Hi All,
The proposal is to about defining the qemu-kvm interface for reserving the
performance monitor for guest(guests) in Embedded Power Architecture. The plan
is to reserve the Performance Monitor for guest/s on guest boot-up and will be
released only on guest reset/exit. If a Performance
On 04/12/2011 03:39 AM, Anthony Liguori wrote:
would say let it rest in peace. But maybe it points to a generic issues
that is just magnified by non-threaded mode.
If it's most probably an architectural deficit of non-io-thread mode, I
If gpxe is spinning waiting for I/O to complete, that's
On 04/11/2011 08:55 PM, FinnTux wrote:
Hello,
I ran into a crash today while I tried to log into one of my servers.
I noticed ssh didn't respond at all. All virtual machines were running
ok though. I had one terminal open to the server and it was running ok
except ssh didn't work.
I'm not
Hi All,
This is KVM test result against kvm.git
7a7ada1bfb958d2ad722d0df9299f1b0136ec1d4 based on kernel 2.6.39-rc2+, and
qemu-kvm.git df85c051d780bca0ee2462cfeb8ef6d9552a19b0.
We found 1 bug about NIC cannot work when it had been used before .
The VT-d bug 730441 (qemu bugzilla) concerning
On 04/11/2011 08:15 PM, Blue Swirl wrote:
On Mon, Apr 11, 2011 at 10:01 AM, Markus Armbrusterarm...@redhat.com wrote:
Avi Kivitya...@redhat.com writes:
On 04/08/2011 12:41 AM, Anthony Liguori wrote:
And it's a good thing to have, but exposing this as the only API to
do something as
Quoting Avi Kivity (a...@redhat.com):
On 04/09/2011 12:09 AM, Serge E. Hallyn wrote:
Hi,
at https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/747090, it was
found that emulate_int_real() sometimes pushes the wrong eip when doing a
int. Whereas with non-kvm qemu we push the next
On 04/12/2011 10:53 AM, Serge E. Hallyn wrote:
Quoting Avi Kivity (a...@redhat.com):
On 04/09/2011 12:09 AM, Serge E. Hallyn wrote:
Hi,
at https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/747090, it was
found that emulate_int_real() sometimes pushes the wrong eip when doing a
On 04/12/2011 10:48 AM, Ren, Yongjie wrote:
Hi All,
This is KVM test result against kvm.git
7a7ada1bfb958d2ad722d0df9299f1b0136ec1d4 based on kernel 2.6.39-rc2+, and
qemu-kvm.git df85c051d780bca0ee2462cfeb8ef6d9552a19b0.
We found 1 bug about NIC cannot work when it had been used before .
On 04/11/2011 10:18 PM, Jan Kiszka wrote:
At least Windows should no longer we a functional blocker thanks to
Paolo's work.
What's left now is icount. I also have had patches ready for a while,
I'll send them out.
Paolo
--
To unsubscribe from this list: send the line unsubscribe kvm in
the
On Tue, Apr 12, 2011 at 1:18 AM, Josh Durgin josh.dur...@dreamhost.com wrote:
On 04/08/2011 01:43 AM, Stefan Hajnoczi wrote:
On Mon, Mar 28, 2011 at 04:15:57PM -0700, Josh Durgin wrote:
librbd stacks on top of librados to provide access
to rbd images.
Using librbd simplifies the qemu code,
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/x86.c | 14 ++
1 files changed, 6 insertions(+), 8 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 609c7ab..efe196c 100644
--- a/arch/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@ -4404,6 +4404,12 @@
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/emulate.c |3 ++-
1 files changed, 2 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index eb4c7eb..4f95249 100644
--- a/arch/x86/kvm/emulate.c
+++ b/arch/x86/kvm/emulate.c
@@ -3876,7
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/emulate.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index 3e8b4ab..eb4c7eb 100644
--- a/arch/x86/kvm/emulate.c
+++ b/arch/x86/kvm/emulate.c
@@ -1973,6
Remove unused variable mmio_fault_cr2.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/kvm_host.h |1 -
arch/x86/kvm/x86.c |2 +-
2 files changed, 1 insertions(+), 2 deletions(-)
diff --git a/arch/x86/include/asm/kvm_host.h
mmio_index should be taken into account when copying data from
userspace.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/x86.c |3 ++-
1 files changed, 2 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index b568779..609c7ab 100644
---
Hi All,
I have following command line options to qemu-kvm ( apart from others
- irrelevant here !! )
-chardev
socket,id=charmonitor,path=/var/lib/libvirt/qemu/vm00-SMP.monitor,server,nowait
-mon chardev=charmonitor,id=monitor,mode=control
How do I now start the qemu-kvm monitor control session
My EuroSe'11 paper was a attack on memory deduplication, but my
USENIX HotSe'10 paper was a proposal to increase security of Guest OS using
memory deduplication (KSM).
Title: Moving from Logical Sharing of Guest OS to Physical Sharing of
Deduplication on Virtual Machine
Paper:
As suggested by Christoph Hellwig and Pekka Enberg, Add a '--readonly' flag to
prevent runtime changes to the disk to be saved in the image file.
Please note that since the changes are saved in the VM instead of being written
out, a large amount of modified blocks may kill the tool.
On Tue, Apr 12, 2011 at 12:26 PM, Onkar Mahajan kern.de...@gmail.com wrote:
Hi All,
I have following command line options to qemu-kvm ( apart from others
- irrelevant here !! )
-chardev
socket,id=charmonitor,path=/var/lib/libvirt/qemu/vm00-SMP.monitor,server,nowait
-mon
On 04/12/2011 12:36 PM, Gleb Natapov wrote:
Signed-off-by: Gleb Natapovg...@redhat.com
---
arch/x86/kvm/emulate.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index 3e8b4ab..eb4c7eb 100644
---
On 04/12/2011 12:36 PM, Gleb Natapov wrote:
mmio_index should be taken into account when copying data from
userspace.
Signed-off-by: Gleb Natapovg...@redhat.com
---
arch/x86/kvm/x86.c |3 ++-
1 files changed, 2 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/x86.c
On Tue, Apr 12, 2011 at 03:19:00PM +0300, Avi Kivity wrote:
On 04/12/2011 12:36 PM, Gleb Natapov wrote:
mmio_index should be taken into account when copying data from
userspace.
Signed-off-by: Gleb Natapovg...@redhat.com
---
arch/x86/kvm/x86.c |3 ++-
1 files changed, 2
On Tue, Apr 12, 2011 at 03:17:51PM +0300, Avi Kivity wrote:
On 04/12/2011 12:36 PM, Gleb Natapov wrote:
Signed-off-by: Gleb Natapovg...@redhat.com
---
arch/x86/kvm/emulate.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/emulate.c
On 2011-04-12 14:08, Stefan Hajnoczi wrote:
On Tue, Apr 12, 2011 at 12:26 PM, Onkar Mahajan kern.de...@gmail.com wrote:
Hi All,
I have following command line options to qemu-kvm ( apart from others
- irrelevant here !! )
-chardev
On 04/12/2011 03:22 PM, Gleb Natapov wrote:
On Tue, Apr 12, 2011 at 03:19:00PM +0300, Avi Kivity wrote:
On 04/12/2011 12:36 PM, Gleb Natapov wrote:
mmio_index should be taken into account when copying data from
userspace.
Signed-off-by: Gleb Natapovg...@redhat.com
---
On 04/12/2011 03:23 PM, Gleb Natapov wrote:
On Tue, Apr 12, 2011 at 03:17:51PM +0300, Avi Kivity wrote:
On 04/12/2011 12:36 PM, Gleb Natapov wrote:
Signed-off-by: Gleb Natapovg...@redhat.com
---
arch/x86/kvm/emulate.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
On Tue, Apr 12, 2011 at 03:27:40PM +0300, Avi Kivity wrote:
On 04/12/2011 03:22 PM, Gleb Natapov wrote:
On Tue, Apr 12, 2011 at 03:19:00PM +0300, Avi Kivity wrote:
On 04/12/2011 12:36 PM, Gleb Natapov wrote:
mmio_index should be taken into account when copying data from
userspace.
On 04/12/2011 03:34 PM, Gleb Natapov wrote:
On Tue, Apr 12, 2011 at 03:27:40PM +0300, Avi Kivity wrote:
On 04/12/2011 03:22 PM, Gleb Natapov wrote:
On Tue, Apr 12, 2011 at 03:19:00PM +0300, Avi Kivity wrote:
On 04/12/2011 12:36 PM, Gleb Natapov wrote:
mmio_index should be taken
Juan Quintela quint...@trasno.org wrote:
Please, send in any agenda items you are interested in covering.
Later, Juan.
As there is no agenda items posted, today call is just cancelled.
Enjoy, Juan.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
Anthony,
From: Anthony Liguori anth...@codemonkey.ws
Subject: Re: EuroSec'11 Presentation
Date: Mon, 11 Apr 2011 12:19:10 -0500
Again, it is extremely difficult to use side channel information
disclosures to actually exploit anything. If you are worried about this
level of security, you
Quoting Avi Kivity (a...@redhat.com):
On 04/12/2011 10:53 AM, Serge E. Hallyn wrote:
Quoting Avi Kivity (a...@redhat.com):
On 04/09/2011 12:09 AM, Serge E. Hallyn wrote:
Hi,
at https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/747090, it was
found that emulate_int_real()
Quoting Avi Kivity (a...@redhat.com):
On 04/12/2011 10:53 AM, Serge E. Hallyn wrote:
Quoting Avi Kivity (a...@redhat.com):
On 04/09/2011 12:09 AM, Serge E. Hallyn wrote:
Hi,
at https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/747090, it was
found that emulate_int_real()
On 04/12/2011 04:57 PM, Serge E. Hallyn wrote:
Quoting Avi Kivity (a...@redhat.com):
On 04/12/2011 10:53 AM, Serge E. Hallyn wrote:
Quoting Avi Kivity (a...@redhat.com):
On 04/09/2011 12:09 AM, Serge E. Hallyn wrote:
Hi,
at
On 04/12/2011 05:12 PM, Serge E. Hallyn wrote:
Quoting Avi Kivity (a...@redhat.com):
On 04/12/2011 10:53 AM, Serge E. Hallyn wrote:
Quoting Avi Kivity (a...@redhat.com):
On 04/09/2011 12:09 AM, Serge E. Hallyn wrote:
Hi,
at
On 04/12/2011 10:29 AM, Bhushan Bharat-R65777 wrote:
Hi All,
The proposal is to about defining the qemu-kvm interface for reserving the
performance monitor for guest(guests) in Embedded Power Architecture. The plan
is to reserve the Performance Monitor for guest/s on guest boot-up and will be
From: Takuya Yoshikawa yoshikawa.tak...@oss.ntt.co.jp
This stops CMP r/m, reg to write back the data into memory.
Pointed out by Avi.
The writeback suppression now covers CMP, CMPS, SCAS.
Signed-off-by: Takuya Yoshikawa yoshikawa.tak...@oss.ntt.co.jp
---
Changelog v1-v2: moved the line just
From: Takuya Yoshikawa yoshikawa.tak...@oss.ntt.co.jp
PUSH emulation stores the value by calling writeback() after setting
the dst operand appropriately in emulate_push().
This writeback() using dst is not needed at all because we know the
target is the stack. So this patch makes emulate_push()
From: Takuya Yoshikawa yoshikawa.tak...@oss.ntt.co.jp
em_push() is a simple wrapper of emulate_push(). So this patch replaces
emulate_push() with em_push() and removes the unnecessary former.
In addition, the unused ops arguments are removed from emulate_pusha()
and emulate_grp45().
On Tue, 12 Apr 2011, Stefan Hajnoczi wrote:
On Tue, Apr 12, 2011 at 1:18 AM, Josh Durgin josh.dur...@dreamhost.com
wrote:
On 04/08/2011 01:43 AM, Stefan Hajnoczi wrote:
On Mon, Mar 28, 2011 at 04:15:57PM -0700, Josh Durgin wrote:
librbd stacks on top of librados to provide access
to
On 04/11/2011 12:12 PM, Nikola Ciprich wrote:
Hello Zachary,
what is the current status, are You going to post this patch to Avi?
I'd like to see one (or both) in stable eventually, I think it's good
candidate..
BR
nik
I think for upstream the newer patch is the way to go, but I would
On 2011-04-12 16:16, Avi Kivity wrote:
On 04/12/2011 05:12 PM, Serge E. Hallyn wrote:
Quoting Avi Kivity (a...@redhat.com):
On 04/12/2011 10:53 AM, Serge E. Hallyn wrote:
Quoting Avi Kivity (a...@redhat.com):
On 04/09/2011 12:09 AM, Serge E. Hallyn wrote:
Hi,
at
-Original Message-
From: Avi Kivity [mailto:a...@redhat.com]
Sent: Tuesday, April 12, 2011 8:09 PM
To: Bhushan Bharat-R65777
Cc: kvm@vger.kernel.org; bharatb.ya...@gmail.com
Subject: Re: [Proposal] QEMU-KVM Interface for granting Performance
Monitor to guests
On 04/12/2011
Signed-off-by: Asias He asias.he...@gmail.com
---
tools/kvm/virtio-console.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/tools/kvm/virtio-console.c b/tools/kvm/virtio-console.c
index 9675090..aa9b1bd 100644
--- a/tools/kvm/virtio-console.c
+++
Left irq pin 3 for virtio networking
Signed-off-by: Asias He asias.he...@gmail.com
---
tools/kvm/virtio-console.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/tools/kvm/virtio-console.c b/tools/kvm/virtio-console.c
index aa9b1bd..14f61ae 100644
---
This patch implement virtio network device.
The current implementation uses tap which needs root privileges to create a
virtual network device (tap0) on host side. Actually, what we need is
CAP_NET_ADMIN.
The host side tap0 is set to 192.168.33.2/24.
You need to configure the guest side eth0 to
On Tue, 12 Apr 2011 16:05:29 +
Bhushan Bharat-R65777 r65...@freescale.com wrote:
-Original Message-
From: Avi Kivity [mailto:a...@redhat.com]
Sent: Tuesday, April 12, 2011 8:09 PM
To: Bhushan Bharat-R65777
Cc: kvm@vger.kernel.org; bharatb.ya...@gmail.com
Subject: Re:
On 04/12/2011 07:45 PM, Scott Wood wrote:
On Tue, 12 Apr 2011 16:05:29 +
Bhushan Bharat-R65777r65...@freescale.com wrote:
-Original Message-
From: Avi Kivity [mailto:a...@redhat.com]
Sent: Tuesday, April 12, 2011 8:09 PM
To: Bhushan Bharat-R65777
Cc:
Looks like double free or similar. Try adding the kernel boot parameter
slub_debug=ZFPU.
Will do.
Meanwhile I got the same error on the other host. I was able to login
via ssh though.
[208817.065852] [ cut here ]
[208817.066187] kernel BUG at
bootindex option was added to -option-rom switch, but never documented.
Signed-off-by: Glauber Costa glom...@redhat.com
---
qemu-options.hx | 11 +--
1 files changed, 9 insertions(+), 2 deletions(-)
diff --git a/qemu-options.hx b/qemu-options.hx
index 18f54d2..96927cc 100644
---
The option-rom puts all roms passed by this switch in the genroms directory,
through the fw_dir option. But as it turns out, not all roms should be placed
there.
VGA roms are a of a different kind. They live in a different segment, and are
scanned
first. This patch allows qemu to use external
Some roms should not live in genroms/, the default place for all roms passed
through -option-rom switch.
Rather, they'd like to be placed in vgaroms. This patch allows it to happen.
Glauber Costa (2):
document bootindex option
add fw_dir option to option-rom switch
hw/pc.c |7
If user doesn't specify a kernel image for 'kvm run' command, try to look up
host kernel kernel image from /boot directory and use it as guest kernel.
Cc: Asias He asias.he...@gmail.com
Cc: Cyrill Gorcunov gorcu...@gmail.com
Cc: Ingo Molnar mi...@elte.hu
Signed-off-by: Pekka Enberg
Add the OPT_GROUP parser option to allow the creation of an organized help menu.
Used code taken from the git project.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/include/kvm/parse-options.h |6 ++
1 files changed, 6 insertions(+), 0 deletions(-)
diff --git
Group the cmdline menu into simple groups instead of one messy list.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/kvm-run.c | 23 ++-
1 files changed, 14 insertions(+), 9 deletions(-)
diff --git a/tools/kvm/kvm-run.c b/tools/kvm/kvm-run.c
index
On Tue, 2011-04-12 at 12:40 -0500, Anthony Liguori wrote:
On 04/12/2011 12:23 PM, Glauber Costa wrote:
The option-rom puts all roms passed by this switch in the genroms directory,
through the fw_dir option. But as it turns out, not all roms should be
placed there.
VGA roms are a of a
On Tue, 2011-04-12 at 19:03 +0100, Prasad Joshi wrote:
@@ -158,6 +177,13 @@ int kvm_cmd_run(int argc, const char **argv,
const char *prefix)
}
+ kernel_filename = find_host_kernel();
Will this not unset the explicitly set kernel file name?
On Tue, 2011-04-12 at 11:02 +0300, Avi Kivity wrote:
On 04/12/2011 10:48 AM, Ren, Yongjie wrote:
Hi All,
This is KVM test result against kvm.git
7a7ada1bfb958d2ad722d0df9299f1b0136ec1d4 based on kernel 2.6.39-rc2+, and
qemu-kvm.git df85c051d780bca0ee2462cfeb8ef6d9552a19b0.
We found
On 04/12/2011 01:54 AM, Stefan Hajnoczi wrote:
Is qemu-iotests passing for you now?
Yes, they all pass when 016 is skipped.
Josh
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
On Tue, Apr 12, 2011 at 10:52 AM, Avi Kivity a...@redhat.com wrote:
On 04/11/2011 08:15 PM, Blue Swirl wrote:
On Mon, Apr 11, 2011 at 10:01 AM, Markus Armbrusterarm...@redhat.com
wrote:
Avi Kivitya...@redhat.com writes:
On 04/08/2011 12:41 AM, Anthony Liguori wrote:
And it's a
On 04/12/2011 01:13 PM, Glauber Costa wrote:
On Tue, 2011-04-12 at 12:40 -0500, Anthony Liguori wrote:
On 04/12/2011 12:23 PM, Glauber Costa wrote:
The option-rom puts all roms passed by this switch in the genroms directory,
through the fw_dir option. But as it turns out, not all roms should
Quoting Jan Kiszka (jan.kis...@siemens.com):
On 2011-04-12 16:16, Avi Kivity wrote:
On 04/12/2011 05:12 PM, Serge E. Hallyn wrote:
Quoting Avi Kivity (a...@redhat.com):
On 04/12/2011 10:53 AM, Serge E. Hallyn wrote:
Quoting Avi Kivity (a...@redhat.com):
On 04/09/2011 12:09 AM,
On Tue, 2011-04-12 at 13:31 -0500, Anthony Liguori wrote:
On 04/12/2011 01:13 PM, Glauber Costa wrote:
On Tue, 2011-04-12 at 12:40 -0500, Anthony Liguori wrote:
On 04/12/2011 12:23 PM, Glauber Costa wrote:
The option-rom puts all roms passed by this switch in the genroms
directory,
On 04/12/2011 01:47 PM, Glauber Costa wrote:
For sure, but if we had this discussion a while ago,
sgabios wouldn't exist back then, and now it does =p
Actually, it's been around for ages :-)
And the fact that not all of them should
live in genroms persists.
Actually genroms should
Hello,
I've tried using mmap to map the RAM of a guest instead of
posix_memalign which is used both in the kvm tool and qemu.
Doing so caused a kernel Oops, which happens every time I run the code
and was confirmed both on 2.6.38 and the latest git build of 2.6.39.
[32109.368018] BUG: unable to
On Thu, Mar 10, 2011 at 12:19:42PM +1030, Rusty Russell wrote:
Here's an old patch where I played with implementing this:
...
virtio: put last_used and last_avail index into ring itself.
Generally, the other end of the virtio ring doesn't need to see where
you're up to in consuming the
On 2011-04-12 20:31, Serge E. Hallyn wrote:
Quoting Jan Kiszka (jan.kis...@siemens.com):
On 2011-04-12 16:16, Avi Kivity wrote:
On 04/12/2011 05:12 PM, Serge E. Hallyn wrote:
Quoting Avi Kivity (a...@redhat.com):
On 04/12/2011 10:53 AM, Serge E. Hallyn wrote:
Quoting Avi Kivity
On 2011-04-12 20:22, Alex Williamson wrote:
On Tue, 2011-04-12 at 11:02 +0300, Avi Kivity wrote:
On 04/12/2011 10:48 AM, Ren, Yongjie wrote:
Hi All,
This is KVM test result against kvm.git
7a7ada1bfb958d2ad722d0df9299f1b0136ec1d4 based on kernel 2.6.39-rc2+, and
qemu-kvm.git
On 2011-04-12 21:41, Sasha Levin wrote:
Hello,
I've tried using mmap to map the RAM of a guest instead of
posix_memalign which is used both in the kvm tool and qemu.
Doing so caused a kernel Oops, which happens every time I run the code
and was confirmed both on 2.6.38 and the latest git
On Tue, Apr 12, 2011 at 4:38 PM, Sage Weil s...@newdream.net wrote:
On Tue, 12 Apr 2011, Stefan Hajnoczi wrote:
On Tue, Apr 12, 2011 at 1:18 AM, Josh Durgin josh.dur...@dreamhost.com
wrote:
On 04/08/2011 01:43 AM, Stefan Hajnoczi wrote:
On Mon, Mar 28, 2011 at 04:15:57PM -0700, Josh
On Tue, 2011-04-12 at 23:02 +0200, Jan Kiszka wrote:
On 2011-04-12 20:22, Alex Williamson wrote:
On Tue, 2011-04-12 at 11:02 +0300, Avi Kivity wrote:
On 04/12/2011 10:48 AM, Ren, Yongjie wrote:
Hi All,
This is KVM test result against kvm.git
7a7ada1bfb958d2ad722d0df9299f1b0136ec1d4
Quoting Jan Kiszka (jan.kis...@web.de):
From a brief refresh-reading, I would say
if (interrupt.soft || kvm_exception_is_soft(nr))
increment_eip_by_inst_len
but only for those interrupts/exceptions which were raised by the
triggering instructions, _not_ for exceptions raise while
During unattended install, right after we receive the ACK from the guest
the test is deemed to be finished, and as shutdown_vm = yes, it'll try
to end the vm issuing a shutdown command to it. However, on virtually
all Linux guests an SSH server is not available at the end of install,
so KVM
On 2011-04-12 23:20, Alex Williamson wrote:
On Tue, 2011-04-12 at 23:02 +0200, Jan Kiszka wrote:
On 2011-04-12 20:22, Alex Williamson wrote:
On Tue, 2011-04-12 at 11:02 +0300, Avi Kivity wrote:
On 04/12/2011 10:48 AM, Ren, Yongjie wrote:
Hi All,
This is KVM test result against kvm.git
Quoting Serge E. Hallyn (se...@hallyn.com):
Quoting Jan Kiszka (jan.kis...@web.de):
From a brief refresh-reading, I would say
if (interrupt.soft || kvm_exception_is_soft(nr))
increment_eip_by_inst_len
but only for those interrupts/exceptions which were raised by the
triggering
On 2011-04-12 21:41, Sasha Levin wrote:
Hello,
I've tried using mmap to map the RAM of a guest instead of
posix_memalign which is used both in the kvm tool and qemu.
Doing so caused a kernel Oops, which happens every time I run the code
and was confirmed both on 2.6.38 and the latest git
On 2011-04-13 00:39, Serge E. Hallyn wrote:
Quoting Serge E. Hallyn (se...@hallyn.com):
Quoting Jan Kiszka (jan.kis...@web.de):
From a brief refresh-reading, I would say
if (interrupt.soft || kvm_exception_is_soft(nr))
increment_eip_by_inst_len
but only for those interrupts/exceptions
From: Jan Kiszka jan.kis...@siemens.com
If kvm_arch_vcpu_setup failed, we leaked the allocated VCPU structure so
far.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
virt/kvm/kvm_main.c | 11 ++-
1 files changed, 6 insertions(+), 5 deletions(-)
diff --git a/virt/kvm/kvm_main.c
On Tue, 2011-04-12 at 14:19 -0500, Anthony Liguori wrote:
On 04/12/2011 01:47 PM, Glauber Costa wrote:
For sure, but if we had this discussion a while ago,
sgabios wouldn't exist back then, and now it does =p
Actually, it's been around for ages :-)
And the fact that not all of them
This patchset moves the complexity of the rbd format into librbd and
adds truncation support. This passes qemu-iotests when 016 is
skipped. A patch for this is in a separate email.
Changes since v2:
* return values are checked in rbd_aio_rw_vector
* bdrv_truncate added
Josh Durgin (4):
rbd:
librbd stacks on top of librados to provide access
to rbd images.
Using librbd simplifies the qemu code, and allows
qemu to use new versions of the rbd format
with few (if any) changes.
Signed-off-by: Josh Durgin josh.dur...@dreamhost.com
Signed-off-by: Yehuda Sadeh yeh...@hq.newdream.net
---
The new format is rbd:pool/image[@snapshot][:option1=value1[:option2=value2...]]
Each option is used to configure rados, and may be any Ceph option, or conf.
The conf option specifies a Ceph configuration file to read.
This allows rbd volumes from more than one Ceph cluster to be used by
If scheduling fails, the number of outstanding I/Os must be correct,
or there will be a hang when waiting for everything to be flushed.
Reported-by: Stefan Hajnoczi stefa...@gmail.com
Signed-off-by: Josh Durgin josh.dur...@dreamhost.com
---
block/rbd.c | 24
1 files
Signed-off-by: Josh Durgin josh.dur...@dreamhost.com
---
block/rbd.c | 15 +++
1 files changed, 15 insertions(+), 0 deletions(-)
diff --git a/block/rbd.c b/block/rbd.c
index ac20282..4514dbd 100644
--- a/block/rbd.c
+++ b/block/rbd.c
@@ -686,6 +686,20 @@ static int64_t
rbd is not growable, so test 016 is skipped.
rbd implements bdrv_truncate, so test 025 will work.
Signed-off-by: Josh Durgin josh.dur...@dreamhost.com
---
016 |4
025 |2 +-
2 files changed, 5 insertions(+), 1 deletions(-)
diff --git a/016 b/016
index 16f151f..8fa921f 100755
---
Hi,
I'd like to intercept from the host the exact times at which an
incoming network packet directed to a guest VM:
a) is delivered from the host OS to the KVM process;
b) is delivered to the CPU thread of the KVM process.
Specifically, I don't have a clean idea of how b) happens when the CPU
This patch avoids gcc issuing the following warning when KVM_MAX_VCPUS=1:
warning: array subscript is above array bounds
kvm_for_each_vcpu currently checks to see if the index for the vcpu is
valid /after/ loading it. We don't run into problems because the address
is still inside the
On Tue, 05 Apr 2011 20:38:52 +0530, Krishna Kumar krkum...@in.ibm.com wrote:
Implement mq virtio-net driver.
Though struct virtio_net_config changes, it works with the old
qemu since the last element is not accessed unless qemu sets
VIRTIO_NET_F_MULTIQUEUE.
Signed-off-by: Krishna Kumar
@@ -43,6 +43,10 @@ _supported_fmt raw
_supported_proto generic
_supported_os Linux
+# rbd images are not growable
+if [ $IMGPROTO = rbd ]; then
+_notrun image protocol $IMGPROTO does not support growable images
+fi
I suspect we only support the weird writing past size for the
file
The CPUIDs for Centaur are added, and then the features of PadLock
hardware
engine on VIA CPU, such as ace, ace_en and so on, can be passed into
the
kvm guest.
Signed-off-by: BrillyWubrill...@viatech.com.cn
Signed-off-by: KaryJinkary...@viatech.com.cn
---
arch/x86/kvm/x86.c | 31
When KVM is running on VIA CPU with the option -cpu host, the
feautures of
PadLock hardware engine on VIA CPU, such as ace, ace_en and so on
can
be passed into kvm guest through the CPUIDs for Centaur.
Signed-off-by: BrillyWubrill...@viatech.com.cn
Signed-off-by: KaryJinkary...@viatech.com.cn
On Wed, 13 Apr 2011 04:43:39 +0200, Christoph Hellwig h...@lst.de
wrote:
@@ -43,6 +43,10 @@ _supported_fmt raw
_supported_proto generic
_supported_os Linux
+# rbd images are not growable
+if [ $IMGPROTO = rbd ]; then
+_notrun image protocol $IMGPROTO does not support growable images
91 matches
Mail list logo