On Thu, 2011-12-01 at 09:58 +0200, Michael S. Tsirkin wrote:
> On Thu, Dec 01, 2011 at 01:12:25PM +1030, Rusty Russell wrote:
> > On Wed, 30 Nov 2011 18:11:51 +0200, Sasha Levin
> > wrote:
> > > On Tue, 2011-11-29 at 16:58 +0200, Avi Kivity wrote:
> > > > On 11/29/2011 04:54 PM, Michael S. Tsirki
On Thu, Dec 01, 2011 at 12:58:59PM +1030, Rusty Russell wrote:
> On Thu, 1 Dec 2011 01:13:07 +0200, "Michael S. Tsirkin"
> wrote:
> > For x86, stores into memory are ordered. So I think that yes, smp_XXX
> > can be selected at compile time.
> >
> > So let's forget the virtio strangeness for a mi
On Wed, 30 Nov 2011, Asias He wrote:
In virtio net's notify_vq(), we simply signal the tx/rx handle thread
and return.
Why not use the threadpool?
No.
Sasha?
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordom
On Thu, 2011-12-01 at 10:48 +0200, Pekka Enberg wrote:
> On Wed, 30 Nov 2011, Asias He wrote:
> >>> In virtio net's notify_vq(), we simply signal the tx/rx handle thread
> >>> and return.
> >>
> >> Why not use the threadpool?
> >
> > No.
>
> Sasha?
I was looking into the concept of adding 'dedica
On Thu, Dec 01, 2011 at 08:14:26AM +0200, Ohad Ben-Cohen wrote:
> On Thu, Dec 1, 2011 at 1:13 AM, Michael S. Tsirkin wrote:
> > For x86, stores into memory are ordered. So I think that yes, smp_XXX
> > can be selected at compile time.
>
> But then you can't use the same kernel image for both scen
On 11/29/2011 09:10 PM, Markus Armbruster wrote:
> Avi Kivity writes:
>
> > On 11/29/2011 05:51 PM, Juan Quintela wrote:
> >> How to do high level stuff?
> >> - python?
> >>
> >
> > One of the disadvantages of the various scripting languages is the lack
> > of static type checking, which makes it
On Thu, Dec 01, 2011 at 10:09:37AM +0200, Sasha Levin wrote:
> On Thu, 2011-12-01 at 09:58 +0200, Michael S. Tsirkin wrote:
> > On Thu, Dec 01, 2011 at 01:12:25PM +1030, Rusty Russell wrote:
> > > On Wed, 30 Nov 2011 18:11:51 +0200, Sasha Levin
> > > wrote:
> > > > On Tue, 2011-11-29 at 16:58 +02
On Wed, 2011-11-30 at 18:32 +, Stefano Stabellini wrote:
> On Wed, 30 Nov 2011, Arnd Bergmann wrote:
>
> > KVM and Xen at least both fall into the single-return-value category,
> > so we should be able to agree on a calling conventions. KVM does not
> > have an hcall API on ARM yet, and I see
On 11/30/2011 11:43 AM, Xiao Guangrong wrote:
> Subject: [PATCH] KVM: MMU: audit: inline audit function
>
> inline audit function and little cleanup
>
>
Thanks, applied.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line "unsubscribe k
On Wed, 2011-11-30 at 18:15 +, Arnd Bergmann wrote:
> On Wednesday 30 November 2011, Ian Campbell wrote:
> > On Wed, 2011-11-30 at 14:32 +, Arnd Bergmann wrote:
> > > On Wednesday 30 November 2011, Ian Campbell wrote:
> > > What I suggested to the KVM developers is to start out with the
> >
On Thu, Dec 1, 2011 at 10:58 AM, Sasha Levin wrote:
> I was looking into the concept of adding 'dedicated' threads to the
> threadpool, since when the threadpool was added originally one of the
> purposes was to have all worker threads in a single place.
>
> This way we could still have threads in
On 11/30/2011 10:59 AM, Raghavendra K T wrote:
> Add a hypercall to KVM hypervisor to support pv-ticketlocks
>
> KVM_HC_KICK_CPU allows the calling vcpu to kick another vcpu out of halt
> state.
>
> The presence of these hypercalls is indicated to guest via
> KVM_FEATURE_KICK_VCPU/KVM_CAP_KI
l am a Staff of Hang Seng Bank HongKong, I do not know if we can work together
in transferring $19,500,000.USD from my bank. Finally if you are interested I
shall provide you with more details. my private Email: mrsong.l...@yahoo.cn
--
To unsubscribe from this list: send the line "unsubscribe kvm
l am a Staff of Hang Seng Bank HongKong, I do not know if we can work together
in transferring $19,500,000.USD from my bank. Finally if you are interested I
shall provide you with more details. my private Email: mrsong.l...@yahoo.cn
--
To unsubscribe from this list: send the line "unsubscribe kvm
On 2011-11-04 09:45, Jan Kiszka wrote:
> [ Rebase of v1 over yesterday's linux-next ]
>
> This series tries to heal the currently broken locking scheme around PCI
> config space accesses.
>
> We have an interface lock out access via sysfs, but that service wrongly
> assumes it is only called by o
This patch introduces two ioctls for virtual cpus, that are only
valid for kernel virtual machines that are controlled by userspace.
Each virtual cpu has its individual address space in this mode of
operation, and each address space is backed by the gmap
implementation just like the address space f
This patch allows the user to fault in pages on a virtual cpus
address space for user controlled virtual machines. Typically this
is superfluous because userspace can just create a mapping and
let the kernel's page fault logic take are of it. There is one
exception: SIE won't start if the lowcore i
Hi Avi, Hi Marcelo,
this patch series introduces an interface to allow a privileged userspace
program to control a KVM virtual machine. The interface is intended for
use by a machine simulator called CECSIM that can simulate an entire
mainframe machine with nested virtualization and I/O for the pu
This patch disables the in-kernel interrupt stack for KVM virtual
machines that are controlled by user. Userspace has to take care
of handling interrupts on its own.
Signed-off-by: Carsten Otte
---
Index: linux-2.5-cecsim/arch/s390/kvm/kvm-s390.c
==
This patch introduces a new config option for user controlled kernel
virtual machines. It introduces a new ioctl named
KVM_S390_ENABLE_UCONTROL on the kvm file descriptor which allows for
a one way transition from a regular kernel virtual machine to a
user controlled virtual machine. The virtual ma
This patch introduces an interface to access the guest visible
storage keys. It supports three operations that model the behavior
that SSKE/ISKE/RRBE instructions would have if they were issued by
the guest. These instructions are all documented in the z architecture
principles of operation book.
This patch introduces a new exit reason in the kvm_run structure
named KVM_EXIT_UCONTROL. This exit indicates, that a virtual cpu
has regognized a fault on the host page table. The idea is that
userspace can handle this fault by mapping memory at the fault
location into the cpu's address space and
This patch announces a new capability KVM_CAP_S390_UCONTROL that
indicates that kvm can now support virtual machines that are
controlled by userspace.
Signed-off-by: Carsten Otte
---
---
arch/s390/kvm/kvm-s390.c |3 +++
include/linux/kvm.h |1 +
2 files changed, 4 insertions(+)
---
This patch exports the SIE hardware control block to userspace
via the mapping of the vcpu file descriptor.
Signed-off-by: Carsten Otte
---
---
arch/s390/include/asm/kvm_host.h |2 ++
virt/kvm/kvm_main.c |5 +
2 files changed, 7 insertions(+)
--- a/arch/s390/include/asm
This patch fixes definition of the idle_mask and the local_int array
in kvm_s390_float_interrupt. Previous definition had 64 cpus max
hardcoded instead of using KVM_MAX_VCPUS.
Signed-off-by: Carsten Otte
---
Index: linux-2.5-cecsim/arch/s390/include/asm/kvm_host.h
This patch disables in-kernel handling of SIE intercepts for user
controlled virtual machines. All intercepts are passed to userspace
via KVM_EXIT_SIE exit reason just like SIE intercepts that cannot be
handled in-kernel for regular KVM guests.
Signed-off-by: Carsten Otte
---
Index: linux-2.5-cec
This patch makes sure user controlled virtual machines do not use a
system control area (sca). This is needed in order to create
virtual machines with more cpus than the size of the sca [64].
Signed-off-by: Carsten Otte
---
Index: linux-2.5-cecsim/arch/s390/kvm/kvm-s390.c
This patch fixes the return code of kvm_arch_vcpu_ioctl in case
of an unkown ioctl number.
Signed-off-by: Carsten Otte
---
Index: linux-2.5-cecsim/arch/s390/kvm/kvm-s390.c
===
--- linux-2.5-cecsim.orig/arch/s390/kvm/kvm-s390.c
+++ li
On 12/01/2011 02:57 PM, Carsten Otte wrote:
> Hi Avi, Hi Marcelo,
>
> this patch series introduces an interface to allow a privileged userspace
> program to control a KVM virtual machine. The interface is intended for
> use by a machine simulator called CECSIM that can simulate an entire
> mainfram
On 12/01/2011 02:57 PM, Carsten Otte wrote:
> This patch introduces a new config option for user controlled kernel
> virtual machines. It introduces a new ioctl named
> KVM_S390_ENABLE_UCONTROL on the kvm file descriptor which allows for
> a one way transition from a regular kernel virtual machine
On 12/01/2011 02:57 PM, Carsten Otte wrote:
> This patch introduces two ioctls for virtual cpus, that are only
> valid for kernel virtual machines that are controlled by userspace.
> Each virtual cpu has its individual address space in this mode of
> operation, and each address space is backed by t
On 12/01/2011 02:57 PM, Carsten Otte wrote:
> This patch exports the SIE hardware control block to userspace
> via the mapping of the vcpu file descriptor.
>
> Signed-off-by: Carsten Otte
> ---
> ---
> arch/s390/include/asm/kvm_host.h |2 ++
> virt/kvm/kvm_main.c |5 +
>
On 12/01/2011 02:57 PM, Carsten Otte wrote:
> This patch exports the SIE hardware control block to userspace
> via the mapping of the vcpu file descriptor.
> else if (vmf->pgoff == KVM_COALESCED_MMIO_PAGE_OFFSET)
> page = virt_to_page(vcpu->kvm->coalesced_mmio_ring);
> #endif
>
On 12/01/2011 03:15 PM, Avi Kivity wrote:
>
> > +
> > + if (kvm->arch.gmap)
> > + gmap_free(kvm->arch.gmap);
> > +
> > + kvm->arch.gmap = NULL;
>
> Locking?
>
> What happens if a vcpu is created afterwards?
>
Having read the code, I think you can repurpose the argument of
KVM_CREATE_
On 12/01/2011 03:10 PM, Avi Kivity wrote:
> On 12/01/2011 02:57 PM, Carsten Otte wrote:
> > Hi Avi, Hi Marcelo,
> >
> > this patch series introduces an interface to allow a privileged userspace
> > program to control a KVM virtual machine. The interface is intended for
> > use by a machine simulato
Hi,
my name's Daniele and I'm using the native linux kvm tool.
If I try to execute it in this way ./kvm run -d ~/linux-0.2.img I get
a kernel panic like this: http://paste.org/41673
Only using the addictional option -p "idle=halt" I can run a virtual machine.
Printing cat /proc/cpuinfo on the host
In automated test environments, we often build and test
qemu from arbitrary paths, rather than installing them
on standard PATH directories. Of course, appending directories
to PATH might produce the desired result, but making it
possible to specify arbitrary qemu paths through environment
variable
Print the paths of the programs under test
(qemu, qemu-img and qemu-io).
Signed-off-by: Lucas Meneghel Rodrigues
---
check |3 +++
1 files changed, 3 insertions(+), 0 deletions(-)
diff --git a/check b/check
index 84ef3e5..8499a04 100755
--- a/check
+++ b/check
@@ -158,6 +158,9 @@ FULL_HOST_
Since we might want to test arbitrary qemu, qemu-img and
qemu-io paths, allow users to specify environment variable
values for QEMU_PROG, QEMU_IMG_PROG and QEMU_IO_PROG so
the testsuite will use those values rather than find them
on PATH. Obviously, if such env variables are not set
prior to script
On 12/01/2011 03:37 PM, Daniele Carollo wrote:
> Hi,
> my name's Daniele and I'm using the native linux kvm tool.
> If I try to execute it in this way ./kvm run -d ~/linux-0.2.img I get
> a kernel panic like this: http://paste.org/41673
> Only using the addictional option -p "idle=halt" I can run a
On Thu, 2011-12-01 at 15:48 +0200, Avi Kivity wrote:
> On 12/01/2011 03:37 PM, Daniele Carollo wrote:
> > Hi,
> > my name's Daniele and I'm using the native linux kvm tool.
> > If I try to execute it in this way ./kvm run -d ~/linux-0.2.img I get
> > a kernel panic like this: http://paste.org/41673
On 12/01/2011 03:50 PM, Sasha Levin wrote:
> On Thu, 2011-12-01 at 15:48 +0200, Avi Kivity wrote:
> > On 12/01/2011 03:37 PM, Daniele Carollo wrote:
> > > Hi,
> > > my name's Daniele and I'm using the native linux kvm tool.
> > > If I try to execute it in this way ./kvm run -d ~/linux-0.2.img I get
Il 01 dicembre 2011 14:48, Avi Kivity ha scritto:
> On 12/01/2011 03:37 PM, Daniele Carollo wrote:
>> Hi,
>> my name's Daniele and I'm using the native linux kvm tool.
>> If I try to execute it in this way ./kvm run -d ~/linux-0.2.img I get
>> a kernel panic like this: http://paste.org/41673
>> On
On 12/01/2011 03:54 PM, Daniele Carollo wrote:
> Il 01 dicembre 2011 14:48, Avi Kivity ha scritto:
> > On 12/01/2011 03:37 PM, Daniele Carollo wrote:
> >> Hi,
> >> my name's Daniele and I'm using the native linux kvm tool.
> >> If I try to execute it in this way ./kvm run -d ~/linux-0.2.img I get
On 01.12.2011 14:26, Avi Kivity wrote:
On 12/01/2011 02:57 PM, Carsten Otte wrote:
This patch exports the SIE hardware control block to userspace
via the mapping of the vcpu file descriptor.
else if (vmf->pgoff == KVM_COALESCED_MMIO_PAGE_OFFSET)
page = virt_to_page(vcpu->
On 12/01/2011 03:59 PM, Carsten Otte wrote:
> On 01.12.2011 14:26, Avi Kivity wrote:
>> On 12/01/2011 02:57 PM, Carsten Otte wrote:
>>> This patch exports the SIE hardware control block to userspace
>>> via the mapping of the vcpu file descriptor.
>>> else if (vmf->pgoff == KVM_COALESCED_MMIO
On Thu, 01 Dec 2011 15:15:03 +0200
Avi Kivity wrote:
> > +
> > + if (kvm->arch.gmap)
> > + gmap_free(kvm->arch.gmap);
> > +
> > + kvm->arch.gmap = NULL;
>
> Locking?
>
> What happens if a vcpu is created afterwards?
>
> I guess you don't mind too much since this is a privileged i
On 2011-11-29 22:36, Eric B Munson wrote:
> Often when a guest is stopped from the qemu console, it will report spurious
> soft lockup warnings on resume. There are kernel patches being discussed that
> will give the host the ability to tell the guest that it is being stopped and
> should ignore t
On 2011-10-23 17:39, Vadim Rozenfeld wrote:
> ---
> Makefile.target |2 +
> target-i386/cpuid.c | 14 ++
> target-i386/hyperv.c | 65
> ++
> target-i386/hyperv.h | 37
> 4 files changed, 118 inser
On 2011-10-23 17:39, Vadim Rozenfeld wrote:
> ---
> target-i386/kvm.c | 73 +++-
> 1 files changed, 71 insertions(+), 2 deletions(-)
>
> diff --git a/target-i386/kvm.c b/target-i386/kvm.c
> index 82fec8c..c061e3b 100644
> --- a/target-i386/kvm.c
>
On Thu, 01 Dec 2011 13:04:15 +0100
Jan Kiszka wrote:
> On 2011-11-04 09:45, Jan Kiszka wrote:
> > [ Rebase of v1 over yesterday's linux-next ]
> >
> > This series tries to heal the currently broken locking scheme
> > around PCI config space accesses.
> >
> > We have an interface lock out access
On Thu, 1 Dec 2011, Ian Campbell wrote:
> On Wed, 2011-11-30 at 18:32 +, Stefano Stabellini wrote:
> > On Wed, 30 Nov 2011, Arnd Bergmann wrote:
> > > KVM and Xen at least both fall into the single-return-value category,
> > > so we should be able to agree on a calling conventions. KVM does not
On 11/30/2011 09:03 AM, Xiao Guangrong wrote:
> On 11/29/2011 08:01 PM, Avi Kivity wrote:
>
> > On 11/29/2011 01:56 PM, Xiao Guangrong wrote:
> >> On 11/29/2011 07:20 PM, Avi Kivity wrote:
> >>
> >>
> >>> We used to have a bitmap in a shadow page with a bit set for every slot
> >>> pointed to by th
On Thu, Dec 01, 2011 at 10:26:37AM +, Ian Campbell wrote:
> On Wed, 2011-11-30 at 18:32 +, Stefano Stabellini wrote:
> > On Wed, 30 Nov 2011, Arnd Bergmann wrote:
> > > KVM and Xen at least both fall into the single-return-value category,
> > > so we should be able to agree on a calling con
On 11/30/2011 07:15 AM, Takuya Yoshikawa wrote:
> (2011/11/30 14:02), Takuya Yoshikawa wrote:
>
>> IIUC, even though O(1) is O(1) at the timing of GET DIRTY LOG, it
>> needs O(N) write
>> protections with respect to the total number of dirty pages:
>> distributed, but
>> actually each page fault, w
On Thursday 01 December 2011, Catalin Marinas wrote:
> Given the way register banking is done on AArch64, issuing an HVC on a
> 32-bit guest OS doesn't require translation on a 64-bit hypervisor. We
> have a similar implementation at the SVC level (for 32-bit user apps on
> a 64-bit kernel), the on
On Thu, 2011-12-01 at 15:10 +, Catalin Marinas wrote:
> On Thu, Dec 01, 2011 at 10:26:37AM +, Ian Campbell wrote:
> > On Wed, 2011-11-30 at 18:32 +, Stefano Stabellini wrote:
> > > On Wed, 30 Nov 2011, Arnd Bergmann wrote:
> > > > KVM and Xen at least both fall into the single-return-va
On Thu, Dec 01, 2011 at 03:42:19PM +, Arnd Bergmann wrote:
> On Thursday 01 December 2011, Catalin Marinas wrote:
> > Given the way register banking is done on AArch64, issuing an HVC on a
> > 32-bit guest OS doesn't require translation on a 64-bit hypervisor. We
> > have a similar implementati
On Thursday 01 December 2011, Catalin Marinas wrote:
> On Thu, Dec 01, 2011 at 03:42:19PM +, Arnd Bergmann wrote:
> > On Thursday 01 December 2011, Catalin Marinas wrote:
> > How do you deal with signed integer arguments passed into SVC or HVC from
> > a caller? If I understand the architecture
On Thu, Dec 01, 2011 at 04:44:40PM +, Arnd Bergmann wrote:
> On Thursday 01 December 2011, Catalin Marinas wrote:
> > On Thu, Dec 01, 2011 at 03:42:19PM +, Arnd Bergmann wrote:
> > > On Thursday 01 December 2011, Catalin Marinas wrote:
> > > How do you deal with signed integer arguments pas
On Thu, 01 Dec 2011, Jan Kiszka wrote:
> On 2011-11-29 22:36, Eric B Munson wrote:
> > Often when a guest is stopped from the qemu console, it will report spurious
> > soft lockup warnings on resume. There are kernel patches being discussed
> > that
> > will give the host the ability to tell the
On Thu, 01 Dec 2011, Jan Kiszka wrote:
> On 2011-11-29 22:36, Eric B Munson wrote:
> > Often when a guest is stopped from the qemu console, it will report spurious
> > soft lockup warnings on resume. There are kernel patches being discussed
> > that
> > will give the host the ability to tell the
On Wed, Nov 30, 2011 at 06:41:13PM +0100, Andrea Arcangeli wrote:
> On Wed, Nov 30, 2011 at 09:52:37PM +0530, Dipankar Sarma wrote:
> > create the guest topology correctly and optimize for NUMA. This
> > would work for us.
>
> Even on the case of 1 guest that fits in one node, you're not going to
Often when a guest is stopped from the qemu console, it will report spurious
soft lockup warnings on resume. There are kernel patches being discussed that
will give the host the ability to tell the guest that it is being stopped and
should ignore the soft lockup warning that generates. This patch
On 12/01/2011 06:19 PM, Eric B Munson wrote:
> On Thu, 01 Dec 2011, Jan Kiszka wrote:
>
>> On 2011-11-29 22:36, Eric B Munson wrote:
>>> +
>>> static void cpu_update_state(void *opaque, int running, RunState state)
>>> {
>>> CPUState *env = opaque;
>>>
>>> if (running) {
>>>
On 2011-12-01 18:19, Eric B Munson wrote:
> On Thu, 01 Dec 2011, Jan Kiszka wrote:
>
>> On 2011-11-29 22:36, Eric B Munson wrote:
>>> Often when a guest is stopped from the qemu console, it will
>>> report spurious soft lockup warnings on resume. There are
>>> kernel patches being discussed that
On 2011-12-01 18:31, Arend van Spriel wrote:
> On 12/01/2011 06:19 PM, Eric B Munson wrote:
>> On Thu, 01 Dec 2011, Jan Kiszka wrote:
>>
>>> On 2011-11-29 22:36, Eric B Munson wrote:
+
static void cpu_update_state(void *opaque, int running, RunState state)
{
CPUState *env
On 2011-12-01 18:22, Eric B Munson wrote:
> On Thu, 01 Dec 2011, Jan Kiszka wrote:
>
>> On 2011-11-29 22:36, Eric B Munson wrote:
>>> Often when a guest is stopped from the qemu console, it will report spurious
>>> soft lockup warnings on resume. There are kernel patches being discussed
>>> that
On Thu, Dec 01, 2011 at 10:55:20PM +0530, Dipankar Sarma wrote:
> On Wed, Nov 30, 2011 at 06:41:13PM +0100, Andrea Arcangeli wrote:
> > On Wed, Nov 30, 2011 at 09:52:37PM +0530, Dipankar Sarma wrote:
> > > create the guest topology correctly and optimize for NUMA. This
> > > would work for us.
> >
On Wed, 2011-11-23 at 16:03 +0100, Andrea Arcangeli wrote:
> Hi!
>
> On Mon, Nov 21, 2011 at 07:51:21PM -0600, Anthony Liguori wrote:
> > Fundamentally, the entity that should be deciding what memory should be
> > present
> > and where it should located is the kernel. I'm fundamentally opposed
On Thu, Dec 01, 2011 at 06:36:23PM +0100, Andrea Arcangeli wrote:
> On Thu, Dec 01, 2011 at 10:55:20PM +0530, Dipankar Sarma wrote:
> > On Wed, Nov 30, 2011 at 06:41:13PM +0100, Andrea Arcangeli wrote:
> > > On Wed, Nov 30, 2011 at 09:52:37PM +0530, Dipankar Sarma wrote:
> > > > create the guest to
Currently we silently fail if VMX is already in use by a different
virtualization technology.
This is bad since it's non-obvious for the user, and its not too uncommon
for users to have several of these installed on same host.
This patch adds a message to notify the user of the problem.
Cc: Joer
Currently we silently fail if SVM is already in use by a different
virtualization technology.
This is bad since it's non-obvious for the user, and its not too uncommon
for users to have several of these installed on same host.
This patch adds a message to notify the user of the problem.
Cc: Joer
It's enough for memory slot to be readable, as the comment above the check
states.
A user should be able to create read-only memory slot.
Cc: Avi Kivity
Cc: Marcelo Tosatti
Cc: kvm@vger.kernel.org
Signed-off-by: Sasha Levin
---
virt/kvm/kvm_main.c |2 +-
1 files changed, 1 insertions(+),
[ CCing Jeremy's new email ID ]
Hi Avi,
Thanks for review and inputs.
On 12/01/2011 04:41 PM, Avi Kivity wrote:
On 11/30/2011 10:59 AM, Raghavendra K T wrote:
The hypercall needs to be documented in
Documentation/virtual/kvm/hypercalls.txt.
Yes, Sure 'll document. hypercalls.txt is a new fi
>> The attributes are not intrinsic features of the domain. User space will
>> need to set them. But in thinking about it a bit more I think the attributes
>> are more properties of the domain rather than a per map() operation
>> characteristic. I think a separate API might be appropriate. Defi
On Thu, 2011-12-01 at 14:58 -0600, Stuart Yoder wrote:
> >> The attributes are not intrinsic features of the domain. User space will
> >> need to set them. But in thinking about it a bit more I think the
> >> attributes
> >> are more properties of the domain rather than a per map() operation
> >
On Tue, Nov 29, 2011 at 04:35:34PM -0500, Eric B Munson wrote:
> Changes from V3:
> Include CC's on patch 3
> Drop clear flag ioctl and have the watchdog clear the flag when it is reset
>
> Changes from V2:
> A new kvm functions defined in kvm_para.h, the only change to pvclock is the
> initial fl
On Thu, Dec 01, 2011 at 06:36:17PM +0100, Jan Kiszka wrote:
> On 2011-12-01 18:22, Eric B Munson wrote:
> > On Thu, 01 Dec 2011, Jan Kiszka wrote:
> >
> >> On 2011-11-29 22:36, Eric B Munson wrote:
> >>> Often when a guest is stopped from the qemu console, it will report
> >>> spurious
> >>> soft
On Thu, Dec 01, 2011 at 12:19:38PM -0500, Eric B Munson wrote:
> On Thu, 01 Dec 2011, Jan Kiszka wrote:
>
> > On 2011-11-29 22:36, Eric B Munson wrote:
> > > Often when a guest is stopped from the qemu console, it will report
> > > spurious
> > > soft lockup warnings on resume. There are kernel
On Thu, 01 Dec 2011, Marcelo Tosatti wrote:
> On Thu, Dec 01, 2011 at 06:36:17PM +0100, Jan Kiszka wrote:
> > On 2011-12-01 18:22, Eric B Munson wrote:
> > > On Thu, 01 Dec 2011, Jan Kiszka wrote:
> > >
> > >> On 2011-11-29 22:36, Eric B Munson wrote:
> > >>> Often when a guest is stopped from th
Currently, qemu-iotests is implemented outside
the KVM autotest realm. Although convenient if
you want to test the default qemu shipped with
your distro, it's not so convenient to integrate
with the KVM autotest workflow.
In order to take advantage of the fact kvm autotest
tests are already testin
As it is important for qemu-iotests that this particular
program is used.
Signed-off-by: Lucas Meneghel Rodrigues
---
client/tests/kvm/base.cfg.sample |1 +
client/tests/kvm/tests.cfg.sample |4
client/virt/kvm_installer.py | 24
3 files changed, 29
In order to run always the latest up to date qemu iotests
on all KVM branches, insert qemu-iotests execution inside
KVM autotest. It'll attempt to git fetch the latest contents
of the qemu-iotests test suite, then carry on with tests,
reporting errors to autotest.
Besides having the latest test, w
On Thu, 1 Dec 2011 12:26:42 +0200, "Michael S. Tsirkin" wrote:
> On Thu, Dec 01, 2011 at 10:09:37AM +0200, Sasha Levin wrote:
> > On Thu, 2011-12-01 at 09:58 +0200, Michael S. Tsirkin wrote:
> > > We'll presumably need some logic to increment is back,
> > > to account for random workload changes.
On Thu, 1 Dec 2011 10:12:37 +0200, "Michael S. Tsirkin" wrote:
> On Thu, Dec 01, 2011 at 12:58:59PM +1030, Rusty Russell wrote:
> > On Thu, 1 Dec 2011 01:13:07 +0200, "Michael S. Tsirkin"
> > wrote:
> > > For x86, stores into memory are ordered. So I think that yes, smp_XXX
> > > can be selected
(2011/12/02 4:42), Sasha Levin wrote:
> It's enough for memory slot to be readable, as the comment above the check
> states.
>
> A user should be able to create read-only memory slot.
I submitted the original patch like you to speed up page table walking,
a hot path in KVM, and Avi applied the pa
On Mon, 2011-11-21 at 17:00 +0800, Alex,Shi wrote:
> On Thu, 2011-10-20 at 16:38 +0800, Eric Dumazet wrote:
> > Le jeudi 20 octobre 2011 à 15:32 +0800, Alex,Shi a écrit :
> > > percpu_xxx funcs are duplicated with this_cpu_xxx funcs, so replace them
> > > for further code clean up.
> > >
> > > And
(2011/12/02 10:15), Takuya Yoshikawa wrote:
> (2011/12/02 4:42), Sasha Levin wrote:
>> It's enough for memory slot to be readable, as the comment above the check
>> states.
>>
>> A user should be able to create read-only memory slot.
Note: at that time, it looked to me that the API did not allow m
On 29/11/11 16:48, Alex Williamson wrote:
> On Tue, 2011-11-29 at 15:34 +1100, Alexey Kardashevskiy wrote:
>> Hi!
>>
>> On 29/11/11 14:46, Alex Williamson wrote:
>>> On Tue, 2011-11-29 at 12:52 +1100, Alexey Kardashevskiy wrote:
Hi!
I tried (successfully) to run it on POWER and while
On Fri, 2011-12-02 at 12:16 +0900, Takuya Yoshikawa wrote:
> (2011/12/02 10:15), Takuya Yoshikawa wrote:
> > (2011/12/02 4:42), Sasha Levin wrote:
> >> It's enough for memory slot to be readable, as the comment above the check
> >> states.
> >>
> >> A user should be able to create read-only memory
From: Liu Ping Fan
Currently, vcpu can be destructed only when kvm instance destroyed.
Change this to vcpu's destruction taken when its refcnt is zero,
and then vcpu MUST and CAN be destroyed before kvm's destroy.
Signed-off-by: Liu Ping Fan
---
arch/x86/kvm/i8254.c | 14 +-
arch/x86
(2011/12/02 14:46), Sasha Levin wrote:
On Fri, 2011-12-02 at 12:16 +0900, Takuya Yoshikawa wrote:
(2011/12/02 10:15), Takuya Yoshikawa wrote:
(2011/12/02 4:42), Sasha Levin wrote:
It's enough for memory slot to be readable, as the comment above the check
states.
A user should be able to creat
Signed-off-by: Sasha Levin
---
tools/kvm/builtin-run.c |3 ---
1 files changed, 0 insertions(+), 3 deletions(-)
diff --git a/tools/kvm/builtin-run.c b/tools/kvm/builtin-run.c
index 43cf2c4..33de4f6 100644
--- a/tools/kvm/builtin-run.c
+++ b/tools/kvm/builtin-run.c
@@ -856,9 +856,6 @@ int kvm
This patch adds a '--sandbox' argument when used in conjuction with a custom
rootfs, it allows running a script or an executable in the guest environment
by using executables and other files from the host.
This is useful when testing code that might cause problems on the host, or
to automate kerne
On Fri, Dec 2, 2011 at 9:16 AM, Sasha Levin wrote:
> This patch adds a '--sandbox' argument when used in conjuction with a custom
> rootfs, it allows running a script or an executable in the guest environment
> by using executables and other files from the host.
>
> This is useful when testing cod
On Fri, 2011-12-02 at 09:26 +0200, Pekka Enberg wrote:
> On Fri, Dec 2, 2011 at 9:16 AM, Sasha Levin wrote:
> > This patch adds a '--sandbox' argument when used in conjuction with a custom
> > rootfs, it allows running a script or an executable in the guest environment
> > by using executables and
On Fri, 2011-12-02 at 09:26 +0200, Pekka Enberg wrote:
On Fri, Dec 2, 2011 at 9:16 AM, Sasha Levin wrote:
This patch adds a '--sandbox' argument when used in conjuction with a custom
rootfs, it allows running a script or an executable in the guest environment
by using executables and other file
On Fri, 2011-12-02 at 09:39 +0200, Pekka Enberg wrote:
> On Fri, 2011-12-02 at 09:26 +0200, Pekka Enberg wrote:
> >> On Fri, Dec 2, 2011 at 9:16 AM, Sasha Levin
> >> wrote:
> >>> This patch adds a '--sandbox' argument when used in conjuction with a
> >>> custom
> >>> rootfs, it allows running a
On Fri, Dec 2, 2011 at 9:44 AM, Sasha Levin wrote:
>> Would it not be better to introduce a new command that works like 'perf
>> stat', for example:
>>
>> ./kvm sandbox -k -- trinity --mode=random --quiet -i
>>
>> ?
>
> So basically proxy the first set of parameters to 'kvm run' and run the
>
100 matches
Mail list logo