발신자 : kvm@vger.kernel.org
수신자 : SEMIANGEL
제목 : Returned mail: Data format error
첨부 파일명 : attachment.zip(attachment.exe)
검사 결과 : attachment.zip/attachment.exe ( Win32/MyDoom.worm.M ) -> 압축 파일(압축을 푼 후
다시 검사하십시오.)
attachment.zip -> 삭제
안녕하세요.
매일경제신문사 메일서버 관리자입니다.
보내주신 메일에서 바이러스가 발견되었습니다.
치료가 가능하면 치
On Mon, Nov 26, 2012 at 05:44:29AM +, Zhang, Yang Z wrote:
> Avi Kivity wrote on 2012-11-25:
> > On 11/25/2012 03:03 PM, Gleb Natapov wrote:
> >> On Sun, Nov 25, 2012 at 02:55:26PM +0200, Avi Kivity wrote:
> >>> On 11/22/2012 05:22 PM, Gleb Natapov wrote:
> On Wed, Nov 21, 2012 at 04:09:38
Hi
Please send in any agenda topics you are interested in.
Later, Juan.
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
On Mon, Nov 26, 2012 at 03:51:04AM +, Zhang, Yang Z wrote:
> Gleb Natapov wrote on 2012-11-25:
> > On Wed, Nov 21, 2012 at 04:09:39PM +0800, Yang Zhang wrote:
> >> Posted Interrupt allows vAPICV interrupts to inject into guest directly
> >> without any vmexit.
> >>
> >> - When delivering a int
On Fri, Nov 23, 2012 at 08:24:32PM +0100, Nikola Ciprich wrote:
> > Please also post the exact package version you are using - the line
> > numbers change between releases and depend on which patches have been
> > applied to the source tree. The distro exact package version allows me
> > to downlo
On Fri, Nov 23, 2012 at 10:34:16AM -0800, Vincent Li wrote:
> On Thu, Nov 22, 2012 at 11:29 PM, Stefan Hajnoczi wrote:
> > On Wed, Nov 21, 2012 at 03:36:50PM -0800, Vincent Li wrote:
> >> We have users running on redhat based distro (Kernel
> >> 2.6.32-131.21.1.el6.x86_64 ) with kvm, when customer
Hi Marcelo,
(2012/11/24 7:46), Marcelo Tosatti wrote:
On Thu, Nov 22, 2012 at 02:21:20PM +0900, Yoshihiro YUNOMAE wrote:
Hi Marcelo,
(2012/11/21 7:51), Marcelo Tosatti wrote:
On Tue, Nov 20, 2012 at 07:36:33PM +0900, Yoshihiro YUNOMAE wrote:
Hi Marcelo,
Sorry for the late reply.
(2012/11/1
On Sat, Nov 24, 2012 at 06:40:39PM +0200, Shlomi Tsadok wrote:
> I'm looking for a way to configure the guest networking(including IP)
> dynamically, using a custom script, right after VM creation.
>
> Is there a similar feature in KVM/Libvirt as the Invoke-VMScript in of
> VMware's PowerCLI?
> It
https://bugzilla.kernel.org/show_bug.cgi?id=50921
Alan changed:
What|Removed |Added
CC||a...@lxorguk.ukuu.org.uk
--- Comment #12 from
In some special scenarios like #vcpu <= #pcpu, PLE handler may
prove very costly, because there is no need to iterate over vcpus
and do unsuccessful yield_to burning CPU.
The first patch optimizes all the yield_to by bailing out when there
is no need to continue in yield_to (i.e., when there is
From: Peter Zijlstra
In case of undercomitted scenarios, especially in large guests
yield_to overhead is significantly high. when run queue length of
source and target is one, take an opportunity to bail out and return
-ESRCH. This return condition can be further exploited to quickly come
out of
From: Raghavendra K T
yield_to returns -ESRCH, When source and target of yield_to
run queue length is one. When we see three successive failures of
yield_to we assume we are in potential undercommit case and abort
from PLE handler.
The assumption is backed by low probability of wrong decision
for
Gleb Natapov wrote on 2012-11-26:
> On Mon, Nov 26, 2012 at 03:51:04AM +, Zhang, Yang Z wrote:
>> Gleb Natapov wrote on 2012-11-25:
>>> On Wed, Nov 21, 2012 at 04:09:39PM +0800, Yang Zhang wrote:
Posted Interrupt allows vAPICV interrupts to inject into guest directly
without any vmexi
On 24.11.2012, at 10:32, Paul Mackerras wrote:
> On Sat, Nov 24, 2012 at 10:05:37AM +0100, Alexander Graf wrote:
>>
>>
>> On 23.11.2012, at 23:13, Paul Mackerras wrote:
>>
>>> On Fri, Nov 23, 2012 at 04:47:45PM +0100, Alexander Graf wrote:
On 22.11.2012, at 10:28, Paul Mackerras wr
On 23.11.2012, at 23:07, Paul Mackerras wrote:
> On Fri, Nov 23, 2012 at 04:43:03PM +0100, Alexander Graf wrote:
>>
>> On 22.11.2012, at 10:28, Paul Mackerras wrote:
>>
>>> - With the possibility of the host paging out guest pages, the use of
>>> H_LOCAL by an SMP guest is dangerous since the g
https://bugzilla.kernel.org/show_bug.cgi?id=50921
--- Comment #13 from Lucio Crusca 2012-11-26 13:13:56 ---
@Alan: see comment #5, since then I've always tested with and without vbox
modules.
@Gleb: can't run on 3.5.0 right now, I'll take the stack trace ASAP.
--
Configure bugmail: https:
On 23.11.2012, at 22:42, Paul Mackerras wrote:
> On Fri, Nov 23, 2012 at 03:13:09PM +0100, Alexander Graf wrote:
>>
>> On 22.11.2012, at 10:25, Paul Mackerras wrote:
>>
>>> + /* Do they have an SLB shadow buffer registered? */
>>> + slb = vcpu->arch.slb_shadow.pinned_addr;
>>> + if (!slb)
On 05.11.2012, at 04:40, Paul Mackerras wrote:
> Here are some fixes for PR-style KVM. With these I can successfully
> run a pseries (PAPR) guest under PR KVM on a POWER7. (This is all
> running inside a HV KVM virtual machine.) The patches are against
> Alex Graf's kvm-ppc-next branch.
Thank
On Mon, Nov 26, 2012 at 05:37:54PM +0530, Raghavendra K T wrote:
> From: Peter Zijlstra
>
> In case of undercomitted scenarios, especially in large guests
> yield_to overhead is significantly high. when run queue length of
> source and target is one, take an opportunity to bail out and return
> -
On Mon, Nov 26, 2012 at 05:38:04PM +0530, Raghavendra K T wrote:
> From: Raghavendra K T
>
> yield_to returns -ESRCH, When source and target of yield_to
> run queue length is one. When we see three successive failures of
> yield_to we assume we are in potential undercommit case and abort
> from P
On Mon, Nov 26, 2012 at 12:29:54PM +, Zhang, Yang Z wrote:
> Gleb Natapov wrote on 2012-11-26:
> > On Mon, Nov 26, 2012 at 03:51:04AM +, Zhang, Yang Z wrote:
> >> Gleb Natapov wrote on 2012-11-25:
> >>> On Wed, Nov 21, 2012 at 04:09:39PM +0800, Yang Zhang wrote:
> Posted Interrupt allo
On 16.10.2012, at 07:01, Michael Ellerman wrote:
> Signed-off-by: Michael Ellerman
Thanks, applied to kvm-ppc-next.
Alex
> ---
> MAINTAINERS |1 +
> 1 file changed, 1 insertion(+)
>
> diff --git a/MAINTAINERS b/MAINTAINERS
> index e73060f..32dc107 100644
> --- a/MAINTAINERS
> +++ b/MAINT
On Mon, Nov 26, 2012 at 02:43:02PM +0100, Andrew Jones wrote:
> On Mon, Nov 26, 2012 at 05:38:04PM +0530, Raghavendra K T wrote:
> > From: Raghavendra K T
> >
> > yield_to returns -ESRCH, When source and target of yield_to
> > run queue length is one. When we see three successive failures of
> >
On Thu, 2012-11-22 at 11:56 +, Sethi Varun-B16395 wrote:
>
> > -Original Message-
> > From: linux-kernel-ow...@vger.kernel.org [mailto:linux-kernel-
> > ow...@vger.kernel.org] On Behalf Of Alex Williamson
> > Sent: Tuesday, November 20, 2012 11:50 PM
> > To: Alexey Kardashevskiy
> > Cc
Zhang Yanfei writes:
> This patch adds an atomic notifier list named crash_notifier_list.
> Currently, when loading kvm-intel module, a notifier will be registered
> in the list to enable vmcss loaded on all cpus to be VMCLEAR'd if
> needed.
crash_notifier_list ick gag please no. Effectively th
On Mon, Nov 19, 2012 at 10:26:41PM +0200, Michael S. Tsirkin wrote:
> >
> > Userspace bits:
> > -
> > 1) LKVM
> > The latest vhost-blk userspace bits for kvm tool can be found here:
> > g...@github.com:asias/linux-kvm.git blk.vhost-blk
> >
> > 2) QEMU
> > The latest vh
On Fri, 2012-11-23 at 13:02 +1100, Alexey Kardashevskiy wrote:
> On 22/11/12 22:56, Sethi Varun-B16395 wrote:
> >
> >
> >> -Original Message-
> >> From: linux-kernel-ow...@vger.kernel.org [mailto:linux-kernel-
> >> ow...@vger.kernel.org] On Behalf Of Alex Williamson
> >> Sent: Tuesday, Nove
On Fri, 2012-11-23 at 11:06 +0800, yi li wrote:
> Hi Guys,
>
> there have a issue about smp_affinity cannot work correctly on guest
> os when PCI passthrough device using msi/msi-x with KVM.
>
> My reason:
> pcpu will occur a lot of ipi interrupt to find the vcpu to handle the
> irq. so the gues
Marcelo Tosatti writes:
> The following changes since commit 1ccbc2851282564308f790753d7158487b6af8e2:
>
> qemu-sockets: Fix parsing of the inet option 'to'. (2012-11-21 12:07:59
> +0400)
>
> are available in the git repository at:
> git://git.kernel.org/pub/scm/virt/kvm/qemu-kvm.git uq/mast
hi Alex,
the qemu-kvm version 1.2.
Thanks.
YiLi
2012/11/26 Alex Williamson :
> On Fri, 2012-11-23 at 11:06 +0800, yi li wrote:
>> Hi Guys,
>>
>> there have a issue about smp_affinity cannot work correctly on guest
>> os when PCI passthrough device using msi/msi-x with KVM.
>>
>> My reason:
>> pc
On Mon, Nov 26, 2012 at 09:08:54AM -0600, Eric W. Biederman wrote:
> Zhang Yanfei writes:
>
> > This patch adds an atomic notifier list named crash_notifier_list.
> > Currently, when loading kvm-intel module, a notifier will be registered
> > in the list to enable vmcss loaded on all cpus to be V
Gleb Natapov writes:
> On Mon, Nov 26, 2012 at 09:08:54AM -0600, Eric W. Biederman wrote:
>> Zhang Yanfei writes:
>>
>> > This patch adds an atomic notifier list named crash_notifier_list.
>> > Currently, when loading kvm-intel module, a notifier will be registered
>> > in the list to enable vm
On Mon, Nov 26, 2012 at 11:43:10AM -0600, Eric W. Biederman wrote:
> Gleb Natapov writes:
>
> > On Mon, Nov 26, 2012 at 09:08:54AM -0600, Eric W. Biederman wrote:
> >> Zhang Yanfei writes:
> >>
> >> > This patch adds an atomic notifier list named crash_notifier_list.
> >> > Currently, when load
On Mon, 2012-11-26 at 08:18 -0700, Alex Williamson wrote:
> On Fri, 2012-11-23 at 13:02 +1100, Alexey Kardashevskiy wrote:
> > On 22/11/12 22:56, Sethi Varun-B16395 wrote:
> > >
> > >
> > >> -Original Message-
> > >> From: linux-kernel-ow...@vger.kernel.org [mailto:linux-kernel-
> > >> ow..
Gleb Natapov writes:
> On Mon, Nov 26, 2012 at 11:43:10AM -0600, Eric W. Biederman wrote:
>> Gleb Natapov writes:
>>
>> > On Mon, Nov 26, 2012 at 09:08:54AM -0600, Eric W. Biederman wrote:
>> >> Zhang Yanfei writes:
>> >>
>> >> > This patch adds an atomic notifier list named crash_notifier_li
On Fri, 2012-11-23 at 20:03 +1100, Alexey Kardashevskiy wrote:
> VFIO implements platform independent stuff such as
> a PCI driver, BAR access (via read/write on a file descriptor
> or direct mapping when possible) and IRQ signaling.
>
> The platform dependent part includes IOMMU initialization
>
Resending these as the mail seems to have not fully worked last Wed.
Marcelo,
I have addressed your comments for this patch set (V3), the following patch for
QEMU-KVM and for adding a test
case for tsc_adjust also to follow today.
Thanks,
Will
Will Auld (2):
Add code to track call origin
In order to track who initiated the call (host or guest) to modify an msr
value I have changed function call parameters along the call path. The
specific change is to add a struct pointer parameter that points to (index,
data, caller) information rather than having this information passed as
indivi
CPUID.7.0.EBX[1]=1 indicates IA32_TSC_ADJUST MSR 0x3b is supported
Basic design is to emulate the MSR by allowing reads and writes to a guest
vcpu specific location to store the value of the emulated MSR while adding
the value to the vmcs tsc_offset. In this way the IA32_TSC_ADJUST value will
be i
CPUID.7.0.EBX[1]=1 indicates IA32_TSC_ADJUST MSR 0x3b is supported
Basic design is to emulate the MSR by allowing reads and writes to the
hypervisor vcpu specific locations to store the value of the emulated MSRs.
In this way the IA32_TSC_ADJUST value will be included in all reads to
the TSC MSR w
Comments are still not addressed.
On Mon, Nov 26, 2012 at 10:40:51AM -0800, Will Auld wrote:
> In order to track who initiated the call (host or guest) to modify an msr
> value I have changed function call parameters along the call path. The
> specific change is to add a struct pointer parameter t
I have several general questions about this patch...
On 11/21/2012 06:33 PM, Sanjay Lal wrote:
The following patchset implements KVM support for MIPS32R2 processors,
using Trap & Emulate, with basic runtime binary translation to improve
performance. The goal has been to keep the Guest kernel c
Hello,
Am 26.11.2012 19:42, schrieb Will Auld:
> CPUID.7.0.EBX[1]=1 indicates IA32_TSC_ADJUST MSR 0x3b is supported
>
> Basic design is to emulate the MSR by allowing reads and writes to the
> hypervisor vcpu specific locations to store the value of the emulated MSRs.
> In this way the IA32_TSC_A
On Tue, 2012-11-27 at 00:47 +0800, yi li wrote:
> hi Alex,
>
> the qemu-kvm version 1.2.
And is the device making use of MSI-X or MSI interrupts. MSI-X should
work on 1.2, MSI does not yet support vector updates for affinity, but
patches are welcome. Thanks,
Alex
> 2012/11/26 Alex Williamson
On Sun, Nov 25, 2012 at 6:17 PM, George-Cristian Bîrzan wrote:
> On Sun, Nov 25, 2012 at 5:19 PM, Gleb Natapov wrote:
>> What Windows is this? Can you try changing "-cpu host" to "-cpu
>> host,+hv_relaxed"?
>
> This is on Windows Server 2008 R2 (sorry, forgot to mention that I
> guess), and I can
https://bugzilla.kernel.org/show_bug.cgi?id=50891
Alex Williamson changed:
What|Removed |Added
CC||alex.william...@redhat.com
--- Comm
Gleb, Marcelo,
Sorry Gleb, I did not see comments from you but I have now found them. In doing
so I also found one form Marcelo that I missed.
What I believe is now outstanding to be addressed are:
>From Gleb:
- You've changed function pointer signature here, but emulator_set_msr()
remained th
On 10/22/2012 10:33 AM, Rik van Riel wrote:
On 10/16/2012 10:23 PM, Michael Wolf wrote:
In the case of where you have a system that is running in a
capped or overcommitted environment the user may see steal time
being reported in accounting tools such as top or vmstat. This can
cause confusion
On Thu, 2012-11-22 at 10:52 +0200, Alex Lyakas wrote:
> Hi Alex,
> thanks for your response.
>
> I printed out the "vector" and "entry" values of dev->host_msix_entries[i]
> within assigned_device_enable_host_msix() before call to
> request_threaded_irq(). I see that they are all 0s:
> kernel: [
On 11/24/2012 09:44 PM, bugzilla-dae...@bugzilla.kernel.org wrote:
> https://bugzilla.kernel.org/show_bug.cgi?id=50921
>
>
>
>
>
> --- Comment #5 from Lucio Crusca 2012-11-24 13:44:16 ---
> Here the first tests results:
>
> vbox modules do not make a difference (tried rmmod vboxpci vboxneta
https://bugzilla.kernel.org/show_bug.cgi?id=50921
--- Comment #14 from Anonymous Emailer
2012-11-26 20:10:11 ---
Reply-To: xiaoguangr...@linux.vnet.ibm.com
On 11/24/2012 09:44 PM, bugzilla-dae...@bugzilla.kernel.org wrote:
> https://bugzilla.kernel.org/show_bug.cgi?id=50921
>
>
>
>
>
On Mon, Nov 26, 2012 at 2:58 AM, Stefan Hajnoczi wrote:
> On Fri, Nov 23, 2012 at 10:34:16AM -0800, Vincent Li wrote:
>> On Thu, Nov 22, 2012 at 11:29 PM, Stefan Hajnoczi wrote:
>> > On Wed, Nov 21, 2012 at 03:36:50PM -0800, Vincent Li wrote:
>> >> We have users running on redhat based distro (Ke
Sorry, forgot to CC Lucio Crusca.
On 11/27/2012 04:09 AM, Xiao Guangrong wrote:
> On 11/24/2012 09:44 PM, bugzilla-dae...@bugzilla.kernel.org wrote:
>> https://bugzilla.kernel.org/show_bug.cgi?id=50921
>>
>>
>>
>>
>>
>> --- Comment #5 from Lucio Crusca 2012-11-24 13:44:16 ---
>> Here the first t
https://bugzilla.kernel.org/show_bug.cgi?id=50921
--- Comment #15 from Anonymous Emailer
2012-11-26 20:29:28 ---
Reply-To: xiaoguangr...@linux.vnet.ibm.com
Sorry, forgot to CC Lucio Crusca.
On 11/27/2012 04:09 AM, Xiao Guangrong wrote:
> On 11/24/2012 09:44 PM, bugzilla-dae...@bugzilla.ke
On Mon, Nov 26, 2012 at 07:42:28PM +, Auld, Will wrote:
> Gleb, Marcelo,
>
> Sorry Gleb, I did not see comments from you but I have now found them. In
> doing so I also found one form Marcelo that I missed.
>
> What I believe is now outstanding to be addressed are:
> >From Gleb:
> - You've
In the case of where you have a system that is running in a
capped or overcommitted environment the user may see steal time
being reported in accounting tools such as top or vmstat. This can
cause confusion for the end user. To ease the confusion this patch set
adds the idea of consigned (expecte
Modify the amount of stealtime that the kernel reports via the /proc interface.
Steal time will now be broken down into steal_time and consigned_time.
Consigned_time will represent the amount of time that is expected to be lost
due to overcommitment of the physical cpu or by using cpu capping. The
Add a consigned field. This field will hold the time lost due to capping or
overcommit.
The rest of the time will still show up in the steal-time field.
Signed-off-by: Michael Wolf
---
arch/x86/include/asm/paravirt.h |4 ++--
arch/x86/include/asm/paravirt_types.h |2 +-
arch/x86/
Add the code to send the consigned time from the host to the guest.
Signed-off-by: Michael Wolf
---
arch/x86/include/asm/kvm_host.h |1 +
arch/x86/include/asm/kvm_para.h |3 ++-
arch/x86/include/asm/paravirt.h |4 ++--
arch/x86/kernel/kvm.c |3 ++-
arch/x86/kernel/parav
Add a timer to the host. This will define the period. During a period
the first n ticks will go into the consigned bucket. Any other ticks that
occur within the period will be placed in the stealtime bucket.
Signed-off-by: Michael Wolf
---
arch/x86/include/asm/kvm_host.h | 10 +
arc
Add an ioctl to communicate the consign limit to the host.
Signed-off-by: Michael Wolf
---
arch/x86/kvm/x86.c |6 ++
include/linux/kvm_host.h |2 ++
include/uapi/linux/kvm.h |2 ++
virt/kvm/kvm_main.c |7 +++
4 files changed, 17 insertions(+)
diff --git a/arch
Add the code to send the consigned time from the host to the guest.
Signed-off-by: Michael Wolf
---
arch/x86/include/asm/kvm_host.h |1 +
arch/x86/include/asm/kvm_para.h |3 ++-
arch/x86/include/asm/paravirt.h |4 ++--
arch/x86/kernel/kvm.c |3 ++-
arch/x86/kernel/parav
Add a timer to the host. This will define the period. During a period
the first n ticks will go into the consigned bucket. Any other ticks that
occur within the period will be placed in the stealtime bucket.
Signed-off-by: Michael Wolf
---
arch/x86/include/asm/kvm_host.h | 10 +
arc
In the case of where you have a system that is running in a
capped or overcommitted environment the user may see steal time
being reported in accounting tools such as top or vmstat. This can
cause confusion for the end user. To ease the confusion this patch set
adds the idea of consigned (expecte
Modify the amount of stealtime that the kernel reports via the /proc interface.
Steal time will now be broken down into steal_time and consigned_time.
Consigned_time will represent the amount of time that is expected to be lost
due to overcommitment of the physical cpu or by using cpu capping. The
Add a consigned field. This field will hold the time lost due to capping or
overcommit.
The rest of the time will still show up in the steal-time field.
Signed-off-by: Michael Wolf
---
arch/x86/include/asm/paravirt.h |4 ++--
arch/x86/include/asm/paravirt_types.h |2 +-
arch/x86/
On Mon, Nov 26, 2012 at 02:10:33PM +0100, Alexander Graf wrote:
>
> On 23.11.2012, at 23:07, Paul Mackerras wrote:
>
> > On Fri, Nov 23, 2012 at 04:43:03PM +0100, Alexander Graf wrote:
> >>
> >> On 22.11.2012, at 10:28, Paul Mackerras wrote:
> >>
> >>> - With the possibility of the host paging
On Mon, Nov 26, 2012 at 02:15:16PM +0100, Alexander Graf wrote:
>
> On 23.11.2012, at 22:42, Paul Mackerras wrote:
>
> > On Fri, Nov 23, 2012 at 03:13:09PM +0100, Alexander Graf wrote:
> >>
> >> On 22.11.2012, at 10:25, Paul Mackerras wrote:
> >>
> >>> + /* Do they have an SLB shadow buffer reg
On 26.11.2012, at 22:33, Paul Mackerras wrote:
> On Mon, Nov 26, 2012 at 02:15:16PM +0100, Alexander Graf wrote:
>>
>> On 23.11.2012, at 22:42, Paul Mackerras wrote:
>>
>>> On Fri, Nov 23, 2012 at 03:13:09PM +0100, Alexander Graf wrote:
On 22.11.2012, at 10:25, Paul Mackerras wrote:
On 26.11.2012, at 22:48, Paul Mackerras wrote:
> On Mon, Nov 26, 2012 at 02:10:33PM +0100, Alexander Graf wrote:
>>
>> On 23.11.2012, at 23:07, Paul Mackerras wrote:
>>
>>> On Fri, Nov 23, 2012 at 04:43:03PM +0100, Alexander Graf wrote:
On 22.11.2012, at 10:28, Paul Mackerras wrote:
On 26.11.2012, at 22:55, Alexander Graf wrote:
>
> On 26.11.2012, at 22:33, Paul Mackerras wrote:
>
>> On Mon, Nov 26, 2012 at 02:15:16PM +0100, Alexander Graf wrote:
>>>
>>> On 23.11.2012, at 22:42, Paul Mackerras wrote:
>>>
On Fri, Nov 23, 2012 at 03:13:09PM +0100, Alexander Graf wrote
https://bugzilla.kernel.org/show_bug.cgi?id=50921
--- Comment #16 from Lucio Crusca 2012-11-26 22:14:15 ---
@xiaoguangrong: YOU ARE THE MAN! 'emulate_invalid_guest_state = 0' did the
trick, now I have win2000 running in a 3.6.7 kvm guest! Thanks.
Still guessing why it works with plain kvm-i
On 11/25/2012 11:22 PM, Paolo Bonzini wrote:
> Il 21/11/2012 23:41, H. Peter Anvin ha scritto:
>> From: "H. Peter Anvin"
>>
>> In __emulate_1op_rax_rdx, we use "+a" and "+d" which are input/output
>> constraints, and *then* use "a" and "d" as input constraints. This is
>> incorrect, but happens t
On Mon, Nov 26, 2012 at 11:03:48PM +0100, Alexander Graf wrote:
>
> On 26.11.2012, at 22:55, Alexander Graf wrote:
>
> >
> > On 26.11.2012, at 22:33, Paul Mackerras wrote:
> >
> >> On Mon, Nov 26, 2012 at 02:15:16PM +0100, Alexander Graf wrote:
> >>>
> >>> On 23.11.2012, at 22:42, Paul Mackerr
On 24.11.2012, at 09:37, Paul Mackerras wrote:
> Currently, if a machine check interrupt happens while we are in the
> guest, we exit the guest and call the host's machine check handler,
> which tends to cause the host to panic. Some machine checks can be
> triggered by the guest; for example, i
On Mon, Nov 26, 2012 at 11:03:19PM +0100, Alexander Graf wrote:
>
> On 26.11.2012, at 22:48, Paul Mackerras wrote:
>
> > On Mon, Nov 26, 2012 at 02:10:33PM +0100, Alexander Graf wrote:
> >>
> >> On 23.11.2012, at 23:07, Paul Mackerras wrote:
> >>
> >>> On Fri, Nov 23, 2012 at 04:43:03PM +0100,
On Tue, Nov 20, 2012 at 07:59:53AM +0800, Xiao Guangrong wrote:
> The current reexecute_instruction can not well detect the failed instruction
> emulation. It allows guest to retry all the instructions except it accesses
> on error pfn.
>
> For example, some cases are nested-write-protect - if the
On Tue, Nov 20, 2012 at 07:59:10AM +0800, Xiao Guangrong wrote:
> Currently, reexecute_instruction refused to retry all instructions. If
> nested npt is used, the emulation may be caused by shadow page, it can
> be fixed by dropping the shadow page
>
> Signed-off-by: Xiao Guangrong
> ---
> arch/
On Mon, Nov 26, 2012 at 08:05:10PM +0900, Yoshihiro YUNOMAE wrote:
> >>>500h. event tsc_write tsc_offset=-3000
> >>>
> >>>Then a guest trace containing events with a TSC timestamp.
> >>>Which tsc_offset to use?
> >>>
> >>>(that is the problem, which unless i am mistaken can only be solved
> >>>easi
On Tue, Nov 27, 2012 at 12:16:28AM +0100, Alexander Graf wrote:
>
> On 24.11.2012, at 09:37, Paul Mackerras wrote:
>
> > Currently, if a machine check interrupt happens while we are in the
> > guest, we exit the guest and call the host's machine check handler,
> > which tends to cause the host to
On 27.11.2012, at 00:16, Paul Mackerras wrote:
> On Mon, Nov 26, 2012 at 11:03:19PM +0100, Alexander Graf wrote:
>>
>> On 26.11.2012, at 22:48, Paul Mackerras wrote:
>>
>>> On Mon, Nov 26, 2012 at 02:10:33PM +0100, Alexander Graf wrote:
On 23.11.2012, at 23:07, Paul Mackerras wrote:
On 27.11.2012, at 00:18, Paul Mackerras wrote:
> On Tue, Nov 27, 2012 at 12:16:28AM +0100, Alexander Graf wrote:
>>
>> On 24.11.2012, at 09:37, Paul Mackerras wrote:
>>
>>> Currently, if a machine check interrupt happens while we are in the
>>> guest, we exit the guest and call the host's machi
On Tue, Nov 20, 2012 at 02:09:46PM +, Pandarathil, Vijaymohan R wrote:
>
>
> > -Original Message-
> > From: Stefan Hajnoczi [mailto:stefa...@gmail.com]
> > Sent: Tuesday, November 20, 2012 5:41 AM
> > To: Pandarathil, Vijaymohan R
> > Cc: kvm@vger.kernel.org; linux-...@vger.kernel.org
On Mon, Nov 26, 2012 at 02:48:50PM -0800, H. Peter Anvin wrote:
> On 11/25/2012 11:22 PM, Paolo Bonzini wrote:
> > Il 21/11/2012 23:41, H. Peter Anvin ha scritto:
> >> From: "H. Peter Anvin"
> >>
> >> In __emulate_1op_rax_rdx, we use "+a" and "+d" which are input/output
> >> constraints, and *then
On 11/26/2012 03:48 PM, Marcelo Tosatti wrote:
>>
>> Gleb, Marcelo: are you going to apply this or would you prefer I took it
>> in x86/urgent?
>>
>> -hpa
>
> Feel free to merge it through x86/urgent.
>
I presume that's an Acked-by?
-hpa
--
To unsubscribe from this list: send the
On Tue, Nov 27, 2012 at 12:20:08AM +0100, Alexander Graf wrote:
> Hrm. Promise to run checkpatch yourself next time and I'll fix it up for you
> this time ;)
OK, will do, thanks. :)
Paul.
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger
On Mon, 2012-11-26 at 11:04 -0700, Alex Williamson wrote:
> Ok, I see tces are put on shutdown via tce_iommu_detach_group, so you're
> more concerned about the guest simply mapping over top of it's own
> mappings. Is that common? Is it common enough for every multi-page
> mapping to assume it wil
Alex,
Thanks for your reply, and i will check it agiain with msi-x.
YiLi
2012/11/27 Alex Williamson :
> On Tue, 2012-11-27 at 00:47 +0800, yi li wrote:
>> hi Alex,
>>
>> the qemu-kvm version 1.2.
>
> And is the device making use of MSI-X or MSI interrupts. MSI-X should
> work on 1.2, MSI does n
On Mon, Nov 26, 2012 at 03:49:36PM -0800, H. Peter Anvin wrote:
> On 11/26/2012 03:48 PM, Marcelo Tosatti wrote:
> >>
> >> Gleb, Marcelo: are you going to apply this or would you prefer I took it
> >> in x86/urgent?
> >>
> >>-hpa
> >
> > Feel free to merge it through x86/urgent.
> >
>
> I pr
https://bugzilla.kernel.org/show_bug.cgi?id=50891
--- Comment #2 from liyi 2012-11-27 00:57:28 ---
sorry, i am not clearly it.
1:i am sure the device using the MSI-X, the test is failed.
check the attribute, entry->msi_attrib.is_msix is 1.
pls, the qemu kvm version is 1.2.
also, when u
This reversion, V4, addresses a couple of issues I missed from Gleb and Marcelo.
Thanks, Will
Will Auld (2):
Add code to track call origin for msr assignment.
Enabling IA32_TSC_ADJUST for KVM guest VM support
arch/x86/include/asm/cpufeature.h | 1 +
arch/x86/include/asm/kvm_host.h | 15
于 2012年11月27日 02:18, Eric W. Biederman 写道:
> Gleb Natapov writes:
>
>> On Mon, Nov 26, 2012 at 11:43:10AM -0600, Eric W. Biederman wrote:
>>> Gleb Natapov writes:
>>>
On Mon, Nov 26, 2012 at 09:08:54AM -0600, Eric W. Biederman wrote:
> Zhang Yanfei writes:
>
>> This patch adds
In order to track who initiated the call (host or guest) to modify an msr
value I have changed function call parameters along the call path. The
specific change is to add a struct pointer parameter that points to (index,
data, caller) information rather than having this information passed as
indivi
CPUID.7.0.EBX[1]=1 indicates IA32_TSC_ADJUST MSR 0x3b is supported
Basic design is to emulate the MSR by allowing reads and writes to a guest
vcpu specific location to store the value of the emulated MSR while adding
the value to the vmcs tsc_offset. In this way the IA32_TSC_ADJUST value will
be i
CPUID.7.0.EBX[1]=1 indicates IA32_TSC_ADJUST MSR 0x3b is supported
Basic design is to emulate the MSR by allowing reads and writes to the
hypervisor vcpu specific locations to store the value of the emulated MSRs.
In this way the IA32_TSC_ADJUST value will be included in all reads to
the TSC MSR w
Andreas,
Thanks. I just sent the update patch (V3) to address your comments.
Will
> -Original Message-
> From: kvm-ow...@vger.kernel.org [mailto:kvm-ow...@vger.kernel.org] On
> Behalf Of Andreas Färber
> Sent: Monday, November 26, 2012 11:05 AM
> To: Auld, Will
> Cc: Will Auld; qemu-de
Zhang Yanfei writes:
> So in summary,
>
> 1. a specific callback function instead of a notifier?
Yes.
> 2. Instead of calling vmclear_local_loaded_vmcss, the vmclear operation
>will just call the vmclear on every vmcss loaded on the cpu?
>
>like below:
>
>static void crash_vmclear_l
Am 27.11.2012 02:40, schrieb Will Auld:
> CPUID.7.0.EBX[1]=1 indicates IA32_TSC_ADJUST MSR 0x3b is supported
>
> Basic design is to emulate the MSR by allowing reads and writes to the
> hypervisor vcpu specific locations to store the value of the emulated MSRs.
> In this way the IA32_TSC_ADJUST va
于 2012年11月27日 09:49, Eric W. Biederman 写道:
> Zhang Yanfei writes:
>
>> So in summary,
>>
>> 1. a specific callback function instead of a notifier?
>
> Yes.
>
>> 2. Instead of calling vmclear_local_loaded_vmcss, the vmclear operation
>>will just call the vmclear on every vmcss loaded on the
Sorry, let me figure this out and resend.
Thanks,
Will
> -Original Message-
> From: kvm-ow...@vger.kernel.org [mailto:kvm-ow...@vger.kernel.org] On
> Behalf Of Andreas Färber
> Sent: Monday, November 26, 2012 5:51 PM
> To: Auld, Will
> Cc: Will Auld; qemu-devel; Gleb; mtosa...@redhat.com
1 - 100 of 120 matches
Mail list logo