Hello,
On Mon, Apr 15, 2013 at 5:27 AM, Lin Ming min...@gmail.com wrote:
Will BIOS support be added in kvmtool in the future?
Yes, I expect that to happen eventually. Various patchsets have been
started by multiple people to support SeaBIOS but there hasn't been a
focused effort to push them
On Mon, Apr 15, 2013 at 2:48 PM, Pekka Enberg penb...@kernel.org wrote:
Hello,
Hi,
On Mon, Apr 15, 2013 at 5:27 AM, Lin Ming min...@gmail.com wrote:
Will BIOS support be added in kvmtool in the future?
Yes, I expect that to happen eventually. Various patchsets have been
started by
On Sun, Apr 14, 2013 at 08:27:14PM +0800, Asias He wrote:
On Sun, Apr 14, 2013 at 12:58:03PM +0300, Michael S. Tsirkin wrote:
On Sat, Apr 13, 2013 at 11:29:14AM +0800, Asias He wrote:
This patch makes vhost_scsi_flush() wait for all the pending requests
issued before the flush operation
On 2013-04-15 08:24, 李春奇 Arthur Chunqi Li wrote:
Hi all,
In a nested virtualization environment of qemu+KVM, some emulated CPU (such
as core2duo) may cause L2 guest crash after booting for a while. Here's my
configuration:
Host:
Linux 3.5.7
You should better use latest version from
Am 14.04.2013 um 01:26 hat Cole Robinson geschrieben:
On 04/12/2013 07:27 AM, Kevin Wolf wrote:
This adds a small script that allows to conveniently run all test cases and
that reports back one PASS or FAIL line for each test case; it also
creates
a test.log file with the full output.
Am 14.04.2013 um 20:18 hat Cole Robinson geschrieben:
First two patches are trivial bits. Rest rewrites x86-run in python,
which then makes it easy to parse unittests.cfg. This makes it
simpler to invoke individual unittests the same way autotest does.
Kevin has a similar series[1], but I'm
Hi Marcelo and Gleb,
The following changes since commit 41ef2d5678d83af030125550329b6ae8b74618fa:
Linux 3.9-rc7 (2013-04-14 17:45:16 -0700)
are available in the git repository at:
git://github.com/columbia/linux-kvm-arm.git kvm-arm-fixes-for-3.9
for you to fetch changes up to
Am 14.04.2013 um 14:42 hat Gleb Natapov geschrieben:
On Fri, Apr 12, 2013 at 01:14:47PM +0200, Kevin Wolf wrote:
This adds a test case that jumps into VM86 by iret-ing to a TSS and back
to Protected Mode using a task gate in the IDT.
Signed-off-by: Kevin Wolf kw...@redhat.com
Applied,
Hi Sasha,
On Sun, Apr 14, 2013 at 01:20:44AM +0100, Sasha Levin wrote:
This patch makes the maximum amount of vqs configurable. To use it pass a 'mq'
option to network device configuration. For example:
vm run -n mode=tap,mq=4
Will allow up to 4 queue pairs for that network device.
On Sun, Apr 14, 2013 at 08:27:14PM +0800, Asias He wrote:
On Sun, Apr 14, 2013 at 12:58:03PM +0300, Michael S. Tsirkin wrote:
On Sat, Apr 13, 2013 at 11:29:14AM +0800, Asias He wrote:
This patch makes vhost_scsi_flush() wait for all the pending requests
issued before the flush operation
On 04/15/2013 12:19 PM, Will Deacon wrote:
Hi Sasha,
On Sun, Apr 14, 2013 at 01:20:44AM +0100, Sasha Levin wrote:
This patch makes the maximum amount of vqs configurable. To use it pass a 'mq'
option to network device configuration. For example:
vm run -n mode=tap,mq=4
Will allow up
Il 15/04/2013 10:30, Kevin Wolf ha scritto:
Am 14.04.2013 um 20:18 hat Cole Robinson geschrieben:
First two patches are trivial bits. Rest rewrites x86-run in python,
which then makes it easy to parse unittests.cfg. This makes it
simpler to invoke individual unittests the same way autotest
Il 14/04/2013 12:44, Jan Kiszka ha scritto:
+ if (vmcs12-vm_entry_controls VM_ENTRY_LOAD_IA32_EFER
+ (!kvm_valid_efer(vcpu, vmcs12-guest_ia32_efer) ||
+ !!(vmcs12-vm_entry_controls VM_ENTRY_IA32E_MODE) !=
+ !!(vmcs12-guest_ia32_efer EFER_LMA) ||
+
Il 14/04/2013 12:44, Jan Kiszka ha scritto:
From: Jan Kiszka jan.kis...@siemens.com
If we load the complete EFER MSR on entry or exit, EFER.LMA (and LME)
loading is skipped. Their consistency is already checked now before
starting the transition.
Signed-off-by: Jan Kiszka
Hello gentlemen,
I'd like to ask somebody more experienced then me for help.
I've got machine with 4 running KVM guests. The host is moderately
loaded (load_avg ~4-5), same applies for the guests.
On all of those guests, I see remarkable amount of dropped packets
for no obvious reason. Packets
On 04/08/13 17:11, Peter Maydell wrote:
On 6 April 2013 00:52, Sriram Murthy srira...@yahoo.com wrote:
(actually, the virtualbox SVGA card is based off of the KVM VGA card)
Is it possible to implement it as an extension to the VGA
card device, or has it diverged incompatibly such that it
KVM does not use the activity state VMCS field, and does not support
it in nested VMX either (the corresponding bits in the misc VMX feature
MSR are zero). Fail entry if the activity state is set to anything but
active.
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
arch/x86/kvm/vmx.c | 5
On 2013-04-15 14:46, Paolo Bonzini wrote:
KVM does not use the activity state VMCS field, and does not support
it in nested VMX either (the corresponding bits in the misc VMX feature
MSR are zero). Fail entry if the activity state is set to anything but
active.
Ah, that indeed simplifies the
KVM does not use the activity state VMCS field, and does not support
it in nested VMX either (the corresponding bits in the misc VMX feature
MSR are zero). Fail entry if the activity state is set to anything but
active.
Since the value will always be the same for L1 and L2, we do not need
to
On 2013-04-15 15:00, Paolo Bonzini wrote:
KVM does not use the activity state VMCS field, and does not support
it in nested VMX either (the corresponding bits in the misc VMX feature
MSR are zero). Fail entry if the activity state is set to anything but
active.
Since the value will always
On 04/15/2013 06:47 AM, Paolo Bonzini wrote:
Il 15/04/2013 10:30, Kevin Wolf ha scritto:
Am 14.04.2013 um 20:18 hat Cole Robinson geschrieben:
First two patches are trivial bits. Rest rewrites x86-run in python,
which then makes it easy to parse unittests.cfg. This makes it
simpler to invoke
Hi,
I'd like to add/export an function which allow userspace program
to take snapshot for a region of memory. Since it is not implemented yet
I will describe it as C APIs, it is quite simple now and if it is worthy
I'll improve the interface later:
Simple prototype:
C API in userspace:
/*
*
Hi,
I'm seeing a frequent KVM boot hang using qemu-kvm 1.0+noroms-0ubuntu14.7
since kernel 3.8.y. This report is for guest kernel 3.8.6, but the
issue did also occur with kernel 3.8.2.
I know this qemu-kvm version is a bit dated, but contacting Ubuntu
people on IRC wasn't successfull.
The
On Mon, Apr 15, 2013 at 03:00:27PM +0200, Paolo Bonzini wrote:
KVM does not use the activity state VMCS field, and does not support
it in nested VMX either (the corresponding bits in the misc VMX feature
MSR are zero). Fail entry if the activity state is set to anything but
active.
Since
On Mon, Apr 15, 2013 at 10:56:42AM +0200, Kevin Wolf wrote:
Am 14.04.2013 um 14:42 hat Gleb Natapov geschrieben:
On Fri, Apr 12, 2013 at 01:14:47PM +0200, Kevin Wolf wrote:
This adds a test case that jumps into VM86 by iret-ing to a TSS and back
to Protected Mode using a task gate in the
Hi
Please send in any agenda topics you are interested in.
Later, Juan.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Am 15.04.2013 um 17:38 hat Gleb Natapov geschrieben:
On Mon, Apr 15, 2013 at 10:56:42AM +0200, Kevin Wolf wrote:
Am 14.04.2013 um 14:42 hat Gleb Natapov geschrieben:
On Fri, Apr 12, 2013 at 01:14:47PM +0200, Kevin Wolf wrote:
This adds a test case that jumps into VM86 by iret-ing to a
On Sun, Apr 14, 2013 at 09:04:26PM +0200, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
The logic for checking if interrupts can be injected has to be applied
also on NMIs. The difference is that if NMI interception is on these
events are consumed and blocked by the VM exit.
On Mon, Apr 15, 2013 at 05:42:27PM +0200, Kevin Wolf wrote:
Am 15.04.2013 um 17:38 hat Gleb Natapov geschrieben:
On Mon, Apr 15, 2013 at 10:56:42AM +0200, Kevin Wolf wrote:
Am 14.04.2013 um 14:42 hat Gleb Natapov geschrieben:
On Fri, Apr 12, 2013 at 01:14:47PM +0200, Kevin Wolf wrote:
On 04/15/2013 12:23:28 AM, Paul Mackerras wrote:
On Fri, Apr 12, 2013 at 07:08:47PM -0500, Scott Wood wrote:
Enabling this capability connects the vcpu to the designated
in-kernel
MPIC. Using explicit connections between vcpus and irqchips allows
for flexibility, but the main benefit at
The motivation for this patch is to fix a 20KB leak of memory in vmx.c
when a VM is created and destroyed.
On x86/vmx platforms KVM needs 5 pages of userspace memory per VM for
architecture specific reasons. It currently allocates the pages on behalf
of user space, but has no way of cleanly
Sasha Levin sasha.le...@oracle.com writes:
Add basic documentation for virtio-9p. I can expand more on device operation,
but I don't think there's anything significant enough for the spec to be
mentioned there. Please let me know if I'm wrong.
Signed-off-by: Sasha Levin sasha.le...@oracle.com
On Mon, Apr 15, 2013 at 01:11:54PM +0300, Michael S. Tsirkin wrote:
On Sun, Apr 14, 2013 at 08:27:14PM +0800, Asias He wrote:
On Sun, Apr 14, 2013 at 12:58:03PM +0300, Michael S. Tsirkin wrote:
On Sat, Apr 13, 2013 at 11:29:14AM +0800, Asias He wrote:
This patch makes vhost_scsi_flush()
From: Igor Mammedov imamm...@redhat.com
... so it could be called without requiring CPUArchState.
Signed-off-by: Igor Mammedov imamm...@redhat.com
Reviewed-by: Eduardo Habkost ehabk...@redhat.com
Signed-off-by: Andreas Färber afaer...@suse.de
---
cpus.c | 4 ++--
complete_mmio_load writes back the mmio result into the
destination register. Doing this on a store results in
register corruption.
Signed-off-by: Scott Wood scottw...@freescale.com
---
arch/powerpc/kvm/powerpc.c |1 -
1 file changed, 1 deletion(-)
diff --git a/arch/powerpc/kvm/powerpc.c
** Untested **.
Emulation of xcr0 writes zero guest_xcr0_loaded variable so that
subsequent VM-entry reloads CPU's xcr0 with guests xcr0 value.
However, this is incorrect because guest_xcr0_loaded variable is
read to decide whether to reload hosts xcr0.
In case the vcpu thread is scheduled
On Thu, Apr 11, 2013 at 07:21:34PM +0800, Yang Zhang wrote:
From: Yang Zhang yang.z.zh...@intel.com
Current interrupt coalescing logci which only used by RTC has conflict
with Posted Interrupt.
This patch introduces a new mechinism to use eoi to track interrupt:
When delivering an
On Mon, Apr 01, 2013 at 05:56:43PM +0800, Xiao Guangrong wrote:
Changelog in v2:
- rename kvm_mmu_invalid_mmio_spte to kvm_mmu_invalid_mmio_sptes
- use kvm-memslots-generation as kvm global generation-number
- fix comment and codestyle
- init kvm generation close to mmio wrap-around
Hi Marcelo,
On 04/16/2013 08:54 AM, Marcelo Tosatti wrote:
On Mon, Apr 01, 2013 at 05:56:43PM +0800, Xiao Guangrong wrote:
Changelog in v2:
- rename kvm_mmu_invalid_mmio_spte to kvm_mmu_invalid_mmio_sptes
- use kvm-memslots-generation as kvm global generation-number
- fix comment and
On Mon, Apr 15, 2013 at 12:52:27PM -0500, Scott Wood wrote:
On 04/15/2013 12:23:28 AM, Paul Mackerras wrote:
On Fri, Apr 12, 2013 at 07:08:47PM -0500, Scott Wood wrote:
Enabling this capability connects the vcpu to the designated
in-kernel
MPIC. Using explicit connections between vcpus and
From: Prasad Joshi prasadjoshi.li...@gmail.com
The SVM test 'cr3 read intercept emulate' when ran on uniprocessor
system does not finish and blocks all the tests scheduled to be ran
afterwords. Add check so that the test is only ran on the SMP VM.
Signed-off-by: Prasad Joshi
On Fri, Apr 12, 2013 at 05:04:27PM +0200, Martin Wawro wrote:
Logging the kvm_stat on the host, we obtained the following output during
Besides the kvm_stat, general performance data from the host is useful
when dealing with high load averages.
Do you have vmstat or sar data for periods of time
On Mon, Apr 15, 2013 at 09:03:36PM +0800, Wenchao Xia wrote:
I'd like to add/export an function which allow userspace program
to take snapshot for a region of memory. Since it is not implemented yet
I will describe it as C APIs, it is quite simple now and if it is worthy
I'll improve the
On 04/15/2013 12:23:28 AM, Paul Mackerras wrote:
On Fri, Apr 12, 2013 at 07:08:47PM -0500, Scott Wood wrote:
Enabling this capability connects the vcpu to the designated
in-kernel
MPIC. Using explicit connections between vcpus and irqchips allows
for flexibility, but the main benefit at
complete_mmio_load writes back the mmio result into the
destination register. Doing this on a store results in
register corruption.
Signed-off-by: Scott Wood scottw...@freescale.com
---
arch/powerpc/kvm/powerpc.c |1 -
1 file changed, 1 deletion(-)
diff --git a/arch/powerpc/kvm/powerpc.c
On Mon, Apr 15, 2013 at 12:52:27PM -0500, Scott Wood wrote:
On 04/15/2013 12:23:28 AM, Paul Mackerras wrote:
On Fri, Apr 12, 2013 at 07:08:47PM -0500, Scott Wood wrote:
Enabling this capability connects the vcpu to the designated
in-kernel
MPIC. Using explicit connections between vcpus and
46 matches
Mail list logo