>From 2d6ee07b96f1a91cef9327f241077af3698ed4dc Mon Sep 17 00:00:00 2001
From: Zhang Xiantao <[EMAIL PROTECTED]>
Date: Thu, 8 Nov 2007 13:37:38 +0800
Subject: [PATCH] Make kvm_init as arch-indepenent, through defining a
void
pointer type variable. All archs will register their corresponding arch
fun
>From fc56bda0f599ccd00d992bf196654101e82d1413 Mon Sep 17 00:00:00 2001
From: Zhang Xiantao <[EMAIL PROTECTED]>
Date: Wed, 7 Nov 2007 11:39:23 +0800
Subject: [PATCH] move some header files form kvm_main.c to x86.c, since
the
related functions have been moved to x86.c
Signed-off-by: Zhang Xiantao <[
Alexey Eremenko wrote:
> Hi Avi,
>
> Speaking of AMD host - with KVM-51 it doesn't crashes anymore !
>
> But there is still fonts rendering problem with Fedora7/ 32-bit guests.
>
>
Can you update the relevant bug trackers? Please add xpdyinfo output as
well.
--
Do not meddle in the internals
>From cba4340cef2217343c540ca5de9b67cc8826b63f Mon Sep 17 00:00:00 2001
From: Zhang Xiantao <[EMAIL PROTECTED]>
Date: Thu, 8 Nov 2007 13:07:23 +0800
Subject: [PATCH] Using kvm_arch prefix to define functions, and replace
kvm_x86_ops callback.
Signed-off-by: Zhang Xiantao <[EMAIL PROTECTED]>
---
dr
Hi Avi,
This series of patches are intended to further split x86 specific code
from kvm_main.c, and make kvm_main.c arch-independent.
For easy review, I splitted them into small patches. With these patches,
we almost finish the first stage work for code split.
[1/5] Remove unused header files i
>From 959bc19b0e2ca7edcb3389aabdecf99ba9f1794e Mon Sep 17 00:00:00 2001
From: Zhang Xiantao <[EMAIL PROTECTED]>
Date: Thu, 8 Nov 2007 13:19:06 +0800
Subject: [PATCH] Combine kvm_init and kvm_init_x86 into one function,
and
meanwhile remove module_init module_exit function, since they will be
called
>From 7473192cc0c529b8ce35c13d0e83a9b663072831 Mon Sep 17 00:00:00 2001
From: Zhang Xiantao <[EMAIL PROTECTED]>
Date: Wed, 7 Nov 2007 11:41:50 +0800
Subject: [PATCH] mov kvm_x86_ops to x86.c for next step's work
Signed-off-by: Zhang Xiantao <[EMAIL PROTECTED]>
---
drivers/kvm/kvm_main.c |1 -
Hi Avi,
Speaking of AMD host - with KVM-51 it doesn't crashes anymore !
But there is still fonts rendering problem with Fedora7/ 32-bit guests.
--
-Alexey Eremenko "Technologov"
-
This SF.net email is sponsored by: Splunk
Anthony Liguori wrote:
> This patch moves virtio under the virtualization menu and changes virtio
> devices to not claim to only be for lguest.
>
Perhaps the virt menu needs to be split into a host-side support menu
and guest-side support menu.
--
Do not meddle in the internals of kernels, fo
Amit Shah wrote:
>>> Introduce kvm_get_vm_fd to get the VM FD
>>>
>> What, so you can issue ioctls like there's no tomorrow? Add function
>> wrappers for your ioctls instead.
>>
>
> Hmm. this might not be needed now since the kvm_context moved to a .h file.
> It
> was a static in a .
Aurelien Jarno wrote:
> Well the IDE code hasn't changed a lot recently, so I checked the CVS
> history and easily (first test) found the commit that causes the problem:
>
> Last AIO patch, by Vladimir N. Oleynik.
>
> http://cvs.savannah.nongnu.org/viewvc/qemu/hw/ide.c?root=qemu&r1=1.64&r2=1.65
>
>
On Thursday 08 November 2007 11:56:24 Avi Kivity wrote:
> Amit Shah wrote:
> > With the declaration in libkvm.h this time:
> > >From 8313b87bcab415746e6eed86ac3f5b6c562b9764 Mon Sep 17 00:00:00 2001
> >
> > From: Amit Shah <[EMAIL PROTECTED]>
> > Date: Thu, 8 Nov 2007 00:13:07 +0530
> > Subject: [P
This patch partially reverts 9105435f46ca4e110237eae57272e4f5deaf8dd6 so that
kvm_msr_list, kvm_get_msrs and kvm_set_msrs are again public and visible in
userspace for x86 as they are used by qemu-kvm
Signed-off-by: Carlo Marcelo Arenas Belon <[EMAIL PROTECTED]>
---
libkvm/kvm-x86.h |4
Amit Shah wrote:
> This patch introduces support for device passthrough
> from the host to a paravirtualized guest.
>
> A new command-line option, -passthrough is added.
> For example, to invoke it for an Ethernet device sitting at
> PCI bus:dev.fn 04:08.0 with host IRQ 18, use this:
>
> -passthrou
Amit Shah wrote:
> With the declaration in libkvm.h this time:
>
> >From 8313b87bcab415746e6eed86ac3f5b6c562b9764 Mon Sep 17 00:00:00 2001
> From: Amit Shah <[EMAIL PROTECTED]>
> Date: Thu, 8 Nov 2007 00:13:07 +0530
> Subject: [PATCH] Add accessor for kvm->vm_fd
>
> Introduce kvm_get_vm_fd to get t
Anthony Liguori wrote:
> +case VIRTIO_PCI_QUEUE_NOTIFY:
> + if (val < VIRTIO_PCI_QUEUE_MAX)
> + virtio_ring_kick(vdev, &vdev->vq[val]);
> + break;
>
I see you're not using hypercalls for this, presumably for compatibility
with -no-kvm. Well I think I have a solution: advert
On Thursday 08 November 2007 01:31:32 Hollis Blanchard wrote:
> I'm sorry these comments aren't substantive, but please watch your
> whitespace...
Hi Hollis,
Thanks for going through this. We know about these issues; the userspace is
kind of messy since it's collected from various sources and we
Anthony Liguori wrote:
> This is a PCI device that implements a transport for virtio. It allows virtio
> devices to be used by QEMU based VMMs like KVM or Xen.
>
>
Didn't see support for dma. I think that with Amit's pvdma patches you
can support dma-capable devices as well without too much fu
Lynn Kerby wrote:
> On Nov 7, 2007, at 3:06 AM, Avi Kivity wrote:
>
>
>> Lynn Kerby wrote:
>>
>>> Hi KVM developers (and lurkers like myself).
>>>
>>> Apologies in advance as this is probably not the right forum for
>>> this question.
>>>
>>>
>> It is certainly the right forum.
>>
Carlo Marcelo Arenas Belon wrote:
> On Tue, Nov 06, 2007 at 10:48:52AM -0600, Jerone Young wrote:
>
>> Move msrs functions to libkvm-x86.c
>>
>> This patch moves functions:
>> kvm_msr_list
>> move kvm_get_msrs
>> move kvm_set_msrs
>>
>
> the problem is that with this the defi
On Tue, Nov 06, 2007 at 10:48:52AM -0600, Jerone Young wrote:
> Move msrs functions to libkvm-x86.c
>
> This patch moves functions:
> kvm_msr_list
> move kvm_get_msrs
> move kvm_set_msrs
the problem is that with this the definitions were moved as well from libkvm.h
to kvm-x86.h
Haydn Solomon wrote:
> First , thank you for new release of kvm. I have a few problems to
> report with kvm-51.
>
> 1. When running an exisiting winxp ACPI multiprocessor HAL with -smp
> 2, sometimes it will hang on boot.
This isn't new. It isn't reported because few people run smp Windows,
as pr
This still needs quite a lot of work but I wanted to post it for reference.
Regards,
Anthony Liguori
diff --git a/qemu/Makefile.target b/qemu/Makefile.target
index 65f449e..3032337 100644
--- a/qemu/Makefile.target
+++ b/qemu/Makefile.target
@@ -448,6 +448,8 @@ VL_OBJS += rtl8139.o
# PCI Hyperc
This patch moves virtio under the virtualization menu and changes virtio
devices to not claim to only be for lguest.
Signed-off-by: Anthony Liguori <[EMAIL PROTECTED]>
diff --git a/drivers/Kconfig b/drivers/Kconfig
index f4076d9..d945ffc 100644
--- a/drivers/Kconfig
+++ b/drivers/Kconfig
@@ -93,6
This patch series implements a PCI driver for virtio. This allows virtio
devices (like block and network) to be used in QEMU/KVM. I'll post a very
early KVM userspace backend in kvm-devel for those that are interested.
This series depends on the two virtio fixes I've posted and Rusty's config_op
This is a PCI device that implements a transport for virtio. It allows virtio
devices to be used by QEMU based VMMs like KVM or Xen.
Signed-off-by: Anthony Liguori <[EMAIL PROTECTED]>
diff --git a/drivers/virtio/Kconfig b/drivers/virtio/Kconfig
index 9e33fc4..c81e0f3 100644
--- a/drivers/virtio/
This is needed for the virtio PCI device to be compiled as a module.
Signed-off-by: Anthony Liguori <[EMAIL PROTECTED]>
diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c
index 0e1bf05..3f28b47 100644
--- a/drivers/virtio/virtio_ring.c
+++ b/drivers/virtio/virtio_ring.c
@@ -
On Nov 7, 2007, at 3:06 AM, Avi Kivity wrote:
> Lynn Kerby wrote:
>> Hi KVM developers (and lurkers like myself).
>>
>> Apologies in advance as this is probably not the right forum for
>> this question.
>>
>
> It is certainly the right forum.
Good to know. There doesn't seem to be a lot of "
I'm sorry these comments aren't substantive, but please watch your
whitespace...
On Wed, 2007-11-07 at 21:45 +0200, Amit Shah wrote:
> diff --git a/qemu/Makefile b/qemu/Makefile
> index 053c88c..3e599f3 100644
> --- a/qemu/Makefile
> +++ b/qemu/Makefile
> @@ -37,7 +37,7 @@ qemu-img$(EXESUF): qemu-
On Nov 7, 2007 2:48 PM, Amit Shah <[EMAIL PROTECTED]> wrote:
> On Thursday 08 November 2007 01:05:32 Haydn Solomon wrote:
> > First , thank you for new release of kvm. I have a few problems to
> > report with kvm-51.
> >
> > 1. When running an exisiting winxp ACPI multiprocessor HAL with -smp 2,
>
On Thursday 08 November 2007 01:05:32 Haydn Solomon wrote:
> First , thank you for new release of kvm. I have a few problems to
> report with kvm-51.
>
> 1. When running an exisiting winxp ACPI multiprocessor HAL with -smp 2,
> sometimes it will hang on boot.
You mean the guest hangs, right? What'
This patch introduces support for device passthrough
from the host to a paravirtualized guest.
A new command-line option, -passthrough is added.
For example, to invoke it for an Ethernet device sitting at
PCI bus:dev.fn 04:08.0 with host IRQ 18, use this:
-passthrough Ethernet/04:08.0-18
The hos
This kernel module injects IRQs specified on the command line
via the passthrough parameter
This doesn't handle shared interrupts.
These patches don't yet work with the in-kernel apic, so you have
to use -no-kvm-irqchip.
These will soon be overridden by a new mechanism that utilises
the in-kerne
First , thank you for new release of kvm. I have a few problems to
report with kvm-51.
1. When running an exisiting winxp ACPI multiprocessor HAL with -smp 2,
sometimes it will hang on boot.
2. This may not be a major problem but cpu usage is a litte higher when
idle on release 51 than 50. It
With the declaration in libkvm.h this time:
>From 8313b87bcab415746e6eed86ac3f5b6c562b9764 Mon Sep 17 00:00:00 2001
From: Amit Shah <[EMAIL PROTECTED]>
Date: Thu, 8 Nov 2007 00:13:07 +0530
Subject: [PATCH] Add accessor for kvm->vm_fd
Introduce kvm_get_vm_fd to get the VM FD
Signed-off-by: Amit S
>From de1adac9a0f63bcac932ba76c8ca4a473e12af10 Mon Sep 17 00:00:00 2001
From: Amit Shah <[EMAIL PROTECTED]>
Date: Thu, 8 Nov 2007 00:13:07 +0530
Subject: [PATCH] Add accessor for kvm->vm_fd
Introduce kvm_get_vm_fd to get the VM FD
Signed-off-by: Amit Shah <[EMAIL PROTECTED]>
---
libkvm/libkvm.c
If you're having trouble on AMD systems, please try this out.
Changes from kvm-50:
- fix some x86 emulator one-byte insns (fixes W2K3 installer again)
- fix host hangs with NMI watchdog on AMD
- fix guest SMP on AMD
- fix dirty page tracking when clearing a guest page (Dor Laor)
- more portability
Carsten Otte wrote:
> Christian Borntraeger wrote:
>>> It is not yet updated to latest virtio & latest kvm.
>>> This version uses a pci device for virtio. Since I'm think Rusty's
>>> config space does not matches
>>> pci config space I might consider changing it. (Preferably not, maybe
>>> I'll s
Avi Kivity wrote:
> Cam Macdonell wrote:
>> Dor Laor wrote:
>>
>>> Cam Macdonell wrote:
>>>
Hi,
I'm running an AMD
vendor_id : AuthenticAMD
cpu family : 15
model : 75
model name : AMD Athlon(tm) 64 X2 Dual Core Processor 4600
Fix win2k install] Add delay between dma issue & result.
Using synchonous io leads the guest to unexplored places:
If it issues a dma command, it goes to qemu and executed
synchrnously and return with irq for data ready.
This is not real world scenario and happens when not usin
We make the dma_mapping_ops structure to point to our structure
so that every DMA access goes through us. (This is the reason this
only works for 64-bit guest. 32-bit guest doesn't yet have a dma_ops
struct.)
We make a hypercall for every device that does a DMA operation
to find out if it is a pas
We have some structures defined which are going to be
used by userspace for ioctls.
Signed-off-by: Amit Shah <[EMAIL PROTECTED]>
---
include/linux/kvm_para.h |3 +--
1 files changed, 1 insertions(+), 2 deletions(-)
diff --git a/include/linux/kvm_para.h b/include/linux/kvm_para.h
index e4db25
This patchset is work in progress and is sent out for comments.
Guests within KVM can have paravirtualized DMA access. I've tested
the e1000 driver, and that works fine. A few problems/conditions to
get things to work:
- The pv driver should only be used as a module. If built into the
kernel,
A guest can call dma_ops->is_pv_device() to find out
if a device is a passthrough'ed device (device passed
on to a guest by the host). If this is true, a hypercall
will be made to translate DMA mapping operations.
This function can be done away with and just a
kvm_is_pv_device() call can be added,
This is to be enabled on a guest. Currently, only
'module' works; compiling it in freezes at HD bringup
Signed-off-by: Amit Shah <[EMAIL PROTECTED]>
---
drivers/kvm/Kconfig |8
1 files changed, 8 insertions(+), 0 deletions(-)
diff --git a/drivers/kvm/Kconfig b/drivers/kvm/Kconfig
in
Glauber de Oliveira Costa wrote:
>>> void kvm_inject_pending_timer_irqs(struct kvm_vcpu *vcpu)
>>> {
>>> + vcpu->time_needs_update = 1;
>>>
>>>
>> Why here and not in __vcpu_run()? It isn't timer irq related.
>>
> Because my plan was exactly, updating it at each timer interrupt.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Avi Kivity escreveu:
> Glauber de Oliveira Costa wrote:
>> This is the host part of kvm clocksource implementation. As it does
>> not include clockevents, it is a fairly simple implementation. We
>> only have to register a per-vcpu area, and start writ
Jerone Young wrote:
> # HG changeset patch
> # User Jerone Young <[EMAIL PROTECTED]>
> # Date 1194367649 21600
> # Node ID cb186258bc6ecf05ded03d81a3d2ee820e58f605
> # Parent 7ea01f673a05fe66cb0d9c514b5a43ddcd72c07f
> Move kvm_create_memory_alias & kvm_destroy_memory_alias to libkvm-x86.c
>
> Sign
Introduce three hypercalls and one ioctl for enabling guest
DMA mappings.
An ioctl comes from userspace (qemu) to notify of a physical
device being assigned to a guest. Guests make a hypercall (once
per device) to find out if the device is a passthrough device
and if any DMA translations are neces
Of all the DMA calls, only dma_alloc_coherent might not actually
call dma_ops->alloc_coherent. We make sure that gets called
if the device that's being worked on is a PV device
Signed-off-by: Amit Shah <[EMAIL PROTECTED]>
---
arch/x86/kernel/pci-dma_64.c | 13 +
1 files changed, 13
Add Makefile rule for compiling the new file
that we create
Signed-off-by: Amit Shah <[EMAIL PROTECTED]>
---
drivers/kvm/Makefile |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/drivers/kvm/Makefile b/drivers/kvm/Makefile
index cf18ad4..f492e3e 100644
--- a/drivers/kvm/M
Check for CONFIG_VIRTUALIZATION instead of CONFIG_KVM,
since the PV drivers won't depend on CONFIG_KVM and we
still want to be selectable
Signed-off-by: Amit Shah <[EMAIL PROTECTED]>
---
drivers/Makefile |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/drivers/Makefile b/
Jerone Young wrote:
> Here is the 4th revision of the refactoring of libkvm. This revision
> changes since the 3rd revision:
> - removes libkvm-x86.h
> - keeps functions kvm_create_default_phys_mem & kvm_create_phys_mem
> in place
> - added kvm_arch_create_default_phys_mem
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Akio Takebe escreveu:
> Hi, Glauber
>
> This is interesting facility. :-)
>
>> +#define KVM_HCALL_REGISTER_CLOCK1
>> +
>> +union kvm_hv_clock {
>> +struct {
>> +u64 tsc_mult;
>> +u64 now_ns;
>> +/* That's t
Hi,
>> Why does kvm_hv_clock need page_align?
>Each vcpu will register a page on its own. In the guest side, it will be
>an array of pages. So, we make it page sized.
>
>> And also the kvm_hv_clock is alloced with kvm_vcpu,
>There's no requirements on the host part at all. So it doesn't really
>m
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Jeremy Fitzhardinge escreveu:
> Avi Kivity wrote:
>> Glauber de Oliveira Costa wrote:
>>
+union kvm_hv_clock {
+ struct {
+ u64 tsc_mult;
+ u64 now_ns;
+ /* That's the wall clo
Zhao, Yunfeng wrote:
> Retested it.
> It has been fixed.
>
>
Thanks. I'll try to knock a few more off the list.
--
error compiling committee.c: too many arguments to function
-
This SF.net email is sponsored by: Splun
Retested it.
It has been fixed.
Thanks
Yunfeng
>-Original Message-
>From: Avi Kivity [mailto:[EMAIL PROTECTED]
>Sent: 2007年11月7日 16:33
>To: Zhao, Yunfeng
>Cc: kvm-devel
>Subject: Re: [kvm-devel] KVM Test result, kernel 35e0154.. , userspace
>b0e5e88..
>
>Zhao, Yunfeng wrote:
>> Hi, all
>
Lynn Kerby wrote:
Hi KVM developers (and lurkers like myself).
Apologies in advance as this is probably not the right forum for this
question.
It is certainly the right forum.
I've had no success getting an SMP virtual machine running on my AMD
Athlon64 X2 server. The base system is U
Christian Borntraeger wrote:
>
> Am Dienstag, 6. November 2007 schrieb Dor Laor:
> > The is my latest (old) branch:
> >
> > -Kernel repo: git://kvm.qumranet.com/home/dor/src/virtio/kvm
> > -Userspace repo:
> git://kvm.qumranet.com/home/dor/src/virtio/kvm-userspace
> > Use virt-final branch.
>
> Ye
Christian Borntraeger wrote:
>> It is not yet updated to latest virtio & latest kvm.
>> This version uses a pci device for virtio. Since I'm think Rusty's
>> config space does not matches
>> pci config space I might consider changing it. (Preferably not, maybe
>> I'll start using it until we'll h
Am Dienstag, 6. November 2007 schrieb Dor Laor:
> The is my latest (old) branch:
>
> -Kernel repo: git://kvm.qumranet.com/home/dor/src/virtio/kvm
> -Userspace repo: git://kvm.qumranet.com/home/dor/src/virtio/kvm-userspace
> Use virt-final branch.
Yes I had a look at these. This code is virtio dra
Zhao, Yunfeng wrote:
> Hi, all
> This is today's KVM test result against kvm.git
> 35e0154eeb0ace014ecf4cc2bdb93a42ee762aca and kvm-userspace.git
> b0e5e88d4d25e63ae33396fa990f2ca2b539e5a6
> One issue has been fixed, 10 issues still open.
>
>
> 2. windows xp with acpi hal fails to reboot
> "-no-kvm
Hi, Glauber
This is interesting facility. :-)
>+#define KVM_HCALL_REGISTER_CLOCK 1
>+
>+union kvm_hv_clock {
>+ struct {
>+ u64 tsc_mult;
>+ u64 now_ns;
>+ /* That's the wall clock, not the water closet */
>+ u64 wc_sec;
>+
64 matches
Mail list logo