From: Avi Kivity a...@redhat.com
typo, missing zero.
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/qemu/qemu-kvm.c b/qemu/qemu-kvm.c
index 121873e..c5a5880 100644
--- a/qemu/qemu-kvm.c
+++ b/qemu/qemu-kvm.c
@@ -803,7 +803,7 @@ static int must_use_aliases_target(target_phys_addr_t addr)
From: Jan Kiszka jan.kis...@siemens.com
Adopt to new KVM_CAP_USER_NMI interface for injecting NMIs from qemu
user space. As this capability is only provided on archs actually
requiring it, we can also drop a lot of empty arch stubs.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
Signed-off-by:
From: Mark McLoughlin mar...@redhat.com
Fixes an oops in the bounce buffer malloc in virtqueue_pop()
I have seen twice so far. We still need to track this down,
but it's very hard to reproduce.
Signed-off-by: Mark McLoughlin mar...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git
From: Jan Kiszka jan.kis...@siemens.com
There is no point in doing the ready_for_nmi_injection/
request_nmi_window dance with user space. First, we don't do this for
in-kernel irqchip anyway, while the code path is the same as for user
space irqchip mode. And second, there is nothing to loose if
From: Christian Ehrhardt ehrha...@linux.vnet.ibm.com
The configure script is missing the target/host cpu sync for powerpc kvm.
Signed-off-by: Christian Ehrhardt ehrha...@linux.vnet.ibm.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/qemu/configure b/qemu/configure
index
From: root r...@vti-demo.(none)
Since ia64 use 64K page size by default and each bank memory only
has 32K size , so VGA optimization for legacy mmio range 0xa-0xc
doesn't work. Comment out the code for ia64.
Before adding the dirty log machanism, always update Videmo memory to make
From: Christian Ehrhardt ehrha...@linux.vnet.ibm.com
virtio_blk_init now is in a separate header
Signed-off-by: Christian Ehrhardt ehrha...@linux.vnet.ibm.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/qemu/hw/ppc440_bamboo.c b/qemu/hw/ppc440_bamboo.c
index 79e4ea8..57d04f9 100644
From: root r...@vti-demo.(none)
Signed-off-by: Xiantao Zhang xiantao.zh...@intel.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/libkvm/libkvm-ia64.c b/libkvm/libkvm-ia64.c
index f3afc56..2f15675 100644
--- a/libkvm/libkvm-ia64.c
+++ b/libkvm/libkvm-ia64.c
@@ -67,3 +67,16 @@ void
No need to repeat the same assembly block over and over.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/x86_emulate.c | 79 +++
1 files changed, 28 insertions(+), 51 deletions(-)
diff --git a/arch/x86/kvm/x86_emulate.c
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/x86_emulate.c | 66 +++
1 files changed, 23 insertions(+), 43 deletions(-)
diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c
index 8f60ace..5f87d3e 100644
---
This is the third batch of the 2.6.29 merge window queue.
Amit Shah (1):
KVM: x86 emulator: Fix handling of VMMCALL instruction
Avi Kivity (8):
KVM: x86 emulator: reduce duplication in one operand emulation thunks
KVM: x86 emulator: consolidate emulation of two operand instructions
KVM:
'ret' did not set the operand type or size for the destination, so
writeback ignored it.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/x86_emulate.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/x86_emulate.c |6 +++---
1 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c
index 2555762..70242f5 100644
--- a/arch/x86/kvm/x86_emulate.c
+++
From: Christian Borntraeger borntrae...@de.ibm.com
The s390 backend of kvm never calls kvm_vcpu_uninit. This causes
a memory leak of vcpu-run pages.
Lets call kvm_vcpu_uninit in kvm_arch_vcpu_destroy to free
the vcpu-run.
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
Acked-by:
Switch 'pop r/m' instruction to use the new function.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/x86_emulate.c | 21 +
1 files changed, 17 insertions(+), 4 deletions(-)
diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c
index
From: Mark McLoughlin mar...@redhat.com
We will obviously never pass a NULL struct kvm_irq_ack_notifier* to
this functions. They are always embedded in the assigned device
structure, so the assertion add nothing.
The irqchip_in_kernel() assertion is very out of place - clearly
this little
Notices by Guillaume Thouvenin.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/x86_emulate.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c
index e8c87cc..69b330b 100644
---
Set operand type and size to get correct writeback behavior.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/x86_emulate.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c
index 72ae86b..e8c87cc 100644
From: Mark McLoughlin mar...@redhat.com
We never pass a NULL notifier pointer here, but we may well
pass a notifier struct which hasn't previously been
registered.
Guard against this by using hlist_del_init() which will
not do anything if the node hasn't been added to the list
and, when removing
From: Mark McLoughlin mar...@redhat.com
Make sure kvm_request_irq_source_id() never returns
KVM_USERSPACE_IRQ_SOURCE_ID.
Likewise, check that kvm_free_irq_source_id() never accepts
KVM_USERSPACE_IRQ_SOURCE_ID.
Signed-off-by: Mark McLoughlin mar...@redhat.com
Signed-off-by: Avi Kivity
From: Wu Fengguang fengguang...@intel.com
Add marker_synchronize_unregister() before module unloading.
This prevents possible trace calls into unloaded module text.
Signed-off-by: Wu Fengguang w...@linux.intel.com
Signed-off-by: Avi Kivity a...@redhat.com
---
virt/kvm/kvm_trace.c |1 +
1
From: Marcelo Tosatti mtosa...@redhat.com
Collapse remote TLB flushes on root sync.
kernbench is 2.7% faster on 4-way guest. Improvements have been seen
with other loads such as AIM7.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
From: Mark McLoughlin mar...@redhat.com
Split out the logic corresponding to undoing assign_irq() and
clean it up a bit.
Signed-off-by: Mark McLoughlin mar...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
virt/kvm/kvm_main.c | 29 ++---
1 files changed, 22
From: Mark McLoughlin mar...@redhat.com
Set assigned_dev-irq_source_id to -1 so that we can avoid freeing
a source ID which we never allocated.
Signed-off-by: Mark McLoughlin mar...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
virt/kvm/kvm_main.c |7 +--
1 files changed, 5
From: Glauber Costa glom...@redhat.com
Right now, KVM does not remove a slot when we do a
register ioctl for size 0 (would be the expected behaviour).
Instead, we only mark it as empty, but keep all bitmaps
and allocated data structures present. It completely
nullifies our chances of reusing
From: Amit Shah amit.s...@redhat.com
The VMMCALL instruction doesn't get recognised and isn't processed
by the emulator.
This is seen on an Intel host that tries to execute the VMMCALL
instruction after a guest live migrates from an AMD host.
Signed-off-by: Amit Shah amit.s...@redhat.com
From: Hannes Eder han...@hanneseder.net
Impact: make global function static
virt/kvm/kvm_main.c:85:6: warning: symbol 'kvm_rebooting' was not declared.
Should it be static?
Signed-off-by: Hannes Eder han...@hanneseder.net
Signed-off-by: Avi Kivity a...@redhat.com
---
virt/kvm/kvm_main.c |
From: Marcelo Tosatti mtosa...@redhat.com
If the guest executes invlpg, peek into the pagetable and attempt to
prepopulate the shadow entry.
Also stop dirty fault updates from interfering with the fork detector.
2% improvement on RHEL3/AIM7.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
From: Hannes Eder han...@hanneseder.net
Impact: make global function static
arch/x86/kvm/vmx.c:134:3: warning: symbol 'vmx_capability' was not declared.
Should it be static?
Signed-off-by: Hannes Eder han...@hanneseder.net
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/vmx.c |
From: Eduardo Habkost ehabk...@redhat.com
kvm_get_tsc_khz() currently returns the previously-calculated preset_lpj
value, but it is in loops-per-jiffy, not kHz. The current code works
correctly only when HZ=1000.
Signed-off-by: Eduardo Habkost ehabk...@redhat.com
Signed-off-by: Avi Kivity
From: Hollis Blanchard holl...@us.ibm.com
KVM currently ignores the host's round robin TLB eviction selection, instead
maintaining its own TLB state and its own round robin index. However, by
participating in the normal 44x TLB selection, we can drop the alternate TLB
processing in KVM. This
From: Guillaume Thouvenin guillaume.thouve...@ext.bull.net
Add SrcOne operand type when we need to decode an implied '1' like with
regular shift instruction
Signed-off-by: Guillaume Thouvenin guillaume.thouve...@ext.bull.net
Signed-off-by: Avi Kivity a...@redhat.com
---
From: Hollis Blanchard holl...@us.ibm.com
Existing KVM statistics are either just counters (kvm_stat) reported for
KVM generally or trace based aproaches like kvm_trace.
For KVM on powerpc we had the need to track the timings of the different exit
types. While this could be achieved parsing data
From: Guillaume Thouvenin guillaume.thouve...@ext.bull.net
Add emulation of shld and shrd instructions
Signed-off-by: Guillaume Thouvenin guillaume.thouve...@ext.bull.net
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/x86_emulate.c | 17 +++--
1 files changed, 15
From: Guillaume Thouvenin guillaume.thouve...@ext.bull.net
Add the assembler code for instruction with three operands and one
operand is stored in ECX register
Signed-off-by: Guillaume Thouvenin guillaume.thouve...@ext.bull.net
Signed-off-by: Avi Kivity a...@redhat.com
---
From: Marcelo Tosatti mtosa...@redhat.com
Instead of invoking the handler directly collect pages into
an array so the caller can work with it.
Simplifies TLB flush collapsing.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
---
Jan Kiszka wrote:
[Hope I will not cause troubles to other archs this time.]
Adopt to new KVM_CAP_USER_NMI interface for injecting NMIs from qemu
user space. As this capability is only provided on archs actually
requiring it, we can also drop a lot of empty arch stubs.
Applied, thanks.
--
Christian Ehrhardt wrote:
This patch series fixes kvm-userspace to build for powerpc again.
It also aligns some code to match qemu upstream (where some ppc
patches went in).
Applied all, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this
Mark McLoughlin wrote:
Anthony intended to enable VIRTIO_ZERO_COPY before submitting,
so do that now.
Fixes an oops in the bounce buffer malloc in virtqueue_pop()
I have seen twice so far. We still need to track this down,
but it's very hard to reproduce.
Applied, thanks.
--
error
There is a need for communication channel between host and various
agents that are running inside a VM guest. The channel will be used
for statistic gathering, logging, cut paste, host screen resolution
changes notification, guest configuration etc.
It is undesirable to use TCP/IP for this
There is a need for communication channel between host and various
agents that are running inside a VM guest. The channel will be used
for statistic gathering, logging, cut paste, host screen resolution
changes notifications, guest configuration etc.
It is undesirable to use TCP/IP for this
qemu-kvm.c uses qemu_eventfd/qemu_signalfd. The code of compatfd takes care
if CONFIG_eventfd/CONFIG_signalfd is really enabled. But currently compatfd is
not build if --disable-aio is set. This patch lets compatfd.c build if USE_KVM
is set to allow qemu-kvm to be linked in all cases
On Sun, Dec 14, 2008 at 02:28:23PM +0200, Blue Swirl wrote:
On 12/14/08, Gleb Natapov g...@redhat.com wrote:
There is a need for communication channel between host and various
agents that are running inside a VM guest. The channel will be used
for statistic gathering, logging, cut paste,
Bugs item #2411975, was opened at 2008-12-09 17:24
Message generated for change (Comment added) made by avik
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2411975group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #2411975, was opened at 2008-12-09 17:24
Message generated for change (Settings changed) made by avik
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2411975group_id=180599
Please note that this message will contain a full copy of the comment
On 12/14/08, Gleb Natapov g...@redhat.com wrote:
There is a need for communication channel between host and various
agents that are running inside a VM guest. The channel will be used
for statistic gathering, logging, cut paste, host screen resolution
changes notification, guest
Hi Gleb.
On Sun, Dec 14, 2008 at 01:50:55PM +0200, Gleb Natapov (g...@redhat.com) wrote:
There is a need for communication channel between host and various
agents that are running inside a VM guest. The channel will be used
for statistic gathering, logging, cut paste, host screen resolution
Hi Evgeniy,
On Sun, Dec 14, 2008 at 03:23:20PM +0300, Evgeniy Polyakov wrote:
On Sun, Dec 14, 2008 at 01:50:55PM +0200, Gleb Natapov (g...@redhat.com)
wrote:
There is a need for communication channel between host and various
agents that are running inside a VM guest. The channel will be
Bugs item #1971512, was opened at 2008-05-25 00:45
Message generated for change (Comment added) made by avik
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=1971512group_id=180599
Please note that this message will contain a full copy of the comment
On Sat, Dec 13, 2008 at 03:11:57PM -0600, Anthony Liguori wrote:
cause an overflow. You will naturally validate this in the map() function
because you cannot map something that is greater than can fit in a void *.
When you told me to pass ram_addr_t instead of size_t in my patch, I
didn't
Andrea Arcangeli wrote:
To me map/unmap looks backwards. There's absolutely no point at all to
pretend that RAM isn't always mapped.
Actually, with Xen, RAM may be unmapped due do Xen limitations when qemu
runs on dom0 mode. But I think map/unmap makes sense even disregarding
Xen: if we
On Sun, Dec 14, 2008 at 07:01:38PM +0200, Avi Kivity wrote:
Actually, with Xen, RAM may be unmapped due do Xen limitations when qemu
runs on dom0 mode. But I think map/unmap makes sense even disregarding
I realize xen 32bit has issues... Qemu/KVM 32bit also has the same
issues but there's no
Anthony Liguori wrote:
Let me clarify this a bit more. The problem we're trying to address
today is the encapsulating knowledge of phys_ram_base. We want to
minimize the amount of code that makes any assumptions about
phys_ram_base. Your current API still accesses phys_ram_base directly
Avi Kivity wrote:
Anthony Liguori wrote:
There are N users of this code, all of which would need to cope with
the
failure. Or there could be one user (dma.c) which handles the failure
and the bouncing.
N should be small long term. It should only be for places that would
interact
Gleb Natapov wrote:
On Sun, Dec 14, 2008 at 02:28:23PM +0200, Blue Swirl wrote:
On 12/14/08, Gleb Natapov g...@redhat.com wrote:
There is a need for communication channel between host and various
agents that are running inside a VM guest. The channel will be used
for statistic
Gleb Natapov wrote:
diff --git a/hw/pc.c b/hw/pc.c
index 73dd8bc..57e3b1d 100644
--- a/hw/pc.c
+++ b/hw/pc.c
@@ -1095,7 +1095,7 @@ static void pc_init1(ram_addr_t ram_size, int
vga_ram_size,
}
}
-/* Add virtio block devices */
+/* Add virtio devices */
Please don't
On Sun, Dec 14, 2008 at 01:15:42PM -0600, Anthony Liguori wrote:
Gleb Natapov wrote:
On Sun, Dec 14, 2008 at 02:28:23PM +0200, Blue Swirl wrote:
On 12/14/08, Gleb Natapov g...@redhat.com wrote:
There is a need for communication channel between host and various
agents that are
Anthony Liguori wrote:
I've thought quite a bit about it, and I'm becoming less convinced
that this sort of API is going to be helpful.
I was thinking that we need to make one minor change to the map API I
proposed. It should return a mapped size as an output parameter and
take a flag as to
Andrea Arcangeli wrote:
On Sun, Dec 14, 2008 at 07:01:38PM +0200, Avi Kivity wrote:
Actually, with Xen, RAM may be unmapped due do Xen limitations when qemu
runs on dom0 mode. But I think map/unmap makes sense even disregarding
I realize xen 32bit has issues... Qemu/KVM 32bit also
On Sun, Dec 14, 2008 at 01:15:42PM -0600, Anthony Liguori wrote:
Gleb Natapov wrote:
On Sun, Dec 14, 2008 at 02:28:23PM +0200, Blue Swirl wrote:
On 12/14/08, Gleb Natapov g...@redhat.com wrote:
There is a need for communication channel between host and various
agents that are
Gleb Natapov wrote:
On Sun, Dec 14, 2008 at 01:15:42PM -0600, Anthony Liguori wrote:
I don't know why do you think that we are going to use that for closed
code or something. It will be used by libvirt and it is open source last
I checked.
For what?
vmchannel was developed for SPICE,
Daniel P. Berrange wrote:
On Sun, Dec 14, 2008 at 01:15:42PM -0600, Anthony Liguori wrote:
One non-QEMU backend I can see being implemented is a DBus daemon,
providing a simple bus for RPC calls between guests host.
The main problem with external backends is that they cannot easily
Avi Kivity wrote:
Anthony Liguori wrote:
I've thought quite a bit about it, and I'm becoming less convinced
that this sort of API is going to be helpful.
I was thinking that we need to make one minor change to the map API I
proposed. It should return a mapped size as an output parameter and
On Sun, Dec 14, 2008 at 04:56:49PM -0600, Anthony Liguori wrote:
Daniel P. Berrange wrote:
On Sun, Dec 14, 2008 at 01:15:42PM -0600, Anthony Liguori wrote:
One non-QEMU backend I can see being implemented is a DBus daemon,
providing a simple bus for RPC calls between guests host.
The
Hi,
I'm testing KVM 80 (prepackaged from lfarkas.org) on CentOS 5.2 (both
guest and host) and comparing against Xen 3.3.0. The only modification
I've really made is that I've set noatime on both guest and host. The
guest is running straight from an LVM volume and is assigned 4 Gb RAM
and 4
On Sunday 14 December 2008, Gleb Natapov wrote:
There is a need for communication channel between host and various
agents that are running inside a VM guest. The channel will be used
for statistic gathering, logging, cut paste, host screen resolution
changes notification, guest configuration
That's pointless; cirrus for example has 8MB of mmio while a
cpu-to-vram blit is in progress, and some random device we'll add
tomorrow could easily introduce more. Our APIs shouldn't depend on
properties of emulated hardware, at least as much as possible.
One way to think of what I'm
Daniel P. Berrange wrote:
[snip]
If you don't have QEMU as a broker, it makes it very hard for QEMU to
virtualization all of the resources exposed to the guest. This
complicates things like save/restore and complicates security policies
since you now have things being done on behalf of
Paul Brook wrote:
On Sunday 14 December 2008, Gleb Natapov wrote:
There is a need for communication channel between host and various
agents that are running inside a VM guest. The channel will be used
for statistic gathering, logging, cut paste, host screen resolution
changes notification,
Daniel P. Berrange wrote:
On Sun, Dec 14, 2008 at 04:56:49PM -0600, Anthony Liguori wrote:
Daniel P. Berrange wrote:
On Sun, Dec 14, 2008 at 01:15:42PM -0600, Anthony Liguori wrote:
One non-QEMU backend I can see being implemented is a DBus daemon,
providing a simple bus for RPC
Paul Brook wrote:
That's pointless; cirrus for example has 8MB of mmio while a
cpu-to-vram blit is in progress, and some random device we'll add
tomorrow could easily introduce more. Our APIs shouldn't depend on
properties of emulated hardware, at least as much as possible.
One way to
Hi Weidong,
Thank you for your answer.
I tried to test latest Avi's kvm.git and kvm-userspace.git.
but, kvm-userspace fails to compile.
I used the following git repositories:
git clone git://git.kernel.org/pub/scm/linux/kernel/git/avi/kvm-userspace.git
vtd
$ ./configure
$ make
make -C libkvm
I think you need sync with kernel code:
$ ./configure
$ cd kernel
$ make sync LINUX=../../kvm -- kvm kernel directory
$ cd ..
$ make
$ make install
BTW, you should also need following patch to pass compilation.
---
kernel/x86/external-module-compat.h |2 +-
1 files changed, 1
Arne Kepp wrote:
Hi,
I'm testing KVM 80 (prepackaged from lfarkas.org) on CentOS 5.2 (both
guest and host) and comparing against Xen 3.3.0. The only modification
I've really made is that I've set noatime on both guest and host. The
guest is running straight from an LVM volume and is assigned
From: Gleb Natapov g...@redhat.com
Date: Sun, 14 Dec 2008 13:50:55 +0200
It is undesirable to use TCP/IP for this purpose since network
connectivity may not exist between host and guest and if it exists the
traffic can be not routable between host and guest for security reasons
or TCP/IP
On Sun, Dec 14, 2008 at 10:44:36PM -0800, David Miller wrote:
From: Gleb Natapov g...@redhat.com
Date: Sun, 14 Dec 2008 13:50:55 +0200
It is undesirable to use TCP/IP for this purpose since network
connectivity may not exist between host and guest and if it exists the
traffic can be not
76 matches
Mail list logo