From: Joerg Roedel <[EMAIL PROTECTED]>
The compilation of kvm-userspace part fails if the in-kernel pit is not
detected in with the following error message:
pc.o: In function `pc_init1':
/home/jroedel/src/kvm/kvm-userspace/qemu/hw/pc.c:987: undefined reference to
`kvm_pit_init'
collect2: ld ret
From: Feng(Eric) Liu <[EMAIL PROTECTED]>
Signed-off-by: Feng (Eric) Liu <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
diff --git a/kernel/Kbuild b/kernel/Kbuild
index 014cc17..e3e97ab 100644
--- a/kernel/Kbuild
+++ b/kernel/Kbuild
@@ -2,6 +2,9 @@ EXTRA_CFLAGS := -I$(src)/inclu
From: Anthony Liguori <[EMAIL PROTECTED]>
KVM kernel modules are now located in arch/x86/kvm so make sure to rename those
too.
Signed-off-by: Anthony Liguori <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
diff --git a/kernel/Makefile b/kernel/Makefile
index fb053eb..c30c8b2 10
From: Feng(Eric) Liu <[EMAIL PROTECTED]>
from relayfs. It is not an analysis tool.
The code is based on blktrace.
Signed-off-by: Feng (Eric) Liu <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
diff --git a/user/Makefile b/user/Makefile
index 225a435..131baad 100644
--- a/user/M
From: Feng(Eric) Liu <[EMAIL PROTECTED]>
reformats it according to the rules in the file "formats" of definitions.
Signed-off-by: Feng (Eric) Liu <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
diff --git a/user/formats b/user/formats
new file mode 100644
index 000..5313a47
From: Avi Kivity <[EMAIL PROTECTED]>
-
This SF.net email is sponsored by the 2008 JavaOne(SM) Conference
Don't miss this year's exciting event. There's still time to save $100.
Use priority code J8TL2D2.
http://ad.doublecl
From: Joerg Roedel <[EMAIL PROTECTED]>
This patch aligns the host version of the CR4.MCE bit with the CR4 active in
the guest. This is necessary to get MCE exceptions when the guest is running.
Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
diff --g
From: Joerg Roedel <[EMAIL PROTECTED]>
To properly forward a MCE occured while the guest is running to the host, we
have to intercept this exception and call the host handler by hand. This is
implemented by this patch.
Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EM
From: Joerg Roedel <[EMAIL PROTECTED]>
The svm_set_cr4 function is indented with spaces. This patch replaces
them with tabs.
Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index ad27346..d7439ce 1
From: Avi Kivity <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
diff --git a/kernel/include-compat/linux/marker.h
b/kernel/include-compat/linux/marker.h
new file mode 100644
index 000..ceef04f
--- /dev/null
+++ b/kernel/include-compat/linux/marker.h
@@ -0,0 +1,119 @@
+/*
+
From: Avi Kivity <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
diff --git a/arch/ia64/kvm/Kconfig b/arch/ia64/kvm/Kconfig
index d2e54b9..7914e48 100644
--- a/arch/ia64/kvm/Kconfig
+++ b/arch/ia64/kvm/Kconfig
@@ -43,4 +43,7 @@ config KVM_INTEL
Provides support for KVM
From: Avi Kivity <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
diff --git a/arch/s390/kvm/Kconfig b/arch/s390/kvm/Kconfig
index 2489b34..1761b74 100644
--- a/arch/s390/kvm/Kconfig
+++ b/arch/s390/kvm/Kconfig
@@ -36,6 +36,9 @@ config KVM
If unsure, say N.
+config
From: Feng (Eric) Liu <[EMAIL PROTECTED]>
Trace markers allow userspace to trace execution of a virtual machine
in order to monitor its performance.
Signed-off-by: Feng (Eric) Liu <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx
From: Joerg Roedel <[EMAIL PROTECTED]>
When KVM uses NPT there is no reason to intercept task switches. This patch
removes the intercept for it in that case.
Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
diff --git a/arch/x86/kvm/svm.c b/arch/x86/k
From: Feng(Eric) Liu <[EMAIL PROTECTED]>
This interface allows user a space application to read the trace of kvm
related events through relayfs.
Signed-off-by: Feng (Eric) Liu <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
diff --git a/arch/x86/kvm/Kconfig b/arch/x86/kvm/Kconf
From: Marcelo Tosatti <[EMAIL PROTECTED]>
Make sure that all threads are paused in userspace before saving machine
state.
Signed-off-by: Marcelo Tosatti <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
diff --git a/qemu/qemu-kvm.c b/qemu/qemu-kvm.c
index 8b5d2dc..5ad810e 100644
From: Marcelo Tosatti <[EMAIL PROTECTED]>
Signed-off-by: Marcelo Tosatti <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
diff --git a/libkvm/libkvm.c b/libkvm/libkvm.c
index de91328..329f29f 100644
--- a/libkvm/libkvm.c
+++ b/libkvm/libkvm.c
@@ -776,6 +776,28 @@ int kvm_set_sreg
From: Marcelo Tosatti <[EMAIL PROTECTED]>
Use the new interface to save and restore MP_STATE for all vcpu's.
Increase version_id for cpu_load/cpu_save.
Fixes SMP migration.
Signed-off-by: Marcelo Tosatti <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
diff --git a/qemu/hw/pc.
From: Marcelo Tosatti <[EMAIL PROTECTED]>
Otherwise a signal can be received in userspace and a vcpu goes back
to the kernel while it should stay still.
Signed-off-by: Marcelo Tosatti <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
diff --git a/qemu/qemu-kvm.c b/qemu/qemu-kvm.c
From: Marcelo Tosatti <[EMAIL PROTECTED]>
The MSR_IA32_APICBASE_ENABLE/MSR_IA32_APICBASE_BSP bits in s->apicbase
are not initialized if in-kernel APIC emulation is used, so save the
actual value passed by cpu_set_apic_base() caller.
Signed-off-by: Marcelo Tosatti <[EMAIL PROTECTED]>
Signed-off-by
From: Marcelo Tosatti <[EMAIL PROTECTED]>
So userspace can save/restore the mpstate during migration.
[avi: export the #define constants describing the value]
Signed-off-by: Marcelo Tosatti <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
diff --git a/arch/x86/kvm/x86.c b/arch/
From: Avi Kivity <[EMAIL PROTECTED]>
This reverts commit b40ad0133935717e714c8dc448916b0e6f4cf464. It causes
virtual interrupts to be delivered with physical irqs disabled, which
annoys smp_call_function_single().
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
diff --git a/arch/x86/kvm/x86.c b/a
From: Marcelo Tosatti <[EMAIL PROTECTED]>
There is a window open between testing of pending IRQ's
and assignment of guest_mode in __vcpu_run.
Injection of IRQ's can race with __vcpu_run as follows:
CPU0CPU1
kvm_x86_ops->run()
vcpu->guest_mode = 0SE
From: Marcelo Tosatti <[EMAIL PROTECTED]>
There is a window open between testing of pending IRQ's
and assignment of guest_mode in __vcpu_run.
Injection of IRQ's can race with __vcpu_run as follows:
CPU0CPU1
kvm_x86_ops->run()
vcpu->guest_mode = 0SE
From: Avi Kivity <[EMAIL PROTECTED]>
We wish to export it to userspace, so move it into the kvm namespace.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
diff --git a/arch/ia64/kvm/kvm-ia64.c b/arch/ia64/kvm/kvm-ia64.c
index ca1cfb1..f7589db 100644
--- a/arch/ia64/kvm/kvm-ia64.c
+++ b/arch/ia64/k
From: Marcelo Tosatti <[EMAIL PROTECTED]>
Timers that fire between guest hlt and vcpu_block's add_wait_queue() are
ignored, possibly resulting in hangs.
Also make sure that atomic_inc and waitqueue_active tests happen in the
specified order, otherwise the following race is open:
CPU0
26 matches
Mail list logo