MCE registers are saved/load into/from CPUState in
kvm_arch_save/load_regs. To simulate the MCG_STATUS clearing upon
reset, MSR_MCG_STATUS is set to 0 for KVM_PUT_RESET_STATE.
v3:
- use msrs[] in kvm_arch_load/save_regs and get_msr_entry directly.
v2:
- Rebased on new CPU registers save/load
On Tue, Mar 02, 2010 at 06:57:54PM -0800, Ross Boylan wrote:
On Mon, 2010-03-01 at 15:59 -0600, Anthony Liguori wrote:
* desktop is 1024 x 720
1024x768 and this is what the default is today anyway.
That was not my experience, as reported in my post a few days ago
(800x600
On Wed, 2010-03-03 at 11:32 +0800, Zhang, Yanmin wrote:
On Tue, 2010-03-02 at 10:36 +0100, Ingo Molnar wrote:
* Zhang, Yanmin yanmin_zh...@linux.intel.com wrote:
On Fri, 2010-02-26 at 10:17 +0100, Ingo Molnar wrote:
My suggestion, as always, would be to start very simple and very
On Wed, Mar 03, 2010 at 12:54:25AM -0800, David Stevens wrote:
Michael S. Tsirkin m...@redhat.com wrote on 03/02/2010 11:54:32 PM:
On Tue, Mar 02, 2010 at 04:20:03PM -0800, David Stevens wrote:
These patches add support for mergeable receive buffers to
vhost-net, allowing it to use
On Wed, 2010-03-03 at 17:27 +0800, Zhang, Yanmin wrote:
+static inline u64 perf_instruction_pointer(struct pt_regs *regs)
+{
+ u64 ip;
+ ip = percpu_read(perf_virt_ip.ip);
+ if (!ip)
+ ip = instruction_pointer(regs);
+ else
+
On Wed, 2010-03-03 at 17:27 +0800, Zhang, Yanmin wrote:
-#ifndef perf_misc_flags
-#define perf_misc_flags(regs) (user_mode(regs) ? PERF_RECORD_MISC_USER : \
-PERF_RECORD_MISC_KERNEL)
-#define perf_instruction_pointer(regs) instruction_pointer(regs)
-#endif
Bugs item #2936094, was opened at 2010-01-21 11:07
Message generated for change (Comment added) made by kolobrod
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2936094group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #2962575, was opened at 2010-03-03 13:20
Message generated for change (Tracker Item Submitted) made by erikvdk
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2962575group_id=180599
Please note that this message will contain a full copy of the
On 03/01/2010 12:14 PM, Chris Webb wrote:
We've just seen another VNC related qemu-kvm crash, this time an arithmetic
exception at vnc.c:1424 in the newly release qemu-kvm 0.12.3.
[...]
1423 if (vs-absolute) {
1424 kbd_mouse_event(x * 0x7FFF / (ds_get_width(vs-ds) - 1),
On Tue, 2010-03-02 at 19:30 +0200, Michael Goldish wrote:
This patch:
- Makes kvm_config use less memory during parsing, by storing config data
compactly in arrays during parsing, and generating the final dicts only when
requested.
On my machine this results in 5-10 times less memory
This patch:
- Makes kvm_config use less memory during parsing,
by storing config data compactly in arrays during
parsing, and generating the final dicts only when
requested.
On my machine this results in 5-10 times less
memory being used (depending on the size of the
final generated
On Wed, 2010-03-03 at 08:55 +, Daniel P. Berrange wrote:
On Tue, Mar 02, 2010 at 06:57:54PM -0800, Ross Boylan wrote:
On Mon, 2010-03-01 at 15:59 -0600, Anthony Liguori wrote:
* desktop is 1024 x 720
1024x768 and this is what the default is today anyway.
That was
LMSW is present in both group tables. It was marked privileged only in
one of them. Intel analog of VMMCALL is already marked privileged.
Signed-off-by: Gleb Natapov g...@redhat.com
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index 3d2e115..3af63d2 100644
---
On Mon, Mar 01, 2010 at 06:17:22PM +0100, Jan Kiszka wrote:
As we hard-wire the BSP to CPU 0 anyway and cpuid_apic_id equals
cpu_index, cpu_is_bsp can also be based on the latter directly. This
will help an early user of it: KVM while initializing mp_state.
Signed-off-by: Jan Kiszka
- Lucas Meneghel Rodrigues l...@redhat.com wrote:
On Tue, 2010-03-02 at 19:30 +0200, Michael Goldish wrote:
This patch:
- Makes kvm_config use less memory during parsing, by storing config
data
compactly in arrays during parsing, and generating the final dicts
only when
Interesting. Since the feature in question is billed first of all a
performance optimization...
By whom? Although I see some improved performance, I think its real
benefit is improving memory utilization on the guest. Instead of using
75K for an ARP packet, mergeable RX buffers only uses 4K.
This is necessary to implement Nested Nested Paging. As a
side effect this allows some cleanups in the SVM nested
paging code.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
arch/x86/include/asm/kvm_host.h |1 +
arch/x86/kvm/mmu.c |4 +++-
2 files changed, 4
Hi,
here are the patches that implement nested paging support for nested
svm. They are somewhat intrusive to the soft-mmu so I post them as RFC
in the first round to get feedback about the general direction of the
changes. Nevertheless I am proud to report that with these patches the
famous
This patch implements the reporting of the nested paging
feature support to userspace.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
arch/x86/kvm/svm.c | 10 ++
1 files changed, 10 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index
This patch introduces a second MMU context which will hold
the paging information for the l2 guest.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
arch/x86/include/asm/kvm_host.h |8 ++
arch/x86/kvm/mmu.c | 48 ++-
2 files changed,
This patch adds the functions to do a nested l2_gva to
l1_gpa page table walk.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
arch/x86/include/asm/kvm_host.h |3 +++
arch/x86/kvm/mmu.c |8
arch/x86/kvm/paging_tmpl.h | 31 +++
This patch introduces an inject_page_fault function pointer
into struct kvm_mmu which will be used to inject a page
fault. This will be used later when Nested Nested Paging is
implemented.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
arch/x86/include/asm/kvm_host.h |3 +++
This patch adds code to initialize the Nested Nested Paging
MMU context when the L1 guest executes a VMRUN instruction
and has nested paging enabled in its VMCB.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
arch/x86/kvm/mmu.c |1 +
arch/x86/kvm/svm.c | 56
This patch introduces a mmu-callback to translate gpa
addresses in the walk_addr code. This is later used to
translate l2_gpa addresses into l1_gpa addresses.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
arch/x86/include/asm/kvm_host.h |1 +
arch/x86/kvm/mmu.c |7
This is the first patch in the series towards a generic
walk_addr implementation which could walk two-dimensional
page tables in the end. In this first step the walk_addr
function is renamed into walk_addr_generic which takes an
mmu context as an additional parameter.
Signed-off-by: Joerg Roedel
This patch implements logic to make sure that either a
page-fault/page-fault-vmexit or a nested-page-fault-vmexit
is propagated back to the guest.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
arch/x86/kvm/mmu.h |1 +
arch/x86/kvm/paging_tmpl.h |2 ++
arch/x86/kvm/x86.c
This patch adds the helper functions which will be used in
the mmu context for handling nested nested page faults.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
arch/x86/kvm/svm.c | 33 +
1 files changed, 33 insertions(+), 0 deletions(-)
diff --git
This function pointer in the MMU context is required to
implement Nested Nested Paging.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
arch/x86/include/asm/kvm_host.h |1 +
arch/x86/kvm/mmu.c |9 -
arch/x86/kvm/paging_tmpl.h |4 ++--
3 files changed,
This patch introduces a special set_tdp_cr3 function pointer
in kvm_x86_ops which is only used for tpd enabled mmu
contexts. This allows to remove some hacks from svm code.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
arch/x86/include/asm/kvm_host.h |1 +
arch/x86/kvm/mmu.c
This patch changes the tdp_enabled flag from its global
meaning to the mmu-context. This is necessary for Nested SVM
with emulation of Nested Paging where we need an extra MMU
context to shadow the Nested Nested Page Table.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
This patch adds the get_supported_cpuid callback to
kvm_x86_ops. It will be used in do_cpuid_ent to delegate the
decission about some supported cpuid bits to the
architecture modules.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
arch/x86/include/asm/kvm_host.h |2 ++
This capability shows userspace that is can trust the values
of cpuid[0x800A] that it gets from the kernel. Old
behavior was to just return the host cpuid values which is
broken because all additional svm-features need support in
the svm emulation code.
Signed-off-by: Joerg Roedel
Some logic of this function is required to build the Nested
Nested Paging context. So factor the required logic into a
seperate function and export it.
Also make the whole init path suitable for more than one mmu
context.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
arch/x86/kvm/mmu.c |
The walk_addr function checks for !is_long_mode in its 64
bit version. But what is meant here is a check for pae
paging. Change the condition to really check for pae paging
so that it also works with nested nested paging.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
This patch changes is_rsvd_bits_set() function prototype to
take only a kvm_mmu context instead of a full vcpu.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
arch/x86/kvm/mmu.c |4 ++--
arch/x86/kvm/paging_tmpl.h |3 ++-
2 files changed, 4 insertions(+), 3 deletions(-)
Hi,
this is the small userspace part. They are necessary for the l1 guest to see
the npt feature bit with cpuid.
Please review and give feedback :-)
Thanks,
Joerg
Diffstat:
kvm/include/linux/kvm.h |2 ++
qemu-kvm-x86.c | 15 +--
target-i386/cpu.h |
This patch adds code to ask the kernel about the svm
features it supports for its guests and propagates them to
the guest. The new capability is necessary because the old
behavior of the kernel was to just return the host svm
features but every svm-feature needs emulation in the nested
svm kernel
This patch fixes the propagation of the ext3_features from
the qemu cpu-model to kvm. This is required for the guest to
see the svm flag.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
target-i386/helper.c |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git
With latest qemu-kvm.git I am getting a segfault at start:
/tmp/qemu-kvm-test/bin/qemu-system-x86_64 -m 1024 -smp 2 \
-drive file=/images/f12-x86_64.img,if=virtio,cache=none,boot=on
kvm_create_vcpu: Invalid argument
Segmentation fault (core dumped)
git bisect points to:
Bisecting: 0
On Wed, Mar 3, 2010 at 12:06 AM, Khaled Ibrahim kz...@hotmail.com wrote:
Hi Cam,
I used your patches successfully to support shared memory on KVM and
used the test cases successfully, but qemu-kvm crashes when I increased the
size of the shared memory. I
applied the ivshmem patch to
Date: Wed, 3 Mar 2010 15:09:17 -0700
Subject: Re: IVSHMEM and limits on shared memory
From: c...@cs.ualberta.ca
To: kz...@hotmail.com
CC: kvm@vger.kernel.org
On Wed, Mar 3, 2010 at 12:06 AM, Khaled Ibrahim wrote:
Hi Cam,
I used your patches
Am 03.03.2010 um 20:15 schrieb Joerg Roedel joerg.roe...@amd.com:
This patch adds code to ask the kernel about the svm
features it supports for its guests and propagates them to
the guest. The new capability is necessary because the old
behavior of the kernel was to just return the host svm
David S. Ahern wrote:
With latest qemu-kvm.git I am getting a segfault at start:
/tmp/qemu-kvm-test/bin/qemu-system-x86_64 -m 1024 -smp 2 \
-drive file=/images/f12-x86_64.img,if=virtio,cache=none,boot=on
kvm_create_vcpu: Invalid argument
Segmentation fault (core dumped)
git bisect
Joerg Roedel wrote:
Hi,
here are the patches that implement nested paging support for nested
svm. They are somewhat intrusive to the soft-mmu so I post them as RFC
in the first round to get feedback about the general direction of the
changes. Nevertheless I am proud to report that with
On 03/03/2010 04:08 PM, Jan Kiszka wrote:
David S. Ahern wrote:
With latest qemu-kvm.git I am getting a segfault at start:
/tmp/qemu-kvm-test/bin/qemu-system-x86_64 -m 1024 -smp 2 \
-drive file=/images/f12-x86_64.img,if=virtio,cache=none,boot=on
kvm_create_vcpu: Invalid argument
Huang Ying wrote:
MCE registers are saved/load into/from CPUState in
kvm_arch_save/load_regs. To simulate the MCG_STATUS clearing upon
reset, MSR_MCG_STATUS is set to 0 for KVM_PUT_RESET_STATE.
v3:
- use msrs[] in kvm_arch_load/save_regs and get_msr_entry directly.
Looks good!
v2:
David S. Ahern wrote:
On 03/03/2010 04:08 PM, Jan Kiszka wrote:
David S. Ahern wrote:
With latest qemu-kvm.git I am getting a segfault at start:
/tmp/qemu-kvm-test/bin/qemu-system-x86_64 -m 1024 -smp 2 \
-drive file=/images/f12-x86_64.img,if=virtio,cache=none,boot=on
On 03/03/2010 04:20 PM, Jan Kiszka wrote:
David S. Ahern wrote:
On 03/03/2010 04:08 PM, Jan Kiszka wrote:
David S. Ahern wrote:
With latest qemu-kvm.git I am getting a segfault at start:
/tmp/qemu-kvm-test/bin/qemu-system-x86_64 -m 1024 -smp 2 \
-drive
Gleb Natapov wrote:
On Mon, Mar 01, 2010 at 06:17:22PM +0100, Jan Kiszka wrote:
As we hard-wire the BSP to CPU 0 anyway and cpuid_apic_id equals
cpu_index, cpu_is_bsp can also be based on the latter directly. This
will help an early user of it: KVM while initializing mp_state.
Signed-off-by:
On 03.03.2010, at 20:12, Joerg Roedel wrote:
This patch implements the reporting of the nested paging
feature support to userspace.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
arch/x86/kvm/svm.c | 10 ++
1 files changed, 10 insertions(+), 0 deletions(-)
diff --git
On 03.03.2010, at 20:12, Joerg Roedel wrote:
Hi,
here are the patches that implement nested paging support for nested
svm. They are somewhat intrusive to the soft-mmu so I post them as RFC
in the first round to get feedback about the general direction of the
changes. Nevertheless I am
David S. Ahern wrote:
On 03/03/2010 04:20 PM, Jan Kiszka wrote:
David S. Ahern wrote:
On 03/03/2010 04:08 PM, Jan Kiszka wrote:
David S. Ahern wrote:
With latest qemu-kvm.git I am getting a segfault at start:
/tmp/qemu-kvm-test/bin/qemu-system-x86_64 -m 1024 -smp 2 \
-drive
On Tue, Mar 02, 2010 at 10:55:45AM -0600, Brian Jackson wrote:
On Tuesday 02 March 2010 10:33:19 am Harald Braumann wrote:
quite often my Windows guest freezes. The window is just black
and it uses 100% CPU.
Have you tried to reproduce without vmware vga? That support was developed
On 03/03/2010 01:12 PM, Joerg Roedel wrote:
Hi,
here are the patches that implement nested paging support for nested
svm. They are somewhat intrusive to the soft-mmu so I post them as RFC
in the first round to get feedback about the general direction of the
changes. Nevertheless I am proud to
On Wed, 2010-03-03 at 11:13 +0100, Peter Zijlstra wrote:
On Wed, 2010-03-03 at 17:27 +0800, Zhang, Yanmin wrote:
+static inline u64 perf_instruction_pointer(struct pt_regs *regs)
+{
+ u64 ip;
+ ip = percpu_read(perf_virt_ip.ip);
+ if (!ip)
+ ip =
On Wed, 2010-03-03 at 11:15 +0100, Peter Zijlstra wrote:
On Wed, 2010-03-03 at 17:27 +0800, Zhang, Yanmin wrote:
-#ifndef perf_misc_flags
-#define perf_misc_flags(regs) (user_mode(regs) ? PERF_RECORD_MISC_USER : \
-PERF_RECORD_MISC_KERNEL)
-#define
On Tue, Mar 02, 2010 at 11:29:10PM -0300, Marcelo Tosatti wrote:
On Tue, Mar 02, 2010 at 05:31:09PM +0100, Jan Kiszka wrote:
Marcelo Tosatti wrote:
On Tue, Mar 02, 2010 at 09:00:04AM +0100, Jan Kiszka wrote:
Marcelo Tosatti wrote:
On Mon, Mar 01, 2010 at 07:10:30PM +0100, Jan Kiszka
On Wed, Mar 3, 2010 at 3:38 PM, Khaled Ibrahim kz...@hotmail.com wrote:
Date: Wed, 3 Mar 2010 15:09:17 -0700
Subject: Re: IVSHMEM and limits on shared memory
From: c...@cs.ualberta.ca
To: kz...@hotmail.com
CC: kvm@vger.kernel.org
On Wed, Mar 3,
On Thu, Mar 04, 2010 at 01:21:12AM -0300, Marcelo Tosatti wrote:
The regression seems to be caused by seabios commit d7e998f. Kevin, the
failure can be seen on the attached screenshot, which happens on the
first reboot of WinXP 32 installation (after copying files etc).
Sorry - I also noticed
On Thu, Mar 04, 2010 at 12:34:22AM +0100, Jan Kiszka wrote:
Gleb Natapov wrote:
On Mon, Mar 01, 2010 at 06:17:22PM +0100, Jan Kiszka wrote:
As we hard-wire the BSP to CPU 0 anyway and cpuid_apic_id equals
cpu_index, cpu_is_bsp can also be based on the latter directly. This
will help an
Add a kvm subtest format_disk.
This test will simply create a file system on disk, mount it and write a file
with some content to the disk. Check whether the write could be succeeded.
Signed-off-by: sshang ssh...@redhat.com
---
client/tests/kvm/tests/format_disk.py | 63
This test mainly tests whether all guest cpu flags are supported by host
machine.
Signed-off-by: sshang ssh...@redhat.com
---
client/tests/kvm/tests/cpuflags.py | 80
client/tests/kvm/tests_base.cfg.sample |9 +++-
2 files changed, 88 insertions(+), 1
62 matches
Mail list logo