On 2012-02-14 08:12, Gerhard Wiesinger wrote:
Hello,
Current QEMU-KVM VGA implementation have the following problem with
legacy OS (e.g. DOS with INT10h calls): Performance is low on accessing
A000:0
page and doing bank switching at the 64k page.
Do we already understand the mode and
On 2012-02-14 08:54, Gleb Natapov wrote:
On Mon, Feb 13, 2012 at 08:22:21PM +0100, Jan Kiszka wrote:
Unfortunately, this is only an internal structure, not officially
documented by MS. However, all supported OS versions a legacy by now, no
longer changing its structure.
This and a note about
On Tue, Feb 14, 2012 at 09:55:46AM +0100, Jan Kiszka wrote:
On 2012-02-14 08:54, Gleb Natapov wrote:
On Mon, Feb 13, 2012 at 08:22:21PM +0100, Jan Kiszka wrote:
Unfortunately, this is only an internal structure, not officially
documented by MS. However, all supported OS versions a legacy by
Sorry for being a noob here, Any clues with this?, anyone ...
On Mon, Feb 13, 2012 at 2:05 AM, Ryan Brown mp3g...@gmail.com wrote:
Host/KVM server is running linux 3.2.4 (Debian wheezy), and guest
kernel is running 3.2.5. The cpu is an E3-1230, but for some reason
its not able to supply the
On 02/10/2012 03:25 PM, Takuya Yoshikawa wrote:
Avi Kivity a...@redhat.com wrote:
2. When we create(and shift?) a memory slot, we call
kvm_arch_flush_shadow()
to clear all mmio sptes, again not restricted to that slot.
/*
* If the new memory slot is created, we need to
On 02/10/2012 07:16 PM, Marcelo Tosatti wrote:
On Thu, Feb 09, 2012 at 04:25:36PM +0200, Avi Kivity wrote:
On 02/08/2012 08:45 PM, Marcelo Tosatti wrote:
BTW do we really need fast slot creation/destruction?
At the moment yes. Boot a RHEL/Fedora installation disk (or any other
On 02/14/2012 02:11 AM, Michael S. Tsirkin wrote:
On Tue, Feb 14, 2012 at 11:49:55AM +1100, ronnie sahlberg wrote:
By just exposing this device to the kernel, the kernel keeps sending,
or if not the kernel maybe some other process trying to poll the
status?
every few seconds :
Hi all,
Since on X86, bios is always at the end of the address space, so I
have some thought about how to implement the seabios support for kvm
tool.
1. using kvm__register_mem to map the end of address space to the
guest then copy the code of seabios to this mem region. Just emulating
the bios
On Tue, Feb 14, 2012 at 1:03 PM, Yang Bai hamo...@gmail.com wrote:
Since on X86, bios is always at the end of the address space, so I
have some thought about how to implement the seabios support for kvm
tool.
1. using kvm__register_mem to map the end of address space to the
guest then copy
On Tue, Feb 14, 2012 at 01:10:59PM +0200, Pekka Enberg wrote:
On Tue, Feb 14, 2012 at 1:03 PM, Yang Bai hamo...@gmail.com wrote:
Since on X86, bios is always at the end of the address space, so I
have some thought about how to implement the seabios support for kvm
tool.
1. using
On Mon, 2012-02-13 at 07:13 -0800, John Fastabend wrote:
The use case here is multiple VFs but the same solution should work with
multiple PFs as well. FDB controls should be independent of how the ports
are exposed VFs, PFs, VMDQ/queue pairs, macvlan, etc.
Makes sense.
With events and
In a nutshell, I don't know what a SHPC is (nor OSHP), so I'm looking
for an additional Ack.
No problem, I'll get an Ack :)
Meanwhile - here's a summary, as far as I understand it.
Originally PCI SIG only defined the electrical
and mechanical requirements from hotplug, no standard
On 02/10/2012 12:09 PM, David Cure wrote:
hello,
Le Sun, Feb 05, 2012 at 11:38:34AM +0200, Avi Kivity ecrivait :
Please post a trace as documented in http://www.linux-kvm.org/page/Tracing.
I made the trace : started just before the slow function launch
and stoped
On Tue, Feb 14, 2012 at 09:20:18PM +0800, Yang Bai wrote:
And will seabios replace the present bios implement or co-exsit?
Ideally we should get rid of our minibios completely and only have
seabios here instead.
Cyrill
--
To unsubscribe from this list: send the line unsubscribe kvm in
On Tue, Feb 14, 2012 at 12:49:08PM +, Paul Brook wrote:
In a nutshell, I don't know what a SHPC is (nor OSHP), so I'm looking
for an additional Ack.
No problem, I'll get an Ack :)
Meanwhile - here's a summary, as far as I understand it.
Originally PCI SIG only defined the
On Tue, Feb 14, 2012 at 03:32:16PM +0200, Avi Kivity wrote:
On 02/10/2012 12:09 PM, David Cure wrote:
hello,
Le Sun, Feb 05, 2012 at 11:38:34AM +0200, Avi Kivity ecrivait :
Please post a trace as documented in
http://www.linux-kvm.org/page/Tracing.
I made the
Now an OS can have a standard driver and use it
to activate hotplug functionality. This is OS hotplug (OSHP).
So presumably this will work on targets that don't have ACPI?
Assuming a competent guest OS of course. Have you tested this?
This being the qemu side of things? I run
- Original Message -
From: Avi Kivity a...@redhat.com
To: David Cure k...@cure.nom.fr
Cc: kvm@vger.kernel.org, Vadim Rozenfeld vroze...@redhat.com
Sent: Tuesday, February 14, 2012 3:32:16 PM
Subject: Re: performance trouble
On 02/10/2012 12:09 PM, David Cure wrote:
hello,
On 02/14/12 07:25, Michael Tokarev wrote:
On 14.02.2012 05:42, Reeted wrote:
Hello, subject says it all
The driver for windows 2000 for the -vga std should be the Anapa VBE
Vesa VBEMP if I understand correctly
but I cannot on earth find this executable
http://navozhdeniye.narod.ru/vbemp.htm
On Tue, Feb 14, 2012 at 01:47:59PM +, Paul Brook wrote:
Now an OS can have a standard driver and use it
to activate hotplug functionality. This is OS hotplug (OSHP).
So presumably this will work on targets that don't have ACPI?
Assuming a competent guest OS of course. Have
Juan Quintela quint...@redhat.com wrote:
Hi
Please send in any agenda items you are interested in covering.
As there are no topics, call is cancelled.
Happy hacking,
Juan.
PD. You should use the extra time to draw a qemu mascot O:-)
Cheers,
Juan.
--
To unsubscribe from this list: send
https://bugzilla.kernel.org/show_bug.cgi?id=42755
--- Comment #28 from Avi Kivity a...@redhat.com 2012-02-14 14:47:38 ---
(In reply to comment #27)
and there soon will be video capture with 'perf top'
http://vbox7.com/play:199e9ede30
Run it while the guest is also running.
--
On 02/14/2012 07:03 PM, Yang Bai wrote:
Hi all,
Since on X86, bios is always at the end of the address space, so I
have some thought about how to implement the seabios support for kvm
tool.
1. using kvm__register_mem to map the end of address space to the
guest then copy the code of seabios to
This imports and builds the original VAPIC option ROM of qemu-kvm.
Its interaction with QEMU is described in the commit that introduces the
corresponding device model.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
.gitignore |1 +
Makefile |2
The CH registers is only written, never read. So we can remove these
operations and, in case of up_set_tpr, also the ECX push/pop.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
pc-bios/optionrom/kvmvapic.S |6 +-
1 files changed, 1 insertions(+), 5 deletions(-)
diff --git
CPUState::next_cpu is already CPUState *.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
cpus.c |8
1 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/cpus.c b/cpus.c
index d0c8340..4e65894 100644
--- a/cpus.c
+++ b/cpus.c
@@ -853,7 +853,7 @@ static int
As we have thread-local cpu_single_env now and KVM uses exactly one
thread per VCPU, we can drop the cpu_single_env updates from the loop
and initialize this variable only once during setup.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
cpus.c|1 +
kvm-all.c |5 -
2 files
Use OPTION_ROM_START/END from the common header file, add comment to
init code.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
pc-bios/optionrom/kvmvapic.S | 18 --
1 files changed, 8 insertions(+), 10 deletions(-)
diff --git a/pc-bios/optionrom/kvmvapic.S
This will allow the APIC core to file a TPR access report. Depending on
the accelerator and kernel irqchip mode, it will either be delivered
right away or queued for later reporting.
In TCG mode, we can restart the triggering instruction and can therefore
forward the event directly. KVM does not
In order to perform critical manipulations on the VM state in the
context of a VCPU, specifically code patching, stopping and resuming of
all VCPUs may be necessary. resume_all_vcpus is already compatible, now
enable pause_all_vcpus for this use case by stopping the calling context
before starting
Always add a byte before the final 512-bytes alignment to reserve the
space for the ROM checksum.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
pc-bios/optionrom/optionrom.h |3 ++-
1 files changed, 2 insertions(+), 1 deletions(-)
diff --git a/pc-bios/optionrom/optionrom.h
v3 comes with the following changes:
- clear TPR access report on system reset
(in case we load a guest without the option ROM)
- addressed review comments on details in kvmvapic.c
- streamlined 16-bit VAPIC port handling
- included cleanup for useless next_cpu casts in cpus.c
(to avoid
This enables acceleration for MMIO-based TPR registers accesses of
32-bit Windows guest systems. It is mostly useful with KVM enabled,
either on older Intel CPUs (without flexpriority feature, can also be
manually disabled for testing) or any current AMD processor.
The approach introduced here is
On 02/13/2012 11:30 PM, Sanidhya Kashyap wrote:
I have been going through the kvm code but didn't get the significance
of level in kvm_mmu_page_role. So, it would be nice if anyone can
explain it what is its use?
It's the page table level. Level 1 contains page table entries pointing
to 4k
On Wed, 08 Feb 2012, Eric B Munson wrote:
When a guest kernel is stopped by the host hypervisor it can look like a soft
lockup to the guest kernel. This false warning can mask later soft lockup
warnings which may be real. This patch series adds a method for a host
hypervisor to
On Tue, Feb 14, 2012 at 09:20:18PM +0800, Yang Bai wrote:
And will seabios replace the present bios implement or co-exsit?
On Tue, Feb 14, 2012 at 3:32 PM, Cyrill Gorcunov gorcu...@openvz.org wrote:
Ideally we should get rid of our minibios completely and only have
seabios here instead.
No,
On Tue, Feb 14, 2012 at 05:35:47PM +0200, Pekka Enberg wrote:
On Tue, Feb 14, 2012 at 09:20:18PM +0800, Yang Bai wrote:
And will seabios replace the present bios implement or co-exsit?
On Tue, Feb 14, 2012 at 3:32 PM, Cyrill Gorcunov gorcu...@openvz.org wrote:
Ideally we should get rid of
On Tue, Feb 14, 2012 at 5:38 PM, Cyrill Gorcunov gorcu...@openvz.org wrote:
Ideally we should get rid of our minibios completely and only have
seabios here instead.
No, no, they should co-exist. There's absolutely no reason to force
people to use a BIOS to boot Linux.
I meant run-time (ie
On Tue, Feb 14, 2012 at 10:29:31AM -0500, Eric B Munson wrote:
On Wed, 08 Feb 2012, Eric B Munson wrote:
When a guest kernel is stopped by the host hypervisor it can look like a
soft
lockup to the guest kernel. This false warning can mask later soft lockup
warnings which may be
On Tue, 14 Feb 2012, Marcelo Tosatti wrote:
On Tue, Feb 14, 2012 at 10:29:31AM -0500, Eric B Munson wrote:
On Wed, 08 Feb 2012, Eric B Munson wrote:
When a guest kernel is stopped by the host hypervisor it can look like a
soft
lockup to the guest kernel. This false warning
On Tue, Feb 14, 2012 at 10:50:13AM -0500, Eric B Munson wrote:
On Tue, 14 Feb 2012, Marcelo Tosatti wrote:
On Tue, Feb 14, 2012 at 10:29:31AM -0500, Eric B Munson wrote:
On Wed, 08 Feb 2012, Eric B Munson wrote:
When a guest kernel is stopped by the host hypervisor it can look
In migration tests, the command we were using as a
'watchdog' command was tcpdump, but without specifying
which interface it should listen to. As this may fail
depending on the interface ordering, let's change the
command to listen in all interfaces, since this way
it's safer and the command won't
On Fri, Feb 10, 2012 at 03:28:31PM +0900, Takuya Yoshikawa wrote:
Other threads may process the same page in that small window and skip
TLB flush and then return before these functions do flush.
It's correct to flush the shadow MMU TLB without the mmu_lock only in
the context of mmu notifier
On Tue, Feb 14, 2012 at 01:56:17PM +0900, Takuya Yoshikawa wrote:
(2012/02/14 13:36), Takuya Yoshikawa wrote:
BTW, do you think that kvm_mmu_flush_tlb() should be moved inside of the
mmu_lock critical section?
Ah, forget about this. Trivially no.
Yes the reason is that it's the local
On Fri, Feb 10, 2012 at 03:52:49PM +0800, Xiao Guangrong wrote:
On 02/10/2012 02:28 PM, Takuya Yoshikawa wrote:
Other threads may process the same page in that small window and skip
TLB flush and then return before these functions do flush.
It is possible that flush tlb in mmu lock
On Tue, Feb 14, 2012 at 06:10:44PM +0100, Andrea Arcangeli wrote:
On Fri, Feb 10, 2012 at 03:28:31PM +0900, Takuya Yoshikawa wrote:
Other threads may process the same page in that small window and skip
TLB flush and then return before these functions do flush.
It's correct to flush the
On Tue, Jan 31, 2012 at 1:15 PM, Ingo Molnar mi...@elte.hu wrote:
(added KVM folks to the Cc:)
* Bastien ROUCARIES roucaries.bast...@gmail.com wrote:
Ping^2
Bastien
On Mon, Jan 23, 2012 at 11:28 AM, Bastien ROUCARIES
roucaries.bast...@gmail.com wrote:
On Mon, Jan 16, 2012 at 8:21 PM,
On Tuesday, February 14, 2012 03:31:10 AM Ryan Brown wrote:
Sorry for being a noob here, Any clues with this?, anyone ...
On Mon, Feb 13, 2012 at 2:05 AM, Ryan Brown mp3g...@gmail.com wrote:
Host/KVM server is running linux 3.2.4 (Debian wheezy), and guest
kernel is running 3.2.5. The cpu
On Tue, Feb 14, 2012 at 03:29:47PM -0200, Marcelo Tosatti wrote:
The problem the patch is fixing is not related to page freeing, but
rmap_write_protect. From 8bf3f6f06fcdfd097b6c6ec51531d8292fa0d81d
Can't find the commit on kvm.git.
(replace A (get_dirty_log) with
On 2/14/2012 5:18 AM, jamal wrote:
On Mon, 2012-02-13 at 07:13 -0800, John Fastabend wrote:
The use case here is multiple VFs but the same solution should work with
multiple PFs as well. FDB controls should be independent of how the ports
are exposed VFs, PFs, VMDQ/queue pairs, macvlan, etc.
On Tue, 14 Feb 2012 10:57:04 -0800
John Fastabend john.r.fastab...@intel.com wrote:
On 2/14/2012 5:18 AM, jamal wrote:
On Mon, 2012-02-13 at 07:13 -0800, John Fastabend wrote:
The use case here is multiple VFs but the same solution should work with
multiple PFs as well. FDB controls
On 2/14/2012 11:05 AM, Stephen Hemminger wrote:
On Tue, 14 Feb 2012 10:57:04 -0800
John Fastabend john.r.fastab...@intel.com wrote:
On 2/14/2012 5:18 AM, jamal wrote:
On Mon, 2012-02-13 at 07:13 -0800, John Fastabend wrote:
The use case here is multiple VFs but the same solution should
On Tue, Feb 14, 2012 at 07:53:56PM +0100, Andrea Arcangeli wrote:
On Tue, Feb 14, 2012 at 03:29:47PM -0200, Marcelo Tosatti wrote:
The problem the patch is fixing is not related to page freeing, but
rmap_write_protect. From 8bf3f6f06fcdfd097b6c6ec51531d8292fa0d81d
Can't find the commit on
On Tue, 14 Feb 2012, Marcelo Tosatti wrote:
On Tue, Feb 14, 2012 at 10:50:13AM -0500, Eric B Munson wrote:
On Tue, 14 Feb 2012, Marcelo Tosatti wrote:
On Tue, Feb 14, 2012 at 10:29:31AM -0500, Eric B Munson wrote:
On Wed, 08 Feb 2012, Eric B Munson wrote:
When a guest
Thanks for the reply, I was thinking AESNI was supported in the way
SSE/MMX and other cpu flags are supported? is a QEMU or a KVM issue?
On Wed, Feb 15, 2012 at 7:18 AM, Brian Jackson i...@theiggy.com wrote:
On Tuesday, February 14, 2012 03:31:10 AM Ryan Brown wrote:
Sorry for being a noob
On Tue, Feb 14, 2012 at 04:13:42PM +0400, Cyrill Gorcunov wrote:
On Tue, Feb 14, 2012 at 01:10:59PM +0200, Pekka Enberg wrote:
On Tue, Feb 14, 2012 at 1:03 PM, Yang Bai hamo...@gmail.com wrote:
Since on X86, bios is always at the end of the address space, so I
have some thought about how
The Buildbot has detected a new failure on builder i386 while building kvm.
Full details are available at:
http://buildbot.b1-systems.de/kvm/builders/i386/builds/454
Buildbot URL: http://buildbot.b1-systems.de/kvm/
Buildslave for this Build: b1_kvm_1
Build Reason: The Nightly scheduler named
https://bugzilla.kernel.org/show_bug.cgi?id=42755
--- Comment #29 from Rosen sandik...@yandex.ru 2012-02-15 07:49:35 ---
(In reply to comment #28)
(In reply to comment #27)
and there soon will be video capture with 'perf top'
http://vbox7.com/play:199e9ede30
Run it while the guest
58 matches
Mail list logo