Liu, Eric E wrote:
Hollis Blanchard wrote:
On Wednesday 16 April 2008 01:45:34 Liu, Eric E wrote:
[...]
Actually... we could have kvmtrace itself insert the metadata, so
there would be no chance of it being overwritten in the kernel
buffers. The header could be written in tip_open_output(),
Avi Kivity wrote:
Actually kvm is affected by pae: it enables nx support. Please try
(separately)
1. Boot with 'noexec=off' on the host kernel command line
2.6.24.4-64.fc8PAE noexec=off:
Using normal F8 modules
qemu-kvm dies in the same way
2. Loading the kernel modules that come
Ian Kirk wrote:
Avi Kivity wrote:
I do this regularly, basically you need to install kernel-devel and
that's it.
Yes, that is very easy isn't it. Oops to my stupidity. I've got it built
and will give it a go tomorrow and report back on each test case.
Please don't flame on
各位老总:您们好!
诚祝:您们在2008年里;有鼠不尽的快乐!鼠不尽的收获!鼠不尽的钞票!
鼠不尽的幸福!鼠不尽的美满生活!愿:您们阖家欢乐!幸福安康!
我是(深圳市珊湖岛进出口有限公司)的负责人;可以提供:出口报关单,
核销单等等一系列手续;代理:出口报关,商检,境内外运输..等等;还可
Avi Kivity wrote:
Yes, that is very easy isn't it. Oops to my stupidity. I've got it built
and will give it a go tomorrow and report back on each test case.
Please don't flame on kvm-devel, even if the flames are self-directed.
Er, OK...
各位老总:您们好!
诚祝:您们在2008年里;有鼠不尽的快乐!鼠不尽的收获!鼠不尽的钞票!
鼠不尽的幸福!鼠不尽的美满生活!愿:您们阖家欢乐!幸福安康!
我是(深圳市珊湖岛进出口有限公司)的负责人;可以提供:出口报关单,
核销单等等一系列手续;代理:出口报关,商检,境内外运输..等等;还可
From 73c33765f3d879001818cd0719038c78a0c65561 Mon Sep 17 00:00:00 2001
From: Sheng Yang [EMAIL PROTECTED]
Date: Fri, 18 Apr 2008 17:15:39 +0800
Subject: [PATCH] kvm: qemu: Enable EPT support for real mode
This patch build a identity page table on the last page of VGA bios, and use
it as the
From 9e723871299268e844c9e72f3903ba5f4eb71751 Mon Sep 17 00:00:00 2001
From: Sheng Yang [EMAIL PROTECTED]
Date: Fri, 18 Apr 2008 17:02:59 +0800
Subject: [PATCH 1/5] KVM: VMX: EPT Feature Detection
Signed-off-by: Sheng Yang [EMAIL PROTECTED]
---
arch/x86/kvm/vmx.c | 63
Hi
This patchset enabled EPT on KVM.
The most obvious improvement is the separate construction of EPT table has
been discarded completely. Now EPT reused ordinary MMU for building the EPT
table. The code size is greatly reduced and this also solved the display
problem. But I think it also
From cb851671421832d37c7d90976b603b59a5c75c79 Mon Sep 17 00:00:00 2001
From: Sheng Yang [EMAIL PROTECTED]
Date: Fri, 18 Apr 2008 17:05:06 +0800
Subject: [PATCH 3/5] KVM: MMU: Add EPT support
Enable kvm_set_spte() to generate EPT entries.
Signed-off-by: Sheng Yang [EMAIL PROTECTED]
---
From a5ee291f056256f8a892393410bc5923ff575a3b Mon Sep 17 00:00:00 2001
From: Sheng Yang [EMAIL PROTECTED]
Date: Fri, 18 Apr 2008 17:03:53 +0800
Subject: [PATCH 2/5] KVM: MMU: Move some defination for building common
entries
Move some defination to mmu.h in order to building common table entries.
From 5d4a79e5edfc09b54bd83a3a289cbb82058e3daa Mon Sep 17 00:00:00 2001
From: Sheng Yang [EMAIL PROTECTED]
Date: Fri, 18 Apr 2008 17:05:20 +0800
Subject: [PATCH 4/5] KVM: Export necessary function for EPT
The function gfn_to_gva is necessary for handling EPT violation.
Signed-off-by: Sheng Yang
From 43eb727046349aac3df52317dbbfd3b4b33c084d Mon Sep 17 00:00:00 2001
From: Sheng Yang [EMAIL PROTECTED]
Date: Fri, 18 Apr 2008 17:07:31 +0800
Subject: [PATCH 5/5] KVM: VMX: Enable EPT feature for KVM
Signed-off-by: Sheng Yang [EMAIL PROTECTED]
---
arch/x86/kvm/mmu.c | 11 ++-
On Fri, Apr 18, 2008 at 2:39 PM, Amit Shah [EMAIL PROTECTED] wrote:
* On Monday 14 Apr 2008 06:01:07 Samuel Masham wrote:
Please keep the userspace support alive.
I am particularly interested in using the pci-passthough to qemu
running non x86 system emulation
(at the moment
Приглашатся!
Руководители и сотрудники служб безопасности, юрисконсульты,
руководители предприятий, финансовые и коммерческие директора
принять участие в мероприятии:
...Э к о н о м и ч е с к а я
безопасность предприятия...
12 - 16 мая
On Thu, Apr 17, 2008 at 2:58 PM, H. Peter Anvin [EMAIL PROTECTED] wrote:
Nguyen Anh Quynh wrote:
This patch replaces the current assembly code of Extboot option rom
with new C code. Patch is against kvm-66.
This version returns an error code in case int 13 handler cannot
handle a
On Thu, Apr 17, 2008 at 3:00 PM, H. Peter Anvin [EMAIL PROTECTED] wrote:
+ .globl linux_boot
+linux_boot:
+ cli
+ cld
+ mov $0x9000, %ax
+ mov %ax, %ds
+ mov %ax, %es
+ mov %ax, %fs
+ mov %ax, %gs
+ mov %ax, %ss
+
On Thu, Apr 17, 2008 at 4:36 PM, Carlo Marcelo Arenas Belon
[EMAIL PROTECTED] wrote:
On Thu, Apr 17, 2008 at 10:30:27AM +0900, Nguyen Anh Quynh wrote:
+++ b/extboot/farvar.h
@@ -0,0 +1,113 @@
+// Code to access multiple segments within gcc.
+//
+// Copyright (C) 2008 Kevin O'Connor
On Tue, 15 Apr 2008 16:06:43 +0300
Avi Kivity [EMAIL PROTECTED] wrote:
...
handle_vmentry_failure: invalid guest state
handle_vmentry_failure: start emulation
handle_vmentry_failure: emulation failed
What instruction failed, exactly?
I added the code do dump the instruction and
Ian Kirk wrote:
I can't compile them against 2.6.24.4-64.fc8PAE as the module magic name
mismatches, and I don't know how to change kernel-devel to know it's PAE.
You just need to install kernel-PAE-devel package, and then build against that.
Chris Lalancette
Nguyen Anh Quynh wrote:
Actually, this code is left from the original code of Anthony, and it
seems he took it from qemu 0.8 version.
Anthony, may you explain why you want to hijact the linux boot process
here? If I understand correctly, we can just let the original int19
execute, and if
Daniel P. Berrange wrote:
Those cases aren't always discoverable. Linux-aio just falls back to
using synchronous IO. It's pretty terrible. We need a new AIO
interface for Linux (and yes, we're working on this). Once we have
something better, we'll change that to be the default and
Nguyen Anh Quynh wrote:
Actually, this code is left from the original code of Anthony, and it
seems he took it from qemu 0.8 version.
Anthony, may you explain why you want to hijact the linux boot process
here? If I understand correctly, we can just let the original int19
execute, and if
On Fri, 18 Apr 2008 14:18:16 +0200
Guillaume Thouvenin [EMAIL PROTECTED] wrote:
I added the code do dump the instruction and it seems that it's the
emulation of 0xe6 (== out imm8, al) that failed. I made modifications
to emulate it (see below) and now I have another problem in kvm
userspace
Nguyen Anh Quynh wrote:
On Thu, Apr 17, 2008 at 3:00 PM, H. Peter Anvin [EMAIL PROTECTED] wrote:
+ .globl linux_boot
+linux_boot:
+ cli
+ cld
+ mov $0x9000, %ax
+ mov %ax, %ds
+ mov %ax, %es
+ mov %ax, %fs
+ mov %ax, %gs
+ mov
H. Peter Anvin wrote:
Nguyen Anh Quynh wrote:
Actually, this code is left from the original code of Anthony, and it
seems he took it from qemu 0.8 version.
Anthony, may you explain why you want to hijact the linux boot process
here? If I understand correctly, we can just let the original
Guillaume Thouvenin wrote:
On Tue, 15 Apr 2008 16:06:43 +0300
Avi Kivity [EMAIL PROTECTED] wrote:
...
handle_vmentry_failure: invalid guest state
handle_vmentry_failure: start emulation
handle_vmentry_failure: emulation failed
What instruction failed, exactly?
I
Yang, Sheng wrote:
@@ -1048,17 +1071,18 @@ static void mmu_set_spte(struct kvm_vcpu *vcpu, u64
*shadow_pte,
* whether the guest actually used the pte (in order to detect
* demand paging).
*/
- spte = PT_PRESENT_MASK | PT_DIRTY_MASK;
+ spte =
On 4/18/08, Anthony Liguori [EMAIL PROTECTED] wrote:
Nguyen Anh Quynh wrote:
On Thu, Apr 17, 2008 at 3:00 PM, H. Peter Anvin [EMAIL PROTECTED] wrote:
+ .globl linux_boot
+linux_boot:
+ cli
+ cld
+ mov $0x9000, %ax
+ mov %ax, %ds
Anthony Liguori wrote:
The thinking is to eliminate the need to hijack the boot sector when
using the -kernel option. However, the linux boot stuff in extboot has
been broken since hpa rewrote the boot code. It can be removed for now
and I'll eventually revisit it.
It probably makes
On Fri, 18 Apr 2008 08:23:07 -0500
Anthony Liguori [EMAIL PROTECTED] wrote:
This doesn't seem right. You should have been able to break out of the
emulator long before encountering an out instruction. The next
instruction you encounter should be a mov instruction. Are you sure
you're
Jeremy Fitzhardinge wrote:
Gerd Hoffmann wrote:
Wall clock is off a few hours though. Oops.
I think the way wall clock and system clock work together in xen (Jeremy
correct me if I'm wrong) is that the wall clock specifies the point in
time where the system clock started going. As kvm
Anthony Liguori wrote:
Nguyen Anh Quynh wrote:
The thinking is to eliminate the need to hijack the boot sector when
using
the -kernel option.
I see, but does that offer any advantage over the current approach?
You no longer have to specify a -hda option when using -kernel.
On 4/18/08, Anthony Liguori [EMAIL PROTECTED] wrote:
Nguyen Anh Quynh wrote:
The thinking is to eliminate the need to hijack the boot sector when
using
the -kernel option.
I see, but does that offer any advantage over the current approach?
You no longer have to
On Thu, Apr 17, 2008 at 02:26:52PM -0500, Anthony Liguori wrote:
This patch introduces a Linux-aio backend that is disabled by default. To
use this backend effectively, the user should disable caching and select
it with the appropriate -aio option. For instance:
qemu-system-x86_64 -drive
On Friday 18 April 2008 21:30:14 Anthony Liguori wrote:
Yang, Sheng wrote:
@@ -1048,17 +1071,18 @@ static void mmu_set_spte(struct kvm_vcpu *vcpu,
u64 *shadow_pte,
* whether the guest actually used the pte (in order to detect
* demand paging).
*/
- spte =
Marcelo Tosatti wrote:
On Thu, Apr 17, 2008 at 02:26:52PM -0500, Anthony Liguori wrote:
This patch introduces a Linux-aio backend that is disabled by default. To
use this backend effectively, the user should disable caching and select
it with the appropriate -aio option. For instance:
Nguyen Anh Quynh wrote:
You no longer have to specify a -hda option when using -kernel.
Without -hda, how can we load disk image? Or you mean you only want to
test the kernel?
Right. You may be booting from NFS, iSCSI, or something like that.
Regards,
Anthony Liguori
Thanks,
Jamie Lokier wrote:
I've basically got a choice of making libvirt always ad '-aio linux'
or never add it at all. My inclination is to the latter since it is
compatible with existing QEMU which has no -aio option. Presumably
'-aio linux' is intended to provide some performance benefit so it'd
Guillaume Thouvenin wrote:
On Fri, 18 Apr 2008 08:23:07 -0500
Anthony Liguori [EMAIL PROTECTED] wrote:
This doesn't seem right. You should have been able to break out of the
emulator long before encountering an out instruction. The next
instruction you encounter should be a mov
[EMAIL PROTECTED] wrote:
From: Ben-Ami Yassour [EMAIL PROTECTED]
Signed-off-by: Ben-Ami Yassour [EMAIL PROTECTED]
Signed-off-by: Muli Ben-Yehuda [EMAIL PROTECTED]
---
arch/x86/kvm/mmu.c | 59 +--
arch/x86/kvm/paging_tmpl.h | 19
Yang, Sheng wrote:
On Friday 18 April 2008 21:30:14 Anthony Liguori wrote:
Yang, Sheng wrote:
@@ -1048,17 +1071,18 @@ static void mmu_set_spte(struct kvm_vcpu *vcpu,
u64 *shadow_pte,
* whether the guest actually used the pte (in order to detect
* demand paging).
*/
[EMAIL PROTECTED] wrote:
From: Ben-Ami Yassour [EMAIL PROTECTED]
Signed-off-by: Ben-Ami Yassour [EMAIL PROTECTED]
Signed-off-by: Muli Ben-Yehuda [EMAIL PROTECTED]
---
libkvm/libkvm.c | 24
qemu/hw/pci-passthrough.c | 89
Signed-off-by: Hollis Blanchard [EMAIL PROTECTED]
diff --git a/qemu/qemu-kvm-powerpc.c b/qemu/qemu-kvm-powerpc.c
--- a/qemu/qemu-kvm-powerpc.c
+++ b/qemu/qemu-kvm-powerpc.c
@@ -72,7 +72,6 @@
for (i = 0;i 32; i++){
regs.gpr[i] = env-gpr[i];
-regs.fpr[i] = env-fpr[i];
[EMAIL PROTECTED] wrote:
This patch for PCI passthrough devices enables a guest to access a device's
memory mapped I/O regions directly, without requiring the host to trap and
emulate every MMIO access.
Updated from last version: we create a memory slot for each MMIO region of the
guest's
Joerg Roedel wrote:
This patch series implements optimizations to the CR8 intercept handling in
SVM. With these patches applied CR8 reads are not intercepted anymore. The
writes to CR8 are only intercepted if the TPR masks interrupts. This
significantly reduces the number of total CR8
Joerg Roedel wrote:
There is not selective cr0 intercept bug. The code in the comment sets the
CR0.PG bit. But KVM sets the CR4.PG bit for SVM always to implement the paged
real mode. So the 'mov %eax,%cr0' instruction does not change the CR0.PG bit.
Selective CR0 intercepts only occur when a
Alex Davis wrote:
Host software:
Linux 2.6.24.4
KVM 65 (I am using the kernel modules from this release).
X11 7.2 from Xorg
SDL 1.2.13
GCC 4.1.1
Glibc 2.4
Host hardware:
Asus P5B Deluxe (P965 chipset based) motherboard
4 GB RAM
Intel E6700 CPU
Guest software:
Slackware 12.0
Anthony Liguori wrote:
I'm of the view that '-aio auto' would be a really good option - and
when it's proven itself, it should be the default. It could work on
all QEMU hosts: it would pick synchronous IO when there is nothing else.
Right now, not specifying the -aio option is equivalent to
Ryan Harper wrote:
From: Ryan Harper [EMAIL PROTECTED]
Rather than faking up some geometry, allow the backend to push the disk
geometry via virtio pci config option. Keep the old geo code around for
compatibility.
Applied, thanks.
struct virtio_blk_config
{
uint64_t
Glauber de Oliveira Costa wrote:
Hi,
I've got some qemu crashes while trying to passthrough an ide device
to a kvm guest. After some investigation, it turned out that
register_ioport_{read/write} will abort on errors instead of returning
a meaningful error.
However, even if we do return
Anthony Liguori wrote:
Right now, not specifying the -aio option is equivalent to your proposed
-aio auto.
I guess I should include an info aio to let the user know what type of
aio they are using. We can add selection criteria later but
semantically, not specifying an explicit -aio
On Fri, Apr 18, 2008 at 10:18:33AM -0500, Anthony Liguori wrote:
Sleeping in the context of vcpu's is extremely bad (eg virtio-block
blocks in write() throttling which kills performance). It should wait
on IO completions instead (qemu-kvm.c creates a pthread waitqueue to
resolve that issue).
Hi Uri,
The method you propose in fact doesn't work (tested with KVM 65) at
least for a Windows XP as guest.
After performing steps from 1 to 7 with no errors:
- In step 8, the VM in question is already loaded and its user
interface is showed in the X windows (as mentioned a Windows
Hi Marcelo,
http://www.mail-archive.com/kvm-devel@lists.sourceforge.net/msg14732.html
I tried it this evening with kvm 66 - which should include your patch,
right?
No its not included. The issue is being worked on.
my bad, sorry.
Now I know I really have that patch: qemu-kvm hangs
Hi Gerd,
On Fri, Apr 18, 2008 at 11:27:58PM +0200, Gerd von Egidy wrote:
Hi Marcelo,
http://www.mail-archive.com/kvm-devel@lists.sourceforge.net/msg14732.html
I tried it this evening with kvm 66 - which should include your patch,
right?
No its not included. The issue is
Gerd Hoffmann wrote:
I'm looking at the guest side of the issue right now, trying to identify
common code, and while doing so noticed that xen does the
version-check-loop in both get_time_values_from_xen(void) and
xen_clocksource_read(void), and I can't see any obvious reason for that.
The
Use the asynchronous version of block IO functions, otherwise guests can block
for long periods of time waiting for the operations to complete.
--
-
This SF.net email is sponsored by the 2008 JavaOne(SM) Conference
Don't
So drivers can do whatever necessary on reset.
Signed-off-by: Marcelo Tosatti [EMAIL PROTECTED]
Index: kvm-userspace.aio/qemu/hw/virtio.c
===
--- kvm-userspace.aio.orig/qemu/hw/virtio.c
+++ kvm-userspace.aio/qemu/hw/virtio.c
@@
virtio-blk should not use synchronous requests, as that can blocks vcpus
outside of guest mode for large periods of time for no reason.
The generic block layer could complete AIO's before re-entering guest mode,
so that cached reads and writes can be reported ASAP, a job for the block layer.
I am trying to add a trace marker and the data is coming out all 0's. e.g.,
0 (+ 0) PTE_WRITE vcpu = 0x0001 pid = 0x240d [ gpa =
0x gpte = 0x ]
Patch is attached. I know the data is non-zero as I added an if check before
calling the trace to
--- On Fri, 4/18/08, Avi Kivity [EMAIL PROTECTED] wrote:
From: Avi Kivity [EMAIL PROTECTED]
Subject: Re: [kvm-devel] Second KVM process hangs eating 80-100% CPU on host
during startup
To: Alex Davis [EMAIL PROTECTED]
Cc: kvm-devel@lists.sourceforge.net
Date: Friday, April 18, 2008, 12:12
Hi Marcelo,
Use the asynchronous version of block IO functions, otherwise guests can
block for long periods of time waiting for the operations to complete.
just tried these patches. Results are similar to the last ones: the guest
comes up fine but after running 2 or 3 minutes of bonnie++ the
David S. Ahern wrote:
I am trying to add a trace marker and the data is coming out all 0's.
e.g.,
0 (+ 0) PTE_WRITE vcpu = 0x0001 pid = 0x240d [
gpa = 0x gpte = 0x ]
Patch is attached. I know the data is non-zero as I added an if
inline.
Liu, Eric E wrote:
David S. Ahern wrote:
I am trying to add a trace marker and the data is coming out all 0's.
e.g.,
0 (+ 0) PTE_WRITE vcpu = 0x0001 pid = 0x240d [
gpa = 0x gpte = 0x ]
Patch is attached. I know the data is
David S. Ahern wrote:
inline.
Liu, Eric E wrote:
David S. Ahern wrote:
I am trying to add a trace marker and the data is coming out all
0's. e.g.,
0 (+ 0) PTE_WRITE vcpu = 0x0001 pid = 0x240d [
gpa = 0x gpte = 0x ]
Patch is
--- On Fri, 4/18/08, Avi Kivity [EMAIL PROTECTED] wrote:
From: Avi Kivity [EMAIL PROTECTED]
Subject: Re: [kvm-devel] Second KVM process hangs eating 80-100% CPU on host
during startup
To: Alex Davis [EMAIL PROTECTED]
Cc: kvm-devel@lists.sourceforge.net
Date: Friday, April 18, 2008, 12:12
67 matches
Mail list logo