On Fri, 2011-12-16 at 15:40 +0800, Zang Hongyong wrote:
> 于 2011/12/16,星期五 15:05, Sasha Levin 写道:
> > On Fri, 2011-12-16 at 13:32 +0800, zanghongy...@huawei.com wrote:
> >> From: Hongyong Zang
> >>
> >> Vhost-net uses its own vhost_memory, which results from user space (qemu)
> >> info,
> >> to tr
On Fri, 2011-12-16 at 09:59 +0200, Sasha Levin wrote:
> There has been a great deal of effort to keep vhost and kvm untangled.
> One example is the memory translation it has to do, another one is the
> eventfd/irqfd thing it does just so it could signal an IRQ in the guest
> instead of accessing th
于 2011/12/16,星期五 15:59, Sasha Levin 写道:
> On Fri, 2011-12-16 at 15:40 +0800, Zang Hongyong wrote:
>> 于 2011/12/16,星期五 15:05, Sasha Levin 写道:
>>> On Fri, 2011-12-16 at 13:32 +0800, zanghongy...@huawei.com wrote:
From: Hongyong Zang
Vhost-net uses its own vhost_memory, which results fr
于 2011/12/16,星期五 15:23, Sasha Levin 写道:
> On Fri, 2011-12-16 at 15:02 +0800, Zang Hongyong wrote:
>> 于 2011/12/16,星期五 13:50, Sasha Levin 写道:
>>> On Fri, 2011-12-16 at 09:01 +0800, zanghongy...@huawei.com wrote:
If a guest's ram_size exceeds KVM_32BIT_GAP_START, the corresponding kvm
tool
Signed-off-by: Sasha Levin
---
tools/kvm/disk/qcow.c | 26 --
tools/kvm/ioport.c |7 ++-
tools/kvm/pci.c|6 --
tools/kvm/symbol.c | 18 +-
tools/kvm/term.c |1 -
tools/kvm/util/util.c |
On Fri, 2011-12-16 at 16:36 +0800, Zang Hongyong wrote:
> 于 2011/12/16,星期五 15:23, Sasha Levin 写道:
> > On Fri, 2011-12-16 at 15:02 +0800, Zang Hongyong wrote:
> >> 于 2011/12/16,星期五 13:50, Sasha Levin 写道:
> >>> On Fri, 2011-12-16 at 09:01 +0800, zanghongy...@huawei.com wrote:
> If a guest's ram_
On Fri, Dec 16, 2011 at 10:40:06AM +0200, Sasha Levin wrote:
> Signed-off-by: Sasha Levin
> ---
Thanks, Sasha!
Cyrill
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/maj
Set features which depend on the config we select to make 'make kvmconfig'
non-interactive.
Signed-off-by: Sasha Levin
---
arch/x86/Kconfig |1 +
scripts/kconfig/Makefile |1 +
2 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig
inde
* Sasha Levin wrote:
> Set features which depend on the config we select to make 'make kvmconfig'
> non-interactive.
>
> Signed-off-by: Sasha Levin
Acked-by: Ingo Molnar
Thanks,
Ingo
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to major
于 2011/12/16,星期五 16:45, Sasha Levin 写道:
> On Fri, 2011-12-16 at 16:36 +0800, Zang Hongyong wrote:
>> 于 2011/12/16,星期五 15:23, Sasha Levin 写道:
>>> On Fri, 2011-12-16 at 15:02 +0800, Zang Hongyong wrote:
于 2011/12/16,星期五 13:50, Sasha Levin 写道:
> On Fri, 2011-12-16 at 09:01 +0800, zanghongy...
On (Fri) 16 Dec 2011 [09:14:26], zanghongy...@huawei.com wrote:
> From: Hongyong Zang
>
> In pci_enable_msix(), the guest's virtio-serial driver tries to set msi-x
> with one vector per queue. But it fails and eventually all virtio-serial
> ports share one MSI-X vector. Because every virtio-seria
On Fri, 2011-12-16 at 17:33 +0800, Zang Hongyong wrote:
> > Do you see an issue with increasing kvm->ram_size?
> >
> Yes, it will cause some problems after simply increase the kvm->ram_size.
> For examples:
> In kvm__init_ram() code we use kvm->ram_size to calculate the size of
> the second
> RAM r
In this patchset, we observably reduce the size of struct kvm_mmu_page and let
the code more simple.
And this patchset have already tested by unittest and
RHEL.6.1 setup/boot/reboot/shutdown.
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@v
unsync is only used for the page of level == 1 and unsync_children is only
used in the upper page, so combine them to reduce the size of shadow page
structure
Signed-off-by: Xiao Guangrong
---
Documentation/virtual/kvm/mmu.txt |5 ++-
arch/x86/include/asm/kvm_host.h | 14 +++-
ar
Upper page do not need to be tracked the status bit, it is safe to set the
dirty and let cpu to happily prefetch it
Signed-off-by: Xiao Guangrong
---
arch/x86/kvm/mmu.c | 13 +
1 files changed, 5 insertions(+), 8 deletions(-)
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
in
Set the spte before adding it to the rmap of its child so that all parent
spte are valid when propagate unsync bit from a usnync page / children page
And this feature is needed by the later patch
Signed-off-by: Xiao Guangrong
---
arch/x86/kvm/mmu.c | 74 +++
unsync_child_bitmap is used to record which spte has unsync page or unsync
children, we can set a free bit in the spte instead of it
Signed-off-by: Xiao Guangrong
---
Documentation/virtual/kvm/mmu.txt |4 --
arch/x86/include/asm/kvm_host.h |1 -
arch/x86/kvm/mmu.c| 77
Exactly, unysnc_children is the number of unsync sptes, we can use to
avoid unnecessary spte fetching
Signed-off-by: Xiao Guangrong
---
arch/x86/kvm/mmu.c |5 -
1 files changed, 4 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index 9bd2084..16e0642 1
Use unsync bit to see if the spte is point to unsync child
Signed-off-by: Xiao Guangrong
---
arch/x86/kvm/paging_tmpl.h |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/paging_tmpl.h b/arch/x86/kvm/paging_tmpl.h
index c79c503..5333256 100644
--- a/arch/x86/k
get_written_sptes is called twice in kvm_mmu_pte_write, one of them can be
removed
Signed-off-by: Xiao Guangrong
---
arch/x86/kvm/mmu.c |6 ++
1 files changed, 2 insertions(+), 4 deletions(-)
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index 16e0642..5d0f0e3 100644
--- a/arch/x
It is not used, remove it
Signed-off-by: Xiao Guangrong
---
arch/x86/kvm/mmu.c |1 -
1 files changed, 0 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index 5d0f0e3..234a32e 100644
--- a/arch/x86/kvm/mmu.c
+++ b/arch/x86/kvm/mmu.c
@@ -91,7 +91,6 @@ module
On Thu, Dec 15, 2011 at 03:48:38PM +0900, Takuya Yoshikawa wrote:
> (2011/12/15 13:28), Liu Ping Fan wrote:
> > From: Liu Ping Fan
> >
> > Currently, vcpu can be destructed only when kvm instance destroyed.
> > Change this to vcpu's destruction before kvm instance, so vcpu MUST
> > and CAN be dest
On Thu, Dec 15, 2011 at 12:21:16PM +0200, Avi Kivity wrote:
> On 12/14/2011 08:21 PM, Marcelo Tosatti wrote:
> > On Wed, Dec 14, 2011 at 04:39:56PM +0200, Avi Kivity wrote:
> > > On 12/14/2011 02:16 PM, Marcelo Tosatti wrote:
> > > > > Having this controlled from userspace means it doesn't work for
On Mon, Dec 12, 2011 at 07:26:47AM +0900, Takuya Yoshikawa wrote:
> From: Takuya Yoshikawa
>
> Currently, mmu_shrink() tries to free a shadow page from one kvm and
> does not use nr_to_scan correctly.
>
> This patch fixes this by making it try to free some shadow pages from
> each kvm. The numb
On Fri, 16 Dec 2011 09:06:11 -0200
Marcelo Tosatti wrote:
> On Mon, Dec 12, 2011 at 07:26:47AM +0900, Takuya Yoshikawa wrote:
> > From: Takuya Yoshikawa
> >
> > Currently, mmu_shrink() tries to free a shadow page from one kvm and
> > does not use nr_to_scan correctly.
> >
> > This patch fixes
On 12/15/2011 08:15 PM, Sasha Levin wrote:
> When using AIO, submit all requests which exists in the vring in a single
> io_submit instead of one io_submit for each descriptor.
>
> Benchmarks:
>
> Short version: 15%+ increase in IOPS, small increase in BW.
>
> Read IOPS:
> Before:
> vda: ios=2
On Thursday 15 December 2011, Eric B Munson wrote:
> Documentation/virtual/kvm/api.txt | 12
> arch/ia64/include/asm/kvm_para.h|5 +
> arch/powerpc/include/asm/kvm_para.h |5 +
> arch/s390/include/asm/kvm_para.h|5 +
> arch/x86/include/asm/kvm_host.
On 12/14/2011 02:27 AM, Avi Kivity wrote:
> PMU virtualization needs to talk to Intel-specific bits of perf; these are
> only available when CPU_SUP_INTEL=y.
>
> Fixes
>
> arch/x86/built-in.o: In function `atomic_switch_perf_msrs':
> vmx.c:(.text+0x6b1d4): undefined reference to `perf_guest_g
On Dec 15, 2011, at 1:47 PM, Vivek Goyal wrote:
> Ok, I continued to develop on the patch which tries to allocate per cpu
> stats from worker thread context. Here is the patch.
>
> Can the reporter please try out the patch and see if it helps. I am not
> sure if deadlock was because of mutex issu
On Fri, Dec 16, 2011 at 12:43:52PM -0600, Nate Custer wrote:
>
> On Dec 15, 2011, at 1:47 PM, Vivek Goyal wrote:
> > Ok, I continued to develop on the patch which tries to allocate per cpu
> > stats from worker thread context. Here is the patch.
> >
> > Can the reporter please try out the patch a
From: Liu Ping Fan
Currently, vcpu can be destructed only when kvm instance destroyed.
Change this to vcpu's destruction before kvm instance, so vcpu MUST
and CAN be destroyed before kvm's destroy.
Signed-off-by: Liu Ping Fan
---
arch/x86/kvm/i8254.c | 10 +++--
arch/x86/kvm/i8259.c
2011/12/15 Takuya Yoshikawa :
> (2011/12/15 13:28), Liu Ping Fan wrote:
>> From: Liu Ping Fan
>>
>> Currently, vcpu can be destructed only when kvm instance destroyed.
>> Change this to vcpu's destruction before kvm instance, so vcpu MUST
>> and CAN be destroyed before kvm's destroy.
>
> Could you
32 matches
Mail list logo