Signed-off-by: Yolkfull Chow yz...@redhat.com
---
client/tests/kvm/kvm_vm.py |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/client/tests/kvm/kvm_vm.py b/client/tests/kvm/kvm_vm.py
index 55220f9..8ae 100755
--- a/client/tests/kvm/kvm_vm.py
+++
Hi all,
the kvm-XX packages always included the kernel module, but this is not the case
for stable qemu-kvm-0.11.0? So I am trying to compile the latest kernel module
for our 2.6.24 kernel.
# git clone git://git.kernel.org/pub/scm/virt/kvm/kvm-kmod.git
# cd kvm-kmod
# git submodule update
Avi Kivity wrote:
+#define KVM_VMX_DEFAULT_PLE_GAP41
+#define KVM_VMX_DEFAULT_PLE_WINDOW 4096
+static int __read_mostly ple_gap = KVM_VMX_DEFAULT_PLE_GAP;
+module_param(ple_gap, int, S_IRUGO);
+
+static int __read_mostly ple_window = KVM_VMX_DEFAULT_PLE_WINDOW;
+module_param(ple_window,
VirtIO is still broken in qemu-kvm-0-11.0. Reverting the patch solves the
problem.
Should I report that bug somewhere else?
- Dietmar
-Original Message-
From: kvm-ow...@vger.kernel.org [mailto:kvm-ow...@vger.kernel.org] On
Behalf Of Alexey Eromenko
Sent: Donnerstag, 23. Juli 2009
Bugs item #2868883, was opened at 2009-09-28 15:27
Message generated for change (Tracker Item Submitted) made by mdw21
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2868883group_id=180599
Please note that this message will contain a full copy of the
Bugs item #2868883, was opened at 2009-09-28 15:27
Message generated for change (Comment added) made by mdw21
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2868883group_id=180599
Please note that this message will contain a full copy of the comment
On Wed, Sep 23, 2009 at 09:47:15PM +0300, Izik Eidus wrote:
Change from v2 : remove unused if.
Thanks.
Izik Eidus (3):
kvm: dont hold pagecount reference for mapped sptes pages
add SPTE_HOST_WRITEABLE flag to the shadow ptes
add support for change_pte mmu notifiers
On Wed, Sep 23, 2009 at 04:13:18PM -0600, Bruce Rogers wrote:
The dirty bitmap copied out to userspace is stored in a long array, and gets
copied out to userspace accordingly. This patch accounts for that correctly.
Currently I'm seeing kvm crashing due to writing beyond the end of the
On Fri, Sep 25, 2009 at 11:09:37AM +0200, Aurelien Jarno wrote:
Don't overflow when computing the 64-bit period from 32-bit registers.
Fixes sourceforge bug #2826486.
Signed-off-by: Aurelien Jarno aurel...@aurel32.net
---
arch/x86/kvm/lapic.c |2 +-
1 files changed, 1 insertions(+),
So one can measure SMP overhead.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: qemu-kvm-test/kvm/user/test/x86/vmexit.c
===
--- qemu-kvm-test.orig/kvm/user/test/x86/vmexit.c
+++ qemu-kvm-test/kvm/user/test/x86/vmexit.c
To determine whether to wait for IPI to finish on remote cpu.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: qemu-kvm/kvm/user/test/lib/x86/smp.c
===
--- qemu-kvm.orig/kvm/user/test/lib/x86/smp.c
+++
Run the vmexit tests in parallel on each present cpu.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Hello,
Sorry about that. The issue is the BUG in gfn_to_pgn where the pfn is
not calculated correctly after looking up the vma.
I still don't see how to get the physical address from the vma, since
vm_pgoff is zero, and the vm_ops are not filled. The vma does not seem
to store the
On Fri, Sep 25, 2009 at 06:18:01PM +0200, Jan Kiszka wrote:
As requested, here is my current kvm-kmod queue. Most fixes target
latest 2.6.31 so aren't that urgent yet, but some also affect older
kernels in specific configurations.
Find the patches also at git://git.kiszka.org/kvm-kmod.git
On Mon, 2009-07-27 at 12:38 +0200, Alexander Graf wrote:
We currently use host endian long types to store information
in the dirty bitmap.
This works reasonably well on Little Endian targets, because the
u32 after the first contains the next 32 bits. On Big Endian this
breaks completely
On 29.09.2009, at 02:08, Hollis Blanchard wrote:
On Mon, 2009-07-27 at 12:38 +0200, Alexander Graf wrote:
We currently use host endian long types to store information
in the dirty bitmap.
This works reasonably well on Little Endian targets, because the
u32 after the first contains the next
Hi All,
This Weekly KVM Testing Report against lastest kvm.git
94252a58662dc4ca6191eac479efb40e0716865c and qemu-kvm.git
5cc3cfb6c2254483ae324da407a13307fe7355f3.
Qemu-kvm tree build issue is fixed by qemu commit
781774b38c90797add71d029b7fbee43200c66d4.
There is no other new bug found in this
Greatly simplified version of the patches; allocate and dealloc
all required structs at module load and unload time.
Clarification: per_cpu(var, cpu) does indeed work for not-present CPUs;
the allocations for module specific per-cpu variables are done at module
load and unload time, while the
Signed-off-by: Zachary Amsden zams...@redhat.com
---
arch/x86/kvm/x86.c | 23 +++
1 files changed, 15 insertions(+), 8 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index fedac9d..15d2ace 100644
--- a/arch/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@
Both VMX and SVM require per-cpu memory allocation, which is done at module
init time, for only online cpus.
Backend was not allocating enough structure for all possible CPUs, so
new CPUs coming online could not be hardware enabled.
Signed-off-by: Zachary Amsden zams...@redhat.com
---
They are globals, not clearly protected by any ordering or locking, and
vulnerable to various startup races.
Instead, for variable TSC machines, register the cpufreq notifier and get
the TSC frequency directly from the cpufreq machinery. Not only is it
always right, it is also perfectly
Signed-off-by: Zachary Amsden zams...@redhat.com
---
arch/x86/kvm/svm.c |5 +++--
1 files changed, 3 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index 9a4daca..d1036ce 100644
--- a/arch/x86/kvm/svm.c
+++ b/arch/x86/kvm/svm.c
@@ -330,13 +330,14 @@ static
Daniel Bareiro wrote:
Hi Brian.
On Tuesday, 08 September 2009 16:18:09 -0500,
Brian Jackson wrote:
I'm trying to modify the amount of RAM that has some of guests. Host
has 2.6.30 kernel with KVM-88.
In one of guest I didn't have problems when decreasing the amount of
memory
On Mon, 2009-07-27 at 12:38 +0200, Alexander Graf wrote:
We currently use host endian long types to store information
in the dirty bitmap.
This works reasonably well on Little Endian targets, because the
u32 after the first contains the next 32 bits. On Big Endian this
breaks completely
24 matches
Mail list logo