Akio Takebe wrote:
> Hi,
>
> Nice to meet you, all.
>
Hello and welcome :)
> I recently got understanding kvm started,
> and I found some worning at compiling kvm.
>
> This patch is for cleanup of kvmctl.c.
> I tested Booting Linux guest on x86_32.
>
>
Thanks, applied.
--
error compiling
Jim,
Both changing the nic (to rtl8139) and rebooting the host solved the
issue for me.
My VM's have now survived over 12 hours of intense activity without a glitch.
To be clear: soly changing the nic without rebooting the host worked;
after rebooting the host the default nic works again.
Ki
Zhao, Yunfeng wrote:
> Hi,
> Here is the testing result for latest KVM commits, kernel
> bb1d1fee77d97efba72dccec85d857378e3abea5, userspace,
> 332650e859f19aac2e941f1e31693a99e0484820.
>
> Two new issues:
> 1. host kernel call trace while running smp guests
> https://sourceforge.net/tracker/?func=
From: Laurent Vivier <[EMAIL PROTECTED]>
The repnz/repne instructions must set rep_prefix to 1 like rep/repe/repz.
This patch correct the disk probe problem met with OpenBSD.
This issue appears with commit e70669abd4e60dfea3ac1639848e20e2b8dd1255
because before it, the decoding was done internal
The following patches fix fallout from the main 2.6.24 KVM merge. An
exception is the movnti emulation patch, which adds support for Linux
2.6.16 guests.
The patches can be found in kvm.git in the branch kvm-updates-2.6.24.
There is also a branch kvm-updates-2.6.25 which will form the basis of
th
This makes sure we handle NMI on the current cpu, and that we don't service
maskable interrupts before non-maskable ones.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/vmx.c | 13 +
1 files changed, 9 insertions(+), 4 deletions(-)
diff --git a/drivers/kvm/vmx.c b/dr
From: Nitin A Kamble <[EMAIL PROTECTED]>
This code has gone to wrong place in the file. Moving it back to
right location.
Signed-off-by: Nitin A Kamble <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/x86_emulate.c | 51 +++--
From: Izik Eidus <[EMAIL PROTECTED]>
Setting shadow page table entry should be set atomicly using set_shadow_pte().
Signed-off-by: Izik Eidus <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/mmu.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff
From: Sheng Yang <[EMAIL PROTECTED]>
Implement emulation of instruction:
movnti m32/m64, r32/r64
opcode: 0x0f 0xc3
Signed-off-by: Sheng Yang <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/x86_emulate.c |7 ++-
1 files changed, 6 insertions(+), 1
From: Aurelien Jarno <[EMAIL PROTECTED]>
The patch belows changes the access type to register from memory for
instructions that are declared as SrcMem or DstMem, but have a
ModR/M byte with Mod = 3.
It fixes (at least) the lmsw and smsw instructions on an AMD64 CPU,
which are needed for FreeBSD.
From: Kevin Pedretti <[EMAIL PROTECTED]>
kvm_lapic_reset() was initializing apic->timer.divide_count to 0,
which could potentially lead to a divide by zero error in
apic_get_tmcct(). Any guest that reads the APIC's CCR (current count)
register before setting DCR (divide configuration) would trigg
When resetting from userspace, we need to handle the flags being cleared
even after we are in real mode.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/vmx.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/drivers/kvm/vmx.c b/drivers/kvm/vmx.c
index f130c0
From: Eddie Dong <[EMAIL PROTECTED]>
Resetting an SMP guest will force AP enter real mode (RESET) with
paging enabled in protected mode. While current enter_rmode() can
only handle mode switch from nonpaging mode to real mode which leads
to SMP reboot failure.
Fix by reloading the mmu context on
From: Kevin Pedretti <[EMAIL PROTECTED]>
Better handle wrap-around cases when reading the APIC CCR
(current count register). Also, if ICR is 0, CCR should also
be 0... previously reading CCR before setting ICR would result
in a large kinda-random number.
Signed-off-by: Kevin Pedretti <[EMAIL PRO
From: Laurent Vivier <[EMAIL PROTECTED]>
We need to make sure that the timer interrupt happens before we clear
PF_VCPU, so the accounting code actually sees guest mode.
http://lkml.org/lkml/2007/10/15/114
Signed-off-by: Laurent Vivier <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECT
Avi Kivity wrote:
> The following patches fix fallout from the main 2.6.24 KVM merge. An
> exception is the movnti emulation patch, which adds support for Linux
> 2.6.16 guests.
>
> The patches can be found in kvm.git in the branch kvm-updates-2.6.24.
> There is also a branch kvm-updates-2.6.25 wh
Bart Trojanowski wrote:
> * Bart Trojanowski <[EMAIL PROTECTED]> [071019 20:03]:
>
>> * Bart Trojanowski <[EMAIL PROTECTED]> [071019 17:00]:
>>
>>
>>> Once the system is booted, I attached using vnc, then I ssh in and ran
>>> 'svn update'... and the host machine froze.
>>>
>>> The last mes
Carlo Marcelo Arenas Belon wrote:
> The following patch Implement a configure passthrough for qemu and
> migrate all current qemu specific configuration flags (enable-alsa,
> disable-vnc-tls and disable-gcc-check) to use it.
>
> It leaves a description of the current flags (as used in kvm's confi
Avi Kivity a écrit :
> Avi Kivity wrote:
>> The following patches fix fallout from the main 2.6.24 KVM merge. An
>> exception is the movnti emulation patch, which adds support for Linux
>> 2.6.16 guests.
>>
>> The patches can be found in kvm.git in the branch kvm-updates-2.6.24.
>> There is also a
Laurent Vivier wrote:
> Avi Kivity a écrit :
>> Avi Kivity wrote:
>>> The following patches fix fallout from the main 2.6.24 KVM merge. An
>>> exception is the movnti emulation patch, which adds support for Linux
>>> 2.6.16 guests.
>>>
>>> The patches can be found in kvm.git in the branch kvm-upda
Vladimir Stavrinov wrote:
> Microsoft.Windows.Vista.Ultimate.X86.OEM guest successfully
> installed but after that kvm crash immediately after startup on
> vista boot loader and dump registers into linux console:
>
>
Hmm. I just went through a full install/boot cycle with no problems (om
kvm-4
Avi Kivity a écrit :
> Laurent Vivier wrote:
>> Avi Kivity a écrit :
>>> Avi Kivity wrote:
The following patches fix fallout from the main 2.6.24 KVM merge. An
exception is the movnti emulation patch, which adds support for Linux
2.6.16 guests.
The patches can be found in
Should fpu_active be X86 specific? Not sure about PPC & S390 (Hollis &
Carsten?), but for IA64
it is catagoried into low fp & high fp.
Eddie
diff --git a/drivers/kvm/kvm.h b/drivers/kvm/kvm.h
index 08b5b21..a824073 100644
--- a/drivers/kvm/kvm.h
+++ b/drivers/kvm/kvm.h
@@ -333,7 +333,6 @@ void kv
Without rtl9139 linux guest with 4GB can be booted up successfully.
>-Original Message-
>From: Izik Eidus [mailto:[EMAIL PROTECTED]
>Sent: 2007年10月19日 20:56
>To: Zhao, Yunfeng
>Cc: kvm-devel
>Subject: Re: [kvm-devel] Test for KVM , kernel bb1d1fe..., userspace 332650e...
>
>Zhao, Yunfeng w
Joris wrote:
> Both changing the nic (to rtl8139) and rebooting the host solved the
> issue for me.
> My VM's have now survived over 12 hours of intense activity without a glitch.
>
> To be clear: soly changing the nic without rebooting the host worked;
> after rebooting the host the default nic w
> -Ursprüngliche Nachricht-
> Von: Gregory Haskins [mailto:[EMAIL PROTECTED]
> Gesendet: Friday, October 19, 2007 5:27 PM
> An: Back, Michael (ext)
> Cc: kvm-devel@lists.sourceforge.net
> Betreff: Re: AW: [kvm-devel] KVM and Prempt?
>
> On Fri, 2007-10-19 at 16:17 +0200, Back, Michael (e
26 matches
Mail list logo