Hi,
I got a Oops message when I shutdown a guest on x86_32 machine.
The patch fixes this issue.
Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Best Regards,
Akio Takebe
---
diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
index 4f38f5c..f9427e2 100644
--- a/virt/kvm/kvm_main.c
+++
Avi Kivity avi at qumranet.com writes:
This release was cooking for far too long, and as a result there are
plenty of changes.
Excellent news !
Quick question: when will you merge the recent qemu-img.c changes
(qemu svn rev 4672) ?
-marc
--
To unsubscribe from this list: send the line
From efba05901f8ffca03208217d075f679f78f3469d Mon Sep 17 00:00:00 2001
From: Sheng Yang [EMAIL PROTECTED]
Date: Tue, 17 Jun 2008 17:41:10 +0800
Subject: [PATCH] KVM: VMX: Flush all VPID tagged TLB when VMXON
Signed-off-by: Sheng Yang [EMAIL PROTECTED]
---
arch/x86/kvm/vmx.c |7 +++
1
On Fri, 2008-06-13 at 17:09 +0300, Avi Kivity wrote:
Mark McLoughlin wrote:
- .ioctl = vring_ioctl,
+ .unlocked_ioctl = vring_ioctl,
+ .compat_ioctl = vring_compat_ioctl,
I think you can set compat_ioctl = vring_ioctl (that's what kvm does).
Don't pointer args need
* Anthony Liguori [EMAIL PROTECTED] [2008-06-16 10:21]:
Any idea if this is a kernel bug, BIOS issue or a bug in VMplayer?
This has been fixed in the latest KVM code base AFAIK.
Can you give some more information? Which commit fixed the problem?
Was the patch submitted to the 2.6.25-stable
Martin Michlmayr wrote:
* Anthony Liguori [EMAIL PROTECTED] [2008-06-16 10:21]:
Any idea if this is a kernel bug, BIOS issue or a bug in VMplayer?
This has been fixed in the latest KVM code base AFAIK.
Can you give some more information? Which commit fixed the problem?
* Anthony Liguori [EMAIL PROTECTED] [2008-06-17 08:16]:
VMware is a binary kernel module that's out of kernel. KVM is not
misbehaving and the fact that VMware breaks when the KVM module is
loaded isn't our problem. If they submitted their code for
inclusion in mainline, we could possibly
On Tue, Jun 17, 2008 at 8:44 AM, Martin Michlmayr [EMAIL PROTECTED] wrote:
Sorry, Anthony, I just realized I misparsed your response. So you're
saying that it's a known issue and that VMware is the problem. Thanks
a lot! I'll take it up with VMware.
i think what he's saying is that VMWare
Don't know if this is a kvm bug or not, but figured I'd send it anyway. Just
in case.
http://www.theiggy.com/tmp/hrtimers_bug.png
Host:
Core 2 Duo 2.5G
4G ram
Ubuntu 8.04
Guest:
Ubuntu 8.04
qemu-system-x86_64 -m 440M -vnc :1 -std-vga -drive
file=/dev/vm_space/test1,if=virtio,boot=on -kernel
Martin Michlmayr wrote:
* Anthony Liguori [EMAIL PROTECTED] [2008-06-17 08:16]:
VMware is a binary kernel module that's out of kernel. KVM is not
misbehaving and the fact that VMware breaks when the KVM module is
loaded isn't our problem. If they submitted their code for
inclusion in
From: Han Weidong [EMAIL PROTECTED]
Signed-off-by: Ben-Ami Yassour [EMAIL PROTECTED]
---
arch/x86/kvm/x86.c |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 89d9cda..896ae5c 100644
--- a/arch/x86/kvm/x86.c
+++
From: Han Weidong [EMAIL PROTECTED]
Signed-off-by: Ben-Ami Yassour [EMAIL PROTECTED]
---
arch/x86/kvm/vtd.c|2 +-
drivers/pci/intel-iommu.c |2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/vtd.c b/arch/x86/kvm/vtd.c
index c2d9192..be775cd 100644
From: Ben-Ami Yassour [EMAIL PROTECTED]
PIO for passthrough does not work properly since the permissions are not
set, it is not enough to call iopl at init time.
This temporary patch calls iopl for every pio request.
A better solution would be have a per thread iopl.
An alternative approach
On Tue, Jun 17, 2008 at 02:29:59PM -0500, Brian Jackson wrote:
I'm having a problem recently with my guests freezing. It seems to happen
within a few hours of booting the guest. I can still access the monitor and
check stuff in there. The kernel that comes with Ubuntu 8.04 (2.6.24) doesn't
CPU Model: Intel(R) Core(TM)2 Duo CPU T7250 @ 2.00GHz
KVM version: kvm-69-1687-gd660add
Host Kernel: 2.6.26-rc5 (x86_64)
Guests: FreeDOS and Minix 3.1.2 32-bit
Command: qemu-system-x86_64 -hda /media/sda6/dos or minix image
Real mode guests (namely Minix 3 and FreeDOS with HIMEM XMS driver)
I'm seeing this as well.
with KVM-70
my host:
dual quad core Intel E5320
4G ram
Debian Etch
2.6.26-rc6 x86_64
my guest:
debian etch
2.6.26-rc6 x86_64
512 Mb ram
started with:
qemu-system-x86_64 -drive \
file=/mnt/kvms/images/guitest.img,if=ide,boot=on -m 512 \
-vnc localhost:2 -name
From 54dc26e44f1c0aa460bef409b799f36dae56a911 Mon Sep 17 00:00:00 2001
From: Sheng Yang [EMAIL PROTECTED]
Date: Wed, 18 Jun 2008 11:23:13 +0800
Subject: [PATCH] KVM: VMX: Add ept_sync_context in flush_tlb
Fix a potention issue caused by kvm_mmu_slot_remove_write_access().
The old behavior don't
complement 2680f3df932a3119880a692609943587ecc8f409 to export the
definition for kvm_init_coalesced_mmio as it is used by the per
arch libkvm as shown by the following warning :
libkvm-x86.c: In function 'kvm_arch_create':
libkvm-x86.c:182: warning: implicit declaration of function
From 7b2c2612b21b895cd14e632fea845c03b6e1dedc Mon Sep 17 00:00:00 2001
From: Anthony Xu [EMAIL PROTECTED]
Date: Thu, 29 May 2008 13:14:56 -0400
Subject: [PATCH] Make qemu compile for kvm-ia64
Since merging with Qemu upsteram, it can't be compiled
for kvm-ia64
Signed-off-by: Anthony Xu [EMAIL
On Tuesday 17 June 2008 00:02:55 Anthony Liguori wrote:
There's nothing that prevents zero-copy to be implemented for tun
without vringfd. In fact, I seem to recall that your earlier patches
implemented zero-copy :-)
They didn't actually work. You need to block until the data isn't being
20 matches
Mail list logo