On Wed, Apr 30, 2008 at 01:48:38AM +0300, Avi Kivity wrote:
Amit Shah wrote:
+ if (is_error_page(host_page)) {
+ printk(KERN_INFO %s: gfn %p not valid\n,
+ __func__, (void *)page_gfn);
+ r = -1;
r = -1 is not really informative. Better use some
On Tue, Apr 29, 2008 at 02:09:20PM -0500, Anthony Liguori wrote:
This patch allows VMA's that contain no backing page to be used for guest
memory. This is a drop-in replacement for Ben-Ami's first page in his direct
mmio series. Here, we continue to allow mmio pages to be represented in the
On Tue, Apr 29, 2008 at 01:37:29PM +0300, Amit Shah wrote:
dma_alloc_coherent() doesn't call dma_ops-alloc_coherent in case no
IOMMU translations are necessary.
I always thought this was a huge wart in the x86-64 DMA ops. Would
there be strong resistance to fixing it so that alloc_coherent
Muli Ben-Yehuda wrote:
On Tue, Apr 29, 2008 at 02:09:20PM -0500, Anthony Liguori wrote:
This patch allows VMA's that contain no backing page to be used for guest
memory. This is a drop-in replacement for Ben-Ami's first page in his direct
mmio series. Here, we continue to allow mmio
On Wed, Apr 30, 2008 at 11:59:47AM +0300, Avi Kivity wrote:
The code is not trying to find a vma for the address, but a vma for the
address which also has VM_PFNMAP set. The cases for vma not found, or vma
found, but not VM_PFNMAP, are folded together.
Muli's saying the comparison is
Andrea Arcangeli wrote:
On Wed, Apr 30, 2008 at 11:59:47AM +0300, Avi Kivity wrote:
The code is not trying to find a vma for the address, but a vma for the
address which also has VM_PFNMAP set. The cases for vma not found, or vma
found, but not VM_PFNMAP, are folded together.
Christian Borntraeger wrote:
Am Sonntag, 27. April 2008 schrieb Avi Kivity:
Carsten Otte (4):
s390: KVM preparation: provide hook to enable pgstes in user pagetable
KVM: s390: interrupt subsystem, cpu timer, waitpsw
KVM: s390: API documentation
s390: KVM guest:
Bugs item #1953353, was opened at 2008-04-28 13:50
Message generated for change (Comment added) made by ravpl
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=1953353group_id=180599
Please note that this message will contain a full copy of the comment
* Christian Borntraeger [EMAIL PROTECTED] wrote:
While it is not a typical case, is there a better way of specifying
multiple authors to avoid future confusion?
i think the established rule is that there's one Author field per
commit. Multiple authors should either submit a tree with
Muli Ben-Yehuda wrote:
@@ -544,19 +545,35 @@ pfn_t gfn_to_pfn(struct kvm *kvm, gfn_t gfn)
npages = get_user_pages(current, current-mm, addr, 1, 1, 1, page,
NULL);
-if (npages != 1) {
-get_page(bad_page);
-return
David Miller wrote:
I've created (and tested) all of these lists.
Thanks. I about a week I'll make the sourceforge lists read-only.
--
Any sufficiently difficult bug is indistinguishable from a feature.
-
This
Jan Kiszka wrote:
Joerg Roedel wrote:
The current KVM x86 exception code handles double and triple faults only for
page fault exceptions. This patch extends this detection for every exception
that gets queued for the guest.
Signed-off-by: Joerg Roedel [EMAIL PROTECTED]
Cc: Jan Kiszka
On Wed, Apr 30, 2008 at 10:45:12AM +0200, Jan Kiszka wrote:
Joerg Roedel wrote:
The current KVM x86 exception code handles double and triple faults only for
page fault exceptions. This patch extends this detection for every exception
that gets queued for the guest.
Signed-off-by: Joerg
I noticed there is a windows PV driver based on virtIO in
http://sourceforge.net/project/showfiles.php?group_id=180599
But when I enable the driver in guest, the guest will hang. I'm using
changeset around April, 18. Since the driver is created in March, I
assume the changeset in Apri should be
David S. Ahern wrote:
Another tidbit for you guys as I make my way through various permutations:
I installed the RHEL3 hugemem kernel and the guest behavior is *much* better.
System time still has some regular hiccups that are higher than xen and esx
(e.g., 1 minute samples out of 5 show
In about a week, the various kvm lists will move to vger.kenel.org.
This will improve responsiveness, and reduce spam and advertising.
Please subscribe to the lists you are interested in as soon as
possible. You can subscribe by sending an email to
[EMAIL PROTECTED], with the following lines
Avi Kivity wrote:
Jan Kiszka wrote:
Joerg Roedel wrote:
The current KVM x86 exception code handles double and triple faults
only for
page fault exceptions. This patch extends this detection for every
exception
that gets queued for the guest.
Signed-off-by: Joerg Roedel [EMAIL
Avi Kivity wrote:
Fabian Deutsch wrote:
Hey.
I've been trying Microsoft Windows 2003 a couple of times. The wiki
tells me that everything should work okay. It does, when using -smp 1,
but gets ugly when using -smp 2 or so.
SO might it be useful, to add the column smp to the Guest
Jan Kiszka wrote:
Clear the pending original exception when raising a triple fault. This
allows to re-use the vcpu instance, e.g. after a reset which is
typically issued as reaction on the triple fault.
Signed-off-by: Jan Kiszka [EMAIL PROTECTED]
---
arch/x86/kvm/x86.c |4 +++-
1
Joerg Roedel wrote:
The current KVM x86 exception code handles double and triple faults only for
page fault exceptions. This patch extends this detection for every exception
that gets queued for the guest.
Signed-off-by: Joerg Roedel [EMAIL PROTECTED]
Cc: Jan Kiszka [EMAIL PROTECTED]
---
Minor cleanup I came across while reverting printf instrumentations.
Signed-off-by: Jan Kiszka [EMAIL PROTECTED]
---
libkvm/libkvm-x86.c |4 ++--
libkvm/libkvm.c |4 ++--
2 files changed, 4 insertions(+), 4 deletions(-)
Index: b/libkvm/libkvm-x86.c
This looks bogus, but it is so far without practical impact (phys_start
is always 0 when we do the calculation).
Signed-off-by: Jan Kiszka [EMAIL PROTECTED]
---
libkvm/libkvm.c |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
Index: b/libkvm/libkvm.c
Hollis Blanchard wrote:
Acked-by: Hollis Blanchard [EMAIL PROTECTED]
Avi, please apply for 2.6.26.
Sure thing. Thanks.
--
Any sufficiently difficult bug is indistinguishable from a feature.
-
This SF.net email is
Bugs item #1953353, was opened at 2008-04-28 07:50
Message generated for change (Comment added) made by mtosatti
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=1953353group_id=180599
Please note that this message will contain a full copy of the comment
Avi Kivity wrote:
David S. Ahern wrote:
Another tidbit for you guys as I make my way through various
permutations:
I installed the RHEL3 hugemem kernel and the guest behavior is *much*
better.
System time still has some regular hiccups that are higher than xen
and esx
(e.g., 1 minute
David S. Ahern wrote:
Avi Kivity wrote:
David S. Ahern wrote:
Another tidbit for you guys as I make my way through various
permutations:
I installed the RHEL3 hugemem kernel and the guest behavior is *much*
better.
System time still has some regular hiccups that are higher than
On Wed, Apr 30, 2008 at 07:39:53AM -0600, David S. Ahern wrote:
Avi Kivity wrote:
David S. Ahern wrote:
Another tidbit for you guys as I make my way through various
permutations:
I installed the RHEL3 hugemem kernel and the guest behavior is *much*
better.
System time still has some
Bugs item #1953353, was opened at 2008-04-28 14:50
Message generated for change (Comment added) made by izike
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=1953353group_id=180599
Please note that this message will contain a full copy of the comment
Avi Kivity wrote:
Hollis/Xiantao/Carsten, can you confirm that this approach works for
you? Carsten, I believe you don't have mmio, but at least this
shouldn't interfere.
Should work fine on s390 afaics.
-
This SF.net
My neighbor keeps me awake all night with their late night activities
http://www.poieuean.com/
-
This SF.net email is sponsored by the 2008 JavaOne(SM) Conference
Don't miss this year's exciting event. There's still time to
Yes, the 4G/4G patch and the 64G options are both enabled for the hugemem
kernel:
CONFIG_HIGHMEM64G=y
CONFIG_X86_4G=y
Differences between the standard kernel and the hugemem kernel:
# diff config-2.4.21-47.ELsmp config-2.4.21-47.ELhugemem
2157,2158c2157,2158
CONFIG_M686=y
#
Am Sonntag, 27. April 2008 schrieb Avi Kivity:
Carsten Otte (4):
s390: KVM preparation: provide hook to enable pgstes in user pagetable
KVM: s390: interrupt subsystem, cpu timer, waitpsw
KVM: s390: API documentation
s390: KVM guest: detect when running on kvm
On Tuesday 29 April 2008 18:12:51 Anthony Liguori wrote:
IIUC PPC correctly, all IO pages have corresponding struct pages. This
means that get_user_pages() would succeed and you can reference count
them? In this case, we would never take the VM_PFNMAP path.
Is that correct?
I think
Andrea Arcangeli wrote:
On Tue, Apr 29, 2008 at 06:12:51PM -0500, Anthony Liguori wrote:
IIUC PPC correctly, all IO pages have corresponding struct pages. This
means that get_user_pages() would succeed and you can reference count them?
In this case, we would never take the VM_PFNMAP
since the pv_apic_ops are only present if CONFIG_X86_LOCAL_APIC is compiled
in, kvmclock failed to build without this option. This patch fixes this
Signed-off-by: Glauber Costa [EMAIL PROTECTED]
---
arch/x86/kernel/kvmclock.c |4
1 files changed, 4 insertions(+), 0 deletions(-)
diff
Bugs item #1952988, was opened at 2008-04-27 15:25
Message generated for change (Comment added) made by carenas
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=1952988group_id=180599
Please note that this message will contain a full copy of the comment
This patch adds some kvmtrace bits to the generic x86 code
where it is instrumented from SVM.
Signed-off-by: Joerg Roedel [EMAIL PROTECTED]
---
arch/x86/kvm/x86.c | 25 -
1 files changed, 20 insertions(+), 5 deletions(-)
diff --git a/arch/x86/kvm/x86.c
This patch adds the missing kvmtrace markers to the svm
module of kvm.
Signed-off-by: Joerg Roedel [EMAIL PROTECTED]
---
arch/x86/kvm/svm.c | 26 +-
1 files changed, 25 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index
With an exit handler for NMI intercepts its possible to account them using
kvmtrace.
Signed-off-by: Joerg Roedel [EMAIL PROTECTED]
---
arch/x86/kvm/svm.c |7 ++-
1 files changed, 6 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index ab22615..6dce863
With an exit handler for INTR intercepts its possible to account them using
kvmtrace.
Signed-off-by: Joerg Roedel [EMAIL PROTECTED]
---
arch/x86/kvm/svm.c |8 +++-
1 files changed, 7 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index
This patch moves the trace entry for APIC accesses from the VMX code to the
generic lapic code. This way APIC accesses from SVM will also be traced.
Signed-off-by: Joerg Roedel [EMAIL PROTECTED]
---
arch/x86/kvm/lapic.c |4
arch/x86/kvm/vmx.c |2 --
2 files changed, 4
To distinguish between real page faults and nested page faults they should be
traced as different events. This is implemented by this patch.
Signed-off-by: Joerg Roedel [EMAIL PROTECTED]
---
arch/x86/kvm/svm.c|4
include/asm-x86/kvm.h |1 +
2 files changed, 5 insertions(+), 0
This patch adds a format line for TDP page faults to the formats file.
Signed-off-by: Joerg Roedel [EMAIL PROTECTED]
---
user/formats |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/user/formats b/user/formats
index 5313a47..c6c49d6 100644
--- a/user/formats
+++
This series of patches adds the missing kvmtrace markers to the SVM specific
code paths in KVM. Further it adds a new trace event for TDP page faults.
The diffstat:
arch/x86/kvm/lapic.c |4
arch/x86/kvm/svm.c| 45 ++---
arch/x86/kvm/vmx.c
Avi Kivity wrote:
Jan Kiszka wrote:
Clear the pending original exception when raising a triple fault. This
allows to re-use the vcpu instance, e.g. after a reset which is
typically issued as reaction on the triple fault.
Signed-off-by: Jan Kiszka [EMAIL PROTECTED]
---
arch/x86/kvm/x86.c
Userland-located ROM memory is not available via kvm-physical_memory +
guest_address. To let kvm_show_code also dump useful information when
some problem in ROM (BIOS...) occurs, this patch first tries to obtain
the memory content via the mmio_read callback - maybe not 100% clean,
but works at
The in-kernel PIT emulation ignores pending timers if operating under
mode 4, which for example DragonFlyBSD uses (and Plan9 too, apparently).
Mode 4 seems to be similar to one-shot mode, other than the fact that it
starts counting after the next CLK pulse once programmed, while mode 1
starts
Anthony,
The following sequence crashes F9 guests, when using VNC:
# modprobe cirrusfb
# vbetool post
Results in Floating point exception at:
cirrus_do_copy()
{
depth = s-get_bpp((VGAState *)s) / 8
...
sx = (src % (width * depth)) / depth;
...
}
Problem is that -get_bpp
Bugs item #1905703, was opened at 2008-03-02 10:49
Message generated for change (Comment added) made by mtosatti
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=1905703group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #1919354, was opened at 2008-03-19 04:18
Message generated for change (Comment added) made by mtosatti
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=1919354group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #1881418, was opened at 2008-01-28 16:55
Message generated for change (Comment added) made by mtosatti
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=1881418group_id=180599
Please note that this message will contain a full copy of the comment
Marcelo Tosatti wrote:
The in-kernel PIT emulation ignores pending timers if operating under
mode 4, which for example DragonFlyBSD uses (and Plan9 too, apparently).
Mode 4 seems to be similar to one-shot mode, other than the fact that it
starts counting after the next CLK pulse once
Jan Kiszka wrote:
Yes, the following still works for me. But I'm not the right person to
ask if there are obscure cases where you may not want this clearing
while just editing some registers (I'm thinking of debugger scenarios
now).
Applied, as the bug we're fixing is much more likely
Bugs item #1905703, was opened at 2008-03-02 15:49
Message generated for change (Comment added) made by jroedel
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=1905703group_id=180599
Please note that this message will contain a full copy of the comment
Joerg Roedel wrote:
This series of patches adds the missing kvmtrace markers to the SVM specific
code paths in KVM. Further it adds a new trace event for TDP page faults.
Thanks, applied all. Please use git format-patch -n (or format.numbered
= auto) so that patch order is explicit.
--
Marcelo Tosatti wrote:
Anthony,
The following sequence crashes F9 guests, when using VNC:
# modprobe cirrusfb
# vbetool post
Results in Floating point exception at:
cirrus_do_copy()
{
depth = s-get_bpp((VGAState *)s) / 8
...
sx = (src % (width * depth)) / depth;
On Sat, Apr 26, 2008 at 10:08 AM, Avi Kivity [EMAIL PROTECTED] wrote:
Marcelo Tosatti wrote:
On Wed, Apr 23, 2008 at 09:30:06AM +0300, Avi Kivity wrote:
as I got no reply, I guess it is a bad setup on my part. If that might
help, this happenned while I was doing a make -j on
Jiang, Yunhong wrote:
I noticed there is a windows PV driver based on virtIO in
http://sourceforge.net/project/showfiles.php?group_id=180599
But when I enable the driver in guest, the guest will hang. I'm using
changeset around April, 18. Since the driver is created in March, I
assume the
There is no reason why should i386 and x86_64 code for rdtsc be different.
Unify them.
---
cpu-all.h | 11 +--
1 files changed, 1 insertions(+), 10 deletions(-)
diff --git a/cpu-all.h b/cpu-all.h
index 2a2b197..1c9e2a3 100644
--- a/cpu-all.h
+++ b/cpu-all.h
@@ -930,16 +930,7 @@ static
In vmx.c:alloc_identity_pagetable() we grab a reference to the EPT identity
page table via gfn_to_page(). We never release this reference though.
This patch releases the reference to this page on VM destruction. I haven't
tested this with EPT.
Signed-off-by: Anthony Liguori [EMAIL PROTECTED]
Jerone Young wrote:
This patch removes static x86 entries and makes things work for multiple
archs.
Signed-off-by: Jerone Young [EMAIL PROTECTED]
diff --git a/kernel/Makefile b/kernel/Makefile
--- a/kernel/Makefile
+++ b/kernel/Makefile
@@ -1,5 +1,10 @@ include ../config.mak
include
Jerone Young wrote:
1 file changed, 1 deletion(-)
qemu/hw/ppc440_bamboo.c |1 -
In 2.6.26 wait is now enabled by default. With this the /hypervisor node will
not be need to be idetified to enable the guest to go into wait state while
idle.
Signed-off-by: Jerone Young [EMAIL
This patch allows VMA's that contain no backing page to be used for guest
memory. This is a drop-in replacement for Ben-Ami's first page in his direct
mmio series. Here, we continue to allow mmio pages to be represented in the
rmap.
Since v1, I've taken into account Andrea's suggestions at
On Wednesday 30 April 2008 15:53:47 Jerone Young wrote:
1 file changed, 1 insertion(+), 1 deletion(-)
configure |2 +-
This fixes compilation for cross compilers as many do not create a
${cross_prefix}cc link. But the do a ${cross_prefix}gcc. This is what the
kernel does so this will
On Wednesday 30 April 2008 15:16:09 Avi Kivity wrote:
hack = $(call _hack,$T/$(strip $1))
+
+ifneq '$(filter $(ARCH_DIR), x86)' ''
+HACK_FILES = kvm_main.c \
+ mmu.c \
+ vmx.c \
+ svm.c \
+ x86.c \
+ irq.h
+endif
1 file changed, 1 insertion(+), 1 deletion(-)
configure |2 +-
This fixes compilation for cross compilers as many do not create a
${cross_prefix}cc link. But the do a ${cross_prefix}gcc. This is what the
kernel does so this will work for everyone. This breaks some who do not have a
cc link
1 file changed, 23 insertions(+), 13 deletions(-)
kernel/Makefile | 36 +++-
This patch removes static x86 entries and makes things work for multiple archs.
Signed-off-by: Jerone Young [EMAIL PROTECTED]
diff --git a/kernel/Makefile b/kernel/Makefile
---
Hi ,
Regarding the guest swapping mechanism (host ability to swap out guest
pages),
1) Can the host swap out any page of a guest VM ? (including the guest's
kernel pages)
2) Does the guest know its page has been swapped out or is this transparent
to the guest ? ( I think the guest
wouldn't know
Bugs item #1881418, was opened at 2008-01-28 21:55
Message generated for change (Comment added) made by fishor-flex
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=1881418group_id=180599
Please note that this message will contain a full copy of the comment
69 matches
Mail list logo