On 08/23/2009 02:24 PM, Mohammed Gamal wrote:
Signed-off-by: Mohammed Gamalm.gamal...@gmail.com
Applied, thanks.
+static int emulate_pop_sreg(struct x86_emulate_ctxt *ctxt,
+struct x86_emulate_ops *ops, int seg)
+{
+ struct decode_cache *c =ctxt-decode;
On 08/23/2009 02:24 PM, Mohammed Gamal wrote:
Introduces a new decode option No64, which is used for instructions that are
invalid in long mode.
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm
On 08/23/2009 02:24 PM, Mohammed Gamal wrote:
Report unhandled instructions in the syslog on emulation failure
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
On 08/23/2009 02:24 PM, Mohammed Gamal wrote:
Signed-off-by: Mohammed Gamalm.gamal...@gmail.com
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
On 08/24/2009 07:07 AM, Mohammed Gamal wrote:
Return to userspace instead of repeatedly trying to emulate
instructions that have already failed
Signed-off-by: Mohammed Gamalm.gamal...@gmail.com
---
arch/x86/kvm/vmx.c |5 -
1 files changed, 4 insertions(+), 1 deletions(-)
diff --git
Bugs item #2351676, was opened at 2008-11-26 19:59
Message generated for change (Comment added) made by z-image
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2351676group_id=180599
Please note that this message will contain a full copy of the comment
At Rusty's suggestion, I tested vhost base performance with ping.
Results below, and seem to be what you'd expect. I'm working on TSO
support, expect results shortly.
latency with ping (lower is better):
native:
[r...@virtlab17 ~]# ping -c 100 -f -q 21.1.50.4
PING 21.1.50.4 (21.1.50.4)
kvm-irq_lock protects too much stuff, but still fail to protect
everything it was design to protect (see ack notifiers call in pic). I
want to make IRQ injection fast path as lockless as possible. This patch
series removes kvm-irq_lock from irq injection path effectively making
interrupt injection
Use gsi indexed array instead of scanning all entries on each interrupt
injection.
Signed-off-by: Gleb Natapov g...@redhat.com
---
include/linux/kvm_host.h | 16 +++--
virt/kvm/irq_comm.c | 88 +++--
virt/kvm/kvm_main.c |1 -
3 files
This removes assumptions that max GSIs is smaller than number of pins.
Sharing is tracked on pin level not GSI level.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/kvm_host.h |1 -
arch/x86/kvm/irq.h |1 +
include/linux/kvm_host.h|2 +-
Also move call of ack notifiers after pic state change.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/i8259.c | 22 +-
1 files changed, 9 insertions(+), 13 deletions(-)
diff --git a/arch/x86/kvm/i8259.c b/arch/x86/kvm/i8259.c
index 01f1516..ccc941a 100644
Maintain back mapping from irqchip/pin to gsi to speedup
interrupt acknowledgment notifications.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/ia64/include/asm/kvm.h |1 +
arch/x86/include/asm/kvm.h |1 +
include/linux/kvm_host.h|1 +
virt/kvm/irq_comm.c | 31
Signed-off-by: Gleb Natapov g...@redhat.com
---
virt/kvm/irq_comm.c | 16 +++-
1 files changed, 11 insertions(+), 5 deletions(-)
diff --git a/virt/kvm/irq_comm.c b/virt/kvm/irq_comm.c
index 6a8434d..8350050 100644
--- a/virt/kvm/irq_comm.c
+++ b/virt/kvm/irq_comm.c
@@ -159,7
Use RCU locking for mask/ack notifiers lists.
Signed-off-by: Gleb Natapov g...@redhat.com
---
virt/kvm/irq_comm.c | 22 --
1 files changed, 12 insertions(+), 10 deletions(-)
diff --git a/virt/kvm/irq_comm.c b/virt/kvm/irq_comm.c
index d7393d6..71a5a43 100644
---
Mask irq notifier list is already there.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/ia64/include/asm/kvm_host.h |1 -
arch/x86/include/asm/kvm_host.h |1 -
include/linux/kvm_host.h |1 +
virt/kvm/irq_comm.c |5 ++---
virt/kvm/kvm_main.c
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/ia64/kvm/kvm-ia64.c |7 +---
arch/x86/kvm/i8259.c | 22 +---
arch/x86/kvm/lapic.c |5 +--
arch/x86/kvm/x86.c | 10 +
virt/kvm/ioapic.c| 80 +++---
The only thing it protects now is interrupt injection into lapic and
this can work lockless. Even now with kvm-irq_lock in place access
to lapic is not entirely serialized since vcpu access doesn't take
kvm-irq_lock.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/ia64/kvm/kvm-ia64.c |2
Return to userspace instead of repeatedly trying to emulate
instructions that have already failed
Signed-off-by: Mohammed Gamal m.gamal...@gmail.com
---
arch/x86/kvm/vmx.c |6 +-
1 files changed, 5 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index
Use return value from kvm_set_irq() to track coalesced PIT interrupts
instead of ack/mask notifiers.
Signed-off-by: Gleb Natapov g...@redhat.com
diff --git a/arch/x86/kvm/i8254.c b/arch/x86/kvm/i8254.c
index b857ca3..0b63991 100644
--- a/arch/x86/kvm/i8254.c
+++ b/arch/x86/kvm/i8254.c
@@ -231,20
Andre Przywara wrote:
Stephane, Thomas: Can you verify this?
I'm not very familiar with compiling kvm-mod from git sources. And your
patch does not apply to svm.c shipped with kernel 2.6.30.5
So at the moment I have no clue, how to verify. Is there any short howto out
there, how to get kvm
Thomas Besser wrote:
Andre Przywara wrote:
Stephane, Thomas: Can you verify this?
I'm not very familiar with compiling kvm-mod from git sources. And your
patch does not apply to svm.c shipped with kernel 2.6.30.5
You shouldn't have seen any problems with 2.6.30.5, since the code in
question
Andre Przywara wrote:
Thomas Besser wrote:
Andre Przywara wrote:
Stephane, Thomas: Can you verify this?
I'm not very familiar with compiling kvm-mod from git sources. And your
patch does not apply to svm.c shipped with kernel 2.6.30.5
You shouldn't have seen any problems with 2.6.30.5,
subscribe kvm
Veja quais são os assuntos do momento no Yahoo! +Buscados
http://br.maisbuscados.yahoo.com
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
Chris Webb ch...@arachsys.com writes:
With the following applied, VNC connections and disconnections still work
correctly, so it doesn't horribly break anything, but I can't immediately
confirm whether it will cure the rare segfaults as I haven't yet found a
rapid way of reproducing the
On Mon, Aug 24, 2009 at 03:06:23PM +0300, Gleb Natapov wrote:
Use return value from kvm_set_irq() to track coalesced PIT interrupts
instead of ack/mask notifiers.
Gleb,
What is the advantage of doing so?
Ack notifiers are asynchronous notifications. Using the return value
from kvm_set_irq
On Mon, Aug 24, 2009 at 01:32:56PM -0300, Marcelo Tosatti wrote:
On Mon, Aug 24, 2009 at 03:06:23PM +0300, Gleb Natapov wrote:
Use return value from kvm_set_irq() to track coalesced PIT interrupts
instead of ack/mask notifiers.
Gleb,
What is the advantage of doing so?
Current code
On Mon, Aug 24, 2009 at 08:16:46PM +0300, Gleb Natapov wrote:
On Mon, Aug 24, 2009 at 01:32:56PM -0300, Marcelo Tosatti wrote:
On Mon, Aug 24, 2009 at 03:06:23PM +0300, Gleb Natapov wrote:
Use return value from kvm_set_irq() to track coalesced PIT interrupts
instead of ack/mask notifiers.
Hello Avi,
Thanks for you review. I was on vacation last week.
On Sun, 2009-08-16 at 16:47 +0300, Avi Kivity wrote:
Alternatives include:
- store the link in the page itself
- have an array of pages per list element instead of just one pointer
- combine the two, store an array of page
On Mon, Aug 24, 2009 at 02:44:27PM -0300, Marcelo Tosatti wrote:
On Mon, Aug 24, 2009 at 08:16:46PM +0300, Gleb Natapov wrote:
On Mon, Aug 24, 2009 at 01:32:56PM -0300, Marcelo Tosatti wrote:
On Mon, Aug 24, 2009 at 03:06:23PM +0300, Gleb Natapov wrote:
Use return value from
On 08/24/2009 09:25 PM, Davide Libenzi wrote:
Indeed, the default eventfd behaviour is like, well, an event. Signaling
(kernel side) or writing (userspace side), signals the event.
Waiting (reading) it, will reset the event.
If you use EFD_SEMAPHORE, you get a semaphore-like behavior.
Events and
On Sun, 23 Aug 2009, Michael S. Tsirkin wrote:
On Sun, Aug 23, 2009 at 04:40:51PM +0300, Avi Kivity wrote:
On 08/23/2009 04:36 PM, Michael S. Tsirkin wrote:
More important here is realization that eventfd is a mutex/semaphore
implementation, not a generic event reporting interface as we
On Mon, Aug 24, 2009 at 09:19:05PM +0300, Gleb Natapov wrote:
It is obviously wrong thing to do from assigned devices POV.
Thats not entirely clear to me. So what happens if a guest with PIC
assigned device resets with a pending IRR? The host interrupt line will
be kept disabled, even
Gregory Haskins wrote:
Gregory Haskins wrote:
Ingo Molnar wrote:
We all love faster code and better management interfaces and tons
of your prior patches got accepted by Avi. This time you didnt even
_try_ to improve virtio.
Im sorry, but you are mistaken:
Hi Anthony,
Anthony Liguori wrote:
Gregory Haskins wrote:
Gregory Haskins wrote:
Ingo Molnar wrote:
We all love faster code and better management interfaces and tons of
your prior patches got accepted by Avi. This time you didnt even
_try_ to improve virtio.
Im sorry, but
Hello Community,
I just want to ask if it is planned to support 3d acceleration
features for windows guests on linux hosts to enhance windows
based CAD applications. I am not aware of the features modern
CAD software is using so I cannot provide a list of requested
features, sorry. I am not sure
On Mon, Aug 24, 2009 at 11:12:41AM +0300, Michael S. Tsirkin wrote:
At Rusty's suggestion, I tested vhost base performance with ping.
Results below, and seem to be what you'd expect.
Rusty, any chance you could look at the code? Is it in reasonable
shape? I think it makes sense to merge it
Gregory Haskins wrote:
Anthony Liguori wrote:
Fundamentally, how is this different than the virtio-add_buf concept?
From my POV, they are at different levels. Calling vbus-shm() is for
establishing a shared-memory region including routing the memory and
signal-path contexts. You do this
On Mon, Aug 24, 2009 at 11:25:01AM -0700, Davide Libenzi wrote:
On Sun, 23 Aug 2009, Michael S. Tsirkin wrote:
On Sun, Aug 23, 2009 at 04:40:51PM +0300, Avi Kivity wrote:
On 08/23/2009 04:36 PM, Michael S. Tsirkin wrote:
More important here is realization that eventfd is a
On Mon, 24 Aug 2009, Avi Kivity wrote:
On 08/24/2009 09:25 PM, Davide Libenzi wrote:
Indeed, the default eventfd behaviour is like, well, an event. Signaling
(kernel side) or writing (userspace side), signals the event.
Waiting (reading) it, will reset the event.
If you use
There are userspace libraries that do almost everything, but you hardly
see things like pthread_(EFD_STATE-like)_create() or similar system
interfaces based on such abstraction.
It actually seems as close to a condition variable as an eventfd can be.
Paolo
--
To unsubscribe from this list:
On Tue, 25 Aug 2009, Michael S. Tsirkin wrote:
On Mon, Aug 24, 2009 at 11:25:01AM -0700, Davide Libenzi wrote:
On Sun, 23 Aug 2009, Michael S. Tsirkin wrote:
On Sun, Aug 23, 2009 at 04:40:51PM +0300, Avi Kivity wrote:
On 08/23/2009 04:36 PM, Michael S. Tsirkin wrote:
More
On Tue, 25 Aug 2009, Paolo Bonzini wrote:
There are userspace libraries that do almost everything, but you hardly
see things like pthread_(EFD_STATE-like)_create() or similar system
interfaces based on such abstraction.
It actually seems as close to a condition variable as an eventfd
Return to userspace instead of repeatedly trying to emulate
instructions that have already failed
Signed-off-by: Mohammed Gamal m.gamal...@gmail.com
---
arch/x86/kvm/vmx.c |6 +-
1 files changed, 5 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index
Gregory Haskins wrote:
Hi Anthony,
Fundamentally, how is this different than the virtio-add_buf concept?
From my POV, they are at different levels. Calling vbus-shm() is for
establishing a shared-memory region including routing the memory and
signal-path contexts. You do this once
Anthony Liguori wrote:
IOW, I can envision a model that looked like PCI - virtio-pci -
virtio-shm - virtio-ring - virtio-net
Let me stress that what's important here is that devices target either
virtio-ring or virtio-shm. If we had another transport, those drivers
would be agnostic toward
On Sun, Aug 23, 2009 at 1:22 PM, Michael S. Tsirkinm...@redhat.com wrote:
Just had a different, but slightly similar problem when the host running
qemu had forwarding enabled. Is it possible your host is forwarding the
packets somewhere else, and that's why we get the dupes?
sysctl -w
Bugs item #2829519, was opened at 2009-07-30 09:13
Message generated for change (Comment added) made by sf-robot
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2829519group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #2725669, was opened at 2009-04-01 20:44
Message generated for change (Settings changed) made by sf-robot
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2725669group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #2543539, was opened at 2009-01-28 17:44
Message generated for change (Settings changed) made by sf-robot
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2543539group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #2099075, was opened at 2008-09-07 19:22
Message generated for change (Settings changed) made by sf-robot
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2099075group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #1906189, was opened at 2008-03-03 11:33
Message generated for change (Comment added) made by sf-robot
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=1906189group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #1941302, was opened at 2008-04-13 11:21
Message generated for change (Settings changed) made by sf-robot
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=1941302group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #1984384, was opened at 2008-06-04 11:49
Message generated for change (Comment added) made by sf-robot
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=1984384group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #2024740, was opened at 2008-07-22 14:36
Message generated for change (Settings changed) made by sf-robot
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2024740group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #2490866, was opened at 2009-01-06 21:10
Message generated for change (Comment added) made by sf-robot
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2490866group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #1831632, was opened at 2007-11-14 08:46
Message generated for change (Comment added) made by sf-robot
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=1831632group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #1929279, was opened at 2008-03-30 11:21
Message generated for change (Settings changed) made by sf-robot
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=1929279group_id=180599
Please note that this message will contain a full copy of the comment
Michael S. Tsirkin wrote:
On Mon, Aug 24, 2009 at 11:12:41AM +0300, Michael S. Tsirkin wrote:
At Rusty's suggestion, I tested vhost base performance with ping.
Results below, and seem to be what you'd expect.
Rusty, any chance you could look at the code? Is it in reasonable
shape? I
Using kvm-76 on 2.6.21mv kernel on ibm server x3650(64bit processor)
target, I got the
following error.Any suggestions..
unhandled vm exit: 0x8021 vcpu_id 0
rax b101 rbx rcx rdx
rsi rdi rsp
Commit b8bcfe997e4 made paravirt pte updates synchronous in interrupt
context.
Unfortunately the KVM pv mmu code caches the lazy/nonlazy mode
internally, so a pte update from interrupt context during a lazy mmu
operation can be batched while it should be performed synchronously.
On 08/25/2009 05:22 AM, Anthony Liguori wrote:
I think 2.6.32 is pushing it.
2.6.32 is pushing it, but we need to push it.
I think some time is needed to flush out the userspace interface. In
particular, I don't think Mark's comments have been adequately
addressed. If a version were
On 08/25/2009 01:08 AM, Davide Libenzi wrote:
Is that really difficult to understand where I'm standing, leaving the KVM
hat off for a moment?
I understand it perfectly. I take the same position with kvm. I'm
providing more data in the hope that you'll change you mind, not trying
to
From: Mohammed Gamal m.gamal...@gmail.com
Report unhandled instructions in the syslog on emulation failure
Signed-off-by: Mohammed Gamal m.gamal...@gmail.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index 1f0ff4a..3d6a562 100644
---
From: Mohammed Gamal m.gamal...@gmail.com
Introduces a new decode option No64, which is used for instructions that are
invalid in long mode.
Signed-off-by: Mohammed Gamal m.gamal...@gmail.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
From: Avi Kivity a...@redhat.com
They're just copies of vcpu-run, which is readily accessible.
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h
index 33901be..b080590 100644
--- a/arch/x86/include/asm/kvm_host.h
+++
65 matches
Mail list logo