On Tue, Feb 16, 2010 at 10:06:12PM -1000, Zachary Amsden wrote:
On 02/16/2010 02:39 PM, Marcelo Tosatti wrote:
On Mon, Feb 15, 2010 at 10:45:42AM +0100, Jan Kiszka wrote:
The interrupt shadow created by STI or MOV-SS-like operations is part of
the VCPU state and must be preserved across
Zachary Amsden wrote:
On 02/16/2010 02:39 PM, Marcelo Tosatti wrote:
On Mon, Feb 15, 2010 at 10:45:42AM +0100, Jan Kiszka wrote:
The interrupt shadow created by STI or MOV-SS-like operations is part of
the VCPU state and must be preserved across migration. Transfer it in
the spare
On 02/14/2010 10:17 AM, Avi Kivity wrote:
--- a/Documentation/kvm/api.txt
+++ b/Documentation/kvm/api.txt
@@ -820,6 +820,11 @@ executed a memory-mapped I/O instruction which
could not be satisfied
by kvm. The 'data' member contains the written data if 'is_write' is
true, and should be
On 02/16/2010 10:51 AM, Gleb Natapov wrote:
x86 arch defines desc_ptr for idt/gdt pointers, no need to define
another structure in kvm code.
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
On 02/14/2010 09:30 AM, Chris Kilgour wrote:
I don't subscribe to the list, so please excuse any breach of etiquette.
According to AMD document 21485D pp.141, APROMWE is bit 8 of BCR2.
Please send this to the qemu mailing list, qemu-de...@nongnu.org, as
this code is shared between qemu
We think? I mean - yes, I think so too. But have you actually measured it?
How much improvement are we talking here?
Is it still faster when a bswap is involved?
Thanks for pointing out.
I will post the data for x86 later.
However, I don't have a test environment to check the impact of bswap.
Currently device assignment forces pinning the entire guest memory. The
following kernel and qemu patches add
balloon support for device assignment. When the balloon inflates, the
corresponding pages are unmapped from the IOMMU and unpinned, and accordingly
they are remapped and pinned when
From: Eran Borovik bor...@il.ibm.com
This patch adds modifications to allow correct
balloon operation when a virtual guest uses a direct assigned device.
The modifications include a new interface between qemu and kvm to allow
mapping and unmapping the pages from the IOMMU as well as pinning and
From: Eran Borovik bor...@il.ibm.com
This patch adds modifications to allow correct
balloon operation when a virtual guest uses a direct assigned device.
The modifications include a new interface between qemu and kvm to allow
mapping and unmapping the pages from the IOMMU as well as pinning and
On 17.02.2010, at 10:42, OHMURA Kei wrote:
We think? I mean - yes, I think so too. But have you actually measured
it?
How much improvement are we talking here?
Is it still faster when a bswap is involved?
Thanks for pointing out.
I will post the data for x86 later.
However, I don't have
On 02/17/2010 11:42 AM, OHMURA Kei wrote:
We think? I mean - yes, I think so too. But have you actually
measured it?
How much improvement are we talking here?
Is it still faster when a bswap is involved?
Thanks for pointing out.
I will post the data for x86 later.
However, I don't have a test
On 17.02.2010, at 10:47, Avi Kivity wrote:
On 02/17/2010 11:42 AM, OHMURA Kei wrote:
We think? I mean - yes, I think so too. But have you actually measured
it?
How much improvement are we talking here?
Is it still faster when a bswap is involved?
Thanks for pointing out.
I will post the
On 02/17/2010 11:43 AM, bor...@il.ibm.com wrote:
From: Eran Borovikbor...@il.ibm.com
This patch adds modifications to allow correct
balloon operation when a virtual guest uses a direct assigned device.
The modifications include a new interface between qemu and kvm to allow
mapping and unmapping
On 02/17/2010 11:43 AM, bor...@il.ibm.com wrote:
From: Eran Borovikbor...@il.ibm.com
This patch adds modifications to allow correct
balloon operation when a virtual guest uses a direct assigned device.
The modifications include a new interface between qemu and kvm to allow
mapping and unmapping
On Tue, Feb 16, 2010 at 10:11:06AM +0100, Jan Kiszka wrote:
Gleb Natapov wrote:
On Tue, Feb 16, 2010 at 09:05:40AM +0100, Jan Kiszka wrote:
Gleb Natapov wrote:
On Mon, Feb 15, 2010 at 03:53:04PM +0100, Jan Kiszka wrote:
We intercept #BP while in guest debugging mode. As VM exits due to
On 02/17/2010 04:41 AM, Tsuyoshi Ozawa wrote:
shadow_efer was renamed to efer, so this should be modified rather than deleted.
OK. The new patch uses efer instead of deleting shadow_efer
Excuse me, and what should I do next ?
Copy Jan - he maintains kvm-kmod, and probably
Hi all,
I need to install several windows KVM (rhel5.4 host fully updated) guests for
iSCSI boot. iSCSI servers are Solaris/OpenSolaris storage servers and I need to boot
windows guests (2008R2 and Win7) using gpxe. Can i use virtio net dirver during
windows install or e1000 driver??
Many
On Mon, Feb 15, 2010 at 02:20:31PM +0100, Jan Kiszka wrote:
Jan Kiszka wrote:
Gleb Natapov wrote:
Lets check if SVM works. I can do that if you tell me how.
- Fire up some Linux guest with gdb installed
- Attach gdb to gdbstub of the VM
- Set a soft breakpoint in guest kernel,
On 02/17/2010 12:43 PM, Gleb Natapov wrote:
And, again: This is an _existing_ user space ABI. We could only provide
an alternative, but we have to maintain what is there at least for some
longer grace period.
But it was always broken for SVM and was broken for VMX for a year and
nobody
On Wed, Feb 17, 2010 at 01:11:36PM +0200, Avi Kivity wrote:
On 02/15/2010 03:30 PM, Gleb Natapov wrote:
I just did this on our primary AMD platform (Embedded Opteron, 13KS EE),
and it just worked.
But this is a fairly new processor. Consequently, it reports NextRIP
support via cpuid
On Wed, Feb 17, 2010 at 01:13:29PM +0200, Avi Kivity wrote:
On 02/17/2010 12:43 PM, Gleb Natapov wrote:
And, again: This is an _existing_ user space ABI. We could only provide
an alternative, but we have to maintain what is there at least for some
longer grace period.
But it was always
Gleb Natapov wrote:
On Wed, Feb 17, 2010 at 01:13:29PM +0200, Avi Kivity wrote:
On 02/17/2010 12:43 PM, Gleb Natapov wrote:
And, again: This is an _existing_ user space ABI. We could only provide
an alternative, but we have to maintain what is there at least for some
longer grace period.
Gleb Natapov wrote:
On Wed, Feb 17, 2010 at 01:11:36PM +0200, Avi Kivity wrote:
On 02/15/2010 03:30 PM, Gleb Natapov wrote:
I just did this on our primary AMD platform (Embedded Opteron, 13KS EE),
and it just worked.
But this is a fairly new processor. Consequently, it reports NextRIP
Gleb Natapov wrote:
On Mon, Feb 15, 2010 at 02:20:31PM +0100, Jan Kiszka wrote:
Jan Kiszka wrote:
Gleb Natapov wrote:
Lets check if SVM works. I can do that if you tell me how.
- Fire up some Linux guest with gdb installed
- Attach gdb to gdbstub of the VM
- Set a soft breakpoint in guest
Avi Kivity wrote:
On 02/17/2010 04:41 AM, Tsuyoshi Ozawa wrote:
shadow_efer was renamed to efer, so this should be modified rather than
deleted.
OK. The new patch uses efer instead of deleting shadow_efer
Excuse me, and what should I do next ?
Copy Jan - he maintains
On Wed, Feb 17, 2010 at 12:24:19PM +0100, Jan Kiszka wrote:
Gleb Natapov wrote:
On Wed, Feb 17, 2010 at 01:11:36PM +0200, Avi Kivity wrote:
On 02/15/2010 03:30 PM, Gleb Natapov wrote:
I just did this on our primary AMD platform (Embedded Opteron, 13KS EE),
and it just worked.
But this
On 02/11/2010 01:09 AM, Paolo Bonzini wrote:
This patch series morphs the code in qemu-kvm's eventfd so that it looks
like the code in upstream qemu. Patch 4 is not yet in upstream QEMU,
I'm submitting it first to qemu-kvm to avoid conflicts.
Applied, thanks.
--
error compiling
On 02/11/2010 01:23 AM, Paolo Bonzini wrote:
Signed-off-by: Paolo Bonzinipbonz...@redhat.com
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
On 02/11/2010 02:43 PM, Gleb Natapov wrote:
Some instruction are obsolete in a long mode. Inject #UD.
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
On Wed, Feb 17, 2010 at 12:23:39PM +0100, Jan Kiszka wrote:
Gleb Natapov wrote:
On Wed, Feb 17, 2010 at 01:13:29PM +0200, Avi Kivity wrote:
On 02/17/2010 12:43 PM, Gleb Natapov wrote:
And, again: This is an _existing_ user space ABI. We could only provide
an alternative, but we have to
On 02/12/2010 08:50 AM, Takuya Yoshikawa wrote:
This is the rework of Fix x86 emulator's fault propagations.
-- http://www.spinics.net/lists/kvm/msg28874.html
I read the review comments from Avi, Marcelo and Gleb and removed
some parts which should be done with more care: descriptor related
From: Jochen Maes jochen.m...@sejo.be
Fixed 2 codestyle issues in virt/kvm/coalesced_mmio.c
Signed-off-by: Jochen Maes jochen.m...@sejo.be
Signed-off-by: Avi Kivity a...@redhat.com
---
virt/kvm/coalesced_mmio.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git
These features are unused by modern userspace and can go away. Paravirt
mmu needs to stay a little longer for live migration.
Signed-off-by: Avi Kivity a...@redhat.com
---
Documentation/feature-removal-schedule.txt | 30
1 files changed, 30 insertions(+), 0
From: Gleb Natapov g...@redhat.com
Instructions with opcode 82 are not valid in 64 bit mode.
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/emulate.c | 16
1 files changed, 8 insertions(+), 8 deletions(-)
diff --git
From: Gleb Natapov g...@redhat.com
Instructions which are not allowed to have LOCK prefix should
generate #UD if one is used.
[avi: fold opcode 82 fix from another patch]
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/emulate.c | 97
From: Liu Yu yu@freescale.com
Old method prematurely sets ESR and DEAR.
Move this part after we decide to inject interrupt,
which is more like hardware behave.
Signed-off-by: Liu Yu yu@freescale.com
Acked-by: Hollis Blanchard hol...@penguinppc.org
Acked-by: Alexander Graf ag...@suse.de
From: Gleb Natapov g...@redhat.com
POPF behaves differently depending on current CPU mode. Emulate correct
logic to prevent guest from changing flags that it can't change otherwise.
Signed-off-by: Gleb Natapov g...@redhat.com
Cc: sta...@kernel.org
Signed-off-by: Avi Kivity a...@redhat.com
---
From: Wei Yongjun yj...@cn.fujitsu.com
Just remove redundant semicolon.
Signed-off-by: Wei Yongjun yj...@cn.fujitsu.com
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/emulate.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/emulate.c
From: Gleb Natapov g...@redhat.com
Make emulator check that vcpu is allowed to execute IN, INS, OUT,
OUTS, CLI, STI.
Signed-off-by: Gleb Natapov g...@redhat.com
Cc: sta...@kernel.org
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/include/asm/kvm_host.h |1 +
arch/x86/kvm/emulate.c
From: Gleb Natapov g...@redhat.com
Add CPL checking in case emulator is tricked into emulating
privilege instruction from userspace.
Signed-off-by: Gleb Natapov g...@redhat.com
Cc: sta...@kernel.org
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/emulate.c | 35
From: Michael S. Tsirkin m...@redhat.com
wqh is unused, so we do not need to store it in irqfd anymore
Signed-off-by: Michael S. Tsirkin m...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
virt/kvm/eventfd.c |3 ---
1 files changed, 0 insertions(+), 3 deletions(-)
diff --git
From: Wei Yongjun yj...@cn.fujitsu.com
If fail to create pit, we should unregister kvm irq notifier
which register in kvm_create_pit().
Signed-off-by: Wei Yongjun yj...@cn.fujitsu.com
Acked-by: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/mmu.c | 11 ---
include/trace/events/kvm.h | 22 ++
2 files changed, 30 insertions(+), 3 deletions(-)
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index b8da671..7397932 100644
---
From: Wei Yongjun yj...@cn.fujitsu.com
If we fail to init ioapic device or the fail to setup the default irq
routing, the device register by kvm_create_pic() and kvm_ioapic_init()
remain unregister. This patch fixed to do this.
Signed-off-by: Wei Yongjun yj...@cn.fujitsu.com
Signed-off-by: Avi
From: Sheng Yang sh...@linux.intel.com
Following the new SDM. Now the bit is named Ignore PAT memory type.
Signed-off-by: Sheng Yang sh...@linux.intel.com
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/include/asm/vmx.h |2 +-
arch/x86/kvm/vmx.c |4 ++--
2 files changed,
On Tue, Feb 16, 2010 at 12:08:58PM +0200, Gleb Natapov wrote:
Besides this, proper #DB forwarding to the guest was missing.
During NMI injection? How to reproduce?
Inject, e.g., an NMI over code with TF set. A bit harder is placing a
guest HW breakpoint at the spot the NMI handler
From: Gleb Natapov g...@redhat.com
For some instructions CPU behaves differently for real-mode and
virtual 8086. Let emulator know which mode cpu is in, so it will
not poke into vcpu state directly.
Signed-off-by: Gleb Natapov g...@redhat.com
Cc: sta...@kernel.org
Signed-off-by: Avi Kivity
From: Gleb Natapov g...@redhat.com
Currently when x86 emulator needs to access memory, page walk is done with
broadest permission possible, so if emulated instruction was executed
by userspace process it can still access kernel memory. Fix that by
providing correct memory access to page walker
From: Gleb Natapov g...@redhat.com
Use groups mechanism to decode 0F BA instructions.
Signed-off-by: Gleb Natapov g...@redhat.com
Cc: sta...@kernel.org
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/emulate.c |7 ++-
1 files changed, 6 insertions(+), 1 deletions(-)
diff
From: Gleb Natapov g...@redhat.com
Use groups mechanism to decode 0F C7 instructions.
Signed-off-by: Gleb Natapov g...@redhat.com
Cc: sta...@kernel.org
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/emulate.c |9 +++--
1 files changed, 7 insertions(+), 2 deletions(-)
diff
From: Wei Yongjun yj...@cn.fujitsu.com
If KVM_CREATE_IRQCHIP fail due to kvm_setup_default_irq_routing(),
ioapic device is not destroyed and kvm-arch.vioapic is not set to
NULL, this may cause KVM_GET_IRQCHIP and KVM_SET_IRQCHIP access to
unexcepted memory.
Signed-off-by: Wei Yongjun
This is the first of four batches of patches for the 2.6.34 merge window. KVM
changes for this cycle include:
- rdtscp support
- powerpc server-class updates
- much improved large-guest scaling (now up to 64 vcpus)
- improved guest fpu handling
- initial Hyper-V emulation
- better swapping
From: Wei Yongjun yj...@cn.fujitsu.com
kvm-arch.vioapic should be NULL in case of kvm_ioapic_init() failure
due to cannot register io dev.
Signed-off-by: Wei Yongjun yj...@cn.fujitsu.com
Signed-off-by: Avi Kivity a...@redhat.com
---
virt/kvm/ioapic.c |4 +++-
1 files changed, 3
The i8254/i8259 locks need to be real spinlocks on preempt-rt. Convert
them to raw_spinlock. No change for !RT kernels.
Signed-off-by: Thomas Gleixner t...@linutronix.de
---
arch/x86/kvm/i8254.c | 10 +-
arch/x86/kvm/i8254.h |2 +-
arch/x86/kvm/i8259.c | 31
On Wed, Feb 17, 2010 at 11:10:07AM +0200, Gleb Natapov wrote:
On Wed, Feb 17, 2010 at 10:03:58AM +0100, Jan Kiszka wrote:
Also, as Avi mentioned it would be better to avoid this. Is it not
possible to disallow migration while interrupt shadow is present?
Which means disallowing
On 09.02.2010, at 13:27, Avi Kivity wrote:
On 02/09/2010 01:13 PM, Alexander Graf wrote:
Avi Kivity wrote:
On 02/09/2010 01:00 PM, Alexander Graf wrote:
That's pretty impressive (never saw x86 with this exit rate) but it's
more than 1000 times slower than the hardware,
Gleb Natapov wrote:
On Wed, Feb 17, 2010 at 12:32:05PM +0100, Jan Kiszka wrote:
Gleb Natapov wrote:
On Mon, Feb 15, 2010 at 02:20:31PM +0100, Jan Kiszka wrote:
Jan Kiszka wrote:
Gleb Natapov wrote:
Lets check if SVM works. I can do that if you tell me how.
- Fire up some Linux guest with
On Wed, Feb 17, 2010 at 04:13:11PM +0100, Jan Kiszka wrote:
Gleb Natapov wrote:
On Wed, Feb 17, 2010 at 12:32:05PM +0100, Jan Kiszka wrote:
Gleb Natapov wrote:
On Mon, Feb 15, 2010 at 02:20:31PM +0100, Jan Kiszka wrote:
Jan Kiszka wrote:
Gleb Natapov wrote:
Lets check if SVM works. I
The Buildbot has detected a new failure of disable_kvm_i386_out_of_tree on
qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/disable_kvm_i386_out_of_tree/builds/216
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build:
The Buildbot has detected a new failure of default_x86_64_debian_5_0 on
qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/default_x86_64_debian_5_0/builds/277
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build: b1_qemu_kvm_1
The Buildbot has detected a new failure of disable_kvm_x86_64_debian_5_0 on
qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/disable_kvm_x86_64_debian_5_0/builds/267
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build:
The Buildbot has detected a new failure of disable_kvm_x86_64_out_of_tree on
qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/disable_kvm_x86_64_out_of_tree/builds/216
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build:
The Buildbot has detected a new failure of disable_kvm_i386_debian_5_0 on
qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/disable_kvm_i386_debian_5_0/builds/268
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build:
On 02/17/2010 06:23 PM, Alexander Graf wrote:
On 17.02.2010, at 17:03, Avi Kivity wrote:
On 02/17/2010 04:56 PM, Alexander Graf wrote:
So I changed to code according to your input by making all FPU calls explicit,
getting rid of all binary patching.
On the PowerStation again I'm
The Buildbot has detected a new failure of default_i386_debian_5_0 on qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/default_i386_debian_5_0/builds/279
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build: b1_qemu_kvm_2
The Buildbot has detected a new failure of default_i386_out_of_tree on qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/default_i386_out_of_tree/builds/216
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build: b1_qemu_kvm_2
Hi,
Comparing the features tested for in get_para_features() with the
kvm_feature_names in target-i386/helper.c, I noticed that we didn't
list the cr3_cache feature in the real name table.
I presume this is unintentional so here's a patch to correct it.
Cheers,
Jes
commit
Bugs item #2915201, was opened at 2009-12-15 16:35
Message generated for change (Comment added) made by jbl001
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2915201group_id=180599
Please note that this message will contain a full copy of the comment
On Wed, Feb 17, 2010 at 12:27:09PM +0200, Avi Kivity wrote:
On 02/17/2010 11:43 AM, bor...@il.ibm.com wrote:
From: Eran Borovikbor...@il.ibm.com
This patch adds modifications to allow correct
balloon operation when a virtual guest uses a direct assigned device.
The modifications include a
On 17.02.2010, at 17:34, Avi Kivity wrote:
On 02/17/2010 06:23 PM, Alexander Graf wrote:
On 17.02.2010, at 17:03, Avi Kivity wrote:
On 02/17/2010 04:56 PM, Alexander Graf wrote:
So I changed to code according to your input by making all FPU calls
explicit, getting rid of all
Copy Jan - he maintains kvm-kmod, and probably didn't see your patch.
Yes, I did. Proper subject prefixing can help a lot here...
I'm sorry for I forgot to prefix kvm-kmod and thank you for telling me this.
I mind this from now.
Could you please repost, avoiding that the patch is
Tsuyoshi Ozawa wrote:
Copy Jan - he maintains kvm-kmod, and probably didn't see your patch.
Yes, I did. Proper subject prefixing can help a lot here...
I'm sorry for I forgot to prefix kvm-kmod and thank you for telling me this.
I mind this from now.
Could you please repost, avoiding
Bugs item #2915201, was opened at 2009-12-15 17:35
Message generated for change (Comment added) made by alex_williamson
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2915201group_id=180599
Please note that this message will contain a full copy of the
Gleb Natapov wrote:
On Tue, Feb 16, 2010 at 12:08:58PM +0200, Gleb Natapov wrote:
Besides this, proper #DB forwarding to the guest was missing.
During NMI injection? How to reproduce?
Inject, e.g., an NMI over code with TF set. A bit harder is placing a
guest HW breakpoint at the spot the NMI
Gleb Natapov wrote:
On Wed, Feb 17, 2010 at 12:23:39PM +0100, Jan Kiszka wrote:
Gleb Natapov wrote:
On Wed, Feb 17, 2010 at 01:13:29PM +0200, Avi Kivity wrote:
On 02/17/2010 12:43 PM, Gleb Natapov wrote:
And, again: This is an _existing_ user space ABI. We could only provide
an alternative,
On Wed, Feb 17, 2010 at 06:44:12PM +0100, Jes Sorensen wrote:
Hi,
Comparing the features tested for in get_para_features() with the
kvm_feature_names in target-i386/helper.c, I noticed that we didn't
list the cr3_cache feature in the real name table.
I presume this is unintentional so
On 02/17/10 22:08, Marcelo Tosatti wrote:
The KVM_CAP_CR3_CACHE reference can be removed since the feature
was never implemented/included.
Ok that works too, would you rather a patch to remove all references
to it, or leave it in in case someone decides to pick it up later?
Cheers,
Jes
--
On Wed, Feb 17, 2010 at 10:26:56PM +0100, Jes Sorensen wrote:
On 02/17/10 22:08, Marcelo Tosatti wrote:
The KVM_CAP_CR3_CACHE reference can be removed since the feature
was never implemented/included.
Ok that works too, would you rather a patch to remove all references
to it, or leave it in
Otherwise a vcpu thread can run the sigchild handler causing
waitpid() from iothread to fail.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: qemu/vl.c
===
--- qemu.orig/vl.c
+++ qemu/vl.c
@@ -3514,6 +3514,7 @@ static void
With SIG_IPI blocked vcpu loop exit notification happens via -EAGAIN
from KVM_RUN.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: qemu/kvm-all.c
===
--- qemu.orig/kvm-all.c
+++ qemu/kvm-all.c
@@ -753,11 +753,13 @@ int
In KVM mode the global mutex is released when vcpus are executing,
which means acquiring the fairness mutex is not required.
Also for KVM there is one thread per vcpu, so tcg_has_work is meaningless.
Add a new qemu_wait_io_event_common function to hold common code
between TCG/KVM.
Change the way the internal qemu signal, used for communication between
iothread and vcpus, is handled.
Block and consume it with sigtimedwait on the outer vcpu loop, which
allows more precise timing control.
Change from standard signal (SIGUSR1) to real-time one, so multiple
signals are not
We think? I mean - yes, I think so too. But have you actually measured it?
How much improvement are we talking here?
Is it still faster when a bswap is involved?
Thanks for pointing out.
I will post the data for x86 later.
However, I don't have a test environment to check the impact of bswap.
On Wed, Feb 17, 2010 at 08:17:28PM +0100, Jan Kiszka wrote:
Gleb Natapov wrote:
On Wed, Feb 17, 2010 at 12:23:39PM +0100, Jan Kiszka wrote:
Gleb Natapov wrote:
On Wed, Feb 17, 2010 at 01:13:29PM +0200, Avi Kivity wrote:
On 02/17/2010 12:43 PM, Gleb Natapov wrote:
And, again: This is an
On 02/17/2010 08:07 PM, Alexander Graf wrote:
On 17.02.2010, at 17:34, Avi Kivity wrote:
On 02/17/2010 06:23 PM, Alexander Graf wrote:
On 17.02.2010, at 17:03, Avi Kivity wrote:
On 02/17/2010 04:56 PM, Alexander Graf wrote:
So I changed to code according to
On Wed, Feb 17, 2010 at 08:16:45PM +0100, Jan Kiszka wrote:
Gleb Natapov wrote:
On Tue, Feb 16, 2010 at 12:08:58PM +0200, Gleb Natapov wrote:
Besides this, proper #DB forwarding to the guest was missing.
During NMI injection? How to reproduce?
Inject, e.g., an NMI over code with TF set. A
From: Marcelo Tosatti mtosa...@redhat.com
* upstream-merge: (159 commits)
crisv10: Prettify.
sparc32 fix spurious dma interrupts v2
Revert Sparc32: improve DMA controller IRQ debugging
cris: Add support for CRISv10 translation.
cris: Use tcg_gen_movi_tl.
cris: Add v10 style
From: Avi Kivity a...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/kvm/scripts/vmxcap b/kvm/scripts/vmxcap
index b7f58ac..08fd120 100755
--- a/kvm/scripts/vmxcap
+++ b/kvm/scripts/vmxcap
@@ -196,6 +196,7 @@ controls = [
8: 'Paging-structure memory type UC',
From: OHMURA Kei ohmura@lab.ntt.co.jp
dirty-bitmap-traveling is carried out by byte size in qemu-kvm.c.
But We think that dirty-bitmap-traveling by long size is faster than by byte
size especially when most of memory is not dirty.
Signed-off-by: OHMURA Kei ohmura@lab.ntt.co.jp
From: Gleb Natapov g...@redhat.com
x86 arch defines desc_ptr for idt/gdt pointers, no need to define
another structure in kvm code.
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/include/asm/kvm_host.h
From: Marcelo Tosatti mtosa...@redhat.com
Document that partially emulated instructions leave the guest state
inconsistent, and that the kernel will complete operations before
checking for pending signals.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Avi Kivity
Hi,
You are receiving this email because Sonia wants to tell you about this
website which will analyze your horoscope and answer your Astrology
questions free.
Please click on the link below or copy and paste the URL into your browser:
On 09.02.2010, at 13:27, Avi Kivity wrote:
On 02/09/2010 01:13 PM, Alexander Graf wrote:
Avi Kivity wrote:
On 02/09/2010 01:00 PM, Alexander Graf wrote:
That's pretty impressive (never saw x86 with this exit rate) but it's
more than 1000 times slower than the hardware,
On 02/17/2010 04:56 PM, Alexander Graf wrote:
So I changed to code according to your input by making all FPU calls explicit,
getting rid of all binary patching.
On the PowerStation again I'm running this code (simplified to the important
instructions) using kvmctl:
li r2,
On 17.02.2010, at 17:34, Avi Kivity wrote:
On 02/17/2010 06:23 PM, Alexander Graf wrote:
On 17.02.2010, at 17:03, Avi Kivity wrote:
On 02/17/2010 04:56 PM, Alexander Graf wrote:
So I changed to code according to your input by making all FPU calls
explicit, getting rid of all
On 02/17/2010 08:07 PM, Alexander Graf wrote:
On 17.02.2010, at 17:34, Avi Kivity wrote:
On 02/17/2010 06:23 PM, Alexander Graf wrote:
On 17.02.2010, at 17:03, Avi Kivity wrote:
On 02/17/2010 04:56 PM, Alexander Graf wrote:
So I changed to code according to
96 matches
Mail list logo