Arn wrote:
> Hi ,
>
> Regarding the guest swapping mechanism (host ability to swap out guest
> pages),
>
> 1) Can the host swap out any page of a guest VM ? (including the
> guest's kernel pages)
right now kvm can swap any pages but pages that are mapped in it mmu
cache. (it doesnt matther if i
Bugs item #1881418, was opened at 2008-01-28 21:55
Message generated for change (Comment added) made by fishor-flex
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1881418&group_id=180599
Please note that this message will contain a full copy of the comme
Hi ,
Regarding the guest swapping mechanism (host ability to swap out guest
pages),
1) Can the host swap out any page of a guest VM ? (including the guest's
kernel pages)
2) Does the guest know its page has been swapped out or is this transparent
to the guest ? ( I think the guest
wouldn't know
On Wed, 2008-04-30 at 16:14 -0500, Hollis Blanchard wrote:
> On Wednesday 30 April 2008 15:53:47 Jerone Young wrote:
> > 1 file changed, 1 insertion(+), 1 deletion(-)
> > configure |2 +-
> >
> >
> > This fixes compilation for cross compilers as many do not create a
> ${cross_prefix}cc link.
1 file changed, 1 insertion(+), 1 deletion(-)
configure |2 +-
This fixes compilation for cross compilers as many do not create a
${cross_prefix}cc link. But the do a ${cross_prefix}gcc. This is what the
kernel does so this will work for everyone. This breaks some who do not have a
cc link
On Wednesday 30 April 2008 15:16:09 Avi Kivity wrote:
> > hack = $(call _hack,$T/$(strip $1))
> > +
> > +ifneq '$(filter $(ARCH_DIR), x86)' ''
> > +HACK_FILES = kvm_main.c \
> > + mmu.c \
> > + vmx.c \
> > + svm.c \
> > + x86.c \
> > + ir
On Wednesday 30 April 2008 15:53:47 Jerone Young wrote:
> 1 file changed, 1 insertion(+), 1 deletion(-)
> configure |2 +-
>
>
> This fixes compilation for cross compilers as many do not create a
${cross_prefix}cc link. But the do a ${cross_prefix}gcc. This is what the
kernel does so this wi
1 file changed, 23 insertions(+), 13 deletions(-)
kernel/Makefile | 36 +++-
This patch removes static x86 entries and makes things work for multiple archs.
Signed-off-by: Jerone Young <[EMAIL PROTECTED]>
diff --git a/kernel/Makefile b/kernel/Makefile
--- a/kern
This patch allows VMA's that contain no backing page to be used for guest
memory. This is a drop-in replacement for Ben-Ami's first page in his direct
mmio series. Here, we continue to allow mmio pages to be represented in the
rmap.
Since v1, I've taken into account Andrea's suggestions at using
Jerone Young wrote:
> 1 file changed, 1 deletion(-)
> qemu/hw/ppc440_bamboo.c |1 -
>
>
> In 2.6.26 wait is now enabled by default. With this the /hypervisor node will
> not be need to be idetified to enable the guest to go into wait state while
> idle.
>
> Signed-off-by: Jerone Young <[EMAIL
Jerone Young wrote:
> This patch removes static x86 entries and makes things work for multiple
> archs.
>
> Signed-off-by: Jerone Young <[EMAIL PROTECTED]>
>
> diff --git a/kernel/Makefile b/kernel/Makefile
> --- a/kernel/Makefile
> +++ b/kernel/Makefile
> @@ -1,5 +1,10 @@ include ../config.mak
>
In vmx.c:alloc_identity_pagetable() we grab a reference to the EPT identity
page table via gfn_to_page(). We never release this reference though.
This patch releases the reference to this page on VM destruction. I haven't
tested this with EPT.
Signed-off-by: Anthony Liguori <[EMAIL PROTECTED]>
There is no reason why should i386 and x86_64 code for rdtsc be different.
Unify them.
---
cpu-all.h | 11 +--
1 files changed, 1 insertions(+), 10 deletions(-)
diff --git a/cpu-all.h b/cpu-all.h
index 2a2b197..1c9e2a3 100644
--- a/cpu-all.h
+++ b/cpu-all.h
@@ -930,16 +930,7 @@ static i
Jiang, Yunhong wrote:
> I noticed there is a windows PV driver based on virtIO in
> http://sourceforge.net/project/showfiles.php?group_id=180599
>
> But when I enable the driver in guest, the guest will hang. I'm using
> changeset around April, 18. Since the driver is created in March, I
> assume t
Jan Kiszka wrote:
> Minor cleanup I came across while reverting printf instrumentations.
>
>
Applied, thanks.
--
Any sufficiently difficult bug is indistinguishable from a feature.
-
This SF.net email is sponsored by the
On Sat, Apr 26, 2008 at 10:08 AM, Avi Kivity <[EMAIL PROTECTED]> wrote:
> Marcelo Tosatti wrote:
>
> > On Wed, Apr 23, 2008 at 09:30:06AM +0300, Avi Kivity wrote:
> >
> >
> > >
> > > > as I got no reply, I guess it is a bad setup on my part. If that might
> > > > help, this happenned while I was do
Marcelo Tosatti wrote:
> Anthony,
>
> The following sequence crashes F9 guests, when using VNC:
>
> # modprobe cirrusfb
> # vbetool post
>
> Results in Floating point exception at:
>
> cirrus_do_copy()
> {
>
> depth = s->get_bpp((VGAState *)s) / 8
> ...
> sx = (src % (width * depth))
Joerg Roedel wrote:
> This series of patches adds the missing kvmtrace markers to the SVM specific
> code paths in KVM. Further it adds a new trace event for TDP page faults.
>
>
Thanks, applied all. Please use git format-patch -n (or format.numbered
= auto) so that patch order is explicit.
Bugs item #1905703, was opened at 2008-03-02 15:49
Message generated for change (Comment added) made by jroedel
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1905703&group_id=180599
Please note that this message will contain a full copy of the comment t
Jan Kiszka wrote:
> Userland-located ROM memory is not available via kvm->physical_memory +
> guest_address. To let kvm_show_code also dump useful information when
> some problem in ROM (BIOS...) occurs, this patch first tries to obtain
> the memory content via the mmio_read callback - maybe not 10
Jan Kiszka wrote:
> Yes, the following still works for me. But I'm not the right person to
> ask if there are obscure cases where you may not want this clearing
> while just editing some registers (I'm thinking of debugger scenarios
> now).
>
>
Applied, as the bug we're fixing is much more like
Marcelo Tosatti wrote:
> The in-kernel PIT emulation ignores pending timers if operating under
> mode 4, which for example DragonFlyBSD uses (and Plan9 too, apparently).
>
> Mode 4 seems to be similar to one-shot mode, other than the fact that it
> starts counting after the next CLK pulse once prog
Bugs item #1881418, was opened at 2008-01-28 16:55
Message generated for change (Comment added) made by mtosatti
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1881418&group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #1919354, was opened at 2008-03-19 04:18
Message generated for change (Comment added) made by mtosatti
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1919354&group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #1905703, was opened at 2008-03-02 10:49
Message generated for change (Comment added) made by mtosatti
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1905703&group_id=180599
Please note that this message will contain a full copy of the comment
Anthony,
The following sequence crashes F9 guests, when using VNC:
# modprobe cirrusfb
# vbetool post
Results in Floating point exception at:
cirrus_do_copy()
{
depth = s->get_bpp((VGAState *)s) / 8
...
sx = (src % (width * depth)) / depth;
...
}
Problem is that ->get_bpp r
The in-kernel PIT emulation ignores pending timers if operating under
mode 4, which for example DragonFlyBSD uses (and Plan9 too, apparently).
Mode 4 seems to be similar to one-shot mode, other than the fact that it
starts counting after the next CLK pulse once programmed, while mode 1
starts cou
Userland-located ROM memory is not available via kvm->physical_memory +
guest_address. To let kvm_show_code also dump useful information when
some problem in ROM (BIOS...) occurs, this patch first tries to obtain
the memory content via the mmio_read callback - maybe not 100% clean,
but works at lea
Avi Kivity wrote:
> Jan Kiszka wrote:
Clear the pending original exception when raising a triple fault. This
allows to re-use the vcpu instance, e.g. after a reset which is
typically issued as reaction on the triple fault.
Signed-off-by: Jan Kiszka <[EMAIL PROTECTED]>
This series of patches adds the missing kvmtrace markers to the SVM specific
code paths in KVM. Further it adds a new trace event for TDP page faults.
The diffstat:
arch/x86/kvm/lapic.c |4
arch/x86/kvm/svm.c| 45 ++---
arch/x86/kvm/vmx.c
This patch adds a format line for TDP page faults to the formats file.
Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
---
user/formats |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/user/formats b/user/formats
index 5313a47..c6c49d6 100644
--- a/user/formats
+++ b/user/
To distinguish between real page faults and nested page faults they should be
traced as different events. This is implemented by this patch.
Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
---
arch/x86/kvm/svm.c|4
include/asm-x86/kvm.h |1 +
2 files changed, 5 insertions(+), 0 d
This patch moves the trace entry for APIC accesses from the VMX code to the
generic lapic code. This way APIC accesses from SVM will also be traced.
Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
---
arch/x86/kvm/lapic.c |4
arch/x86/kvm/vmx.c |2 --
2 files changed, 4 insertions(
With an exit handler for INTR intercepts its possible to account them using
kvmtrace.
Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
---
arch/x86/kvm/svm.c |8 +++-
1 files changed, 7 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index 6dce863..ca83c
With an exit handler for NMI intercepts its possible to account them using
kvmtrace.
Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
---
arch/x86/kvm/svm.c |7 ++-
1 files changed, 6 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index ab22615..6dce863
This patch adds the missing kvmtrace markers to the svm
module of kvm.
Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
---
arch/x86/kvm/svm.c | 26 +-
1 files changed, 25 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index ca83c8a..d
This patch adds some kvmtrace bits to the generic x86 code
where it is instrumented from SVM.
Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
---
arch/x86/kvm/x86.c | 25 -
1 files changed, 20 insertions(+), 5 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/
Bugs item #1952988, was opened at 2008-04-27 15:25
Message generated for change (Comment added) made by carenas
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1952988&group_id=180599
Please note that this message will contain a full copy of the comment t
since the pv_apic_ops are only present if CONFIG_X86_LOCAL_APIC is compiled
in, kvmclock failed to build without this option. This patch fixes this
Signed-off-by: Glauber Costa <[EMAIL PROTECTED]>
---
arch/x86/kernel/kvmclock.c |4
1 files changed, 4 insertions(+), 0 deletions(-)
diff -
Andrea Arcangeli wrote:
> On Tue, Apr 29, 2008 at 06:12:51PM -0500, Anthony Liguori wrote:
>
>> IIUC PPC correctly, all IO pages have corresponding struct pages. This
>> means that get_user_pages() would succeed and you can reference count them?
>> In this case, we would never take the VM_PF
On Tuesday 29 April 2008 18:12:51 Anthony Liguori wrote:
> IIUC PPC correctly, all IO pages have corresponding struct pages. This
> means that get_user_pages() would succeed and you can reference count
> them? In this case, we would never take the VM_PFNMAP path.
>
> Is that correct?
I think
Am Sonntag, 27. April 2008 schrieb Avi Kivity:
> Carsten Otte (4):
> s390: KVM preparation: provide hook to enable pgstes in user pagetable
> KVM: s390: interrupt subsystem, cpu timer, waitpsw
> KVM: s390: API documentation
> s390: KVM guest: detect when running on kvm
>
>
Yes, the 4G/4G patch and the 64G options are both enabled for the hugemem
kernel:
CONFIG_HIGHMEM64G=y
CONFIG_X86_4G=y
Differences between the "standard" kernel and the hugemem kernel:
# diff config-2.4.21-47.ELsmp config-2.4.21-47.ELhugemem
2157,2158c2157,2158
< CONFIG_M686=y
< # CONFIG_MPENTI
My neighbor keeps me awake all night with their late night activities
http://www.poieuean.com/
-
This SF.net email is sponsored by the 2008 JavaOne(SM) Conference
Don't miss this year's exciting event. There's still time to
Avi Kivity wrote:
> Hollis/Xiantao/Carsten, can you confirm that this approach works for
> you? Carsten, I believe you don't have mmio, but at least this
> shouldn't interfere.
Should work fine on s390 afaics.
-
This SF.net
Bugs item #1953353, was opened at 2008-04-28 14:50
Message generated for change (Comment added) made by izike
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1953353&group_id=180599
Please note that this message will contain a full copy of the comment thr
On Wed, Apr 30, 2008 at 07:39:53AM -0600, David S. Ahern wrote:
> Avi Kivity wrote:
> > David S. Ahern wrote:
> >> Another tidbit for you guys as I make my way through various
> >> permutations:
> >> I installed the RHEL3 hugemem kernel and the guest behavior is *much*
> >> better.
> >> System time
David S. Ahern wrote:
> Avi Kivity wrote:
>
>> David S. Ahern wrote:
>>
>>> Another tidbit for you guys as I make my way through various
>>> permutations:
>>> I installed the RHEL3 hugemem kernel and the guest behavior is *much*
>>> better.
>>> System time still has some regular hiccups tha
Avi Kivity wrote:
> David S. Ahern wrote:
>> Another tidbit for you guys as I make my way through various
>> permutations:
>> I installed the RHEL3 hugemem kernel and the guest behavior is *much*
>> better.
>> System time still has some regular hiccups that are higher than xen
>> and esx
>> (e.g.,
Bugs item #1953353, was opened at 2008-04-28 07:50
Message generated for change (Comment added) made by mtosatti
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1953353&group_id=180599
Please note that this message will contain a full copy of the comment
Hollis Blanchard wrote:
> Acked-by: Hollis Blanchard <[EMAIL PROTECTED]>
>
> Avi, please apply for 2.6.26.
>
>
Sure thing. Thanks.
--
Any sufficiently difficult bug is indistinguishable from a feature.
-
This SF.net em
This looks bogus, but it is so far without practical impact (phys_start
is always 0 when we do the calculation).
Signed-off-by: Jan Kiszka <[EMAIL PROTECTED]>
---
libkvm/libkvm.c |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
Index: b/libkvm/libkvm.c
===
Jan Kiszka wrote:
>>> Clear the pending original exception when raising a triple fault. This
>>> allows to re-use the vcpu instance, e.g. after a reset which is
>>> typically issued as reaction on the triple fault.
>>>
>>> Signed-off-by: Jan Kiszka <[EMAIL PROTECTED]>
>>>
>>> ---
>>> arch/x86/kvm/
Joerg Roedel wrote:
> The current KVM x86 exception code handles double and triple faults only for
> page fault exceptions. This patch extends this detection for every exception
> that gets queued for the guest.
>
> Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
> Cc: Jan Kiszka <[EMAIL PROTECTED
Avi Kivity wrote:
> Fabian Deutsch wrote:
> > Hey.
> >
> > I've been trying Microsoft Windows 2003 a couple of times. The wiki
> > tells me that "everything" should work okay. It does, when using -smp 1,
> > but gets ugly when using -smp 2 or so.
> >
> > SO might it be useful, to add the column "sm
Minor cleanup I came across while reverting printf instrumentations.
Signed-off-by: Jan Kiszka <[EMAIL PROTECTED]>
---
libkvm/libkvm-x86.c |4 ++--
libkvm/libkvm.c |4 ++--
2 files changed, 4 insertions(+), 4 deletions(-)
Index: b/libkvm/libkvm-x86.c
=
Avi Kivity wrote:
> Jan Kiszka wrote:
>> Joerg Roedel wrote:
>>
>>> The current KVM x86 exception code handles double and triple faults
>>> only for
>>> page fault exceptions. This patch extends this detection for every
>>> exception
>>> that gets queued for the guest.
>>>
>>> Signed-off-by: Joer
In about a week, the various kvm lists will move to vger.kenel.org.
This will improve responsiveness, and reduce spam and advertising.
Please subscribe to the lists you are interested in as soon as
possible. You can subscribe by sending an email to
[EMAIL PROTECTED], with the following lines
David S. Ahern wrote:
> Another tidbit for you guys as I make my way through various permutations:
> I installed the RHEL3 hugemem kernel and the guest behavior is *much* better.
> System time still has some regular hiccups that are higher than xen and esx
> (e.g., 1 minute samples out of 5 show sy
I noticed there is a windows PV driver based on virtIO in
http://sourceforge.net/project/showfiles.php?group_id=180599
But when I enable the driver in guest, the guest will hang. I'm using
changeset around April, 18. Since the driver is created in March, I
assume the changeset in Apri should be ok
On Wed, Apr 30, 2008 at 10:45:12AM +0200, Jan Kiszka wrote:
> Joerg Roedel wrote:
> > The current KVM x86 exception code handles double and triple faults only for
> > page fault exceptions. This patch extends this detection for every exception
> > that gets queued for the guest.
> >
> > Signed-off
Jan Kiszka wrote:
> Joerg Roedel wrote:
>
>> The current KVM x86 exception code handles double and triple faults only for
>> page fault exceptions. This patch extends this detection for every exception
>> that gets queued for the guest.
>>
>> Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
>> Cc
David Miller wrote:
> I've created (and tested) all of these lists.
>
>
Thanks. I about a week I'll make the sourceforge lists read-only.
--
Any sufficiently difficult bug is indistinguishable from a feature.
-
This SF.
Muli Ben-Yehuda wrote:
>> @@ -544,19 +545,35 @@ pfn_t gfn_to_pfn(struct kvm *kvm, gfn_t gfn)
>> npages = get_user_pages(current, current->mm, addr, 1, 1, 1, page,
>> NULL);
>>
>> -if (npages != 1) {
>> -get_page(bad_page);
>> -return p
* Christian Borntraeger <[EMAIL PROTECTED]> wrote:
> While it is not a typical case, is there a better way of specifying
> multiple authors to avoid future confusion?
i think the established rule is that there's one Author field per
commit. Multiple authors should either submit a tree with mul
Bugs item #1953353, was opened at 2008-04-28 13:50
Message generated for change (Comment added) made by ravpl
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1953353&group_id=180599
Please note that this message will contain a full copy of the comment thr
Christian Borntraeger wrote:
> Am Sonntag, 27. April 2008 schrieb Avi Kivity:
>
>> Carsten Otte (4):
>> s390: KVM preparation: provide hook to enable pgstes in user pagetable
>> KVM: s390: interrupt subsystem, cpu timer, waitpsw
>> KVM: s390: API documentation
>> s390: KV
Andrea Arcangeli wrote:
> On Wed, Apr 30, 2008 at 11:59:47AM +0300, Avi Kivity wrote:
>
>> The code is not trying to find a vma for the address, but a vma for the
>> address which also has VM_PFNMAP set. The cases for vma not found, or vma
>> found, but not VM_PFNMAP, are folded together.
>>
On Wed, Apr 30, 2008 at 11:59:47AM +0300, Avi Kivity wrote:
> The code is not trying to find a vma for the address, but a vma for the
> address which also has VM_PFNMAP set. The cases for vma not found, or vma
> found, but not VM_PFNMAP, are folded together.
Muli's saying the comparison is rever
Muli Ben-Yehuda wrote:
> On Tue, Apr 29, 2008 at 02:09:20PM -0500, Anthony Liguori wrote:
>
>> This patch allows VMA's that contain no backing page to be used for guest
>> memory. This is a drop-in replacement for Ben-Ami's first page in his direct
>> mmio series. Here, we continue to allow mm
On Tue, Apr 29, 2008 at 06:12:51PM -0500, Anthony Liguori wrote:
> IIUC PPC correctly, all IO pages have corresponding struct pages. This
> means that get_user_pages() would succeed and you can reference count them?
> In this case, we would never take the VM_PFNMAP path.
get_user_pages only wo
71 matches
Mail list logo