repository: C:/dev/kvm-guest-drivers-windows
branch: master
commit b68b7671ab3dd07f7f16e819db2d4060bbaeb901
Author: Yan Vugenfirer yvuge...@redhat.com
Date: Sun Nov 1 15:23:20 2009 +0200
[WIN-GUEST-DRIVERS] viostor driver.Add memory read barrier - synch with fix
for Linux guests by Michael
repository: C:/dev/kvm-guest-drivers-windows
branch: master
commit e4808e72e5d12fa97b17dfd2d1e465a6c6331e8a
Author: Yan Vugenfirer yvuge...@redhat.com
Date: Sun Nov 1 15:59:18 2009 +0200
[WIN-GUEST-DRIVERS] Fix the driver version report through OID. Will fix the
warning during MS tests.
From: Avi Kivity a...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/kvm/scripts/vmxcap b/kvm/scripts/vmxcap
index 50fb86e..93051c6 100755
--- a/kvm/scripts/vmxcap
+++ b/kvm/scripts/vmxcap
@@ -59,6 +59,29 @@ class Control(object):
s = 'yes'
print
From: Gleb Natapov g...@redhat.com
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/Makefile b/Makefile
index ea568f5..acd9108 100644
--- a/Makefile
+++ b/Makefile
@@ -259,6 +259,7 @@ pxe-ne2k_pci.bin pxe-rtl8139.bin pxe-pcnet.bin
pxe-e1000.bin
From: Avi Kivity a...@redhat.com
yes/no replaces True/False.
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/kvm/scripts/vmxcap b/kvm/scripts/vmxcap
index ec909b3..b7f58ac 100755
--- a/kvm/scripts/vmxcap
+++ b/kvm/scripts/vmxcap
@@ -79,7 +79,8 @@ class Misc(object):
fmt
From: Marcelo Tosatti mtosa...@redhat.com
Michael reported a qemu-kvm SIGSEGV at shutdown:
Program received signal SIGSEGV, Segmentation fault.
[Switching to Thread 0x411d0940 (LWP 14446)]
0x0040afb4 in qemu_mod_timer (ts=0x19f0fd0,
expire_time=62275467335)
at
From: Avi Kivity a...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/kvm/scripts/vmxcap b/kvm/scripts/vmxcap
index 93051c6..ec909b3 100755
--- a/kvm/scripts/vmxcap
+++ b/kvm/scripts/vmxcap
@@ -7,6 +7,7 @@ MSR_IA32_VMX_EXIT_CTLS = 0x483
MSR_IA32_VMX_ENTRY_CTLS = 0x484
From: Jan Kiszka jan.kis...@siemens.com
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
diff --git a/scripts/make-release b/scripts/make-release
index f9205e3..5fabe1a 100755
--- a/scripts/make-release
+++ b/scripts/make-release
@@ -91,5 +91,5 @@ tar cjf $tarball -C $tmpdir $name
rm -rf
From: Avi Kivity a...@redhat.com
This variable is used to communicate between a caller and a callee; switch
to a function argument instead.
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 85f97d1..99c34f1 100644
--- a/arch/x86/kvm/vmx.c
+++
From: Marcelo Tosatti mtosa...@redhat.com
GUEST_CR3 is updated via kvm_set_cr3 whenever CR3 is modified from
outside guest context. Similarly pdptrs are updated via load_pdptrs.
Let kvm_set_cr3 perform the update, removing it from the vcpu_run
fast path.
Signed-off-by: Marcelo Tosatti
From: Avi Kivity a...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
--
To unsubscribe from this list: send the line unsubscribe kvm-commits in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
From: Jan Kiszka jan.kis...@siemens.com
We were missing one indirection here to translate from vmx-local to
x86 slot indices, and this caused subtle host crashes.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/vmx.c
On 10/29/2009 07:13 PM, Avi Kivity wrote:
On 10/29/2009 06:53 PM, Jan Kiszka wrote:
We were missing one indirection here to translate from vmx-local to
x86 slot indices, and this caused subtle host crashes.
Ahh, good catch. How did it work?
And, of course, applied. Thanks.
--
error
On 10/29/2009 05:47 PM, Saul Tamari wrote:
Hi,
The current qemu-kvm from the git indeed adds the MSI-x capability to
the virtio block device.
With MSI-x enabled on the virtio block device, there aren't
VIRTIO_PCI_ISR reads on the unused device.
There shouldn't be VIRTIO_PCI_ISR reads on
Hello,
Avi Kivity wrote:
Only, that merge doesn't change virt/kvm or arch/x86/kvm.
Tejun, anything known bad about that merge? ada3fa15 kills kvm.
Nothing rings a bell at the moment. How does it kill kvm? One big
difference caused by that merge is use of sparse areas near the top of
On 11/01/2009 12:00 PM, Tejun Heo wrote:
Hello,
Avi Kivity wrote:
Only, that merge doesn't change virt/kvm or arch/x86/kvm.
Tejun, anything known bad about that merge? ada3fa15 kills kvm.
Nothing rings a bell at the moment. How does it kill kvm? One big
difference caused by that
repository: /home/vadimr/shares/kvm-guest-drivers-windows
branch: XP
commit 6906acfc2d5f58df43ebc9c190e1447ff6e63a01
Author: Vadim Rozenfeldvroze...@redhat.com
Date: Sun Nov 1 11:54:03 2009 +0200
[PATCH] viostor driver.Add memory read barrier - synch with fix for Linux guests
by Michael
Hello,
Avi Kivity wrote:
We get a page fault immediately (next instruction) after returning from
the guest when running with oprofile. The page fault address does not
match anything the instruction does, so presumably it is one of the
accesses the processor performs in order to service an
You are right.
After enabling MSI-x for the virtio block device I now only see
VIRTIO_PCI_QUEUE_NOTIFY writes and there aren't any VIRTIO_PCI_ISR
reads anymore.
Thanks,
Saul
On Sun, Nov 1, 2009 at 11:23 AM, Avi Kivity a...@redhat.com wrote:
On 10/29/2009 05:47 PM, Saul Tamari wrote:
Hi,
On 11/01/2009 12:45 PM, Tejun Heo wrote:
Hello,
Avi Kivity wrote:
We get a page fault immediately (next instruction) after returning from
the guest when running with oprofile. The page fault address does not
match anything the instruction does, so presumably it is one of the
accesses the
KVM virtualize guest memory by means of shadow pages or HW assistance
like NPT/EPT. Not all memory used by a guest is mapped into the guest
address space or even present in a host memory at any given time.
When vcpu tries to access memory page that is not mapped into guest
address space KVM is
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/mm/gup.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/arch/x86/mm/gup.c b/arch/x86/mm/gup.c
index 71da1bc..cea0dfe 100644
--- a/arch/x86/mm/gup.c
+++ b/arch/x86/mm/gup.c
@@ -8,6 +8,7 @@
#include linux/mm.h
When page is swapped in it is mapped into guest memory only after guest
tries to access it again and generate another fault. To save this fault
we can map it immediately since we know that guest is going to access
the page.
Signed-off-by: Gleb Natapov g...@redhat.com
---
If async page fault is received by idle task or when preemp_count is
not zero guest cannot reschedule, so make wait for page hypercall
and comtinue only after a page is ready.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kernel/kvm.c | 16 +++-
1 files changed, 15
Asynchronous page fault notifies vcpu that page it is trying to access
is swapped out by a host. In response guest puts a task that caused the
fault to sleep until page is swapped in again. When missing page is
brought back into the memory guest is notified and task resumes execution.
Add hypercall that allows guest and host to setup per cpu shared
memory.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/kvm_host.h |3 +
arch/x86/include/asm/kvm_para.h | 11 +
arch/x86/kernel/kvm.c | 82 +++
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/mmu.c | 16 ++--
1 files changed, 6 insertions(+), 10 deletions(-)
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index 3d33994..21ec65a 100644
--- a/arch/x86/kvm/mmu.c
+++ b/arch/x86/kvm/mmu.c
@@ -2358,7 +2358,7
Do not preempt kernel. Just maintain counter to know if task can sleep.
Signed-off-by: Gleb Natapov g...@redhat.com
---
include/linux/hardirq.h |6 ++
include/linux/preempt.h | 22 --
kernel/sched.c |6 --
lib/kernel_lock.c |1 +
4 files
If guest access swapped out memory do not swap it in from vcpu thread
context. Setup slow work to do swapping and send async page fault to
a guest.
Allow async page fault injection only when guest is in user mode since
otherwise guest may be in non-sleepable context and will not be able to
We want to be able to inject async pagefault into guest event if a guest
is not executing userspace code. But in this case guest may receive
async page fault in non-sleepable context. In this case it will be
able to make wait for page hypercall vcpu will be put to sleep until
page is swapped in
This patch add get_user_pages() variant that only succeeds if getting
a reference to a page doesn't require major fault.
Signed-off-by: Gleb Natapov g...@redhat.com
---
fs/ncpfs/mmap.c|2 ++
include/linux/mm.h |5 +
mm/filemap.c |3 +++
mm/memory.c| 31
Allow paravirtualized guest to do special handling for some page faults.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/paravirt.h |7 +++
arch/x86/include/asm/paravirt_types.h |4
arch/x86/kernel/paravirt.c|8
Committed. Thanks.
-Original Message-
From: kvm-ow...@vger.kernel.org [mailto:kvm-ow...@vger.kernel.org] On
Behalf Of Vadim Rozenfeld
Sent: Sunday, November 01, 2009 12:41 PM
To: kvm@vger.kernel.org
Subject: [PATCH] viostor driver.Add memory barrier - synch with fix for
Linux
On 10/30/2009 02:23 PM, Chris Lalancette wrote:
In the meantime, I've gotten the set_irq from IRQ context that Avi
suggested
working, and the fixing up of this IOAPIC check is the last bit to actually get
kdump working.
There are two problems with that:
- kvm_set_irq() calls some
On 10/29/2009 05:11 PM, Arnaud Maillet wrote:
Hello world,
I used to use Xen on my server but due to a non-patched cygwin problem
I installed kvm 83 on my redhat 5.4 with the red hat rpm.
I found some troubles with a windows 2008 server 64 bits guest. When I
install a software like an
On 10/29/2009 12:38 AM, Marcelo Tosatti wrote:
This will miss an event at the very beginning of the loop (powerdown
requested before we had a chance to spin up?). I think it should be
fine since there will be a pending signal which will break us out of
kvm_cpu_exec() before it has a chance to
On 10/28/2009 11:16 PM, Erik Rull wrote:
Hi all,
after several tests it seems that the interrupt assignment on the host
systems influences the kvm performance drastically. If eth0, video and
usb
are on seperate interrupts the perfomance is way better than if they are
shared (that means on the
On 10/28/2009 11:13 PM, Erik Rull wrote:
Hi all,
when changing the CPU from the default QEMU32 one to e.g. the n270 or
the core2duo no .NET apps will work under Windows XP as guest.
Switching back and everything is fine. The Pentium Emulation on the
other side works fine!
The Application
The Buildbot has detected a new failure of default_x86_64_out_of_tree on
qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/default_x86_64_out_of_tree/builds/74
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build: b1_qemu_kvm_1
The Buildbot has detected a new failure of default_i386_out_of_tree on qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/default_i386_out_of_tree/builds/73
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build: b1_qemu_kvm_2
On 11/01/2009 07:07 PM, a...@linux-foundation.org wrote:
The mm-of-the-moment snapshot 2009-11-01-10-01 has been uploaded to
Hi, I got the following warning while booting an image in qemu-kvm:
WARNING: at fs/attr.c:158 notify_change+0x2da/0x310()
Hardware name:
Modules linked in:
Pid: 1, comm:
Hi,
I've got a Kubuntu host and two dedicated graphic cards. Now I want to
create a Windows Seven guest for KVM and give the guest one of the
graphic cards (it isn't in business on my host). The informations I
got is only that PCI passthrough is possible, but I've got no more
details about it
This is the really low level of guest entry/exit code.
Book3s_64 has an SLB, which stores all ESID - VSID mappings we're
currently aware of.
The segments in the guest differ from the ones on the host, so we need
to switch the SLB to tell the MMU that we're in a new context.
So we store
snip
+static void invalidate_pte(struct hpte_cache *pte)
+{
+ dprintk_mmu(KVM: Flushing SPT %d: 0x%llx (0x%llx) - 0x%llx\n,
+ i, pte-pte.eaddr, pte-pte.vpage, pte-host_va);
+
+ ppc_md.hpte_invalidate(pte-slot, pte-host_va,
+MMU_PAGE_4K,
Hi Avi,
the Host CPU is a Intel Core2Duo - VT capable and enabled!
Best regards,
Erik
Avi Kivity wrote:
On 10/28/2009 11:13 PM, Erik Rull wrote:
Hi all,
when changing the CPU from the default QEMU32 one to e.g. the n270 or
the core2duo no .NET apps will work under Windows XP as guest.
On 11/01/2009 06:56 AM, Gleb Natapov wrote:
Add hypercall that allows guest and host to setup per cpu shared
memory.
While it is pretty obvious that we should implement
the asynchronous pagefaults for KVM, so a swap-in
of a page the host swapped out does not stall the
entire virtual CPU, I
On 11/02/2009 01:45 AM, Erik Rull wrote:
Hi Avi,
Please don't top-post.
the Host CPU is a Intel Core2Duo - VT capable and enabled!
The problem is that one of the flags that -cpu core2duo enables is
implemented incorrectly, so it leads to .net breakage.
These flags are pni, lm, nx,
On Sun, Nov 01, 2009 at 11:27:15PM -0500, Rik van Riel wrote:
On 11/01/2009 06:56 AM, Gleb Natapov wrote:
Add hypercall that allows guest and host to setup per cpu shared
memory.
While it is pretty obvious that we should implement
the asynchronous pagefaults for KVM, so a swap-in
of a page
snip
+static void invalidate_pte(struct hpte_cache *pte)
+{
+ dprintk_mmu(KVM: Flushing SPT %d: 0x%llx (0x%llx) - 0x%llx\n,
+ i, pte-pte.eaddr, pte-pte.vpage, pte-host_va);
+
+ ppc_md.hpte_invalidate(pte-slot, pte-host_va,
+MMU_PAGE_4K,
49 matches
Mail list logo