Bugs item #2260759, was opened at 2008-11-10 23:14
Message generated for change (Settings changed) made by jiajun
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=2260759&group_id=180599
Please note that this message will contain a full copy of the comment
Avi Kivity wrote:
> >>>But does the fact KVM doesn't use TCG prevent KVM from running some
> >>>x86 modes correctly? E.g. I gather 16-bit code is run by KVM using
> >>>VM86 mode, which is not exactly correct. It would be nice to have KVM
> >>>acceleration but also complete and correct emulation,
On Sunday 16 November 2008 07:27:48 am you wrote:
> In theory, CONFIG_KVM_CLOCK should avoid the need for ntp. Let us know
> if you get different results.
I've been running a VM for a couple of days with a 2.6.27 kernel and
CONFIG_KVM_CLOCK and the clock is synchronized. Is there a driver we co
this macro allow setting the pte in the shadow page tables directly
instead of flushing the shadow page table entry and then get vmexit in
order to set it.
This function is optimzation for kvm/users of mmu_notifiers for COW
pages, it is useful for kvm when ksm is used beacuse it allow kvm
not to h
Ksm is driver that allow merging identical pages between one or more
applications in way unvisible to the application that use it.
Pages that are merged are marked as readonly and are COWed when any
application try to change them.
Ksm is used for cases where using fork() is not suitable,
one of th
replace_page() allow changing the mapping of pte from one physical page
into diffrent physical page.
This function is working by removing oldpage from the rmap and calling
put_page on it, and by setting the pte to point into newpage and by
inserting it to the rmap using page_add_file_rmap().
Note
this patch add new function called page_wrprotect(),
page_wrprotect() is used to take a page and mark all the pte that
point into it as readonly.
The function is working by walking the rmap of the page, and setting
each pte realted to the page as readonly.
The odirect_sync parameter is used to pr
(From v1 to v2 the main change is much more documentation)
KSM is a linux driver that allows dynamicly sharing identical memory
pages between one or more processes.
Unlike tradtional page sharing that is made at the allocation of the
memory, ksm do it dynamicly after the memory was created.
Memor
Attached. Thanks!
>From 0175b35b388b3d1a8df82bdab200a8d8d00bab3d Mon Sep 17 00:00:00 2001
From: Xiantao Zhang <[EMAIL PROTECTED]>
Date: Mon, 17 Nov 2008 09:58:53 +0800
Subject: [PATCH] KVM: External Module: Remove the inclusion for
Some OSes lack of for applications,
so removes it from kernel
Avi Kivity wrote:
Anthony Liguori wrote:
I don't think it's established that PV/VF will have less latency than
using virtio-net. virtio-net requires a world switch to send a group
of packets. The cost of this (if it stays in kernel) is only a few
thousand cycles on the most modern processors
After I submitted the initial question, I downloaded the latest kernel
2.6.27.6, and compiled
with the following options, some of which are new since my previous
kernel 2.6.24-21.
CONFIG_PARAVIRT_GUEST=y
CONFIG_XEN_SAVE_RESTORE=y
CONFIG_VMI=y
CONFIG_KVM_CLOCK=y
CONFIG_KVM_GUEST=y
# CONFIG_LGUES
Oops,
I was wrong, -no-kvm does boot and runs cleanly (It's just insanely slow). The
other configurations the guests still eventually hang.
Any advice would be much appreciated.
Thanks,
Chris
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL
Farkas Levente wrote:
There is the maint/ series on git.kernel.org. It doesn't have formal
releases though.
do you plan any formal release? and it'd be nice to see the relationship
between the current devel tree and the stable tree to eg. last stable
0.5 current devel 0.78.
The key t
Bill Rieske wrote:
Instead of this, can you add an snprintf() (in a separate patch) and use
it? There's already a vsnprintf() so all the heavy machinery is in place.
Nice catch much cleaner
The field within the Memory Device type 17 is only a word with the MSB being
used to report MB/KB.
Daire Byrne wrote:
Is direct kernel booting just not really supported properly or is it just to do
with Qemu forgetting about the direct boot kernel/initrd after a reboot?
Direct kernel booting is supported. Please try with -no-kvm to see if
it is a qemu or kvm issue, and also try the lat
Anthony Liguori wrote:
I don't think it's established that PV/VF will have less latency than
using virtio-net. virtio-net requires a world switch to send a group
of packets. The cost of this (if it stays in kernel) is only a few
thousand cycles on the most modern processors.
Using VT-d mean
Avi Kivity wrote:
> Jan Kiszka wrote:
>>> The complexity, as shown by the decision tree, is exploding, however.
>>>
>>
>> Yes, I had the same impression while gluing the fix together. And I also
>> wondered how things may look like for SVM once we support NMIs there as
>> well. However, I didn
Andi Kleen wrote:
Yes, but since we're emulating a CPU anyways we don't want vendor
specific setup, since we might live migrate.
I was mainly thinking of tuning.
For example Linux selects the best suitable page copy
function based on vendor information. Using the wrong page copy
can have
Jan Kiszka wrote:
The complexity, as shown by the decision tree, is exploding, however.
Yes, I had the same impression while gluing the fix together. And I also
wondered how things may look like for SVM once we support NMIs there as
well. However, I didn't want to add a new regression sour
Glauber Costa wrote:
We can possibly do it a little bit better by emulating in the guest directly.
So the deal would be emulation both in the host and the guest. If the
guest have it,
fine. Otherwise, we use host emulation, that is slower, but works.
If the guest is modifiable, this is easy.
Avi Kivity wrote:
> Jan Kiszka wrote:
>> This patch addresses item #2215532 in the kvm bug tracker, but was
>> finally also visible with other Linux guests that use the NMI watchdog:
>>
>> There is a subtle race in kvm-intel between a pending IRQ and a briefly
>> later arriving NMI (e.g. from the w
Xu, Jiajun wrote:
1. 32bits Rhel5/FC6 guest may fail to reboot after installation
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1991647&group_id=180599
I just committed a fix (by Jan Kiszka) for this (888cc6 in
kvm-userspace.git).
2. failure to migrate guests with more th
Marcos Pinto wrote:
i'm trying to run vista-64 on a linux 2.6.27 x86_64 host with kvm-77
on Intel(R) Core(TM)2 Duo CPU E8500. -no-kvm-irqchip and -no-kvm-pit
make no difference.
interestingly enough, the installer worked perfectly. after
installing, though, it wont run.
I just installed and
Hi All,
This is our Weekly KVM Testing Report against lastest kvm.git
0ccca08a27f00fdb483c20dc3734fde7a179cb48 and kvm-userspace.git
f81ca32c51db6edc556eb2eb5ad35db09d379a22.
There is no new issue found this week, one old issue is fixed by Yang Sheng.
Fixed issue:
Michael Tokarev wrote:
A question that I asked on irc many times,
but got no answer..
Giving guest linux with CONFIG_KVM_TIME set,
is it necessary to run ntpd in it for accurate
time, or ntpd on host is sufficient?
And the same, but without CONFIG_KVM_TIME ?
In theory, CONFIG_KVM_CLOCK sho
Randy Broman wrote:
-I've tried both the default Cirrus adapter and the "-std-vga" option.
Which is better?
Cirrus is generally better, but supports fewer resolutions.
I saw reference to another VMware-based adapter, but I can't figure
out how to implement
it - would that be better?
-vg
Avi Kivity wrote:
> Jan Kiszka wrote:
>> Jan Kiszka wrote:
>>
>>> Hi Avi,
>>>
>>> I've a problem with the last qemu-cvs merge into kvm-userspace: Booting
>>> the RHEL kernel 2.6.18-53.el5 in with more than one VCPU gives me
>>>
>>> Modules linked in:
>>> Pid: 0, comm: swapper Not tainted 2.6.18-5
Kamble, Nitin A wrote:
The capability itself can return the count; for example
case KVM_CAP_NR_CPUID_LEAVES:
return KVM_MAX_CPUID_ENTRIES;
which is simpler to use and shorter.
Avi,
Yes, it is simpler and shorter, but is returning a constant. It will be
wasting space for the unu
Jamie Lokier wrote:
Avi Kivity wrote:
Jamie Lokier wrote:
But does the fact KVM doesn't use TCG prevent KVM from running some
x86 modes correctly? E.g. I gather 16-bit code is run by KVM using
VM86 mode, which is not exactly correct. It would be nice to have KVM
acceleration but also
Martin Vogt wrote:
Hello,
I'm running kvm-79 on SLES 10, which has a 2.6.16.
I see simple hangs (nothing happens anymore) in my kvm-virtual machine.
I never have these hangs on 2.6.27.
The hangs seem to be related to qcow2 images on local and on NFS disks.
When I uses iscsi as disk the hangs do
Louis-David Mitterrand wrote:
Hi,
On a brand new Sony Vaio (VGN-FW21Z) VT is disabled and there is no bios
option to enable it (on my Dell XPS laptop thankfully one can enable VT
in the bios).
Can Sony's stupidity (or should I say my own stupidity for purchasing
from that brand) be worked aroun
Jan Kiszka wrote:
Jan Kiszka wrote:
Hi Avi,
I've a problem with the last qemu-cvs merge into kvm-userspace: Booting
the RHEL kernel 2.6.18-53.el5 in with more than one VCPU gives me
Modules linked in:
Pid: 0, comm: swapper Not tainted 2.6.18-53.el5 #1
RIP: 0010:[] [] write_rdtscp_cb+0xa/0x
Jan Kiszka wrote:
This patch addresses item #2215532 in the kvm bug tracker, but was
finally also visible with other Linux guests that use the NMI watchdog:
There is a subtle race in kvm-intel between a pending IRQ and a briefly
later arriving NMI (e.g. from the watchdog). If the IRQ was injecte
Jan Kiszka wrote:
Transfer ioapic state to the in-kernel implementation on reset, fixing a
systematic reboot issue of 2.6.18 RHEL/CentOS kernels, but probably also
other, more sporadic reboot hangs (seen after Windows Vista installation
e.g.).
Applied, thanks.
--
error compiling committee.
Hi,
On a brand new Sony Vaio (VGN-FW21Z) VT is disabled and there is no bios
option to enable it (on my Dell XPS laptop thankfully one can enable VT
in the bios).
Can Sony's stupidity (or should I say my own stupidity for purchasing
from that brand) be worked around to enable VT?
Apparently some
Zhang, Xiantao wrote:
I am not sure the inclusion for comiplier.h in is unnecessry when
building userspace or external module. If it is useless, maybe we can remove it in
hach. Could you confirm it ?
I think that the kernel's 'make headers-install' process strips out
compiler.h, so it s
Han, Weidong wrote:
From bba614bf2acf22f765995fb2364de04cec039226 Mon Sep 17 00:00:00 2001
From: Weidong Han <[EMAIL PROTECTED]>
Date: Fri, 14 Nov 2008 16:53:10 +0800
Subject: [PATCH] support VT-d device hotplug
wrap kvm_assign_device() and kvm_deassign_device() to support assign/deassign a
dev
37 matches
Mail list logo