From: Sheng Yang [EMAIL PROTECTED]
Signed-off-by: Sheng Yang [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
diff --git a/kvm b/kvm
index 2a7dc85..cb9ecf8 100755
--- a/kvm
+++ b/kvm
@@ -18,6 +18,14 @@ config = ShellConfigParser()
config.read('config.mak')
external_module =
From: Mark McLoughlin [EMAIL PROTECTED]
virtio_net tries to guess when it has received a tx
notification from the guest whether it indicates that the
guest has no more room in the tx ring and it should
immediately flush the queued buffers.
The heuristic is based on the fact that there are 128
From: Mark McLoughlin [EMAIL PROTECTED]
The current virtio_net tx timer is 2ns, which doesn't make
any sense. Set it to a more reasonable 250us instead.
However, even though we were requesting a 2ns tx timer, it
was actually getting limited to MIN_TIMER_REARM_US which is
currently 250us.
So,
From: Mark McLoughlin [EMAIL PROTECTED]
Set the VIRTIO_F_NOTIFY_ON_EMPTY feature bit so the
guest can rely on us notifying them when the queue
is empty.
Also, only notify when the available queue is empty
*and* when we've finished with all the buffers we
had detached. Right now, when the queue
From: Mark McLoughlin [EMAIL PROTECTED]
Once we know we have buffers available on the receive ring, we can
safely disable notifications.
Signed-off-by: Mark McLoughlin [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
diff --git a/qemu/hw/virtio-net.c b/qemu/hw/virtio-net.c
index
From: Mark McLoughlin [EMAIL PROTECTED]
Signed-off-by: Mark McLoughlin [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
diff --git a/qemu/vl.c b/qemu/vl.c
index 126944d..f5aacf0 100644
--- a/qemu/vl.c
+++ b/qemu/vl.c
@@ -4369,19 +4369,6 @@ typedef struct TAPState {
unsigned int
From: Sheng Yang [EMAIL PROTECTED]
Signed-off-by: Sheng Yang [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index c4510fe..337670b 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@ -1732,7 +1732,8 @@ static int
From: Ben-Ami Yassour [EMAIL PROTECTED]
Remove unused field: struct kvm_assigned_pci_dev assigned_dev
from struct: struct kvm_assigned_dev_kernel
Signed-off-by: Ben-Ami Yassour [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
diff --git a/include/asm-x86/kvm_host.h
From: Marcelo Tosatti [EMAIL PROTECTED]
The vcpu thread can be preempted after the guest_debug_pre() callback,
resulting in invalid debug registers on the new vcpu.
Move it inside the non-preemptable section.
Signed-off-by: Marcelo Tosatti [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL
From: Avi Kivity [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
diff --git a/configure b/configure
index 72337c9..3bb10ce 100755
--- a/configure
+++ b/configure
@@ -8,7 +8,7 @@ objcopy=objcopy
want_module=1
qemu_cflags=
qemu_ldflags=
-qemu_opts=
+qemu_opts=()
cross_prefix=
From: Philippe Gerum [EMAIL PROTECTED]
This patch fixes misspelled calls to qemu_fopen_file().
Signed-off-by: Philippe Gerum [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
diff --git a/qemu/hw/ds1225y.c b/qemu/hw/ds1225y.c
index 3b91b4f..b1d0284 100644
--- a/qemu/hw/ds1225y.c
+++
Bugs item #2042889, was opened at 2008-08-08 13:16
Message generated for change (Comment added) made by ravpl
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2042889group_id=180599
Please note that this message will contain a full copy of the comment
From 4993375c0d67fd5eb47891dee48300880aceff1e Mon Sep 17 00:00:00 2001
From: Sheng Yang [EMAIL PROTECTED]
Date: Wed, 13 Aug 2008 15:39:29 +0800
Subject: [PATCH] kvm: Fix kvm startup script
Signed-off-by: Sheng Yang [EMAIL PROTECTED]
---
kvm | 16 +---
1 files changed, 13
From bb7cc3fd1e549d38d6bda10a06feda9339de9d3e Mon Sep 17 00:00:00 2001
From: Sheng Yang [EMAIL PROTECTED]
Date: Wed, 13 Aug 2008 14:29:43 +0800
Subject: [PATCH] KVM: trace: Add event mask support
Allow user space application to specify one or morefilter masks to
limit the events being captured
Yang, Sheng wrote:
From bb7cc3fd1e549d38d6bda10a06feda9339de9d3e Mon Sep 17 00:00:00 2001
From: Sheng Yang [EMAIL PROTECTED]
Date: Wed, 13 Aug 2008 14:29:43 +0800
Subject: [PATCH] KVM: trace: Add event mask support
Allow user space application to specify one or morefilter masks to
limit the
Yang, Sheng wrote:
From 4993375c0d67fd5eb47891dee48300880aceff1e Mon Sep 17 00:00:00 2001
From: Sheng Yang [EMAIL PROTECTED]
Date: Wed, 13 Aug 2008 15:39:29 +0800
Subject: [PATCH] kvm: Fix kvm startup script
Applied, thanks.
--
error compiling committee.c: too many arguments to function
On Wednesday 13 August 2008 16:04:59 Avi Kivity wrote:
Yang, Sheng wrote:
From bb7cc3fd1e549d38d6bda10a06feda9339de9d3e Mon Sep 17 00:00:00
2001 From: Sheng Yang [EMAIL PROTECTED]
Date: Wed, 13 Aug 2008 14:29:43 +0800
Subject: [PATCH] KVM: trace: Add event mask support
Allow user
Philippe Gerum wrote:
Add dependency to get dyngen-opc.h generated prior to compiling qemu/exec.c.
qemu-devel material as well.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
Philippe Gerum wrote:
static void vga_map(PCIDevice *pci_dev, int region_num,
uint32_t addr, uint32_t size, int type)
diff --git a/qemu/qemu-kvm.h b/qemu/qemu-kvm.h
index 7e28428..9ba81a3 100644
--- a/qemu/qemu-kvm.h
+++ b/qemu/qemu-kvm.h
@@ -114,6 +114,10 @@ extern
Avi Kivity wrote:
Jan Kiszka wrote:
I thought I tested out -no-kvm-irqchip, but apprently not well
enough. I'll try to see what went wrong.
Should this issue have been fixed meanwhile? I just gave latest git a
try and - as far as I recall my tests before holiday correctly - things
Philippe Gerum wrote:
This patch defines cpu_vendor_string for linux-user builds.
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo
Avi Kivity wrote:
Philippe Gerum wrote:
static void vga_map(PCIDevice *pci_dev, int region_num,
uint32_t addr, uint32_t size, int type)
diff --git a/qemu/qemu-kvm.h b/qemu/qemu-kvm.h
index 7e28428..9ba81a3 100644
--- a/qemu/qemu-kvm.h
+++ b/qemu/qemu-kvm.h
@@ -114,6
Bugs item #2042889, was opened at 2008-08-08 13:16
Message generated for change (Comment added) made by ravpl
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2042889group_id=180599
Please note that this message will contain a full copy of the comment
Ben-Ami Yassour wrote:
Remove unused field: struct kvm_assigned_pci_dev assigned_dev
from struct: struct kvm_assigned_dev_kernel
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a
On Thursday 07 August 2008 22:14:46 Ben-Ami Yassour wrote:
From: Kay, Allen M [EMAIL PROTECTED]
This patch extends the VT-d driver to support KVM
Seems OK to me.
Avi, is this patch good enough to send to PCI guys to have a review?
--
regards
Yang, Sheng
[Ben: fixed memory pinning]
Yang, Sheng wrote:
On Thursday 07 August 2008 22:14:46 Ben-Ami Yassour wrote:
From: Kay, Allen M [EMAIL PROTECTED]
This patch extends the VT-d driver to support KVM
Seems OK to me.
Avi, is this patch good enough to send to PCI guys to have a review?
I think so. There are some
On Thursday 07 August 2008 22:14:47 Ben-Ami Yassour wrote:
Based on a patch by: Kay, Allen M [EMAIL PROTECTED]
This patch enables pci device assignment based on VT-d support.
When a device is assigned to the guest, the guest memory is pinned
and the mapping is updated in the VT-d IOMMU.
I
Yang, Sheng wrote:
On Thursday 07 August 2008 22:14:47 Ben-Ami Yassour wrote:
Based on a patch by: Kay, Allen M [EMAIL PROTECTED]
This patch enables pci device assignment based on VT-d support.
When a device is assigned to the guest, the guest memory is pinned
and the mapping is updated in
Daniel P. Berrange writes ([Xen-devel] Re: Announcing: Open OVF project source
code availibility):
Building an XML-RPC
interface just to call into functions for manipulating OVF files is
rather overkill.
Also it is far from clear whether merely changing the concrete
representation of the
On Wednesday 13 August 2008 17:46:03 Avi Kivity wrote:
Yang, Sheng wrote:
On Thursday 07 August 2008 22:14:47 Ben-Ami Yassour wrote:
Based on a patch by: Kay, Allen M [EMAIL PROTECTED]
This patch enables pci device assignment based on VT-d support.
When a device is assigned to the
Marcelo Tosatti wrote:
Avi Kivity wrote:
Any reason this is not in __vcpu_run()?
Our main loop could look like
while (no reason to stop)
if (runnable)
enter guest
else
block
deal with aftermath
kvm_emulate_halt would then simply modify the mp
Marcelo Tosatti wrote:
The vcpu thread can be preempted after the guest_debug_pre() callback,
resulting in invalid debug registers on the new vcpu.
Move it inside the non-preemptable section.
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To
Avi Kivity wrote:
Marcelo Tosatti wrote:
Offline or uninitialized vcpu's can be executed if requested to perform
userspace work.
Follow Avi's suggestion to handle halted vcpu's in the main loop,
simplifying kvm_emulate_halt(). Introduce a new vcpu-requests bit to
indicate events that promote
Glauber Costa wrote:
Signed-off-by: Glauber Costa [EMAIL PROTECTED]
---
libkvm/libkvm.c | 34 +-
libkvm/libkvm.h |2 +-
qemu/qemu-kvm.c |2 +-
3 files changed, 23 insertions(+), 15 deletions(-)
diff --git a/libkvm/libkvm.c b/libkvm/libkvm.c
index
Glauber Costa wrote:
Hi folks,
The following series contain a proposal for our memory registration
framework. This is by no means complete, and rather, a first step only.
This first step, btw, has the goal of taking the kvm-specific memory
registration
functions from all over the code, so we
On Wed, Aug 13, 2008 at 8:41 AM, Avi Kivity [EMAIL PROTECTED] wrote:
Glauber Costa wrote:
Signed-off-by: Glauber Costa [EMAIL PROTECTED]
---
libkvm/libkvm.c | 34 +-
libkvm/libkvm.h |2 +-
qemu/qemu-kvm.c |2 +-
3 files changed, 23 insertions(+),
Even though we don't share irqs at the moment, we should ensure
regular user processes don't try to allocate system resources.
We check for capability to access IO devices (CAP_SYS_RAWIO) before
we request_irq on behalf of the guest.
Noticed by Avi.
Signed-off-by: Amit Shah [EMAIL PROTECTED]
Glauber Costa wrote:
Turn the explicit calls to kvm_cpu_register_memoy_area()
an empty function. Provide a __kvm_cpu_register_memory_area()
that is called from within cpu_register_memory_area().
To avoid registering mmio regions to the hypervisor, since we depend on
them faulting, we keep track
Avi Kivity wrote:
Philippe Gerum wrote:
This patch fixes misspelled calls to qemu_fopen_file().
Please send to qemu-devel as this is a generic qemu issue, not kvm
specific.
qemu_fopen_file() only exists in KVM (it's one of the live migration
changes).
Regards,
Anthony Liguori
--
Mark McLoughlin wrote:
Okay, I've just sent a patch to add TUNGETIFF:
http://marc.info/?l=linux-netdevm=121863813904363
See below patch for how we'd use it. Don't apply this until the kernel
patch is accepted, obviously.
Please repost once that's in.
The -help string is what libvirt
On Wed, Aug 13, 2008 at 07:24:30PM +0300, Avi Kivity wrote:
Mark McLoughlin wrote:
Okay, I've just sent a patch to add TUNGETIFF:
http://marc.info/?l=linux-netdevm=121863813904363
See below patch for how we'd use it. Don't apply this until the kernel
patch is accepted, obviously.
Hi
Is there a way to detect if a particular machine is a VM running on KVM
hypervisor or not. i.e from within a guest can one figure out if it is running
on top of a hypervisor and not physical machine ? [For both Linux guests and
Windows guests ]
/Jd
--
To unsubscribe from this
jd wrote:
Hi
Is there a way to detect if a particular machine is a VM running on KVM
hypervisor or not. i.e from within a guest can one figure out if it is running
on top of a hypervisor and not physical machine ? [For both Linux guests and
Windows guests ]
The preferred way of doing
On Tue, 12 Aug 2008 16:46:39 +0800 Zhao, Yu wrote:
[PATCH 4/4] PCI: document SR-IOV
SR-IOV Documentation.
Signed-off-by: Yu Zhao [EMAIL PROTECTED]
Signed-off-by: Eddie Dong [EMAIL PROTECTED]
---
Documentation/ABI/testing/sysfs-bus-pci | 13 ++
Documentation/PCI/00-INDEX
Thanks. Good to know that most hypervisors are using this mechanism.
/Jd
--- On Wed, 8/13/08, Anthony Liguori [EMAIL PROTECTED] wrote:
From: Anthony Liguori [EMAIL PROTECTED]
Subject: Re: KVM Guest detection
To: [EMAIL PROTECTED]
Cc: KVM List kvm@vger.kernel.org
Date: Wednesday, August
Avi Kivity wrote:
The AP enters HALT state with IF=0. What can make it resume at the
following jmp 1b? NMI? SMI?
Yes, but also INIT.
Are you sure the AP will continue after the hlt instruction on INIT?
I think it will start to execute code from the reset vector (0xfff0).
We might
On Wed, Aug 13, 2008 at 01:09:16PM -0700, Randy Dunlap wrote:
On Tue, 12 Aug 2008 16:46:39 +0800 Zhao, Yu wrote:
[PATCH 4/4] PCI: document SR-IOV
SR-IOV Documentation.
Signed-off-by: Yu Zhao [EMAIL PROTECTED]
Signed-off-by: Eddie Dong [EMAIL PROTECTED]
---
This patch aims to allow emulation whenever guest state is not valid for VMX
operation.
This usually happens in mode switches with guests such as older versions of
gfxboot and FreeDOS with HIMEM.
The patch aims to address this issue, it introduces the following:
- A function that invokes the
This is esentially a re-write of the QEMU UHCI layer. My initial goal
was to support fully async operation with multiple outstanding async
transactions. Along the way I realized that I can greatly simplify
and cleanup the overall logic. There was a lot of duplicate and confusing
code in the UHCI
This is a follow up to the async UHCI patch. Both BULK and ISOC transactions
are now fully asynchrounous. I left CONTROL synchronous for now, ideally
we want it to be async too and it should not be that hard to do now.
This patch obviously requires UHCI patch. The combo has been tested with
50 matches
Mail list logo