On Thu, Jun 17, 2010, Gleb Natapov wrote about Re: [PATCH 22/24] Correct
handling of idt vectoring info:
On Sun, Jun 13, 2010 at 03:33:50PM +0300, Nadav Har'El wrote:
In the normal non-nested case, the idt_vectoring_info case is treated after
the exit. However, in the nested case a decision
On Sun, Sep 19, 2010 at 05:57:25PM -0400, Kevin O'Connor wrote:
On Sun, Sep 19, 2010 at 06:24:33PM +0200, Conrad Wood wrote:
a script with my exact steps is below. Result is reproducible.
[...]
echo Ejecting CPU #4
echo cpu_set 4 offline | nc ${MONITORHOST} ${MONITORPORT} /dev/null
On Sun, Sep 19, 2010 at 06:03:31PM -0400, Kevin O'Connor wrote:
On Sun, Sep 19, 2010 at 06:12:14PM +0200, Gleb Natapov wrote:
On Sun, Sep 19, 2010 at 12:04:51PM -0400, Kevin O'Connor wrote:
I'm confused. The cpu_set x offline doesn't appear to do anything
for me. It does not disable the
On Sun, Sep 19, 2010 at 08:19:33PM +0200, Joerg Roedel wrote:
On Sun, Sep 19, 2010 at 07:50:27PM +0200, Gleb Natapov wrote:
On Sun, Sep 19, 2010 at 07:29:41PM +0200, Joerg Roedel wrote:
On Sun, Sep 19, 2010 at 06:41:27PM +0200, Gleb Natapov wrote:
Nested SVM checks for external interrupt
From: Xin Xiaohui xiaohui@intel.com
---
Michael,
I have move the ioctl to configure the locked memory to vhost and
check the limit with mm-locked_vm. please have a look.
Thanks
Xiaohui
drivers/vhost/mpassthru.c | 74 +--
drivers/vhost/net.c
Nested SVM checks for external interrupt after injecting nested exception.
In case there is external interrupt pending the code generates external
interrupt exit and overwrites previous exit info. If previously injected
exception already generated exit it will be lost.
Signed-off-by: Gleb Natapov
On Mon, Sep 20, 2010 at 04:15:32AM -0400, Gleb Natapov wrote:
Nested SVM checks for external interrupt after injecting nested exception.
In case there is external interrupt pending the code generates external
interrupt exit and overwrites previous exit info. If previously injected
exception
On Mon, Sep 20, 2010 at 08:37:04AM +0200, Nadav Har'El wrote:
Why can't you do that using existing exception/nmi/interrupt queues that
we have, but instead you effectively disable vmx_complete_interrupts()
by patch 18 when in nested mode and add logically same code in this
patch. I.e after
On 09/19/2010 04:33 PM, Avi Kivity wrote:
Override kvm_emulate_insn formatting to use a disassembler to format
the emulated instruction. If a disassembler (udis86) is not available,
fall back to showing the instruction bytes in hex.
Signed-off-by: Avi Kivitya...@redhat.com
---
Note 1: on top
On Mon, Sep 20, 2010, Gleb Natapov wrote about Re: [PATCH 22/24] Correct
handling of idt vectoring info:
But your code disables normal path even if L0 is the one who should
handle exit and re-inject event into L2. Look at what nested SVM is doing.
It is checking in handle_exit() if vmexit
On 09/20/2010 12:03 PM, Nadav Har'El wrote:
On Mon, Sep 20, 2010, Gleb Natapov wrote about Re: [PATCH 22/24] Correct handling
of idt vectoring info:
But your code disables normal path even if L0 is the one who should
handle exit and re-inject event into L2. Look at what nested SVM is
On Mon, Sep 20, 2010 at 12:03:40PM +0200, Nadav Har'El wrote:
On Mon, Sep 20, 2010, Gleb Natapov wrote about Re: [PATCH 22/24] Correct
handling of idt vectoring info:
But your code disables normal path even if L0 is the one who should
handle exit and re-inject event into L2. Look at what
No longer used.
Signed-off-by: Avi Kivity a...@redhat.com
---
qemu-kvm-helper.c | 35 ---
1 files changed, 0 insertions(+), 35 deletions(-)
delete mode 100644 qemu-kvm-helper.c
diff --git a/qemu-kvm-helper.c b/qemu-kvm-helper.c
deleted file mode 100644
index
No longer used.
Signed-off-by: Avi Kivity a...@redhat.com
---
v2: update Makefile
Makefile.target |1 -
qemu-kvm-helper.c | 35 ---
2 files changed, 0 insertions(+), 36 deletions(-)
delete mode 100644 qemu-kvm-helper.c
diff --git a/Makefile.target
On Mon, Sep 20, 2010 at 04:08:48PM +0800, xiaohui@intel.com wrote:
From: Xin Xiaohui xiaohui@intel.com
---
Michael,
I have move the ioctl to configure the locked memory to vhost
It's ok to move this to vhost but vhost does not
know how much memory is needed by the backend.
So I
Hi,
I think I am hitting this, in a weird way :D. Running 0.12.90,
vhost_net and kernel 2.6.35.4, I have troubles to get dhcp clients to
work except an old dhcp client pump seems to work out of the box.
Below are the output of dhcpcd, isc's dhcp client and busybox' udhcpc.
My dhcp server is in a
On Wed, 2010-09-08 at 15:08 +0100, Stefan Hajnoczi wrote:
Hi Rayson,
For the KVM kernel module Linux trace events are already used. For
example, see arch/x86/kvm/trace.h and check out
/sys/kernel/debug/tracing/events/kvm/*. There is a set of useful
static trace points for vm_exit/vm_enter,
Heres my benches, done in two days so dates are weird and results are very
approximative.
What surprises me are in the Part 2, swap occured.
In 3 and 4, the ram is eaten up, even if the vm just booted.
Part 0
End of boot :
bash-3.1$ free
total
On Mon, Sep 20, 2010 at 2:19 PM, Rayson Ho r...@redhat.com wrote:
On Wed, 2010-09-08 at 15:08 +0100, Stefan Hajnoczi wrote:
Hi Rayson,
For the KVM kernel module Linux trace events are already used. For
example, see arch/x86/kvm/trace.h and check out
/sys/kernel/debug/tracing/events/kvm/*.
TOURNIER Frédéric wrote:
Heres my benches, done in two days so dates are weird and results are very
approximative.
What surprises me are in the Part 2, swap occured.
I don't know exactly why, but I have seen a small usage of swap
occasionally without real memory pressure. So I'd consider this
The default state of 'kvm-amd.nested' is enabled now, so fix the documentation
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
---
Documentation/kernel-parameters.txt |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/Documentation/kernel-parameters.txt
Document this parameter into Documentation/kernel-parameters.txt
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
---
Documentation/kernel-parameters.txt |4
1 files changed, 4 insertions(+), 0 deletions(-)
diff --git a/Documentation/kernel-parameters.txt
Now, sp-root_count is only used by the root sp, in the later patch, we will
increase
it to keep unsync sp alive while it's out of 'kvm-mmu_lock''s protection, so
rename the
name to fits its use
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
---
arch/x86/include/asm/kvm_host.h |
It allows keep unsync sp alive while it's out of the protection, later we can
use
kvm_mmu_free_page() to free it if !sp-active_count
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
---
arch/x86/kvm/mmu.c | 16 ++--
1 files changed, 10 insertions(+), 6 deletions(-)
diff
Move reserved bits check then invlpg path can use it
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
---
arch/x86/kvm/mmu.c |3 ---
arch/x86/kvm/paging_tmpl.h |4
2 files changed, 4 insertions(+), 3 deletions(-)
diff --git a/arch/x86/kvm/mmu.c
Gfn may have many shadow pages, when one sp need be synced, we write
protected sp-gfn and sync this sp but we keep other shadow pages
asynchronous
So, while gfn happen page fault, let it not touches unsync page, the unsync
page only updated at invlpg/flush TLB time
Signed-off-by: Xiao Guangrong
Move initialization after we're certain to succeed, so we don't leak
memory on failure.
Signed-off-by: Avi Kivity a...@redhat.com
---
hw/msix.c | 13 +++--
1 files changed, 7 insertions(+), 6 deletions(-)
diff --git a/hw/msix.c b/hw/msix.c
index 3dd0456..312439a 100644
--- a/hw/msix.c
Signed-off-by: Avi Kivity a...@redhat.com
---
hw/msix.c | 19 +--
1 files changed, 13 insertions(+), 6 deletions(-)
diff --git a/hw/msix.c b/hw/msix.c
index 312439a..2e2ce5a 100644
--- a/hw/msix.c
+++ b/hw/msix.c
@@ -48,6 +48,17 @@ int msix_supported;
#ifdef CONFIG_KVM
/*
This allows us to reuse them from the kvm support code.
Signed-off-by: Avi Kivity a...@redhat.com
---
hw/msix.c | 27 ---
hw/msix.h | 26 ++
2 files changed, 26 insertions(+), 27 deletions(-)
diff --git a/hw/msix.c b/hw/msix.c
index
Signed-off-by: Avi Kivity a...@redhat.com
---
hw/msix.c | 19 +++
1 files changed, 15 insertions(+), 4 deletions(-)
diff --git a/hw/msix.c b/hw/msix.c
index 2e2ce5a..d762870 100644
--- a/hw/msix.c
+++ b/hw/msix.c
@@ -159,6 +159,18 @@ static void kvm_msix_del(PCIDevice *dev,
This removes the dependency on CONFIG_KVM.
Signed-off-by: Avi Kivity a...@redhat.com
---
hw/msix.c | 137
kvm-all.c | 124 ++
kvm-stub.c | 28
kvm.h | 16
Now that hw/msix.c does not depend on CONFIG_KVM, remove it from
Makefile.target and put it back in Makefile.objs.
Signed-off-by: Avi Kivity a...@redhat.com
---
Makefile.objs |4 +---
Makefile.target |4
2 files changed, 1 insertions(+), 7 deletions(-)
diff --git a/Makefile.objs
Simplifies the msix code.
Signed-off-by: Avi Kivity a...@redhat.com
---
hw/msix.c | 22 --
kvm-all.c | 18 ++
kvm-stub.c |2 +-
3 files changed, 27 insertions(+), 15 deletions(-)
diff --git a/hw/msix.c b/hw/msix.c
index bdec0b3..fc4cbb1 100644
---
Needs qemu-common.h for qemu_irq.
Signed-off-by: Avi Kivity a...@redhat.com
---
hw/irq.h |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/hw/irq.h b/hw/irq.h
index 5daae44..e9f0542 100644
--- a/hw/irq.h
+++ b/hw/irq.h
@@ -1,6 +1,8 @@
#ifndef QEMU_IRQ_H
#define
This cleans up msix/kvm integration a bit. The really important patch is the
last one, which allows msix.o to be part of non-target-specific build.
Avi Kivity (9):
msix: avoid leaking kvm data on init failure
msix: make kvm specific initialization a function
msix: move kvm specific msix
Target-specific definitions need to be qualified with NEED_CPU_H so kvm.h
can be included from non-target-specific files.
Signed-off-by: Avi Kivity a...@redhat.com
---
kvm-stub.c |1 +
qemu-kvm.h | 21 -
2 files changed, 21 insertions(+), 1 deletions(-)
diff --git
On 09/20/2010 04:19 PM, Xiao Guangrong wrote:
It allows keep unsync sp alive while it's out of the protection, later we can
use
kvm_mmu_free_page() to free it if !sp-active_count
Don't understand. Of course unsync pages exist outside mmu_lock...?
diff --git a/arch/x86/kvm/mmu.c
On 09/20/2010 04:21 PM, Xiao Guangrong wrote:
Gfn may have many shadow pages, when one sp need be synced, we write
protected sp-gfn and sync this sp but we keep other shadow pages
asynchronous
So, while gfn happen page fault, let it not touches unsync page, the unsync
page only updated at
On Mon, 20 Sep 2010 16:00:53 +0200
Andre Przywara andre.przyw...@amd.com wrote:
TOURNIER Frédéric wrote:
Heres my benches, done in two days so dates are weird and results are very
approximative.
What surprises me are in the Part 2, swap occured.
I don't know exactly why, but I have seen
On Sat, Sep 18, 2010 at 02:38:15PM -1000, Zachary Amsden wrote:
Negate the effects of AN TYM spell while kvm thread is preempted by tracking
conversion factor to the highest TSC rate and catching the TSC up when it has
fallen behind the kernel view of time. Note that once triggered, we don't
On Sat, Sep 18, 2010 at 02:38:12PM -1000, Zachary Amsden wrote:
If preempted after kvmclock values are updated, but before hardware
virtualization is entered, the last tsc time as read by the guest is
never set. It underflows the next time kvmclock is updated if there
has not yet been a
On Sun, Sep 19, 2010 at 09:00:33AM +0800, Huang Ying wrote:
In QEMU-KVM, physical address != RAM address. While MCE simulation
needs physical address instead of RAM address. So
kvm_physical_memory_addr_from_ram() is implemented to do the
conversion, and it is invoked before being filled in the
Please send in any agenda items you are interested in covering.
thanks,
-chris
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
On 09/20/2010 06:44 PM, Chris Wright wrote:
Please send in any agenda items you are interested in covering.
nested vmx: the resurrection. Nice to see it progressing again, but
there's still a lot of ground to cover. Perhaps we can involve Intel to
speed things up?
--
error compiling
On Mon, Sep 20, 2010 at 05:06:45PM +0200, Avi Kivity wrote:
This allows us to reuse them from the kvm support code.
Signed-off-by: Avi Kivity a...@redhat.com
I would rather all dealings with MSI-X table stayed in one place. All we
need is just the entry, so let's add APIs to retrieve MSIX
On Mon, Sep 20, 2010 at 05:06:41PM +0200, Avi Kivity wrote:
This cleans up msix/kvm integration a bit. The really important patch is the
last one, which allows msix.o to be part of non-target-specific build.
I actually thoought this later move should be done in a different way:
- add all
On Mon, Sep 20, 2010 at 05:06:49PM +0200, Avi Kivity wrote:
Target-specific definitions need to be qualified with NEED_CPU_H so kvm.h
can be included from non-target-specific files.
Signed-off-by: Avi Kivity a...@redhat.com
Long term, would be cleaner to split this into two files ...
---
On Sun, Sep 19, 2010 at 02:34:07PM +0200, Avi Kivity wrote:
From: Mohammed Gamal m.gamal...@gmail.com
Replace the inject-as-software-interrupt hack we currently have with
emulated injection.
Signed-off-by: Mohammed Gamal m.gamal...@gmail.com
Signed-off-by: Avi Kivity a...@redhat.com
---
David,
The following tree includes a bugfix for vhost-net.
It is on top of net-2.6. Please merge it for 2.6.36.
Thanks!
The following changes since commit 053d8f6622701f849fda2ca2c9ae596c13599ba9:
Merge branch 'vhost-net' of
git://git.kernel.org/pub/scm/linux/kernel/git/mst/vhost (2010-09-09
From: Michael S. Tsirkin m...@redhat.com
Date: Mon, 20 Sep 2010 19:42:22 +0200
git://git.kernel.org/pub/scm/linux/kernel/git/mst/vhost.git vhost-net
Pulled, thanks!
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More
On Mon, 2010-09-20 at 11:51 +0200, Avi Kivity wrote:
On 09/19/2010 04:33 PM, Avi Kivity wrote:
Override kvm_emulate_insn formatting to use a disassembler to format
the emulated instruction. If a disassembler (udis86) is not available,
fall back to showing the instruction bytes in hex.
On Sun, Sep 19, 2010 at 06:44:07PM +0200, Avi Kivity wrote:
The PIC code used to be called from preempt_disable() context, which
wasn't very good for PREEMPT_RT. That is no longer the case, so move
back from raw_spinlock_t to spinlock_t.
Signed-off-by: Avi Kivity a...@redhat.com
---
On Mon, Sep 20, 2010 at 01:01:50PM +0200, Avi Kivity wrote:
No longer used.
Signed-off-by: Avi Kivity a...@redhat.com
---
v2: update Makefile
Makefile.target |1 -
qemu-kvm-helper.c | 35 ---
2 files changed, 0 insertions(+), 36 deletions(-)
On Mon, Sep 20, 2010 at 10:15:32AM +0200, Gleb Natapov wrote:
Nested SVM checks for external interrupt after injecting nested exception.
In case there is external interrupt pending the code generates external
interrupt exit and overwrites previous exit info. If previously injected
exception
On Sun, Sep 19, 2010 at 03:56:49PM +0200, Joerg Roedel wrote:
Hi,
here are two patches for the svm unit-test framework that measure the
latency of the emulated vmrun, vmload, and vmsave instructions as well
as the latency of emulated vmexits.
On my Phenom II X6 1090T running in P0 it
On Sun, Sep 19, 2010 at 07:02:31PM +0200, Michael S. Tsirkin wrote:
I think I see the following (theoretical) race:
During irqfd assign, we drop irqfds lock before we
schedule inject work. Therefore, deassign running
on another CPU could cause shutdown and flush to run
before inject,
On Mon, Sep 20, 2010 at 06:50:55PM +0200, Avi Kivity wrote:
On 09/20/2010 06:44 PM, Chris Wright wrote:
Please send in any agenda items you are interested in covering.
nested vmx: the resurrection. Nice to see it progressing again, but
there's still a lot of ground to cover. Perhaps we
On 09/20/2010 02:15 PM, Michael S. Tsirkin wrote:
On Mon, Sep 20, 2010 at 06:50:55PM +0200, Avi Kivity wrote:
On 09/20/2010 06:44 PM, Chris Wright wrote:
Please send in any agenda items you are interested in covering.
nested vmx: the resurrection. Nice to see it
On Mon, Sep 20, 2010 at 02:12:40PM +0200, xming wrote:
Hi,
I think I am hitting this, in a weird way :D. Running 0.12.90,
vhost_net and kernel 2.6.35.4, I have troubles to get dhcp clients to
work except an old dhcp client pump seems to work out of the box.
Below are the output of dhcpcd,
On Mon, Sep 20, 2010 at 10:16:45PM +0800, Xiao Guangrong wrote:
The default state of 'kvm-amd.nested' is enabled now, so fix the documentation
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
---
Documentation/kernel-parameters.txt |2 +-
1 files changed, 1 insertions(+), 1
On Mon, Sep 20, 2010 at 08:50:17AM +0200, Gleb Natapov wrote:
On Sun, Sep 19, 2010 at 06:03:31PM -0400, Kevin O'Connor wrote:
I was wrong. The cpu_set x offline does send an event to the guest
OS. SeaBIOS even forwards the event along - as far as I can tell a
Notify(CPxx, 3) event is
On 09/20/2010 05:38 AM, Marcelo Tosatti wrote:
On Sat, Sep 18, 2010 at 02:38:15PM -1000, Zachary Amsden wrote:
Negate the effects of AN TYM spell while kvm thread is preempted by tracking
conversion factor to the highest TSC rate and catching the TSC up when it has
fallen behind the kernel
From: Michael S. Tsirkin [mailto:m...@redhat.com]
Sent: Monday, September 20, 2010 7:37 PM
To: Xin, Xiaohui
Cc: net...@vger.kernel.org; kvm@vger.kernel.org; linux-ker...@vger.kernel.org;
mi...@elte.hu; da...@davemloft.net; herb...@gondor.hengli.com.au;
jd...@linux.intel.com
Subject: Re: [RFC PATCH
This patchset contains a lot of much needed cleanups for
the unattended install setup code. As the final user visible
result, it is now possible to use both floppy as cdrom to
hold the kickstart/autoyast file (cdrom default).
Lucas Meneghel Rodrigues (2):
KVM test: Cleaning up
Over the months, scripts/unattended.py received a lot
of expansions, which made code difficult to read and
understand. This patch gives some much needed cleanup
to the code:
* Configuration key variables are directly translated
to class attributes, making up for shorter, cleaner
code
* All non
Avi Kivity wrote on Mon, 20 Sep 2010 at 09:50:55:
On 09/20/2010 06:44 PM, Chris Wright wrote:
Please send in any agenda items you are interested in covering.
nested vmx: the resurrection. Nice to see it progressing again, but
there's still a lot of ground to cover. Perhaps we can
66 matches
Mail list logo