1. 18 2月, 2019 1 次提交
  2. 15 2月, 2019 1 次提交
  3. 12 2月, 2019 1 次提交
  4. 09 2月, 2019 2 次提交
  5. 04 2月, 2019 3 次提交
  6. 01 2月, 2019 3 次提交
  7. 29 1月, 2019 1 次提交
  8. 25 1月, 2019 1 次提交
  9. 24 1月, 2019 2 次提交
    • D
      trace: add ability to do simple printf logging via systemtap · 62dd1048
      Daniel P. Berrangé 提交于
      The dtrace systemtap trace backend for QEMU is very powerful but it is
      also somewhat unfriendly to users who aren't familiar with systemtap,
      or who don't need its power right now.
      
        stap -e "....some strange script...."
      
      The 'log' backend for QEMU by comparison is very crude but incredibly
      easy to use:
      
       $ qemu -d trace:qio* ...some args...
       23266@1547735759.137292:qio_channel_socket_new Socket new ioc=0x563a8a39d400
       23266@1547735759.137305:qio_task_new Task new task=0x563a891d0570 source=0x563a8a39d400 func=0x563a86f1e6c0 opaque=0x563a89078000
       23266@1547735759.137326:qio_task_thread_start Task thread start task=0x563a891d0570 worker=0x563a86f1ce50 opaque=0x563a891d9d90
       23273@1547735759.137491:qio_task_thread_run Task thread run task=0x563a891d0570
       23273@1547735759.137503:qio_channel_socket_connect_sync Socket connect sync ioc=0x563a8a39d400 addr=0x563a891d9d90
       23273@1547735759.138108:qio_channel_socket_connect_fail Socket connect fail ioc=0x563a8a39d400
      
      This commit introduces a way to do simple printf style logging of probe
      points using systemtap. In particular it creates another set of tapsets,
      one per emulator:
      
        /usr/share/systemtap/tapset/qemu-*-log.stp
      
      These pre-define probe functions which simply call printf() on their
      arguments. The printf() format string is taken from the normal
      trace-events files, with a little munging to the format specifiers
      to cope with systemtap's more restrictive syntax.
      
      With this you can now do
      
       $ stap -e 'probe qemu.system.x86_64.log.qio*{}'
       22806@1547735341399856820 qio_channel_socket_new Socket new ioc=0x56135d1d7c00
       22806@1547735341399862570 qio_task_new Task new task=0x56135cd66eb0 source=0x56135d1d7c00 func=0x56135af746c0 opaque=0x56135bf06400
       22806@1547735341399865943 qio_task_thread_start Task thread start task=0x56135cd66eb0 worker=0x56135af72e50 opaque=0x56135c071d70
       22806@1547735341399976816 qio_task_thread_run Task thread run task=0x56135cd66eb0
      
      We go one step further though and introduce a 'qemu-trace-stap' tool to
      make this even easier
      
       $ qemu-trace-stap run qemu-system-x86_64 'qio*'
       22806@1547735341399856820 qio_channel_socket_new Socket new ioc=0x56135d1d7c00
       22806@1547735341399862570 qio_task_new Task new task=0x56135cd66eb0 source=0x56135d1d7c00 func=0x56135af746c0 opaque=0x56135bf06400
       22806@1547735341399865943 qio_task_thread_start Task thread start task=0x56135cd66eb0 worker=0x56135af72e50 opaque=0x56135c071d70
       22806@1547735341399976816 qio_task_thread_run Task thread run task=0x56135cd66eb0
      
      This tool is clever in that it will automatically change the
      SYSTEMTAP_TAPSET env variable to point to the directory containing the
      right set of probes for the QEMU binary path you give it. This is useful
      if you have QEMU installed in /usr but are trying to test and trace a
      binary in /home/berrange/usr/qemu-git. In that case you'd do
      
       $ qemu-trace-stap run /home/berrange/usr/qemu-git/bin/qemu-system-x86_64 'qio*'
      
      And it'll make sure /home/berrange/usr/qemu-git/share/systemtap/tapset
      is used for the trace session
      
      The 'qemu-trace-stap' script takes a verbose arg so you can understand
      what it is running
      
       $ qemu-trace-stap run /home/berrange/usr/qemu-git/bin/qemu-system-x86_64 'qio*'
       Using tapset dir '/home/berrange/usr/qemu-git/share/systemtap/tapset' for binary '/home/berrange/usr/qemu-git/bin/qemu-system-x86_64'
       Compiling script 'probe qemu.system.x86_64.log.qio* {}'
       Running script, <Ctrl>-c to quit
       ...trace output...
      
      It can enable multiple probes at once
      
       $ qemu-trace-stap run qemu-system-x86_64 'qio*' 'qcrypto*' 'buffer*'
      
      By default it monitors all existing running processes and all future
      launched proceses. This can be restricted to a specific PID using the
      --pid arg
      
       $ qemu-trace-stap run --pid 2532 qemu-system-x86_64 'qio*'
      
      Finally if you can't remember what probes are valid it can tell you
      
       $ qemu-trace-stap list qemu-system-x86_64
       ahci_check_irq
       ahci_cmd_done
       ahci_dma_prepare_buf
       ahci_dma_prepare_buf_fail
       ahci_dma_rw_buf
       ahci_irq_lower
       ...snip...
      
      Or list just those matching a prefix pattern
      
       $ qemu-trace-stap list -v qemu-system-x86_64 'qio*'
       Using tapset dir '/home/berrange/usr/qemu-git/share/systemtap/tapset' for binary '/home/berrange/usr/qemu-git/bin/qemu-system-x86_64'
       Listing probes with name 'qemu.system.x86_64.log.qio*'
       qio_channel_command_abort
       qio_channel_command_new_pid
       qio_channel_command_new_spawn
       qio_channel_command_wait
       qio_channel_file_new_fd
       ...snip...
      Reviewed-by: NEric Blake <eblake@redhat.com>
      Signed-off-by: NDaniel P. Berrangé <berrange@redhat.com>
      Message-id: 20190123120016.4538-5-berrange@redhat.com
      Signed-off-by: NStefan Hajnoczi <stefanha@redhat.com>
      62dd1048
    • P
      MAINTAINERS: Fix utf-8 mangling · 6f75e3f5
      Philippe Mathieu-Daudé 提交于
      Patch incorrectly applied as 15ffb43c.
      Signed-off-by: NPhilippe Mathieu-Daudé <philmd@redhat.com>
      Message-Id: <20190117161355.18204-1-philmd@redhat.com>
      Signed-off-by: NLaurent Vivier <laurent@vivier.eu>
      6f75e3f5
  10. 15 1月, 2019 1 次提交
  11. 14 1月, 2019 4 次提交
  12. 09 1月, 2019 3 次提交
  13. 07 1月, 2019 2 次提交
  14. 04 1月, 2019 4 次提交
  15. 26 12月, 2018 3 次提交
  16. 22 12月, 2018 2 次提交
    • Y
      qapi: Define new QMP message for pvrdma · 4a5c9903
      Yuval Shaia 提交于
      pvrdma requires that the same GID attached to it will be attached to the
      backend device in the host.
      
      A new QMP messages is defined so pvrdma device can broadcast any change
      made to its GID table. This event is captured by libvirt which in  turn
      will update the GID table in the backend device.
      Signed-off-by: NYuval Shaia <yuval.shaia@oracle.com>
      Reviewed-by: NMarcel Apfelbaum <marcel.apfelbaum@gmail.com>
      Acked-by: NMarkus Armbruster <armbru@redhat.com>
      Signed-off-by: NMarcel Apfelbaum <marcel.apfelbaum@gmail.com>
      4a5c9903
    • Y
      contrib/rdmacm-mux: Add implementation of RDMA User MAD multiplexer · a5d2f6f8
      Yuval Shaia 提交于
      RDMA MAD kernel module (ibcm) disallow more than one MAD-agent for a
      given MAD class.
      This does not go hand-by-hand with qemu pvrdma device's requirements
      where each VM is MAD agent.
      Fix it by adding implementation of RDMA MAD multiplexer service which on
      one hand register as a sole MAD agent with the kernel module and on the
      other hand gives service to more than one VM.
      
      Design Overview:
      Reviewed-by: NShamir Rabinovitch <shamir.rabinovitch@oracle.com>
      ----------------
      A server process is registered to UMAD framework (for this to work the
      rdma_cm kernel module needs to be unloaded) and creates a unix socket to
      listen to incoming request from clients.
      A client process (such as QEMU) connects to this unix socket and
      registers with its own GID.
      
      TX:
      ----
      When client needs to send rdma_cm MAD message it construct it the same
      way as without this multiplexer, i.e. creates a umad packet but this
      time it writes its content to the socket instead of calling umad_send().
      The server, upon receiving such a message fetch local_comm_id from it so
      a context for this session can be maintain and relay the message to UMAD
      layer by calling umad_send().
      
      RX:
      ----
      The server creates a worker thread to process incoming rdma_cm MAD
      messages. When an incoming message arrived (umad_recv()) the server,
      depending on the message type (attr_id) looks for target client by
      either searching in gid->fd table or in local_comm_id->fd table. With
      the extracted fd the server relays to incoming message to the client.
      Signed-off-by: NYuval Shaia <yuval.shaia@oracle.com>
      Reviewed-by: NShamir Rabinovitch <shamir.rabinovitch@oracle.com>
      Signed-off-by: NMarcel Apfelbaum <marcel.apfelbaum@gmail.com>
      a5d2f6f8
  17. 21 12月, 2018 2 次提交
  18. 20 12月, 2018 1 次提交
  19. 17 12月, 2018 1 次提交
  20. 12 12月, 2018 2 次提交