On Thu, Jun 2, 2011 at 11:22 PM, Sasha Levin levinsasha...@gmail.com wrote:
This patch adds a 'kvm debug' command that's currently an alias for
kill -USR2 `pidof kvm`
Which pauses a guest (freezes all VCPU threads).
Signed-off-by: Sasha Levin levinsasha...@gmail.com
What is this useful
On Fri, 2011-06-03 at 09:29 +0300, Pekka Enberg wrote:
On Thu, Jun 2, 2011 at 11:22 PM, Sasha Levin levinsasha...@gmail.com wrote:
This patch adds a 'kvm debug' command that's currently an alias for
kill -USR2 `pidof kvm`
Which pauses a guest (freezes all VCPU threads).
From: Jan Kiszka jan.kis...@siemens.com
Neither host_irq nor the guest_msi struct are used anymore today.
Tag the former, drop the latter to avoid confusion.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
Documentation/virtual/kvm/api.txt |7 +--
include/linux/kvm.h
On Thu, Jun 2, 2011 at 5:33 PM, Michal Suchanek hramr...@centrum.cz wrote:
On 1 June 2011 05:12, Zhi Yong Wu wu...@linux.vnet.ibm.com wrote:
On Tue, May 31, 2011 at 03:55:49PM -0400, Vivek Goyal wrote:
Date: Tue, 31 May 2011 15:55:49 -0400
From: Vivek Goyal vgo...@redhat.com
To: Zhi Yong Wu
* Prasad Joshi prasadjoshi...@gmail.com wrote:
struct cmd_struct kvm_commands[] = {
+ { pause, kvm_cmd_pause, NULL, 0 },
We automatically generate include/common-cmds.h header file that
lists the command options with kvm. Should we ensure 'pause' is
added to the file? I
* Pekka Enberg penb...@kernel.org wrote:
On Fri, Jun 3, 2011 at 12:19 AM, Sasha Levin levinsasha...@gmail.com wrote:
+static int cache_table(struct qcow *q, u64 *table, u64 offset)
+{
+ struct qcow_l2_cache *n;
+ struct rb_root *r = q-root;
+ struct qcow_l2_cache *lru;
+
On Fri, Jun 3, 2011 at 10:15 AM, Ingo Molnar mi...@elte.hu wrote:
I personally prefer the sizeof(*cache) variant for a subtle reason:
because during review it's easier to match up local variable names
than to match up types.
[snip, snip]
Aye, aye, cap'n!
As long as we have good volunteers
On Mon, 2011-05-30 at 14:36 +0200, Ingo Molnar wrote:
Right now i can produce something similar to it: 42 vcpus on a single
CPU:
$ taskse 1 kvm run --cpus 42
And that hangs early on during bootup, around:
[0.236000] Disabled fast string operations
[0.242000] #4
[
* Sasha Levin levinsasha...@gmail.com wrote:
with no apparent progress being made.
Since it's something that worked in 2.6.37, I've looked into it to
find what might have caused this issue.
I've bisected guest kernels and found that the problem starts with:
On Fri, 2011-06-03 at 09:34 +0200, Ingo Molnar wrote:
* Sasha Levin levinsasha...@gmail.com wrote:
with no apparent progress being made.
Since it's something that worked in 2.6.37, I've looked into it to
find what might have caused this issue.
I've bisected guest kernels and
On 02/06/11 07:03, CaT wrote:
On Wed, Jun 01, 2011 at 07:52:33PM +0800, Brad Campbell wrote:
Unfortunately the only interface that is mentioned by name anywhere
in my firewall is $DMZ (which is ppp0 and not part of any bridge).
All of the nat/dnat and other horrible hacks are based on IP
This patch adds a 'kvm debug' command that's currently an alias for
kill -USR2 `pidof kvm`
Which pauses a guest (freezes all VCPU threads) or resumes a paused
guest.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/Documentation/kvm-pause.txt | 15 +++
Minor fallout from recent refactorings.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
kvm-stub.c | 11 +++
qemu-kvm.h |4 ++--
2 files changed, 5 insertions(+), 10 deletions(-)
diff --git a/kvm-stub.c b/kvm-stub.c
index 90fed66..aa2238f 100644
--- a/kvm-stub.c
+++
(CCing Marcelo, Avi, and kvm mailing list, so they can help answering
the uq/master patch flow question)
On Fri, Jun 03, 2011 at 12:51:42AM +0200, Jan Kiszka wrote:
On 2011-06-02 21:34, Eduardo Habkost wrote:
Ouch, the subject prefix is completely wrong because of broken
git-send-email
Upstream just as well as qemu-kvm only support CPU 0 as boot CPU. And
that is also the KVM ABI default if the user does not issue any
KVM_SET_BOOT_CPU_ID.
So let's drop this redundancy. It can be re-introduced via upstream once
we support something more sophisticated.
Signed-off-by: Jan Kiszka
On Wed, 2011-05-11 at 11:55 -0400, Avi Kivity wrote:
- counters that have PMI (interrupt) enabled stop counting after the
interrupt is signalled. This is because we need one-shot samples
that keep counting, which perf doesn't support yet
You'll have to reprogram the thing anyway, since
On Wed, 2011-05-11 at 11:55 -0400, Avi Kivity wrote:
+static u64 read_gp_pmc(struct kvm_pmu *pmu, struct kvm_pmc *pmc)
+{
+ u64 counter, enabled, running;
+
+ counter = pmc-counter;
+
+ if (pmc-perf_event)
+ counter += perf_event_read_value(pmc-perf_event,
On Wed, 2011-05-11 at 11:55 -0400, Avi Kivity wrote:
+++ b/include/linux/perf_event.h
@@ -709,7 +709,9 @@ struct perf_buffer {
struct perf_sample_data;
-typedef void (*perf_overflow_handler_t)(struct perf_event *, int,
+typedef void (*perf_overflow_handler_t)(void *context,
+
On 2011-06-03 16:38, Eduardo Habkost wrote:
(CCing Marcelo, Avi, and kvm mailing list, so they can help answering
the uq/master patch flow question)
On Fri, Jun 03, 2011 at 12:51:42AM +0200, Jan Kiszka wrote:
On 2011-06-02 21:34, Eduardo Habkost wrote:
Ouch, the subject prefix is completely
The following series implements partial KVM support for ARM processors,
specifically on the Cortex A-15 platform. The patch set is broken up
into a logical set of patches, the first one containing a skeleton
of files, makefile changes, the basic user space interface and KVM
architecture specific
Targets KVM support for Cortex A-15 processors.
Contains no real functionality but all the framework components,
make files, header files and some tracing functionality.
---
arch/arm/Kconfig |2
arch/arm/Makefile |1
arch/arm/include/asm/kvm.h
Adds support in the identity mapping feature that allows KVM to setup
identity mapping for the Hyp mode with the AP[1] bit set as required by
the specification and also supports freeing created sub pmd's after
finished use.
---
arch/arm/include/asm/pgtable-3level-hwdef.h |1 +
Sets up the required registers to run code in HYP-mode from the kernel.
No major controversies, but we should consider how to deal with SMP
support for hypervisor stack page.
Works by setting the HVBAR the kernel can execute code in Hyp-mode with
the MMU disabled which initializes other registers
Initializes a blank level-1 translation table for the second stage
translation and handles freeing it as well.
---
arch/arm/include/asm/kvm_host.h |4 ++-
arch/arm/include/asm/kvm_mmu.h |5
arch/arm/kvm/arm.c | 54 ++-
3 files
Provides complete world-switch implementation to switch to other guests
runinng in non-secure modes. Includes Hyp exception handlers that
captures necessary exception information and stores the information on
the VCPU and KVM structures.
Only controversy may be the back-door call to __irq_svc
A few stub functions and support for emulating access to memory remap
registers PRRR and NMRR.
Provides some framework for handling trapped CP15 accesses in general.
---
arch/arm/include/asm/kvm_emulate.h |7 ++
arch/arm/kvm/arm.c | 73 +++-
Handles the guest faults in KVM by mapping in corresponding user pages
in the 2nd stage page tables.
Introduces new ARM-specific kernel memory types, PAGE_KVM_GUEST and
pgprot_guest variables used to map 2nd stage memory for KVM guests.
---
arch/arm/include/asm/pgtable-3level.h |9 +++
When the guest accesses I/O memory this will create data abort
exceptions and they are handled by decoding the HSR information
(physical address, read/write, length, register) and forwarding reads
and writes to QEMU which performs the device emulation.
This requires changing the general flow
On 2011-06-03 17:03, Christoffer Dall wrote:
Targets KVM support for Cortex A-15 processors.
Contains no real functionality but all the framework components,
make files, header files and some tracing functionality.
---
...
diff --git a/include/linux/kvm.h b/include/linux/kvm.h
index
Am 03.06.2011 15:38, schrieb Brad Campbell:
On 02/06/11 07:03, CaT wrote:
On Wed, Jun 01, 2011 at 07:52:33PM +0800, Brad Campbell wrote:
Unfortunately the only interface that is mentioned by name anywhere
in my firewall is $DMZ (which is ppp0 and not part of any bridge).
All of the nat/dnat
On 2011-06-03 17:31, Jan Kiszka wrote:
On 2011-06-03 17:03, Christoffer Dall wrote:
Targets KVM support for Cortex A-15 processors.
Contains no real functionality but all the framework components,
make files, header files and some tracing functionality.
---
...
diff --git
This patch introduces 'struct framebuffer' and related API as a preparational
step to killing libvnc dependency from hw/vesa.c.
Cc: Cyrill Gorcunov gorcu...@gmail.com
Cc: Ingo Molnar mi...@elte.hu
Cc: John Floren j...@jfloren.net
Cc: Sasha Levin levinsasha...@gmail.com
Signed-off-by: Pekka Enberg
This patch adds support for SDL based framebuffer. Use the '--sdl' command line
option to enable the feature.
Cc: Cyrill Gorcunov gorcu...@gmail.com
Cc: Ingo Molnar mi...@elte.hu
Cc: John Floren j...@jfloren.net
Cc: Sasha Levin levinsasha...@gmail.com
Signed-off-by: Pekka Enberg
This patch makes use of 'struct framebuffer' and moves the VNC code to ui/vnc.c
in preparation for other framebuffer output targets.
Cc: Cyrill Gorcunov gorcu...@gmail.com
Cc: Ingo Molnar mi...@elte.hu
Cc: John Floren j...@jfloren.net
Cc: Sasha Levin levinsasha...@gmail.com
Signed-off-by: Pekka
On 03/06/11 23:50, Bernhard Held wrote:
Am 03.06.2011 15:38, schrieb Brad Campbell:
On 02/06/11 07:03, CaT wrote:
On Wed, Jun 01, 2011 at 07:52:33PM +0800, Brad Campbell wrote:
Unfortunately the only interface that is mentioned by name anywhere
in my firewall is $DMZ (which is ppp0 and not
thanks, I will fix this for next version.
On Fri, Jun 3, 2011 at 5:53 PM, Jan Kiszka jan.kis...@siemens.com wrote:
On 2011-06-03 17:31, Jan Kiszka wrote:
On 2011-06-03 17:03, Christoffer Dall wrote:
Targets KVM support for Cortex A-15 processors.
Contains no real functionality but all the
* Pekka Enberg penb...@kernel.org wrote:
This patch adds support for SDL based framebuffer. Use the '--sdl' command
line
option to enable the feature.
Very nice!
I tried them out - but i'm unsure how to activate the feature.
Right now 'kvm run' will run the guest and it outputs to the
* Ingo Molnar mi...@elte.hu wrote:
Right now 'kvm run' will run the guest and it outputs to the serial
console. If i try 'kvm run --sdl' i get:
linux/tools/kvm ./kvm run --sdl
# kvm run -k ../../arch/x86/boot/bzImage -m 1216 -c 16
Warning: Unable to open /dev/net/tun
Undefined
On Fri, 3 Jun 2011, Ingo Molnar wrote:
Very nice!
I tried them out - but i'm unsure how to activate the feature.
Right now 'kvm run' will run the guest and it outputs to the serial
console. If i try 'kvm run --sdl' i get:
linux/tools/kvm ./kvm run --sdl
That's correct.
# kvm run -k
On 03.06.2011, at 18:19, Christoffer Dall wrote:
thanks, I will fix this for next version.
Please be prepared that we might want to model the API as well, so I'd propose
you send out an RFC that patches Documentation/kvm with the respective API
documentation so we can have some constructive
i don't seem to be able to get the SDL window to inizialize over ssh
X-forwarding:
linux/tools/kvm ./kvm run --sdl
# kvm run -k ../../arch/x86/boot/bzImage -m 1216 -c 16
Warning: Unable to open /dev/net/tun
���
Thanks,
Ingo
--
To unsubscribe from this list: send the line
On Fri, 3 Jun 2011, Ingo Molnar wrote:
i don't seem to be able to get the SDL window to inizialize over ssh
X-forwarding:
linux/tools/kvm ./kvm run --sdl
# kvm run -k ../../arch/x86/boot/bzImage -m 1216 -c 16
Warning: Unable to open /dev/net/tun
?
Please pass
-p console=ttyS0
* Pekka Enberg penb...@kernel.org wrote:
Please pass
-p console=ttyS0
to 'kvm' to see if there's error messages in dmesg. I suppose we
should enable that by default.
It says:
[0.639000] vesafb: mode is 640x480x32, linelength=2560, pages=0
[0.64] vesafb: scrolling: redraw
On Fri, 3 Jun 2011, Ingo Molnar wrote:
It says:
[0.639000] vesafb: mode is 640x480x32, linelength=2560, pages=0
[0.64] vesafb: scrolling: redraw
[0.641000] vesafb: Truecolor: size=8:8:8:8, shift=24:0:8:16
[0.642000] vesafb: framebuffer at 0xd000, mapped to
i tried this patch:
diff --git a/tools/kvm/ui/sdl.c b/tools/kvm/ui/sdl.c
index 8bc3f68..403563c 100644
--- a/tools/kvm/ui/sdl.c
+++ b/tools/kvm/ui/sdl.c
@@ -19,6 +19,8 @@ static void *sdl__thread(void *p)
SDL_Surface *screen;
SDL_Event ev;
+ BUG_ON(1);
+
if
On Fri, 3 Jun 2011, Ingo Molnar wrote:
Oh ... because the SDL library is not present on that box and it
silently did not get built.
Now *that* is not an obvious failure pattern ;-)
Oh, sorry about that. I'll just drop the '--sdl' command line option if
the library is not present. Does that
* Pekka Enberg penb...@kernel.org wrote:
On Fri, 3 Jun 2011, Ingo Molnar wrote:
Oh ... because the SDL library is not present on that box and it
silently did not get built.
Now *that* is not an obvious failure pattern ;-)
Oh, sorry about that. I'll just drop the '--sdl' command line
On Fri, 3 Jun 2011, Ingo Molnar wrote:
it would be better to display a meaningful error message in that case
and not run, the user very likely has added --sdl expecting a
framebuffer to pop up!
Is this better?
penberg@tiger:~/linux/tools/kvm$ ./kvm run --sdl -p root=/dev/vda1 -d
so, i still don't have a GUI. What happens is that once the
framebuffer initializes in the guest the bootup gets *real* slow,
like only printk-ing two lines per second.
Then it gets even slower and stops around here:
[ 20.04] No RTC device found, ALARM timers will not wake from suspend
* Ingo Molnar mi...@elte.hu wrote:
here is how the slowdown looks like with printk timestamps:
[0.677000] uvesafb: failed to execute /sbin/v86d
[0.678000] uvesafb: make sure that the v86d helper is installed and
executable
[0.679000] uvesafb: Getting VBE info block failed
* Pekka Enberg penb...@kernel.org wrote:
On Fri, 3 Jun 2011, Ingo Molnar wrote:
it would be better to display a meaningful error message in that case
and not run, the user very likely has added --sdl expecting a
framebuffer to pop up!
Is this better?
penberg@tiger:~/linux/tools/kvm$
Hello,
I've tried using KVM_REGISTER_COALESCED_MMIO to register a coalesced
MMIO zone.
ioctl(KVM_CHECK_EXTENSION) for KVM_CAP_COALESCED_MMIO works properly
(and returns 2).
ioctl(KVM_REGISTER_COALESCED_MMIO) with the zone also works fine (and
returns 0).
What I see is that we still get
Hi,recently I just read the source of kvm and add some code to it.I
compile my own kernel version 2.6.27, and the compile the kvm at
version kvm-88, the comipile warnning shows some symbol was export
twice,and previous export from vmlinx.I find the Makefile.syvers says
it did export the those
On Fri, 2011-06-03 at 20:49 +0300, Sasha Levin wrote:
Hello,
I've tried using KVM_REGISTER_COALESCED_MMIO to register a coalesced
MMIO zone.
Looks like this issue was caused because I changed my KVM_MAX_VCPUS from
64 to 1024.
--
Sasha.
--
To unsubscribe from this list: send the line
Tell me it isn't so...
diff --git a/drivers/pci/intel-iommu.c b/drivers/pci/intel-iommu.c
index 59f17ac..6c588ee 100644
--- a/drivers/pci/intel-iommu.c
+++ b/drivers/pci/intel-iommu.c
@@ -3866,6 +3866,20 @@ static int intel_iommu_unmap(struct iommu_domain *domain,
struct dmar_domain
On Fri, Jun 03, 2011 at 10:54:19AM +0300, Sasha Levin wrote:
On Fri, 2011-06-03 at 09:34 +0200, Ingo Molnar wrote:
* Sasha Levin levinsasha...@gmail.com wrote:
with no apparent progress being made.
Since it's something that worked in 2.6.37, I've looked into it to
find what
This patch fixes access to 'ah' in int10_vesa() by masking the high bits.
Cc: Ingo Molnar mi...@elte.hu
Cc: Cyrill Gorcunov gorcu...@gmail.com
Cc: John Floren j...@jfloren.net
Cc: Sasha Levin levinsasha...@gmail.com
Signed-off-by: Pekka Enberg penb...@kernel.org
---
tools/kvm/bios/int10.c |2
This patch cleans up the code in bios/int10.c without changing functionality.
Cc: Ingo Molnar mi...@elte.hu
Cc: Cyrill Gorcunov gorcu...@gmail.com
Cc: John Floren j...@jfloren.net
Cc: Sasha Levin levinsasha...@gmail.com
Signed-off-by: Pekka Enberg penb...@kernel.org
---
tools/kvm/bios/int10.c |
On Fri, Jun 03, 2011 at 10:37:04PM +0300, Pekka Enberg wrote:
This patch fixes access to 'ah' in int10_vesa() by masking the high bits.
Cc: Ingo Molnar mi...@elte.hu
Cc: Cyrill Gorcunov gorcu...@gmail.com
Cc: John Floren j...@jfloren.net
Cc: Sasha Levin levinsasha...@gmail.com
On Fri, Jun 03, 2011 at 10:37:03PM +0300, Pekka Enberg wrote:
This patch cleans up the code in bios/int10.c without changing functionality.
Cc: Ingo Molnar mi...@elte.hu
Cc: Cyrill Gorcunov gorcu...@gmail.com
Cc: John Floren j...@jfloren.net
Cc: Sasha Levin levinsasha...@gmail.com
Coalescing MMIO allows us to avoid an exit every time we have a
MMIO write, instead - MMIO writes are coalesced in a ring which
can be flushed once an exit for a different reason is needed.
A MMIO exit is also trigged once the ring is full.
Coalesce all MMIO regions registered in the MMIO mapper.
On Fri, 2011-06-03 at 12:31 -0700, Paul E. McKenney wrote:
On Fri, Jun 03, 2011 at 10:54:19AM +0300, Sasha Levin wrote:
On Fri, 2011-06-03 at 09:34 +0200, Ingo Molnar wrote:
* Sasha Levin levinsasha...@gmail.com wrote:
with no apparent progress being made.
Since it's
On Fri, 2011-06-03 at 20:31 +0100, David Woodhouse wrote:
+ size = PAGE_SIZE gfp_order;
Just realised it needs an extra 9 in there somewhere, if you actually
wanted to test it (Allen). I think I'd prefer to fix the KVM code
instead, though.
--
dwmw2
--
To unsubscribe from
On Fri, 2011-06-03 at 20:31 +0100, David Woodhouse wrote:
Tell me it isn't so...
Looks accurate to me, in fact, with hugetlbfs it seems like it's doing
exactly what it should do. The non-hugetlbfs case isn't efficient, but
it isn't wrong either. Our only other option is to figure out what's
It doesn't make sense to ever see a half-initialized kvm structure on
mmu notifier callbacks. Previously, 85722cda changed the ordering to
ensure that the mmu_lock was initialized before mmu notifier
registration, but there is still a race where the mmu notifier could
come in and try accessing
On Fri, Jun 03, 2011 at 10:56:20PM +0300, Sasha Levin wrote:
On Fri, 2011-06-03 at 12:31 -0700, Paul E. McKenney wrote:
On Fri, Jun 03, 2011 at 10:54:19AM +0300, Sasha Levin wrote:
On Fri, 2011-06-03 at 09:34 +0200, Ingo Molnar wrote:
* Sasha Levin levinsasha...@gmail.com wrote:
On Fri, 2011-06-03 at 13:22 -0700, Paul E. McKenney wrote:
On Fri, Jun 03, 2011 at 10:56:20PM +0300, Sasha Levin wrote:
On Fri, 2011-06-03 at 12:31 -0700, Paul E. McKenney wrote:
On Fri, Jun 03, 2011 at 10:54:19AM +0300, Sasha Levin wrote:
On Fri, 2011-06-03 at 09:34 +0200, Ingo Molnar
This patch optimizes SDL updates by keeping track of which parts of the guest
screen have been written since last update and calling SDL_BlitSurface() and
SDL_UpdateRect() for only changed parts of the screen.
Cc: Cyrill Gorcunov gorcu...@gmail.com
Cc: Ingo Molnar mi...@elte.hu
Cc: John Floren
On Sat, Jun 04, 2011 at 12:03:59AM +0300, Sasha Levin wrote:
On Fri, 2011-06-03 at 13:22 -0700, Paul E. McKenney wrote:
On Fri, Jun 03, 2011 at 10:56:20PM +0300, Sasha Levin wrote:
On Fri, 2011-06-03 at 12:31 -0700, Paul E. McKenney wrote:
On Fri, Jun 03, 2011 at 10:54:19AM +0300, Sasha
On Fri, 2011-06-03 at 14:20 -0700, Paul E. McKenney wrote:
On Sat, Jun 04, 2011 at 12:03:59AM +0300, Sasha Levin wrote:
On Fri, 2011-06-03 at 13:22 -0700, Paul E. McKenney wrote:
On Fri, Jun 03, 2011 at 10:56:20PM +0300, Sasha Levin wrote:
On Fri, 2011-06-03 at 12:31 -0700, Paul E.
On Sat, Jun 04, 2011 at 01:54:45AM +0300, Sasha Levin wrote:
On Fri, 2011-06-03 at 14:20 -0700, Paul E. McKenney wrote:
On Sat, Jun 04, 2011 at 12:03:59AM +0300, Sasha Levin wrote:
On Fri, 2011-06-03 at 13:22 -0700, Paul E. McKenney wrote:
On Fri, Jun 03, 2011 at 10:56:20PM +0300, Sasha
Hi All,
This is KVM test result against kvm.git
19c17b5c14e0b3e9131e55a92b961ea9eabbc56b based on kernel 2.6.39+, and
qemu-kvm.git c007db193eb6b2557acb5caf2dc4d7023639e6f3.
We found no bug and no fix in our nightly test during the past two weeks.
New issue:
Fixed issue:
Old Issues:
On 03.06.2011, at 01:15, Scott Wood wrote:
This patchset contains SPE state management for e500 KVM guests, as well
as MMU enhancements (performance, userspace visibility, and support for
mapping things that aren't standard kernel-managed pages).
They are combined into one patchset because
73 matches
Mail list logo