Signed-off-by: Ken CC ken.c...@gmail.com
---
hw/pci.c |2 +-
hw/pci.h |1 +
2 files changed, 2 insertions(+), 1 deletions(-)
diff --git a/hw/pci.c b/hw/pci.c
index 70dbace..02019a1 100644
--- a/hw/pci.c
+++ b/hw/pci.c
@@ -47,7 +47,7 @@ struct PCIBus {
pci_hotplug_fn hotplug;
assert(devfn PCIBUS_MAX_DEVICES)
Signed-off-by: Ken CC ken.c...@gmail.com
---
hw/pci.c |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/hw/pci.c b/hw/pci.c
index 02019a1..1e804da 100644
--- a/hw/pci.c
+++ b/hw/pci.c
@@ -747,6 +747,7 @@ static PCIDevice
Define MAX_PCI_SLOTS as 0x1f, if pci addr provided from command line
is bigger than 0x1f, return error -EINVAL.
0x1f 3 | 7 == 255 (PCIBUS_MAX_DEVICES - 1)
Signed-off-by: Ken CC ken.c...@gmail.com
---
hw/qdev-properties.c |2 ++
hw/qdev.h|3 +++
2 files changed, 5
assert(devfn PCIBUS_MAX_DEVICES)
Signed-off-by: Ken CC ken.c...@gmail.com
---
hw/pci.c |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/hw/pci.c b/hw/pci.c
index 02019a1..1e804da 100644
--- a/hw/pci.c
+++ b/hw/pci.c
@@ -747,6 +747,7 @@ static PCIDevice
Define MAX_PCI_SLOTS as 0x1f, if pci addr provided from command line
is bigger than 0x1f, return error -EINVAL.
0x1f 3 | 7 == 255 (PCIBUS_MAX_DEVICES - 1)
Signed-off-by: Ken CC ken.c...@gmail.com
---
hw/qdev-properties.c |2 ++
hw/qdev.h|3 +++
2 files changed, 5
broken thread, please ignore.
On Tue, Aug 24, 2010 at 02:33:51PM +0800, Ken CC wrote:
assert(devfn PCIBUS_MAX_DEVICES)
Signed-off-by: Ken CC ken.c...@gmail.com
---
hw/pci.c |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/hw/pci.c b/hw/pci.c
index
Am 23.08.2010 23:31, schrieb Alexander Graf:
Currenty the ext_param field only distinguishes between config change and
vring interrupt. We can do a lot more with it though, so let's enable a
full byte of possible values and constants to #defines while at it.
Makes a lot of sense.
[...]
Am 23.08.2010 23:31, schrieb Alexander Graf:
The one big missing feature in s390-virtio was hotplugging. This is no more.
This patch implements hotplug add support, so you can on the fly add new
devices
in the guest.
Nice :-)
Keep in mind that this needs a patch for qemu to actually
On Mon, Aug 23, 2010 at 06:48:53PM +0300, Avi Kivity wrote:
On 07/19/2010 06:30 PM, Gleb Natapov wrote:
When async PF capability is detected hook up special page fault handler
that will handle async page fault events and bypass other page faults to
regular page fault handler.
Acked-by: Rik
On Mon, Aug 23, 2010 at 07:17:20PM +0300, Avi Kivity wrote:
On 07/19/2010 06:30 PM, Gleb Natapov wrote:
If guest access swapped out memory do not swap it in from vcpu thread
context. Setup slow work to do swapping and send async page fault to
a guest.
Allow async page fault injection only
hello all,
i am reading kvm code and confused about the mmu_pte_write process,
when update a gpte, function kvm_mmu_pte_write is called , and walk the shadow
page for it.why condition is :
if (sp-gfn != gfn || sp-role.direct || sp-role.invalid)
continue;
and not update those sp-gfn == gfn
On 08/24/2010 10:31 AM, Gleb Natapov wrote:
+
+static void apf_task_wait(struct task_struct *tsk, u32 token)
+{
+ u32 key = hash_32(token, KVM_TASK_SLEEP_HASHBITS);
+ struct kvm_task_sleep_head *b =async_pf_sleepers[key];
+ struct kvm_task_sleep_node n, *e;
+
On 08/24/2010 10:52 AM, Gleb Natapov wrote:
This nice cache needs to be outside apf to reduce complexity for
reviewers and since it is useful for others.
Would be good to have memslot-cached kvm_put_guest() and kvm_get_guest().
Will look into it.
In the meantime, you can just drop the
On 07/19/2010 06:30 PM, Gleb Natapov wrote:
When page is swapped in it is mapped into guest memory only after guest
tries to access it again and generate another fault. To save this fault
we can map it immediately since we know that guest is going to access
the page.
-static int
On 07/19/2010 06:31 PM, Gleb Natapov wrote:
If async page fault is received by idle task or when preemp_count is
not zero guest cannot reschedule, so do sti; hlt and wait for page to be
ready. vcpu can still process interrupts while it waits for the page to
be ready.
Acked-by: Rik van
On 07/19/2010 06:31 PM, Gleb Natapov wrote:
If guest can detect that it runs in non-preemptable context it can
handle async PFs at any time, so let host know that it can send async
PF even if guest cpu is not in userspace.
Acked-by: Rik van Rielr...@redhat.com
Signed-off-by: Gleb
On Tue, Aug 24, 2010 at 12:25:33PM +0300, Avi Kivity wrote:
On 07/19/2010 06:30 PM, Gleb Natapov wrote:
When page is swapped in it is mapped into guest memory only after guest
tries to access it again and generate another fault. To save this fault
we can map it immediately since we know that
On 07/19/2010 06:31 PM, Gleb Natapov wrote:
If guest indicates that it can handle async pf in kernel mode too send
it, but only if interrupt are enabled.
Reviewed-by: Rik van Rielr...@redhat.com
Signed-off-by: Gleb Natapovg...@redhat.com
---
arch/x86/kvm/mmu.c |8 +++-
1 files
On Tue, Aug 24, 2010 at 12:30:25PM +0300, Avi Kivity wrote:
On 07/19/2010 06:31 PM, Gleb Natapov wrote:
If async page fault is received by idle task or when preemp_count is
not zero guest cannot reschedule, so do sti; hlt and wait for page to be
ready. vcpu can still process interrupts while
On 08/24/2010 12:33 PM, Gleb Natapov wrote:
@@ -505,6 +506,37 @@ out_unlock:
return 0;
}
+static int FNAME(page_fault_other_cr3)(struct kvm_vcpu *vcpu, gpa_t cr3,
+ gva_t addr, u32 error_code)
+{
+ int r = 0;
+ gpa_t curr_cr3 =
On 08/24/2010 12:36 PM, Gleb Natapov wrote:
On Tue, Aug 24, 2010 at 12:30:25PM +0300, Avi Kivity wrote:
On 07/19/2010 06:31 PM, Gleb Natapov wrote:
If async page fault is received by idle task or when preemp_count is
not zero guest cannot reschedule, so do sti; hlt and wait for page to be
On Tue, Aug 24, 2010 at 10:07 AM, Marcelo Tosatti mtosa...@redhat.com wrote:
On Mon, Aug 23, 2010 at 07:11:11PM +0800, Xiaotian Feng wrote:
On Mon, Aug 23, 2010 at 6:27 PM, Avi Kivity a...@redhat.com wrote:
On 08/23/2010 01:22 PM, Avi Kivity wrote:
I see a lot of soft lockups with this
On 08/24/2010 11:16 AM, cs-jerry** wrote:
hello all,
i am reading kvm code and confused about the mmu_pte_write process,
when update a gpte, function kvm_mmu_pte_write is called , and walk the shadow
page for it.why condition is :
if (sp-gfn != gfn || sp-role.direct || sp-role.invalid)
Signed-off-by: Avi Kivity a...@redhat.com
---
x86/idt.c |8 +++-
1 files changed, 7 insertions(+), 1 deletions(-)
diff --git a/x86/idt.c b/x86/idt.c
index 590839f..4480833 100644
--- a/x86/idt.c
+++ b/x86/idt.c
@@ -100,6 +100,11 @@ asm (.pushsection .text \n\t
pushq $13 \n\t
DIV may raise an exception if dividing by zero or causing an overflow. Test
it.
Avi Kivity (3):
Support #DE (divide error) exception handlers
Allow emulation tests to trap exceptions
Add DIV tests
config-x86-common.mak |3 ++-
x86/emulator.c| 20
Test divide-by-zero and normal cases.
Signed-off-by: Avi Kivity a...@redhat.com
---
x86/emulator.c | 18 ++
1 files changed, 18 insertions(+), 0 deletions(-)
diff --git a/x86/emulator.c b/x86/emulator.c
index 5d1659f..845e7a0 100644
--- a/x86/emulator.c
+++ b/x86/emulator.c
@@
Some instructions trap on execution, we need a way to see if they raise an
exception as expected.
Signed-off-by: Avi Kivity a...@redhat.com
---
config-x86-common.mak |3 ++-
x86/emulator.c|2 ++
2 files changed, 4 insertions(+), 1 deletions(-)
diff --git a/config-x86-common.mak
Like DIV and IDIV.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/emulate.c | 43 +++
1 files changed, 43 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index 808934c..f82e43a 100644
---
KVM recently started emulating DIV and IDIV. However, those instructions
trap when given the right operands. Since figuring out when to trap or not
is difficult, we just execute the instruction and see if the processor trapped
or not.
tip: please queue the first patch on fast-forward-only
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/emulate.c | 17 ++---
1 files changed, 14 insertions(+), 3 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index f82e43a..a7e26d0 100644
--- a/arch/x86/kvm/emulate.c
+++ b/arch/x86/kvm/emulate.c
@@
KVM wants to emulate the DIV and IDIV instructions by executing them natively;
this can cause a #DE to be raised.
Allow the exception handling mechanism to process #DE exceptions so KVM can
catch and process them.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kernel/traps.c | 10
On Tue, Aug 24, 2010 at 7:10 AM, Avi Kivity a...@redhat.com wrote:
KVM wants to emulate the DIV and IDIV instructions by executing them natively;
this can cause a #DE to be raised.
Allow the exception handling mechanism to process #DE exceptions so KVM can
catch and process them.
Add Cc: m...@redhat.com.
MAX_PCI_SLOTS should be in pci.h instead of qdev.h?
And the name should be start with PCI_ prefix for consistency?
Except that, the patches look okay.
thanks,
On Tue, Aug 24, 2010 at 02:49:27PM +0800, Ken CC wrote:
Define MAX_PCI_SLOTS as 0x1f, if pci addr provided
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/emulate.c |6 +++---
1 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index 017ae0c..f9f8353 100644
--- a/arch/x86/kvm/emulate.c
+++ b/arch/x86/kvm/emulate.c
@@ -3393,7
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/emulate.c | 42 +-
1 files changed, 29 insertions(+), 13 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index f9f8353..d34d706 100644
--- a/arch/x86/kvm/emulate.c
x86_emulate_insn() will return 1 if instruction can be restarted
without re-entering a guest.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/kvm_emulate.h |1 -
arch/x86/kvm/emulate.c | 47 ---
arch/x86/kvm/x86.c
On 08/24/2010 02:22 PM, Brian Gerst wrote:
+dotraplinkage void do_divide_error(struct pt_regs *regs, long error_code)
+{
+ if (!user_mode_vm(regs) fixup_exception(regs))
+ return;
+ do_divide_error_user(regs, error_code);
+}
+
#ifdef CONFIG_X86_64
/* Runs on IST
On 08/24/2010 02:35 PM, Isaku Yamahata wrote:
Add Cc: m...@redhat.com.
MAX_PCI_SLOTS should be in pci.h instead of qdev.h?
And the name should be start with PCI_ prefix for consistency?
Except that, the patches look okay.
These aren't slots, are they? They are functions.
There's a lot of
On Tue, Aug 24, 2010 at 02:42:18PM +0300, Avi Kivity wrote:
On 08/24/2010 02:35 PM, Isaku Yamahata wrote:
Add Cc: m...@redhat.com.
MAX_PCI_SLOTS should be in pci.h instead of qdev.h?
And the name should be start with PCI_ prefix for consistency?
Except that, the patches look okay.
These
On 08/24/2010 03:07 PM, Isaku Yamahata wrote:
On Tue, Aug 24, 2010 at 02:42:18PM +0300, Avi Kivity wrote:
On 08/24/2010 02:35 PM, Isaku Yamahata wrote:
Add Cc: m...@redhat.com.
MAX_PCI_SLOTS should be in pci.h instead of qdev.h?
And the name should be start with PCI_ prefix for
Christian Borntraeger wrote:
Am 23.08.2010 23:31, schrieb Alexander Graf:
Currenty the ext_param field only distinguishes between config change and
vring interrupt. We can do a lot more with it though, so let's enable a
full byte of possible values and constants to #defines while at it.
Am 24.08.2010 14:06, schrieb Alexander Graf:
#define VIRTIO_SUBCODE_64 0x0D00
+#define VIRTIO_PARAM_MASK 0xff
+#define VIRTIO_PARAM_VRING_INTERRUPT 0x0
+#define VIRTIO_PARAM_CONFIG_CHANGED0x1
Maybe this should be exported in a header, something like
On Tue, Aug 24, 2010 at 03:04:44PM +0300, Avi Kivity wrote:
On 08/24/2010 03:07 PM, Isaku Yamahata wrote:
On Tue, Aug 24, 2010 at 02:42:18PM +0300, Avi Kivity wrote:
On 08/24/2010 02:35 PM, Isaku Yamahata wrote:
Add Cc: m...@redhat.com.
MAX_PCI_SLOTS should be in pci.h instead of qdev.h?
On 08/24/2010 03:24 PM, Isaku Yamahata wrote:
On Tue, Aug 24, 2010 at 03:04:44PM +0300, Avi Kivity wrote:
On 08/24/2010 03:07 PM, Isaku Yamahata wrote:
On Tue, Aug 24, 2010 at 02:42:18PM +0300, Avi Kivity wrote:
On 08/24/2010 02:35 PM, Isaku Yamahata wrote:
Add Cc: m...@redhat.com.
On Tue, Aug 24, 2010 at 03:04:44PM +0300, Avi Kivity wrote:
On 08/24/2010 03:07 PM, Isaku Yamahata wrote:
On Tue, Aug 24, 2010 at 02:42:18PM +0300, Avi Kivity wrote:
On 08/24/2010 02:35 PM, Isaku Yamahata wrote:
Add Cc: m...@redhat.com.
MAX_PCI_SLOTS should be in pci.h instead of qdev.h?
On 08/24/2010 03:16 PM, Chen Cao wrote:
On Tue, Aug 24, 2010 at 03:04:44PM +0300, Avi Kivity wrote:
On 08/24/2010 03:07 PM, Isaku Yamahata wrote:
On Tue, Aug 24, 2010 at 02:42:18PM +0300, Avi Kivity wrote:
On 08/24/2010 02:35 PM, Isaku Yamahata wrote:
Add Cc: m...@redhat.com.
On 08/24/2010 03:14 PM, Christian Borntraeger wrote:
I have no strong opinion on that, but I think its more a matter of where
to put an interface description. A header file seems just the right place.
I will let you (or Rusty) decide.
First of all we need a virtio/s390 specification, like we
Avi Kivity wrote:
On 08/24/2010 03:14 PM, Christian Borntraeger wrote:
I have no strong opinion on that, but I think its more a matter of where
to put an interface description. A header file seems just the right
place.
I will let you (or Rusty) decide.
First of all we need a virtio/s390
On Mon, Aug 23, 2010 at 07:17:20PM +0300, Avi Kivity wrote:
+static int apf_put_user(struct kvm_vcpu *vcpu, u32 val)
+{
+if (unlikely(vcpu-arch.apf_memslot_ver !=
+ vcpu-kvm-memslot_version)) {
+u64 gpa = vcpu-arch.apf_msr_val ~0x3f;
+unsigned
On 08/24/2010 03:25 PM, Alexander Graf wrote:
Avi Kivity wrote:
On 08/24/2010 03:14 PM, Christian Borntraeger wrote:
I have no strong opinion on that, but I think its more a matter of where
to put an interface description. A header file seems just the right
place.
I will let you (or Rusty)
Avi Kivity wrote:
On 08/24/2010 03:25 PM, Alexander Graf wrote:
Avi Kivity wrote:
On 08/24/2010 03:14 PM, Christian Borntraeger wrote:
I have no strong opinion on that, but I think its more a matter of
where
to put an interface description. A header file seems just the right
place.
I
On 08/24/2010 03:28 PM, Gleb Natapov wrote:
On Mon, Aug 23, 2010 at 07:17:20PM +0300, Avi Kivity wrote:
+static int apf_put_user(struct kvm_vcpu *vcpu, u32 val)
+{
+ if (unlikely(vcpu-arch.apf_memslot_ver !=
+vcpu-kvm-memslot_version)) {
+ u64 gpa =
On 08/24/2010 03:32 PM, Alexander Graf wrote:
Perhaps we should freeze virtio/s390 development until someone feels
sufficiently motivated.
Sure, go ahead. I don't think that'll help anyone but if it makes you
feel good...
I don't maintain virtio or the virtio-s390 interface, so I can't
Am 23.08.2010 20:16, schrieb Marcelo Tosatti:
On Thu, Aug 05, 2010 at 01:41:16PM +0200, Moritz Duge wrote:
Hi,
I had some trouble while using the ballooning feature of KVM (using
Ubuntu 10.04 with standard software versions).
The first scenario:
1. Having a guest started by this command:
On 08/23/2010 05:30 PM, Chris Wright wrote:
Please send in any agenda items you are interested in covering.
There are quite a few important discussions on the list but I think they
should stay on the list right now.
So it sounds like we don't have an agenda for today.
Regards,
Anthony
On 08/24/2010 02:30 PM, Gleb Natapov wrote:
Signed-off-by: Gleb Natapovg...@redhat.com
---
arch/x86/kvm/emulate.c | 42 +-
1 files changed, 29 insertions(+), 13 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index
On Tue, Aug 24, 2010 at 10:31:07AM +0800, Xiaotian Feng wrote:
Latest kvm mmu_shrink code rework makes kernel changes
kvm-arch.n_used_mmu_pages/
kvm-arch.n_max_mmu_pages at kvm_mmu_free_page/kvm_mmu_alloc_page, which is
called
by kvm_mmu_commit_zap_page. So the kvm-arch.n_used_mmu_pages or
On 08/24/2010 02:30 PM, Gleb Natapov wrote:
x86_emulate_insn() will return 1 if instruction can be restarted
without re-entering a guest.
So now we have an undocumented -1/0/1 return code?
Better to have an enum for this.
--
error compiling committee.c: too many arguments to function
--
On Tue, Aug 24, 2010 at 04:11:20PM +0300, Avi Kivity wrote:
On 08/24/2010 02:30 PM, Gleb Natapov wrote:
Signed-off-by: Gleb Natapovg...@redhat.com
---
arch/x86/kvm/emulate.c | 42 +-
1 files changed, 29 insertions(+), 13 deletions(-)
diff --git
On 08/24/2010 04:20 PM, Gleb Natapov wrote:
+{
+ struct decode_cache *c =ctxt-decode;
+
+ /* All REP prefixes have the same first termination condition */
+ if (address_mask(c, c-regs[VCPU_REGS_RCX]) == 0)
+ return true;
This is checked during the beginning of
Am 24.08.2010 14:22, schrieb Avi Kivity:
First of all we need a virtio/s390 specification, like we have a
virtio/pci spec.
Here is something that I started a year ago but never finished.
Christian
guest/host interface for s390/virtio devices
KVM_DEVICE_DESCRIPTOR PAGE
And update the max function number used in struct PCIBus{} to
PCIBUS_MAX_FUNCTIONS = PCI_FUNCTIONS_PER_DEVICE * PCIBUS_MAX_DEVICES
TODO:
according to Avi Kivity, PCIBus.devices[] should be renamed to functions[]
Signed-off-by: Ken CC ken.c...@gmail.com
---
hw/pci.c |2 +-
hw/pci.h |
Check if devfn PCIBUS_MAX_DEVICES * PCI_FUNCTIONS_PER_DEVICE
Signed-off-by: Ken CC ken.c...@gmail.com
---
hw/pci.c |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/hw/pci.c b/hw/pci.c
index 9234fe3..fc4becd 100644
--- a/hw/pci.c
+++ b/hw/pci.c
@@ -747,6 +747,7 @@ static
If pci addr provided from command line is bigger than 32,
PCIBUS_MAX_DEVICES, return error -EINVAL.
32 3 | 7 == 256 (PCIBUS_MAX_FUNCTIONS)
PCIBUS_MAX_FUNCTIONS = PCIBUS_MAX_DEVICES * PCI_FUNCTIONS_PER_DEVICE
Signed-off-by: Ken CC ken.c...@gmail.com
---
hw/qdev-properties.c |4 +++-
1 files
PCI_FUNC_MAX is introduced by
6eab3de16d36c48a983366b09d0a0029a5260bc3
and
6fa84913eccec4266a27c81ae88465f6790742b9
which should be safe to rename to PCI_FUNCTIONS_PER_DEVICES.
Signed-off-by: Ken CC ken.c...@gmail.com
---
hw/pci.c |4 ++--
hw/pci.h |1 -
2 files changed, 2 insertions(+),
* Anthony Liguori (anth...@codemonkey.ws) wrote:
On 08/23/2010 05:30 PM, Chris Wright wrote:
Please send in any agenda items you are interested in covering.
There are quite a few important discussions on the list but I think
they should stay on the list right now.
So it sounds like we
On 08/23/10 23:47, Zachary Amsden wrote:
I've heard the rumor that TSC is orders of magnitude faster under VMware
than under KVM from three people now, and I thought you were part of
that camp.
Needless to say, they are either laughably incorrect, or possess some
great secret knowledge of
On Tue, Aug 24, 2010 at 04:13:38PM +0300, Avi Kivity wrote:
On 08/24/2010 02:30 PM, Gleb Natapov wrote:
x86_emulate_insn() will return 1 if instruction can be restarted
without re-entering a guest.
So now we have an undocumented -1/0/1 return code?
Better to have an enum for this.
We
On 08/24/2010 04:37 PM, Gleb Natapov wrote:
On Tue, Aug 24, 2010 at 04:13:38PM +0300, Avi Kivity wrote:
On 08/24/2010 02:30 PM, Gleb Natapov wrote:
x86_emulate_insn() will return 1 if instruction can be restarted
without re-entering a guest.
So now we have an undocumented -1/0/1 return
The following series do some minor cleanup and fix for the 32bit test.
---
Jason Wang (10):
Do not track config.mak and kvmtrace
Remove trailing whitespaces
Makefile cleanup
Correct the path in README
Drop print.S
Remove the duplicated rdmsr/wrmsr
config.mak was generated by configure and kvmtrace were compiled
throuh makefile.
Signed-off-by: Jason Wang jasow...@redhat.com
---
config.mak |8
kvmtrace | Bin
2 files changed, 0 insertions(+), 8 deletions(-)
delete mode 100644 config.mak
delete mode 100755 kvmtrace
diff
Signed-off-by: Jason Wang jasow...@redhat.com
---
config-x86-common.mak | 14 +++---
x86/access.c |2 +-
x86/cstart64.S|4 ++--
x86/print.S |6 +++---
x86/sieve.c |2 +-
x86/vm.c |6 +++---
6 files changed, 17
Remove the obsoleted target and directories.
Signed-off-by: Jason Wang jasow...@redhat.com
---
Makefile |9 +
1 files changed, 1 insertions(+), 8 deletions(-)
diff --git a/Makefile b/Makefile
index 5347ce8..d25e6f2 100644
--- a/Makefile
+++ b/Makefile
@@ -30,10 +30,6 @@ CFLAGS +=
Signed-off-by: Jason Wang jasow...@redhat.com
---
README | 10 +-
1 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/README b/README
index 6a83831..9c0c518 100644
--- a/README
+++ b/README
@@ -7,17 +7,17 @@ Tests uses a qemu's virtual test device, named testdev, for
We've already had lib/printf.c.
Signed-off-by: Jason Wang jasow...@redhat.com
---
config-x86-common.mak |9 -
x86/print.S | 31 ---
2 files changed, 4 insertions(+), 36 deletions(-)
delete mode 100644 x86/print.S
diff --git
They have been implemented in lib/x86/processor.h. Also rename the
cpuid to cpuid_test because cpuid have been defined.
Signed-off-by: Jason Wang jasow...@redhat.com
---
x86/msr.c| 16 +---
x86/vmexit.c | 20 +++-
2 files changed, 4 insertions(+), 32
TSS size should be 104 byte.
Signed-off-by: Jason Wang jasow...@redhat.com
---
x86/cstart64.S |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/x86/cstart64.S b/x86/cstart64.S
index 5d358ad..b871153 100644
--- a/x86/cstart64.S
+++ b/x86/cstart64.S
@@ -69,7 +69,7 @@ tss:
CR8 is only availabe when in long mode.
Signed-off-by: Jason Wang jasow...@redhat.com
---
x86/vmexit.c | 14 --
1 files changed, 12 insertions(+), 2 deletions(-)
diff --git a/x86/vmexit.c b/x86/vmexit.c
index 819c24b..34b0af4 100644
--- a/x86/vmexit.c
+++ b/x86/vmexit.c
@@ -48,6
Signed-off-by: Jason Wang jasow...@redhat.com
---
x86/msr.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/x86/msr.c b/x86/msr.c
index 9c85369..c3e0014 100644
--- a/x86/msr.c
+++ b/x86/msr.c
@@ -49,9 +49,11 @@ struct msr_info msr_info[] =
{ .index = 0xc102,
Add the smp initlaization codes for 32bit. This would make the 32bit
smp tests available.
Signed-off-by: Jason Wang jasow...@redhat.com
---
x86/cstart.S | 179 --
1 files changed, 173 insertions(+), 6 deletions(-)
diff --git
As suggested by Christian, we should expose headers to user space with
information that might be valuable there. The s390 virtio interface is
one of those cases. It defines an ABI between hypervisor and guest, so
it should be exposed to user space.
Reported-by: Christian Borntraeger
Currenty the ext_param field only distinguishes between config change and
vring interrupt. We can do a lot more with it though, so let's enable a
full byte of possible values and constants to #defines while at it.
Signed-off-by: Alexander Graf ag...@suse.de
---
v1 - v2:
- move defines to
On Tue, Aug 24, 2010 at 04:41:10PM +0300, Avi Kivity wrote:
On 08/24/2010 04:37 PM, Gleb Natapov wrote:
On Tue, Aug 24, 2010 at 04:13:38PM +0300, Avi Kivity wrote:
On 08/24/2010 02:30 PM, Gleb Natapov wrote:
x86_emulate_insn() will return 1 if instruction can be restarted
without
On 08/24/2010 04:47 PM, Jason Wang wrote:
TSS size should be 104 byte.
Signed-off-by: Jason Wangjasow...@redhat.com
---
x86/cstart64.S |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/x86/cstart64.S b/x86/cstart64.S
index 5d358ad..b871153 100644
--- a/x86/cstart64.S
On 08/24/2010 04:47 PM, Jason Wang wrote:
CR8 is only availabe when in long mode.
Signed-off-by: Jason Wangjasow...@redhat.com
---
x86/vmexit.c | 14 --
1 files changed, 12 insertions(+), 2 deletions(-)
diff --git a/x86/vmexit.c b/x86/vmexit.c
index 819c24b..34b0af4 100644
On 08/24/2010 04:52 PM, Gleb Natapov wrote:
We can, of course. But for me it looks as arbitrary as -1/0/1 since not
all enum values have meanings to the caller.
Yeah. -1/0/1's problem is that between reading the callee code and
caller code, I manage to forget what the values mean.
--
On Tue, Aug 24, 2010 at 05:01:10PM +0300, Avi Kivity wrote:
On 08/24/2010 04:52 PM, Gleb Natapov wrote:
We can, of course. But for me it looks as arbitrary as -1/0/1 since not
all enum values have meanings to the caller.
Yeah. -1/0/1's problem is that between reading the callee code and
Hi guys,
I'm trying to sort out networking for a VM I've created on my Ubuntu
Lucid box but the VM cannot access the Internet.
I can connect to the VM (crisps) from the host (holly) and to the host
from the VM.
But the VM cannot connect to the Internet and the Internet cannot
connect to the VM.
On Wednesday, 18 August 2010 21:45:56 +0300,
Nikolai K. Bochev wrote:
Strange, i did 2 clean installs of centos 5.5 on an ubuntu 9.10 host
and it went flawless with virtio devices ( both disks and network ).
Doing some tests with CentOS 5.5 on a KVM virtual machine, after doing
the
On 08/24/2010 05:06 PM, Gleb Natapov wrote:
On Tue, Aug 24, 2010 at 05:01:10PM +0300, Avi Kivity wrote:
On 08/24/2010 04:52 PM, Gleb Natapov wrote:
We can, of course. But for me it looks as arbitrary as -1/0/1 since not
all enum values have meanings to the caller.
Yeah. -1/0/1's problem
On Tue, Aug 24, 2010 at 10:57:12AM +0800, Wei Yongjun wrote:
Signed-off-by: Wei Yongjun yj...@cn.fujitsu.com
---
v2 - v3: rebased
---
x86/realmode.c | 42 ++
1 files changed, 42 insertions(+), 0 deletions(-)
Applied, thanks.
--
To unsubscribe from
[ 0.00] NR_IRQS:4352 nr_irqs:512
[ 0.00] Console: colour VGA+ 80x25
[ 0.00] console [tty0] enabled
[ 0.00] ODEBUG: 0 of 0 active objects replaced
[ 0.00] Fast TSC calibration failed
[ 0.00] TSC: Unable to calibrate against PIT
[ 0.00] TSC: No
Hi,
I've been using UIO for a userspace driver and noticed a feature when
multiple uio file handles have been opened for the same device (e.g. when
running separate processes).
Since each handle stores its own count of the interrupts and uses this to
determine whether uio_read returns, it's
On Tue, Aug 24, 2010 at 05:28:12PM +0300, Avi Kivity wrote:
On 08/24/2010 05:06 PM, Gleb Natapov wrote:
On Tue, Aug 24, 2010 at 05:01:10PM +0300, Avi Kivity wrote:
On 08/24/2010 04:52 PM, Gleb Natapov wrote:
We can, of course. But for me it looks as arbitrary as -1/0/1 since not
all enum
Hello,
I would like to debug the OS kernel loaded and simulated by kvm. I
know that QEMU have some problem with KVM debug. So how can I debug
this kernel? Is there any suggestion?
Best regards,
--
Hao Shen
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message
it worked. thankx a lot.
On Tue, Aug 24, 2010 at 2:22 PM, Marcelo Tosatti mtosa...@redhat.com wrote:
[ 0.00] NR_IRQS:4352 nr_irqs:512
[ 0.00] Console: colour VGA+ 80x25
[ 0.00] console [tty0] enabled
[ 0.00] ODEBUG: 0 of 0 active objects replaced
[
it worked. thankx a lot.
On Tue, Aug 24, 2010 at 2:22 PM, Marcelo Tosatti mtosa...@redhat.com wrote:
[ 0.00] NR_IRQS:4352 nr_irqs:512
[ 0.00] Console: colour VGA+ 80x25
[ 0.00] console [tty0] enabled
[ 0.00] ODEBUG: 0 of 0 active objects replaced
[
On Mon 23 Aug at 16:13:15 +0800 yj...@cn.fujitsu.com said:
commit ad05c88266b4cce1c820928ce8a0fb7690912ba1
(KVM: create aggregate kvm_total_used_mmu_pages value)
introduce percpu counter kvm_total_used_mmu_pages but never
destroy it, this may cause oops when rmmod modprobe.
Signed-off-by:
On Tuesday, August 24, 2010 09:08:30 am Rus Hughes wrote:
Hi guys,
I'm trying to sort out networking for a VM I've created on my Ubuntu
Lucid box but the VM cannot access the Internet.
I can connect to the VM (crisps) from the host (holly) and to the host
from the VM.
But the VM cannot
On Tuesday, 24 August 2010 11:23:59 -0300,
Daniel Bareiro wrote:
Strange, i did 2 clean installs of centos 5.5 on an ubuntu 9.10 host
and it went flawless with virtio devices ( both disks and network ).
Doing some tests with CentOS 5.5 on a KVM virtual machine, after doing
the
1 - 100 of 108 matches
Mail list logo