Bugs item #2490866, was opened at 2009-01-06 23:10
Message generated for change (Comment added) made by thekozmo
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2490866group_id=180599
Please note that this message will contain a full copy of the comment
On 13.01.2009, at 08:09, Amit Shah wrote:
These two patches were sent separately earlier. There are a couple of
small changes in this version, including removal of a debug message
that
was left behind.
Are you sure this actually implements the CPUID 4 leaf? I bet it
simply submits
On Tue, Jan 13, 2009 at 09:25:32AM +0100, Alexander Graf wrote:
On 13.01.2009, at 08:09, Amit Shah wrote:
These two patches were sent separately earlier. There are a couple of
small changes in this version, including removal of a debug message
that
was left behind.
Are you sure this
Please keep the cc list when replying (use reply-all).
Jay wrote:
Avi Kivity avi at redhat.com writes:
How much memory do you have on the host? Is the host swapping? Can you
post 'vmstat 1' output while Windows is opening the start menu?
I have 8GB RAM on the host, and i've run
Abhishek Saksena wrote:
Hi guys,
Is ther a way to count how many instruction VCPU (KVM) executed? Say
between between two IO/mmio operations.
Is there any KVM API for this?
While it's possible in theory using the hardware performance counters,
no one has implemented this.
Other thing
Bugs item #2504082, was opened at 2009-01-13 10:36
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2504082group_id=180599
Please note that this message will contain a full copy of
On Tue, Jan 13, 2009 at 11:27:07AM +0200, Avi Kivity wrote:
Amit Shah wrote:
CPUID functions 4, 0xb and 0xd behave differently for different values of
ECX.
Store these values if userspace passes them.
Userspace has no way of knowing whether the kernel contains this fix or not.
Use the
Amit Shah wrote:
Use the SET_CPUID2 interface instead.
OK; So first attempt to use the SET_CPUID2 interface. If that fails (new
userspace on older kernel), what should we do?
SET_CPUID2 was introduced on 2.6.25; that is now the minimum requirement
for qemu and kvm-userspace anyway.
On Tue, Jan 13, 2009 at 11:45:55AM +0200, Avi Kivity wrote:
Amit Shah wrote:
Use the SET_CPUID2 interface instead.
OK; So first attempt to use the SET_CPUID2 interface. If that fails (new
userspace on older kernel), what should we do?
SET_CPUID2 was introduced on 2.6.25; that is
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
virt/kvm/irq_comm.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/virt/kvm/irq_comm.c b/virt/kvm/irq_comm.c
index 8f49113..0c3266a 100644
--- a/virt/kvm/irq_comm.c
+++ b/virt/kvm/irq_comm.c
@@ -39,7 +39,7 @@ void
Prepared for reuse ioapic_redir_entry for MSI.
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
include/linux/kvm_types.h | 17 +
virt/kvm/ioapic.c |6 +++---
virt/kvm/ioapic.h | 17 +
3 files changed, 21 insertions(+), 19 deletions(-)
Update from v5:
Addressed Marcelo and Avi's comments, also change ioctl back to add/delete
style one.
--
regards
Yang, Sheng
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
Convert MSI userspace interface to support gsi_msg mapping(and nobody should
be the user of the old interface...).
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
include/linux/kvm_host.h |1 -
virt/kvm/kvm_main.c | 79 ++
2 files
Prepare to merge with kvm_set_irq().
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
virt/kvm/kvm_main.c |8
1 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
index f3d5958..b0b97ba 100644
--- a/virt/kvm/kvm_main.c
+++
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
include/linux/kvm_host.h |3 ++
virt/kvm/ioapic.c| 84
virt/kvm/irq_comm.c | 87 --
3 files changed, 87 insertions(+), 87 deletions(-)
Avi's purpose, to use single kvm_set_irq() to deal with all interrupt, including
MSI. So here is it.
struct gsi_route_entry is a mapping from a special gsi(with
KVM_GSI_MSG_ENTRY_MASK) to MSI/MSI-X message address/data. And the struct can
also be extended for other purpose.
Now we support up to
Using kvm_set_irq to handle all interrupt injection.
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
include/linux/kvm_host.h |2 +-
virt/kvm/irq_comm.c | 79 +++--
virt/kvm/kvm_main.c | 78
Bugs item #2490866, was opened at 2009-01-06 22:10
Message generated for change (Comment added) made by ldvornik
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2490866group_id=180599
Please note that this message will contain a full copy of the comment
Some typos, comments, whitespace errors corrected in the cpuid code
Signed-off-by: Amit Shah amit.s...@redhat.com
---
arch/x86/include/asm/kvm.h |6 ++--
arch/x86/kvm/x86.c | 45 +--
2 files changed, 25 insertions(+), 26 deletions(-)
diff
kvm_set_cpuid2() builds on top of kvm_set_cpuid() and correctly populates
cpuid functions that have sub-leaves.
Signed-off-by: Amit Shah amit.s...@redhat.com
---
libkvm/libkvm-x86.c | 18 ++
libkvm/libkvm.h | 16
2 files changed, 34 insertions(+), 0
CPUID functions 4, 0xb and 0xd have sub-leaf values which depend on the
input value of ECX. Fetch these cpuid values and pass them on to the kernel.
We also switch to the kvm_set_cpuid2() ioctl for this; kvm_set_cpuid() can't
handle the extra parameters we need to support sub-leaves.
On Tue, Jan 13, 2009 at 10:47:52AM +, Amit Shah wrote:
Some typos, comments, whitespace errors corrected in the cpuid code
Signed-off-by: Amit Shah amit.s...@redhat.com
---
arch/x86/include/asm/kvm.h |6 ++--
arch/x86/kvm/x86.c | 45
On Tue, Jan 13, 2009 at 02:40:53PM +0530, Amit Shah wrote:
On Tue, Jan 13, 2009 at 09:25:32AM +0100, Alexander Graf wrote:
For exactly this purpose KVM_SET_CPUID2 was introduced quite a while
ago, enabling support for all CPUID leaf flavors on the kernel side.
Merely the userspace call
Bugs item #2490866, was opened at 2009-01-07 06:10
Message generated for change (Comment added) made by danv
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2490866group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #2504388, was opened at 2009-01-13 13:01
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2504388group_id=180599
Please note that this message will contain a full copy of
The guest is not acting up right now since I just rebooted the host on
Sunday.
Here is the current outputs of the command, and I will post them again when
they start acting up:
[r...@e6400:~/ 500]$vmstat 1
procs ---memory-- ---swap-- -io -system--
cpu
r b
Bugs item #2353811, was opened at 2008-11-27 17:44
Message generated for change (Comment added) made by technologov
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2353811group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #2413430, was opened at 2008-12-10 11:00
Message generated for change (Comment added) made by technologov
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2413430group_id=180599
Please note that this message will contain a full copy of the comment
Alexander Graf wrote:
Hi,
while I don't fully understand the problem, here's what I experience so far:
When using an openSUSE 11.0 kernel (2.6.25) in the guest, virtio on tap
breaks with current KVM git, while it used to work before (haven't
bisected, definitely worked in kvm-78, but is
Bugs item #2504388, was opened at 2009-01-13 13:01
Message generated for change (Comment added) made by martinmaurer
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2504388group_id=180599
Please note that this message will contain a full copy of the
Avi Kivity wrote:
The biggest change this time around is support for the AMD IOMMU for
device assignment. As it requires extensive core kernel support, it is
only available on Linux 2.6.29rc1 or higher hosts.
status report on rhel/centos-5.2 host:
- fedora-9 latest kernel now boot again
-
Hi, i installed kvm-83 on xubuntu-amd64/kernel-2.6.7-11.
i notice some problem with -net downscript.
my kvm start up script like this:
qemu-system-x86_64 ... ... -net
tap,ifname=tap0,script=/path/kvm-ifup,downscript=/path/kvm-ifdown
when the guest shutdown, kvm pass all argument to downscript.
Bugs item #2504998, was opened at 2009-01-13 18:24
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2504998group_id=180599
Please note that this message will contain a full copy of
Hi John,
On Wed, 2009-01-14 at 00:15 +0800, John Wong wrote:
Hi, i installed kvm-83 on xubuntu-amd64/kernel-2.6.7-11.
i notice some problem with -net downscript.
my kvm start up script like this:
qemu-system-x86_64 ... ... -net
On Wed, Jan 14, 2009 at 01:40:27AM +0800, John Wong wrote:
Hi Mark, i want to try, but i don't know where can download snapshot
source code,
i'm long time no use linux.
Where can i download kvm snapshot source code? kernel.org? or?
Hi John,
You apply this patch on top of the kvm-83 release
Bugs item #2351676, was opened at 2008-11-26 18:59
Message generated for change (Comment added) made by poelzi
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2351676group_id=180599
Please note that this message will contain a full copy of the comment
Following is my alternative to irq routing. The differences compared to
Sheng's version are:
- A single ioctl to replace the entire routing table, instead of add/remove
ioctls for individual routing entries. Routing changes are rare, and
we need to track the entire table in userspace anyway
Currently KVM has a static routing from GSI numbers to interrupts (namely,
0-15 are mapped 1:1 to both PIC and IOAPIC, and 16:23 are mapped 1:1 to
the IOAPIC). This is insufficient for several reasons:
- HPET requires non 1:1 mapping for the timer interrupt
- MSIs need a new method to assign
(restoring cc)
Abhishek Saksena wrote:
Other thing which I am not sure how KVM kerenel is synconrinized with
Qemu kernel? Can somebody explain this?
What's the qemu kernel?
Just qemu. Qemu has it's own timers how they are synced up with KVM?
For example if the guest is getting
Mark McLoughlin wrote:
Hi John,
On Wed, 2009-01-14 at 00:15 +0800, John Wong wrote:
Hi, i installed kvm-83 on xubuntu-amd64/kernel-2.6.7-11.
i notice some problem with -net downscript.
my kvm start up script like this:
qemu-system-x86_64 ... ... -net
Michael Tokarev wrote:
Mark McLoughlin wrote:
[]
--- qemu/net.c
+++ qemu/net.c
@@ -1740,7 +1740,7 @@ void net_cleanup(void)
TAPState *s = vc-opaque;
if (strcmp(vc-model, tap) == 0
-sscanf(vc-info_str, ifname=%63s , ifname) == 1
+
Without mmu notifiers usage of hugepages to back guest memory can cause
memory corruption.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/qemu/vl.c b/qemu/vl.c
index d0660ab..49cf066 100644
--- a/qemu/vl.c
+++ b/qemu/vl.c
@@ -4664,6 +4664,11 @@ void *alloc_mem_area(size_t
Marcelo Tosatti wrote:
Without mmu notifiers usage of hugepages to back guest memory can cause
memory corruption.
Really? Why's that? Sorry if I missed a previous discussion of this.
Regards,
Anthony Liguori
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/qemu/vl.c
Michael Tokarev wrote:
Michael Tokarev wrote:
Mark McLoughlin wrote:
[]
--- qemu/net.c
+++ qemu/net.c
@@ -1740,7 +1740,7 @@ void net_cleanup(void)
TAPState *s = vc-opaque;
if (strcmp(vc-model, tap) == 0
-sscanf(vc-info_str,
On Tue, Jan 13, 2009 at 02:38:33PM -0600, Anthony Liguori wrote:
Marcelo Tosatti wrote:
Without mmu notifiers usage of hugepages to back guest memory can cause
memory corruption.
Really? Why's that? Sorry if I missed a previous discussion of this.
Marcelo Tosatti wrote:
Without mmu notifiers usage of hugepages to back guest memory can cause
memory corruption.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/qemu/vl.c b/qemu/vl.c
index d0660ab..49cf066 100644
--- a/qemu/vl.c
+++ b/qemu/vl.c
@@ -4664,6 +4664,11
Anthony Liguori wrote:
Michael Tokarev wrote:
...
if (strcmp(vc-model, tap) == 0
- sscanf(vc-info_str, ifname=%63s , ifname) == 1
+ sscanf(vc-info_str, ifname=%63s,, ifname) == 1
And while we're at it.. Why the parsing isn't done like this:
for(tok =
Here's an update to the patches I sent last week. The goal of this
series is to add RX mode bits, MAC table filtering, and I'll follow up
with VLAN filtering, so that the virtio_net device doesn't always run in
promiscuous mode.
This version now uses a virtqueue for outbound commands for setting
Signed-off-by: Alex Williamson alex.william...@hp.com
---
drivers/net/virtio_net.c | 23 +--
1 files changed, 21 insertions(+), 2 deletions(-)
diff --git a/drivers/net/virtio_net.c b/drivers/net/virtio_net.c
index 43f6523..e7700de 100644
--- a/drivers/net/virtio_net.c
+++
This will be used for RX mode, MAC filter table, VLAN filtering, etc...
Signed-off-by: Alex Williamson alex.william...@hp.com
---
drivers/net/virtio_net.c | 55 +++-
include/linux/virtio_net.h |3 ++
2 files changed, 57 insertions(+), 1
Signed-off-by: Alex Williamson alex.william...@hp.com
---
drivers/net/virtio_net.c | 18 ++
include/linux/virtio_net.h |4
2 files changed, 22 insertions(+), 0 deletions(-)
diff --git a/drivers/net/virtio_net.c b/drivers/net/virtio_net.c
index de348de..b18dd4c
Number of entries configurable via module param.
Signed-off-by: Alex Williamson alex.william...@hp.com
---
drivers/net/virtio_net.c | 71 +++-
include/linux/virtio_net.h |4 ++
2 files changed, 73 insertions(+), 2 deletions(-)
diff --git
This will be used for RX mode, MAC table, VLAN table control, etc...
Signed-off-by: Alex Williamson alex.william...@hp.com
---
qemu/hw/virtio-net.c | 32
qemu/hw/virtio-net.h |3 +++
2 files changed, 35 insertions(+), 0 deletions(-)
diff --git
Rename get_config for simplicity
Signed-off-by: Alex Williamson alex.william...@hp.com
---
qemu/hw/virtio-net.c | 18 --
1 files changed, 16 insertions(+), 2 deletions(-)
diff --git a/qemu/hw/virtio-net.c b/qemu/hw/virtio-net.c
index 1f9dc16..e9b3d46 100644
---
Here's an update to the patches I sent last week. The goal of this
series is to add MAC setting and filtering support to the virtio-net
backend in qemu/kvm.
This version now makes use of a virtqueue for outbound commands from the
guest driver. This allows us to support numerous features without
Signed-off-by: Alex Williamson alex.william...@hp.com
---
qemu/hw/virtio-net.c | 22 ++
1 files changed, 22 insertions(+), 0 deletions(-)
diff --git a/qemu/hw/virtio-net.c b/qemu/hw/virtio-net.c
index c5d9952..99e582f 100644
--- a/qemu/hw/virtio-net.c
+++
Set via control virtqueue. For compatibility with older guest drivers
we need to default to promiscuous.
Signed-off-by: Alex Williamson alex.william...@hp.com
---
qemu/hw/virtio-net.c | 41 ++---
qemu/hw/virtio-net.h |4
2 files changed, 42
Alex Williamson wrote:
Here's an update to the patches I sent last week. The goal of this
series is to add MAC setting and filtering support to the virtio-net
backend in qemu/kvm.
This version now makes use of a virtqueue for outbound commands from the
guest driver. This allows us to support
On Tue, Jan 13, 2009 at 03:47:49PM +0800, Sheng Yang wrote:
On Sunday 11 January 2009 12:55:58 Marcelo Tosatti wrote:
The original apic_timer_intr_post() got:
if (apic apic_lvt_vector(apic, APIC_LVTT) == vec)
apic-timer.last_update = ktime_add_ns(
On Wed, 2009-01-14 at 00:01 +0300, Michael Tokarev wrote:
Anthony Liguori wrote:
Michael Tokarev wrote:
...
if (strcmp(vc-model, tap) == 0
- sscanf(vc-info_str, ifname=%63s , ifname) == 1
+ sscanf(vc-info_str, ifname=%63s,, ifname) == 1
And while we're at
I have a (32-bit) Windows XP guest installed, and if I start kvm-82
(from the Debian packages) on a 2.6.29-rc1 kernel (running 64-bit on an
AMD host), the guest boots but soon dies with messages along the lines
of:
lsi_scsi: error: Unimplemented message 0x0c
lsi_scsi: error: Reselect with
* Roland Dreier rdre...@cisco.com [2009-01-13 16:43]:
I have a (32-bit) Windows XP guest installed, and if I start kvm-82
(from the Debian packages) on a 2.6.29-rc1 kernel (running 64-bit on an
AMD host), the guest boots but soon dies with messages along the lines
of:
lsi_scsi: error:
On Tue, Jan 13, 2009 at 01:57:09PM -0700, David S. Ahern wrote:
Marcelo Tosatti wrote:
Without mmu notifiers usage of hugepages to back guest memory can cause
memory corruption.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/qemu/vl.c b/qemu/vl.c
index
63 matches
Mail list logo