From: Sheng Yang sh...@linux.intel.com
Prepared for reuse ioapic_redir_entry for MSI.
Signed-off-by: Sheng Yang sh...@linux.intel.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/include/linux/kvm_types.h b/include/linux/kvm_types.h
index 2b8318c..b84aca3 100644
---
From: Sheng Yang sh...@linux.intel.com
Would be used with bit ops, and would be easily extended if KVM_MAX_VCPUS is
increased.
Signed-off-by: Sheng Yang sh...@linux.intel.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/lapic.c b/arch/x86/kvm/lapic.c
index
From: Sheng Yang sh...@linux.intel.com
It's also convenient when we extend KVM supported vcpu number in the future.
Signed-off-by: Sheng Yang sh...@linux.intel.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/lapic.c b/arch/x86/kvm/lapic.c
index 6aa8d20..afc59b2 100644
From: Sheng Yang sh...@linux.intel.com
Signed-off-by: Sheng Yang sh...@linux.intel.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h
index 894a56e..1a2f98f 100644
--- a/include/linux/kvm_host.h
+++ b/include/linux/kvm_host.h
@@ -352,6
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
include/linux/kvm_host.h |3 +
virt/kvm/ioapic.c| 92
virt/kvm/irq_comm.c | 95 +++--
3 files changed, 94 insertions(+), 96 deletions(-)
Prepared for reuse ioapic_redir_entry for MSI.
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
include/linux/kvm_types.h | 17 +
virt/kvm/ioapic.c |6 +++---
virt/kvm/ioapic.h | 17 +
3 files changed, 21 insertions(+), 19 deletions(-)
Would be used with bit ops, and would be easily extended if KVM_MAX_VCPUS is
increased.
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
arch/x86/kvm/lapic.c |8
include/linux/kvm_host.h |2 +-
virt/kvm/ioapic.c|4 ++--
virt/kvm/ioapic.h|4 ++--
It's also convenient when we extend KVM supported vcpu number in the future.
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
arch/x86/kvm/lapic.c |7 ---
virt/kvm/ioapic.c| 25 ++---
virt/kvm/irq_comm.c | 21 -
3 files changed, 30
Rebased on latest upstream. The changes are Report IRQ injection status
related in the second patch.
The v8 was acked by Marcelo Tosatti.
Thanks.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
Drop the first patch which corrected ABI error.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
We have to handle more than one interrupt with one handler for MSI-X. Avi
suggested to use a flag to indicate the pending. So here is it.
Signed-off-by: Sheng Yang sh...@linux.intel.com
---
include/linux/kvm_host.h |1 +
virt/kvm/kvm_main.c | 66
This patch finally enable MSI-X.
What we need for MSI-X:
1. Intercept one page in MMIO region of device. So that we can get guest desired
MSI-X table and set up the real one. Now this have been done by guest, and
transfer to kernel using ioctl KVM_SET_MSIX_NR and KVM_SET_MSIX_ENTRY.
2.
Brian Jackson escribió:
If you use -vnc, then KVM runs and just sits there on the command line. It
doesn't prompt you when it's ready or anything. So you can connect via VNC as
soon as you start KVM. You connect with VNC just like you normally would to a
server running a regular VNC server.
Hi,
I'm a really happy KVM user - I've been running several hosts (mostly servers)
using KVM and I'm quite satisfied with it.
2 days ago I wanted to add 2 hosts to our VPN but I ran into serious trouble
which - after some analysis by the OpenVPN guys - seem to be caused by KVM.
What happens?
Zhang, Xiantao wrote:
Hi, Jes
I have fixed it and the patches has been in kvm.git's master branch,
please retry :)
Xiantao
Hi Xiantao,
Good timing, you must have pushed it right after I pulled it down for
my testing. This seems to work for me, but it will still break for
PowerPC I
On Monday 23 February 2009 21:57:38 Marcelo Tosatti wrote:
--
The patches look good to me.
ACK.
--
regards
Yang, Sheng
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
Sheng Yang wrote:
This patchset based on MSI patch which changed deliver method to irq routing.
Applied all, thanks. There were many merge conflicts, please look at
the final result to see if I missed anything.
--
error compiling committee.c: too many arguments to function
--
To
Elias Probst wrote:
Has anyone any ideas where to look for further information how this happens?
You could try running tcpdump on the guest, the host tap interface, and
the host bridge. By comparing the logs, we could see which packets are
lost or delayed and try to figure out why
Sheng Yang wrote:
Rebased on latest upstream. The changes are Report IRQ injection status
related in the second patch.
The v8 was acked by Marcelo Tosatti.
I just merged this (and resolved all the conflicts...). I'll see if
there are any changes between the two sets.
--
error
Avi Kivity schrieb:
Tomasz Chmielewski wrote:
I'm trying to use ballooning with kvm-83.
Although I'm able to limit the guest's memory, when I try to increase
it right after that, I get vballoon: page allocation failure.
order:0 followed by a kernel panic.
Is it expected?
The guest is
Tomasz Chmielewski wrote:
BTW, is it possible to balloon to a bigger amount of memory that
what was available when the guest started?
No. The guest won't have its data structures set up to handle the extra
memory.
Or is it only possible to shrink and grow within initial memory
Marcelo Tosatti wrote:
See comments on
http://sourceforge.net/tracker2/?func=detailaid=2627272group_id=180599atid=893831
regarding the version variable. Looks fishy.
Fix looks correct (for both per-cpu access and the version stuff).
I think prempting the vcpu to another pcpu will force a
Rebased on latest upstream. The changes are Report IRQ injection
status
related in the second patch.
The v8 was acked by Marcelo Tosatti.
I just merged this (and resolved all the conflicts...). I'll see if
there are any changes between the two sets.
Gleb tells me that my version is
PPC doesn't compile this source file, I think :)
Xiantao
-Original Message-
From: Jes Sorensen [mailto:j...@sgi.com]
Sent: Wednesday, February 25, 2009 6:06 PM
To: Zhang, Xiantao
Cc: Sheng Yang; Avi Kivity; kvm-i...@vger.kernel.org; kvm@vger.kernel.org
Subject: Re: KVM build breakage
Gleb Natapov wrote:
Signed-off-by: Gleb Natapov g...@redhat.com
Applied, thanks.
diff --git a/libkvm/kvm-common.h b/libkvm/kvm-common.h
index d4fffbe..de1ada2 100644
--- a/libkvm/kvm-common.h
+++ b/libkvm/kvm-common.h
libkvm uses the Linux coding style, I fixed it up before applying.
Sheng Yang wrote:
Drop the first patch which corrected ABI error.
Applied all, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info
Hi,
First of all please allow me to salute the community since this is my
first post.
Now my problem. I have been using KVM to conduct tests for various
software on windows, so far it worked out just fine. I use savevm and
loadvm to assure that the VM is in the same state for each test. I do
a
Alpár Török wrote:
Hi,
First of all please allow me to salute the community since this is my
first post.
Congratulations, hoping for the next ones :)
Now my problem. I have been using KVM to conduct tests for various
software on windows, so far it worked out just fine. I use savevm and
I have successfully enjoyed KVM for para-virtualized Linux guests :))
Unfortunately I have to maintain some SW for a customer
which is running on a specialized HW,
so I only have the chance to maintain that in customer-supplied VMware
virtual machines.
Trying to emerge (Gentoo on amd64) VMware
Manfred_Knick wrote:
I have successfully enjoyed KVM for para-virtualized Linux guests :))
Unfortunately I have to maintain some SW for a customer
which is running on a specialized HW,
so I only have the chance to maintain that in customer-supplied VMware
virtual machines.
Trying to emerge
On Wed, Feb 25, 2009 at 8:20 AM, Tomasz Chmielewski man...@wpkg.org wrote:
Is it possible to make snapshots when using raw devices (i.e. disk,
partition, LVM volume) as guest's disk image?
According to documentation[1] (and some tests I made) it is only possible
with qcow2 images. Which makes
Javier Guerra schrieb:
On Wed, Feb 25, 2009 at 8:20 AM, Tomasz Chmielewski man...@wpkg.org wrote:
Is it possible to make snapshots when using raw devices (i.e. disk,
partition, LVM volume) as guest's disk image?
According to documentation[1] (and some tests I made) it is only possible
with
Avi Kivity schrieb:
Manfred_Knick wrote:
I have successfully enjoyed KVM for para-virtualized Linux guests :))
...
== You cannot install on a system with KVM enabled.
...
KVM likes to hang onto the virtualization root mode aggressively for a
minor performance gain. (*)
...
A) Is (*)
On Wed, Feb 25, 2009 at 9:31 AM, Tomasz Chmielewski man...@wpkg.org wrote:
The VM state info is stored in the first qcow2 non removable and
writable block device. The disk image snapshots are stored in every
disk image.
Or, am I making a mistake here?
ah, i misremembered that.
--
Avi Kivity schrieb:
Manfred_Knick wrote:
I have successfully enjoyed KVM for para-virtualized Linux guests :))
...
== You cannot install on a system with KVM enabled.
...
KVM likes to hang onto the virtualization root mode aggressively for a
minor performance gain. (*)
...
ADDENDUM:
I
Not releasing the time_page causes a leak of that page or the compound
page it is situated in.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
arch/x86/kvm/x86.c |5 +
1 files changed, 5 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index
Tomasz Chmielewski wrote:
Is it possible to make snapshots when using raw devices (i.e. disk,
partition, LVM volume) as guest's disk image?
According to documentation[1] (and some tests I made) it is only
possible with qcow2 images. Which makes it very inflexible:
- one is forced to use a
Manfred_Knick wrote:
B) Any chance to solve this problem?
'rmmod kvm-intel; rmmod kvm' should work.
Avi,
thanks a lot for your _very_ speedy response!!
So I take it that
-- You can't have them both at once, at the same time
which turns out to be really unfortunate for my tasks.
Anthony Liguori schrieb:
Is it possible to do it with KVM?
In monitor:
Works great - thanks!
Small corrections below.
(qemu) stop
(qemu) migrate exec:dd of=state.img
Gives me:
qm migrate exec:dd of=state.img
migrate: extraneous characters at the end of line
Should be:
qm migrate
On Wed, Feb 25, 2009 at 04:08:31PM +0100, Joerg Roedel wrote:
Not releasing the time_page causes a leak of that page or the compound
page it is situated in.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
arch/x86/kvm/x86.c |5 +
1 files changed, 5 insertions(+), 0
2009/2/25 Tomasz Chmielewski man...@wpkg.org:
Alpár Török schrieb:
Indeed virtio performs better than e1000.
It should work, please provide host kernel version, kvm version, virtio
net
version and
windows guest type. Also the cmdline and monitor command will help.
kernel is
Alpár Török schrieb:
2009/2/25 Tomasz Chmielewski man...@wpkg.org:
Alpár Török schrieb:
Indeed virtio performs better than e1000.
It should work, please provide host kernel version, kvm version, virtio
net
version and
windows guest type. Also the cmdline and monitor command will help.
kernel
2009/2/25 Tomasz Chmielewski man...@wpkg.org:
Alpár Török schrieb:
2009/2/25 Tomasz Chmielewski man...@wpkg.org:
Alpár Török schrieb:
Indeed virtio performs better than e1000.
It should work, please provide host kernel version, kvm version, virtio
net
version and
windows guest type.
Bugs item #2627272, was opened at 2009-02-22 09:55
Message generated for change (Comment added) made by glommer
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2627272group_id=180599
Please note that this message will contain a full copy of the comment
Add pop es instruction
Signed-off-by: Mohammed Gamal m.gamal...@gmail.com
---
arch/x86/kvm/x86_emulate.c |5 -
1 files changed, 4 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c
index ca91749..8c292b6 100644
---
Hi,
I'm new to KVM and have some questions regarding kvm cpu emulation,
hope you can answer them.
I have a kvm node with Dual-Core AMD Opteron(tm) Processor 2218 processors.
1)I was wondering choosing what cpu emulation for VM would give best
performance?
I get the following options
#
Bugs item #2638990, was opened at 2009-02-25 17:35
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2638990group_id=180599
Please note that this message will contain a full copy of
Bugs item #2638990, was opened at 2009-02-25 17:35
Message generated for change (Settings changed) made by drasche2
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2638990group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #2633594, was opened at 2009-02-24 13:37
Message generated for change (Comment added) made by een4dja
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2633594group_id=180599
Please note that this message will contain a full copy of the comment
On Wednesday 25 February 2009 18:44:41 Avi Kivity wrote:
Rebased on latest upstream. The changes are Report IRQ injection
status
related in the second patch.
The v8 was acked by Marcelo Tosatti.
I just merged this (and resolved all the conflicts...). I'll see if
there are any
On Sun, Feb 15, 2009 at 06:59:10AM +0800, Grant Grundler wrote:
On Thu, Feb 12, 2009 at 08:50:32PM +0800, Yu Zhao wrote:
This patch series implements Address Translation Service support for
the Intel IOMMU. ATS makes the PCI Endpoint be able to request the
DMA address translation from the
On Sun, Feb 15, 2009 at 07:20:52AM +0800, Grant Grundler wrote:
On Thu, Feb 12, 2009 at 08:50:38PM +0800, Yu Zhao wrote:
Support device IOTLB (i.e. ATS) for both native and KVM environments.
+
+static void iommu_enable_dev_iotlb(struct device_domain_info *info)
+{
+
On Thu, Feb 26, 2009 at 10:50:35AM +0800, Yu Zhao wrote:
On Sun, Feb 15, 2009 at 06:59:10AM +0800, Grant Grundler wrote:
On Thu, Feb 12, 2009 at 08:50:32PM +0800, Yu Zhao wrote:
This patch series implements Address Translation Service support for
the Intel IOMMU. ATS makes the PCI
Chris Wright wrote:
This adds a remove_id sysfs entry to allow users of new_id to later
remove the added dynid. One use case is management tools that want to
dynamically bind/unbind devices to pci-stub driver while devices are
assigned to KVM guests. Rather than having to track which driver
Mohammed Gamal wrote:
Add pop es instruction
Hi again...
@@ -1446,6 +1446,9 @@ special_insn:
add: /* add */
emulate_2op_SrcV(add, c-src, c-dst, ctxt-eflags);
break;
+ case 0x07: /* pop es */
+
55 matches
Mail list logo