On 02/28/2011 06:54 PM, Avi Kivity wrote:
On 02/28/2011 06:49 PM, Jan Kiszka wrote:
That's what I tried, and it didn't work?! Maybe I forgot to
compile or
something.
Well, it maybe failed to build as qemu_kvm_init_cpu_signals became
unused and the compiler should have bailed out?
On 2011-03-01 09:39, Avi Kivity wrote:
On 02/28/2011 06:54 PM, Avi Kivity wrote:
On 02/28/2011 06:49 PM, Jan Kiszka wrote:
That's what I tried, and it didn't work?! Maybe I forgot to
compile or
something.
Well, it maybe failed to build as qemu_kvm_init_cpu_signals became
unused and
On 03/01/2011 10:58 AM, Jan Kiszka wrote:
On 2011-03-01 09:39, Avi Kivity wrote:
On 02/28/2011 06:54 PM, Avi Kivity wrote:
On 02/28/2011 06:49 PM, Jan Kiszka wrote:
That's what I tried, and it didn't work?! Maybe I forgot to
compile or
something.
Well, it maybe failed to build
I'm getting wildly different disk IO performance from two storage devices in a
Windows Server 2003 guest. I'm using diskgraf to test and get a max of 8MB/s
for both reads and writes of a 64MB file on the system drive, but 101MB/s
writes and 250MB/s reads on the second drive. The cache is
On Tue, Mar 1, 2011 at 5:01 AM, ya su suya94...@gmail.com wrote:
kvm start with disk image on nfs server, when nfs server can not be
reached, monitor will be blocked. I change io_thread to SCHED_RR
policy, it will work unfluently waiting for disk read/write timeout.
There are some
Seems the bug is related to EVENTFD support.
int event_notifier_init(EventNotifier *e, int active)
That simply return -ENOSYS on older glibc ( 2.8)
I can define the syscall manually, but I wonder if there is a better way?
- Dietmar
I get this error when I run new kvm 0.14.0 on kernel
On Tue, Mar 1, 2011 at 10:23 AM, Kevin Clark kevin.cl...@csoft.co.uk wrote:
Any thoughts/ideas?
There are a lot of variables here. Are you using virtio-blk devices
and Windows guest drivers? Are you using hardware RAID5 on the NFS
server? Could it be a network issue (contention during
On Tue, Mar 01, 2011 at 02:10:37PM +0800, Sheng Yang wrote:
On Monday 28 February 2011 19:27:29 Michael S. Tsirkin wrote:
On Mon, Feb 28, 2011 at 03:20:04PM +0800, Sheng Yang wrote:
Then we can support mask bit operation of assigned devices now.
Signed-off-by: Sheng Yang
On Tue, Mar 01, 2011 at 02:20:02PM +0200, Michael S. Tsirkin wrote:
On Tue, Mar 01, 2011 at 02:10:37PM +0800, Sheng Yang wrote:
On Monday 28 February 2011 19:27:29 Michael S. Tsirkin wrote:
On Mon, Feb 28, 2011 at 03:20:04PM +0800, Sheng Yang wrote:
Then we can support mask bit operation
On 02/28/2011 04:05 PM, Paolo Bonzini wrote:
On 02/28/2011 01:13 PM, Avi Kivity wrote:
If there's a git tree of this I'll be happy to do an autotest run.
Sure, it's branch iothread-win32 of git://github.com/bonzini/qemu.git
Fails on Fedora 9 i386 install, hangs right after Performing
first say sorry for the same mail sent more than one time, I don't
know it will take so long time to come back.
hi, stefan:
thank for your explaining.
how about to remove kvm_handle_io/handle_mmio in kvm_run function
into kvm_main_loop, as these operation belong to io operation, this
On Tue, Mar 01, 2011 at 02:20:02PM +0200, Michael S. Tsirkin wrote:
On Tue, Mar 01, 2011 at 02:10:37PM +0800, Sheng Yang wrote:
On Monday 28 February 2011 19:27:29 Michael S. Tsirkin wrote:
On Mon, Feb 28, 2011 at 03:20:04PM +0800, Sheng Yang wrote:
@@ -1877,6 +1879,24 @@ static long
On Sun, Feb 27, 2011 at 08:11:26PM +0100, Jan Kiszka wrote:
On 2011-02-27 20:03, Alon Levy wrote:
On Sat, Feb 26, 2011 at 01:29:01PM +0100, Jan Kiszka wrote:
On 2011-02-26 12:43, xming wrote:
When trying to start X (and it loads qxl driver) the kvm process just
crashes.
This is
Bugs item #3196108, was opened at 2011-03-01 13:22
Message generated for change (Tracker Item Submitted) made by alephlg
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=3196108group_id=180599
Please note that this message will contain a full copy of the
Le 01/03/2011 08:03, Michael S. Tsirkin a écrit :
On Mon, Feb 28, 2011 at 11:34:16PM +0100, Jean-Philippe Menil wrote:
Hi,
here is another trace with kvm.ko compiled with debug flags.
the bug:
[12099.503414] BUG: unable to handle kernel paging request at
0b6635e9
[12099.503462] IP:
Juan Quintela quint...@redhat.com wrote:
Please send in any agenda items you are interested in covering.
As there are 0 items on the agenda, call got cancelled this week.
Enjoy, Juan.
Thanks, Juan.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
On Tue, Mar 1, 2011 at 12:39 PM, ya su suya94...@gmail.com wrote:
how about to remove kvm_handle_io/handle_mmio in kvm_run function
into kvm_main_loop, as these operation belong to io operation, this
will remove the qemu_mutux between the 2 threads. is this an
reasonable thought?
In
On 03/01/2011 01:04 AM, Alex Williamson wrote:
The original problem that brought this on was scaling. The re-ordered
array still has O(N) scaling while the tree should have ~O(logN) (note
that it currently doesn't because it needs a compaction algorithm added
after insert and
On 03/01/2011 05:01 PM, Stefan Hajnoczi wrote:
On Tue, Mar 1, 2011 at 12:39 PM, ya susuya94...@gmail.com wrote:
how about to remove kvm_handle_io/handle_mmio in kvm_run function
into kvm_main_loop, as these operation belong to io operation, this
will remove the qemu_mutux between the
Michael S. Tsirkin m...@redhat.com wrote on 02/28/2011 03:13:20 PM:
Thank you once again for your feedback on both these patches.
I will send the qemu patch tomorrow. I will also send the next
version incorporating these suggestions once we finalize some
minor points.
Overall looks good.
The
Michael S. Tsirkin m...@redhat.com wrote on 02/28/2011 03:34:23 PM:
The number of vhost threads is = #txqs. Threads handle more
than one txq when #txqs is more than MAX_VHOST_THREADS (4).
It is this sharing that prevents us from just reusing multiple vhost
descriptors?
Sorry, I didn't
Bugs item #3196108, was opened at 2011-03-01 13:22
Message generated for change (Comment added) made by nikola_ciprich
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=3196108group_id=180599
Please note that this message will contain a full copy of the
On Tue, 2011-03-01 at 17:03 +0200, Avi Kivity wrote:
On 03/01/2011 01:04 AM, Alex Williamson wrote:
The original problem that brought this on was scaling. The re-ordered
array still has O(N) scaling while the tree should have ~O(logN) (note
that it currently doesn't
On Fri, Feb 18, 2011 at 11:11:11AM +0100, Jan Kiszka wrote:
Round 2 of this part, primarily addressing review comments:
- Reworked CPU_INTERRUPT_MCE - exection translation
(now done in kvm_arch_process_async_events, indeed much cleaner)
- Add missing cpu_synchronize_state on pending MCE
On 2011-03-01 18:48, Marcelo Tosatti wrote:
On Fri, Feb 18, 2011 at 11:11:11AM +0100, Jan Kiszka wrote:
Round 2 of this part, primarily addressing review comments:
- Reworked CPU_INTERRUPT_MCE - exection translation
(now done in kvm_arch_process_async_events, indeed much cleaner)
- Add
On Sun, Feb 27, 2011 at 11:54:29AM +0200, Avi Kivity wrote:
On 02/24/2011 07:35 PM, Alex Williamson wrote:
On Thu, 2011-02-24 at 12:06 +0200, Avi Kivity wrote:
On 02/23/2011 09:28 PM, Alex Williamson wrote:
I had forgotten about1M mem, so actually the slot configuration was:
https://bugzilla.kernel.org/show_bug.cgi?id=29382
Jean-Philippe Menil jean-philippe.me...@univ-nantes.fr changed:
What|Removed |Added
CC|
On Thu, Feb 24, 2011 at 10:56:17PM +0100, Juan Quintela wrote:
Hi
This series just:
- use qemu_mallocz() everywhere.
- remove NULL tests for qemu_mallocz().
- change all container_of to DO_UPCAST() (there were both of them).
Later, Juan.
Juan Quintela (3):
device-assignment: Use
On Fri, Feb 25, 2011 at 10:29:38AM +0200, Michael S. Tsirkin wrote:
On Fri, Feb 25, 2011 at 02:28:02PM +0800, Sheng Yang wrote:
On Thursday 24 February 2011 18:45:08 Michael S. Tsirkin wrote:
On Thu, Feb 24, 2011 at 05:51:04PM +0800, Sheng Yang wrote:
Then we can support mask bit
On Mon, Feb 28, 2011 at 8:25 PM, James Neave robo...@gmail.com wrote:
On Mon, Feb 28, 2011 at 3:31 PM, Chris Wright chr...@sous-sol.org wrote:
* James Neave (robo...@gmail.com) wrote:
HOLY CRAP IT WORKS 8@
Hey, great! ;)
...almost...
OK, clear_emulator_capabilities=0 solved the IRQ
On Tue, Mar 01, 2011 at 05:18:58PM -0300, Marcelo Tosatti wrote:
On Fri, Feb 25, 2011 at 10:29:38AM +0200, Michael S. Tsirkin wrote:
On Fri, Feb 25, 2011 at 02:28:02PM +0800, Sheng Yang wrote:
On Thursday 24 February 2011 18:45:08 Michael S. Tsirkin wrote:
On Thu, Feb 24, 2011 at
Some KVM autotest tests are only meant to run on Linux
platform, others are only meant to run on Windows. With
the new parser it is possible to state this information
even if the Linux and Windows blocks are defined later
inside tests_base.cfg. We advise test authors to follow
this convention from
Hello,
I'd like to ask, are there any recommendation about kernel timer frequency
for guest and for the host?
I guess that on host, the higher frequency can be better, but for guest,
100HZ should be better because it causes lower overhead for host, right?
Thanks a lot for reply in advance
cheers
On Tue, Mar 1, 2011 at 4:44 PM, Nikola Ciprich extmaill...@linuxbox.cz wrote:
I guess that on host, the higher frequency can be better, but for guest,
100HZ should be better because it causes lower overhead for host, right?
or NO_HZ?
--
Javier
--
To unsubscribe from this list: send the line
On Wednesday 02 March 2011 04:18:58 Marcelo Tosatti wrote:
On Fri, Feb 25, 2011 at 10:29:38AM +0200, Michael S. Tsirkin wrote:
On Fri, Feb 25, 2011 at 02:28:02PM +0800, Sheng Yang wrote:
On Thursday 24 February 2011 18:45:08 Michael S. Tsirkin wrote:
On Thu, Feb 24, 2011 at 05:51:04PM
A method to verify guest kernel panics can be very
useful for a number of tests. Adapted from a function
present on virtio_console test, create VM.verify_kernel_crash()
and use it on unattended_install.
Signed-off-by: Lucas Meneghel Rodrigues l...@redhat.com
---
client/tests/kvm/kvm_vm.py
Lucas Meneghel Rodrigues writes:
A method to verify guest kernel panics can be very
useful for a number of tests. Adapted from a function
present on virtio_console test, create VM.verify_kernel_crash()
and use it on unattended_install.
How about using a thread to monitor the serial
Then it can be used by other struct in kvm_host.h
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
include/linux/kvm_host.h | 23 +++
virt/kvm/iodev.h | 25 +
2 files changed, 24 insertions(+), 24 deletions(-)
diff --git
Then we can support mask bit operation of assigned devices now.
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
arch/x86/kvm/Makefile|2 +-
arch/x86/kvm/x86.c | 31 -
include/linux/kvm.h | 28 +
include/linux/kvm_host.h | 34 ++
virt/kvm/assigned-dev.c |
Add a new parameter to IO writing handler, so that we can transfer information
from IO handler to caller.
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
arch/x86/kvm/i8254.c |6 --
arch/x86/kvm/i8259.c |3 ++-
arch/x86/kvm/lapic.c |3 ++-
arch/x86/kvm/x86.c
Change from v10:
1. Update according to the comments of Michael.
2. Use mmio_needed to exit to userspace according to Marcelo's comments.
Sheng Yang (4):
KVM: Move struct kvm_io_device to kvm_host.h
KVM: Add kvm_io_ext_data to IO handler
KVM: Emulate MSI-X table in kernel
KVM: Add
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
Documentation/kvm/api.txt | 58 +
1 files changed, 58 insertions(+), 0 deletions(-)
diff --git a/Documentation/kvm/api.txt b/Documentation/kvm/api.txt
index e1a9297..dd10c3b 100644
---
We will broaden the scope of this function on x86 beyond irqchip events.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
kvm-all.c |2 +-
kvm.h |2 +-
target-i386/kvm.c |2 +-
target-ppc/kvm.c |2 +-
target-s390x/kvm.c |2 +-
5 files changed, 5
This is required to support keeping VCPU states across a system reset.
If we do not read the current state before the reset,
cpu_synchronize_all_post_reset may write back incorrect state
information.
The first user of this will be MCE MSR synchronization which currently
works around the missing
We will use the current TCG-only MCE injection path for KVM as well, and
then this read-modify-write of the target VCPU state has to be performed
synchronously in the corresponding thread.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
target-i386/helper.c | 87
The current way of injecting MCE events without updating of and
synchronizing with the CPUState is broken and causes spurious
corruptions of the MCE-related parts of the CPUState.
As a first step towards a fix, enhance the state writeback code with
support for injecting events that are pending in
MCEs can be injected asynchronously, so they can also terminate the halt
state.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
CC: Huang Ying ying.hu...@intel.com
CC: Hidetoshi Seto seto.hideto...@jp.fujitsu.com
CC: Jin Dongming jin.dongm...@np.css.fujitsu.com
---
target-i386/exec.h | 15
Allow to tell cpu_x86_inject_mce that it should ignore Action Optional
MCE events when the target VCPU is still processing another one. This
will be used by KVM soon.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
CC: Huang Ying ying.hu...@intel.com
CC: Hidetoshi Seto
This is mostly a rebase of the previous round, just including one
additional ppc build fix (patch 2) for a regression in a previous part.
Please merge.
CC: David Gibson da...@gibson.dropbear.id.au
CC: Hidetoshi Seto seto.hideto...@jp.fujitsu.com
CC: Huang Ying ying.hu...@intel.com
CC: Jin
As this service is used by the human monitor, make sure that errors get
reported to the right channel, and also raise the verbosity.
This requires to move Monitor typedef in qemu-common.h to resolve the
include dependency.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
CC: Huang Ying
From: Huang Ying ying.hu...@intel.com
qemu_ram_remap() unmaps the specified RAM pages, then re-maps these
pages again. This is used by KVM HWPoison support to clear HWPoisoned
page tables across guest rebooting, so that a new page may be
allocated later to recover the memory error.
[ Jan: style
Reorder mcg_status in CPUState to achieve automatic clearing on reset.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
CC: Huang Ying ying.hu...@intel.com
CC: Hidetoshi Seto seto.hideto...@jp.fujitsu.com
CC: Jin Dongming jin.dongm...@np.css.fujitsu.com
---
target-i386/cpu.h|3 ++-
This switches KVM's MCE injection path to cpu_x86_inject_mce, both for
SIGBUS and monitor initiated events. This means we prepare the MCA MSRs
in the VCPUState also for KVM.
We have to drop the MSRs writeback restrictions for this purpose which
is now safe as every uncoordinated MSR injection is
Original fix by David Gibson.
CC: David Gibson da...@gibson.dropbear.id.au
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
kvm-all.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/kvm-all.c b/kvm-all.c
index e6a7de4..7753c8a 100644
--- a/kvm-all.c
+++ b/kvm-all.c
Commit 7a39fe5882 failed to convert the right arch function.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
target-ppc/kvm.c |6 +++---
1 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/target-ppc/kvm.c b/target-ppc/kvm.c
index bd4012a..3924f4b 100644
---
From: Huang Ying ying.hu...@intel.com
In Linux kernel HWPoison processing implementation, the virtual
address in processes mapping the error physical memory page is marked
as HWPoison. So that, the further accessing to the virtual
address will kill corresponding processes with SIGBUS.
If the
Pure function suffling to avoid multiple #ifdef KVM_CAP_MCE sections,
no functional changes. While at it, annotate some #ifdef sections.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
CC: Huang Ying ying.hu...@intel.com
CC: Hidetoshi Seto seto.hideto...@jp.fujitsu.com
CC: Jin Dongming
Fix some code style issues, use proper headers, and align to cpu_x86
naming scheme. No functional changes.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
CC: Huang Ying ying.hu...@intel.com
CC: Hidetoshi Seto seto.hideto...@jp.fujitsu.com
CC: Jin Dongming jin.dongm...@np.css.fujitsu.com
---
There is no reason to continue if the kernel claims to support MCE but
then fails to process our request.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
CC: Huang Ying ying.hu...@intel.com
CC: Hidetoshi Seto seto.hideto...@jp.fujitsu.com
CC: Jin Dongming jin.dongm...@np.css.fujitsu.com
---
There is nothing to abstract here. Fold kvm_setup_mce into its caller
and fix up the error reporting (return code of kvm_vcpu_ioctl holds the
error value).
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
CC: Huang Ying ying.hu...@intel.com
CC: Hidetoshi Seto seto.hideto...@jp.fujitsu.com
CC: Jin
60 matches
Mail list logo