On Tuesday 06 May 2008 03:06:23 Kay, Allen M wrote:
Kvm kernel changes.
Signed-off-by: Allen M Kay [EMAIL PROTECTED]
--- /dev/null
+++ b/arch/x86/kvm/vtd.c
@@ -0,0 +1,183 @@
+
+#define DEFAULT_DOMAIN_ADDRESS_WIDTH 48
+
+struct dmar_drhd_unit * dmar_find_matched_drhd_unit(struct
On Tuesday 06 May 2008 03:05:30 Kay, Allen M wrote:
Following three patches contains vt-d support for pci passthrough. It
contains diff's base on Amit's 4/22 passthrough tree.
The hardware environment used for this work is an Intel Weybridge system
(Q35). The passthrough device is an E1000
On Friday 02 May 2008 16:05:17 Avi Kivity wrote:
Amit Shah wrote:
+static irqreturn_t
+kvm_pci_pt_dev_intr(int irq, void *dev_id)
+{
+ struct kvm_pci_pt_dev_list *match;
+ struct kvm *kvm = (struct kvm *) dev_id;
+
+ if (!test_bit(irq, pt_irq_handled))
+ return IRQ_NONE
On Tuesday 29 April 2008 21:28:51 Amit Shah wrote:
On Tuesday 29 April 2008 20:14:16 Glauber Costa wrote:
Amit Shah wrote:
+ if (find_pci_pt_dev(vcpu-kvm-arch.pci_pt_dev_head,
+ pci_pt_info, 0, KVM_PT_SOURCE_ASSIGN))
+ r++; /* We have assigned the device
-by: Amit Shah [EMAIL PROTECTED]
---
arch/x86/Kconfig |8 +
arch/x86/kernel/Makefile |1 +
arch/x86/kernel/kvm_pv_dma.c | 391 ++
3 files changed, 400 insertions(+), 0 deletions(-)
create mode 100644 arch/x86/kernel/kvm_pv_dma.c
diff
to the host.
In KVM, with pci passthrough support, we can assign actual devices to the
guest OS which need this functionality.
Signed-off-by: Amit Shah [EMAIL PROTECTED]
---
arch/x86/kernel/pci-dma.c | 11 +++
include/asm-x86/dma-mapping.h |2 ++
2 files changed, 13 insertions(+), 0
On Tuesday 29 April 2008 19:01:32 Andi Kleen wrote:
Amit Shah [EMAIL PROTECTED] writes:
+const struct dma_mapping_ops *orig_dma_ops;
I suspect real dma ops stacking will need some further thought than
your simple hacks
Yes; that's something we're planning to do.
Haven't read further
On Tuesday 29 April 2008 18:44:23 Andi Kleen wrote:
Amit Shah [EMAIL PROTECTED] writes:
diff --git a/arch/x86/kernel/pci-dma.c b/arch/x86/kernel/pci-dma.c
index 388b113..678cafb 100644
--- a/arch/x86/kernel/pci-dma.c
+++ b/arch/x86/kernel/pci-dma.c
@@ -443,6 +443,17
On Tuesday 29 April 2008 20:14:16 Glauber Costa wrote:
Amit Shah wrote:
+static struct kvm_pv_dma_map*
+find_pci_pv_dmap(struct list_head *head, dma_addr_t dma)
+{
might be better to prefix those functions with kvm? Even though they are
static, it seems to be the current practice
* On Sunday 13 Apr 2008 14:06:27 Avi Kivity wrote:
Amit Shah wrote:
Passthrough devices are host machine PCI devices which have
been handed off to the guest. Handle interrupts from these
devices and route them to the appropriate guest irq lines.
The userspace provides us
* On Wednesday 23 Apr 2008 05:20:03 Stuart Sheldon wrote:
I've looked around but can't seem to find these answers.
I'm using KVM to run multiple servers on the same hardware, but it seems
that most of the documentation written is for desktop use.
I'm currently running KVM-66 on a 2.6.24.4
* On Monday 14 Apr 2008 06:01:07 Samuel Masham wrote:
On Sun, Apr 13, 2008 at 9:49 PM, Dor Laor [EMAIL PROTECTED] wrote:
On Thu, 2008-04-10 at 11:48 +0300, Amit Shah wrote:
If kvm uses the in-kernel irqchip, interrupts are routed to
the guest via the kvm module (accompanied kernel
* On Saturday 12 Apr 2008 00:06:32 Andrea Arcangeli wrote:
On Fri, Apr 11, 2008 at 05:43:03PM +0530, Amit Shah wrote:
Hi Andrea,
Did you have to recompile the bios? How did you do that (or did you ask
Avi to
Yes.
generate it?) Do you have a binary of the bios that I can use to test
This patchset introduces PCI passthrough support for KVM.
This has been tested with an Ethernet device. The device is
seen in the guest and interrupts are generated. However, no
data transfer can take place unless pvdma or reserved-ram
is used. The patches for pvdma will be available shortly.
doing the passthrough.
If kvm uses the in-kernel irqchip, interrupts are routed to
the guest via the kvm module (accompanied kernel changes are necessar).
If -no-kvm-irqchip is used, the 'irqhook' module, also included here,
is to be used.
Signed-off-by: Amit Shah [EMAIL PROTECTED]
---
Makefile
, so we have an
additional ioctl that keeps track of those changes in userspace
and notifies us whenever that happens.
It is expected the kernel driver for the passthrough device
is removed before passing it on to the guest.
Signed-off-by: Amit Shah [EMAIL PROTECTED]
---
arch/x86/kvm/lapic.c
Signed-off-by: Amit Shah [EMAIL PROTECTED]
---
virt/kvm/ioapic.c |2 +-
virt/kvm/ioapic.h |1 +
2 files changed, 2 insertions(+), 1 deletions(-)
diff --git a/virt/kvm/ioapic.c b/virt/kvm/ioapic.c
index 4232fd7..c5e776a 100644
--- a/virt/kvm/ioapic.c
+++ b/virt/kvm/ioapic.c
@@ -268,7
This patchset introduces PCI passthrough support for KVM.
This has been tested with an Ethernet device. The device is
seen in the guest and interrupts are generated. However, no
data transfer can take place unless pvdma or reserved-ram
is used. The patches for pvdma will be available shortly.
* On Wednesday 09 Apr 2008 17:41:10 Glauber Costa wrote:
Amit Shah wrote:
* On Tuesday 08 April 2008 22:34:36 Glauber Costa wrote:
Instead of artificially limiting irq numbers, use arch provided NR_IRQS
Signed-off-by: Glauber Costa [EMAIL PROTECTED]
Thanks, applied.
Going forward
* On Tuesday 08 April 2008 22:34:36 Glauber Costa wrote:
Instead of artificially limiting irq numbers, use arch provided NR_IRQS
Signed-off-by: Glauber Costa [EMAIL PROTECTED]
Thanks, applied.
Going forward, we're going to use the in-kernel approach for interrupt
injection (which already has
* On Wednesday 26 March 2008 03:06:19 Glauber Costa wrote:
Hello,
Here there is a series of 20 patches that lays the foundations for
using dma_ops in i386 in the very same way x86_64, as well as many other
architectures already do.
Thanks; Please also see Stephen Tweedie's tree at
earlier; we now trample over the first 0..4
bits.
This fixes the issue; please check for correctness.
From: Amit Shah [EMAIL PROTECTED]
Date: Tue, 18 Mar 2008 18:01:05 +0530
Subject: [PATCH] QEMU/KVM: fix initialization of IO memory regions
Signed-off-by: Amit Shah [EMAIL PROTECTED]
---
qemu/exec.c
* Marcelo Tosatti wrote:
On Tue, Mar 18, 2008 at 06:02:10PM +0530, Amit Shah wrote:
This patch broke -no-kvm-irqchip:
...
Hi Amit,
There is no need to zero io_mem_used since its in the BSS. The loop in
io_mem_init() was meant to allocate the slots from 0 to 4, not free
them.
Of course
by
commit 3a001629eea909b2aa97f001a9db4700f15d986b
Author: Amit Shah [EMAIL PROTECTED]
Date: Thu Feb 28 16:06:15 2008 +0530
KVM: is_long_mode() should check for EFER.LMA
is_long_mode currently checks the LongModeEnable bit in
EFER instead of the LongModeActive bit. This is wrong
On Monday 11 February 2008 12:58:07 Avi Kivity wrote:
Amit Shah wrote:
On Sunday 10 February 2008 17:01:46 Avi Kivity wrote:
Michael Tokarev wrote:
Ok, I finally got it working.
The problem was 32/64 bits issue. I'm so used to 64bits kernel and
32bits userland - not a single thought
Hello Michael,
On Friday 01 February 2008 13:30:03 Michael Tokarev wrote:
Hello! A first-time poster (and user) is here... but not a newbie ;)
Some time ago I tried KVM for the first time, on an AMD X2-64 system
(BE-2400 processor, also tried with other similar processors, like
plain X2-64
On Friday 18 January 2008 13:34:20 Soren Hansen wrote:
On Fri, Jan 18, 2008 at 12:43:51AM +0200, Dor Laor wrote:
I was under the impression that the kernel API should be backwards
compatible, so I consider this a bug. Is there anything I can do to
help debug this issue?
It's a bit odd.
On Friday 18 January 2008 14:44:42 Soren Hansen wrote:
On Fri, Jan 18, 2008 at 02:38:03PM +0530, Amit Shah wrote:
I was under the impression that the kernel API should be backwards
compatible, so I consider this a bug. Is there anything I can do to
help debug this issue?
It's a bit odd
On Friday 18 January 2008 04:13:51 Dor Laor wrote:
On Thu, 2008-01-17 at 18:20 +0100, Soren Hansen wrote:
Hi!
I'm having an issue with GFXboot in Ubuntu. If I try to boot one of our
recent iso images, e.g.
http://cdimage.ubuntu.com/ubuntu-server/daily/current/hardy-server-amd64.
On Saturday 12 January 2008 08:45:29 Will Trives wrote:
Hello,
As per subject the vmmouse driver does not appear to work with any
distro of Linux that uses Xorg 7.3, at least that has been my
experience.
The mouse appears to be jammed over to the right hand side.
Does exporting
$ export
block.
Signed-off-by: Glauber de Oliveira Costa [EMAIL PROTECTED]
Acked-by: Amit Shah [EMAIL PROTECTED]
-
Check out the new SourceForge.net Marketplace.
It's the best place to buy or sell services for
just about anything Open
On Tuesday 08 January 2008 12:12:53 Amit Shah wrote:
On Tuesday 08 January 2008 03:35:48 Dave Hansen wrote:
With kvm-44, I thought my kernel was freezing during boot if I gave it
1G of RAM. But, it boots fine with 512M.
So, I instrumented the kernel, and found out that it is just taking
On Tuesday 08 January 2008 18:31:53 Amit Shah wrote:
On Tuesday 08 January 2008 12:12:53 Amit Shah wrote:
On Tuesday 08 January 2008 03:35:48 Dave Hansen wrote:
With kvm-44, I thought my kernel was freezing during boot if I gave it
1G of RAM. But, it boots fine with 512M.
So, I
On Tuesday 08 January 2008 03:35:48 Dave Hansen wrote:
With kvm-44, I thought my kernel was freezing during boot if I gave it
1G of RAM. But, it boots fine with 512M.
So, I instrumented the kernel, and found out that it is just taking a
long time to memset a 58MB area of memory for
On Thursday 03 January 2008 20:58:17 Jerry Geis wrote:
I dont exactly know what SDL is.
All I know is when I am at my desk everything is working fine...
Then I go home and use vncviewer machine to remote into my desktop.
Everything runs normal of course but when I select my minimized kvm
On Friday 28 December 2007 22:38:38 Jerry Geis wrote:
How do I specify a different screen size for the graphics part?
I want to virtualize XP (which is working) but instead of 1280x1024
I would like to run 1280x800. There is no option on the desktop settings
for that.
Can I force it run in
On Thursday 27 December 2007 13:20:06 Zhang, Xiantao wrote:
It shouldn't have any confilicts, since they belong to different
archs. Currently, you know source code is placed at
arch/{$arch}/kvm, and Makefile and Kconfig aslo there.
So, it doesn't impact any issues, since ia64 and x86_64
On Wednesday 19 December 2007 17:52:01 Zhang, Xiantao wrote:
KVM/IA64 HOWTO
This is the notes about how to enalbe kvm on Itanium series of
processors
suppoting VT. Since fully userspace built is not supported yet, so we
have to
build qemu, and kernel module separately.
The
On Thursday 27 December 2007 08:00:49 Zhang, Xiantao wrote:
4. Insert kvm.ko kvm-intel.ko to kernel.
kvm-intel is the name of the module fox x86-intel. Do we have a
collision here? Or is this supposed to load the x86 one on x86 and
ia64 one on ia64?
OK, I just saw your patches for
On Friday 21 December 2007 13:32:07 Norbert Preining wrote:
Hi Amit,
a new day, a new success ...
Ok, I got it running, no idea why:
- updated the BIOS
- updated to kernel 2.6.24-rc6
- kvm kernel part from 2.6.24-rc6
- kvm user part from Debian sid, i.e. v57
And it worked.
That's great
On Friday 21 December 2007 20:28:23 Zhang, Xiantao wrote:
Hi, Avi
Due to last merge with Qemu upstream, some interfaces are changed, and
leads to build fail
, this patch fixed them.
Xiantao
I've not checked the patch yet; but a curiosity question: Do you also test x86
compiles / builds?
On Friday 21 December 2007 23:38:14 Izik Eidus wrote:
Amit Shah wrote:
On Friday 21 December 2007 20:28:23 Zhang, Xiantao wrote:
Hi, Avi
Due to last merge with Qemu upstream, some interfaces are changed, and
leads to build fail
, this patch fixed them.
Xiantao
I've not checked
On Thursday 13 December 2007 05:09:20 Norbert Preining wrote:
Hi all!
(Please Cc, thanks)
kernel 2.6.24-rc{3,4,5}
kvm user space v55
kvm kernel space v55 or the one from the kernel
Which host is this? Intel or AMD?
I am trying to install a winxp (either plain or sp2) into a kvm:
On Thursday 20 December 2007 18:28:44 Norbert Preining wrote:
Dear Amit,
thanks for the reply!
On Do, 20 Dez 2007, Amit Shah wrote:
kernel 2.6.24-rc{3,4,5}
kvm user space v55
kvm kernel space v55 or the one from the kernel
Which host is this? Intel or AMD?
Host Intel Core2
On Thursday 20 December 2007 22:10:48 Norbert Preining wrote:
Hi Amit,
On Do, 20 Dez 2007, Amit Shah wrote:
I never had a version that worked, so it would be quite hard ...
Oh that is strange. This is the first such report. Do non-windows guests
work fine for you? Is there any BIOS
On Wednesday 19 December 2007 17:48:14 Zhang, Xiantao wrote:
Hi, all
As you know, in the past two months, commnity worked out cross-arch
framework support for kvm. Thank you all for your contributions !
Especially for Avi's quick response in mailing list! !
Currently, following userspace
On Wednesday 19 December 2007 21:02:06 Glauber de Oliveira Costa wrote:
On Dec 19, 2007 12:27 PM, Avi Kivity [EMAIL PROTECTED] wrote:
Ingo Molnar wrote:
* Avi Kivity [EMAIL PROTECTED] wrote:
Avi Kivity wrote:
Testing shows wrmsr and rdtsc function normally.
I'll try pinning the
On Monday 17 December 2007 03:18:55 Peter O'Reilly wrote:
Is there a GUI for managing virtual machine with KVM?
I have tried to get kvm working with this tutorial from the command line,
http://www.michaeldolan.com/1030#comment-10228
...but this is the problem I can't get past,
I added
* Anthony Liguori wrote:
Amit Shah wrote:
* Anthony Liguori wrote:
This patch refactors the current hypercall infrastructure to better
support live migration and SMP. It eliminates the hypercall page by
trapping the UD exception that would occur if you used the wrong
hypercall
* Avi Kivity wrote:
Amit Shah wrote:
* Anthony Liguori wrote:
Amit Shah wrote:
What are you using to issue the hypercall?
+ r = kvm_hypercall1(KVM_PV_PCI_DEVICE, page_gfn);
Setup is done by:
+ if (!kvm_para_available()) {
+ printk
* Anthony Liguori wrote:
This patch refactors the current hypercall infrastructure to better support
live migration and SMP. It eliminates the hypercall page by trapping the
UD exception that would occur if you used the wrong hypercall instruction
for the underlying architecture and replacing
From a60dc9bddf8741743077db07f87dd1cec51bccb5 Mon Sep 17 00:00:00 2001
From: Amit Shah [EMAIL PROTECTED]
Date: Thu, 29 Nov 2007 03:11:15 +0530
Subject: [PATCH] KVM external module: Fix 'make sync'
bash syntax didn't work for me (3.2.25 on Kubuntu)
Signed-off-by: Amit Shah [EMAIL PROTECTED
* Guillaume Thouvenin wrote:
Hello,
CMPS and SCAS instructions accept repeat prefixes F3 and F2. So in
order to emulate those prefixed instructions we need to be able to know
if prefixes are REP/REPE/REPZ or REPNE/REPNZ. Currently kvm doesn't make
this distinction. This patch introduces
* Guillaume Thouvenin wrote:
On Thu, 22 Nov 2007 17:27:55 +0530
Amit Shah [EMAIL PROTECTED] wrote:
Can you just rename this to REP and REPNE?
Yes I can. I send the new patch.
Does this fix the problems you saw with openbsd?
No not yet. It will help to make the difference between REPE
* Avi Kivity wrote:
Carsten Otte wrote:
Hollis Blanchard wrote:
These patches are based on Xiantao's work to create struct kvm_x86.
Patch 1 replaces his KVM Portability split: Splitting kvm structure
(V2), and patches 2 and 3 build on it.
Looks like a clean approach with to to_kvm_x86
* Dan Kenigsberg wrote:
These patches expose host CPU features (that are known to work under
KVM) to guests. It makes a couple of benchmarks run faster, and
generally gives kvm's user better info on its host.
The kernel-space patch adds KVM_GET_SUPPORTED_CPUID ioctl to obtain the
table of
On Tuesday 20 November 2007 15:42:35 Avi Kivity wrote:
Amit Shah wrote:
On Tuesday 20 November 2007 15:17:54 Avi Kivity wrote:
Amit Shah wrote:
On Tuesday 20 November 2007 00:38:05 Markus Rechberger wrote:
this patch discards MSR writes to the Performance Event-Select
Registers
On Tuesday 20 November 2007 15:17:54 Avi Kivity wrote:
Amit Shah wrote:
On Tuesday 20 November 2007 00:38:05 Markus Rechberger wrote:
this patch discards MSR writes to the Performance Event-Select
Registers, this is the first issue why vista seems to fail although now
vista ends up
The clts code didn't use set_cr0 properly, so our lazy FPU
processing wasn't being done by the clts instruction at all.
This fixes all the FPU leaks, so re-enabling lazy FPU
optimization.
Signed-off-by: Amit Shah [EMAIL PROTECTED]
---
drivers/kvm/svm.c |2 --
drivers/kvm/x86.c |3 +--
2
On Tuesday 20 November 2007 00:38:05 Markus Rechberger wrote:
this patch discards MSR writes to the Performance Event-Select
Registers, this is the first issue why vista seems to fail although now
vista ends up in an endless loop a bit later.
Qemu currently also discards those writes.
Won't
On Sunday 18 November 2007 22:58:56 Avi Kivity wrote:
Amit Shah wrote:
diff --git a/drivers/kvm/svm.c b/drivers/kvm/svm.c
index ea2cb83..d7c9b92 100644
--- a/drivers/kvm/svm.c
+++ b/drivers/kvm/svm.c
@@ -1600,11 +1600,11 @@ static void svm_set_cr3(struct kvm_vcpu *vcpu,
unsigned long
From 76204eda7e03035c16702105e78724137ecad24b Mon Sep 17 00:00:00 2001
From: Amit Shah [EMAIL PROTECTED]
Date: Sun, 18 Nov 2007 22:42:47 +0530
Subject: [PATCH] KVM: SVM: Disable Lazy FPU optimization because of
regressions
Host FPU state is leaked into the guest FPU state. This happens
because
From 554315592b05eabf0355ac63145c28e11358af1f Mon Sep 17 00:00:00 2001
From: Amit Shah [EMAIL PROTECTED]
Date: Sun, 18 Nov 2007 00:03:27 +0530
Subject: [PATCH] KVM: Use write_emulated and not write_std, which is not
implemented
... and calling write_emulated should work just as well
in place
Instead of having each architecture do it individually, we
do this in the arch-independent code (just x86 as of now).
Turns out SVM did not do this at all.
Signed-off-by: Amit Shah [EMAIL PROTECTED]
---
drivers/kvm/vmx.c |1 -
drivers/kvm/x86.c |1 +
2 files changed, 1 insertions(+), 1
On Sunday 18 November 2007 23:49:38 Mike Lampard wrote:
This patch didnt resolve the font issues for me, however the other patch
(unload FPU state) did fix it. I didnt run the test app (no compiler on
the (32bit ubuntu) guest atm) but reverting this patch on my tree didnt
appear to adversely
On Saturday 10 November 2007 00:12:41 Glauber de Oliveira Costa wrote:
Hey folks,
Here's a new spin of the pvops64 patch series.
We didn't get that many comments from the last time,
so it should be probably almost ready to get in. Heya!
From the last version, the most notable changes are:
On Monday 12 November 2007 13:42:07 Avi Kivity wrote:
Amit Shah wrote:
On Monday 12 November 2007 12:22:39 Alexey Eremenko wrote:
This is strange, because I have XP on AMD-64 working fine on KVM-51.
A pre-installed VM works just fine. The problem is with the installation.
Does
On Sunday 11 November 2007 22:16:50 Ghiora Drori wrote:
Hi,
I am interested in supporting NVDIA, ATI, Intel and presumably other
display cards when running a windows guest KVM. The idea is to get
Windows XP games to work properly under kvm when being hosted by Linux.
The screen on Linux can
On Monday 12 November 2007 16:20:01 Muli Ben-Yehuda wrote:
On Wed, Nov 07, 2007 at 04:21:04PM +0200, Amit Shah wrote:
We make the dma_mapping_ops structure to point to our structure so
that every DMA access goes through us. (This is the reason this only
works for 64-bit guest. 32-bit guest
On Monday 12 November 2007 16:26:37 Muli Ben-Yehuda wrote:
On Wed, Nov 07, 2007 at 04:21:06PM +0200, Amit Shah wrote:
Of all the DMA calls, only dma_alloc_coherent might not actually
call dma_ops-alloc_coherent. We make sure that gets called if the
device that's being worked on is a PV
On Monday 12 November 2007 19:02:07 Muli Ben-Yehuda wrote:
On Mon, Nov 12, 2007 at 05:26:24PM +0530, Amit Shah wrote:
On Monday 12 November 2007 16:20:01 Muli Ben-Yehuda wrote:
On Wed, Nov 07, 2007 at 04:21:04PM +0200, Amit Shah wrote:
We make the dma_mapping_ops structure to point
On Monday 12 November 2007 21:25:22 Joerg Roedel wrote:
On Wed, Nov 07, 2007 at 04:21:02PM +0200, Amit Shah wrote:
@@ -1649,6 +1913,15 @@ int kvm_emulate_hypercall(struct kvm_vcpu *vcpu)
}
switch (nr) {
+ case KVM_PV_DMA_MAP:
+ ret = pv_map_hypercall(vcpu, a0, a1
On Sunday 11 November 2007 15:50:30 Avi Kivity wrote:
Amit Shah wrote:
On Friday 09 November 2007 22:49:18 Werner Opriel wrote:
Version:
kvm-50 and kvm-51
Problem:
I am not able to install a Win XP SP2 guest.
The Guest always crashes while installing Windows XP devices at T-37
On Monday 12 November 2007 12:22:39 Alexey Eremenko wrote:
This is strange, because I have XP on AMD-64 working fine on KVM-51.
A pre-installed VM works just fine. The problem is with the installation. Does
the installation succeed for you as well with kvm-51?
On Friday 09 November 2007 22:49:18 Werner Opriel wrote:
Version:
kvm-50 and kvm-51
Problem:
I am not able to install a Win XP SP2 guest.
The Guest always crashes while installing Windows XP devices at T-37
minutes with a blue-screen and IRQL_NOT_LES_OR_EQUAL.
This is most likely hidden
We have some structures defined which are going to be
used by userspace for ioctls.
Signed-off-by: Amit Shah [EMAIL PROTECTED]
---
include/linux/kvm_para.h |3 +--
1 files changed, 1 insertions(+), 2 deletions(-)
diff --git a/include/linux/kvm_para.h b/include/linux/kvm_para.h
index e4db25f
on the map request and unpin them on the unmap
operation.
Major tasks still to be done: implement proper locking (get a
vm-lock), we never free some part of memory
Signed-off-by: Amit Shah [EMAIL PROTECTED]
---
drivers/kvm/x86.c | 273
include/asm
Of all the DMA calls, only dma_alloc_coherent might not actually
call dma_ops-alloc_coherent. We make sure that gets called
if the device that's being worked on is a PV device
Signed-off-by: Amit Shah [EMAIL PROTECTED]
---
arch/x86/kernel/pci-dma_64.c | 13 +
1 files changed, 13
With the declaration in libkvm.h this time:
From 8313b87bcab415746e6eed86ac3f5b6c562b9764 Mon Sep 17 00:00:00 2001
From: Amit Shah [EMAIL PROTECTED]
Date: Thu, 8 Nov 2007 00:13:07 +0530
Subject: [PATCH] Add accessor for kvm-vm_fd
Introduce kvm_get_vm_fd to get the VM FD
Signed-off-by: Amit Shah
This patchset is work in progress and is sent out for comments.
Guests within KVM can have paravirtualized DMA access. I've tested
the e1000 driver, and that works fine. A few problems/conditions to
get things to work:
- The pv driver should only be used as a module. If built into the
kernel,
the in-kernel apic.
Signed-off-by: Amit Shah [EMAIL PROTECTED]
---
Makefile | 10 ++-
irqhook/Kbuild |3 +
irqhook/Makefile | 25 ++
irqhook/irqhook_main.c | 217
4 files changed, 251 insertions(+), 4 deletions
, which can be no-op
on a non-pv guest (or on the host).
Signed-off-by: Amit Shah [EMAIL PROTECTED]
---
include/asm-x86/dma-mapping_64.h |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/include/asm-x86/dma-mapping_64.h b/include/asm-x86/dma-mapping_64.h
index ecd0f61
Add Makefile rule for compiling the new file
that we create
Signed-off-by: Amit Shah [EMAIL PROTECTED]
---
drivers/kvm/Makefile |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/drivers/kvm/Makefile b/drivers/kvm/Makefile
index cf18ad4..f492e3e 100644
--- a/drivers/kvm
On Thursday 08 November 2007 01:05:32 Haydn Solomon wrote:
First , thank you for new release of kvm. I have a few problems to
report with kvm-51.
1. When running an exisiting winxp ACPI multiprocessor HAL with -smp 2,
sometimes it will hang on boot.
You mean the guest hangs, right? What's
The host driver is to be removed before doing the passthrough.
Signed-off-by: Amit Shah [EMAIL PROTECTED]
---
qemu/Makefile |6 +-
qemu/Makefile.target |4 +-
qemu/exec.c|1 +
qemu/hw/apic.c |2 +
qemu/hw
Check for CONFIG_VIRTUALIZATION instead of CONFIG_KVM,
since the PV drivers won't depend on CONFIG_KVM and we
still want to be selectable
Signed-off-by: Amit Shah [EMAIL PROTECTED]
---
drivers/Makefile |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/drivers/Makefile b
This is to be enabled on a guest. Currently, only
'module' works; compiling it in freezes at HD bringup
Signed-off-by: Amit Shah [EMAIL PROTECTED]
---
drivers/kvm/Kconfig |8
1 files changed, 8 insertions(+), 0 deletions(-)
diff --git a/drivers/kvm/Kconfig b/drivers/kvm/Kconfig
On Thursday 08 November 2007 11:56:24 Avi Kivity wrote:
Amit Shah wrote:
With the declaration in libkvm.h this time:
From 8313b87bcab415746e6eed86ac3f5b6c562b9764 Mon Sep 17 00:00:00 2001
From: Amit Shah [EMAIL PROTECTED]
Date: Thu, 8 Nov 2007 00:13:07 +0530
Subject: [PATCH] Add
are urging the
people who have done this to provide good patches.
These aren't ready yet for inclusion, we've sent them out to get comments on
the overall solution for PCI passthrough.
On Wed, 2007-11-07 at 21:45 +0200, Amit Shah wrote:
diff --git a/qemu/Makefile b/qemu/Makefile
index
On Sunday 04 November 2007 12:47:32 Avi Kivity wrote:
Amit Shah wrote:
From bfed574c93b36a19e2976ddcaae7939dd6c6fc41 Mon Sep 17 00:00:00 2001
From: Amit Shah [EMAIL PROTECTED]
Date: Sat, 3 Nov 2007 02:38:00 +0530
Subject: [PATCH] KVM: is_long_mode should check for EFER_LMA
From bfed574c93b36a19e2976ddcaae7939dd6c6fc41 Mon Sep 17 00:00:00 2001
From: Amit Shah [EMAIL PROTECTED]
Date: Sat, 3 Nov 2007 02:38:00 +0530
Subject: [PATCH] KVM: is_long_mode should check for EFER_LMA
is_long_mode currently checks the LongModeEnable bit in
EFER instead of the LongModeActive bit
On Monday 15 October 2007 01:54:03 Jan Frey wrote:
Hi,
I intended to use qemu-system-x86_64 with kvm for full virtualization.
My host is
# cat /proc/cpuinfo
processor : 0
vendor_id : AuthenticAMD
cpu family : 15
model : 127
model name : AMD Athlon(tm) 64
This was missed when moving stuff around in fbc4f2e
Fixes Solaris guests and bug #1773613
Signed-off-by: Amit Shah [EMAIL PROTECTED]
---
drivers/kvm/kvm_main.c |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/drivers/kvm/kvm_main.c b/drivers/kvm/kvm_main.c
index f7ff231
On Saturday 18 August 2007 02:42:56 Koen de Jonge wrote:
Hi all,
here is a list of Supported Guests:
http://kvm.qumranet.com/kvmwiki/Guest_Support_Status
The tables are a bit unclear to me, I will explain using the 'Debian
Etch' example.
There's no guideline on what the table should look
On Saturday 11 August 2007 08:48:41 Tony Smolar wrote:
Hi, I was currently using kvm-24, and I decided to try to upgrade to
the latest.
My guest is XP-SP2 Home full edition.When I tried to boot it under
kvm-33, I eventually got a blue screen and a IRQL_NOT_LESS_OR_EQUAL error.
I
On Tuesday 31 July 2007 22:26:28 Dimitry Golubovsky wrote:
I use console redirected to serial port (-append console=ttyS0), and
serial port to stdio (-serial stdio), that is, the terminal window
that started kvm becomes guest console, and qemu console seems to be
unavailable. I disable the SDL
96 matches
Mail list logo