On Saturday 21 March 2009 10:45:58 am John Wong wrote:
I create the 30G qcow2 image file, installed winxp, winxp show me the
harddisk used 5G, but the image file size is 12G now.
can i shrink the image file size? how?
I wrote a simple utility in .Net 2.0 that creates a file in Windows with all
Caleb Tennis ca...@aei-tech.com writes:
On Mar 22, 2009, at 5:30 PM, Christoph Hellwig wrote:
I do you virtio block in a very similar setup to yours (fully static
kernel, -kernel option to kvm/qemu) sucesfully for quite a a while.
Can you post your kernel .config and the contents of
This patch series implements Address Translation Service support for
the Intel IOMMU. The PCIe Endpoint that supports ATS capability can
request the DMA address translation from the IOMMU and cache the
translation itself. This can alleviate IOMMU TLB pressure and improve
the hardware performance
The PCIe ATS capability makes the Endpoint be able to request the
DMA address translation from the IOMMU and cache the translation
in the device side, thus alleviate IOMMU TLB pressure and improve
the hardware performance in the I/O virtualization environment.
Signed-off-by: Yu Zhao
Parse the Root Port ATS Capability Reporting Structure in the DMA
Remapping Reporting Structure ACPI table.
Signed-off-by: Yu Zhao yu.z...@intel.com
---
drivers/pci/dmar.c | 112 --
include/linux/dmar.h|9
The SR-IOV spec requires the Smallest Translation Unit and the
Invalidate Queue Depth fields in the Virtual Function ATS capability
to be hardwired to 0. If a function is a Virtual Function, then and
set its Physical Function's STU before enabling the ATS.
Signed-off-by: Yu Zhao yu.z...@intel.com
Enable the device IOTLB (i.e. ATS) for both the bare metal and KVM
environments.
Signed-off-by: Yu Zhao yu.z...@intel.com
---
drivers/pci/intel-iommu.c | 99 +-
include/linux/intel-iommu.h |1 +
2 files changed, 97 insertions(+), 3 deletions(-)
* Michael Tokarev m...@tls.msk.ru wrote:
Today (Friday, the 13th) I had a very bad sequence of failures
with our servers leading to data loss and almost the whole day
of very hard work. And now I'm *really* interested where the
fault(s) is(are).
What I have here is an AMD780G-based system
Ingo, I lost any hope already to hear anything about this one..
Surprise. Thank you for replying!
Ingo Molnar wrote:
[]
top/strace, but nothing interesting shows. I captured Sysrq+T of this situation
here: http://www.corpit.ru/mjt/host-high-la -- everything I was able to find
in kern.log.
Gleb Natapov wrote:
Signed-off-by: Gleb Natapov g...@redhat.com
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
Bugs item #2703537, was opened at 2009-03-22 18:07
Message generated for change (Comment added) made by glebn
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2703537group_id=180599
Please note that this message will contain a full copy of the comment
Gleb Natapov wrote:
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Gleb Natapov wrote:
On Mon, Mar 23, 2009 at 12:12:06PM +0200, Gleb Natapov wrote:
Currently timer events are processed before entering guest mode. Move it
to main vcpu event loop since timer events should be processed even while
vcpu is haled. Timer may cause interrupt/nmi to be injected and
Avi Kivity wrote:
Gleb Natapov wrote:
kvm_vcpu_block() unhalts vpu on an interrupt/timer without checking
if interrupt window is actually opened.
+static int svm_interrupt_allowed(struct kvm_vcpu *vcpu)
+{
+struct vcpu_svm *svm = to_svm(vcpu);
+struct vmcb *vmcb = svm-vmcb;
+
* Michael Tokarev m...@tls.msk.ru wrote:
Now, after quite some googling around, I tried to disable hpet,
booting with hpet=disable parameter. And that one fixed all the
problems at once. 7 days uptime, I stress-tested it several times,
it works with TSC as timesource (still a problem
This is just a first cut. It needs a fair bit of cleanup before it can be
committed. I also think we need to fixup the AIO abstractions a bit.
I wanted to share though in case anyone is interested in doing some performance
comparisons. It seems to work although I haven't exercised it very
Anthony Liguori wrote:
This is just a first cut. It needs a fair bit of cleanup before it can be
committed. I also think we need to fixup the AIO abstractions a bit.
I wanted to share though in case anyone is interested in doing some performance
comparisons. It seems to work although I
On Mon, Mar 23, 2009 at 04:26:34PM +0200, Avi Kivity wrote:
Gleb Natapov wrote:
On Mon, Mar 23, 2009 at 12:12:06PM +0200, Gleb Natapov wrote:
Currently timer events are processed before entering guest mode. Move it
to main vcpu event loop since timer events should be processed even while
Avi Kivity wrote:
Instead of introducing yet another layer of indirection, you could add
block-raw-linux-aio, which would be registered before block-raw-posix
(which is realy block-raw-threadpool...), and resist a -probe() if
caching is enabled.
block-raw-posix needs a major overhaul.
On Mon, Mar 23, 2009 at 06:17:36PM +0200, Avi Kivity wrote:
Instead of introducing yet another layer of indirection, you could add
block-raw-linux-aio, which would be registered before block-raw-posix
(which is realy block-raw-threadpool...), and resist a -probe() if
caching is enabled.
On Mon, Mar 23, 2009 at 12:14:58PM -0500, Anthony Liguori wrote:
I'd like to see the O_DIRECT bounce buffering removed in favor of the
DMA API bouncing. Once that happens, raw_read and raw_pread can
disappear. block-raw-posix becomes much simpler.
See my vectored I/O patches for doing
On Sun, Mar 22, 2009 at 11:35:00AM +0200, Avi Kivity wrote:
Good catch, indeed. But is it sufficient? We could unlink a page
through other means, for example by the guest zapping a page directory
entry.
Yep.
Maybe it's best to resync when relinking a global page?
How about this. It
On Mon, Mar 23, 2009 at 12:14:58PM -0500, Anthony Liguori wrote:
block-raw-posix needs a major overhaul. That's why I'm not even
considering committing the patch as is.
I have some WIP patches that split out the host device bits into
separate files to get block-raw-posix down to the pure
external module compat hard codes tsc_khz as 200 if KERNEL_VERSION
(2,6,23).
This breaks kvmclock on hosts with different frequency.
While tsc_khz was only exported on 2.6.23, the majority of relevant
older v2.6 based distros seem to have it exported.
Signed-off-by: Marcelo Tosatti
Christoph Hellwig wrote:
On Mon, Mar 23, 2009 at 12:14:58PM -0500, Anthony Liguori wrote:
I'd like to see the O_DIRECT bounce buffering removed in favor of the
DMA API bouncing. Once that happens, raw_read and raw_pread can
disappear. block-raw-posix becomes much simpler.
See my
Kohl, Bernhard (NSN - DE/Munich) bernhard.k...@nsn.com writes:
Jan Kiszka Wrote:
[...]
OK, after the discussion has finished, I will submit separate patches.
Is there any progress on this? I've been using this patch for several
days now with no ill effects.
The patch fixes Bug 2681442 for me:
Benjamin Gilbert wrote:
vmx_set_msr: msr_index 0xc080 msr-index 0xc080 msr-data 0x100
How did that get in there?!
Please add a dump_stack() after that printk().
--
I have a truly marvellous patch that fixes the bug which this
signature is too narrow to contain.
--
To unsubscribe
Andreas Tanz wrote:
[ 3732.020033] returning from kvm_handle_exit, cause 3, retval = 1, exit_reason
= 7
Here, vmx tells us that the guest is ready to accept interrupts (having
executed the sti instruction)
[ 3732.020044] vmx-vmx_vcpu_run() 00 : vmcs_read32(VM_ENTRY_INTR_INFO_FIELD)
Avi Kivity wrote:
Benjamin Gilbert wrote:
vmx_set_msr: msr_index 0xc080 msr-index 0xc080 msr-data 0x100
How did that get in there?!
Please add a dump_stack() after that printk().
Pid: 2381, comm: qemu-system-x86 Not tainted 2.6.28-686 #4
Call Trace:
[f8cf2fdc]
On Mon, Mar 23, 2009 at 01:10:30PM -0500, Anthony Liguori wrote:
I really dislike having so many APIs. I'd rather have an aio API that
took byte accesses or have pread/pwrite always be emulated with a full
sector read/write
I had patches to change the aio API to byte based access, and get
Avi Kivity wrote:
On 32-bit, we might actually reach the default: label of the switch in
vmx_set_msr(). Can you add a printk() there? print both msr_index, and,
if msr is not NULL, msr-index and msr-data.
Sure:
vmx_set_msr: msr_index 0xc081 msr-index 0xc081 msr-data 0x0
vmx_set_msr:
This series adds a new -smbios option for x86 that allows individual
SMBIOS entries to be passed into the guest VM. This follows the same
basic path as the support for loading ACPI tables. While SMBIOS is
independent of ACPI, I chose to add the smbios_entry_add() function to
acpi.c because
Create a new -smbios options that takes binary SMBIOS entries
to provide to the VM BIOS. The binary can be easily generated
using something like:
dmidecode -t 1 -u | grep $'^\t\t[^]' | xargs -n1 | \
perl -lne 'printf %c, hex($_)' smbios_type_1.bin
For some inventory tools, this makes
SMBIOS entries can be read from the VM using the same mechanism
as additional ACPI tables. External entries will supercede
generated entries.
Signed-off-by: Alex Williamson alex.william...@hp.com
--
diff --git a/bios/rombios32.c b/bios/rombios32.c
index 7be4216..f0e0f8c 100644
---
Benjamin Gilbert wrote:
vmx_set_msr: msr_index 0xc080 msr-index 0xc080 msr-data 0x100
How did that get in there?!
Please add a dump_stack() after that printk().
Pid: 2381, comm: qemu-system-x86 Not tainted 2.6.28-686 #4
Call Trace:
[f8cf2fdc] vmx_set_msr+0x150/0x178 [kvm_intel]
This cropped up in stress testing of a backport
of the mmu notifier mechanism, however it still
exists in 2.6.28.8 as well. Patch attached.
Signed-off-by: john.coo...@redhat.com
--
john.coo...@third-harmonic.com
mm/memory.c |8 +---
1 file changed, 5 insertions(+), 3 deletions(-)
Christoph Hellwig wrote:
On Mon, Mar 23, 2009 at 01:10:30PM -0500, Anthony Liguori wrote:
I really dislike having so many APIs. I'd rather have an aio API that
took byte accesses or have pread/pwrite always be emulated with a full
sector read/write
I had patches to change the aio
Anthony Liguori wrote:
Avi Kivity wrote:
Instead of introducing yet another layer of indirection, you could
add block-raw-linux-aio, which would be registered before
block-raw-posix (which is realy block-raw-threadpool...), and resist
a -probe() if caching is enabled.
block-raw-posix
Avi Kivity wrote:
Duh, I noted this hole in a previous email.
Attached patch should fix.
It does, thanks.
--Benjamin Gilbert
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
Avi Kivity wrote:
We would drop the signaling stuff and have the thread pool use an fd
to signal. The big problem with that right now is that it'll cause a
performance regression for certain platforms until we have the IO
thread in place.
Well, let's merge this after the iothread?
Avi Kivity wrote:
Will talk to the specification and come up with further tests.
Please printk() vmcs_readl(GUEST_RFLAGS) (where you printk kvm_rip_read()).
--
I have a truly marvellous patch that fixes the bug which this
signature is too narrow to contain.
--
To unsubscribe from this
Some option roms (e1000 provided by gpxe project as an example)
are bigger than a segment. The current algorithm to compute the
checksum fails in such case. To proper compute the checksum, this
patch deals with the possibility of the rom's size crossing a
segment border.
We don't need to worry
Hello Alex,
From: Alexander Graf ag...@suse.de
Subject: Re: Release: USB image of OS Circular and deb packages of LBCAS
(LoopBack Content Addressable Storage)
Kuniyasu Suzaki wrote:
Hello,
We released bootable USB image of OS circular and the Debian packages of
LBCAS (LoopBack
On Monday 23 March 2009 23:17:42 Avi Kivity wrote:
Avi Kivity wrote:
Gleb Natapov wrote:
kvm_vcpu_block() unhalts vpu on an interrupt/timer without checking
if interrupt window is actually opened.
+static int svm_interrupt_allowed(struct kvm_vcpu *vcpu)
+{
+struct vcpu_svm
From: Avi Kivity a...@redhat.com
Useful to see how the module was loaded.
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 5852443..d3919ac 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@ -39,19 +39,19 @@ MODULE_AUTHOR(Qumranet);
From: Gleb Natapov g...@redhat.com
The prioritized bit vector manipulation functions are useful in both vmx and
svm.
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index da23fd3..04ee964 100644
---
46 matches
Mail list logo