The implementation is the same as xen:
register panic notifier, and call hypercall when the guest
is paniced.
Signed-off-by: Wen Congyang we...@cn.fujitsu.com
---
arch/x86/kernel/kvm.c| 12
include/linux/kvm_para.h |1 +
2 files changed, 13 insertions(+), 0 deletions(-)
This patch introduces new request bit KVM_REQ_GUEST_PANICEKD.
If this bit is set, set vcpu's exit_reason to KVM_EXIT_GUEST_PANICKED.
And then the user space can know the guest panicked.
Signed-off-by: Wen Congyang we...@cn.fujitsu.com
---
arch/x86/kvm/x86.c | 11 +++
Signed-off-by: Wen Congyang we...@cn.fujitsu.com
---
linux-headers/asm-s390/kvm.h |2 ++
linux-headers/linux/kvm.h |7 +++
linux-headers/linux/kvm_para.h |1 +
3 files changed, 10 insertions(+), 0 deletions(-)
diff --git a/linux-headers/asm-s390/kvm.h
When the host knows the guest is panicked, it will set
exit_reason to KVM_EXIT_GUEST_PANICKED. So if qemu receive
this exit_reason, we can send a event to tell management
application that the guest is panicked and set the guest
status to RUN_STATE_PANICKED.
Signed-off-by: Wen Congyang
3.3 may be released soon, but there are some fixes not sent to
upstream yet.
One of them, mine, fixes a clear regression from 3.2.
Thanks,
Takuya
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
On 03/07/2012 10:02 PM, Davidlohr Bueso wrote:
From: Davidlohr Bueso d...@gnu.org
Since most guests will have paging enabled for memory management, add
likely() and unlikely()
optimizations around is_paging() checks.
Signed-off-by: Davidlohr Bueso d...@gnu.org
---
arch/x86/kvm/mmu.c |
On 03/08/2012 11:37 AM, Takuya Yoshikawa wrote:
3.3 may be released soon, but there are some fixes not sent to
upstream yet.
One of them, mine, fixes a clear regression from 3.2.
Right, we're planning to let them be tested in kvm.git for a few more
days (since one of the fixes is very
On 02/03/12 21:15, Nicolas Pitre wrote:
[ coming back from vacation and trying to catch up ]
On Wed, 29 Feb 2012, Dave Martin wrote:
Just had a chat with some tools guys -- apparently, when passing register
arguments to gcc inline asms there really isn't a guarantee that those
variables
On 2012-03-08 09:07, Wen Congyang wrote:
When the host knows the guest is panicked, it will set
exit_reason to KVM_EXIT_GUEST_PANICKED. So if qemu receive
this exit_reason, we can send a event to tell management
application that the guest is panicked and set the guest
status to
At 03/08/2012 06:08 PM, Jan Kiszka Wrote:
On 2012-03-08 09:07, Wen Congyang wrote:
When the host knows the guest is panicked, it will set
exit_reason to KVM_EXIT_GUEST_PANICKED. So if qemu receive
this exit_reason, we can send a event to tell management
application that the guest is panicked
This enables support for the host IRQ sharing support via PCI-2.3
interrupt masking. See the patches for details.
Patch 1 3 could be considered for uq/master although we have no use
case for the changes in upstream yet.
Changes in v4:
- add patch for kvm_has_intx_set_mask
- do not issue
Required for INTx masking / host IRQ sharing support of assigned
devices.
Corresponding kvm.git hash: 186195928e
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
linux-headers/asm-s390/kvm.h |2 ++
linux-headers/linux/kvm.h|6 ++
2 files changed, 8 insertions(+), 0
Will be used by PCI device assignment code.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
kvm-all.c |8
kvm.h |1 +
2 files changed, 9 insertions(+), 0 deletions(-)
diff --git a/kvm-all.c b/kvm-all.c
index 7fed5c9..471293d 100644
--- a/kvm-all.c
+++ b/kvm-all.c
@@
Enable the new KVM feature that allows legacy interrupt sharing for
PCI-2.3-compliant devices. This requires to synchronize any guest
change of the INTx mask bit to the kernel.
The feature is controlled by the property 'share_intx' and is off by
default for now.
Signed-off-by: Jan Kiszka
INTx sharing is a bit more expensive than exclusive host interrupts, but
this channel is not supposed to be used for high-performance scenarios
anyway. Modern devices support MSI/MSI-X and do not depend on using INTx
under critical workload, real old devices do not support INTx sharing
anyway.
When the host knows the guest is panicked, it will set
exit_reason to KVM_EXIT_GUEST_PANICKED. So if qemu receive
this exit_reason, we can send a event to tell management
application that the guest is panicked and set the guest
status to RUN_STATE_PANICKED.
Signed-off-by: Wen Congyang
On Thu, Mar 08, 2012 at 06:07:56PM +0800, Jason Wang wrote:
Also count the exits of fast-path.
And align it with how it is counted in VMX.
Signed-off-by: Jason Wang jasow...@redhat.com
Acked-by: Joerg Roedel joerg.roe...@amd.com
---
arch/x86/kvm/svm.c |2 +-
1 files changed, 1
From: Davidlohr Bueso d...@gnu.org
Since most guests will have paging enabled for memory management, add likely()
optimization
around CR0.PG checks.
Signed-off-by: Davidlohr Bueso d...@gnu.org
---
arch/x86/kvm/x86.h |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git
On 03/08/2012 09:57 AM, Wen Congyang wrote:
We can know the guest is paniced when the guest runs on xen.
But we do not have such feature on kvm.
Another purpose of this feature is: management app(for example:
libvirt) can do auto dump when the guest is crashed. If management
app does not do
Deprecated in favour of tracepoints.
Signed-off-by: Avi Kivity a...@redhat.com
---
Documentation/feature-removal-schedule.txt |7 +++
1 files changed, 7 insertions(+), 0 deletions(-)
diff --git a/Documentation/feature-removal-schedule.txt
b/Documentation/feature-removal-schedule.txt
On 03/08/2012 12:15 PM, Wen Congyang wrote:
When the host knows the guest is panicked, it will set
exit_reason to KVM_EXIT_GUEST_PANICKED. So if qemu receive
this exit_reason, we can send a event to tell management
application that the guest is panicked and set the guest
status to
On Thu, Mar 08, 2012 at 01:28:56PM +0200, Avi Kivity wrote:
On 03/08/2012 12:15 PM, Wen Congyang wrote:
When the host knows the guest is panicked, it will set
exit_reason to KVM_EXIT_GUEST_PANICKED. So if qemu receive
this exit_reason, we can send a event to tell management
application
On Thu, 2012-03-08 at 11:45 +0200, Avi Kivity wrote:
On 03/07/2012 10:02 PM, Davidlohr Bueso wrote:
From: Davidlohr Bueso d...@gnu.org
Since most guests will have paging enabled for memory management, add
likely() and unlikely()
optimizations around is_paging() checks.
On 03/08/2012 01:36 PM, Daniel P. Berrange wrote:
On Thu, Mar 08, 2012 at 01:28:56PM +0200, Avi Kivity wrote:
On 03/08/2012 12:15 PM, Wen Congyang wrote:
When the host knows the guest is panicked, it will set
exit_reason to KVM_EXIT_GUEST_PANICKED. So if qemu receive
this exit_reason,
On 03/08/2012 12:56 AM, Randy Dunlap wrote:
On 03/06/2012 11:10 PM, Stephen Rothwell wrote:
Hi all,
Changes since 20120306:
The kvm tree lost its build failure.
I'm getting this build error on X86_32 (i386):
arch/x86/kvm/x86.c:1042: Error: no instruction mnemonic suffix given
On Thu, Mar 08, 2012 at 01:52:45PM +0200, Avi Kivity wrote:
On 03/08/2012 01:36 PM, Daniel P. Berrange wrote:
On Thu, Mar 08, 2012 at 01:28:56PM +0200, Avi Kivity wrote:
On 03/08/2012 12:15 PM, Wen Congyang wrote:
When the host knows the guest is panicked, it will set
exit_reason to
'idiv', when given a memory operand, can't determine the instruction
size. Provide it explicitly.
Reported-by: Randy Dunlap rdun...@xenotime.net
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/x86.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git
On Thu, Mar 08, 2012 at 09:58:23AM +, Richard Earnshaw wrote:
On 02/03/12 21:15, Nicolas Pitre wrote:
[ coming back from vacation and trying to catch up ]
On Wed, 29 Feb 2012, Dave Martin wrote:
Just had a chat with some tools guys -- apparently, when passing register
arguments to
On 08.03.2012, at 05:18, Yoder Stuart-B08248 wrote:
-Original Message-
From: Alexander Graf [mailto:ag...@suse.de]
Sent: Wednesday, March 07, 2012 5:39 PM
To: Wood Scott-B07421
Cc: Yoder Stuart-B08248; kvm-...@vger.kernel.org; kvm@vger.kernel.org
Subject: Re: [PATCH v9 2/4]
The following changes since commit e32605062cd62c2a958ad28a6ad7de4eeab12027:
xilinx_zynq: machine model initial version (2012-03-07 02:20:19 +0100)
are available in the git repository at:
git://git.kernel.org/pub/scm/virt/kvm/qemu-kvm.git uq/master
Jan Kiszka (4):
i8254: Factor out
From: Jan Kiszka jan.kis...@siemens.com
This provides the required user space stubs to enable the in-kernel
i8254 emulation of KVM.
The in-kernel model supports lost tick compensation according to the
delay policy. This is enabled by default and can be switched off via a
device property.
From: Jan Kiszka jan.kis...@siemens.com
To be used for in-kernel PIT emulation.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
Signed-off-by: Avi Kivity a...@redhat.com
---
kvm-all.c | 10 ++
kvm-stub.c |5 +
kvm.h |1 +
3 files changed, 16 insertions(+), 0
From: Jan Kiszka jan.kis...@siemens.com
Applying the concept used for the *PICs once again: establish a base
class for the i8254 that can be used both by the current user space
emulation and the upcoming KVM in-kernel version. We share most of the
public interface of the i8254, specifically to
From: Michael S. Tsirkin m...@redhat.com
valgrind warns about padding fields which are passed
to vcpu ioctls uninitialized.
This is not an error in practice because kvm ignored padding.
Since the ioctls in question are off data path and
the cost is zero anyway, initialize padding to 0
to suppress
From: Jan Kiszka jan.kis...@siemens.com
Same as for the APIC: To enable migration between accelerated and
non-accelerated models, we need to arm the channel 0 timer only inside
the emulated PIT model. The common code just saves/restores that timer
to the the next_transition_time field.
Hi,
I find out (IMO) better solution of smp parameter in cgroup testing. It doesn't
need any changes to import order and it. Also now when cgroup_speeds is set the
test calculates SMP from it.
See pull request on:
https://github.com/autotest/autotest/pull/225
Kind regards,
Lukáš Doktor
--
To
This patch solves the problem with smp parameter.
* cpu_cfs_util - test creates the first VM instead of preprocess
* cpu_share - 'cgroup_use_max_smp' cfg parameter let test calculate smp
* cpuset_cpus - when cpusets is defined it calculates smp from it. Otherwise
user can force
Hi all,
for an university study, I'm doing some network test between two vm
using native linux kvm tool and connected via tap/virtio/vhost.
When I run my script (several consecutive iperf tcp and udp
execution), the first vm freeze with a message like: hrtimer:
interrupt took * ns.
Is this a bug?
On Thu, Mar 8, 2012 at 4:32 PM, Daniele Carollo carollo.d...@gmail.com wrote:
for an university study, I'm doing some network test between two vm
using native linux kvm tool and connected via tap/virtio/vhost.
When I run my script (several consecutive iperf tcp and udp
execution), the first vm
On Thu, Mar 08, 2012 at 05:11:16PM +0200, Pekka Enberg wrote:
On Thu, Mar 8, 2012 at 4:32 PM, Daniele Carollo carollo.d...@gmail.com
wrote:
for an university study, I'm doing some network test between two vm
using native linux kvm tool and connected via tap/virtio/vhost.
When I run my
Il giorno 08 marzo 2012 16:13, Cyrill Gorcunov gorcu...@openvz.org ha scritto:
On Thu, Mar 08, 2012 at 05:11:16PM +0200, Pekka Enberg wrote:
On Thu, Mar 8, 2012 at 4:32 PM, Daniele Carollo carollo.d...@gmail.com
wrote:
for an university study, I'm doing some network test between two vm
Hi,
i'm trying to build the last kvm git,
./configure --prefix=/usr --datadir=/usr/share/kvm
--docdir=/usr/share/doc/pve-qemu-kvm --sysconfdir=/etc --disable-xen
--enable-vnc-tls --enable-sdl --enable-uuid --enable-linux-aio
and build fail on vcard_emul_nss.c
cc1: warnings being treated as
On 08/03/12 12:45, Davidlohr Bueso wrote:
From: Davidlohr Bueso d...@gnu.org
Since most guests will have paging enabled for memory management, add
likely() optimization
around CR0.PG checks.
{
- return kvm_read_cr0_bits(vcpu, X86_CR0_PG);
+ return likely(kvm_read_cr0_bits(vcpu,
On Thu, Mar 08, 2012 at 04:31:17PM +0100, Daniele Carollo wrote:
I don't really use the tap interface so lets CC Asias. Which guest
kernel are you using, btw?
Yup, Asias was using it, if my memory doesn't betray me. Also both -- host
and guest kernel versions might be useful to
Hi list,
I'm installing several virtual machines with kvm. In the host machine
I've configured several vlan interfaces, then I've matched the guest
machine interface with the host vlan interface; it works correctly.
The problem is that I want to create the vlan in the guest machine;
how I must
Hi,
We are undergraduate engineering students of Maharashtra Academy of
Engineering, Pune, India and we are working on a project entitled
'Transcendent Memory on KVM' as a part of our academics.
The project members are:
1. Ashutosh Tripathi
2. Shreyas Mahure
3. Nishant Gulhane
4. Akshay Karle
From: Akshay Karle akshay.a.ka...@gmail.com
Subject: [RFC 1/2] kvm: host-side changes for tmem on KVM
Working at host:
Once the guest exits to the kvm host, the host determines that the guest exited
to perform some tmem operation(done at kvm_emulate_hypercall)and then
we use zcache to implement
On Thu, 2012-03-08 at 11:10 +0100, Jan Kiszka wrote:
Enable the new KVM feature that allows legacy interrupt sharing for
PCI-2.3-compliant devices. This requires to synchronize any guest
change of the INTx mask bit to the kernel.
The feature is controlled by the property 'share_intx' and is
From: Akshay Karle akshay.a.ka...@gmail.com
Subject: [RFC 2/2] kvm: guest-side changes for tmem on KVM
Working in the guest:
At the kvm guest, we add the appropriate tmem shims to intercept the
tmem operations and then invoke the kvm hypercalls to exit to the host
and perform these operations.
On 2012-03-08 18:00, Alex Williamson wrote:
On Thu, 2012-03-08 at 11:10 +0100, Jan Kiszka wrote:
Enable the new KVM feature that allows legacy interrupt sharing for
PCI-2.3-compliant devices. This requires to synchronize any guest
change of the INTx mask bit to the kernel.
The feature is
On Thu, 8 Mar 2012, Richard Earnshaw wrote:
On 02/03/12 21:15, Nicolas Pitre wrote:
So, to me, the gcc documentation is perfectly clear on this topic.
there really _is_ a guarantee that those asm marked variables will be in
the expected registers on entry to the inline asm, given that the
On Fri, Mar 2, 2012 at 11:17 AM, Scott Wood scottw...@freescale.com wrote:
On 03/02/2012 10:30 AM, Alexander Graf wrote:
On 02.03.2012, at 17:20, Scott Wood wrote:
On Fri, Mar 02, 2012 at 03:12:33PM +0100, Alexander Graf wrote:
When running inside a virtual machine, we can not modify
On Thu, Mar 8, 2012 at 11:54 AM, Akshay Karle akshay.a.ka...@gmail.com wrote:
From: Akshay Karle akshay.a.ka...@gmail.com
Subject: [RFC 1/2] kvm: host-side changes for tmem on KVM
Working at host:
Once the guest exits to the kvm host, the host determines that the guest
exited
to perform
On Thu, Mar 8, 2012 at 12:02 PM, Akshay Karle akshay.a.ka...@gmail.com wrote:
From: Akshay Karle akshay.a.ka...@gmail.com
Subject: [RFC 2/2] kvm: guest-side changes for tmem on KVM
Working in the guest:
At the kvm guest, we add the appropriate tmem shims to intercept the
tmem operations and
Hi list,
I have a question regarding changing the queue size that is set in
virtio_blk_init(). The current value is 128, which results in setting the queue
depth in the Windows guest device to 8. Does anyone know if changing this value
to defined maximum (1024) going to result in any issues?
Enable the new KVM feature that allows legacy interrupt sharing for
PCI-2.3-compliant devices. This requires to synchronize any guest
change of the INTx mask bit to the kernel.
The feature is controlled by the property 'share_intx' and is off by
default for now.
Signed-off-by: Jan Kiszka
On 03/08/2012 11:31 AM, McClintock Matthew-B29882 wrote:
On Fri, Mar 2, 2012 at 11:17 AM, Scott Wood scottw...@freescale.com wrote:
On 03/02/2012 10:30 AM, Alexander Graf wrote:
On 02.03.2012, at 17:20, Scott Wood wrote:
Again, for 85xx we should *never* sync the timebase in the kernel,
On Thu, Mar 8, 2012 at 12:20 PM, Scott Wood scottw...@freescale.com wrote:
On 03/08/2012 11:31 AM, McClintock Matthew-B29882 wrote:
On Fri, Mar 2, 2012 at 11:17 AM, Scott Wood scottw...@freescale.com wrote:
On 03/02/2012 10:30 AM, Alexander Graf wrote:
On 02.03.2012, at 17:20, Scott Wood
On 03/08/2012 12:24 PM, McClintock Matthew-B29882 wrote:
On Thu, Mar 8, 2012 at 12:20 PM, Scott Wood scottw...@freescale.com wrote:
On 03/08/2012 11:31 AM, McClintock Matthew-B29882 wrote:
On Fri, Mar 2, 2012 at 11:17 AM, Scott Wood scottw...@freescale.com wrote:
On 03/02/2012 10:30 AM,
On Thu, Mar 8, 2012 at 12:43 PM, Scott Wood scottw...@freescale.com wrote:
On 03/08/2012 12:24 PM, McClintock Matthew-B29882 wrote:
On Thu, Mar 8, 2012 at 12:20 PM, Scott Wood scottw...@freescale.com wrote:
On 03/08/2012 11:31 AM, McClintock Matthew-B29882 wrote:
On Fri, Mar 2, 2012 at 11:17
On 08/03/12 17:21, Nicolas Pitre wrote:
On Thu, 8 Mar 2012, Richard Earnshaw wrote:
On 02/03/12 21:15, Nicolas Pitre wrote:
So, to me, the gcc documentation is perfectly clear on this topic.
there really _is_ a guarantee that those asm marked variables will be in
the expected registers on
On Thu, 2012-03-08 at 16:47 +0100, Christian Borntraeger wrote:
On 08/03/12 12:45, Davidlohr Bueso wrote:
From: Davidlohr Bueso d...@gnu.org
Since most guests will have paging enabled for memory management, add
likely() optimization
around CR0.PG checks.
{
- return
Any news on the status of this?
On Thu, Feb 9, 2012 at 8:45 PM, Alexander Graf ag...@suse.de wrote:
On 10.02.2012, at 02:40, Christoffer Dall wrote:
The kvm_vcpu_kick function performs roughly the same funcitonality on
most all architectures, so we shouldn't have separate copies.
PowerPC
kvm_write_tsc() converts from guest TSC to microseconds, not nanoseconds
as intended. The result is that the window for matching is 1000 seconds,
not 1 second.
Microsecond precision is enough for checking whether the TSC write delta
is within the heuristic values, so use it instead of
On Thu, Mar 08, 2012 at 01:57:23PM +0200, Avi Kivity wrote:
'idiv', when given a memory operand, can't determine the instruction
size. Provide it explicitly.
Reported-by: Randy Dunlap rdun...@xenotime.net
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/x86.c |2 +-
1
On 03/08/2012 03:44 PM, Christoffer Dall wrote:
Any news on the status of this?
On Thu, Feb 9, 2012 at 8:45 PM, Alexander Graf ag...@suse.de wrote:
Apart from this little glitch the patch looks fine to me. But I'd like to
have Scott and Paul ack it too.
ACK
-Scott
--
To unsubscribe from
Any comments on this one?
On Thu, Feb 9, 2012 at 3:57 PM, Christoffer Dall
c.d...@virtualopensystems.com wrote:
From: Christoffer Dall c.d...@virtualopensystems.com
Introduces a couple of print functions, which are essentially wrappers
around standard printk functions, with a KVM: prefix.
On Tue, Feb 28, 2012 at 05:15:46AM +, Liu, Jinsong wrote:
From ecd8be962f69393c183f941bfdbd7a7d3876d442 Mon Sep 17 00:00:00 2001
From: Liu, Jinsong jinsong@intel.com
Date: Mon, 27 Feb 2012 05:19:32 +0800
Subject: [PATCH] KVM: expose Intel cpu new features to guest
Intel recently
On Wed, Feb 29, 2012 at 01:09:47AM +0100, Alexander Graf wrote:
There's always a chance we're unable to read a guest instruction. The guest
could have its TLB mapped execute-, but not readable, something odd happens
and our TLB gets flushed. So it's a good idea to be prepared for that case
and
On Thu, Mar 08, 2012 at 10:03:55AM +0800, Amos Kong wrote:
This patch makes the kvm_io_range array can be resized dynamically.
Signed-off-by: Amos Kong ak...@redhat.com
---
include/linux/kvm_host.h |5 +++--
virt/kvm/kvm_main.c | 38 ++
2
I just joined in order to chime in here-
I'm seeing the exact same thing as Reeted; I've got a machine with a
storage subsystem capable of 400k IOPs, and when I punch the storage up to
VMs, each VM seems to top out at around 15-20k IOPs. I've managed to get
to 115k IOPs by creating 8 VMs,
On Thu, Mar 08, 2012 at 10:35:45AM +0900, Takuya Yoshikawa wrote:
Marcelo Tosatti mtosa...@redhat.com wrote:
What is worrying are large memory cases: think of the 50GB slot case.
100ms hold time is pretty bad (and reacquiring the lock is relatively
simple).
OK, I agree basically.
At 03/08/2012 07:13 PM, Avi Kivity Wrote:
On 03/08/2012 09:57 AM, Wen Congyang wrote:
We can know the guest is paniced when the guest runs on xen.
But we do not have such feature on kvm.
Another purpose of this feature is: management app(for example:
libvirt) can do auto dump when the guest
On Fri, Mar 02, 2012 at 06:59:04AM +, Zhang, Yang Z wrote:
Change DM(date mode) and 24/12 control bit don't affect the internal
registers. It only indicates what format is using for those registers. So
we don't need to update time format when it is modified.
Signed-off-by: Yang Zhang
-Original Message-
From: Marcelo Tosatti [mailto:mtosa...@redhat.com]
Sent: Friday, March 09, 2012 9:36 AM
---
hw/mc146818rtc.c | 10 +-
1 files changed, 1 insertions(+), 9 deletions(-)
diff --git a/hw/mc146818rtc.c b/hw/mc146818rtc.c
index a46fdfc..9b49cbc 100644
I think the better fixing is to update the cmos before reading the RTC. And in
my patch, it will do it.
best regards
yang
-Original Message-
From: Zhang, Yang Z
Sent: Friday, March 09, 2012 9:54 AM
To: Marcelo Tosatti
Cc: qemu-de...@nongnu.org; Jan Kiszka; kvm@vger.kernel.org;
On Wed, Feb 29, 2012 at 12:30:55PM -0700, Alex Williamson wrote:
On Thu, 2012-02-02 at 12:24 +1100, David Gibson wrote:
On Wed, Feb 01, 2012 at 01:08:39PM -0700, Alex Williamson wrote:
[snip]
Any update to this series? It would be great if we could map out the
functionality to the point of
On 09/03/12 07:20, Marcelo Tosatti wrote:
On Thu, Mar 08, 2012 at 10:03:55AM +0800, Amos Kong wrote:
This patch makes the kvm_io_range array can be resized dynamically.
Signed-off-by: Amos Kongak...@redhat.com
---
include/linux/kvm_host.h |5 +++--
virt/kvm/kvm_main.c | 38
Boot up qemu-kvm guest with 232 multiple functions disks, qemu
will report a ENOSPC error, it's not good to statically increase
iobus array. This patchset makes kvm_io_range array can be
resized dynamically, and change dev limit to 1000.
Changes from v1:
- fix typo: kvm_io_bus_range -
This patch makes the kvm_io_range array can be resized dynamically.
Signed-off-by: Amos Kong ak...@redhat.com
---
include/linux/kvm_host.h |5 +++--
virt/kvm/kvm_main.c | 38 ++
2 files changed, 21 insertions(+), 22 deletions(-)
diff --git
kvm_io_bus devices are used for ioevent, pit, pic, ioapic,
coalesced_mmio.
Currently Qemu only emulates one PCI bus, it contains 32 slots,
one slot contains 8 functions, maximum of supported PCI devices:
1 * 32 * 8 = 256. One virtio-blk takes one iobus device,
one virtio-net(vhost=on) takes two
On 08.03.2012, at 05:18, Yoder Stuart-B08248 wrote:
-Original Message-
From: Alexander Graf [mailto:ag...@suse.de]
Sent: Wednesday, March 07, 2012 5:39 PM
To: Wood Scott-B07421
Cc: Yoder Stuart-B08248; kvm-ppc@vger.kernel.org; k...@vger.kernel.org
Subject: Re: [PATCH v9 2/4]
On Fri, Mar 2, 2012 at 11:17 AM, Scott Wood scottw...@freescale.com wrote:
On 03/02/2012 10:30 AM, Alexander Graf wrote:
On 02.03.2012, at 17:20, Scott Wood wrote:
On Fri, Mar 02, 2012 at 03:12:33PM +0100, Alexander Graf wrote:
When running inside a virtual machine, we can not modify
On 03/08/2012 11:31 AM, McClintock Matthew-B29882 wrote:
On Fri, Mar 2, 2012 at 11:17 AM, Scott Wood scottw...@freescale.com wrote:
On 03/02/2012 10:30 AM, Alexander Graf wrote:
On 02.03.2012, at 17:20, Scott Wood wrote:
Again, for 85xx we should *never* sync the timebase in the kernel,
On Thu, Mar 8, 2012 at 12:20 PM, Scott Wood scottw...@freescale.com wrote:
On 03/08/2012 11:31 AM, McClintock Matthew-B29882 wrote:
On Fri, Mar 2, 2012 at 11:17 AM, Scott Wood scottw...@freescale.com wrote:
On 03/02/2012 10:30 AM, Alexander Graf wrote:
On 02.03.2012, at 17:20, Scott Wood
On 03/08/2012 12:24 PM, McClintock Matthew-B29882 wrote:
On Thu, Mar 8, 2012 at 12:20 PM, Scott Wood scottw...@freescale.com wrote:
On 03/08/2012 11:31 AM, McClintock Matthew-B29882 wrote:
On Fri, Mar 2, 2012 at 11:17 AM, Scott Wood scottw...@freescale.com wrote:
On 03/02/2012 10:30 AM,
On Thu, Mar 8, 2012 at 12:43 PM, Scott Wood scottw...@freescale.com wrote:
On 03/08/2012 12:24 PM, McClintock Matthew-B29882 wrote:
On Thu, Mar 8, 2012 at 12:20 PM, Scott Wood scottw...@freescale.com wrote:
On 03/08/2012 11:31 AM, McClintock Matthew-B29882 wrote:
On Fri, Mar 2, 2012 at 11:17
Any news on the status of this?
On Thu, Feb 9, 2012 at 8:45 PM, Alexander Graf ag...@suse.de wrote:
On 10.02.2012, at 02:40, Christoffer Dall wrote:
The kvm_vcpu_kick function performs roughly the same funcitonality on
most all architectures, so we shouldn't have separate copies.
PowerPC
On 03/08/2012 03:44 PM, Christoffer Dall wrote:
Any news on the status of this?
On Thu, Feb 9, 2012 at 8:45 PM, Alexander Graf ag...@suse.de wrote:
Apart from this little glitch the patch looks fine to me. But I'd like to
have Scott and Paul ack it too.
ACK
-Scott
--
To unsubscribe from
On Wed, Feb 29, 2012 at 01:09:47AM +0100, Alexander Graf wrote:
There's always a chance we're unable to read a guest instruction. The guest
could have its TLB mapped execute-, but not readable, something odd happens
and our TLB gets flushed. So it's a good idea to be prepared for that case
and
90 matches
Mail list logo