Hi Lucas,
Since I consider you our Autotest reference I direct the following question to
you.
Currently our Autotest servers run tests in client mode using the same control
file on all hosts. We want to move on to dispatching tests from the server,
using a server control file, so that each hos
Bugs item #2793225, was opened at 2009-05-18 10:04
Message generated for change (Tracker Item Submitted) made by alain_knaff
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=2793225&group_id=180599
Please note that this message will contain a full copy of
Sheng Yang wrote:
This meant to be with commit: adcf3594f9580bdf9b5e71f271b6088b185e017e,
otherwise QEmu only counts the MSI-X entries, but won't fill it...
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line "unsu
Hi,
what kvm module/userspace versions are You using?
n.
On Sun, May 17, 2009 at 11:32:44PM -0300, Wagner Sartori Junior wrote:
> Hello,
>
> I'm needin' some help. The network in guests hangs(I can't ping from
> my house the guest) after some time(from 10 minutes to some hours) and
> stops in one
The problem exists only on VMX. Also currently we skip this step if
there is pending exception. The patch fixes this too.
Signed-off-by: Gleb Natapov
---
arch/x86/kvm/vmx.c |8
arch/x86/kvm/x86.c |3 ---
2 files changed, 8 insertions(+), 3 deletions(-)
diff --git a/arch/x86/kvm
Most of the time IRR is empty, so instead of scanning the whole IRR on
each VM entry keep a variable that tells us if IRR is not empty. IRR
will have to be scanned twice on each IRQ delivery, but this is much more
rare than VM entry.
Signed-off-by: Gleb Natapov
---
arch/x86/kvm/lapic.c | 19 ++
Signed-off-by: Gleb Natapov
---
arch/x86/kvm/i8259.c |5 +
arch/x86/kvm/irq.c |1 -
arch/x86/kvm/x86.c |9 +
3 files changed, 10 insertions(+), 5 deletions(-)
diff --git a/arch/x86/kvm/i8259.c b/arch/x86/kvm/i8259.c
index 1ccb50c..d32ceac 100644
--- a/arch/x86/kvm/i8
Gleb Natapov wrote:
@@ -3174,10 +3174,11 @@ static void inject_pending_irq(struct kvm_vcpu *vcpu,
struct kvm_run *kvm_run)
vcpu->arch.nmi_injected = true;
kvm_x86_ops->set_nmi(vcpu);
}
- } else if (kvm_cpu_has_interrupt(vcpu))
Avi Kivity wrote:
> Jan Kiszka wrote:
>> In order to allow sync'ing the kmod dir against arbitrary kernels trees,
>> extend the sync script to accept alternative paths and adjust the
>> Makefile accordingly.
>>
>> @@ -17,6 +17,7 @@ ORIGMODDIR = $(patsubst %/build,%/kernel,$(KERNELDIR))
>>
>> rpm
On Sun, May 17, 2009 at 08:00:40PM +0300, Avi Kivity wrote:
> Anthony Liguori wrote:
>> From: Joerg Roedel
>>
>> The current method of finding out the size of huge pages does not work
>> reliably anymore. Current Linux supports more than one huge page size
>> but /proc/meminfo only show one of the
On Mon, May 18, 2009 at 12:00:40PM +0300, Avi Kivity wrote:
> Gleb Natapov wrote:
>> @@ -3174,10 +3174,11 @@ static void inject_pending_irq(struct kvm_vcpu
>> *vcpu, struct kvm_run *kvm_run)
>> vcpu->arch.nmi_injected = true;
>> kvm_x86_ops->set_nmi(vcpu);
From: Sheng Yang
Prepared for reuse ioapic_redir_entry for MSI.
Signed-off-by: Sheng Yang
Signed-off-by: Avi Kivity
---
include/linux/kvm_types.h | 17 +
virt/kvm/ioapic.c |6 +++---
virt/kvm/ioapic.h | 17 +
3 files changed, 21 insertio
Highmem pages are a pain, and saving three lowmem pages on i386 isn't worth
the extra code.
Signed-off-by: Avi Kivity
---
arch/x86/kvm/vmx.c | 59 ++--
1 files changed, 25 insertions(+), 34 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86
From: Sheng Yang
Signed-off-by: Sheng Yang
Signed-off-by: Avi Kivity
---
include/linux/kvm_host.h |3 +
virt/kvm/ioapic.c| 91 ---
virt/kvm/irq_comm.c | 95 --
3 files changed, 95 insertion
Windows 2008 accesses this MSR often on context switch intensive workloads;
since we run in guest context with the guest MSR value loaded (so swapgs can
work correctly), we can simply disable interception of rdmsr/wrmsr for this
MSR.
A complication occurs since in legacy mode, we run with the host
From: Sheng Yang
In order to use with bit ops.
Signed-off-by: Sheng Yang
Signed-off-by: Avi Kivity
---
virt/kvm/ioapic.c | 17 -
virt/kvm/ioapic.h |4 ++--
virt/kvm/irq_comm.c |5 +++--
3 files changed, 13 insertions(+), 13 deletions(-)
diff --git a/virt/kvm/ioa
From: Sheng Yang
It's also convenient when we extend KVM supported vcpu number in the future.
Signed-off-by: Sheng Yang
Signed-off-by: Avi Kivity
---
arch/x86/kvm/lapic.c |7 ---
virt/kvm/ioapic.c| 24 +---
virt/kvm/irq_comm.c | 17 +
3 fil
From: Sheng Yang
We have to handle more than one interrupt with one handler for MSI-X. Avi
suggested to use a flag to indicate the pending. So here is it.
Signed-off-by: Sheng Yang
Signed-off-by: Avi Kivity
---
include/linux/kvm_host.h |1 +
virt/kvm/kvm_main.c | 66 +++
From: Marcelo Tosatti
Unused.
Signed-off-by: Marcelo Tosatti
Signed-off-by: Avi Kivity
---
arch/x86/kvm/i8254.c |1 -
arch/x86/kvm/i8254.h |1 -
2 files changed, 0 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/i8254.c b/arch/x86/kvm/i8254.c
index c13bb92..3eddae6 100644
---
From: Matt T. Yourst
This issue just appeared in kvm-84 when running on 2.6.28.7 (x86-64)
with PREEMPT enabled.
We're getting syslog warnings like this many (but not all) times qemu
tells KVM to run the VCPU:
BUG: using smp_processor_id() in preemptible [] code:
qemu-system-x86/28938
ca
From: Sheng Yang
Introduce KVM_SET_MSIX_NR and KVM_SET_MSIX_ENTRY two ioctls.
This two ioctls are used by userspace to specific guest device MSI-X entry
number and correlate MSI-X entry with GSI during the initialization stage.
MSI-X should be well initialzed before enabling.
Don't support cha
From: Gleb Natapov
free_mmu_pages() should only undo what alloc_mmu_pages() does.
Free mmu pages from the generic VM destruction function, kvm_destroy_vm().
Signed-off-by: Gleb Natapov
Signed-off-by: Avi Kivity
---
arch/x86/kvm/mmu.c |8
virt/kvm/kvm_main.c |2 ++
2 files ch
From: Yang Zhang
Modify the arg of kvm_get_lowest_prio_vcpu().
Make it consistent with its declaration.
Signed-off-by: Yang Zhang
Signed-off-by: Marcelo Tosatti
---
arch/ia64/kvm/kvm-ia64.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/arch/ia64/kvm/kvm-ia64.c b/ar
From: Marcelo Tosatti
Skip the test which checks if the PIT is properly routed when
using the IOAPIC, aimed at buggy hardware.
Signed-off-by: Marcelo Tosatti
Signed-off-by: Avi Kivity
---
arch/x86/kernel/kvm.c |4
1 files changed, 4 insertions(+), 0 deletions(-)
diff --git a/arch/x8
From: Marcelo Tosatti
We can infer elapsed time from hrtimer_expires_remaining.
Signed-off-by: Marcelo Tosatti
Signed-off-by: Avi Kivity
---
arch/x86/kvm/i8254.c | 37 +++--
1 files changed, 31 insertions(+), 6 deletions(-)
diff --git a/arch/x86/kvm/i8254.c
From: Marcelo Tosatti
Hide the internals of vcpu awakening / injection from the in-kernel
emulated timers. This makes future changes in this logic easier and
decreases the distance to more generic timer handling.
Signed-off-by: Marcelo Tosatti
Signed-off-by: Avi Kivity
---
arch/x86/kvm/Makefi
From: Sheng Yang
Would be used with bit ops, and would be easily extended if KVM_MAX_VCPUS is
increased.
Signed-off-by: Sheng Yang
Signed-off-by: Avi Kivity
---
arch/x86/kvm/lapic.c |8
virt/kvm/ioapic.h|2 +-
virt/kvm/irq_comm.c |2 +-
3 files changed, 6 insertions(
From: Joerg Roedel
There is no reason to update the shadow pte here because the guest pte
is only changed to dirty state.
Signed-off-by: Joerg Roedel
Signed-off-by: Marcelo Tosatti
---
arch/x86/kvm/paging_tmpl.h |1 -
1 files changed, 0 insertions(+), 1 deletions(-)
diff --git a/arch/x86
From: Gleb Natapov
ioapic_deliver() and kvm_set_msi() have code duplication. Move
the code into ioapic_deliver_entry() function and call it from
both places.
Signed-off-by: Gleb Natapov
Signed-off-by: Marcelo Tosatti
---
include/linux/kvm_host.h |2 +-
virt/kvm/ioapic.c| 61
From: Jes Sorensen
Copy in SN2 RTC based ITC emulation for fast exit. The two versions
have the same size, so a dropin is simpler than patching the branch
instruction to hit the SN2 version.
Signed-off-by: Jes Sorensen
Acked-by: Xiantao Zhang
Signed-off-by: Avi Kivity
---
arch/ia64/include/a
From: Sheng Yang
Gleb fixed bitmap ops usage in kvm_ioapic_get_delivery_bitmask.
Sheng merged two functions, as well as fixed several issues in
kvm_get_intr_delivery_bitmask
1. deliver_bitmask is a bitmap rather than a unsigned long intereger.
2. Lowest priority target bitmap wrong calculated by
From: Sheng Yang
This patch finally enable MSI-X.
What we need for MSI-X:
1. Intercept one page in MMIO region of device. So that we can get guest desired
MSI-X table and set up the real one. Now this have been done by guest, and
transfer to kernel using ioctl KVM_SET_MSIX_NR and KVM_SET_MSIX_EN
From: Jes Sorensen
On SN2, map in the SN2 RTC registers to the VMM module, needed for ITC
emulation.
Signed-off-by: Jes Sorensen
Acked-by: Xiantao Zhang
Signed-off-by: Avi Kivity
---
arch/ia64/include/asm/kvm_host.h |2 +
arch/ia64/include/asm/pgtable.h |2 +
arch/ia64/kvm/kvm-ia64.
From: Amit Shah
We ignore writes to the performance counters and performance event
selector registers already. Kaspersky antivirus reads the eventsel
MSR causing it to crash with the current behaviour.
Return 0 as data when the eventsel registers are read to stop the
crash.
Signed-off-by: Amit
From: Gleb Natapov
Use kvm_apic_match_dest() in kvm_get_intr_delivery_bitmask() instead
of duplicating the same code. Use kvm_get_intr_delivery_bitmask() in
apic_send_ipi() to figure out ipi destination instead of reimplementing
the logic.
Signed-off-by: Gleb Natapov
Signed-off-by: Marcelo Tosa
From: Gleb Natapov
Get rid of ioapic_inj_irq() and ioapic_inj_nmi() functions.
Signed-off-by: Gleb Natapov
Signed-off-by: Marcelo Tosatti
---
arch/ia64/include/asm/kvm_host.h |1 -
arch/ia64/kvm/kvm-ia64.c |8 +++---
arch/ia64/kvm/lapic.h|2 +-
arch/x86/kvm/lap
From: Gleb Natapov
The new way does not require additional loop over vcpus to calculate
the one with lowest priority as one is chosen during delivery bitmap
construction.
Signed-off-by: Gleb Natapov
Signed-off-by: Marcelo Tosatti
---
arch/ia64/kvm/kvm-ia64.c| 15 +---
arch/i
From: Gleb Natapov
kvm_vcpu_block() unhalts vpu on an interrupt/timer without checking
if interrupt window is actually opened.
Signed-off-by: Gleb Natapov
Signed-off-by: Avi Kivity
---
arch/ia64/kvm/kvm-ia64.c|6 ++
arch/powerpc/kvm/powerpc.c |6 ++
arch/s390/kvm/
Allows reading back hardware capability.
Signed-off-by: Avi Kivity
---
arch/x86/kvm/vmx.c |5 -
1 files changed, 4 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 9b97c8e..2f65120 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@ -265,7
From: Gleb Natapov
Currently timer events are processed before entering guest mode. Move it
to main vcpu event loop since timer events should be processed even while
vcpu is halted. Timer may cause interrupt/nmi to be injected and only then
vcpu will be unhalted.
Signed-off-by: Gleb Natapov
Si
From: Gleb Natapov
Deliver interrupt during destination matching loop.
Signed-off-by: Gleb Natapov
Acked-by: Xiantao Zhang
Signed-off-by: Marcelo Tosatti
---
arch/ia64/kvm/kvm-ia64.c | 33 -
arch/ia64/kvm/lapic.h |4 +-
arch/x86/kvm/lapic.c | 59
This allows reading back how the hardware is configured.
Signed-off-by: Avi Kivity
---
arch/x86/kvm/vmx.c |5 -
1 files changed, 4 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index f4b6c4b..9b97c8e 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm
Instead of 'enable_vpid=1', use a simple 'vpid=1'.
Signed-off-by: Avi Kivity
---
arch/x86/kvm/vmx.c |6 +++---
1 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 85f4fd5..a69ba6b 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.
Trivial.
Signed-off-by: Avi Kivity
---
arch/x86/kvm/vmx.c | 33 ++---
1 files changed, 14 insertions(+), 19 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 2f65120..da6461d 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@ -263,11
Useful to see how the module was loaded.
Signed-off-by: Avi Kivity
---
arch/x86/kvm/vmx.c | 10 +-
1 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 2c0a2ed..469787c 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@ -
From: Sheng Yang
After discussion with Marcelo, we decided to rework device assignment framework
together. The old problems are kernel logic is unnecessary complex. So Marcelo
suggest to split it into a more elegant way:
1. Split host IRQ assign and guest IRQ assign. And userspace determine the
It is a static vmx-specific function.
Signed-off-by: Avi Kivity
---
arch/x86/kvm/vmx.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 469787c..85f4fd5 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@ -3162,7 +3
From: Hannes Eder
Fix this sparse warnings:
arch/x86/kvm/lapic.c:916:22: warning: symbol 'lapic_timer_ops' was not
declared. Should it be static?
arch/x86/kvm/i8254.c:268:22: warning: symbol 'kpit_ops' was not declared.
Should it be static?
Signed-off-by: Hannes Eder
Signed-off-by: Avi Ki
From: Jes Sorensen
On SN2 do not pass down the real ITC frequency, but rather patch the
values to match the SN2 RTC frequency.
Signed-off-by: Jes Sorensen
Acked-by: Xiantao Zhang
Signed-off-by: Avi Kivity
---
arch/ia64/kvm/kvm_fw.c | 28 +++-
1 files changed, 27 ins
From: Gleb Natapov
svm_do_inject_vector() reimplements pop_irq().
Signed-off-by: Gleb Natapov
Signed-off-by: Avi Kivity
---
arch/x86/kvm/svm.c | 10 +-
1 files changed, 1 insertions(+), 9 deletions(-)
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index 1f8510c..5b35ebd 10064
Following is my queue for the 2.6.31 merge window that is now approaching.
Please review.
Amit Shah (1):
KVM: x86: Ignore reads to EVNTSEL MSRs
Avi Kivity (9):
KVM: VMX: Don't use highmem pages for the msr and pio bitmaps
KVM: VMX: Don't intercept MSR_KERNEL_GS_BASE
KVM: VMX: Make module
Signed-off-by: Avi Kivity
---
arch/x86/kvm/vmx.c | 10 +-
1 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index a69ba6b..f4b6c4b 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@ -38,19 +38,19 @@
MODULE_AUTHOR("Qumranet")
From: Gleb Natapov
The prioritized bit vector manipulation functions are useful in both vmx and
svm.
Signed-off-by: Gleb Natapov
Signed-off-by: Avi Kivity
---
arch/x86/kvm/svm.c | 25 -
arch/x86/kvm/vmx.c | 17 ++---
arch/x86/kvm/x86.h | 18 ++
From: Jes Sorensen
Move all reading of special register 'AR_ITC' into two functions, one
in the kernel and one in the VMM module. When running on SN2, base the
result on the RTC rather the system ITC, as the ITC isn't
synchronized.
Signed-off-by: Jes Sorensen
Acked-by: Xiantao Zhang
Signed-off
From: Christian Borntraeger
Since "KVM: Unify the delivery of IOAPIC and MSI interrupts"
I get the following warnings:
CC [M] arch/s390/kvm/kvm-s390.o
In file included from arch/s390/kvm/kvm-s390.c:22:
include/linux/kvm_host.h:357: warning: 'struct kvm_ioapic' declared inside
parameter list
Antoine Martin wrote:
Hi,
Here is another one, any ideas?
These oopses do look quite deep. Is it normal to end up in tcp_send_ack
from pdflush??
I think it can happen anywhere, part of the net softirq.
Cheers
Antoine
[929492.154634] pdflush: page allocation failure. order:0, mode:0x20
add iommu_flags for struct kvm_arch in ia64
Signed-off-by: Yang Zhang
Signed-off-by: Xiantao Zhang
diff --git a/arch/ia64/include/asm/kvm_host.h b/arch/ia64/include/asm/kvm_host.h
index 589536f..012aca0 100644
--- a/arch/ia64/include/asm/kvm_host.h
+++ b/arch/ia64/include/asm/kvm_host.h
@@ -468
Brent A Nelson wrote:
Well, I just tried disabling smp on my guest, and live migration
worked fine. I see that there are already SMP complaints with live
migration in KVM:84 in the bug database, so I guess this is just
another, "Me, too."
Is this expected to be fixed in the soon-to-be-releas
Ingo Molnar wrote:
> * Han, Weidong wrote:
>
>> Siddha, Suresh B wrote:
>>> On Wed, 2009-05-06 at 23:16 -0700, Han, Weidong wrote:
@@ -634,6 +694,44 @@ static int ir_parse_ioapic_scope(struct
acpi_dmar_header *header, " 0x%Lx\n",
Zhang, Yang wrote:
add iommu_flags for struct kvm_arch in ia64
Thanks, I already fixed it (in the same way).
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.or
On Mon, May 18, 2009 at 12:30:49AM +0300, Avi Kivity wrote:
> Michael S. Tsirkin wrote:
>> This implements optional MSI-X support in virtio_pci.
>> MSI-X is used whenever the host supports at least 2 MSI-X
>> vectors: 1 for configuration changes and 1 for virtqueues.
>> Per-virtqueue vectors are al
Avi Kivity wrote:
> Cam Macdonell wrote:
>>>
>>> If my understanding is correct both the VM's who wants to
>>> communicate would gives this path in the command line with one of
>>> them specifying as "server".
>>
>> Exactly, the one with the "server" in the parameter list will wait
>> for a connect
On Sun, May 17, 2009 at 11:47:53PM +0300, Avi Kivity wrote:
> Alex Williamson wrote:
>> On Wed, 2009-05-13 at 08:33 -0600, Alex Williamson wrote:
>>
>>> On Wed, 2009-05-13 at 08:15 -0600, Alex Williamson wrote:
>>>
On Wed, 2009-05-13 at 16:55 +0300, Michael S. Tsirkin wrote:
Forget to remove debug output before submitting. Resending.
Signed-off-by: Gleb Natapov
diff --git a/arch/x86/kvm/i8259.c b/arch/x86/kvm/i8259.c
index 1ccb50c..d32ceac 100644
--- a/arch/x86/kvm/i8259.c
+++ b/arch/x86/kvm/i8259.c
@@ -218,6 +218,11 @@ int kvm_pic_read_irq(struct kvm *kvm)
s
Hi Avi - Yes the control is not coming to neither " kvm_handle_exit " nor
"handle_vmcall" after the hypercall is made from the guest.
If I am not wrong, the "KVM_HYPERCALL" instruction is expected to work, isn't
it?
Thx,
Venkat
-Original Message-
From: Avi Kivity [mailto:a...@redhat.c
Hi Avi - Yes the control is not coming to neither " kvm_handle_exit " nor
"handle_vmcall" after the hypercall is made from the guest.
If I am not wrong, the "KVM_HYPERCALL" instruction is expected to work, isn't
it?
Thx,
Venkat
-Original Message-
From: Avi Kivity [mailto:a...@redhat.c
Kumar, Venkat wrote:
Hi Avi - Yes the control is not coming to neither " kvm_handle_exit " nor
"handle_vmcall" after the hypercall is made from the guest.
If I am not wrong, the "KVM_HYPERCALL" instruction is expected to work, isn't
it?
Yes, it should. Are you sure the guest is executing
On Mon, May 18, 2009 at 08:53:58AM +0300, Gleb Natapov wrote:
> On Mon, May 18, 2009 at 08:44:54AM +0300, Avi Kivity wrote:
> > Gleb Natapov wrote:
> >> On Sun, May 17, 2009 at 11:07:31PM +0300, Avi Kivity wrote:
> >>
> >>> Gleb Natapov wrote:
> >>>
> Theoretically we can provide diffe
Michael S. Tsirkin wrote:
On Sun, May 17, 2009 at 11:47:53PM +0300, Avi Kivity wrote:
Alex Williamson wrote:
On Wed, 2009-05-13 at 08:33 -0600, Alex Williamson wrote:
On Wed, 2009-05-13 at 08:15 -0600, Alex Williamson wrote:
On Wed, 2009-05-13 at 16:55 +0300, M
Gregory Haskins wrote:
I'll just add that you could tie the irqfd to an iosignalfd to eliminate
the involvement of qemu on either side as well. I'm not sure if that
really works with the design of this particular device (e.g. perhaps
qemu is needed for other reasons besides signaling), but it is
On Mon, May 18, 2009 at 08:39:43AM -0300, Glauber Costa wrote:
> > Now I recall something on LKML about this. Well, in this case Linux
> > shouldn't have used ACPI to invent its own way to do cpu hot-plug.
> It didn't.
> History shows that this method is what is used in some unisys machines,
> whic
On 17.05.2009, at 08:48, Gleb Natapov wrote:
On Fri, May 15, 2009 at 10:22:20AM +0200, Alexander Graf wrote:
static void svm_set_irq(struct kvm_vcpu *vcpu, int irq)
{
struct vcpu_svm *svm = to_svm(vcpu);
- nested_svm_intr(svm);
+ if(!(svm->vcpu.arch.hflags & HF_GIF_MASK))
On Mon, 2009-05-18 at 04:01 -0400, Michael Goldish wrote:
> Hi Lucas,
>
> Since I consider you our Autotest reference I direct the following question
> to you.
>
> Currently our Autotest servers run tests in client mode using the same
> control file on all hosts. We want to move on to dispatchi
Kumar, Venkat wrote:
> Hi Avi - Yes the control is not coming to neither " kvm_handle_exit " nor
> "handle_vmcall" after the hypercall is made from the guest.
> If I am not wrong, the "KVM_HYPERCALL" instruction is expected to work, isn't
> it?
>
Hi Venkat,
I have used this method of IO man
On Mon, May 11, 2009 at 01:29:06PM -0500, Anthony Liguori wrote:
> >It don't think we realistically can.
>
> Maybe two fds? One open in O_SYNC and one not. Is such a thing sane?
O_SYNC and O_DIRECT currently behave exactly in the same way. In none
of the filesystem I've looked at there is an e
On Tue, May 12, 2009 at 11:35:23AM +0300, Avi Kivity wrote:
> >The cache size on disks is constantly growing, and if you lose cache
> >it doesn't really matter how much you lose but what you lose.
> >
>
> Software errors won't cause data loss on a real disk (firmware bugs
> will, but the firmwa
On Tue, May 12, 2009 at 04:18:36PM +0200, Christian Borntraeger wrote:
> Am Tuesday 12 May 2009 15:54:14 schrieb Rusty Russell:
> > On Mon, 11 May 2009 06:09:08 pm Christoph Hellwig wrote:
> > > Do we need a new feature flag for this command or can we expect that
> > > all previous barrier support
Cam - I got your patch to work but without notifications. I could share memory
using the patch but notifications aren't working.
I bring up two VM's with option "-ivshmem shrmem,1024,/dev/shm/shrmem,server"
and "-ivshmem shrmem,1024,/dev/shm/shrmem" respectively.
When I make an "ioctl" from one
On Wed, May 13, 2009 at 01:06:57PM -0400, john cooper wrote:
> [Resend of earlier patch: 1/2 rebased to qemu-kvm,
> 2/2 minor tweak]
patch 1/2 seems to be missing.
> Equivalent functionality currently exists for IDE
> and SCSI, however it is not yet implemented for
> virtio.
So why can't we re-u
Use proper foo-y style list additions to cleanup all the conditionals,
move module selection after compound object selection and remove the
superflous comment.
Signed-off-by: Christoph Hellwig
Index: linux-2.6/arch/x86/kvm/Makefile
===
On Mon, May 18, 2009 at 02:36:41PM +0300, Avi Kivity wrote:
> Michael S. Tsirkin wrote:
>> On Sun, May 17, 2009 at 11:47:53PM +0300, Avi Kivity wrote:
>>
>>> Alex Williamson wrote:
>>>
On Wed, 2009-05-13 at 08:33 -0600, Alex Williamson wrote:
> On Wed, 2009-05-13 at 0
Ok. With KVM-85 it works. I was using KVM-84 earlier.
Thx,
Venkat
-Original Message-
From: Avi Kivity [mailto:a...@redhat.com]
Sent: Monday, May 18, 2009 5:03 PM
To: Kumar, Venkat
Cc: kvm@vger.kernel.org
Subject: Re: KVM_HYPERCALL
Kumar, Venkat wrote:
> Hi Avi - Yes the control is not
Michael S. Tsirkin wrote:
On the other hand, in MSI-X mask bit is mandatory, not optional
so we'll have to support it for assigned devices at some point.
If we are worried about speed of masking/unmasking MSI-X interrupts for
assigned devices (older kernels used to mask them, recent kernels le
On Mon, May 18, 2009 at 02:40:18PM +0300, Gleb Natapov wrote:
> On Mon, May 18, 2009 at 08:39:43AM -0300, Glauber Costa wrote:
> > > Now I recall something on LKML about this. Well, in this case Linux
> > > shouldn't have used ACPI to invent its own way to do cpu hot-plug.
> > It didn't.
> > Histor
On Mon, May 18, 2009 at 09:40:03AM -0300, Glauber Costa wrote:
> On Mon, May 18, 2009 at 02:40:18PM +0300, Gleb Natapov wrote:
> > On Mon, May 18, 2009 at 08:39:43AM -0300, Glauber Costa wrote:
> > > > Now I recall something on LKML about this. Well, in this case Linux
> > > > shouldn't have used A
On 17.05.2009, at 23:08, Avi Kivity wrote:
Alexander Graf wrote:
In order to find out why things were slow with nested SVM I hacked
intercept reporting into debugfs in my local tree and found pretty
interesting results (using NPT):
[...]
So apparently the most intercepts come from the
On Mon, May 18, 2009 at 03:42:10PM +0300, Gleb Natapov wrote:
> On Mon, May 18, 2009 at 09:40:03AM -0300, Glauber Costa wrote:
> > On Mon, May 18, 2009 at 02:40:18PM +0300, Gleb Natapov wrote:
> > > On Mon, May 18, 2009 at 08:39:43AM -0300, Glauber Costa wrote:
> > > > > Now I recall something on L
On 17.05.2009, at 22:58, Avi Kivity wrote:
Alexander Graf wrote:
I can't think why it was done for writes. Normally, a guest page
fault would be trapped and reflected a long time before emulation,
in FNAME(page_fault)(), after walk_addr().
Can you give some details on the situation? W
On 15.05.2009, at 15:43, Joerg Roedel wrote:
On Fri, May 15, 2009 at 10:22:19AM +0200, Alexander Graf wrote:
SVM adds another way to do INVLPG by ASID which Hyper-V makes use of,
so let's implement it!
For now we just do the same thing invlpg does, as asid switching
means we flush the mmu any
Joerg Roedel wrote:
On Sun, May 17, 2009 at 08:00:40PM +0300, Avi Kivity wrote:
Anthony Liguori wrote:
From: Joerg Roedel
The current method of finding out the size of huge pages does not work
reliably anymore. Current Linux supports more than one huge page size
but /proc/meminfo only
Greetings,
Could someone let me know if current virtio-net supports zero-copy? I
see some discussion here:
http://thread.gmane.org/gmane.comp.emulators.kvm.devel/28061/
(copyless virtio net thoughts) and it looks like the copyless
virtio-net is not supported by KVM yet. If this is true, then is th
On Mon, May 18, 2009 at 08:10:28AM -0500, Anthony Liguori wrote:
> Joerg Roedel wrote:
>> On Sun, May 17, 2009 at 08:00:40PM +0300, Avi Kivity wrote:
>>
>>> Anthony Liguori wrote:
>>>
From: Joerg Roedel
The current method of finding out the size of huge pages does not work
>
Alexander Graf wrote:
There's only a limited potential here (a factor of three, reducing 6
exits to 2, less the emulation overhead). There's a lot more to be
gained from nested npt, since you'll avoid most of the original exits
in the first place.
I think the reversed is the case. Look at
On 18.05.2009, at 15:29, Avi Kivity wrote:
Alexander Graf wrote:
There's only a limited potential here (a factor of three, reducing
6 exits to 2, less the emulation overhead). There's a lot more to
be gained from nested npt, since you'll avoid most of the original
exits in the first pl
Alexander Graf wrote:
Of course, this all depends on the workload. For kernbench style
benchmarks nested NPT probably gives you a bigger win, but anything
doing IO is slowed down way more than it has to now.
What is causing 17K pio exits/sec? What port numbers?
Any hints on how to easily fi
On Mon, May 18, 2009 at 03:33:20PM +0300, Avi Kivity wrote:
> Michael S. Tsirkin wrote:
>>>
On the other hand, in MSI-X mask bit is mandatory, not optional
so we'll have to support it for assigned devices at some point.
If we are worried about speed of masking/unmasking MSI-X in
Michael S. Tsirkin wrote:
On Mon, May 18, 2009 at 03:33:20PM +0300, Avi Kivity wrote:
Michael S. Tsirkin wrote:
On the other hand, in MSI-X mask bit is mandatory, not optional
so we'll have to support it for assigned devices at some point.
If we are worried about speed of masking/unmas
Raju Srivastava wrote:
Greetings,
Could someone let me know if current virtio-net supports zero-copy? I
see some discussion here:
http://thread.gmane.org/gmane.comp.emulators.kvm.devel/28061/
(copyless virtio net thoughts) and it looks like the copyless
virtio-net is not supported by KVM yet.
On Sun, May 17, 2009 at 07:59:51PM +0300, Avi Kivity wrote:
> Anthony Liguori wrote:
>> From: Yaniv Kamay
>>
>> Stop cpus before devices when stopping the VM, start cpus after devices
>> when starting VM. Otherwise a vcpu could access a stopped device.
>>
>>
>
> IIRC we decided this was unnece
Christoph Hellwig wrote:
Use proper foo-y style list additions to cleanup all the conditionals,
move module selection after compound object selection and remove the
superflous comment.
I think you're patching the wrong tree.
-kvm-objs := $(common-objs) x86.o mmu.o x86_emulate.o i8259.o ir
1 - 100 of 150 matches
Mail list logo