On Tue, Oct 11, 2011 at 12:49 AM, Aneesh Kumar K.V
aneesh.ku...@linux.vnet.ibm.com wrote:
On Mon, 10 Oct 2011 22:05:21 +0530, Aneesh Kumar K.V
aneesh.ku...@linux.vnet.ibm.com wrote:
On Mon, 10 Oct 2011 18:30:28 +0800, Zhi Yong Wu wu...@linux.vnet.ibm.com
wrote:
qemu build break due to the
On 10/09/2011 08:52 PM, Vadim Rozenfeld wrote:
---
qemu-options.hx | 23 +++
vl.c|2 ++
2 files changed, 25 insertions(+), 0 deletions(-)
diff --git a/qemu-options.hx b/qemu-options.hx
index 3a13533..9f60059 100644
--- a/qemu-options.hx
+++
On 10/09/2011 08:52 PM, Vadim Rozenfeld wrote:
---
target-i386/kvm.c | 53 -
1 files changed, 52 insertions(+), 1 deletions(-)
diff --git a/target-i386/kvm.c b/target-i386/kvm.c
index 3840255..74fcc9a 100644
--- a/target-i386/kvm.c
+++
On 10/09/2011 08:52 PM, Vadim Rozenfeld wrote:
---
hyperv.c |3 +++
hyperv.h | 10 ++
Please move these to target-i386, and add a license header.
Also, I don't think it is necessary to add a new configure option; just
leave it enabled by default and add CONFIG_HYPERV=y to
On 10/11/2011 09:35 AM, Paolo Bonzini wrote:
I think these could be sub-options of -machine.
Oops, I obviously meant -cpu like Jan said.
Paolo
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
On 10/09/2011 09:37 PM, Avi Kivity wrote:
On 10/09/2011 02:24 PM, Avi Kivity wrote:
On 10/08/2011 06:06 AM, Xiao Guangrong wrote:
On 10/07/2011 01:53 AM, Marcelo Tosatti wrote:
On Thu, Sep 22, 2011 at 04:52:40PM +0800, Xiao Guangrong wrote:
This patchset is against
On 10/10/2011 05:46 PM, Eric B Munson wrote:
The kvm_host struct can include an mmu_notifier struct but mmu_notifier.h is
not included directly.
Thanks, applied. Is there a .config which causes this?
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this
Hi Ohad,
On Mon, Oct 10, 2011 at 01:02:46PM -0400, Ohad Ben-Cohen wrote:
On Mon, Oct 10, 2011 at 5:36 PM, Roedel, Joerg joerg.roe...@amd.com wrote:
Yes, somthing like that. Probably the iommu_ops-unmap function should
be turned into a unmap_page function call which only takes an iova and
On Mon, Oct 10, 2011 at 06:01:06PM -0400, Ohad Ben-Cohen wrote:
On Mon, Oct 10, 2011 at 5:36 PM, Roedel, Joerg joerg.roe...@amd.com wrote:
The master branch is best to base your patches on for generic work.
It looks like the master branch is missing something like this:
From
On Mon, Oct 10, 2011 at 06:49:32PM -0400, Ohad Ben-Cohen wrote:
-int iommu_unmap(struct iommu_domain *domain, unsigned long iova, int
gfp_order)
+int iommu_unmap(struct iommu_domain *domain, unsigned long iova, int size)
{
- size_t size;
+ int order, unmapped_size,
On 10/10/2011 01:35 PM, Juan Quintela wrote:
Hi
Please send in any agenda items you are interested in covering.
Planning the feature freeze:
- what is left to merge?
- test day?
Paolo
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
On 10/10/2011 01:35 PM, Juan Quintela wrote:
Hi
Please send in any agenda items you are interested in covering.
Subsections, version numbers, migration to older releases.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line
On 10/11/2011 06:36 AM, Paolo Bonzini wrote:
On 10/10/2011 01:35 PM, Juan Quintela wrote:
Hi
Please send in any agenda items you are interested in covering.
Planning the feature freeze:
- what is left to merge?
- test day?
Great topic. Just a reminder, we're looking at release dates
On 10/11/2011 06:48 AM, Avi Kivity wrote:
On 10/10/2011 01:35 PM, Juan Quintela wrote:
Hi
Please send in any agenda items you are interested in covering.
Subsections, version numbers, migration to older releases.
Problem with subsections:
The encoding of a subsection within an embedded
On Tue, 11 Oct 2011, Avi Kivity wrote:
On 10/10/2011 05:46 PM, Eric B Munson wrote:
The kvm_host struct can include an mmu_notifier struct but mmu_notifier.h is
not included directly.
Thanks, applied. Is there a .config which causes this?
--
error compiling committee.c: too many
On 10/11/2011 03:01 PM, Anthony Liguori wrote:
On 10/11/2011 06:48 AM, Avi Kivity wrote:
On 10/10/2011 01:35 PM, Juan Quintela wrote:
Hi
Please send in any agenda items you are interested in covering.
Subsections, version numbers, migration to older releases.
Problem with subsections:
On 10/11/2011 08:21 AM, Avi Kivity wrote:
On 10/11/2011 03:01 PM, Anthony Liguori wrote:
On 10/11/2011 06:48 AM, Avi Kivity wrote:
On 10/10/2011 01:35 PM, Juan Quintela wrote:
Hi
Please send in any agenda items you are interested in covering.
Subsections, version numbers, migration to
Avi Kivity a...@redhat.com wrote:
On 10/10/2011 01:35 PM, Juan Quintela wrote:
Hi
Please send in any agenda items you are interested in covering.
Subsections, version numbers, migration to older releases.
Subsections
---
- Current subsections are a mess (TM). The idea was to only
On Tue, 2011-10-11 at 09:38 +0200, Paolo Bonzini wrote:
On 10/09/2011 08:52 PM, Vadim Rozenfeld wrote:
---
target-i386/kvm.c | 53
-
1 files changed, 52 insertions(+), 1 deletions(-)
diff --git a/target-i386/kvm.c
On 10/11/2011 03:27 PM, Anthony Liguori wrote:
5) Implement subsections through the wire as top-level sections (as
originally intended). Keep existing subsections with (1).
That was (3).
Yes, sorry.
btw, it's reasonable to require that backwards migration is only to a
fully updated
On 10/11/2011 08:27 AM, Juan Quintela wrote:
Avi Kivitya...@redhat.com wrote:
On 10/10/2011 01:35 PM, Juan Quintela wrote:
Hi
Please send in any agenda items you are interested in covering.
Subsections, version numbers, migration to older releases.
Subsections
---
- Current
On 10/11/2011 08:47 AM, Avi Kivity wrote:
On 10/11/2011 03:27 PM, Anthony Liguori wrote:
5) Implement subsections through the wire as top-level sections (as
originally intended). Keep existing subsections with (1).
That was (3).
Yes, sorry.
btw, it's reasonable to require that
On 10/11/2011 03:57 PM, Anthony Liguori wrote:
What I'm trying to avoid is making choices today that close the door on
better fixes in the future.
I think Juan made a really good point in his earlier post. We need to
focus on better testing for migration. With a solid migration torture
On 10/11/2011 09:01 AM, Avi Kivity wrote:
On 10/11/2011 03:57 PM, Anthony Liguori wrote:
What I'm trying to avoid is making choices today that close the door on
better fixes in the future.
I think Juan made a really good point in his earlier post. We need to
focus on better testing for
On 10/11/2011 04:34 PM, Anthony Liguori wrote:
On 10/11/2011 09:01 AM, Avi Kivity wrote:
On 10/11/2011 03:57 PM, Anthony Liguori wrote:
What I'm trying to avoid is making choices today that close the
door on
better fixes in the future.
I think Juan made a really good point in his earlier
On Tue, Oct 11, 2011 at 7:49 AM, Ohad Ben-Cohen o...@wizery.com wrote:
int iommu_map(struct iommu_domain *domain, unsigned long iova,
- phys_addr_t paddr, int gfp_order, int prot)
+ phys_addr_t paddr, int size, int prot)
{
Even though it is not realistic that size
with 3.1.0-rc9-00020-g3ee72c I am getting:
[ 4420.437736] ===
[ 4420.437741] [ INFO: possible circular locking dependency detected ]
[ 4420.437744] 3.1.0-rc9-00020-g3ee72ca #1
[ 4420.437746]
On 10/11/2011 03:46 PM, Vadim Rozenfeld wrote:
These should not be KVM-specific. You should be able to add
enlightenments to a TCG VM. At the same time, the KVM leaves could be
moved to 0x4100 when enlightenments are active, similar to what Xen
does.
IMO, adding Hyper-V features
On 10/11/2011 09:54 AM, Anthony Liguori wrote:
On 10/11/2011 08:27 AM, Juan Quintela wrote:
I've been thinking about it this morning. I think it's solvable. We
need to be able to save off the qdev construction properties right
before init. This is just a matter of storing a list of
On Tue, 2011-10-11 at 17:52 +0200, Paolo Bonzini wrote:
On 10/11/2011 03:46 PM, Vadim Rozenfeld wrote:
These should not be KVM-specific. You should be able to add
enlightenments to a TCG VM. At the same time, the KVM leaves could be
moved to 0x4100 when enlightenments are
On 10/11/2011 06:09 PM, Vadim Rozenfeld wrote:
Spinlocks too. TCG does its own round-robin scheduling, so having zero
How? You need hypercall page for it.
I'm not saying you should implement it, :) in principle TCG could have a
hypercall page.
Paolo
--
To unsubscribe from this list: send
From: Kenji Kaneshige kaneshige.ke...@jp.fujitsu.com
Currently, NMI interrupt is blindly sent to all the vCPUs when NMI
button event happens. This doesn't properly emulate real hardware on
which NMI button event triggers LINT1. Because of this, NMI is sent to
the processor even when LINT1 is
On Tue, Oct 11, 2011 at 12:38 PM, Roedel, Joerg joerg.roe...@amd.com wrote:
You need to make sure that you don;t pass larger regions then requested
to the low-level driver. Some logic like in the iommu_map function
should do it.
You're right. But the solution IMHO should be getting rid of that
Synchronize newest kernel headers which have
KVM_CAP_IRQCHIP_LAPIC_NMI by
./scripts/update-linux-headers.sh
Signed-off-by: Lai Jiangshan la...@cn.fujitsu.com
---
linux-headers/asm|1 +
linux-headers/asm-powerpc/kvm.h | 19 +--
From: Kenji Kaneshige kaneshige.ke...@jp.fujitsu.com
Currently, NMI interrupt is blindly sent to all the vCPUs when NMI
button event happens. This doesn't properly emulate real hardware on
which NMI button event triggers LINT1. Because of this, NMI is sent to
the processor even when LINT1 is
Hi KyongHo,
On Tue, Oct 11, 2011 at 4:59 PM, KyongHo Cho pullip@samsung.com wrote:
I think the type of size should be size_t.
..
Thus, it should be
iommu_unmap(domain, orig_iova, orig_size - size)
Agree with both suggestions, thanks !
P.S - please only keep the parts of my email which
On Mon, Oct 10, 2011 at 7:37 AM, Lukáš Doktor ldok...@redhat.com wrote:
I thought about that. But pci_add is not much stable and it's not supported
in QMP (as far as I read) with a note that this way is buggy and should be
rewritten completely. So I placed it here to let it develop and then I
[ dropped unaffected seabios from CC ]
On 2011-10-11 19:00, Lai Jiangshan wrote:
From: Kenji Kaneshige kaneshige.ke...@jp.fujitsu.com
Currently, NMI interrupt is blindly sent to all the vCPUs when NMI
button event happens. This doesn't properly emulate real hardware on
which NMI button
On 2011-10-11 19:03, Lai Jiangshan wrote:
From: Kenji Kaneshige kaneshige.ke...@jp.fujitsu.com
Currently, NMI interrupt is blindly sent to all the vCPUs when NMI
button event happens. This doesn't properly emulate real hardware on
which NMI button event triggers LINT1. Because of this, NMI
To forward an interrupt to a vcpu that runs on
a host cpu different from the current one,
we need an ipi which likely will cost us as much
as delivering the interrupt directly to that cpu would.
So it seems to make sense to set irq affinity hint to point there, irq
balancer can then take this
Pass host irq number to functions that set guest irq.
If unavailable, pass -1.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
arch/x86/kvm/i8254.c |4 ++--
arch/x86/kvm/lapic.c |2 +-
arch/x86/kvm/x86.c |2 +-
include/linux/kvm_host.h |7 ---
To forward an interrupt to a vcpu that runs on
a host cpu different from the current one,
we need an ipi which likely will cost us as much
as delivering the interrupt directly to that cpu would.
Set irq affinity hint to point there, irq balancer
can then take this into accound and balance
On 10/07/2011 03:24 PM, Lukas Doktor wrote:
This is a patchset with four new tests to KVM specific cgroup testing. Also I
made some modifications into (general) cgroup_common library which makes cgroup
testing better readable and more safe to execute. Please find the details in
each patch.
Hi guys, this is an updated version of the Libvirt test.
Cleber has made some great work and fixed a bunch of
problems involving using libvirt Xen backend, and now
it is possible to run most of the autotest tests using
libvirt on both KVM and Xen backends.
This patchset was also sent as a pull
During the process of implementing the libvirt test,
we've noticed that the whole mechanism implemented
by the KVM test (subtest loader, use of env file, params)
could be turned into common infrastructure. So move
all implementation to a class called virt_test.
We believe most virt test classes
Signed-off-by: Lucas Meneghel Rodrigues l...@redhat.com
---
client/tests/kvm/tests/unattended_install.py | 632 --
client/virt/tests/unattended_install.py | 632 ++
2 files changed, 632 insertions(+), 632 deletions(-)
delete mode 100644
From: Cleber Rosa cr...@redhat.com
This patch adds support to unattended installs via libvirt+XEN and
serving installation content via the auto url feature (using a
builtin http server).
A sample configuration is provided to run a Fedora 15 64 bits PV
based test (libvirt_xenpv_f15_quick).
From: Cleber Rosa cr...@redhat.com
This adds a simple HTTP server that is good enought to support unattended
installs. Tested serving kickstart files and RHEL/Fedora content to
anaconda.
Signed-off-by: Cleber Rosa cr...@redhat.com
---
client/virt/virt_http_server.py | 124
From: Cleber Rosa cr...@redhat.com
This patchs adds proper detection of active (alive) XEN domains via libvirt;
a quick way to determine whether the current connected hypervisor is XEN or
QEMU/KVM and also deals with virt-install options and syntax supported on
RHEL 5 libvirt+XEN.
Signed-off-by:
This is an initial implementation for a libvirt monitor.
With it, we plan on making the libvirt test use all the
monitor features, making most of the tests available for
kvm available for libvirt.
As of implementation details, it uses aexpect to get a
virsh shell, and then the monitor methods are
With this patch, we make libvirt vm handling integrating
to pre/postprocessing code, making it possible the
execution of a libvirt test. The idea was to try
to abstract some concepts and intrude the least
possible in the pre/postprocessing code.
Signed-off-by: Lucas Meneghel Rodrigues
As most of the get_started.py code could be very well
shared among virt tests, moved the bulk of the code
to virt_utils.py. Now we have the function
virt_test_assistant(), that is generic enough so other
tests can implement their variation of the assistant
script.
Signed-off-by: Lucas Meneghel
This is a first attempt at providing a libvirt VM class,
in order to implement the needed methods for virt testing.
With this class, we will be able to implement a libvirt
test, that behaves similarly to the KVM test.
As of implementation details, libvirt_vm uses virsh
(a userspace program
Marcelo,
I just test guest migration from v13 to v12, it failed w/ info
savevm: unsupported version 13 for 'cpu' v12
load of migration failed
v13 is new qemu-kvm with tsc deadline timer co-work patch, v12 is old qemu-kvm.
Marcelo Tosatti wrote:
Jinsong, please test this qemu-kvm patch by
54 matches
Mail list logo