If we stgi() too soon, nmis can reach the processor even though interrupts
are disabled, catching it in a half-switched state. Delay the stgi() until
we're done switching.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/svm.c |8
1 files changed, 4 insertions(+), 4
Hi,
We are interested in an IA64 port of KVM, either experimenting with
someone else's or writing our own. I've tried getting in contact with Yu
Fenghua of Intel but it seems that we will be unable to get hold of
their source code until it is in the main tree.
Is such a merge likely in the near
Acked-by: Carsten Otte [EMAIL PROTECTED]
Zhang, Xiantao wrote:
From fc56bda0f599ccd00d992bf196654101e82d1413 Mon Sep 17 00:00:00 2001
From: Zhang Xiantao [EMAIL PROTECTED]
Date: Wed, 7 Nov 2007 11:39:23 +0800
Subject: [PATCH] move some header files form kvm_main.c to x86.c, since
the
related
Hi Avi
Seems my mailer has something wrong, and it always reference an
old version. This should be a correct one. Sorry for inconvenience!
Xiantao
From 959bc19b0e2ca7edcb3389aabdecf99ba9f1794e Mon Sep 17 00:00:00 2001
From: Zhang Xiantao [EMAIL PROTECTED]
Date: Thu, 8 Nov 2007 13:19:06
AP processor needs to reset to the SIPI vector, not normal INIT.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/svm.c |6 ++
1 files changed, 6 insertions(+), 0 deletions(-)
diff --git a/drivers/kvm/svm.c b/drivers/kvm/svm.c
index 729f1cd..3910358 100644
---
Zhang, Xiantao wrote:
This series of patches are intended to further split x86 specific code
from kvm_main.c, and make kvm_main.c arch-independent.
For easy review, I splitted them into small patches. With these patches,
we almost finish the first stage work for code split.
These patches
'push imm8' found itself in the wrong switch somehow, so it is never executed.
This fixes Windows 2003 installation.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/x86_emulate.c | 22 +++---
1 files changed, 11 insertions(+), 11 deletions(-)
diff --git
Hi,
Some remarks:
- rename the option to -pcidevice.
- Remove the directory passthrough and put the file directly in hw/.
Rename the file to something more explicit such as pci_passthrough*
- Suppress the files passthrough.h and neo_pci_tree.h
- pt_init should be called only if there are
Acked-by: Carsten Otte [EMAIL PROTECTED]
Zhang, Xiantao wrote:
From 7473192cc0c529b8ce35c13d0e83a9b663072831 Mon Sep 17 00:00:00 2001
From: Zhang Xiantao [EMAIL PROTECTED]
Date: Wed, 7 Nov 2007 11:41:50 +0800
Subject: [PATCH] mov kvm_x86_ops to x86.c for next step's work
Signed-off-by: Zhang
2007/11/8, Avi Kivity [EMAIL PROTECTED]:
Lynn Kerby wrote:
[snip]
I'd assumed (there's *that* word) that core developer types were
using KVM on all kinds of hardware and that basics like this would
have been shaken out.
Well, it is a reasonable assumption, but the sad fact is, we do
Carlo Marcelo Arenas Belon wrote:
This patch partially reverts 9105435f46ca4e110237eae57272e4f5deaf8dd6 so that
kvm_msr_list, kvm_get_msrs and kvm_set_msrs are again public and visible in
userspace for x86 as they are used by qemu-kvm
Applied, thanks.
--
error compiling committee.c: too
Hi Avi
Please drop it, and use this one, due to version issue.
thanks
Xiantao
From 959bc19b0e2ca7edcb3389aabdecf99ba9f1794e Mon Sep 17 00:00:00 2001
From: Zhang Xiantao [EMAIL PROTECTED]
Date: Thu, 8 Nov 2007 13:19:06 +0800
Subject: [PATCH] Combine kvm_init and kvm_init_x86 into one function,
Avi Kivity a écrit :
Aurelien Jarno wrote:
Well the IDE code hasn't changed a lot recently, so I checked the CVS
history and easily (first test) found the commit that causes the problem:
Last AIO patch, by Vladimir N. Oleynik.
Emulate the 'invd' instruction (opcode 0f 08).
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/x86_emulate.c |4 +++-
1 files changed, 3 insertions(+), 1 deletions(-)
diff --git a/drivers/kvm/x86_emulate.c b/drivers/kvm/x86_emulate.c
index da0cdd5..33b1814 100644
---
I intend to submit the following patchset shortly for mainline. All fixes are
for fairly serious issues, including host crashes. Several will go into
-stable as well.
Please review.
drivers/kvm/svm.c | 18 ++
drivers/kvm/x86_emulate.c | 26
Trying to run the latest OLPC XO guest image with kvm-intel on 2.6.22
x86_64 (Ubuntu Gutsy) on a T7200 there are critical problems which don't
occur if kvm-intel is not loaded/used.
The same issue affects kvm-48, kvm-50 and kvm-51.
I don't see these problems with Gutsy or Windows guests. The
TJ wrote:
Trying to run the latest OLPC XO guest image with kvm-intel on 2.6.22
x86_64 (Ubuntu Gutsy) on a T7200 there are critical problems which don't
occur if kvm-intel is not loaded/used.
The same issue affects kvm-48, kvm-50 and kvm-51.
I don't see these problems with Gutsy or Windows
Gildas wrote:
2007/11/8, Avi Kivity [EMAIL PROTECTED]:
Lynn Kerby wrote:
[snip]
I'd assumed (there's *that* word) that core developer types were
using KVM on all kinds of hardware and that basics like this would
have been shaken out.
Well, it is a reasonable assumption, but the sad
Rebased to latest commits.
Thanks
Xiantao
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Zhang, Xiantao
Sent: 2007年11月8日 21:00
To: [EMAIL PROTECTED]
Cc: kvm-devel@lists.sourceforge.net; Hollis Blanchard; Avi Kivity
Subject: Re: [kvm-devel] [PATCH]0/5
Anthony Liguori wrote:
Avi Kivity wrote:
Anthony Liguori wrote:
This is a PCI device that implements a transport for virtio. It
allows virtio
devices to be used by QEMU based VMMs like KVM or Xen.
Didn't see support for dma.
Not sure what you're expecting there. Using
Anthony Liguori wrote:
Avi Kivity wrote:
Anthony Liguori wrote:
+case VIRTIO_PCI_QUEUE_NOTIFY:
+if (val VIRTIO_PCI_QUEUE_MAX)
+virtio_ring_kick(vdev, vdev-vq[val]);
+break;
I see you're not using hypercalls for this, presumably for compatibility
with
Zhang, Xiantao wrote:
+void kvm_arch_vcpu_free(struct kvm_vcpu *vcpu);
+void kvm_arch_vcpu_decache(struct kvm_vcpu *vcpu);
+void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu);
+void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu);
+struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm, unsigned
Avi Kivity wrote:
Anthony Liguori wrote:
This is a PCI device that implements a transport for virtio. It allows
virtio
devices to be used by QEMU based VMMs like KVM or Xen.
Didn't see support for dma.
Not sure what you're expecting there. Using dma_ops in virtio_ring?
Acked-by: Carsten Otte [EMAIL PROTECTED]
Zhang, Xiantao wrote:
From 2d6ee07b96f1a91cef9327f241077af3698ed4dc Mon Sep 17 00:00:00 2001
From: Zhang Xiantao [EMAIL PROTECTED]
Date: Thu, 8 Nov 2007 13:37:38 +0800
Subject: [PATCH] Make kvm_init as arch-indepenent, through defining a
void
pointer
Avi Kivity wrote:
Anthony Liguori wrote:
+case VIRTIO_PCI_QUEUE_NOTIFY:
+if (val VIRTIO_PCI_QUEUE_MAX)
+virtio_ring_kick(vdev, vdev-vq[val]);
+break;
I see you're not using hypercalls for this, presumably for compatibility
with -no-kvm.
More than just
On Thursday 08 November 2007, Anthony Liguori wrote:
+/* A PCI device has it's own struct device and so does a virtio device so
+ * we create a place for the virtio devices to show up in sysfs. I think it
+ * would make more sense for virtio to not insist on having it's own device.
*/
On Thu, 2007-11-08 at 18:21 +0800, Zhang, Xiantao wrote:
Caleb Moore wrote:
Is such a merge likely in the near future or should we proceed in
creating our own port?
Hi, Caleb
We have completed kvm IA64 port until the end of Aug, and showed a
demo in kvm forum of Aug. Then, we
Carsten Otte wrote:
Zhang, Xiantao wrote:
+void kvm_arch_vcpu_free(struct kvm_vcpu *vcpu);
+void kvm_arch_vcpu_decache(struct kvm_vcpu *vcpu);
+void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu);
+void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu);
+struct kvm_vcpu
Anthony Liguori wrote:
+case VIRTIO_PCI_QUEUE_NOTIFY:
+if (val VIRTIO_PCI_QUEUE_MAX)
+virtio_ring_kick(vdev, vdev-vq[val]);
+break;
I see you're not using hypercalls for this, presumably for
compatibility
with -no-kvm.
More than just that. By stick to
Anthony Liguori wrote:
Avi Kivity wrote:
If a pci device is capable of dma (or issuing interrupts), it will be
useless with pv pci.
Hrm, I think we may be talking about different things. Are you
thinking that the driver I posted allows you to do PCI pass-through
over virtio? That's not
Carsten Otte wrote:
+bad_page = alloc_page(GFP_KERNEL | __GFP_ZERO);
+
+if (bad_page == NULL) {
+r = -ENOMEM;
+goto out;
+}
I don't think we need bad_page on s390, maybe I missed something. It's
only useful for mmu code as far as I can tell.
Anthony Liguori wrote:
Avi Kivity wrote:
Anthony Liguori wrote:
Avi Kivity wrote:
Anthony Liguori wrote:
+case VIRTIO_PCI_QUEUE_NOTIFY:
+if (val VIRTIO_PCI_QUEUE_MAX)
+virtio_ring_kick(vdev, vdev-vq[val]);
+break;
I
Avi Kivity wrote:
If a pci device is capable of dma (or issuing interrupts), it will be
useless with pv pci.
Hrm, I think we may be talking about different things. Are you thinking
that the driver I posted allows you to do PCI pass-through over virtio?
That's not what it is.
The driver I
Avi Kivity wrote:
There's no reason that the PIO operations couldn't be handled in the
kernel. You'll already need some level of cooperation in userspace
unless you plan on implementing the PCI bus in kernel space too.
It's easy enough in the pci_map function in QEMU to just notify the
This would be my bad. Things kept changing and I didn't put these back
into libkvm.h.
On Thu, 2007-11-08 at 00:34 -0600, Carlo Marcelo Arenas Belon wrote:
This patch partially reverts 9105435f46ca4e110237eae57272e4f5deaf8dd6 so that
kvm_msr_list, kvm_get_msrs and kvm_set_msrs are again public
Your mailer, which I'm guessing is Microsoft Outlook, is wrapping lines
and so this patch does not apply.
You might try using git-send-email or equivalent to avoid this issue.
--
Hollis Blanchard
IBM Linux Technology Center
On Thu, 2007-11-08 at 16:17 +0800, Zhang, Xiantao wrote:
Hi Avi
On Thursday 08 November 2007, Anthony Liguori wrote:
+/* A PCI device has it's own struct device and so does a virtio device so
+ * we create a place for the virtio devices to show up in sysfs. I think it
+ * would make more sense for virtio to not insist on having it's own device.
*/
On Thu, 2007-11-08 at 07:54 +0200, Avi Kivity wrote:
Carlo Marcelo Arenas Belon wrote:
On Tue, Nov 06, 2007 at 10:48:52AM -0600, Jerone Young wrote:
Move msrs functions to libkvm-x86.c
This patch moves functions:
kvm_msr_list
move kvm_get_msrs
move kvm_set_msrs
I have been testing KVM for eventual use in a production server
environment and am running into some trouble when I attempt to rsync my
data from the current production system to the test system.
Specifically, whenever I hit a large file, the guest freezes and I get
the following in the host's
Anthony Liguori wrote:
Avi Kivity wrote:
Anthony Liguori wrote:
This is a PCI device that implements a transport for virtio. It allows
virtio
devices to be used by QEMU based VMMs like KVM or Xen.
Didn't see support for dma.
Not sure what you're
Clive Stewell wrote:
I have been testing KVM for eventual use in a production server
environment and am running into some trouble when I attempt to rsync my
data from the current production system to the test system.
Specifically, whenever I hit a large file, the guest freezes and I get
Anthony Liguori wrote:
This still needs quite a lot of work but I wanted to post it for reference.
Regards,
Anthony Liguori
diff --git a/qemu/Makefile.target b/qemu/Makefile.target
...
Why change Rusty's codding standard? It will be harder to track changes.
+typedef struct VRingDesc
Hi folks,
Here's a new spin of the clocksource implementation.
In this new version:
* followed avi's suggestion of:
- letting the cpu itself register its memory area.
- using a gfn instead of a phys addr as a parameter, to be sure we can
cover the whole memory area
- write guest time
drivers/kvm/kvm_main.c: In function `kvm_flush_remote_tlbs':
drivers/kvm/kvm_main.c:220: error: implicit declaration of function
`smp_call_function_mask'
make[2]: *** [drivers/kvm/kvm_main.o] Error 1
make[1]: *** [drivers/kvm] Error 2
http://sr71.net/~dave/linux/config-kvm-up
Looks like that
Akio Takebe wrote:
Hi, Alex and Xiantao
Perhaps more people would be able to help restructure the tree to
support more architectures if a snapshot of the kvm/ia64 code was
made available. We might want to think about a kvm-ia64-devel
mailing list too (such as ppc has already). Thanks,
Dor Laor wrote:
Anthony Liguori wrote:
This still needs quite a lot of work but I wanted to post it for
reference.
Regards,
Anthony Liguori
diff --git a/qemu/Makefile.target b/qemu/Makefile.target
...
Why change Rusty's codding standard? It will be harder to track changes.
Because
# HG changeset patch
# User Jerone Young [EMAIL PROTECTED]
# Date 1194560092 21600
# Node ID 10991ad11487e51d327430a1a61e0d63021caf7b
# Parent 026c26ab068482aaf17deaf8cd73c1ff1db3806b
[v2] Fix declerations that should be in kvm-common.h not in kvm-x86.h
The last version of this patch was based
This is the host part of kvm clocksource implementation. As it does
not include clockevents, it is a fairly simple implementation. We
only have to register a per-vcpu area, and start writting to it periodically.
Signed-off-by: Glauber de Oliveira Costa [EMAIL PROTECTED]
---
This patch introduces the include files for kvm clock.
They'll be needed for both guest and host part.
Signed-off-by: Glauber de Oliveira Costa [EMAIL PROTECTED]
---
include/asm-x86/kvm_para.h | 25 +
include/linux/kvm.h|1 +
include/linux/kvm_para.h |
On Thu, 2007-11-08 at 14:49 +0100, Carsten Otte wrote:
Zhang, Xiantao wrote:
+void kvm_arch_vcpu_free(struct kvm_vcpu *vcpu);
+void kvm_arch_vcpu_decache(struct kvm_vcpu *vcpu);
+void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu);
+void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu);
Le jeudi 08 novembre 2007 à 11:55 -0800, Dave Hansen a écrit :
drivers/kvm/kvm_main.c: In function `kvm_flush_remote_tlbs':
drivers/kvm/kvm_main.c:220: error: implicit declaration of function
`smp_call_function_mask'
make[2]: *** [drivers/kvm/kvm_main.o] Error 1
make[1]: *** [drivers/kvm]
# HG changeset patch
# User Jerone Young [EMAIL PROTECTED]
# Date 1194551969 21600
# Node ID c08b2667a95ecd85effb1d5f5d84e235f9e8d6cc
# Parent d6fa0d16fa60ee5083877fec698b69cea840d0b0
Fix building of kvmctl
This patch creates the make rule needed to for the linker
to link libkvm archive and
Avi Kivity wrote:
Anthony Liguori wrote:
+case VIRTIO_PCI_QUEUE_NOTIFY:
+if (val VIRTIO_PCI_QUEUE_MAX)
+virtio_ring_kick(vdev, vdev-vq[val]);
+break;
I see you're not using hypercalls for this, presumably for
compatibility
with -no-kvm.
More than just
On Thu, 2007-11-08 at 15:21 +0800, Zhang, Xiantao wrote:
@@ -890,7 +890,7 @@ static int kvm_vm_ioctl_create_vcpu(struct kvm
*kvm,
int n)
if (!valid_vcpu(n))
return -EINVAL;
- vcpu = kvm_x86_ops-vcpu_create(kvm, n);
+ vcpu = kvm_arch_vcpu_create(kvm,
This is the guest part of kvm clock implementation
It does not do tsc-only timing, as tsc can have deltas
between cpus, and it did not seem worthy to me to keep
adjusting them.
We do use it, however, for fine-grained adjustment.
Other than that, time comes from the host.
Signed-off-by: Glauber
Hi everybody,
I'm trying to clone the repository:
git-clone http://www.kernel.org/pub/scm/linux/kernel/git/avi/kvm.git kvm
Fail on this:
error: Couldn't get
http://www.kernel.org/pub/scm/linux/kernel/git/avi/kvm.git/refs/heads/kvm-updates
for heads/kvm-updates
The requested URL returned
Anthony Liguori wrote:
This is a PCI device that implements a transport for virtio. It allows virtio
devices to be used by QEMU based VMMs like KVM or Xen.
While it's a little premature, we can start thinking of irq path
improvements.
The current patch acks a private isr and
Hi, Alex and Xiantao
Perhaps more people would be able to help restructure the tree to
support more architectures if a snapshot of the kvm/ia64 code was made
available. We might want to think about a kvm-ia64-devel mailing list
too (such as ppc has already). Thanks,
I also think so. :)
Anthony Liguori wrote:
Avi Kivity wrote:
There's no reason that the PIO operations couldn't be handled in the
kernel. You'll already need some level of cooperation in userspace
unless you plan on implementing the PCI bus in kernel space too.
It's easy enough in the pci_map function in
On Thu, 2007-11-08 at 09:00 -0700, Alex Williamson wrote:
Hi Xiantao,
Perhaps more people would be able to help restructure the tree to
support more architectures if a snapshot of the kvm/ia64 code was made
available. We might want to think about a kvm-ia64-devel mailing list
too (such
Chen Xi wrote:
Hi everybody,
I'm trying to clone the repository:
git-clone http://www.kernel.org/pub/scm/linux/kernel/git/avi/kvm.git kvm
You should clone with the git URL.
Regards,
Anthony Liguori
Fail on this:
error: Couldn't get
Dor Laor wrote:
Anthony Liguori wrote:
This is a PCI device that implements a transport for virtio. It
allows virtio
devices to be used by QEMU based VMMs like KVM or Xen.
While it's a little premature, we can start thinking of irq path
improvements.
The current patch acks a
I tried. It seems that git can not pass through http proxy.
Any other hints?
Thanks.
On Thu, 8 Nov 2007, Anthony Liguori wrote:
Chen Xi wrote:
Hi everybody,
I'm trying to clone the repository:
git-clone http://www.kernel.org/pub/scm/linux/kernel/git/avi/kvm.git kvm
You
On Fri, 2007-11-09 at 09:29 +0800, Zhang, Xiantao wrote:
H, Alex/Akio
Thanks for your suggestions. It is a surely good idea to create a
IA64 mailing list to talk about the IA64-KVM. But now we have to rebase
them to latest commits before sending out, since the kvm source layout
changed
hi,
I tried. It seems that git can not pass through http proxy.
Any other hints?
Did you use export http_proxy= ?
Best Regards,
Akio Takebe
-
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log
Yes. It gives this error:
git clone git://git.kernel.org/pub/scm/linux/kernel/git/avi/kvm.git
Initialized empty Git repository in /home/xichen/ex/kvm/.git/
fatal: exec failed
fetch-pack from
'git://git.kernel.org/pub/scm/linux/kernel/git/avi/kvm.git' failed.
On Fri, 9 Nov 2007, Akio Takebe
Add wbinvd VM Exit support to prepare for pass-through
device cache emulation and also enhance real time
responsibility.
Signed-off-by: Yaozu (Eddie) Dong [EMAIL PROTECTED]
diff --git a/drivers/kvm/vmx.c b/drivers/kvm/vmx.c
index 6fc981d..6d80a41 100644
--- a/drivers/kvm/vmx.c
I agree.
My branch of the Gelato Federation (http://www.gelato.unsw.edu.au/)
wants to invest time and effort into IA64 KVM which could mean helping
with a merge, streamlining code, benchmarking, bug hunting or
something else along those lines. We've already got an open source
Itanium
Bugs item #1828760, was opened at 2007-11-09 12:53
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=1828760group_id=180599
Please note that this message will contain a full copy of
Here is the package deal we're running for this week
Board Certified Medical Doctors in the United States
788,976 in total * 17,413 emails
Featuring coverage for more than 30 specialties like Internal Medicine, Family
Practice, Opthalmology, Anesthesiologists, Cardiologists and more
Can
Hollis Blanchard wrote:
- kvm_x86_ops-vcpu_free(vcpu);
+ kvm_arch_vcpu_free(vcpu);
return r;
}
Have a look at the patch I posted on Wednesday: [PATCH 2 of 2] RFC:
Create kvm_arch_vcpu_create(). kvm_arch_vcpu_create() will actually
encompass more logic from
71 matches
Mail list logo