On Wednesday 10 June 2009, Fischer, Anna wrote:
Have you tried eliminating VLAN to simplify the setup?
No - but there is a relating bug in the tun/tap interface (well, it is not
really a bug but simply the way tun/tap works) that will cause packets to
be replicated on all the tap interfaces
Subject: Re: Network throughput limits for local VM - VM
communication
On Wednesday 10 June 2009, Fischer, Anna wrote:
Have you tried eliminating VLAN to simplify the setup?
No - but there is a relating bug in the tun/tap interface (well, it
is not
really a bug but simply the way
Most of the time IRR is empty, so instead of scanning the whole IRR on
each VM entry keep a variable that tells us if IRR is not empty. IRR
will have to be scanned twice on each IRQ delivery, but this is much
more rare than VM entry.
v2:
The only difference from v1 is the comment describing
Linus, please pull the 2.6.31 KVM batch from
git://git.kernel.org/pub/scm/virt/kvm/kvm.git kvm-updates/2.6.31
Changes include MSI support, a rework of the interrupt code, improved smp
performance, and architecure code updates.
Amit Shah (1):
KVM: x86: Ignore reads to EVNTSEL MSRs
Andi
Fischer, Anna wrote:
I am using two bridges, and yes, in theory, the router should be the only connection
between the two guests. However, without VLANs, the tun interface will pass packets
to all tap interfaces. It has to, as it doesn't know to which one the packet has to
go to. It does not
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Izik Eidus wrote:
+ if (!kvm_x86_ops-dirty_bit_support()) {
+ spin_lock(kvm-mmu_lock);
+ /* remove_write_access() flush the tlb */
+ kvm_mmu_slot_remove_write_access(kvm,
Replace previous exception with a new one in a hope that instruction
re-execution will regenerate lost exception.
Signed-off-by: Gleb Natapov g...@redhat.com
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 272e2e8..3150d06 100644
--- a/arch/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@
Bike Snow wrote:
Hello
I've compiled and installed KVM on kernel 2.6.28-11. It worked perfectly.
I'm using Ubuntu 9.04.
I'm now trying to compile on kernel 2.6.29-4.
It fails on compiling the kernel module with this error message:
/usr/src/kvm-kmod-devel-86/x86/iommu.c: In function
On Wed, Jun 10, 2009 at 08:04:13PM +0100, Paul Brook wrote:
If we can't start a new qemu with the same hardware configuration then we
should not be allowing migration or loading of snapshots.
OK, so I'll add an option in virtio-net to disable msi-x, and such
an option will be added in
Subject: Re: Network throughput limits for local VM - VM
communication
Fischer, Anna wrote:
I am using two bridges, and yes, in theory, the router should be the
only connection between the two guests. However, without VLANs, the tun
interface will pass packets to all tap interfaces. It
- Yolkfull Chow yz...@redhat.com wrote:
Michael, these are the backtrace messages:
...
20090611-064959
no_boundary.local_stg.RHEL.5.3-server-64.no_ksm.boot_vms.e1000.user.size_1024:
ERROR: run_once: Test failed: [Errno 12] Cannot allocate memory
20090611-064959
Glauber Costa wrote:
This series do some more cleanups in qemu-kvm.c
I decided it is better to clean it up in place a little bit
before merging it to kvm-all.c
it is dependant on my previous patch:
move libkvm-all.c code to qemu-kvm.c
I don't see that patch. Where is it?
--
error
Glauber Costa wrote:
remove wrappers that existed only due to qemu/libkvm separation.
Use qemu types for function definitions.
-int kvm_register_coalesced_mmio(kvm_context_t kvm, uint64_t addr, uint32_t size)
+int kvm_coalesce_mmio_region(target_phys_addr_t addr, ram_addr_t size)
{
#ifdef
Avi Kivity wrote:
Glauber Costa wrote:
This series do some more cleanups in qemu-kvm.c
I decided it is better to clean it up in place a little bit
before merging it to kvm-all.c
it is dependant on my previous patch:
move libkvm-all.c code to qemu-kvm.c
I don't see that patch. Where is
On 06/11/2009 04:53 PM, Michael Goldish wrote:
- Yolkfull Chowyz...@redhat.com wrote:
Michael, these are the backtrace messages:
...
20090611-064959
no_boundary.local_stg.RHEL.5.3-server-64.no_ksm.boot_vms.e1000.user.size_1024:
ERROR: run_once: Test failed: [Errno 12] Cannot
Avi Kivity wrote:
Izik Eidus wrote:
change the dirty page tracking to work with dirty bity instead of
page fault.
right now the dirty page tracking work with the help of page faults,
when we
want to track a page for being dirty, we write protect it and we mark
it dirty
when we have write page
Izik Eidus wrote:
Avi Kivity wrote:
Izik Eidus wrote:
change the dirty page tracking to work with dirty bity instead of
page fault.
right now the dirty page tracking work with the help of page faults,
when we
want to track a page for being dirty, we write protect it and we
mark it dirty
when
Hello,
I'm trying to setup a virtual machine with my onboard nic passed
through. Unfortunately I get the message:
Failed to assign irq for 2:00.0: Input/output error
Perhaps you are assigning a device that shares an IRQ with another device?
I'm using a clean Ubuntu 9.04 installation (64 bits
Hi Avi,
The conflicts with the networking changes just pushed to qemu.git are
fairly involved to resolve, so I thought I'd try and save you the pain.
Below is a pull request which merges in the latest, and does it in the
way we recently discussed - each conflict is resolved in a
The following patch did not make it in the merge.
I've been waiting for the merge to stabilize first.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
From: Supriya Kannery supri...@in.ibm.com
Default is to run each test once.
Just add iterations = N in kvm_tests.cfg to the test(s) you
want to run multiple times.
Signed-off-by: Supriya Kannery supri...@in.ibm.com
Cc : Michael Goldish mgold...@redhat.com
Signed-off-by: Uri Lublin
Mark McLoughlin wrote:
Hi Avi,
The conflicts with the networking changes just pushed to qemu.git are
fairly involved to resolve, so I thought I'd try and save you the pain.
Below is a pull request which merges in the latest, and does it in the
way we recently discussed - each
Building latest git with ./configure --disable-kvm breaks with errors in
pcspk.c
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Hello KVM-Autotest users developers,
I want to present a new KVM-Autotest module here: kvm_iperf.
Basically it tests networking functionality, stability and performance of guest
OSes.
This test is cross-platform -- i.e. it works on both Linux and Windows VMs.
I was under development since
On Wed, Jun 10, 2009 at 04:50:25PM +0200, Dag Wieers wrote:
On Wed, 10 Jun 2009, Federico Simoncelli wrote:
I've been working quite extensively with kvm on CentOS 5.3 lately.
If you are interested in the latest rpm of kvm-kmod-2.6.30-rc8,
qemu-kvm-0.10.5 and libvirt-0.6.4 you can temporary
Going over this code again, I seem to see a minor error handling issue here:
On Wed, May 20, 2009 at 10:30:49AM -0400, Gregory Haskins wrote:
diff --git a/virt/kvm/eventfd.c b/virt/kvm/eventfd.c
new file mode 100644
index 000..72a282e
--- /dev/null
+++ b/virt/kvm/eventfd.c
@@ -0,0
On Thu, Jun 11, 2009 at 04:16:47PM +0300, Michael S. Tsirkin wrote:
+
+ ret = file-f_op-poll(file, irqfd-pt);
+ if (ret 0)
+ goto fail;
Looking at it some more, we have:
struct file_operations {
unsigned int (*poll) (struct file *, struct poll_table_struct *);
Beth Kon wrote:
Building latest git with ./configure --disable-kvm breaks with errors in
pcspk.c
With latest git, things break much earlier in case your host does not
provide linux/kvm.h because libkvm-all.h includes it unconditionally.
I would like to push this task to Glauber as he is
Disable usage of 2M pages if VMX_EPT_2MB_PAGE_BIT (bit 16) is clear
in MSR_IA32_VMX_EPT_VPID_CAP and EPT is enabled.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: kvm/arch/x86/kvm/vmx.c
===
---
Required by EPT misconfiguration handler.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: kvm/arch/x86/kvm/mmu.c
===
--- kvm.orig/arch/x86/kvm/mmu.c
+++ kvm/arch/x86/kvm/mmu.c
@@ -3013,6 +3013,24 @@ out:
return r;
On Wed, Jun 10, 2009 at 12:21:05PM +0300, Avi Kivity wrote:
Avi Kivity wrote:
Marcelo Tosatti wrote:
This way there is no need to add explicit checks in every
for_each_shadow_entry user.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: kvm/arch/x86/kvm/mmu.c
Handler for EPT misconfiguration which checks for valid state
in the shadow pagetables, printing the spte on each level.
The separate WARN_ONs are useful for kerneloops.org.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: kvm/arch/x86/kvm/vmx.c
Required for EPT misconfiguration handler.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: kvm/arch/x86/include/asm/vmx.h
===
--- kvm.orig/arch/x86/include/asm/vmx.h
+++ kvm/arch/x86/include/asm/vmx.h
@@ -352,9 +352,16 @@
This way there is no need to add explicit checks in every
for_each_shadow_entry user.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: kvm/arch/x86/kvm/mmu.c
===
--- kvm.orig/arch/x86/kvm/mmu.c
+++ kvm/arch/x86/kvm/mmu.c
@@
Addressing comments.
--
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
On Thu, Jun 11, 2009 at 02:27:46PM +0300, Izik Eidus wrote:
Marcelo Tosatti wrote:
What i'm saying is with shadow and NPT (i believe) you can mark a spte
writable but not dirty, which gives you the ability to know whether
certain pages have been dirtied.
Isnt this what this patch is
Bugs item #2353510, was opened at 2008-11-27 14:46
Message generated for change (Settings changed) made by technologov
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2353510group_id=180599
Please note that this message will contain a full copy of the
Marcelo Tosatti wrote:
Addressing comments, introducing a new helper, handling largepages.
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
Glauber Costa wrote:
Ultimately, goal is to put it in kvm-all.c, so we
can start sharing things. This is put here first
to allow for preparation.
It is almost a cut and paste. Only needed adaptation
goes with kvm_has_sync_mmu(), which had a conflicting
definition.
Applied, thanks.
--
Marcelo Tosatti wrote:
Required by EPT misconfiguration handler.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: kvm/arch/x86/kvm/mmu.c
===
--- kvm.orig/arch/x86/kvm/mmu.c
+++ kvm/arch/x86/kvm/mmu.c
@@ -3013,6 +3013,24
remove wrappers that existed only due to qemu/libkvm separation.
Use qemu types for function definitions.
Signed-off-by: Glauber Costa glom...@redhat.com
---
qemu-kvm.c | 27 ---
qemu-kvm.h |5 -
2 files changed, 4 insertions(+), 28 deletions(-)
diff --git
The purpose of that was only to allow the user of libkvm
to register functions pointers that corresponded to possible
actions. We don't need that anymore.
Signed-off-by: Glauber Costa glom...@redhat.com
---
libkvm-all.h |4 +-
qemu-kvm.c | 380
Glauber Costa wrote:
Same series as before, but with avi's little comment addressed.
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More
These patches resolve the irq0-inti2 override issue, and get the hpet working
on kvm.
Override and HPET changes are sent as a series because HPET depends on the
override. Win2k8 expects the HPET interrupt on inti2, regardless of whether
an override exists in the BIOS. And the HPET spec states
Signed-off-by: Beth Kon e...@us.ibm.com
---
kvm/bios/acpi-dsdt.dsl |2 --
kvm/bios/rombios32.c | 11 +++
2 files changed, 3 insertions(+), 10 deletions(-)
diff --git a/kvm/bios/acpi-dsdt.dsl b/kvm/bios/acpi-dsdt.dsl
index db57307..71d0a5e 100755
--- a/kvm/bios/acpi-dsdt.dsl
+++
Signed-off-by: Beth Kon e...@us.ibm.com
---
arch/x86/include/asm/kvm.h |1 +
arch/x86/kvm/i8254.c | 24 +++-
arch/x86/kvm/i8254.h |3 ++-
arch/x86/kvm/x86.c |5 -
4 files changed, 26 insertions(+), 7 deletions(-)
diff --git
Signed-off-by: Beth Kon e...@us.ibm.com
---
hw/ioapic.c|6 +++---
hw/pc.c|2 ++
qemu-kvm-x86.c |6 +-
qemu-kvm.h |2 ++
sysemu.h |1 +
vl.c | 11 +--
6 files changed, 22 insertions(+), 6 deletions(-)
diff --git a/hw/ioapic.c
The big change here is handling of enabling/disabling of hpet legacy mode. When
hpet enters
legacy mode, the spec says that the pit stops generating interrupts. In
practice, we want to
stop the pit periodic timer from running because it is wasteful in a virtual
environment.
We also have to
Required for EPT misconfiguration handler.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: kvm/arch/x86/include/asm/vmx.h
===
--- kvm.orig/arch/x86/include/asm/vmx.h
+++ kvm/arch/x86/include/asm/vmx.h
@@ -352,9 +352,16 @@
Handler for EPT misconfiguration which checks for valid state
in the shadow pagetables, printing the spte on each level.
The separate WARN_ONs are useful for kerneloops.org.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: kvm/arch/x86/kvm/vmx.c
Required by EPT misconfiguration handler.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: kvm/arch/x86/kvm/mmu.c
===
--- kvm.orig/arch/x86/kvm/mmu.c
+++ kvm/arch/x86/kvm/mmu.c
@@ -3013,6 +3013,24 @@ out:
return r;
This way there is no need to add explicit checks in every
for_each_shadow_entry user.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: kvm/arch/x86/kvm/mmu.c
===
--- kvm.orig/arch/x86/kvm/mmu.c
+++ kvm/arch/x86/kvm/mmu.c
@@
Disable usage of 2M pages if VMX_EPT_2MB_PAGE_BIT (bit 16) is clear
in MSR_IA32_VMX_EPT_VPID_CAP and EPT is enabled.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: kvm/arch/x86/kvm/vmx.c
===
---
On Thu, 7 May 2009 11:28:41 +0300
Michael S. Tsirkin m...@redhat.com wrote:
pci_enable_msix currently returns -EINVAL if you ask
for more vectors than supported by the device, which would
typically cause fallback to regular interrupts.
It's better to return the table size, making the driver
Beth Kon wrote:
Sebastian Herbszt wrote:
Beth Kon wrote:
These patches resolve the irq0-inti2 override issue, and get the
hpet working
on kvm.
Override and HPET changes are sent as a series because HPET depends
on the
override. Win2k8 expects the HPET interrupt on inti2, regardless of
These patches resolve the irq0-inti2 override issue, and get the hpet working
on kvm.
Override and HPET changes are sent as a series because HPET depends on the
override. Win2k8 expects the HPET interrupt on inti2, regardless of whether
an override exists in the BIOS. And the HPET spec states
Signed-off-by: Beth Kon e...@us.ibm.com
---
hw/ioapic.c|6 +++---
hw/pc.c|2 ++
qemu-kvm-x86.c |6 +-
qemu-kvm.h |2 ++
sysemu.h |1 +
vl.c | 11 +--
6 files changed, 22 insertions(+), 6 deletions(-)
diff --git a/hw/ioapic.c
Signed-off-by: Beth Kon e...@us.ibm.com
---
kvm/bios/acpi-dsdt.dsl |2 --
kvm/bios/rombios32.c | 11 +++
2 files changed, 3 insertions(+), 10 deletions(-)
diff --git a/kvm/bios/acpi-dsdt.dsl b/kvm/bios/acpi-dsdt.dsl
index db57307..71d0a5e 100755
--- a/kvm/bios/acpi-dsdt.dsl
+++
The big change here is handling of enabling/disabling of hpet legacy mode. When
hpet enters
legacy mode, the spec says that the pit stops generating interrupts. In
practice, we want to
stop the pit periodic timer from running because it is wasteful in a virtual
environment.
We also have to
Signed-off-by: Beth Kon e...@us.ibm.com
---
arch/x86/include/asm/kvm.h |1 +
arch/x86/kvm/i8254.c | 24 +++-
arch/x86/kvm/i8254.h |3 ++-
arch/x86/kvm/x86.c |5 -
4 files changed, 26 insertions(+), 7 deletions(-)
diff --git
On Thu, Jun 04, 2009 at 08:48:02AM -0400, Gregory Haskins wrote:
(Applies to kvm.git/master:25deed73)
Please see the header for 2/2 for a description. This patch series has been
fully tested and appears to be working correctly.
[Review notes:
*) Paul has looked at the SRCU design
[ Resending with correct address for Davide. Pls don't reply
to the original one, you'll get bounces. ]
On Thu, Jun 04, 2009 at 08:48:02AM -0400, Gregory Haskins wrote:
(Applies to kvm.git/master:25deed73)
Please see the header for 2/2 for a description. This patch series has been
fully
From: Uri Lublin u...@redhat.com
--
To unsubscribe from this list: send the line unsubscribe kvm-commits in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
From: Avi Kivity a...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/ia64/external-module-compat.h b/ia64/external-module-compat.h
index 8ccad90..60a83a1 100644
--- a/ia64/external-module-compat.h
+++ b/ia64/external-module-compat.h
@@ -24,6 +24,10 @@ typedef u64 phys_addr_t;
From: Gleb Natapov g...@redhat.com
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/i8254.c b/arch/x86/kvm/i8254.c
index 5d5cfd3..26c29cb 100644
--- a/arch/x86/kvm/i8254.c
+++ b/arch/x86/kvm/i8254.c
@@ -291,7 +291,7 @@ static void
From: Avi Kivity a...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
--
To unsubscribe from this list: send the line unsubscribe kvm-commits in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
From: Gleb Natapov g...@redhat.com
Use it instead of open code vcpu_id zero is BSP assumption.
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/ia64/kvm/kvm-ia64.c b/arch/ia64/kvm/kvm-ia64.c
index 3199221..3924591 100644
---
From: Gleb Natapov g...@redhat.com
Archs are free to use vcpu_id as they see fit. For x86 it is used as
vcpu's apic id. New ioctl is added to configure boot vcpu id that was
assumed to be 0 till now.
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff
From: Avi Kivity a...@redhat.com
* 'for-avi' of git://git.et.redhat.com/qemu-net: (69 commits)
Fix build breakage when using VDE introduced by 4f1c942
Fix defined but not used warning
monitor: Introduce get_command_name()
monitor: Remove unused variable
monitor: Remove uneeded 'return'
From: Glauber Costa glom...@redhat.com
Those headers define qemu specific things like ram_addr_t.
This will allow us to start using them in libkvm.
Signed-off-by: Glauber Costa glom...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/libkvm-all.c b/libkvm-all.c
index
70 matches
Mail list logo