>Li, Xin B wrote:
>> I've just got x86_64 Linux 2.6.20.3 SMP guest boots on KVM
>with 2 vCPUs
>> (I'm using a x86_64 RHEL5 image but the RHEL5 kernel can't boot.),
>>
>
>I found that an issue with x86-64 is that the mmu picks up an nx shadow
>page for a non-nx guest pte. This is unrelated to
>> 2: APIC timer
>> a: V09 uses hrtimer for LAPIC timer, apic->timer.last_update is
>> updated every time when __apic_timer_fn is invoked at time of the
APIC
>> timer fired. This impose an accumulated difference since the fire
time
>> is already some ns later after expected time.
>>
Il Wed, Jun 13, 2007 at 11:59:25AM +0300, Avi Kivity ha scritto:
> Luca Tettamanti wrote:
> >Il Mon, Jun 11, 2007 at 10:44:45AM +0300, Avi Kivity ha scritto:
> >
> >>Luca wrote:
> >>
> I've managed to reproduce this on kvm-21 (it takes many boots for this
> to happen, but it does ev
On Wed, 2007-06-13 at 11:52 -0700, David Brown wrote:
> > Hi David,
> > I am not an expert here, but I don't believe it would work without
> > changes to KVM. My understanding is that you use an IOMMU in this
> > fashion if you want to direct-map a device into a guest for devices that
> > do not
> Hi David,
> I am not an expert here, but I don't believe it would work without
> changes to KVM. My understanding is that you use an IOMMU in this
> fashion if you want to direct-map a device into a guest for devices that
> do not have a local IOMMU-like functionality built in already. For
>
On Wed, 2007-06-13 at 10:27 -0700, David Brown wrote:
> I was wondering if anyone has done any sort of virtualization testing
> with kvm using IOMMU to improve performance of I/O and what sort of
> results they've had... I currently don't have a box with IOMMU (at
> least I don't think so, since it
I was wondering if anyone has done any sort of virtualization testing
with kvm using IOMMU to improve performance of I/O and what sort of
results they've had... I currently don't have a box with IOMMU (at
least I don't think so, since its an i386 box) but will be getting
some amd64 boxes which, hop
> That patch is hopelessly broken; try this instead (revert the old one
> first).
Yeah that works fine now, thanks.
- David Brown
-
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of D
Li, Xin B wrote:
> I've just got x86_64 Linux 2.6.20.3 SMP guest boots on KVM with 2 vCPUs
> (I'm using a x86_64 RHEL5 image but the RHEL5 kernel can't boot.),
>
I found that an issue with x86-64 is that the mmu picks up an nx shadow
page for a non-nx guest pte. This is unrelated to smp, but
Dimitry Golubovsky wrote:
> Avi,
>
> On 6/13/07, Avi Kivity <[EMAIL PROTECTED]> wrote:
>
>> > So, expecting that eventually it will be, it seems to be worth
>> > pursuing running kvm at users privileges at the moment memory is being
>> > consumed. Such memory limit control will be easier to impleme
Avi,
On 6/13/07, Avi Kivity <[EMAIL PROTECTED]> wrote:
> > So, expecting that eventually it will be, it seems to be worth
> > pursuing running kvm at users privileges at the moment memory is being
> > consumed. Such memory limit control will be easier to implement in
> > this case rather than if
Dimitry Golubovsky wrote:
> Avi,
>
> On 6/13/07, Avi Kivity <[EMAIL PROTECTED]> wrote:
>
>> > BTW if qemu_system_x86-64 runs at user privileges, can the memory
>> > consumed be subject to whatever per-user limits that may be set
>> > systemwide?
>> >
>>
>> That's the intent, but currently this isn'
Avi,
On 6/13/07, Avi Kivity <[EMAIL PROTECTED]> wrote:
> > BTW if qemu_system_x86-64 runs at user privileges, can the memory
> > consumed be subject to whatever per-user limits that may be set
> > systemwide?
> >
>
> That's the intent, but currently this isn't implemented.
So, expecting that eve
Dimitry Golubovsky wrote:
> Anthony,
>
> On 6/13/07, Anthony Liguori <[EMAIL PROTECTED]> wrote:
>
>> One thing to consider is that if a userspace process can create KVM
>> guests, they are capable of pinning large quantities of physical
>> memory. This could be used as a DoS attack so consider VM
Dimitry Golubovsky wrote:
>
> BTW if qemu_system_x86-64 runs at user privileges, can the memory
> consumed be subject to whatever per-user limits that may be set
> systemwide?
>
That's the intent, but currently this isn't implemented.
--
error compiling committee.c: too many arguments to functio
Anthony,
On 6/13/07, Anthony Liguori <[EMAIL PROTECTED]> wrote:
> One thing to consider is that if a userspace process can create KVM
> guests, they are capable of pinning large quantities of physical
> memory. This could be used as a DoS attack so consider VM creation a
> privileged operation.
Anthony Liguori wrote:
> Avi Kivity wrote:
>> Dimitry Golubovsky wrote:
>>
>>> Am I missing anything else root privileges might be needed for?
>>
>> I think you got it covered.
>>
>
> One thing to consider is that if a userspace process can create KVM
> guests, they are capable of pinnin
Avi Kivity wrote:
> Dimitry Golubovsky wrote:
>
>> Am I missing anything else root privileges might be needed for?
>>
>
> I think you got it covered.
>
One thing to consider is that if a userspace process can create KVM
guests, they are capable of pinning large quantities of physical
On Wed, 2007-06-13 at 20:53 +0800, Li, Xin B wrote:
> Yeah, quick and dirty way, I will polish later maybe using completion.
>
Cool. I am thinking that we should return -EINTR on signal_pending here
as well.
Keep up the good work.
-Greg
-
>Hi Xin,
> Nice work! I am bummed that you are getting to do all the fun
>parts :)
>
>I have one comment:
>
>+ while (1) {
>+ if (vcpu->init_sipi_sipi_state ==
>+ KVM_VCPU_INIT_SIPI_SIPI_STATE_NORM)
>+ break;
>+ yield();
>+
Alan Pope wrote:
> Hi,
>
> I have a Toshiba Portege M400 laptop with a core2duo T7200 CPU. It kernel
> panics when I insert the kvm-intel module:-
>
[...]
> It was suggested that maybe my BIOS was not configuring vmx correctly. Are
> there further BIOS tests I can perform?
>
>
I suggest
>> Zhao, Yunfeng wrote:
>> > Hi,
>> > We ran a testing against latest KVM to know its quality status.
>> > In the testing we tried to boot guests, test basic devices of
guest,
>and
>> > install guests.
>> >
>>
>> Thanks for doing this -- it is enormously useful.
>>
>> > Basic devices, Keybord,disk,
On Wed, 2007-06-13 at 17:17 +0800, Li, Xin B wrote:
> I've just got x86_64 Linux 2.6.20.3 SMP guest boots on KVM with 2 vCPUs
> (I'm using a x86_64 RHEL5 image but the RHEL5 kernel can't boot.),
> /proc/cpuinfo and /proc/interrupts show the 2 CPU are working, but it's
> still _not_ stable and I saw
On Wed, 2007-06-13 at 11:48 +0300, Avi Kivity wrote:
> Zhao, Yunfeng wrote:
> > Hi,
> > We ran a testing against latest KVM to know its quality status.
> > In the testing we tried to boot guests, test basic devices of guest, and
> > install guests.
> >
>
> Thanks for doing this -- it is enormou
Dong, Eddie wrote:
>> We found that using an hrtimer enabled host with
>> CONFIG_HZ=1000 improves
>> things. However I don't think that it's as accurate as 7
>> seconds in 20
>> minutes (that's better than 1% accuracy), so probably more work is
>> needed in qemu to correct time drift.
>>
>>
>
> We found that using an hrtimer enabled host with
> CONFIG_HZ=1000 improves
> things. However I don't think that it's as accurate as 7
> seconds in 20
> minutes (that's better than 1% accuracy), so probably more work is
> needed in qemu to correct time drift.
>
Time virtualization for HVM is alw
Hi,
I have a Toshiba Portege M400 laptop with a core2duo T7200 CPU. It kernel
panics when I insert the kvm-intel module:-
This is what I have transcribed from the screen:-
EIP: 0060:[] Not tainted VLI
EFLAGS: 0010002 (2.6.22-6-generic #1)
EIP is at hardware_enable+0x8e/0xb0 [kvm_intel]
eax: c20
Luca Tettamanti wrote:
> Il Mon, Jun 11, 2007 at 10:44:45AM +0300, Avi Kivity ha scritto:
>
>> Luca wrote:
>>
I've managed to reproduce this on kvm-21 (it takes many boots for this
to happen, but it does eventually).
>>> Hum, any clue on the cause?
>>>
>> Fr
Zhao, Yunfeng wrote:
> Hi,
> We ran a testing against latest KVM to know its quality status.
> In the testing we tried to boot guests, test basic devices of guest, and
> install guests.
>
Thanks for doing this -- it is enormously useful.
> Basic devices, Keybord,disk,VGA, and nic works well, b
Hi,
We ran a testing against latest KVM to know its quality status.
In the testing we tried to boot guests, test basic devices of guest, and
install guests.
The commit is: 08908a44630210f97b0276f6e41ff71ec04f1308
A summary for the testing result:
Can boot most IA32/IA32e UP VMX guests, but SMP gue
Dimitry Golubovsky wrote:
> Am I missing anything else root privileges might be needed for?
I think you got it covered.
--
error compiling committee.c: too many arguments to function
-
This SF.net email is sponsored by DB
Mike Day wrote:
> Are all the development TODO's up-to-date?
>
> http://kvm.qumranet.com/kvmwiki/TODO
>
>
Many things are in progress. I updated it to the best of my knowledge.
--
error compiling committee.c: too many arguments to function
-
David Brown wrote:
Yeah the upgrade to sid went okay so there must be something else
wrong with my netboot setup.
Thanks for the patch when will it make it into the default kernel?
Uhm, crap... found some more stuff didn't seem to affect the guest OS
or the host for that matter...
This is fro
Bugs item #1736307, was opened at 2007-06-13 16:04
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1736307&group_id=180599
Please note that this message will contain a full copy
Bugs item #1736305, was opened at 2007-06-13 16:01
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1736305&group_id=180599
Please note that this message will contain a full copy
Bugs item #1736301, was opened at 2007-06-13 15:58
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1736301&group_id=180599
Please note that this message will contain a full copy
Bugs item #1736299, was opened at 2007-06-13 15:56
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1736299&group_id=180599
Please note that this message will contain a full copy
37 matches
Mail list logo