From: Glauber Costa glom...@redhat.com
For a while now, we are issuing a rdmsr instruction to find out which
msrs in our save list are really supported by the underlying machine.
However, it fails to account for kvm-specific msrs, such as the pvclock
ones.
This patch moves then to the beginning
From: Frederik Deweerdt frederik.dewee...@xprog.eu
On a 32 bits compile, commit 3da0dd433dc399a8c0124d0614d82a09b6a49bce
introduced the following warnings:
arch/x86/kvm/mmu.c: In function ‘kvm_set_pte_rmapp’:
arch/x86/kvm/mmu.c:770: warning: cast to pointer from integer of different size
From: Joerg Roedel joerg.roe...@amd.com
The nested SVM code emulates a #vmexit caused by a request
to open the irq window right in the request function. This
is a bug because the request function runs with preemption
and interrupts disabled but the #vmexit emulation might
sleep. This can cause a
From: Alexander Graf ag...@suse.de
If event_inj is valid on a #vmexit the host CPU would write
the contents to exit_int_info, so the hypervisor knows that
the event wasn't injected.
We don't do this in nested SVM by now which is a bug and
fixed by this patch.
Signed-off-by: Alexander Graf
From: Joerg Roedel joerg.roe...@amd.com
This patch adds a tracepoint for the event that the guest
executed the SKINIT instruction. This information is
important because SKINIT is an SVM extenstion not yet
implemented by nested SVM and we may need this information
for debugging hypervisors that do
From: Joerg Roedel joerg.roe...@amd.com
With all important informations now delivered through
tracepoints we can savely remove the nsvm_printk debugging
code for nested svm.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git
From: Joerg Roedel joerg.roe...@amd.com
This patch adds a special tracepoint for the event that a
nested #vmexit is injected because kvm wants to inject an
interrupt into the guest.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git
From: Joerg Roedel joerg.roe...@amd.com
This patch adds a tracepoint for every #vmexit we get from a
nested guest.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index 907af3f..edf6e8b
From: Mark Langsdorf mark.langsd...@amd.com
New AMD processors (Family 0x10 models 8+) support the Pause
Filter Feature. This feature creates a new field in the VMCB
called Pause Filter Count. If Pause Filter Count is greater
than 0 and intercepting PAUSEs is enabled, the processor will
From: Marcelo Tosatti mtosa...@redhat.com
There's no kvm_run argument anymore.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index a4580d6..364263a 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@ -3387,7 +3387,7 @@ out:
*
From: Zhai, Edwin edwin.z...@intel.com
New NHM processors will support Pause-Loop Exiting by adding 2 VM-execution
control fields:
PLE_Gap- upper bound on the amount of time between two successive
executions of PAUSE in a loop.
PLE_Window - upper bound on the amount of time a
From: Darrick J. Wong djw...@us.ibm.com
I'm seeing an oops condition when kvm-intel and kvm-amd are modprobe'd
during boot (say on an Intel system) and then rmmod'd:
# modprobe kvm-intel
kvm_init()
kvm_init_debug()
kvm_arch_init() -- stores debugfs dentries internally
From: Jan Kiszka jan.kis...@web.de
Push the NMI-related singlestep variable into vcpu_svm. It's dealing
with an AMD-specific deficit, nothing generic for x86.
Acked-by: Gleb Natapov g...@redhat.com
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
arch/x86/include/asm/kvm_host.h |1 -
From: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/Documentation/kvm/api.txt b/Documentation/kvm/api.txt
index 126419f..f504e0b 100644
--- a/Documentation/kvm/api.txt
+++ b/Documentation/kvm/api.txt
@@ -631,7 +631,8 @@ such as migration.
From: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
--
To unsubscribe from this list: send the line unsubscribe kvm-commits in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
From: Arnd Bergmann a...@arndb.de
With big endian userspace, we can't quite figure out if a pointer
is 32 bit (shifted 32) or 64 bit when we read a 64 bit pointer.
This is what happens with dirty logging. To get the pointer interpreted
correctly, we thus need Arnd's patch to implement a compat
From: Ed Swierk eswi...@aristanetworks.com
Support for Xen PV-on-HVM guests can be implemented almost entirely in
userspace, except for handling one annoying MSR that maps a Xen
hypercall blob into guest address space.
A generic mechanism to delegate MSR writes to userspace seems overkill
and
From: Glauber Costa glom...@redhat.com
When we migrate a kvm guest that uses pvclock between two hosts, we may
suffer a large skew. This is because there can be significant differences
between the monotonic clock of the hosts involved. When a new host with
a much larger monotonic time starts
From: Sridhar Samudrala s...@us.ibm.com
Enable UFO on the host tap device if supported and allow setting UFO
on virtio-net in the guest.
Acked-by: Mark McLoughlin mar...@redhat.com
Signed-off-by: Sridhar Samudrala s...@us.ibm.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git
From: Glauber Costa glom...@redhat.com
abort() needs it. Build with kvm disabled breaks without it.
Signed-off-by: Glauber Costa glom...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/qemu-kvm.h b/qemu-kvm.h
index d6748c7..0bb2516 100644
--- a/qemu-kvm.h
+++
From: Glauber Costa glom...@redhat.com
they are just a tiny wrapper around qemu memory functions. Drop' em
Signed-off-by: Glauber Costa glom...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/qemu-kvm-x86.c b/qemu-kvm-x86.c
index a44ae67..e8ec59d 100644
---
From: Glauber Costa glom...@redhat.com
Upstream now has tests for irqchip_in_kernel. It differs from our
signature, as it does not take any parameter. For consistency, convert
our usage. Also, use a field in KVMState to store it, so we can have the
exact same function as qemu upstream does.
From: Glauber Costa glom...@redhat.com
kvm_arch_run() takes a vcpu context parameter, but CPUState should
do. Convert it, as well as the functions that it end up calling
Signed-off-by: Glauber Costa glom...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git
From: Glauber Costa glom...@redhat.com
There are no more users of kvm_run inside vcpu context. Remove it, and
leave the one inside CPUState for the job.
Signed-off-by: Glauber Costa glom...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/qemu-kvm.c b/qemu-kvm.c
index
From: Jan Kiszka jan.kis...@web.de
This simplifies working with new features without having to update the
locally mirrored headers. It also reduces the diff to upstream.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/configure
From: Glauber Costa glom...@redhat.com
It is not used anywhere, so just blow it away.
Signed-off-by: Glauber Costa glom...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/qemu-kvm.c b/qemu-kvm.c
index 35a3be4..199e620 100644
--- a/qemu-kvm.c
+++ b/qemu-kvm.c
@@ -441,9
From: Glauber Costa glom...@redhat.com
qemu already stores id information in a couple of places.
No need to do it here too.
Signed-off-by: Glauber Costa glom...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/qemu-kvm.c b/qemu-kvm.c
index 8647dc9..15b9129 100644
---
From: Gerd Hoffmann kra...@redhat.com
Signed-off-by: Gerd Hoffmann kra...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/configure b/configure
index fdefcf6..ff7e8b2 100755
--- a/configure
+++ b/configure
@@ -1424,7 +1424,7 @@ if test $kvm_cap_pit != no ; then
#endif
From: Gerd Hoffmann kra...@redhat.com
Use new rom loading infrastructure.
Devices can simply register option roms now.
Signed-off-by: Gerd Hoffmann kra...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/hw/device-assignment.c b/hw/device-assignment.c
index
From: Gleb Natapov g...@redhat.com
Otherwise some cpus may start executing code before others
are fully initialized.
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/qemu-kvm.c b/qemu-kvm.c
index 15b9129..b6c36e0 100644
--- a/qemu-kvm.c
From: Marcelo Tosatti mtosa...@redhat.com
* upstream-merge: (103 commits)
scsi disk block descriptor v2
Add some chipset doc links
user: fix libuser build messages
sparc64: fix done instruction pc
qemu: allow pulseaudio to be the default
Fixed wacom emulation
rom loader: also try
From: Gleb Natapov g...@redhat.com
Use qemu_send_packet_raw to send gracious arp. This will ensure that
vnet header is handled properly.
Acked-by: Mark McLoughlin mar...@redhat.com
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git
From: Gleb Natapov g...@redhat.com
mp_state, unlike other cpu state, can be changed not only from vcpu
context it belongs to, but by other vcpus too. That makes its loading
from kernel/saving back not safe if mp_state value is changed inside
kernel between load and save. For example vcpu 1 loads
From: Avi Kivity a...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/roms/pcbios b/roms/pcbios
index da5ff65..e5c3144 16
--- a/roms/pcbios
+++ b/roms/pcbios
@@ -1 +1 @@
-Subproject commit
From: Marcelo Tosatti mtosa...@redhat.com
* upstream-merge:
Only IDE needs limits for CHS configuration
MIPS jazz: create isa bus
ksm support
multiboot: Limit number of multiboot modules
pcnet: Extend hardware reset
multiboot: Fix cmdline of modules
qcow2: Bring synchronous
From: Eduardo Habkost ehabk...@redhat.com
A new register was added to the load/save list on commit
d283d5a65a2bdcc570065267be21848bd6fe3d78, but MSR_COUNT was not updated, leading
to potential stack corruption on kvm_arch_save_regs().
The following registers are saved by kvm_arch_save_regs():
From: Glauber Costa glom...@redhat.com
This is a patch actually written by Juan, which, according to him,
he plans on posting to qemu.git. Problem is that linux defines
u64 in a way that is type-uncompatible with uint64_t.
I am including it here, because it is a dependency to my patch series
From: Glauber Costa glom...@redhat.com
We have no use for it anymore. Only trace of it was in vcpu_create.
Make it disappear.
Signed-off-by: Glauber Costa glom...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/qemu-kvm.c b/qemu-kvm.c
index 2ddd08e..b58a457 100644
---
From: Glauber Costa glom...@redhat.com
Currently, the msrs involved in setting up pvclock are not saved over
migration and/or save/restore. This patch puts their value in special
fields in our CPUState, and deal with them using vmstate.
kvm also has to account for it, by including them in the
From: Kamalesh Babulal kamal...@linux.vnet.ibm.com
qemu-0.11.50 build breaks with
CCx86_64-softmmu/monitor.o
cc1: warnings being treated as errors
/other/srcs/qemu-kvm/monitor.c: In function 'print_cpu_iter':
/other/srcs/qemu-kvm/monitor.c:450: error: format '%ld' expects type 'long
int',
From: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/monitor.c b/monitor.c
index b73225c..b4c4878 100644
--- a/monitor.c
+++ b/monitor.c
@@ -447,6 +447,8 @@ static void print_cpu_iter(QObject *obj, void *opaque)
if
From: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/net.c b/net.c
index a9f5ced..a23b75c 100644
--- a/net.c
+++ b/net.c
@@ -1603,7 +1603,9 @@ static TAPState *net_tap_fd_init(VLANState *vlan,
int vnet_hdr)
{
From: Glauber Costa glom...@redhat.com
Intention is to merge with upstream version in the following patch.
Doing as a separate step to help identify any further issues.
Signed-off-by: Glauber Costa glom...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/qemu-kvm-x86.c
From: Glauber Costa glom...@redhat.com
this whole tpr thing does not belong in common code. Move it to i386 specific
files.
Signed-off-by: Glauber Costa glom...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/qemu-kvm-x86.c b/qemu-kvm-x86.c
index eb9d13a..0dcbd44
From: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/kvm/user/config-x86-common.mak b/kvm/user/config-x86-common.mak
index 3f279ed..63cca42 100644
--- a/kvm/user/config-x86-common.mak
+++ b/kvm/user/config-x86-common.mak
@@ -2,9 +2,8 @@
From: Glauber Costa glom...@redhat.com
Register a vmstate handler for kvmclock. The goal here is to pass
information about current time to migration, so we avoid going backwards
or jumping too much. We use our plain new ioctls for that.
Signed-off-by: Glauber Costa glom...@redhat.com
From: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/qemu-kvm.c b/qemu-kvm.c
index bfee8bd..4c13628 100644
--- a/qemu-kvm.c
+++ b/qemu-kvm.c
@@ -853,6 +853,7 @@ void post_kvm_run(kvm_context_t kvm, CPUState *env)
{
From: Glauber Costa glom...@redhat.com
qemu.git uses an array of 100 entries for the msr list, which is arguably large
enough (tm).
I propose we follow the same path, for two reasons:
1) ease future merge.
2) avoid stack overflow problems that had already began to appear
Signed-off-by:
From: Glauber Costa glom...@redhat.com
Replace ours with qemu.git version. A couple of functions go
unused, and are deleted.
Signed-off-by: Glauber Costa glom...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/qemu-kvm-x86.c b/qemu-kvm-x86.c
index f4d9e7a..eb9d13a
From: Michael S. Tsirkin m...@redhat.com
KVM does not virtualize low address bits for memory accesses, so we must
require that PCI BAR size is a multiple of 4K for passthrough to work
(this also guarantees that address is 4K aligned).
Users of recent linux kernels can force resource size up to
From: Glauber Costa glom...@redhat.com
Signed-off-by: Glauber Costa glom...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/kvm-all.c b/kvm-all.c
index 5e03cd9..d02e94b 100644
--- a/kvm-all.c
+++ b/kvm-all.c
@@ -865,7 +865,6 @@ int kvm_vm_ioctl(KVMState *s, int type,
From: Glauber Costa glom...@redhat.com
We can use upstream version of handle_io, there called kvm_handle_io()
Signed-off-by: Glauber Costa glom...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/kvm-all.c b/kvm-all.c
index 0a8aa4c..5e03cd9 100644
--- a/kvm-all.c
+++
From: Glauber Costa glom...@redhat.com
At this point, vcpu arguments are passed only for the fd field.
We already provide that in env, as kvm_fd. Replace it.
Signed-off-by: Glauber Costa glom...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/cpu-defs.h b/cpu-defs.h
From: Jan Kiszka jan.kis...@siemens.com
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
diff --git a/sync b/sync
index 0bbd488..4821b84 100755
--- a/sync
+++ b/sync
@@ -119,6 +119,8 @@ def __hack(data):
line = sub(r'flags', r'kvm_pt_regs_flags', line)
mce = False
From: Jan Kiszka jan.kis...@siemens.com
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
diff --git a/external-module-compat-comm.h b/external-module-compat-comm.h
index 47fdc86..de8ab23 100644
--- a/external-module-compat-comm.h
+++ b/external-module-compat-comm.h
@@ -993,3 +993,10 @@ unsigned
From: Jan Kiszka jan.kis...@siemens.com
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
diff --git a/external-module-compat-comm.h b/external-module-compat-comm.h
index de8ab23..8f56f11 100644
--- a/external-module-compat-comm.h
+++ b/external-module-compat-comm.h
@@ -1000,3 +1000,7 @@ static
From: Jan Kiszka jan.kis...@siemens.com
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
diff --git a/linux-2.6 b/linux-2.6
index abb015a..8fdcaf6 16
--- a/linux-2.6
+++ b/linux-2.6
@@ -1 +1 @@
-Subproject commit abb015ac65852287c7a7c243c8cdee966a38854d
+Subproject commit
From: Jan Kiszka jan.kis...@siemens.com
kmap_atomic_to_page was not exported before 2.6.32, and adding a compat
wrapper for it is impossible due to further missing exports. This breaks
x86-32 modules under CONFIG_HIGHMEM.
So avoid its use via a crude hack: nested_svm_map callers receive the
From: Jan Kiszka jan.kis...@siemens.com
Apply DESTDIR also on old module renaming and depmod.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
diff --git a/Makefile b/Makefile
index 37a14e1..8314833 100644
--- a/Makefile
+++ b/Makefile
@@ -49,11 +49,11 @@ sync:
install:
mkdir -p
From: Jan Kiszka jan.kis...@siemens.com
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
diff --git a/external-module-compat-comm.h b/external-module-compat-comm.h
index 8f56f11..fd3aab7 100644
--- a/external-module-compat-comm.h
+++ b/external-module-compat-comm.h
@@ -1004,3 +1004,9 @@ static
From: Jan Kiszka jan.kis...@siemens.com
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
diff --git a/external-module-compat-comm.h b/external-module-compat-comm.h
index fd3aab7..2892ace 100644
--- a/external-module-compat-comm.h
+++ b/external-module-compat-comm.h
@@ -957,7 +957,7 @@ static
From: Jan Kiszka jan.kis...@siemens.com
Ported from OpenSUSE: Provide an udev rule that not only sets the group
of /dev/kvm but also triggers automatic loading of the kernel modules
during boot.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
diff --git a/Makefile b/Makefile
index
From: Jan Kiszka jan.kis...@siemens.com
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
diff --git a/external-module-compat-comm.h b/external-module-compat-comm.h
index a8f8a2f..cec117b 100644
--- a/external-module-compat-comm.h
+++ b/external-module-compat-comm.h
@@ -1003,3 +1003,13 @@ int
From: Jan Kiszka jan.kis...@siemens.com
This was used to carry CONFIG_KVM_TRACE into the build. We no longer
have such switches, so drop the infrastructure. We can easily
reintroduce it once required.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
diff --git a/.gitignore b/.gitignore
index
repository: /home/vadimr/shares/kvm-guest-drivers-windows
branch: master
commit 8d7431f1080345c06abdb2ec334fb654da2a59fa
Author: Vadim Rozenfeld vroze...@redhat.com
Date: Sun Oct 25 13:04:09 2009 +0200
[PATCH] Add MSI-X support
Signed-off-by: Vadim Rozenfeld vroze...@redhat.com
repository: C:/dev/kvm-guest-drivers-windows
branch: master
commit 1d364940b008413e3ceb5adc06e6c5677e732c83
Author: Yan Vugenfirer yvuge...@redhat.com
Date: Sun Oct 25 14:20:37 2009 +0200
[WIN-GUEST-DRIVERS] viostor driver. Code cleanup. Getting rid of the
Registry stuff.
repository: /home/vadimr/shares/kvm-guest-drivers-windows
branch: master
commit eca6d92722fc669d5b3fdb99182a0a8e3db6a38b
Author: Vadim Rozenfeld vroze...@redhat.com
Date: Sun Oct 25 15:45:17 2009 +0200
[PATCH] viostor driver. fix broken xp build
Signed-off-by: Vadim Rozenfeld
repository: C:/dev/kvm-guest-drivers-windows
branch: master
commit c7561ecd1c1d6fd7c119cd45f43579f7cae0bd48
Author: Yan Vugenfirer yvuge...@redhat.com
Date: Sun Oct 25 15:59:53 2009 +0200
[WIN-GUEST-DRIVERS]viostor driver. Complete SRBs at DPC level
Signed-off-by: Vadim
repository: C:/dev/kvm-guest-drivers-windows
branch: master
commit c8a200effa3a9082319ae0130073186ede86cdd4
Author: Yan Vugenfirer yvuge...@redhat.com
Date: Sun Oct 25 16:02:24 2009 +0200
[WIN-GUEST-DRIVERS] viostor driver. Complete SRBs at DPC level. Fixing
previous commit.
repository: C:/dev/kvm-guest-drivers-windows
branch: master
commit 05200e17936d50e4a203b23ac3870c9ffa30396c
Author: Yan Vugenfirer yvuge...@redhat.com
Date: Sun Oct 25 16:04:27 2009 +0200
[WIN-GUEST-DRIVERS] viostor driver. Add support for serial number feature.
Signed-off-by:
repository: C:/dev/kvm-guest-drivers-windows
branch: master
commit 597c5be5ab7fd44aa4e127c5cec028964588e9a7
Author: Yan Vugenfirer yvuge...@redhat.com
Date: Sun Oct 25 16:06:30 2009 +0200
[WIN-GUEST-DRIVERS] Add MSI-X support for viostor driver
Signed-off-by: Vadim
repository: C:/dev/kvm-guest-drivers-windows
branch: master
commit 4ab13fe7d8375604846bbc8a01f3a4ea44fafee2
Author: Yan Vugenfirer yvuge...@redhat.com
Date: Sun Oct 25 17:08:24 2009 +0200
[WIN-GUEST_DRIVERS] User Windows 7 DDK (build 7600.16385.0) as a default
build environment.
repository: C:/dev/kvm-guest-drivers-windows
branch: master
commit f3cde3d0e011c64bae6f6b95d7eb34c87d141487
Author: Yan Vugenfirer yvuge...@redhat.com
Date: Sun Oct 25 17:08:24 2009 +0200
[WIN-GUEST_DRIVERS] Use Windows 7 DDK (build 7600.16385.0) as a default
build environment.
I'm just gonna answer him very shortly here :
virsh destroy jamm12a
virsh define /etc/libvirt/qemu/jamm12a.xml
virsh start jamm12a
And yes, this convo doesn't belong here.
- Original Message -
From: Avi Kivity a...@redhat.com
To: Neil Aggarwal n...@jammconsulting.com
Cc:
Also, on _loaded_ systems, I noticed creating/removing logical volumes
can take really long (several minutes); where allocating a file of a
given size would just take a fraction of that.
Allocating a file takes much longer, unless you use a 'sparse' file.
- Dietmar
--
To unsubscribe from
Do you support multiple guests accessing the same image?
A VM image can be attached to any VMs but one VM at a time; multiple
running VMs cannot access to the same VM image.
I guess this is a problem when you want to do live migrations?
- Dietmar
On Fri, Oct 23, 2009 at 12:24:15PM -0700, Shirley Ma wrote:
Hello Michael,
Some update,
On Fri, 2009-10-23 at 08:12 -0700, Shirley Ma wrote:
Tested raw packet, it didn't work;
Tested option -net raw,ifname=eth0, attached to a real device, raw works
to remote node. I was expecting raw
The Buildbot has detected a new failure of default_x86_64_debian_5_0 on
qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/default_x86_64_debian_5_0/builds/123
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build: b1_qemu_kvm_1
The Buildbot has detected a new failure of default_x86_64_out_of_tree on
qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/default_x86_64_out_of_tree/builds/65
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build: b1_qemu_kvm_1
On 10/24/2009 06:49 AM, Eduardo Habkost wrote:
Hi,
The following patches fix a bug on the SIPI reset code for SVM. cr0 was not
being reset properly, making KVM keep the vcpu on paging mode, thus not
being able to run the real-mode boostrap code. This bug was reported at:
The Buildbot has detected a new failure of default_i386_debian_5_0 on qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/default_i386_debian_5_0/builds/126
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build: b1_qemu_kvm_2
On Thu, Oct 22, 2009 at 05:46:16PM +0200, Orit Wasserman wrote:
Gleb Natapov g...@redhat.com wrote on 22/10/2009 11:04:58:
From:
Gleb Natapov g...@redhat.com
To:
Orit Wasserman/Haifa/i...@ibmil
Cc:
Abel Gordon/Haifa/i...@ibmil, aligu...@us.ibm.com, Ben-Ami Yassour1/
On 10/20/2009 09:23 PM, Alexander Graf wrote:
If the nested hypervisor doesn't intercept INTR we don't support it
anyways.
That's a bug.
Really, pushing the whole nesting state over is not a good idea.
Isn't the entire state just one bit? Everything else should be saved to
guest
On 10/24/2009 12:35 PM, Alexander Graf wrote:
Hm, thinking about this again, it might be useful to have an
currently in nested VM flag here. That way userspace can decide if
it needs to get out of the nested state (for migration) or if it just
doesn't care.
Getting out of nested state
On Thu, Oct 22, 2009 at 06:57:27PM -0200, Marcelo Tosatti wrote:
On Thu, Oct 22, 2009 at 02:00:15PM +0200, Michael S. Tsirkin wrote:
Hi!
I'm sometimes getting segfaults when I kill qemu.
This time I caught it when qemu was under gdb:
Program received signal SIGSEGV, Segmentation
On 10/21/2009 10:19 PM, Jon . wrote:
Hi all,
I am attempting to build kvm-88 on CentOS 5.3 and encounter the error
below while running make. Is the kernel included with CentOS too old?
Has any one been able to successfully build and run kvm-88 on CentOS
5.3?
If you're looking for kvm on
On Fri, Oct 23, 2009 at 09:23:40AM -0700, Shirley Ma wrote:
Hello Michael,
Some initial vhost test netperf results on my T61 laptop from the
working tap device are here, latency has been significant decreased, but
throughput from guest to host has huge regression.
Could you please try
Dietmar Maurer wrote:
Also, on _loaded_ systems, I noticed creating/removing logical volumes
can take really long (several minutes); where allocating a file of a
given size would just take a fraction of that.
Allocating a file takes much longer, unless you use a 'sparse' file.
If you mean
repository: /home/vadimr/shares/kvm-guest-drivers-windows
branch: master
commit f7f53b25857f20732b2eb69f127bb2d9bf369e4e
Author: Vadim Rozenfeldvroze...@redhat.com
Date: Mon Sep 21 22:05:51 2009 +0300
[PATCH] viostor driver.
Code cleanup. Getting rid of the Registry stuff.
repository: /home/vadimr/shares/kvm-guest-drivers-windows
branch: master
commit ed4b9ade27b56e9ee37461c2cf72e46d75633e9c
Author: Vadim Rozenfeldvroze...@redhat.com
Date: Wed Sep 23 11:28:48 2009 +0300
[PATCH] viostor driver. switch to full-duplex mode.
Signed-off-by: Vadim
repository: /home/vadimr/shares/kvm-guest-drivers-windows
branch: master
commit c507d6b279010ff1e1939927d2b2e91a59daac3b
Author: Vadim Rozenfeldvroze...@redhat.com
Date: Thu Sep 24 22:03:00 2009 +0300
[PATCH] viostor driver. Complete SRBs at DPC level
Signed-off-by: Vadim
repository: /home/vadimr/shares/kvm-guest-drivers-windows
branch: master
commit 394ae1879c5818fd0dce4b68b207c8ef6bf5e115
Author: Vadim Rozenfeldvroze...@redhat.com
Date: Fri Sep 25 21:15:37 2009 +0300
[PATCH] viostor driver. add support for serial number feature.
Signed-off-by:
On 09/16/2009 03:45 PM, Avi Kivity wrote:
The various x86 syscall related MSRs (MSR_LSTAR and friends, EFER when SCE
needs to be updated) are fairly expensive to read or write. Since different
operating systems can set different values for these MSRs, KVM needs to reload
them when switching to
On SMP guests, reads from the ring might bypass
used index reads. This causes guest crashes
because host writes to used index to signal ring data
readiness.
Fix this by inserting rmb before used ring reads.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
Rusty, I see guest crashes with
When CONFIG_USER_RETURN_NOTIFIER is set, we need to link
kernel/user-return-notifier.o.
Signed-off-by: Avi Kivity a...@redhat.com
---
kernel/Makefile |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/kernel/Makefile b/kernel/Makefile
index b8d4cd8..0ae57a8 100644
---
Hi,
my OpenSolaris image (64bit, 2009.06) is slowed down with kvm-88.
It was working with kvm-84 - after downgrade Debian/unstable to
Debian/testing + recompiling the kernel + kvm-88 it responds verry
slowly (for instance booting, character input.)
Seams to me something is going wrong with
On 10/23/2009 02:33 AM, Hollis Blanchard wrote:
On Wed, 2009-10-21 at 17:03 +0200, Alexander Graf wrote:
KVM for PowerPC only supports embedded cores at the moment.
While it makes sense to virtualize on small machines, it's even more fun
to do so on big boxes. So I figured we need KVM for
On 10/15/2009 01:27 PM, Jan Kiszka wrote:
Perhaps it makes sense to query about individual states, including
existing ones? That will allow us to deprecate and then phase out
broken states. It's probably not worth it.
You may do this already with the given design: Set up a VCPU, then
On SMP guests, reads from the ring might bypass
used index reads. This causes guest crashes
because host writes to used index to signal ring data
readiness.
Fix this by inserting rmb before used ring reads.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
Change from v1: indent with TAB and
repository: /home/vadimr/shares/kvm-guest-drivers-windows
branch: master
commit eca6d92722fc669d5b3fdb99182a0a8e3db6a38b
Author: Vadim Rozenfeldvroze...@redhat.com
Date: Sun Oct 25 15:45:17 2009 +0200
[PATCH] viostor driver. fix broken xp build
Signed-off-by: Vadim
1 - 100 of 121 matches
Mail list logo