On Sun, Oct 30, 2011 at 7:35 PM, Sasha Levin levinsasha...@gmail.com wrote:
This makes passing different ops structures easier since you don't have
to keep them somewhere else after initializing disk_image.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
Why do we want to do this? Why
On 10/31/2011 10:12 PM, Scott Wood wrote:
+4.59 KVM_DIRTY_TLB
+
+Capability: KVM_CAP_SW_TLB
+Architectures: ppc
+Type: vcpu ioctl
+Parameters: struct kvm_dirty_tlb (in)
+Returns: 0 on success, -1 on error
+
+struct kvm_dirty_tlb {
+ __u64 bitmap;
+ __u32 num_dirty;
+};
On 10/31/2011 08:52 PM, Scott Wood wrote:
On 10/31/2011 07:50 AM, Avi Kivity wrote:
On 10/31/2011 09:53 AM, Alexander Graf wrote:
+/* sesel is index into the set, not the whole array */
+static void write_stlbe(struct kvmppc_vcpu_e500 *vcpu_e500,
+ struct tlbe *gtlbe,
+
On 11/01/2011 10:58 AM, Avi Kivity wrote:
We already have another mechanism for such shared memory,
mmap(vcpu_fd). x86 uses it for the coalesced mmio region as well as the
traditional kvm_run area. Please consider using it.
What does it buy us, other than needing a separate codepath
On 10/30/2011 06:53 PM, Gleb Natapov wrote:
From: Avi Kivity a...@redhat.com
This has changed significantly, so please update the authorship. You
can say 'based on original patch by ...' to provide due credit.
Use perf_events to emulate an architectural PMU, version 2.
+
+/* mapping
On 10/30/2011 06:53 PM, Gleb Natapov wrote:
KVM needs to know perf capability to decide which PMU it can expose to a
guest.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/perf_event.h | 11 +++
arch/x86/kernel/cpu/perf_event.c | 11 +++
On 10/30/2011 06:53 PM, Gleb Natapov wrote:
From: Avi Kivity a...@redhat.com
Provide a CPUID leaf that describes the emulated PMU.
Signed-off-by: Avi Kivity a...@redhat.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/x86.c | 23 ++-
1 files changed,
On Tue, Oct 18, 2011 at 01:37:32PM -0400, Avi Kivity wrote:
On 10/18/2011 06:35 PM, Roedel, Joerg wrote:
On Tue, Oct 18, 2011 at 12:23:11PM -0400, Jan Kiszka wrote:
AMD processors apparently have a bug in the hardware task switching
support when NPT is enabled. If the task switch triggers
On Tue, 2011-11-01 at 08:44 +0200, Pekka Enberg wrote:
On Sun, Oct 30, 2011 at 7:35 PM, Sasha Levin levinsasha...@gmail.com wrote:
This makes passing different ops structures easier since you don't have
to keep them somewhere else after initializing disk_image.
Signed-off-by: Sasha Levin
Hi Sasha,
On Sun, Oct 30, 2011 at 7:35 PM, Sasha Levin levinsasha...@gmail.com wrote:
This makes passing different ops structures easier since you don't have
to keep them somewhere else after initializing disk_image.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
On Tue, 2011-11-01
On Tue, Nov 01, 2011 at 10:39:08AM +1030, Rusty Russell wrote:
* [new tag] ru...@rustcorp.com.au-v3.1-7196-gac5be1e -
ru...@rustcorp.com.au-v3.1-7196-gac5be1e
The following changes since commit 839d8810747bbf39e0a5a7f223b67bffa7945f8d:
Merge branch 'i2c-for-linus' of
On Tue, 2011-11-01 at 13:30 +0200, Pekka Enberg wrote:
Hi Sasha,
On Sun, Oct 30, 2011 at 7:35 PM, Sasha Levin levinsasha...@gmail.com wrote:
This makes passing different ops structures easier since you don't have
to keep them somewhere else after initializing disk_image.
On Tue, Nov 1, 2011 at 1:43 PM, Sasha Levin levinsasha...@gmail.com wrote:
How would you implement the fallback thing we have in RO images now?
declare all those ops as global variables?
Yes.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
On Tue, Nov 01, 2011 at 12:51:53PM +0200, Avi Kivity wrote:
On 10/30/2011 06:53 PM, Gleb Natapov wrote:
From: Avi Kivity a...@redhat.com
Provide a CPUID leaf that describes the emulated PMU.
Signed-off-by: Avi Kivity a...@redhat.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
On 10/31/11 10:39 AM, Rose, Gregory V gregory.v.r...@intel.com wrote:
-Original Message-
From: Roopa Prabhu [mailto:ropra...@cisco.com]
Sent: Monday, October 31, 2011 10:09 AM
To: Rose, Gregory V; net...@vger.kernel.org
Cc: s...@us.ibm.com; dragos.tatu...@gmail.com;
On Tue, Nov 01, 2011 at 12:47:18PM +0200, Avi Kivity wrote:
On 10/30/2011 06:53 PM, Gleb Natapov wrote:
From: Avi Kivity a...@redhat.com
This has changed significantly, so please update the authorship. You
can say 'based on original patch by ...' to provide due credit.
Use perf_events
On Tue, 2011-11-01 at 13:45 +0200, Michael S. Tsirkin wrote:
On Tue, Nov 01, 2011 at 10:39:08AM +1030, Rusty Russell wrote:
* [new tag] ru...@rustcorp.com.au-v3.1-7196-gac5be1e -
ru...@rustcorp.com.au-v3.1-7196-gac5be1e
The following changes since commit
On Tue, Nov 01, 2011 at 02:33:33PM +0200, Sasha Levin wrote:
On Tue, 2011-11-01 at 13:45 +0200, Michael S. Tsirkin wrote:
On Tue, Nov 01, 2011 at 10:39:08AM +1030, Rusty Russell wrote:
* [new tag] ru...@rustcorp.com.au-v3.1-7196-gac5be1e -
On Tue, 2011-11-01 at 14:42 +0200, Michael S. Tsirkin wrote:
On Tue, Nov 01, 2011 at 02:33:33PM +0200, Sasha Levin wrote:
On Tue, 2011-11-01 at 13:45 +0200, Michael S. Tsirkin wrote:
On Tue, Nov 01, 2011 at 10:39:08AM +1030, Rusty Russell wrote:
* [new tag]
On 2011-11-01 12:13, Roedel, Joerg wrote:
On Tue, Oct 18, 2011 at 01:37:32PM -0400, Avi Kivity wrote:
On 10/18/2011 06:35 PM, Roedel, Joerg wrote:
On Tue, Oct 18, 2011 at 12:23:11PM -0400, Jan Kiszka wrote:
AMD processors apparently have a bug in the hardware task switching
support when NPT
On Mon, Oct 31, 2011 at 08:09:31PM +0100, Juan Quintela wrote:
Hi
Please send in any agenda items you are interested in covering.
Thanks, Juan.
PD. Tomorrow is a Spanish holiday, so I would not attend the call.
As there are no agenda items, todays call is cancelled.
Justin
--
To
On Tue, Nov 01, 2011 at 02:30:41PM +0200, Gleb Natapov wrote:
+
+static void kvm_perf_overflow(struct perf_event *perf_event,
+ struct perf_sample_data *data,
+ struct pt_regs *regs)
+{
+ struct kvm_pmc *pmc =
Hi there,
I'm generating some slides on guest debugging via kvm. What's the
current state for Book-E and Book-S? Works out of box, mostly usable, or
to be implemented? Is anyone using it?
Thanks,
Jan
signature.asc
Description: OpenPGP digital signature
On Thu, Oct 06, 2011 at 11:18:28AM -0200, Michael S. Tsirkin wrote:
On Thu, Oct 06, 2011 at 12:15:36PM +1030, Rusty Russell wrote:
On Wed, 05 Oct 2011 15:54:05 -0400, Christoph Hellwig h...@infradead.org
wrote:
Split virtqueue_kick to be able to do the actual notification outside the
On Tue, Nov 01, 2011 at 09:39:49AM -0400, Jan Kiszka wrote:
So SVM does not guarantee that an intercept during a task-switch can be
restarted.
Not a bug but still a deficit as it makes hardware-assisted task
switching practically useless, no?
Not entirely. For hypervisors that can
On 10/30/2011 10:53 AM, Gleb Natapov wrote:
KVM needs to know perf capability to decide which PMU it can expose to a
guest.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/perf_event.h | 11 +++
arch/x86/kernel/cpu/perf_event.c | 11 +++
On 10/30/2011 10:53 AM, Gleb Natapov wrote:
From: Avi Kivity a...@redhat.com
Provide a CPUID leaf that describes the emulated PMU.
Signed-off-by: Avi Kivity a...@redhat.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/x86.c | 23 ++-
1 files
On 2011-11-01 16:30, Roedel, Joerg wrote:
On Tue, Nov 01, 2011 at 09:39:49AM -0400, Jan Kiszka wrote:
So SVM does not guarantee that an intercept during a task-switch can be
restarted.
Not a bug but still a deficit as it makes hardware-assisted task
switching practically useless, no?
Not
On Sun, Oct 30, 2011 at 7:41 AM, Avi Kivity a...@redhat.com wrote:
On 10/20/2011 05:30 AM, Jorge Lucangeli Obes wrote:
https://docs.google.com/leaf?id=0B78o7gMWkuFeNmJlYzNiNWYtMGQ4MS00NzhiLWIyNTMtY2NlNWEzNzQ5NGYxhl=en_US
The logs show lots of accesses to the vga region at 0xa instead of
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/disk/qcow.c |8
tools/kvm/disk/raw.c |2 +-
tools/kvm/include/kvm/disk-image.h |7 +--
3 files changed, 10 insertions(+), 7 deletions(-)
diff --git a/tools/kvm/disk/qcow.c
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/disk/core.c | 48 ++
tools/kvm/disk/qcow.c | 47 +++--
tools/kvm/disk/raw.c | 50 +---
This patch modifies the definition and usage of ops for read only, mmap and
regular IO.
There is no longer a mix between iov and mmap, and read only no longer implies
mmap (although it will try to use it first).
This allows for more flexibility defining different ops for different
scenarios.
This patch adds an optional callback to be called when a disk op completes.
Currently theres not much use for it, but it is the infrastructure for adding
aio support.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/disk/core.c | 22 ++
In case a read or write op ptr is missing simply ignore it instead of
critically failing. This provides an easier way to prevent read or write
in specific scenarios.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/disk/core.c |4 ++--
1 files changed, 2 insertions(+), 2
It is no longer needed due to previous changes.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/disk/qcow.c |9 -
1 files changed, 0 insertions(+), 9 deletions(-)
diff --git a/tools/kvm/disk/qcow.c b/tools/kvm/disk/qcow.c
index ba65ab6..f9598de 100644
---
This patch splits IO request processing from completion notification.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/disk/core.c |6 +-
tools/kvm/include/kvm/disk-image.h |4 +-
tools/kvm/include/kvm/virtio-blk.h |1 +
tools/kvm/virtio/blk.c
This patch connects the completion processing in virtio-blk to the completion
notification coming from disk image.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/virtio/blk.c | 10 ++
1 files changed, 6 insertions(+), 4 deletions(-)
diff --git
This patch adds basic native vectored AIO functions.
These functions should be optimized to process multiple io
requests at once.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/Makefile |1 +
tools/kvm/include/kvm/read-write.h |6 ++
This patch hooks AIO support into virtio-blk, allowing for faster IO.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/disk/core.c | 35 +--
tools/kvm/disk/qcow.c |4
tools/kvm/disk/raw.c | 20
On 11/01/2011 12:17 PM, kvm-autotest wrote:
Job ID: 2011
Job name: Upstream qemu-kvm.git sanity 11-01-2011 00:04:02
Summary: Host: Status: Completed
Status: 1 Completed
Execution time (HH:MM:SS): 01:17:02
User tests executed: 19
User tests passed: 18
User tests failed: 1
User tests success rate:
On Tue, Nov 01, 2011 at 09:49:19AM -0600, David Ahern wrote:
On 10/30/2011 10:53 AM, Gleb Natapov wrote:
KVM needs to know perf capability to decide which PMU it can expose to a
guest.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/perf_event.h | 11
On Tue, Nov 01, 2011 at 11:49:42AM -0400, Jan Kiszka wrote:
On 2011-11-01 16:30, Roedel, Joerg wrote:
On Tue, Nov 01, 2011 at 09:39:49AM -0400, Jan Kiszka wrote:
So SVM does not guarantee that an intercept during a task-switch can be
restarted.
Not a bug but still a deficit as it makes
On 11/01/2011 03:58 AM, Avi Kivity wrote:
On 10/31/2011 10:12 PM, Scott Wood wrote:
+4.59 KVM_DIRTY_TLB
+
+Capability: KVM_CAP_SW_TLB
+Architectures: ppc
+Type: vcpu ioctl
+Parameters: struct kvm_dirty_tlb (in)
+Returns: 0 on success, -1 on error
+
+struct kvm_dirty_tlb {
+ __u64
On Tue, Nov 01, 2011 at 09:49:27AM -0600, David Ahern wrote:
On 10/30/2011 10:53 AM, Gleb Natapov wrote:
From: Avi Kivity a...@redhat.com
Provide a CPUID leaf that describes the emulated PMU.
Signed-off-by: Avi Kivity a...@redhat.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
On 11/01/2011 10:13 AM, Gleb Natapov wrote:
On Tue, Nov 01, 2011 at 09:49:19AM -0600, David Ahern wrote:
On 10/30/2011 10:53 AM, Gleb Natapov wrote:
KVM needs to know perf capability to decide which PMU it can expose to a
guest.
Signed-off-by: Gleb Natapov g...@redhat.com
---
On 11/01/2011 10:18 AM, Gleb Natapov wrote:
On Tue, Nov 01, 2011 at 09:49:27AM -0600, David Ahern wrote:
On 10/30/2011 10:53 AM, Gleb Natapov wrote:
From: Avi Kivity a...@redhat.com
Provide a CPUID leaf that describes the emulated PMU.
Signed-off-by: Avi Kivity a...@redhat.com
This patch adds an option to provide information about redirection
of terminal redirection to a PTY device within 'kvm stat'.
Usage:
'kvm stat -p [term] -n [instance_name]'
Will print information about redirection of terminal 'term' int instance
'instance_name'.
Cc: Osier Yang
hi,
here is what i understand how mmio is handled in kvm.
- mmio range is registered with kvm from userspace.
- this range is then write-protected in kernel
- mmio write will be handled as page-fault inside kernel
- so there is no userspace is involved when mmio write is handled.
please can
On Tue, Nov 01, 2011 at 10:24:41AM -0600, David Ahern wrote:
On 11/01/2011 10:18 AM, Gleb Natapov wrote:
On Tue, Nov 01, 2011 at 09:49:27AM -0600, David Ahern wrote:
On 10/30/2011 10:53 AM, Gleb Natapov wrote:
From: Avi Kivity a...@redhat.com
Provide a CPUID leaf that describes the
On Tue, Nov 1, 2011 at 6:06 PM, Sasha Levin levinsasha...@gmail.com wrote:
This patch hooks AIO support into virtio-blk, allowing for faster IO.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
It turns out libaio is not installed on my Fedora 15 by default. Can
we do CONFIG_HAS_LIBAIO thing
On 11/01/2011 10:40 AM, Gleb Natapov wrote:
If PERF_EVENTS is disabled in the host kernel will KVM return the right
thing for the guest that might have PERF_EVENTS enabled?
With correct implementation of perf_get_x86_pmu_capability() it should.
PERF_EVENTS disable version should set
Hi,
(outside-OK) $ qemu-system-x86_64 -version
QEMU emulator version 0.15.0 (qemu-kvm-0.15.0)
(inside-slow) $ qemu-system-x86_64 -version
QEMU PC emulator version 0.12.5 (qemu-kvm-0.12.5)
However, running outside the chroot was also OK with 0.12.3.
What could be causing this?
On Tue, Nov 01, 2011 at 10:20:04AM -0600, David Ahern wrote:
On 11/01/2011 10:13 AM, Gleb Natapov wrote:
On Tue, Nov 01, 2011 at 09:49:19AM -0600, David Ahern wrote:
On 10/30/2011 10:53 AM, Gleb Natapov wrote:
KVM needs to know perf capability to decide which PMU it can expose to a
On Tue, Nov 1, 2011 at 9:29 AM, Gerd Hoffmann kra...@redhat.com wrote:
Hi,
(outside-OK) $ qemu-system-x86_64 -version
QEMU emulator version 0.15.0 (qemu-kvm-0.15.0)
(inside-slow) $ qemu-system-x86_64 -version
QEMU PC emulator version 0.12.5 (qemu-kvm-0.12.5)
However, running outside the
On 2011-11-01 17:15, Roedel, Joerg wrote:
On Tue, Nov 01, 2011 at 11:49:42AM -0400, Jan Kiszka wrote:
On 2011-11-01 16:30, Roedel, Joerg wrote:
On Tue, Nov 01, 2011 at 09:39:49AM -0400, Jan Kiszka wrote:
So SVM does not guarantee that an intercept during a task-switch can be
restarted.
Not
So here's the plan: move all hotplug handling out
to ssdt, this way it'll keep working even with a
user-supplied dsdt. Next step we can patch
this ssdt at runtime.
There's little point in this change alone, so posting as RFC,
will repost with the patching part when it's ready,
posting now to
On 10/31/2011 03:07 PM, Eric B Munson wrote:
This flag will be used to check if the vm was stopped by the host when a soft
lockup was detected.
Signed-off-by: Eric B Munsonemun...@mgebm.net
Adding Jeremy since the pvclock ABI is shared across Xen and KVM.
Regards,
Anthony Liguori
---
On 10/31/2011 03:07 PM, Eric B Munson wrote:
When a host stops or suspends a VM it will set a flag to show this. The
watchdog will use these functions to determine if a softlockup is real, or the
result of a suspended VM.
Signed-off-by: Eric B Munsonemun...@mgebm.net
---
On 10/31/2011 03:07 PM, Eric B Munson wrote:
Now that we have a flag that will tell the guest it was suspended, create an
interface for that communication using a KVM ioctl.
Signed-off-by: Eric B Munsonemun...@mgebm.net
---
Changes from V1:
Add kvm_set_host_stopped to arch/x86/jvm/x86.c
On 10/31/2011 03:07 PM, Eric B Munson wrote:
The KVM_GUEST_PAUSED flag will prevent a guest from compaining about a soft
lockup but it can mask real soft lockups if the flag isn't cleared when it is
no longer relevant. This patch adds a kvm ioctl that the hypervisor will use
when it resumes a
On Tue, 01 Nov 2011, Anthony Liguori wrote:
On 10/31/2011 03:07 PM, Eric B Munson wrote:
The KVM_GUEST_PAUSED flag will prevent a guest from compaining about a soft
lockup but it can mask real soft lockups if the flag isn't cleared when it is
no longer relevant. This patch adds a kvm ioctl
On 11/01/2011 02:51 PM, Eric B Munson wrote:
On Tue, 01 Nov 2011, Anthony Liguori wrote:
On 10/31/2011 03:07 PM, Eric B Munson wrote:
The KVM_GUEST_PAUSED flag will prevent a guest from compaining about a soft
lockup but it can mask real soft lockups if the flag isn't cleared when it is
no
On Tue, 01 Nov 2011, Anthony Liguori wrote:
On 10/31/2011 03:07 PM, Eric B Munson wrote:
When a host stops or suspends a VM it will set a flag to show this. The
watchdog will use these functions to determine if a softlockup is real, or
the
result of a suspended VM.
Signed-off-by: Eric B
On Tue, 01 Nov 2011, Anthony Liguori wrote:
On 11/01/2011 02:51 PM, Eric B Munson wrote:
On Tue, 01 Nov 2011, Anthony Liguori wrote:
On 10/31/2011 03:07 PM, Eric B Munson wrote:
The KVM_GUEST_PAUSED flag will prevent a guest from compaining about a soft
lockup but it can mask real soft
On Tue, 01 Nov 2011, Anthony Liguori wrote:
On 10/31/2011 03:07 PM, Eric B Munson wrote:
Now that we have a flag that will tell the guest it was suspended, create an
interface for that communication using a KVM ioctl.
Signed-off-by: Eric B Munsonemun...@mgebm.net
---
Changes from V1:
On Tue, Nov 01, 2011 at 09:11:40PM +0200, Michael S. Tsirkin wrote:
So here's the plan: move all hotplug handling out
to ssdt, this way it'll keep working even with a
user-supplied dsdt. Next step we can patch
this ssdt at runtime.
There's little point in this change alone, so posting as
On Tue, Nov 1, 2011 at 11:10 AM, Jorge Lucangeli Obes
jorg...@chromium.org wrote:
On Tue, Nov 1, 2011 at 9:29 AM, Gerd Hoffmann kra...@redhat.com wrote:
Hi,
(outside-OK) $ qemu-system-x86_64 -version
QEMU emulator version 0.15.0 (qemu-kvm-0.15.0)
(inside-slow) $ qemu-system-x86_64 -version
This feature hasn't been in use for some years now. The host side bits
are deprecated for almost a year. The guest side would only get used
on old hosts, and it's slower than shadow or hw assisted paging.
Time to remove it.
Chris Wright (2):
KVM Guest: remove KVM guest pv mmu support
This has not been used for some years now. It's time to remove it.
Signed-off-by: Chris Wright chr...@redhat.com
---
- v2 rebase to b796a09c
arch/x86/kernel/kvm.c | 181 -
1 files changed, 0 insertions(+), 181 deletions(-)
diff --git
The host side pv mmu support has been marked for feature removal in
January 2011. It's not in use, is slower than shadow or hardware
assisted paging, and a maintenance burden. It's November 2011, time to
remove it.
Signed-off-by: Chris Wright chr...@redhat.com
---
- v2 rebase to b796a09c
On Tue, 1 Nov 2011 14:42:23 +0200, Michael S. Tsirkin m...@redhat.com wrote:
On Tue, Nov 01, 2011 at 02:33:33PM +0200, Sasha Levin wrote:
A proper solution would be for example a configuration in the PIO config
space which points to the MMIO BAR to use instead.
I think it makes sense to
On Tue, 1 Nov 2011 16:40:45 +0200, Michael S. Tsirkin m...@redhat.com wrote:
On Thu, Oct 06, 2011 at 11:18:28AM -0200, Michael S. Tsirkin wrote:
On Thu, Oct 06, 2011 at 12:15:36PM +1030, Rusty Russell wrote:
On Wed, 05 Oct 2011 15:54:05 -0400, Christoph Hellwig
h...@infradead.org wrote:
On Wed, 2011-11-02 at 11:39 +1030, Rusty Russell wrote:
On Tue, 1 Nov 2011 14:42:23 +0200, Michael S. Tsirkin m...@redhat.com
wrote:
On Tue, Nov 01, 2011 at 02:33:33PM +0200, Sasha Levin wrote:
Unless Michael pointed this patch out, it would have broken (at least)
the kvm tool in a non
Hi,
In case of direct io, without the interrupt remapping in IOMMU (intel
VT-d or AMD IOMMU), hypervisor needs to inject interrupt for guest
when the guest is scheduled to specific CPU. At the beginning I
thought with IOMMU's interrupt remapping, the hardware can directly
forward the interrupt to
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/disk/qcow.c |8
tools/kvm/disk/raw.c |2 +-
tools/kvm/include/kvm/disk-image.h |7 +--
3 files changed, 10 insertions(+), 7 deletions(-)
diff --git a/tools/kvm/disk/qcow.c
This patch modifies the definition and usage of ops for read only, mmap and
regular IO.
There is no longer a mix between iov and mmap, and read only no longer implies
mmap (although it will try to use it first).
This allows for more flexibility defining different ops for different
scenarios.
In case a read or write op ptr is missing simply ignore it instead of
critically failing. This provides an easier way to prevent read or write
in specific scenarios.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/disk/core.c |4 ++--
1 files changed, 2 insertions(+), 2
This patch adds an optional callback to be called when a disk op completes.
Currently theres not much use for it, but it is the infrastructure for adding
aio support.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/disk/core.c | 22 ++
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/disk/core.c | 48 ++
tools/kvm/disk/qcow.c | 47 +++--
tools/kvm/disk/raw.c | 50 +---
It is no longer needed due to previous changes.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/disk/qcow.c |9 -
1 files changed, 0 insertions(+), 9 deletions(-)
diff --git a/tools/kvm/disk/qcow.c b/tools/kvm/disk/qcow.c
index ba65ab6..f9598de 100644
---
This patch splits IO request processing from completion notification.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/disk/core.c |6 +-
tools/kvm/include/kvm/disk-image.h |4 +-
tools/kvm/include/kvm/virtio-blk.h |1 +
tools/kvm/virtio/blk.c
This patch connects the completion processing in virtio-blk to the completion
notification coming from disk image.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/virtio/blk.c | 10 ++
1 files changed, 6 insertions(+), 4 deletions(-)
diff --git
This patch adds basic native vectored AIO functions.
These functions should be optimized to process multiple io
requests at once.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/Makefile |7 +++
tools/kvm/config/feature-tests.mak | 10 ++
This patch hooks AIO support into virtio-blk, allowing for faster IO.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/disk/core.c | 39 ++-
tools/kvm/disk/qcow.c |4 +++
tools/kvm/disk/raw.c | 36
On 10/31/2011 10:12 PM, Scott Wood wrote:
+4.59 KVM_DIRTY_TLB
+
+Capability: KVM_CAP_SW_TLB
+Architectures: ppc
+Type: vcpu ioctl
+Parameters: struct kvm_dirty_tlb (in)
+Returns: 0 on success, -1 on error
+
+struct kvm_dirty_tlb {
+ __u64 bitmap;
+ __u32 num_dirty;
+};
85 matches
Mail list logo