From: Kay, Allen M [EMAIL PROTECTED]
This patch includes the functions to support VT-d for passthrough
devices.
[Ben: fixed memory pinning]
Signed-off-by: Kay, Allen M [EMAIL PROTECTED]
Signed-off-by: Weidong Han [EMAIL PROTECTED]
Signed-off-by: Ben-Ami Yassour [EMAIL PROTECTED]
---
From: Kay, Allen M [EMAIL PROTECTED]
This patch extends the VT-d driver to support KVM
[Ben: fixed memory pinning]
Signed-off-by: Kay, Allen M [EMAIL PROTECTED]
Signed-off-by: Weidong Han [EMAIL PROTECTED]
Signed-off-by: Ben-Ami Yassour [EMAIL PROTECTED]
---
drivers/pci/dmar.c
Cool!
Does it now happen that qemu no longer wakes up every 10ms? If not,
please try to make sure it happens, that would eventually fix that power
leak :)
Samuel
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at
On Wed, 2008-07-09 at 10:49 -0500, Anthony Liguori wrote:
Ben-Ami Yassour wrote:
From: Kay, Allen M [EMAIL PROTECTED]
This patch includes the functions to support VT-d for passthrough
devices.
[Ben: fixed memory pinning]
Signed-off-by: Kay, Allen M [EMAIL PROTECTED]
ציטוט Sukanto Ghosh:
Can anyone answer these queries regarding KSM ?
How does KSM offers its services through the /dev/ksm device ?
ioctls
Are every guest pages scanned in KVM while using KSM or page-scanning
and sharing is triggered on some event (low memory, etc) ?
no, the scanning
On Thursday 10 July 2008 17:14:42 Ben-Ami Yassour wrote:
From: Kay, Allen M [EMAIL PROTECTED]
This patch includes the functions to support VT-d for passthrough
devices.
[Ben: fixed memory pinning]
Signed-off-by: Kay, Allen M [EMAIL PROTECTED]
Signed-off-by: Weidong Han [EMAIL PROTECTED]
On Thursday 10 July 2008 17:51:53 Ben-Ami Yassour wrote:
On Thu, 2008-07-10 at 17:30 +0800, Yang, Sheng wrote:
On Thursday 10 July 2008 17:14:42 Ben-Ami Yassour wrote:
From: Kay, Allen M [EMAIL PROTECTED]
This patch includes the functions to support VT-d for
passthrough devices.
On Wednesday 09 July 2008 23:03:19 Hollis Blanchard wrote:
On Wed, 2008-07-09 at 11:17 +0200, Christian Ehrhardt wrote:
So the question that is left before changing that is, if the
original author had something special in mind chosing cycles
here. I added Eric on CC for that.
I wait
From: Christian Ehrhardt [EMAIL PROTECTED]
This patch adds the handling of the ppc instruction emulation trace records.
Due to the fact that those are more complex than the classic formats file
way this patch adds a check of the event id and maps to the internal handler
function if needed (other
From: Christian Ehrhardt [EMAIL PROTECTED]
Chaning kvmtrace code to use timestamp and add powerpc support.
This is the revised series including the feedback from the earlier submission
this week. I now also added the userspace changes which completes the series.
The series contains nine patches
From: Christian Ehrhardt [EMAIL PROTECTED]
From: Jerone Young [EMAIL PROTECTED]
This patch fixes kvmtrace use on big endian systems. When using bit fields the
compiler will lay data out in the wrong order expected when laid down into a
file.
This fixes it by using one variable instead of using
From: Christian Ehrhardt [EMAIL PROTECTED]
Usually people don't want to read thousands of trace log lines to interpret
the data, a condensed statistic about the traced events is usually better
to read.
This patch adds a new command line switch -s that tells kvmtrace_format to
generate statistics
Doesn't KSM notifies KVM about the shared pages so that KVM can update
its sptes accordingly or is it done by KSM itself ?
when using kvm, mmu notifiers is a must for ksm, (mmu notifiers update kvm
about the changes in the host page table)
What about KSM being used by someone other than
ציטוט Sukanto Ghosh:
Doesn't KSM notifies KVM about the shared pages so that KVM can update
its sptes accordingly or is it done by KSM itself ?
when using kvm, mmu notifiers is a must for ksm, (mmu notifiers update kvm
about the changes in the host page table)
What about KSM
got it. thanks
On Fri, Jul 11, 2008 at 12:50 AM, Izik Eidus [EMAIL PROTECTED] wrote:
ציטוט Sukanto Ghosh:
Doesn't KSM notifies KVM about the shared pages so that KVM can update
its sptes accordingly or is it done by KSM itself ?
when using kvm, mmu notifiers is a must for ksm, (mmu
Yang, Sheng wrote:
On Wednesday 09 July 2008 02:29:44 Glauber Costa wrote:
clflush is a non-privileged instruction that flushes the cacheline
given by its parameter, in terms of linear address. As it is
non-privileged, it is quite tricky, because a guest doing clflush
will actually be trying
Yang, Sheng wrote:
On Wednesday 09 July 2008 23:03:19 Hollis Blanchard wrote:
On Wed, 2008-07-09 at 11:17 +0200, Christian Ehrhardt wrote:
So the question that is left before changing that is, if the
original author had something special in mind chosing cycles
here. I added Eric on CC
Anthony Liguori wrote:
Yang, Sheng wrote:
On Wednesday 09 July 2008 02:29:44 Glauber Costa wrote:
clflush is a non-privileged instruction that flushes the cacheline
given by its parameter, in terms of linear address. As it is
non-privileged, it is quite tricky, because a guest doing clflush
One more query, what if multiple processes call ioctl KSM_CREATE_SCAN
? Will there be multiple scanners ?
Consider a scenario where two processes A B separately call
KSM_CREATE_SCAN and then start registering some memory pages/areas via
KSM_CREATE_SHARED_MEMORY_AREA ioctl.
Lets say A registers 4
ציטוט Sukanto Ghosh:
One more query, what if multiple processes call ioctl KSM_CREATE_SCAN
? Will there be multiple scanners ?
yes
Consider a scenario where two processes A B separately call
KSM_CREATE_SCAN and then start registering some memory pages/areas via
Alexander Graf wrote:
Avi Kivity wrote:
Alexander Graf wrote:
Netware writes and reads to the DEBUGCTL and LAST*IP MSRs without
further checks and is really confused to receive a #GP during that.
To make it happy we should just make them stubs, which is exactly
what SVM already does.
To
Anthony Liguori wrote:
It's equivalent to a read from a VT perspective so if the read would
trap, the clflush instruction will trap.
Reads don't normally go through the emulator. Is the guest clflush()ing
mmio addresses? Strange as these are not normally cached.
--
error compiling
Glauber Costa wrote:
clflush is a non-privileged instruction that flushes the cacheline
given by its parameter, in terms of linear address. As it is non-privileged,
it is quite tricky, because a guest doing clflush will actually be trying to
flush a host kernel address.
We need to allow
Avi Kivity wrote:
Anthony Liguori wrote:
It's equivalent to a read from a VT perspective so if the read would
trap, the clflush instruction will trap.
Reads don't normally go through the emulator. Is the guest
clflush()ing mmio addresses? Strange as these are not normally cached.
It
* Elizabeth Kon [EMAIL PROTECTED] [2008-07-09 23:07]:
This patch, written by Ryan Harper, adds HPET support to BIOS.
Based on hpet changes to Xen's hvm firmware/rombios.
Signed-off-by: Beth Kon [EMAIL PROTECTED]
Signed-off-by: Ryan Harper [EMAIL PROTECTED]
--
Ryan Harper
Software Engineer;
Bugs item #2009439, was opened at 2008-07-03 06:51
Message generated for change (Settings changed) made by markmc
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2009439group_id=180599
Please note that this message will contain a full copy of the comment
On Thu, Jul 10, 2008 at 06:07:27PM +0800, Yang, Sheng wrote:
I think it's may be unnecessary to map pages when device
assigned. The table can be set up along with set_memory_region(), it
covered all memory slots already, or I miss something here?
VT-d is only initialized after the slots are
Marcelo Tosatti wrote:
On Mon, Jul 07, 2008 at 02:31:55PM -0300, Marcelo Tosatti wrote:
On Sun, Jul 06, 2008 at 12:15:56AM +0300, Avi Kivity wrote:
Marcelo Tosatti wrote:
On Sat, Jul 05, 2008 at 08:25:30PM +0300, Avi Kivity wrote:
@@ -1955,6 +1955,22 @@ void
On Thu, Jul 10, 2008 at 11:20 AM, Anthony Liguori [EMAIL PROTECTED] wrote:
Avi Kivity wrote:
Anthony Liguori wrote:
It's equivalent to a read from a VT perspective so if the read would
trap, the clflush instruction will trap.
Reads don't normally go through the emulator. Is the guest
Glauber Costa wrote:
On Thu, Jul 10, 2008 at 11:20 AM, Anthony Liguori [EMAIL PROTECTED] wrote:
Avi Kivity wrote:
Anthony Liguori wrote:
It's equivalent to a read from a VT perspective so if the read would
trap, the clflush instruction will trap.
Reads don't normally
Zhang, Xiantao wrote:
I agree that for automatic testing it's more of a burden; but it needs
to be done, especially as some kvm features are only enabled on newer
kernels.
The external module is convenient, but it's not a substitute for the
real thing.
So, I have a question here, When
Muli Ben-Yehuda wrote:
On Thu, Jul 10, 2008 at 06:07:27PM +0800, Yang, Sheng wrote:
I think it's may be unnecessary to map pages when device
assigned. The table can be set up along with set_memory_region(), it
covered all memory slots already, or I miss something here?
VT-d is only
Avi Kivity wrote:
Glauber Costa wrote:
On Thu, Jul 10, 2008 at 11:20 AM, Anthony Liguori
[EMAIL PROTECTED] wrote:
Avi Kivity wrote:
Anthony Liguori wrote:
It's equivalent to a read from a VT perspective so if the read would
trap, the clflush instruction will trap.
Reads
Anthony Liguori wrote:
yes. It is address 0xc8821000, apparently part of a pci controller
initialization.
qemu pci starts at 0xe000 IIRC. So maybe the guest is flushing
random addresses just to be annoying.
That's a virtual address, not a physical address IIUC.
Ah, of course.
Beth Kon wrote:
This patch, written by Ryan Harper, adds HPET support to BIOS.
Signed-off-by: Beth Kon [EMAIL PROTECTED]
diff --git a/bios/Makefile b/bios/Makefile
index 48022ea..3e73fb5 100644
--- a/bios/Makefile
+++ b/bios/Makefile
@@ -40,7 +40,7 @@ LIBS = -lm
RANLIB = ranlib
BCC = bcc
On Thu, Jul 10, 2008 at 6:47 PM, Mohammed Gamal [EMAIL PROTECTED] wrote:
After updating my kvm-userspace tree to the latest git tree. I am no
more able to run FreeDOS. The VM freezes after choosing any of the
boot options. I am running both latest kvm.git and kvm-userspace.git
Forgot to
* Sebastian Herbszt [EMAIL PROTECTED] [2008-07-10 10:46]:
Hey Sebastian,
Thanks for the review,
Beth Kon wrote:
This patch, written by Ryan Harper, adds HPET support to BIOS.
Signed-off-by: Beth Kon [EMAIL PROTECTED]
diff --git a/bios/Makefile b/bios/Makefile
index 48022ea..3e73fb5
Ryan Harper wrote:
Hey Sebastian,
Thanks for the review,
Beth Kon wrote:
This patch, written by Ryan Harper, adds HPET support to BIOS.
Signed-off-by: Beth Kon [EMAIL PROTECTED]
diff --git a/bios/Makefile b/bios/Makefile
index 48022ea..3e73fb5 100644
--- a/bios/Makefile
+++
Mohammed Gamal wrote:
On Thu, Jul 10, 2008 at 7:31 PM, Anthony Liguori [EMAIL PROTECTED] wrote:
Mohammed Gamal wrote:
After updating my kvm-userspace tree to the latest git tree. I am no
more able to run FreeDOS. The VM freezes after choosing any of the
boot options. I am running both
On Thu, Jul 10, 2008 at 12:39 PM, Avi Kivity [EMAIL PROTECTED] wrote:
Anthony Liguori wrote:
yes. It is address 0xc8821000, apparently part of a pci controller
initialization.
qemu pci starts at 0xe000 IIRC. So maybe the guest is flushing
random addresses just to be annoying.
That's
Anthony Liguori wrote:
+#include asm/param.h
I don't think this is necessary anymore. Depending on a Linux headers
breaks the QEMU build on other unices so it's a bad thing.
It is no longer required, but see below.
hpage is a misnomer too as we aren't actually dependent on huge pages
You can get to the monitor the same way in vnc as you do with the sdl gui.
You can also have the monitor connected to a socket or network port.
See the qemu docs for more info.
On Thursday 10 July 2008 3:51:44 pm Ty! Boyack wrote:
Folks,
I'm afraid I'm missing something very basic here.
john cooper wrote:
Anthony Liguori wrote:
john cooper wrote:
As it currently exists alloc_hpage_mem() is tied to
the notion of huge page allocation as it will reference
gethugepagesize() irrespective of *mem_path. So even
in the case of tmpfs backed files, if the host kernel
has been
Ty! Boyack wrote:
Folks,
I'm afraid I'm missing something very basic here. I'm looking to try
out the live migration facility, and all the documentation I'm seeing
shows to initiate the migration by going to the qemu monitor from the
SDL windows (alt-ctrl-2). However, I'd like to run my
On Fri, Jul 11, 2008 at 12:22 AM, Jan Kiszka [EMAIL PROTECTED] wrote:
Mohammed Gamal wrote:
On Thu, Jul 10, 2008 at 11:02 PM, Anthony Liguori [EMAIL PROTECTED] wrote:
Mohammed Gamal wrote:
On Thu, Jul 10, 2008 at 7:31 PM, Anthony Liguori [EMAIL PROTECTED]
wrote:
Mohammed Gamal wrote:
KVM: MMU: improve invalid shadow root page handling
Harden kvm_mmu_zap_page() against invalid root pages that
had been shadowed from memslots that are gone.
Signed-off-by: Marcelo Tosatti [EMAIL PROTECTED]
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index ff7cf63..7f57da6 100644
---
Avi Kivity wrote:
Zhang, Xiantao wrote:
I agree that for automatic testing it's more of a burden; but it
needs to be done, especially as some kvm features are only enabled
on newer kernels.
The external module is convenient, but it's not a substitute for
the real thing.
So, I have
On Thursday 10 July 2008 21:32:29 Avi Kivity wrote:
Yang, Sheng wrote:
On Wednesday 09 July 2008 23:03:19 Hollis Blanchard wrote:
On Wed, 2008-07-09 at 11:17 +0200, Christian Ehrhardt wrote:
So the question that is left before changing that is, if the
original author had something special
Hi All,
This is today's KVM test result against kvm.git
cc453ceef31019dcddff453d35a608ca2c659fec and kvm-userspace.git
6787f5a048c17e4ec4eb7858804795888449cd96.
One Issue Fixed:
1. vista auto-unattended installation failed on kvm guests
From 989c9551664988535608bb4051e654ffe5e5ddb0 Mon Sep 17 00:00:00 2001
From: Xiantao Zhang [EMAIL PROTECTED]
Date: Wed, 2 Jul 2008 17:04:19 +0800
Subject: [PATCH] KVM: external module: Allow non-x86 archs to build in
userspace.
This patch targets for allowing kvm/ia64 to build in userspace.
For
From ce37b613776ea71ed2c75c8302985aecb5e6799f Mon Sep 17 00:00:00 2001
From: Xiantao Zhang [EMAIL PROTECTED]
Date: Fri, 11 Jul 2008 13:13:52 +0800
Subject: [PATCH] KVM: userspace: Enable rpm build for kvm/ia64
Enable make rpm for kvm/ia64.
Signed-off-by: Xiantao Zhang [EMAIL PROTECTED]
---
51 matches
Mail list logo