Il 04/09/2012 04:21, Nicholas A. Bellinger ha scritto:
@@ -112,6 +118,9 @@ static void virtscsi_complete_cmd(struct virtio_scsi
*vscsi, void *buf)
struct virtio_scsi_cmd *cmd = buf;
struct scsi_cmnd *sc = cmd-sc;
struct virtio_scsi_cmd_resp *resp = cmd-resp.cmd;
+struct
On 09/04/2012 04:30 AM, Nikunj A Dadhania wrote:
On Mon, 03 Sep 2012 17:33:46 +0300, Avi Kivity a...@redhat.com wrote:
On 08/21/2012 02:25 PM, Nikunj A. Dadhania wrote:
kernbench(lower is better)
==
base pvflushv4 %improvement
1VM48.5800
On Tue, 04 Sep 2012 10:51:06 +0300, Avi Kivity a...@redhat.com wrote:
On 09/04/2012 04:30 AM, Nikunj A Dadhania wrote:
On Mon, 03 Sep 2012 17:33:46 +0300, Avi Kivity a...@redhat.com wrote:
On 08/21/2012 02:25 PM, Nikunj A. Dadhania wrote:
kernbench(lower is better)
On Mon, Sep 3, 2012 at 7:48 PM, Avi Kivity a...@redhat.com wrote:
On 09/03/2012 09:44 AM, Juan Quintela wrote:
Hi
Please send in any agenda items you are interested in covering.
- protecting MemoryRegion::opaque during dispatch
I'm guessing Ping won't make it due to timezone problems.
On 09/04/2012 11:17 AM, liu ping fan wrote:
On Mon, Sep 3, 2012 at 7:48 PM, Avi Kivity a...@redhat.com wrote:
On 09/03/2012 09:44 AM, Juan Quintela wrote:
Hi
Please send in any agenda items you are interested in covering.
- protecting MemoryRegion::opaque during dispatch
I'm guessing
On Tue, Sep 4, 2012 at 4:21 PM, Avi Kivity a...@redhat.com wrote:
On 09/04/2012 11:17 AM, liu ping fan wrote:
On Mon, Sep 3, 2012 at 7:48 PM, Avi Kivity a...@redhat.com wrote:
On 09/03/2012 09:44 AM, Juan Quintela wrote:
Hi
Please send in any agenda items you are interested in covering.
-
On 09/03/2012 10:32 PM, Blue Swirl wrote:
On Mon, Sep 3, 2012 at 4:14 PM, Avi Kivity a...@redhat.com wrote:
On 08/29/2012 11:27 AM, Markus Armbruster wrote:
I don't see a point in making contributors avoid non-problems that might
conceivably become trivial problems some day. Especially when
On Tue, Sep 04, 2012 at 08:46:12AM +0200, Paolo Bonzini wrote:
Il 04/09/2012 04:21, Nicholas A. Bellinger ha scritto:
@@ -112,6 +118,9 @@ static void virtscsi_complete_cmd(struct virtio_scsi
*vscsi, void *buf)
struct virtio_scsi_cmd *cmd = buf;
struct scsi_cmnd *sc = cmd-sc;
Hello.
# Avi Kivity avi(a)redhat recommended I copy kvm in on this. It would also seem
relevent to libvirt. #
I have a Centos 6.2 server and Centos 6.2 client.
[root@store ~]# cat /etc/exports
/dev/shm
10.149.0.0/16(rw,fsid=1,no_root_squash,insecure)(I have
Il 04/09/2012 10:46, Michael S. Tsirkin ha scritto:
+static int virtscsi_queuecommand_multi(struct Scsi_Host *sh,
+ struct scsi_cmnd *sc)
+{
+ struct virtio_scsi *vscsi = shost_priv(sh);
+ struct virtio_scsi_target_state *tgt = vscsi-tgt[sc-device-id];
+
On 09/04/2012 11:08 AM, Nikunj A Dadhania wrote:
On Tue, 04 Sep 2012 10:51:06 +0300, Avi Kivity a...@redhat.com wrote:
On 09/04/2012 04:30 AM, Nikunj A Dadhania wrote:
On Mon, 03 Sep 2012 17:33:46 +0300, Avi Kivity a...@redhat.com wrote:
On 08/21/2012 02:25 PM, Nikunj A. Dadhania wrote:
On Tue, Sep 04, 2012 at 12:25:03PM +0200, Paolo Bonzini wrote:
Il 04/09/2012 10:46, Michael S. Tsirkin ha scritto:
+static int virtscsi_queuecommand_multi(struct Scsi_Host *sh,
+ struct scsi_cmnd *sc)
+{
+struct virtio_scsi *vscsi =
Il 04/09/2012 13:09, Michael S. Tsirkin ha scritto:
queuecommand on CPU #0 queuecommand #2 on CPU #1
--
atomic_inc_return(...) == 1
atomic_inc_return(...) == 2
- Original Message -
From: Avi Kivity a...@redhat.com
To: Alex Jia a...@redhat.com
Cc: Andrew Holway a.hol...@syseleven.de, kvm@vger.kernel.org
Sent: Monday, September 3, 2012 9:27:08 PM
Subject: Re: [libvirt-users] vm pxe fail
On 08/31/2012 05:37 PM, Alex Jia wrote:
Hi Andrew,
Great,
On 09/04/2012 02:31 PM, Alex Jia wrote:
- Original Message -
From: Avi Kivity a...@redhat.com
To: Alex Jia a...@redhat.com
Cc: Andrew Holway a.hol...@syseleven.de, kvm@vger.kernel.org
Sent: Monday, September 3, 2012 9:27:08 PM
Subject: Re: [libvirt-users] vm pxe fail
On 08/31/2012
On 09/03/2012 03:33 PM, Rusty Russell wrote:
Avi Kivity a...@redhat.com writes:
On 09/01/2012 03:35 PM, Rusty Russell wrote:
Passing an address in a struct is pretty bad, since it involves
compatibility wrappers.
Right, some s390 thing.
Err, no, i386 on x86-64, or ppc32 on ppc64, or arm
On 09/03/2012 02:47 PM, Gleb Natapov wrote:
kvm_pic_reset() is not used anywhere. Move reset logic from
pic_ioport_write() there.
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a
On 09/01/2012 11:12 AM, Mao, Junjie wrote:
Checks and operations on the INVPCID feature bit should use EBX of CPUID leaf
7
instead of ECX.
Signed-off-by: Junjie Mao junjie@intel.com
---
arch/x86/kvm/vmx.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git
On 09/01/2012 11:12 AM, Mao, Junjie wrote:
The INVPCID enabling test assumes cr3[11:0] is 0. But at present PCID enabling
test sets cr3[11:0] to 1 for its own purpose and doesn't restore the register,
which leads to a failure when INVPCID test tries to enable PCIDE.
This patch restores cr3
On 09/02/2012 09:59 PM, Rik van Riel wrote:
On 09/02/2012 06:12 AM, Gleb Natapov wrote:
On Thu, Aug 30, 2012 at 12:51:01AM +0530, Raghavendra K T wrote:
The idea of starting from next vcpu (source of yield_to + 1) seem to
work
well for overcomitted guest rather than using last boosted vcpu. We
On Tue, 2012-09-04 at 11:31 +0200, Andrew Holway wrote:
Hello.
# Avi Kivity avi(a)redhat recommended I copy kvm in on this. It would also
seem relevent to libvirt. #
I have a Centos 6.2 server and Centos 6.2 client.
[root@store ~]# cat /etc/exports
/dev/shm
On 08/30/2012 02:30 AM, Mathias Krause wrote:
As the the compiler ensures that the memory operand is always aligned
to a 16 byte memory location,
I'm not sure it does. Is V4SI aligned? Do we use alignof() to
propagate the alignment to the vcpu allocation code?
use the aligned variant of
On 09/04/2012 03:09 PM, Avi Kivity wrote:
On 08/30/2012 02:30 AM, Mathias Krause wrote:
As the the compiler ensures that the memory operand is always aligned
to a 16 byte memory location,
I'm not sure it does. Is V4SI aligned? Do we use alignof() to
propagate the alignment to the vcpu
On 08/30/2012 01:32 PM, Jamie Iles wrote:
Commit aea218f3cbbc (KVM: PIC: call ack notifiers for irqs that are
dropped form irr) used an uninitialised variable to track whether an
appropriate apic had been found. This could result in calling the ack
notifier incorrectly.
Thanks, applied to
On Tue, Aug 28, 2012 at 01:54:17PM +0200, Paolo Bonzini wrote:
This patch adds queue steering to virtio-scsi. When a target is sent
multiple requests, we always drive them to the same queue so that FIFO
processing order is kept. However, if a target was idle, we can choose
a queue
On Tue, Sep 4, 2012 at 2:13 PM, Avi Kivity a...@redhat.com wrote:
On 09/04/2012 03:09 PM, Avi Kivity wrote:
On 08/30/2012 02:30 AM, Mathias Krause wrote:
As the the compiler ensures that the memory operand is always aligned
to a 16 byte memory location,
I'm not sure it does. Is V4SI
On 08/29/2012 11:34 AM, Pozsár Balázs wrote:
Hi all,
I have been testing network throughput and latency and I was wondering
if my measurements are as expected.
For the test, I used Fedora 17 for both host and guest, using kernel
3.5.2-3.fc17.86_64.
Pinging an external server on the LAN
That is expected behaviour. DIRECT_IO over RDMA needs to be page aligned
so that it can use the more efficient RDMA READ and RDMA WRITE memory
semantics (instead of the SEND/RECEIVE channel semantics).
Yes, I think I am understanding that now.
I need to find a way of getting around the
On 08/28/2012 11:26 PM, Ross Boylan wrote:
My vm launches with -hda /dev/turtle/VD0 -hdb /dev/turtle/VD1, where VD0
and VD1 are lvm logical volumes. I used lvextend to expand them, but
the VM, started after the expansion, does not seem to see the extra
space.
What do I need to so that the
On 08/24/2012 02:29 PM, Asias He wrote:
It is useful to run a X program in guest and display it on host.
1) Make host's x server listen to localhost:6000
host_shell$ socat -d -d TCP-LISTEN:6000,fork,bind=localhost \
UNIX-CONNECT:/tmp/.X11-unix/X0
2) Start the guest and
On 08/24/2012 06:14 AM, Neal Murphy wrote:
On Saturday 18 August 2012 22:04:20 Neal Murphy wrote:
I've been using KVM for a few years now. I've had little trouble with it.
But now it's got me treed. I cannot get a KVM-enabled Linux 3.2.27 kernel
to boot in qemu-kvm unless I specify '-no-kvm'.
On 1 September 2012 20:40, Christoffer Dall
c.d...@virtualopensystems.com wrote:
On Sep 1, 2012, at 6:25 AM, Peter Maydell peter.mayd...@linaro.org wrote:
On 1 September 2012 10:16, Avi Kivity a...@redhat.com wrote:
On 08/29/2012 11:21 AM, Rusty Russell wrote:
Peter Maydell wrote:
...but if
Avi Kivity a...@redhat.com wrote:
On 09/03/2012 04:35 PM, Jan Kiszka wrote:
On 2012-09-03 13:48, Avi Kivity wrote:
On 09/03/2012 09:44 AM, Juan Quintela wrote:
Hi
Please send in any agenda items you are interested in covering.
- protecting MemoryRegion::opaque during dispatch
I'm
On 09/04/2012 04:16 PM, Juan Quintela wrote:
Avi Kivity a...@redhat.com wrote:
On 09/03/2012 04:35 PM, Jan Kiszka wrote:
On 2012-09-03 13:48, Avi Kivity wrote:
On 09/03/2012 09:44 AM, Juan Quintela wrote:
Hi
Please send in any agenda items you are interested in covering.
- protecting
Juan Quintela quint...@redhat.com wrote:
Hi
Please send in any agenda items you are interested in covering.
As the memory region protection topic has been re-called, there are no
topic for this week. Call gets cancelled.
Have a nice week, Juan.
--
To unsubscribe from this list: send the
On 1 September 2012 13:28, Rusty Russell ru...@rustcorp.com.au wrote:
Rusty Russell (8):
KVM: ARM: Fix walk_msrs()
KVM: Move KVM_SET_ONE_REG/KVM_GET_ONE_REG to generic code.
KVM: Add KVM_REG_SIZE() helper.
KVM: ARM: use KVM_SET_ONE_REG/KVM_GET_ONE_REG.
KVM: Add
On Tue, Sep 04, 2012 at 01:18:31PM +0200, Paolo Bonzini wrote:
Il 04/09/2012 13:09, Michael S. Tsirkin ha scritto:
queuecommand on CPU #0 queuecommand #2 on CPU #1
--
atomic_inc_return(...) == 1
Il 04/09/2012 15:35, Michael S. Tsirkin ha scritto:
I see. I guess you can rewrite this as:
atomic_inc
if (atomic_read() == 1)
which is a bit cheaper, and make the fact
that you do not need increment and return to be atomic,
explicit.
It seems more complicated to me for hardly any reason.
Il 04/09/2012 14:48, Michael S. Tsirkin ha scritto:
This patch adds queue steering to virtio-scsi. When a target is sent
multiple requests, we always drive them to the same queue so that FIFO
processing order is kept. However, if a target was idle, we can choose
a queue arbitrarily. In
On Tue, Sep 04, 2012 at 03:45:57PM +0200, Paolo Bonzini wrote:
Also - some kind of comment explaining why a similar race can not happen
with this lock in place would be nice: I see why this specific race can
not trigger but since lock is dropped later before you submit command, I
have hard
On Tue, Sep 04, 2012 at 03:49:42PM +0200, Paolo Bonzini wrote:
Il 04/09/2012 14:48, Michael S. Tsirkin ha scritto:
This patch adds queue steering to virtio-scsi. When a target is sent
multiple requests, we always drive them to the same queue so that FIFO
processing order is kept.
Il 04/09/2012 16:19, Michael S. Tsirkin ha scritto:
Also - some kind of comment explaining why a similar race can not happen
with this lock in place would be nice: I see why this specific race can
not trigger but since lock is dropped later before you submit command, I
have hard time
On Tue, Sep 4, 2012 at 9:09 AM, Peter Maydell peter.mayd...@linaro.org wrote:
On 1 September 2012 20:40, Christoffer Dall
c.d...@virtualopensystems.com wrote:
On Sep 1, 2012, at 6:25 AM, Peter Maydell peter.mayd...@linaro.org wrote:
On 1 September 2012 10:16, Avi Kivity a...@redhat.com wrote:
Il 04/09/2012 16:21, Michael S. Tsirkin ha scritto:
One reason is that, even though in practice I expect roughly the same
number of targets and VCPUs, hotplug means the number of targets is
difficult to predict and is usually fixed to 256.
The other reason is that per-target vq didn't
On Tue, Sep 04, 2012 at 04:30:35PM +0200, Paolo Bonzini wrote:
Il 04/09/2012 16:21, Michael S. Tsirkin ha scritto:
One reason is that, even though in practice I expect roughly the same
number of targets and VCPUs, hotplug means the number of targets is
difficult to predict and is usually
On Tue, Aug 28, 2012 at 01:54:17PM +0200, Paolo Bonzini wrote:
@@ -575,15 +630,19 @@ static struct scsi_host_template virtscsi_host_template
= {
__val, sizeof(__val)); \
})
+
Pls don't add empty lines.
static void virtscsi_init_vq(struct
- Original Message -
From: Avi Kivity a...@redhat.com
To: Alex Jia a...@redhat.com
Cc: Andrew Holway a.hol...@syseleven.de, kvm@vger.kernel.org
Sent: Tuesday, September 4, 2012 7:44:36 PM
Subject: Re: [libvirt-users] vm pxe fail
On 09/04/2012 02:31 PM, Alex Jia wrote:
- Original
Il 04/09/2012 16:47, Michael S. Tsirkin ha scritto:
static void virtscsi_init_vq(struct virtio_scsi_vq *virtscsi_vq,
- struct virtqueue *vq)
+ struct virtqueue *vq, bool affinity)
{
spin_lock_init(virtscsi_vq-vq_lock);
virtscsi_vq-vq
On Tue, Sep 04, 2012 at 04:55:56PM +0200, Paolo Bonzini wrote:
Il 04/09/2012 16:47, Michael S. Tsirkin ha scritto:
static void virtscsi_init_vq(struct virtio_scsi_vq *virtscsi_vq,
- struct virtqueue *vq)
+ struct virtqueue *vq,
From 728a17e2de591b557c3c8ba31076b4bf2ca5ab42 Mon Sep 17 00:00:00 2001
From: Liu, Jinsong jinsong@intel.com
Date: Wed, 5 Sep 2012 03:18:15 +0800
Subject: [PATCH] KVM: tsc deadline timer works only when hrtimer high
resolution configured
This is for 2 reasons:
1. it's pointless to enable tsc
There's no need to keep __MAX_SUBCHANNEL and __MAX_SSID private to the
common I/O layer when __MAX_CSSID is usable by everybody.
Signed-off-by: Cornelia Huck cornelia.h...@de.ibm.com
---
arch/s390/include/asm/cio.h | 2 ++
drivers/s390/cio/css.h | 3 ---
2 files changed, 2 insertions(+), 3
Signed-off-by: Cornelia Huck cornelia.h...@de.ibm.com
---
Documentation/virtual/kvm/api.txt | 2 +-
arch/s390/kvm/kvm-s390.c | 26 ++
2 files changed, 27 insertions(+), 1 deletion(-)
diff --git a/Documentation/virtual/kvm/api.txt
Add support for handling I/O interrupts (standard, subchannel-related
ones and rudimentary adapter interrupts).
The subchannel-identifying parameters are encoded into the interrupt
type.
I/O interrupts are floating, so they can't be injected on a specific
vcpu.
Signed-off-by: Cornelia Huck
Explicitely catch all channel I/O related instructions intercepts
in the kernel and set condition code 3 for them.
This paves the way for properly handling these instructions later
on.
Note: This is not architecture compliant (the previous code wasn't
either) since setting cc 3 is not the
This will be needed by the new virtio-ccw transport.
Signed-off-by: Cornelia Huck cornelia.h...@de.ibm.com
---
Changes v1-v2:
- make it EXPORT_SYMBOL_GPL to get in line with other interfaces
---
arch/s390/include/asm/ccwdev.h | 5 +
drivers/s390/cio/device_ops.c | 12
2
Hi,
here's the second revision of the guest support for virtio-ccw.
The first patch has gotten several changes and now handles checking
for s390-virtio support much more nicely.
The third patch has been adapted to the changed virtio-ccw interface.
Cornelia Huck (4):
s390/kvm: Handle hosts
This code is transport agnostic and can be used by both the legacy
virtio code and virtio_ccw.
Signed-off-by: Cornelia Huck cornelia.h...@de.ibm.com
---
drivers/s390/kvm/Makefile | 2 +-
drivers/s390/kvm/early_printk.c | 42 +
Hi,
here's the second revision of the virtual channel subsystem support for
s390.
I changed the representation of the channel subsystem, introducing channel
subsystem images, which brings it closer to the actual implementation. A
new ioctl for adding a new channel subsystem image has also been
Add support for injecting machine checks (only repressible
conditions for now).
This is a bit more involved than I/O interrupts, for these reasons:
- Machine checks come in both floating and cpu varieties.
- We don't have a bit for machine checks enabling, but have to use
a roundabout approach
Hi,
I have incorporated the feedback I received to my first RFC for
virtio-ccw (http://marc.info/?l=kvmm=134435141402140w=2) and will
post the updates shortly.
Patches will again be sorted into kernel host and guest, qemu, and
virtio spec.
Feedback is still welcome.
Cornelia
--
To unsubscribe
Hi,
this is the second revision of the virtio-ccw spec.
The interface has been improved to support more than 32 feature bits
as well as allocating less that the requested queue size and specifying
alignment.
(Note: I folded the changes with git into my initial spec; I hope LyX can
handle this
Add a driver for kvm guests that matches virtual ccw devices provided
by the host as virtio bridge devices.
These virtio-ccw devices use a special set of channel commands in order
to perform virtio functions.
Signed-off-by: Cornelia Huck cornelia.h...@de.ibm.com
---
Changes v1-v2:
- adapt to
This patch enables using both virtio-xxx-s390 and virtio-xxx-ccw
by making the alias lookup code verify that a driver is actually
registered.
(Only included in order to allow testing of virtio-ccw; should be
replaced by cleaning up the virtio bus model.)
Not-signed-off-by: Cornelia Huck
Add specifications for the new s390 specific virtio-ccw transport.
Signed-off-by: Cornelia Huck cornelia.h...@de.ibm.com
---
Changes v1-v2:
- support more than 32 feature bits
- allow to allocate less than requested queue size
- allow to transfer alignment
---
virtio-spec.lyx | 534
Add a new virtio transport that uses channel commands to perform
virtio operations.
Add a new machine type s390-ccw that uses this virtio-ccw transport
and make it the default machine for s390.
Signed-off-by: Cornelia Huck cornelia.h...@de.ibm.com
---
Changes v1-v2:
- update to virtio-ccw
Provide a mechanism for qemu to provide fully virtual subchannels to
the guest. In the KVM case, this relies on the kernel's css support.
The !KVM case is not yet supported.
Signed-off-by: Cornelia Huck cornelia.h...@de.ibm.com
---
Changes v1 - v2:
- coding style
- re-organization of hardware
Signed-off-by: Cornelia Huck cornelia.h...@de.ibm.com
---
Changes v1-v2:
- update to latest kvm interface changes
---
linux-headers/asm-generic/kvm_para.h | 5 +++
linux-headers/asm-x86/kvm.h | 1 +
linux-headers/linux/kvm.h| 80 ++--
3
Hi,
here's the second version of virtual channel I/O and the new virtio-ccw
transport.
Changes to the first version include coding style fixes, changes in the
organization of objects (not quite finished yet), adaptions to changes
in the kernel interface and implementation of the improved
Running under a kvm host does not necessarily imply the presence of
a page mapped above the main memory with the virtio information;
however, the code includes a hard coded access to that page.
Instead, check for the presence of the page and exit gracefully
before we hit an addressing exception
kvm will need to use some css-related structures (pmcw, schib, orb),
so let's move the definitions from drivers/s390/cio/ to include/asm/.
Signed-off-by: Cornelia Huck cornelia.h...@de.ibm.com
---
arch/s390/include/asm/orb.h | 69 +++
Hi,
i want to convert a sles 11 sp2 64bit system (running on VMWare Server 1.09) to
libvirt format. Host OS is SLES 11 SP2 64bit.
I tried virt-convert --os-variant=sles11 sles_11_vmx/ sles_11_kvm/ .
This is what i got:
Generating output in 'virt-image' format to sles_11_kvm//
Converting disk
On 09/02/2012 11:42 PM, Kevin O'Connor wrote:
On Tue, Aug 14, 2012 at 07:29:19AM +0200, Gerd Hoffmann wrote:
This patch makes seabios use the acpi pmtimer instead of tsc for
timekeeping. The pmtimer has a fixed frequency and doesn't need
calibration, thus it doesn't suffer from calibration
On 08/31/2012 12:56 PM, Michael S. Tsirkin wrote:
On Fri, Aug 31, 2012 at 11:36:07AM +0200, Sasha Levin wrote:
On 08/30/2012 03:38 PM, Michael S. Tsirkin wrote:
+static unsigned int indirect_alloc_thresh = 16;
Why 16? Please make is MAX_SG + 1 this makes some sense.
Wouldn't MAX_SG mean
On 09/04/2012 07:34 PM, Avi Kivity wrote:
On 08/31/2012 12:56 PM, Michael S. Tsirkin wrote:
On Fri, Aug 31, 2012 at 11:36:07AM +0200, Sasha Levin wrote:
On 08/30/2012 03:38 PM, Michael S. Tsirkin wrote:
+static unsigned int indirect_alloc_thresh = 16;
Why 16? Please make is MAX_SG + 1 this
On Tuesday, September 04, 2012 11:26:49 AM Lentes, Bernd wrote:
Hi,
i want to convert a sles 11 sp2 64bit system (running on VMWare Server
1.09) to libvirt format. Host OS is SLES 11 SP2 64bit. I tried
virt-convert --os-variant=sles11 sles_11_vmx/ sles_11_kvm/ .
This is what i got:
On Tue, Sep 04, 2012 at 07:34:19PM +0300, Avi Kivity wrote:
On 08/31/2012 12:56 PM, Michael S. Tsirkin wrote:
On Fri, Aug 31, 2012 at 11:36:07AM +0200, Sasha Levin wrote:
On 08/30/2012 03:38 PM, Michael S. Tsirkin wrote:
+static unsigned int indirect_alloc_thresh = 16;
Why 16? Please
On Tue, 2012-09-04 at 15:53 +0300, Avi Kivity wrote:
On 08/28/2012 11:26 PM, Ross Boylan wrote:
My vm launches with -hda /dev/turtle/VD0 -hdb /dev/turtle/VD1, where VD0
and VD1 are lvm logical volumes. I used lvextend to expand them, but
the VM, started after the expansion, does not seem
On Tue, Sep 4, 2012 at 8:32 AM, Avi Kivity a...@redhat.com wrote:
On 09/03/2012 10:32 PM, Blue Swirl wrote:
On Mon, Sep 3, 2012 at 4:14 PM, Avi Kivity a...@redhat.com wrote:
On 08/29/2012 11:27 AM, Markus Armbruster wrote:
I don't see a point in making contributors avoid non-problems that
On Tue, 2012-09-04 at 08:46 +0200, Paolo Bonzini wrote:
Il 04/09/2012 04:21, Nicholas A. Bellinger ha scritto:
@@ -112,6 +118,9 @@ static void virtscsi_complete_cmd(struct virtio_scsi
*vscsi, void *buf)
struct virtio_scsi_cmd *cmd = buf;
struct scsi_cmnd *sc = cmd-sc;
struct
Andreas Färber afaer...@suse.de writes:
Am 28.08.2012 14:57, schrieb Anthony Liguori:
Andreas Färber afaer...@suse.de writes:
Hi,
Am 27.08.2012 08:28, schrieb Jan Kiszka:
From: Jan Kiszka jan.kis...@siemens.com
This adds PCI device assignment for i386 targets using the classic KVM
-Original Message-
From: Avi Kivity [mailto:a...@redhat.com]
Sent: Monday, September 03, 2012 5:23 PM
To: Hao, Xudong
Cc: Roedel, Joerg; kvm@vger.kernel.org; Zhang, Xiantao
Subject: Re: [PATCH] kvm/fpu: Enable fully eager restore kvm FPU
On 08/23/2012 11:51 AM, Hao, Xudong wrote:
Enable KVM FPU fully eager restore, if there is other FPU state which isn't
tracked by CR0.TS bit.
Changes from v1:
Expand KVM_XSTATE_LAZY to 64 bits before negating it.
Signed-off-by: Xudong Hao xudong@intel.com
---
arch/x86/include/asm/kvm.h |4
arch/x86/kvm/x86.c | 13
On 04.09.2012, at 07:48, Avi Kivity a...@redhat.com wrote:
On 09/03/2012 03:33 PM, Rusty Russell wrote:
Avi Kivity a...@redhat.com writes:
On 09/01/2012 03:35 PM, Rusty Russell wrote:
Passing an address in a struct is pretty bad, since it involves
compatibility wrappers.
Right, some
On 04.09.2012, at 09:31, Peter Maydell wrote:
On 1 September 2012 13:28, Rusty Russell ru...@rustcorp.com.au wrote:
Rusty Russell (8):
KVM: ARM: Fix walk_msrs()
KVM: Move KVM_SET_ONE_REG/KVM_GET_ONE_REG to generic code.
KVM: Add KVM_REG_SIZE() helper.
KVM: ARM: use
On Mon, Sep 3, 2012 at 1:11 AM, Xiao Guangrong
xiaoguangr...@linux.vnet.ibm.com wrote:
On 09/03/2012 10:09 AM, Hugo wrote:
On Sun, Sep 2, 2012 at 8:29 AM, Xiao Guangrong
xiaoguangr...@linux.vnet.ibm.com wrote:
On 09/01/2012 05:30 AM, Hui Lin (Hugo) wrote:
On Thu, Aug 30, 2012 at 9:54 PM, Xiao
On 09/03/2012 07:55 PM, Michael S. Tsirkin wrote:
At Jason's request, I am trying to help finalize the spec for
the new multiqueue feature.
Changes from Jason's rfc:
- reserved vq 3: this makes all rx vqs even and tx vqs odd, which
looks nicer to me.
- documented packet steering, added a
On 09/02/12 22:42, Kevin O'Connor wrote:
On Tue, Aug 14, 2012 at 07:29:19AM +0200, Gerd Hoffmann wrote:
This patch makes seabios use the acpi pmtimer instead of tsc for
timekeeping. The pmtimer has a fixed frequency and doesn't need
calibration, thus it doesn't suffer from calibration errors
This patch makes seabios use the acpi pmtimer instead of tsc for
timekeeping. The pmtimer has a fixed frequency and doesn't need
calibration, thus it doesn't suffer from calibration errors due to a
loaded host machine.
[ v3: mask port ioport read ]
[ v2: add CONFIG_PMTIMER ]
Signed-off-by: Gerd
On Wed, Sep 05, 2012 at 11:34:15AM +0800, Jason Wang wrote:
On 09/03/2012 07:55 PM, Michael S. Tsirkin wrote:
At Jason's request, I am trying to help finalize the spec for
the new multiqueue feature.
Changes from Jason's rfc:
- reserved vq 3: this makes all rx vqs even and tx vqs odd, which
On Mon, 2012-08-06 at 16:27 +0300, Mihai Caraman wrote:
Critical exception handler on 64-bit booke uses user-visible SPRG3 as scratch.
Restore VDSO information in SPRG3 on exception prolog.
Breaks the build on !BOOKE because of :
diff --git a/arch/powerpc/kernel/vdso.c
The VMCS includes controls that enable the virtualization of interrupts and the
Advanced Programmable Interrupt Controller (APIC).
When these controls are used, the processor will emulate many accesses to the
APIC, track the state of the virtual APIC, and deliver virtual interrupts - all
in VMX
- APIC read doesn't cause VM-Exit
- APIC write becomes trap-like
Signed-off-by: Kevin Tian kevin.t...@intel.com
Signed-off-by: Jiongxi Li jiongxi...@intel.com
---
arch/x86/include/asm/vmx.h |2 ++
arch/x86/kvm/lapic.c | 16
arch/x86/kvm/lapic.h |2 ++
Virtual interrupt delivery avoids KVM to inject vAPIC interrupts
manually, which is fully taken care of by the hardware. This needs
some special awareness into existing interrupr injection path:
- for pending interrupt, instead of direct injection, we may need
update architecture specific
- before returning to guest, RVI should be updated if any pending IRRs
- EOI exit bitmap controls whether an EOI write should cause VM-Exit.
if set, a trap-like induced EOI VM-Exit is triggered. Keep all the
bitmaps cleared for now, which should be enough to allow a MSI based
device
With APICv virtual interrupt delivery feature, EOI write from non
root mode doesn't cause VM-Exit unless set in EOI exit bitmap VMCS
field. Basically there're two methods to manipulate EOI exit bitmap:
[Option 1]
Ideally only level triggered irq requires a hook in vLAPIC EOI write,
so that
basically to benefit from apicv, we need clear MSR bitmap for
corresponding x2apic MSRs:
0x800 - 0x8ff: no read intercept for apicv register virtualization
TPR,EOI,SELF-IPI: no write intercept for virtual interrupt delivery
Signed-off-by: Kevin Tian kevin.t...@intel.com
Signed-off-by:
From: Paul Mackerras pau...@samba.org
TODO: ask Paul to make a proper message.
This is the fix for a host kernel compiled with a page size
other than 4K (TCE page size). In the case of a 64K page size,
the host used to lose address bits in hpte_rpn().
The patch fixes it.
Signed-off-by: Alexey
On Mon, 2012-08-06 at 16:27 +0300, Mihai Caraman wrote:
Critical exception handler on 64-bit booke uses user-visible SPRG3 as scratch.
Restore VDSO information in SPRG3 on exception prolog.
Breaks the build on !BOOKE because of :
diff --git a/arch/powerpc/kernel/vdso.c
98 matches
Mail list logo