Hi all,
is there a summary existing that shows up the rough or actual differences
between qemu --enable-kvm and qemu-kvm? I tested both versions with the
same compile and start options, the CPU performance results are identical,
only the bootup time of my guest system with qemu-kvm seemed to
On 05/18/2012 12:34 PM, Matthias Lange wrote:
Hi,
I was playing around with kvm's nested virtualization feature on Intel
VT-x. When trying to access the GUEST_SMBASE (offset 0x4828)field of the
VMCS I got a VMREAD/VMWRITE from/to unsupported VMCS component error.
According to the Intel
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Nothing spectacular, just regularization of the code.
v2:
fix endless loop in patch 3 where a reload would set a bit in
vcpu-requests and abort the entry
Avi Kivity (3):
KVM: Simplify KVM_REQ_EVENT/req_int_win handling
KVM: Optimize vcpu-requests slow path slightly
KVM: Move mmu
Put the KVM_REQ_EVENT block in the regular vcpu-requests if (),
instead of its own little check.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/x86.c | 30 --
1 file changed, 16 insertions(+), 14 deletions(-)
diff --git a/arch/x86/kvm/x86.c
Instead of using a atomic operation per active request, use just one
to get all requests at once, then check them with local ops. This
probably isn't any faster, since simultaneous requests are rare, but
it does reduce code size.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/x86.c
Currently we check that the mmu root exits before every entry. Use the
existing KVM_REQ_MMU_RELOAD mechanism instead, by making it really reload
the mmu, and by adding the request to mmu initialization code.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/mmu.c |4 +++-
On 05/20/2012 03:55 AM, Erik Brakkee wrote:
Hi,
I am seeing high workload spikes of approx. 15 when I do IO inside a
KVM guest, for instance
dd if=/dev/zero bs=1G count=1 of=hog
When I execute a similar command on the host to write a file on the
same physical disk, the workload only
On 05/20/2012 07:15 AM, Takuya Yoshikawa wrote:
From: Takuya Yoshikawa yoshikawa.tak...@oss.ntt.co.jp
lpage_info is created for each large level even when the memory slot is
not for RAM. This means that when we add one slot for a PCI device, we
end up allocating at least KVM_NR_PAGE_SIZES -
On 05/17/2012 04:32 PM, Jan Kiszka wrote:
[ changes in v2: rebase over uq/master ]
This series is another major milestone of merging qemu-kvm into
upstream. It implements the required interfaces and logic to directly
inject MSI-X interrupts generated by the vhost-net kernel module into
the
On Thu, May 17, 2012 at 10:32:28AM -0300, Jan Kiszka wrote:
After this series, to only reasons to still use qemu-kvm for production
purposes will be PCI device assignment
Yay!
By the way, there are probably not many reasons to keep the
assignment code out of qemu.git. It duplicates a ton of
On 05/20/2012 05:42 PM, Michael S. Tsirkin wrote:
On Thu, May 17, 2012 at 10:32:28AM -0300, Jan Kiszka wrote:
After this series, to only reasons to still use qemu-kvm for production
purposes will be PCI device assignment
Yay!
By the way, there are probably not many reasons to keep the
On 05/10/2012 06:09 PM, Michal Suchanek wrote:
It does not work.
Without the patch KVM git experiences emulation error, with the patch
it just locks up.
I just tested it, and it worked for me; kvm.git next. Fastest reboot
I've ever seen.
Also I don't see why would they use movntps for
On 05/10/2012 07:43 AM, Mao, Junjie wrote:
This patch makes Qemu accept the PCID feature specified from configuration or
command line options.
Please post to the qemu mailing list. It's not kvm specific (it isn't
supported by tcg, but that's another story).
--
error compiling committee.c:
On 05/20/2012 08:29 PM, Erik Brakkee wrote:
Avi Kivity wrote:
On 05/20/2012 08:02 PM, Erik Brakkee wrote:
[...]
Thanks for this information. Unfortunately, io=native in domain.xml
is not supported by opensuse 11.3. It is supported in 12.1 so it
appears that the version of KVM I have on the
On Wed, May 16, 2012 at 7:58 PM, Rusty Russell ru...@rustcorp.com.au wrote:
On Mon, 14 May 2012 18:57:20 -0400, Christoffer Dall
c.d...@virtualopensystems.com wrote:
On Thu, Mar 22, 2012 at 8:41 PM, Rusty Russell rusty.russ...@linaro.org
wrote:
As our emulation gets more sophisticated, we
-Original Message-
From: Marcelo Tosatti [mailto:mtosa...@redhat.com]
Sent: Saturday, May 19, 2012 5:51 AM
To: Mao, Junjie
Cc: n...@math.technion.ac.il; 'kvm@vger.kernel.org'
Subject: Re: [PATCH v3] KVM: x86: Implement PCID/INVPCID for guests with
EPT
On Fri, May 18, 2012 at
On Sun, 20 May 2012 14:34:48 -0400, Christoffer Dall
c.d...@virtualopensystems.com wrote:
On Wed, May 16, 2012 at 7:58 PM, Rusty Russell ru...@rustcorp.com.au wrote:
On Mon, 14 May 2012 18:57:20 -0400, Christoffer Dall
c.d...@virtualopensystems.com wrote:
On Thu, Mar 22, 2012 at 8:41 PM,
于 2012年05月21日 01:43, Avi Kivity 写道:
On 05/16/2012 10:50 AM, zhangyanfei wrote:
This patch set exports offsets of VMCS fields as note information for
kdump. We call it VMCSINFO. The purpose of VMCSINFO is to retrieve
runtime state of guest machine image, such as registers, in host
machine's
-Original Message-
From: Marcelo Tosatti [mailto:mtosa...@redhat.com]
Sent: Friday, May 18, 2012 10:23 AM
To: Xudong Hao
Cc: a...@redhat.com; kvm@vger.kernel.org; linux-ker...@vger.kernel.org;
Shan, Haitao; Zhang, Xiantao; Hao, Xudong
Subject: Re: [PATCH 4/4] Enabling Access bit
On 05/18/2012 12:17 AM, Richard W.M. Jones wrote:
On Thu, May 17, 2012 at 11:36:24PM +0530, Jaspal wrote:
Hi ,
Is it possible to keep a count of reads / writes taking place in a
vm using qemu ( using kvm as hypervisor ) ? Is there a api ( or any
patch ) for it ?
Memory reads and writes is
Hi All,
This is KVM upstream test result against kvm.git
51bfd2998113e1f8ce8dcf853407b76a04b5f2a0 based on kernel 3.4.0-rc7, and
qemu-kvm.git a1fce560c0e5f287ed65d2aaadb3e59578aaa983.
We found 1 new bug and 1 bug got fixed in the past two weeks.
New issue (1):
1. disk error when guest boot
Add EPT A/D bits definitions.
Signed-off-by: Haitao Shan haitao.s...@intel.com
Signed-off-by: Xudong Hao xudong@intel.com
---
arch/x86/include/asm/vmx.h |4
1 files changed, 4 insertions(+), 0 deletions(-)
diff --git a/arch/x86/include/asm/vmx.h b/arch/x86/include/asm/vmx.h
index
Enabling Access bit when doing memory swapping.
Signed-off-by: Haitao Shan haitao.s...@intel.com
Signed-off-by: Xudong Hao xudong@intel.com
---
arch/x86/kvm/mmu.c | 13 +++--
arch/x86/kvm/vmx.c |6 --
2 files changed, 11 insertions(+), 8 deletions(-)
diff --git
Add kernel parameter to control A/D bits support, it's on by default.
Signed-off-by: Haitao Shan haitao.s...@intel.com
Signed-off-by: Xudong Hao xudong@intel.com
---
arch/x86/kvm/vmx.c | 12
1 files changed, 12 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/vmx.c
In EPT page structure entry, Enable EPT A/D bits if processor supported.
Signed-off-by: Haitao Shan haitao.s...@intel.com
Signed-off-by: Xudong Hao xudong@intel.com
---
arch/x86/kvm/vmx.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/vmx.c
26 matches
Mail list logo