Hi,
did You try both noapic nolapic?
this helped me...
n.
On Fri, Sep 12, 2008 at 11:37:33PM +0200, xming wrote:
hi,
I am running kvm-74 and it's getting worse for me (compared to 73, or
70,71 w/o issues), I tried virtio, rtl8139 and e1000,
the network will stall. With 8139 it happens very
Hi David, well, I tried e1000, but it's actualy much worse for me.
But I'm using much newer (vanilla) kernels, maybe RHEL kernels
contain some patch that prevents the problem? I'll have a look.
BR
nik
On Mon, Sep 15, 2008 at 09:45:56AM -0600, David S. Ahern wrote:
Last February I dug into where
Alexander Graf wrote:
KVM as is assumes that the kernel obj dir and the kernel source dir
are at the same location. This is true for most self-built vanilla
kernels, but some distributions split these up (e.g. SUSE).
To keep compatible and have users have a good experience on building
KVM on
Bugs item #2113643, was opened at 2008-09-16 09:34
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2113643group_id=180599
Please note that this message will contain a full copy of
Summary - I'm getting stability issues running SMP. The guest will run
for, typically, 6 to 12 hours before causing a problem.
The first time it happened the guest process that was running SMP went
Zombie, but in a spin loop clocking huge amount of CPU time, and I had
to reboot the host to
From: Christian Ehrhardt [EMAIL PROTECTED]
Updating and testing kvm-userspace for ppc after a too long time brought up
some issues fixed in this series.
The patches are small and their description should be comprehendible. Due to
the fact that most of the issues where build time issues I also
Hi all,
I am working on KVM 75 (Debian 2.6.24 amd64 Kernel, but the error is also on
KVM 71, others not tested)
___
Disk I/o error: Status = 0001
Disk I/o error: Status = 0001
Disk I/o error: Status = 0001
Nikola,
can you try:
ifconfig tapX txqueuelen 1500 on the host, this work around solved my
problem, well
at least it doesn't hang every few miniutes.
On Tue, Sep 16, 2008 at 8:34 AM, Nikola Ciprich [EMAIL PROTECTED] wrote:
Hi David, well, I tried e1000, but it's actualy much worse for me.
From: Christian Ehrhardt [EMAIL PROTECTED]
It came up in the review of the s390 libkvm code that we have some
broken headers too.
Signed-off-by: Christian Ehrhardt [EMAIL PROTECTED]
---
[diffstat]
libkvm-powerpc.c | 14 +-
1 file changed, 5 insertions(+), 9 deletions(-)
[diff]
On Sep 16, 2008, at 9:22 AM, Zhang, Xiantao wrote:
Alexander Graf wrote:
KVM as is assumes that the kernel obj dir and the kernel source dir
are at the same location. This is true for most self-built vanilla
kernels, but some distributions split these up (e.g. SUSE).
To keep compatible and
Alexander Graf wrote:
On Sep 16, 2008, at 9:22 AM, Zhang, Xiantao wrote:
Alexander Graf wrote:
KVM as is assumes that the kernel obj dir and the kernel source dir
are at the same location. This is true for most self-built vanilla
kernels, but some distributions split these up (e.g. SUSE).
On Sep 16, 2008, at 12:22 PM, Zhang, Xiantao wrote:
Alexander Graf wrote:
On Sep 16, 2008, at 9:22 AM, Zhang, Xiantao wrote:
Alexander Graf wrote:
KVM as is assumes that the kernel obj dir and the kernel source dir
are at the same location. This is true for most self-built vanilla
kernels,
Sheng,
out of curiosity: vmx_vcpu_run invokes 'int $2' to trigger a host NMI if
the VM exited due to an external NMI event. According to Intel specs I
have, software-triggered NMIs do not block hardware NMIs. So are we
facing the risk to receive another NMI while running the first handler?
Or
Further to my previous report..
I have just noticed that, where the host is running on the dual
Quad-Core AMD Opteron(tm) Processor 2352 (family 16, model 2) the
kernels in the *guest* machines (usually 2.6.26) are reporting WARNING:
This combination of AMDprocessors is not suitable for SMP.
Le mardi 16 septembre 2008 à 00:58 +, Avi Kivity a écrit :
From: Ben-Ami Yassour [EMAIL PROTECTED]
Based on a patch by: Kay, Allen M [EMAIL PROTECTED]
This patch enables PCI device assignment based on VT-d support.
When a device is assigned to the guest, the guest memory is pinned and
When using Windows XP 32 installed with TCP/IP and microsoft client
networking, I can reproduce an intermittent BSOD [1] with kvmnet.sys
1.0.0 and 1.2.0, by aborting a large data transfer in an application.
Since this reproduces with 1.0.0 kvmnet.sys, it looks unrelated to the
locking changes
I am running virtio with the latest KVM code, and see a significant
performance issue.
Ping to the host (or any other close machine) reports a 4ms delay.
In the same setup with an e1000 emulation (just changing model=virtio to
model=e1000 in the KVM command line), ping reports 0.177ms delay.
Bugs item #2114277, was opened at 2008-09-16 09:16
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2114277group_id=180599
Please note that this message will contain a full copy of
Ben-Ami Yassour wrote:
I am running virtio with the latest KVM code, and see a significant
performance issue.
Ping to the host (or any other close machine) reports a 4ms delay.
What kvm version and what host kernel version?
It's very easy to mistakenly compile qemu without GSO support
This patch refactors the AIO layer to allow multiple AIO implementations. It's
only possible because of the recent signalfd() patch.
Right now, the AIO infrastructure is pretty specific to the block raw backend.
For other block devices to implement AIO, the qemu_aio_wait function must
support
intel_iommu_found() is not defined if CONFIG_DMAR is not defined
Signed-off-by: Amit Shah [EMAIL PROTECTED]
---
include/linux/kvm_host.h |5 +
1 files changed, 5 insertions(+), 0 deletions(-)
diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h
index 6252802..5b9d713 100644
Amit Shah wrote:
intel_iommu_found() is not defined if CONFIG_DMAR is not defined
Signed-off-by: Amit Shah [EMAIL PROTECTED]
---
include/linux/kvm_host.h |5 +
1 files changed, 5 insertions(+), 0 deletions(-)
diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h
index
intel_iommu_found() is not defined if CONFIG_DMAR is not defined
Signed-off-by: Amit Shah [EMAIL PROTECTED]
---
include/linux/intel-iommu.h | 10 +-
1 files changed, 9 insertions(+), 1 deletions(-)
diff --git a/include/linux/intel-iommu.h b/include/linux/intel-iommu.h
index
When building kvm-userspace from git, gawk is used by kernel/Makefile. Without
this check it's non-obvious why kernel/Makefile fails.
Signed-off-by: Brian Jackson [EMAIL PROTECTED]
diff --git a/configure b/configure
index 3bb10ce..5cac4c8 100755
--- a/configure
+++ b/configure
@@ -102,6 +102,12
* On Tuesday 16 Sep 2008 22:55:29 Avi Kivity wrote:
Amit Shah wrote:
When an IRQ allocation fails, we free up the device structures and
disable the device so that we can unregister the device in the userspace
and not expose it to the guest at all.
Still doesn't apply. What did you
Ben-Ami Yassour [EMAIL PROTECTED] wrote:
Hello Ben,
I am running virtio with the latest KVM code, and see a significant
performance issue.
Ping to the host (or any other close machine) reports a 4ms delay.
In the same setup with an e1000 emulation (just changing model=virtio to
On 9/16/08, Anthony Liguori [EMAIL PROTECTED] wrote:
This patch refactors the AIO layer to allow multiple AIO implementations.
It's
only possible because of the recent signalfd() patch.
+/* This is a simple lock used to protect the aio_handlers list.
Specifically,
+ * it's used to
[This still doesn't include some fixes to review comments.
I'm posting this just so that people can use this to test
or base their work off the latest patch.]
From: Or Sagi [EMAIL PROTECTED]
From: Nir Peleg [EMAIL PROTECTED]
From: Amit Shah [EMAIL PROTECTED]
From: Ben-Ami Yassour [EMAIL
Bugs item #2019053, was opened at 2008-07-15 18:10
Message generated for change (Comment added) made by alex_williamson
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2019053group_id=180599
Please note that this message will contain a full copy of the
Laurent Vivier wrote:
@@ -1147,6 +1157,9 @@ int kvm_dev_ioctl_check_extension(long ext)
case KVM_CAP_PV_MMU:
r = !tdp_enabled;
break;
+ case KVM_CAP_IOMMU:
+ r = intel_iommu_found();
+ break;
Must depend on
Blue Swirl wrote:
On 9/16/08, Anthony Liguori [EMAIL PROTECTED] wrote:
This patch refactors the AIO layer to allow multiple AIO implementations. It's
only possible because of the recent signalfd() patch.
+/* This is a simple lock used to protect the aio_handlers list.
On Tue, 2008-09-16 at 09:16 -0500, Anthony Liguori wrote:
Ben-Ami Yassour wrote:
I am running virtio with the latest KVM code, and see a significant
performance issue.
Ping to the host (or any other close machine) reports a 4ms delay.
What kvm version and what host kernel version?
check out for qemu's -serial option
Only some operations do work this way. The atmel controller signature is
read wrongly from the device all the time using this option.
I'd like to try an USB to serial adapter now.
using usb_add host:1.2 or such I am able to attach the harddisk and
WindowsXP
Amit Shah wrote:
* On Tuesday 16 Sep 2008 22:55:29 Avi Kivity wrote:
Amit Shah wrote:
When an IRQ allocation fails, we free up the device structures and
disable the device so that we can unregister the device in the userspace
and not expose it to the guest at all.
Still doesn't
Farkas Levente wrote:
as i see only the first iso is corrupt, so here is the first iso:
ftp://ftp.bppiac.hu/
Well, it installs and runs perfectly.
Can you describe what's going wrong? What's your host cpu?
--
I have a truly marvellous patch that fixes the bug which this
signature is too
--
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
kvm_vm_fault is invoked with mmap_sem held in read mode. Since gfn_to_page
will be converted to get_user_pages_fast, which requires this lock NOT
to be held, switch to opencoded get_user_pages.
Signed-off-by: Marcelo Tosatti [EMAIL PROTECTED]
Index: kvm.tip/virt/kvm/kvm_main.c
Convert gfn_to_pfn to use get_user_pages_fast, which can do lockless
pagetable lookups on x86. Kernel compilation on 4-way guest is 3.7%
faster on VMX.
Signed-off-by: Marcelo Tosatti [EMAIL PROTECTED]
Index: kvm.tip/arch/x86/kvm/mmu.c
Using a recent QEMU tree (5001), I can start a Windows XP VM (FAT32-based)
in -snapshot mode, make changes, shutdown Windows (I have auto-power-off
disabled) and then issue 'commit all' at the monitor prompt. The changes
which I have made are then correctly stored back into the image file
On Tue, Sep 16, 2008 at 11:18:30AM -0700, Avi Kivity wrote:
Laurent Vivier wrote:
@@ -1147,6 +1157,9 @@ int kvm_dev_ioctl_check_extension(long ext)
case KVM_CAP_PV_MMU:
r = !tdp_enabled;
break;
+ case KVM_CAP_IOMMU:
+ r = intel_iommu_found();
+
Seems it lacks device-assignment.[c,h] ?
Xiantao
Amit Shah wrote:
[This still doesn't include some fixes to review comments.
I'm posting this just so that people can use this to test
or base their work off the latest patch.]
From: Or Sagi [EMAIL PROTECTED]
From: Nir Peleg [EMAIL PROTECTED]
Amit Shah wrote:
[This still doesn't include some fixes to review comments.
I'm posting this just so that people can use this to test
or base their work off the latest patch.]
From: Or Sagi [EMAIL PROTECTED]
From: Nir Peleg [EMAIL PROTECTED]
From: Amit Shah [EMAIL PROTECTED]
From: Ben-Ami
From: Christian Ehrhardt [EMAIL PROTECTED]
Last submission missed the right 3/3 tag so I resend it to be recognized.
Commit 2d5737d8 added the requirement for an $arch/Makefile.pre in the
kernel subdirectory. This patch adds a stub for powerpc.
Additionally now a file
* On Wednesday 17 Sep 2008 11:15:16 Zhang, Xiantao wrote:
Seems it lacks device-assignment.[c,h] ?
Xiantao
Hmm, here is the version with the files.
From cd82862ef7493afd3431e538b85adb9771f94da6 Mon Sep 17 00:00:00 2001
From: Amit Shah [EMAIL PROTECTED]
Date: Tue, 16 Sep 2008 23:09:23 +0530
From: Christian Ehrhardt [EMAIL PROTECTED]
This patch adds the functionality of rewriting guest code using the magic page
mechanism. If a paravirtual guest memory (magic page) is registered the host
rewrites trapping emulations instead of emulating them. This only works with
instructions that can
From: Christian Ehrhardt [EMAIL PROTECTED]
This adds another guest code rewrite support replacing the mfmsr instructions
using the magic page mechanism.
Signed-off-by: Christian Ehrhardt [EMAIL PROTECTED]
---
[diffstat]
arch/powerpc/kvm/emulate.c | 20 +++-
From: Christian Ehrhardt [EMAIL PROTECTED]
Updating and testing kvm-userspace for ppc after a too long time brought up
some issues fixed in this series.
The patches are small and their description should be comprehendible. Due to
the fact that most of the issues where build time issues I also
47 matches
Mail list logo