On Oct 13, 2008, at 9:46 PM, Matthew Wilcox wrote:
On Tue, Oct 14, 2008 at 12:18:40PM +0800, Dong, Eddie wrote:
Matthew Wilcox wrote:
On Tue, Oct 14, 2008 at 10:14:35AM +0800, Yu Zhao wrote:
As Eddie said, we have two problems here:
1) User has to set device specific parameters of a VF
when
On Wednesday 15 October 2008 22:27:49 Jan Kiszka wrote:
> Aligning in-kernel kvm_apic_accept_pic_intr with its user space mate,
> this patch relaxes the conditions under which PIC IRQs are accepted
> by LVT0. This reflects reality and allows to reuse the service for the
> NMI watchdog use case.
>
>
Uri Lublin wrote:
That is true, but in the case I mentioned above it would take the
management tool some time (guest down time) to realize what happens,
and to send "cont" to the SRC. With end-of-migration messages SRC
discovers DST fails and immediately continues.
I agree those messages add
>From 7bba897e8f00c0d2e850e7b8f47cc491cb1f5dee Mon Sep 17 00:00:00 2001
From: Xiantao Zhang <[EMAIL PROTECTED]>
Date: Fri, 17 Oct 2008 09:07:01 +0800
Subject: [PATCH] KVM: Qemu: Define the macro CONFIG_$ARCH for building
userspace.
Currently, make sync will use unifdef to hack some header files, b
Bill Davidsen wrote:
I need a Win98SE VM to do some software testing and support.
Unfortunately KVM seems to not be able to run 98SE, although it runs a
bunch of more recent Windows versions I can't use for this. I really
don't want to support multiple VM servers, and there is pressure to go
t
I need a Win98SE VM to do some software testing and support. Unfortunately KVM
seems to not be able to run 98SE, although it runs a bunch of more recent
Windows versions I can't use for this. I really don't want to support multiple
VM servers, and there is pressure to go to VISTA and VMware.
B
Bernhard Schmidt <[EMAIL PROTECTED]> wrote:
> I have a small but annoying issue.
>
> Host:
> * AMD Athlon64
> * Debian Lenny, Kernel 2.6.26-1-amd64
> * kvm-72 (Debian package) or kvm-76 (self-built)
>
> Guest:
> * monolithic vanilla 2.6.26, KVM_GUEST and KVM_CLOCK, VIRTIO for both
> block device
Bugs item #2171940, was opened at 2008-10-16 16:59
Message generated for change (Comment added) made by lvivier
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=2171940&group_id=180599
Please note that this message will contain a full copy of the comment t
Stephen Dennis wrote:
> Hello
>
> My aim is to have a VM with 2 network interfaces, one bridged to the outside
> world and the other bridged on a private network. From the private interface
> this VM runs DHCP and PXE services to start and install VM's which have one
> network interface tapped on
Bugs item #2088475, was opened at 2008-09-02 01:37
Message generated for change (Comment added) made by jiajun
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=2088475&group_id=180599
Please note that this message will contain a full copy of the comment th
Handle INIT before SIPI.
If SIPI was issued before CPU handled INIT signal the CPU is not reseted.
Signed-off-by: Gleb Natapov <[EMAIL PROTECTED]>
diff --git a/qemu/qemu-kvm.c b/qemu/qemu-kvm.c
index 577f2b2..dae05b0 100644
--- a/qemu/qemu-kvm.c
+++ b/qemu/qemu-kvm.c
@@ -349,13 +349,20
Bugs item #2171940, was opened at 2008-10-16 16:59
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=2171940&group_id=180599
Please note that this message will contain a full copy
Bugs item #2088475, was opened at 2008-09-02 11:37
Message generated for change (Comment added) made by technologov
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=2088475&group_id=180599
Please note that this message will contain a full copy of the comme
Avi Kivity wrote:
Uri Lublin wrote:
Weren't there some acks flowing back on the old protocol to let the
source now things are fine?
There were, but there aren't now. They don't improve reliability.
Why do you think they don't improve reliability ?
The Ack/Go messages catch the scenario w
Uri Lublin wrote:
Weren't there some acks flowing back on the old protocol to let the
source now things are fine?
There were, but there aren't now. They don't improve reliability.
Why do you think they don't improve reliability ?
The Ack/Go messages catch the scenario where SRC finishes s
Anthony Liguori wrote:
Avi Kivity wrote:
Anthony Liguori wrote:
Uri Lublin wrote:
Anthony Liguori wrote:
I have already cut your text, but I don't understand the comment
about not being "full duplex". Is there a reason why migration needs
to be bidirectional? I don't think there's a fund
Avi Kivity wrote:
Anthony Liguori wrote:
Uri Lublin wrote:
Anthony Liguori wrote:
I have already cut your text, but I don't understand the comment
about not being "full duplex". Is there a reason why migration needs
to be bidirectional? I don't think there's a fundamental reason it
needs
On 15.10.2008, at 21:31, Alexander Graf wrote:
This patch adds the CPUID feature flag for SVM in the x86 Linux
headers.
Looks like the full leaf 0x8001 found its way into mainline, so
this patch is not necessary anymore.
Alex
Signed-off-by: Alexander Graf <[EMAIL PROTECTED]>
---
On 16.10.2008, at 10:58, Avi Kivity wrote:
I think this was fixed by e74bb3fa8e55284dc6fdd68aa9da833ce07a4295
("KVM: MMU: sync root on paravirt TLB flush").
Eh, yes. Sorry for the fuss - it works now.
Alex
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a mes
Anthony Liguori wrote:
Uri Lublin wrote:
Anthony Liguori wrote:
I have already cut your text, but I don't understand the comment about
not being "full duplex". Is there a reason why migration needs to be
bidirectional? I don't think there's a fundamental reason it needs to
be and I think
Veiko Kukk wrote:
Hi!
My desktop machine is HP dc5750 SFF, CPU is AMD Athlon(tm) 64 X2 Dual
Core Processor 4600+, /proc/cpuinfo lists svm flag. I'm using 2.6.27
kernel on FC9, qemu-system-x86_64 "info version" 0.9.1.
How can I be absolutely sure, that my kvm virtual machines are using
AMD-V
It needs the kernel patch I sent to mailing list yesterday.
Avi,
Could you check-in attached patch and queue it for 2.6.28? Thanks!
Xiantao
Jes Sorensen wrote:
> Hi,
>
> We can now boot upto 60 vcpus on ia64, but thats just the beginning.
> Would you please add this one to the kvm-userland tr
Anthony Liguori wrote:
But that will require refactoring a lot of these optimizations. In
order to do that right, they need to be presented on qemu-devel.
It's a whole lot easier to do that incrementally so that people can
digest it all instead of blasting a big series.
Can you elaborate?
Gleb Natapov wrote:
Similar patch was sent to bochs devel list, but I propose to apply this
patch now rather than waiting for bochs developers to apply it and then
merger.
---
Add support for new FW configuration channel to the BIOS.
Read UUID from QEMU using this channel.
Applied, thanks
Veiko Kukk wrote:
Hi!
My desktop machine is HP dc5750 SFF, CPU is AMD Athlon(tm) 64 X2 Dual
Core Processor 4600+, /proc/cpuinfo lists svm flag. I'm using 2.6.27
kernel on FC9, qemu-system-x86_64 "info version" 0.9.1.
How can I be absolutely sure, that my kvm virtual machines are using
AMD-V
Zhang, Xiantao wrote:
Attached the updated one. Thanks!
Xiantao
From 8d827b19ba03dee74edeb5e2bcc23bed7b9f38ea Mon Sep 17 00:00:00 2001
From: Xiantao Zhang <[EMAIL PROTECTED]>
Date: Thu, 16 Oct 2008 15:58:15 +0800
Subject: [PATCH] kvm/ia64: Fix halt emulation logic.
Common halt halding logic is
Hi,
We can now boot upto 60 vcpus on ia64, but thats just the beginning.
Would you please add this one to the kvm-userland tree.
Thanks,
Jes
Raise max number of vcpus for ia64 to 256.
Signed-off-by: Jes Sorensen <[EMAIL PROTECTED]>
---
libkvm/kvm-common.h | 11 +++
qemu/vl.c
Otherwise set_bit() for private memory slot(above KVM_MEMORY_SLOTS) would
corrupted memory in 32bit host.
Signed-off-by: Sheng Yang <[EMAIL PROTECTED]>
---
arch/x86/kvm/mmu.c |6 +++---
include/asm-x86/kvm_host.h |8 +---
2 files changed, 8 insertions(+), 6 deletions(-)
diff
PCI device assignment would map guest MMIO spaces as separate slot, so it is
possible that the device has more than 2 MMIO spaces and overwrite current
private memslot.
The patch move private memory slot to the top of userspace visible memory slots.
Signed-off-by: Sheng Yang <[EMAIL PROTECTED]>
-
Sheng Yang wrote:
My fault...
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Attached the updated one. Thanks!
Xiantao
>From 8d827b19ba03dee74edeb5e2bcc23bed7b9f38ea Mon Sep 17 00:00:00 2001
From: Xiantao Zhang <[EMAIL PROTECTED]>
Date: Thu, 16 Oct 2008 15:58:15 +0800
Subject: [PATCH] kvm/ia64: Fix halt emulation logic.
Common halt halding logic is changed by x86 side, th
My fault...
Signed-off-by: Sheng Yang <[EMAIL PROTECTED]>
---
Makefile |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/Makefile b/Makefile
index 6581679..64e296d 100644
--- a/Makefile
+++ b/Makefile
@@ -110,8 +110,8 @@ srpm:
clean:
for i in $(if $(WANT_MODULE),
Zhang, Xiantao wrote:
smp_call_function_single() will call the function on the current cpu
if instructed, so this change is unneeded.
Aha, Thanks for pointing this. Yes, it is unnecessary. Could you help to
remove it directly ? or need me have a resend.
Please resend, since I can't tes
Alexander Graf wrote:
Hi,
while trying to run the current openSUSE on git KVM I found that the
installation doesn't even boot properly. I bisected the problem down
to commit 641fb03992b20aa640781a245f6b7136f0b845e4, as of which udev
shows strange errors.
I reproduced the incorrect behavior
Avi Kivity wrote:
> Zhang, Xiantao wrote:
>> Hi, Avi
>> This is the key fix for 2.6.28 merge. Without this patch, guest
>> may hang once configured with more than 2 vcpus, it is because x86
>> side changed the halt handling's common logic, but it misses to
>> change ia64 side.
>>
>
>> @@ -3
On Wed, Oct 15, 2008 at 10:56:02AM -0500, Anthony Liguori wrote:
> Gleb Natapov wrote:
>> Andrew,
>>
>> On Wed, Oct 15, 2008 at 07:18:52AM -0700, Andrew Biggadike wrote:
>>
>>> Gleb Natapov <[EMAIL PROTECTED]> wrote:
>>>
> Of course, you should also take a look at VMware's VMCI. If we'
Zhang, Xiantao wrote:
Hi, Avi
This is the key fix for 2.6.28 merge. Without this patch, guest
may hang once configured with more than 2 vcpus, it is because x86 side
changed the halt handling's common logic, but it misses to change ia64
side.
@@ -398,8 +400,11 @@ static int handle_global
Amit Shah wrote:
+#define KVM_USERSPACE_IRQ_SOURCE_ID1 << 0
+
This is dangerous, if used in an expression together with a higher
precedence operator. I fixed it and applied. Thanks to all involved.
Thanks; however, Sheng suggested we should use set_bit to set the
correspon
Sheng Yang wrote:
+#define KVM_USERSPACE_IRQ_SOURCE_ID1 << 0
+
This is dangerous, if used in an expression together with a higher
precedence operator. I fixed it and applied. Thanks to all involved.
Wait a minute
I think I reserved source id 0 to userspace, rather than
On Thursday 16 October 2008 16:26:07 Avi Kivity wrote:
> Yang, Sheng wrote:
> > I've found the reason... It's because that kvm_mmu_page->slot_bitmap is
> > unsigned long, and if use KVM_MEMORY_SLOTS + xxx, it would beyond 32 in
> > pae, then memory corrupted.
> >
> > But reduce supported memory slo
On Wed, Oct 15, 2008 at 09:02:30AM -0500, Anthony Liguori wrote:
>>> like struct sockaddr_un. As long as the strings were unique, they
>>> could be in whatever format people wanted.
>>>
>>>
>> So basically what you are saying is that you want to use string IDs instead
>> of
>> numerical ID
* On Thursday 16 Oct 2008 13:51:38 Avi Kivity wrote:
> Zhang, Xiantao wrote:
> > Forget to modify the from item generated automatically by git. Modified
> > to Sheng Yang <[EMAIL PROTECTED]> :)
> > Xiantao
> >
> > From c0d1ad6327c01ba0584922022bef48c971bbf18a Mon Sep 17 00:00:00 2001
> > From: Sh
On Thursday 16 October 2008 16:21:38 Avi Kivity wrote:
> Zhang, Xiantao wrote:
> > Forget to modify the from item generated automatically by git. Modified
> > to Sheng Yang <[EMAIL PROTECTED]> :)
> > Xiantao
> >
> > From c0d1ad6327c01ba0584922022bef48c971bbf18a Mon Sep 17 00:00:00 2001
> > From:
Avi Kivity wrote:
> Zhang, Xiantao wrote:
>> Hi, Avi
>> Please apply this urgent fix for 2.6.28 merge. Thanks!
>>
>
> Applied, and will queue for 2.6.28. Is it needed for 2.6.26 and .27?
> If not, why not?
It should be an issue here, and also needs for 2.6.26 and 27. For
end-users, it shou
Zhang, Xiantao wrote:
Hi, Avi
Please apply this urgent fix for 2.6.28 merge. Thanks!
Applied, and will queue for 2.6.28. Is it needed for 2.6.26 and .27?
If not, why not?
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line "un
Yang, Sheng wrote:
I've found the reason... It's because that kvm_mmu_page->slot_bitmap is
unsigned long, and if use KVM_MEMORY_SLOTS + xxx, it would beyond 32 in pae,
then memory corrupted.
But reduce supported memory slot number to 28 or extend slot_bitmap, or other
methods? Slot_bitmap hav
Zhang, Xiantao wrote:
Forget to modify the from item generated automatically by git. Modified
to Sheng Yang <[EMAIL PROTECTED]> :)
Xiantao
From c0d1ad6327c01ba0584922022bef48c971bbf18a Mon Sep 17 00:00:00 2001
From: Sheng Yang <[EMAIL PROTECTED]>
Date: Wed, 15 Oct 2008 20:15:06 +0800
Subject:
Anthony Liguori wrote:
Yeah, I tried to implement the read/write mode buffer and it ends up
not to work very nicely. I don't remember the precise issue, but I
hit some sort of wall that I thought was a fundamental limitation. I
ended up forcing the QEMUFile to be in either read or write mod
Anthony Liguori wrote:
Uri Lublin wrote:
Anthony Liguori wrote:
I have already cut your text, but I don't understand the comment about
not being "full duplex". Is there a reason why migration needs to be
bidirectional? I don't think there's a fundamental reason it needs to
be and I think
49 matches
Mail list logo