Christian Borntraeger wrote:
> include/linux/kvm.h defines struct kvm_dirty_log to
> [...]
> union {
> void __user *dirty_bitmap; /* one bit per page */
> __u64 padding;
> };
>
> __user requires compiler.h to compile. Currently, this works on x86
> only
Glauber Costa wrote:
> Avi,
>
> This series now apply ontop of kvm.git.
> Only the needed function from machine_ops is made non-static.
>
>
Applied, thanks.
Ingo, can you carry the first two patches as well? They are
602ac559a208ba44d5879a8e6381a379b376a8b7 and
0c7f95e535a02caba52f944f067fb
Glauber Costa wrote:
> As Marcelo pointed out, we need slots_lock to protect
> against slots changing under our nose during wall clock
> writing.
>
> This patch address this issue.
>
>
Applied, thanks.
This lock is fairly annoying. What do you think about taking it in
vcpu_run unconditionall
Marcelo Tosatti wrote:
> Otherwise the guest will miscalculate the region size.
>
>
Applied all, thanks.
--
Do not meddle in the internals of kernels, for they are subtle and quick to
panic.
-
This SF.net email is spons
Marcelo Tosatti wrote:
> On Mon, Mar 17, 2008 at 04:41:18PM +0200, Avi Kivity wrote:
>
>> Marcelo Tosatti wrote:
>>
While aging is not too hard to do, I don't think it would add much in
practice; we rarely observe mmu shadow pages being recycled due to
memory pressure. So
david ahern wrote:
> Attaching gdb to qemu you work with addresses as seen by the qemu process; the
> idea is to work with addresses as seen inside the guest.
>
> For example, in the qemu console you can examine guest kernel memory such as
> task structs using guest kernel based addresses:
>
> (qem
Ni hao,
+---+
Warning! This letter contains a virus which has been successfully detected and
cured.
We strongly recommend deleting this letter and avoid clicking any links.
+---+
[RBN Networks Antivirus]
Attaching gdb to qemu you work with addresses as seen by the qemu process; the
idea is to work with addresses as seen inside the guest.
For example, in the qemu console you can examine guest kernel memory such as
task structs using guest kernel based addresses:
(qemu) x /128w 0xc0327a80
c
On Mon, Mar 17, 2008 at 04:41:18PM +0200, Avi Kivity wrote:
> Marcelo Tosatti wrote:
> >>
> >>While aging is not too hard to do, I don't think it would add much in
> >>practice; we rarely observe mmu shadow pages being recycled due to
> >>memory pressure. So this is mostly helpful for preventing
Signed-off-by: Marcelo Tosatti <[EMAIL PROTECTED]>
Index: kvm-userspace.hotplug3/qemu/hw/pci.c
===
--- kvm-userspace.hotplug3.orig/qemu/hw/pci.c
+++ kvm-userspace.hotplug3/qemu/hw/pci.c
@@ -236,6 +236,11 @@ void pci_register_io_region
Otherwise the PCI size for such regions will be calculated erroneously.
Signed-off-by: Marcelo Tosatti <[EMAIL PROTECTED]>
Cc: Anthony Liguori <[EMAIL PROTECTED]>
Index: kvm-userspace.hotplug3/qemu/hw/virtio.c
===
--- kvm-userspace.h
Find Last Set, in accordance with glibc's ffs.
Signed-off-by: Marcelo Tosatti <[EMAIL PROTECTED]>
Index: kvm-userspace.hotplug3/qemu/cutils.c
===
--- kvm-userspace.hotplug3.orig/qemu/cutils.c
+++ kvm-userspace.hotplug3/qemu/cutils.c
Otherwise the guest will miscalculate the region size.
--
-
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2008.
http://clk.atdmt.com/MRT/go/vse012070mrt/direct/01/
As Marcelo pointed out, we need slots_lock to protect
against slots changing under our nose during wall clock
writing.
This patch address this issue.
Signed-off-by: Glauber Costa <[EMAIL PROTECTED]>
CC: Marcelo Tosatti <[EMAIL PROTECTED]>
---
arch/x86/kvm/x86.c | 10 ++
1 files changed
it will allow external users to call it. It is mainly
useful for routines that will override its machine_ops
field for its own special purposes, but want to call the
normal shutdown routine after they're done
Signed-off-by: Glauber Costa <[EMAIL PROTECTED]>
---
arch/x86/kernel/reboot.c |2 +-
This patch a llows machine_crash_shutdown to
be replaced, just like any of the other functions
in machine_ops
Signed-off-by: Glauber Costa <[EMAIL PROTECTED]>
---
arch/x86/kernel/crash.c |3 ++-
arch/x86/kernel/reboot.c |7 ++-
include/asm-x86/reboot.h |1 +
3 files changed, 9 in
Avi,
This series now apply ontop of kvm.git.
Only the needed function from machine_ops is made non-static.
-
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2008.
http://clk.atdm
This patch writes 0 (actually, what really matters is that the
LSB is cleared) to the system time msr before shutting down
the machine for kexec.
Without it, we can have a random memory location being written
when the guest comes back
It overrides the functions shutdown, used in the path of kerne
On Sun, Mar 9, 2008 at 11:52 AM, Gilad Ben-Yossef <[EMAIL PROTECTED]> wrote:
> Jamie Lokier wrote:
> > Gilad Ben-Yossef wrote:
> >> Glauber Costa wrote:
> >>> This patch introduces a "thread_id" variable to CPUState.
> >>> It's duty will be to hold the process, or more generally, thread
> >>>
Hi Avi,
2008/3/17, Avi Kivity <[EMAIL PROTECTED]>:
> Ryota OZAKI wrote:
> > Hi all,
> >
> > This patch allows a VM to have own directory on debugfs,
> > that contains statics only for the VM. Each directory
> > is identified by the pid of the VM (ie qemu).
> >
> > I tried this patch under s
Randy Dunlap wrote:
> On Sun, 16 Mar 2008 13:13:08 +0200 Avi Kivity wrote:
>
>
>> Randy Dunlap wrote:
>>
>>> From: Randy Dunlap <[EMAIL PROTECTED]>
>>>
>>> Make KVM_CLOCK depend on HAVE_KVM. Otherwise a Voyager build can
>>> fail with:
>>>
>>> CC arch/x86/kernel/asm-offsets.s
>>> In
On Sun, 16 Mar 2008 13:13:08 +0200 Avi Kivity wrote:
> Randy Dunlap wrote:
> > From: Randy Dunlap <[EMAIL PROTECTED]>
> >
> > Make KVM_CLOCK depend on HAVE_KVM. Otherwise a Voyager build can
> > fail with:
> >
> > CC arch/x86/kernel/asm-offsets.s
> > In file included from include2/asm/irqf
I added the kvm_stat support to ppc to watch my guest while executing e.g. to check
things like "what does my guest do when I see nothing" ;-)
To be able to do that I also needed a script that reports in a iostat/vmstat
like style, because of that I wrote a small shell script.
Additionally my co
Marcelo Tosatti wrote:
> On Mon, Mar 17, 2008 at 01:11:11PM +0200, Avi Kivity wrote:
>
>
>>> + up_read(&kvm->slots_lock);
>>>
>>> So as to avoid rmap_nuke, since that will be done through the madvise()
>>> path.
>>>
>>>
>>>
>> Why not do it in userspace?
>>
>
> I don't see an
Marcelo Tosatti wrote:
> The following patchset fixes pvmmu/cr3-cache for 32-bit guests.
>
>
>
Thanks. I folded the fixes into the patches they fixed, and merged
everything except cr3 cache (I want to look at it again and see if I can
reduce the impact a little). pvmmu branch now contains th
Marcelo Tosatti wrote:
>>
>> While aging is not too hard to do, I don't think it would add much in
>> practice; we rarely observe mmu shadow pages being recycled due to
>> memory pressure. So this is mostly helpful for preventing a VM from
>> pinning memory when under severe memory pressure, wh
On Sun, Mar 16, 2008 at 01:28:43PM +0200, Avi Kivity wrote:
> Marcelo Tosatti wrote:
> > On Wed, Mar 12, 2008 at 08:13:41PM +0200, Izik Eidus wrote:
> >
> >> this patch simply register the mmu cache with the shrinker.
> >>
> >
> > Hi Izik,
> >
> > Nice.
> >
> > I think you want some sort of
On Mon, Mar 17, 2008 at 01:11:11PM +0200, Avi Kivity wrote:
> >+ up_read(&kvm->slots_lock);
> >
> >So as to avoid rmap_nuke, since that will be done through the madvise()
> >path.
> >
> >
>
> Why not do it in userspace?
I don't see any way of knowing whether you have or not mmu notifiers
The pdptrs need to be cached in addition to the shadowed root tables, so
the guest walk can be done properly.
Signed-off-by: Marcelo Tosatti <[EMAIL PROTECTED]>
Index: kvm.first/arch/x86/kvm/mmu.c
===
--- kvm.first.orig/arch/x86/kvm
kvm_patch might be called during module load.
Signed-off-by: Marcelo Tosatti <[EMAIL PROTECTED]>
Index: kvm.first/arch/x86/kernel/kvm.c
===
--- kvm.first.orig/arch/x86/kernel/kvm.c
+++ kvm.first/arch/x86/kernel/kvm.c
@@ -184,7 +184,7
The paravirt interface will export set_pud for 3-level pagetables. Hook it.
Signed-off-by: Marcelo Tosatti <[EMAIL PROTECTED]>
Index: kvm.first/arch/x86/kernel/kvm.c
===
--- kvm.first.orig/arch/x86/kernel/kvm.c
+++ kvm.first/arch/x86
Slipped through on the first patch.
Signed-off-by: Marcelo Tosatti <[EMAIL PROTECTED]>
Index: kvm.first/arch/x86/kvm/mmu.c
===
--- kvm.first.orig/arch/x86/kvm/mmu.c
+++ kvm.first/arch/x86/kvm/mmu.c
@@ -1321,7 +1321,7 @@ static void m
Let the compiler choose register placing. All we care is that "trap"
value gets retained.
Signed-off-by: Marcelo Tosatti <[EMAIL PROTECTED]>
Index: kvm.first/arch/x86/kernel/kvm.c
===
--- kvm.first.orig/arch/x86/kernel/kvm.c
+++ kvm
The following patchset fixes pvmmu/cr3-cache for 32-bit guests.
--
-
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2008.
http://clk.atdmt.com/MRT/go/vse012070mrt/direct/01
Find the physical address through kmap_atomic_to_page().
Signed-off-by: Marcelo Tosatti <[EMAIL PROTECTED]>
Index: kvm.first/arch/x86/kernel/kvm.c
===
--- kvm.first.orig/arch/x86/kernel/kvm.c
+++ kvm.first/arch/x86/kernel/kvm.c
@@ -2
Упрощенная система налoгooблoжения
Oднoдневный семинар прoйдёт 21 марта 2008г. (Мoсква)
В прoграмма:
1. Сущнoсть УСН, oсвoбoждение oт уплаты ряда налoгoв.
Пoрядoк и услoвия начала и прекращения применения упрoщеннoй системы
налoгooблoжения с учетoм нoвшеств 2008 г.
Требoвания к размеру дoхoд
Yunfeng Zhao wrote:
> Hi All,
> This is today's KVM test result against kvm.git
> a16664b59065b8ae877b213e68a6f962ac359ca4 and kvm-userspace.git
> 3017d054a6a9f37bfffee4ebf0bf52a51c9860b5.
>
>
> One new issue:
> 1. booting smp windows guests has 30% chance of hang
> https://sourceforge.net/track
Ryota OZAKI wrote:
> Hi all,
>
> This patch allows a VM to have own directory on debugfs,
> that contains statics only for the VM. Each directory
> is identified by the pid of the VM (ie qemu).
>
> I tried this patch under several host kernel versions,
> .22, .23, and .24, and confirmed things work
Dont settle for a lovestick that is too short and too thin click here for
the solution.
http://www.buriaoto.com/
10 incredible ways to hit on her-
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microso
Marcelo Tosatti wrote:
> Hi Avi,
>
> Good that you're back.
>
> On Sun, Mar 16, 2008 at 04:00:06PM +0200, Avi Kivity wrote:
>
>> Marcelo Tosatti wrote:
>>
>>> This patchset resends Anthony's QEMU balloon support plus:
>>>
>>> - Truncates the target size to ram size
>>> - Enables madvise() c
Christoph Hellwig wrote:
> On Sat, Mar 08, 2008 at 06:45:34PM -0800, Roland Dreier wrote:
>
>> > spin_lock(&kvm_lock);
>> > + if (--kvm->refcount) {
>> > + spin_lock(&kvm_lock);
>>
>> obvious typo here...
>>
>
>
> Indeed. Any comments from the kvm developers in
On Sat, Mar 08, 2008 at 06:45:34PM -0800, Roland Dreier wrote:
> >spin_lock(&kvm_lock);
> > + if (--kvm->refcount) {
> > + spin_lock(&kvm_lock);
>
> obvious typo here...
Indeed. Any comments from the kvm developers in this approach? The
current multi-level file refcounting seem
[EMAIL PROTECTED] wrote:
> Avi Kivity wrote:
>> Jan Kiszka wrote:
>>> Avi Kivity wrote:
>>>
Liu, Eric E wrote:
>
> Since we already have had debugfs_entries and some other kernel
> debug mechanism to use, does this kvmtrace make sense? Any
> comment is welcomed.
Th
david ahern wrote:
> Does anyone know of tools that can dump memory for a qemu guest with addresses
> as seen by the guest and generate a core file? For instance, say you know the
> guest is running a 32-bit linux kernel with a 1G/3G split. Then you would want
> to dump 1G of memory starting 0xc000
Yang, Sheng wrote:
> ...
> BTW: I am working on NMI supporting now.
That's good news! Some weeks ago I posted a NMI infrastructure patch [1]
to qemu-devel already, for now only to support IOAPIC NMI watchdogs [1,
2]. Maybe you can make use of this. Please keep us posted about your
approach!
Jan
On Friday 14 March 2008 20:31:50 Zdenek Kabelac wrote:
> Hi
>
> I'm trying various thing with qemu to resolve my other issue and I've
> tried to use oprofile.
> But as soon as I run these:
>
> opcontrol --vmlinux=mine/vmlinux
> opcontrol --start
>
> I get kernel oops (see bellow)
That's known, be
46 matches
Mail list logo