Dong, Eddie wrote:
???
I didn't think the APIC is removed.
Who and which commit?
commit 394b6efba95f21d22687743def9aa1a0b7125809
Author: Eddie Dong [EMAIL PROTECTED]
Date: Thu Jul 19 12:12:53 2007 +0300
kvm: rename KVM_CAP_PIC to KVM_CAP_IRQCHIP
had parts of the patch that removed
On Tue, 2007-07-24 at 08:30 +0300, Avi Kivity wrote:
Rusty Russell wrote:
On Mon, 2007-07-23 at 13:27 +0300, Avi Kivity wrote:
Having an address_space (like your patch does) is remarkably simple, and
requires few hooks from the current vm. However using existing vmas
mapped by the
On Tue, 2007-07-24 at 09:21 +0300, Avi Kivity wrote:
Rusty Russell wrote:
Actually, get_user_pages() does that for you. You have to make R/O any
writable pte where the guest doesn't set the dirty bit (so you can trap
it later) but last I put a printk in there, Linux doesn't do that.
O, I checked minutes ago (using local mirror), everthing is fine.
I got live migration works for FC5_32 which uses PIC only.
Eddie
-
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find
Rusty Russell wrote:
If not, it does get harder. A callback in the mm struct to say I want
to swap your page out is required if we don't take a reference to the
page. Dirty bit handling would be an interesting issue (maybe the
callback can say No! and dirty the page again?).
Since
If the guest can invoke a printk(), it can potentially flood the logs,
causing a host DoS. We should also indicate *which* guest we're
talking about.
This patch adds pr_guest (analogous to pr_debug) which ratelimits.
Not all printk's were replaced: some are only printed once and others
should
On Tue, 2007-07-24 at 09:59 +0300, Avi Kivity wrote:
However, you can probably work around that by not setting an rmap for
the kernel mappings, and instead have the guest teach the host where the
kernel page tables live. You'd only be left with shared libraries,
until the kernel can share
Shaohua Li wrote:
gfn_to_page might sleep with swap support. Move it out of the kmap calls.
I'd like to apply this to the kvm.git master branch so we don't have to
maintain it. Was this tested on a highmem machine? If not, I can do it.
--
error compiling committee.c: too many
Dong, Eddie wrote:
Against lapic2
This is a pre-cleanup for in kernel irqchip live migration support.
A guest may not have APIC but still have apic_base_msr be
save/restored in current live migration framework.
Signed-off-by: Yaozu (Eddie) Dong [EMAIL PROTECTED]
diff --git
Dong, Eddie wrote:
This patch is only for idea collection so far.
The dilemma is that how to export the pic/IOAPIC/apic state data
structure
to user and make sure it has same/similar structure in user level.
Otherwise a
convert is a must and we must maintain the converter.
I think we
Rusty Russell wrote:
Insist on a reason when injecting a #GP into a guest
All places but one already do a printk before injecting a #GP: just
formalize it a little.
Signed-off-by: Rusty Russell [EMAIL PROTECTED]
diff -r f75b0a5fc387 drivers/kvm/kvm_main.c
--- a/drivers/kvm/kvm_main.c Mon
Rusty Russell wrote:
If the guest can invoke a printk(), it can potentially flood the logs,
causing a host DoS. We should also indicate *which* guest we're
talking about.
This patch adds pr_guest (analogous to pr_debug) which ratelimits.
Not all printk's were replaced: some are only printed
On Tue, 2007-07-24 at 13:15 +0300, Avi Kivity wrote:
Rusty Russell wrote:
+static void __attribute__((format(printf, 2, 3)))
+inject_gp(struct kvm_vcpu *vcpu, const char *why_fmt, ...)
...
kvm_arch_ops-inject_gp(vcpu, 0);
}
Some guests (non hardware accelerated hypervisors,
Rusty Russell wrote:
On Tue, 2007-07-24 at 13:15 +0300, Avi Kivity wrote:
Rusty Russell wrote:
+static void __attribute__((format(printf, 2, 3)))
+inject_gp(struct kvm_vcpu *vcpu, const char *why_fmt, ...)
...
kvm_arch_ops-inject_gp(vcpu, 0);
}
Some
This patch removes some unused functions in mmu.c
Signed-off-by: Nguyen Anh Quynh [EMAIL PROTECTED]
diff --git a/drivers/kvm/mmu.c b/drivers/kvm/mmu.c
index a7985b1..13fb6bb 100644
--- a/drivers/kvm/mmu.c
+++ b/drivers/kvm/mmu.c
@@ -156,21 +156,6 @@ static struct kmem_cache *pte_chain_cache;
Nguyen Anh Quynh wrote:
This patch removes some unused functions in mmu.c
-static int is_nx(struct kvm_vcpu *vcpu)
-{
- return vcpu-shadow_efer EFER_NX;
-}
-
is_nx() for example, is used.
More care, please.
--
error compiling committee.c: too many arguments to function
Rusty Russell wrote:
On Tue, 2007-07-24 at 13:19 +0300, Avi Kivity wrote:
Rusty Russell wrote:
diff -r 3f158ee9df43 drivers/kvm/kvm_main.c
--- a/drivers/kvm/kvm_main.cTue Jul 24 16:22:39 2007 +1000
+++ b/drivers/kvm/kvm_main.cTue Jul 24 16:28:33 2007 +1000
@@ -425,8
Hello list,
I am facing some big issues with the latest KVM release. I am still
trying to boot and use the same VM image on four different hosts, but
with outstanding bad luck.
More precisely, I created a brand new VM image and installed Windows
Server 2003. Then, I did shut it down and
On Tue, 2007-07-24 at 14:01 +0300, Avi Kivity wrote:
Rusty Russell wrote:
KVM *will* be used to run malicious guests. That's going to be hard to
lock down later, so I figure we should start now.
There's no reason to make this KERN_WARN. There's nothing wrong with
the host, and there
Actually this is known problem, that I reproduced easily.
Windows 2000/XP/2003 (32-bit) all fails on AMD SVM.
Strage, but Vista runs on SVM fine.
VMX and SVM have different problems, with different guests failing on each.
--
-Alexey Eremenko Technologov
http://sourceforge.net/tracker/index.php?func=detailaid=1750684group_id=180599atid=893831
http://sourceforge.net/tracker/index.php
bug 1750684
--
-Alexey Eremenko Technologov
-
This SF.net email is sponsored by: Splunk Inc.
Rusty Russell wrote:
On Tue, 2007-07-24 at 14:01 +0300, Avi Kivity wrote:
Rusty Russell wrote:
KVM *will* be used to run malicious guests. That's going to be hard to
lock down later, so I figure we should start now.
There's no reason to make this KERN_WARN. There's nothing
Alessandro Sardo wrote:
One at a time.
Test #3
CPU model: 1 x Single-Core AMD Athlon64 Processor 3500+ AM2
Host: RHEL5 x86_64, kernel 2.6.18-8.1.8.el5
KVM-33
Result - boots fine, but when I try to install the SP2 I get the
following kernel panic:
Unable to handle kernel NULL pointer
2007/7/24, Avi Kivity [EMAIL PROTECTED]:
Shaohua Li wrote:
gfn_to_page might sleep with swap support. Move it out of the kmap calls.
I'd like to apply this to the kvm.git master branch so we don't have to
maintain it. Was this tested on a highmem machine? If not, I can do it.
My test
Hello,
I've heard that KVM-33 now supports SMP hosts and SMP guests,
which is cool. However I do have some newbie-level questions
about this one.
- I assume this is implemented by using n threads for n CPUs/CPU
cores and letting the host OS schedule accordingly? Or does the
VM somehow
From: Avi Kivity [EMAIL PROTECTED]
To: Li, Shaohua [EMAIL PROTECTED]
Date: Tue, 24 Jul 2007 13:42:29 +0800
Subject: Re: [RFC 0/8]KVM: swap out guest pages
Shaohua Li wrote:
On Mon, 2007-07-23 at 18:27 +0800, Avi Kivity wrote:
Shaohua Li wrote:
This patch series make kvm guest
Peter Meier wrote:
Hello,
I've heard that KVM-33 now supports SMP hosts and SMP guests,
which is cool. However I do have some newbie-level questions
about this one.
- I assume this is implemented by using n threads for n CPUs/CPU
cores and letting the host OS schedule accordingly? Or
Thanks Avi :). Off to try it out ...
Regards,
Peter
-
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a
kvm needs zlib development files to compile,
but does not probe for it in configure and does
not complain if they are missing.
a simple header check in qemu configure should
fix this.
Regards, Andreas
-
This SF.net email is
Can you post the guest image (if it is free and has no private data)?
Here is the test case. Image contains kernel and bootloader:
http://depositfiles.com/en/files/1304964
-
This SF.net email is sponsored by: Splunk Inc.
This patch applies to the preempt-hooks branch to enable KVM to function
properly on VMX. With preemption enabled, the KVM context can get scheduled
out at arbitrary points. The preempt-hooks allow us to correctly restore
the host state while being preemptible, but preemption causes problems on
On Tue, 2007-07-24 at 22:02 +, Chris Clayton wrote:
I've been doing some more digging around here and thought I'd report my
findings. I've found that under kvm 31 and 33, qemu-system-x86_64 always
fails with a seg fault when the (__thread) variable vcpu_env (declared at
line 33 of
On Fri, Jul 20, 2007 at 09:57:55AM +0300, Avi Kivity wrote:
Avi Kivity wrote:
Please tell me what I can do to help debugging this problem.
Alternatively I have uploaded an image to reproduce the problem here:
http://temp.aurel32.net/kfreebsd-amd64.img.g
I've downloaded the image
Nguyen Anh Quynh wrote:
On 7/24/07, Avi Kivity [EMAIL PROTECTED] wrote:
Nguyen Anh Quynh wrote:
This patch removes some unused functions in mmu.c
-static int is_nx(struct kvm_vcpu *vcpu)
-{
- return vcpu-shadow_efer EFER_NX;
-}
-
is_nx() for example, is used.
More care,
Aurelien Jarno wrote:
On Fri, Jul 20, 2007 at 09:57:55AM +0300, Avi Kivity wrote:
Avi Kivity wrote:
Please tell me what I can do to help debugging this problem.
Alternatively I have uploaded an image to reproduce the problem here:
http://temp.aurel32.net/kfreebsd-amd64.img.g
Simon Gao wrote:
Avi Kivity wrote:
Simon Gao wrote:
So from kvm-31 and on, qemu command will become qemu-system-x86_64 no
matter host system is 32bit or 64bit? So it's possible to compile 64bit
kvm qemu with only 32bit libraries?
Yes and yes. That's even more true
Gregory Haskins wrote:
This patch applies to the preempt-hooks branch to enable KVM to function
properly on VMX. With preemption enabled, the KVM context can get scheduled
out at arbitrary points. The preempt-hooks allow us to correctly restore
the host state while being preemptible, but
Chris Clayton wrote:
Forgot to cc this to the list, sorry
-- Forwarded Message --
Subject: Re: [kvm-devel] kvm-31 seg fault
Date: Tuesday 24 July 2007
From: Chris Clayton [EMAIL PROTECTED]
To: Avi Kivity [EMAIL PROTECTED]
Hi again Avi,
On Sunday 22 July 2007, you
load_pdptrs can be handed an invalid cr3, and it should not oops.
This can happen because we injected #gp in set_cr3() after we set
vcpu-cr3 to the invalid value, or from kvm_vcpu_ioctl_set_sregs(), or
possibly (?) memory configuration changes after the guest did
set_cr3().
We should also copy
Bugs item #1760056, was opened at 2007-07-24 21:46
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=1760056group_id=180599
Please note that this message will contain a full copy of
On Wed, 2007-07-25 at 06:20 +0300, Avi Kivity wrote:
I'd rather wait for the real fix, especially as this is an experimental
branch. Can you provide details of the issue?
Sure. Keep in mind I am working with the RT kernel, so things might be
tighter and/or different than the vanilla
On Wed, 2007-07-25 at 07:13 +0300, Avi Kivity wrote:
Preemption disabled yes, but interrupts?
How do you think I found this? ;)
From smp_call_function_single in -rt:
WARN_ON(irqs_disabled());
IIRC I picked the place where
sched_in is called to have interrupts enabled, but maybe -rt
42 matches
Mail list logo