Zhao, Yunfeng wrote:
Hi, all
This is today's KVM test result against kvm.git
35e0154eeb0ace014ecf4cc2bdb93a42ee762aca and kvm-userspace.git
b0e5e88d4d25e63ae33396fa990f2ca2b539e5a6
One issue has been fixed, 10 issues still open.
2. windows xp with acpi hal fails to reboot
-no-kvm-irqchip
Am Dienstag, 6. November 2007 schrieb Dor Laor:
The is my latest (old) branch:
-Kernel repo: git://kvm.qumranet.com/home/dor/src/virtio/kvm
-Userspace repo: git://kvm.qumranet.com/home/dor/src/virtio/kvm-userspace
Use virt-final branch.
Yes I had a look at these. This code is virtio draft 4
Christian Borntraeger wrote:
It is not yet updated to latest virtio latest kvm.
This version uses a pci device for virtio. Since I'm think Rusty's
config space does not matches
pci config space I might consider changing it. (Preferably not, maybe
I'll start using it until we'll have the
Christian Borntraeger wrote:
Am Dienstag, 6. November 2007 schrieb Dor Laor:
The is my latest (old) branch:
-Kernel repo: git://kvm.qumranet.com/home/dor/src/virtio/kvm
-Userspace repo:
git://kvm.qumranet.com/home/dor/src/virtio/kvm-userspace
Use virt-final branch.
Yes I had a look
Lynn Kerby wrote:
Hi KVM developers (and lurkers like myself).
Apologies in advance as this is probably not the right forum for this
question.
It is certainly the right forum.
I've had no success getting an SMP virtual machine running on my AMD
Athlon64 X2 server. The base system is
We have some structures defined which are going to be
used by userspace for ioctls.
Signed-off-by: Amit Shah [EMAIL PROTECTED]
---
include/linux/kvm_para.h |3 +--
1 files changed, 1 insertions(+), 2 deletions(-)
diff --git a/include/linux/kvm_para.h b/include/linux/kvm_para.h
index
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Avi Kivity escreveu:
Glauber de Oliveira Costa wrote:
This is the host part of kvm clocksource implementation. As it does
not include clockevents, it is a fairly simple implementation. We
only have to register a per-vcpu area, and start writting
Introduce three hypercalls and one ioctl for enabling guest
DMA mappings.
An ioctl comes from userspace (qemu) to notify of a physical
device being assigned to a guest. Guests make a hypercall (once
per device) to find out if the device is a passthrough device
and if any DMA translations are
Of all the DMA calls, only dma_alloc_coherent might not actually
call dma_ops-alloc_coherent. We make sure that gets called
if the device that's being worked on is a PV device
Signed-off-by: Amit Shah [EMAIL PROTECTED]
---
arch/x86/kernel/pci-dma_64.c | 13 +
1 files changed, 13
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Jeremy Fitzhardinge escreveu:
Avi Kivity wrote:
Glauber de Oliveira Costa wrote:
+union kvm_hv_clock {
+ struct {
+ u64 tsc_mult;
+ u64 now_ns;
+ /* That's the wall clock, not the water closet
With the declaration in libkvm.h this time:
From 8313b87bcab415746e6eed86ac3f5b6c562b9764 Mon Sep 17 00:00:00 2001
From: Amit Shah [EMAIL PROTECTED]
Date: Thu, 8 Nov 2007 00:13:07 +0530
Subject: [PATCH] Add accessor for kvm-vm_fd
Introduce kvm_get_vm_fd to get the VM FD
Signed-off-by: Amit Shah
First , thank you for new release of kvm. I have a few problems to
report with kvm-51.
1. When running an exisiting winxp ACPI multiprocessor HAL with -smp 2,
sometimes it will hang on boot.
2. This may not be a major problem but cpu usage is a litte higher when
idle on release 51 than 50. It
Avi Kivity wrote:
Cam Macdonell wrote:
Dor Laor wrote:
Cam Macdonell wrote:
Hi,
I'm running an AMD
vendor_id : AuthenticAMD
cpu family : 15
model : 75
model name : AMD Athlon(tm) 64 X2 Dual Core Processor 4600+
with 4GB of RAM and Scientific Linux
This patchset is work in progress and is sent out for comments.
Guests within KVM can have paravirtualized DMA access. I've tested
the e1000 driver, and that works fine. A few problems/conditions to
get things to work:
- The pv driver should only be used as a module. If built into the
kernel,
Glauber de Oliveira Costa wrote:
void kvm_inject_pending_timer_irqs(struct kvm_vcpu *vcpu)
{
+ vcpu-time_needs_update = 1;
Why here and not in __vcpu_run()? It isn't timer irq related.
Because my plan was exactly, updating it at each timer interrupt.
I think
Jerone Young wrote:
Here is the 4th revision of the refactoring of libkvm. This revision
changes since the 3rd revision:
- removes libkvm-x86.h
- keeps functions kvm_create_default_phys_mem kvm_create_phys_mem
in place
- added kvm_arch_create_default_phys_mem
This kernel module injects IRQs specified on the command line
via the passthrough parameter
This doesn't handle shared interrupts.
These patches don't yet work with the in-kernel apic, so you have
to use -no-kvm-irqchip.
These will soon be overridden by a new mechanism that utilises
the
A guest can call dma_ops-is_pv_device() to find out
if a device is a passthrough'ed device (device passed
on to a guest by the host). If this is true, a hypercall
will be made to translate DMA mapping operations.
This function can be done away with and just a
kvm_is_pv_device() call can be added,
Add Makefile rule for compiling the new file
that we create
Signed-off-by: Amit Shah [EMAIL PROTECTED]
---
drivers/kvm/Makefile |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/drivers/kvm/Makefile b/drivers/kvm/Makefile
index cf18ad4..f492e3e 100644
---
On Thursday 08 November 2007 01:05:32 Haydn Solomon wrote:
First , thank you for new release of kvm. I have a few problems to
report with kvm-51.
1. When running an exisiting winxp ACPI multiprocessor HAL with -smp 2,
sometimes it will hang on boot.
You mean the guest hangs, right? What's
Hi,
Why does kvm_hv_clock need page_align?
Each vcpu will register a page on its own. In the guest side, it will be
an array of pages. So, we make it page sized.
And also the kvm_hv_clock is alloced with kvm_vcpu,
There's no requirements on the host part at all. So it doesn't really
matter.
This patch introduces support for device passthrough
from the host to a paravirtualized guest.
A new command-line option, -passthrough is added.
For example, to invoke it for an Ethernet device sitting at
PCI bus:dev.fn 04:08.0 with host IRQ 18, use this:
-passthrough Ethernet/04:08.0-18
The
Check for CONFIG_VIRTUALIZATION instead of CONFIG_KVM,
since the PV drivers won't depend on CONFIG_KVM and we
still want to be selectable
Signed-off-by: Amit Shah [EMAIL PROTECTED]
---
drivers/Makefile |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/drivers/Makefile
Jerone Young wrote:
# HG changeset patch
# User Jerone Young [EMAIL PROTECTED]
# Date 1194367649 21600
# Node ID cb186258bc6ecf05ded03d81a3d2ee820e58f605
# Parent 7ea01f673a05fe66cb0d9c514b5a43ddcd72c07f
Move kvm_create_memory_alias kvm_destroy_memory_alias to libkvm-x86.c
Signed-off-by:
Fix win2k install] Add delay between dma issue result.
Using synchonous io leads the guest to unexplored places:
If it issues a dma command, it goes to qemu and executed
synchrnously and return with irq for data ready.
This is not real world scenario and happens when not
This is to be enabled on a guest. Currently, only
'module' works; compiling it in freezes at HD bringup
Signed-off-by: Amit Shah [EMAIL PROTECTED]
---
drivers/kvm/Kconfig |8
1 files changed, 8 insertions(+), 0 deletions(-)
diff --git a/drivers/kvm/Kconfig b/drivers/kvm/Kconfig
Carsten Otte wrote:
Christian Borntraeger wrote:
It is not yet updated to latest virtio latest kvm.
This version uses a pci device for virtio. Since I'm think Rusty's
config space does not matches
pci config space I might consider changing it. (Preferably not, maybe
I'll start using it
This patch series implements a PCI driver for virtio. This allows virtio
devices (like block and network) to be used in QEMU/KVM. I'll post a very
early KVM userspace backend in kvm-devel for those that are interested.
This series depends on the two virtio fixes I've posted and Rusty's
From fc56bda0f599ccd00d992bf196654101e82d1413 Mon Sep 17 00:00:00 2001
From: Zhang Xiantao [EMAIL PROTECTED]
Date: Wed, 7 Nov 2007 11:39:23 +0800
Subject: [PATCH] move some header files form kvm_main.c to x86.c, since
the
related functions have been moved to x86.c
Signed-off-by: Zhang Xiantao
Alexey Eremenko wrote:
Hi Avi,
Speaking of AMD host - with KVM-51 it doesn't crashes anymore !
But there is still fonts rendering problem with Fedora7/ 32-bit guests.
Can you update the relevant bug trackers? Please add xpdyinfo output as
well.
--
Do not meddle in the internals of
Hi Avi,
This series of patches are intended to further split x86 specific code
from kvm_main.c, and make kvm_main.c arch-independent.
For easy review, I splitted them into small patches. With these patches,
we almost finish the first stage work for code split.
[1/5] Remove unused header files
From 959bc19b0e2ca7edcb3389aabdecf99ba9f1794e Mon Sep 17 00:00:00 2001
From: Zhang Xiantao [EMAIL PROTECTED]
Date: Thu, 8 Nov 2007 13:19:06 +0800
Subject: [PATCH] Combine kvm_init and kvm_init_x86 into one function,
and
meanwhile remove module_init module_exit function, since they will be
called
From 2d6ee07b96f1a91cef9327f241077af3698ed4dc Mon Sep 17 00:00:00 2001
From: Zhang Xiantao [EMAIL PROTECTED]
Date: Thu, 8 Nov 2007 13:37:38 +0800
Subject: [PATCH] Make kvm_init as arch-indepenent, through defining a
void
pointer type variable. All archs will register their corresponding arch
From 7473192cc0c529b8ce35c13d0e83a9b663072831 Mon Sep 17 00:00:00 2001
From: Zhang Xiantao [EMAIL PROTECTED]
Date: Wed, 7 Nov 2007 11:41:50 +0800
Subject: [PATCH] mov kvm_x86_ops to x86.c for next step's work
Signed-off-by: Zhang Xiantao [EMAIL PROTECTED]
---
drivers/kvm/kvm_main.c |1 -
Anthony Liguori wrote:
This patch moves virtio under the virtualization menu and changes virtio
devices to not claim to only be for lguest.
Perhaps the virt menu needs to be split into a host-side support menu
and guest-side support menu.
--
Do not meddle in the internals of kernels, for
Amit Shah wrote:
Introduce kvm_get_vm_fd to get the VM FD
What, so you can issue ioctls like there's no tomorrow? Add function
wrappers for your ioctls instead.
Hmm. this might not be needed now since the kvm_context moved to a .h file.
It
was a static in a .c earlier.
On Thursday 08 November 2007 11:56:24 Avi Kivity wrote:
Amit Shah wrote:
With the declaration in libkvm.h this time:
From 8313b87bcab415746e6eed86ac3f5b6c562b9764 Mon Sep 17 00:00:00 2001
From: Amit Shah [EMAIL PROTECTED]
Date: Thu, 8 Nov 2007 00:13:07 +0530
Subject: [PATCH] Add
Anthony Liguori wrote:
This is a PCI device that implements a transport for virtio. It allows virtio
devices to be used by QEMU based VMMs like KVM or Xen.
Didn't see support for dma. I think that with Amit's pvdma patches you
can support dma-capable devices as well without too much fuss.
This is needed for the virtio PCI device to be compiled as a module.
Signed-off-by: Anthony Liguori [EMAIL PROTECTED]
diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c
index 0e1bf05..3f28b47 100644
--- a/drivers/virtio/virtio_ring.c
+++ b/drivers/virtio/virtio_ring.c
@@
Lynn Kerby wrote:
On Nov 7, 2007, at 3:06 AM, Avi Kivity wrote:
Lynn Kerby wrote:
Hi KVM developers (and lurkers like myself).
Apologies in advance as this is probably not the right forum for
this question.
It is certainly the right forum.
Good to know. There
On Nov 7, 2007, at 3:06 AM, Avi Kivity wrote:
Lynn Kerby wrote:
Hi KVM developers (and lurkers like myself).
Apologies in advance as this is probably not the right forum for
this question.
It is certainly the right forum.
Good to know. There doesn't seem to be a lot of user oriented
On Tue, Nov 06, 2007 at 10:48:52AM -0600, Jerone Young wrote:
Move msrs functions to libkvm-x86.c
This patch moves functions:
kvm_msr_list
move kvm_get_msrs
move kvm_set_msrs
the problem is that with this the definitions were moved as well from libkvm.h
to kvm-x86.h which
Carlo Marcelo Arenas Belon wrote:
On Tue, Nov 06, 2007 at 10:48:52AM -0600, Jerone Young wrote:
Move msrs functions to libkvm-x86.c
This patch moves functions:
kvm_msr_list
move kvm_get_msrs
move kvm_set_msrs
the problem is that with this the definitions were
On Thursday 08 November 2007 01:31:32 Hollis Blanchard wrote:
I'm sorry these comments aren't substantive, but please watch your
whitespace...
Hi Hollis,
Thanks for going through this. We know about these issues; the userspace is
kind of messy since it's collected from various sources and we
This is a PCI device that implements a transport for virtio. It allows virtio
devices to be used by QEMU based VMMs like KVM or Xen.
Signed-off-by: Anthony Liguori [EMAIL PROTECTED]
diff --git a/drivers/virtio/Kconfig b/drivers/virtio/Kconfig
index 9e33fc4..c81e0f3 100644
---
This patch moves virtio under the virtualization menu and changes virtio
devices to not claim to only be for lguest.
Signed-off-by: Anthony Liguori [EMAIL PROTECTED]
diff --git a/drivers/Kconfig b/drivers/Kconfig
index f4076d9..d945ffc 100644
--- a/drivers/Kconfig
+++ b/drivers/Kconfig
@@ -93,6
Anthony Liguori wrote:
+case VIRTIO_PCI_QUEUE_NOTIFY:
+ if (val VIRTIO_PCI_QUEUE_MAX)
+ virtio_ring_kick(vdev, vdev-vq[val]);
+ break;
I see you're not using hypercalls for this, presumably for compatibility
with -no-kvm. Well I think I have a solution: advertise
Amit Shah wrote:
With the declaration in libkvm.h this time:
From 8313b87bcab415746e6eed86ac3f5b6c562b9764 Mon Sep 17 00:00:00 2001
From: Amit Shah [EMAIL PROTECTED]
Date: Thu, 8 Nov 2007 00:13:07 +0530
Subject: [PATCH] Add accessor for kvm-vm_fd
Introduce kvm_get_vm_fd to get the VM FD
Amit Shah wrote:
This patch introduces support for device passthrough
from the host to a paravirtualized guest.
A new command-line option, -passthrough is added.
For example, to invoke it for an Ethernet device sitting at
PCI bus:dev.fn 04:08.0 with host IRQ 18, use this:
-passthrough
Aurelien Jarno wrote:
Well the IDE code hasn't changed a lot recently, so I checked the CVS
history and easily (first test) found the commit that causes the problem:
Last AIO patch, by Vladimir N. Oleynik.
http://cvs.savannah.nongnu.org/viewvc/qemu/hw/ide.c?root=qemur1=1.64r2=1.65
Have
Hi Avi,
Speaking of AMD host - with KVM-51 it doesn't crashes anymore !
But there is still fonts rendering problem with Fedora7/ 32-bit guests.
--
-Alexey Eremenko Technologov
-
This SF.net email is sponsored by: Splunk
From cba4340cef2217343c540ca5de9b67cc8826b63f Mon Sep 17 00:00:00 2001
From: Zhang Xiantao [EMAIL PROTECTED]
Date: Thu, 8 Nov 2007 13:07:23 +0800
Subject: [PATCH] Using kvm_arch prefix to define functions, and replace
kvm_x86_ops callback.
Signed-off-by: Zhang Xiantao [EMAIL PROTECTED]
---
52 matches
Mail list logo