kvm_para.h potentially contains definitions that are to be used by
kvm-userspace,
so it should not be included inside the __KERNEL__ block. To protect its own
data structures,
kvm_para.h already includes its own __KERNEL__ block.
Signed-off-by: Glauber de Oliveira Costa <[EMAIL PROTECTED]>
Acked
The 3 patches should be attached now.
userspace follows
-
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2008.
http://clk.atdmt.com/MRT/go/vse012070mrt/direct/01/
__
This is the host part of kvm clocksource implementation. As it does
not include clockevents, it is a fairly simple implementation. We
only have to register a per-vcpu area, and start writting to it periodically.
The area is binary compatible with xen, as we use the same shadow_info
structure.
Si
This is the guest part of kvm clock implementation
It does not do tsc-only timing, as tsc can have deltas
between cpus, and it did not seem worthy to me to keep
adjusting them.
We do use it, however, for fine-grained adjustment.
Other than that, time comes from the host.
Signed-off-by: Glauber d
Alexander Graf wrote:
> This is a resend of a mail I sent on 01/10/2008. I did not receive any
> response, so I assume it was lost.
>
> The patch is really minor, does not break any compatibility (the MSR is
> Intel family 13+) and makes Darwin work.
>
> --- old mail ---
>
> This patch adds support
In this patch, we probe the host checking for clocksource capabilities.
In case it is found, it is advertised to the guest through the appropriate
cpuid mechanism
Signed-off-by: Glauber de Oliveira Costa <[EMAIL PROTECTED]>
---
qemu/qemu-kvm-x86.c |7 ++-
1 files changed, 6 insertions(+),
userspace, with patches attached.
-
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2008.
http://clk.atdmt.com/MRT/go/vse012070mrt/direct/01/
_
Darrick J. Wong wrote:
> Hi,
>
> I'm attempting to run a KVM instance with 2 CPUs configured. The VM
> appears to get most of the way through booting Ubuntu and then kvm locks
> up. At that point there's nothing printed on stdout from the kvm
> process and the monitor doesn't respond either. The
Marcelo Tosatti wrote:
> So the first patch seemed alright (taking into account the comments from
> my previous email, that migration should probably be fixed in a separate
> patch since its broken already and that its guaranteed that vcpu0 is the
> first to hit vcpu_load).
>
I really would lik
Glauber de Oliveira Costa wrote:
> Here's a new version, with some comments addressed.
> I'm using only one msr instead of two as avi sugested.
>
> Reason is that, following another comentary of avi,
> I'm doing kmap_atomic's instead of kvm_write. however,
> as all the information is part of the sa
Avi Kivity wrote:
> Glauber de Oliveira Costa wrote:
>> Here's a new version, with some comments addressed.
>> I'm using only one msr instead of two as avi sugested.
>>
>> Reason is that, following another comentary of avi,
>> I'm doing kmap_atomic's instead of kvm_write. however,
>> as all the inf
Alexander Graf wrote:
>>>
>>>
>>>
>> What I mean is, right now we present really broken tscs to the guest.
>> After your patch, we present less-broken tscs (at boot, they will
>> closely resemble stable tscs). But after the machine idles a bit and
>> cpufreq takes over, the tscs
have qemu-kvm to include kvm_para, allowing access to paravirt definitions
Signed-off-by: Glauber de Oliveira Costa <[EMAIL PROTECTED]>
---
qemu/qemu-kvm-x86.c |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/qemu/qemu-kvm-x86.c b/qemu/qemu-kvm-x86.c
index c79ca36..21ec112
Christoph Hellwig wrote:
> I have to add that having compile of userspace code depend on a kernel
> dir is completely broken. Any chance the kvm maintainers can fix
> userspace code to compile standalone and not depend on a kernel?
That's the plan, but since things work for most people that are
On Mon, Jan 07, 2008 at 03:25:50PM +0100, Laurent Vivier wrote:
> > Perhaps a ./configure is needed.
> >
> > What's your HEAD? I have a5b3d2c9b4d4ca3e02f294d14c7df016e070bda7,
> > which compiles fine.
>
> OK, I found where is the problem: my KERNELDIR is not the good one.
>
> Thank you for the
Alexander Graf wrote:
> This is a resend of a mail I sent on 01/10/2008. I did not receive any
> response, so I assume it was lost.
>
> The patch is really minor, does not break any compatibility (the MSR is
> Intel family 13+) and makes Darwin work.
>
> --- old mail ---
>
> This patch adds support
On Tue, Jan 15, 2008 at 04:40:19PM +0200, Avi Kivity wrote:
> Note that we can now replace aliases with slots; simply map the same hva
> range to two different gpa ranges (using a kvm-private memslot for backward
> compat).
Currently the host physical page is a 1:1 mapping with the hva. Not
sure
Andrea Arcangeli wrote:
> On Tue, Jan 15, 2008 at 04:40:19PM +0200, Avi Kivity wrote:
>
>> Note that we can now replace aliases with slots; simply map the same hva
>> range to two different gpa ranges (using a kvm-private memslot for backward
>> compat).
>>
>
> Currently the host physical
Le mardi 15 janvier 2008 à 15:49 +, Christoph Hellwig a écrit :
> On Mon, Jan 07, 2008 at 03:25:50PM +0100, Laurent Vivier wrote:
> > > Perhaps a ./configure is needed.
> > >
> > > What's your HEAD? I have a5b3d2c9b4d4ca3e02f294d14c7df016e070bda7,
> > > which compiles fine.
> >
> > OK, I fo
On Tue, 2008-01-15 at 16:57 +0200, Avi Kivity wrote:
> Hollis Blanchard wrote:
> >> btw, isn't passthrough better handled through the tlb? i.e. actually
> >> let the guest access the specially-configured memory? You can have qemu
> >> mmap /dev/mem and install it as a memslot, and things should
Avi Kivity wrote:
> Alexander Graf wrote:
>> This is a resend of a mail I sent on 01/10/2008. I did not receive any
>> response, so I assume it was lost.
>>
>> The patch is really minor, does not break any compatibility (the MSR is
>> Intel family 13+) and makes Darwin work.
>>
>> --- old mail ---
On Tue, Jan 15, 2008 at 05:57:03PM +0200, Avi Kivity wrote:
> It's the same hva for two different gpas. Same functionality as the alias,
> but with less data structures.
Ok but if this is already supposed to work, then I need to at least
change kvm_hva_to_rmapp not to stop when it find the first
Avi Kivity wrote:
> Alexander Graf wrote:
>
>>> What I mean is, right now we present really broken tscs to the guest.
>>> After your patch, we present less-broken tscs (at boot, they will
>>> closely resemble stable tscs). But after the machine idl
Avi Kivity wrote:
> Alexander Graf wrote:
>
>> This is a resend of a mail I sent on 01/10/2008. I did not receive any
>> response, so I assume it was lost.
>>
>> The patch is really minor, does not break any compatibility (the MSR is
>> Intel family 13+) and makes Darwin work.
>>
>> --- old mail
On Tue, Jan 15, 2008 at 05:55:20PM +0200, Avi Kivity wrote:
> That's the plan, but since things work for most people that area is not
> seeing much attention. The problem areas are compiling userspace against
> older kernels, and that's not something we do often.
Well, the point is there should
On Sun, Jan 13, 2008 at 01:37:11PM +0200, Uri Lublin wrote:
> Try to build the kernel modules too (remove '--with-patched-kernel' from
> ./configure arguments ):
> ./configure --prefix=/opt/kvm --qemu-cc=/usr/bin/gcc-3.4 ; make -C
> kernel LINUX= sync; make
> You will have to rmmod current kvm mo
Bugs item #1872252, was opened at 2008-01-15 12:17
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1872252&group_id=180599
Please note that this message will contain a full copy
On Tue, 15 Jan 2008, Avi Kivity wrote:
> > Duh. Impossible. Two instances of Linux cannot share page structs. So how
> > are you doing this? Or is this just an idea?
>
> I was describing one Linux host running two guest instances. The page structs
> are in the host, so they are shared by mmap().
Christoph Hellwig wrote:
> On Tue, Jan 15, 2008 at 05:55:20PM +0200, Avi Kivity wrote:
>
>> That's the plan, but since things work for most people that area is not
>> seeing much attention. The problem areas are compiling userspace against
>> older kernels, and that's not something we do ofte
Alexander Graf wrote:
> Avi Kivity wrote:
>
>> Alexander Graf wrote:
>>
>>
>>> This is a resend of a mail I sent on 01/10/2008. I did not receive any
>>> response, so I assume it was lost.
>>>
>>> The patch is really minor, does not break any compatibility (the MSR is
>>> Intel family 13
Alexander Graf wrote:
> If I remember correctly, there was a statement on LKML by AMD which said
> that the TSC is completely broken on AMD systems, so you should not use
> it there anyway.
>
Well, that's up to the guest to decide. Looks like older Linux guests
make the wrong decision.
On Tue, Jan 15, 2008 at 07:44:09PM +0200, Avi Kivity wrote:
> Yes, you're right. My confusion arose because we have two distinct needs
> for a "kernel directory":
>
> 1. A build directory for the external module (which really needs to be a
> kernel directory)
> 2. A directory with the exported u
Bugs item #1872255, was opened at 2008-01-15 12:24
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1872255&group_id=180599
Please note that this message will contain a full copy
Christoph Lameter wrote:
> On Tue, 15 Jan 2008, Avi Kivity wrote:
>
>
>>> Duh. Impossible. Two instances of Linux cannot share page structs. So how
>>> are you doing this? Or is this just an idea?
>>>
>> I was describing one Linux host running two guest instances. The page
>> structs
>>
On Tue, 15 Jan 2008, Avi Kivity wrote:
> > Ahh.. Okay I was talking about a guest exporting its memory to another
> > guest.
> >
>
> That's not very different, if they are on the same host?
But each guest has its own page structs. They cannot share page structs.
Concurrent access of two inde
Christoph Lameter wrote:
> On Tue, 15 Jan 2008, Avi Kivity wrote:
>
>
>>> Ahh.. Okay I was talking about a guest exporting its memory to another
>>> guest.
>>>
>>>
>> That's not very different, if they are on the same host?
>>
>
> But each guest has its own page structs. They cann
On Tue, 15 Jan 2008, Avi Kivity wrote:
> > But each guest has its own page structs. They cannot share page structs.
> > Concurrent access of two independent kernel instances for synchronization
> > and status maintenance to a single page struct?
> >
>
> There's a host page struct (that the gue
As it should be useful to be able to mount partition from a disk image, (and as
I need a break in my bug hunting) I've modified the loop driver to mount raw
disk image.
To not break original loop device, as we have to change minor numbers to manage
partitions, a new parameter is added to the mo
On Tuesday 15 January 2008 23:16:46 Avi Kivity wrote:
> Alexander Graf wrote:
> > If I remember correctly, there was a statement on LKML by AMD which said
> > that the TSC is completely broken on AMD systems, so you should not use
> > it there anyway.
>
> Well, that's up to the guest to decide. Lo
On Tue, Jan 15, 2008 at 07:22:53PM +0100, Laurent Vivier wrote:
> As it should be useful to be able to mount partition from a
> disk image, (and as I need a break in my bug hunting) I've
> modified the loop driver to mount raw disk image.
>
> To not break original loop device, as we have to chan
On Tue, Jan 15, 2008 at 05:07:46PM +0200, Avi Kivity wrote:
> Are you using qcow? If so, this may be the recently-committed smp aio
> deadlock fix. See 6bcdef5c1157bd7b526491252d20f8007ff2e9dc. Please try a
> fresh qemu-userspace.git.
qcow2, actually. qcow + fresh git seems to reduce the de
On Tue, 2008-01-15 at 13:44 +0100, Andrea Arcangeli wrote:
> On Mon, Jan 14, 2008 at 12:02:42PM -0800, Christoph Lameter wrote:
> > Hmmm... In most of the callsites we hold a writelock on mmap_sem right?
>
> Not in all, like Marcelo pointed out in kvm-devel, so the lowlevel
> locking can't relay
On Tue, Jan 15, 2008 at 12:13:40PM -0800, Darrick J. Wong wrote:
> On Tue, Jan 15, 2008 at 05:07:46PM +0200, Avi Kivity wrote:
>
> > Are you using qcow? If so, this may be the recently-committed smp aio
> > deadlock fix. See 6bcdef5c1157bd7b526491252d20f8007ff2e9dc. Please try a
> > fresh qem
I Dream of you http://67.175.162.226/
-
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2008.
http://clk.atdmt.com/MRT/go/vse012070mrt/direct/01/
__
# HG changeset patch
# User Hollis Blanchard <[EMAIL PROTECTED]>
# Date 1200434370 21600
# Node ID 9878c9cec5f831ff5e9b97539aabc5fa3d934501
# Parent 931a81e1002110be0e8bf5b335bf199d43534c2c
This allows kvm_host.h to be #included even when struct preempt_notifier is
undefined.
Signed-off-by: Holli
These small ifdefs are necessary for integration of the PowerPC port.
3 files changed, 9 insertions(+)
arch/x86/kvm/Kconfig |5 +
include/linux/kvm_host.h |2 ++
virt/kvm/kvm_main.c |2 ++
-
This SF.net
# HG changeset patch
# User Hollis Blanchard <[EMAIL PROTECTED]>
# Date 1200436754 21600
# Node ID f058f7e0e9e2f47beb19114a4ee3c7c44ac03aa0
# Parent c6e8bf3f9f7c9705a0ad29f44fa148fe80a365ff
The return code from exit() will propagate all the way out to shell, which will
enable some automated testin
# HG changeset patch
# User Hollis Blanchard <[EMAIL PROTECTED]>
# Date 1200436754 21600
# Node ID 59aa1c2e71c23b6fe1fb072c81163807da817d5b
# Parent 05365f8559d584fb1e935a9a64b5fa4f7e894d1f
This allows for cross-compiling.
Signed-off-by: Hollis Blanchard <[EMAIL PROTECTED]>
---
1 file changed, 1
# HG changeset patch
# User Hollis Blanchard <[EMAIL PROTECTED]>
# Date 1200436754 21600
# Node ID d4c0de7599e4a4ae107044aa4f4c95dc50f9ce6a
# Parent 59aa1c2e71c23b6fe1fb072c81163807da817d5b
This duplicates some test/x86/lib/ files into test/lib/ until someone ports x86
to use the common source. Ar
# HG changeset patch
# User Hollis Blanchard <[EMAIL PROTECTED]>
# Date 1200436754 21600
# Node ID 05365f8559d584fb1e935a9a64b5fa4f7e894d1f
# Parent f058f7e0e9e2f47beb19114a4ee3c7c44ac03aa0
This allows other architectures to build test executables in other ways.
Signed-off-by: Hollis Blanchard <[
# HG changeset patch
# User Hollis Blanchard <[EMAIL PROTECTED]>
# Date 1200436754 21600
# Node ID c6e8bf3f9f7c9705a0ad29f44fa148fe80a365ff
# Parent f22e390c06b78ffbcec4738112309f66267e3582
This will allow other architectures to share it, since main.c is x86-only.
Signed-off-by: Hollis Blanchard
# HG changeset patch
# User Hollis Blanchard <[EMAIL PROTECTED]>
# Date 1200437012 21600
# Node ID 75481de4f07eab17035fb24f14417be2ee62ac10
# Parent d4c0de7599e4a4ae107044aa4f4c95dc50f9ce6a
Signed-off-by: Hollis Blanchard <[EMAIL PROTECTED]>
---
3 files changed, 92 insertions(+), 18 deletions(-)
Le mardi 15 janvier 2008 à 18:27 +, Daniel P. Berrange a écrit :
> On Tue, Jan 15, 2008 at 07:22:53PM +0100, Laurent Vivier wrote:
> > As it should be useful to be able to mount partition from a
> > disk image, (and as I need a break in my bug hunting) I've
> > modified the loop driver to mou
On Wed, Jan 16, 2008 at 12:40:06AM +0100, Laurent Vivier wrote:
> Le mardi 15 janvier 2008 à 18:27 +, Daniel P. Berrange a écrit :
> > On Tue, Jan 15, 2008 at 07:22:53PM +0100, Laurent Vivier wrote:
> > > As it should be useful to be able to mount partition from a
> > > disk image, (and as I n
Le mardi 15 janvier 2008 à 23:54 +, Daniel P. Berrange a écrit :
> On Wed, Jan 16, 2008 at 12:40:06AM +0100, Laurent Vivier wrote:
> > Le mardi 15 janvier 2008 à 18:27 +, Daniel P. Berrange a écrit :
> > > On Tue, Jan 15, 2008 at 07:22:53PM +0100, Laurent Vivier wrote:
> > > > As it should
On Wed, Jan 16, 2008 at 07:18:53AM +1100, Benjamin Herrenschmidt wrote:
> Do you have cases where it's -not- called with the PTE lock held ?
For invalidate_page no because currently it's only called next to the
ptep_get_and_clear that modifies the pte and requires the pte
lock. invalidate_range/re
Bugs item #1872539, was opened at 2008-01-16 14:40
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1872539&group_id=180599
Please note that this message will contain a full copy
Hi, all,
This is today's KVM test result against kvm.git
e523e00f4e2fe71b123bb102a8847f86b5b4bd8b and kvm-userspace.git
6bcdef5c1157bd7b526491252d20f8007ff2e9dc.
One issue fixed:
With using qcow images xpsp2 with 2vpus may fail to boot
https://sourceforge.net/tracker/index.php?func=detail&aid=1
Christoph Lameter wrote:
> On Tue, 15 Jan 2008, Avi Kivity wrote:
>
>
>>> But each guest has its own page structs. They cannot share page structs.
>>> Concurrent access of two independent kernel instances for synchronization
>>> and status maintenance to a single page struct?
>>>
>>>
>
Andi Kleen wrote:
> FWIW it seems things are broken even without -kernel in -59 too. If I try
> to boot an existing image with just -hda ... the VGA screen just stays
> black while the process runs at 99% CPU. Again with -49 it works fine.
>
>
Yes, 6b8bb99a9cde386d72b4b7c22b92f4bdec333dab in kv
Christoph Hellwig wrote:
> On Sun, Jan 13, 2008 at 01:37:11PM +0200, Uri Lublin wrote:
>
>> Try to build the kernel modules too (remove '--with-patched-kernel' from
>> ./configure arguments ):
>> ./configure --prefix=/opt/kvm --qemu-cc=/usr/bin/gcc-3.4 ; make -C
>> kernel LINUX= sync; make
>>
On Tue, Jan 15, 2008 at 12:56:52PM +0200, Avi Kivity wrote:
> Andi Kleen wrote:
> >FWIW it seems things are broken even without -kernel in -59 too. If I try
> >to boot an existing image with just -hda ... the VGA screen just stays
> >black while the process runs at 99% CPU. Again with -49 it works
Andi Kleen wrote:
> On Tue, Jan 15, 2008 at 12:56:52PM +0200, Avi Kivity wrote:
>
>> Andi Kleen wrote:
>>
>>> FWIW it seems things are broken even without -kernel in -59 too. If I try
>>> to boot an existing image with just -hda ... the VGA screen just stays
>>> black while the process runs
This is a resend of a mail I sent on 01/10/2008. I did not receive any
response, so I assume it was lost.
The patch is really minor, does not break any compatibility (the MSR is
Intel family 13+) and makes Darwin work.
--- old mail ---
This patch adds support for the MSR MSR_IA32_PERF_STATUS. Th
On Mon, Jan 14, 2008 at 12:02:42PM -0800, Christoph Lameter wrote:
> Hmmm... In most of the callsites we hold a writelock on mmap_sem right?
Not in all, like Marcelo pointed out in kvm-devel, so the lowlevel
locking can't relay on the VM locks.
About your request to schedule in the mmu notifier m
On Tue, Jan 15, 2008 at 08:57:45AM +0100, Alexander Graf wrote:
> Dan Kenigsberg wrote:
> > On Mon, Jan 14, 2008 at 02:49:31PM +0100, Alexander Graf wrote:
> >
> >> Hi,
> >>
> >> Currently CPUID function 4 is broken. This function's values rely on the
> >> value of ECX.
> >> To solve the issue c
Liu, Eric E wrote:
> If we use Qcow img to boot SMP guest, windows guest may hang , since
> the vcpu thread which does AIO will wait for the signal SIGUSR2 which
> may be eated by vcpu 0 's thread. So this patch removes SIGUSR2 from
> io_sigset and masks it in vcpu 0's thread, it can let the guest
Carlo Marcelo Arenas Belon wrote:
> This series replaces the current fix for the MMC6 GET CONFIGURATION emulation
> for the IDE CD-ROM with version 2.2 of the same fix which was committed in
> qemu.
>
> PATCH 1/2 : Revert "kvm: qemu: GET_CONFIGURATION fixes to allow OpenSolaris
> CD-ROM access"
>
Christian Ehrhardt wrote:
> Subject: [PATCH][RESEND] fill kvm_callback with arch specific
> dcr_read/dcr_write callbacks v2
> From: Christian Ehrhardt <[EMAIL PROTECTED]>
>
> This Patch adds the callback assignment and handlers for powerpc_dcr_read
> and ppc_dcr_write which are called from libkvm.
Avi Kivity wrote:
> Marcelo Tosatti wrote:
>
>> Hi Avi,
>>
>> On Sun, Jan 13, 2008 at 02:19:29PM +0200, Avi Kivity wrote:
>>
>>
>>> Marcelo Tosatti wrote:
>>>
>>>
The boot TSC sync check is failing on recent Linux SMP guests on TSC
stable hosts.
Andrea Arcangeli wrote:
> On Mon, Jan 14, 2008 at 05:43:58PM +0200, Avi Kivity wrote:
>
>> heavy handed. Maybe it can be fixed in some clever way with rcu or with a
>> rwlock around the memory slot map.
>>
>
> Ok, first the alias looked superflous so I just dropped it (the whole
> point o
Marcelo Tosatti wrote:
> Hi Avi,
>
> On Sun, Jan 13, 2008 at 02:19:29PM +0200, Avi Kivity wrote:
>
>> Marcelo Tosatti wrote:
>>
>>> The boot TSC sync check is failing on recent Linux SMP guests on TSC
>>> stable hosts.
>>>
>>>
>>>
>> What about tsc unstable hosts? If your patch co
Hollis Blanchard wrote:
>> btw, isn't passthrough better handled through the tlb? i.e. actually
>> let the guest access the specially-configured memory? You can have qemu
>> mmap /dev/mem and install it as a memslot, and things should work, no?
>> (well, you might need to set some cachablilit
73 matches
Mail list logo