On Thu, Apr 24, 2008 at 12:19:28AM +0200, Andrea Arcangeli wrote:
/dev/kvm closure. Given this can be a considered a bugfix to
mmu_notifier_unregister I'll apply it to 1/N and I'll release a new
I'm not sure anymore this can be considered a bugfix given how large
change this resulted in the
On Tuesday 22 April 2008 18:16:41 Avi Kivity wrote:
Yang, Sheng wrote:
From 73c33765f3d879001818cd0719038c78a0c65561 Mon Sep 17 00:00:00 2001
From: Sheng Yang [EMAIL PROTECTED]
Date: Fri, 18 Apr 2008 17:15:39 +0800
Subject: [PATCH] kvm: qemu: Enable EPT support for real mode
This
Yang, Sheng wrote:
On Tuesday 22 April 2008 18:16:41 Avi Kivity wrote:
Yang, Sheng wrote:
From 73c33765f3d879001818cd0719038c78a0c65561 Mon Sep 17 00:00:00 2001
From: Sheng Yang [EMAIL PROTECTED]
Date: Fri, 18 Apr 2008 17:15:39 +0800
Subject: [PATCH] kvm: qemu: Enable EPT support
On Thursday 24 April 2008 15:15:30 Avi Kivity wrote:
Yang, Sheng wrote:
On Tuesday 22 April 2008 18:16:41 Avi Kivity wrote:
Yang, Sheng wrote:
From 73c33765f3d879001818cd0719038c78a0c65561 Mon Sep 17 00:00:00 2001
From: Sheng Yang [EMAIL PROTECTED]
Date: Fri, 18 Apr 2008 17:15:39 +0800
Yang, Sheng wrote:
Why not use ept_identity_pagetable != NULL to encode
ept_identity_pagetable_done?
ept_identity_pagetable_done was used to indicate if the pagetable was setted
up, and ept_identity_pagetable was used to indicate if the page used for
pagetable was allocated... I
On Thursday 24 April 2008 15:37:53 Avi Kivity wrote:
Yang, Sheng wrote:
Why not use ept_identity_pagetable != NULL to encode
ept_identity_pagetable_done?
ept_identity_pagetable_done was used to indicate if the pagetable was
setted up, and ept_identity_pagetable was used to indicate if
Signed-off-by: Gerd Hoffmann [EMAIL PROTECTED]
---
arch/x86/kvm/x86.c | 63 +++
1 files changed, 53 insertions(+), 10 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 0ce5563..45b71c6 100644
--- a/arch/x86/kvm/x86.c
+++
Hi folks,
My first attempt to send out a patch series with git ...
The patches fix the kvm paravirt clocksource code to be compatible with
xen and they also factor out some code which can be shared into a
separate source files used by both kvm and xen.
cheers,
Gerd
Signed-off-by: Gerd Hoffmann [EMAIL PROTECTED]
---
arch/x86/xen/Kconfig |1 +
arch/x86/xen/time.c | 110 +-
2 files changed, 12 insertions(+), 99 deletions(-)
diff --git a/arch/x86/xen/Kconfig b/arch/x86/xen/Kconfig
index 4d5f264..47f0cdc
Signed-off-by: Gerd Hoffmann [EMAIL PROTECTED]
---
arch/x86/Kconfig |1 +
arch/x86/kernel/kvmclock.c | 66 ++-
2 files changed, 17 insertions(+), 50 deletions(-)
diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig
index fe73d38..ed1a679
Signed-off-by: Gerd Hoffmann [EMAIL PROTECTED]
---
arch/x86/Kconfig |4 +
arch/x86/kernel/Makefile |1 +
arch/x86/kernel/pvclock.c | 146 +
include/asm-x86/pvclock.h |6 ++
4 files changed, 157 insertions(+), 0 deletions(-)
I am not certain of this, but it seems like this patch leaves things in
a somewhat asymetric state. At the very least, I think that asymetry
should be documented in the comments of either mmu_notifier.h or .c.
Before I do the first mmu_notifier_register, all places that test for
Hi All,
This is today's KVM test result against kvm.git
873c05fa7e6fea27090b1bf0f67a073eadb04782 and kvm-userspace.git
d102d750f397b543fe620a3c77a7e5e42c483865.
In today's nightly testing, we meet host hang while booting multiple
guests several times.
This issue could be easily reproduced.
Yunfeng Zhao wrote:
Hi All,
This is today's KVM test result against kvm.git
873c05fa7e6fea27090b1bf0f67a073eadb04782 and kvm-userspace.git
d102d750f397b543fe620a3c77a7e5e42c483865.
I suspect 873c05fa7e6fea27090b1bf0f67a073eadb04782 itself, it's the only
thing that has any chance of
Jerone Young wrote:
1 file changed, 37 insertions(+), 21 deletions(-)
kernel/Makefile | 58 +++
- This adapts perviously sent patch to new changes to kernel/Makefile
- Fixes improper check in conditional
This patch add the
Dor Laor wrote:
while investigating the revert of fix sci irq set when acpi timer I
discovered the reason. Please also re-revert the original patch.
Applied, but system_powerdown still doesn't work with the sci acpi timer
fix.
--
error compiling committee.c: too many arguments to
I propose moving the kvm lists to vger.kernel.org, for the following
benefits:
- better spam control
- faster service (I see significant lag with the sourceforge lists)
- no ads appended to the end of each email
If no objections are raised, and if the vger postmasters agree, I will
mass
On Thursday 24 April 2008 19:37:03 Avi Kivity wrote:
Yunfeng Zhao wrote:
Hi All,
This is today's KVM test result against kvm.git
873c05fa7e6fea27090b1bf0f67a073eadb04782 and kvm-userspace.git
d102d750f397b543fe620a3c77a7e5e42c483865.
I suspect 873c05fa7e6fea27090b1bf0f67a073eadb04782
On Thursday 24 April 2008 20:54:10 Avi Kivity wrote:
I propose moving the kvm lists to vger.kernel.org, for the following
benefits:
- better spam control
- faster service (I see significant lag with the sourceforge lists)
- no ads appended to the end of each email
If no objections are
Gerd Hoffmann wrote:
Glauber Costa wrote:
Gerd Hoffmann wrote:
Jeremy Fitzhardinge wrote:
Xen could change the parameters in the instant after
get_time_values(). That change could be as a result of
suspend-resume, so the parameters
and the tsc could be wildly different.
Ah, ok, forgot the
+void pvclock_read_wallclock(struct kvm_wall_clock *wall_clock,
+ struct kvm_vcpu_time_info *vcpu_time,
+ struct timespec *ts)
+{
+ u32 version;
+ u64 delta;
+ struct timespec now;
+
+ /* get wallclock at
-
- delta = kvm_clock_read();
-
native_write_msr(MSR_KVM_WALL_CLOCK, low, high);
- do {
- version = wall_clock.wc_version;
- rmb();
- wc_sec = wall_clock.wc_sec;
- wc_nsec = wall_clock.wc_nsec;
-
On Mon, Apr 21, 2008 at 4:15 AM, Gerd Hoffmann [EMAIL PROTECTED] wrote:
Marcelo Tosatti wrote:
From what me and marcelo discussed, I think there's a possibility that
it has marginally something to do with precision of clock calculation.
Gerd's patches address that issues. Can somebody
Avi Kivity wrote:
Yang, Sheng wrote:
On Thursday 24 April 2008 19:37:03 Avi Kivity wrote:
Yunfeng Zhao wrote:
Hi All,
This is today's KVM test result against kvm.git
873c05fa7e6fea27090b1bf0f67a073eadb04782 and kvm-userspace.git
d102d750f397b543fe620a3c77a7e5e42c483865.
I
On Sat, Apr 19, 2008 at 6:11 PM, Glauber Costa [EMAIL PROTECTED] wrote:
On Fri, Apr 18, 2008 at 1:27 PM, Avi Kivity [EMAIL PROTECTED] wrote:
Glauber de Oliveira Costa wrote:
Hi,
I've got some qemu crashes while trying to passthrough an ide device
to a kvm guest. After some
From: Avi Kivity [EMAIL PROTECTED]
Date: Thu, 24 Apr 2008 15:54:10 +0300
I propose moving the kvm lists to vger.kernel.org, for the following
benefits:
- better spam control
- faster service (I see significant lag with the sourceforge lists)
- no ads appended to the end of each email
David Miller wrote:
If no objections are raised, and if the vger postmasters agree, I will
mass subscribe the current subscribers so that there will be no service
interruption.
I'm fine with adding the list, but we don't do mass subscribes like
that, and this rule applies to every
Avi Kivity wrote:
Ok. __pit_timer_fn() is called from an interrupt, which then calls
smp_call_function_single(), which calls spin_lock(). If we've already
taken the lock, we hang.
Ah. Just adding a me too; I didn't get a chance to debug it yesterday, but I
was seeing similar problems.
On Thu, 2008-04-24 at 15:47 +0300, Avi Kivity wrote:
Dor Laor wrote:
while investigating the revert of fix sci irq set when acpi timer I
discovered the reason. Please also re-revert the original patch.
Applied, but system_powerdown still doesn't work with the sci acpi timer
fix.
Chris Lalancette wrote:
Avi Kivity wrote:
Ok. __pit_timer_fn() is called from an interrupt, which then calls
smp_call_function_single(), which calls spin_lock(). If we've already
taken the lock, we hang.
Ah. Just adding a me too; I didn't get a chance to debug it yesterday,
Hi,
My Project proposal Improving and Stabilizing Real-Mode Support for
Intel Hosts has been accepted into Google Summer of Code under the
Linux Foundation. You may have a look at the proposal abstract here:
http://code.google.com/soc/2008/linux/appinfo.html?csaid=1CC1C8B4CCC1120E
.
Any pointers
Chris Lalancette wrote:
Avi Kivity wrote:
You mean the gcc generates wrong code? It seems fine here (though
wonderfully obfuscated).
Can you attach an objdump -Sr svm.o? Also, what gcc version are you using?
(sending attachment in private mail, so I don't spam the whole list
On Thu, Apr 24, 2008 at 04:51:12AM -0500, Robin Holt wrote:
It seems to me the work done by mmu_notifier_mm_destroy should really
be done inside the mm_lock()/mm_unlock area of mmu_unregister and
There's no mm_lock/unlock for mmu_unregister anymore. That's the whole
point of using srcu so it
Avi Kivity wrote:
1811:8d 86 00 00 ff 3f lea0x3fff(%rsi),%eax
1817:83 f8 03cmp$0x3,%eax
181a:0f 87 e2 01 00 00 ja 1a02 svm_set_msr+0x27f
Now it uses %rsi instead of %esi, and any junk in the upper bits will
cause the ja to
Hollis Blanchard wrote:
On Thursday 24 April 2008 07:54:10 Avi Kivity wrote:
I propose moving the kvm lists to vger.kernel.org, for the following
benefits:
- better spam control
- faster service (I see significant lag with the sourceforge lists)
- no ads appended to the end of each
On Thu, Apr 24, 2008 at 5:47 PM, Avi Kivity [EMAIL PROTECTED] wrote:
Mohammed Gamal wrote:
Hi,
My Project proposal Improving and Stabilizing Real-Mode Support for
Intel Hosts has been accepted into Google Summer of Code under the
Linux Foundation. You may have a look at the proposal
Mohammed Gamal wrote:
Hi,
My Project proposal Improving and Stabilizing Real-Mode Support for
Intel Hosts has been accepted into Google Summer of Code under the
Linux Foundation. You may have a look at the proposal abstract here:
Dor Laor wrote:
On Thu, 2008-04-24 at 15:47 +0300, Avi Kivity wrote:
Dor Laor wrote:
while investigating the revert of fix sci irq set when acpi timer I
discovered the reason. Please also re-revert the original patch.
Applied, but system_powerdown still doesn't work with
On Thu, Apr 24, 2008 at 04:44:27PM +0300, Avi Kivity wrote:
Chris Lalancette wrote:
Avi Kivity wrote:
Ok. __pit_timer_fn() is called from an interrupt, which then calls
smp_call_function_single(), which calls spin_lock(). If we've already
taken the lock, we hang.
Ah. Just
On Thursday 24 April 2008 07:54:10 Avi Kivity wrote:
I propose moving the kvm lists to vger.kernel.org, for the following
benefits:
- better spam control
- faster service (I see significant lag with the sourceforge lists)
- no ads appended to the end of each email
If no objections are
Mohammed Gamal wrote:
Hi,
My Project proposal Improving and Stabilizing Real-Mode Support for
Intel Hosts has been accepted into Google Summer of Code under the
Linux Foundation. You may have a look at the proposal abstract here:
Marcelo Tosatti wrote:
On Thu, Apr 24, 2008 at 04:44:27PM +0300, Avi Kivity wrote:
Chris Lalancette wrote:
Avi Kivity wrote:
Ok. __pit_timer_fn() is called from an interrupt, which then calls
smp_call_function_single(), which calls spin_lock(). If we've already
taken
What is the rip (GUEST_RIP) value in the VMEXIT trace output? Is that the
current instruction pointer for the guest?
I take it the virt in the PAGE_FAULT trace output is the virtual address the
guest was referencing when the page fault occurred. What I don't understand (one
of many things
On Thu, Apr 24, 2008 at 05:39:43PM +0200, Andrea Arcangeli wrote:
There's at least one small issue I noticed so far, that while _release
don't need to care about _register, but _unregister definitely need to
care about _register. I've to take the mmap_sem in addition or in
In the end the best
David Miller [EMAIL PROTECTED] writes:
I'm fine with adding the list, but we don't do mass subscribes like
that, and this rule applies to every list which moves to vger from
somewhere else.
People will need to subscribe themselves to the new list.
Can someone please resubscribe gmane too
Avi Kivity wrote:
Now it uses %rsi instead of %esi, and any junk in the upper bits will
cause the ja to be taken.
We need to get a reduced testcase to the gcc folks, this is a serious
bug. Any changes in the code to work around this would be fragile.
Avi,
I've now filed a bug in
Hi,
I saw kvm-userspace recently merged qemu's new CPU_INTERRUPT_NMI
support. But the required infrastructure to use this in kvm mode is not
yet visible. Is anyone working on this? Sheng? IIRC, you once said to
work on it.
Currently I just need the basic mechanism for injecting NMIs into the
On Friday 25 April 2008 08:33:04 Jan Kiszka wrote:
Hi,
I saw kvm-userspace recently merged qemu's new CPU_INTERRUPT_NMI
support. But the required infrastructure to use this in kvm mode is not
yet visible. Is anyone working on this? Sheng? IIRC, you once said to
work on it.
Currently I just
If I suspend my host while running a Windows XP guest, the whole machine
crashes, so I was hoping to automate hibernation of the guest OS and
integrate that into my host's suspend process. Does anyone know how to
do that?
TIA,
--
Dave Abrahams
Boost Consulting
http://boost-consulting.com
Hi,
This series is an (initial) attempt to make qemu code a little bit
more modular. In this patch series specifically, I'm removing
some #ifdef TARGET_* from the general-purpose translate.c,
and rather, replacing them with a common function implemented in
architecture specific files.
Any rants
this patch replaced code inside specific ifdef in translate-all.c
with a generic architecture-implemented function. This leads to a
cleaner and more modular code in the generic part.
---
target-arm/translate.c |5 +
translate-all.c|2 +-
2 files changed, 6 insertions(+), 1
this patch replaced code inside specific ifdef in translate-all.c
with a generic architecture-implemented function. This leads to a
cleaner and more modular code in the generic part.
---
exec-all.h |3 +++
target-i386/translate.c | 23 +++
translate-all.c
this patch replaced code inside specific ifdef in translate-all.c
with a generic architecture-implemented function. This leads to a
cleaner and more modular code in the generic part.
---
target-sparc/translate.c | 20
translate-all.c | 18 +-
2
this patch replaced code inside specific ifdef in translate-all.c
with a generic architecture-implemented function. This leads to a
cleaner and more modular code in the generic part.
---
target-ppc/translate.c | 42 ++
translate-all.c| 40
this patch replaced code inside specific ifdef in translate-all.c
with a generic architecture-implemented function. This leads to a
cleaner and more modular code in the generic part.
---
target-m68k/translate.c |5 +
translate-all.c |2 +-
2 files changed, 6 insertions(+), 1
this patch replaced code inside specific ifdef in translate-all.c
with a generic architecture-implemented function. This leads to a
cleaner and more modular code in the generic part.
---
target-mips/translate.c |8
translate-all.c |4 +---
2 files changed, 9
this patch replaced code inside specific ifdef in translate-all.c
with a generic architecture-implemented function. This leads to a
cleaner and more modular code in the generic part.
---
target-alpha/translate.c |5 +
translate-all.c |2 +-
2 files changed, 6 insertions(+), 1
this patch replaced code inside specific ifdef in translate-all.c
with a generic architecture-implemented function. This leads to a
cleaner and more modular code in the generic part.
---
target-sh4/translate.c |7 +++
translate-all.c|3 +--
2 files changed, 8 insertions(+), 2
this patch replaced code inside specific ifdef in translate-all.c
with a generic architecture-implemented function. This leads to a
cleaner and more modular code in the generic part.
---
target-cris/translate.c |6 ++
translate-all.c |2 +-
2 files changed, 7 insertions(+), 1
As the current state of matters, all architectures call a function
with the same name and signature for updating the pc. Remove the ifdefs,
leading to a cleaner code
---
translate-all.c | 19 +--
1 files changed, 1 insertions(+), 18 deletions(-)
diff --git a/translate-all.c
2 files changed, 16 insertions(+)
arch/powerpc/kvm/booke_guest.c |6 ++
arch/powerpc/kvm/powerpc.c | 10 ++
This patch adds vcpu_put vpu_load in strategic places (as x86 does it), for
use of premption. This patch also adds a very critial bit need to wake up guest
that end
This set of patches fixes 100% CPU usage when a guest is idle on PowerPC. This
ti
me it uses common kvm functions to sleep the guest.
Signed-off-by: Jerone Young [EMAIL PROTECTED]
5 files changed, 91 insertions(+), 4 deletions(-)
arch/powerpc/kvm/booke_guest.c |6 +++
2 files changed, 68 insertions(+), 1 deletion(-)
arch/powerpc/platforms/44x/Makefile |2 -
arch/powerpc/platforms/44x/idle.c | 67 +++
This patch has been accepted upstream and will be in 2.6.26. So it will
eventually need to be removed when we move to
2 files changed, 7 insertions(+), 3 deletions(-)
arch/powerpc/kvm/emulate.c |5 +
arch/powerpc/kvm/powerpc.c |5 ++---
This patch handles a guest that is in a wait state. This ensures that the guest
is not allways eating up 100% cpu when it is idle.
Signed-off-by: Jerone Young [EMAIL
64 matches
Mail list logo