From: Eduardo Habkost ehabk...@redhat.com
This should have no effect, it is just to make the code clearer.
Signed-off-by: Eduardo Habkost ehabk...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 364263a..1773017 100644
---
From: Avi Kivity a...@redhat.com
Merge the user-return-notifier infrastructure.
Signed-off-by: Avi Kivity a...@redhat.com
--
To unsubscribe from this list: send the line unsubscribe kvm-commits in
the body of a message to majord...@vger.kernel.org
More majordomo info at
From: Eduardo Habkost ehabk...@redhat.com
The svm_set_cr0() call will initialize save-cr0 properly even when npt is
enabled, clearing the NW and CD bits as expected, so we don't need to
initialize it manually for npt_enabled anymore.
Signed-off-by: Eduardo Habkost ehabk...@redhat.com
From: Avi Kivity a...@redhat.com
When CONFIG_USER_RETURN_NOTIFIER is set, we need to link
kernel/user-return-notifier.o.
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/kernel/Makefile b/kernel/Makefile
index b8d4cd8..0ae57a8 100644
--- a/kernel/Makefile
+++ b/kernel/Makefile
@@ -95,6
From: Eduardo Habkost ehabk...@redhat.com
svm_vcpu_reset() was not properly resetting the contents of the guest-visible
cr0 register, causing the following issue:
https://bugzilla.redhat.com/show_bug.cgi?id=525699
Without resetting cr0 properly, the vcpu was running the SIPI bootstrap routine
From: Avi Kivity a...@redhat.com
Currently MSR_KERNEL_GS_BASE is saved and restored as part of the
guest/host msr reloading. Since we wish to lazy-restore all the other
msrs, save and reload MSR_KERNEL_GS_BASE explicitly instead of using
the common code.
Signed-off-by: Avi Kivity
From: Avi Kivity a...@redhat.com
So we can extend it later.
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/Documentation/kvm/api.txt b/Documentation/kvm/api.txt
index f504e0b..36594ba 100644
--- a/Documentation/kvm/api.txt
+++ b/Documentation/kvm/api.txt
@@ -608,8 +608,8 @@ page of a
From: Hollis Blanchard holl...@us.ibm.com
The old BUILD_BUG_ON implementation didn't work with __builtin_constant_p().
Fixing that revealed this test had been inverted for a long time without
anybody noticing...
Signed-off-by: Hollis Blanchard holl...@us.ibm.com
Signed-off-by: Avi Kivity
From: Avi Kivity a...@redhat.com
The various syscall-related MSRs are fairly expensive to switch. Currently
we switch them on every vcpu preemption, which is far too often:
- if we're switching to a kernel thread (idle task, threaded interrupt,
kernel-mode virtio server (vhost-net), for
From: Gleb Natapov g...@redhat.com
Probably introduced by a bad merge.
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index be968f1..2ef3906 100644
--- a/arch/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@
From: Avi Kivity a...@redhat.com
--
To unsubscribe from this list: send the line unsubscribe kvm-commits in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
From: Gleb Natapov g...@redhat.com
If TSS we are switching to resides in high memory task switch will fail
since address will be truncated. Windows2k3 does this sometimes when
running with more then 4G
Cc: sta...@kernel.org
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Avi Kivity
On 2009/10/25 17:51, Dietmar Maurer wrote:
Do you support multiple guests accessing the same image?
A VM image can be attached to any VMs but one VM at a time; multiple
running VMs cannot access to the same VM image.
I guess this is a problem when you want to do live migrations?
Yes,
Avi Kivity wrote:
On 10/15/2009 01:27 PM, Jan Kiszka wrote:
Perhaps it makes sense to query about individual states, including
existing ones? That will allow us to deprecate and then phase out
broken states. It's probably not worth it.
You may do this already with the given design:
Avi Kivity wrote:
On 10/23/2009 12:06 AM, Alexander Graf wrote:
Am 22.10.2009 um 18:29 schrieb Avi Kivity a...@redhat.com:
On 10/13/2009 08:35 AM, Jan Kiszka wrote:
It can be particularly slow if you use in-kernel irqchips and the
default NIC emulation (up to 10 times slower), some effect I
On 10/25/2009 06:45 PM, Alexander Graf wrote:
It's not. We can't use the guest memory for hsave because then the
guest could break the l1 state, so a malicious hypervisor could
break us.
Guest hsave should be used for storing guest state when switching
into the nested guest, not host state.
On 10/26/2009 10:12 AM, Jan Kiszka wrote:
No. Dedicated I/O threads provide parallelism. All latency needs is to
have SIGIO sent on all file descriptors (or rather, in qemu-kvm with
irqchip, to have all file descriptors in the poll() call).
Jan, does slirp add new connections to the select
On Mon, Oct 26, 2009 at 12:11:51PM +1030, Rusty Russell wrote:
On Mon, 26 Oct 2009 03:33:40 am Michael S. Tsirkin wrote:
virtio net used to unlink skbs from send queues on error,
but ever since 48925e372f04f5e35fec6269127c62b2c71ab794
we do not do this. This causes guest data corruption and
On 10/23/09 17:54, Stefan wrote:
Hello,
I have a simple question (sorry I'm a kvm beginner):
Is it right that a 64bit guest (8 CPUs, 16GB) is
much faster than a 32bit guest (8 CPUs, 16GB PAE).
Yes. With *that* much memory the 32bit guest
I am pleased to announce that Jan Kiszka has agreed to maintain
kvm-kmod.git, the backporting kit that allows running modern kvm code on
older kernels. Jan will release kvm-kmod-2.6.x.y packages and
kvm-kmod-2.6.x-rcy packages, while Marcelo and I will (with Jan's help)
release
On Mon, Oct 26, 2009 at 12:11:51PM +1030, Rusty Russell wrote:
On Mon, 26 Oct 2009 03:33:40 am Michael S. Tsirkin wrote:
virtio net used to unlink skbs from send queues on error,
but ever since 48925e372f04f5e35fec6269127c62b2c71ab794
we do not do this. This causes guest data corruption and
Am 26.10.2009 um 09:33 schrieb Avi Kivity a...@redhat.com:
On 10/25/2009 06:45 PM, Alexander Graf wrote:
It's not. We can't use the guest memory for hsave because then
the guest could break the l1 state, so a malicious hypervisor
could break us.
Guest hsave should be used for storing
On Sun, Oct 25, 2009 at 11:49:35AM +0200, Avi Kivity wrote:
On 10/24/2009 12:35 PM, Alexander Graf wrote:
Hm, thinking about this again, it might be useful to have an
currently in nested VM flag here. That way userspace can decide
if it needs to get out of the nested state (for migration) or
On 10/26/2009 11:11 AM, Alexander Graf wrote:
L1 hsave stores the architected state saved by vmrun, e.g. cs.sel,
next_rip, cr0, cr3, etc. The host intercept bitmap is not state
since it is calculated from the L1 intercept bitmap and host code.
Indeed it can be different from host to host
On 10/26/2009 11:17 AM, Joerg Roedel wrote:
On Sun, Oct 25, 2009 at 11:49:35AM +0200, Avi Kivity wrote:
On 10/24/2009 12:35 PM, Alexander Graf wrote:
Hm, thinking about this again, it might be useful to have an
currently in nested VM flag here. That way userspace can decide
if it
On Fri, Oct 23, 2009 at 09:23:40AM -0700, Shirley Ma wrote:
I also hit guest skb_xmit panic.
If these are the same panics I have seen myself,
they are probably fixed with recent virtio patches
I sent to Rusty. I put them on my vhost.git tree to make
it easier for you to test.
If you see any more
On Mon, Oct 26, 2009 at 11:21:12AM +0200, Avi Kivity wrote:
On 10/26/2009 11:17 AM, Joerg Roedel wrote:
On Sun, Oct 25, 2009 at 11:49:35AM +0200, Avi Kivity wrote:
On 10/24/2009 12:35 PM, Alexander Graf wrote:
Hm, thinking about this again, it might be useful to have an
currently in nested VM
On 10/26/2009 11:30 AM, Joerg Roedel wrote:
Which host state? As far as I can tell, it can all be regenerated.
The state which is loaded into the vcpu when a #vmexit is emulated. This
includes segments, control registers and the host rip for example.
All of this state does not
On Mon, Oct 26, 2009 at 11:39:46AM +0200, Avi Kivity wrote:
On 10/26/2009 11:30 AM, Joerg Roedel wrote:
Which host state? As far as I can tell, it can all be regenerated.
The state which is loaded into the vcpu when a #vmexit is emulated. This
includes segments, control registers and the
On 10/26/2009 11:56 AM, Joerg Roedel wrote:
On Mon, Oct 26, 2009 at 11:39:46AM +0200, Avi Kivity wrote:
On 10/26/2009 11:30 AM, Joerg Roedel wrote:
Which host state? As far as I can tell, it can all be regenerated.
The state which is loaded into the vcpu when a
On 10/26/2009 10:58 AM, Gerd Hoffmann wrote:
On 10/23/09 17:54, Stefan wrote:
Hello,
I have a simple question (sorry I'm a kvm beginner):
Is it right that a 64bit guest (8 CPUs, 16GB) is
much faster than a 32bit guest (8 CPUs, 16GB PAE).
Yes.
Hello,
I have a KVM virtualization problem.
I've put together new hardware (supermicro) server with 2 E5530 cpu's
and memory disk to start experimenting with virtualization.
I intend to use the www.proxmox.com system/setup.
I installed proxmox and started stress testing the hardware:
parallel
Avi Kivity wrote:
On 10/26/2009 10:58 AM, Gerd Hoffmann wrote:
On 10/23/09 17:54, Stefan wrote:
Hello,
I have a simple question (sorry I'm a kvm beginner):
Is it right that a 64bit guest (8 CPUs, 16GB) is
much faster than a 32bit guest (8 CPUs, 16GB PAE).
On 10/26/2009 12:42 PM, Michael Tokarev wrote:
Oh yes, without ept/npt the slowdown should indeed be significant
with this much memory.
How it is with 4Gb guest/mem without PAE (I mean, with
CONFIG_HIGHMEM_4G=y)?
Or even 2Gb? In case of npt or without.
It'll be slow. Just use x86_64
On Mon, Oct 26, 2009 at 12:09:25PM +0200, Avi Kivity wrote:
On 10/26/2009 11:56 AM, Joerg Roedel wrote:
On Mon, Oct 26, 2009 at 11:39:46AM +0200, Avi Kivity wrote:
On 10/26/2009 11:30 AM, Joerg Roedel wrote:
Which host state? As far as I can tell, it can all be regenerated.
The state which
On 10/26/2009 12:45 PM, Joerg Roedel wrote:
Ok, parts of the state can be saved in guest memory. But thats
currently not done. This will need some care to not introduce a security
hole. But it shouldn't be too difficult.
The state thats not reproducible in an sane way is the intercept bitmap
On Mon, Oct 26, 2009 at 12:56:31PM +0200, Avi Kivity wrote:
On 10/26/2009 12:45 PM, Joerg Roedel wrote:
* nested intercepts
These are part of the guest vmcb. The host nested intercepts can be
recalculated, no?
* for nested nested paging: guest nested cr3 value
Part of the guest
Signed-off-by: Gleb Natapov g...@redhat.com
diff --git a/Makefile b/Makefile
index ea568f5..acd9108 100644
--- a/Makefile
+++ b/Makefile
@@ -259,6 +259,7 @@ pxe-ne2k_pci.bin pxe-rtl8139.bin pxe-pcnet.bin
pxe-e1000.bin \
bamboo.dtb petalogix-s3adsp1800.dtb \
multiboot.bin
BLOBS += extboot.bin
On 10/26/2009 01:42 PM, Gleb Natapov wrote:
Need to remove the original implementation.
What was this tested on?
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
On Mon, Oct 26, 2009 at 02:31:21PM +0200, Avi Kivity wrote:
On 10/26/2009 01:42 PM, Gleb Natapov wrote:
Need to remove the original implementation.
That's in submodule now. Different repository. May it's worth to leave it
in for a while?
What was this tested on?
WindowsXP 32 bit
On 10/26/2009 02:33 PM, Gleb Natapov wrote:
On Mon, Oct 26, 2009 at 02:31:21PM +0200, Avi Kivity wrote:
On 10/26/2009 01:42 PM, Gleb Natapov wrote:
Need to remove the original implementation.
That's in submodule now. Different repository. May it's worth to leave it
in for a while?
On Mon, Oct 26, 2009 at 02:36:47PM +0200, Avi Kivity wrote:
On 10/26/2009 02:33 PM, Gleb Natapov wrote:
On Mon, Oct 26, 2009 at 02:31:21PM +0200, Avi Kivity wrote:
On 10/26/2009 01:42 PM, Gleb Natapov wrote:
Need to remove the original implementation.
That's in submodule now. Different
Compiled as option rom now.
Signed-off-by: Gleb Natapov g...@redhat.com
diff --git a/Makefile b/Makefile
index 434d64e..bcd3ee2 100644
--- a/Makefile
+++ b/Makefile
@@ -105,8 +105,8 @@ rombios32.bin: rombios32.out rombios.h
objcopy -O binary $ $@
./biossums -pad $@
On 10/26/2009 01:42 PM, Gleb Natapov wrote:
Signed-off-by: Gleb Natapovg...@redhat.com
Applied this and the pcbios patch as well. Thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a
The Buildbot has detected a new failure of default_x86_64_out_of_tree on
qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/default_x86_64_out_of_tree/builds/67
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build: b1_qemu_kvm_1
The Buildbot has detected a new failure of default_x86_64_debian_5_0 on
qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/default_x86_64_debian_5_0/builds/126
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build: b1_qemu_kvm_1
The Buildbot has detected a new failure of default_i386_out_of_tree on qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/default_i386_out_of_tree/builds/65
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build: b1_qemu_kvm_2
The Buildbot has detected a new failure of default_i386_debian_5_0 on qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/default_i386_debian_5_0/builds/128
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build: b1_qemu_kvm_2
Avi Kivity wrote:
On 10/23/2009 04:38 AM, Gregory Haskins wrote:
Certain GSI's support lockless injecton, but we have no way to detect
which ones at the GSI level. Knowledge of this attribute will be
useful later in the series so that we can optimize irqfd injection
paths for cases where we
-Original Message-
From:
qemu-devel-bounces+chris.krumme=windriver@nongnu.org
[mailto:qemu-devel-bounces+chris.krumme=windriver@nongnu.o
rg] On Behalf Of Avi Kivity
Sent: Sunday, October 25, 2009 9:23 AM
To: Mark McLoughlin
Cc: Michael Tokarev; qemu-de...@nongnu.org; KVM
On 10/26/2009 03:40 PM, Krumme, Chris wrote:
Well, it is. vlan=x really means the ethernet segment named x. If
you connect all your guest nics to one vlan, you are
connecting them all
to one ethernet segment, so any packet transmitted on one will be
reflected on others.
Whether this is a
Sometimes CD images can be located on read only NFS shares,
so allways pass the ro option to the CD mount command
on the unattended.py setup script.
Signed-off-by: Lucas Meneghel Rodrigues l...@redhat.com
---
client/tests/kvm/scripts/unattended.py |4 ++--
1 files changed, 2 insertions(+), 2
Gregory Haskins wrote:
Avi Kivity wrote:
On 10/23/2009 04:38 AM, Gregory Haskins wrote:
Certain GSI's support lockless injecton, but we have no way to detect
which ones at the GSI level. Knowledge of this attribute will be
useful later in the series so that we can optimize irqfd injection
(Applies to kvm.git/master:11b06403)
The following patches are cleanups/enhancements for IRQFD now that
we have lockless interrupt injection. For more details, please see
the patch headers.
These patches pass checkpatch, and are fully tested. Please consider
for merging. Patch 1/3 is a fix
IRQFD currently uses a deferred workqueue item to execute the injection
operation. It was originally designed this way because kvm_set_irq()
required the caller to hold the irq_lock mutex, and the eventfd callback
is invoked from within a non-preemptible critical section.
With the advent of
The current code suffers from the following race condition:
thread-1thread-2
---
kvm_set_irq() {
rcu_read_lock()
irq_rt = rcu_dereference(table);
rcu_read_unlock();
Certain GSI's support lockless injecton, but we have no way to detect
which ones at the GSI level. Knowledge of this attribute will be
useful later in the series so that we can optimize irqfd injection
paths for cases where we know the code will not sleep. Therefore,
we provide an API to query a
This package contains the kvm external modules, using the sources from
latest stable Linux release 2.6.31.5. It can be used to update the
kernel-side support of kvm without upgrading the host kernel.
This release has been tested on x86 down to host kernel 2.6.27 and
builds down to 2.6.24.
Avi Kivity wrote:
I am pleased to announce that Jan Kiszka has agreed to maintain
kvm-kmod.git, the backporting kit that allows running modern kvm code on
older kernels. Jan will release kvm-kmod-2.6.x.y packages and
kvm-kmod-2.6.x-rcy packages, while Marcelo and I will (with Jan's help)
On Thu, Oct 22, 2009 at 06:57:27PM -0200, Marcelo Tosatti wrote:
On Thu, Oct 22, 2009 at 02:00:15PM +0200, Michael S. Tsirkin wrote:
Hi!
I'm sometimes getting segfaults when I kill qemu.
This time I caught it when qemu was under gdb:
Program received signal SIGSEGV,
On Mon, Oct 26, 2009 at 12:11:51PM +1030, Rusty Russell wrote:
On Mon, 26 Oct 2009 03:33:40 am Michael S. Tsirkin wrote:
virtio net used to unlink skbs from send queues on error,
but ever since 48925e372f04f5e35fec6269127c62b2c71ab794
we do not do this. This causes guest data corruption and
GUEST_CR3 is updated via kvm_set_cr3 whenever CR3 is modified from
outside guest context. Similarly pdptrs are updated via load_pdptrs.
Let kvm_set_cr3 perform the update, removing it from the vcpu_run
fast path.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: b/arch/x86/kvm/vmx.c
Hi!
I noticed a performance regression in virtio net: going from
2.6.31 to 2.6.32-rc4 I see this, for guest to host communication:
[...@tuck ~]$ ssh robin sh streamtest1
TCP STREAM TEST from 0.0.0.0 (0.0.0.0) port 0 AF_INET to 11.0.0.3
(11.0.0.3) port 0 AF_INET : demo
Recv SendSend
Socket
On Mon, Oct 26, 2009 at 04:43:11PM -0200, Marcelo Tosatti wrote:
On Thu, Oct 22, 2009 at 06:57:27PM -0200, Marcelo Tosatti wrote:
On Thu, Oct 22, 2009 at 02:00:15PM +0200, Michael S. Tsirkin wrote:
Hi!
I'm sometimes getting segfaults when I kill qemu.
This time I caught it when
Large page translations are always synchronized (either in level 3
or level 2), so its not necessary to properly deal with them
in the invlpg handler.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Index: b/arch/x86/kvm/paging_tmpl.h
On Mon, Oct 26, 2009 at 04:46:02PM -0200, Marcelo Tosatti wrote:
Michael reported a qemu-kvm SIGSEGV at shutdown:
Program received signal SIGSEGV, Segmentation fault.
[Switching to Thread 0x411d0940 (LWP 14446)]
0x0040afb4 in qemu_mod_timer (ts=0x19f0fd0,
expire_time=62275467335)
On Mon, Oct 26, 2009 at 08:58:49PM +0200, Gleb Natapov wrote:
On Mon, Oct 26, 2009 at 04:46:02PM -0200, Marcelo Tosatti wrote:
Michael reported a qemu-kvm SIGSEGV at shutdown:
Program received signal SIGSEGV, Segmentation fault.
[Switching to Thread 0x411d0940 (LWP 14446)]
On Mon, Oct 26, 2009 at 08:42:43PM +0200, Michael S. Tsirkin wrote:
On Mon, Oct 26, 2009 at 12:11:51PM +1030, Rusty Russell wrote:
On Mon, 26 Oct 2009 03:33:40 am Michael S. Tsirkin wrote:
virtio net used to unlink skbs from send queues on error,
but ever since
Is cpu host supported on AMD hosts?
Whenever I try to use this option on a Windows Vista/7 client, I get blue
screen.
Removing the option, the client works fine.
Host kernel 2.6.31.4. Userspace is qemu-kvm-0.11.0. (Previous versions
fail too)
/proc/cpuinfo snippet:
vendor_id :
On Fri, Oct 23, 2009 at 09:23:40AM -0700, Shirley Ma wrote:
Hello Michael,
Some initial vhost test netperf results on my T61 laptop from the
working tap device are here, latency has been significant decreased, but
throughput from guest to host has huge regression. I also hit guest
skb_xmit
On Sun, 2009-10-25 at 15:01 +0200, Avi Kivity wrote:
On 10/23/2009 02:33 AM, Hollis Blanchard wrote:
On Wed, 2009-10-21 at 17:03 +0200, Alexander Graf wrote:
KVM for PowerPC only supports embedded cores at the moment.
While it makes sense to virtualize on small machines, it's even
Hangs on boot, xp guest:
STOP: c221 Unknown Hard Error
\SystemRoot\System32\ntdll.dll
Will boot into safe mode, but _not_ into safe mode with networking.
Boots into non-MS VMs fine.
* what cpu model (examples: Intel Core Duo, Intel Core 2 Duo, AMD
Opteron 2210). See /proc/cpuinfo
On 26.10.2009, at 18:26, Jan Kiszka wrote:
This package contains the kvm external modules, using the sources from
latest stable Linux release 2.6.31.5. It can be used to update the
kernel-side support of kvm without upgrading the host kernel.
This release has been tested on x86 down to host
Hello Miachel,
On Mon, 2009-10-26 at 22:05 +0200, Michael S. Tsirkin wrote:
Shirley, could you please test the following patch?
With this patch, the performance has gained from 1xxx to 2xxx Mb/s,
still has some performance gap compared to without vhost. It was
3xxxMb/s before from guest to host
Pulled your git tree, didn't see the panic.
Thanks
Shirley
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
On Sun, 2009-10-25 at 11:11 +0200, Michael S. Tsirkin wrote:
What is vnet0?
That's a tap interface. I am binding raw socket to a tap interface and
it doesn't work. Does it support?
Thanks
Shirley
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
Bugs item #2886754, was opened at 2009-10-26 23:41
Message generated for change (Tracker Item Submitted) made by nwxi
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2886754group_id=180599
Please note that this message will contain a full copy of the
Not sure which patch in the series this is needed for since I applied
them all, but I got:
CC arch/powerpc/kvm/timing.o
arch/powerpc/kvm/timing.c:205: error: 'THIS_MODULE' undeclared here (not in a
function)
Signed-off-by: Olof Johansson o...@lixom.net
diff --git
On Mon, 2009-10-26 at 18:06 -0500, Olof Johansson wrote:
Not sure which patch in the series this is needed for since I applied
them all, but I got:
CC arch/powerpc/kvm/timing.o
arch/powerpc/kvm/timing.c:205: error: 'THIS_MODULE' undeclared here (not in a
function)
A new program that evaluates hash strings, intended
to help kvm autotest administrators was added, cd_hash.
Usage: cd_hash.py [options]
Options:
-h, --helpshow this help message and exit
-i FILENAME, --iso=FILENAME
path to a ISO file whose hash string will
On Oct 26, 2009, at 6:20 PM, Hollis Blanchard wrote:
For some reason, I'm not seeing this build break, but the patch is
obviously correct.
Acked-by: Hollis Blanchard holl...@us.ibm.com
I saw it when building with pasemi_defconfig + manually enabled KVM
options (all available).
-Olof
--
Hi,
I am running Proxmox 1.4 (which uses the 2.6.30.1 kvm modules) and am
experiencing performance problems with Linux guests using the virtio_blk
module.
Especially with random IO it is a lot slower than IDE.
Ubuntu 9.10 VM on LVM storage with VirtIO:
===
bonnie++ -s 16384
From: Michael S. Tsirkin m...@redhat.com
Date: Mon, 26 Oct 2009 11:07:13 +0200
Another, and hopefully the last, note, is that
git-am can only handle Subject/From lines
at the beginning of the message.
So git style of the mail would be
...
I think it's weird. We could invent some kind of
On Tuesday 27 October 2009 02:48:33 Marcelo Tosatti wrote:
GUEST_CR3 is updated via kvm_set_cr3 whenever CR3 is modified from
outside guest context. Similarly pdptrs are updated via load_pdptrs.
Let kvm_set_cr3 perform the update, removing it from the vcpu_run
fast path.
Looks fine to me.
On Mon, Oct 26, 2009 at 12:21:57PM -0400, Gregory Haskins wrote:
The current code suffers from the following race condition:
thread-1thread-2
---
kvm_set_irq() {
rcu_read_lock()
irq_rt =
Since the mac address is (changed to) lowercase and the output of
'arping' is in uppercase, we need re.IGNORECASE in the re.compile.
(the re.IGNORECASE in the re.search function takes no effect on the
compiled regex.)
Signed-off-by: Cao, Chen k...@redhat.com
---
client/tests/kvm/kvm_utils.py |
qemu-ifup is a script for setting network bridge.
If no execute permission, always face this problem:
autotest/client/tests/kvm/scripts/qemu-ifup: could not launch network script
Could not initialize device 'tap
Signed-off-by: Amos Kong ak...@redhat.com
---
0 files changed, 0 insertions(+), 0
Test 802.1Q vlan of nic, config it by vconfig command.
1) Create two VMs
2) Setup guests in different vlan by vconfig and test communication by ping
using hard-coded ip address
3) Setup guests in same vlan and test communication by ping
4) Recover the vlan config
The subnet of vlan can be
On Wed, Oct 21, 2009 at 06:37:56PM +0800, Amos Kong wrote:
On Tue, Oct 20, 2009 at 09:19:50AM -0400, Michael Goldish wrote:
See comments below.
Hi all,
Thanks for your reply.
.
Agree with you.
When I test this case, the original get_command_status() always cause special
read
On Sun, 2009-10-25 at 15:01 +0200, Avi Kivity wrote:
On 10/23/2009 02:33 AM, Hollis Blanchard wrote:
On Wed, 2009-10-21 at 17:03 +0200, Alexander Graf wrote:
KVM for PowerPC only supports embedded cores at the moment.
While it makes sense to virtualize on small machines, it's even
On Mon, 2009-10-26 at 18:06 -0500, Olof Johansson wrote:
Not sure which patch in the series this is needed for since I applied
them all, but I got:
CC arch/powerpc/kvm/timing.o
arch/powerpc/kvm/timing.c:205: error: 'THIS_MODULE' undeclared here (not in a
function)
On Oct 26, 2009, at 6:20 PM, Hollis Blanchard wrote:
For some reason, I'm not seeing this build break, but the patch is
obviously correct.
Acked-by: Hollis Blanchard holl...@us.ibm.com
I saw it when building with pasemi_defconfig + manually enabled KVM
options (all available).
-Olof
--
92 matches
Mail list logo