Hi Alex,
Thanks for your advice.
Just qemu-img convert the image to raw and use that as disk image in
vbox. Make sure you configure your vm to the same hw as on kvm (apic,
piix3, etc)
Could you please explain in more detail ... configure your vm to the
same hw as on kvm (apic, piix3, etc)?
sati...@pacific.net.hk wrote:
Hi Alex,
Thanks for your advice.
Just qemu-img convert the image to raw and use that as disk image in
vbox. Make sure you configure your vm to the same hw as on kvm (apic,
piix3, etc)
Could you please explain in more detail ... configure your vm to the
same
Alexander Graf wrote:
But seriously, why would anyone want to go this direction?
Alex
Hi Alex
Last time I checked the advantages of VirtualBox vs KVM were (for the
technical part):
- sata support
- usb2 support
- audio hd support
- rdp/rdp+usb support
- a somewhat simpler network
On Thu, Feb 04, 2010 at 01:33:50AM +0100, Jan Kiszka wrote:
Marcelo Tosatti wrote:
On Wed, Feb 03, 2010 at 10:29:45PM +0100, Jan Kiszka wrote:
So far we synchronized any dirty VCPU state back into the kernel before
updating the guest debug state. This was a tribute to a deficit in x86
On 02/02/2010 10:16 AM, Paolo Bonzini wrote:
On 01/21/2010 02:31 PM, Avi Kivity wrote:
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index feca59f..09207ba 100644
--- a/arch/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@ -3266,6 +3266,7 @@ int emulate_invlpg(struct kvm_vcpu *vcpu, gva_t
On Thu, Feb 04, 2010 at 03:05:17PM +0200, Avi Kivity wrote:
On 02/02/2010 10:16 AM, Paolo Bonzini wrote:
On 01/21/2010 02:31 PM, Avi Kivity wrote:
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index feca59f..09207ba 100644
--- a/arch/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@ -3266,6
On 02/03/2010 11:12 PM, Balbir Singh wrote:
* Rik van Rielr...@redhat.com [2010-02-03 16:11:03]:
Currently KVM pretends that pages with EPT mappings never got
accessed. This has some side effects in the VM, like swapping
out actively used guest pages and needlessly breaking up actively
used
Hi folks,
Hello Satimis,
I need converting KVM (qcow2) to VirtualBox (vdi) from one PC to
another PC.
I had to do this recently to run a KVM virtual machine on a Windows PC with
virtualbox.
Do you have any idea/suggestion where can I find relevant
documentation?
Although you can
Hello,
I'm having trouble running the latest qemu-kvm code on Debian Lenny (Linux
2.6.26).
qemu-kvm dies with an error like this one:
exception 13 (0)
rax 0010 rbx 8c00 rcx 6ebe rdx
000c8c00
rsi e201 rdi 000c rsp
Marcelo Tosatti wrote:
On Thu, Feb 04, 2010 at 01:33:50AM +0100, Jan Kiszka wrote:
Marcelo Tosatti wrote:
On Wed, Feb 03, 2010 at 10:29:45PM +0100, Jan Kiszka wrote:
So far we synchronized any dirty VCPU state back into the kernel before
updating the guest debug state. This was a tribute to a
* Rik van Riel r...@redhat.com [2010-02-04 08:40:43]:
On 02/03/2010 11:12 PM, Balbir Singh wrote:
* Rik van Rielr...@redhat.com [2010-02-03 16:11:03]:
Currently KVM pretends that pages with EPT mappings never got
accessed. This has some side effects in the VM, like swapping
out actively
This is port of vhost v1 patch set I posted previously to qemu-kvm, for
those that want to get good performance out of it :)
This includes irqchip support and merge fixup on top of upstream patch.
Michael S. Tsirkin (20):
exec: memory notifiers
kvm: move kvm_set_phys_mem around
kvm: move
qemu-kvm.c must register notifier as well
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
kvm-all.c |4
qemu-kvm.c |1 +
2 files changed, 5 insertions(+), 0 deletions(-)
diff --git a/kvm-all.c b/kvm-all.c
index f31585e..51273e4 100644
--- a/kvm-all.c
+++ b/kvm-all.c
@@
This adds API to set ioeventfd to kvm,
as well as stubs for non-eventfd case,
making it possible for users to use this API
without ifdefs.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
kvm-all.c | 20
kvm.h | 16
2 files changed, 36
event notifiers are slightly generalized eventfd descriptors. Current
implementation depends on eventfd because vhost is the only user, and
vhost depends on eventfd anyway, but a stub is provided for non-eventfd
case.
We'll be able to further generalize this when another user comes along
and we
vhost needs physical addresses for ring and other queue fields,
so add APIs for these.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
hw/virtio.c | 51 +++
hw/virtio.h | 10 +-
2 files changed, 56 insertions(+), 5 deletions(-)
vhost net backend needs to be notified when
frontend status changes. Add a callback.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
hw/s390-virtio-bus.c |3 +++
hw/syborg_virtio.c |2 ++
hw/virtio-pci.c |6 ++
hw/virtio.h |1 +
4 files changed, 12
This adds vhost net support in qemu. Will be tied to tap device and
virtio by following patches. Raw backend is currently missing, will be
worked on/submitted separately.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
Makefile.target |1 +
hw/vhost.c | 603
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
net.c |8
net/tap.c | 29 +
qemu-options.hx |4 +++-
3 files changed, 40 insertions(+), 1 deletions(-)
diff --git a/net.c b/net.c
index 6ef93e6..b942d03 100644
--- a/net.c
+++
will be used by virtio-net for vhost net support
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
net/tap.c |7 +++
net/tap.h |3 +++
2 files changed, 10 insertions(+), 0 deletions(-)
diff --git a/net/tap.c b/net/tap.c
index d9f2e41..166cf05 100644
--- a/net/tap.c
+++
This connects virtio-net to vhost net backend.
The code is structured in a way analogous to what we have with vnet
header capability in tap. We start/stop backend on driver start/stop as
well as on save and vm start (for migration).
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
This makes it possible to build vhost support
on systems which do not have this header.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
kvm/include/linux/vhost.h | 130 +
1 files changed, 130 insertions(+), 0 deletions(-)
create mode 100644
Add API to assign/deassign irqfd to kvm.
Add stub so that users do not have to use
ifdefs.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
kvm-all.c | 19 +++
kvm.h | 10 ++
2 files changed, 29 insertions(+), 0 deletions(-)
diff --git a/kvm-all.c
Support per-vector callbacks for msix mask/unmask.
Will be used for vhost net.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
hw/msix.c | 36 +++-
hw/msix.h |1 +
hw/pci.h |6 ++
3 files changed, 42 insertions(+), 1 deletions(-)
diff --git
Use irqfd when supported by kernel.
This uses msix mask notifiers: when vector is masked, we poll it from
userspace. When it is unmasked, we poll it from kernel.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
hw/virtio-pci.c | 31 +--
1 files changed, 29
Balbir Singh wrote:
* Rik van Riel r...@redhat.com [2010-02-04 08:40:43]:
On 02/03/2010 11:12 PM, Balbir Singh wrote:
* Rik van Rielr...@redhat.com [2010-02-03 16:11:03]:
Currently KVM pretends that pages with EPT mappings never got
accessed. This has some side effects in the VM, like
There are some situations when we're pretty sure the guest will use the
FPU soon. So we can save the churn of going into the guest, finding out
it does want to use the FPU and going out again.
This patch adds preloading of the FPU when it's reasonable.
Signed-off-by: Alexander Graf ag...@suse.de
The Gekko implements an extension called paired singles. When the guest wants
to use that extension, we need to make sure we're not running the host FPU,
because all FPU instructions need to get emulated to accomodate for additional
operations that occur.
This patch adds an hflag to track if
The Gekko has GPRs, SPRs and FPRs like normal PowerPC codes, but
it also has QPRs which are basically single precision only FPU registers
that get used when in paired single mode.
The following patches depend on them being around, so let's add the
definitions early.
Signed-off-by: Alexander Graf
There's a typo in the debug ifdef of the book3s_32 mmu emulation. While trying
to debug something I stumbled across that and wanted to save anyone after me
(or myself later) from having to debug that again.
So let's fix the ifdef.
Signed-off-by: Alexander Graf ag...@suse.de
---
We need to call the ext giveup handlers from code outside of book3s.c.
So let's make it non-static.
Signed-off-by: Alexander Graf ag...@suse.de
---
arch/powerpc/include/asm/kvm_book3s.h |1 +
arch/powerpc/kvm/book3s.c |3 +--
2 files changed, 2 insertions(+), 2 deletions(-)
Emulation of an instruction can have different outcomes. It can succeed,
fail, require MMIO, do funky BookE stuff - or it can just realize something's
odd and will be fixed the next time around.
Exactly that is what EMULATE_AGAIN means. Using that flag we can now tell
the caller that nothing
The one big thing about the Gekko is paired singles.
Paired singles are an extension to the instruction set, that adds 32 single
precision floating point registers (qprs), some SPRs to modify the behavior
of paired singled operations and instructions to deal with qprs to the
instruction set.
To emulate paired single instructions, we need to be able to call FPU
operations from within the kernel. Since we don't want gcc to spill
arbitrary FPU code everywhere, we tell it to use a soft fpu.
Since we know we can really call the FPU in safe areas, let's also add
some calls that we can
When we get a program interrupt we usually don't expect it to perform an
MMIO operation. But why not? When we emulate paired singles, we can end
up loading or storing to an MMIO address - and the handling of those
happens in the program interrupt handler.
So let's teach the program interrupt
The Book3S_32 specifications allows for two instructions to modify segment
registers: mtsrin and mtsr.
Most normal operating systems use mtsrin, because it allows to define which
segment it wants to change using a register. But since I was trying to run
an embedded guest, it turned out to be
BATs didn't work. Well, they did, but only up to BAT3. As soon as we
came to BAT4 the offset calculation was screwed up and we ended up
overwriting BAT0-3.
Fortunately, Linux hasn't been using BAT4+. It's still a good
idea to write correct code though.
Signed-off-by: Alexander Graf ag...@suse.de
With paired singles we have a nifty instruction execution engine. That
engine takes safe and properly cleared FPU opcodes and executes them
directly on the hardware.
Since we can't run off the stack and modifying .bss isn't future-proof
either, the best method seemed to be to vmalloc an
The PowerPC specification always lists bits from MSB to LSB. That is
really confusing when you're trying to write C code, because it fits
in pretty badly with the normal (1 xx) schemes.
So I came up with some nice wrappers that allow to get and set fields
in a u64 with bit numbers exactly as
The guest I was trying to get to run uses the LHA and LHAU instructions.
Those instructions basically do a load, but also sign extend the result.
Since we need to fill our registers by hand when doing MMIO, we also need
to sign extend manually.
This patch implements sign extended MMIO and the
Right now MMIO access can only happen for GPRs and is at most 32 bit wide.
That's actually enough for almost all types of hardware out there.
Unfortunately, the guest I was using used FPU writes to MMIO regions, so
it ended up writing 64 bit MMIOs using FPRs and QPRs.
So let's add code to handle
The Book3S KVM implementation contains some helper functions to load and store
data from and to virtual addresses.
Unfortunately, this helper used to keep the physical address it so nicely
found out for us to itself. So let's change that and make it return the
physical address it resolved.
The Gekko has some SPR values that differ from other PPC core values and
also some additional ones.
Let's add support for them in our mfspr/mtspr emulator.
Signed-off-by: Alexander Graf ag...@suse.de
---
arch/powerpc/include/asm/kvm_book3s.h |1 +
arch/powerpc/include/asm/reg.h|
In an effort to get KVM on PPC more useful for other userspace users than
Qemu, I figured it'd be a nice idea to implement virtualization of the
Gekko CPU.
The Gekko is the CPU used in the GameCube. In a slightly more modern
fashion it lives on in the Wii today.
Using this patch set and a
When we for example get an Altivec interrupt, but our guest doesn't support
altivec, we need to inject a program interrupt, not an altivec interrupt.
The same goes for paired singles. When an altivec interrupt arrives, we're
pretty sure we need to emulate the instruction because it's a paired
Very sorry for bugin' you all, but I have an issue someone may be able
to fix.
I have 3 guests on a single host. This host is using bridged
networking. The guest VMs can talk to the host and any other computer on
the hosts network. They can even get outside to the internet.
Likewise,
the host
On Wed, Feb 03, 2010 at 04:11:03PM -0500, Rik van Riel wrote:
Jeff, does this patch fix the issue you saw a few months ago, with
a 256MB KVM guest in a cgroup limited to 128GB memory?
Hum, let me dust off that workload and give it a shot...
Jeff
--
To
2.6.32-stable review patch. If anyone has any objections, please let us know.
--
From: Glauber Costa glom...@redhat.com
(cherry picked from afbcf7ab8d1bc8c2d04792f6d9e786e0adeb328d)
When we migrate a kvm guest that uses pvclock between two hosts, we may
suffer a large skew.
Hi, Brian.
On Wednesday, 03 February 2010 16:44:28 -0600,
Brian Jackson wrote:
Anthony Liguori wrote:
Are you sure you enabled KVM? Are you sure you are using the KVM
binary and not some QEMU binary that's sitting around. This is one
of those situations where the KVM command you are
On Thu, Feb 04, 2010 at 08:40:43AM -0500, Rik van Riel wrote:
I suspect it won't be very many. I have been monitoring
/proc/meminfo on my system while testing this patch, and
it is quite typical that the size of the inactive anon
list does not change for minutes at a time.
In other words,
On 02/04/2010 03:11 PM, Gleb Natapov wrote:
On Thu, Feb 04, 2010 at 03:05:17PM +0200, Avi Kivity wrote:
On 02/02/2010 10:16 AM, Paolo Bonzini wrote:
On 01/21/2010 02:31 PM, Avi Kivity wrote:
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index feca59f..09207ba 100644
Hello -
This is a topic which has been covered in the past that i'd like to
bump for my own sanity check...
Currently when i boot esx it hangs on loading install.tgz
booting:mbi=0x00010090, entry=0x00100212
Followed by a purple screen of death - #GP Exception(13) in world 0
My config looks
Marcelo Tosatti wrote:
On Thu, Feb 04, 2010 at 04:41:44PM +0100, Jan Kiszka wrote:
Jan Kiszka wrote:
Marcelo Tosatti wrote:
On Thu, Feb 04, 2010 at 01:33:50AM +0100, Jan Kiszka wrote:
Marcelo Tosatti wrote:
On Wed, Feb 03, 2010 at 10:29:45PM +0100, Jan Kiszka wrote:
So far we synchronized
Jan Kiszka wrote:
Marcelo Tosatti wrote:
Unrelated to this problem, won't put_vcpu_events, which is executed
after KVM_SET_GUEST_DEBUG, overwrite any queued debug exceptions?
Good point, SET_GUEST_DEBUG should be last in the writeback for that reason.
Actually, we no longer need the
On 02/02/2010 03:57 AM, Kurt Kiefer wrote:
Hi all,
This is a vague/general question. For some background: I have a reason
(control of IA32_PERF_GLOBAL_CTRL) for loading/saving MSRs on
VM-entry/exit. To get this to work correctly, I made changes to use
the conventional VMX MSR load areas of
On 02/03/2010 04:25 PM, Michael Goldish wrote:
- Uri Lublinu...@redhat.com wrote:
On 02/02/2010 01:48 PM, Lucas Meneghel Rodrigues wrote:
Hi folks:
We're on an effort of streamlining the KVM test experience, by
choosing
sane defaults and helper scripts that can overcome the initial
On 01/28/2010 09:03 PM, Marcelo Tosatti wrote:
A vcpu can be stopped after handling IO in userspace,
but before returning to kernel to finish processing.
Is this strictly needed? If we teach qemu to migrate before executing
the pio request, I think we'll be all right? should work at
Jan Kiszka wrote:
Marcelo Tosatti wrote:
With kvm-autotest the failure is not sporadic (and the above commit
applied): with KVM_SET_GUEST_DEBUG in arch_put_regs all migration
tests fail, without, all of them succeed.
So env-kvm_guest_debug has been zeroed by cpu_x86_init, which means
the
On Thu, Feb 4, 2010 at 5:13 PM, Uri Lublin u...@redhat.com wrote:
On 02/03/2010 04:25 PM, Michael Goldish wrote:
4) Another option is to make winutils.iso available (somewhere on the
web), and
download it in get_started.py (similar to other iso images used by kvm
test).
But isn't there a
On Thu, Feb 4, 2010 at 5:26 PM, Lucas Meneghel Rodrigues l...@redhat.com
wrote:
And I really really want to ship the full winutils.iso. If for some
reason we can't ship VLC, we'll find another windows video capable of
doing theora, which is totally patent unencumbered, so there will be
joy
On Thu, Feb 04, 2010 at 09:16:47PM +0200, Avi Kivity wrote:
On 01/28/2010 09:03 PM, Marcelo Tosatti wrote:
A vcpu can be stopped after handling IO in userspace,
but before returning to kernel to finish processing.
Is this strictly needed? If we teach qemu to migrate before
executing the
On Thu, Feb 04, 2010 at 08:21:08PM +0100, Jan Kiszka wrote:
Jan Kiszka wrote:
Marcelo Tosatti wrote:
With kvm-autotest the failure is not sporadic (and the above commit
applied): with KVM_SET_GUEST_DEBUG in arch_put_regs all migration
tests fail, without, all of them succeed.
So
On 02/03/2010 04:47 PM, Michael Goldish wrote:
- Uri Lublinu...@redhat.com wrote:
Signed-off-by: Uri Lublinu...@redhat.com
---
client/tests/kvm/tests/timedrift.py |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/client/tests/kvm/tests/timedrift.py
On 02/04/2010 11:36 PM, Marcelo Tosatti wrote:
On Thu, Feb 04, 2010 at 09:16:47PM +0200, Avi Kivity wrote:
On 01/28/2010 09:03 PM, Marcelo Tosatti wrote:
A vcpu can be stopped after handling IO in userspace,
but before returning to kernel to finish processing.
Is this
On Thu, Feb 04, 2010 at 11:46:25PM +0200, Avi Kivity wrote:
On 02/04/2010 11:36 PM, Marcelo Tosatti wrote:
On Thu, Feb 04, 2010 at 09:16:47PM +0200, Avi Kivity wrote:
On 01/28/2010 09:03 PM, Marcelo Tosatti wrote:
A vcpu can be stopped after handling IO in userspace,
but before returning to
Am 04.02.2010 um 18:56 schrieb Brian Kelly kelly.bri...@gmail.com:
Hello -
This is a topic which has been covered in the past that i'd like to
bump for my own sanity check...
Currently when i boot esx it hangs on loading install.tgz
booting:mbi=0x00010090, entry=0x00100212
Followed by a purple
On Thu, Feb 04, 2010 at 08:12:07PM -0200, Marcelo Tosatti wrote:
On 01/28/2010 09:03 PM, Marcelo Tosatti wrote:
A vcpu can be stopped after handling IO in userspace,
but before returning to kernel to finish processing.
Is this strictly needed? If we teach qemu to migrate before
Similarly as we're doing on windows, make sure the vm
acquires an IP address before proceeding with the
rest of post install.
Signed-off-by: Lucas Meneghel Rodrigues l...@redhat.com
---
client/tests/kvm/unattended/Fedora-11.ks |1 +
client/tests/kvm/unattended/Fedora-12.ks |1 +
Hi,
On my centos x84_64 machine I have KVM installed.
kvm-83-105.el5_4.13
kmod-kvm-83-105.el5_4.13
And I have an ubuntu and a fedora 10 VMs running on it. On the host
OS I have added below configurations video capture card.
osprey eeprom: card=89 name=Osprey 210/220/230 serial=9201206
Please
Hi Liang,
Thanks for your advice and link.
Host - Debian 5.0
KVM
libvirt
run kvm-nbd VM/vm30.qcow2, modprobe nbd
nbd-client localhost 1024 /dev/nbd0
then you can use /dev/nbd0 as a block device like /dev/sda
I've write a little essay on how to install Debian on kvm image, FYI:
Hi,
thanks for that! I've running a lot of hosts still running with
kernel 2.6.30 and KVM 88 without problems. It seems that
all qemu-kvm versions = 0.11.0 have this problem incl.
the latest 0.12.2. So if one of the enterprise distributions
will choose one of this versions for inclusion in there
We need to call the ext giveup handlers from code outside of book3s.c.
So let's make it non-static.
Signed-off-by: Alexander Graf ag...@suse.de
---
arch/powerpc/include/asm/kvm_book3s.h |1 +
arch/powerpc/kvm/book3s.c |3 +--
2 files changed, 2 insertions(+), 2 deletions(-)
The one big thing about the Gekko is paired singles.
Paired singles are an extension to the instruction set, that adds 32 single
precision floating point registers (qprs), some SPRs to modify the behavior
of paired singled operations and instructions to deal with qprs to the
instruction set.
When we get a program interrupt we usually don't expect it to perform an
MMIO operation. But why not? When we emulate paired singles, we can end
up loading or storing to an MMIO address - and the handling of those
happens in the program interrupt handler.
So let's teach the program interrupt
BATs didn't work. Well, they did, but only up to BAT3. As soon as we
came to BAT4 the offset calculation was screwed up and we ended up
overwriting BAT0-3.
Fortunately, Linux hasn't been using BAT4+. It's still a good
idea to write correct code though.
Signed-off-by: Alexander Graf ag...@suse.de
There are some situations when we're pretty sure the guest will use the
FPU soon. So we can save the churn of going into the guest, finding out
it does want to use the FPU and going out again.
This patch adds preloading of the FPU when it's reasonable.
Signed-off-by: Alexander Graf ag...@suse.de
The PowerPC specification always lists bits from MSB to LSB. That is
really confusing when you're trying to write C code, because it fits
in pretty badly with the normal (1 xx) schemes.
So I came up with some nice wrappers that allow to get and set fields
in a u64 with bit numbers exactly as
The guest I was trying to get to run uses the LHA and LHAU instructions.
Those instructions basically do a load, but also sign extend the result.
Since we need to fill our registers by hand when doing MMIO, we also need
to sign extend manually.
This patch implements sign extended MMIO and the
The Gekko has some SPR values that differ from other PPC core values and
also some additional ones.
Let's add support for them in our mfspr/mtspr emulator.
Signed-off-by: Alexander Graf ag...@suse.de
---
arch/powerpc/include/asm/kvm_book3s.h |1 +
arch/powerpc/include/asm/reg.h|
79 matches
Mail list logo