirmable bugs from the Source Forge
tracker to Launchpad.
I think that part of the bug day should also include retesting OSes that
appear in OS Support List as having bug and confirming if the bug is still
On 05/19/10 15:34, Anthony Liguori wrote:
On 05/19/2010 12:04 AM, Aurelien Jarno wrote:
The idea is nice, but would it be possible to hold this on a week-end,
I personally won't be able to attend such thing on a day week.
Or maybe holding that on two days: friday and saturday so that people
Thank you for fixing it. Probably I was too in hurry when rebasing the patches.
Acked-by: Isaku Yamahata yamah...@valinux.co.jp
On Thu, May 20, 2010 at 09:14:04AM +0300, Eduard - Gabriel Munteanu wrote:
Commit 3d53f5c36ff6 introduced a segfault by erroneously making fw_cfg a
'void **' and
On 05/13/10 16:57, Avi Kivity wrote:
On 05/13/2010 05:35 PM, Stefan Hajnoczi wrote:
How to count and trace KVM perf events:
http://www.linux-kvm.org/page/Perf_events
I want to draw attention to this because traditional kvm_stat and
kvm_trace use has been moving over to the debugfs based
On 05/20/2010 11:15 AM, Jes Sorensen wrote:
On 05/13/10 16:57, Avi Kivity wrote:
On 05/13/2010 05:35 PM, Stefan Hajnoczi wrote:
How to count and trace KVM perf events:
http://www.linux-kvm.org/page/Perf_events
I want to draw attention to this because traditional kvm_stat and
On 05/20/10 10:19, Avi Kivity wrote:
On 05/20/2010 11:15 AM, Jes Sorensen wrote:
Two things are missing to make this really useful:
- a continuously updating difference mode like kvm_stat
- subevents; for example kvm:kvm_exit is an aggregate of all exit types
that can be split using
From: Dexuan Cui dexuan@intel.com
Enable XSAVE/XRSTORE for guest.
Change from V2:
Addressed comments from Avi.
Change from V1:
1. Use FPU API.
2. Fix CPUID issue.
3. Save/restore all possible guest xstate fields when switching. Because we
don't know which fields guest has already touched.
On 05/19/2010 05:14 AM, Feng Yang wrote:
- Michael Goldish mgold...@redhat.com wrote:
From: Michael Goldish mgold...@redhat.com
To: Feng Yang fy...@redhat.com
Cc: autot...@test.kernel.org, kvm@vger.kernel.org
Sent: Monday, May 17, 2010 11:05:37 PM GMT +08:00 Beijing / Chongqing / Hong
On 05/20/2010 12:16 PM, Sheng Yang wrote:
From: Dexuan Cuidexuan@intel.com
Enable XSAVE/XRSTORE for guest.
Change from V2:
Addressed comments from Avi.
Change from V1:
1. Use FPU API.
2. Fix CPUID issue.
3. Save/restore all possible guest xstate fields when switching. Because we
don't
On 05/19/2010 11:25 AM, Feng Yang wrote:
Hi, Michael
Thanks for your patch.
We plan add netdev parameter support in make_qemu_command. Since you are
working on this part. Could you add netdev support in your patch? hopeful
netdev can be default supported in make_qemu_command if qemu
On 05/19/2010 12:13 PM, Jason Wang wrote:
This checker serves as the post_command to find the panic information
in the file which contains the content of guest serial console.
Changes from v2:
- Put all things into __main__
- Fix some typos
Signed-off-by: Jason Wang jasow...@redhat.com
On Wed, May 19, 2010 at 02:18:35PM -0500, Anthony Liguori wrote:
On 05/19/2010 02:00 PM, Chris Wright wrote:
When libvirt launches a guest it first chowns the relevenat
/sys/bus/pci/.../config file for an assigned device then drops privileges.
This causes an issue for device assignment
On Thu, May 20, 2010 at 02:31:50PM +0930, Rusty Russell wrote:
Can we do better? The obvious idea is to try to get rid of last_used and
used, and use the ring itself. We would use an invalid entry to mark the
head of the ring.
Any other thoughts?
Rusty.
We also need a way to avoid
On Thu, May 13, 2010 at 04:17:14PM +0300, Gleb Natapov wrote:
When in-kernel irqchip is used env-halted is never used for anything
except info cpus command. Halted state is synced in
kvm_arch_save_mpstate() and showed by do_info_cpus() but otherwise never
looked at. Zeroing it here breaks info
On SVM interrupts are injected by svm_set_irq() not svm_inject_irq().
The later is used only to wait for irq window.
Signed-off-by: Gleb Natapov g...@redhat.com
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index 58c91f5..cd70109 100644
--- a/arch/x86/kvm/svm.c
+++ b/arch/x86/kvm/svm.c
@@
On Thu, May 20, 2010 at 01:19:45PM +0300, Gleb Natapov wrote:
On SVM interrupts are injected by svm_set_irq() not svm_inject_irq().
The later is used only to wait for irq window.
And of course ignore this. Haven't noticed compilation error.
Signed-off-by: Gleb Natapov g...@redhat.com
diff
On SVM interrupts are injected by svm_set_irq() not svm_inject_irq().
The later is used only to wait for irq window.
Signed-off-by: Gleb Natapov g...@redhat.com
ChangeLog:
v1-v2:
- fix stupid cutpaste error.
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index 58c91f5..69b16a7 100644
On Thu, 2010-05-20 at 12:50 +0300, Michael Goldish wrote:
On 05/19/2010 11:25 AM, Feng Yang wrote:
Hi, Michael
Thanks for your patch.
We plan add netdev parameter support in make_qemu_command. Since you are
working on this part. Could you add netdev support in your patch? hopeful
8330 kvm:kvm_entry# 0.000 M/sec
^--- count since starting perf
The 8330 number means that kvm_entry has fired 8330 times since perf
was started. Like Avi says, you need to keep the perf process
running. I run benchmarks using a script that kills perf after the
benchmark
On 05/20/2010 02:05 PM, Stefan Hajnoczi wrote:
8330 kvm:kvm_entry# 0.000 M/sec
^--- count since starting perf
The 8330 number means that kvm_entry has fired 8330 times since perf
was started. Like Avi says, you need to keep the perf process
running. I run benchmarks using a
On 05/20/10 13:10, Avi Kivity wrote:
On 05/20/2010 02:05 PM, Stefan Hajnoczi wrote:
Jes, you're right, something like perf stat -e kvm:* --start and
perf stat --stop would be more usable for system-wide monitoring. I
wonder if it is possible to support this or whether the perf process
needs
On Thu, May 20, 2010 at 12:16 PM, Jes Sorensen jes.soren...@redhat.com wrote:
On 05/20/10 13:10, Avi Kivity wrote:
What's wrong with starting perf after the warm-up period and stopping it
before it's done?
It's pretty hard to script.
I use the following. It ain't pretty:
#!/bin/bash
Anthony Liguori anth...@codemonkey.ws writes:
On 05/19/2010 02:00 PM, Chris Wright wrote:
When libvirt launches a guest it first chowns the relevenat
/sys/bus/pci/.../config file for an assigned device then drops privileges.
This causes an issue for device assignment because despite being
On 05/20/2010 02:23 PM, Stefan Hajnoczi wrote:
On Thu, May 20, 2010 at 12:16 PM, Jes Sorensenjes.soren...@redhat.com wrote:
On 05/20/10 13:10, Avi Kivity wrote:
What's wrong with starting perf after the warm-up period and stopping it
before it's done?
It's pretty hard to
On Thu, May 20, 2010 at 1:14 PM, Avi Kivity a...@redhat.com wrote:
echo 1/sys/kernel/debug/tracing/events/kvm/enable
cat /sys/kernel/debug/tracing/trace_piperesults/trace
perf will enable the events by itself (no?), so all you need is is the perf
call in the middle.
Yes, it will enable
On 05/20/2010 03:24 PM, Stefan Hajnoczi wrote:
On Thu, May 20, 2010 at 1:14 PM, Avi Kivitya...@redhat.com wrote:
echo 1/sys/kernel/debug/tracing/events/kvm/enable
cat /sys/kernel/debug/tracing/trace_piperesults/trace
perf will enable the events by itself (no?), so all you need is
Am 17.05.2010 18:45, schrieb Nicholas A. Bellinger:
From: Nicholas Bellinger n...@linux-iscsi.org
Greetings,
Attached are the updated patches following hch's comments to fix scsi-generic
device breakage with find_image_format() and refresh_total_sectors().
These are being resent as the
This is preliminary work for AMD IOMMU emulation support.
Signed-off-by: Eduard - Gabriel Munteanu eduard.munte...@linux360.ro
---
Makefile.target |2 +
configure |9 +
hw/amd_iommu.c | 442 +++
hw/pc.c |2 +
hw/pc.h
On Thu, 20 May 2010 04:30:56 pm Avi Kivity wrote:
On 05/20/2010 08:01 AM, Rusty Russell wrote:
A device with out of order
completion (like virtio-blk) will quickly randomize the unused
descriptor indexes, so every descriptor fetch will require a bounce.
In contrast, if the rings hold
On 05/19/2010 05:16 PM, Mohammed Gamal wrote:
This patch address bug report in https://bugs.launchpad.net/qemu/+bug/530077.
Failed vmentries were handled with handle_unhandled() which prints a rather
unfriendly message to the user. This patch separates handling vmentry failures
from unknown
On Thu, May 20, 2010 at 5:37 PM, Chris Lalancette clala...@redhat.com wrote:
On 05/19/2010 05:16 PM, Mohammed Gamal wrote:
This patch address bug report in https://bugs.launchpad.net/qemu/+bug/530077.
Failed vmentries were handled with handle_unhandled() which prints a rather
unfriendly
On 05/20/2010 09:37 AM, Chris Lalancette wrote:
On 05/19/2010 05:16 PM, Mohammed Gamal wrote:
This patch address bug report in https://bugs.launchpad.net/qemu/+bug/530077.
Failed vmentries were handled with handle_unhandled() which prints a rather
unfriendly message to the user. This patch
On 05/20/2010 05:34 PM, Rusty Russell wrote:
Have just one ring, no indexes. The producer places descriptors into
the ring and updates the head, The consumer copies out descriptors to
be processed and copies back in completed descriptors. Chaining is
always linear. The descriptors contain
On Thu, May 20, 2010 at 6:53 PM, Avi Kivity a...@redhat.com wrote:
On 05/20/2010 05:46 PM, Mohammed Gamal wrote:
On Thu, May 20, 2010 at 5:37 PM, Chris Lalancetteclala...@redhat.com
wrote:
On 05/19/2010 05:16 PM, Mohammed Gamal wrote:
This patch address bug report in
[for Michael Tsirkin's vhost development git tree]
This patch fixes a race between guest and host when
adding used buffers wraps the ring. Without it, guests
can see partial packets before num_buffers is set in
the vnet header.
Signed-off-by: David L Stevens dlstev...@us.ibm.com
diff --git
On Thursday, May 20, 2010 02:03:31 am magicboiz wrote:
Hello
since kernel 2.6.28 or 2.6.29, I don't remember exactly, whenever I try to
run KVM in my laptop, I get my computer totally frozen.
I'd try:
- -no-kvm flag: works, but very slow
- -cpu qemu32,-nx: frozen
- -no-acpi flag:
I'm interested in moving some research prototypes from Xen to KVM, but
there are a few esoteric features I'd need to do this.
First is an efficient mechanism for direct VM-to-VM sockets...something
that bypasses the protocol stack and minimizes overhead. Xen has
XenSocket, XenLoop, and
On Wed, May 19, 2010 at 7:22 PM, Christian Brunner c...@muc.de wrote:
The attached patch is a block driver for the distributed file system
Ceph (http://ceph.newdream.net/). This driver uses librados (which
is part of the Ceph server) for direct access to the Ceph object
store and is running
Good catch. Thanks, applied.
On Thu, May 20, 2010 at 6:14 AM, Eduard - Gabriel Munteanu
eduard.munte...@linux360.ro wrote:
Commit 3d53f5c36ff6 introduced a segfault by erroneously making fw_cfg a
'void **' and passing it around in different ways.
Signed-off-by: Eduard - Gabriel Munteanu
2010/5/20 Blue Swirl blauwir...@gmail.com:
On Wed, May 19, 2010 at 7:22 PM, Christian Brunner c...@muc.de wrote:
The attached patch is a block driver for the distributed file system
Ceph (http://ceph.newdream.net/). This driver uses librados (which
is part of the Ceph server) for direct access
On 05/20/2010 04:18 PM, Christian Brunner wrote:
Thanks for your comments. I'll send an updated patch in a few days.
Having a central storage system is quite essential in larger hosting
environments, it enables you to move your guest systems from one node
to another easily (live-migration or
20.05.2010 11:15, Andre Przywara wrote:
Michael Tokarev wrote:
[]
It'd be nice if we had more flexibility in defining custom machine types
so you could just do qemu -M win98.
This is wrong IMHO. win98 and winNT can run on various different
machines, including all modern ones (yes I tried the
We've already got an open fd for PCI config space for the device, we
might as well use it. This also makes sure that if we're making use of
a privileged file descriptor opened for us, we use it for all accesses
to the device.
Signed-off-by: Alex Williamson alex.william...@redhat.com
---
* Alex Williamson (alex.william...@redhat.com) wrote:
We've already got an open fd for PCI config space for the device, we
might as well use it. This also makes sure that if we're making use of
a privileged file descriptor opened for us, we use it for all accesses
to the device.
2010/5/20 Anthony Liguori anth...@codemonkey.ws:
With new approaches like Sheepdog or Ceph, things are getting a lot
cheaper and you can scale your system without disrupting your service.
The concepts are quite similar to what Amazon is doing in their EC2
environment, but they certainly won't
On Tue, May 18, 2010 at 5:04 PM, Sridhar Samudrala
samudrala.srid...@gmail.com wrote:
Add a new kernel API to attach a task to current task's cgroup
in all the active hierarchies.
Signed-off-by: Sridhar Samudrala s...@us.ibm.com
Reviewed-by: Paul Menage men...@google.com
It would be more
On Thu, May 20, 2010 at 3:22 PM, Paul Menage men...@google.com wrote:
On Tue, May 18, 2010 at 5:04 PM, Sridhar Samudrala
samudrala.srid...@gmail.com wrote:
Add a new kernel API to attach a task to current task's cgroup
in all the active hierarchies.
Signed-off-by: Sridhar Samudrala
On Thu, May 20, 2010 at 1:31 PM, Blue Swirl blauwir...@gmail.com wrote:
On Wed, May 19, 2010 at 7:22 PM, Christian Brunner c...@muc.de wrote:
The attached patch is a block driver for the distributed file system
Ceph (http://ceph.newdream.net/). This driver uses librados (which
is part of the
* Chris Wright (chr...@redhat.com) wrote:
* Alex Williamson (alex.william...@redhat.com) wrote:
We've already got an open fd for PCI config space for the device, we
might as well use it. This also makes sure that if we're making use of
a privileged file descriptor opened for us, we use it
Use stdint types to avoid extra reliance on pci/pci.h header.
Cc: Alex Williamson alex.william...@redhat.com
Signed-off-by: Chris Wright chr...@redhat.com
---
hw/device-assignment.c |6 +++---
1 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/hw/device-assignment.c
From: Alex Williamson alex.william...@redhat.com
We've already got an open fd for PCI config space for the device, we
might as well use it. This also makes sure that if we're making use of
a privileged file descriptor opened for us, we use it for all accesses
to the device.
Signed-off-by: Alex
On Thu, 2010-05-20 at 17:25 -0700, Chris Wright wrote:
Use stdint types to avoid extra reliance on pci/pci.h header.
Cc: Alex Williamson alex.william...@redhat.com
Signed-off-by: Chris Wright chr...@redhat.com
---
hw/device-assignment.c |6 +++---
1 files changed, 3 insertions(+), 3
On Thu, 2010-05-20 at 17:27 -0700, Chris Wright wrote:
From: Alex Williamson alex.william...@redhat.com
We've already got an open fd for PCI config space for the device, we
might as well use it. This also makes sure that if we're making use of
a privileged file descriptor opened for us, we
- Lucas Meneghel Rodrigues l...@redhat.com wrote:
From: Lucas Meneghel Rodrigues l...@redhat.com
To: Michael Goldish mgold...@redhat.com
Cc: Feng Yang fy...@redhat.com, autot...@test.kernel.org,
kvm@vger.kernel.org
Sent: Thursday, May 20, 2010 6:57:23 PM GMT +08:00 Beijing / Chongqing
On Thu, May 20, 2010 at 11:16 PM, Christian Brunner c...@muc.de wrote:
2010/5/20 Anthony Liguori anth...@codemonkey.ws:
Both sheepdog and ceph ultimately transmit I/O over a socket to a central
daemon, right? So could we not standardize a protocol for this that both
sheepdog and ceph could
At Fri, 21 May 2010 00:16:46 +0200,
Christian Brunner wrote:
2010/5/20 Anthony Liguori anth...@codemonkey.ws:
With new approaches like Sheepdog or Ceph, things are getting a lot
cheaper and you can scale your system without disrupting your service.
The concepts are quite similar to what
70 matches
Mail list logo