On 11/18/2010 05:08 PM, Avi Kivity wrote:
On 11/18/2010 05:00 PM, Andi Kleen wrote:
On 11/18/2010 3:32 PM, Avi Kivity wrote:
On 11/18/2010 03:48 PM, Andi Kleen wrote:
On 11/18/2010 1:17 PM, Avi Kivity wrote:
cea15c2 ("KVM: Move KVM context switch into own function") split
vmx_vcpu_run()
to pr
On 11/19/2010 11:04 AM, Xiao Guangrong wrote:
Introduce a common function to map invalid gpte
Signed-off-by: Xiao Guangrong
---
arch/x86/kvm/mmu.c |3 --
arch/x86/kvm/paging_tmpl.h | 71 +++-
2 files changed, 37 insertions(+), 37 deletion
On 11/11/2010 11:22 AM, Daniel Gollub wrote:
On Thursday, November 11, 2010 02:31:06 am Avi Kivity wrote:
> Daniel, the buildbot has been fairly effective in keeping qemu-kvm.git
> building. I'd like to extend that to kvm.git, especially for non-x86
> architectures.
[...]
> Can you help with
On 11/22/2010 05:28 PM, Avi Kivity wrote:
>> +static bool FNAME(map_invalid_gpte)(struct kvm_vcpu *vcpu,
>> +struct kvm_mmu_page *sp, u64 *spte,
>> +pt_element_t gpte)
>
> It's really only for speculative maps, the name should reflect that.
>
OK, i'll us
in mmu.txt,there is: a shadow page may contain a mix of leaf and nonleaf sptes.
does it mean that some of sptes points to other shadow pages and some points to
pfn?N§²æìr¸yúèØb²X¬¶Ç§vØ^)Þº{.nÇ+·¤¾h§¶¡Ü¨}©²Æ zÚ&j:+v¨¾«êçzZ+Ê+zf£¢·h§~Ûiÿûàz¹®w¥¢¸?¨èÚ&¢)ߢf
On 11/22/2010 12:18 PM, Xiao Guangrong wrote:
>
> I think the order is reversed. If !is_present_gpte(), it doesn't matter
> if reserved bits are set or not.
>
if !is_present_gpte()&& is_rsvd_bits_set, then we may mark the spte notrap,
so the guest will detect #PF with PFEC.P=PEFC.RSVD=0, but
On 11/18/2010 07:09 PM, Michael S. Tsirkin wrote:
Store irq routing table pointer in the irqfd object,
and use that to inject MSI directly without bouncing out to
a kernel thread.
While we touch this structure, rearrange irqfd fields to make fastpath
better packed for better cache utilization.
On 11/21/10 16:33, Avi Kivity wrote:
+{ 1280, 768, 16 , 0x175},
+{ 1280, 768, 24 , 0x176},
+{ 1280, 768, 32 , 0x177},
Acked-by: Gerd Hoffmann
cheers,
Gerd
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the
Please send in any agenda items you are interested in covering.
thanks, Juan.
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
This patch changes structure of the virtio_console test and
prepares this test for simpler porting of another required tests.
It creates a new layer for running the elementary tests allowing
them to non-critically fail and let the test to finish the whole test loop.
Tests are divided into parts
---
client/tests/kvm/scripts/virtio_guest.py | 22 --
1 files changed, 12 insertions(+), 10 deletions(-)
diff --git a/client/tests/kvm/scripts/virtio_guest.py
b/client/tests/kvm/scripts/virtio_guest.py
index 87727c7..b039ec9 100755
--- a/client/tests/kvm/scripts/virtio_gues
On Mon, Nov 22, 2010 at 1:38 PM, Juan Quintela wrote:
>
> Please send in any agenda items you are interested in covering.
QCOW2 performance roadmap:
* What can be done to achieve near-raw image format performance?
* Benchmark results from an ideal QCOW2 model.
Stefan
--
To unsubscribe from this
Hello,
I was under the impression that the each virtio driver will have a frontend and
backend part. The frontend part would be loaded in the Guest OS and the backend
driver will be loaded in the Host OS. These two drivers will communicate with
each other. The backend driver will then retransmi
On Mon, Nov 22, 2010 at 11:45:18AM +0800, Xiao Guangrong wrote:
> On 11/20/2010 12:11 AM, Marcelo Tosatti wrote:
>
> >> void kvm_flush_remote_tlbs(struct kvm *kvm)
> >> {
> >> + int dirty_count = atomic_read(&kvm->tlbs_dirty);
> >> +
> >> + smp_mb();
> >>if (make_all_cpus_request(kvm, KVM_
here it's the answer of kvm -net nic,model=?
qemu: Supported NIC models:
ne2k_pci,i82551,i82557b,i82559er,rtl8139,e1000,pcnet,virtio
which one is 10mbps and which one is 100 or 1000 mbps?
does it require to install the proper driver on a centos VM for each
one of them?
Regards
On Sat, Nov 20, 201
22.11.2010 17:24, hadi golestani wrote:
> here it's the answer of kvm -net nic,model=?
> qemu: Supported NIC models:
> ne2k_pci,i82551,i82557b,i82559er,rtl8139,e1000,pcnet,virtio
> which one is 10mbps and which one is 100 or 1000 mbps?
As has been already pointed out, these speeds are speeds of
ph
Thanks,
But I've heared that using e1000 and installing it's driver will speed
up the VM network, and my experience confirms that.
Don't you think using the driver will help the speed of port?
On Mon, Nov 22, 2010 at 6:31 AM, wrote:
> 22.11.2010 17:24, hadi golestani wrote:
>> here it's the an
22.11.2010 17:36, hadi golestani wrote:
> Thanks,
> But I've heared that using e1000 and installing it's driver will speed
> up the VM network, and my experience confirms that.
> Don't you think using the driver will help the speed of port?
The speedup of e1000 compared with the default rtl8139 is
This boring patchset introduces a struct x86_exception to represent an
exception, and uses it to communicate between the emulator and the rest
of kvm. The primary benefit is that we can now pass a #GP from kvm into
the emulator, not just #PFs.
I'd like to also fold vcpu->arch.fault into struct x8
Introduce a structure that can contain an exception to be passed back
to main kvm code.
Signed-off-by: Avi Kivity
---
arch/x86/include/asm/kvm_emulate.h | 11 ---
arch/x86/kvm/emulate.c | 26 +++---
arch/x86/kvm/x86.c | 13 +++
If rc == X86EMUL_PROPAGATE_FAULT, we would have returned earlier.
Signed-off-by: Avi Kivity
---
arch/x86/kvm/emulate.c |8
1 files changed, 0 insertions(+), 8 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index 68d72db..b39df7b 100644
--- a/arch/x86/kvm/
Immediately after we generate an exception, we want a X86EMUL_PROPAGATE_FAULT
constant, so return it from the generation functions.
Signed-off-by: Avi Kivity
---
arch/x86/kvm/emulate.c | 140 +---
1 files changed, 50 insertions(+), 90 deletions(-)
di
Signed-off-by: Avi Kivity
---
arch/x86/include/asm/kvm_host.h | 14 ++---
arch/x86/kvm/mmu.c | 13 +
arch/x86/kvm/paging_tmpl.h | 19 +
arch/x86/kvm/x86.c | 52 --
4 files changed, 51 insertions(+),
Signed-off-by: Avi Kivity
---
arch/x86/kvm/paging_tmpl.h | 32 ++--
1 files changed, 14 insertions(+), 18 deletions(-)
diff --git a/arch/x86/kvm/paging_tmpl.h b/arch/x86/kvm/paging_tmpl.h
index f448da5..aaed914 100644
--- a/arch/x86/kvm/paging_tmpl.h
+++ b/arch/x86/
Instead of checking for X86EMUL_PROPAGATE_FAULT, check for any error,
making the callers more reliable.
Signed-off-by: Avi Kivity
---
arch/x86/kvm/emulate.c | 16
1 files changed, 8 insertions(+), 8 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
ind
This way, they can return #GP, not just #PF.
Signed-off-by: Avi Kivity
---
arch/x86/include/asm/kvm_emulate.h | 15 --
arch/x86/kvm/emulate.c | 89 ---
arch/x86/kvm/x86.c | 76 ++-
3 files changed,
From: Sridhar Samudrala
Date: Thu, 28 Oct 2010 16:10:50 -0700
> With the current default 'vepa' mode, a KVM guest using virtio with
> macvtap backend has the following limitations.
> - cannot change/add a mac address on the guest virtio-net
> - cannot create a vlan device on the guest virtio-net
On Mon, Nov 22, 2010 at 2:05 PM, Prasad Joshi
wrote:
> I was under the impression that the each virtio driver will have a frontend
> and backend part. The frontend part would be loaded in the Guest OS and the
> backend driver will be loaded in the Host OS. These two drivers will
> communicate w
On 10/26/2010 09:59 AM, Jeremy Fitzhardinge wrote:
>
> If the guest domain has been suspend/resumed or migrated, then the
> system clock backing the pvclock clocksource may revert to a smaller
> value (ie, can be non-monotonic across the migration/save-restore).
> Make sure we zero last_value in th
On Mon, 22 Nov 2010 13:49:11 +1100 Stephen Rothwell wrote:
> Hi all,
>
> Changes since 20101119:
kvm.c:(.init.text+0x11f49): undefined reference to `kvm_register_clock'
when CONFIG_KVM_CLOCK is not enabled.
---
~Randy
*** Remember to use Documentation/SubmitChecklist when testing your code **
On Mon, Nov 22, 2010 at 12:19:25PM -0200, Marcelo Tosatti wrote:
> On Mon, Nov 22, 2010 at 11:45:18AM +0800, Xiao Guangrong wrote:
> > On 11/20/2010 12:11 AM, Marcelo Tosatti wrote:
> >
> > >> void kvm_flush_remote_tlbs(struct kvm *kvm)
> > >> {
> > >> +int dirty_count = atomic_read(&kvm
* Juan Quintela (quint...@redhat.com) wrote:
> Please send in any agenda items you are interested in covering.
usb-ccid
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-i
On 11/22/2010 03:45 PM, Chris Wright wrote:
* Juan Quintela (quint...@redhat.com) wrote:
Please send in any agenda items you are interested in covering.
usb-ccid
aka external device emulation in qemu.
This is an easy topic to discuss in an abstract sense and I'm sure
everyone
qemu-kvm vcpu threads don't response to SIGSTOP/SIGCONT. Instead of teaching
them to respond to these signals, introduce monitor commands that stop and start
individual vcpus.
The purpose of these commands are to implement CPU hard limits using an external
tool that watches the CPU consumption an
On 11/22/2010 03:45 PM, Chris Wright wrote:
* Juan Quintela (quint...@redhat.com) wrote:
Please send in any agenda items you are interested in covering.
usb-ccid
- vcpu hard limits
Regards,
Anthony Liguori
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
On 11/22/2010 05:00 PM, Anthony Liguori wrote:
qemu-kvm vcpu threads don't response to SIGSTOP/SIGCONT. Instead of teaching
them to respond to these signals, introduce monitor commands that stop and start
individual vcpus.
The purpose of these commands are to implement CPU hard limits using an
* Anthony Liguori (aligu...@us.ibm.com) wrote:
> qemu-kvm vcpu threads don't response to SIGSTOP/SIGCONT. Instead of teaching
> them to respond to these signals, introduce monitor commands that stop and
> start
> individual vcpus.
In the past SIGSTOP has introduced time skew. Have you verified
VFIO "driver" development has moved to a publicly accessible respository
on github:
git://github.com/pugs/vfio-linux-2.6.git
This is a clone of the Linux-2.6 tree with all VFIO changes on the vfio
branch (which is the default). There is a tag 'vfio-v6' marking the latest
"release" of VFI
On 11/22/2010 05:04 PM, Chris Wright wrote:
* Anthony Liguori (aligu...@us.ibm.com) wrote:
qemu-kvm vcpu threads don't response to SIGSTOP/SIGCONT. Instead of teaching
them to respond to these signals, introduce monitor commands that stop and start
individual vcpus.
In the past SIGST
* Anthony Liguori (aligu...@linux.vnet.ibm.com) wrote:
> On 11/22/2010 05:04 PM, Chris Wright wrote:
> >* Anthony Liguori (aligu...@us.ibm.com) wrote:
> >>qemu-kvm vcpu threads don't response to SIGSTOP/SIGCONT. Instead of
> >>teaching
> >>them to respond to these signals, introduce monitor comma
On 11/22/2010 05:56 PM, Chris Wright wrote:
* Anthony Liguori (aligu...@linux.vnet.ibm.com) wrote:
On 11/22/2010 05:04 PM, Chris Wright wrote:
* Anthony Liguori (aligu...@us.ibm.com) wrote:
qemu-kvm vcpu threads don't response to SIGSTOP/SIGCONT. Instead of teaching
them to
On Monday, November 22, 2010 10:37:05 pm Avi Kivity wrote:
> On 11/11/2010 11:22 AM, Daniel Gollub wrote:
> > On Thursday, November 11, 2010 02:31:06 am Avi Kivity wrote:
> > > Daniel, the buildbot has been fairly effective in keeping qemu-kvm.git
> > > building. I'd like to extend that to kvm.g
On 11/22/2010 06:17 PM, cs-jerry** wrote:
> in mmu.txt,there is: a shadow page may contain a mix of leaf and nonleaf
> sptes.
> does it mean that some of sptes points to other shadow pages and some points
> to pfn?
Yes, nonleaf sptes point to other shadow pages and leaf sptes point to GFNs or
P
I test the performance between per-vhost kthread disable and enable.
Test method:
Send the same traffic load between per-vhost kthread disable and
enable, and compare the cpu rate of host os.
I run five vm on kvm, each of them have five nic.
the vhost version which per-vhost kthread disable we use
- "Jiří Župka" wrote:
> ---
> client/tests/kvm/scripts/virtio_guest.py | 22
> --
> 1 files changed, 12 insertions(+), 10 deletions(-)
>
> diff --git a/client/tests/kvm/scripts/virtio_guest.py
> b/client/tests/kvm/scripts/virtio_guest.py
> index 87727c7..b039ec9 100755
Test method:
Send the same traffic load between virtio_pci MSI-X disable and
enable,and compare the cpu rate of host os.
I used the same version of virtio driver, only modify the msi-x option.
the host os version is 2.6.32.
the virtio dirver is from rhel6.
the guest version os is 2.6.16.
Test res
On 11/22/2010 05:28 PM, Avi Kivity wrote:
>> +static bool FNAME(map_invalid_gpte)(struct kvm_vcpu *vcpu,
>> +struct kvm_mmu_page *sp, u64 *spte,
>> +pt_element_t gpte)
>
> It's really only for speculative maps, the name should reflect that.
>
This is the
On 11/23/2010 05:46 AM, Marcelo Tosatti wrote:
>
> My bad, the patch is fine.
>
Post the path with appropriate format and add some comments.
Subject: [PATCH v3 6/6] KVM: MMU: delay flush all tlbs on sync_page path
From: Xiao Guangrong
Quote from Avi:
| I don't think we need to flush immediat
Hi Avi,
I've purposed the following API for mask bit support.
The main point is, QEmu can know which entries are enabled(by
pci_enable_msix()).
And for enabled entries, kernel own it, including MSI data/address and mask
bit(routing table and mask bitmap). QEmu should use KVM_GET_MSIX_ENTRY ioc
On 11/23/2010 08:09 AM, Yang, Sheng wrote:
Hi Avi,
I've purposed the following API for mask bit support.
The main point is, QEmu can know which entries are enabled(by
pci_enable_msix()).
And for enabled entries, kernel own it, including MSI data/address and mask
bit(routing table and mask bitm
On 11/23/2010 04:53 AM, lidong chen wrote:
Test method:
Send the same traffic load between virtio_pci MSI-X disable and
enable,and compare the cpu rate of host os.
I used the same version of virtio driver, only modify the msi-x option.
the host os version is 2.6.32.
the virtio dirver is from rhel
Hi Lidong,
What do you mean by 'send the same traffic load between...' ?
See if my understanding is correct:
You have two identical physical machines (CPU/Memory/NIC...), one(A) runs RHEL6
Beta2(2.6.32-60) and the other one (B) runs RHEL6 (2.6.32-71).
Each machine booted 5 identical VMs and the
On 11/23/2010 01:04 AM, Chris Wright wrote:
* Anthony Liguori (aligu...@us.ibm.com) wrote:
> qemu-kvm vcpu threads don't response to SIGSTOP/SIGCONT. Instead of teaching
> them to respond to these signals, introduce monitor commands that stop and
start
> individual vcpus.
In the past SIGSTO
On Tuesday 23 November 2010 14:17:28 Avi Kivity wrote:
> On 11/23/2010 08:09 AM, Yang, Sheng wrote:
> > Hi Avi,
> >
> > I've purposed the following API for mask bit support.
> >
> > The main point is, QEmu can know which entries are enabled(by
> > pci_enable_msix()). And for enabled entries, kern
On 11/23/2010 01:00 AM, Anthony Liguori wrote:
qemu-kvm vcpu threads don't response to SIGSTOP/SIGCONT. Instead of teaching
them to respond to these signals, introduce monitor commands that stop and start
individual vcpus.
The purpose of these commands are to implement CPU hard limits using an
On Tue, Nov 23, 2010 at 08:20:19AM +0200, Avi Kivity wrote:
> On 11/23/2010 04:53 AM, lidong chen wrote:
> >Test method:
> >Send the same traffic load between virtio_pci MSI-X disable and
> >enable,and compare the cpu rate of host os.
> >I used the same version of virtio driver, only modify the msi
I used a special tool, this tool can send and receive packets parallelly.
I set the tool to use the same traffic load.
then i use the tool to test different version of kvm.
2010/11/23 Huang, Zhiteng :
> Hi Lidong,
>
> What do you mean by 'send the same traffic load between...' ?
>
> See if my un
By same traffic load, do you mean same amount of packets or traffic with same
bandwidth or anything else?
Regards,
HUANG, Zhiteng
-Original Message-
From: lidong chen [mailto:chen.lidong.ker...@gmail.com]
Sent: Tuesday, November 23, 2010 2:53 PM
To: Huang, Zhiteng
Cc: t...@kernel.org
traffic with same bandwidth.
for example,both 1000 packets per second.
2010/11/23 Huang, Zhiteng :
> By same traffic load, do you mean same amount of packets or traffic with same
> bandwidth or anything else?
>
> Regards,
>
> HUANG, Zhiteng
>
>
>
> -Original Message-
> From: lidong chen
can you tell me something about this problem.
thanks.
2010/11/23 Avi Kivity :
> On 11/23/2010 04:53 AM, lidong chen wrote:
>>
>> Test method:
>> Send the same traffic load between virtio_pci MSI-X disable and
>> enable,and compare the cpu rate of host os.
>> I used the same version of virtio drive
On Mon, Nov 22, 2010 at 05:00:18PM -0600, Anthony Liguori wrote:
> qemu-kvm vcpu threads don't response to SIGSTOP/SIGCONT. Instead of teaching
> them to respond to these signals, introduce monitor commands that stop and
> start
> individual vcpus.
>
> The purpose of these commands are to implem
On 11/23/2010 09:27 AM, lidong chen wrote:
can you tell me something about this problem.
thanks.
Which problem?
--
I have a truly marvellous patch that fixes the bug which this
signature is too narrow to contain.
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of
On 11/23/2010 08:35 AM, Yang, Sheng wrote:
On Tuesday 23 November 2010 14:17:28 Avi Kivity wrote:
> On 11/23/2010 08:09 AM, Yang, Sheng wrote:
> > Hi Avi,
> >
> > I've purposed the following API for mask bit support.
> >
> > The main point is, QEmu can know which entries are enabled(by
>
63 matches
Mail list logo