Nguyen Anh Quynh wrote:
This patch replaces the current assembly code of Extboot option rom
with new C code. Patch is against kvm-66.
This version returns an error code in case int 13 handler cannot
handle a requested function.
Signed-off-by: Nguyen Anh Quynh [EMAIL PROTECTED]
+
+ .globl linux_boot
+linux_boot:
+ cli
+ cld
+ mov $0x9000, %ax
+ mov %ax, %ds
+ mov %ax, %es
+ mov %ax, %fs
+ mov %ax, %gs
+ mov %ax, %ss
+ mov $0x8ffe, %sp
+ ljmp $0x9000 + 0x20, $0
The hard use of segment 9000 is really highly unfortunate
On Thu, Apr 17, 2008 at 10:30:27AM +0900, Nguyen Anh Quynh wrote:
+++ b/extboot/farvar.h
@@ -0,0 +1,113 @@
+// Code to access multiple segments within gcc.
+//
+// Copyright (C) 2008 Kevin O'Connor [EMAIL PROTECTED]
+//
+// This file may be distributed under the terms of the GNU GPLv3 license.
Marcelo Tosatti wrote:
On Wed, Apr 16, 2008 at 11:21:05AM -0500, Hollis Blanchard wrote:
By the way Marcelo, it would be polite to provide these stubs yourself to
avoid breaking the build on other architectures.
Indeed, should have been more careful.
And I should have caught
Carsten Otte wrote:
Hi Avi,
these two fixes repair two things in kvm-s390:
- #1 makes kvm complile again on s390 after a common code change
- #2 changes our virtio interrupt definitions to the values that will
be reserved for kvm use in s390 architecture
I'd be great if both could make
Carsten Otte wrote:
From: Christian Borntraeger [EMAIL PROTECTED]
This patch changes the interrupt defintions for virtio on s390. We now use
the extint number 0x2603, which is used as a host interrupt already by z/VM
for pfault and dasd_diag.
We will use subcode 0x0D to distinguish virtio
From: Carsten Otte [EMAIL PROTECTED]
Temporary commit, should appear in mainline shortly.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/s390/lib/uaccess_pt.c |3 +++
1 files changed, 3 insertions(+), 0 deletions(-)
diff --git a/arch/s390/lib/uaccess_pt.c b/arch/s390/lib/uaccess_pt.c
From: Christian Borntraeger [EMAIL PROTECTED]
The address 0x11b8 is used by z/VM for pfault and diag 250 I/O to
provide a 64 bit extint parameter. virtio uses the same address, so
its time to update the lowcore structure.
Acked-by: Martin Schwidefsky [EMAIL PROTECTED]
Signed-off-by: Christian
From: Martin Schwidefsky [EMAIL PROTECTED]
From: Carsten Otte [EMAIL PROTECTED]
The SIE instruction on s390 uses the 2nd half of the page table page to
virtualize the storage keys of a guest. This patch offers the s390_enable_sie
function, which reorganizes the page tables of a single-threaded
From: Carsten Otte [EMAIL PROTECTED]
This patch adds Documentation/s390/kvm.txt, which describes specifics of kvm's
user interface that are unique to s390 architecture.
Signed-off-by: Carsten Otte [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
Documentation/s390/kvm.txt |
From: Carsten Otte [EMAIL PROTECTED]
From: Christian Borntraeger [EMAIL PROTECTED]
This patch adds the virtualization submenu and the kvm option to the kernel
config. It also defines HAVE_KVM for 64bit kernels.
Acked-by: Martin Schwidefsky [EMAIL PROTECTED]
Signed-off-by: Christian Borntraeger
From: Carsten Otte [EMAIL PROTECTED]
From: Christian Borntraeger [EMAIL PROTECTED]
This patch introduces in-kernel handling of some intercepts for privileged
instructions:
handle_set_prefix()sets the prefix register of the local cpu
handle_store_prefix() stores the content of the
From: Christian Borntraeger [EMAIL PROTECTED]
drivers/s390/sysinfo.c uses the store system information intruction to query
the system about information of the machine, the LPAR and additional
hypervisors. KVM has to implement the host part for this instruction.
To avoid code duplication, this
From: Carsten Otte [EMAIL PROTECTED]
From: Christian Borntraeger [EMAIL PROTECTED]
This patch introduces interpretation of some diagnose instruction intercepts.
Diagnose is our classic architected way of doing a hypercall. This patch
features the following diagnose codes:
- vm storage size, that
From: Carsten Otte [EMAIL PROTECTED]
From: Christian Borntraeger [EMAIL PROTECTED]
This path introduces handling of sie intercepts in three flavors: Intercepts
are either handled completely in-kernel by kvm_handle_sie_intercept(),
or passed to userspace with corresponding data in struct kvm_run
From: Carsten Otte [EMAIL PROTECTED]
From: Christian Borntraeger [EMAIL PROTECTED]
This patch introduces in-kernel handling of _some_ sigp interprocessor
signals (similar to ipi).
kvm_s390_handle_sigp() decodes the sigp instruction and calls individual
handlers depending on the operation
From: Heiko Carstens [EMAIL PROTECTED]
kvm_arch_vcpu_ioctl_run currently incorrectly always returns 0.
Signed-off-by: Heiko Carstens [EMAIL PROTECTED]
Signed-off-by: Carsten Otte [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/s390/kvm/kvm-s390.c |2 +-
1 files
From: Xiantao Zhang [EMAIL PROTECTED]
This interface provides more flexible functionality for smp
infrastructure.
Signed-off-by: Xiantao Zhang [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/ia64/kernel/smp.c | 82
From: Xiantao Zhang [EMAIL PROTECTED]
vtlb.c includes tlb/VHPT virtulization.
Signed-off-by: Anthony Xu [EMAIL PROTECTED]
Signed-off-by: Xiantao Zhang [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/ia64/kvm/vtlb.c | 636 ++
From: Heiko Carstens [EMAIL PROTECTED]
There is no need to use interlocked updates when the rcp
lock is held. Therefore the simple bitops variants can be
used. This should improve performance.
Signed-off-by: Heiko Carstens [EMAIL PROTECTED]
Signed-off-by: Carsten Otte [EMAIL PROTECTED]
From: Izik Eidus [EMAIL PROTECTED]
the main purpose of adding this functions is the abilaty to release the
spinlock that protect the kvm list while still be able to do operations
on a specific kvm in a safe way.
Signed-off-by: Izik Eidus [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL
From: Christian Borntraeger [EMAIL PROTECTED]
This patch adds an entry for kvm on s390 to the MAINTAINERS file :-). We intend
to push all patches regarding this via Avi's kvm.git.
Signed-off-by: Christian Borntraeger [EMAIL PROTECTED]
Signed-off-by: Carsten Otte [EMAIL PROTECTED]
Signed-off-by:
From: Xiantao Zhang [EMAIL PROTECTED]
Update the related Makefile and KConfig for kvm build
Signed-off-by: Xiantao Zhang [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/ia64/Kconfig |3 ++
arch/ia64/Makefile |1 +
arch/ia64/kvm/Kconfig | 46
From: Xiantao Zhang [EMAIL PROTECTED]
vcpu.c provides processor virtualization logic for kvm.
Signed-off-by: Anthony Xu [EMAIL PROTECTED]
Signed-off-by: Xiantao Zhang [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/ia64/kvm/vcpu.c | 2163
From: Xiantao Zhang [EMAIL PROTECTED]
mmio.c includes mmio decoder, and related mmio logics.
Signed-off-by: Anthony Xu [EMAIL PROTECTED]
Signed-off-by: Xiantao Zhang [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/ia64/kvm/mmio.c | 341
From: Xiantao Zhang [EMAIL PROTECTED]
Three header files are added:
asm-ia64/kvm.h
asm-ia64/kvm_host.h
asm-ia64/kvm_para.h
Signed-off-by: Xiantao Zhang [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
include/asm-ia64/kvm.h | 205 +-
From: Xiantao Zhang [EMAIL PROTECTED]
optvfault.S Add optimization for some performance-critical
virtualization faults.
Signed-off-by: Anthony Xu [EMAIL PROTECTED]
Signed-off-by: Xiantao Zhang [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/ia64/kvm/optvfault.S | 918
From: Xiantao Zhang [EMAIL PROTECTED]
Register structures are defined per SDM.
Add three small routines for kernel:
ia64_ttag, ia64_loadrs, ia64_flushrs
Signed-off-by: Xiantao Zhang [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
include/asm-ia64/gcc_intrin.h | 12
From: Heiko Carstens [EMAIL PROTECTED]
Temporarily rename this function to avoid merge conflicts and/or
dependencies. This function will be removed as soon as git-s390
and kvm.git are finally upstream.
Signed-off-by: Heiko Carstens [EMAIL PROTECTED]
Signed-off-by: Carsten Otte [EMAIL PROTECTED]
From: Xiantao Zhang [EMAIL PROTECTED]
kvm_ia64.c is created to handle kvm ia64-specific core logic.
Signed-off-by: Xiantao Zhang [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/ia64/kvm/kvm-ia64.c | 1789 ++
1 files changed,
Am Donnerstag, 17. April 2008 schrieb Avi Kivity:
Don't you need to change KVM_S390_INT_VIRTIO as well?
Good catch.
It works without that change, but its cleaner to change that. We can also
remove another fixme, as the host interrupt uses the same control register
bit 9.
Can you merge this
Christian Borntraeger wrote:
Am Donnerstag, 17. April 2008 schrieb Avi Kivity:
Don't you need to change KVM_S390_INT_VIRTIO as well?
Good catch.
It works without that change, but its cleaner to change that. We can also
remove another fixme, as the host interrupt uses the same
From: Joerg Roedel [EMAIL PROTECTED]
The kvm_host.h file for x86 declares the functions kvm_set_cr[0348]. In the
header file their second parameter is named cr0 in all cases. This patch
renames the parameters so that they match the function name.
Signed-off-by: Joerg Roedel [EMAIL PROTECTED]
From: Xiantao Zhang [EMAIL PROTECTED]
process.c mainly handle interruption injection, and some faults handling.
Signed-off-by: Anthony Xu [EMAIL PROTECTED]
Signed-off-by: Xiantao Zhang [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/ia64/kvm/process.c | 970
From: Christian Borntraeger [EMAIL PROTECTED]
From: Carsten Otte [EMAIL PROTECTED]
This patch adds functionality to detect if the kernel runs under the KVM
hypervisor. A macro MACHINE_IS_KVM is exported for device drivers. This
allows drivers to skip device detection if the systems runs
From: Xiantao Zhang [EMAIL PROTECTED]
Some sal/pal calls would be traped to kvm for virtulization
from guest firmware.
Signed-off-by: Xiantao Zhang [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/ia64/kvm/kvm_fw.c | 500
1
From: Izik Eidus [EMAIL PROTECTED]
Allow the Linux memory manager to reclaim memory in the kvm shadow cache.
Signed-off-by: Izik Eidus [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/x86/kvm/mmu.c | 58 ++-
1 files
From: Carsten Otte [EMAIL PROTECTED]
From: Christian Borntraeger [EMAIL PROTECTED]
From: Heiko Carstens [EMAIL PROTECTED]
This patch contains the port of Qumranet's kvm kernel module to IBM zSeries
(aka s390x, mainframe) architecture. It uses the mainframe's virtualization
instruction SIE to
From: Xiantao Zhang [EMAIL PROTECTED]
Guide for creating virtual machine on kvm/ia64.
Signed-off-by: Xiantao Zhang [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
Documentation/ia64/kvm.txt | 82
1 files changed, 82 insertions(+),
Noticed by Marcelo Tosatti.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/x86/kvm/x86.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index e6a38bf..c7ad235 100644
--- a/arch/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@
From: Xiantao Zhang [EMAIL PROTECTED]
vmm.c adds the interfaces with kvm/module, and initialize global data area.
Signed-off-by: Xiantao Zhang [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/ia64/kvm/vmm.c | 66 +++
1
From: Xiantao Zhang [EMAIL PROTECTED]
vmm_ivt.S includes an ivt for vmm use.
Signed-off-by: Anthony Xu [EMAIL PROTECTED]
Signed-off-by: Xiantao Zhang [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/ia64/kvm/vmm_ivt.S | 1424 +++
From: Xiantao Zhang [EMAIL PROTECTED]
Dynamic TR resource should be managed in the uniform way.
Add two interfaces for kernel:
ia64_itr_entry: Allocate a (pair of) TR for caller.
ia64_ptr_entry: Purge a (pair of ) TR by caller.
Signed-off-by: Xiantao Zhang [EMAIL PROTECTED]
Signed-off-by:
From: Marcelo Tosatti [EMAIL PROTECTED]
Unify slots_lock acquision around vcpu_run(). This is simpler and less
error-prone.
Also fix some callsites that were not grabbing the lock properly.
[avi: drop slots_lock while in guest mode to avoid holding the lock
for indefinite periods]
If the accessed bit is not set, the guest has never accessed this page
(at least through this spte), so there's no need to mark the page
accessed. This provides more accurate data for the eviction algortithm.
Noted by Andrea Arcangeli.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
From: Sheng Yang [EMAIL PROTECTED]
MSR Bitmap controls whether the accessing of an MSR causes VM Exit.
Eliminating exits on automatically saved and restored MSRs yields a
small performance gain.
Signed-off-by: Sheng Yang [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
Anthony Liguori wrote:
There is a 5th option. Do away with the use of posix aio. We get
absolutely no benefit from it because it's limited to a single thread.
Even one async request is much better than zero.
Fabrice has reverted a patch to change that in the past.
Perhaps he can
Hollis Blanchard wrote:
It's a globally exported symbol now.
Applied, thanks.
--
error compiling committee.c: too many arguments to function
-
This SF.net email is sponsored by the 2008 JavaOne(SM) Conference
Don't
From: Xiantao Zhang [EMAIL PROTECTED]
asm-offsets.c will generate offset values used for assembly code
for some fileds of special structures.
Signed-off-by: Anthony Xu [EMAIL PROTECTED]
Signed-off-by: Xiantao Zhang [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
Jerone Young wrote:
This patch apparently fell through the cracks or I didn't send the rised
version to the list. These patches fix cpu initilization for PowerPC. Without
them guest cannot be launched.
Applied both, thanks.
--
error compiling committee.c: too many arguments to
Hollis Blanchard wrote:
[POWERPC KVM] Implement KVM for PowerPC 440
Avi, these patches have now been acked by Paul Mackerras, so I think they're
ready to be committed.
Applied all, thanks.
--
error compiling committee.c: too many arguments to function
From: Xiantao Zhang [EMAIL PROTECTED]
kvm_minstate.h : Marcos about Min save routines.
lapic.h: apic structure definition.
vcpu.h : routions related to vcpu virtualization.
vti.h : Some macros or routines for VT support on Itanium.
Signed-off-by: Xiantao Zhang [EMAIL PROTECTED]
Signed-off-by:
From: Marcelo Tosatti [EMAIL PROTECTED]
Zdenek reported a bug where a looping dmsetup status eventually hangs
on SMP guests.
The problem is that kvm_mmu_get_page() prepopulates the shadow MMU
before write protecting the guest page tables. By doing so, it leaves a
window open where the guest can
When push comes to shove, push harder, cum harder and shove harder.
http://www.buryeoag.com/
-
This SF.net email is sponsored by the 2008 JavaOne(SM) Conference
Don't miss this year's exciting event. There's still time to
On Wed, Apr 16, 2008 at 12:15:08PM -0700, Christoph Lameter wrote:
On Wed, 16 Apr 2008, Robin Holt wrote:
On Wed, Apr 16, 2008 at 11:35:38AM -0700, Christoph Lameter wrote:
On Wed, 16 Apr 2008, Robin Holt wrote:
I don't think this lock mechanism is completely working. I have
Hollis Blanchard wrote:
+config KVM
+ tristate Kernel-based Virtual Machine (KVM) support
+ depends on EXPERIMENTAL
+ select PREEMPT_NOTIFIERS
+ select ANON_INODES
+ ---help---
+ Support hosting virtualized guest machines. You will also
+ need to select one
Avi Kivity wrote:
Hollis Blanchard wrote:
+config KVM
+ tristate Kernel-based Virtual Machine (KVM) support
+ depends on EXPERIMENTAL
+ select PREEMPT_NOTIFIERS
+ select ANON_INODES
+ ---help---
+ Support hosting virtualized guest machines. You will also
+ need to select one or more of the
Hi,
I was able to boot and install Soarlis 10 U4 but since upgraded the host,
I have issues.
Host:
Fedora 8 - 2.6.24.4-64.fc8PAE SMP
CPU AMD Athlon(tm) 64 X2 Dual Core Processor 3800+
32 bit
Previously:
2.6.24.4-64.fc8
Running the standard F8 KVM kernel drivers, with either 65 or 66
Carsten Otte wrote:
Anthony Liguori wrote:
There is a 5th option. Do away with the use of posix aio. We get
absolutely no benefit from it because it's limited to a single
thread. Fabrice has reverted a patch to change that in the past.
How about using linux aio for it? It seems much
KVM-65/66 has some bugs on AMD. I suggest you to degrade to KVM-64 for
stability.
Other than that, only Solaris-10 32-bit is supposed to work fine,
while Solaris 64-bit will need some patches to KVM to work at all.
For more info see:
http://kvm.qumranet.com/kvmwiki/Guest_Support_Status
--
Avi Kivity wrote:
Avi Kivity wrote:
Hollis Blanchard wrote:
+config KVM
+ tristate Kernel-based Virtual Machine (KVM) support
+ depends on EXPERIMENTAL
+ select PREEMPT_NOTIFIERS
+ select ANON_INODES
+ ---help---
+ Support hosting virtualized guest machines. You will also
+ need to select one
[Note: KVM Forum registration is now open at
http://kforum.qumranet.com/KVMForum/about_kvmforum.php]
This is the Call for Presentations for the second annual KVM Developer's
Forum, to be held on June 10-13, 2008, in Napa, California, USA [1]. We
are looking for presentations on KVM development,
Alexey Eremenko wrote:
KVM-65/66 has some bugs on AMD. I suggest you to degrade to KVM-64 for
stability.
Also crashes (userland kvm-64, kernel F8). It is Solaris 32bit.
Does the 32bit host running PAE cause any issues ?
Alexey Eremenko wrote:
KVM-65/66 has some bugs on AMD. I suggest you to degrade to KVM-64 for
stability.
What bugs?
Also note Ian (which you don't quote or copy) reports success with
kvm-65 userspace on a non-pae kernel.
Other than that, only Solaris-10 32-bit is supposed to work fine,
Ian Kirk wrote:
Hi,
I was able to boot and install Soarlis 10 U4 but since upgraded the host,
I have issues.
Host:
Fedora 8 - 2.6.24.4-64.fc8PAE SMP
CPU AMD Athlon(tm) 64 X2 Dual Core Processor 3800+
32 bit
How much memory do you have? If you are blessed with 4GB or more, this
is
* Anthony Liguori [EMAIL PROTECTED] [2008-04-16 16:33]:
Rusty Russell wrote:
On Thursday 17 April 2008 04:56:37 Ryan Harper wrote:
From: Ryan Harper [EMAIL PROTECTED]
Rather than faking up some geometry, allow the backend to push the disk
geometry via virtio pci config option. Keep the
Bugs item #1944969, was opened at 2008-04-17 10:48
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=1944969group_id=180599
Please note that this message will contain a full copy of
Avi Kivity wrote:
How much memory do you have? If you are blessed with 4GB or more, this
is likely a truncation issue.
I have 4GB (just upgraded from 1GB), hence running PAE else Linux is only
enable to use ~3GB.
By mem=2000 I assume you mean on the Host?
If so, I might as well drop back to
On Thu, 17 Apr 2008 12:10:18 +0300 Avi Kivity wrote:
From: Carsten Otte [EMAIL PROTECTED]
This patch adds Documentation/s390/kvm.txt, which describes specifics of kvm's
user interface that are unique to s390 architecture.
Signed-off-by: Carsten Otte [EMAIL PROTECTED]
Signed-off-by: Avi
Randy Dunlap wrote:
Please use CPU consistently throughout the file (i.e., not cpu).
Thanks, will fix that with a patch that'll go on top.
-
This SF.net email is sponsored by the 2008 JavaOne(SM) Conference
Don't miss this
1 file changed, 5 insertions(+), 6 deletions(-)
arch/powerpc/kvm/Kconfig | 11 +--
Don't allow building as a module (asm-offsets dependencies).
Also, automatically select KVM_BOOKE_HOST until we better separate the guest
and host layers.
Signed-off-by: Hollis Blanchard [EMAIL
Avi Kivity wrote:
If so, I might as well drop back to non-PAE and get to use 3GB.
If it works, this provides a clue as to what goes wrong, and we can fix
it.
Are these known issues? Can I do anything to help/test which might
make it work for other people?
Just let us know if it works
On Wed, Apr 16, 2008 at 11:35:38AM -0700, Christoph Lameter wrote:
On Wed, 16 Apr 2008, Robin Holt wrote:
I don't think this lock mechanism is completely working. I have
gotten a few failures trying to dereference 0x100100 which appears to
be LIST_POISON1.
How does xpmem unregistering
Ian Kirk wrote:
Avi Kivity wrote:
If so, I might as well drop back to non-PAE and get to use 3GB.
If it works, this provides a clue as to what goes wrong, and we can fix
it.
Are these known issues? Can I do anything to help/test which might
make it work for other people?
Avi Kivity wrote:
Not good. kvm doesn't really care about the host page table layout, I
don't see how this can matter.
Actually kvm is affected by pae: it enables nx support. Please try
(separately)
1. Boot with 'noexec=off' on the host kernel command line
2. Loading the kernel
On Thu, Apr 17, 2008 at 05:51:57PM +0200, Andrea Arcangeli wrote:
On Wed, Apr 16, 2008 at 11:35:38AM -0700, Christoph Lameter wrote:
On Wed, 16 Apr 2008, Robin Holt wrote:
I don't think this lock mechanism is completely working. I have
gotten a few failures trying to dereference
Avi Kivity wrote:
1. Boot with 'noexec=off' on the host kernel command line
2. Loading the kernel modules that come with kvm-66
I'll have a go at no.2, I have not had much luck compiling the modules
within the constraints of a Fedora kernel.
No.1 I can do tomorrow when in the same
On Thu, Apr 17, 2008 at 11:36:42AM -0500, Robin Holt wrote:
In this case, we are not making the call to unregister, we are waiting
for the _release callout which has already removed it from the list.
In the event that the user has removed all the grants, we use unregister.
That typically
On Thu, Apr 17, 2008 at 07:14:43PM +0200, Andrea Arcangeli wrote:
On Thu, Apr 17, 2008 at 11:36:42AM -0500, Robin Holt wrote:
In this case, we are not making the call to unregister, we are waiting
for the _release callout which has already removed it from the list.
In the event that the
Bugs item #1945129, was opened at 2008-04-17 14:36
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=1945129group_id=180599
Please note that this message will contain a full copy of
Ian Kirk wrote:
Avi Kivity wrote:
1. Boot with 'noexec=off' on the host kernel command line
2. Loading the kernel modules that come with kvm-66
I'll have a go at no.2, I have not had much luck compiling the modules
within the constraints of a Fedora kernel.
I do this
Avi Kivity wrote:
I do this regularly, basically you need to install kernel-devel and
that's it.
Yes, that is very easy isn't it. Oops to my stupidity. I've got it built
and will give it a go tomorrow and report back on each test case.
On Thu, 17 Apr 2008, Andrea Arcangeli wrote:
Also note, EMM isn't using the clean hlist_del, it's implementing list
by hand (with zero runtime gain) so all the debugging may not be
existent in EMM, so if it's really a mm_lock race, and it only
triggers with mmu notifiers and not with EMM, it
Posix AIO, especially as used by QEMU, is not very efficient for disk IO.
This patch introduces an AIO abstract to allow multiple AIO implements to be
used. We can't simply replace posix-aio by linux-aio because linux-aio only
works on some filesystems and only with files opened with O_DIRECT.
This patch moves the posix-aio code into a separate file. It's strictly code
motion, no new functionality is introduced.
Signed-off-by: Anthony Liguori [EMAIL PROTECTED]
diff --git a/Makefile b/Makefile
index a8df278..916f071 100644
--- a/Makefile
+++ b/Makefile
@@ -139,7 +139,7 @@
On 4/16/08, Anthony Liguori [EMAIL PROTECTED] wrote:
Blue Swirl wrote:
On 4/16/08, Anthony Liguori [EMAIL PROTECTED] wrote:
This patch introduces a DMA API and plumbs support through the DMA
layer. We
use a mostly opaque structure, IOVector to represent a scatter/gather
list of
This patch introduces a Linux-aio backend that is disabled by default. To
use this backend effectively, the user should disable caching and select
it with the appropriate -aio option. For instance:
qemu-system-x86_64 -drive foo.img,cache=off -aio linux
There's no universal way to asynchronous
On Thu, Apr 17, 2008 at 02:26:50PM -0500, Anthony Liguori wrote:
Posix AIO, especially as used by QEMU, is not very efficient for disk IO.
This patch introduces an AIO abstract to allow multiple AIO implements to be
used. We can't simply replace posix-aio by linux-aio because linux-aio only
Daniel P. Berrange wrote:
On Thu, Apr 17, 2008 at 02:26:50PM -0500, Anthony Liguori wrote:
Posix AIO, especially as used by QEMU, is not very efficient for disk IO.
This patch introduces an AIO abstract to allow multiple AIO implements to be
used. We can't simply replace posix-aio by
On Thu, Apr 17, 2008 at 02:41:32PM -0500, Anthony Liguori wrote:
Daniel P. Berrange wrote:
On Thu, Apr 17, 2008 at 02:26:50PM -0500, Anthony Liguori wrote:
Posix AIO, especially as used by QEMU, is not very efficient for disk IO.
This patch introduces an AIO abstract to allow multiple AIO
Daniel P. Berrange wrote:
If QEMU can't discover cases where it won't work, what criteria should
the end user use to decide between the impls, or for that matter, what
criteria should a management api/app like libvirt use ? If the only decision
logic is 'try it benchmark your VM' then its
Blue Swirl wrote:
I fixed the bug, now pcnet works. Performance is improved by a few
percent. The problem was that the vector was not freed. Maybe dynamic
allocation is a bit fragile. In this case, the length of the vector is
known, so it could be allocated once at init time. But would this
Introduce QEMUDevice, making the ioport/iomem-device relationship visible.
At the moment it only contains a lock, but could be extended.
With it the following is possible:
- vcpu's to read/write via ioports/iomem while the iothread is working on
some unrelated device, or just copying
cpu_single_env is a global variable, so there is an assumption that only
one vcpu can execute QEMU at the same time.
Provide a get_cpu_env() wrapper allowing KVM to use its thread local storage
vcpu info. It simplifies IO thread handling.
Index: kvm-userspace.io/qemu/block-raw-posix.c
Introduce a QEMUDevice type to allow global knowledge of present devices.
At the moment its only used for locking purposes, but not limited to that.
Index: kvm-userspace.io/qemu/qemu-common.h
===
---
Subject says it all.
With KVM in-kernel irqchip this is unused.
Index: kvm-userspace.io/qemu/hw/apic.c
===
--- kvm-userspace.io.orig/qemu/hw/apic.c
+++ kvm-userspace.io/qemu/hw/apic.c
@@ -478,6 +478,8 @@ int
Only used by qemu/hw/sun4m.c.
Index: kvm-userspace.io/qemu/Makefile.target
===
--- kvm-userspace.io.orig/qemu/Makefile.target
+++ kvm-userspace.io/qemu/Makefile.target
@@ -563,7 +563,7 @@ DEPLIBS += libfdt.a
endif
# SCSI layer
Same as before, but make the iomem-device relationship visible.
Index: kvm-userspace.io/qemu/cpu-all.h
===
--- kvm-userspace.io.orig/qemu/cpu-all.h
+++ kvm-userspace.io/qemu/cpu-all.h
@@ -840,7 +840,7 @@ void
Record which device owns ioports/memports, and use that to grab the appropriate
lock when entering ioport/iomem processing.
Make cpu_physical_memory_rw() unlocked (called from inside device code), and
locking optional from __cpu_physical_memory_rw(), to be called when a vcpu
enters mmio
Grab device locks when moving data through char devices in the host-guest
direction.
Index: kvm-userspace.io/qemu/hw/serial.c
===
--- kvm-userspace.io.orig/qemu/hw/serial.c
+++ kvm-userspace.io/qemu/hw/serial.c
@@ -305,18 +305,21 @@
1 - 100 of 111 matches
Mail list logo