On Fri, 03 Apr 2009 09:52:09 -0400
Masami Hiramatsu wrote:
> Vegard Nossum wrote:
> > 2009/4/3 Ingo Molnar :
> >> * Avi Kivity wrote:
> >>
> >>> Ingo Molnar wrote:
> > kvm has three requirements not needed by kprobes:
> > - it wants to execute instructions, not just decode them, includin
Avi Kivity wrote:
When the vga resolution changes, a new display surface is not allocated
immediately; instead that is deferred until the next update. However,
if we're running without a display client attached, that won't happen
and the next bitblt is likely to cause a segfault by overflowing t
Complexity to fix it not worthwhile the gains, as discussed
in http://article.gmane.org/gmane.comp.emulators.kvm.devel/28649.
Signed-off-by: Marcelo Tosatti
Index: kvm/arch/x86/include/asm/kvm_host.h
===
--- kvm.orig/arch/x86/includ
--
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Complexity to fix it not worthwhile the gains, as discussed
in http://article.gmane.org/gmane.comp.emulators.kvm.devel/28649.
Signed-off-by: Marcelo Tosatti
Index: kvm/arch/x86/kvm/mmu.c
===
--- kvm.orig/arch/x86/kvm/mmu.c
+++ kvm/a
On Sun, Apr 05, 2009 at 05:14:44PM +, Eric Liu wrote:
>
> Yes it is AMD system, however KVM website does mention AMD iommu
> support KVM device passthrough. I want to make sure my system has
> this capability.
That's 'AMD IOMMU', as opposed to AMD GART, which is not an
isolation-capable IOMM
Avi Kivity wrote:
Eduardo Habkost wrote:
Signed-off-by: Eduardo Habkost
---
client/tests/kvm_runtest_2/stepeditor.py | 14 +-
1 files changed, 9 insertions(+), 5 deletions(-)
diff --git a/client/tests/kvm_runtest_2/stepeditor.py
b/client/tests/kvm_runtest_2/stepeditor.py
inde
On Sun, Apr 05, 2009 at 03:31:03PM +0300, Avi Kivity wrote:
> Eduardo Habkost wrote:
>> SPACE_RGB, False, 8, w, h, w*3)
>>
>>> Traceback (most recent call last):
>>> File "", line 1, in ?
>>> MemoryError
>>>
>>
>>
>>
>
> Instead of returning an empty image here, we sh
Yes it is AMD system, however KVM website does mention AMD iommu support KVM
device passthrough.
I want to make sure my system has this capability.
Regards
Eric
> Date: Sat, 4 Apr 2009 21:18:23 +0300
> From: m...@il.ibm.com
> To: ericliu2...@hotmail.co
Avi Kivity wrote:
Anthony Liguori wrote:
What we need is:
1) Lockless MMIO/PIO dispatch (there should be two IO registration
interfaces, a new lockless one and the legacy one)
Not sure exactly how much this is needed, since when there is no
contention, locks are almost free (there's the at
> If you want that and good performance too write a virtio driver, and use
> virtio disk instead of IDE or SCSI.
Is there a place where the interface types are documented? The man
page lists ide, scsi, sd, mtd, floppy, pflash, and virtio. There's a
virtio page on the kvm wiki, and I think I can
Jan Kiszka wrote:
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Jan Kiszka wrote:
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Anthony Liguori wrote:
What we need is:
1) Lockless MMIO/PIO dispatch (there should be two IO registration
interfaces, a new lockless one and the legacy one)
Not sure exactly how much this is needed, since when there is no
contention, locks are almost free (there's the atomic and cacheline
tsuraan wrote:
I see. That sucks.
Yeah... Is there any reason that kvm is hard-coded to only allow 4
IDE devices? Is it an issue with the BIOS implementation, or is it
just a random limit? If there's some macro somewhere that defines
NUM_IDE to 2, and I could change that to 5, then I'd
> I see. That sucks.
Yeah... Is there any reason that kvm is hard-coded to only allow 4
IDE devices? Is it an issue with the BIOS implementation, or is it
just a random limit? If there's some macro somewhere that defines
NUM_IDE to 2, and I could change that to 5, then I'd be perfectly
happy; I
tsuraan wrote:
No plan that I know of. Is the LSI scsi device not supported by Solaris?
Yeah, there was a short thread about it last July
(http://www.mail-archive.com/kvm@vger.kernel.org/msg01633.html). The
jist of it is that 64-bit OpenSolaris no longer supports the 53c895a
SCSI control
When the vga resolution changes, a new display surface is not allocated
immediately; instead that is deferred until the next update. However,
if we're running without a display client attached, that won't happen
and the next bitblt is likely to cause a segfault by overflowing the
display surface.
Anthony Liguori wrote:
This patch breaks VC switching with -curses.
The attached incremental fixes it, by basically replicating the previous
behaviour. I'll follow up with a new combined patch.
--
error compiling committee.c: too many arguments to function
diff --git a/hw/vga.c b/hw/vga.
Anthony Liguori wrote:
Avi Kivity wrote:
When the vga resolution changes, a new display surface is not allocated
immediately; instead that is deferred until the next update. However,
if we're running without a display client attached, that won't happen
and the next bitblt is likely to cause a s
> No plan that I know of. Is the LSI scsi device not supported by Solaris?
Yeah, there was a short thread about it last July
(http://www.mail-archive.com/kvm@vger.kernel.org/msg01633.html). The
jist of it is that 64-bit OpenSolaris no longer supports the 53c895a
SCSI controller. According to th
Rusty Russell wrote:
On Thursday 02 April 2009 02:40:29 Anthony Liguori wrote:
Rusty Russell wrote:
As you point out, 350-450 is possible, which is still bad, and it's at least
partially caused by the exit to userspace and two system calls. If virtio_net
had a backend in the kernel, we
If a task switch was initiated because off a task gate in IDT and IDT
was accessed because of an external even the instruction should not
be skipped.
Signed-off-by: Gleb Natapov
---
arch/x86/kvm/svm.c | 11 +--
1 files changed, 9 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kv
In the new mode instruction is decoded, but not executed. The EIP
is moved to point after the instruction.
Signed-off-by: Gleb Natapov
---
arch/x86/include/asm/kvm_host.h |1 +
arch/x86/kvm/x86.c |5 +
2 files changed, 6 insertions(+), 0 deletions(-)
diff --git a/arch/
Do not emulate them yet.
Signed-off-by: Gleb Natapov
---
arch/x86/kvm/x86_emulate.c |3 ++-
1 files changed, 2 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c
index cf27e62..fcaad4b 100644
--- a/arch/x86/kvm/x86_emulate.c
+++ b/arch/x86/kv
Signed-off-by: Gleb Natapov
---
arch/x86/kvm/x86_emulate.c | 15 ++-
1 files changed, 2 insertions(+), 13 deletions(-)
diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c
index 1790933..3c23af0 100644
--- a/arch/x86/kvm/x86_emulate.c
+++ b/arch/x86/kvm/x86_emulate
Signed-off-by: Gleb Natapov
---
arch/x86/kvm/x86_emulate.c | 10 ++
1 files changed, 6 insertions(+), 4 deletions(-)
diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c
index 3c23af0..cf27e62 100644
--- a/arch/x86/kvm/x86_emulate.c
+++ b/arch/x86/kvm/x86_emulate.c
@@
Signed-off-by: Gleb Natapov
---
arch/x86/kvm/x86_emulate.c | 25 +
1 files changed, 5 insertions(+), 20 deletions(-)
diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c
index fe0dec2..e7e4db1 100644
--- a/arch/x86/kvm/x86_emulate.c
+++ b/arch/x86/kvm/x
Signed-off-by: Gleb Natapov
---
arch/x86/kvm/x86_emulate.c | 50
1 files changed, 18 insertions(+), 32 deletions(-)
diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c
index e7e4db1..1790933 100644
--- a/arch/x86/kvm/x86_emulate.c
No emulation yet.
Signed-off-by: Gleb Natapov
---
arch/x86/kvm/x86_emulate.c |3 ++-
1 files changed, 2 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c
index c015063..fe0dec2 100644
--- a/arch/x86/kvm/x86_emulate.c
+++ b/arch/x86/kvm/x86_e
Such as segment number in lcall/ljmp
Signed-off-by: Gleb Natapov
---
arch/x86/kvm/x86_emulate.c |7 +++
1 files changed, 7 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c
index d7c9f6f..c015063 100644
--- a/arch/x86/kvm/x86_emulate.c
+
Avi Kivity wrote:
When the vga resolution changes, a new display surface is not allocated
immediately; instead that is deferred until the next update. However,
if we're running without a display client attached, that won't happen
and the next bitblt is likely to cause a segfault by overflowing t
On Sunday 05 April 2009 09:10:31 David Miller wrote:
> > Acked-by: Christian Borntraeger
>
> Applied, thanks!
Hmm, doesn't really matter, but it's unnecessary.
Cheers,
Rusty.
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
Gleb Natapov wrote:
Goes on top of Jcc tests patch.
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.k
Gleb Natapov wrote:
Signed-off-by: Gleb Natapov
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kerne
Gleb Natapov wrote:
The length of pushed on to the stack return address depends on operand
size not address size.
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to m
Eduardo Habkost wrote:
SPACE_RGB, False, 8, w, h, w*3)
Traceback (most recent call last):
File "", line 1, in ?
MemoryError
Signed-off-by: Eduardo Habkost
---
client/tests/kvm_runtest_2/stepeditor.py | 14 +-
1 files changed, 9 insertions(+), 5 deletions(-)
Avi Kivity wrote:
I think all the settings should be reset to 0
when opening the tun device.
This should definitely be fixed. I'll look at writing a patch.
Okay, that's not in upstream qemu, so I committed a fix to
kvm-userspace.git.
Attached if you want to test it.
--
error compiling c
(cc qemu-devel)
Michael Tokarev wrote:
Hello.
2 days debugging an.. issue here, and finally got it.
To make the long and painful (it was for me anyway)
story short...
kvm provides a way to control various offload settings
on the "host side" of the tun network device (I mean
the `-net tap' setu
Alex Williamson wrote:
On Fri, 2009-04-03 at 20:28 -0300, Marcelo Tosatti wrote:
Can you please try the following
Thanks Marcelo, this seems to fix it. I tested up to a 30G guest with
large pages.
I've applied the patch, thanks. I keep thinking we need to do
additional rounding
tsuraan wrote:
Is there any plan to add AHCI support to kvm? It seems like it would
be an ideal alternative to the LSI SCSI driver, since AHCI is
supported by 64-bit Solaris as well as nearly every other modern OS.
No plan that I know of. Is the LSI scsi device not supported by Solaris?
-
Marcelo Tosatti wrote:
Here's one way to make this work:
- add a hash of global pagetables, indexed by virtual address instead
of the pagetable's gfn
- invlpg checks this hash in addition to the recursive walk
We'd need to make the virtual address part of sp->role to avoid needing
to lin
On Sun, Apr 05, 2009 at 11:41:39AM +0300, Avi Kivity wrote:
> Marcelo Tosatti wrote:
>> The problem is when the page is unreachable due to a higher level path
>> being unlinked. Say:
>>
>> level 4 -> level 3 . level 2 -> level 1 (global unsync)
>>
>> The dot there means level 3 is not linked to lev
Gregory Haskins wrote:
You don't gain simplicity by adding things.
But you are failing to account for the fact that we still have to add
something for PCI if we go with something like the in-kernel model. Its
nice for the userspace side because a) it was already in qemu, and b) we
need it
Gregory Haskins wrote:
2) the vbus-proxy and kvm-guest patch go away
3) the kvm-host patch changes to work with coordination from the
userspace-pci emulation for things like MSI routing
4) qemu will know to create some MSI shim 1:1 with whatever it
instantiates on the bus (and can communicate
Bugs item #2733678, was opened at 2009-04-05 10:51
Message generated for change (Tracker Item Submitted) made by lacsap2
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=2733678&group_id=180599
Please note that this message will contain a full copy of the
Marcelo Tosatti wrote:
The problem is when the page is unreachable due to a higher level path
being unlinked. Say:
level 4 -> level 3 . level 2 -> level 1 (global unsync)
The dot there means level 3 is not linked to level 2, so invlpg can't
reach the global unsync at level 1.
kvm_mmu_get_page
Rusty Russell wrote:
On Thursday 02 April 2009 02:40:29 Anthony Liguori wrote:
Rusty Russell wrote:
As you point out, 350-450 is possible, which is still bad, and it's at least
partially caused by the exit to userspace and two system calls. If virtio_net
had a backend in the kernel, we
If a task switch was initiated because off a task gate in IDT and IDT
was accessed because of an external even the instruction should not
be skipped.
Signed-off-by: Gleb Natapov
---
arch/x86/kvm/svm.c | 11 +--
1 files changed, 9 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kv
In the new mode instruction is decoded, but not executed. The EIP
is moved to point after the instruction.
Signed-off-by: Gleb Natapov
---
arch/x86/include/asm/kvm_host.h |1 +
arch/x86/kvm/x86.c |5 +
2 files changed, 6 insertions(+), 0 deletions(-)
diff --git a/arch/
After instruction decoding decode_cache.eip should point after instruction.
Signed-off-by: Gleb Natapov
---
arch/x86/kvm/x86_emulate.c | 107
1 files changed, 38 insertions(+), 69 deletions(-)
diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/
Goes on top of Jcc tests patch.
Signed-off-by: Gleb Natapov
diff --git a/user/test/x86/realmode.c b/user/test/x86/realmode.c
index 336ba1c..755b5d1 100644
--- a/user/test/x86/realmode.c
+++ b/user/test/x86/realmode.c
@@ -451,6 +451,23 @@ void test_jcc_near(void)
print_serial("JMP
52 matches
Mail list logo