This test mainly tests whether all guest cpu flags are supported by host
machine.
Signed-off-by: sshang
---
client/tests/kvm/tests/cpuflags.py | 80
client/tests/kvm/tests_base.cfg.sample |9 +++-
2 files changed, 88 insertions(+), 1 deletions(-)
cre
Add a kvm subtest format_disk.
This test will simply create a file system on disk, mount it and write a file
with some content to the disk. Check whether the write could be succeeded.
Signed-off-by: sshang
---
client/tests/kvm/tests/format_disk.py | 63
cl
On Thu, Mar 04, 2010 at 12:34:22AM +0100, Jan Kiszka wrote:
> Gleb Natapov wrote:
> > On Mon, Mar 01, 2010 at 06:17:22PM +0100, Jan Kiszka wrote:
> >> As we hard-wire the BSP to CPU 0 anyway and cpuid_apic_id equals
> >> cpu_index, cpu_is_bsp can also be based on the latter directly. This
> >> will
On Thu, Mar 04, 2010 at 01:21:12AM -0300, Marcelo Tosatti wrote:
> The regression seems to be caused by seabios commit d7e998f. Kevin, the
> failure can be seen on the attached screenshot, which happens on the
> first reboot of WinXP 32 installation (after copying files etc).
Sorry - I also notice
On Wed, Mar 3, 2010 at 3:38 PM, Khaled Ibrahim wrote:
>
>
>
>
>> Date: Wed, 3 Mar 2010 15:09:17 -0700
>> Subject: Re: IVSHMEM and limits on shared memory
>> From: c...@cs.ualberta.ca
>> To: kz...@hotmail.com
>> CC: kvm@vger.kernel.org
>>
>> On Wed, Mar 3, 2
On Tue, Mar 02, 2010 at 11:29:10PM -0300, Marcelo Tosatti wrote:
> On Tue, Mar 02, 2010 at 05:31:09PM +0100, Jan Kiszka wrote:
> > Marcelo Tosatti wrote:
> > > On Tue, Mar 02, 2010 at 09:00:04AM +0100, Jan Kiszka wrote:
> > >> Marcelo Tosatti wrote:
> > >>> On Mon, Mar 01, 2010 at 07:10:30PM +0100,
On Wed, 2010-03-03 at 11:15 +0100, Peter Zijlstra wrote:
> On Wed, 2010-03-03 at 17:27 +0800, Zhang, Yanmin wrote:
> > -#ifndef perf_misc_flags
> > -#define perf_misc_flags(regs) (user_mode(regs) ? PERF_RECORD_MISC_USER : \
> > -PERF_RECORD_MISC_KERNEL)
> > -#define
On Wed, 2010-03-03 at 11:13 +0100, Peter Zijlstra wrote:
> On Wed, 2010-03-03 at 17:27 +0800, Zhang, Yanmin wrote:
> > +static inline u64 perf_instruction_pointer(struct pt_regs *regs)
> > +{
> > + u64 ip;
> > + ip = percpu_read(perf_virt_ip.ip);
> > + if (!ip)
> > +
On 03/03/2010 01:12 PM, Joerg Roedel wrote:
Hi,
here are the patches that implement nested paging support for nested
svm. They are somewhat intrusive to the soft-mmu so I post them as RFC
in the first round to get feedback about the general direction of the
changes. Nevertheless I am proud to r
On Tue, Mar 02, 2010 at 10:55:45AM -0600, Brian Jackson wrote:
> On Tuesday 02 March 2010 10:33:19 am Harald Braumann wrote:
> >
> > quite often my Windows guest freezes. The window is just black
> > and it uses 100% CPU.
>
> Have you tried to reproduce without vmware vga? That support was develo
David S. Ahern wrote:
> On 03/03/2010 04:20 PM, Jan Kiszka wrote:
>> David S. Ahern wrote:
>>>
>>>
>>> On 03/03/2010 04:08 PM, Jan Kiszka wrote:
David S. Ahern wrote:
> With latest qemu-kvm.git I am getting a segfault at start:
>
> /tmp/qemu-kvm-test/bin/qemu-system-x86_64 -m 1024
On 03.03.2010, at 20:12, Joerg Roedel wrote:
> Hi,
>
> here are the patches that implement nested paging support for nested
> svm. They are somewhat intrusive to the soft-mmu so I post them as RFC
> in the first round to get feedback about the general direction of the
> changes. Nevertheless I
On 03.03.2010, at 20:12, Joerg Roedel wrote:
> This patch implements the reporting of the nested paging
> feature support to userspace.
>
> Signed-off-by: Joerg Roedel
> ---
> arch/x86/kvm/svm.c | 10 ++
> 1 files changed, 10 insertions(+), 0 deletions(-)
>
> diff --git a/arch/x86/kvm
Gleb Natapov wrote:
> On Mon, Mar 01, 2010 at 06:17:22PM +0100, Jan Kiszka wrote:
>> As we hard-wire the BSP to CPU 0 anyway and cpuid_apic_id equals
>> cpu_index, cpu_is_bsp can also be based on the latter directly. This
>> will help an early user of it: KVM while initializing mp_state.
>>
>> Sign
On 03/03/2010 04:20 PM, Jan Kiszka wrote:
> David S. Ahern wrote:
>>
>>
>>
>> On 03/03/2010 04:08 PM, Jan Kiszka wrote:
>>> David S. Ahern wrote:
With latest qemu-kvm.git I am getting a segfault at start:
/tmp/qemu-kvm-test/bin/qemu-system-x86_64 -m 1024 -smp 2 \
-drive file=
David S. Ahern wrote:
>
>
>
> On 03/03/2010 04:08 PM, Jan Kiszka wrote:
>> David S. Ahern wrote:
>>> With latest qemu-kvm.git I am getting a segfault at start:
>>>
>>> /tmp/qemu-kvm-test/bin/qemu-system-x86_64 -m 1024 -smp 2 \
>>> -drive file=/images/f12-x86_64.img,if=virtio,cache=none,boot=on
Huang Ying wrote:
> MCE registers are saved/load into/from CPUState in
> kvm_arch_save/load_regs. To simulate the MCG_STATUS clearing upon
> reset, MSR_MCG_STATUS is set to 0 for KVM_PUT_RESET_STATE.
>
> v3:
>
> - use msrs[] in kvm_arch_load/save_regs and get_msr_entry directly.
Looks good!
>
On 03/03/2010 04:08 PM, Jan Kiszka wrote:
> David S. Ahern wrote:
>> With latest qemu-kvm.git I am getting a segfault at start:
>>
>> /tmp/qemu-kvm-test/bin/qemu-system-x86_64 -m 1024 -smp 2 \
>> -drive file=/images/f12-x86_64.img,if=virtio,cache=none,boot=on
>>
>> kvm_create_vcpu: Invalid ar
Joerg Roedel wrote:
> Hi,
>
> here are the patches that implement nested paging support for nested
> svm. They are somewhat intrusive to the soft-mmu so I post them as RFC
> in the first round to get feedback about the general direction of the
> changes. Nevertheless I am proud to report that wit
David S. Ahern wrote:
> With latest qemu-kvm.git I am getting a segfault at start:
>
> /tmp/qemu-kvm-test/bin/qemu-system-x86_64 -m 1024 -smp 2 \
> -drive file=/images/f12-x86_64.img,if=virtio,cache=none,boot=on
>
> kvm_create_vcpu: Invalid argument
> Segmentation fault (core dumped)
>
>
> gi
Am 03.03.2010 um 20:15 schrieb Joerg Roedel :
This patch adds code to ask the kernel about the svm
features it supports for its guests and propagates them to
the guest. The new capability is necessary because the old
behavior of the kernel was to just return the host svm
features but every svm-
> Date: Wed, 3 Mar 2010 15:09:17 -0700
> Subject: Re: IVSHMEM and limits on shared memory
> From: c...@cs.ualberta.ca
> To: kz...@hotmail.com
> CC: kvm@vger.kernel.org
>
> On Wed, Mar 3, 2010 at 12:06 AM, Khaled Ibrahim wrote:
>>
>> Hi Cam,
>>
>> I used
On Wed, Mar 3, 2010 at 12:06 AM, Khaled Ibrahim wrote:
>
> Hi Cam,
>
> I used your patches successfully to support shared memory on KVM and
> used the test cases successfully, but qemu-kvm crashes when I increased the
> size of the shared memory. I
> applied the ivshmem patch to qemu-kvm-0.12.3 (
With latest qemu-kvm.git I am getting a segfault at start:
/tmp/qemu-kvm-test/bin/qemu-system-x86_64 -m 1024 -smp 2 \
-drive file=/images/f12-x86_64.img,if=virtio,cache=none,boot=on
kvm_create_vcpu: Invalid argument
Segmentation fault (core dumped)
git bisect points to:
Bisecting: 0 revisio
This patch fixes the propagation of the ext3_features from
the qemu cpu-model to kvm. This is required for the guest to
see the svm flag.
Signed-off-by: Joerg Roedel
---
target-i386/helper.c |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/target-i386/helper.c b/target-i3
This patch adds code to ask the kernel about the svm
features it supports for its guests and propagates them to
the guest. The new capability is necessary because the old
behavior of the kernel was to just return the host svm
features but every svm-feature needs emulation in the nested
svm kernel c
Hi,
this is the small userspace part. They are necessary for the l1 guest to see
the npt feature bit with cpuid.
Please review and give feedback :-)
Thanks,
Joerg
Diffstat:
kvm/include/linux/kvm.h |2 ++
qemu-kvm-x86.c | 15 +--
target-i386/cpu.h |
The walk_addr function checks for !is_long_mode in its 64
bit version. But what is meant here is a check for pae
paging. Change the condition to really check for pae paging
so that it also works with nested nested paging.
Signed-off-by: Joerg Roedel
---
arch/x86/kvm/paging_tmpl.h |4 ++--
1
Some logic of this function is required to build the Nested
Nested Paging context. So factor the required logic into a
seperate function and export it.
Also make the whole init path suitable for more than one mmu
context.
Signed-off-by: Joerg Roedel
---
arch/x86/kvm/mmu.c | 60
This capability shows userspace that is can trust the values
of cpuid[0x800A] that it gets from the kernel. Old
behavior was to just return the host cpuid values which is
broken because all additional svm-features need support in
the svm emulation code.
Signed-off-by: Joerg Roedel
---
arch/x
This patch changes is_rsvd_bits_set() function prototype to
take only a kvm_mmu context instead of a full vcpu.
Signed-off-by: Joerg Roedel
---
arch/x86/kvm/mmu.c |4 ++--
arch/x86/kvm/paging_tmpl.h |3 ++-
2 files changed, 4 insertions(+), 3 deletions(-)
diff --git a/arch/x86/k
This patch adds the get_supported_cpuid callback to
kvm_x86_ops. It will be used in do_cpuid_ent to delegate the
decission about some supported cpuid bits to the
architecture modules.
Signed-off-by: Joerg Roedel
---
arch/x86/include/asm/kvm_host.h |2 ++
arch/x86/kvm/svm.c |
This patch introduces a special set_tdp_cr3 function pointer
in kvm_x86_ops which is only used for tpd enabled mmu
contexts. This allows to remove some hacks from svm code.
Signed-off-by: Joerg Roedel
---
arch/x86/include/asm/kvm_host.h |1 +
arch/x86/kvm/mmu.c |2 +-
arch/x
This patch changes the tdp_enabled flag from its global
meaning to the mmu-context. This is necessary for Nested SVM
with emulation of Nested Paging where we need an extra MMU
context to shadow the Nested Nested Page Table.
Signed-off-by: Joerg Roedel
---
arch/x86/include/asm/kvm_host.h |1 +
This function pointer in the MMU context is required to
implement Nested Nested Paging.
Signed-off-by: Joerg Roedel
---
arch/x86/include/asm/kvm_host.h |1 +
arch/x86/kvm/mmu.c |9 -
arch/x86/kvm/paging_tmpl.h |4 ++--
3 files changed, 11 insertions(+), 3 de
This patch implements logic to make sure that either a
page-fault/page-fault-vmexit or a nested-page-fault-vmexit
is propagated back to the guest.
Signed-off-by: Joerg Roedel
---
arch/x86/kvm/mmu.h |1 +
arch/x86/kvm/paging_tmpl.h |2 ++
arch/x86/kvm/x86.c | 15
This patch adds the helper functions which will be used in
the mmu context for handling nested nested page faults.
Signed-off-by: Joerg Roedel
---
arch/x86/kvm/svm.c | 33 +
1 files changed, 33 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/svm.c b/arc
This is the first patch in the series towards a generic
walk_addr implementation which could walk two-dimensional
page tables in the end. In this first step the walk_addr
function is renamed into walk_addr_generic which takes an
mmu context as an additional parameter.
Signed-off-by: Joerg Roedel
This patch introduces a mmu-callback to translate gpa
addresses in the walk_addr code. This is later used to
translate l2_gpa addresses into l1_gpa addresses.
Signed-off-by: Joerg Roedel
---
arch/x86/include/asm/kvm_host.h |1 +
arch/x86/kvm/mmu.c |7 +++
arch/x86/kvm/pa
This patch adds code to initialize the Nested Nested Paging
MMU context when the L1 guest executes a VMRUN instruction
and has nested paging enabled in its VMCB.
Signed-off-by: Joerg Roedel
---
arch/x86/kvm/mmu.c |1 +
arch/x86/kvm/svm.c | 56 ++-
This patch adds the functions to do a nested l2_gva to
l1_gpa page table walk.
Signed-off-by: Joerg Roedel
---
arch/x86/include/asm/kvm_host.h |3 +++
arch/x86/kvm/mmu.c |8
arch/x86/kvm/paging_tmpl.h | 31 +++
3 files changed, 42
This patch implements the reporting of the nested paging
feature support to userspace.
Signed-off-by: Joerg Roedel
---
arch/x86/kvm/svm.c | 10 ++
1 files changed, 10 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index fe1398e..ce71023 100644
--- a
This patch introduces a second MMU context which will hold
the paging information for the l2 guest.
Signed-off-by: Joerg Roedel
---
arch/x86/include/asm/kvm_host.h |8 ++
arch/x86/kvm/mmu.c | 48 ++-
2 files changed, 55 insertions(+), 1
This patch introduces an inject_page_fault function pointer
into struct kvm_mmu which will be used to inject a page
fault. This will be used later when Nested Nested Paging is
implemented.
Signed-off-by: Joerg Roedel
---
arch/x86/include/asm/kvm_host.h |3 +++
arch/x86/kvm/mmu.c
Hi,
here are the patches that implement nested paging support for nested
svm. They are somewhat intrusive to the soft-mmu so I post them as RFC
in the first round to get feedback about the general direction of the
changes. Nevertheless I am proud to report that with these patches the
famous kerne
This is necessary to implement Nested Nested Paging. As a
side effect this allows some cleanups in the SVM nested
paging code.
Signed-off-by: Joerg Roedel
---
arch/x86/include/asm/kvm_host.h |1 +
arch/x86/kvm/mmu.c |4 +++-
2 files changed, 4 insertions(+), 1 deletions(-)
> Interesting. Since the feature in question is billed first of all a
> performance optimization...
By whom? Although I see some improved performance, I think its real
benefit is improving memory utilization on the guest. Instead of using
75K for an ARP packet, mergeable RX buffers only uses 4K. :
- "Lucas Meneghel Rodrigues" wrote:
> On Tue, 2010-03-02 at 19:30 +0200, Michael Goldish wrote:
> > This patch:
> >
> > - Makes kvm_config use less memory during parsing, by storing config
> data
> > compactly in arrays during parsing, and generating the final dicts
> only when
> > requ
On Mon, Mar 01, 2010 at 06:17:22PM +0100, Jan Kiszka wrote:
> As we hard-wire the BSP to CPU 0 anyway and cpuid_apic_id equals
> cpu_index, cpu_is_bsp can also be based on the latter directly. This
> will help an early user of it: KVM while initializing mp_state.
>
> Signed-off-by: Jan Kiszka
> -
LMSW is present in both group tables. It was marked privileged only in
one of them. Intel analog of VMMCALL is already marked privileged.
Signed-off-by: Gleb Natapov
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index 3d2e115..3af63d2 100644
--- a/arch/x86/kvm/emulate.c
+++ b/arch/
On Wed, 2010-03-03 at 08:55 +, Daniel P. Berrange wrote:
> On Tue, Mar 02, 2010 at 06:57:54PM -0800, Ross Boylan wrote:
> > On Mon, 2010-03-01 at 15:59 -0600, Anthony Liguori wrote:
> > >
> > > > * desktop is 1024 x 720
> > > >
> > >
> > > 1024x768 and this is what the default is today
This patch:
- Makes kvm_config use less memory during parsing,
by storing config data compactly in arrays during
parsing, and generating the final dicts only when
requested.
On my machine this results in 5-10 times less
memory being used (depending on the size of the
final generated l
On Tue, 2010-03-02 at 19:30 +0200, Michael Goldish wrote:
> This patch:
>
> - Makes kvm_config use less memory during parsing, by storing config data
> compactly in arrays during parsing, and generating the final dicts only when
> requested.
> On my machine this results in 5-10 times less me
On 03/01/2010 12:14 PM, Chris Webb wrote:
We've just seen another VNC related qemu-kvm crash, this time an arithmetic
exception at vnc.c:1424 in the newly release qemu-kvm 0.12.3.
[...]
1423 if (vs->absolute) {
1424 kbd_mouse_event(x * 0x7FFF / (ds_get_width(vs->ds) - 1),
Bugs item #2962575, was opened at 2010-03-03 13:20
Message generated for change (Tracker Item Submitted) made by erikvdk
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=2962575&group_id=180599
Please note that this message will contain a full copy of the
Bugs item #2936094, was opened at 2010-01-21 11:07
Message generated for change (Comment added) made by kolobrod
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=2936094&group_id=180599
Please note that this message will contain a full copy of the comment
On Wed, 2010-03-03 at 17:27 +0800, Zhang, Yanmin wrote:
> -#ifndef perf_misc_flags
> -#define perf_misc_flags(regs) (user_mode(regs) ? PERF_RECORD_MISC_USER : \
> -PERF_RECORD_MISC_KERNEL)
> -#define perf_instruction_pointer(regs) instruction_pointer(regs)
> -#endif
On Wed, 2010-03-03 at 17:27 +0800, Zhang, Yanmin wrote:
> +static inline u64 perf_instruction_pointer(struct pt_regs *regs)
> +{
> + u64 ip;
> + ip = percpu_read(perf_virt_ip.ip);
> + if (!ip)
> + ip = instruction_pointer(regs);
> + else
> + perf_
On Wed, Mar 03, 2010 at 12:54:25AM -0800, David Stevens wrote:
> "Michael S. Tsirkin" wrote on 03/02/2010 11:54:32 PM:
>
> > On Tue, Mar 02, 2010 at 04:20:03PM -0800, David Stevens wrote:
> > > These patches add support for mergeable receive buffers to
> > > vhost-net, allowing it to use multiple
On Wed, 2010-03-03 at 11:32 +0800, Zhang, Yanmin wrote:
> On Tue, 2010-03-02 at 10:36 +0100, Ingo Molnar wrote:
> > * Zhang, Yanmin wrote:
> >
> > > On Fri, 2010-02-26 at 10:17 +0100, Ingo Molnar wrote:
> >
> > > > My suggestion, as always, would be to start very simple and very
> > > > minimal
On Tue, Mar 02, 2010 at 06:57:54PM -0800, Ross Boylan wrote:
> On Mon, 2010-03-01 at 15:59 -0600, Anthony Liguori wrote:
> >
> > > * desktop is 1024 x 720
> > >
> >
> > 1024x768 and this is what the default is today anyway.
> That was not my experience, as reported in my post a few days ago
"Michael S. Tsirkin" wrote on 03/02/2010 11:54:32 PM:
> On Tue, Mar 02, 2010 at 04:20:03PM -0800, David Stevens wrote:
> > These patches add support for mergeable receive buffers to
> > vhost-net, allowing it to use multiple virtio buffer heads for a
single
> > receive packet.
> >
MCE registers are saved/load into/from CPUState in
kvm_arch_save/load_regs. To simulate the MCG_STATUS clearing upon
reset, MSR_MCG_STATUS is set to 0 for KVM_PUT_RESET_STATE.
v3:
- use msrs[] in kvm_arch_load/save_regs and get_msr_entry directly.
v2:
- Rebased on new CPU registers save/load
63 matches
Mail list logo