- MCE features are initialized when VCPU is intialized according to CPUID.
- A monitor command mce is added to inject a MCE.
- A new interrupt mask: CPU_INTERRUPT_MCE is added to inject the MCE.
ChangeLog:
v5:
- Rebased on latest qemu-kvm.git
v4:
- Add savevm/loadvm support
Signed-off-by:
KVM ioctls are used to initialize MCE simulation and inject MCE. The
real MCE simulation is implemented in Linux kernel.
ChangeLog:
v5:
- Re-based on latest qemu-kvm.git
v3:
- Re-based on qemu/tcg MCE support patch
v2:
- Use new kernel MCE capability exportion interface.
Signed-off-by:
On Wed, May 20, 2009 at 3:55 PM, Sachin Sant sach...@in.ibm.com wrote:
Mark McLoughlin wrote:
On Wed, 2009-05-20 at 15:25 +0530, Sachin Sant wrote:
I used system_reset command from QEMU prompt with a SLES 11
Guest. After a reset the guest came up fine with the exception
that neither key
Poornima B N wrote:
I used system_reset command from QEMU prompt with a SLES 11
Guest. After a reset the guest came up fine with the exception
that neither key strokes nor mouse click worked.
Problem is specific to SLES11 guests as it works fine on other guests like
RedHat and Fedora.
Hi,
This test will boot VMs until one of them becomes unresponsive, and
records the maximum number of VMs successfully started.
--
Yolkfull
Regards,
diff --git a/client/tests/kvm/kvm_tests.py b/client/tests/kvm/kvm_tests.py
index 48e..7d00277 100644
--- a/client/tests/kvm/kvm_tests.py
Minor issues that likely had no practical relevance: The kvm timer
function so far incremented the pending counter and then may reset it
again to 1 in case reinjection was disabled. This opened a small racy
window with the corresponding VCPU loop that may have happened to run on
another (real) CPU
Hi,
This test will boot VMs until one of them becomes unresponsive, and
records the maximum number of VMs successfully started.
Can you clarify what this test is exactly testing? Is it any of the
tests on http://kvm.et.redhat.com/page/KVM-Autotest/TODO (if not, please
add it).
Are you
The test looks pretty nicely written. Comments:
1. Consider making all the cloned VMs use image snapshots:
curr_vm = vm1.clone()
curr_vm.get_params()[extra_params] += -snapshot
I'm not sure it's a good idea to let all VMs use the same disk image.
Or maybe you shouldn't add -snapshot yourself,
- Yaniv Kaul yk...@redhat.com wrote:
Hi,
This test will boot VMs until one of them becomes unresponsive, and
records the maximum number of VMs successfully started.
Can you clarify what this test is exactly testing? Is it any of the
tests on
I am testing network throughput between two guests residing on the same
physical machine. I use a bridge to pass packets between those guests and the
virtio NIC model. I am wondering why the throughput only goes up to about
970Mbps. Should we not be able to achieve much higher throughput if the
Bugs item #2506814, was opened at 2009-01-14 11:38
Message generated for change (Comment added) made by cova
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2506814group_id=180599
Please note that this message will contain a full copy of the comment
From: john cooper john.coo...@redhat.com
This patch extracts the opaque data from pci i/o
region 0 via the added VIRTIO_BLK_F_IDENTIFY
field. By convention this data takes the form of
that returned by an ATA IDENTIFY DEVICE command,
however the driver (except for structure size)
makes no
On Thu, 4 Jun 2009 06:37:19 am you wrote:
This patch extracts the opaque data from pci i/o
region 0 via the added VIRTIO_BLK_F_IDENTIFY
field.
Thanks John, I fixed textual conflicts and forwarded it to Jens: he has the
other pending virtio_blk patches as well.
I removed one comment:
+/*
On Mon, Jun 08, 2009 at 12:24:08PM +0300, Avi Kivity wrote:
+static void __mmu_spte_walk(struct kvm *kvm, struct kvm_mmu_page *sp,
+inspect_spte_fn fn)
+{
+int i;
+
+for (i = 0; i PT64_ENT_PER_PAGE; ++i) {
+u64 ent = sp-spt[i];
+
+
Marcelo Tosatti wrote:
Semi-related: we should set up a new exit code to halt the VM so it can
be inspected, otherwise all those printks and dump_stack()s will quickly
overwhelm the logging facilities.
Can you clarify on the halt exit code?
set a bit that tells KVM_RUN to quit
On Tue, Jun 09 2009, Rusty Russell wrote:
From: john cooper john.coo...@redhat.com
This patch extracts the opaque data from pci i/o
region 0 via the added VIRTIO_BLK_F_IDENTIFY
field. By convention this data takes the form of
that returned by an ATA IDENTIFY DEVICE command,
however the
On 06/09/2009 11:41 AM, Yolkfull Chow wrote:
Hi,
This test will boot VMs until one of them becomes unresponsive, and
records the maximum number of VMs successfully started.
Hello,
Some more comments (in addition to previous comments by others)
1. Do not just send monitor command quit but
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/i8254.c |2 +-
arch/x86/kvm/kvm_timer.h |2 +-
arch/x86/kvm/lapic.c |2 +-
arch/x86/kvm/timer.c |2 +-
4 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/arch/x86/kvm/i8254.c
Currently vcpu_id is used as an index into vcpus array and as apic id
on x86. This is incorrect since apic ids not have to be continuous
(they can also encode cpu hierarchy information) and may have values
bigger then vcpu array in case of x2apic. This series removes use of
vcpu_id as vcpus array
Archs are free to use vcpu_id as they see fit. For x86 it is used as
vcpu's apic id. New ioctl is added to configure boot vcpu id that was
assumed to be 0 till now.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/ia64/include/asm/kvm_host.h |1 -
arch/ia64/kvm/Kconfig|1
Use it instead of open code vcpu_id zero is BSP assumption.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/ia64/kvm/kvm-ia64.c |2 +-
arch/ia64/kvm/vcpu.c |2 +-
arch/x86/kvm/i8254.c |4 ++--
arch/x86/kvm/i8259.c |6 +++---
arch/x86/kvm/lapic.c |7
update_pte sets nonleaf sptes as notrap, so either it or the audit code
is broken.
Choose the audit code.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: kvm/arch/x86/kvm/mmu.c
===
--- kvm.orig/arch/x86/kvm/mmu.c
+++
Addressing comments.
--
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Under testing, count_writable_mappings returns a value that is 2 integers
larger than what count_rmaps returns.
Suspicion is that either of the two functions is counting a duplicate (either
positively or negatively).
Modifying check_writable_mappings_rmap to check for rmap existance on
all
- Unsync pages contain writable sptes in the rmap.
- rmaps do not exclusively contain writable sptes anymore.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: kvm/arch/x86/kvm/mmu.c
===
--- kvm.orig/arch/x86/kvm/mmu.c
+++
- Fail early in case gfn_to_pfn returns is_error_pfn.
- For the pre pte write case, avoid spurious gva is valid but spte is notrap
messages (the emulation code does the guest write first, so this particular
case is OK).
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index:
Hi ,
I would like to know if both container based (Vserver ) and para
virtualization (KVM) co-exist at the same time on the host machine ( INTEL
VT) ?
Thanks
Ajay
__
--
To unsubscribe from this list: send the line
On Tue, 2009-06-09 at 11:06 +, Fischer, Anna wrote:
I am testing network throughput between two guests residing on the
same physical machine. I use a bridge to pass packets between those
guests and the virtio NIC model. I am wondering why the throughput
only goes up to about 970Mbps.
On Tue, Jun 09, 2009 at 03:37:01PM +0200, Jan Kiszka wrote:
v2 as requested in private discussion: Broken into two pieces, and the
second one will not change the original semantic.
--
Minor issue that likely had no practical relevance: The kvm timer
function so far incremented
Ajay EP wrote:
Hi ,
I would like to know if both container based (Vserver ) and para
virtualization (KVM) co-exist at the same time on the host machine ( INTEL
VT) ?
As far as I know, yes.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list:
On Tuesday 09 June 2009, Han, Weidong wrote:
Paul Brook wrote:
On Monday 08 June 2009, Weidong Han wrote:
When hot remove an assigned device, segmentation fault was triggered
by qemu_free(pci_dev-qdev) in pci_unregister_device().
pci_register_device() doesn't initialize or set
On 06/09/09 16:51, Paul Brook wrote:
On Tuesday 09 June 2009, Han, Weidong wrote:
Paul Brook wrote:
On Monday 08 June 2009, Weidong Han wrote:
When hot remove an assigned device, segmentation fault was triggered
by qemu_free(pci_dev-qdev) in pci_unregister_device().
pci_register_device()
This patch is based on the recent patch from Vincent Minet. I split Vincent's
changes into 2 patches (to separate MADT and RSDT table cleanup, as suggested by
Marcelo) and added a bit to them.
There has been much ado over the acpi_bios_init function recently. I had
actually
done a rewrite very
This patch is also based on the patch by Vincent Minet. It corrects the size
calculation of the RSDT, and checks for overflow of MAX_RSDT_ENTRIES,
assuming that the external table entry count is contained within
MAX_RSDT_ENTRIES.
I moved the for() loop to the end of the code that adds
This is a series of patches that addresses the problems found by Uri
Lublin on a run of the new kvm upstream test.
* Bad line continuations on long strings
* Bad logging calls
* Inability to run kvm_config.py as a stand alone program
--
Lucas Meneghel Rodrigues
Software Engineer (QE)
Red Hat
During the conversion of the kvm_runtest_2 to the kvm test, some
bad line breaks were introduced. Started using parenthesis
implicit line continuation instead of backslash continuation in
assignments that were using it.
Signed-off-by: Lucas Meneghel Rodrigues l...@redhat.com
---
All kvm modules that can be used as stand alone programs were
updated to use #!/usr/bin/python instead of #!/usr/bin/env python,
complying with the rest of the autotest code base.
Signed-off-by: Lucas Meneghel Rodrigues l...@redhat.com
---
client/tests/kvm/fix_cdkeys.py |2 +-
During the conversion of kvm autotest to upstream coding standards,
some bad logging calls were left behind. This patch fixes them.
Signed-off-by: Lucas Meneghel Rodrigues l...@redhat.com
---
client/tests/kvm/kvm_utils.py |6 +++---
1 files changed, 3 insertions(+), 3 deletions(-)
diff
Ryan,
On Fri, May 29, 2009 at 11:43:26AM -0500, Ryan Harper wrote:
Testing latest qemu-kvm.git and kvm-kmod.git, ept enabled and backing
guests with large pages trips a BUG in the mmu code. If I disable ept,
but still use large pages, migration succeeds. Reproduce with:
hugetlbfs setup:
There is no place in the world for this sad header.
This is part of the patch series I sent the other day (about KVMState),
but it is an independent cleanup.
Since that was not merged, I'm sending this part separetedly.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body
This file has no purpose in life in new scheme of things. Move
its contents to libkvm-all.h. There are some name clashes
in qemu-kvm.c. Those function names are then changed.
Signed-off-by: Glauber Costa glom...@redhat.com
---
kvm.h|1 +
libkvm-all.h | 82
Those headers define qemu specific things like ram_addr_t.
This will allow us to start using them in libkvm.
Signed-off-by: Glauber Costa glom...@redhat.com
---
libkvm-all.c |2 +-
libkvm-all.h |1 +
target-i386/libkvm.c |2 ++
3 files changed, 4 insertions(+), 1
Bugs item #2803638, was opened at 2009-06-09 09:45
Message generated for change (Tracker Item Submitted) made by vinyvat
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2803638group_id=180599
Please note that this message will contain a full copy of the
Marcelo Tosatti wrote:
Ryan,
On Fri, May 29, 2009 at 11:43:26AM -0500, Ryan Harper wrote:
Testing latest qemu-kvm.git and kvm-kmod.git, ept enabled and backing
guests with large pages trips a BUG in the mmu code. If I disable ept,
but still use large pages, migration succeeds. Reproduce
Bugs item #2803653, was opened at 2009-06-09 09:57
Message generated for change (Tracker Item Submitted) made by vinyvat
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2803653group_id=180599
Please note that this message will contain a full copy of the
On Fri, Jun 05, 2009 at 01:23:15PM +0300, Michael S. Tsirkin wrote:
Add routines to manage PCI capability list. First user will be MSI-X.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
hw/pci.c | 98
--
hw/pci.h | 18
On Fri, Jun 05, 2009 at 01:23:31PM +0300, Michael S. Tsirkin wrote:
Add functions implementing MSI-X support. First user will be virtio-pci.
Note that platform must set a flag to declare MSI supported.
For PC this will be set by APIC.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
env = cpu_single_env;
if (!env)
@@ -727,7 +762,6 @@ static void apic_mem_writel(void *opaque,
target_phys_addr_t addr, uint32_t val)
printf(APIC write: %08x = %08x\n, (uint32_t)addr, val);
#endif
-index = (addr 4) 0xff;
switch(index) {
case 0x02:
On Fri, Jun 05, 2009 at 01:23:55PM +0300, Michael S. Tsirkin wrote:
Make it possible to resize PCI regions. This will be used by virtio
with MSI-X, where the region size depends on whether MSI-X is enabled,
and can change across load/save.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
Bugs item #2803638, was opened at 2009-06-09 09:45
Message generated for change (Comment added) made by vinyvat
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2803638group_id=180599
Please note that this message will contain a full copy of the comment
Hello
I've compiled and installed KVM on kernel 2.6.28-11. It worked perfectly.
I'm using Ubuntu 9.04.
I'm now trying to compile on kernel 2.6.29-4.
It fails on compiling the kernel module with this error message:
/usr/src/kvm-kmod-devel-86/x86/iommu.c: In function âkvm_iommu_map_pagesâ:
* Marcelo Tosatti mtosa...@redhat.com [2009-06-09 11:45]:
Ryan,
Marcelo, thanks for taking a look. Applied patch and reproduced,
included the new debug output.
On Fri, May 29, 2009 at 11:43:26AM -0500, Ryan Harper wrote:
Testing latest qemu-kvm.git and kvm-kmod.git, ept enabled and
Does anyone have any comments on this patch? I will revise it again, if
I get no objections I am going to commit it soon...
On Wed, 2009-06-03 at 00:22 -0300, Lucas Meneghel Rodrigues wrote:
Refactored KVM install test. Recently the source directory layout
for KVM was changed (now the toplevel
Required for EPT misconfiguration handler.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: kvm/arch/x86/include/asm/vmx.h
===
--- kvm.orig/arch/x86/include/asm/vmx.h
+++ kvm/arch/x86/include/asm/vmx.h
@@ -351,9 +351,16 @@
Disable usage of 2M pages if VMX_EPT_2MB_PAGE_BIT (bit 16) is clear
in MSR_IA32_VMX_EPT_VPID_CAP and EPT is enabled.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: kvm/arch/x86/kvm/vmx.c
===
---
From the Intel docs:
An EPT misconfiguration occurs when, in the course of translation
a guest-physical address, the logical processor encounters an EPT
paging-structure entry that contains an unsupported value.
Handle this event and print useful information for diagnostics.
--
To unsubscribe
This way there is no need to add explicit checks in every
for_each_shadow_entry user.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: kvm/arch/x86/kvm/mmu.c
===
--- kvm.orig/arch/x86/kvm/mmu.c
+++ kvm/arch/x86/kvm/mmu.c
@@
Handler for EPT misconfiguration which checks for valid state
in the shadow pagetables, printing the spte on each level.
The separate WARN_ONs are useful for kerneloops.org.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: kvm/arch/x86/kvm/vmx.c
Required by EPT misconfiguration handler.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: kvm/arch/x86/kvm/mmu.c
===
--- kvm.orig/arch/x86/kvm/mmu.c
+++ kvm/arch/x86/kvm/mmu.c
@@ -3013,6 +3013,26 @@ out:
return r;
Bugs item #2803811, was opened at 2009-06-09 15:03
Message generated for change (Tracker Item Submitted) made by scottparker
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2803811group_id=180599
Please note that this message will contain a full copy of
On Monday 25 May 2009, Michael S. Tsirkin wrote:
Add functions implementing MSI-X support. First user will be virtio-pci.
Note that platform must set a flag to declare MSI supported.
For PC this will be set by APIC.
This sounds wrong. The device shouldn't know or care whether the system has a
All kvm modules that can be used as stand alone programs were
updated to use #!/usr/bin/python instead of #!/usr/bin/env python,
complying with the rest of the autotest code base. As suggested
by Martin, common.py was added. With this, the stand alone
programs will be able to use the autotest
On Tue, 2009-06-09 at 10:00 -0700, Martin Bligh wrote:
I'd suggest you use the same mechanism as the other entry points,
and override the python version where necessary - some distros
have ancient or bleeding edge default Python versions.
see common.py - setup_modules.py -
On Tue, 2009-06-09 at 16:26 -0300, Lucas Meneghel Rodrigues wrote:
Does anyone have any comments on this patch? I will revise it again, if
I get no objections I am going to commit it soon...
Applied.
On Wed, 2009-06-03 at 00:22 -0300, Lucas Meneghel Rodrigues wrote:
Refactored KVM install
On Fri, 5 Jun 2009 02:13:20 am Michael S. Tsirkin wrote:
I out up a copy at http://www.linux-kvm.org/page/Networking_Performance as
well, and intend to dump updates there from time to time.
Hi Michael,
Sorry for the delay. I'm weaning myself off my virtio work, but virtio_net
performance
On Mon, 8 Jun 2009 02:46:08 pm Herbert Xu wrote:
On Fri, Jun 05, 2009 at 05:16:31PM -0700, Sridhar Samudrala wrote:
+ /* Software UFO is not yet supported */
+ segs = ERR_PTR(-EPROTONOSUPPORT);
Hmm, we need to fill this in before you start using it for virt.
After all, it's very
Rusty Russell wrote:
On Mon, 8 Jun 2009 02:46:08 pm Herbert Xu wrote:
On Fri, Jun 05, 2009 at 05:16:31PM -0700, Sridhar Samudrala wrote:
+ /* Software UFO is not yet supported */
+ segs = ERR_PTR(-EPROTONOSUPPORT);
Hmm, we need to fill this in before you start using
Herbert Xu wrote:
On Mon, Jun 08, 2009 at 10:04:47AM -0700, Sridhar Samudrala wrote:
OK. Can we use skb_segment() to do IP fragmentation of UDP packets?
It should be able to.
Unfortunately, this doesn't work for UDP without any changes.
skb_segment() currently adds transport
From: Nitin A Kamble nitin.a.kam...@intel.com
Unrestricted Guest feature is added in the VMX specification.
Intel Westmere and onwards processors will support this feature.
It allows kvm guests to run real mode and unpaged mode
code natively in the VMX mode when EPT is turned on. With the
From: Avi Kivity a...@redhat.com
rmode is only used in vmx, so move it to vmx.c
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h
index a1a96a5..c7b0cc2 100644
--- a/arch/x86/include/asm/kvm_host.h
+++
70 matches
Mail list logo