Hi,
Could someone please post some concret examples on how to use extboot?
I looked around, but saw nothing.
Thanks,
Jun
-
Check out the new SourceForge.net Marketplace.
It's the best place to buy or sell services for
just
Филиалы и oбoсoбленные пoдpазделения
oднoдневный семинаp / 4 апpеля 2008 г. / Мoсква
Пpoгpамма семинаpа:
1. Пpизнаки oбoсoбленнoгo пoдpазделения пo Налoгoвoму кoдексу poссийскoй
Федеpации.
2. Пpoцедуpа pегистpации opганизации в налoгoвыx opганаx пo месту наxoждения
oбoсoбленнoгo
Hello all,
Thanks for your answer Haydn, but I did not understand the issue too.
Victor has explained my problem clearly, is kvm uncapable of running the
bridge at 1GBit if it is not a e1000 network card?
Thanks a lot in advanced,
Miguel
Hello,
I'm not sure if I understand you. Do you
Liu, Eric E wrote:
From d56731ffc6d5742a88a157dfe0e4344d35f7db58 Mon Sep 17 00:00:00 2001
From: Feng(Eric) Liu [EMAIL PROTECTED]
Date: Mon, 31 Mar 2008 10:08:55 -0400
Subject: [PATCH] KVM: Add some trace entries in current code and define
some interfaces for userspace app to contrl and use
On Wed, 2008-04-02 at 18:24 -0700, Christoph Lameter wrote:
Ok lets forget about the single theaded thing to solve the registration
races. As Andrea pointed out this still has ssues with other subscribed
subsystems (and also try_to_unmap). We could do something like what
stop_machine_run
Liu, Eric E wrote:
From 41d65b55580d3f07f9f1c50e89e3d64c5d10fbaf Mon Sep 17 00:00:00 2001
From: Feng (Eric) Liu [EMAIL PROTECTED]
Date: Tue, 1 Apr 2008 07:26:14 -0400
Subject: [PATCH] KVM: Add kvm trace support. when config KVM_TRACE, it
allows userspace app to read the trace of kvm_related
Marcelo Tosatti wrote:
This version fixes the vmdk problems found by the
regression testing.
Dor, regarding the option to disable the IO thread, it
would require duplicating most of the changed code. For now
I believe its better to get the patch into a state
where its considered stable
On Wed, 2008-04-02 at 14:33 -0700, Christoph Lameter wrote:
On Wed, 2 Apr 2008, Andrea Arcangeli wrote:
but anyway it's silly to be hardwired to such an interface that worst
of all requires switch statements instead of proper pointer to
functions and a fixed set of parameters and retval
Andrea Arcangeli wrote:
On Wed, Apr 02, 2008 at 02:16:41PM +0300, Avi Kivity wrote:
Ugh, there's still mark_page_accessed() and SetPageDirty().
btw, like PG_dirty is only set if the spte is writeable,
mark_page_accessed should only run if the accessed bit is set in the
spte. It
Avi Kivity wrote:
There's still something wrong. When I start Windows with these
patches applied, Windows startup consumes ~50 sec of cpu time,
compared to ~12 sec without. Pinning qemu into cpu 0 seems to fix this.
I'll investigate some more.
Changing GUI_REFRESH_INTERVAL to 1000
Jun Koi wrote:
Hi,
Could someone please post some concret examples on how to use extboot?
I looked around, but saw nothing.
Just append boot=on to your -drive parameter.
Regards,
Anthony Liguori
Thanks,
Jun
-
On Wed, 02 Apr 2008 10:22:45 -0500
Anthony Liguori [EMAIL PROTECTED] wrote:
We can then obtain the faulting
virtual address from CR2 in the host and walk the guest's page table to
determine what guest physical address should be mapped at that guest
virtual address (if any at all).
[...]
On Thu, Apr 03, 2008 at 12:40:46PM +0200, Peter Zijlstra wrote:
It seems to me that common code can be shared using functions? No need
FWIW I prefer separate methods.
kvm patch using mmu notifiers shares 99% of the code too between the
two different methods implemented indeed. Code sharing is
Avi Kivity wrote:
Avi Kivity wrote:
There's still something wrong. When I start Windows with these
patches applied, Windows startup consumes ~50 sec of cpu time,
compared to ~12 sec without. Pinning qemu into cpu 0 seems to fix this.
I'll investigate some more.
Changing
On Wed, Apr 02, 2008 at 06:24:15PM -0700, Christoph Lameter wrote:
Ok lets forget about the single theaded thing to solve the registration
races. As Andrea pointed out this still has ssues with other subscribed
subsystems (and also try_to_unmap). We could do something like what
Bugs item #1933508, was opened at 2008-04-03 22:53
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=1933508group_id=180599
Please note that this message will contain a full copy of
Thanks for your answer Haydn, but I did not understand the issue too.
Victor has explained my problem clearly, is kvm uncapable of running
the bridge at 1GBit if it is not a e1000 network card?
Hey Miguel,
what Haydn meant was to force qemu to *emulate* a e1000 NIC instead of
the default
See also
http://www.linux-kvm.com/content/tip-how-setup-windows-guest-paravirtual-network-drivers
On Thu, Apr 3, 2008 at 10:54 AM, Felix Leimbach [EMAIL PROTECTED]
wrote:
Thanks for your answer Haydn, but I did not understand the issue too.
Victor has explained my problem clearly, is kvm
On Thu, 3 Apr 2008, Peter Zijlstra wrote:
It seems to me that common code can be shared using functions? No need
to stuff everything into a single function. We have method vectors all
over the kernel, we could do a_ops as a single callback too, but we
dont.
FWIW I prefer separate methods.
On Thu, 3 Apr 2008, Andrea Arcangeli wrote:
My attempt to fix this once and for all is to walk all vmas of the
mm inside mmu_notifier_register and take all anon_vma locks and
i_mmap_locks in virtual address order in a row. It's ok to take those
inside the mmap_sem. Supposedly if anybody will
From: Sheng Yang [EMAIL PROTECTED]
Separate the reset part and prepare for reset support.
Signed-off-by: Sheng Yang [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/x86/kvm/i8254.c | 30 +++---
arch/x86/kvm/i8254.h |1 +
2 files changed, 20
From: Joerg Roedel [EMAIL PROTECTED]
In the current inject_page_fault path KVM only checks if there is another PF
pending and injects a DF then. But it has to check for a pending DF too to
detect a shutdown condition in the VCPU. If this is not detected the VCPU goes
to a PF - DF - PF loop when
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/x86/kvm/x86.c | 21 ++---
include/asm-x86/kvm_host.h |3 +++
2 files changed, 17 insertions(+), 7 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 1b9e695..03ba402 100644
---
From: Marcelo Tosatti [EMAIL PROTECTED]
Add basic KVM paravirt support. Avoid vm-exits on IO delays.
Signed-off-by: Marcelo Tosatti [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/x86/Kconfig |8 ++
arch/x86/kernel/Makefile |1 +
From: Harvey Harrison [EMAIL PROTECTED]
__FUNCTION__ is gcc-specific, use __func__
Signed-off-by: Harvey Harrison [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/x86/kvm/lapic.c |8
arch/x86/kvm/mmu.c | 35 +--
From: Marcelo Tosatti [EMAIL PROTECTED]
Add basic KVM paravirt support. Avoid vm-exits on IO delays.
Signed-off-by: Marcelo Tosatti [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/x86/kvm/x86.c |1 +
include/asm-x86/kvm_para.h |3 ++-
include/linux/kvm.h
From: Glauber Costa [EMAIL PROTECTED]
it will allow external users to call it. It is mainly
useful for routines that will override its machine_ops
field for its own special purposes, but want to call the
normal shutdown routine after they're done
Signed-off-by: Glauber Costa [EMAIL PROTECTED]
From: Sheng Yang [EMAIL PROTECTED]
The patch moved PIT from userspace to kernel, and increase the timer accuracy
greatly.
Signed-off-by: Sheng Yang [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/x86/kvm/Makefile |3 +-
arch/x86/kvm/i8254.c | 585
From: Marcelo Tosatti [EMAIL PROTECTED]
Hypercall based pte updates are faster than faults, and also allow use
of the lazy MMU mode to batch operations.
Don't report the feature if two dimensional paging is enabled.
[avi:
- guest/host split
- fix 32-bit truncation issues
- adjust to mmu_op]
From: Marcelo Tosatti [EMAIL PROTECTED]
Hypercall based pte updates are faster than faults, and also allow use
of the lazy MMU mode to batch operations.
Don't report the feature if two dimensional paging is enabled.
[avi:
- one mmu_op hypercall instead of one per op
- allow 64-bit gpa on
Useful for debugging.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/x86/kvm/vmx.c |8 ++--
1 files changed, 6 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index fb0389d..0155931 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
include/asm-x86/kvm_host.h | 13 +
include/linux/kvm_host.h | 13 -
2 files changed, 13 insertions(+), 13 deletions(-)
diff --git a/include/asm-x86/kvm_host.h b/include/asm-x86/kvm_host.h
index 52e276c..2773f91 100644
Encapsulate the pte mask'n'shift in a function.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/x86/kvm/mmu.c | 17 -
1 files changed, 12 insertions(+), 5 deletions(-)
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index dd4b95b..6fc3421 100644
---
Long overdue.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/x86/kvm/Kconfig |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/Kconfig b/arch/x86/kvm/Kconfig
index 41962e7..76c70ab 100644
--- a/arch/x86/kvm/Kconfig
+++ b/arch/x86/kvm/Kconfig
@@ -19,7
If we populate a shadow pte due to a fault (and not speculatively due to a
pte write) then we can set the accessed bit on it, as we know it will be
set immediately on the next guest instruction. This saves a read-modify-write
operation.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
From: Izik Eidus [EMAIL PROTECTED]
When mmu_set_spte() checks if a page related to spte should be release as
dirty or clean, it check if the shadow pte was writeble, but in case
rmap_write_protect() is called called it is possible for shadow ptes that were
writeble to become readonly and therefor
From: Glauber Costa [EMAIL PROTECTED]
This patch writes 0 (actually, what really matters is that the
LSB is cleared) to the system time msr before shutting down
the machine for kexec.
Without it, we can have a random memory location being written
when the guest comes back
It overrides the
From: Marcelo Tosatti [EMAIL PROTECTED]
Create large pages mappings if the guest PTE's are marked as such and
the underlying memory is hugetlbfs backed. If the largepage contains
write-protected pages, a large pte is not used.
Gives a consistent 2% improvement for data copies on ram mounted
From: Izik Eidus [EMAIL PROTECTED]
Signed-off-by: Izik Eidus [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/x86/kvm/svm.c |8
arch/x86/kvm/vmx.c | 15 +++
include/asm-x86/kvm_host.h |1 +
3 files changed, 24 insertions(+), 0
From: Izik Eidus [EMAIL PROTECTED]
This emulates the x86 hardware task switch mechanism in software, as it is
unsupported by either vmx or svm. It allows operating systems which use it,
like freedos, to run as kvm guests.
Signed-off-by: Izik Eidus [EMAIL PROTECTED]
Signed-off-by: Avi Kivity
From: Glauber Costa [EMAIL PROTECTED]
This patch a llows machine_crash_shutdown to
be replaced, just like any of the other functions
in machine_ops
Signed-off-by: Glauber Costa [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/x86/kernel/crash.c |3 ++-
Names like 'set_cr3()' look dangerously close to affecting the host.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/x86/kvm/vmx.c | 14 ++--
arch/x86/kvm/x86.c | 46 ++--
include/asm-x86/kvm_host.h | 12 +-
3
From: Christian Borntraeger [EMAIL PROTECTED]
include/linux/kvm.h defines struct kvm_dirty_log to
[...]
union {
void __user *dirty_bitmap; /* one bit per page */
__u64 padding;
};
__user requires compiler.h to compile. Currently, this works
From: Marcelo Tosatti [EMAIL PROTECTED]
Mark zapped root pagetables as invalid and ignore such pages during lookup.
This is a problem with the cr3-target feature, where a zapped root table fools
the faulting code into creating a read-only mapping. The result is a lockup
if the instruction can't
From: Amit Shah [EMAIL PROTECTED]
Signed-off-by: Amit Shah [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/x86/kvm/x86.c |2 ++
include/asm-x86/kvm_host.h |1 +
2 files changed, 3 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/x86.c
These thirty-five patches comprise the second batch of the updates I have
queued for 2.6.26. Please review.
arch/x86/Kconfig |8 +
arch/x86/kernel/Makefile |1 +
arch/x86/kernel/crash.c |3 +-
arch/x86/kernel/kvm.c | 247
From: Harvey Harrison [EMAIL PROTECTED]
Nesting __emulate_2op_nobyte inside__emulate_2op produces many shadowed
variable warnings on the internal variable _tmp used by both macros.
Change the outer macro to use __tmp.
Avoids a sparse warning like the following at every call site of
From: Xiantao Zhang [EMAIL PROTECTED]
Since the size of kvm_regs is too big to allocate from kernel stack on ia64,
use kzalloc to allocate it.
Signed-off-by: Xiantao Zhang [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
virt/kvm/kvm_main.c | 33
The x86 desc_struct unification allows us to remove segment_descriptor.h.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/x86/kvm/segment_descriptor.h | 29 -
arch/x86/kvm/vmx.c|3 +--
arch/x86/kvm/x86.c| 15 +++
The desc_struct changes left an unnecessary #ifdef; remove it.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/x86/kvm/svm.c |4
1 files changed, 0 insertions(+), 4 deletions(-)
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index b2c667f..51741f9 100644
---
From: Alexander Graf [EMAIL PROTECTED]
Darwin relies on this and ceases to work without.
Signed-off-by: Alexander Graf [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/x86/kvm/x86.c |8 +++-
1 files changed, 7 insertions(+), 1 deletions(-)
diff --git
From: Harvey Harrison [EMAIL PROTECTED]
Fixes sparse warning as well.
arch/x86/kvm/svm.c:69:15: warning: symbol 'iopm_base' was not declared. Should
it be static?
Signed-off-by: Harvey Harrison [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/x86/kvm/svm.c |2 +-
1
From: Harvey Harrison [EMAIL PROTECTED]
In two case statements, use the ever popular 'i' instead of index:
arch/x86/kvm/x86.c:1063:7: warning: symbol 'index' shadows an earlier one
arch/x86/kvm/x86.c:1000:9: originally declared here
arch/x86/kvm/x86.c:1079:7: warning: symbol 'index' shadows an
From: Marcelo Tosatti [EMAIL PROTECTED]
Batch pte updates and tlb flushes in lazy MMU mode.
[avi:
- adjust to mmu_op
- helper for getting para_state without debug warnings]
Signed-off-by: Marcelo Tosatti [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
arch/x86/kernel/kvm.c
kvm_arch_load_regs() might load APIC base and APIC TPR from the
uninitialized userspace APIC emulation.
This happened when running X11 on SMP guest in my case, disabling the
APIC for vcpu3:
vcpu not ready for apic_round_robin
vcpu not ready for apic_round_robin
vcpu not ready for
The vmport code is very broken for SMP guests. It uses a global CPUState
that's initialized multiple times? At any rate, since it needs to know CPU
registers for the current CPU in a PIO handler, it needs to use cpu_single_env.
This patch makes vmmouse when using -smp 1
Signed-off-by: Anthony
Hi,
I've been trying to use kvm (+ PXE + root-over-NFS) to remotely boot live
images on client servers started using wakeonlan.
However, I'm still trying to find out how to attach a kvm guest directly to
a 'real' harddisk device file.
Is this possible on the current implementation?
Thanks in
kvm -drive file=/dev/sdX
Where sdX is some drive you want to hook up to the virtual machine.
Be very careful, you can really mess things up if you use the wrong device.
--Brian Jackson
On Thursday 03 April 2008 8:50:49 pm Andrés Moré wrote:
Hi,
I've been trying to use kvm (+ PXE +
58 matches
Mail list logo