On Tue, Jul 16, 2013 at 09:07:53AM +0530, Raghavendra K T wrote:
On 07/15/2013 04:06 PM, Gleb Natapov wrote:
On Mon, Jul 15, 2013 at 03:20:06PM +0530, Raghavendra K T wrote:
On 07/14/2013 06:42 PM, Gleb Natapov wrote:
On Mon, Jun 24, 2013 at 06:13:42PM +0530, Raghavendra K T wrote:
kvm :
On Tue, Jul 16, 2013 at 12:41:15AM +0200, Borislav Petkov wrote:
Fix kvm ML already.
On Tue, Jul 16, 2013 at 12:39:30AM +0200, Borislav Petkov wrote:
On Sun, Jul 07, 2013 at 01:18:27PM +0300, Gleb Natapov wrote:
KVM does not enables emulation because QEMU called
KVM_GET_EMULATED_CPUID.
Il 16/07/2013 07:09, Naor Shlomo ha scritto:
Hi,
I am trying to disable the mergeable rx buffers for a Linux guest but I am
currently unable to do so.
I tried looking in the code of libvirt in order to find the -global
virtio-net-pci.mrg_rxbuf=off but the only globals configured are:
On Mon, Jul 15, 2013 at 01:17:33PM -0500, Scott Wood wrote:
On 07/15/2013 06:30:20 AM, Gleb Natapov wrote:
On Mon, Jul 15, 2013 at 04:41:17PM +0530, Bharat Bhushan wrote:
KVM_HC_VM_RESET: Requests that the virtual machine be reset.
KVM_HC_VM_SHUTDOWN: Requests that the virtual machine be
Hi Paolo and thanks for your quick reply,
I tried editing (virsh edit) the domain's XML and put the XML excerpt you gave
me everywhere but with no success.
The moment I exit the edit mode the text was gone (I guess it didn't pass some
sort of sanity and that's why it was automatically erased).
Il 16/07/2013 08:40, Naor Shlomo ha scritto:
Hi Paolo and thanks for your quick reply,
I tried editing (virsh edit) the domain's XML and put the XML excerpt you
gave me everywhere but with no success.
The moment I exit the edit mode the text was gone (I guess it didn't pass
some sort of
Thanks again Paolo,
I used your string and read the documents in the site you referred me to but
could not understand why doesn't it accept the
xmlns:qemu='http://libvirt.org/schemas/domain/qemu/1.0' string.
I tried it on the following version:
Compiled against library: libvir 0.9.8
Using
This is the first version for VMX nested environment test case. It
contains the basic VMX instructions test cases, including VMXON/
VMXOFF/VMXPTRLD/VMXPTRST/VMCLEAR/VMLAUNCH/VMRESUME/VMCALL. This patch
also tests the basic execution routine in VMX nested environment and
let the VM print Hello
Hi there,
This is a version calling for comments. Some minor changes should be
done before final commitment (TODOs in it), because these places are
related to the bugs I have commited in the previous weeks and the
relevant patches are not accpeted. But these bugs are all about some
unexpected
Il 16/07/2013 10:06, Naor Shlomo ha scritto:
Thanks again Paolo,
I used your string and read the documents in the site you referred me to but
could not understand why doesn't it accept the
xmlns:qemu='http://libvirt.org/schemas/domain/qemu/1.0' string.
I tried it on the following
On Tue, Jul 16, 2013 at 05:35:16PM +0800, Arthur Chunqi Li wrote:
Hi there,
This is a version calling for comments. Some minor changes should be
Add RFC before PATCH for such submission please.
done before final commitment (TODOs in it), because these places are
related to the bugs I have
On Tue, Jul 16, 2013 at 5:45 PM, Gleb Natapov g...@redhat.com wrote:
On Tue, Jul 16, 2013 at 05:35:16PM +0800, Arthur Chunqi Li wrote:
Hi there,
This is a version calling for comments. Some minor changes should be
Add RFC before PATCH for such submission please.
done before final commitment
On Tue, Jul 16, 2013 at 05:53:56PM +0800, Arthur Chunqi Li wrote:
On Tue, Jul 16, 2013 at 5:45 PM, Gleb Natapov g...@redhat.com wrote:
On Tue, Jul 16, 2013 at 05:35:16PM +0800, Arthur Chunqi Li wrote:
Hi there,
This is a version calling for comments. Some minor changes should be
Add RFC
Il 16/07/2013 11:27, Arthur Chunqi Li ha scritto:
This is the first version for VMX nested environment test case. It
contains the basic VMX instructions test cases, including VMXON/
VMXOFF/VMXPTRLD/VMXPTRST/VMCLEAR/VMLAUNCH/VMRESUME/VMCALL. This patch
also tests the basic execution routine in
Il 16/07/2013 12:40, Naor Shlomo ha scritto:
Hi Paolo,
For some unknown reason it suddenly started to accept the changes to the XML
and the strings you gave me are now in place.
Good.
Upon machine start I now receive the following error messages:
virsh # start NaorDev
error: Failed to
On Tue, Jul 16, 2013 at 10:40:28AM +, Naor Shlomo wrote:
Hi Paolo,
For some unknown reason it suddenly started to accept the changes to the XML
and the strings you gave me are now in place.
Upon machine start I now receive the following error messages:
virsh # start NaorDev
error:
Il 15/07/2013 10:04, Arthur Chunqi Li ha scritto:
When L2 exits to L1, segment infomations of L1 are not set correctly.
According to Intel SDM 27.5.2(Loading Host Segment and Descriptor
Table Registers), segment base/limit/access right of L1 should be
set to some designed value when L2 exits
Paolo,
Sorry for all the trouble.
We got a progress. Your last qemu:commandline really worked and I was able to
try and start the machine.
The problem is that I reached up to the tun driver load section and then the
machine shut itself down.
The last lines of the console showed the following:
Thanks Daniel,
Paolo already got it right, it's:
qemu:commandline
qemu:arg value='-global'/
qemu:arg value='virtio-net-pci.mrg_rxbuf=off'/
/qemu:commandline
-Original Message-
From: Daniel P. Berrange [mailto:berra...@redhat.com]
Sent: Tuesday, July 16, 2013 1:43 PM
To: Naor Shlomo
On Sun, Jul 07, 2013 at 11:13:37PM +0800, Arthur Chunqi Li wrote:
The recent KVM patch adds IA32_FEATURE_CONTROL support. QEMU needs
to clear this MSR when reset vCPU and keep the value of it when
migration. This patch add this feature.
So what happens if we migrate from qemu that does not
Hi Paolo,
On Tue, Jul 16, 2013 at 6:28 PM, Paolo Bonzini pbonz...@redhat.com wrote:
Il 16/07/2013 11:27, Arthur Chunqi Li ha scritto:
This is the first version for VMX nested environment test case. It
contains the basic VMX instructions test cases, including VMXON/
Il 16/07/2013 13:42, Gleb Natapov ha scritto:
On Sun, Jul 07, 2013 at 11:13:37PM +0800, Arthur Chunqi Li wrote:
The recent KVM patch adds IA32_FEATURE_CONTROL support. QEMU needs
to clear this MSR when reset vCPU and keep the value of it when
migration. This patch add this feature.
So what
On Tue, Jul 16, 2013 at 7:42 PM, Gleb Natapov g...@redhat.com wrote:
On Sun, Jul 07, 2013 at 11:13:37PM +0800, Arthur Chunqi Li wrote:
The recent KVM patch adds IA32_FEATURE_CONTROL support. QEMU needs
to clear this MSR when reset vCPU and keep the value of it when
migration. This patch add
Il 16/07/2013 13:47, Arthur Chunqi Li ha scritto:
setjmp and longjmp is not implemented in our test environment, and
these two functions are highly depend on architecture. Do you think we
need to write a general code for both 32bit and 64bit, or just write
specific one just for this test case?
On Tue, Jul 16, 2013 at 07:56:25PM +0800, Arthur Chunqi Li wrote:
On Tue, Jul 16, 2013 at 7:42 PM, Gleb Natapov g...@redhat.com wrote:
On Sun, Jul 07, 2013 at 11:13:37PM +0800, Arthur Chunqi Li wrote:
The recent KVM patch adds IA32_FEATURE_CONTROL support. QEMU needs
to clear this MSR when
Paolo,
Thanks for your help in this matter. Issue is resolved.
One more thing I changed in order to get the machine up and running is this:
domain type='qemu' xmlns:qemu='http://libvirt.org/schemas/domain/qemu/1.0'
has been changed to:
domain type='kvm'
Early 2012 i tested the old vga passthrough capabilities of KVM and was
partly successful.
now with the new vfio driver i tried again according to alex's hints and
this guide:
https://bbs.archlinux.org/viewtopic.php?id=162768
since im primarily using ubuntu i used the daily build of saucy.
it
On Tue, 2013-07-16 at 14:35 +0200, Martin Wolf wrote:
Early 2012 i tested the old vga passthrough capabilities of KVM and was
partly successful.
now with the new vfio driver i tried again according to alex's hints and
this guide:
https://bbs.archlinux.org/viewtopic.php?id=162768
since im
This is the first version for VMX nested environment test case. It
contains the basic VMX instructions test cases, including VMXON/
VMXOFF/VMXPTRLD/VMXPTRST/VMCLEAR/VMLAUNCH/VMRESUME/VMCALL. This patch
also tests the basic execution routine in VMX nested environment and
let the VM print Hello
These two patches are focued on providing a basic version of VMX nested
test suite. This commit provides the architecture of nested VMX similiar
to x86/svm.c.
setjmp/longjmp is designed to avoid exiting VMX in call-back form.
Arthur Chunqi Li (2):
kvm-unit-tests : Add setjmp/longjmp to
Add setjmp and longjmp functions to libcflat. Now these two functions
are only supported in X86_64 arch.
New files added:
lib/x86/setjmp64.S
lib/x86/setjmp64.c
Signed-off-by: Arthur Chunqi Li yzt...@gmail.com
---
config-x86_64.mak |2 ++
lib/x86/setjmp64.S | 27
Il 16/07/2013 17:11, Arthur Chunqi Li ha scritto:
Add setjmp and longjmp functions to libcflat. Now these two functions
are only supported in X86_64 arch.
New files added:
lib/x86/setjmp64.S
lib/x86/setjmp64.c
Signed-off-by: Arthur Chunqi Li yzt...@gmail.com
---
-Original Message-
From: Mario Smarduch [mailto:mario.smard...@huawei.com]
Sent: Thursday, July 04, 2013 9:45 AM
To: Yoder Stuart-B08248
Cc: Alex Williamson; Alexander Graf; Wood Scott-B07421; kvm@vger.kernel.org
list; Bhushan Bharat-R65777;
kvm-...@vger.kernel.org;
On Tue, Jul 16, 2013 at 11:20 PM, Gleb Natapov g...@redhat.com wrote:
On Tue, Jul 16, 2013 at 12:28:05PM +0200, Paolo Bonzini wrote:
+void vmx_exit(void)
+{
+ test_vmxoff();
+ printf(\nSUMMARY: %d tests, %d failures\n, tests, fails);
+ exit(fails ? -1 : 0);
+}
Can you try to
On Tue, Jul 16, 2013 at 12:28:05PM +0200, Paolo Bonzini wrote:
+void vmx_exit(void)
+{
+ test_vmxoff();
+ printf(\nSUMMARY: %d tests, %d failures\n, tests, fails);
+ exit(fails ? -1 : 0);
+}
Can you try to jump back to main, and do test_vmxoff there? This will
avoid having
On Tue, Jul 16, 2013 at 09:02:15AM +0300, Gleb Natapov wrote:
BTW can NMI handler take spinlocks?
No -- that is, yes you can using trylock, but you still shouldn't.
If it can what happens if NMI is
delivered in a section protected by local_irq_save()/local_irq_restore()?
You deadlock.
--
To
These two patches are focued on providing a basic version of VMX nested
test suite. This commit provides the architecture of nested VMX similiar
to x86/svm.c.
setjmp/longjmp is designed to avoid exiting VMX in call-back form.
Arthur Chunqi Li (2):
kvm-unit-tests : Add setjmp/longjmp to
Add setjmp and longjmp functions to libcflat. Now these two functions
are only supported in X86_64 arch.
New files added:
lib/x86/setjmp64.S
lib/x86/setjmp64.c
Signed-off-by: Arthur Chunqi Li yzt...@gmail.com
---
config-x86_64.mak |2 ++
lib/setjmp.h | 11
This is the first version for VMX nested environment test case. It
contains the basic VMX instructions test cases, including VMXON/
VMXOFF/VMXPTRLD/VMXPTRST/VMCLEAR/VMLAUNCH/VMRESUME/VMCALL. This patch
also tests the basic execution routine in VMX nested environment and
let the VM print Hello
On this commit, I delete two TODO lines in PATCH 2/2, and it can
only run with all my previous patches.
Arthur
On Tue, Jul 16, 2013 at 11:58 PM, Arthur Chunqi Li yzt...@gmail.com wrote:
These two patches are focued on providing a basic version of VMX nested
test suite. This commit provides the
On Tue, Jul 16, 2013 at 05:48:52PM +0200, Peter Zijlstra wrote:
On Tue, Jul 16, 2013 at 09:02:15AM +0300, Gleb Natapov wrote:
BTW can NMI handler take spinlocks?
No -- that is, yes you can using trylock, but you still shouldn't.
Great news for this code. Thanks.
--
On Tue, Jul 16, 2013 at 11:29:20PM +0800, Arthur Chunqi Li wrote:
On Tue, Jul 16, 2013 at 11:20 PM, Gleb Natapov g...@redhat.com wrote:
On Tue, Jul 16, 2013 at 12:28:05PM +0200, Paolo Bonzini wrote:
+void vmx_exit(void)
+{
+ test_vmxoff();
+ printf(\nSUMMARY: %d tests, %d
On Wed, Jul 17, 2013 at 12:45 AM, Gleb Natapov g...@redhat.com wrote:
On Tue, Jul 16, 2013 at 11:29:20PM +0800, Arthur Chunqi Li wrote:
On Tue, Jul 16, 2013 at 11:20 PM, Gleb Natapov g...@redhat.com wrote:
On Tue, Jul 16, 2013 at 12:28:05PM +0200, Paolo Bonzini wrote:
+void vmx_exit(void)
Il 16/07/2013 19:13, Arthur Chunqi Li ha scritto:
On Wed, Jul 17, 2013 at 12:45 AM, Gleb Natapov g...@redhat.com wrote:
On Tue, Jul 16, 2013 at 11:29:20PM +0800, Arthur Chunqi Li wrote:
On Tue, Jul 16, 2013 at 11:20 PM, Gleb Natapov g...@redhat.com wrote:
On Tue, Jul 16, 2013 at 12:28:05PM
On Wed, Jul 17, 2013 at 01:13:56AM +0800, Arthur Chunqi Li wrote:
On Wed, Jul 17, 2013 at 12:45 AM, Gleb Natapov g...@redhat.com wrote:
On Tue, Jul 16, 2013 at 11:29:20PM +0800, Arthur Chunqi Li wrote:
On Tue, Jul 16, 2013 at 11:20 PM, Gleb Natapov g...@redhat.com wrote:
On Tue, Jul 16,
On 07/15/2013 09:16 PM, Gleb Natapov wrote:
On Mon, Jul 15, 2013 at 09:06:13PM +0530, Raghavendra K T wrote:
On 07/14/2013 06:54 PM, Gleb Natapov wrote:
On Mon, Jun 24, 2013 at 06:13:53PM +0530, Raghavendra K T wrote:
Simplify kvm_for_each_vcpu with kvm_irq_delivery_to_apic
From: Raghavendra
On 07/16/2013 11:32 AM, Gleb Natapov wrote:
On Tue, Jul 16, 2013 at 09:07:53AM +0530, Raghavendra K T wrote:
On 07/15/2013 04:06 PM, Gleb Natapov wrote:
On Mon, Jul 15, 2013 at 03:20:06PM +0530, Raghavendra K T wrote:
On 07/14/2013 06:42 PM, Gleb Natapov wrote:
On Mon, Jun 24, 2013 at
On 07/16/2013 09:18 PM, Peter Zijlstra wrote:
On Tue, Jul 16, 2013 at 09:02:15AM +0300, Gleb Natapov wrote:
BTW can NMI handler take spinlocks?
No -- that is, yes you can using trylock, but you still shouldn't.
Thanks Peter for the clarification.
I had started checking few of nmi handlers
-Original Message-
From: Wood Scott-B07421
Sent: Wednesday, July 03, 2013 5:32 PM
To: Yoder Stuart-B08248
Cc: Alex Williamson; Alexander Graf; Wood Scott-B07421; Bhushan
Bharat-R65777; Sethi Varun-B16395;
virtualizat...@lists.linux-foundation.org; Antonios Motakis;
(sorry for the delayed response, but I've been on PTO)
1. VFIO_GROUP_GET_DEVICE_FD
User space knows by out-of-band means which device it is accessing
and will call VFIO_GROUP_GET_DEVICE_FD passing a specific sysfs path
to get the device information:
fd = ioctl(group,
On 07/16/2013 04:51:12 PM, Yoder Stuart-B08248 wrote:
3. VFIO_DEVICE_GET_REGION_INFO
No changes needed, except perhaps adding a new flag. Freescale
has some
devices with regions that must be mapped cacheable.
While I don't object to making the information available to the
-Original Message-
From: Wood Scott-B07421
Sent: Tuesday, July 16, 2013 5:01 PM
To: Yoder Stuart-B08248
Cc: Wood Scott-B07421; Alex Williamson; Alexander Graf; Bhushan
Bharat-R65777; Sethi Varun-B16395;
virtualizat...@lists.linux-foundation.org; Antonios Motakis;
On 07/16/2013 05:41:04 PM, Yoder Stuart-B08248 wrote:
-Original Message-
From: Wood Scott-B07421
Sent: Tuesday, July 16, 2013 5:01 PM
To: Yoder Stuart-B08248
Cc: Wood Scott-B07421; Alex Williamson; Alexander Graf; Bhushan
Bharat-R65777; Sethi Varun-B16395;
On 07/16/2013 01:35:55 AM, Gleb Natapov wrote:
On Mon, Jul 15, 2013 at 01:17:33PM -0500, Scott Wood wrote:
On 07/15/2013 06:30:20 AM, Gleb Natapov wrote:
There is no much sense to share hypercalls between architectures.
There
is zero probability x86 will implement those for instance
This
On 16.07.2013, at 00:23, Scott Wood wrote:
On 07/15/2013 03:55:08 PM, Alexander Graf wrote:
On 15.07.2013, at 22:52, Scott Wood wrote:
On 07/15/2013 03:28:46 PM, Alexander Graf wrote:
On 15.07.2013, at 20:21, Scott Wood wrote:
On 07/15/2013 10:16:41 AM, Bhushan Bharat-R65777 wrote:
On 07/16/2013 06:21:51 PM, Alexander Graf wrote:
On 16.07.2013, at 00:23, Scott Wood wrote:
Still, I'm not sure what sort of error you're thinking of. If the
guest didn't support the hcall mechanism we would have returned from
the function by that point. In fact, seeing kvm,has-reset on
On 07/16/2013 06:26:40 PM, Scott Wood wrote:
On 07/16/2013 06:21:51 PM, Alexander Graf wrote:
On 16.07.2013, at 00:23, Scott Wood wrote:
Still, I'm not sure what sort of error you're thinking of. If the
guest didn't support the hcall mechanism we would have returned from
the function by
Linux Plumbers has approved an ACPI/PM, PCI microconference. The
overview page is here:
http://wiki.linuxplumbersconf.org/2013:pci_subsystem
We would like to start receiving volunteers for presenting topics of
interest. There is a lot of activity in these subsystems so please
respond by
thank you for the quick response alex,
but i still need your help ;)
i cloned both git trees
(http://lists.gnu.org/archive/html/qemu-devel/2013-05/msg00432.html)
that was the easy part for me (it boots like a charm ...) ... then i
built the qemu tree and found out
that it is just 1.4.50 and
On Mon, Jul 15, 2013 at 01:17:33PM -0500, Scott Wood wrote:
On 07/15/2013 06:30:20 AM, Gleb Natapov wrote:
On Mon, Jul 15, 2013 at 04:41:17PM +0530, Bharat Bhushan wrote:
KVM_HC_VM_RESET: Requests that the virtual machine be reset.
KVM_HC_VM_SHUTDOWN: Requests that the virtual machine be
-Original Message-
From: Mario Smarduch [mailto:mario.smard...@huawei.com]
Sent: Thursday, July 04, 2013 9:45 AM
To: Yoder Stuart-B08248
Cc: Alex Williamson; Alexander Graf; Wood Scott-B07421; k...@vger.kernel.org
list; Bhushan Bharat-R65777;
kvm-ppc@vger.kernel.org;
-Original Message-
From: Wood Scott-B07421
Sent: Wednesday, July 03, 2013 5:32 PM
To: Yoder Stuart-B08248
Cc: Alex Williamson; Alexander Graf; Wood Scott-B07421; Bhushan
Bharat-R65777; Sethi Varun-B16395;
virtualizat...@lists.linux-foundation.org; Antonios Motakis;
(sorry for the delayed response, but I've been on PTO)
1. VFIO_GROUP_GET_DEVICE_FD
User space knows by out-of-band means which device it is accessing
and will call VFIO_GROUP_GET_DEVICE_FD passing a specific sysfs path
to get the device information:
fd = ioctl(group,
On 07/16/2013 04:51:12 PM, Yoder Stuart-B08248 wrote:
3. VFIO_DEVICE_GET_REGION_INFO
No changes needed, except perhaps adding a new flag. Freescale
has some
devices with regions that must be mapped cacheable.
While I don't object to making the information available to the
-Original Message-
From: Wood Scott-B07421
Sent: Tuesday, July 16, 2013 5:01 PM
To: Yoder Stuart-B08248
Cc: Wood Scott-B07421; Alex Williamson; Alexander Graf; Bhushan
Bharat-R65777; Sethi Varun-B16395;
virtualizat...@lists.linux-foundation.org; Antonios Motakis;
On 07/16/2013 05:41:04 PM, Yoder Stuart-B08248 wrote:
-Original Message-
From: Wood Scott-B07421
Sent: Tuesday, July 16, 2013 5:01 PM
To: Yoder Stuart-B08248
Cc: Wood Scott-B07421; Alex Williamson; Alexander Graf; Bhushan
Bharat-R65777; Sethi Varun-B16395;
On 07/16/2013 01:35:55 AM, Gleb Natapov wrote:
On Mon, Jul 15, 2013 at 01:17:33PM -0500, Scott Wood wrote:
On 07/15/2013 06:30:20 AM, Gleb Natapov wrote:
There is no much sense to share hypercalls between architectures.
There
is zero probability x86 will implement those for instance
This
On 16.07.2013, at 00:23, Scott Wood wrote:
On 07/15/2013 03:55:08 PM, Alexander Graf wrote:
On 15.07.2013, at 22:52, Scott Wood wrote:
On 07/15/2013 03:28:46 PM, Alexander Graf wrote:
On 15.07.2013, at 20:21, Scott Wood wrote:
On 07/15/2013 10:16:41 AM, Bhushan Bharat-R65777 wrote:
On 07/16/2013 06:21:51 PM, Alexander Graf wrote:
On 16.07.2013, at 00:23, Scott Wood wrote:
Still, I'm not sure what sort of error you're thinking of. If the
guest didn't support the hcall mechanism we would have returned from
the function by that point. In fact, seeing kvm,has-reset on
On 07/16/2013 06:26:40 PM, Scott Wood wrote:
On 07/16/2013 06:21:51 PM, Alexander Graf wrote:
On 16.07.2013, at 00:23, Scott Wood wrote:
Still, I'm not sure what sort of error you're thinking of. If the
guest didn't support the hcall mechanism we would have returned from
the function by
70 matches
Mail list logo