On Wednesday 06 May 2009 13:55:44 Sheng Yang wrote:
On Tuesday 05 May 2009 16:14:29 Gleb Natapov wrote:
Only one interrupt vector can be injected from userspace irqchip at
any given time so no need to store it in a bitmap. Put it into interrupt
queue directly.
Signed-off-by: Gleb
On Tuesday 05 May 2009 16:14:31 Gleb Natapov wrote:
Re-inject event instead. This is what Intel suggest. Also use correct
instruction length when re-injecting soft fault/interrupt.
Thanks for fixing this!
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/kvm_host.h |
Alex Williamson wrote:
We can't rely on build switches to tell us if a save image
includes a given field. We also need to save status since
it's visible to the guest. Draw another line in the sand
for broken save versions. The version number should always
be updated when new values are saved
* Gregory Haskins (ghask...@novell.com) wrote:
Chris Wright wrote:
But a free-form hypercall(unsigned long nr, unsigned long *args, size_t
count)
means hypercall number and arg list must be the same in order for code
to call hypercall() in a hypervisor agnostic way.
Yes, and that is
On Wed, May 06, 2009 at 10:35:27AM +0800, Sheng Yang wrote:
On Tuesday 05 May 2009 20:46:04 Michael S. Tsirkin wrote:
On Tue, May 05, 2009 at 07:49:10AM -0300, Marcelo Tosatti wrote:
On Tue, May 05, 2009 at 01:34:50PM +0300, Michael S. Tsirkin wrote:
On Tue, May 05, 2009 at 07:19:45AM
On Tue, May 05, 2009 at 02:40:11PM -0400, Glauber Costa wrote:
diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h
index 8e680c3..a49d07b 100644
--- a/arch/x86/include/asm/kvm_host.h
+++ b/arch/x86/include/asm/kvm_host.h
@@ -510,6 +510,8 @@ struct kvm_x86_ops {
Bugs item #2525768, was opened at 2009-01-21 16:03
Message generated for change (Comment added) made by danv
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2525768group_id=180599
Please note that this message will contain a full copy of the comment
On Wednesday 06 May 2009 15:31:18 Michael S. Tsirkin wrote:
On Wed, May 06, 2009 at 10:35:27AM +0800, Sheng Yang wrote:
On Tuesday 05 May 2009 20:46:04 Michael S. Tsirkin wrote:
On Tue, May 05, 2009 at 07:49:10AM -0300, Marcelo Tosatti wrote:
On Tue, May 05, 2009 at 01:34:50PM +0300,
Bugs item #2525768, was opened at 2009-01-21 16:03
Message generated for change (Settings changed) made by danv
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2525768group_id=180599
Please note that this message will contain a full copy of the comment
Sridhar Samudrala wrote:
When i moved to the latest qemu-kvm git tree from kvm-85, i noticed that
networking stopped working between the host and the guest.
It started working when i put the device in promiscuos mode by running
tcpdump in background on the guest.
After browsing through the
Hi,
1. How should we allocate extra memory to guest other than memory allocated
through qemu_alloc_physram??
2. How to register the extra allocated memory with KVM?
I have tried to allocate an extra one page to Guest but couldn't succeed;
probably somebody had already done this exercise.
1.
On Wed, May 06, 2009 at 02:57:10PM +0800, Sheng Yang wrote:
On Tuesday 05 May 2009 16:14:31 Gleb Natapov wrote:
Re-inject event instead. This is what Intel suggest. Also use correct
instruction length when re-injecting soft fault/interrupt.
Thanks for fixing this!
Signed-off-by: Gleb
Sebastian Herbszt wrote:
Simon Bienlein wrote:
Is a support for BIOS worked on right now?
The vgabios (vgabios.c) has a FIXME should beep. Volker, do you plan
to fix this?
Which frequency should be used for the beep? Which delay?
I would try 1 KHz and some hundred milliseconds.
Getting
Gleb Natapov wrote:
On Tue, May 05, 2009 at 02:40:11PM -0400, Glauber Costa wrote:
diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h
index 8e680c3..a49d07b 100644
--- a/arch/x86/include/asm/kvm_host.h
+++ b/arch/x86/include/asm/kvm_host.h
@@ -510,6 +510,8 @@
Hi Gleb,
Gleb Natapov wrote:
Re-inject event instead. This is what Intel suggest. Also use correct
instruction length when re-injecting soft fault/interrupt.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/kvm_host.h |5 -
arch/x86/kvm/svm.c |
Kumar, Venkat wrote:
Hi,
1. How should we allocate extra memory to guest other than memory allocated through
qemu_alloc_physram??
qemu_alloc_physram() is obsolete. I've just removed it to avoid
confusion (and a warning).
I presume you want to give kvm memory which is not real RAM -
Al, Davide,
Gregory Haskins wrote:
+
+int
+kvm_irqfd(struct kvm *kvm, int gsi, int flags)
+{
+ struct _irqfd *irqfd;
+ struct file *file = NULL;
+ int fd = -1;
+ int ret;
+
+ irqfd = kzalloc(sizeof(*irqfd), GFP_KERNEL);
+ if (!irqfd)
+ return
Here is updated patch with hopefully all comments addressed.
Re-inject event instead. This is what Intel suggest. Also use correct
instruction length when re-injecting soft fault/interrupt.
Signed-off-by: Gleb Natapov g...@redhat.com
diff --git a/arch/x86/include/asm/kvm_host.h
ehrha...@linux.vnet.ibm.com wrote:
From: Carsten Otte co...@de.ibm.com
This patch fixes an incorrectness in the kvm backend for s390.
In case virtual cpus are being created before the corresponding
memory slot is being registered, we need to update the sie
control blocks for the virtual cpus.
ehrha...@linux.vnet.ibm.com wrote:
From: Christian Borntraeger borntrae...@de.ibm.com
This patch reworks the s390 clock comparator wakeup to hrtimer. The clock
comparator is a per-cpu value that is compared against the TOD clock. If
ckc = TOD an external interrupt 1004 is triggered. Since the
ehrha...@linux.vnet.ibm.com wrote:
From: Carsten Otte co...@de.ibm.com
This patch makes sure we do unlink a vcpu's sie control block
from the system control area in kvm_arch_vcpu_destroy. This
prevents illegal accesses to the sie control block from other
virtual cpus after free.
Reported-by:
(Applies to kvm.git:66b0aed4, plus you will also need Davide Libenzi's
eventfd_file_create() patch, which you can find here:
http://www.mail-archive.com/kvm@vger.kernel.org/msg13923.html
You can find my complete tree with kvm.git, Davide's patch, and this series
here:
We will re-use eventfd for implmenting irqfd later in the series, and the
irqfd users will potentially live in modules.
Signed-off-by: Gregory Haskins ghask...@novell.com
---
fs/eventfd.c |4
1 files changed, 4 insertions(+), 0 deletions(-)
diff --git a/fs/eventfd.c b/fs/eventfd.c
KVM provides a complete virtual system environment for guests, including
support for injecting interrupts modeled after the real exception/interrupt
facilities present on the native platform (such as the IDT on x86).
Virtual interrupts can come from a variety of sources (emulated devices,
Kumar, Venkat wrote:
Kumar, Venkat wrote:
Hi,
1. How should we allocate extra memory to guest other than memory allocated through
qemu_alloc_physram??
qemu_alloc_physram() is obsolete. I've just removed it to avoid
confusion (and a warning).
==
If kvm-85 is the latest
Am Wednesday 06 May 2009 14:10:07 schrieb Avi Kivity:
ehrha...@linux.vnet.ibm.com wrote:
From: Christian Borntraeger borntrae...@de.ibm.com
This patch reworks the s390 clock comparator wakeup to hrtimer. The clock
comparator is a per-cpu value that is compared against the TOD clock. If
Chris Wright wrote:
* Gregory Haskins (ghask...@novell.com) wrote:
Chris Wright wrote:
But a free-form hypercall(unsigned long nr, unsigned long *args, size_t
count)
means hypercall number and arg list must be the same in order for code
to call hypercall() in a hypervisor agnostic
Gregory Haskins wrote:
We add a generic hypercall() mechanism for use by IO code which is
compatible with a variety of hypervisors, but which prefers to use
hypercalls over other types of hypervisor traps for performance and/or
feature reasons.
For instance, consider an emulated PCI device in
On Tue, May 05, 2009 at 11:16:19PM -0400, Glauber Costa wrote:
When we create a new vcpu, we need to make sure that
all of the state it is going to use (apic state, for example)
already exists. We can do it nicely by making sure kvm_init_vcpu
is executed after everything else in cpu creation.
Gregory Haskins wrote:
Chris Wright wrote:
* Gregory Haskins (gregory.hask...@gmail.com) wrote:
So you would never have someone making a generic
hypercall(KVM_HC_MMU_OP). I agree.
Which is why I think the interface proposal you've made is wrong.
I respectfully
On Wed, May 06, 2009 at 10:53:06AM -0300, Marcelo Tosatti wrote:
On Tue, May 05, 2009 at 11:16:19PM -0400, Glauber Costa wrote:
When we create a new vcpu, we need to make sure that
all of the state it is going to use (apic state, for example)
already exists. We can do it nicely by making
Anthony Liguori wrote:
Avi Kivity wrote:
Alex Williamson wrote:
We can't rely on build switches to tell us if a save image
includes a given field. We also need to save status since
it's visible to the guest. Draw another line in the sand
for broken save versions. The version number should
When we create a new vcpu, we need to make sure that
all of the state it is going to use (apic state, for example)
already exists. We can do it nicely by making sure kvm_init_vcpu
is executed after everything else in cpu creation.
After that, the first call to KVM_SET_LAPIC ioctl will not find an
Hi,
Some freak :-) put x86 specific irq routing into the generic code path,
which obviously won't work on non-x86 systems.
This patch creates kvm_arch_init_irq_routing() and moves the x86
gibberish to it's correct location :-)
Now I have networking again!
Cheers,
Jes
Platform specific IRQ
Glauber Costa wrote:
When we create a new vcpu, we need to make sure that
all of the state it is going to use (apic state, for example)
already exists. We can do it nicely by making sure kvm_init_vcpu
is executed after everything else in cpu creation.
After that, the first call to
Bugs item #2506814, was opened at 2009-01-14 11:38
Message generated for change (Comment added) made by mellen
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2506814group_id=180599
Please note that this message will contain a full copy of the comment
diff --git a/qemu-kvm.c b/qemu-kvm.c
index 8c0d463..8fd80c1 100644
--- a/qemu-kvm.c
+++ b/qemu-kvm.c
@@ -435,6 +435,9 @@ static void *ap_main_loop(void *_env)
kvm_create_vcpu(kvm_context, env-cpu_index);
kvm_qemu_init_env(env);
+/* APIC state creation takes place
Anthony Liguori wrote:
Gregory Haskins wrote:
We add a generic hypercall() mechanism for use by IO code which is
compatible with a variety of hypervisors, but which prefers to use
hypercalls over other types of hypervisor traps for performance and/or
feature reasons.
For instance, consider
On Wed, 6 May 2009, Gregory Haskins wrote:
Al, Davide,
Gregory Haskins wrote:
+
+int
+kvm_irqfd(struct kvm *kvm, int gsi, int flags)
+{
+ struct _irqfd *irqfd;
+ struct file *file = NULL;
+ int fd = -1;
+ int ret;
+
+ irqfd = kzalloc(sizeof(*irqfd), GFP_KERNEL);
Davide Libenzi wrote:
On Wed, 6 May 2009, Gregory Haskins wrote:
Al, Davide,
Gregory Haskins wrote:
+
+int
+kvm_irqfd(struct kvm *kvm, int gsi, int flags)
+{
+ struct _irqfd *irqfd;
+ struct file *file = NULL;
+ int fd = -1;
+ int ret;
+
+ irqfd =
Hi,
The latest changes to qemu-kvm breaks miserably if one tries to build
without CONFIG_GDBSTUB.
Jes
Make qemu-kvm build again when CONFIG_GDBSTUB is not set.
Signed-off-by: Jes Sorensen j...@sgi.com
---
gdbstub.h |6 ++
vl.c |2 --
2 files changed, 6 insertions(+), 2
Glauber Costa wrote:
diff --git a/qemu-kvm.c b/qemu-kvm.c
index 8c0d463..8fd80c1 100644
--- a/qemu-kvm.c
+++ b/qemu-kvm.c
@@ -435,6 +435,9 @@ static void *ap_main_loop(void *_env)
kvm_create_vcpu(kvm_context, env-cpu_index);
kvm_qemu_init_env(env);
+/* APIC state creation
Hi,
This one is needed to build on ia64.
Cheers,
Jes
Defined cpu_has_work() for ia64.
Signed-off-by: Jes Sorensen j...@sgi.com
---
target-ia64/exec.h |5 +
1 file changed, 5 insertions(+)
Index: qemu-kvm/target-ia64/exec.h
This short series adds support for exposing PCI option ROMs on
pass-through devices. I'm hoping that someone with more BIOS-foo
can make use of this to dynamically load option ROMs from within
the BIOS such that we might be able to boot from a pass-through
device. I guess it's theoretically
The PCI code already knows about option ROMs, so we just need to
mmap some space for it, load it with a copy of the contents, and
complete the plubming to the generic code.
Signed-off-by: Alex Williamson alex.william...@hp.com
---
hw/device-assignment.c | 59
Bit 0 is the enable bit, which we not only don't want to set, but
it will stick and make us think it's an I/O port resource.
Signed-off-by: Alex Williamson alex.william...@hp.com
---
kvm/bios/rombios32.c |8 +---
1 files changed, 5 insertions(+), 3 deletions(-)
diff --git
On Wed, 2009-05-06 at 10:21 +0300, Avi Kivity wrote:
Alex Williamson wrote:
We can't rely on build switches to tell us if a save image
includes a given field. We also need to save status since
it's visible to the guest. Draw another line in the sand
for broken save versions. The
Anthony Liguori wrote:
Gregory Haskins wrote:
Today, there is no equivelent of a platform agnostic iowrite32() for
hypercalls so the driver would look like the pseudocode above except
substitute with kvm_hypercall(), lguest_hypercall(), etc. The proposal
is to allow the hypervisor to assign
* Gregory Haskins (ghask...@novell.com) wrote:
Chris Wright wrote:
VF drivers can also have this issue (and typically use mmio).
I at least have a better idea what your proposal is, thanks for
explanation. Are you able to demonstrate concrete benefit with it yet
(improved latency numbers
On Wednesday 06 May 2009, Gregory Haskins wrote:
Ok, so we would
need to come up with these pio_calls for x86, and no other arch can use
the infrastructure (but wait, PPC can use PCI too, so how does that
work? It must be either MMIO emulation or its not supported? That puts
us back to
Hi,
I am running the KVM kernel userspace downloaded on 4/24 with Fedora 10 host
Linux on a Dell T7400 Xeon with VT-x and VT-d enabled. The T7400 has an onboard
Broadcom NIC, but when I use VT-d to assign this NIC to a Fedora 10 guest, the
NIC's tg3 driver in the guest aborts because it
On Wed, 2009-05-06 at 11:51 +0800, Sheng Yang wrote:
On Wednesday 06 May 2009 01:45:47 Nicholas A. Bellinger wrote:
On Tue, 2009-05-05 at 04:28 -0700, Nicholas A. Bellinger wrote:
On Tue, 2009-05-05 at 03:43 -0700, Nicholas A. Bellinger wrote:
On Tue, 2009-05-05 at 09:42 +0800, Yu Zhao
On Wed, May 6, 2009 at 11:31 AM, Nadolski, Ed ed.nadol...@lsi.com wrote:
Hi,
I am running the KVM kernel userspace downloaded on 4/24 with Fedora 10
host Linux on a Dell T7400 Xeon with VT-x and VT-d enabled. The T7400 has an
onboard Broadcom NIC, but when I use VT-d to assign this NIC to
Jan Kiszka wrote:
Sebastian Herbszt wrote:
Simon Bienlein wrote:
Is a support for BIOS worked on right now?
The vgabios (vgabios.c) has a FIXME should beep. Volker, do you plan
to fix this?
Which frequency should be used for the beep? Which delay?
I would try 1 KHz and some hundred
Sebastian Herbszt wrote:
Beth Kon wrote:
@@ -477,6 +480,7 @@ void wrmsr_smp(uint32_t index, uint64_t val)
#define QEMU_CFG_SIGNATURE 0x00
#define QEMU_CFG_ID 0x01
#define QEMU_CFG_UUID 0x02
+#define QEMU_CFG_IRQ0_OVERRIDE 0x0e
Small thing to consider before you resubmit:
In his
On Tue, May 5, 2009 at 3:29 PM, Justin Dossey j...@justindossey.com wrote:
On Mon, May 4, 2009 at 3:40 PM, Marcelo Tosatti mtosa...@redhat.com wrote:
Justin,
On Sun, May 03, 2009 at 11:40:47AM -0700, Justin Dossey wrote:
[snip]
Seems to be an issue with paravirt mmu. Do you happen to have
Bugs item #2624842, was opened at 2009-02-21 13:27
Message generated for change (Comment added) made by jb17bsome
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2624842group_id=180599
Please note that this message will contain a full copy of the comment
Aha, good catch! I think it should fix irq routting for pci irq of ia64 ?
Xiantao
-Original Message-
From: Jes Sorensen [mailto:j...@sgi.com]
Sent: Wednesday, May 06, 2009 10:12 PM
To: Avi Kivity
Cc: Zhang, Xiantao; kvm-i...@vger.kernel.org; kvm@vger.kernel.org
Subject: [patch] fix irq
Jes Sorensen wrote:
Hi,
The latest changes to qemu-kvm breaks miserably if one tries to build
without CONFIG_GDBSTUB.
Jes
--- qemu-kvm.orig/vl.c
+++ qemu-kvm/vl.c
@@ -4417,13 +4417,11 @@
}
if (cpu_can_run(env))
ret = qemu_cpu_exec(env);
-#ifndef
On Wed, 6 May 2009, Gregory Haskins wrote:
I think we are ok in this regard (at least in v5) without the callback.
kvm holds irqfd, which holds eventfd. In a normal situation, we will
have eventfd with 2 references. If userspace closes the eventfd, it
will drop 1 of the 2 eventfd file
Davide Libenzi wrote:
On Wed, 6 May 2009, Gregory Haskins wrote:
I think we are ok in this regard (at least in v5) without the callback.
kvm holds irqfd, which holds eventfd. In a normal situation, we will
have eventfd with 2 references. If userspace closes the eventfd, it
will drop 1
Justin,
On Wed, May 06, 2009 at 04:35:24PM -0700, Justin Dossey wrote:
On Tue, May 5, 2009 at 3:29 PM, Justin Dossey j...@justindossey.com wrote:
On Mon, May 4, 2009 at 3:40 PM, Marcelo Tosatti mtosa...@redhat.com wrote:
Justin,
On Sun, May 03, 2009 at 11:40:47AM -0700, Justin Dossey
On Wed, May 06, 2009 at 06:35:20PM -0400, Beth Kon wrote:
Sebastian Herbszt wrote:
Beth Kon wrote:
@@ -477,6 +480,7 @@ void wrmsr_smp(uint32_t index, uint64_t val)
#define QEMU_CFG_SIGNATURE 0x00
#define QEMU_CFG_ID 0x01
#define QEMU_CFG_UUID 0x02
+#define
From: Avi Kivity a...@redhat.com
Too many to list independently.
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/Makefile.target b/Makefile.target
index be97e6b..a8b198c 100644
--- a/Makefile.target
+++ b/Makefile.target
@@ -140,8 +140,7 @@ endif
kvm.o: CFLAGS+=$(KVM_CFLAGS)
kvm-all.o:
64 matches
Mail list logo