The GET_SUPPORTED_CPUID bug has been fixed and shouldn't be happening
from v3.2 onwards.
Do you still see the issue in older versions?
On Mon, 2012-01-23 at 21:20 -0800, Gabe Black wrote:
> Sorry, forgot to add a subject.
>
> Gabe
>
> On Mon, Jan 23, 2012 at 9:18 PM, Gabe Black wrote:
> > Hi,
Sorry, forgot to add a subject.
Gabe
On Mon, Jan 23, 2012 at 9:18 PM, Gabe Black wrote:
> Hi, I think I've tracked down the bug that causes
> "KVM_GET_SUPPORTED_CPUID failed: Argument list too long" errors when
> using the kvm tool. Basically, this (possibly squished) code seems to
> be to blame
Hi, I think I've tracked down the bug that causes
"KVM_GET_SUPPORTED_CPUID failed: Argument list too long" errors when
using the kvm tool. Basically, this (possibly squished) code seems to
be to blame:
case 0xd: {
int i;
entry->flags |= KVM_CPUID_FLAG_SIGNIFCANT_INDEX;
for (i = 1; *nent < maxnent
Hello All,
Non-development question, apologies if I am posting to the wrong list,
but I cannot seem to find linux kvm forum 2010 videos at the following
link:
http://www.linux-kvm.org/page/KVM_Forum_2010
Is there some place else where they might be present ?
Nick
--
To unsubscribe from this lis
On 01/19/2012 12:04 PM, Jan Kiszka wrote:
> On 2012-01-19 18:54, Marcelo Tosatti wrote:
>> On Thu, Jan 19, 2012 at 01:39:24PM +0100, Jan Kiszka wrote:
>>> This is at best a PPC topi but according to [1] even there unneeded. In
>>> any case, remove this diff to upstream, it should be handled there i
subscribe kvm
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
None of those files have any meaning for today's qemu-kvm.
Signed-off-by: Jan Kiszka
---
Note that I removed the binary patch to delete pc-bios/openbios-sparc.
It seemms to have caused troubles getting this on the list.
pc-bios/bios-vista.diff | 17 -
pc-bios/bochs-manifest
Marcelo Tosatti wrote:
On Mon, Jan 23, 2012 at 05:12:07PM +0100, erik.r...@rdsoftware.de wrote:
Hi all,
I get continuous reboots on my guest system, including these dmesg entries:
[ 31.770538] device tap0 entered promiscuous mode
[ 31.770554] br0: port 2(tap0) entering learning state
[ 3
On Mon, Jan 23, 2012 at 05:12:07PM +0100, erik.r...@rdsoftware.de wrote:
> Hi all,
>
> I get continuous reboots on my guest system, including these dmesg entries:
>
> [ 31.770538] device tap0 entered promiscuous mode
> [ 31.770554] br0: port 2(tap0) entering learning state
> [ 39.259921] kv
On Mon, Jan 23, 2012 at 07:42:04PM +0900, Takuya Yoshikawa wrote:
> The last one is an RFC patch:
>
> I think it is better to refactor the rmap things, if needed, before
> other architectures than x86 starts large pages support.
>
> Takuya
Looks good to me.
--
To unsubscribe from this lis
On Thu, Jan 19, 2012 at 10:22:41PM -0500, Christoffer Dall wrote:
> The kvm_vcpu_kick function performs roughly the same funcitonality on
> most all architectures, so we shouldn't have separate copies.
>
> PowerPC keeps a pointer to interchanging waitqueues on the vcpu_arch
> structure and to acco
On 01/20/2012 11:26 AM, Marcelo Tosatti wrote:
The following changes since commit 8c4ec5c0269bda18bb777a64b2008088d1c632dc:
pxa2xx_keypad: fix unbalanced parenthesis. (2012-01-17 02:14:42 +0100)
are available in the git repository at:
git://git.kernel.org/pub/scm/virt/kvm/qemu-kvm.git uq/
Please send in any agenda items you are interested in covering.
Cheers,
Markus
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Enable the base code.
Signed-off-by: Alex Williamson
---
MAINTAINERS |8
drivers/Kconfig |2 ++
drivers/Makefile |1 +
drivers/vfio/Kconfig |8
drivers/vfio/Makefile |3 +++
5 files changed, 22 insertions(+), 0 deletions(-)
create mod
Backing for operations on the IOMMU object, including DMA
mapping and unmapping.
Signed-off-by: Alex Williamson
---
drivers/vfio/vfio_iommu.c | 611 +
1 files changed, 611 insertions(+), 0 deletions(-)
create mode 100644 drivers/vfio/vfio_iommu.c
d
This provides the base group management with conduits to the
IOMMU driver and VFIO bus drivers.
Signed-off-by: Alex Williamson
---
drivers/vfio/vfio_main.c| 1248 +++
drivers/vfio/vfio_private.h | 36 +
2 files changed, 1284 insertions(+), 0 deletio
This defines both the user and bus driver APIs.
Signed-off-by: Alex Williamson
---
Documentation/ioctl/ioctl-number.txt |1
include/linux/vfio.h | 395 ++
2 files changed, 396 insertions(+), 0 deletions(-)
create mode 100644 include/linux/v
Including rationale for design, example usage and API description.
Signed-off-by: Alex Williamson
---
Documentation/vfio.txt | 359
1 files changed, 359 insertions(+), 0 deletions(-)
create mode 100644 Documentation/vfio.txt
diff --git a/Docum
This series includes the core framework for the VFIO driver.
VFIO is a userspace driver interface meant to replace both the
KVM device assignment code as well as interfaces like UIO. Please
see patch 1/5 for a complete description of VFIO, what it can do,
and how it's designed.
This series can al
On Mon, Jan 23, 2012 at 05:32:59PM +0100, Kevin Wolf wrote:
> Am 23.01.2012 17:22, schrieb Gleb Natapov:
> > On Mon, Jan 23, 2012 at 05:20:22PM +0100, Kevin Wolf wrote:
> >> Am 23.01.2012 17:10, schrieb Gleb Natapov:
> >>> On Mon, Jan 23, 2012 at 05:07:13PM +0100, Kevin Wolf wrote:
> This adds
Am 23.01.2012 17:22, schrieb Gleb Natapov:
> On Mon, Jan 23, 2012 at 05:20:22PM +0100, Kevin Wolf wrote:
>> Am 23.01.2012 17:10, schrieb Gleb Natapov:
>>> On Mon, Jan 23, 2012 at 05:07:13PM +0100, Kevin Wolf wrote:
This adds a test case that jumps into VM86 by iret-ing to a TSS and back
t
https://bugzilla.kernel.org/show_bug.cgi?id=42636
--- Comment #2 from Klaus Mueller 2012-01-23 16:26:49
---
Well, I did exactly what you proposed, but I got the same error again, as I
tried to apply both devices. That's the relevant part of the xml file:
On Mon, Jan 23, 2012 at 05:20:22PM +0100, Kevin Wolf wrote:
> Am 23.01.2012 17:10, schrieb Gleb Natapov:
> > On Mon, Jan 23, 2012 at 05:07:13PM +0100, Kevin Wolf wrote:
> >> This adds a test case that jumps into VM86 by iret-ing to a TSS and back
> >> to Protected Mode using a task gate in the IDT.
https://bugzilla.kernel.org/show_bug.cgi?id=42635
--- Comment #2 from Klaus Mueller 2012-01-23 16:18:33
---
The device never works in the guest after s2disk/resume cycle of the host. But
it always works if it's used by the host itself - even after a s2disk/resume
cycle.
The device is (as s
Am 23.01.2012 17:10, schrieb Gleb Natapov:
> On Mon, Jan 23, 2012 at 05:07:13PM +0100, Kevin Wolf wrote:
>> This adds a test case that jumps into VM86 by iret-ing to a TSS and back
>> to Protected Mode using a task gate in the IDT.
>>
> Can you add the test case to taskswitch2.c?
That's actually w
Hi all,
I get continuous reboots on my guest system, including these dmesg entries:
[ 31.770538] device tap0 entered promiscuous mode
[ 31.770554] br0: port 2(tap0) entering learning state
[ 39.259921] kvm: 1517: cpu0 unhandled wrmsr: 0x0 data 400080532d74
[ 39.259936] kvm: 1517: cpu0
On Mon, Jan 23, 2012 at 05:07:13PM +0100, Kevin Wolf wrote:
> This adds a test case that jumps into VM86 by iret-ing to a TSS and back
> to Protected Mode using a task gate in the IDT.
>
Can you add the test case to taskswitch2.c?
> Signed-off-by: Kevin Wolf
> ---
> config-i386.mak |3
Task switches can switch between Protected Mode and VM86. The current
mode must be updated during the task switch emulation so that the new
segment selectors are interpreted correctly and privilege checks
succeed.
Signed-off-by: Kevin Wolf
---
arch/x86/include/asm/kvm_emulate.h |1 +
arch/x8
Setting the segment DPL to 0 for at least the VM86 code segment makes
the VM entry fail on VMX.
Signed-off-by: Kevin Wolf
---
arch/x86/kvm/emulate.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index 1b98a2c..833969e 10
Currently, all task switches check privileges against the DPL of the
TSS. This is only correct for jmp/call to a TSS. If a task gate is used,
the DPL of this take gate is used for the check instead. Exceptions,
external interrupts and iret shouldn't perform any check.
This patch fixes the problem
Kevin Wolf (3):
KVM: x86 emulator: Fix task switch privilege checks
KVM: x86 emulator: VM86 segments must have DPL 3
KVM: x86 emulator: Allow PM/VM86 switch during task switch
arch/x86/include/asm/kvm_emulate.h |3 +-
arch/x86/include/asm/kvm_host.h|4 +-
arch/x86/kvm/emulate.c
This adds a test case that jumps into VM86 by iret-ing to a TSS and back
to Protected Mode using a task gate in the IDT.
Signed-off-by: Kevin Wolf
---
config-i386.mak |3 +-
lib/x86/desc.c| 37 +-
lib/x86/desc.h| 36 ++
Commit 1d946e07 removed idt, but left a reference to idt in i386-only
code.
Signed-off-by: Kevin Wolf
---
lib/x86/desc.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/lib/x86/desc.c b/lib/x86/desc.c
index c268955..770c250 100644
--- a/lib/x86/desc.c
+++ b/lib/x86/desc
This adds a convenient way to run all tests without having to set up
Autotest.
Signed-off-by: Kevin Wolf
---
run_tests.sh | 107 ++
1 files changed, 107 insertions(+), 0 deletions(-)
create mode 100755 run_tests.sh
diff --git a/run_tests
Signed-off-by: Kevin Wolf
---
x86/unittests.cfg | 12
1 files changed, 12 insertions(+), 0 deletions(-)
diff --git a/x86/unittests.cfg b/x86/unittests.cfg
index 065020a..dac7d44 100644
--- a/x86/unittests.cfg
+++ b/x86/unittests.cfg
@@ -64,6 +64,18 @@ file = svm.flat
smp = 2
ext
This adds a test case for taskswitches into/out of VM86. This test case
currently fails on KVM, it passes with TCG. I'll send out KVM fixes together
with this series.
I also included a small shell script that just runs tests and prints a
PASS/FAIL message for each. I've been using this script loca
https://bugzilla.kernel.org/show_bug.cgi?id=42635
Alex Williamson changed:
What|Removed |Added
CC||alex.william...@redhat.com
--- Comm
https://bugzilla.kernel.org/show_bug.cgi?id=42636
Alex Williamson changed:
What|Removed |Added
CC||alex.william...@redhat.com
--- Comm
Though we have one rmap array for every level, those for large pages,
called rmap_pde, are coupled with write_count information and constitute
lpage_info arrays.
To hide this implementation details, we are now using __gfn_to_rmap()
which includes likely(level == PT_PAGE_TABLE_LEVEL) heuristics; t
We can also use this for PT_PAGE_TABLE_LEVEL to treat every level
uniformly.
Signed-off-by: Takuya Yoshikawa
---
arch/x86/kvm/mmu.c |3 +--
include/linux/kvm_host.h |7 +++
virt/kvm/kvm_main.c |4 +---
3 files changed, 9 insertions(+), 5 deletions(-)
diff --git a/arch
We can hide the implementation details and treat every level uniformly.
Signed-off-by: Takuya Yoshikawa
---
arch/x86/kvm/mmu.c | 12 ++--
1 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index 844fcce..0e82d9d 100644
--- a/arch/x86/
We want to eliminate direct access to the rmap array.
Signed-off-by: Takuya Yoshikawa
---
arch/x86/kvm/mmu_audit.c |4 +---
1 files changed, 1 insertions(+), 3 deletions(-)
diff --git a/arch/x86/kvm/mmu_audit.c b/arch/x86/kvm/mmu_audit.c
index 6eabae3..e62fa4f 100644
--- a/arch/x86/kvm/mmu_
The last one is an RFC patch:
I think it is better to refactor the rmap things, if needed, before
other architectures than x86 starts large pages support.
Takuya
arch/ia64/kvm/kvm-ia64.c|8
arch/powerpc/kvm/book3s_64_mmu_hv.c |6 +++---
arch/powerpc/kvm/book
Le Mon, Jan 23, 2012 at 09:28:37AM +0100, David Cure ecrivait :
>
> I attach the libvirt xml of my vm.
I forget to attach ;)
David.
rds.xml
Description: XML document
signature.asc
Description: Digital signature
https://bugzilla.kernel.org/show_bug.cgi?id=42636
Summary: PCI passthrough does not work with AMD iommu for PCI
device
Product: Virtualization
Version: unspecified
Kernel Version: 3.1
Platform: All
OS/Version: Linux
https://bugzilla.kernel.org/show_bug.cgi?id=42635
Summary: PCIe passthrough broken with AMD iommu after s2disk /
resume
Product: Virtualization
Version: unspecified
Kernel Version: 3.1
Platform: All
OS/Version: Linux
Hello,
I use several kvm box, and no problem at all except for 1
application that have bad response time.
The VM runs Windows 2008R2 and the application is an
client-server app develop with progress software and talk to an Oracle
databasei (on another server) and
47 matches
Mail list logo