Bugs item #1991647, was opened at 2008-06-12 15:59
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1991647&group_id=180599
Please note that this message will contain a full copy
Bugs item #1991653, was opened at 2008-06-12 16:05
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1991653&group_id=180599
Please note that this message will contain a full copy
Bugs item #1991653, was opened at 2008-06-12 16:05
Message generated for change (Comment added) made by yunfeng
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1991653&group_id=180599
Please note that this message will contain a full copy of the comment t
Hi All,
This is today's KVM test result against kvm.git
df4245dff396bd1671bdaf735b0529371b3b7112 and kvm-userspace.git
67a67deba877c9a40572451f3b9abae1f98883e7.
Booting four 32e guests sequentially hang host once in auto testing, but
hadn't reproduced it manully.
And we found two new issues ab
Javier Guerra Giraldez <[EMAIL PROTECTED]> writes:
> On Wednesday 11 June 2008, Chris Webb wrote:
> > Hi. I have a small 'qemu-send' utility for talking to a running qemu/kvm
> > process whose monitor console listens on a filesystem socket, which I think
> > might be a useful building block when e
On Wed, Jun 11, 2008 at 09:07:49PM -0500, Javier Guerra Giraldez wrote:
> On Wednesday 11 June 2008, Freddie Cash wrote:
> > The script can be run as a normal user, as it will use sudo where
> > needed. However, this causes all the VMs to be run as root (this is
> > developed on Debian where they'
Marcelo Tosatti wrote:
On Fri, Jun 06, 2008 at 11:11:12AM +0800, Yunfeng Zhao wrote:
Hi All,
This is today's KVM test result against kvm.git
ff5bdac4be0230e0bb33e4208ac0a91343c72929 and kvm-userspace.git
eb2fd67cbecdb573f908697ed41b81ee312372bd.
One New Issue:
===
Hi all,
On my system:
Processor: Intel Core 2 Duo 6300 1.86 GHz
Motherboard: Intel DG965RY
OS: Ubuntu 7.10 (Gutsy)
Linux Kernel: 2.6.22-14-generic
BIOS has VT technology 'enable/disable' feature.
'cat /proc/cpuinfo' shows 'vmx' flags.
I checked and enabled the VT support in the BIOS.
'modpro
Hi,
You need to go through a power-down/power-up cycle.
(See the help associated with the flag in the BIOS)
Laurent
Le jeudi 12 juin 2008 à 16:04 +0530, Sukanto Ghosh a écrit :
> Hi all,
>
> On my system:
>
> Processor: Intel Core 2 Duo 6300 1.86 GHz
> Motherboard: Intel DG965RY
> OS: Ubuntu
Thanks Laurent. I was always restarting the system.
I could successfully load kvm-intel module.
Thanks once again.
Laurent Vivier wrote:
Hi,
You need to go through a power-down/power-up cycle.
(See the help associated with the flag in the BIOS)
Laurent
Le jeudi 12 juin 2008 à 16:04 +0530, S
Marcelo Tosatti wrote:
kvm_mmu_pte_write() does not handle 32-bit non-PAE large page backed
guests properly. It will instantiate two 2MB sptes pointing to the same
physical 2MB page when a guest large pte update is trapped.
Instead of duplicating code to handle this, disallow directory level
upd
On Tue, Jun 10, 2008 at 12:45:30PM -0700, Kay, Allen M wrote:
> Muli,
>
> The userpsace branch is located at:
>
> git.kernel.org/pub/scm/linux/kernel/git/amit/kvm-userspace.git vtd
>
> I forgot to send out the userspace patch last night. :-)
Thanks Allen. I am trying to get the latest rev to wo
Marcelo Tosatti wrote:
Only abort guest entry if the timer count went from 0->1, since for 1->2
or larger the bit will either be set already or a timer irq will have
been injected.
Using atomic_inc_and_test() for it also introduces an SMP barrier
to the LAPIC version (thought it was unecessary b
Alexander Graf wrote:
Apparently this is broken on x86 too. I was just trying this patch
with Mac OS X as target and magically the in-kernel APIC starts
working, so I guess something is going wrong already here.
Btw, according to the ACPI tables, all PCI interrupts are currently
defined Activ
Xu, Anthony wrote:
Avi Kivity wrote:
I suggest modifying the firmware to report the interrupts as active
high. Since Xen does not emulate polarity, the change will not affect
it and the firmware can continue to be shared. I'd also recommend
fixing Xen to emulate the polarity correctly, if p
Xu, Anthony wrote:
Thanks for comments
Basically we are on the same page, while I didn't find your patch about
irq assignment, can you post it in this thread again, thx?
Below patch makes all PCI devices use level-trigger , active low
interrupt, it worked well when running linux guest, I didn't
Anthony Liguori wrote:
Jan Kiszka wrote:
Remove redundant checkes for kvm_enabled() on register updates between
userspace and kvm kernel driver. Ensure register update across all CPUs
on "info cpus" monitor command.
This breaks the build when KVM is disabled. The explicit guard is
needed
Tan, Li wrote:
> Avi,
> Do you have any comments?
No, just overloaded. Thanks for the reminder.
>
> Subject: [PATCH] [PATCH] kvm: kvmtrace: kvmtrace_format for supporting
> big_endian
> Currently kvmtrace is not portable, and prevent from copying
> a trace file from big-endian target to little-end
Xu, Anthony wrote:
Glauber Costa wrote:
There's no need to polute the already poluted CPUState
with "ready_for_interrupt_injection". We can compute it
in the few times we use it, and be fine.
Give a simple test
This patch is safe for ia64.
Thanks, I applied the patch.
--
I hav
Glauber Costa wrote:
If we're not gonna do anything (case in which failure is already
reported), we do not need to even bother with calculating the linear rip.
This is a nitpick, but I saw it while doing some testing, so here's
the patch.
Applied, thanks.
--
I have a truly marvellous patc
Dave Hansen wrote:
On Wed, 2008-06-04 at 16:42 +0300, Avi Kivity wrote:
Dave Hansen wrote:
...
After collecting all those, I turned on CONFIG_DEBUG_HIGHMEM and the
oopses miraculously stopped. But, the guest hung (for at least 5
minutes or so) during windows bootup, pegging my host
Marcelo Tosatti wrote:
Perhaps kvm-userspace should check for kernel version and disable
hugetlb backed memory. Nasty.
That means if a distro fixed this bug, then it would still suffer. I
don't think we can test for this? Otherwise I see no choice but a
version check.
--
I have a trul
Bugs item #1985977, was opened at 2008-06-06 05:42
Message generated for change (Comment added) made by avik
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1985977&group_id=180599
Please note that this message will contain a full copy of the comment thre
Jerone Young wrote:
This patch is not in yet. Wanted to make sure that it doesn't fall off
the radar. Please include upstream.
Acked-by: Jerone Young <[EMAIL PROTECTED]>
Thanks for the reminder. Patch applied.
--
I have a truly marvellous patch that fixes the bug which this
signature is t
Sukanto Ghosh wrote:
But I want to confirm whether a shadowed guest page refers to "the
guest PT page that has a corresponding shadow PT page. And the
corresponding shadow PT page is called the shadow of the former. Am I
right ?
Yes.
--
I have a truly marvellous patch that fixes the bug w
Martin Michlmayr wrote:
I was reading email in my kvm instance when suddenly it was terminated
and my whole laptop locked-up hard. I saw "unhandled vm exit:
0x8021 vcpu_id0" and a bunch of register info that can be found at
http://www.cyrius.com/tmp/kvm.jpg
Does this give any information wh
Am Donnerstag, 12. Juni 2008 schrieb Oliver Paukstadt:
> On Thu, 2008-06-12 at 00:14 +0200, Christian Borntraeger wrote:
>
> > Ok, I got an idea.
> > Does that patch fix the handle_should_not_happen PANIC?
> >
> Patch does not fit, because my code contains
> vcpu->arch.sie_block->gmsor = 0x0
On Wed, Jun 11, 2008 at 4:04 PM, Freddie Cash <[EMAIL PROTECTED]> wrote:
> On Wed, Jun 11, 2008 at 3:52 PM, Freddie Cash <[EMAIL PROTECTED]> wrote:
>> For everyone's viewing (and critiquing, I guess) pleasure, I present
>> my version of a kvmctl script.
> [snip]
>> It's released under the BSD Licen
Alexander Graf wrote:
> On Jun 10, 2008, at 12:57 AM, Xu, Anthony wrote:
>
>> Thanks for comments
>>
>> Basically we are on the same page, while I didn't find your patch
>> about irq assignment, can you post it in this thread again, thx?
>
> I'll attach it to this mail.
This patch is stilling us
Marcelo Tosatti wrote:
> On Wed, Jun 11, 2008 at 07:24:09AM -0700, Alexander Graf wrote:
>>
>> On Jun 10, 2008, at 12:57 AM, Xu, Anthony wrote:
>>
>>> Thanks for comments
>>>
>>> Basically we are on the same page, while I didn't find your patch
>>> about irq assignment, can you post it in this t
These patches fix up the build system in the /user dircectory so that other
archs (besides x86) can build the kvm-trace tool.
Signed-off-by: Jerone Young <[EMAIL PROTECTED]>
3 files changed, 3 insertions(+), 2 deletions(-)
user/Makefile |2 ++
user/config-powerpc.mak|2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
user/config-powerpc.mak |2 +-
Patch adds kvmtrace to standard build in /user diretory for powerpc.
Signed-off-by: Jerone Young <[EMAIL PROTECTED]>
diff --git a/user/config-powerpc.mak b/user/config-powerpc.mak
--- a/user/config-powerpc.mak
+++ b
2 files changed, 2 insertions(+), 1 deletion(-)
user/Makefile |2 ++
user/config-x86-common.mak |1 -
$(kvmtrace_objs) is defined in config-x86-common.mak. This needs to be moved to
the common Makefile so everyone can build it. Also it is just one c file as
opposed to multipl
Marcelo Tosatti wrote:
> On Tue, Jun 10, 2008 at 03:57:30PM +0800, Xu, Anthony wrote:
>> diff --git a/qemu/hw/pci.c b/qemu/hw/pci.c
>> index a23a466..df0ea33 100644
>> --- a/qemu/hw/pci.c
>> +++ b/qemu/hw/pci.c
>> @@ -548,7 +548,7 @@ static void pci_set_irq(void *opaque, int
>> irq_num, in
Avi Kivity wrote:
> Xu, Anthony wrote:
>> Thanks for comments
>>
>> Basically we are on the same page, while I didn't find your patch
>> about irq assignment, can you post it in this thread again, thx?
>> Below patch makes all PCI devices use level-trigger , active low
>> interrupt, it worked well
Hello,
2.6.26-rc5 + git://git.kernel.org/pub/scm/linux/kernel/git/avi/kvm.git
always freezes on booting with -smp 2 (kvm-69 on amd). So I re-compiled with
almost
all debug options enabled, the oops below is even without the -smp option
Starting Avahi mDNS/DNS-SD Daemon: avahi-daemon[ 26.8710
Hi all,
Thanks for your comments.
I made this new patch based on your comments
1. use bimodal _PRT, to take advantage of IOAPIC pin 16~23
the mapping is simple, slot -> (slot&7)+16 IOAPIC pin,
someone may provide good mapping ?
2. use ISA-bridge configure space 0x64 byte as a communica
Bugs item #1935481, was opened at 2008-04-05 11:37
Message generated for change (Comment added) made by nilaab
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1935481&group_id=180599
Please note that this message will contain a full copy of the comment th
Xu, Anthony wrote:
Hi all,
Thanks for your comments.
I made this new patch based on your comments
1. use bimodal _PRT, to take advantage of IOAPIC pin 16~23
the mapping is simple, slot -> (slot&7)+16 IOAPIC pin,
someone may provide good mapping ?
I think it's fine. If we find a
On Thu, 2008-06-12 at 16:14 +0200, Christian Borntraeger wrote:
> Am Donnerstag, 12. Juni 2008 schrieb Oliver Paukstadt:
> > PID hash table entries: 256 (order: 8, 2048 bytes)
> > console [hvc0] enabled
> > sclp vt220 tty driver: could not register vt220 - sclp_register returned
> > -5
> > list_del
Avi Kivity wrote:
> Xu, Anthony wrote:
>> Hi all,
>> Thanks for your comments.
>>
>> I made this new patch based on your comments
>>
>> 1. use bimodal _PRT, to take advantage of IOAPIC pin 16~23
>> the mapping is simple, slot -> (slot&7)+16 IOAPIC pin,
>> someone may provide good mapping
Hi All,
This is today's KVM test result against kvm.git
c1b11ebee6bda13878562b894ee811141dd06198 and kvm-userspace.git
8841cf174d3d13982c40e91800ef44e25756221e.
Nightly failed cases are old issues: Save/restore and live migration
still failed, reboot guest will meet guest crash. There's no new
Date: 2008-06-12 16:26
Message:
Logged In: YES
user_id=539971
Originator: NO
Okay, I reverted the patch.
Avi,
The issue still exists on our nightly testing machine even after
reverted the pmode transition patch.
I might make a mistake in the testing for your patch.
I am sorry about th
Hi Avi and all
This is the revised one,
All PCI devices send interrupt to both PIC and IOAPIC,
a). When PIC is enabled and IOAPIC is disabled, all redirect entries in
IOAPIC are masked.
B) When PIC is disabled and IPAPIC is enabled, link entry bit7 is set,
means this link entry is disable.
Gue
44 matches
Mail list logo