On 01/21/2010 05:05 PM, Anthony Liguori wrote:
On 01/20/2010 07:18 PM, john cooper wrote:
Chris Wright wrote:
* Daniel P. Berrange (berra...@redhat.com) wrote:
To be honest all possible naming schemes for '-cpuname' are just as
unfriendly as each other. The only user friendly option is '-cpu
Bugs item #2939216, was opened at 2010-01-25 11:48
Message generated for change (Tracker Item Submitted) made by llevy
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2939216group_id=180599
Please note that this message will contain a full copy of the
On HW task switch newly loaded segments should me marked as accessed.
Reported-by: Lorenzo Martignoni martig...@gmail.com
Signed-off-by: Gleb Natapov g...@redhat.com
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 47c6e23..b5a2a88 100644
--- a/arch/x86/kvm/x86.c
+++
On 01/25/2010 12:01 PM, Gleb Natapov wrote:
On HW task switch newly loaded segments should me marked as accessed.
@@ -4775,6 +4766,11 @@ int kvm_load_segment_descriptor(struct kvm_vcpu *vcpu,
u16 selector,
kvm_seg.unusable = 1;
kvm_set_segment(vcpu,kvm_seg,
On Mon, Jan 25, 2010 at 01:08:13PM +0200, Avi Kivity wrote:
On 01/25/2010 12:01 PM, Gleb Natapov wrote:
On HW task switch newly loaded segments should me marked as accessed.
@@ -4775,6 +4766,11 @@ int kvm_load_segment_descriptor(struct kvm_vcpu
*vcpu, u16 selector,
On 01/25/2010 01:11 PM, Gleb Natapov wrote:
On Mon, Jan 25, 2010 at 01:08:13PM +0200, Avi Kivity wrote:
On 01/25/2010 12:01 PM, Gleb Natapov wrote:
On HW task switch newly loaded segments should me marked as accessed.
@@ -4775,6 +4766,11 @@ int kvm_load_segment_descriptor(struct
Dor Laor wrote:
x86 qemu64
x86 phenom
x86 core2duo
x86kvm64
x86 qemu32
x86 coreduo
x86 486
x86 pentium
x86 pentium2
x86 pentium3
x86 athlon
x86 n270
I wonder if kvm32
-Original Message-
From: Alexander Graf [mailto:ag...@suse.de]
Sent: Friday, January 22, 2010 7:33 PM
To: Liu Yu-B13201
Cc: hol...@penguinppc.org; kvm-...@vger.kernel.org;
kvm@vger.kernel.org
Subject: Re: [PATCH] kvmppc/booke: Set ESR and DEAR when
inject interrupt to guest
On Mon, Jan 25, 2010 at 01:12:36PM +0200, Avi Kivity wrote:
On 01/25/2010 01:11 PM, Gleb Natapov wrote:
On Mon, Jan 25, 2010 at 01:08:13PM +0200, Avi Kivity wrote:
On 01/25/2010 12:01 PM, Gleb Natapov wrote:
On HW task switch newly loaded segments should me marked as accessed.
@@ -4775,6
On 01/25/2010 02:24 PM, Gleb Natapov wrote:
On Mon, Jan 25, 2010 at 01:12:36PM +0200, Avi Kivity wrote:
On 01/25/2010 01:11 PM, Gleb Natapov wrote:
On Mon, Jan 25, 2010 at 01:08:13PM +0200, Avi Kivity wrote:
On 01/25/2010 12:01 PM, Gleb Natapov wrote:
On HW task
On Sun, Jan 24, 2010 at 04:26:40PM +0200, Avi Kivity wrote:
When cr0.mp is clear, the guest doesn't expect a #NM in response to
a WAIT instruction. Because we always keep cr0.mp set, it will get
a #NM, and potentially be confused.
Fix by keeping cr0.mp set only when the fpu is inactive, and
On Sun, Jan 24, 2010 at 12:17:23PM +0200, Avi Kivity wrote:
The simplistic clts implementation has a couple of flaws:
- kvm_read_cr0_bits() is temporarily unsynchronized when vcpu-arch.cr0
changes
- if the fpu is active, we need to clear GUEST_CR0.TS, not just
CR_READ_SHADOW.TS, so that we
From f94dcd1ccabbcdb51ed7c37c5f58f00a5c1b7eec Mon Sep 17 00:00:00 2001
From: Izik Eidus iei...@redhat.com
Date: Mon, 25 Jan 2010 15:49:41 +0200
Subject: [PATCH] RFC: alias rework
This patch remove the old way of aliasing inside kvm
and move into using aliasing with the same virtual addresses
On Mon, Jan 25, 2010 at 02:53:09PM +0200, Avi Kivity wrote:
On 01/25/2010 02:24 PM, Gleb Natapov wrote:
On Mon, Jan 25, 2010 at 01:12:36PM +0200, Avi Kivity wrote:
On 01/25/2010 01:11 PM, Gleb Natapov wrote:
On Mon, Jan 25, 2010 at 01:08:13PM +0200, Avi Kivity wrote:
On 01/25/2010 12:01 PM,
On 01/25/2010 03:08 AM, Dor Laor wrote:
qemu-config.[ch], taking a new command line that parses the argument via
QemuOpts, then passing the parsed options to a target-specific function
that then builds the table of supported cpus.
It should just be a matter of adding qemu_cpudefs_opts to
Isn't
On 01/25/2010 04:22 PM, Gleb Natapov wrote:
Things like 'return kvm_write_guest_virt()' do handle it.
That what save_guest_segment_descriptor() calls, but error is not
propagated to userspace anywhere in the task switch code. Lets apply this
patch and I'll send follow up with fixes for
Avi Kivity wrote:
Hi Avi,
I've just done a quick test re-enabling processor.sys on my WinXP
guest and then did the following:
virsh stop winxp
rmmod kvm_intel
rmmod kvm
modprobe kvm ignore_msrs=1
modprobe kvm_intel
virsh start winxp
Unfortunately it still crashes with the same
On 01/25/2010 05:15 PM, Mark Cave-Ayland wrote:
Unfortunately it still crashes with the same
DRIVER_UNLOADED_WITHOUT_CANCELING_PENDING_OPERATIONS BSOD :(
Well, don't do that then. Is there any specific functionality in
processor.sys that you're missing?
No, not at all. My only concern was
Sometimes the latest commit might not have any tags
associated, leading to a failure on git describe.
Let's handle this failure appropriately.
Signed-off-by: Lucas Meneghel Rodrigues l...@redhat.com
---
client/tests/kvm/kvm_utils.py |6 +-
1 files changed, 5 insertions(+), 1 deletions(-)
Avi Kivity wrote:
Well, there was a regression, but it was in 0.12.1.1.
There were two bugs involved, a serious one (that caused the cpuid to
show up as AMD) hiding the less serious one (that causes processor.sys
to BSOD).
Okay, understood. I must have just got lucky when upgrading from
On Mon, Jan 25, 2010 at 03:46:44PM +0800, Sheng Yang wrote:
The default action of coalesced MMIO is, cache the writing in buffer, until:
1. The buffer is full.
2. Or the exit to QEmu due to other reasons.
But this would result in a very late writing in some condition.
1. The each time write
On 01/25/2010 06:06 PM, Mark Cave-Ayland wrote:
I'd like to find out why processor.sys fails, but the .1-.2 change
isn't any help unfortunately. It looks like here too there are two
bugs involved: one in kvm which doesn't act like processor.sys
expects it, and one in processor.sys which
Avi Kivity wrote:
I've had a quick look at this, and I can't work out how to enable kvm
trace in Kconfig. Is there any documentation on how to build with kvm
trace enabled for debugging?
CONFIG_FTRACE, CONFIG_TRACEPOINTS should be sufficient, I think. 2.6.32
or later IIRC.
Hmmm these
On 01/25/2010 06:18 PM, Mark Cave-Ayland wrote:
Avi Kivity wrote:
I've had a quick look at this, and I can't work out how to enable
kvm trace in Kconfig. Is there any documentation on how to build
with kvm trace enabled for debugging?
CONFIG_FTRACE, CONFIG_TRACEPOINTS should be sufficient,
On 22/01/10 23:33, Brian Jackson wrote:
1. I am experiencing a 40% performance hit (600 Mb/s) on each individual
virtio guest connection ;
I don't know what all features RHEL5.4 enables for kvm, but that doesn't seem
outside the realm of possibility. Especially depending on what OS is
Hi,
Right now KVM/QEMU relies on hard coded values in Seabios for the
reserved area for the TSS pages and the EPT page.
I'd like to suggest we change this to pass the value from QEMU via
qemu-cfg making it possible to move it around dynamically in the future.
Attached is a patch to Seabios for
Hi,
This is the QEMU-KVM bits for providing the e820-reserve space through
qemu-cfg.
Cheers,
Jes
Use qemu-cfg to notify the BIOS of the location of the TSS range to
reserve in the e820 table, to avoid relying on hard coded values.
Signed-off-by: Jes Sorensen jes.soren...@redhat.com
---
Avi Kivity wrote:
echo kvm /sys/kernel/debug/tracing/set_event
(you can also enable just the msr and cpuid events, see
/sys/kernel/debug/tracing/events)
cat /sys/kernel/debug/trace
(goes on a kernel debugging crash course)
Okay I think I've got the information you need for msr and cpuid:
On 25.01.2010, at 17:52, Jes Sorensen wrote:
Hi,
This is the QEMU patch for providing the e820-reserve space through
qemu-cfg.
Howdy. Congratulations to the new mail address - looks neat ;-).
Two comments:
1) I don't see how passing a single region is any help. I'd rather like to see
a
Linus, please pull from
git://git.kernel.org/pub/scm/virt/kvm/kvm.git kvm-updates/2.6.33
For the following KVM fixes.
Alexander Graf (1):
KVM: powerpc: Show timing option only on embedded
Avi Kivity (1):
KVM: Fix race between APIC TMR and IRR
Christian Borntraeger (1):
KVM:
Am 25.01.2010 um 18:13 schrieb Jes Sorensen jes.soren...@redhat.com:
On 01/25/10 17:58, Alexander Graf wrote:
Howdy. Congratulations to the new mail address - looks neat ;-).
:-)
Two comments:
1) I don't see how passing a single region is any help. I'd rather
like to see a device tree
We don't trace failed msr access (wrmsr or rdmsr which end up generating a
#GP), which loses important data.
Avi Kivity (2):
KVM: Fix msr trace
KVM: Trace failed msr reads and writes
arch/x86/kvm/svm.c | 13 -
arch/x86/kvm/trace.h | 27 ---
- data is 64 bits wide, not unsigned long
- rw is confusingly named
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/trace.h | 16
1 files changed, 8 insertions(+), 8 deletions(-)
diff --git a/arch/x86/kvm/trace.h b/arch/x86/kvm/trace.h
index 1cb3d0e..45903a9 100644
On 01/25/2010 06:54 PM, Mark Cave-Ayland wrote:
Avi Kivity wrote:
echo kvm /sys/kernel/debug/tracing/set_event
(you can also enable just the msr and cpuid events, see
/sys/kernel/debug/tracing/events)
cat /sys/kernel/debug/trace
(goes on a kernel debugging crash course)
Okay I think
On 01/25/10 18:28, Alexander Graf wrote:
That way we'd get 2 entries and the chance to enhance them later on.
In fact, it might even make sense to pass the whole table in such a
form. That way qemu generates all of the e820 tables and we can
declare whatever we want. Just add a type field in the
Record failed msrs reads and writes, and the fact that they failed as well.
Signed-off-by: Avi Kivity a...@redhat.com
---
(cosmetic indentation fix)
arch/x86/kvm/svm.c | 13 -
arch/x86/kvm/trace.h | 17 +++--
arch/x86/kvm/vmx.c |5 +++--
3 files changed, 22
Jernej Simončič wrote:
On Sunday, January 24, 2010, 19:28:47, Jean-Philippe Menil wrote:
Maybe the same can be done with windows guest.
Should work with any Windows, and verified to work with Vista x64
guest.
The only problem is that windows does not want to shut down when you
need it.
Michael Tokarev wrote:
Jernej Simončič wrote:
On Sunday, January 24, 2010, 19:28:47, Jean-Philippe Menil wrote:
Maybe the same can be done with windows guest.
Should work with any Windows, and verified to work with Vista x64
guest.
The only problem is that windows does not want to shut
On Mon, 25 Jan 2010 17:45:53 -0200
Marcelo Tosatti mtosa...@redhat.com wrote:
Izik,
On Mon, Jan 25, 2010 at 03:53:44PM +0200, Izik Eidus wrote:
From f94dcd1ccabbcdb51ed7c37c5f58f00a5c1b7eec Mon Sep 17 00:00:00 2001
From: Izik Eidus iei...@redhat.com
Date: Mon, 25 Jan 2010 15:49:41 +0200
On 25.01.2010, at 18:46, Jes Sorensen wrote:
On 01/25/10 18:28, Alexander Graf wrote:
That way we'd get 2 entries and the chance to enhance them later on.
In fact, it might even make sense to pass the whole table in such a
form. That way qemu generates all of the e820 tables and we can
On 01/25/2010 02:04 PM, Alexander Graf wrote:
On 25.01.2010, at 18:46, Jes Sorensen wrote:
On 01/25/10 18:28, Alexander Graf wrote:
That way we'd get 2 entries and the chance to enhance them later on.
In fact, it might even make sense to pass the whole table in such a
form. That way
On 01/25/10 21:14, Anthony Liguori wrote:
On 01/25/2010 02:04 PM, Alexander Graf wrote:
Yes, sounds good. Should be fairly extensible then. What about memory
holes? Do we need to take care of them?
It would be nice for QEMU to be able to add additional e820 regions that
don't necessarily fit
On 25.01.2010, at 22:05, Jes Sorensen wrote:
On 01/25/10 21:14, Anthony Liguori wrote:
On 01/25/2010 02:04 PM, Alexander Graf wrote:
Yes, sounds good. Should be fairly extensible then. What about memory
holes? Do we need to take care of them?
It would be nice for QEMU to be able to add
On 01/25/10 22:08, Alexander Graf wrote:
On 25.01.2010, at 22:05, Jes Sorensen wrote:
Only problem is that we don't really have a way to pass back info
saying 'you messed up trying to pinch an area that the BIOS wants
for itself'.
Eh - the BIOS shouldn't even try to use regions that are
On Mon, Jan 25, 2010 at 10:40:32PM +0200, Izik Eidus wrote:
On Mon, 25 Jan 2010 18:20:39 -0200
Marcelo Tosatti mtosa...@redhat.com wrote:
With current code, if a memslot is deleted, access through any aliases
that use it will fail (BTW it looks this is not properly handled, but
thats a
On Mon, Jan 25, 2010 at 12:01:04PM +0200, Gleb Natapov wrote:
On HW task switch newly loaded segments should me marked as accessed.
Reported-by: Lorenzo Martignoni martig...@gmail.com
Signed-off-by: Gleb Natapov g...@redhat.com
Applied, thanks.
--
To unsubscribe from this list: send the
On Mon, 25 Jan 2010 18:49:25 -0200
Marcelo Tosatti mtosa...@redhat.com wrote:
On Mon, Jan 25, 2010 at 10:40:32PM +0200, Izik Eidus wrote:
On Mon, 25 Jan 2010 18:20:39 -0200
Marcelo Tosatti mtosa...@redhat.com wrote:
With current code, if a memslot is deleted, access through any aliases
Avi Kivity wrote:
Unfortunately msr tracing fails to record some important information. I
just posted a patch to fix this. Can you rerun from kvm.git branch
msr-trace? That contains the fix.
Done.
http://pastebin.com/m209b1f13
Hopefully this trace should give a better indication of when
On 01/25/2010 04:21 PM, Anthony Liguori wrote:
On 01/25/2010 03:08 AM, Dor Laor wrote:
qemu-config.[ch], taking a new command line that parses the argument via
QemuOpts, then passing the parsed options to a target-specific function
that then builds the table of supported cpus.
It should just
* Brian Jackson (i...@theiggy.com) wrote:
On Saturday 23 January 2010 05:20:49 Yigal Korman wrote:
I'm trying to pass a second video card to a Windows 7 virtual machine
with KVM, and I get the following error:
KVM doesn't support assigning graphics cards to VMs yet. There are people
On Mon, Jan 25, 2010 at 05:46:42PM +0100, Jes Sorensen wrote:
Hi,
Right now KVM/QEMU relies on hard coded values in Seabios for the
reserved area for the TSS pages and the EPT page.
I'd like to suggest we change this to pass the value from QEMU via
qemu-cfg making it possible to move it
2010/1/26 Chris Wright chr...@sous-sol.org:
Again, VT (or VT-x) isn't the same as VT-d. So to be sure, you can
grep dmesg for DMAR and IOMMU to verify that the chipset actually has
VT-d support, that it's enabled, and that it's not broken (there are
quite a few broken BIOS out there that
2010/1/26 Kenni Lund ke...@kelu.dk:
2010/1/26 Chris Wright chr...@sous-sol.org:
Again, VT (or VT-x) isn't the same as VT-d. So to be sure, you can
grep dmesg for DMAR and IOMMU to verify that the chipset actually has
VT-d support, that it's enabled, and that it's not broken (there are
quite
* Kenni Lund (ke...@kelu.dk) wrote:
2010/1/26 Kenni Lund ke...@kelu.dk:
2010/1/26 Chris Wright chr...@sous-sol.org:
Again, VT (or VT-x) isn't the same as VT-d. So to be sure, you can
grep dmesg for DMAR and IOMMU to verify that the chipset actually has
VT-d support, that it's enabled,
Hi,
I have a box with an AMD Phenom II X4 920 CPU
Reading http://www.linux-kvm.org/page/FAQ#What_do_I_need_to_use_KVM.3F,
I've verified with 'cat /proc/cpuinfo' that the CPU has the AMD-V
svm extension.
I'm specifically interested in whether or not this CPU's capabilities
will allow PCI
This is designed to test all subcommands of 'qemu-img' however
so far 'commit' is not implemented.
* For 'check' subcommand test, it will 'dd' to create a file with specified
size and see whether it's supported to be checked. Then convert it to be
supported formats (qcow2 and raw so far) to see
On Monday 25 January 2010 21:11:12 Ben DJ wrote:
Hi,
I have a box with an AMD Phenom II X4 920 CPU
Reading http://www.linux-kvm.org/page/FAQ#What_do_I_need_to_use_KVM.3F,
I've verified with 'cat /proc/cpuinfo' that the CPU has the AMD-V
svm extension.
I'm specifically interested in
On 01/26/2010 12:25 AM, Mark Cave-Ayland wrote:
Avi Kivity wrote:
Unfortunately msr tracing fails to record some important
information. I just posted a patch to fix this. Can you rerun from
kvm.git branch msr-trace? That contains the fix.
Done.
http://pastebin.com/m209b1f13
Hopefully
On 01/26/2010 03:11 AM, Kenni Lund wrote:
Can someone with write permissions to the wiki please add this?
Everyone has write permissions, you just need an account.
--
Do not meddle in the internals of kernels, for they are subtle and quick to
panic.
--
To unsubscribe from this list:
On Mon, Jan 25, 2010 at 9:44 PM, Brian Jackson i...@theiggy.com wrote:
You do need iommu support in your system. Unfortunately there are very few AMD
motherboards that have an iommu. Only 1 server level board I know of has one
and is close to hitting the markets. So chances are you don't have
On Mon, Jan 25, 2010 at 06:13:35PM +0100, Jes Sorensen wrote:
On 01/25/10 17:58, Alexander Graf wrote:
Howdy. Congratulations to the new mail address - looks neat ;-).
:-)
Two comments:
1) I don't see how passing a single region is any help. I'd rather like to
see a device tree like
Please send in any agenda items you are interested in covering.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
On Tuesday 26 January 2010 00:22:25 Ben DJ wrote:
On Mon, Jan 25, 2010 at 9:44 PM, Brian Jackson i...@theiggy.com wrote:
You do need iommu support in your system. Unfortunately there are very
few AMD motherboards that have an iommu. Only 1 server level board I know
of has one and is close
-Original Message-
From: Alexander Graf [mailto:ag...@suse.de]
Sent: Friday, January 22, 2010 7:33 PM
To: Liu Yu-B13201
Cc: hol...@penguinppc.org; kvm-ppc@vger.kernel.org;
k...@vger.kernel.org
Subject: Re: [PATCH] kvmppc/booke: Set ESR and DEAR when
inject interrupt to guest
64 matches
Mail list logo