From: Robert P. J. Day rpj...@crashcourse.ca
Signed-off-by: Robert P. J. Day rpj...@crashcourse.ca
Cc: Avi Kivity a...@redhat.com
Signed-off-by: Andrew Morton a...@linux-foundation.org
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/Kconfig b/arch/x86/kvm/Kconfig
index
From: Marcelo Tosatti mtosa...@redhat.com
Verify the cr3 address stored in vcpu-arch.cr3 points to an existant
memslot. If not, inject a triple fault.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/mmu.c
From: Carsten Otte co...@de.ibm.com
This patch makes sure we do unlink a vcpu's sie control block
from the system control area in kvm_arch_vcpu_destroy. This
prevents illegal accesses to the sie control block from other
virtual cpus after free.
Reported-by: Mijo Safradin m...@linux.vnet.ibm.com
From: Gleb Natapov g...@redhat.com
It is done for exception and interrupt already.
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index 8b5ffbd..ac3d5ba 100644
--- a/arch/x86/kvm/svm.c
+++
From: Christian Borntraeger borntrae...@de.ibm.com
This patch reworks the s390 clock comparator wakeup to hrtimer. The clock
comparator is a per-cpu value that is compared against the TOD clock. If
ckc = TOD an external interrupt 1004 is triggered. Since the clock comparator
and the TOD clock
From: Christian Borntraeger borntrae...@de.ibm.com
The floating interrupt lock is only taken in process context. We can
replace all spin_lock_bh with standard spin_lock calls.
Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com
Signed-off-by: Christian Ehrhardt ehrha...@de.ibm.com
From: Carsten Otte co...@de.ibm.com
This check verifies that the guest we're trying to run in KVM_RUN
has some memory assigned to it. It enters an endless exception
loop if this is not the case.
Reported-by: Mijo Safradin m...@linux.vnet.ibm.com
Signed-off-by: Carsten Otte co...@de.ibm.com
From: Gleb Natapov g...@redhat.com
The exception will immediately close the interrupt window.
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 33f850b..d9396a7 100644
--- a/arch/x86/kvm/x86.c
+++
From: Gleb Natapov g...@redhat.com
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index ac3d5ba..1315ce0 100644
--- a/arch/x86/kvm/svm.c
+++ b/arch/x86/kvm/svm.c
@@ -228,7 +228,9 @@ static void
From: Gleb Natapov g...@redhat.com
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 7037afa..44e87a5 100644
--- a/arch/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@ -3138,7 +3138,10 @@ static void
From: Gleb Natapov g...@redhat.com
Re-inject event instead. This is what Intel suggest. Also use correct
instruction length when re-injecting soft fault/interrupt.
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/include/asm/kvm_host.h
From: Avi Kivity a...@redhat.com
Conflicts:
arch/x86/kvm/x86.c
Signed-off-by: Avi Kivity a...@redhat.com
--
To unsubscribe from this list: send the line unsubscribe kvm-commits in
the body of a message to majord...@vger.kernel.org
More majordomo info at
From: Gleb Natapov g...@redhat.com
Currently they are not requested if there is pending exception.
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index e395ca4..efba9bc 100644
--- a/arch/x86/kvm/x86.c
From: Gleb Natapov g...@redhat.com
To save us one reading of VM_EXIT_INTR_INFO.
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 29b49f0..fe2ce2b 100644
--- a/arch/x86/kvm/vmx.c
+++
From: Gleb Natapov g...@redhat.com
INTn will be re-executed after migration. If we wanted to migrate
pending software interrupt we would need to migrate interrupt type
and instruction length too, but we do not have all required info on
SVM, so SVM-VMX migration would need to re-execute INTn
Use standard msr-index.h's MSR declaration.
MSR_IA32_TSC is better than MSR_IA32_TIME_STAMP_COUNTER as it also solves
80 column issue.
Signed-off-by: Jaswinder Singh Rajput jaswinderraj...@gmail.com
---
arch/x86/include/asm/kvm_host.h |2 --
arch/x86/kvm/svm.c |4 ++--
Am Wednesday 13 May 2009 21:08:58 schrieb Michael S. Tsirkin:
This replaces find_vq/del_vq with find_vqs/del_vqs virtio operations,
and updates all drivers. This is needed for MSI support, because MSI
needs to know the total number of vectors upfront.
[...]
---
- jason wang jasow...@redhat.com wrote:
sudhir kumar 写道:
Hi Uri/Lucas,
Do you have any plans for enhancing kvm-autotest?
I was looking mainly on the following 2 aspects:
(1).
we have standalone migration only. Is there any plans of enhancing
kvm-autotest so that we can
Ross Boylan wrote:
Thanks for all the info. I have one follow up.
On Wed, 2009-05-13 at 10:07 +0300, Avi Kivity wrote:
As I install software onto a system I want to preserve its
state--just
the disk state---at various points so I can go back. What is the
best
Dong, Eddie wrote:
OK.
Also back to Gleb's question, the reason I want to do that is to simplify event
generation mechanism in current KVM.
Today KVM use additional layer of exception/nmi/interrupt such as
vcpu.arch.exception.pending, vcpu-arch.interrupt.pending
vcpu-arch.nmi_injected.
All
Mark McLoughlin wrote:
- There will be no stable releases, as such, of the kernel module.
You should use upstream linux releases instead - e.g. the latest
stable release is 2.6.29.2
Actually, I do plan to release kvm-kmod-2.6.30 (and kvm-kmod-2.6.30.x).
--
error compiling
Gregory Haskins wrote:
KVM provides a complete virtual system environment for guests, including
support for injecting interrupts modeled after the real exception/interrupt
facilities present on the native platform (such as the IDT on x86).
Virtual interrupts can come from a variety of sources
On Wed, May 13, 2009 at 11:30 PM, Michael Goldish mgold...@redhat.com wrote:
- sudhir kumar smalik...@gmail.com wrote:
Hi Uri/Lucas,
Do you have any plans for enhancing kvm-autotest?
I was looking mainly on the following 2 aspects:
(1).
we have standalone migration only. Is there any
I had a similar problem some weeks ago. Finally I found out that my VM
running WinXP was working on a non-acpi system (maybe I started kvm
with -no-acpi option during the installation). In the Device Manager
there has to be the entry Computer-ACPI Multiprocessor PC.
Otherwise the VM produced 100%
On Thu, May 14, 2009 at 12:22 PM, jason wang jasow...@redhat.com wrote:
sudhir kumar 写道:
Hi Uri/Lucas,
Do you have any plans for enhancing kvm-autotest?
I was looking mainly on the following 2 aspects:
(1).
we have standalone migration only. Is there any plans of enhancing
kvm-autotest
Hi Jason,
We already have patches that implement similar functionality here in
TLV, as mentioned in the to-do list (item #4 under 'Framework').
They're not yet committed upstream because they're still quite fresh.
Still, your patch looks good and is quite similar to mine. The main
difference is
- sudhir kumar smalik...@gmail.com wrote:
On Thu, May 14, 2009 at 12:22 PM, jason wang jasow...@redhat.com
wrote:
sudhir kumar 写道:
Hi Uri/Lucas,
Do you have any plans for enhancing kvm-autotest?
I was looking mainly on the following 2 aspects:
(1).
we have standalone
Here's the latest draft of virtio patches.
This is on top of Rusty's recent virtqueue list + name patch,
which is included in series for completeness.
Changelog:
changes since v5: fix build on s390 (only patch 2/4 modified)
Michael S. Tsirkin (3):
virtio: find_vqs/del_vqs virtio
From: Rusty Russell ru...@rustcorp.com.au
Add a linked list of all virtqueues for a virtio device: this helps for
debugging and is also needed for upcoming interface change.
Also, add a name field for clearer debug messages.
Signed-off-by: Rusty Russell ru...@rustcorp.com.au
---
including this
This implements optional MSI-X support in virtio_pci.
MSI-X is used whenever the host supports at least 2 MSI-X
vectors: 1 for configuration changes and 1 for virtqueues.
Per-virtqueue vectors are allocated if enough vectors
available.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
Gregory Haskins wrote:
iofd is a mechanism to register PIO/MMIO regions to trigger an eventfd
signal when written to. Userspace can register any arbitrary address
with a corresponding eventfd.
Please start a separate patchset for this so I can merge irqfd.
diff --git
- sudhir kumar smalik...@gmail.com wrote:
On Wed, May 13, 2009 at 11:30 PM, Michael Goldish
mgold...@redhat.com wrote:
- sudhir kumar smalik...@gmail.com wrote:
Hi Uri/Lucas,
Do you have any plans for enhancing kvm-autotest?
I was looking mainly on the following 2
Gregory Haskins wrote:
KVM provides a complete virtual system environment for guests, including
support for injecting interrupts modeled after the real exception/interrupt
facilities present on the native platform (such as the IDT on x86).
Virtual interrupts can come from a variety of sources
Avi Kivity wrote:
Gregory Haskins wrote:
KVM provides a complete virtual system environment for guests, including
support for injecting interrupts modeled after the real
exception/interrupt
facilities present on the native platform (such as the IDT on x86).
Virtual interrupts can come from a
Avi Kivity wrote:
Gregory Haskins wrote:
iofd is a mechanism to register PIO/MMIO regions to trigger an eventfd
signal when written to. Userspace can register any arbitrary address
with a corresponding eventfd.
Please start a separate patchset for this so I can merge irqfd.
Ack. Will
Glauber Costa wrote:
In the call path of kvm_get_dirty_pages_log_range(),
its caller kvm_get_dirty_bitmap_cb() passes the
target_phys_addr_t both as start_addr and the offset.
So, using int will make dirty tracking over 4G fail
completely.
Applied, thanks.
Of course we should be using
Gregory Haskins wrote:
Please fget() the new fd and compare the filps; fds aren't meaningful
in the kernel. You can also drop _irqfd::fd.
I like this as a second option...
It may also be useful to compare the gsi, this allows a
make-before-break switchover:
...but I like this
Gregory Haskins wrote:
+#define KVM_IOFD_FLAG_PIO (1 1)
+
+struct kvm_iofd {
+__u64 addr;
+__u32 len;
+__u32 fd;
+__u32 flags;
+__u8 pad[12];
+};
+
Please add a data match capability. virtio uses a write with the data
containing the queue ID, and we want a
Tomasz Chmielewski schrieb:
The keyboard is not present after I reboot the guest and usually type
before Linux is started. It does not happen always.
Observed with kvm-83, kvm-84, kvm-85 on multiple KVM hosts (different
hardware).
Anyone else seeing this? If you're not sure, do something
Avi Kivity wrote:
Gregory Haskins wrote:
Please fget() the new fd and compare the filps; fds aren't meaningful
in the kernel. You can also drop _irqfd::fd.
I like this as a second option...
It may also be useful to compare the gsi, this allows a
make-before-break switchover:
Tomasz Chmielewski schrieb:
Tomasz Chmielewski schrieb:
The keyboard is not present after I reboot the guest and usually type
before Linux is started. It does not happen always.
Observed with kvm-83, kvm-84, kvm-85 on multiple KVM hosts (different
hardware).
Anyone else seeing this? If
Avi Kivity wrote:
Dong, Eddie wrote:
OK.
Also back to Gleb's question, the reason I want to do that is to
simplify event
generation mechanism in current KVM.
Today KVM use additional layer of exception/nmi/interrupt such as
vcpu.arch.exception.pending, vcpu-arch.interrupt.pending
On Thu, May 14, 2009 at 09:43:33PM +0800, Dong, Eddie wrote:
Avi Kivity wrote:
Dong, Eddie wrote:
OK.
Also back to Gleb's question, the reason I want to do that is to
simplify event
generation mechanism in current KVM.
Today KVM use additional layer of exception/nmi/interrupt such
Hi all
I'm newbie on list.
I have deploy a system here, with a Ubuntu Server running KVM.
Well, when I run virt-clone command, I get this error:
CMD: virt-clone -o vm01 -n VMUbuntu-2 -f /virt/ubuntu-2.img
RESULT:
Traceback (most recent call last):
File /usr/lib/python2.6/logging/__init__.py,
On Thu, May 14, 2009 at 9:16 AM, Gilberto Nunes
gilberto.nu...@selbetti.com.br wrote:
Hi all
I'm newbie on list.
I have deploy a system here, with a Ubuntu Server running KVM.
Well, when I run virt-clone command, I get this error:
CMD: virt-clone -o vm01 -n VMUbuntu-2 -f /virt/ubuntu-2.img
On Wed, May 13, 2009 at 09:56:18AM +0300, Avi Kivity wrote:
Ross Boylan wrote:
I just installed XP into a new VM, specifying -smp 2 for the machine.
According to top, it's using nearly 200% of a cpu even when I'm not
doing anything.
Is this real CPU useage, or just a reporting problem (just
Gleb Natapov wrote:
On Thu, May 14, 2009 at 09:43:33PM +0800, Dong, Eddie wrote:
Avi Kivity wrote:
Dong, Eddie wrote:
OK.
Also back to Gleb's question, the reason I want to do that is to
simplify event generation mechanism in current KVM.
Today KVM use additional layer of
On Thu, 2009-05-14 at 10:32 +0800, Yu Zhao wrote:
Make iommu_flush_iotlb_psi() and flush_unmaps() more readable.
This doesn't apply any more.
--
David WoodhouseOpen Source Technology Centre
david.woodho...@intel.com Intel Corporation
--
On Thu, 2009-05-14 at 12:19 +0200, Johannes Schlatow wrote:
I had a similar problem some weeks ago. Finally I found out that my VM
running WinXP was working on a non-acpi system (maybe I started kvm
with -no-acpi option during the installation). In the Device Manager
there has to be the entry
On Thu, May 14, 2009 at 10:34:11PM +0800, Dong, Eddie wrote:
Gleb Natapov wrote:
On Thu, May 14, 2009 at 09:43:33PM +0800, Dong, Eddie wrote:
Avi Kivity wrote:
Dong, Eddie wrote:
OK.
Also back to Gleb's question, the reason I want to do that is to
simplify event generation mechanism
On Thursday 14 May 2009, Avi Kivity wrote:
There aren't the real kernel headers, just cheap copies carried in
qemu-kvm.git which have been appropriately postprocessed. We do this
since the kvm external module can run on a much older kernel, so there
is no natural place to find it
Avi Kivity wrote:
Gregory Haskins wrote:
KVM provides a complete virtual system environment for guests, including
support for injecting interrupts modeled after the real
exception/interrupt
facilities present on the native platform (such as the IDT on x86).
Virtual interrupts can come from a
Arnd Bergmann wrote:
On Thursday 14 May 2009, Avi Kivity wrote:
There aren't the real kernel headers, just cheap copies carried in
qemu-kvm.git which have been appropriately postprocessed. We do this
since the kvm external module can run on a much older kernel, so there
is no natural
On Thursday 14 May 2009, Avi Kivity wrote:
I usually add a readlink -f in there due to my innate fear of relative
directories and cd.
There is one already in the only place where this gets used:
KERNELDIR=$(readlink -f $kerneldir)
It also gets shown in the configure --help output, but I
The Host--Guest calls in virtio_blk (using the generic virtio kick/notify)
are as follows:
Guest-Host
---
do_virtlkb_request calls kick in the guest side causing handle_output to be
called on the host side.
Host-Guest
---
virtio_blk_rw_complete calls notify in the host side
Anthony Liguori wrote:
Vincent Minet wrote:
External ACPI tables are counted twice for the RSDT size and the load
address for the first external table is in the MADT (interrupt override
entries are overwritten).
Signed-off-by: Vincent Minet vinc...@vincent-minet.net
Beth,
I think you had
KVM provides a complete virtual system environment for guests, including
support for injecting interrupts modeled after the real exception/interrupt
facilities present on the native platform (such as the IDT on x86).
Virtual interrupts can come from a variety of sources (emulated devices,
irqfd lets you create an eventfd based file-desriptor to inject interrupts
to a kvm guest. We associate one gsi per fd for fine-grained routing.
Signed-off-by: Gregory Haskins ghask...@novell.com
---
kvm/libkvm/libkvm.c | 57 +++
Amit,
I trying to use PVDMA. I've downloaded a kernel snapshot from the your
kvm git, but I couldn't download a snapshot or the repo from your kvm-userspace
tree. I tried to launch the VM using kvm-85 user space but it hangs before
loading it. Should it work with kvm-85 user space? Do
malc wrote:
On Wed, 13 May 2009, Sebastian Herbszt wrote:
Jan Kiszka wrote:
Moreover, does sound work at all with your qemu?
The image I tried [1] issues two beeps after loading (obviously via
direct hw access) - a good way to check general support. Note that one
reason for broken host
On Wed, 2009-05-13 at 09:56 +0300, Avi Kivity wrote:
Ross Boylan wrote:
I just installed XP into a new VM, specifying -smp 2 for the machine.
According to top, it's using nearly 200% of a cpu even when I'm not
doing anything.
Is this real CPU useage, or just a reporting problem (just as
Convert custom marker based KVMTRACE to event trace.
Applies on top of
git://git.kernel.org/pub/scm/linux/kernel/git/mingo/linux-2.6-x86.git
See Documentation/trace/events.txt and commit
7ce7e4249921d5073e764f7ff7ad83cfa9894bd7 if you're interested in playing
with event traces.
Index:
In order to allow sync'ing the kmod dir against arbitrary kernels trees,
extend the sync script to accept alternative paths and adjust the
Makefile accordingly.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
Makefile |3 ++-
sync | 14 +++---
2 files changed, 13
The in-kernel speaker emulation is only a dummy and also unneeded from
the performance point of view. Rather, it takes user space support to
generate sound output on the host, e.g. console beeps.
To allow this, introduce KVM_CREATE_PIT2 which controls in-kernel
speaker port emulation via a flag
When using the in-kernel PIT the speaker emulation has to synchronize
the PIT state with KVM. Enhance the existing speaker sound device and
allow it to take over port 0x61 by using KVM_CREATE_PIT2 where
available. This unbreaks -soundhw pcspk in KVM mode.
Changes in v4:
- preserve full PIT state
Does KVM already take advantage of Intel VT-d2 features, e.g. interrupt
remapping support? Has anyone verified how it improves interrupt delivery for
PCI pass-through devices?
Thanks,
Anna
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
In certain situations, trying to do a rmmod on the kvm modules might
generate errors, as there is a chain of dependencies involved. Instead,
let's use modprobe -r, as it handles dependencies.
Signed-off-by: Lucas Meneghel Rodrigues mrodr...@redhat.com
diff --git
We have verified VT-d2 features works with PCI passthrough on KVM. To enable
it, you need to turn on interrupt remapping in kernel config.
Interrupt remapping is a security/isolation feature where interrupt delivery is
qualified with device's bus/device/function in interrupt remapping table
On Thu, 14 May 2009, Sebastian Herbszt wrote:
malc wrote:
On Wed, 13 May 2009, Sebastian Herbszt wrote:
Jan Kiszka wrote:
Moreover, does sound work at all with your qemu?
The image I tried [1] issues two beeps after loading (obviously via
direct hw access) - a good way to
I thought that one use case of VT-d2 interrupt remapping was to be able to
safely and more efficiently deliver interrupts to the CPU that runs the
particular VCPU of the guest that owns the I/O device that issues the
interrupt. Shouldn't there at least be some performance (e.g. latency)
Are there any plans to enhance virtio_net with receive-side scaling
capabilities, so that an SMP guest OS can balance its network processing load
more equally across multiple CPUs?
Thanks,
Anna
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
In both interrupt remapping and no interrupt remapping cases, interrupts from
the passthrough device are still delivered to the host kernel. KVM then
injects the interrupt to guest via vlapic-vioapic-vmcs path.
The value add from interrupt remapping is that a new source ID field in
interrupt
Bugs item #2638990, was opened at 2009-02-25 23:35
Message generated for change (Settings changed) made by sf-robot
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2638990group_id=180599
Please note that this message will contain a full copy of the comment
On Thu, 14 May 2009, Gregory Haskins wrote:
Avi Kivity wrote:
Gregory Haskins wrote:
KVM provides a complete virtual system environment for guests, including
support for injecting interrupts modeled after the real
exception/interrupt
facilities present on the native platform (such as
Michael Goldish 写道:
- jason wang jasow...@redhat.com wrote:
sudhir kumar 写道:
Hi Uri/Lucas,
Do you have any plans for enhancing kvm-autotest?
I was looking mainly on the following 2 aspects:
(1).
we have standalone migration only. Is there any plans of enhancing
kvm-autotest so
Does KVM allow passing through a full multi-function PCI device to a guest, and
make that device appear as a whole multi-function device rather than as
multiple PCI single-function devices (e.g. Xen only does the latter where all
PCI devices appear with function ID being 0 in the guest)?
Greetings all,
The first test results for Linux/iSCSI Initiators and targets for large
block sizes using 10 Gb/sec Ethernet + PCIe device-passthrough into
Linux/KVM guests have been posted at:
http://linux-iscsi.org/index.php/KVM-LIO-Target
So far, the results have been quite impressive using
And here's the fixup patch I applied:
diff --git a/drivers/lguest/lguest_device.c b/drivers/lguest/lguest_device.c
--- a/drivers/lguest/lguest_device.c
+++ b/drivers/lguest/lguest_device.c
@@ -318,11 +318,11 @@ static void lg_del_vqs(struct virtio_dev
struct virtqueue *vq, *n;
78 matches
Mail list logo