To deal with guest shared interrupt bug in in-kernel irqchip, we should:
1. Identify each level trig interrupt source.
2. Implement logical OR on the same IRQ line for each interrupt source.
Here I chose a simple method: the caller of kvm_set_irq() has responsiblity
to identify interrupt
From e6b784985c14afe9805bfc8706858884b0259ab5 Mon Sep 17 00:00:00 2001
From: Sheng Yang [EMAIL PROTECTED]
Date: Thu, 2 Oct 2008 14:20:22 +0800
Subject: [PATCH 1/2] KVM: Separate interrupt sources
Keep a record of current interrupt state before update, and don't
assert/deassert repeatly. So that
From eab008da232cd9cc09dd8071bd15796c8e46f6bd Mon Sep 17 00:00:00 2001
From: Sheng Yang [EMAIL PROTECTED]
Date: Thu, 2 Oct 2008 14:21:06 +0800
Subject: [PATCH 2/2] KVM: Implement OR logic on guest shared IRQ line
Now IOAPIC and PIC treat every kvm_set_irq() as from one separate interrupt
source,
Hi Guys,
We are pleased to announce ConVirt 0.9.5 which includes
* drag and drop live migration for KVM
* Storage Management and
* some critical bug fixes
For more information, please visit us at http://www.convirt.net/
Thanks
ConVirt Team
--
To unsubscribe from this list: send the
Dor Laor [EMAIL PROTECTED] writes:
Sven Rudolph wrote:
...
Trying a summary: When using virtio Ethernet and -usb; Windows
leaves something (virtio Ethernet or USB ?) in a state that isn't
reset by my reboot sequence (etherboot/pxegrub) and makes the next
Windows boot hang. Booting
Chris Wright wrote:
* Anthony Liguori ([EMAIL PROTECTED]) wrote:
And arguably, storing TSC frequency in CPUID is a terrible interface
because the TSC frequency can change any time a guest is entered. It
True for older hardware, newer hardware should fix this. I guess the
point
Farkas Levente wrote:
still not working with kvm-76 userspace but still working with kvm-71
userspace and kmod-76. what else can i do?
What's the guest kernel? Is it updated relative to the madrake-10 release?
I was able to install and run mandrake 10 a couple of weeks ago, so
maybe this
Han, Weidong wrote:
From 61028d958dc7c57ee02de32ea89b025dccb9650d Mon Sep 17 00:00:00 2001
From: Weidong Han [EMAIL PROTECTED]
Date: Thu, 25 Sep 2008 23:32:02 +0800
Subject: [PATCH] Map mmio pages into VT-d page table
Assigned device could DMA to mmio pages, so also need to map mmio pages
into
On Thu, Oct 02, 2008 at 02:56:55PM +0300, Avi Kivity wrote:
Han, Weidong wrote:
From 61028d958dc7c57ee02de32ea89b025dccb9650d Mon Sep 17 00:00:00 2001
From: Weidong Han [EMAIL PROTECTED]
Date: Thu, 25 Sep 2008 23:32:02 +0800
Subject: [PATCH] Map mmio pages into VT-d page table
Assigned
Alex Williamson wrote:
It works, so I pushed it out. Alex, can you rebase your bios patches
on
top of current HEAD?
I updated and resent the first patch in the 4 patch follow-on to this
one. The remaining 3 patches still apply cleanly. I think Sheng was
going to send out a patch to
When userspace support for device assignment is merged, we will finally
have full support for device assignment. Unfortunately, many users
won't be able to test or use device assignment, since very few actually
run development kernels. The first stable kernel with enough iommu
support for
Father Avi,
is it better now?
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Currently, kvm is failing to build with --disable-kvm.
this patch fixes the issue.
Signed-off-by: Glauber Costa [EMAIL PROTECTED]
---
qemu/gdbstub.c | 15 ++-
qemu/hw/acpi.c |6 +-
qemu/hw/cirrus_vga.c |7 +++
qemu/monitor.c |6 --
4 files
Following the pattern we already do, provide a qemu_kvm wrapper to
the memory aliases x86 functions. Reason is that we don't want to have
references to the context spread over qemu.
The destroy alias function is completely removed from libkvm/libkvm.c,
since no one in the code base uses it
Jan Kiszka wrote:
KVM-x86 dumps a lot of debug messages that have no meaning for normal
operation:
- INIT de-assertion is ignored
- SIPIs are sent and received
- APIC writes are unaligned or 4 byte long
(Windows Server 2003 triggers this on SMP)
Degrade them to true debug messages,
Bugs item #2138166, was opened at 2008-09-30 12:39
Message generated for change (Comment added) made by glommer
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2138166group_id=180599
Please note that this message will contain a full copy of the comment
Zhang, Xiantao wrote:
From bb0c01b997d16ff1c1b9b0e797a581577c385b54 Mon Sep 17 00:00:00 2001
From: Xiantao Zhang [EMAIL PROTECTED]
Date: Mon, 29 Sep 2008 10:59:30 +0800
Subject: [PATCH] kvm: Split arch/x86/kvm/irq.c to two parts.
Moving irq ack notification logic as common, and make
it
[EMAIL PROTECTED] wrote:
From: Christian Ehrhardt [EMAIL PROTECTED]
*update
Short after resending v1 I realized that I forgot to put Avi and
[EMAIL PROTECTED] (for 2/3) on cc. I also updated the header text in 1/3 a
bit and verified my hostlongbits proposal on recent cross toolchain versions
Zhang, Xiantao wrote:
In order to enable vt-d suport for kvm/ia64 guests, I worked out the
patchset to make it happen. Please review. The first five patches have
no changes for logic and just do code move.
Xiantao
[PATCH 1/8] kvm/vt-d: Moving vtd.c from arch/x86/kvm/ to virt/kvm/
[PATCH 2/8]
Glauber Costa wrote:
Father Avi,
is it better now?
Yes, applied. thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at
Yang, Sheng wrote:
To deal with guest shared interrupt bug in in-kernel irqchip, we should:
1. Identify each level trig interrupt source.
2. Implement logical OR on the same IRQ line for each interrupt source.
Here I chose a simple method: the caller of kvm_set_irq() has responsiblity
to
Bugs item #2138079, was opened at 2008-09-30 11:36
Message generated for change (Comment added) made by glommer
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2138079group_id=180599
Please note that this message will contain a full copy of the comment
On Thu, Oct 02, 2008 at 04:43:06PM +0300, Avi Kivity wrote:
Glauber Costa wrote:
-kvm_save_registers(mon_cpu);
+if (kvm_enabled())
+kvm_save_registers(mon_cpu);
If I'm not mistaken, this relies on the optimizer to remove the call to
kvm_save_registers(). Compilation
Glauber Costa wrote:
On Thu, Oct 02, 2008 at 04:43:06PM +0300, Avi Kivity wrote:
Glauber Costa wrote:
-kvm_save_registers(mon_cpu);
+if (kvm_enabled())
+kvm_save_registers(mon_cpu);
If I'm not mistaken, this relies on the optimizer to remove the call to
Bugs item #2138079, was opened at 2008-09-30 14:36
Message generated for change (Comment added) made by avik
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2138079group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #2138079, was opened at 2008-09-30 14:36
Message generated for change (Comment added) made by edwin128
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2138079group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #2063072, was opened at 2008-08-21 00:29
Message generated for change (Comment added) made by avik
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2063072group_id=180599
Please note that this message will contain a full copy of the comment
On Thu, Oct 02, 2008 at 04:27:18PM +0300, Avi Kivity wrote:
Yang, Sheng wrote:
To deal with guest shared interrupt bug in in-kernel irqchip, we should:
1. Identify each level trig interrupt source.
2. Implement logical OR on the same IRQ line for each interrupt source.
Here I chose a simple
Avi Kivity wrote:
Farkas Levente wrote:
still not working with kvm-76 userspace but still working with kvm-71
userspace and kmod-76. what else can i do?
What's the guest kernel? Is it updated relative to the madrake-10 release?
I was able to install and run mandrake 10 a couple of
Marcelo Tosatti wrote:
Hi Izik,
On Thu, Sep 04, 2008 at 05:13:20PM +0300, izik eidus wrote:
+ struct kvm_memory_slot *alias_slot = kvm-memslots[i];
+
+ if (alias_slot-base_gfn == slot-base_gfn)
+ return 1;
+ }
+ return 0;
+}
+
Farkas Levente wrote:
ok i don't know any other solution so
- install kvm-71 to the host
- install a guest mandrake-10 truly minimal install into file image
- upgrade to kvm-76 and the guest no longer boot.
so i've uploaded it for you into:
ftp://ftp.bppiac.hu/mandrake.img.bz2
(this is the
Bugs item #2135061, was opened at 2008-09-29 04:51
Message generated for change (Settings changed) made by avik
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2135061group_id=180599
Please note that this message will contain a full copy of the comment
Glauber Costa wrote:
Currently, kvm is failing to build with --disable-kvm.
this patch fixes the issue.
Replaced, thanks.
#define qemu_kvm_irqchip_in_kernel() (0)
#define qemu_kvm_pit_in_kernel() (0)
#define qemu_kvm_has_sync_mmu() (0)
+#define kvm_load_registers(env) do {} while(0)
Currently, kvm is failing to build with --disable-kvm.
this patch fixes the issue.
Signed-off-by: Glauber Costa [EMAIL PROTECTED]
---
qemu/hw/acpi.c |6 +-
qemu/hw/cirrus_vga.c |7 +++
qemu/qemu-kvm.h |2 ++
3 files changed, 10 insertions(+), 5 deletions(-)
diff
On Thu, Oct 02, 2008 at 03:45:33PM +0300, Avi Kivity wrote:
We can fix this fairly simply by having an external module for the
iommus, much like kvm itself. I don't think it should be too
difficult, and it will provide a lot of testing to us, and important
functionality for our users.
The
Hi, Avi
Sorry, seems irq_comm.c is missing when I generate the patchset.
Attach it! Could you help to apply the patchset ? :-)
Xiantao
From cc77672cdfb5a566d1c7e86d91c07d6db99ad8c0 Mon Sep 17 00:00:00 2001
From: Xiantao Zhang [EMAIL PROTECTED]
Date: Sat, 27 Sep 2008 11:29:14 +0800
Marcelo Tosatti wrote:
Hi Izik,
On Thu, Sep 04, 2008 at 05:13:20PM +0300, izik eidus wrote:
+struct kvm_memory_slot *alias_slot = kvm-memslots[i];
+
+if (alias_slot-base_gfn == slot-base_gfn)
+return 1;
+}
+return 0;
+}
+
+static void
Zhang, Xiantao wrote:
+
+/* This should be called with the kvm-lock mutex held */
+void kvm_set_irq(struct kvm *kvm, int irq, int level)
+{
+ /* Not possible to detect if the guest uses the PIC or the
+* IOAPIC. So set the bit in both. The guest will ignore
+* writes to
Hi,
This one cleans up some problems with how the ia64 headers declared
'env' and also included stdio.h in cpu.h.
It builds and still boots kvm on my test system :-)
Cheers,
Jes
Fix build problem with latest kvm-userspace.git on ia64:
- Declare 'env' properly as on all other architectures,
Bugs item #2138166, was opened at 2008-09-30 08:39
Message generated for change (Comment added) made by johnrrousseau
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2138166group_id=180599
Please note that this message will contain a full copy of the
Bugs item #2138166, was opened at 2008-09-30 12:39
Message generated for change (Comment added) made by glommer
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2138166group_id=180599
Please note that this message will contain a full copy of the comment
How about this one? Still untested.
--
From: Sheng Yang [EMAIL PROTECTED]
Date: Fri, 3 Oct 2008 00:07:20 +0800
Subject: [PATCH 1/1] KVM: Fix guest shared interrupt with in-kernel irqchip
Derived from Avi's suggestion, now every call of kvm_set_irq() should offer
a irq_source_id, which is
Avi Kivity wrote:
Farkas Levente wrote:
ok i don't know any other solution so
- install kvm-71 to the host
- install a guest mandrake-10 truly minimal install into file image
- upgrade to kvm-76 and the guest no longer boot.
so i've uploaded it for you into:
Hi,
Is it ok to use gcc-4.1.2 to compile kvm module and utility tools now?
Or is gcc-3.x.x still required?
Simon
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Hi,
I understand the particularity (checkpoint) of this case.
Any way, in the attachment the dmesg log and the output of the dmesg
command.
thanks for your helpfulness.
Regards.
Sheng Yang wrote:
On Mon, Sep 29, 2008 at 6:18 PM, [EMAIL PROTECTED] [EMAIL PROTECTED]
it wrote:
Hi,
I have
Bugs item #2138166, was opened at 2008-09-30 08:39
Message generated for change (Comment added) made by johnrrousseau
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2138166group_id=180599
Please note that this message will contain a full copy of the
On Fri, Oct 03, 2008 at 12:16:20AM +0200, [EMAIL PROTECTED] wrote:
Hi,
I understand the particularity (checkpoint) of this case.
Hi Pier
Thanks for your understanding. :)
Any way, in the attachment the dmesg log and the output of the dmesg
command.
But it's strange that I almost can't
Avi Kivity wrote:
Zhang, Xiantao wrote:
+
+/* This should be called with the kvm-lock mutex held */
+void kvm_set_irq(struct kvm *kvm, int irq, int level) +{
+/* Not possible to detect if the guest uses the PIC or the
+ * IOAPIC. So set the bit in both. The guest will ignore
+
Bugs item #2143498, was opened at 2008-10-02 22:38
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2143498group_id=180599
Please note that this message will contain a full copy of
[EMAIL PROTECTED] wrote:
From: Christian Ehrhardt [EMAIL PROTECTED]
*update
Short after resending v1 I realized that I forgot to put Avi and
[EMAIL PROTECTED] (for 2/3) on cc. I also updated the header text in 1/3 a
bit and verified my hostlongbits proposal on recent cross toolchain versions
50 matches
Mail list logo