On Mon, Oct 19, 2015 at 12:04:48PM +0800, Xiao Guangrong wrote:
>
>
> On 10/19/2015 01:16 AM, Michael S. Tsirkin wrote:
> >On Mon, Oct 19, 2015 at 08:54:13AM +0800, Xiao Guangrong wrote:
> >>Check if the input Arg3 is valid then store it into dsm_in if needed
> >>
> >>Signed-off-by: Xiao
Commit fd1369021878 ("KVM: x86: MMU: Move mapping_level_dirty_bitmap()
call in mapping_level()") forgot to initialize force_pt_level to false
in FNAME(page_fault)() before calling mapping_level() like
nonpaging_map() does. This can sometimes result in forcing page table
level mapping
On Mon, Oct 19, 2015 at 12:39:24PM +0800, Xiao Guangrong wrote:
>
>
> On 10/19/2015 02:05 AM, Michael S. Tsirkin wrote:
> >On Mon, Oct 19, 2015 at 08:54:14AM +0800, Xiao Guangrong wrote:
> >>__DSM is defined in ACPI 6.0: 9.14.1 _DSM (Device Specific Method)
> >>
> >>Function 0 is a query
On Sun, Oct 11, 2015 at 11:52:54AM +0800, Xiao Guangrong wrote:
> We reserve the memory region 0xFF0 ~ 0xFFF0 for NVDIMM ACPI
> which is used as:
> - the first page is mapped as MMIO, ACPI write data to this page to
> transfer the control to QEMU
>
> - the second page is RAM-based which
On Sun, Oct 11, 2015 at 11:52:32AM +0800, Xiao Guangrong wrote:
> Changelog in v3:
> There is huge change in this version, thank Igor, Stefan, Paolo, Eduardo,
> Michael for their valuable comments, the patchset finally gets better shape.
Thanks!
This needs some changes in coding style, and more
On 10/19/2015 03:06 PM, Michael S. Tsirkin wrote:
On Mon, Oct 19, 2015 at 12:39:24PM +0800, Xiao Guangrong wrote:
On 10/19/2015 02:05 AM, Michael S. Tsirkin wrote:
On Mon, Oct 19, 2015 at 08:54:14AM +0800, Xiao Guangrong wrote:
__DSM is defined in ACPI 6.0: 9.14.1 _DSM (Device Specific
On 10/19/2015 02:50 PM, Michael S. Tsirkin wrote:
On Sun, Oct 11, 2015 at 11:52:58AM +0800, Xiao Guangrong wrote:
Check if the input Arg3 is valid then store it into dsm_in if needed
We only do the save on NVDIMM device since we are not going to support any
function on root device
On Mon, Oct 19, 2015 at 03:14:28PM +0800, Xiao Guangrong wrote:
>
>
> On 10/19/2015 02:50 PM, Michael S. Tsirkin wrote:
> >On Sun, Oct 11, 2015 at 11:52:58AM +0800, Xiao Guangrong wrote:
> >>Check if the input Arg3 is valid then store it into dsm_in if needed
> >>
> >>We only do the save on
On Fr, 2015-10-16 at 11:48 -0400, Eric S. Johansson wrote:
>
> On 10/16/2015 07:55 AM, Stefan Hajnoczi wrote:
> > QEMU can emulate PCI soundcards, including the Intel HD Audio codec
> > cards (-device intel-hda or -soundhw hda might do the trick). Low
> > latency and power consumption are
On Mon, Oct 19, 2015 at 03:27:21PM +0800, Xiao Guangrong wrote:
> >>+nvdimm_init_memory_state(>nvdimm_memory, system_memory,
> >>machine,
> >>+ TARGET_PAGE_SIZE);
> >>+
> >
> >Shouldn't this be conditional on presence of the nvdimm device?
> >
>
> We will
On 10/19/2015 03:39 PM, Michael S. Tsirkin wrote:
On Mon, Oct 19, 2015 at 03:27:21PM +0800, Xiao Guangrong wrote:
+nvdimm_init_memory_state(>nvdimm_memory, system_memory, machine,
+ TARGET_PAGE_SIZE);
+
Shouldn't this be conditional on presence of the
On 16/10/2015 17:38, Alex Williamson wrote:
> According to Microsoft documentation, the signature in the standard
> hypervisor CPUID leaf at 0x4000 identifies the Vendor ID and is
> for reporting and diagnostic purposes only. We can therefore allow
> the user to change it to whatever they
On Sun, Oct 11, 2015 at 11:52:58AM +0800, Xiao Guangrong wrote:
> Check if the input Arg3 is valid then store it into dsm_in if needed
>
> We only do the save on NVDIMM device since we are not going to support any
> function on root device
>
> Signed-off-by: Xiao Guangrong
On Tue, Oct 13, 2015 at 01:29:48PM +0800, Xiao Guangrong wrote:
>
>
> On 10/12/2015 07:55 PM, Michael S. Tsirkin wrote:
> >On Sun, Oct 11, 2015 at 11:52:32AM +0800, Xiao Guangrong wrote:
> >>Changelog in v3:
> >>There is huge change in this version, thank Igor, Stefan, Paolo, Eduardo,
>
On Mon, Oct 19, 2015 at 12:04:48PM +0800, Xiao Guangrong wrote:
>
>
> On 10/19/2015 01:16 AM, Michael S. Tsirkin wrote:
> >On Mon, Oct 19, 2015 at 08:54:13AM +0800, Xiao Guangrong wrote:
> >>Check if the input Arg3 is valid then store it into dsm_in if needed
> >>
> >>Signed-off-by: Xiao
On 10/19/2015 02:56 PM, Michael S. Tsirkin wrote:
On Sun, Oct 11, 2015 at 11:52:54AM +0800, Xiao Guangrong wrote:
We reserve the memory region 0xFF0 ~ 0xFFF0 for NVDIMM ACPI
which is used as:
- the first page is mapped as MMIO, ACPI write data to this page to
transfer the control
On 10/19/2015 03:47 PM, Michael S. Tsirkin wrote:
aml_arg(3) is used many times below.
Pls give it a name that makes sense (not arg3! what is it for?)
Er. aml_arg(3) is just the fourth parameter of _DSM method. Will add some
comments:
/*
* The fourth parameter (Arg3) of _DMS is a
This comes as a separate patch because I do not really understand
/usr/bin/make, probably it should be updated.
Change the main Makefile so that if an arch defines ARCH_PRE_INIT
then we
- build $GUEST_INIT without "-static"
- add -DCONFIG_GUEST_PRE_INIT to $CFLAGS
- build
Add the tiny x86/init.S which just mounts /host and execs
/virt/init.
NOTE: of course, the usage of CONFIG_GUEST_PRE_INIT is ugly, we
need to cleanup this code. But I'd prefer to do this on top of
this minimal/simple change. And I think this needs cleanups in
any case, for example I think lkvm
Turn kvm_setup_guest_init(guestfs_name) into a more generic helper,
extract_file(guestfs_name, filename, data, size) and reimplement
kvm_setup_guest_init() as a trivial wrapper.
Signed-off-by: Oleg Nesterov
---
builtin-setup.c | 24 ++--
1 file changed, 14
Hello,
Yesterday I discovered kvmtool and it looks really cool! Thanks!
Looks like, it does exactly what I need.
But the static /virt/init doesn't look good. This series lessens
the size of lkvm binary from 1045952 to 196200 bytes on x86_64,
but this is minor. I want to write my /virt/init in
On Mon, Oct 19, 2015 at 03:44:13PM +0800, Xiao Guangrong wrote:
>
>
> On 10/19/2015 03:39 PM, Michael S. Tsirkin wrote:
> >On Mon, Oct 19, 2015 at 03:27:21PM +0800, Xiao Guangrong wrote:
> +nvdimm_init_memory_state(>nvdimm_memory, system_memory,
> machine,
> +
Hi Dmitry,
On 19/10/15 10:05, Dmitry Vyukov wrote:
> On Fri, Oct 16, 2015 at 7:25 PM, Sasha Levin wrote:
>> On 10/15/2015 04:20 PM, Dmitry Vyukov wrote:
>>> Hello,
>>>
>>> I am trying to run a program in lkvm sandbox so that it communicates
>>> with a program on host. I
Not zeroing EFER means that a 32-bit firmware cannot enter paging mode
without clearing EFER.LME first (which it should not know about).
Yang Zhang from Intel confirmed that the manual is wrong and EFER is
cleared to zero on INIT.
Fixes: d28bc9dd25ce023270d2e039e7c98d38ecbf7758
Cc:
On Sat, Sep 26, 2015 at 04:43:29PM -0700, Mario Smarduch wrote:
> This patch enhances current lazy vfp/simd hardware switch. In addition to
> current lazy switch, it tracks vfp/simd hardware state with a vcpu
> lazy flag.
>
> vcpu lazy flag is set on guest access and trap to vfp/simd hardware
On Sat, Sep 26, 2015 at 04:43:28PM -0700, Mario Smarduch wrote:
> This patch adds vcpu fields to track lazy state, save host FPEXC, and
> offsets to fields.
>
> Signed-off-by: Mario Smarduch
> ---
> arch/arm/include/asm/kvm_host.h | 6 ++
>
On Mon, 19 Oct 2015 09:56:12 +0300
"Michael S. Tsirkin" wrote:
> On Sun, Oct 11, 2015 at 11:52:54AM +0800, Xiao Guangrong wrote:
[...]
> > diff --git a/include/hw/mem/nvdimm.h b/include/hw/mem/nvdimm.h
> > index f6bd2c4..aa95961 100644
> > --- a/include/hw/mem/nvdimm.h
> > +++
On Mon, Oct 19, 2015 at 11:22 AM, Andre Przywara wrote:
> Hi Dmitry,
>
> On 19/10/15 10:05, Dmitry Vyukov wrote:
>> On Fri, Oct 16, 2015 at 7:25 PM, Sasha Levin wrote:
>>> On 10/15/2015 04:20 PM, Dmitry Vyukov wrote:
Hello,
I am
On 19/10/2015 08:13, Takuya Yoshikawa wrote:
> Commit fd1369021878 ("KVM: x86: MMU: Move mapping_level_dirty_bitmap()
> call in mapping_level()") forgot to initialize force_pt_level to false
> in FNAME(page_fault)() before calling mapping_level() like
> nonpaging_map() does. This can sometimes
Not zeroing EFER means that a 32-bit firmware cannot enter paging mode
without clearing EFER.LME first (which it should not know about).
Yang Zhang from Intel confirmed that the manual is wrong and EFER is
cleared to zero on INIT.
Fixes: d28bc9dd25ce023270d2e039e7c98d38ecbf7758
Cc:
On Mon, Oct 19, 2015 at 06:01:17PM +0800, Xiao Guangrong wrote:
>
>
> On 10/19/2015 05:46 PM, Igor Mammedov wrote:
> >On Mon, 19 Oct 2015 12:17:22 +0300
> >"Michael S. Tsirkin" wrote:
> >
> >>On Mon, Oct 19, 2015 at 03:44:13PM +0800, Xiao Guangrong wrote:
> >>>
> >>>
> >>>On
On Mon, 19 Oct 2015 12:17:22 +0300
"Michael S. Tsirkin" wrote:
> On Mon, Oct 19, 2015 at 03:44:13PM +0800, Xiao Guangrong wrote:
> >
> >
> > On 10/19/2015 03:39 PM, Michael S. Tsirkin wrote:
> > >On Mon, Oct 19, 2015 at 03:27:21PM +0800, Xiao Guangrong wrote:
> > +
On 10/19/2015 05:46 PM, Igor Mammedov wrote:
On Mon, 19 Oct 2015 12:17:22 +0300
"Michael S. Tsirkin" wrote:
On Mon, Oct 19, 2015 at 03:44:13PM +0800, Xiao Guangrong wrote:
On 10/19/2015 03:39 PM, Michael S. Tsirkin wrote:
On Mon, Oct 19, 2015 at 03:27:21PM +0800, Xiao
The symbol was missing a KVM dependency.
Signed-off-by: Jan Beulich
---
virt/kvm/Kconfig |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
--- 4.3-rc6/virt/kvm/Kconfig
+++ 4.3-rc6-KVM_COMPAT-dependency/virt/kvm/Kconfig
@@ -46,4 +46,4 @@ config
On Mon, 19 Oct 2015 18:01:17 +0800
Xiao Guangrong wrote:
>
>
> On 10/19/2015 05:46 PM, Igor Mammedov wrote:
> > On Mon, 19 Oct 2015 12:17:22 +0300
> > "Michael S. Tsirkin" wrote:
> >
> >> On Mon, Oct 19, 2015 at 03:44:13PM +0800, Xiao Guangrong
On Sat, Oct 17, 2015 at 4:16 PM, Sasha Levin wrote:
> On 10/15/2015 06:21 AM, Dmitry Vyukov wrote:
>> Hello,
>>
>> I've run a set of sanitizers on
>> git://git.kernel.org/pub/scm/linux/kernel/git/will/kvmtool.git commit
>> 3695adeb227813d96d9c41850703fb53a23845eb. I've
On Mon, Oct 19, 2015 at 11:18:36AM +0200, Igor Mammedov wrote:
> On Mon, 19 Oct 2015 09:56:12 +0300
> "Michael S. Tsirkin" wrote:
>
> > On Sun, Oct 11, 2015 at 11:52:54AM +0800, Xiao Guangrong wrote:
> [...]
> > > diff --git a/include/hw/mem/nvdimm.h b/include/hw/mem/nvdimm.h
>
On 19/10/2015 12:37, Jan Beulich wrote:
> The symbol was missing a KVM dependency.
>
> Signed-off-by: Jan Beulich
> ---
> virt/kvm/Kconfig |2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> --- 4.3-rc6/virt/kvm/Kconfig
> +++
On Sunday 18 October 2015 18:00:11 Eric Auger wrote:
> This series fixes the current implementation by getting rid of the
> usage of __symbol_get which caused a compilation issue with
> CONFIG_MODULES disabled. On top of this, the usage of MODULE_ALIAS makes
> possible to add a new reset module
On Sunday 18 October 2015 18:00:12 Eric Auger wrote:
>
> +struct list_head reset_list;
> +LIST_HEAD(reset_list);
>
These two should be marked 'static'.
Arnd
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More
Hi Christoffer,
On 10/17/2015 10:30 PM, Christoffer Dall wrote:
> We have an interesting issue when the guest disables the timer interrupt
> on the VGIC, which happens when turning VCPUs off using PSCI, for
> example.
>
> The problem is that because the guest disables the virtual interrupt at
>
On Mon, Oct 19, 2015 at 03:27:42PM +0200, Eric Auger wrote:
> On 10/19/2015 03:14 PM, Christoffer Dall wrote:
> > On Mon, Oct 19, 2015 at 03:07:16PM +0200, Eric Auger wrote:
> >> Hi Christoffer,
> >> On 10/17/2015 10:30 PM, Christoffer Dall wrote:
> >>> We have an interesting issue when the guest
On 10/19/2015 03:25 PM, Arnd Bergmann wrote:
> On Monday 19 October 2015 15:17:30 Eric Auger wrote:
>> Hi Arnd,
>> On 10/19/2015 03:04 PM, Arnd Bergmann wrote:
>>> On Sunday 18 October 2015 18:00:13 Eric Auger wrote:
diff --git a/drivers/vfio/platform/reset/vfio_platform_calxedaxgmac.c
On 10/19/2015 04:37 AM, Dmitry Vyukov wrote:
>> So in this case (and most of the other data race cases described in the full
>> log) it
>> > seems like ThreadSanitizer is mixing with different accesses by the guest
>> > to one underlying
>> > block of memory on the host.
>> >
>> > Here, for
On 10/19/2015 05:28 AM, Dmitry Vyukov wrote:
> On Mon, Oct 19, 2015 at 11:22 AM, Andre Przywara
> wrote:
>> Hi Dmitry,
>>
>> On 19/10/15 10:05, Dmitry Vyukov wrote:
>>> On Fri, Oct 16, 2015 at 7:25 PM, Sasha Levin wrote:
On 10/15/2015 04:20
On Sunday 18 October 2015 18:00:13 Eric Auger wrote:
> diff --git a/drivers/vfio/platform/reset/vfio_platform_calxedaxgmac.c
> b/drivers/vfio/platform/reset/vfio_platform_calxedaxgmac.c
> index 619dc7d..4f76b17 100644
> --- a/drivers/vfio/platform/reset/vfio_platform_calxedaxgmac.c
> +++
On Mon, Oct 19, 2015 at 03:07:16PM +0200, Eric Auger wrote:
> Hi Christoffer,
> On 10/17/2015 10:30 PM, Christoffer Dall wrote:
> > We have an interesting issue when the guest disables the timer interrupt
> > on the VGIC, which happens when turning VCPUs off using PSCI, for
> > example.
> >
> >
Hi Arnd,
On 10/19/2015 03:04 PM, Arnd Bergmann wrote:
> On Sunday 18 October 2015 18:00:13 Eric Auger wrote:
>> diff --git a/drivers/vfio/platform/reset/vfio_platform_calxedaxgmac.c
>> b/drivers/vfio/platform/reset/vfio_platform_calxedaxgmac.c
>> index 619dc7d..4f76b17 100644
>> ---
On 10/19/2015 03:14 PM, Christoffer Dall wrote:
> On Mon, Oct 19, 2015 at 03:07:16PM +0200, Eric Auger wrote:
>> Hi Christoffer,
>> On 10/17/2015 10:30 PM, Christoffer Dall wrote:
>>> We have an interesting issue when the guest disables the timer interrupt
>>> on the VGIC, which happens when
On Monday 19 October 2015 15:17:30 Eric Auger wrote:
> Hi Arnd,
> On 10/19/2015 03:04 PM, Arnd Bergmann wrote:
> > On Sunday 18 October 2015 18:00:13 Eric Auger wrote:
> >> diff --git a/drivers/vfio/platform/reset/vfio_platform_calxedaxgmac.c
> >>
According to git grep they can be static.
term_got_escape can be static too, and we can even move it into
term_getc().
"int term_escape_char" doesn't make sense at least until we allow
to redefine it, turn it into preprocessor constant.
Signed-off-by: Oleg Nesterov
---
On Mon, Oct 19, 2015 at 4:35 PM, Sasha Levin wrote:
> On 10/19/2015 10:24 AM, Dmitry Vyukov wrote:
>> On Mon, Oct 19, 2015 at 4:19 PM, Sasha Levin wrote:
>>> > On 10/19/2015 04:37 AM, Dmitry Vyukov wrote:
> >>> So in this case (and most of the
2015-10-19 11:35+0200, Paolo Bonzini:
> Not zeroing EFER means that a 32-bit firmware cannot enter paging mode
> without clearing EFER.LME first (which it should not know about).
> Yang Zhang from Intel confirmed that the manual is wrong and EFER is
> cleared to zero on INIT.
Also in APM v2,
On 10/19/2015 10:47 AM, Dmitry Vyukov wrote:
>> Right, the memory areas that are accessed both by the hypervisor and the
>> guest
>> > should be treated as untrusted input, but the hypervisor is supposed to
>> > validate
>> > the input carefully before using it - so I'm not sure how data races
On Mon, Oct 19, 2015 at 4:19 PM, Sasha Levin wrote:
> On 10/19/2015 04:37 AM, Dmitry Vyukov wrote:
>>> So in this case (and most of the other data race cases described in the
>>> full log) it
>>> > seems like ThreadSanitizer is mixing with different accesses by the guest
On 10/19/2015 10:24 AM, Dmitry Vyukov wrote:
> On Mon, Oct 19, 2015 at 4:19 PM, Sasha Levin wrote:
>> > On 10/19/2015 04:37 AM, Dmitry Vyukov wrote:
>>> So in this case (and most of the other data race cases described in
>>> the full log) it
> >>> > seems
On Mon, Oct 19, 2015 at 5:08 PM, Sasha Levin wrote:
> On 10/19/2015 10:47 AM, Dmitry Vyukov wrote:
>>> Right, the memory areas that are accessed both by the hypervisor and the
>>> guest
>>> > should be treated as untrusted input, but the hypervisor is supposed to
>>> >
This allows the user to always override the paramaters set by lkvm.
Say, currently 'lkvm run -p ro' doesn't work.
To keep the current logic we need to change strstr("root=") to check
cfg.kernel_cmdline, not real_cmdline. And perhaps we can even add a
simple helper add_param(name, val) to make
On Mon, Oct 19, 2015 at 05:32:42PM +0200, Eric Auger wrote:
> Hi,
> On 10/17/2015 10:30 PM, Christoffer Dall wrote:
> > When a guest reboots or offlines/onlines CPUs, it is not uncommon for it
> > to clear the pending and active states of an interrupt through the
> > emulated VGIC distributor.
On 10/19/2015 05:39 PM, Christoffer Dall wrote:
> On Mon, Oct 19, 2015 at 05:32:42PM +0200, Eric Auger wrote:
>> Hi,
>> On 10/17/2015 10:30 PM, Christoffer Dall wrote:
>>> When a guest reboots or offlines/onlines CPUs, it is not uncommon for it
>>> to clear the pending and active states of an
Hi,
On 10/17/2015 10:30 PM, Christoffer Dall wrote:
> When a guest reboots or offlines/onlines CPUs, it is not uncommon for it
> to clear the pending and active states of an interrupt through the
> emulated VGIC distributor. However, since we emulate an edge-triggered
> based on a level-triggered
Hi Drew,
I appreciate your feedback on these patches.
On 10/18/2015 02:28 PM, Andrew Jones wrote:
>> --- a/arm/pmu.c
>> +++ b/arm/pmu.c
>> @@ -37,6 +37,18 @@ static inline unsigned long get_pmccntr(void)
>> asm volatile("mrc p15, 0, %0, c9, c13, 0" : "=r" (cycles));
>> return cycles;
On Mon, Oct 19, 2015 at 12:09 AM, Michael S. Tsirkin wrote:
> On Mon, Oct 19, 2015 at 12:04:48PM +0800, Xiao Guangrong wrote:
> I mean don't use ASL to comment C. It's not more readable.
> Describe why the code is the way it is. Use variables by preference,
> C does not have
Hello Patrick,
On Mon, Oct 12, 2015 at 11:04:11AM -0400, Patrick Donnelly wrote:
> Hello Andrea,
>
> On Mon, Jun 15, 2015 at 1:22 PM, Andrea Arcangeli wrote:
> > This is an incremental update to the userfaultfd code in -mm.
>
> Sorry I'm late to this party. I'm curious how
On Mon, Oct 19, 2015 at 2:19 PM, Michael S. Tsirkin wrote:
> On Mon, Oct 19, 2015 at 10:29:50AM -0700, Dan Williams wrote:
>> On Mon, Oct 19, 2015 at 12:09 AM, Michael S. Tsirkin wrote:
>> > On Mon, Oct 19, 2015 at 12:04:48PM +0800, Xiao Guangrong wrote:
>> > I
On Tue, Oct 20, 2015 at 01:54:12AM +0800, Xiao Guangrong wrote:
>
>
> On 10/19/2015 06:25 PM, Michael S. Tsirkin wrote:
> >On Mon, Oct 19, 2015 at 11:18:36AM +0200, Igor Mammedov wrote:
> >>On Mon, 19 Oct 2015 09:56:12 +0300
> >>"Michael S. Tsirkin" wrote:
> >>
> >>>On Sun, Oct
On Sun, Oct 18, 2015 at 8:01 PM, Ross Zwisler
wrote:
> On Fri, Oct 16, 2015 at 08:49:41PM -0400, Dan Williams wrote:
>> If an application wants exclusive access to all of the persistent memory
>> provided by an NVDIMM namespace it can use this raw-block-dax facility
On Mon, Oct 19, 2015 at 10:29:50AM -0700, Dan Williams wrote:
> On Mon, Oct 19, 2015 at 12:09 AM, Michael S. Tsirkin wrote:
> > On Mon, Oct 19, 2015 at 12:04:48PM +0800, Xiao Guangrong wrote:
> > I mean don't use ASL to comment C. It's not more readable.
> > Describe why the code
On Sun, 2015-10-18 at 18:00 +0200, Eric Auger wrote:
> In preparation for subsequent changes in reset function lookup,
> lets introduce a dynamic list of reset combos (compat string,
> reset module, reset function). The list can be populated/voided with
> two new functions,
On 10/19/2015 06:42 PM, Igor Mammedov wrote:
On Mon, 19 Oct 2015 18:01:17 +0800
Xiao Guangrong wrote:
On 10/19/2015 05:46 PM, Igor Mammedov wrote:
On Mon, 19 Oct 2015 12:17:22 +0300
"Michael S. Tsirkin" wrote:
On Mon, Oct 19, 2015 at
On 10/19/2015 06:25 PM, Michael S. Tsirkin wrote:
On Mon, Oct 19, 2015 at 11:18:36AM +0200, Igor Mammedov wrote:
On Mon, 19 Oct 2015 09:56:12 +0300
"Michael S. Tsirkin" wrote:
On Sun, Oct 11, 2015 at 11:52:54AM +0800, Xiao Guangrong wrote:
[...]
diff --git
On 10/18/2015 2:07 PM, Christoffer Dall wrote:
> On Mon, Oct 12, 2015 at 09:29:23AM -0700, Mario Smarduch wrote:
>> Hi Christoffer, Marc -
>> I just threw this test your way without any explanation.
>
> I'm confused. Did you send me something somewhere already?
Yes in the last patchset
On 10/19/2015 1:53 AM, Christoffer Dall wrote:
> On Sat, Sep 26, 2015 at 04:43:28PM -0700, Mario Smarduch wrote:
>> This patch adds vcpu fields to track lazy state, save host FPEXC, and
>> offsets to fields.
>>
>> Signed-off-by: Mario Smarduch
>> ---
>>
On 10/19/2015 3:14 AM, Christoffer Dall wrote:
> On Sat, Sep 26, 2015 at 04:43:29PM -0700, Mario Smarduch wrote:
>> This patch enhances current lazy vfp/simd hardware switch. In addition to
>> current lazy switch, it tracks vfp/simd hardware state with a vcpu
>> lazy flag.
>>
>> vcpu lazy flag
Hi,
I did benchmarking of scheduler fairness with enabled steal time
accounting(STA) in KVM.
And results are really interesting.
Looks like STA provides worse scheduler fairness against disabled STA
(no-steal-acc cmdline param)
I created benchmark, main idea is: 2 cgroups with cpu.shares
On 10/19/2015 06:42 PM, Igor Mammedov wrote:
On Mon, 19 Oct 2015 18:01:17 +0800
Xiao Guangrong wrote:
On 10/19/2015 05:46 PM, Igor Mammedov wrote:
On Mon, 19 Oct 2015 12:17:22 +0300
"Michael S. Tsirkin" wrote:
On Mon, Oct 19, 2015 at
Greetings,
We the Invesco Investment Company, We invite you to partner with us and
benefit in our new Loan and Project funding program. We offer flexible
loans and funding for various projects by passing the usual rigorGreetings,
We the Invesco Investment Company, We invite you to partner with
77 matches
Mail list logo