On Tue, Apr 29, 2008 at 06:12:51PM -0500, Anthony Liguori wrote:
> IIUC PPC correctly, all IO pages have corresponding struct pages. This
> means that get_user_pages() would succeed and you can reference count them?
> In this case, we would never take the VM_PFNMAP path.
get_user_pages only wo
Muli Ben-Yehuda wrote:
> On Tue, Apr 29, 2008 at 02:09:20PM -0500, Anthony Liguori wrote:
>
>> This patch allows VMA's that contain no backing page to be used for guest
>> memory. This is a drop-in replacement for Ben-Ami's first page in his direct
>> mmio series. Here, we continue to allow mm
On Wed, Apr 30, 2008 at 11:59:47AM +0300, Avi Kivity wrote:
> The code is not trying to find a vma for the address, but a vma for the
> address which also has VM_PFNMAP set. The cases for vma not found, or vma
> found, but not VM_PFNMAP, are folded together.
Muli's saying the comparison is rever
Andrea Arcangeli wrote:
> On Wed, Apr 30, 2008 at 11:59:47AM +0300, Avi Kivity wrote:
>
>> The code is not trying to find a vma for the address, but a vma for the
>> address which also has VM_PFNMAP set. The cases for vma not found, or vma
>> found, but not VM_PFNMAP, are folded together.
>>
Christian Borntraeger wrote:
> Am Sonntag, 27. April 2008 schrieb Avi Kivity:
>
>> Carsten Otte (4):
>> s390: KVM preparation: provide hook to enable pgstes in user pagetable
>> KVM: s390: interrupt subsystem, cpu timer, waitpsw
>> KVM: s390: API documentation
>> s390: KV
Bugs item #1953353, was opened at 2008-04-28 13:50
Message generated for change (Comment added) made by ravpl
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1953353&group_id=180599
Please note that this message will contain a full copy of the comment thr
* Christian Borntraeger <[EMAIL PROTECTED]> wrote:
> While it is not a typical case, is there a better way of specifying
> multiple authors to avoid future confusion?
i think the established rule is that there's one Author field per
commit. Multiple authors should either submit a tree with mul
Muli Ben-Yehuda wrote:
>> @@ -544,19 +545,35 @@ pfn_t gfn_to_pfn(struct kvm *kvm, gfn_t gfn)
>> npages = get_user_pages(current, current->mm, addr, 1, 1, 1, page,
>> NULL);
>>
>> -if (npages != 1) {
>> -get_page(bad_page);
>> -return p
David Miller wrote:
> I've created (and tested) all of these lists.
>
>
Thanks. I about a week I'll make the sourceforge lists read-only.
--
Any sufficiently difficult bug is indistinguishable from a feature.
-
This SF.
Jan Kiszka wrote:
> Joerg Roedel wrote:
>
>> The current KVM x86 exception code handles double and triple faults only for
>> page fault exceptions. This patch extends this detection for every exception
>> that gets queued for the guest.
>>
>> Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
>> Cc
On Wed, Apr 30, 2008 at 10:45:12AM +0200, Jan Kiszka wrote:
> Joerg Roedel wrote:
> > The current KVM x86 exception code handles double and triple faults only for
> > page fault exceptions. This patch extends this detection for every exception
> > that gets queued for the guest.
> >
> > Signed-off
I noticed there is a windows PV driver based on virtIO in
http://sourceforge.net/project/showfiles.php?group_id=180599
But when I enable the driver in guest, the guest will hang. I'm using
changeset around April, 18. Since the driver is created in March, I
assume the changeset in Apri should be ok
David S. Ahern wrote:
> Another tidbit for you guys as I make my way through various permutations:
> I installed the RHEL3 hugemem kernel and the guest behavior is *much* better.
> System time still has some regular hiccups that are higher than xen and esx
> (e.g., 1 minute samples out of 5 show sy
In about a week, the various kvm lists will move to vger.kenel.org.
This will improve responsiveness, and reduce spam and advertising.
Please subscribe to the lists you are interested in as soon as
possible. You can subscribe by sending an email to
[EMAIL PROTECTED], with the following lines
Avi Kivity wrote:
> Jan Kiszka wrote:
>> Joerg Roedel wrote:
>>
>>> The current KVM x86 exception code handles double and triple faults
>>> only for
>>> page fault exceptions. This patch extends this detection for every
>>> exception
>>> that gets queued for the guest.
>>>
>>> Signed-off-by: Joer
Avi Kivity wrote:
> Fabian Deutsch wrote:
> > Hey.
> >
> > I've been trying Microsoft Windows 2003 a couple of times. The wiki
> > tells me that "everything" should work okay. It does, when using -smp 1,
> > but gets ugly when using -smp 2 or so.
> >
> > SO might it be useful, to add the column "sm
Jan Kiszka wrote:
>>> Clear the pending original exception when raising a triple fault. This
>>> allows to re-use the vcpu instance, e.g. after a reset which is
>>> typically issued as reaction on the triple fault.
>>>
>>> Signed-off-by: Jan Kiszka <[EMAIL PROTECTED]>
>>>
>>> ---
>>> arch/x86/kvm/
Joerg Roedel wrote:
> The current KVM x86 exception code handles double and triple faults only for
> page fault exceptions. This patch extends this detection for every exception
> that gets queued for the guest.
>
> Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
> Cc: Jan Kiszka <[EMAIL PROTECTED
Minor cleanup I came across while reverting printf instrumentations.
Signed-off-by: Jan Kiszka <[EMAIL PROTECTED]>
---
libkvm/libkvm-x86.c |4 ++--
libkvm/libkvm.c |4 ++--
2 files changed, 4 insertions(+), 4 deletions(-)
Index: b/libkvm/libkvm-x86.c
=
This looks bogus, but it is so far without practical impact (phys_start
is always 0 when we do the calculation).
Signed-off-by: Jan Kiszka <[EMAIL PROTECTED]>
---
libkvm/libkvm.c |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
Index: b/libkvm/libkvm.c
===
Hollis Blanchard wrote:
> Acked-by: Hollis Blanchard <[EMAIL PROTECTED]>
>
> Avi, please apply for 2.6.26.
>
>
Sure thing. Thanks.
--
Any sufficiently difficult bug is indistinguishable from a feature.
-
This SF.net em
Bugs item #1953353, was opened at 2008-04-28 07:50
Message generated for change (Comment added) made by mtosatti
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1953353&group_id=180599
Please note that this message will contain a full copy of the comment
Avi Kivity wrote:
> David S. Ahern wrote:
>> Another tidbit for you guys as I make my way through various
>> permutations:
>> I installed the RHEL3 hugemem kernel and the guest behavior is *much*
>> better.
>> System time still has some regular hiccups that are higher than xen
>> and esx
>> (e.g.,
David S. Ahern wrote:
> Avi Kivity wrote:
>
>> David S. Ahern wrote:
>>
>>> Another tidbit for you guys as I make my way through various
>>> permutations:
>>> I installed the RHEL3 hugemem kernel and the guest behavior is *much*
>>> better.
>>> System time still has some regular hiccups tha
On Wed, Apr 30, 2008 at 07:39:53AM -0600, David S. Ahern wrote:
> Avi Kivity wrote:
> > David S. Ahern wrote:
> >> Another tidbit for you guys as I make my way through various
> >> permutations:
> >> I installed the RHEL3 hugemem kernel and the guest behavior is *much*
> >> better.
> >> System time
Bugs item #1953353, was opened at 2008-04-28 14:50
Message generated for change (Comment added) made by izike
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1953353&group_id=180599
Please note that this message will contain a full copy of the comment thr
Avi Kivity wrote:
> Hollis/Xiantao/Carsten, can you confirm that this approach works for
> you? Carsten, I believe you don't have mmio, but at least this
> shouldn't interfere.
Should work fine on s390 afaics.
-
This SF.net
My neighbor keeps me awake all night with their late night activities
http://www.poieuean.com/
-
This SF.net email is sponsored by the 2008 JavaOne(SM) Conference
Don't miss this year's exciting event. There's still time to
Yes, the 4G/4G patch and the 64G options are both enabled for the hugemem
kernel:
CONFIG_HIGHMEM64G=y
CONFIG_X86_4G=y
Differences between the "standard" kernel and the hugemem kernel:
# diff config-2.4.21-47.ELsmp config-2.4.21-47.ELhugemem
2157,2158c2157,2158
< CONFIG_M686=y
< # CONFIG_MPENTI
Am Sonntag, 27. April 2008 schrieb Avi Kivity:
> Carsten Otte (4):
> s390: KVM preparation: provide hook to enable pgstes in user pagetable
> KVM: s390: interrupt subsystem, cpu timer, waitpsw
> KVM: s390: API documentation
> s390: KVM guest: detect when running on kvm
>
>
On Tuesday 29 April 2008 18:12:51 Anthony Liguori wrote:
> IIUC PPC correctly, all IO pages have corresponding struct pages. This
> means that get_user_pages() would succeed and you can reference count
> them? In this case, we would never take the VM_PFNMAP path.
>
> Is that correct?
I think
Andrea Arcangeli wrote:
> On Tue, Apr 29, 2008 at 06:12:51PM -0500, Anthony Liguori wrote:
>
>> IIUC PPC correctly, all IO pages have corresponding struct pages. This
>> means that get_user_pages() would succeed and you can reference count them?
>> In this case, we would never take the VM_PF
since the pv_apic_ops are only present if CONFIG_X86_LOCAL_APIC is compiled
in, kvmclock failed to build without this option. This patch fixes this
Signed-off-by: Glauber Costa <[EMAIL PROTECTED]>
---
arch/x86/kernel/kvmclock.c |4
1 files changed, 4 insertions(+), 0 deletions(-)
diff -
Bugs item #1952988, was opened at 2008-04-27 15:25
Message generated for change (Comment added) made by carenas
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1952988&group_id=180599
Please note that this message will contain a full copy of the comment t
This patch adds some kvmtrace bits to the generic x86 code
where it is instrumented from SVM.
Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
---
arch/x86/kvm/x86.c | 25 -
1 files changed, 20 insertions(+), 5 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/
This patch adds the missing kvmtrace markers to the svm
module of kvm.
Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
---
arch/x86/kvm/svm.c | 26 +-
1 files changed, 25 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index ca83c8a..d
With an exit handler for NMI intercepts its possible to account them using
kvmtrace.
Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
---
arch/x86/kvm/svm.c |7 ++-
1 files changed, 6 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index ab22615..6dce863
With an exit handler for INTR intercepts its possible to account them using
kvmtrace.
Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
---
arch/x86/kvm/svm.c |8 +++-
1 files changed, 7 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index 6dce863..ca83c
This patch moves the trace entry for APIC accesses from the VMX code to the
generic lapic code. This way APIC accesses from SVM will also be traced.
Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
---
arch/x86/kvm/lapic.c |4
arch/x86/kvm/vmx.c |2 --
2 files changed, 4 insertions(
To distinguish between real page faults and nested page faults they should be
traced as different events. This is implemented by this patch.
Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
---
arch/x86/kvm/svm.c|4
include/asm-x86/kvm.h |1 +
2 files changed, 5 insertions(+), 0 d
This patch adds a format line for TDP page faults to the formats file.
Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]>
---
user/formats |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/user/formats b/user/formats
index 5313a47..c6c49d6 100644
--- a/user/formats
+++ b/user/
This series of patches adds the missing kvmtrace markers to the SVM specific
code paths in KVM. Further it adds a new trace event for TDP page faults.
The diffstat:
arch/x86/kvm/lapic.c |4
arch/x86/kvm/svm.c| 45 ++---
arch/x86/kvm/vmx.c
Avi Kivity wrote:
> Jan Kiszka wrote:
Clear the pending original exception when raising a triple fault. This
allows to re-use the vcpu instance, e.g. after a reset which is
typically issued as reaction on the triple fault.
Signed-off-by: Jan Kiszka <[EMAIL PROTECTED]>
Userland-located ROM memory is not available via kvm->physical_memory +
guest_address. To let kvm_show_code also dump useful information when
some problem in ROM (BIOS...) occurs, this patch first tries to obtain
the memory content via the mmio_read callback - maybe not 100% clean,
but works at lea
The in-kernel PIT emulation ignores pending timers if operating under
mode 4, which for example DragonFlyBSD uses (and Plan9 too, apparently).
Mode 4 seems to be similar to one-shot mode, other than the fact that it
starts counting after the next CLK pulse once programmed, while mode 1
starts cou
Anthony,
The following sequence crashes F9 guests, when using VNC:
# modprobe cirrusfb
# vbetool post
Results in Floating point exception at:
cirrus_do_copy()
{
depth = s->get_bpp((VGAState *)s) / 8
...
sx = (src % (width * depth)) / depth;
...
}
Problem is that ->get_bpp r
Bugs item #1905703, was opened at 2008-03-02 10:49
Message generated for change (Comment added) made by mtosatti
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1905703&group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #1919354, was opened at 2008-03-19 04:18
Message generated for change (Comment added) made by mtosatti
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1919354&group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #1881418, was opened at 2008-01-28 16:55
Message generated for change (Comment added) made by mtosatti
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1881418&group_id=180599
Please note that this message will contain a full copy of the comment
Marcelo Tosatti wrote:
> The in-kernel PIT emulation ignores pending timers if operating under
> mode 4, which for example DragonFlyBSD uses (and Plan9 too, apparently).
>
> Mode 4 seems to be similar to one-shot mode, other than the fact that it
> starts counting after the next CLK pulse once prog
Jan Kiszka wrote:
> Yes, the following still works for me. But I'm not the right person to
> ask if there are obscure cases where you may not want this clearing
> while just editing some registers (I'm thinking of debugger scenarios
> now).
>
>
Applied, as the bug we're fixing is much more like
Jan Kiszka wrote:
> Userland-located ROM memory is not available via kvm->physical_memory +
> guest_address. To let kvm_show_code also dump useful information when
> some problem in ROM (BIOS...) occurs, this patch first tries to obtain
> the memory content via the mmio_read callback - maybe not 10
Bugs item #1905703, was opened at 2008-03-02 15:49
Message generated for change (Comment added) made by jroedel
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1905703&group_id=180599
Please note that this message will contain a full copy of the comment t
Joerg Roedel wrote:
> This series of patches adds the missing kvmtrace markers to the SVM specific
> code paths in KVM. Further it adds a new trace event for TDP page faults.
>
>
Thanks, applied all. Please use git format-patch -n (or format.numbered
= auto) so that patch order is explicit.
Marcelo Tosatti wrote:
> Anthony,
>
> The following sequence crashes F9 guests, when using VNC:
>
> # modprobe cirrusfb
> # vbetool post
>
> Results in Floating point exception at:
>
> cirrus_do_copy()
> {
>
> depth = s->get_bpp((VGAState *)s) / 8
> ...
> sx = (src % (width * depth))
On Sat, Apr 26, 2008 at 10:08 AM, Avi Kivity <[EMAIL PROTECTED]> wrote:
> Marcelo Tosatti wrote:
>
> > On Wed, Apr 23, 2008 at 09:30:06AM +0300, Avi Kivity wrote:
> >
> >
> > >
> > > > as I got no reply, I guess it is a bad setup on my part. If that might
> > > > help, this happenned while I was do
Jan Kiszka wrote:
> Minor cleanup I came across while reverting printf instrumentations.
>
>
Applied, thanks.
--
Any sufficiently difficult bug is indistinguishable from a feature.
-
This SF.net email is sponsored by the
Jiang, Yunhong wrote:
> I noticed there is a windows PV driver based on virtIO in
> http://sourceforge.net/project/showfiles.php?group_id=180599
>
> But when I enable the driver in guest, the guest will hang. I'm using
> changeset around April, 18. Since the driver is created in March, I
> assume t
There is no reason why should i386 and x86_64 code for rdtsc be different.
Unify them.
---
cpu-all.h | 11 +--
1 files changed, 1 insertions(+), 10 deletions(-)
diff --git a/cpu-all.h b/cpu-all.h
index 2a2b197..1c9e2a3 100644
--- a/cpu-all.h
+++ b/cpu-all.h
@@ -930,16 +930,7 @@ static i
In vmx.c:alloc_identity_pagetable() we grab a reference to the EPT identity
page table via gfn_to_page(). We never release this reference though.
This patch releases the reference to this page on VM destruction. I haven't
tested this with EPT.
Signed-off-by: Anthony Liguori <[EMAIL PROTECTED]>
Jerone Young wrote:
> This patch removes static x86 entries and makes things work for multiple
> archs.
>
> Signed-off-by: Jerone Young <[EMAIL PROTECTED]>
>
> diff --git a/kernel/Makefile b/kernel/Makefile
> --- a/kernel/Makefile
> +++ b/kernel/Makefile
> @@ -1,5 +1,10 @@ include ../config.mak
>
Jerone Young wrote:
> 1 file changed, 1 deletion(-)
> qemu/hw/ppc440_bamboo.c |1 -
>
>
> In 2.6.26 wait is now enabled by default. With this the /hypervisor node will
> not be need to be idetified to enable the guest to go into wait state while
> idle.
>
> Signed-off-by: Jerone Young <[EMAIL
This patch allows VMA's that contain no backing page to be used for guest
memory. This is a drop-in replacement for Ben-Ami's first page in his direct
mmio series. Here, we continue to allow mmio pages to be represented in the
rmap.
Since v1, I've taken into account Andrea's suggestions at using
On Wednesday 30 April 2008 15:53:47 Jerone Young wrote:
> 1 file changed, 1 insertion(+), 1 deletion(-)
> configure |2 +-
>
>
> This fixes compilation for cross compilers as many do not create a
${cross_prefix}cc link. But the do a ${cross_prefix}gcc. This is what the
kernel does so this wi
On Wednesday 30 April 2008 15:16:09 Avi Kivity wrote:
> > hack = $(call _hack,$T/$(strip $1))
> > +
> > +ifneq '$(filter $(ARCH_DIR), x86)' ''
> > +HACK_FILES = kvm_main.c \
> > + mmu.c \
> > + vmx.c \
> > + svm.c \
> > + x86.c \
> > + ir
1 file changed, 1 insertion(+), 1 deletion(-)
configure |2 +-
This fixes compilation for cross compilers as many do not create a
${cross_prefix}cc link. But the do a ${cross_prefix}gcc. This is what the
kernel does so this will work for everyone. This breaks some who do not have a
cc link
On Wed, 2008-04-30 at 16:14 -0500, Hollis Blanchard wrote:
> On Wednesday 30 April 2008 15:53:47 Jerone Young wrote:
> > 1 file changed, 1 insertion(+), 1 deletion(-)
> > configure |2 +-
> >
> >
> > This fixes compilation for cross compilers as many do not create a
> ${cross_prefix}cc link.
1 file changed, 23 insertions(+), 13 deletions(-)
kernel/Makefile | 36 +++-
This patch removes static x86 entries and makes things work for multiple archs.
Signed-off-by: Jerone Young <[EMAIL PROTECTED]>
diff --git a/kernel/Makefile b/kernel/Makefile
--- a/kern
Hi ,
Regarding the guest swapping mechanism (host ability to swap out guest
pages),
1) Can the host swap out any page of a guest VM ? (including the guest's
kernel pages)
2) Does the guest know its page has been swapped out or is this transparent
to the guest ? ( I think the guest
wouldn't know
Bugs item #1881418, was opened at 2008-01-28 21:55
Message generated for change (Comment added) made by fishor-flex
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1881418&group_id=180599
Please note that this message will contain a full copy of the comme
Arn wrote:
> Hi ,
>
> Regarding the guest swapping mechanism (host ability to swap out guest
> pages),
>
> 1) Can the host swap out any page of a guest VM ? (including the
> guest's kernel pages)
right now kvm can swap any pages but pages that are mapped in it mmu
cache. (it doesnt matther if i
71 matches
Mail list logo