On Wed, Oct 31, 2012 at 01:16:56PM +0200, Avi Kivity wrote:
On 10/31/2012 12:58 PM, Stefan Hajnoczi wrote:
On Fri, Sep 21, 2012 at 1:17 PM, Vasilis Liaskovitis
vasilis.liaskovi...@profitbricks.com wrote:
This is v3 of the ACPI memory hotplug functionality. Only x86_64 target is
supported
Can it be reproduced if thp/hugetlbfs is disabled on both source and
destination?
Yes, the problem occurs even if thp/hugetlbfs is disabled.
Shota
-Original Message-
From: Xiao Guangrong [mailto:xiaoguangr...@linux.vnet.ibm.com]
Sent: Thursday, November 01, 2012 1:45 PM
To:
On Tue, Oct 30, 2012 at 04:26:33PM -0400, Prarit Bhargava wrote:
Debugging crash, panics, stack trace WARN_ONs, etc., from both virtual and
bare-metal boots can get difficult very quickly. While there are ways to
decipher the output and determine if the output is from a virtual guest,
the
On Wed, Oct 31, 2012 at 08:46:57PM -0200, Marcelo Tosatti wrote:
Otherwise its possible for an unrelated KVM_REQ_UPDATE_CLOCK (such as due to
CPU
migration) to clear the bit.
Noticed by Paolo Bonzini.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Reviewed-by: Gleb Natapov
On Wed, Oct 31, 2012 at 08:46:58PM -0200, Marcelo Tosatti wrote:
Originally from Jeremy Fitzhardinge.
pvclock_get_time_values, which contains the memory barriers
will be removed by next patch.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: vsyscall/arch/x86/kernel/pvclock.c
Hello.
On 31-10-2012 19:20, Sanjay Lal wrote:
Signed-off-by: Sanjay Lal sanj...@kymasys.com
---
arch/mips/include/asm/mmu_context.h | 6 ++
1 file changed, 6 insertions(+)
diff --git a/arch/mips/include/asm/mmu_context.h
b/arch/mips/include/asm/mmu_context.h
index 9b02cfb..9c7024c
Hello.
On 31-10-2012 19:20, Sanjay Lal wrote:
Signed-off-by: Sanjay Lal sanj...@kymasys.com
---
arch/mips/include/asm/stackframe.h | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/arch/mips/include/asm/stackframe.h
b/arch/mips/include/asm/stackframe.h
index
On 31-10-2012 19:20, Sanjay Lal wrote:
Signed-off-by: Sanjay Lal sanj...@kymasys.com
---
arch/mips/include/asm/stackframe.h | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/arch/mips/include/asm/stackframe.h
b/arch/mips/include/asm/stackframe.h
index
On 11/01/2012 02:46 AM, Marcelo Tosatti wrote:
Otherwise its possible for an unrelated KVM_REQ_UPDATE_CLOCK (such as due to
CPU
migration) to clear the bit.
Noticed by Paolo Bonzini.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: vsyscall/arch/x86/kvm/x86.c
On 11/01/2012 03:48 PM, Gleb Natapov wrote:
On Wed, Oct 31, 2012 at 08:46:58PM -0200, Marcelo Tosatti wrote:
Originally from Jeremy Fitzhardinge.
pvclock_get_time_values, which contains the memory barriers
will be removed by next patch.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
On Thu, Nov 01, 2012 at 05:49:51PM +0400, Glauber Costa wrote:
On 11/01/2012 03:48 PM, Gleb Natapov wrote:
On Wed, Oct 31, 2012 at 08:46:58PM -0200, Marcelo Tosatti wrote:
Originally from Jeremy Fitzhardinge.
pvclock_get_time_values, which contains the memory barriers
will be removed by
On 11/01/2012 02:46 AM, Marcelo Tosatti wrote:
Originally from Jeremy Fitzhardinge.
We can copy the information directly from struct pvclock_vcpu_time_info,
remove pvclock_shadow_time.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Reviewed-by: Glauber Costa glom...@parallels.com
--
On 11/01/2012 02:47 AM, Marcelo Tosatti wrote:
+static __always_inline
+unsigned __pvclock_read_cycles(const struct pvclock_vcpu_time_info *src,
+cycle_t *cycles, u8 *flags)
+{
+ unsigned version;
+ cycle_t ret, offset;
+ u8 ret_flags;
+
+
On 11/01/2012 02:47 AM, Marcelo Tosatti wrote:
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: vsyscall/arch/x86/kernel/pvclock.c
If you are resending this series, I don't see a reason for this one to
be in a separate patch.
code itself is fine.
--
To unsubscribe from this list:
On 11/01/2012 02:47 AM, Marcelo Tosatti wrote:
Originally from Jeremy Fitzhardinge.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Please collect peterz's ack for this one.
Index: vsyscall/include/linux/sched.h
===
---
On 11/01/2012 02:47 AM, Marcelo Tosatti wrote:
Originally from Jeremy Fitzhardinge.
Introduce generic, non hypervisor specific, pvclock initialization
routines.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: vsyscall/arch/x86/kernel/pvclock.c
On 11/01/2012 02:47 AM, Marcelo Tosatti wrote:
Allow a guest to register a second location for the VCPU time info
structure for each vcpu (as described by MSR_KVM_SYSTEM_TIME_NEW).
This is intended to allow the guest kernel to map this information
into a usermode accessible page, so that
On 11/01/2012 02:47 AM, Marcelo Tosatti wrote:
+#ifdef CONFIG_PARAVIRT_CLOCK
+
+static notrace const struct pvclock_vsyscall_time_info *get_pvti(int cpu)
+{
+ const aligned_pvti_t *pvti_base;
+ int idx = cpu / (PAGE_SIZE/PVTI_SIZE);
+ int offset = cpu % (PAGE_SIZE/PVTI_SIZE);
+
On 10/31/2012 05:17 PM, Sanjay Lal wrote:
The following patchset implements KVM support for MIPS32R2 processors,
using Trap Emulate, with basic runtime binary translation to improve
performance. The goal has been to keep the Guest kernel changes to a
minimum.
The patch is against Linux
On 10/31/2012 05:17 PM, Sanjay Lal wrote:
- Add the KVM option to MIPS build files.
- Add default config files for KVM host/guest kernels.
- Change the link address for the Malta KVM Guest kernel to UM (0x4010).
- Add KVM Kconfig file with KVM/MIPS specific options
index
On 10/31/2012 05:18 PM, Sanjay Lal wrote:
- Implements the arch specific APIs for KVM, some are stubs for MIPS
- kvm_mips_handle_exit(): Main 'C' distpatch routine for handling exceptions
while in Guest mode.
- Also implements in-kernel timer interrupt support for the guest.
+
+static
On 10/31/2012 05:19 PM, Sanjay Lal wrote:
Currently, the following instructions are translated:
- CACHE (indexed)
- CACHE (va based): translated to a synci, overkill on D-CACHE operations,
but still much faster than a trap.
- mfc0/mtc0: the virtual COP0 registers for the guest are
On 10/31/2012 05:18 PM, Sanjay Lal wrote:
Signed-off-by: Sanjay Lal sanj...@kymasys.com
---
arch/mips/include/asm/kvm.h | 58
arch/mips/include/asm/kvm_host.h | 672
+++
2 files changed, 730 insertions(+)
create mode 100644
From: Michael S. Tsirkin m...@redhat.com
Date: Wed, 31 Oct 2012 12:31:06 +0200
-void vhost_zerocopy_callback(struct ubuf_info *ubuf)
+void vhost_zerocopy_callback(struct ubuf_info *ubuf, int zerocopy_status)
If you're only reporting true/false values, even just for now,
please use 'bool' for
On Thu, Nov 01, 2012 at 11:50:24AM -0400, David Miller wrote:
From: Michael S. Tsirkin m...@redhat.com
Date: Wed, 31 Oct 2012 12:31:06 +0200
-void vhost_zerocopy_callback(struct ubuf_info *ubuf)
+void vhost_zerocopy_callback(struct ubuf_info *ubuf, int zerocopy_status)
If you're only
From: Michael S. Tsirkin m...@redhat.com
Date: Thu, 1 Nov 2012 18:16:11 +0200
Do you think it's over-engineering, or a good idea?
Engineer what you need, not what you might need.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
On 11/01/2012 08:04 AM, Avi Kivity wrote:
On 10/31/2012 05:18 PM, Sanjay Lal wrote:
Signed-off-by: Sanjay Lal sanj...@kymasys.com
---
arch/mips/include/asm/kvm.h | 58
arch/mips/include/asm/kvm_host.h | 672 +++
2 files changed, 730
tun supports zero copy transmit since 0690899b4d4501b3505be069b9a687e68ccbe15b,
however you can only enable this mode if you know your workload does not
trigger heavy guest to host/host to guest traffic - otherwise you
get a (minor) performance regression.
This patchset addresses this problem by
It seems that to avoid deadlocks it is enough to poll vq before
we are going to use the last buffer. This is faster than
c70aa540c7a9f67add11ad3161096fb95233aa2e.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
drivers/vhost/net.c | 14 --
1 file changed, 12 insertions(+), 2
Orphaning frags for zero copy skbs needs to allocate data in atomic
context so is has a chance to fail. If it does we currently discard
the skb which is safe, but we don't report anything to the caller,
so it can not recover by e.g. disabling zero copy.
Add an API to free skb reporting such
When tun transmits a zero copy skb, it orphans the frags
which might need to allocate extra memory, in atomic context.
If that fails, notify ubufs callback before freeing the skb
as a hint that device should disable zerocopy mode.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
Zerocopy handling code is vhost-net specific.
Move it from vhost.c/vhost.h out to net.c
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
drivers/vhost/net.c | 45
drivers/vhost/tcm_vhost.c | 1 +
drivers/vhost/vhost.c | 53
Even when vhost-net is in zero-copy transmit mode,
net core might still decide to copy the skb later
which is somewhat slower than a copy in user
context: data copy overhead is added to the cost of
page pin/unpin. The result is that enabling tx zero copy
option leads to higher CPU utilization for
Even if skb is marked for zero copy, net core might still decide
to copy it later which is somewhat slower than a copy in user context:
besides copying the data we need to pin/unpin the pages.
Add a parameter reporting such cases through zero copy callback:
if this happens a lot, device can take
Better document macros for DMA tracking. Add an
explicit one for DMA in progress instead of
relying on user supplying len != 1.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
drivers/vhost/net.c | 3 ++-
drivers/vhost/vhost.c | 2 +-
drivers/vhost/vhost.h | 12 +---
3 files
This will be used to disable zerocopy when error rate
is high.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
drivers/vhost/vhost.c | 7 ---
drivers/vhost/vhost.h | 4
2 files changed, 8 insertions(+), 3 deletions(-)
diff --git a/drivers/vhost/vhost.c b/drivers/vhost/vhost.c
Marcelo Tosatti mtosa...@redhat.com writes:
The following changes since commit aee0bf7d8d7564f8f2c40e4501695c492b7dd8d1:
tap-win32: stubs to fix win32 build (2012-10-30 19:18:53 +)
are available in the git repository at:
git://git.kernel.org/pub/scm/virt/kvm/qemu-kvm.git uq/master
On 10/30/2012 02:33 AM, Isaku Yamahata wrote:
Added -p option to migrate command for postcopy mode and
introduce postcopy parameter for migration to indicate that postcopy mode
is enabled.
Signed-off-by: Isaku Yamahata yamah...@valinux.co.jp
diff --git a/qapi-schema.json b/qapi-schema.json
On 10/30/2012 02:33 AM, Isaku Yamahata wrote:
This is for benchmark purpose
Signed-off-by: Isaku Yamahata yamah...@valinux.co.jp
+++ b/qapi-schema.json
@@ -2095,7 +2095,7 @@
##
{ 'command': 'migrate',
'data': {'uri': 'str', '*blk': 'bool', '*inc': 'bool', '*detach': 'bool' ,
-
On 10/30/2012 02:33 AM, Isaku Yamahata wrote:
When page is requested, send surrounding pages are also sent.
Signed-off-by: Isaku Yamahata yamah...@valinux.co.jp
---
hmp-commands.hx | 15 -
hmp.c|3 +++
migration-postcopy.c | 57
On 10/30/2012 02:33 AM, Isaku Yamahata wrote:
When movebg mode is enabled, the point to send background page is set
to the next page to on-demand page.
Signed-off-by: Isaku Yamahata yamah...@valinux.co.jp
+ -m for migratoin with postcopy mode enabled with moving position
On Thu, Nov 01, 2012 at 05:49:51PM +0400, Glauber Costa wrote:
On 11/01/2012 03:48 PM, Gleb Natapov wrote:
On Wed, Oct 31, 2012 at 08:46:58PM -0200, Marcelo Tosatti wrote:
Originally from Jeremy Fitzhardinge.
pvclock_get_time_values, which contains the memory barriers
will be removed by
On Thu, Nov 01, 2012 at 06:04:02PM +0400, Glauber Costa wrote:
On 11/01/2012 02:47 AM, Marcelo Tosatti wrote:
+static __always_inline
+unsigned __pvclock_read_cycles(const struct pvclock_vcpu_time_info *src,
+ cycle_t *cycles, u8 *flags)
+{
+ unsigned version;
On Thu, Nov 01, 2012 at 12:39:30PM +0200, Gleb Natapov wrote:
On Wed, Oct 31, 2012 at 08:46:57PM -0200, Marcelo Tosatti wrote:
Otherwise its possible for an unrelated KVM_REQ_UPDATE_CLOCK (such as due
to CPU
migration) to clear the bit.
Noticed by Paolo Bonzini.
Signed-off-by:
On 10/30/2012 02:33 AM, Isaku Yamahata wrote:
Precopy with this loop number before postcopy mode.
This will be implemented by the next patch.
Signed-off-by: Isaku Yamahata yamah...@valinux.co.jp
---
+++ b/qapi-schema.json
@@ -2089,6 +2089,8 @@
# @detach: this argument exists only for
On Thu, Nov 01, 2012 at 06:56:11PM -0200, Marcelo Tosatti wrote:
On Thu, Nov 01, 2012 at 05:49:51PM +0400, Glauber Costa wrote:
On 11/01/2012 03:48 PM, Gleb Natapov wrote:
On Wed, Oct 31, 2012 at 08:46:58PM -0200, Marcelo Tosatti wrote:
Originally from Jeremy Fitzhardinge.
On Fri, Nov 02, 2012 at 12:13:54AM +0200, Gleb Natapov wrote:
On Thu, Nov 01, 2012 at 06:56:11PM -0200, Marcelo Tosatti wrote:
On Thu, Nov 01, 2012 at 05:49:51PM +0400, Glauber Costa wrote:
On 11/01/2012 03:48 PM, Gleb Natapov wrote:
On Wed, Oct 31, 2012 at 08:46:58PM -0200, Marcelo
On Thu, Nov 01, 2012 at 06:07:45PM +0400, Glauber Costa wrote:
On 11/01/2012 02:47 AM, Marcelo Tosatti wrote:
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: vsyscall/arch/x86/kernel/pvclock.c
If you are resending this series, I don't see a reason for this one to
be in a
On Thu, Nov 01, 2012 at 06:41:46PM +0400, Glauber Costa wrote:
On 11/01/2012 02:47 AM, Marcelo Tosatti wrote:
+#ifdef CONFIG_PARAVIRT_CLOCK
+
+static notrace const struct pvclock_vsyscall_time_info *get_pvti(int cpu)
+{
+ const aligned_pvti_t *pvti_base;
+ int idx = cpu /
On Thu, Nov 01, 2012 at 06:28:31PM +0400, Glauber Costa wrote:
On 11/01/2012 02:47 AM, Marcelo Tosatti wrote:
Allow a guest to register a second location for the VCPU time info
structure for each vcpu (as described by MSR_KVM_SYSTEM_TIME_NEW).
This is intended to allow the guest kernel
Hi,
I have a question about the function of pvclock_get_nsec_offset().
static u64 pvclock_get_nsec_offset(struct pvclock_shadow_time *shadow)
{
u64 delta = native_read_tsc() - shadow-tsc_timestamp;
return pvclock_scale_delta(delta, shadow-tsc_to_nsec_mul,
On Thu, Nov 01, 2012 at 07:42:43PM -0200, Marcelo Tosatti wrote:
On Thu, Nov 01, 2012 at 06:41:46PM +0400, Glauber Costa wrote:
On 11/01/2012 02:47 AM, Marcelo Tosatti wrote:
+#ifdef CONFIG_PARAVIRT_CLOCK
+
+static notrace const struct pvclock_vsyscall_time_info *get_pvti(int cpu)
On Thu, Nov 01, 2012 at 02:10:45PM -0600, Eric Blake wrote:
On 10/30/2012 02:33 AM, Isaku Yamahata wrote:
When page is requested, send surrounding pages are also sent.
Signed-off-by: Isaku Yamahata yamah...@valinux.co.jp
---
hmp-commands.hx | 15 -
hmp.c
For 64 bit processor, emulate 40 bits physical address if the host physical
address space = 40bits, else guest physical is same as host.
Signed-off-by: Xudong Hao xudong@intel.com
---
target-i386/cpu.c |5 -
1 files changed, 4 insertions(+), 1 deletions(-)
diff --git
Enable 64 bits bar emulation.
Signed-off-by: Xudong Hao xudong@intel.com
---
hw/kvm/pci-assign.c | 18 --
1 files changed, 12 insertions(+), 6 deletions(-)
diff --git a/hw/kvm/pci-assign.c b/hw/kvm/pci-assign.c
index 05b93d9..f1f8d1e 100644
--- a/hw/kvm/pci-assign.c
+++
64 bit bar sizing and MMIO allocation. The 64 bit window is placed above high
memory, top down from the end of guest physical address space.
Signed-off-by: Xudong Hao xudong@intel.com
---
src/mtrr.c| 24 +-
src/pci.h |2 +-
src/pciinit.c | 99
56 matches
Mail list logo