tis 2008-09-09 klockan 17:39 -0400 skrev Jerry Geis:
I am looking for information on running
linux as host on /dev/sdb1 and vista as a guest on physical /dev/sda1
I dual boot at the moment however if possible I'd like to run vista
under linux...
I didnt find anything in the FAQ.
That
Anthony Liguori wrote:
Live migration happens in the background, but it is useful to make the monitor
command appear as if it's blocking. This allows a management tool to
immediately know when the live migration has completed without having to poll
the migration status.
This patch allows the
On Mon, Sep 08, 2008 at 11:54:01PM +0400, Igor Kovalenko wrote:
Hi Igor,
I'm using bridged TAP device. Running ethtool -S eth0 (when it's still working)
shows increasing number of rx_err (rx_fifo is also increasing, dunno what that
means).
tx_ok, rx_ok are also increasing of course. Then when
iAnthony Liguori wrote:
The current savevm/loadvm protocol has some draw backs. It does not support
the ability to do progressive saving which means it cannot be used for live
checkpointing or migration. The sections sizes are 32-bit integers which
means that it will not function when using
Mohammed Gamal wrote:
SrcAcc would remove the need for this change.
Stupid question: What does Acc stand for? :)
Accumulator (al/ax/eax/rax). In the good old days cpus would have only
one register that was able to fully participate in arithmetic
operations, typically called A
On Monday, September 01, 2008 11:42 PM, Alex Chiang wrote:
To: Zhao, Yu
Cc: Jesse Barnes; [EMAIL PROTECTED]; Randy Dunlap; Greg KH; Grant
Grundler; Matthew Wilcox; [EMAIL PROTECTED]; kvm@vger.kernel.org;
[EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: [PATCH 4/4 v2] PCI: document the change
*
On Tuesday, September 02, 2008 12:16 AM, Alex Chiang wrote:
* Zhao, Yu [EMAIL PROTECTED]:
Some basic changes to allocation bus range, MMIO resource for SR-IOV device.
This following comment is a bit confusing:
And add new sysfs entry to hotplug core to pass parameter to a
slot, which will be
On Tue, Sep 09, 2008 at 02:49:54PM -0500, Anthony Liguori wrote:
Live migration happens in the background, but it is useful to make the monitor
command appear as if it's blocking. This allows a management tool to
immediately know when the live migration has completed without having to poll
On Tuesday 09 September 2008 22:36:22 Avi Kivity wrote:
Avi Kivity wrote:
This appears to be a new feature? My documentation (a bit old)
doesn't show it. If so, we need a check to see that it is available.
The check is actually there.
If the feature is present, we need to expose it via
Daniel P. Berrange wrote:
This means that migration is no longer transparent. While migration is
going on, you can't change the cdrom media, look at cpu registers, or do
anything that requires the monitor.
Changing cdrom media while in the middle of migration sounds like a rather
On Wed, Sep 10, 2008 at 02:11:56PM +0300, Avi Kivity wrote:
Daniel P. Berrange wrote:
This means that migration is no longer transparent. While migration is
going on, you can't change the cdrom media, look at cpu registers, or do
anything that requires the monitor.
Changing cdrom
Avi Kivity wrote:
Marcelo Tosatti wrote:
Offline or uninitialized vcpu's can be executed if requested to perform
userspace work.
Follow Avi's suggestion to handle halted vcpu's in the main loop,
simplifying kvm_emulate_halt(). Introduce a new vcpu-requests bit to
indicate events that promote
Avi Kivity wrote:
Anthony Liguori wrote:
Live migration happens in the background, but it is useful to make
the monitor
command appear as if it's blocking. This allows a management tool to
immediately know when the live migration has completed without having
to poll
the migration status.
Avi Kivity wrote:
Anthony Liguori wrote:
This patch replaces the static memory savevm/loadvm handler with a
live one.
This handler is used even if performing a non-live migration.
The key difference between this handler and the previous is that each
page is
prefixed with the address of the
Daniel P. Berrange wrote:
On Tue, Sep 09, 2008 at 02:49:54PM -0500, Anthony Liguori wrote:
Live migration happens in the background, but it is useful to make the monitor
command appear as if it's blocking. This allows a management tool to
immediately know when the live migration has
Anthony Liguori wrote:
snip
void qemu_fflush(QEMUFile *f)
{
-if (!f-is_writable)
+if (!f-put_buffer)
return;
+
if (f-buf_index 0) {
-if (f-is_file) {
-fseek(f-outfile, f-buf_offset, SEEK_SET);
-fwrite(f-buf, 1, f-buf_index,
Anthony Liguori wrote:
This patch adds a bdrv_flush_all() function. It's necessary to ensure that
all
IO operations have been flushed to disk before completely a live migration.
N.B. we don't actually use this now. We really should flush the block drivers
using an live savevm callback to
Chris Lalancette wrote:
Anthony Liguori wrote:
+static int announce_self_create(uint8_t *buf,
+uint8_t *mac_addr)
+{
+uint32_t magic = EXPERIMENTAL_MAGIC;
+uint16_t proto = htons(ETH_P_EXPERIMENTAL);
+
+/* FIXME: should we send a different packet (arp/rarp/ping)? */
+
+
First, I'd suggest changing the name of the init script from kvm to
kvmctl. On some platforms, installing the kvm package will include a
kvm init script which loads the modules.
I've also been working on an init script, based off some other efforts
that I've seen. It is written in python.
Ballooning is finally enabled in kvm-75. You will need a 2.6.27+ host
for ballooning to work properly.
Changes from kvm-74:
- add 1280x768 std-vga resolution
- ballooning (Anthony Liguori)
- requires 2.6.27+ host to work correctly
- fix bad memory sizing on ia64 (Xiantao Zhang)
- restore
On Tue, Sep 9, 2008 at 4:49 PM, Anthony Liguori [EMAIL PROTECTED] wrote:
To support live migration, we override QEMUFile so that instead of writing to
disk, the save/restore state happens over a network connection.
This patch makes QEMUFile read/write operations function pointers so that we
On Wed, Sep 10, 2008 at 10:26 AM, Chris Lalancette [EMAIL PROTECTED] wrote:
Anthony Liguori wrote:
This patch adds a bdrv_flush_all() function. It's necessary to ensure that
all
IO operations have been flushed to disk before completely a live migration.
N.B. we don't actually use this now.
On Tue, Sep 9, 2008 at 4:49 PM, Anthony Liguori [EMAIL PROTECTED] wrote:
This patch adds a dirty tracking bit for live migration. We use 0x08 because
kqemu uses 0x04.
For which purpose, and where is it? I think it deserves at least a
comment on the source itself for future generations.
Glauber Costa wrote:
On Tue, Sep 9, 2008 at 4:49 PM, Anthony Liguori [EMAIL PROTECTED] wrote:
This patch adds a dirty tracking bit for live migration. We use 0x08 because
kqemu uses 0x04.
For which purpose, and where is it? I think it deserves at least a
comment on the source itself
Laurent Vivier wrote:
int err;
+ preempt_enable();
+ local_irq_enable();
+
while (!guest_state_valid(vcpu)) {
err = emulate_instruction(vcpu, kvm_run, 0, 0, 0);
@@ -2932,6 +2935,9 @@ static void handle_invalid_guest_state(struct kvm_vcpu *vcpu,
On Wed, Sep 10, 2008 at 11:56 AM, Anthony Liguori [EMAIL PROTECTED] wrote:
Glauber Costa wrote:
On Tue, Sep 9, 2008 at 4:49 PM, Anthony Liguori [EMAIL PROTECTED]
wrote:
This patch adds a dirty tracking bit for live migration. We use 0x08
because
kqemu uses 0x04.
For which purpose, and
Zhang, Xiantao wrote:
Resend.
Avi,
Please help to apply it, Thanks!
Xiantao
(sorry for the late review)
Since this module will be reloated to an isolated address
space from host side, so kvm-intel can't call printk of host
kernel. This patch implements the printk function for
Glauber Costa wrote:
On Wed, Sep 10, 2008 at 10:26 AM, Chris Lalancette [EMAIL PROTECTED] wrote:
Anthony Liguori wrote:
This patch adds a bdrv_flush_all() function. It's necessary to ensure that all
IO operations have been flushed to disk before completely a live migration.
N.B. we
Liu Yu wrote:
Since virtio-blk in kernel has already changed, qemu needs to be updated.
see http://thread.gmane.org/gmane.linux.kernel.virtualization/5776/focus=580
Only tested it on branch kvm-70rc1 for e500/powerpc platform.
Applied, thanks.
--
error compiling committee.c: too many
Mohammed Gamal wrote:
Add call near absolute instruction
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at
On Wed, Sep 10, 2008 at 12:19 PM, Anthony Liguori [EMAIL PROTECTED] wrote:
Glauber Costa wrote:
On Wed, Sep 10, 2008 at 10:26 AM, Chris Lalancette [EMAIL PROTECTED]
wrote:
Anthony Liguori wrote:
This patch adds a bdrv_flush_all() function. It's necessary to ensure
that all
IO
Daniel P. Berrange wrote:
Or rather, such state should be part of the migration. There's the
question of whether to transform the path on the target, but which
media is in the drive is part of the hardware state.
(logically we would copy all of the data of all block devices, but
that's
Anthony Liguori wrote:
I'm actually liking bdrv_flush_all() less and less. If there are any
outstanding IO requests, it will increase the down time associated
with live migration. I think we definitely need to add a live save
handler that waits until there are no outstanding IO requests to
Avi Kivity wrote:
Daniel P. Berrange wrote:
Or rather, such state should be part of the migration. There's the
question of whether to transform the path on the target, but which
media is in the drive is part of the hardware state.
(logically we would copy all of the data of all block
This patch refactors the AIO layer to allow multiple AIO implementations. It's
only possible because of the recent signalfd() patch.
Right now, the AIO infrastructure is pretty specific to the block raw backend.
For other block devices to implement AIO, the qemu_aio_wait function must
support
Amit Shah wrote:
From: Kay, Allen M [EMAIL PROTECTED]
This patch extends the VT-d driver to support KVM
[Ben: fixed memory pinning]
Signed-off-by: Kay, Allen M [EMAIL PROTECTED]
Signed-off-by: Weidong Han [EMAIL PROTECTED]
Signed-off-by: Ben-Ami Yassour [EMAIL PROTECTED]
Signed-off-by: Amit
Avi Kivity wrote:
(logically we would copy all of the data of all block devices, but
that's not very practical, so we assume shared storage).
Speaking of that, if the guest RAM were a memory-mapped file, couldn't
that use shared storage too?
You'd have to be careful: it would need a
On 9/9/08, Anthony Liguori [EMAIL PROTECTED] wrote:
This patch introduces a tcp protocol for live migration. It can be used as
follows:
qemu-system-x86_64 -hda ~/images/linux-test.img -monitor stdio
vm runs for a while
(qemu) migrate tcp:localhost:1025
On the same system:
Blue Swirl wrote:
On 9/9/08, Anthony Liguori [EMAIL PROTECTED] wrote:
This patch introduces a tcp protocol for live migration. It can be used as
follows:
qemu-system-x86_64 -hda ~/images/linux-test.img -monitor stdio
vm runs for a while
(qemu) migrate tcp:localhost:1025
On the same
Farkas Levente wrote:
Avi Kivity wrote:
Farkas Levente wrote:
ok this last one was my fault:-(
but i retest is again.
- kvm-74 with kmod-kvm-74 not working
- kvm-71 with kmod-kvm-74 working
any progress with this?
anyone can test it with a simple minimal mandrake-10 install. after the
On Mon, 2008-08-25 at 22:12 +0930, Mark Pulford wrote:
Fix COMPAT_csum_offset #else/#endif block in virtio_net.c. The #endif
was being output 1 line too early.
Signed-off-by: Mark Pulford [EMAIL PROTECTED]
diff --git a/hack-module.awk b/hack-module.awk
index a3275fa..7cb9381 100644
---
From: Joerg Roedel [EMAIL PROTECTED]
Signed-off-by: Joerg Roedel [EMAIL PROTECTED]
---
MAINTAINERS |7 +++
1 files changed, 7 insertions(+), 0 deletions(-)
diff --git a/MAINTAINERS b/MAINTAINERS
index af27945..228e6d5 100644
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -2414,6 +2414,13 @@ L:
On Wednesday, September 10, 2008 8:53 am Avi Kivity wrote:
Amit Shah wrote:
From: Kay, Allen M [EMAIL PROTECTED]
This patch extends the VT-d driver to support KVM
[Ben: fixed memory pinning]
Signed-off-by: Kay, Allen M [EMAIL PROTECTED]
Signed-off-by: Weidong Han [EMAIL PROTECTED]
On Wed, Sep 10, 2008 at 03:04:10PM +0300, Avi Kivity wrote:
Avi Kivity wrote:
Marcelo Tosatti wrote:
Offline or uninitialized vcpu's can be executed if requested to perform
userspace work.
Follow Avi's suggestion to handle halted vcpu's in the main loop,
simplifying kvm_emulate_halt().
Marcelo Tosatti wrote:
Actually it does reproduce. If you reboot twice, the second reboot will
hang during reset (with cs:ip = f000:fff0). Plain Windows XP.
OK, easily reproducible by adding a sleep at the start of
qemu_kvm_system_reset.
The problem is that the vcpu HLT's between
On Wed, 2008-09-10 at 11:11 -0700, Jesse Barnes wrote:
I assume the KVM bits depend on this patch. I can take it (after the next
spin) unless David already has his IOMMU tree set up, in which case he should
probably apply them.
I haven't -- I hadn't actually got any further muttering to you
On Fri, Sep 05, 2008 at 09:51:18AM +0200, Alexander Graf wrote:
This patch implements the GIF flag and the clgi and stgi instructions that
set this flag. Only if the flag is set (default), interrupts can be received
by
the CPU.
To keep the information about that somewhere, this patch adds
On Fri, Sep 05, 2008 at 09:51:23AM +0200, Alexander Graf wrote:
This adds the #VMEXIT intercept, so we return to the level 1 guest
when something happens in the level 2 guest that should return to
the level 1 guest.
v2 implements HIF handling and cleans up exception interception
Glauber Costa wrote:
From: Glauber Costa [EMAIL PROTECTED]
kvm_cpu_register_physical_memory() is its only user. Remove it.
Signed-off-by: Glauber Costa [EMAIL PROTECTED]
---
qemu/qemu-kvm.c | 52 +---
1 files changed, 21 insertions(+),
From: Glauber Costa [EMAIL PROTECTED]
Signed-off-by: Glauber Costa [EMAIL PROTECTED]
---
qemu/hw/pc.c | 19 ++-
1 files changed, 2 insertions(+), 17 deletions(-)
diff --git a/qemu/hw/pc.c b/qemu/hw/pc.c
index 026e96d..8a50096 100644
--- a/qemu/hw/pc.c
+++ b/qemu/hw/pc.c
@@
From: Glauber Costa [EMAIL PROTECTED]
Signed-off-by: Glauber Costa [EMAIL PROTECTED]
---
qemu/hw/ipf.c | 27 ++-
1 files changed, 6 insertions(+), 21 deletions(-)
diff --git a/qemu/hw/ipf.c b/qemu/hw/ipf.c
index 2f7054c..d70af90 100644
--- a/qemu/hw/ipf.c
+++
From: Glauber Costa [EMAIL PROTECTED]
kvm_destroy_userspace_phys_mem() and kvm_destroy_phys_mem()
can be merged into a single function, now that kernel allocation
is no more.
Signed-off-by: Glauber Costa [EMAIL PROTECTED]
---
libkvm/libkvm.c | 45 +
From: Glauber Costa [EMAIL PROTECTED]
Change its name to kvm_register_phys_mem().
Signed-off-by: Glauber Costa [EMAIL PROTECTED]
---
libkvm/libkvm.c |2 +-
libkvm/libkvm.h |2 +-
qemu/qemu-kvm.c |4 ++--
3 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/libkvm/libkvm.c
From: Glauber Costa [EMAIL PROTECTED]
It is just kvm_create_phys_mem() right now.
Signed-off-by: Glauber Costa [EMAIL PROTECTED]
---
libkvm/libkvm.c | 15 ---
1 files changed, 4 insertions(+), 11 deletions(-)
diff --git a/libkvm/libkvm.c b/libkvm/libkvm.c
index 5b48240..5d42b43
From: Glauber Costa [EMAIL PROTECTED]
Wipe out create_kernel_phys_mem(), and all of its users.
Signed-off-by: Glauber Costa [EMAIL PROTECTED]
---
libkvm/kvm-common.h |3 ---
libkvm/libkvm-ia64.c|6 --
libkvm/libkvm-powerpc.c |7 ---
libkvm/libkvm-s390.c|7
From: Glauber Costa [EMAIL PROTECTED]
kvm_qemu_create_context() will fail if we don't have
userspace memory capability, so no need to check it here.
Signed-off-by: Glauber Costa [EMAIL PROTECTED]
---
qemu/vl.c | 19 +--
1 files changed, 5 insertions(+), 14 deletions(-)
diff
From: Glauber Costa [EMAIL PROTECTED]
All allocations are user now. So we don't need this field
anymore.
Signed-off-by: Glauber Costa [EMAIL PROTECTED]
---
libkvm/kvm-common.h |2 +-
libkvm/libkvm.c | 39 +++
2 files changed, 16 insertions(+), 25
From: Glauber Costa [EMAIL PROTECTED]
kvm_cpu_register_physical_memory() is its only user. Remove it.
Signed-off-by: Glauber Costa [EMAIL PROTECTED]
---
qemu/qemu-kvm.c | 52 +---
1 files changed, 21 insertions(+), 31 deletions(-)
diff --git
From: Glauber Costa [EMAIL PROTECTED]
kvm_arch_create_default_phys_mem and kvm_alloc_kernel_memory
are legacy. Remove them, and their callers. The whole removal
will be split for bisectability. These ones goes first because they are
only called at initialization
Signed-off-by: Glauber Costa
On Wed, Sep 10, 2008 at 09:23:18PM +0200, Jan Kiszka wrote:
Glauber Costa wrote:
From: Glauber Costa [EMAIL PROTECTED]
kvm_cpu_register_physical_memory() is its only user. Remove it.
Signed-off-by: Glauber Costa [EMAIL PROTECTED]
---
qemu/qemu-kvm.c | 52
On Wed, Sep 10, 2008 at 09:42:05PM +0300, Avi Kivity wrote:
Marcelo Tosatti wrote:
Actually it does reproduce. If you reboot twice, the second reboot will
hang during reset (with cs:ip = f000:fff0). Plain Windows XP.
OK, easily reproducible by adding a sleep at the start of
Glauber Costa wrote:
On Wed, Sep 10, 2008 at 09:23:18PM +0200, Jan Kiszka wrote:
Glauber Costa wrote:
From: Glauber Costa [EMAIL PROTECTED]
kvm_cpu_register_physical_memory() is its only user. Remove it.
Signed-off-by: Glauber Costa [EMAIL PROTECTED]
---
qemu/qemu-kvm.c | 52
On Wed, Sep 10, 2008 at 03:48:04PM +0800, Zhao, Yu wrote:
I agree with this improvement to the help text. But a further question
is whether ARI even merits its own user-visible config option. Is it
worth having yet another choice for users? When would someone want ARI
but not SR-IOV?
ARI
VMX initializes the TSC offset for each vcpu at different times, and
also reinitializes it for vcpus other than 0 on APIC SIPI message.
This bug causes the TSC's to appear unsynchronized in the guest, even if
the host is good.
Older Linux kernels don't handle the situation very well, so
Sorry for that, seems like there where some instructions missing.
Since we did not (yet soon) sign the drivers you need to install a
certificate workaround manually:
There are 2 things to do on 64-bit before installation.
1. Install certificate using installcertificate.bat
2. If Test mode
Bugs item #2104487, was opened at 2008-09-10 18:07
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2104487group_id=180599
Please note that this message will contain a full copy of
Bugs item #2104495, was opened at 2008-09-10 18:12
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2104495group_id=180599
Please note that this message will contain a full copy of
Bugs item #2104487, was opened at 2008-09-10 18:07
Message generated for change (Comment added) made by sh0nx
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2104487group_id=180599
Please note that this message will contain a full copy of the comment
On Wed, Sep 10, 2008 at 05:58:42PM -0300, Marcelo Tosatti wrote:
VMX initializes the TSC offset for each vcpu at different times, and
also reinitializes it for vcpus other than 0 on APIC SIPI message.
This bug causes the TSC's to appear unsynchronized in the guest, even if
the host is
* Zhao, Yu [EMAIL PROTECTED]:
It can be PCI_BRIDGE_RESOURCES, because there may be some
non-standard resources following PCI_ROM_RESOURCE and before
PCI_BRIDGE_RESOURCES.
For example, a standard PCI device has following resources:
0 - 5 BARs
6 ROM
7 - 10
Avi Kivity wrote:
Zhang, Xiantao wrote:
Resend.
Avi,
Please help to apply it, Thanks!
Xiantao
(sorry for the late review)
Since this module will be reloated to an isolated address
space from host side, so kvm-intel can't call printk of host
kernel. This patch implements the
machine specs:
Compaq F572US
AMD Athlon 64 X2 TK-53 (Dual Core) (had svm flag)
1024MB of RAM
I am running Xubuntu 8.04 LTS (Hardy)
I have tried both kvm-74 and kvm-75
With 74 anytime I boot using:
qemu-system-x86_64 -hda /var/lib/kvm/efx2blogs -cdrom
/home/utahcon/ubuntu-8.04-server-i386.iso
Hi Marcelo:
Dramatic improvement. The following is an example with kvm-75 and this
patch. Without cpu affinity from a kvm perspective (vcpu-to-pcpu):
cpu 0: 1221107886.020298
cpu 1: 1221107886.020290 *
cpu 2: 1221107886.020555
cpu 3: 1221107886.020549 *
cpu 0: 1221107887.030244
cpu 1:
73 matches
Mail list logo