From: Martin Vogt [EMAIL PROTECTED]
Need to use hrtime_start_p, not hrtimer_start which may not be available.
Signed-off-by: Martin Vogt [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
diff --git a/kernel/external-module-compat-comm.h
b/kernel/external-module-compat-comm.h
index
From: Avi Kivity [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
diff --git a/qemu/target-i386/helper.c b/qemu/target-i386/helper.c
index 51f571c..a18dd20 100644
--- a/qemu/target-i386/helper.c
+++ b/qemu/target-i386/helper.c
@@ -1468,7 +1468,7 @@ void cpu_x86_cpuid(CPUX86State
From: Avi Kivity [EMAIL PROTECTED]
Conflicts:
arch/x86/kvm/vmx.c
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
--
To unsubscribe from this list: send the line unsubscribe kvm-commits in
the body of a message to [EMAIL PROTECTED]
More majordomo info at
From: Jes Sorensen [EMAIL PROTECTED]
Protect calls to kvm_arch_do_ioperm() introduced in
6cb7f4d86438f56a5c917ff6148c70bd237ee0e5 with
#ifdef USE_KVM_DEVICE_ASSIGNMENT similar to how the other calls to
this function are protected.
Signed-off-by: Jes Sorensen [EMAIL PROTECTED]
Signed-off-by: Avi
From: Jes Sorensen [EMAIL PROTECTED]
Signed-off-by: Jes Sorensen [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
diff --git a/libkvm/kvm-common.h b/libkvm/kvm-common.h
index 4aeed18..da56e22 100644
--- a/libkvm/kvm-common.h
+++ b/libkvm/kvm-common.h
@@ -18,13 +18,16 @@
/* FIXME:
From: Hollis Blanchard [EMAIL PROTECTED]
We have an accessor; might as well use it.
Signed-off-by: Hollis Blanchard [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
diff --git a/arch/powerpc/kvm/44x_tlb.c b/arch/powerpc/kvm/44x_tlb.c
index 0286463..de6893e 100644
---
From: Hollis Blanchard [EMAIL PROTECTED]
Bare metal Linux on 440 can overmap RAM in the kernel linear map, so that it
can use large (256MB) mappings even if memory isn't a multiple of 256MB. To
prevent the hardware prefetcher from loading from an invalid physical address
through that mapping,
Bugs item #2275173, was opened at 2008-11-13 17:36
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2275173group_id=180599
Please note that this message will contain a full copy of
On Sat, Nov 08, 2008 at 02:48:25AM +0800, Greg KH wrote:
On Fri, Nov 07, 2008 at 11:17:40PM +0800, Yu Zhao wrote:
While we are arguing what the software model the SR-IOV should be, let me
ask two simple questions first:
1, What does the SR-IOV looks like?
2, Why do we need to support
Signed-off-by: Gleb Natapov [EMAIL PROTECTED]
diff --git a/qemu/qemu-kvm.c b/qemu/qemu-kvm.c
index 9a5a1b6..80c29a3 100644
--- a/qemu/qemu-kvm.c
+++ b/qemu/qemu-kvm.c
@@ -454,9 +454,11 @@ static void *ap_main_loop(void *_env)
kvm_create_vcpu(kvm_context, env-cpu_index);
Hello,
I'm running kvm-79 on SLES 10, which has a 2.6.16.
I see simple hangs (nothing happens anymore) in my kvm-virtual machine.
I never have these hangs on 2.6.27.
The hangs seem to be related to qcow2 images on local and on NFS disks.
When I uses iscsi as disk the hangs do not occur.
(At
The current alias ioctl allows for the creation of
an alias covering a gpa that already exists. It is invalid,
because the gpa space needs to be uniquely mapped. So, if
there's a memory slot covering gpa range 0x123000 to 0x124000,
and we create an alias from any gpa within that range to a
Glauber Costa wrote:
The current alias ioctl allows for the creation of
an alias covering a gpa that already exists. It is invalid,
because the gpa space needs to be uniquely mapped. So, if
there's a memory slot covering gpa range 0x123000 to 0x124000,
and we create an alias from any gpa within
Sheng Yang wrote:
userspace_addr should be a meaningless value.
Perhaps in __kvm_set_memory_region(), if !user_alloc?
Why is it needed? Did you observe any problem?
@@ -2022,6 +2022,8 @@ static int alloc_apic_access_page(struct kvm *kvm)
kvm_userspace_mem.flags = 0;
Dear kvm users/developpers,
I have a problem here where the network interface of a guest hang
2 or 3 times a day. No more packets can be sent out or received, no
error in guest or host logs. I have to stop networking, remove module,
then modprobe again and start the network to get back
On Thu, Nov 13, 2008 at 01:27:09PM +0100, Emmanuel Lacour wrote:
Dear kvm users/developpers,
I have a problem here where the network interface of a guest hang
2 or 3 times a day. No more packets can be sent out or received, no
error in guest or host logs. I have to stop networking, remove
On Thu, Nov 13, 2008 at 01:04:05PM +, Daniel P. Berrange wrote:
Many of the KVM developers don't use libvirt, so probably best if you
post the actual KVM command line libvirt spawned - you can get it from
the logfile in /var/log/libvirt/qemu/$NAME.log, where $NAME is your
guest's name.
Avi Kivity wrote:
Zhang, Xiantao wrote:
Hi, Avi Since kener side is ready, could you apply the patch from
Jes?
Needs changes since qemu changed in this area. Please rebase.
Hi,
Here's a rebase of the CPU number patch. Builds for me.
Cheers,
Jes
Raise max number of vcpus for
On 13.11.2008, at 05:35, Amit Shah wrote:
* On Wednesday 12 Nov 2008 22:49:16 Alexander Graf wrote:
On 12.11.2008, at 17:52, Amit Shah wrote:
Hi Alex,
* On Wednesday 12 Nov 2008 21:09:43 Alexander Graf wrote:
Hi,
I was thinking a bit about cross vendor migration recently and
since
2008/11/12 Anthony Liguori [EMAIL PROTECTED]:
Unlike kqemu, KVM does not use TCG at all when accelerating QEMU. Having TCG
present is not a problem when using KVM on x86. x86 already has TCG host and
target support and it's quite convenient to be able to disable/enable KVM and
compare it to
Jes Sorensen wrote:
Here's a rebase of the CPU number patch. Builds for me.
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at
Hi,
Patch 6cb7f4d86438f56a5c917ff6148c70bd237ee0e5 introduced an
unconditional call to kvm_arch_do_ioperm() without protecting
with an #ifdef like the remaining calls are.
Cheers,
Jes
Protect calls to kvm_arch_do_ioperm() introduced in
6cb7f4d86438f56a5c917ff6148c70bd237ee0e5 with
#ifdef
Michael Tokarev wrote:
Somewhere between kvm-75 and kvm-78, the
mentioned commands has been slowed down
to insane levels. By insane I mean to
take about 10 minutes(!) to save/load a
128MB RAM/1GB HDD VM's state. It used
to require several seconds for much larger
VMs...
Here's a typical
On Thu, 13 Nov 2008 12:38:07 +0200
Izik Eidus [EMAIL PROTECTED] wrote:
If KSM pages are on radix-tree, it will be accounted automatically.
Now, we have Unevictable LRU and mlocked() pages are smartly isolated
into its
own LRU. So, just doing
- inode's radix-tree
- make all pages
ציטוט KAMEZAWA Hiroyuki:
Thank you for answers.
On Wed, 12 Nov 2008 13:11:12 +0200
Izik Eidus [EMAIL PROTECTED] wrote:
Avi Kivity wrote:
KAMEZAWA Hiroyuki wrote:
Can I make a question ? (I'm working for memory cgroup.)
Now, we do charge to anonymous page when
- charge(+1)
Anthony Liguori wrote:
I wonder if patching is an option?
You would need to patch the syscall/sysenter and sysret/sysexit sites,
as well as the kernel entry points, since the calling conventions are
dissimilar. Finding a place to put the stubs would be difficult, at best.
--
error
Alexander Graf wrote:
I wonder if patching is an option?
Windows does have background daemons that check code in runtime and
compares that to checksums. So binary patching might break Windows
pretty easily. I'm really wondering why the CR8 patching still works -
maybe even that'll break
On Thu, 2008-11-13 at 13:27 +0100, Emmanuel Lacour wrote:
Dear kvm users/developpers,
I have a problem here where the network interface of a guest hang
2 or 3 times a day. No more packets can be sent out or received, no
error in guest or host logs. I have to stop networking, remove module,
Zhang, Xiantao wrote:
From 138335ed8c52e775a267a91086e580f86dd5b047 Mon Sep 17 00:00:00 2001
From: Xiantao Zhang [EMAIL PROTECTED]
Date: Thu, 13 Nov 2008 15:23:31 +0800
Subject: [PATCH] KVM: Qemu: Sync compiler.h from kernel source when do make
sync.
In some OS distros, there is no compiler.h
Avi Kivity wrote:
Jes Sorensen wrote:
That's a little ugly -- passing two arguments which describe the
vcpu. How about passing env to kvm_create_vcpu() instead?
I am all in favor of doing this, but in order to do so, we have to
teach libkvm about CPUState - are you ok with that?
No, libkvm
Hi,
This is a new spin of the series to disable vmx on kdump and on
emergency_restart. Now we avoid doing the function pointer stuff by
moving 4 small KVM functions to a header, as inline functions. The code
looks much simpler now, but we have to be more careful because some
additional code will
Use a trick to keep the printk()s on has_svm() working as before. gcc
will take care of not generating code for the 'msg' stuff when the
function is called with a NULL msg argument.
Signed-off-by: Eduardo Habkost [EMAIL PROTECTED]
---
arch/x86/include/asm/virtext.h | 33
It will be used by core code on kdump and reboot, to disable
vmx if needed.
Signed-off-by: Eduardo Habkost [EMAIL PROTECTED]
---
arch/x86/include/asm/virtext.h | 31 +++
arch/x86/kvm/vmx.c |4 ++--
2 files changed, 33 insertions(+), 2 deletions(-)
Signed-off-by: Eduardo Habkost [EMAIL PROTECTED]
---
arch/x86/include/asm/virtext.h | 14 ++
arch/x86/kvm/svm.h | 12 +++-
2 files changed, 17 insertions(+), 9 deletions(-)
diff --git a/arch/x86/include/asm/virtext.h b/arch/x86/include/asm/virtext.h
index
On emergency_restart, we may need to use an NMI to disable virtualization
on all CPUs. We do that using nmi_shootdown_cpus() if VMX is enabled.
Finding a proper point to hook the nmi_shootdown_cpus() call isn't
trivial, as the non-emergency machine_restart() (that doesn't need the
NMI tricks)
Create cpu_svm_disable() function.
Signed-off-by: Eduardo Habkost [EMAIL PROTECTED]
---
arch/x86/include/asm/virtext.h | 14 ++
arch/x86/kvm/svm.c |6 +-
2 files changed, 15 insertions(+), 5 deletions(-)
diff --git a/arch/x86/include/asm/virtext.h
Along with some comments on why it is different from the core cpu_vmxoff()
function.
Signed-off-by: Eduardo Habkost [EMAIL PROTECTED]
---
arch/x86/kvm/vmx.c | 13 +++--
1 files changed, 11 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index
Move the definitions so they can be used by non-kvm code.
Signed-off-by: Eduardo Habkost [EMAIL PROTECTED]
---
arch/x86/include/asm/kvm_host.h | 14 ++
arch/x86/include/asm/virtext.h | 17 +
2 files changed, 19 insertions(+), 12 deletions(-)
diff --git
This function can be used by the reboot or kdump code to forcibly
disable SVM on the CPU.
Signed-off-by: Eduardo Habkost [EMAIL PROTECTED]
---
arch/x86/include/asm/virtext.h |8
1 files changed, 8 insertions(+), 0 deletions(-)
diff --git a/arch/x86/include/asm/virtext.h
We need to disable virtualization extensions on all CPUs before booting
the kdump kernel, otherwise the kdump kernel booting will fail, and
rebooting after the kdump kernel did its task may also fail.
We do it using cpu_emergency_vmxoff() and cpu_emergency_svm_disable(),
that should always work,
Unfortunately we can't use exactly the same code from vmx
hardware_disable(), because the KVM function uses the
__kvm_handle_fault_on_reboot() tricks.
Signed-off-by: Eduardo Habkost [EMAIL PROTECTED]
---
arch/x86/include/asm/virtext.h | 13 +
1 files changed, 13 insertions(+), 0
Michael Tokarev wrote:
A question that I asked on irc many times,
but got no answer..
Giving guest linux with CONFIG_KVM_TIME set,
is it necessary to run ntpd in it for accurate
time, or ntpd on host is sufficient?
And the same, but without CONFIG_KVM_TIME ?
What was your experience when you
2008/11/13 Emmanuel Lacour [EMAIL PROTECTED]:
Dear kvm users/developpers,
I have a problem here where the network interface of a guest hang
2 or 3 times a day. No more packets can be sent out or received, no
error in guest or host logs. I have to stop networking, remove module,
then modprobe
On Thu, 2008-11-13 at 08:44 +1030, Rusty Russell wrote:
Note that I still don't have a balloon patch: want to send me one?
linux: virtio-balloon: avoid implicit use of Linux page size in balloon
interface
Make the balloon interface always use 4K pages, and convert Linux pfns if
necessary.
On Thu, 2008-11-13 at 08:44 +1030, Rusty Russell wrote:
Note that I still don't have a balloon patch: want to send me one?
qemu: virtio-balloon: don't use TARGET_PAGE_BITS in balloon interface
Make the balloon interface always use 4K pages.
Signed-off-by: Hollis Blanchard [EMAIL PROTECTED]
Amit Shah wrote:
* On Thursday 13 Nov 2008 00:46:55 Kai Meyer wrote:
When I heard that kvm had pci-passthrough working for network cards, I
thought I'd make an attempt to get my nVidia 8600GT video card to work
in a Windows VM (thus satisfying my desire to quit dual booting, so I
can play my
On Wed, Oct 22, 2008 at 04:40:41PM +0800, Yu Zhao wrote:
This patch moves all definitions of the PCI resource names to an 'enum',
and also replaces some hard-coded resource variables with symbol
names. This change eases introduction of device specific resources.
Cc: Alex Chiang [EMAIL
On Thu, Nov 13, 2008 at 02:50:24PM +0800, Yu Zhao wrote:
On Fri, Nov 07, 2008 at 11:18:37AM +0800, Greg KH wrote:
On Fri, Nov 07, 2008 at 11:01:29AM +0800, Zhao, Yu wrote:
Greg KH wrote:
On Wed, Nov 05, 2008 at 08:33:18PM -0800, Greg KH wrote:
On Wed, Oct 22, 2008 at 04:45:15PM +0800,
Avi Kivity wrote:
Zhang, Xiantao wrote:
From 138335ed8c52e775a267a91086e580f86dd5b047 Mon Sep 17 00:00:00
2001
From: Xiantao Zhang [EMAIL PROTECTED]
Date: Thu, 13 Nov 2008 15:23:31 +0800
Subject: [PATCH] KVM: Qemu: Sync compiler.h from kernel source when
do make sync.
In some OS
On Friday 14 November 2008 08:18:33 Hollis Blanchard wrote:
On Thu, 2008-11-13 at 08:44 +1030, Rusty Russell wrote:
Note that I still don't have a balloon patch: want to send me one?
linux: virtio-balloon: avoid implicit use of Linux page size in balloon
interface
Thanks, applied with
I see that the last post about Vista was exactly a month ago,
and nothing since then. I've tried installing Vista using
today's kvm.git on both 32-bit and 64-bit linux machines and
failed both times, but with very different results.
The common denominator between 64-bit and 32-bit linux seems
On Thursday 13 November 2008 20:27:13 Avi Kivity wrote:
Sheng Yang wrote:
userspace_addr should be a meaningless value.
Perhaps in __kvm_set_memory_region(), if !user_alloc?
Why is it needed? Did you observe any problem?
A potential issue is kvm_userspace_mem.userspace_addr don't have
Hi Alex
Hope your tooth op went smoothly.
Did u get a chance to put up your new version of the nested KVM patch ?
I am on KVM-70... can u tell me in bit more details on how I can go about
getting your patches and Joerg's patch applied.
-- What versions of KVM are these patches expected
andrzej zaborowski wrote:
2008/11/13 Anthony Liguori [EMAIL PROTECTED]:
andrzej zaborowski wrote:
Is this going a bit in the opposite direction to where QEMUAccel is
going? What Fabrice suggests seems to be like QEMUAccel, with TCG
treated as another accelerator.
QEMUAccel is
2008/11/13 Anthony Liguori [EMAIL PROTECTED]:
andrzej zaborowski wrote:
Is this going a bit in the opposite direction to where QEMUAccel is
going? What Fabrice suggests seems to be like QEMUAccel, with TCG
treated as another accelerator.
QEMUAccel is a bit orthogonal to what I'm talking
Anthony Liguori wrote:
Unlike kqemu, KVM does not use TCG at all when accelerating QEMU. Having TCG
present is not a problem when using KVM on x86. x86 already has TCG host and
target support and it's quite convenient to be able to disable/enable KVM and
compare it to TCG when debugging.
I
Hollis Blanchard wrote:
Hi Avi, these patches fix some minor PowerPC kernel issues, including a nasty
MMU bug that was exposed by 64K pages on the host, but could also affect 4K
pages.
Please apply.
Applied all, thanks.
--
error compiling committee.c: too many arguments to function
--
To
On Thu, 2008-11-13 at 08:44 +1030, Rusty Russell wrote:
Note that I still don't have a balloon patch: want to send me one?
linux: virtio-balloon: avoid implicit use of Linux page size in balloon
interface
Make the balloon interface always use 4K pages, and convert Linux pfns if
necessary.
On Thu, 2008-11-13 at 08:44 +1030, Rusty Russell wrote:
Note that I still don't have a balloon patch: want to send me one?
qemu: virtio-balloon: don't use TARGET_PAGE_BITS in balloon interface
Make the balloon interface always use 4K pages.
Signed-off-by: Hollis Blanchard [EMAIL PROTECTED]
On Friday 14 November 2008 08:18:33 Hollis Blanchard wrote:
On Thu, 2008-11-13 at 08:44 +1030, Rusty Russell wrote:
Note that I still don't have a balloon patch: want to send me one?
linux: virtio-balloon: avoid implicit use of Linux page size in balloon
interface
Thanks, applied with
60 matches
Mail list logo