Hi,
I'm quite pissed off. I just upgraded to kvm-86 on a host that has
worked nicely on kvm-78 for quite some time. But since I was fearing the
qcow2 corruption issues, I wanted to upgrade kvm-86. After testing the
performance, I decided to switch. How stupid that was. That was really
Gilles PIETRI wrote:
Hi,
I'm quite pissed off. I just upgraded to kvm-86 on a host that has
worked nicely on kvm-78 for quite some time. But since I was fearing the
qcow2 corruption issues, I wanted to upgrade kvm-86. After testing the
performance, I decided to switch. How stupid that
- Gilles PIETRI contact+...@gilouweb.com wrote:
Hi,
I'm quite pissed off. I just upgraded to kvm-86 on a host that has
worked nicely on kvm-78 for quite some time. But since I was fearing
the
qcow2 corruption issues, I wanted to upgrade kvm-86. After testing the
performance, I
Le 04/06/2009 09:46, Jim Paris a écrit :
Gilles PIETRI wrote:
Hi,
I'm quite pissed off. I just upgraded to kvm-86 on a host that has
worked nicely on kvm-78 for quite some time. But since I was fearing the
qcow2 corruption issues, I wanted to upgrade kvm-86. After testing the
Gregory Haskins wrote:
irqfd lets you create an eventfd based file-desriptor to inject interrupts
to a kvm guest. We associate one gsi per fd for fine-grained routing.
[note: this is meant to work in conjunction with the POLLHUP version of
irqfd, which has not yet been accepted into kvm.git]
Michael S. Tsirkin wrote:
On Tue, Jun 02, 2009 at 01:41:05PM -0400, Gregory Haskins wrote:
And having close not clean up the state unless you do an ioctl first is
very messy IMO - I don't think you'll find any such examples in kernel.
I agree, and that is why I am advocating this
[This patch is already in the mce3 branch in mce3 tip, but I'm including
it here because it's needed for the next patch.]
Signed-off-by: Andi Kleen a...@linux.intel.com
---
arch/x86/include/asm/irq_vectors.h |1 +
1 file changed, 1 insertion(+)
Index:
[Avi could you please still consider this patch for your 2.6.31 patchqueue?
It's fairly simple, but important to handle memory errors in guests]
VT-x needs an explicit MC vector intercept to handle machine checks in the
hyper visor.
It also has a special option to catch machine checks that
Avi Kivity wrote:
Michael S. Tsirkin wrote:
On Tue, Jun 02, 2009 at 01:41:05PM -0400, Gregory Haskins wrote:
And having close not clean up the state unless you do an ioctl
first is
very messy IMO - I don't think you'll find any such examples in
kernel.
I agree, and that is why
Avi Kivity wrote:
Gregory Haskins wrote:
I agree that deassign is needed for reasons of symmetry, and that it
can be added later.
Cool.
FYI: Davide's patch has been accepted into -mm (Andrew CC'd). I am not
sure of the protocol here, but I assume this means you can now safely
pull
Gregory Haskins wrote:
Since Paul ok'd (I think?) the srcu design, and the only other feedback
was the key-bitmap thing from Davide, I will go ahead and push a v2 with
just that one fix (unless there is any other feedback?)
I'll do a detailed review on your next posting. When I see a long
Bharata B Rao wrote:
2. Need for hard limiting CPU resource
--
- Pay-per-use: In enterprise systems that cater to multiple clients/customers
where a customer demands a certain share of CPU resources and pays only
that, CPU hard limits will be useful to
Gregory Haskins wrote:
Marcello, Avi, and myself have previously agreed that Marcello's
mmio-locking cleanup should go in first. When that happens, I will
need to rebase this series because it changes how you interface to the
io_bus code. I should have mentioned that here, but forgot.
On Thu, Jun 04, 2009 at 02:48:17PM +0300, Avi Kivity wrote:
Andi Kleen wrote:
[Avi could you please still consider this patch for your 2.6.31 patchqueue?
It's fairly simple, but important to handle memory errors in guests]
Oh yes, and it'll be needed for -stable. IIUC, right now a
Current code is a mess. And addition of acpi tables is broken.
Signed-off-by: Gleb Natapov g...@redhat.com
diff --git a/kvm/bios/rombios32.c b/kvm/bios/rombios32.c
index 369cbef..fda4894 100755
--- a/kvm/bios/rombios32.c
+++ b/kvm/bios/rombios32.c
@@ -1293,15 +1293,13 @@ struct rsdp_descriptor
(Applies to kvm.git/master:25deed73)
Please see the header for 2/2 for a description. This patch series has been
fully tested and appears to be working correctly.
[Review notes:
*) Paul has looked at the SRCU design and, to my knowledge, didn't find
any holes.
*) Michael,
From: Davide Libenzi davi...@xmailserver.org
them a change to unregister from the wait queue. This is turn allows
eventfd users to use the eventfd file* w/out holding a live reference to
it.
After the eventfd user callbacks returns, any usage of the eventfd file*
should be dropped. The eventfd
Assigning an irqfd object to a kvm object creates a relationship that we
currently manage by having the kvm oject acquire/hold a file* reference to
the underlying eventfd. The lifetime of these objects is properly maintained
by decoupling the two objects whenever the irqfd is closed or kvm is
Andi Kleen wrote:
This assumption is incorrect. This code is executed after preemption
has been enabled, and we may have even slept before reaching it.
The only thing that counts here is the context before the machine
check event. If there was a vmexit we know it was in guest context.
On Thu, Jun 04, 2009 at 03:49:03PM +0300, Avi Kivity wrote:
Andi Kleen wrote:
This assumption is incorrect. This code is executed after preemption
has been enabled, and we may have even slept before reaching it.
The only thing that counts here is the context before the machine
check
Gleb Natapov wrote:
On vcpu creation cookie is returned which is used in future communication.
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
Gleb Natapov wrote:
kvm_*_mpstate() cannot be called from kvm_arch_*_registers()
since kvm_arch_*_registers() sometimes called from io thread, but
kvm_*_mpstate() can be called only by cpu thread.
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To
Zhang, Xiantao wrote:
Hi, Jes
Have you verified whether it works for you ? You may run kernel build in
the guest with 4 vcpus, if it can be done successfully without any error, it
should be Okay I think, otherwise, we may need to investigate it further. :)
Xiantao
Hi Xiantao,
I was
Andi Kleen wrote:
vmcs access work because we have a preempt notifier called when we are
scheduled in, and will execute vmclear/vmptrld as necessary. Look at
kvm_preempt_ops in virt/kvm_main.c.
I see. So we need to move that check earlier. Do you have a preference
where it should be?
Hi Greg,
On Wed, 2009-06-03 at 18:04 -0400, Gregory Haskins wrote:
Hi Mark,
So with the v5 release of iosignalfd, we now have the notion of a
trigger, the API of which is as follows:
---
/*!
* \brief Assign an eventfd to an IO port (PIO or MMIO)
*
* Assigns an
Andi Kleen wrote:
There's no good place as it breaks the nice exit handler table. You
could put it in vmx_complete_interrupts() next to NMI handling.
I think I came up with a easy cheesy but not too bad solution now that should
work. It simply remembers the CPU in the vcpu structure and
On Thu, Jun 04, 2009 at 04:49:50PM +0300, Avi Kivity wrote:
Andi Kleen wrote:
There's no good place as it breaks the nice exit handler table. You
could put it in vmx_complete_interrupts() next to NMI handling.
I think I came up with a easy cheesy but not too bad solution now that
Gregory Haskins wrote:
(Applies to kvm.git/master:25deed73)
Please see the header for 2/2 for a description. This patch series has been
fully tested and appears to be working correctly.
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe
On Wed, Jun 03, 2009 at 05:19:26PM -0400, Glauber Costa wrote:
Same thing,
addressing comments from gleb.
Jan, can you run your test on this one? It differs from previous one in
halt handling.
--
Gleb.
--
To unsubscribe from this list: send the line unsubscribe kvm
Bugs item #2801212, was opened at 2009-06-04 08:17
Message generated for change (Tracker Item Submitted) made by jiajun
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2801212group_id=180599
Please note that this message will contain a full copy of the
Hello all!
I'm a KVM/Qemu user for a long time and I'm very satisfied by its
features of flexibility, power and portability - really a good project!
Recently, reading some technical articles over internet, I have
discoverd the big potentialities of the NV-CUDA framework in relation to
the
It would be possible to use this technology in the KVM/Qemu project to
achieve better performance?
It could be a significative step for the develop in virtualization
technology?
Nothing is impossible, but it is at least not obvious how to pull
off such a trick.
Qemu/KVM is not embarrassingly
As I'm new to qemu/kvm, to figure out how networking performance can be
improved, I
went over the code and took some notes. As I did this, I tried to record ideas
from recent discussions and ideas that came up on improving performance. Thus
this list.
This includes a partial overview of
Michael S. Tsirkin wrote:
As I'm new to qemu/kvm, to figure out how networking performance can be
improved, I
went over the code and took some notes. As I did this, I tried to record
ideas
from recent discussions and ideas that came up on improving performance. Thus
this list.
This
On Thu, Jun 04, 2009 at 01:16:05PM -0400, Gregory Haskins wrote:
Michael S. Tsirkin wrote:
As I'm new to qemu/kvm, to figure out how networking performance can be
improved, I
went over the code and took some notes. As I did this, I tried to record
ideas
from recent discussions and
On Thu, Apr 09, 2009 at 12:30:57PM -0400, Gregory Haskins wrote:
+static unsigned long
+task_memctx_copy_to(struct vbus_memctx *ctx, void *dst, const void *src,
+ unsigned long n)
+{
+ struct task_memctx *tm = to_task_memctx(ctx);
+ struct task_struct *p = tm-task;
+
On Thu, Jun 04, 2009 at 01:50:20PM -0400, Gregory Haskins wrote:
Suit yourself, but I suspect that by the time you build the prototype
you will either end up re-solving all the same problems anyway, or have
diminished functionality (or both).
/me goes to look at vbus patches.
--
MST
--
To
Michael S. Tsirkin wrote:
On Thu, Jun 04, 2009 at 01:16:05PM -0400, Gregory Haskins wrote:
Michael S. Tsirkin wrote:
As I'm new to qemu/kvm, to figure out how networking performance can be
improved, I
went over the code and took some notes. As I did this, I tried to record
ideas
isr_ack is protected by kvm_pic-lock.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: kvm/arch/x86/kvm/i8259.c
===
--- kvm.orig/arch/x86/kvm/i8259.c
+++ kvm/arch/x86/kvm/i8259.c
@@ -72,8 +72,10 @@ static void
Move coalesced_mmio locking to its own device, instead of relying on
kvm-lock.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: kvm/virt/kvm/coalesced_mmio.c
===
--- kvm.orig/virt/kvm/coalesced_mmio.c
+++
Protect irq injection/acking data structures with a separate irq_lock
mutex. This fixes the following deadlock:
CPU A CPU B
kvm_vm_ioctl_deassign_dev_irq()
mutex_lock(kvm-lock);worker_thread()
- kvm_deassign_irq()-
Nitin A Kamble wrote:
Hi Avi,
I find that the qemu processor reset state is not per the IA32
processor specifications. (Sections 8.1.1 of
http://www.intel.com/Assets/PDF/manual/253668.pdf)
In qemu-kvm.git in file target-i386/helper.c in function cpu_reset the
segment registers are
Michael S. Tsirkin wrote:
On Thu, Apr 09, 2009 at 12:30:57PM -0400, Gregory Haskins wrote:
+static unsigned long
+task_memctx_copy_to(struct vbus_memctx *ctx, void *dst, const void *src,
+unsigned long n)
+{
+struct task_memctx *tm = to_task_memctx(ctx);
+struct
Michael S. Tsirkin wrote:
Also - if we just had vmexit because a process executed
io (or hypercall), can't we just do copy_to_user there?
Avi, I think at some point you said that we can?
You can do copy_to_user() whereever it is legal in Linux. Almost all of
kvm runs in process context,
Gregory Haskins wrote:
BTW, why did you decide to use get_user_pages?
Would switch_mm + copy_to_user work as well
avoiding page walk if all pages are present?
Well, basic c_t_u() won't work because its likely not current if you
are updating the ring from some other task, but I
Avi Kivity wrote:
Gregory Haskins wrote:
BTW, why did you decide to use get_user_pages?
Would switch_mm + copy_to_user work as well
avoiding page walk if all pages are present?
Well, basic c_t_u() won't work because its likely not current if you
are updating the ring from some
Avi Kivity wrote:
Gregory Haskins wrote:
Avi,
Gregory Haskins wrote:
Todo:
*) Develop some kind of hypercall registration mechanism for KVM so
that
we can use that as an integration point instead of directly hooking
kvm hypercalls
What would you like to see here? I now
Gregory Haskins wrote:
Oh, I don't doubt that (in fact, I was pretty sure that was the case
based on some of the optimizations I could see in studying the c_t_u()
path). I just didn't realize there were other ways to do it if its a
non current task. ;)
I guess the enigma for me right now is
On Thu, Jun 04, 2009 at 10:23:29PM +0300, Gleb Natapov wrote:
On Thu, Jun 04, 2009 at 02:23:03PM -0400, Glauber Costa wrote:
This is a pretty mechanical change. To make code look
closer to upstream qemu, I'm renaming kvm_context_t to
KVMState. Mid term goal here is to start sharing code
Gleb Natapov wrote:
On Wed, Jun 03, 2009 at 05:19:26PM -0400, Glauber Costa wrote:
Same thing,
addressing comments from gleb.
Jan, can you run your test on this one? It differs from previous one in
halt handling.
Still works for me.
Jan
signature.asc
Description: OpenPGP digital
On Thu, Jun 04, 2009 at 04:33:19PM -0300, Glauber Costa wrote:
On Thu, Jun 04, 2009 at 10:23:29PM +0300, Gleb Natapov wrote:
On Thu, Jun 04, 2009 at 02:23:03PM -0400, Glauber Costa wrote:
This is a pretty mechanical change. To make code look
closer to upstream qemu, I'm renaming
On Thu, Jun 04, 2009 at 09:46:23PM +0200, Jan Kiszka wrote:
Gleb Natapov wrote:
On Wed, Jun 03, 2009 at 05:19:26PM -0400, Glauber Costa wrote:
Same thing,
addressing comments from gleb.
Jan, can you run your test on this one? It differs from previous one in
halt handling.
Still
On Thu, Jun 04, 2009 at 11:00:46PM +0300, Gleb Natapov wrote:
On Thu, Jun 04, 2009 at 04:33:19PM -0300, Glauber Costa wrote:
On Thu, Jun 04, 2009 at 10:23:29PM +0300, Gleb Natapov wrote:
On Thu, Jun 04, 2009 at 02:23:03PM -0400, Glauber Costa wrote:
This is a pretty mechanical change. To
On Thu, Jun 04, 2009 at 11:09:52PM +0300, Gleb Natapov wrote:
On Thu, Jun 04, 2009 at 05:10:51PM -0300, Glauber Costa wrote:
On Thu, Jun 04, 2009 at 11:00:46PM +0300, Gleb Natapov wrote:
On Thu, Jun 04, 2009 at 04:33:19PM -0300, Glauber Costa wrote:
On Thu, Jun 04, 2009 at 10:23:29PM
On Thu, Jun 04, 2009 at 05:18:06PM -0300, Glauber Costa wrote:
this first phase has nothing to do with functionality. To begin with,
KVMState is qemu style, kvm_context_t is not, like it or not (I don't).
I am not against this mechanical change at all, don't get me wrong. I
don't
I'm running a production Debian Lenny server using KVM to run a couple
of Windows and a couple of Linux guests. All is working well, but I
want to give my Server 2003 guest access to a SCSI tape drive.
Unfortunately, Debian is pretty conservative, and the version of KVM
is too old to support
On Thu, Jun 04, 2009 at 01:37:54PM -0700, Aaron Clausen wrote:
I'm running a production Debian Lenny server using KVM to run a couple
of Windows and a couple of Linux guests. All is working well, but I
want to give my Server 2003 guest access to a SCSI tape drive.
Unfortunately, Debian is
As per the IA32 processor manual, the accessed bit is set to 1 in the
processor state after reset. qemu pc cpu_reset code was missing this
accessed bit setting.
Signed-off-by: Nitin A Kamble nitin.a.kam...@intel.com
---
target-i386/helper.c | 18 --
1 files changed, 12
Avi Kivity wrote:
Bharata B Rao wrote:
2. Need for hard limiting CPU resource
--
- Pay-per-use: In enterprise systems that cater to multiple clients/customers
where a customer demands a certain share of CPU resources and pays only
that, CPU hard limits
On Thu, Jun 04, 2009 at 01:37:54PM -0700, Aaron Clausen wrote:
I'm running a production Debian Lenny server using KVM to run a couple
of Windows and a couple of Linux guests. All is working well, but I
want to give my Server 2003 guest access to a SCSI tape drive.
Unfortunately, Debian is
That way the interpretation of rmode.active becomes more clear with
unrestricted guest code.
Signed-off-by: Nitin A Kamble nitin.a.kam...@intel.com
---
arch/x86/include/asm/kvm_host.h |2 +-
arch/x86/kvm/vmx.c | 28 ++--
2 files changed, 15
Hi Avi,
I have modified the earlier patch as per you comments. I have prepared a
separate patch for renaming rmode.active to rmode.vm86_active. And 2nd patch
enables the Unrestricted Guest feature in the KVM.
This patch will also work with unfixed (cpu reset state) qemu.
Please apply.
Bugs item #2801458, was opened at 2009-06-04 19:36
Message generated for change (Tracker Item Submitted) made by mtosatti
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2801458group_id=180599
Please note that this message will contain a full copy of the
Bugs item #2801459, was opened at 2009-06-04 19:39
Message generated for change (Tracker Item Submitted) made by mtosatti
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2801459group_id=180599
Please note that this message will contain a full copy of the
Bugs item #2801212, was opened at 2009-06-04 11:17
Message generated for change (Settings changed) made by mtosatti
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2801212group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #2782199, was opened at 2009-04-27 11:04
Message generated for change (Comment added) made by mtosatti
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2782199group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #2782199, was opened at 2009-04-27 11:04
Message generated for change (Settings changed) made by mtosatti
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2782199group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #2287677, was opened at 2008-11-14 21:39
Message generated for change (Comment added) made by mtosatti
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2287677group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #2287677, was opened at 2008-11-14 21:39
Message generated for change (Settings changed) made by mtosatti
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2287677group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #2624842, was opened at 2009-02-21 14:27
Message generated for change (Comment added) made by mtosatti
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2624842group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #1971512, was opened at 2008-05-24 17:45
Message generated for change (Comment added) made by mtosatti
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=1971512group_id=180599
Please note that this message will contain a full copy of the comment
Jes Sorensen wrote:
Zhang, Xiantao wrote:
Hi, Jes
Have you verified whether it works for you ? You may run kernel
build in the guest with 4 vcpus, if it can be done successfully
without any error, it should be Okay I think, otherwise, we may need
to investigate it further. :) Xiantao
On Thu, Jun 04, 2009 at 03:19:22PM +0300, Avi Kivity wrote:
Bharata B Rao wrote:
2. Need for hard limiting CPU resource
--
- Pay-per-use: In enterprise systems that cater to multiple clients/customers
where a customer demands a certain share of CPU
* Avi Kivity a...@redhat.com [2009-06-04 15:19:22]:
Bharata B Rao wrote:
2. Need for hard limiting CPU resource
--
- Pay-per-use: In enterprise systems that cater to multiple
clients/customers
where a customer demands a certain share of CPU
Bharata B Rao wrote:
Another way is to place the 8 groups in a container group, and limit
that to 80%. But that doesn't work if I want to provide guarantees to
several groups.
Hmm why not ? Reduce the guarantee of the container group and provide
the same to additional groups ?
Hi,
An update in the hope that this is useful to someone :-)
On Fri, Jun 05, 2009 at 09:03:03AM +1200, Mark van Walraven wrote:
My next step is to try qemu-kvm, built from source. The Debianised libvirt
expects the kvm binaries to be in /usr/bin/kvm, so you can symlink them
from
On Fri, Jun 5, 2009 at 11:33 AM, Avi Kivity a...@redhat.com wrote:
Bharata B Rao wrote:
Another way is to place the 8 groups in a container group, and limit
that to 80%. But that doesn't work if I want to provide guarantees to
several groups.
Hmm why not ? Reduce the guarantee of the
Balbir Singh wrote:
On Fri, Jun 5, 2009 at 11:33 AM, Avi Kivity a...@redhat.com wrote:
Bharata B Rao wrote:
Another way is to place the 8 groups in a container group, and limit
that to 80%. But that doesn't work if I want to provide guarantees to
several groups.
Hmm why
* Avi Kivity a...@redhat.com [2009-06-05 07:44:27]:
Balbir Singh wrote:
On Fri, Jun 5, 2009 at 11:33 AM, Avi Kivity a...@redhat.com wrote:
Bharata B Rao wrote:
Another way is to place the 8 groups in a container group, and limit
that to 80%. But that doesn't work if I want to
On Fri, 5 Jun 2009 04:19:17 am Gregory Haskins wrote:
Avi Kivity wrote:
Gregory Haskins wrote:
One idea is similar to signalfd() or eventfd()
And thus the kvm-eventfd (irqfd/iosignalfd) interface project was born.
;)
The lguest patch queue already has such an interface :) And I have a
Balbir Singh wrote:
But then there is no other way to make a *guarantee*, guarantees come
at a cost of idling resources, no? Can you show me any other
combination that will provide the guarantee and without idling the
system for the specified guarantees?
The example given was two 10%
* Balbir Singh bal...@linux.vnet.ibm.com [2009-06-05 12:49:46]:
* Avi Kivity a...@redhat.com [2009-06-05 07:44:27]:
Balbir Singh wrote:
On Fri, Jun 5, 2009 at 11:33 AM, Avi Kivity a...@redhat.com wrote:
Bharata B Rao wrote:
Another way is to place the 8 groups in a
* Chris Friesen cfrie...@nortel.com [2009-06-04 23:09:22]:
Balbir Singh wrote:
But then there is no other way to make a *guarantee*, guarantees come
at a cost of idling resources, no? Can you show me any other
combination that will provide the guarantee and without idling the
system
Balbir Singh wrote:
How, it works out fine in my calculation
50 + 40 for G2 and G3, make sure that G1 gets 10%, since others are
limited to 90%
50 + 40 for G1 and G3, make sure that G2 gets 10%, since others are
limited to 90%
50 + 50 for G1 and G2, make sure that G3 gets 0%, since others
* Avi Kivity a...@redhat.com [2009-06-05 08:16:21]:
Balbir Singh wrote:
How, it works out fine in my calculation
50 + 40 for G2 and G3, make sure that G1 gets 10%, since others are
limited to 90%
50 + 40 for G1 and G3, make sure that G2 gets 10%, since others are
limited to 90%
50
Balbir Singh wrote:
But then there is no other way to make a *guarantee*, guarantees come
at a cost of idling resources, no? Can you show me any other
combination that will provide the guarantee and without idling the
system for the specified guarantees?
OK, I see part of your concern,
* Avi Kivity a...@redhat.com [2009-06-05 08:21:43]:
Balbir Singh wrote:
But then there is no other way to make a *guarantee*, guarantees come
at a cost of idling resources, no? Can you show me any other
combination that will provide the guarantee and without idling the
system for the
On Fri, Jun 05, 2009 at 02:25:01PM +0930, Rusty Russell wrote:
On Fri, 5 Jun 2009 04:19:17 am Gregory Haskins wrote:
Avi Kivity wrote:
Gregory Haskins wrote:
One idea is similar to signalfd() or eventfd()
And thus the kvm-eventfd (irqfd/iosignalfd) interface project was born.
;)
On Fri, Jun 05, 2009 at 01:27:55PM +0800, Balbir Singh wrote:
* Avi Kivity a...@redhat.com [2009-06-05 08:21:43]:
Balbir Singh wrote:
But then there is no other way to make a *guarantee*, guarantees come
at a cost of idling resources, no? Can you show me any other
combination that will
Aaron Clausen wrote:
[]
is too old to support this. Is there a reasonably safe way of
upgrading to one of the newer versions of KVM on this server?
Can't say for safe but you can grab my .debs which I use here
on a bunch of machines, from http://www.corpit.ru/debian/tls/kvm/ -
both binaries
From: Avi Kivity a...@redhat.com
* 'master' of git://git.sv.gnu.org/qemu: (40 commits)
Update maintainer list.
Install keymaps from new location
vvfat: one more missing BlockDriver C99 initializer conversion
Move keymaps into pc-bios
kvm: Mark full address range dirty on live migration
From: Gregory Haskins ghask...@novell.com
irqfd lets you create an eventfd based file-desriptor to inject interrupts
to a kvm guest. We associate one gsi per fd for fine-grained routing.
Signed-off-by: Gregory Haskins ghask...@novell.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git
From: Gleb Natapov g...@redhat.com
On vcpu creation cookie is returned which is used in future communication.
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/cpu-defs.h b/cpu-defs.h
index 1e071e7..5f541e0 100644
--- a/cpu-defs.h
+++
From: Avi Kivity a...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/linux-2.6 b/linux-2.6
index d789c98..28ddf0a 16
--- a/linux-2.6
+++ b/linux-2.6
@@ -1 +1 @@
-Subproject commit d789c98af00b1bd62f91a241586546072a41175b
+Subproject commit
From: Avi Kivity a...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/external-module-compat-comm.h b/external-module-compat-comm.h
index 9801441..5b96c46 100644
--- a/external-module-compat-comm.h
+++ b/external-module-compat-comm.h
@@ -812,3 +812,16 @@ static inline struct
From: Gregory Haskins ghask...@novell.com
Assigning an irqfd object to a kvm object creates a relationship that we
currently manage by having the kvm oject acquire/hold a file* reference to
the underlying eventfd. The lifetime of these objects is properly maintained
by decoupling the two objects
96 matches
Mail list logo