On Thu, 2010-03-11 at 09:50 +0200, Avi Kivity wrote:
On 03/11/2010 09:46 AM, Sheng Yang wrote:
On Thursday 11 March 2010 15:36:01 Avi Kivity wrote:
On 03/11/2010 09:20 AM, Sheng Yang wrote:
Currently we can only get the cpu_stat of whole guest as one. This patch
enhanced
On Thursday 11 March 2010 15:58:12 Avi Kivity wrote:
On 03/11/2010 09:52 AM, Sheng Yang wrote:
I think we have already suffered enough timer issues due to this(e.g. I
can't boot up well on 2.6.18 kernel)...
2.6.18 as guest or as host?
Guest
I have kept --no-hpet in my setup for
On 03/11/2010 10:23 AM, Sheng Yang wrote:
I have kept --no-hpet in my setup for
months...
Any details about the problems? HPET is important to some guests.
Seems like HPET reaction is too slow to satisfy some guests(for it would
replace PIT).
Here is the thread last time.
On Thu, Mar 11, 2010 at 10:28:12AM +0200, Avi Kivity wrote:
On 03/11/2010 10:23 AM, Sheng Yang wrote:
I have kept --no-hpet in my setup for
months...
Any details about the problems? HPET is important to some guests.
Seems like HPET reaction is too slow to satisfy some guests(for it would
On 03/02/2010 02:14 AM, Marcelo Tosatti wrote:
On Mon, Mar 01, 2010 at 07:10:30PM +0100, Jan Kiszka wrote:
This grand cleanup drops all reset and vmsave/load related
synchronization points in favor of four(!) generic hooks:
- cpu_synchronize_all_states in qemu_savevm_state_complete
On 03/09/2010 03:53 AM, Marcelo Tosatti wrote:
Signed-off-by: Marcelo Tosattimtosa...@redhat.com
Index: qemu-kvm-uq/target-i386/helper.c
===
--- qemu-kvm-uq.orig/target-i386/helper.c
+++ qemu-kvm-uq/target-i386/helper.c
@@ -1176,6
On Thursday 11 March 2010 16:31:57 Gleb Natapov wrote:
On Thu, Mar 11, 2010 at 10:28:12AM +0200, Avi Kivity wrote:
On 03/11/2010 10:23 AM, Sheng Yang wrote:
I have kept --no-hpet in my setup for
months...
Any details about the problems? HPET is important to some guests.
Seems
On Wed, 2010-03-10 at 10:42 -0300, Lucas Meneghel Rodrigues wrote:
On Wed, Mar 10, 2010 at 8:45 AM, Lucas Meneghel Rodrigues
l...@redhat.com wrote:
From: yogi anant...@linux.vnet.ibm.com
Adds new entry SUSE in test_base file for sles and
contains autoinst file for doing unatteneded
On 03/09/2010 03:53 AM, Marcelo Tosatti wrote:
Port qemu-kvm's KVM_EXIT_INTERNAL_ERROR handling to upstream.
Signed-off-by: Marcelo Tosattimtosa...@redhat.com
Index: qemu-kvm/kvm-all.c
===
--- qemu-kvm.orig/kvm-all.c
+++
On 03/09/2010 03:53 AM, Marcelo Tosatti wrote:
From: Sheng Yangsh...@linux.intel.com
If we use larger BIOS image than current 256KB, we would need move reserved
TSS and EPT identity mapping pages. Currently TSS support this, but not
EPT.
Signed-off-by: Marcelo Tosattimtosa...@redhat.com
On Thu, Mar 11, 2010 at 04:38:48PM +0800, Sheng Yang wrote:
On Thursday 11 March 2010 16:31:57 Gleb Natapov wrote:
On Thu, Mar 11, 2010 at 10:28:12AM +0200, Avi Kivity wrote:
On 03/11/2010 10:23 AM, Sheng Yang wrote:
I have kept --no-hpet in my setup for
months...
Any details
On 03/11/2010 10:42 AM, Gleb Natapov wrote:
On Thu, Mar 11, 2010 at 04:38:48PM +0800, Sheng Yang wrote:
On Thursday 11 March 2010 16:31:57 Gleb Natapov wrote:
On Thu, Mar 11, 2010 at 10:28:12AM +0200, Avi Kivity wrote:
On 03/11/2010 10:23 AM, Sheng Yang wrote:
I
Reading rip is expensive on vmx, so move it inside the tracepoint so we only
incur the cost if tracing is enabled.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/svm.c |2 +-
arch/x86/kvm/trace.h |6 +++---
arch/x86/kvm/vmx.c |2 +-
3 files changed, 5 insertions(+), 5
On Thursday 11 March 2010 15:50:54 Avi Kivity wrote:
On 03/11/2010 09:46 AM, Sheng Yang wrote:
On Thursday 11 March 2010 15:36:01 Avi Kivity wrote:
On 03/11/2010 09:20 AM, Sheng Yang wrote:
Currently we can only get the cpu_stat of whole guest as one. This
patch enhanced cpu_stat with
On 03/11/2010 08:55 AM, Avi Kivity wrote:
On 03/10/2010 11:30 PM, Luiz Capitulino wrote:
2. Do we have kvm-specific projects? Can they be part of the QEMU project
or do we need a different mentoring organization for it?
Something really interesting is kvm-assisted tcg. I'm afraid it's a bit
hi,
I have followed the windows guest debugging procedure from
http://www.linux-kvm.org/page/WindowsGuestDrivers/GuestDebugging. And
it works when I start two guests and bind tcp port to guest serial
port, but it is really slow.
And if I use -serial /dev/ttyS1 for the guest debugging target, I
Hi, all.
Recently Debian has published the DSA-2010-1 [1] where the following
vulnerabilities are fixed:
* CVE-2010-0298 CVE-2010-0306 (Gleb Natapov)
* CVE-2010-0309 (Marcelo Tosatti)
* CVE-2010-0419 (Paolo Bonzini)
I'm using Linux 2.6.32.3 with qemu-kvm-0.12.1.2 and I would like to know
if it
Gleb Natapov wrote:
On Wed, Mar 10, 2010 at 07:08:31PM +0900, Takuya Yoshikawa wrote:
Gleb Natapov wrote:
Entering guest from time to time will not change semantics of the
processor (if code is not modified under processor's feet at least).
Currently we reenter guest mode after each iteration
On Thu, Mar 11, 2010 at 06:58:14PM +0900, Takuya Yoshikawa wrote:
Gleb Natapov wrote:
On Wed, Mar 10, 2010 at 07:08:31PM +0900, Takuya Yoshikawa wrote:
Gleb Natapov wrote:
Entering guest from time to time will not change semantics of the
processor (if code is not modified under processor's
These are guest-triggerable.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/x86.c | 27 ---
1 files changed, 0 insertions(+), 27 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 169b1b3..66609f6 100644
--- a/arch/x86/kvm/x86.c
+++
On Thu, Mar 11, 2010 at 10:46:06AM +0200, Avi Kivity wrote:
On 03/11/2010 10:42 AM, Gleb Natapov wrote:
On Thu, Mar 11, 2010 at 04:38:48PM +0800, Sheng Yang wrote:
On Thursday 11 March 2010 16:31:57 Gleb Natapov wrote:
On Thu, Mar 11, 2010 at 10:28:12AM +0200, Avi Kivity wrote:
On 03/11/2010
On Thu, Mar 11, 2010 at 08:47:21AM +0200, Avi Kivity wrote:
tdp is still used in both cases, so that name is confusing. We
could call it mmu.direct_map (and set it for real mode?) or
mmu.virtual_map (with the opposite sense). Or something.
I like the mmu.direct_map name. Its a good term
Avi Kivity wrote:
diff --git a/arch/x86/kvm/trace.h b/arch/x86/kvm/trace.h
index b75efef..3cf9547 100644
--- a/arch/x86/kvm/trace.h
+++ b/arch/x86/kvm/trace.h
@@ -182,8 +182,8 @@ TRACE_EVENT(kvm_apic,
* Tracepoint for kvm guest exit:
*/
TRACE_EVENT(kvm_exit,
- TP_PROTO(unsigned
Often an exception can help point out where things start to go wrong.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/trace.h | 32
arch/x86/kvm/x86.c |3 +++
2 files changed, 35 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/trace.h
On 03/11/2010 01:03 PM, Takuya Yoshikawa wrote:
Avi Kivity wrote:
diff --git a/arch/x86/kvm/trace.h b/arch/x86/kvm/trace.h
index b75efef..3cf9547 100644
--- a/arch/x86/kvm/trace.h
+++ b/arch/x86/kvm/trace.h
@@ -182,8 +182,8 @@ TRACE_EVENT(kvm_apic,
* Tracepoint for kvm guest exit:
On 03/11/2010 04:31 PM, pagee...@freemail.hu wrote:
On 11 Mar 2010 at 8:44, Avi Kivity wrote:
On 03/10/2010 06:17 PM, Antoine Martin wrote:
Hi,
I've updated my host kernel headers to 2.6.33, rebuilt glibc (and the
base system), rebuilt kvm.
... and now I get hundreds of those in
On Thu, Mar 11, 2010 at 01:03:12PM +0200, Avi Kivity wrote:
Often an exception can help point out where things start to go wrong.
Adding guest rip where exception happened will be useful too.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/trace.h | 32
On 11 Mar 2010 at 8:44, Avi Kivity wrote:
On 03/10/2010 06:17 PM, Antoine Martin wrote:
Hi,
I've updated my host kernel headers to 2.6.33, rebuilt glibc (and the
base system), rebuilt kvm.
... and now I get hundreds of those in dmesg on the host when I start
a guest kernel that
On 11.03.2010, at 10:43, Paolo Bonzini wrote:
On 03/11/2010 08:55 AM, Avi Kivity wrote:
On 03/10/2010 11:30 PM, Luiz Capitulino wrote:
2. Do we have kvm-specific projects? Can they be part of the QEMU project
or do we need a different mentoring organization for it?
Something really
On 03/11/2010 01:09 PM, Gleb Natapov wrote:
On Thu, Mar 11, 2010 at 01:03:12PM +0200, Avi Kivity wrote:
Often an exception can help point out where things start to go wrong.
Adding guest rip where exception happened will be useful too.
You get that from the previous kvm_exit
On 03/11/2010 01:25 PM, Alexander Graf wrote:
The list is also still missing a lot of potential mentors for the listed ideas.
Let me propose some here :)
== Shared memory transport between guest(s) and host ==
Sounds like Avi would be a good fit. I'm pretty unknowledgeable when it comes
to
On 03/11/2010 12:23 PM, Gleb Natapov wrote:
If the problem it due to lost ticks reinjection may solve it, but only
partially.
What if IO thread haven't run even once during the time vcpu did clock
source check? IIRC sometimes we trigger this even with in kernel PIT.
That is true.
On 11.03.2010, at 12:54, Avi Kivity wrote:
On 03/11/2010 01:25 PM, Alexander Graf wrote:
The list is also still missing a lot of potential mentors for the listed
ideas. Let me propose some here :)
== Shared memory transport between guest(s) and host ==
Sounds like Avi would be a good
On 03/11/2010 01:56 PM, Avi Kivity wrote:
On 03/11/2010 12:23 PM, Gleb Natapov wrote:
If the problem it due to lost ticks reinjection may solve it, but
only partially.
What if IO thread haven't run even once during the time vcpu did clock
source check? IIRC sometimes we trigger this even
On 03/11/2010 01:56 PM, Alexander Graf wrote:
On 11.03.2010, at 12:54, Avi Kivity wrote:
On 03/11/2010 01:25 PM, Alexander Graf wrote:
The list is also still missing a lot of potential mentors for the listed ideas.
Let me propose some here :)
== Shared memory transport between
On 11.03.2010, at 12:58, Avi Kivity wrote:
On 03/11/2010 01:56 PM, Alexander Graf wrote:
On 11.03.2010, at 12:54, Avi Kivity wrote:
On 03/11/2010 01:25 PM, Alexander Graf wrote:
The list is also still missing a lot of potential mentors for the listed
ideas. Let me propose some
On 03/11/2010 12:25 PM, Alexander Graf wrote:
== Write a C QMP library based on QEMU JSON and QMP code ==
Suggested by Anthony, mentored by Anthony?:) Possible other
candidates are Luiz and Kraxel I guess? I haven't really tracked QMP
that much.
If you guys are okay with this, I think I
On 11 Mar 2010 at 8:44, Avi Kivity wrote:
On 03/10/2010 06:17 PM, Antoine Martin wrote:
Hi,
I've updated my host kernel headers to 2.6.33, rebuilt glibc (and the
base system), rebuilt kvm.
... and now I get hundreds of those in dmesg on the host when I start
a guest kernel that
On 03/11/2010 02:03 PM, Alexander Graf wrote:
Another idea I'd have would be upstream integration (and cleanup) of the ARM
KVM port: https://wiki.ncl.cs.columbia.edu/wiki/index.php/AndroidVirt:MainPage
Huh, didn't even know this thing existed. Definitely something to merge.
--
error
Hi all,
using the Default VGA settings Windows XP detects an unknown VGA Device,
but everything is fine, Display settings are ok. But how can I setup my XP
to detect this virtual graphics board correctly? I just want to continue
using this setting but with no complaints in the system/hardware
On 03/10/2010 07:41 PM, Paul Brook wrote:
You're much better off using a bulk-data transfer API that relaxes
coherency requirements. IOW, shared memory doesn't make sense for TCG
Rather, tcg doesn't make sense for shared memory smp. But we knew that
already.
In think TCG SMP is a
On 03/10/2010 11:30 PM, Luiz Capitulino wrote:
2. Do we have kvm-specific projects? Can they be part of the QEMU project
or do we need a different mentoring organization for it?
Complete big real mode emulation. I'll add this.
--
error compiling committee.c: too many arguments to
On Thu, Mar 11, 2010 at 01:51:30PM +0200, Avi Kivity wrote:
On 03/11/2010 01:09 PM, Gleb Natapov wrote:
On Thu, Mar 11, 2010 at 01:03:12PM +0200, Avi Kivity wrote:
Often an exception can help point out where things start to go wrong.
Adding guest rip where exception happened will be useful
On 03/11/2010 02:31 PM, Gleb Natapov wrote:
On Thu, Mar 11, 2010 at 01:51:30PM +0200, Avi Kivity wrote:
On 03/11/2010 01:09 PM, Gleb Natapov wrote:
On Thu, Mar 11, 2010 at 01:03:12PM +0200, Avi Kivity wrote:
Often an exception can help point out where things start to go
On Thursday 11 March 2010, Avi Kivity wrote:
A totally different option that avoids this whole problem would
be to separate the signalling from the shared memory, making the
PCI shared memory device a trivial device with a single memory BAR,
and using something a higher-level concept like
On Thu, 11 Mar 2010 10:43:09 +0100
Paolo Bonzini pbonz...@redhat.com wrote:
On 03/11/2010 08:55 AM, Avi Kivity wrote:
On 03/10/2010 11:30 PM, Luiz Capitulino wrote:
2. Do we have kvm-specific projects? Can they be part of the QEMU project
or do we need a different mentoring organization
On 11.03.2010, at 13:59, Luiz Capitulino wrote:
On Thu, 11 Mar 2010 10:43:09 +0100
Paolo Bonzini pbonz...@redhat.com wrote:
On 03/11/2010 08:55 AM, Avi Kivity wrote:
On 03/10/2010 11:30 PM, Luiz Capitulino wrote:
2. Do we have kvm-specific projects? Can they be part of the QEMU project
On 03/11/2010 02:57 PM, Arnd Bergmann wrote:
On Thursday 11 March 2010, Avi Kivity wrote:
A totally different option that avoids this whole problem would
be to separate the signalling from the shared memory, making the
PCI shared memory device a trivial device with a single memory BAR,
and
On Wed, 2010-03-10 at 18:30 -0300, Luiz Capitulino wrote:
Hi there,
Our wiki page for the Summer of Code 2010 is doing quite well:
http://wiki.qemu.org/Google_Summer_of_Code_2010
Just to let you guys know that I'm going to give a talk at the local
university (Unicamp) about kvm autotest,
On Thu, 11 Mar 2010 12:25:24 +0100
Alexander Graf ag...@suse.de wrote:
== Write a C QMP library based on QEMU JSON and QMP code ==
Suggested by Anthony, mentored by Anthony? :) Possible other candidates are
Luiz and Kraxel I guess? I haven't really tracked QMP that much.
I didn't
On Thu, 11 Mar 2010 13:09:37 +0100
Paolo Bonzini pbonz...@redhat.com wrote:
On 03/11/2010 12:25 PM, Alexander Graf wrote:
== Write a C QMP library based on QEMU JSON and QMP code ==
Suggested by Anthony, mentored by Anthony?:) Possible other
candidates are Luiz and Kraxel I guess? I
On Thu, 11 Mar 2010 14:00:46 +0100
Alexander Graf ag...@suse.de wrote:
On 11.03.2010, at 13:59, Luiz Capitulino wrote:
On Thu, 11 Mar 2010 10:43:09 +0100
Paolo Bonzini pbonz...@redhat.com wrote:
On 03/11/2010 08:55 AM, Avi Kivity wrote:
On 03/10/2010 11:30 PM, Luiz Capitulino
Hi Avi,
I had missed to include some important syslog lines from the
host system. See attachment.
On 03/10/10 14:15, Avi Kivity wrote:
You have tons of iowait time, indicating an I/O bottleneck.
Is this disk IO or network IO? The rsync session puts a
high load on both, but actually I do
On Thursday 11 March 2010, Avi Kivity wrote:
That would be much slower. The current scheme allows for an
ioeventfd/irqfd short circuit which allows one guest to interrupt
another without involving their qemus at all.
Yes, the serial line approach would be much slower, but my point
On Thu, 11 Mar 2010, Nick Piggin wrote:
On Thu, Mar 11, 2010 at 03:10:47AM +, Jamie Lokier wrote:
Paul Brook wrote:
In a cross environment that becomes extremely hairy. For example the
x86
architecture effectively has an implicit write barrier before every
store, and
It doesn't, and there are often multiple shadow pages per guest page,
distinguished by their sp-role field.
Oh, great! Does this mean that there is already a mechanism for
synchronizing all shadow pages shadowing the same guest when such a
guest page changes?
Marek
--
To unsubscribe from
On Thu, Mar 11, 2010 at 5:03 AM, Alexander Graf ag...@suse.de wrote:
On 11.03.2010, at 12:58, Avi Kivity wrote:
On 03/11/2010 01:56 PM, Alexander Graf wrote:
On 11.03.2010, at 12:54, Avi Kivity wrote:
On 03/11/2010 01:25 PM, Alexander Graf wrote:
The list is also still missing a lot of
On Thu, Mar 11, 2010 at 09:58:12AM +0200, Avi Kivity wrote:
On 03/11/2010 09:52 AM, Sheng Yang wrote:
I think we have already suffered enough timer issues due to this(e.g. I can't
boot up well on 2.6.18 kernel)...
2.6.18 as guest or as host?
I have kept --no-hpet in my setup for
On Thu, Mar 11, 2010 at 10:35:21AM +0200, Avi Kivity wrote:
On 03/09/2010 03:53 AM, Marcelo Tosatti wrote:
Signed-off-by: Marcelo Tosattimtosa...@redhat.com
Index: qemu-kvm-uq/target-i386/helper.c
===
---
On Thu, Mar 11, 2010 at 10:32:50AM +0200, Avi Kivity wrote:
On 03/02/2010 02:14 AM, Marcelo Tosatti wrote:
On Mon, Mar 01, 2010 at 07:10:30PM +0100, Jan Kiszka wrote:
This grand cleanup drops all reset and vmsave/load related
synchronization points in favor of four(!) generic hooks:
-
Bugs item #2968899, was opened at 2010-03-11 14:31
Message generated for change (Tracker Item Submitted) made by high33
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2968899group_id=180599
Please note that this message will contain a full copy of the
Bugs item #2968899, was opened at 2010-03-11 14:31
Message generated for change (Comment added) made by high33
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2968899group_id=180599
Please note that this message will contain a full copy of the comment
On Thu, Mar 04, 2010 at 04:58:20PM +0100, Joerg Roedel wrote:
On Thu, Mar 04, 2010 at 11:42:55AM -0300, Marcelo Tosatti wrote:
On Wed, Mar 03, 2010 at 08:12:03PM +0100, Joerg Roedel wrote:
Hi,
here are the patches that implement nested paging support for nested
svm. They are
Ignore access permissions while patching hypercall instructions.
Otherwise KVM injects a page fault when trying to patch vmcall
on read-only text regions:
Freeing initrd memory: 8843k freed
Freeing unused kernel memory: 660k freed
Write protecting the kernel text: 4780k
Write protecting the
With this patch applied on top, I was able to boot my guest on a AMD host
system.
Marcelo Tosatti wrote:
Ignore access permissions while patching hypercall instructions.
Otherwise KVM injects a page fault when trying to patch vmcall
on read-only text regions:
Freeing initrd memory: 8843k
Avi Kivity wrote:
On 03/10/2010 11:30 PM, Luiz Capitulino wrote:
2. Do we have kvm-specific projects? Can they be part of the QEMU project
or do we need a different mentoring organization for it?
Something really interesting is kvm-assisted tcg. I'm afraid it's a bit
too
The ioctl KVM_IA64_VCPU_GET_STACK does not set the error code if
copy_to_user() fail, and 0 will be return, we should use -EFAULT
instead of 0 in this case, so this patch fixed it.
Signed-off-by: Wei Yongjun yj...@cn.fujitsu.com
---
arch/ia64/kvm/kvm-ia64.c |4 +++-
1 files changed, 3
If no irq chip in kernel, ioctl KVM_IRQ_LINE will return -EFAULT.
But I see in other place such as KVM_[GET|SET]IRQCHIP, -ENXIO is
return. So this patch used -ENXIO instead of -EFAULT.
Signed-off-by: Wei Yongjun yj...@cn.fujitsu.com
---
arch/x86/kvm/x86.c |2 ++
1 files changed, 2
If no irq chip in kernel, ioctl KVM_IRQ_LINE will return -EFAULT.
But I see in other place such as KVM_[GET|SET]IRQCHIP, -ENXIO is
return. So this patch used -ENXIO instead of -EFAULT.
Signed-off-by: Wei Yongjun yj...@cn.fujitsu.com
---
arch/ia64/kvm/kvm-ia64.c |2 ++
1 files changed, 2
Wake up iothread when buffers are consumed.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: qemu-ioworker/hw/virtio-serial-bus.c
===
--- qemu-ioworker.orig/hw/virtio-serial-bus.c
+++ qemu-ioworker/hw/virtio-serial-bus.c
@@
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
This can be used later to introduce generic iothread workers.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: qemu-ioworker/async.c
===
--- qemu-ioworker.orig/async.c
+++ qemu-ioworker/async.c
@@ -180,7 +180,7 @@ void
kvm_coalesced_mmio_init() keeps to hold the addresses of a coalesced mmio
ring page and dev even after it has freed them.
This may trigger problems, e.g., if we call kvm_coalesced_mmio_free() in
kvm_destroy_vm() or kvm_vm_ioctl_register_coalesced_mmio() afterward.
This patch avoids such problems
Takuya Yoshikawa wrote:
kvm_coalesced_mmio_init() keeps to hold the addresses of a coalesced mmio
ring page and dev even after it has freed them.
This may trigger problems, e.g., if we call kvm_coalesced_mmio_free() in
kvm_destroy_vm() or kvm_vm_ioctl_register_coalesced_mmio() afterward.
If coalesced_mmio init fail, the kvm-coalesced_mmio_ring will be set
to NULL. If so, we should return VM_FAULT_SIGBUS in kvm_vcpu_fault()
even if vmf-pgoff == KVM_COALESCED_MMIO_PAGE_OFFSET.
Signed-off-by: Wei Yongjun yj...@cn.fujitsu.com
---
virt/kvm/kvm_main.c |3 ++-
1 files changed, 2
Wei Yongjun wrote:
Takuya Yoshikawa wrote:
kvm_coalesced_mmio_init() keeps to hold the addresses of a coalesced mmio
ring page and dev even after it has freed them.
This may trigger problems, e.g., if we call kvm_coalesced_mmio_free() in
kvm_destroy_vm() or
Wei Yongjun wrote:
If coalesced_mmio init fail, the kvm-coalesced_mmio_ring will be set
to NULL. If so, we should return VM_FAULT_SIGBUS in kvm_vcpu_fault()
even if vmf-pgoff == KVM_COALESCED_MMIO_PAGE_OFFSET.
Signed-off-by: Wei Yongjun yj...@cn.fujitsu.com
---
virt/kvm/kvm_main.c |3 ++-
This patch change the errno of ioctl KVM_[UN]REGISTER_COALESCED_MMIO
from -EINVAL to -ENXIO if no coalesced mmio dev exists.
Signed-off-by: Wei Yongjun yj...@cn.fujitsu.com
---
virt/kvm/coalesced_mmio.c |4 ++--
virt/kvm/kvm_main.c |2 --
2 files changed, 2 insertions(+), 4
Hi,
I'm trying to use ioeventfd/irqfds for my shared memory patch. I
followed the usage in the vhost-net patches to see how it's setup for
virtio-pci and tried to follow it as closely as I could. Despite the
call to kvm_vm_ioctl() returning 0, any writes to the assigned 4-byte
memory area do not
On (Thu) Mar 11 2010 [23:45:51], Marcelo Tosatti wrote:
Wake up iothread when buffers are consumed.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: qemu-ioworker/hw/virtio-serial-bus.c
===
---
On Thu, Mar 11, 2010 at 06:16:05PM -0300, Marcelo Tosatti wrote:
Ignore access permissions while patching hypercall instructions.
Otherwise KVM injects a page fault when trying to patch vmcall
on read-only text regions:
Freeing initrd memory: 8843k freed
Freeing unused kernel memory:
On Fri, Mar 12, 2010 at 07:56:00AM +0200, Gleb Natapov wrote:
On Thu, Mar 11, 2010 at 06:16:05PM -0300, Marcelo Tosatti wrote:
Ignore access permissions while patching hypercall instructions.
Otherwise KVM injects a page fault when trying to patch vmcall
on read-only text regions:
On 03/11/2010 10:58 PM, Marcelo Tosatti wrote:
Can't you translate l2_gpa - l1_gpa walking the current l1 nested
pagetable, and pass that to the kvm tdp fault path (with the correct
context setup)?
If I understand your suggestion correctly, I think thats exactly whats
done in the
On 03/04/2010 05:58 PM, Joerg Roedel wrote:
You probably need to include a flag in base_role to differentiate
between l1 / l2 shadow tables (say if they use the same cr3 value).
Not sure if this is necessary. It may be necessary when large pages come
into play. Otherwise the host npt
On 03/12/2010 07:08 AM, Cam Macdonell wrote:
+s-ivshmem_mmio_io_addr = cpu_register_io_memory(ivshmem_mmio_read,
+ivshmem_mmio_write, s);
+/* region for registers*/
+pci_register_bar(d-dev, 0, 0x100,
+
This version may be better.
Thanks,
Takuya
===
kvm_coalesced_mmio_init() keeps to hold the addresses of a coalesced mmio
ring page and dev even after it has freed them.
Also, if this function fails, though it must be rare, it seems to be
suggesting the system's serious state.
This patch
Takuya Yoshikawa wrote:
This version may be better.
Thanks,
Takuya
===
kvm_coalesced_mmio_init() keeps to hold the addresses of a coalesced mmio
ring page and dev even after it has freed them.
Also, if this function fails, though it must be rare, it seems to be
suggesting the system's
Wei Yongjun wrote:
Takuya Yoshikawa wrote:
This version may be better.
Thanks,
Takuya
===
kvm_coalesced_mmio_init() keeps to hold the addresses of a coalesced mmio
ring page and dev even after it has freed them.
Also, if this function fails, though it must be rare, it seems to be
88 matches
Mail list logo