On 11/13/2011 08:26 PM, Orit Wasserman wrote:
int kvm_mmu_get_spte_hierarchy(struct kvm_vcpu *vcpu, u64 addr, u64
sptes[4]);
void kvm_mmu_set_mmio_spte_mask(u64 mmio_mask);
int handle_mmio_page_fault_common(struct kvm_vcpu *vcpu, u64 addr, bool
direct);
diff --git
This is a revised version of my previous work. I hope that
the patches are more self explanatory than before.
Thanks,
Takuya
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
Remove redundant checks and use is_large_pte() macro.
Signed-off-by: Takuya Yoshikawa yoshikawa.tak...@oss.ntt.co.jp
---
arch/x86/kvm/mmu.c |4 +---
1 files changed, 1 insertions(+), 3 deletions(-)
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index a9b3a32..973f254 100644
---
rmap_write_protect() calls gfn_to_rmap() for each level with gfn fixed.
This results in calling gfn_to_memslot() repeatedly with that gfn.
This patch introduces __gfn_to_rmap() which takes the slot as an
argument to avoid this.
This is also needed for the following dirty logging optimization.
Currently, write protecting a slot needs to walk all the shadow pages
and checks ones which have a pte mapping a page in it.
The walk is overly heavy when dirty pages in that slot are not so many
and checking the shadow pages would result in unwanted cache pollution.
To mitigate this problem, we
Needed for the next patch which uses this number to decide how to write
protect a slot.
Signed-off-by: Takuya Yoshikawa yoshikawa.tak...@oss.ntt.co.jp
---
arch/x86/kvm/x86.c |9 +++--
include/linux/kvm_host.h |1 +
virt/kvm/kvm_main.c |4 +++-
3 files changed, 7
Am 12.11.2011 11:25, schrieb Avi Kivity:
On 11/11/2011 12:15 PM, Kevin Wolf wrote:
Am 10.11.2011 22:30, schrieb Anthony Liguori:
Live migration with qcow2 or any other image format is just not going to
work
right now even with proper clustered storage. I think doing a block level
flush
On 11/14/2011 11:23 AM, Takuya Yoshikawa wrote:
Needed for the next patch which uses this number to decide how to write
protect a slot.
/* If nothing is dirty, don't bother messing with page tables. */
- if (is_dirty) {
+ if (memslot-nr_dirty_pages) {
struct
On Mon, Nov 14, 2011 at 10:58:16AM +0100, Kevin Wolf wrote:
Am 12.11.2011 11:25, schrieb Avi Kivity:
On 11/11/2011 12:15 PM, Kevin Wolf wrote:
Am 10.11.2011 22:30, schrieb Anthony Liguori:
Live migration with qcow2 or any other image format is just not going to
work
right now even
On Mon, 2011-11-14 at 10:04 +0800, Asias He wrote:
Hi, Shsha
On 11/13/2011 11:00 PM, Sasha Levin wrote:
On Sun, 2011-11-13 at 12:24 +0200, Michael S. Tsirkin wrote:
On Sat, Nov 12, 2011 at 12:12:01AM +0200, Sasha Levin wrote:
This is a patch based on Krishna Kumar's patch series which
On Sat, Nov 12, 2011 at 12:25:34PM +0200, Avi Kivity wrote:
On 11/11/2011 12:15 PM, Kevin Wolf wrote:
Am 10.11.2011 22:30, schrieb Anthony Liguori:
Live migration with qcow2 or any other image format is just not going to
work
right now even with proper clustered storage. I think
On 11/14/2011 11:24 AM, Takuya Yoshikawa wrote:
Currently, write protecting a slot needs to walk all the shadow pages
and checks ones which have a pte mapping a page in it.
The walk is overly heavy when dirty pages in that slot are not so many
and checking the shadow pages would result in
On Mon, Nov 14, 2011 at 10:16:10AM +, Daniel P. Berrange wrote:
On Sat, Nov 12, 2011 at 12:25:34PM +0200, Avi Kivity wrote:
On 11/11/2011 12:15 PM, Kevin Wolf wrote:
Am 10.11.2011 22:30, schrieb Anthony Liguori:
Live migration with qcow2 or any other image format is just not going
On 11/14/2011 12:07 PM, Avi Kivity wrote:
On 11/14/2011 11:23 AM, Takuya Yoshikawa wrote:
Needed for the next patch which uses this number to decide how to write
protect a slot.
/* If nothing is dirty, don't bother messing with page tables. */
- if (is_dirty) {
+ if
On 11/14/2011 11:20 AM, Takuya Yoshikawa wrote:
This is a revised version of my previous work. I hope that
the patches are more self explanatory than before.
It looks good. I'll let Marcelo (or anyone else?) review it as well
before applying.
Do you have performance measurements?
--
error
(2011/11/14 19:22), Avi Kivity wrote:
+ *
+ * Generally speaking, if there are not so many dirty pages compared to the
+ * number of shadow pages, we should use the latter.
+ *
+ * Note that letting others write into a page marked dirty in the old bitmap
+ * by using the remaining tlb entry is
(2011/11/14 19:25), Avi Kivity wrote:
On 11/14/2011 11:20 AM, Takuya Yoshikawa wrote:
This is a revised version of my previous work. I hope that
the patches are more self explanatory than before.
It looks good. I'll let Marcelo (or anyone else?) review it as well
before applying.
Do you
On Mon, Nov 14, 2011 at 12:24:22PM +0200, Michael S. Tsirkin wrote:
On Mon, Nov 14, 2011 at 10:16:10AM +, Daniel P. Berrange wrote:
On Sat, Nov 12, 2011 at 12:25:34PM +0200, Avi Kivity wrote:
On 11/11/2011 12:15 PM, Kevin Wolf wrote:
Am 10.11.2011 22:30, schrieb Anthony Liguori:
Am 14.11.2011 12:08, schrieb Daniel P. Berrange:
On Mon, Nov 14, 2011 at 12:24:22PM +0200, Michael S. Tsirkin wrote:
On Mon, Nov 14, 2011 at 10:16:10AM +, Daniel P. Berrange wrote:
On Sat, Nov 12, 2011 at 12:25:34PM +0200, Avi Kivity wrote:
On 11/11/2011 12:15 PM, Kevin Wolf wrote:
Am
On Mon, Nov 14, 2011 at 12:21:53PM +0100, Kevin Wolf wrote:
Am 14.11.2011 12:08, schrieb Daniel P. Berrange:
On Mon, Nov 14, 2011 at 12:24:22PM +0200, Michael S. Tsirkin wrote:
On Mon, Nov 14, 2011 at 10:16:10AM +, Daniel P. Berrange wrote:
On Sat, Nov 12, 2011 at 12:25:34PM +0200, Avi
On Mon, Nov 14, 2011 at 11:08:02AM +, Daniel P. Berrange wrote:
On Mon, Nov 14, 2011 at 12:24:22PM +0200, Michael S. Tsirkin wrote:
On Mon, Nov 14, 2011 at 10:16:10AM +, Daniel P. Berrange wrote:
On Sat, Nov 12, 2011 at 12:25:34PM +0200, Avi Kivity wrote:
On 11/11/2011 12:15 PM,
On Mon, Nov 14, 2011 at 11:29:18AM +, Daniel P. Berrange wrote:
On Mon, Nov 14, 2011 at 12:21:53PM +0100, Kevin Wolf wrote:
Am 14.11.2011 12:08, schrieb Daniel P. Berrange:
On Mon, Nov 14, 2011 at 12:24:22PM +0200, Michael S. Tsirkin wrote:
On Mon, Nov 14, 2011 at 10:16:10AM +,
On Mon, Nov 14, 2011 at 11:29:18AM +, Daniel P. Berrange wrote:
Do you have some more details on the kind of errors? Missing files,
permissions, something like this? Or rather something related to the
actual content of an image file?
Missing files due to wrong/missing NFS mounts, or
On Mon, Nov 14, 2011 at 01:34:15PM +0200, Michael S. Tsirkin wrote:
On Mon, Nov 14, 2011 at 11:29:18AM +, Daniel P. Berrange wrote:
On Mon, Nov 14, 2011 at 12:21:53PM +0100, Kevin Wolf wrote:
Am 14.11.2011 12:08, schrieb Daniel P. Berrange:
On Mon, Nov 14, 2011 at 12:24:22PM +0200,
x86 has a Undefined Instruction, its opcode is 0F 0B and it generates
an invalid opcode exception. This instruction is provided for software
testing to explicitly generate an invalid opcode exception. The opcode
for this instruction is reserved for this purpose.
Thanks
Xin
On Sun, Nov 13,
On Mon, Nov 14, 2011 at 11:37:27AM +, Daniel P. Berrange wrote:
On Mon, Nov 14, 2011 at 01:34:15PM +0200, Michael S. Tsirkin wrote:
On Mon, Nov 14, 2011 at 11:29:18AM +, Daniel P. Berrange wrote:
On Mon, Nov 14, 2011 at 12:21:53PM +0100, Kevin Wolf wrote:
Am 14.11.2011 12:08,
On Mon, Nov 14, 2011 at 11:37:27AM +, Daniel P. Berrange wrote:
On Mon, Nov 14, 2011 at 01:34:15PM +0200, Michael S. Tsirkin wrote:
On Mon, Nov 14, 2011 at 11:29:18AM +, Daniel P. Berrange wrote:
On Mon, Nov 14, 2011 at 12:21:53PM +0100, Kevin Wolf wrote:
Am 14.11.2011 12:08,
On Mon, Nov 14, 2011 at 01:51:40PM +0200, Michael S. Tsirkin wrote:
On Mon, Nov 14, 2011 at 11:37:27AM +, Daniel P. Berrange wrote:
On Mon, Nov 14, 2011 at 01:34:15PM +0200, Michael S. Tsirkin wrote:
On Mon, Nov 14, 2011 at 11:29:18AM +, Daniel P. Berrange wrote:
On Mon, Nov 14,
On Mon, Nov 14, 2011 at 01:56:36PM +0200, Michael S. Tsirkin wrote:
On Mon, Nov 14, 2011 at 11:37:27AM +, Daniel P. Berrange wrote:
On Mon, Nov 14, 2011 at 01:34:15PM +0200, Michael S. Tsirkin wrote:
On Mon, Nov 14, 2011 at 11:29:18AM +, Daniel P. Berrange wrote:
On Mon, Nov 14,
Hi,
I saw the a presentation on virtualizing performance counters at
http://www.linux-kvm.org/wiki/images/6/6d/Kvm-forum-2011-performance-monitoring.pdf.
Has the code been merged? Can I get something to play with/provide
feedback?
Balbir Singh
--
To unsubscribe from this list: send the line
On Mon, Nov 14, 2011 at 11:58:14AM +, Daniel P. Berrange wrote:
On Mon, Nov 14, 2011 at 01:56:36PM +0200, Michael S. Tsirkin wrote:
On Mon, Nov 14, 2011 at 11:37:27AM +, Daniel P. Berrange wrote:
On Mon, Nov 14, 2011 at 01:34:15PM +0200, Michael S. Tsirkin wrote:
On Mon, Nov 14,
On Mon, Nov 14, 2011 at 05:35:59PM +0530, Balbir Singh wrote:
Hi,
I saw the a presentation on virtualizing performance counters at
http://www.linux-kvm.org/wiki/images/6/6d/Kvm-forum-2011-performance-monitoring.pdf.
Has the code been merged? Can I get something to play with/provide
On Mon, Nov 14, 2011 at 4:04 AM, Asias He asias.he...@gmail.com wrote:
Why both the bandwidth and latency performance are dropping so dramatically
with multiple VQ?
What's the expected benefit from multiple VQs i.e. why are doing the
patches Sasha?
--
To unsubscribe from this list: send the
On 11/14/2011 12:56 PM, Takuya Yoshikawa wrote:
(2011/11/14 19:25), Avi Kivity wrote:
On 11/14/2011 11:20 AM, Takuya Yoshikawa wrote:
This is a revised version of my previous work. I hope that
the patches are more self explanatory than before.
It looks good. I'll let Marcelo (or anyone
On Mon, Nov 14, 2011, Xin Tong wrote about Re: KVM VMExit:
x86 has a Undefined Instruction, its opcode is 0F 0B and it generates
an invalid opcode exception. This instruction is provided for software
testing to explicitly generate an invalid opcode exception. The opcode
for this instruction is
On Mon, Nov 14, 2011 at 02:25:17PM +0200, Pekka Enberg wrote:
On Mon, Nov 14, 2011 at 4:04 AM, Asias He asias.he...@gmail.com wrote:
Why both the bandwidth and latency performance are dropping so dramatically
with multiple VQ?
What's the expected benefit from multiple VQs
Heh, the
On 11/09/2011 01:23 AM, Scott Wood wrote:
This prevents us from inappropriately blocking in a KVM_SET_REGS
ioctl -- the MSR[WE] will take effect when the guest is next entered.
It also causes SRR1[WE] to be set when we enter the guest's interrupt
handler, which is what e500 hardware is
On 11/14/2011 04:16 AM, Daniel P. Berrange wrote:
On Sat, Nov 12, 2011 at 12:25:34PM +0200, Avi Kivity wrote:
On 11/11/2011 12:15 PM, Kevin Wolf wrote:
Am 10.11.2011 22:30, schrieb Anthony Liguori:
Live migration with qcow2 or any other image format is just not going to work
right now even
On Sun, Nov 13, 2011 at 07:48:28PM +0200, Michael S. Tsirkin wrote:
@@ -863,6 +872,9 @@ struct net_device_ops {
int (*ndo_stop)(struct net_device *dev);
netdev_tx_t (*ndo_start_xmit) (struct sk_buff *skb,
On 11/14/2011 07:13 AM, Alexander Graf wrote:
On 11/09/2011 01:23 AM, Scott Wood wrote:
+/* Check pending exceptions and deliver one, if possible. */
+void kvmppc_core_prepare_to_enter(struct kvm_vcpu *vcpu)
+{
+WARN_ON_ONCE(!irqs_disabled());
+
+kvmppc_core_check_exceptions(vcpu);
Hi
Please send in any agenda items you are interested in covering.
Proposal:
- Migration debacle.
Thanks, Juan.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
On 11/14/2011 11:44 AM, Juan Quintela wrote:
Hi
Please send in any agenda items you are interested in covering.
Proposal:
- Migration debacle.
Ack. You read my mind :-)
Regards,
Anthony Liguori
Thanks, Juan.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the
On 14.11.2011, at 18:22, Scott Wood scottw...@freescale.com wrote:
On 11/14/2011 07:13 AM, Alexander Graf wrote:
On 11/09/2011 01:23 AM, Scott Wood wrote:
+/* Check pending exceptions and deliver one, if possible. */
+void kvmppc_core_prepare_to_enter(struct kvm_vcpu *vcpu)
+{
+
Add a flexible mechanism to specify virtio configuration layout, using
pci vendor-specific capability. A separate capability is used for each
of common, device specific and data-path accesses.
Warning: compiled only.
This patch also needs to be split up, pci_iomap changes
also need arch updates
I am investigating how PIO is emulated in KVM and QEMU. when a PIO is
encountered, it seems to me that its pio data is copied to
vcpu-arch.pio_data and a fixed offset is assigned to
vcpu-run-io.data_offset.
static int emulator_pio_out_emulated(int size, unsigned short port,
{...
On 11/14/2011 12:01 PM, Alexander Graf wrote:
On 14.11.2011, at 18:22, Scott Wood scottw...@freescale.com wrote:
kvmppc_core_check_exceptions can clear MSR_WE, so we need to check after
that. We can't enable interrupts after kvmppc_core_check_exceptions (or
rather, if we do, we need to
On Fri, 2011-11-11 at 18:14 -0600, Scott Wood wrote:
On 11/03/2011 03:12 PM, Alex Williamson wrote:
+Many modern system now provide DMA and interrupt remapping facilities
+to help ensure I/O devices behave within the boundaries they've been
+allotted. This includes x86 hardware with AMD-Vi
On Mon, 2011-11-14 at 13:54 -0700, Alex Williamson wrote:
On Fri, 2011-11-11 at 18:14 -0600, Scott Wood wrote:
On 11/03/2011 03:12 PM, Alex Williamson wrote:
+ for (i = 0; i npage; i++, iova += PAGE_SIZE, vaddr += PAGE_SIZE) {
+ unsigned long pfn = 0;
+
+ ret =
On 11/14/2011 02:54 PM, Alex Williamson wrote:
On Fri, 2011-11-11 at 18:14 -0600, Scott Wood wrote:
What are the semantics of desired and/or returned dma address?
I believe the original intention was that a user could leave dmaaddr
clear and let the iommu layer provide an iova address. The
Am 14.11.2011 um 23:26 schrieb Scott Wood scottw...@freescale.com:
On 11/14/2011 02:54 PM, Alex Williamson wrote:
On Fri, 2011-11-11 at 18:14 -0600, Scott Wood wrote:
What are the semantics of desired and/or returned dma address?
I believe the original intention was that a user could
On Fri, 2011-11-11 at 16:22 -0600, Christian Benvenuti (benve) wrote:
-Original Message-
From: Alex Williamson [mailto:alex.william...@redhat.com]
Sent: Friday, November 11, 2011 10:04 AM
To: Christian Benvenuti (benve)
Cc: chr...@sous-sol.org; a...@au1.ibm.com; p...@au1.ibm.com;
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
drivers/virtio/virtio_pci.c |6 +++---
1 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/drivers/virtio/virtio_pci.c b/drivers/virtio/virtio_pci.c
index 7625434..d242fcc 100644
--- a/drivers/virtio/virtio_pci.c
+++
Free up the BAR to make space for the new virtio BARs. It isn't required
to have the PBA and the table in the separate BARs, and uniting them will
just give us extra BARs to play with.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/include/kvm/virtio-pci.h |1 -
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/include/kvm/pci.h| 13 ++-
tools/kvm/include/kvm/virtio-pci.h |4 +
tools/kvm/virtio/pci.c | 248 ++--
3 files changed, 254 insertions(+), 11 deletions(-)
diff --git
Offset was ignored for start calulcations, making all mappings start at
offset 0 always.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
lib/iomap.c |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/lib/iomap.c b/lib/iomap.c
index f28720e..93ae915 100644
---
From: Michael S. Tsirkin m...@redhat.com
Add a flexible mechanism to specify virtio configuration layout, using
pci vendor-specific capability. A separate capability is used for each
of common, device specific and data-path accesses.
Warning: compiled only.
This patch also needs to be split up,
This patch series contains two fixes for the RFC patch send by Michael. These
patches are pretty basic and should probably be merged into the next version
of that patch.
Other two patches add support to the new virtio-pci spec in KVM tools, allowing
for easy testing of any future virtio-pci
On Fri, Nov 11, 2011 at 03:10:56PM -0700, Alex Williamson wrote:
Thanks Konrad! Comments inline.
On Fri, 2011-11-11 at 12:51 -0500, Konrad Rzeszutek Wilk wrote:
On Thu, Nov 03, 2011 at 02:12:24PM -0600, Alex Williamson wrote:
[snip]
+The GET_NUM_REGIONS ioctl tells us how many regions the
On Mon, Nov 14, 2011 at 03:59:00PM -0700, Alex Williamson wrote:
On Fri, 2011-11-11 at 16:22 -0600, Christian Benvenuti (benve) wrote:
[snip]
- the user either unmaps one specific mapping or 'all of them'.
The 'all of them' case would also take care of those cases where
the user does
On Tue, 2011-11-15 at 11:05 +1100, David Gibson wrote:
Being strict, or at least enforcing strictness, requires that the
infrastructure track all the maps, so that the unmaps can be
matching. This is not a natural thing with the data structures you
want for all IOMMUs. For example on POWER,
On Mon, 2011-11-14 at 13:54 -0700, Alex Williamson wrote:
On Fri, 2011-11-11 at 18:14 -0600, Scott Wood wrote:
On 11/03/2011 03:12 PM, Alex Williamson wrote:
+ int (*get)(void *);
+ void(*put)(void *);
+ ssize_t (*read)(void *,
On Mon, Nov 14, 2011 at 5:48 PM, Gleb Natapov g...@redhat.com wrote:
Not yet merged. You can take it from here https://lkml.org/lkml/2011/11/10/215
Thank you very much, Gleb!
Balbir Singh.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
Sasha Levin levinsasha...@gmail.com wrote on 11/14/2011 03:45:40 PM:
Why both the bandwidth and latency performance are dropping so
dramatically with multiple VQ?
It looks like theres no hash sync between host and guest, which makes
the RX VQ change for every packet. This is my guess.
-
The message you sent to bamboowang.com/sales was rejected because it would
exceed the quota for the mailbox.
The subject of the message follows:
Subject: Delivery reports about your e-mail
On 14.11.2011, at 18:22, Scott Wood scottw...@freescale.com wrote:
On 11/14/2011 07:13 AM, Alexander Graf wrote:
On 11/09/2011 01:23 AM, Scott Wood wrote:
+/* Check pending exceptions and deliver one, if possible. */
+void kvmppc_core_prepare_to_enter(struct kvm_vcpu *vcpu)
+{
+
65 matches
Mail list logo