On Fri, Nov 28, 2014 at 4:10 AM, Michael S. Tsirkin m...@redhat.com
wrote:
We need to use bit 32 for virtio 1.0
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
drivers/vhost/vhost.h | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/vhost/vhost.h
On Fri, Nov 28, 2014 at 4:10 AM, Michael S. Tsirkin m...@redhat.com
wrote:
Add guest memory access wrappers to handle virtio endianness
conversions.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
drivers/vhost/vhost.h | 31 +++
1 file changed, 31
On Fri, Nov 28, 2014 at 4:10 AM, Michael S. Tsirkin m...@redhat.com
wrote:
vhost/net keeps a copy of some used ring but (ab)uses length
field for internal house-keeping. This works because
for tx used length is always 0.
Suppress sparse errors: we use native endian-ness internally but never
On Fri, Nov 28, 2014 at 4:10 AM, Michael S. Tsirkin m...@redhat.com
wrote:
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
drivers/vhost/net.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/drivers/vhost/net.c b/drivers/vhost/net.c
index cae22f9..1ac58d0 100644
Hi all,
On Thu, Nov 27, 2014 at 03:20:43PM +0800, Zhang Haoyu wrote:
I tested win-server-2008 with -cpu
core2duo,hv_spinlocks=0x,hv_relaxed,hv_time,
this problem still happened, about 200,000 vmexits per-second,
bringing very bad experience, just like being stuck.
Please upload a full
After commit, 1d7fe1d1, KVM: x86: support XSAVES usage in the host,
is introduced,
...
Building modules, stage 2.
MODPOST 20 modules
ERROR: get_xsave_addr [arch/x86/kvm/kvm.ko] undefined!
make[1]: *** [__modpost] Error 1
make: *** [modules] Error 2
so we need to export get_xsave_addr()
On Thu, 27 Nov 2014 18:35:40 +0200
Michael S. Tsirkin m...@redhat.com wrote:
On Thu, Nov 27, 2014 at 05:28:42PM +0100, Cornelia Huck wrote:
On Thu, 27 Nov 2014 18:18:25 +0200
Michael S. Tsirkin m...@redhat.com wrote:
On Thu, Nov 27, 2014 at 05:06:51PM +0100, Cornelia Huck wrote:
On Thu, 27 Nov 2014 18:38:59 +0200
Michael S. Tsirkin m...@redhat.com wrote:
Also, let's focus on one device, e.g. -net for now.
Yes, I'm currently looking at net.
Then probably virtio scsi.
That's because blk needs to be reworked to support ANY_LAYOUT.
I had focused on blk because that's
Hi all,
On Thu, Nov 27, 2014 at 03:20:43PM +0800, Zhang Haoyu wrote:
I tested win-server-2008 with -cpu
core2duo,hv_spinlocks=0x,hv_relaxed,hv_time,
this problem still happened, about 200,000 vmexits per-second,
bringing very bad experience, just like being stuck.
Please upload a full
Was able to test the patch, here is the result: I have not tested with
bigger VMs though. Results make it difficult to talk about any side
effect of
patch if any.
System 16 core 32cpu (+ht) sandybridge
with 4 guests of 16vcpu each
+---+---+---++---+
On 28/11/2014 10:28, Tiejun Chen wrote:
After commit, 1d7fe1d1, KVM: x86: support XSAVES usage in the host,
is introduced,
...
Building modules, stage 2.
MODPOST 20 modules
ERROR: get_xsave_addr [arch/x86/kvm/kvm.ko] undefined!
make[1]: *** [__modpost] Error 1
make: *** [modules]
Am 28.11.2014 um 11:08 schrieb Raghavendra KT:
Was able to test the patch, here is the result: I have not tested with
bigger VMs though. Results make it difficult to talk about any side
effect of
patch if any.
Thanks a log.
If our assumption is correct, then this patch should have no side
On 11/28/2014 04:28 PM, Christian Borntraeger wrote:
Am 28.11.2014 um 11:08 schrieb Raghavendra KT:
Was able to test the patch, here is the result: I have not tested with
bigger VMs though. Results make it difficult to talk about any side
effect of
patch if any.
Thanks a log.
If our
From: Jens Freimann jf...@linux.vnet.ibm.com
In preparation for the rework of the local interrupt injection code,
factor out injection routines from kvm_s390_inject_vcpu().
Signed-off-by: Jens Freimann jf...@linux.vnet.ibm.com
Reviewed-by: David Hildenbrand d...@linux.vnet.ibm.com
Signed-off-by:
From: Thomas Huth th...@linux.vnet.ibm.com
This patch includes two small fixes for the PFMF handler: First, the
start address for PFMF has to be masked according to the current
addressing mode, which is now done with kvm_s390_logical_to_effective().
Second, the protection exceptions have a lower
From: Jens Freimann jf...@linux.vnet.ibm.com
Get rid of open coded value for virtio and pfault completion interrupts.
Signed-off-by: Jens Freimann jf...@linux.vnet.ibm.com
Reviewed-by: David Hildenbrand d...@linux.vnet.ibm.com
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
---
From: Jens Freimann jf...@linux.vnet.ibm.com
Allow to specify CR14, logout area, external damage code
and failed storage address.
Since more then one machine check can be indicated to the guest at
a time we need to combine all indication bits with already pending
requests.
Signed-off-by: Jens
From: Jens Freimann jf...@linux.vnet.ibm.com
This patch adapts handling of local interrupts to be more compliant with
the z/Architecture Principles of Operation and introduces a data
structure
which allows more efficient handling of interrupts.
* get rid of li-active flag, use bitmap instead
*
From: Jens Freimann jf...@linux.vnet.ibm.com
Move delivery code for cpu-local interrupt from the huge do_deliver_interrupt()
to smaller functions which handle one type of interrupt.
Signed-off-by: Jens Freimann jf...@linux.vnet.ibm.com
Reviewed-by: David Hildenbrand d...@linux.vnet.ibm.com
From: Thomas Huth th...@linux.vnet.ibm.com
A couple of our interception handlers rewind the PSW to the beginning
of the instruction to run the intercepted instruction again during the
next SIE entry. This normally works fine, but there is also the
possibility that the instruction did not get run
/linux/kernel/git/kvms390/linux.git
tags/kvm-s390-next-20141128
for you to fetch changes up to fc2020cfe9f8102d17dad79ed96dc68a9d84b19e:
KVM: s390: allow injecting all kinds of machine checks (2014-11-28 13:59:05
+0100)
KVM: s390
When injecting a floating interrupt and no CPU is idle we
kick one CPU to do an external exit. In case of I/O we
should trigger an I/O exit instead. This does not matter
for Linux guests as external and I/O interrupts are
enabled/disabled at the same time, but play safe anyway.
The same holds
From: Jason J. Herne jjhe...@linux.vnet.ibm.com
Define get_guest_storage_key which can be used to get the value of a guest
storage key. This compliments the functionality provided by the helper function
set_guest_storage_key. Both functions are needed for live migration of s390
guests that use
From: Jens Freimann jf...@linux.vnet.ibm.com
Adds a bitmap to the vcpu structure which is used to keep track
of local pending interrupts. Also add enum with all interrupt
types sorted in order of priority (highest to lowest)
Signed-off-by: Jens Freimann jf...@linux.vnet.ibm.com
Reviewed-by:
From: David Hildenbrand d...@linux.vnet.ibm.com
The 32bit external interrupt parameter is only valid for timing-alert and
service-signal interrupts.
Signed-off-by: David Hildenbrand d...@linux.vnet.ibm.com
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
---
arch/s390/kvm/interrupt.c
On 28/11/2014 14:25, Christian Borntraeger wrote:
+static int __inject_prog_irq(struct kvm_vcpu *vcpu,
+ struct kvm_s390_interrupt_info *inti)
+{
Why the __s? :)
Paolo
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
On 28/11/2014 14:25, Christian Borntraeger wrote:
+static int __must_check __deliver_cpu_timer(struct kvm_vcpu *vcpu)
+{
+ int rc;
Same here...
Paolo
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info
On 28/11/2014 14:25, Christian Borntraeger wrote:
+struct kvm_s390_irq_payload {
+ struct kvm_s390_io_info io;
+ struct kvm_s390_ext_info ext;
+ struct kvm_s390_pgm_info pgm;
+ struct kvm_s390_emerg_info emerg;
+ struct kvm_s390_extcall_info extcall;
+ struct
)
are available in the git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux.git
tags/kvm-s390-next-20141128
for you to fetch changes up to fc2020cfe9f8102d17dad79ed96dc68a9d84b19e:
KVM: s390: allow injecting all kinds of machine checks (2014-11-28 13:59:05
+0100
On Thu, Nov 27, 2014 at 06:50:31PM +, Andrew Cooper wrote:
On 27/11/14 18:36, Luis R. Rodriguez wrote:
On Thu, Nov 27, 2014 at 07:36:31AM +0100, Juergen Gross wrote:
On 11/26/2014 11:26 PM, Luis R. Rodriguez wrote:
From: Luis R. Rodriguez mcg...@suse.com
Some folks had reported that
Hi,
I notice that Qemu supports dump virtual memory of Guest OS. As this
page suggests:
http://doc.opensuse.org/products/draft/SLES/SLES-kvm_sd_draft/cha.qemu.monitor.html
To save the content of the virtual machine memory to a disk or console
output, use the following commands:
Good questions.
One thing that prompted this code is the presence and proliferation of
architecture specific hypercalls in include/uapi/linux/kvm_para.h.
I'm not sure why the tree has continued on for as long as it has with
a list of reserved hypercall indices -- most of which are unused on
any
https://bugzilla.kernel.org/show_bug.cgi?id=88671
--- Comment #5 from Tom Stellard tstel...@gmail.com ---
Thanks for the tip about vfio-pci. I can now sometimes get two working guest
boots per host boot.
--
You are receiving this mail because:
You are watching the assignee of the bug.
--
To
https://bugzilla.kernel.org/show_bug.cgi?id=88671
Tom Stellard tstel...@gmail.com changed:
What|Removed |Added
Component|kvm |Video(DRI - non Intel)
https://bugzilla.kernel.org/show_bug.cgi?id=88671
Tom Stellard tstel...@gmail.com changed:
What|Removed |Added
Summary|BUG at |Radeon driver fails to
On 2014/11/25 5:26, Nikolay Nikolaev wrote:
In io_mem_abort remove the call to vgic_handle_mmio. The target is to have
a single MMIO handling path - that is through the kvm_io_bus_ API.
Register a kvm_io_device in kvm_vgic_init on the whole vGIC MMIO region.
Both read and write calls are
On 2014/11/25 5:27, Nikolay Nikolaev wrote:
This enables compilation of the eventfd feature on ARM.
Only enable on ARM? I think we should enable it on ARM64 as well because the
eventfd featrue is common for ARM32 and ARM64.
Thanks,
Shannon
Signed-off-by: Nikolay Nikolaev
37 matches
Mail list logo