Il 04/03/2014 03:40, Ian Pilcher ha scritto:
Is this a known problem? I just tried using nested vmx for the first
time since upgrading my system from F19 (3.12.?? at the time) to F20,
and I cannot start any L2 guests. The L2 guest appears to hang almost
immediately after starting, consuming
On Tue, Mar 04, 2014 at 01:02:44AM +, Huangpeng (Peter) wrote:
But back to the options:
If the host has enough free memory to fork QEMU, a small helper process can
be used to save the copy-on-write memory snapshot (thanks to fork(2)
semantics). The hard part about the fork(2)
On Tue, 25 Feb 2014 18:25:15 +0100
Cornelia Huck cornelia.h...@de.ibm.com wrote:
Handle the new CCW_CMD_SET_IND_ADAPTER command enabling adapter interrupts
on guest request. When active, host-guest notifications will be handled
via global_indicator - queue indicators instead of queue
Il 04/03/2014 09:54, Stefan Hajnoczi ha scritto:
Is there any other proposals to implement vm-snapshot?
See the discussion by Paolo and Andrea about post-copy migration, which
adds kernel memory management features for tracking userspace page
faults. Perhaps you can use that infrastructure to
On 04/03/14 10:05, Cornelia Huck wrote:
On Tue, 25 Feb 2014 18:25:15 +0100
Cornelia Huck cornelia.h...@de.ibm.com wrote:
Handle the new CCW_CMD_SET_IND_ADAPTER command enabling adapter interrupts
on guest request. When active, host-guest notifications will be handled
via global_indicator -
On Tue, Mar 04, 2014 at 09:13:40AM +0100, Paolo Bonzini wrote:
Il 04/03/2014 03:40, Ian Pilcher ha scritto:
Is this a known problem? I just tried using nested vmx for the first
time since upgrading my system from F19 (3.12.?? at the time) to F20,
and I cannot start any L2 guests. The L2
On Tue, Mar 04, 2014 at 03:00:22PM +0530, Kashyap Chamarthy wrote:
On Tue, Mar 04, 2014 at 09:13:40AM +0100, Paolo Bonzini wrote:
Il 04/03/2014 03:40, Ian Pilcher ha scritto:
Is this a known problem? I just tried using nested vmx for the first
time since upgrading my system from F19
* Huangpeng (Peter) (peter.huangp...@huawei.com) wrote:
I think this is different in the same way that block-backup and
block-mirror are different. Huangpeng's proposal would let you make a
consistent snapshot of disks and RAM.
Right. Though the point isn't about consistency (doing
Hi there,
I have tried to log EPT construction status at VM startup, that is to
add some codes in function __direct_map (arch/x86/kvm/mmu.c).
__direct_map constructs the EPT paging structure when a guest page
firstly touched, and I can get related gfn and pfn here.
But I tracked a strange
On 2014-03-03 19:17, Stefan Priebe wrote:
Am 03.03.2014 17:36, schrieb Paolo Bonzini:
Il 28/02/2014 20:47, Stefan Priebe ha scritto:
Hello,
i got this stack trace multiple times while using a vanilla 3.10.32
kernel and already sent it to the list in december but got no replies.
Please
Am 04.03.2014 11:01, schrieb Jan Kiszka:
On 2014-03-03 19:17, Stefan Priebe wrote:
Am 03.03.2014 17:36, schrieb Paolo Bonzini:
Il 28/02/2014 20:47, Stefan Priebe ha scritto:
Hello,
i got this stack trace multiple times while using a vanilla 3.10.32
kernel and already sent it to the list in
On 2014-03-04 11:26, Stefan Priebe - Profihost AG wrote:
Am 04.03.2014 11:01, schrieb Jan Kiszka:
On 2014-03-03 19:17, Stefan Priebe wrote:
Am 03.03.2014 17:36, schrieb Paolo Bonzini:
Il 28/02/2014 20:47, Stefan Priebe ha scritto:
Hello,
i got this stack trace multiple times while using a
-20140304
for you to fetch changes up to 96b14536d935848cffd904f583f67c66169002d8:
virtio-ccw: virtio-ccw adapter interrupt support. (2014-03-04 10:41:04 +0100)
The pull target is kvm/queue.
this is the next round of patches
For migration/reset we want to expose the guest breaking event
address register to userspace. Lets use ONE_REG for that purpose.
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
Reviewed-by: Jason J. Herne jjhe...@linux.vnet.ibm.com
---
arch/s390/include/uapi/asm/kvm.h | 1 +
From: Jens Freimann jf...@linux.vnet.ibm.com
We can use kvm_get_vcpu() now and don't need the
local_int array in the floating_int struct anymore.
This also means we don't have to hold the float_int.lock
in some places.
Signed-off-by: Jens Freimann jf...@linux.vnet.ibm.com
Signed-off-by:
From: Cornelia Huck cornelia.h...@de.ibm.com
Implement the new CCW_CMD_SET_IND_ADAPTER command and try to enable
adapter interrupts for every device on the first startup. If the host
does not support adapter interrupts, fall back to normal I/O interrupts.
virtio-ccw adapter interrupts use the
From: Martin Schwidefsky schwidef...@de.ibm.com
Add airq_iv_alloc and airq_iv_free to allocate and free consecutive
ranges of irqs from the interrupt vector.
Signed-off-by: Martin Schwidefsky schwidef...@de.ibm.com
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
---
commit d208c79d63e06457eef077af770d23dc4cde4d43 (KVM: s390: Enable
the LPP facility for guests) enabled the LPP instruction for guests.
We should expose the program parameter as a pseudo register for
migration/reset etc. Lets also reset this value on initial CPU
reset.
Signed-off-by: Christian
From: Jens Freimann jf...@linux.vnet.ibm.com
We don't need to loop over all cpus to get the number of
vcpus. Let's use the available counter online_vcpus instead.
Signed-off-by: Jens Freimann jf...@linux.vnet.ibm.com
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
---
From: Thomas Huth th...@linux.vnet.ibm.com
When SIGP SET_PREFIX is called with an illegal CPU id, it must return
the condition code 3 (not operational) instead of 1. Also fixed the
order in which the checks are done - CC3 has a higher priority than CC1.
And while we're at it, this patch also get
From: Heinz Graalfs graa...@linux.vnet.ibm.com
The interrupt handler virtio_ccw_int_handler() using the vcdev pointer
is protected by the ccw_device lock. Resetting the pointer within the
ccw_device structure should be done when holding this lock.
Also resetting the vcdev pointer (under the
δΊ 2014/3/4 17:05, Paolo Bonzini ει:
Il 04/03/2014 09:54, Stefan Hajnoczi ha scritto:
Is there any other proposals to implement vm-snapshot?
See the discussion by Paolo and Andrea about post-copy migration, which
adds kernel memory management features for tracking userspace page
faults. Perhaps
/pub/scm/linux/kernel/git/kvms390/linux.git
tags/kvm-s390-20140304
for you to fetch changes up to 96b14536d935848cffd904f583f67c66169002d8:
virtio-ccw: virtio-ccw adapter interrupt support. (2014-03-04 10:41:04 +0100)
The pull target is kvm/queue
Il 28/02/2014 15:52, Marcelo Tosatti ha scritto:
On Fri, Feb 28, 2014 at 12:52:53PM +0100, Andrew Jones wrote:
This patch series addresses two issues with global clock updates.
The first fixes a bug found on hosts that have a tsc marked as
unstable. As global clock updates get triggered on
Juan Quintela quint...@redhat.com wrote:
Hi
Please, send any topic that you are interested in covering.
Agenda:
As there were no topics, we cancel it.
PD. Sorry for the last notice, I was on vacation and forgot :p
Thanks, Juan.
Call details:
09:00 AM to 10:00 AM EDT
Every two weeks
When the kernel is configured without CONFIG_KVM_ARM_VGIC, the
compilation process fails with :
arch/arm/kvm/arm.c: In function 'kvm_vm_ioctl_set_device_addr':
arch/arm/kvm/arm.c:797:3: error: implicit declaration of
function 'kvm_vgic_addr' [-Werror=implicit-function-declaration]
return
Il 04/03/2014 16:10, Michele Paolino ha scritto:
When the kernel is configured without CONFIG_KVM_ARM_VGIC, the
compilation process fails with :
arch/arm/kvm/arm.c: In function 'kvm_vm_ioctl_set_device_addr':
arch/arm/kvm/arm.c:797:3: error: implicit declaration of
function 'kvm_vgic_addr'
On 03/04/2014 03:30 AM, Kashyap Chamarthy wrote:
If you want to try, I made a Fedora Kernel scratch build (i.e. not
official) with fix Paolo pointed to below and this works for me:
http://koji.fedoraproject.org/koji/taskinfo?taskID=6577700
Works here. Thanks!
--
Hi List,
Could you please help me understand below variables ? i found
it in struct kvm_vcpu
char *host_fx_image;
char *guest_fx_image;
-Ratheesh
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More
Add a function to check if the eventfd capability is present in KVM in
the host kernel.
Signed-off-by: Antonios Motakis a.mota...@virtualopensystems.com
Signed-off-by: Nikolay Nikolaev n.nikol...@virtualopensystems.com
---
include/sysemu/kvm.h | 11 +++
kvm-all.c| 4
On Tue, 2014-03-04 at 10:30 +0800, Gavin Shan wrote:
On Mon, Mar 03, 2014 at 12:36:16PM -0700, Alex Williamson wrote:
On Mon, 2014-03-03 at 14:10 +0800, Gavin Shan wrote:
On Sun, Mar 02, 2014 at 09:49:49PM -0700, Alex Williamson wrote:
On Mon, 2014-03-03 at 14:51 +1100, Benjamin
Is there any other proposals to implement vm-snapshot?
See the discussion by Paolo and Andrea about post-copy migration, which adds
kernel memory management features for tracking userspace page faults.
Perhaps you can use that infrastructure to trap guest writes.
Stefan
I will look into
Good suggestion, The latest patches of post-copy seems updated 2 years
ago.
https://github.com/yamahata/qemu
I'm working on post-copy at the moment, using Andrea's kernel code, using bits
of Yamahata's code base as well; hopefully it won't be too long until we have
something to post.
any hint ? or clue ?
On Tue, Mar 4, 2014 at 11:35 PM, ratheesh kannoth
ratheesh@gmail.com wrote:
Hi List,
Could you please help me understand below variables ? i found
it in struct kvm_vcpu
char *host_fx_image;
char *guest_fx_image;
-Ratheesh
--
To
Hi, Andrea
Where can I get the dev-git-branch?
I can use it to try the snapshot prototype coding.
Thanks.
-Original Message-
From: Andrea Arcangeli [mailto:aarca...@redhat.com]
Sent: Tuesday, March 04, 2014 3:52 AM
To: Paolo Bonzini
Cc: Kevin Wolf; Stefan Hajnoczi; Huangpeng
https://bugzilla.kernel.org/show_bug.cgi?id=71521
Bug ID: 71521
Summary: Host call trace when create guest.
Product: Virtualization
Version: unspecified
Kernel Version: 3.14.0-rc1
Hardware: x86-64
OS: Linux
On Tue, Mar 4, 2014 at 10:27 AM, Marc Zyngier marc.zyng...@arm.com wrote:
Paolo, Gleb,
Please pull the following tag to get what we currently have queued for
3.15. This series fixes a number of issue we have with when the guest
runs with caches off.
Thanks,
M.
The following
On Wed, Mar 5, 2014 at 1:23 PM, Ming Lei ming@canonical.com wrote:
On Tue, Mar 4, 2014 at 10:27 AM, Marc Zyngier marc.zyng...@arm.com
Marc Zyngier (12):
arm64: KVM: force cache clean on page fault when caches are off
arm64: KVM: allows discrimination of AArch32 sysreg access
arm64:
38 matches
Mail list logo