repository: /home/vadimr/shares/kvm-guest-drivers-windows
branch: master
commit ed4b9ade27b56e9ee37461c2cf72e46d75633e9c
Author: Vadim Rozenfeldvroze...@redhat.com
Date: Wed Sep 23 11:28:48 2009 +0300
[PATCH] viostor driver. switch to full-duplex mode.
Signed-off-by: Vadim
Am 22.09.2009 um 18:26 schrieb Joerg Roedel j...@8bytes.org:
On Fri, Sep 18, 2009 at 03:00:29PM +0200, Alexander Graf wrote:
SVM has some cleanup code, that tries to reinject interrupts and
exceptions
when the guest didn't manage to deal with them yet. It basically
transfers
them to KVM
Am 22.09.2009 um 18:26 schrieb Joerg Roedel j...@8bytes.org:
On Fri, Sep 18, 2009 at 03:00:29PM +0200, Alexander Graf wrote:
SVM has some cleanup code, that tries to reinject interrupts and
exceptions
when the guest didn't manage to deal with them yet. It basically
transfers
them to KVM
Am 22.09.2009 um 18:39 schrieb Joerg Roedel j...@8bytes.org:
On Fri, Sep 18, 2009 at 03:00:30PM +0200, Alexander Graf wrote:
Real hardware would first process the event_inj field and then
notify the
host that an interrupt is waiting.
Does it really? I couldn't find this in the SVM spec.
On Wed, Sep 23, 2009 at 01:05:57AM -0700, Alexander Graf wrote:
Am 22.09.2009 um 18:26 schrieb Joerg Roedel j...@8bytes.org:
On Fri, Sep 18, 2009 at 03:00:29PM +0200, Alexander Graf wrote:
SVM has some cleanup code, that tries to reinject interrupts and
exceptions
when the guest didn't
On 09/22/2009 05:51 PM, Gleb Natapov wrote:
Otherwise cpu is always unhalted by call to kvm_arch_get_registers()
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
On 09/22/2009 05:51 PM, Gleb Natapov wrote:
Signed-off-by: Gleb Natapovg...@redhat.com
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
On 09/22/2009 05:51 PM, Gleb Natapov wrote:
Each caller of the function already calls it.
Signed-off-by: Gleb Natapovg...@redhat.com
---
hw/apic.c |1 -
1 files changed, 0 insertions(+), 1 deletions(-)
diff --git a/hw/apic.c b/hw/apic.c
index 3a2e128..a9d1fb8 100644
--- a/hw/apic.c
+++
On 09/21/2009 10:50 PM, Michael S. Tsirkin wrote:
On Mon, Sep 21, 2009 at 05:56:13PM +0300, Avi Kivity wrote:
On 09/21/2009 05:51 PM, Michael S. Tsirkin wrote:
When running on host kernel which does not let the guest manupulate the
gsi routing, and user requested MSI-X to be enabled,
On 09/21/2009 10:24 PM, Lucas Meneghel Rodrigues wrote:
Ok, tests ended, indeed a problem showed up - we still have the
problem I reported with the options -no-kvm-irqchip -no-kvm-pit *when*
are coupled with the option -smp 2.
If -smp 2 is not present, qemu works fine with the options
The Buildbot has detected a new failure of disable_kvm_x86_64_out_of_tree on
qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/disable_kvm_x86_64_out_of_tree/builds/19
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build:
The Buildbot has detected a new failure of disable_kvm_x86_64_debian_5_0 on
qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/disable_kvm_x86_64_debian_5_0/builds/70
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build:
The Buildbot has detected a new failure of disable_kvm_i386_debian_5_0 on
qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/disable_kvm_i386_debian_5_0/builds/71
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build:
Now :)
You can compile the drivers from the
git://git.kernel.org/pub/scm/virt/kvm/kvm-guest-drivers-windows.git
Use Vista drivers for Win2008R2 if you use default build scripts. You can
also use latest WDK and compile the code for Windows 2008 R2.
Please keep in mind that you need to test sign
Test 802.1Q vlan of nic, config it by vconfig command.
1) Create two VMs
2) Setup guests in different vlan by vconfig and test communication by ping
using hard-coded ip address
3) Setup guests in same vlan and test communication by ping
4) Recover the vlan config
Signed-off-by: Amos Kong
Avi,
This is the patch to enable PLE, which depends on the a small change of
Linux scheduler
(see http://lkml.org/lkml/2009/5/20/447).
According to our discussion last time, one missing part is that if PLE
exit, pick up an unscheduled vcpu at random and schedule it. But
further investigation
On 09/23/2009 05:04 PM, Zhai, Edwin wrote:
Avi,
This is the patch to enable PLE, which depends on the a small change
of Linux scheduler
(see http://lkml.org/lkml/2009/5/20/447).
According to our discussion last time, one missing part is that if PLE
exit, pick up an unscheduled vcpu at random
Avi Kivity wrote:
On 09/22/2009 12:43 AM, Ira W. Snyder wrote:
Sure, virtio-ira and he is on his own to make a bus-model under that, or
virtio-vbus + vbus-ira-connector to use the vbus framework. Either
model can work, I agree.
Yes, I'm having to create my own bus model, a-la
On 09/23/2009 05:26 PM, Gregory Haskins wrote:
Yes, I'm having to create my own bus model, a-la lguest, virtio-pci, and
virtio-s390. It isn't especially easy. I can steal lots of code from the
lguest bus model, but sometimes it is good to generalize, especially
after the fourth
Avi Kivity wrote:
On 09/23/2009 05:26 PM, Gregory Haskins wrote:
Yes, I'm having to create my own bus model, a-la lguest, virtio-pci,
and
virtio-s390. It isn't especially easy. I can steal lots of code from
the
lguest bus model, but sometimes it is good to generalize, especially
after
Avi Kivity wrote:
On 09/22/2009 05:51 PM, Gleb Natapov wrote:
Each caller of the function already calls it.
Signed-off-by: Gleb Natapovg...@redhat.com
---
hw/apic.c |1 -
1 files changed, 0 insertions(+), 1 deletions(-)
diff --git a/hw/apic.c b/hw/apic.c
index 3a2e128..a9d1fb8
On 09/23/2009 06:07 PM, Jan Kiszka wrote:
Avi Kivity wrote:
On 09/22/2009 05:51 PM, Gleb Natapov wrote:
Each caller of the function already calls it.
Signed-off-by: Gleb Natapovg...@redhat.com
---
hw/apic.c |1 -
1 files changed, 0 insertions(+), 1 deletions(-)
diff --git
Avi Kivity wrote:
On 09/23/2009 06:07 PM, Jan Kiszka wrote:
Avi Kivity wrote:
On 09/22/2009 05:51 PM, Gleb Natapov wrote:
Each caller of the function already calls it.
Signed-off-by: Gleb Natapovg...@redhat.com
---
hw/apic.c |1 -
1 files changed, 0 insertions(+), 1
Hi,
I would like to call attention to the SQLite performance under KVM in
the current Ubuntu Alpha.
http://www.phoronix.com/scan.php?page=articleitem=linux_2631_kvmnum=3
SQLite's benchmark as part of the Phoronix Test Suite is typically IO
limited and is affected by both disk and filesystem
Gregory Haskins wrote:
Avi Kivity wrote:
On 09/23/2009 05:26 PM, Gregory Haskins wrote:
Yes, I'm having to create my own bus model, a-la lguest, virtio-pci,
and
virtio-s390. It isn't especially easy. I can steal lots of code from
the
lguest bus model, but sometimes it is good to
Hope i fixed everything i was asked...
please tell me if I forgot anything.
Izik Eidus (3):
kvm: dont hold pagecount reference for mapped sptes pages
add SPTE_HOST_WRITEABLE flag to the shadow ptes
add support for change_pte mmu notifiers
arch/x86/include/asm/kvm_host.h |1 +
When using mmu notifiers, we are allowed to remove the page count
reference tooken by get_user_pages to a specific page that is mapped
inside the shadow page tables.
This is needed so we can balance the pagecount against mapcount
checking.
(Right now kvm increase the pagecount and does not
this flag notify that the host physical page we are pointing to from
the spte is write protected, and therefore we cant change its access
to be write unless we run get_user_pages(write = 1).
(this is needed for change_pte support in kvm)
Signed-off-by: Izik Eidus iei...@redhat.com
---
this is needed for kvm if it want ksm to directly map pages into its
shadow page tables.
Signed-off-by: Izik Eidus iei...@redhat.com
---
arch/x86/include/asm/kvm_host.h |1 +
arch/x86/kvm/mmu.c | 64 +-
virt/kvm/kvm_main.c | 14
Izik Eidus wrote:
this is needed for kvm if it want ksm to directly map pages into its
shadow page tables.
Signed-off-by: Izik Eidus iei...@redhat.com
---
arch/x86/include/asm/kvm_host.h |1 +
arch/x86/kvm/mmu.c | 64 +-
Change from v2 : remove unused if.
Thanks.
Izik Eidus (3):
kvm: dont hold pagecount reference for mapped sptes pages
add SPTE_HOST_WRITEABLE flag to the shadow ptes
add support for change_pte mmu notifiers
arch/x86/include/asm/kvm_host.h |1 +
arch/x86/kvm/mmu.c | 84
When using mmu notifiers, we are allowed to remove the page count
reference tooken by get_user_pages to a specific page that is mapped
inside the shadow page tables.
This is needed so we can balance the pagecount against mapcount
checking.
(Right now kvm increase the pagecount and does not
this flag notify that the host physical page we are pointing to from
the spte is write protected, and therefore we cant change its access
to be write unless we run get_user_pages(write = 1).
(this is needed for change_pte support in kvm)
Signed-off-by: Izik Eidus iei...@redhat.com
---
this is needed for kvm if it want ksm to directly map pages into its
shadow page tables.
Signed-off-by: Izik Eidus iei...@redhat.com
---
arch/x86/include/asm/kvm_host.h |1 +
arch/x86/kvm/mmu.c | 62 +-
virt/kvm/kvm_main.c | 14
On Sun, Sep 20, 2009 at 3:49 PM, Aidan Marks ai...@cisco.com wrote:
Ah, right. ok. hmm, still getting these symbol warnings:
vger kvm-kmod # git checkout -b queue origin/queue
M linux-2.6
Branch queue set up to track remote branch queue from origin.
Switched to a new branch 'queue'
On 09/23/2009 08:58 PM, Gregory Haskins wrote:
It also pulls parts of the device model into the host kernel.
That is the point. Most of it needs to be there for performance.
To clarify this point:
There are various aspects about designing high-performance virtual
devices such
Avi Kivity wrote:
On 09/23/2009 08:58 PM, Gregory Haskins wrote:
It also pulls parts of the device model into the host kernel.
That is the point. Most of it needs to be there for performance.
To clarify this point:
There are various aspects about designing high-performance
The dirty bitmap copied out to userspace is stored in a long array, and gets
copied out to userspace accordingly. This patch accounts for that correctly.
Currently I'm seeing kvm crashing due to writing beyond the end of the alloc'd
dirty bitmap memory, because the buffer has the wrong size.
Signed-off-by: Zachary Amsden zams...@redhat.com
---
arch/x86/kvm/x86.c | 23 +++
1 files changed, 15 insertions(+), 8 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index fedac9d..15d2ace 100644
--- a/arch/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@
Both VMX and SVM require per-cpu memory allocation, which is done at module
init time, for only online cpus. When bringing a new CPU online, we must
also allocate this structure. The method chosen to implement this is to
make the CPU online notifier available via a call to the arch code. This
In the process of bringing down CPUs, the SVM / VMX structures associated
with those CPUs are not freed. This may cause leaks when unloading and
reloading the KVM module, as only the structures associated with online
CPUs are cleaned up.
Signed-off-by: Zachary Amsden zams...@redhat.com
---
For the non-hotplug case, this TSC speed should be available; instead, clear
cpu_khz_tsc when bringing down a CPU so it is recomputed at the next bringup.
Signed-off-by: Zachary Amsden zams...@redhat.com
---
arch/x86/kvm/x86.c | 12 +---
1 files changed, 5 insertions(+), 7 deletions(-)
CPU frequency change callback provides new TSC frequency for us, and in the
same units (kHz), so there is no reason to do any math.
Signed-off-by: Zachary Amsden zams...@redhat.com
---
arch/x86/kvm/x86.c |5 +
1 files changed, 1 insertions(+), 4 deletions(-)
diff --git
They are globals, not clearly protected by any ordering or locking, and
vulnerable to various startup races.
Instead, for variable TSC machines, register the cpufreq notifier and get
the TSC frequency directly from the cpufreq machinery. Not only is it
always right, it is also perfectly
Hi all,
Today's linux-next build (powerpc ppc44x_defconfig) failed like this:
In file included from arch/powerpc/kvm/booke.c:31:
arch/powerpc/kvm/timing.h: In function 'kvmppc_account_exit_stat':
arch/powerpc/kvm/timing.h:51: error: bit-field 'anonymous' width not an
integer constant
In file
45 matches
Mail list logo