On Mon, 27 Sep 2010 18:44:02 -0400
Lucas Meneghel Rodrigues l...@redhat.com wrote:
From: Amos Kong ak...@redhat.com
This is an enhancement of existed vlan test. Rename the vlan_tag.py
to vlan.py, it is more reasonable.
. Setup arp from /proc/sys/net/ipv4/conf/all/arp_ignore
. Multiple
now jumbo tests works fine, since we added a static arp entry
thanks
Pradeep
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
29.09.2010 23:26, Arjan Koers wrote:
On 2010-09-29 11:19, Michael Tokarev wrote:
29.09.2010 13:17, Michael Tokarev wrote:
[]
Avi, this is definitely a -stable material, for 2.6.32 (longterm
stable) and 2.6.35.
Er. Please excuse me for the misinformation. It is _not_ for 2.6.32
ofcourse.
On 09/30/2010 07:07 AM, Nicholas A. Bellinger wrote:
case 0x06: /* SDID */
-if ((val 0xf) != (s-ssid 0xf))
-BADF(Destination ID does not match SSID\n);
+/*
+ * This workaround is required by the SYM8XX.ADD driver for OS/2 Warp.
+ */
+if
On Mon, 27 Sep 2010 18:43:59 -0400
Lucas Meneghel Rodrigues l...@redhat.com wrote:
From: Amos Kong ak...@redhat.com
Test steps:
1. Get a new mac from pool, and the old mac addr of guest.
2. Execute the mac_change.sh in guest.
3. Relogin to guest and query the interfaces info by
Try this:
http://wiki.qemu.org/download/qemu-doc.html#vm_005fsnapshots
To list the snapshots in your QCOW2 image:
qemu-img snapshot -l myimage.qcow2
To revert the disk to a saved state:
qemu-img snapshot -a snapshot-name myimage.qcow2
Stefan
--
To unsubscribe from this list: send the line
Hi,
I am not sure what's really happening, but every few hours
(unpredictable) two virtual machines (Linux 2.6.32) start to generate
huge cpu loads. It looks like some kind of loop is unable to complete
or something...
So the idea is:
1. I have two linux 2.6.32 x64 (openvz, proxmox project)
On Mon, 27 Sep 2010 18:43:57 -0400
Lucas Meneghel Rodrigues l...@redhat.com wrote:
From: Amos Kong ak...@redhat.com
Use 'ping' to test send/recive multicat packets. Flood ping test is
also added. Limit guest network as 'bridge' mode, because multicast
packets could not be transmitted to
El 29/09/2010, a las 10:56, Sebastian Hetze escribió:
On Tue, Sep 28, 2010 at 10:27:18AM +0200, Inigo Losada wrote:
We are using pci passthrough with an SCSI Adapter card. The system is:
- O.S: Ubuntu 10.04.1 LTS
- KVM Packages:
kvm1:84+dfsg-0ubuntu16+0.12.3+noroms+0ubuntu9.2
30.09.2010 11:55, Michael Tokarev wrote:
29.09.2010 23:26, Arjan Koers wrote:
On 2010-09-29 11:19, Michael Tokarev wrote:
29.09.2010 13:17, Michael Tokarev wrote:
[]
Avi, this is definitely a -stable material, for 2.6.32 (longterm
stable) and 2.6.35.
Er. Please excuse me for the
Nicholas A. Bellinger wrote:
From: Nicholas Bellinger n...@linux-iscsi.org
Greetings Paul, Jan, Kevin and co,
This series is against my v0.12.5 qemu-kvm.git that contains QEMU SCSI layer
SGL passthrough from Gerd Hoffman, 8708EM2 MegaSas emulation from Dr. Hannes
Reinecke, and well as my
We provide an zero-copy method which driver side may get external
buffers to DMA. Here external means driver don't use kernel space
to allocate skb buffers. Currently the external buffer can be from
guest virtio-net driver.
The idea is simple, just to pin the guest VM user space and then
let host
From: Xin Xiaohui xiaohui@intel.com
Signed-off-by: Xin Xiaohui xiaohui@intel.com
Signed-off-by: Zhao Yu yzhao81...@gmail.com
Reviewed-by: Jeff Dike jd...@linux.intel.com
---
include/linux/skbuff.h |9 +
1 files changed, 9 insertions(+), 0 deletions(-)
diff --git
From: Xin Xiaohui xiaohui@intel.com
Add a structure in structure net_device, the new field is
named as mp_port. It's for mediate passthru (zero-copy).
It contains the capability for the net device driver,
a socket, and an external buffer creator, external means
skb buffer belongs to the
From: Xin Xiaohui xiaohui@intel.com
The external buffer owner can use the functions to get
the capability of the underlying NIC driver.
Signed-off-by: Xin Xiaohui xiaohui@intel.com
Signed-off-by: Zhao Yu yzhao...@gmail.com
Reviewed-by: Jeff Dike jd...@linux.intel.com
---
From: Xin Xiaohui xiaohui@intel.com
Signed-off-by: Xin Xiaohui xiaohui@intel.com
Signed-off-by: Zhao Yu yzhao81...@gmail.com
Reviewed-by: Jeff Dike jd...@linux.intel.com
---
include/linux/netdevice.h |5 +
1 files changed, 5 insertions(+), 0 deletions(-)
diff --git
From: Xin Xiaohui xiaohui@intel.com
Currently, it can get external buffers from mp device.
Signed-off-by: Xin Xiaohui xiaohui@intel.com
Signed-off-by: Zhao Yu yzhao81...@gmail.com
Reviewed-by: Jeff Dike jd...@linux.intel.com
---
net/core/skbuff.c | 27
From: Xin Xiaohui xiaohui@intel.com
Signed-off-by: Xin Xiaohui xiaohui@intel.com
Signed-off-by: Zhao Yu yzhao81...@gmail.com
Reviewed-by: Jeff Dike jd...@linux.intel.com
---
net/core/skbuff.c |6 ++
1 files changed, 6 insertions(+), 0 deletions(-)
diff --git
From: Xin Xiaohui xiaohui@intel.com
Signed-off-by: Xin Xiaohui xiaohui@intel.com
Signed-off-by: Zhao Yu yzhao81...@gmail.com
Reviewed-by: Jeff Dike jd...@linux.intel.com
---
include/linux/mpassthru.h | 26 ++
1 files changed, 26 insertions(+), 0 deletions(-)
From: Xin Xiaohui xiaohui@intel.com
The patch add mp(mediate passthru) device, which now
based on vhost-net backend driver and provides proto_ops
to send/receive guest buffers data from/to guest vitio-net
driver.
Signed-off-by: Xin Xiaohui xiaohui@intel.com
Signed-off-by: Zhao Yu
From: Xin Xiaohui xiaohui@intel.com
Signed-off-by: Xin Xiaohui xiaohui@intel.com
Reviewed-by: Jeff Dike jd...@linux.intel.com
---
drivers/vhost/Kconfig | 10 ++
drivers/vhost/Makefile |2 ++
2 files changed, 12 insertions(+), 0 deletions(-)
diff --git
From: Xin Xiaohui xiaohui@intel.com
The hook is called in netif_receive_skb().
Signed-off-by: Xin Xiaohui xiaohui@intel.com
Signed-off-by: Zhao Yu yzhao81...@gmail.com
Reviewed-by: Jeff Dike jd...@linux.intel.com
---
net/core/dev.c | 35 +++
1 files
From: Xin Xiaohui xiaohui@intel.com
The vhost-net backend now only supports synchronous send/recv
operations. The patch provides multiple submits and asynchronous
notifications. This is needed for zero-copy case.
Signed-off-by: Xin Xiaohui xiaohui@intel.com
---
drivers/vhost/net.c |
From: Xin Xiaohui xiaohui@intel.com
This example is made on ixgbe driver which using napi_gro_frags().
It can get buffers from guest side directly using netdev_alloc_page()
and release guest buffers using netdev_free_page().
---
drivers/net/ixgbe/ixgbe_main.c | 25
From: Xin Xiaohui xiaohui@intel.com
This example is made on ixgbe driver.
It provides API is_rx_buffer_mapped_as_page() to indicate
if the driver use napi_gro_frags() interface or not.
The example allocates 2 pages for DMA for one ring descriptor
using netdev_alloc_page(). When packets is
From: Xin Xiaohui xiaohui@intel.com
The patch add two ioctls for mp device.
One is for userspace to query how much memory locked to make mp device
run smoothly. Another one is for userspace to set how much meory locked
it really wants.
---
drivers/vhost/mpassthru.c | 109
On Sep 30, 2010, at 04:31 , Stefan Hajnoczi wrote:
Try this:
http://wiki.qemu.org/download/qemu-doc.html#vm_005fsnapshots
To list the snapshots in your QCOW2 image:
qemu-img snapshot -l myimage.qcow2
To revert the disk to a saved state:
qemu-img snapshot -a snapshot-name myimage.qcow2
Stefan
From: Xin Xiaohui xiaohui@intel.com
If the driver want to allocate external buffers,
then it can export it's capability, as the skb
buffer header length, the page length can be DMA, etc.
The external buffers owner may utilize this.
Signed-off-by: Xin Xiaohui xiaohui@intel.com
From: Xin Xiaohui xiaohui@intel.com
If buffer is external, then use the callback to destruct
buffers.
Signed-off-by: Xin Xiaohui xiaohui@intel.com
Signed-off-by: Zhao Yu yzhao81...@gmail.com
Reviewed-by: Jeff Dike jd...@linux.intel.com
---
include/linux/skbuff.h |
On 09/29/2010 11:59 PM, Michael Tokarev wrote:
30.09.2010 11:55, Michael Tokarev wrote:
29.09.2010 23:26, Arjan Koers wrote:
On 2010-09-29 11:19, Michael Tokarev wrote:
29.09.2010 13:17, Michael Tokarev wrote:
[]
Avi, this is definitely a -stable material,
Virtqueue notify is currently handled synchronously in userspace virtio.
This prevents the vcpu from executing guest code while hardware
emulation code handles the notify.
On systems that support KVM, the ioeventfd mechanism can be used to make
virtqueue notify a lightweight exit by deferring
Le jeudi 30 septembre 2010 à 22:04 +0800, xiaohui@intel.com a
écrit :
From: Xin Xiaohui xiaohui@intel.com
The hook is called in netif_receive_skb().
Signed-off-by: Xin Xiaohui xiaohui@intel.com
Signed-off-by: Zhao Yu yzhao81...@gmail.com
Reviewed-by: Jeff Dike
30.09.2010 17:54, Zachary Amsden wrote:
[]
The printk movement is just a bandaid patch, correct? Anything which
does printk before kvmclock is registered could trigger the same bug.
Well, I'd not say it's just a bandaid patch, it's real bug -- either
we can read kvmclock (so it's initialized),
On Thu, Sep 30, 2010 at 2:49 PM, Peter Doherty
dohe...@hkl.hms.harvard.edu wrote:
On Sep 30, 2010, at 04:31 , Stefan Hajnoczi wrote:
Try this:
http://wiki.qemu.org/download/qemu-doc.html#vm_005fsnapshots
To list the snapshots in your QCOW2 image:
qemu-img snapshot -l myimage.qcow2
To
On Wed, Sep 29, 2010 at 09:17:14AM +0800, Sheng Yang wrote:
+ else {
+ enable_irq(irq);
+ if (assigned_dev-guest_msix_entries[index].flags
+ KVM_ASSIGNED_MSIX_PENDING)
+ schedule_work(assigned_dev-interrupt_work);
+ }
On Tue, Sep 28, 2010 at 05:44:09PM +0800, Sheng Yang wrote:
Hi Avi Marcelo
This patchset would add emulation of MSI-X mask bit for assigned devices in
QEmu.
BTW: We are also purposed an acceleration of MSI-X mask bit for KVM - to get
it done in kernel. That's because sometime MSI-X mask
On 2010-09-30 17:32, Zachary Amsden wrote:
On 09/30/2010 05:12 AM, Michael Tokarev wrote:
30.09.2010 17:54, Zachary Amsden wrote:
[]
The printk movement is just a bandaid patch, correct? Anything which
does printk before kvmclock is registered could trigger the same bug.
Well,
On 2010-09-30 21:05, Marcelo Tosatti wrote:
Arjan, Michael, can you try the following:
From 3823c018162dc708b543cbdc680a4c7d63533fee Mon Sep 17 00:00:00 2001
From: Zachary Amsden zams...@redhat.com
Date: Sat, 29 May 2010 17:52:46 -1000
Subject: [KVM V2 04/25] Fix SVM VMCB reset
Cc: Avi
On Thu, 2010-09-30 at 10:07 +0200, Paolo Bonzini wrote:
On 09/30/2010 07:07 AM, Nicholas A. Bellinger wrote:
case 0x06: /* SDID */
-if ((val 0xf) != (s-ssid 0xf))
-BADF(Destination ID does not match SSID\n);
+/*
+ * This workaround is required
On Thu, 2010-09-30 at 15:23 +0200, Hannes Reinecke wrote:
Nicholas A. Bellinger wrote:
From: Nicholas Bellinger n...@linux-iscsi.org
Greetings Paul, Jan, Kevin and co,
This series is against my v0.12.5 qemu-kvm.git that contains QEMU SCSI layer
SGL passthrough from Gerd Hoffman,
Hi,
I noticed that the TSC handling code has recently changed, and since it
wasn't done correctly in the nested VMX patch, I wanted to take the opportunity
to fix it.
I looked at what nested SVM does about TSC, and most of it I think I
understand, but a couple of other things I don't understand.
30.09.2010 23:05, Marcelo Tosatti wrote:
[]
Arjan, Michael, can you try the following:
From 3823c018162dc708b543cbdc680a4c7d63533fee Mon Sep 17 00:00:00 2001
From: Zachary Amsden zams...@redhat.com
Date: Sat, 29 May 2010 17:52:46 -1000
Subject: [KVM V2 04/25] Fix SVM VMCB reset
Cc: Avi
01.10.2010 03:02, Michael Tokarev wrote:
30.09.2010 23:05, Marcelo Tosatti wrote:
[]
Arjan, Michael, can you try the following:
From 3823c018162dc708b543cbdc680a4c7d63533fee Mon Sep 17 00:00:00 2001
From: Zachary Amsden zams...@redhat.com
Date: Sat, 29 May 2010 17:52:46 -1000
Subject: [KVM
On Monday, September 27, 2010 04:54:21 am Michael S. Tsirkin wrote:
On Wed, Sep 22, 2010 at 02:18:24PM -0700, Tom Lyon wrote:
Signed-off-by: Tom Lyon p...@cisco.com
Some comments on the pci bits:
After going over them for the Nth time - something needs to be done
with the rvirt/write
Will be on leave during 10/01 ~ 10/07, and slow or no response to the comments.
Thanks
Xiaohui
-Original Message-
From: netdev-ow...@vger.kernel.org [mailto:netdev-ow...@vger.kernel.org] On
Behalf Of
xiaohui@intel.com
Sent: Thursday, September 30, 2010 10:04 PM
To:
On 09/30/2010 01:07 PM, Michael Tokarev wrote:
01.10.2010 03:02, Michael Tokarev wrote:
30.09.2010 23:05, Marcelo Tosatti wrote:
[]
Arjan, Michael, can you try the following:
From 3823c018162dc708b543cbdc680a4c7d63533fee Mon Sep 17 00:00:00 2001
From: Zachary
From: Max Asbock masb...@linux.vnet.ibm.com
Add command p2v to translate guest physical address to host virtual
address.
The p2v command provides one step in a chain of translations from
guest virtual to guest physical to host virtual to host physical. Host
physical is then used to inject a
On 09/30/2010 12:50 PM, Nadav Har'El wrote:
Hi,
I noticed that the TSC handling code has recently changed, and since it
wasn't done correctly in the nested VMX patch, I wanted to take the opportunity
to fix it.
I looked at what nested SVM does about TSC, and most of it I think I
understand,
This was preventing the guest from setting any bits in the
hardware MSR which aren't forced on, such as MSR[SPE].
Signed-off-by: Scott Wood scottw...@freescale.com
---
Saving/restoring of SPE registers appears to still be missing, though.
arch/powerpc/kvm/booke_interrupts.S |2 +-
1 files
It is not legal to call mutex_lock() with interrupts disabled.
This will assert with debug checks enabled.
If there's a real need to disable interrupts here, it could be done
after the mutex is acquired -- but I don't see why it's needed at all.
Signed-off-by: Scott Wood scottw...@freescale.com
On 30.09.2010, at 21:28, Scott Wood wrote:
It is not legal to call mutex_lock() with interrupts disabled.
This will assert with debug checks enabled.
If there's a real need to disable interrupts here, it could be done
after the mutex is acquired -- but I don't see why it's needed at all.
51 matches
Mail list logo