On Tue, Sep 4, 2012 at 9:07 PM, Avi Kivity a...@redhat.com wrote:
On 08/24/2012 02:29 PM, Asias He wrote:
It is useful to run a X program in guest and display it on host.
1) Make host's x server listen to localhost:6000
host_shell$ socat -d -d TCP-LISTEN:6000,fork,bind=localhost \
Il 04/09/2012 22:11, Nicholas A. Bellinger ha scritto:
As tgt-tgt_lock is taken in virtscsi_queuecommand_multi() before the
atomic_inc_return(tgt-reqs) check, it seems like using atomic_dec() w/o
smp_mb__after_atomic_dec or tgt_lock access here is not using atomic.h
accessors properly, no..?
On Tue, Sep 04, 2012 at 05:13:25PM +0200, Cornelia Huck wrote:
Just some quick comments:
[...]
int kvm_s390_inject_program_int(struct kvm_vcpu *vcpu, u16 code)
{
struct kvm_s390_local_interrupt *li = vcpu-arch.local_int;
@@ -648,6 +747,12 @@ int kvm_s390_inject_vm(struct kvm *kvm,
On 09/04/2012 09:58 PM, Ross Boylan wrote:
On Tue, 2012-09-04 at 15:53 +0300, Avi Kivity wrote:
On 08/28/2012 11:26 PM, Ross Boylan wrote:
My vm launches with -hda /dev/turtle/VD0 -hdb /dev/turtle/VD1, where VD0
and VD1 are lvm logical volumes. I used lvextend to expand them, but
the VM,
On 09/04/2012 06:13 PM, Cornelia Huck wrote:
Add support for handling I/O interrupts (standard, subchannel-related
ones and rudimentary adapter interrupts).
The subchannel-identifying parameters are encoded into the interrupt
type.
I/O interrupts are floating, so they can't be injected on
On 09/04/2012 06:13 PM, Cornelia Huck wrote:
Hi,
here's the second revision of the virtual channel subsystem support for
s390.
I changed the representation of the channel subsystem, introducing channel
subsystem images, which brings it closer to the actual implementation. A
new ioctl for
On 09/05/2012 09:03 AM, Asias He wrote:
On Tue, Sep 4, 2012 at 9:07 PM, Avi Kivity a...@redhat.com wrote:
On 08/24/2012 02:29 PM, Asias He wrote:
It is useful to run a X program in guest and display it on host.
1) Make host's x server listen to localhost:6000
host_shell$ socat -d -d
On 08/24/2012 02:29 PM, Asias He wrote:
It is useful to run a X program in guest and display it on host.
1) Make host's x server listen to localhost:6000
host_shell$ socat -d -d TCP-LISTEN:6000,fork,bind=localhost \
UNIX-CONNECT:/tmp/.X11-unix/X0
2) Start the guest and run
* Pekka Enberg penb...@kernel.org wrote:
On 08/24/2012 02:29 PM, Asias He wrote:
It is useful to run a X program in guest and display it on host.
1) Make host's x server listen to localhost:6000
host_shell$ socat -d -d TCP-LISTEN:6000,fork,bind=localhost \
This is a generic interface to find out what you can use
KVM_GET_ONE_REG/KVM_SET_ONE_REG on. Archs need to define
KVM_HAVE_REG_LIST and then kvm_arch_num_regs() and
kvm_arch_copy_reg_indices() functions.
It's inspired by KVM_GET_MSR_INDEX_LIST, except it's a per-vcpu ioctl,
and uses 64-bit
Useful helper for getting length of register given id.
Signed-off-by: Rusty Russell rusty.russ...@linaro.org
---
include/linux/kvm.h |2 ++
1 file changed, 2 insertions(+)
diff --git a/include/linux/kvm.h b/include/linux/kvm.h
index d808694..8c3760e 100644
--- a/include/linux/kvm.h
+++
This is the generic part of the KVM_SET_ONE_REG/KVM_GET_ONE_REG
enhancements which ARM wants, rebased onto kvm/next.
Rusty Russell (3):
KVM: Move KVM_SET_ONE_REG/KVM_GET_ONE_REG to generic code.
KVM: Add KVM_REG_SIZE() helper.
KVM: Add KVM_VCPU_GET_REG_LIST/KVM_CAP_REG_LIST.
Avi has indicated that this is the future. For now, make it dependent on
KVM_HAVE_ONE_REG (and define that for PPC and S/390).
Signed-off-by: Rusty Russell rusty.russ...@linaro.org
---
arch/powerpc/include/asm/kvm_host.h |1 +
arch/powerpc/kvm/book3s_hv.c|4 ++--
Avi Kivity a...@redhat.com writes:
On 09/03/2012 03:33 PM, Rusty Russell wrote:
Avi Kivity a...@redhat.com writes:
On 09/01/2012 03:35 PM, Rusty Russell wrote:
Passing an address in a struct is pretty bad, since it involves
compatibility wrappers.
Right, some s390 thing.
Err, no, i386
Peter Maydell peter.mayd...@linaro.org writes:
On 1 September 2012 13:28, Rusty Russell ru...@rustcorp.com.au wrote:
Rusty Russell (8):
KVM: ARM: Fix walk_msrs()
KVM: Move KVM_SET_ONE_REG/KVM_GET_ONE_REG to generic code.
KVM: Add KVM_REG_SIZE() helper.
KVM: ARM: use
Christoffer Dall c.d...@virtualopensystems.com writes:
that's fine, but then the #define's shouldn't be called something with
COPROC in their names.
Sure, feel free to rename it. I failed to come up with a concise, clear
name, so coproc stuck.
Cheers,
Rusty.
--
To unsubscribe from this list:
On Wed, 05 Sep 2012 10:28:53 +0300
Avi Kivity a...@redhat.com wrote:
On 09/04/2012 06:13 PM, Cornelia Huck wrote:
Add support for handling I/O interrupts (standard, subchannel-related
ones and rudimentary adapter interrupts).
The subchannel-identifying parameters are encoded into the
On Thu, 30 Aug 2012 19:49:23 +0300
Michael S. Tsirkin m...@redhat.com wrote:
On Fri, Aug 31, 2012 at 01:09:56AM +0900, Takuya Yoshikawa wrote:
On Thu, 30 Aug 2012 16:21:31 +0300
Michael S. Tsirkin m...@redhat.com wrote:
+static u32 apic_read_reg(int reg_off, void *bitmap)
+{
This patch series is mostly about cleanups:
- Clean all the global variables we have to store configuration options.
- Remove externed config options between objects.
- Adding several exit routines to clean up on exit.
- Remove the global 'kvm' object.
- Contain arch specific init/exit calls
Move all the configurable options from global static variables to a
self-contained
structure.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/builtin-run.c| 310 +++--
tools/kvm/include/kvm/kvm-config.h | 53 +++
2 files changed,
Since we now store options in a struct, we should generate the command line
options
dynamically. This is a pre-requisite to the following patch moving the options
into struct kvm.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/builtin-run.c | 132
Move all the non-arch specific members into a generic struct, and the arch
specific
members into a arch specific kvm_arch. This prevents code duplication across
different
archs.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/include/kvm/kvm.h | 27
Remove some redundant members between struct kvm_config and struct kvm
since options are now contained within struct kvm.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/builtin-run.c | 2 --
tools/kvm/hw/rtc.c | 2 +-
tools/kvm/include/kvm/kvm.h | 3 ---
Contain the options within struct kvm itself. This way options are specific
to a given struct kvm and not just global.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/builtin-run.c | 273 +++-
tools/kvm/include/kvm/kvm.h | 7 +-
This config option was 'extern'ed between different objects. Clean it up
and move it into struct kvm_config.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/builtin-run.c| 3 +--
tools/kvm/include/kvm/kvm-config.h | 1 +
tools/kvm/ioport.c | 5 ++---
Support passing a private ptr to CALLBACK options. This will make it possible
assigning options into specific struct kvms by passing them directly to parsers.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/builtin-run.c | 13 +++--
This config option was 'extern'ed between different objects. Clean it up
and move it into struct kvm_config.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/builtin-run.c| 9 -
tools/kvm/hw/serial.c | 16 ++--
This config option was 'extern'ed between different objects. Clean it up
and move it into struct kvm_config.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/builtin-run.c| 3 +--
tools/kvm/include/kvm/kvm-config.h | 1 +
tools/kvm/mmio.c | 3 +--
3
Move io debug delay into kvm_config, the parser out of builtin-run into the
disk code
and make the init/exit functions match the rest of the code in style.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/builtin-run.c| 75 ++
This no longer has to be a global since we now have kvm_config.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/builtin-run.c| 31 +++
tools/kvm/include/kvm/kvm-config.h | 1 +
2 files changed, 16 insertions(+), 16 deletions(-)
diff
There's no reason the array of guest specific vcpus is global. Move it into
struct kvm.
Also split up arch specific vcpu init from the generic code and call it from
the kvm_cpu initializer.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/Makefile | 2 +-
Make the init and exit functions of the framebuffer similar to the rest
of the code.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/builtin-run.c | 6 --
tools/kvm/framebuffer.c | 6 --
tools/kvm/include/kvm/framebuffer.h | 4 ++--
3 files
Make the init and exit functions of the term code similar to the rest
of the code.
Also move in the pty parser into the term code out of builtin-run.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/builtin-run.c | 19 +--
tools/kvm/include/kvm/term.h | 6
Add an exit function for the threadpool which will stop all running threads in
the
pool. Also clean up the init code a bit.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/builtin-run.c| 11 ++-
tools/kvm/include/kvm/threadpool.h | 3 ++-
Make the timer init/exit follow the rest of the code, and move it out of
builtin-run.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/builtin-run.c | 12 ++--
tools/kvm/include/kvm/kvm.h | 4 ++--
tools/kvm/kvm.c | 23 +++
3 files
Make the init/exit of virtio-console self-contained, so the global init code
won't need to check if it was selected or not.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/builtin-run.c| 12 +---
tools/kvm/include/kvm/virtio-console.h | 3 ++-
Make the init/exit of virtio-rng self-contained, so the global init code
won't need to check if it was selected or not.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/builtin-run.c | 7 +--
tools/kvm/virtio/rng.c | 3 +++
2 files changed, 8 insertions(+), 2 deletions(-)
Make the init/exit of virtio-balloon self-contained, so the global init code
won't need to check if it was selected or not.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/builtin-run.c| 11 +--
tools/kvm/include/kvm/virtio-balloon.h | 3 ++-
Make the init/exit of virtio-net self-contained, so the global init code
won't need to check if it was selected or not.
This also moves the bulk of the net-specific initialization code, including
the parser, into virtio-net itself.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
Move all the kvm-ipc specific code into the relevant file, and modify
the ipc callback to pass a ptr to struct kvm as well.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/builtin-run.c | 122
tools/kvm/include/kvm/kvm-ipc.h | 8 +-
tools/kvm/kvm-ipc.c
Sort out the config initialization order so that configuration is fully
initialized
before init functions start running, and move the firmware initialization code
into
kvm.c.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/builtin-run.c| 122
RAM should be initialized as part of kvm__init, and not somewhere random in the
global
init code.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/builtin-run.c | 2 --
tools/kvm/kvm.c | 2 ++
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git
These should appear before running any init calls.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/builtin-run.c | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/tools/kvm/builtin-run.c b/tools/kvm/builtin-run.c
index f54a6c1..6e6fbf5 100644
---
Sort out init/exit calls, move parser into the 9p code and make sure
rootfs config is initialized before virtio-9p (or any other init func)
is called.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/builtin-run.c | 67 ++
Move ioport arch init into ioport init, which is the logical place for that
instead of a
random place in the global init code.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/builtin-run.c | 2 --
tools/kvm/ioport.c | 2 ++
2 files changed, 2 insertions(+), 2 deletions(-)
Switch to using init/exit calls instead of the repeating call blocks in
builtin-run.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/Makefile | 1 +
tools/kvm/builtin-run.c | 246 +---
tools/kvm/disk/core.c | 2 +
Move the vesa initialization logic into sdl__init() and vnc__init(), builtin-run
shouldn't have to know about the conditions for initializing vesa on it's own.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/builtin-run.c| 49 ++
This will help us get rid of the global kvm object.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/builtin-run.c | 10 --
tools/kvm/kvm.c | 1 +
2 files changed, 9 insertions(+), 2 deletions(-)
diff --git a/tools/kvm/builtin-run.c b/tools/kvm/builtin-run.c
This was ugly, and now we get rid of it.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/builtin-run.c| 48 +++---
tools/kvm/hw/i8042.c | 4 ++--
tools/kvm/hw/pci-shmem.c | 2 +-
tools/kvm/hw/rtc.c | 10
Make the init/exit of pci-shmem self-contained, so the global init code
won't need to check if it was selected or not.
Also move the parser out of builtin-run into the pci-shmem code.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/builtin-run.c | 134
On Wed, 5 Sep 2012 09:22:32 +0200
Heiko Carstens heiko.carst...@de.ibm.com wrote:
On Tue, Sep 04, 2012 at 05:13:25PM +0200, Cornelia Huck wrote:
Just some quick comments:
[...]
int kvm_s390_inject_program_int(struct kvm_vcpu *vcpu, u16 code)
{
struct kvm_s390_local_interrupt
On 5 September 2012 07:48, Rusty Russell ru...@rustcorp.com.au wrote:
Peter Maydell peter.mayd...@linaro.org writes:
This is a problem because it means userspace needs to know the
size of each register, and the kernel doesn't provide any way
to determine the size. This defeats the idea that
On Wed, Sep 5, 2012 at 4:00 PM, Pekka Enberg penb...@kernel.org wrote:
On 08/24/2012 02:29 PM, Asias He wrote:
It is useful to run a X program in guest and display it on host.
1) Make host's x server listen to localhost:6000
host_shell$ socat -d -d TCP-LISTEN:6000,fork,bind=localhost \
On Wed, Sep 5, 2012 at 4:09 PM, Ingo Molnar mi...@kernel.org wrote:
* Pekka Enberg penb...@kernel.org wrote:
On 08/24/2012 02:29 PM, Asias He wrote:
It is useful to run a X program in guest and display it on host.
1) Make host's x server listen to localhost:6000
host_shell$ socat -d
On Wed, Sep 5, 2012 at 3:56 PM, Avi Kivity a...@redhat.com wrote:
On 09/05/2012 09:03 AM, Asias He wrote:
On Tue, Sep 4, 2012 at 9:07 PM, Avi Kivity a...@redhat.com wrote:
On 08/24/2012 02:29 PM, Asias He wrote:
It is useful to run a X program in guest and display it on host.
1) Make host's
Certainly restart (shutting down qemu and restarting it, not a reset)
works, I thought you wanted online resize.
You can resize an lvm volume online without restarting the guest.
just use lvextend to extend you lvm volume
then use qmp block_resize command with the same size. (so the guest
On Wed, Sep 05, 2012 at 05:30:31PM +0900, Takuya Yoshikawa wrote:
On Thu, 30 Aug 2012 19:49:23 +0300
Michael S. Tsirkin m...@redhat.com wrote:
On Fri, Aug 31, 2012 at 01:09:56AM +0900, Takuya Yoshikawa wrote:
On Thu, 30 Aug 2012 16:21:31 +0300
Michael S. Tsirkin m...@redhat.com wrote:
Brian wrote:
On Tuesday, September 04, 2012 11:26:49 AM Lentes, Bernd wrote:
Hi,
i want to convert a sles 11 sp2 64bit system (running on
VMWare Server
1.09) to libvirt format. Host OS is SLES 11 SP2 64bit. I tried
virt-convert --os-variant=sles11 sles_11_vmx/ sles_11_kvm/ .
This
On 09/05/2012 12:19 PM, Asias He wrote:
On Wed, Sep 5, 2012 at 3:56 PM, Avi Kivity a...@redhat.com wrote:
On 09/05/2012 09:03 AM, Asias He wrote:
On Tue, Sep 4, 2012 at 9:07 PM, Avi Kivity a...@redhat.com wrote:
On 08/24/2012 02:29 PM, Asias He wrote:
It is useful to run a X program in guest
On Wed, Sep 5, 2012 at 11:31 AM, Sasha Levin levinsasha...@gmail.com wrote:
This patch series is mostly about cleanups:
- Clean all the global variables we have to store configuration options.
- Remove externed config options between objects.
- Adding several exit routines to clean up on
On Mon, Sep 03, 2012 at 10:40:40PM +0200, Stefan Weil wrote:
Report from smatch:
kvm-all.c:1373 kvm_init(135) warn:
variable dereferenced before check 's' (see line 1360)
's' cannot by NULL (it was alloced using g_malloc0), so there is no need
to check it here.
Signed-off-by: Stefan
On Wed, 5 Sep 2012 12:26:49 +0300
Michael S. Tsirkin m...@redhat.com wrote:
It's not guaranteed if another thread can modify the bitmap.
Is this the case here? If yes we need at least ACCESS_ONCE.
In this patch, using the wrapper function to read out a register
value forces compilers not to do
On 09/04/2012 03:51 PM, Mathias Krause wrote:
On Tue, Sep 4, 2012 at 2:13 PM, Avi Kivity a...@redhat.com wrote:
On 09/04/2012 03:09 PM, Avi Kivity wrote:
On 08/30/2012 02:30 AM, Mathias Krause wrote:
As the the compiler ensures that the memory operand is always aligned
to a 16 byte memory
On Wed, Sep 5, 2012 at 5:29 PM, Avi Kivity a...@redhat.com wrote:
On 09/05/2012 12:19 PM, Asias He wrote:
On Wed, Sep 5, 2012 at 3:56 PM, Avi Kivity a...@redhat.com wrote:
On 09/05/2012 09:03 AM, Asias He wrote:
On Tue, Sep 4, 2012 at 9:07 PM, Avi Kivity a...@redhat.com wrote:
On 08/24/2012
On Wed, Sep 05, 2012 at 06:40:26PM +0900, Takuya Yoshikawa wrote:
On Wed, 5 Sep 2012 12:26:49 +0300
Michael S. Tsirkin m...@redhat.com wrote:
It's not guaranteed if another thread can modify the bitmap.
Is this the case here? If yes we need at least ACCESS_ONCE.
In this patch, using the
On 09/05/2012 12:46 PM, Asias He wrote:
Ok. Then the socat command not only exposes the display to the guest,
but also to any local process with access to localhost:6000.
Yes. It is a trick for people with 'Xorg -nolisten tcp' enabled.
Which is hopefully everyone.
--
error compiling
On Wed, Sep 5, 2012 at 5:53 PM, Avi Kivity a...@redhat.com wrote:
On 09/05/2012 12:46 PM, Asias He wrote:
Ok. Then the socat command not only exposes the display to the guest,
but also to any local process with access to localhost:6000.
Yes. It is a trick for people with 'Xorg -nolisten
find_highest_vector() and count_vectors():
- Instead of using magic values, define and use proper macros.
find_highest_vector():
- Remove likely() which is there only for historical reasons and not
doing correct branch predictions anymore. Using such heuristics
to optimize this function
On Wed, Sep 05, 2012 at 07:30:01PM +0900, Takuya Yoshikawa wrote:
find_highest_vector() and count_vectors():
- Instead of using magic values, define and use proper macros.
find_highest_vector():
- Remove likely() which is there only for historical reasons and not
doing correct branch
On 09/05/2012 01:14 PM, Asias He wrote:
On Wed, Sep 5, 2012 at 5:53 PM, Avi Kivity a...@redhat.com wrote:
On 09/05/2012 12:46 PM, Asias He wrote:
Ok. Then the socat command not only exposes the display to the guest,
but also to any local process with access to localhost:6000.
Yes. It is a
On 09/05/2012 04:26 AM, Xudong Hao wrote:
Enable KVM FPU fully eager restore, if there is other FPU state which isn't
tracked by CR0.TS bit.
Changes from v1:
Expand KVM_XSTATE_LAZY to 64 bits before negating it.
Signed-off-by: Xudong Hao xudong@intel.com
---
On 09/04/2012 03:04 PM, Myklebust, Trond wrote:
On Tue, 2012-09-04 at 11:31 +0200, Andrew Holway wrote:
Hello.
# Avi Kivity avi(a)redhat recommended I copy kvm in on this. It would also
seem relevent to libvirt. #
I have a Centos 6.2 server and Centos 6.2 client.
[root@store ~]# cat
On 09/04/2012 09:41 PM, Michael S. Tsirkin wrote:
On Tue, Sep 04, 2012 at 07:34:19PM +0300, Avi Kivity wrote:
On 08/31/2012 12:56 PM, Michael S. Tsirkin wrote:
On Fri, Aug 31, 2012 at 11:36:07AM +0200, Sasha Levin wrote:
On 08/30/2012 03:38 PM, Michael S. Tsirkin wrote:
+static unsigned
On Wed, Sep 05, 2012 at 05:21:12PM +0300, Avi Kivity wrote:
On 09/04/2012 09:41 PM, Michael S. Tsirkin wrote:
On Tue, Sep 04, 2012 at 07:34:19PM +0300, Avi Kivity wrote:
On 08/31/2012 12:56 PM, Michael S. Tsirkin wrote:
On Fri, Aug 31, 2012 at 11:36:07AM +0200, Sasha Levin wrote:
On
On 08/22/2012 03:41 AM, Michael S. Tsirkin wrote:
I assumed you were pointing out the level vs edge interaction. If we
call that a userspace bug, I can just drop this. Thanks,
Alex
level is userspace bug I think :)
I don't see how it's a bug. Suppose we have a vfio device that shares
On 08/21/2012 10:28 PM, Alex Williamson wrote:
Here's the much anticipated re-write of support for level irqfds. As
Michael suggested, I've rolled the eoi/ack notification fd into
KVM_IRQFD as a new mode. For lack of a better name, as there seems to
be objections to associating this
On 08/21/2012 10:29 PM, Alex Williamson wrote:
KVM_IRQFD currently uses the reserved KVM_USERSPACE_IRQ_SOURCE_ID
which is also shared with userspace injection methods like
KVM_IRQ_LINE. This can cause a conflict if an irqfd triggers on
a GSI asserted through KVM_IRQ_LINE. Move irqfd to it's
On Wed, Sep 05, 2012 at 05:35:43PM +0300, Avi Kivity wrote:
On 08/22/2012 03:41 AM, Michael S. Tsirkin wrote:
I assumed you were pointing out the level vs edge interaction. If we
call that a userspace bug, I can just drop this. Thanks,
Alex
level is userspace bug I think :)
On Wed, Sep 05, 2012 at 05:42:38PM +0300, Avi Kivity wrote:
On 08/21/2012 10:28 PM, Alex Williamson wrote:
Here's the much anticipated re-write of support for level irqfds. As
Michael suggested, I've rolled the eoi/ack notification fd into
KVM_IRQFD as a new mode. For lack of a better
On 08/21/2012 10:29 PM, Alex Williamson wrote:
For VFIO based device assignment we'd like a mechanism to allow level
triggered interrutps to be directly injected into KVM. KVM_IRQFD
already allows this for edge triggered interrupts, but for level, we
need to watch for acknowledgement of the
On 09/05/2012 05:51 PM, Michael S. Tsirkin wrote:
On Wed, Sep 05, 2012 at 05:35:43PM +0300, Avi Kivity wrote:
On 08/22/2012 03:41 AM, Michael S. Tsirkin wrote:
I assumed you were pointing out the level vs edge interaction. If we
call that a userspace bug, I can just drop this. Thanks,
On Wed, Sep 05, 2012 at 05:46:17PM +0300, Avi Kivity wrote:
On 08/21/2012 10:29 PM, Alex Williamson wrote:
KVM_IRQFD currently uses the reserved KVM_USERSPACE_IRQ_SOURCE_ID
which is also shared with userspace injection methods like
KVM_IRQ_LINE. This can cause a conflict if an irqfd
On Wed, Sep 05, 2012 at 05:51:53PM +0300, Michael S. Tsirkin wrote:
On Wed, Sep 05, 2012 at 05:35:43PM +0300, Avi Kivity wrote:
On 08/22/2012 03:41 AM, Michael S. Tsirkin wrote:
I assumed you were pointing out the level vs edge interaction. If we
call that a userspace bug, I can just
On 09/05/2012 06:09 PM, Michael S. Tsirkin wrote:
On Wed, Sep 05, 2012 at 05:51:53PM +0300, Michael S. Tsirkin wrote:
On Wed, Sep 05, 2012 at 05:35:43PM +0300, Avi Kivity wrote:
On 08/22/2012 03:41 AM, Michael S. Tsirkin wrote:
I assumed you were pointing out the level vs edge
On Wed, Sep 05, 2012 at 05:59:46PM +0300, Avi Kivity wrote:
On 09/05/2012 05:51 PM, Michael S. Tsirkin wrote:
On Wed, Sep 05, 2012 at 05:35:43PM +0300, Avi Kivity wrote:
On 08/22/2012 03:41 AM, Michael S. Tsirkin wrote:
I assumed you were pointing out the level vs edge interaction. If
On Wed, Sep 05, 2012 at 06:12:04PM +0300, Avi Kivity wrote:
On 09/05/2012 06:09 PM, Michael S. Tsirkin wrote:
On Wed, Sep 05, 2012 at 05:51:53PM +0300, Michael S. Tsirkin wrote:
On Wed, Sep 05, 2012 at 05:35:43PM +0300, Avi Kivity wrote:
On 08/22/2012 03:41 AM, Michael S. Tsirkin wrote:
On 09/05/2012 06:07 PM, Michael S. Tsirkin wrote:
On Wed, Sep 05, 2012 at 05:46:17PM +0300, Avi Kivity wrote:
On 08/21/2012 10:29 PM, Alex Williamson wrote:
KVM_IRQFD currently uses the reserved KVM_USERSPACE_IRQ_SOURCE_ID
which is also shared with userspace injection methods like
On 09/05/2012 06:13 PM, Michael S. Tsirkin wrote:
On Wed, Sep 05, 2012 at 05:59:46PM +0300, Avi Kivity wrote:
On 09/05/2012 05:51 PM, Michael S. Tsirkin wrote:
On Wed, Sep 05, 2012 at 05:35:43PM +0300, Avi Kivity wrote:
On 08/22/2012 03:41 AM, Michael S. Tsirkin wrote:
I assumed you
On Wed, Sep 05, 2012 at 06:22:57PM +0300, Avi Kivity wrote:
On 09/05/2012 06:13 PM, Michael S. Tsirkin wrote:
On Wed, Sep 05, 2012 at 05:59:46PM +0300, Avi Kivity wrote:
On 09/05/2012 05:51 PM, Michael S. Tsirkin wrote:
On Wed, Sep 05, 2012 at 05:35:43PM +0300, Avi Kivity wrote:
On
On 09/05/2012 12:00 AM, Anthony Liguori wrote:
Why? The way this is being submitted I don't see why we should treat
Jan's patch any different from a patch by IBM or Samsung where we've
asked folks to fix the license to comply with what I thought was our new
policy (it does not even contain a
On Wed, Sep 05, 2012 at 06:26:54PM +0300, Avi Kivity wrote:
On 09/05/2012 12:00 AM, Anthony Liguori wrote:
Why? The way this is being submitted I don't see why we should treat
Jan's patch any different from a patch by IBM or Samsung where we've
asked folks to fix the license to comply
On 09/05/2012 06:28 PM, Michael S. Tsirkin wrote:
gsi 3 is configured as edge in the ioapic. It has (unusually) two
inputs: one driven by userspace, the other by irqfd.
cpu 0cpu 1
-
irqfd: set to 1
ioapic: recognize
On 09/05/12 01:27, Gerd Hoffmann wrote:
On 09/02/12 22:42, Kevin O'Connor wrote:
On Tue, Aug 14, 2012 at 07:29:19AM +0200, Gerd Hoffmann wrote:
This patch makes seabios use the acpi pmtimer instead of tsc for
timekeeping. The pmtimer has a fixed frequency and doesn't need
calibration, thus it
Avi Kivity a...@redhat.com writes:
On 09/05/2012 12:00 AM, Anthony Liguori wrote:
Why? The way this is being submitted I don't see why we should treat
Jan's patch any different from a patch by IBM or Samsung where we've
asked folks to fix the license to comply with what I thought was our new
On 09/05/2012 06:41 PM, Anthony Liguori wrote:
Avi Kivity a...@redhat.com writes:
On 09/05/2012 12:00 AM, Anthony Liguori wrote:
Why? The way this is being submitted I don't see why we should treat
Jan's patch any different from a patch by IBM or Samsung where we've
asked folks to fix the
interrupt_bitmap is KVM_NR_INTERRUPTS bits in size,
so just use that instead of hard-coded constants
and math.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
arch/x86/kvm/x86.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
On Mon, Apr 30, 2012 at 05:38:35PM +0300, Michael S. Tsirkin wrote:
The following makes 'x86info -r' dump hypervisor leaf cpu ids
(for kvm this is signature+features) when running in a vm.
On the guest we see the signature and the features:
eax in: 0x4000, eax = ebx = 4b4d564b
virtio network device multiqueue support reserves
vq 3 for future use (useful both for future extensions and to make it
pretty - this way receive vqs have even and transmit - odd numbers).
Make it possible to skip initialization for
specific vq numbers by specifying NULL for name.
Document this
On Thu, Aug 30, 2012 at 03:20:35PM -0400, Don Slutz wrote:
This is primarily done so that the guest will think it is running
under vmware when hypervisor=vmware is specified as a property of a
cpu.
Also allow this to work in accel=tcg mode.
The new cpu properties hyper_level, hyper_extra,
On Wed, Sep 5, 2012 at 3:41 PM, Anthony Liguori anth...@codemonkey.ws wrote:
Avi Kivity a...@redhat.com writes:
On 09/05/2012 12:00 AM, Anthony Liguori wrote:
Why? The way this is being submitted I don't see why we should treat
Jan's patch any different from a patch by IBM or Samsung where
1 - 100 of 127 matches
Mail list logo