Hello,
just a quick bugreport: on http://www.linux-kvm.org/page/Documents,
the Doxygen Documentation link is broken (http://kvmapi.ath.cx/
doesn't respond).
Does a mirror exist?
Thanks for any help,
--
Matteo Settenvini
FSF Associated Member
Email : mat...@member.fsf.org
-BEGIN GEEK CODE
Gerd Hoffmann wrote:
Right now everything in the vcpu is emulated in the kernel. Everything
else is emulated either in the kernel (irqchip) or in userspace. This
makes things easier to understand, and is more future friendly if more
cpu features become virtualized by hardware.
While these are
Gerd Hoffmann wrote:
On 04/20/09 10:26, Avi Kivity wrote:
Gerd Hoffmann wrote:
The xen pv-on-hvm drivers use an msr to indicate please place the
hypercall page here. Handling that in kernel isn't an option IMHO.
The contents of the hypercall page are vendor specific. This can be
handled from
On 04/20/09 10:26, Avi Kivity wrote:
Gerd Hoffmann wrote:
The xen pv-on-hvm drivers use an msr to indicate please place the
hypercall page here. Handling that in kernel isn't an option IMHO.
The contents of the hypercall page are vendor specific. This can be
handled from userspace (though
The minor number you are using already belongs to another project.
10,234 is free but it would be good to know what device naming is
proposed. I imagine other folks would like to know why you aren't using
sysfs or similar or extending /dev/kvm ?
Alan
--
To unsubscribe from this list: send the
It depends if the MSR may be considered global, or is required to be
per-cpu. Need to refresh my memory on this, but I remember reading this
Machine Check MSRs need to be per CPU. The latest kernels have some support
for shared banks (between CPUs) but it's better to not have it and
older OS
Andi Kleen wrote:
It depends if the MSR may be considered global, or is required to be
per-cpu. Need to refresh my memory on this, but I remember reading this
Machine Check MSRs need to be per CPU. The latest kernels have some support
for shared banks (between CPUs) but it's better to
Alan Cox wrote:
The minor number you are using already belongs to another project.
10,234 is free but it would be good to know what device naming is
proposed. I imagine other folks would like to know why you aren't using
sysfs or similar or extending /dev/kvm ?
ksm was deliberately made
On Sun, 2009-04-19 at 14:48 +0300, Avi Kivity wrote:
Antoine Martin wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Wireshark was showing a huge amount of invalid packets (wrong checksum)
- - that was the cause of the slowdown.
Simply rebooting the host into 2.6.28.9 fixed
Matteo Settenvini wrote:
Hello,
just a quick bugreport: on http://www.linux-kvm.org/page/Documents,
the Doxygen Documentation link is broken (http://kvmapi.ath.cx/
doesn't respond).
Does a mirror exist?
Probably not. But the doxygen docs only document libkvm, which is a
fairly
On 04/20/09 11:05, Avi Kivity wrote:
Gerd Hoffmann wrote:
On 04/20/09 10:26, Avi Kivity wrote:
Gerd Hoffmann wrote:
The xen pv-on-hvm drivers use an msr to indicate please place the
hypercall page here. Handling that in kernel isn't an option IMHO.
The contents of the hypercall page are
(please CC, not on the list)
Hi all,
Fedora 10 randomly hangs for me when run under KVM, whereas (unpatched)
F9 works fine. When this happens, kvm_stat shows that the VM is seeing
1000 IRQ exits per second, but nothing else seems to happen. The latest
F9 update kernel seems to be bust as well.
Gerd Hoffmann wrote:
Well, xenner doesn't do vmcalls, so the page isn't vendor specific.
Well, for true pv (not pv-on-hvm) it wouldn't use the MSR, would it?
Yes, the MSR is used for pv-on-hvm only.
So it isn't relevant for Xenner?
That said, I'd like to be able to emulate the Xen HVM
Lennert Buytenhek wrote:
(please CC, not on the list)
Hi all,
Fedora 10 randomly hangs for me when run under KVM, whereas (unpatched)
F9 works fine. When this happens, kvm_stat shows that the VM is seeing
1000 IRQ exits per second, but nothing else seems to happen. The latest
F9 update
Gleb Natapov wrote:
On Fri, Apr 17, 2009 at 03:12:57PM +, Dmitry Eremin-Solenikov wrote:
This patch does expose some problems on real HW. The first NMI
completes w/o problems. However If I try to boot the kernel w/
nmi_watchdog=1 or to trigger two NMIs from the monitor, kernel is stuck
On 04/20/09 13:27, Avi Kivity wrote:
Gerd Hoffmann wrote:
Well, xenner doesn't do vmcalls, so the page isn't vendor specific.
Well, for true pv (not pv-on-hvm) it wouldn't use the MSR, would it?
Yes, the MSR is used for pv-on-hvm only.
So it isn't relevant for Xenner?
It is. I still
Gerd Hoffmann wrote:
That said, I'd like to be able to emulate the Xen HVM hypercalls. But in
any case, they hypercall implementation has to be in the kernel,
No. With Xenner the xen hypercall emulation code lives in guest
address space.
In this case the guest ring-0 code should trap the
Avi Kivity wrote:
Alan Cox wrote:
The minor number you are using already belongs to another project.
10,234 is free but it would be good to know what device naming is
proposed. I imagine other folks would like to know why you aren't using
sysfs or similar or extending /dev/kvm ?
ksm was
On Sun, Apr 19, 2009 at 02:54:28PM -0300, Marcelo Tosatti wrote:
I'm fine with your kvm_flush_local_tlb. Just one minor nit:
+ /* get new asid before returning to guest mode */
+ if (!test_bit(KVM_REQ_TLB_FLUSH, vcpu-requests))
+ set_bit(KVM_REQ_TLB_FLUSH, vcpu-requests);
On 04/20/09 14:43, Avi Kivity wrote:
Gerd Hoffmann wrote:
That said, I'd like to be able to emulate the Xen HVM hypercalls. But in
any case, they hypercall implementation has to be in the kernel,
No. With Xenner the xen hypercall emulation code lives in guest
address space.
In this case the
Gerd Hoffmann wrote:
On 04/20/09 14:43, Avi Kivity wrote:
Gerd Hoffmann wrote:
That said, I'd like to be able to emulate the Xen HVM hypercalls.
But in
any case, they hypercall implementation has to be in the kernel,
No. With Xenner the xen hypercall emulation code lives in guest
address
Hi,
The bug report below does indeed match everything I have experienced.
Upon further inspection, 2.6.28.9 is also affected, just less so.
Unfortunately I have applied this patch to 2.6.29.1:
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=2f181855a0
And if
(Applies to kvm-userspace.git:a1075de527f309850df278484f2ef4127827c6f4)
The PCI spec requires bit 4 of the config-space STATUS register to be set
in order to indicate that the capabilities pointer and capabilities area are
valid. We have a pci_enable_capabilities() routine to fill out the
Gleb Natapov wrote:
On Fri, Apr 17, 2009 at 03:12:57PM +, Dmitry Eremin-Solenikov wrote:
This patch does expose some problems on real HW. The first NMI completes w/o
problems. However If I try to boot the kernel w/ nmi_watchdog=1 or to trigger
two NMIs from the monitor, kernel is stuck
The stats entry request_nmi is no longer used as the related user space
interface was dropped. So clean it up.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
arch/x86/include/asm/kvm_host.h |1 -
arch/x86/kvm/x86.c |1 -
2 files changed, 0 insertions(+), 2
Well, I just tried disabling smp on my guest, and live migration worked
fine. I see that there are already SMP complaints with live migration in
KVM:84 in the bug database, so I guess this is just another, Me, too.
Is this expected to be fixed in the soon-to-be-released KVM:85?
Thanks,
Hi,
I reviewed my code (modify some things and add missing features) and made more
tests, but I'm stuck with the same problem.
Nonetheless, all the tests I've done seem to freeze my machine when files are
used.
When I try the commands echo, pwd in the console (X is not started), the
machine
Eric Lacombe wrote:
Hi,
I reviewed my code (modify some things and add missing features) and made more
tests, but I'm stuck with the same problem.
Nonetheless, all the tests I've done seem to freeze my machine when files are
used.
When I try the commands echo, pwd in the console (X is not
Bugs item #2776577, was opened at 2009-04-20 13:23
Message generated for change (Tracker Item Submitted) made by tljohnsn
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2776577group_id=180599
Please note that this message will contain a full copy of the
A patch for iterating over VM reboot
- Supriya Kannery,
LTC, IBM
diff -Naurp kvm-autotest/client/tests/kvm_runtest_2/kvm_tests.cfg.sample
kvm-autotest.mod/client/tests/kvm_runtest_2/kvm_tests.cfg.sample
--- kvm-autotest/client/tests/kvm_runtest_2/kvm_tests.cfg.sample
2009-04-13
* supriya kannery supri...@in.ibm.com [2009-04-20 13:49]:
A patch for iterating over VM reboot
- Supriya Kannery,
LTC, IBM
Needs a Signed-off-by:
diff -Naurp kvm-autotest/client/tests/kvm_runtest_2/kvm_tests.cfg.sample
kvm-autotest.mod/client/tests/kvm_runtest_2/kvm_tests.cfg.sample
On Friday 17 April 2009 17:08:07 Jared Hulbert wrote:
As everyone knows, my favourite thing is to say nasty things about any
new feature that adds complexity to common code. I feel like crying to
hear about how many more instances of MS Office we can all run, if only
we apply this patch.
32 matches
Mail list logo