On Wed, 2009-05-13 at 21:57 +, Arnd Bergmann wrote:
> On Wednesday 13 May 2009 08:32:21 Mark McLoughlin wrote:
> > Currently we only include $(KERNELDIR)/include in CFLAGS,
> > but we also have $(KERNELDIR)/arch/$(arch)/include or else
> > we'll get mis-matched headers.
> >
>
> I think this i
Arnd Bergmann wrote:
On Wednesday 13 May 2009 08:32:21 Mark McLoughlin wrote:
Currently we only include $(KERNELDIR)/include in CFLAGS,
but we also have $(KERNELDIR)/arch/$(arch)/include or else
we'll get mis-matched headers.
I think this is fundamentally wrong. User files should neve
- "jason wang" wrote:
> sudhir kumar 写道:
> > Hi Uri/Lucas,
> >
> > Do you have any plans for enhancing kvm-autotest?
> > I was looking mainly on the following 2 aspects:
> >
> > (1).
> > we have standalone migration only. Is there any plans of enhancing
> > kvm-autotest so that we can trigge
Ross Boylan wrote:
Thanks for all the info. I have one follow up.
On Wed, 2009-05-13 at 10:07 +0300, Avi Kivity wrote:
As I install software onto a system I want to preserve its
state--just
the disk state---at various points so I can go back. What is the
best
way
Dong, Eddie wrote:
OK.
Also back to Gleb's question, the reason I want to do that is to simplify event
generation mechanism in current KVM.
Today KVM use additional layer of exception/nmi/interrupt such as
vcpu.arch.exception.pending, vcpu->arch.interrupt.pending &
vcpu->arch.nmi_injected.
All
Mark McLoughlin wrote:
- There will be no stable releases, as such, of the kernel module.
You should use upstream linux releases instead - e.g. the latest
stable release is 2.6.29.2
Actually, I do plan to release kvm-kmod-2.6.30 (and kvm-kmod-2.6.30.x).
--
error compiling commit
Gregory Haskins wrote:
KVM provides a complete virtual system environment for guests, including
support for injecting interrupts modeled after the real exception/interrupt
facilities present on the native platform (such as the IDT on x86).
Virtual interrupts can come from a variety of sources (em
On Wed, May 13, 2009 at 11:30 PM, Michael Goldish wrote:
>
> - "sudhir kumar" wrote:
>
>> Hi Uri/Lucas,
>>
>> Do you have any plans for enhancing kvm-autotest?
>> I was looking mainly on the following 2 aspects:
>>
>> (1).
>> we have standalone migration only. Is there any plans of enhancing
I had a similar problem some weeks ago. Finally I found out that my VM
running WinXP was working on a non-acpi system (maybe I started kvm
with -no-acpi option during the installation). In the Device Manager
there has to be the entry Computer->"ACPI Multiprocessor PC".
Otherwise the VM produced 100
On Thu, May 14, 2009 at 12:22 PM, jason wang wrote:
> sudhir kumar 写道:
>>
>> Hi Uri/Lucas,
>>
>> Do you have any plans for enhancing kvm-autotest?
>> I was looking mainly on the following 2 aspects:
>>
>> (1).
>> we have standalone migration only. Is there any plans of enhancing
>> kvm-autotest so
Hi Jason,
We already have patches that implement similar functionality here in
TLV, as mentioned in the to-do list (item #4 under 'Framework').
They're not yet committed upstream because they're still quite fresh.
Still, your patch looks good and is quite similar to mine. The main
difference is t
- "sudhir kumar" wrote:
> On Thu, May 14, 2009 at 12:22 PM, jason wang
> wrote:
> > sudhir kumar 写道:
> >>
> >> Hi Uri/Lucas,
> >>
> >> Do you have any plans for enhancing kvm-autotest?
> >> I was looking mainly on the following 2 aspects:
> >>
> >> (1).
> >> we have standalone migration onl
Here's the latest draft of virtio patches.
This is on top of Rusty's recent virtqueue list + name patch,
which is included in series for completeness.
Changelog:
changes since v5: fix build on s390 (only patch 2/4 modified)
Michael S. Tsirkin (3):
virtio: find_vqs/del_vqs virtio operati
From: Rusty Russell
Add a linked list of all virtqueues for a virtio device: this helps for
debugging and is also needed for upcoming interface change.
Also, add a "name" field for clearer debug messages.
Signed-off-by: Rusty Russell
---
including this Rusty's patch here for completeness.
d
This replaces find_vq/del_vq with find_vqs/del_vqs virtio operations,
and updates all drivers. This is needed for MSI support, because MSI
needs to know the total number of vectors upfront.
Signed-off-by: Michael S. Tsirkin
---
drivers/block/virtio_blk.c |6 ++--
drivers/char/hw_ran
This reorganizes virtio-pci code in vp_interrupt slightly, so that
it's easier to add per-vq MSI support on top.
Signed-off-by: Michael S. Tsirkin
---
drivers/virtio/virtio_pci.c | 53 +++---
1 files changed, 34 insertions(+), 19 deletions(-)
diff --git a/d
This implements optional MSI-X support in virtio_pci.
MSI-X is used whenever the host supports at least 2 MSI-X
vectors: 1 for configuration changes and 1 for virtqueues.
Per-virtqueue vectors are allocated if enough vectors
available.
Signed-off-by: Michael S. Tsirkin
---
drivers/virtio/virtio_
Sometimes, when I type any keys in BIOS, my Linux guests boot without
keyboard - I'm not able to type in VNC console, guest's dmesg says:
i8042.c: No controller found.
Rebooting the guest doesn't fix the problem; only stopping/starting the
guest helps (i.e. new kvm process is started).
Whi
Gregory Haskins wrote:
iofd is a mechanism to register PIO/MMIO regions to trigger an eventfd
signal when written to. Userspace can register any arbitrary address
with a corresponding eventfd.
Please start a separate patchset for this so I can merge irqfd.
diff --git a/include/linux/kvm
- "sudhir kumar" wrote:
> On Wed, May 13, 2009 at 11:30 PM, Michael Goldish
> wrote:
> >
> > - "sudhir kumar" wrote:
> >
> >> Hi Uri/Lucas,
> >>
> >> Do you have any plans for enhancing kvm-autotest?
> >> I was looking mainly on the following 2 aspects:
> >>
> >> (1).
> >> we have stan
Gregory Haskins wrote:
KVM provides a complete virtual system environment for guests, including
support for injecting interrupts modeled after the real exception/interrupt
facilities present on the native platform (such as the IDT on x86).
Virtual interrupts can come from a variety of sources (em
Avi Kivity wrote:
> Gregory Haskins wrote:
>> KVM provides a complete virtual system environment for guests, including
>> support for injecting interrupts modeled after the real
>> exception/interrupt
>> facilities present on the native platform (such as the IDT on x86).
>> Virtual interrupts can c
Avi Kivity wrote:
> Gregory Haskins wrote:
>> iofd is a mechanism to register PIO/MMIO regions to trigger an eventfd
>> signal when written to. Userspace can register any arbitrary address
>> with a corresponding eventfd.
>>
>>
>
> Please start a separate patchset for this so I can merge irqfd.
Glauber Costa wrote:
In the call path of kvm_get_dirty_pages_log_range(),
its caller kvm_get_dirty_bitmap_cb() passes the
target_phys_addr_t both as start_addr and the offset.
So, using int will make dirty tracking over 4G fail
completely.
Applied, thanks.
Of course we should be using qem
Gregory Haskins wrote:
Please fget() the new fd and compare the filps; fds aren't meaningful
in the kernel. You can also drop _irqfd::fd.
I like this as a second option...
It may also be useful to compare the gsi, this allows a
"make-before-break" switchover:
...but I like thi
Gregory Haskins wrote:
+#define KVM_IOFD_FLAG_PIO (1 << 1)
+
+struct kvm_iofd {
+__u64 addr;
+__u32 len;
+__u32 fd;
+__u32 flags;
+__u8 pad[12];
+};
+
Please add a data match capability. virtio uses a write with the data
containing the queue ID, and we want
Tomasz Chmielewski schrieb:
The keyboard is not present after I reboot the guest and usually type
before Linux is started. It does not happen always.
Observed with kvm-83, kvm-84, kvm-85 on multiple KVM hosts (different
hardware).
Anyone else seeing this? If you're not sure, do something li
Avi Kivity wrote:
> Gregory Haskins wrote:
>>> Please fget() the new fd and compare the filps; fds aren't meaningful
>>> in the kernel. You can also drop _irqfd::fd.
>>>
>>
>> I like this as a second option...
>>
>>
>>> It may also be useful to compare the gsi, this allows a
>>> "make-befor
Tomasz Chmielewski schrieb:
Tomasz Chmielewski schrieb:
The keyboard is not present after I reboot the guest and usually type
before Linux is started. It does not happen always.
Observed with kvm-83, kvm-84, kvm-85 on multiple KVM hosts (different
hardware).
Anyone else seeing this? If you
Avi Kivity wrote:
> Dong, Eddie wrote:
>> OK.
>> Also back to Gleb's question, the reason I want to do that is to
>> simplify event
>> generation mechanism in current KVM.
>>
>> Today KVM use additional layer of exception/nmi/interrupt such as
>> vcpu.arch.exception.pending, vcpu->arch.interrupt.
On Thu, May 14, 2009 at 09:43:33PM +0800, Dong, Eddie wrote:
> Avi Kivity wrote:
> > Dong, Eddie wrote:
> >> OK.
> >> Also back to Gleb's question, the reason I want to do that is to
> >> simplify event
> >> generation mechanism in current KVM.
> >>
> >> Today KVM use additional layer of exceptio
Hi all
I'm newbie on list.
I have deploy a system here, with a Ubuntu Server running KVM.
Well, when I run virt-clone command, I get this error:
CMD: virt-clone -o vm01 -n VMUbuntu-2 -f /virt/ubuntu-2.img
RESULT:
Traceback (most recent call last):
File "/usr/lib/python2.6/logging/__init__.py",
On Thu, May 14, 2009 at 9:16 AM, Gilberto Nunes
wrote:
> Hi all
>
> I'm newbie on list.
> I have deploy a system here, with a Ubuntu Server running KVM.
> Well, when I run virt-clone command, I get this error:
>
> CMD: virt-clone -o vm01 -n VMUbuntu-2 -f /virt/ubuntu-2.img
>
> RESULT:
> Traceback
On Wed, May 13, 2009 at 09:56:18AM +0300, Avi Kivity wrote:
> Ross Boylan wrote:
>> I just installed XP into a new VM, specifying -smp 2 for the machine.
>> According to top, it's using nearly 200% of a cpu even when I'm not
>> doing anything.
>>
>> Is this real CPU useage, or just a reporting prob
Gleb Natapov wrote:
> On Thu, May 14, 2009 at 09:43:33PM +0800, Dong, Eddie wrote:
>> Avi Kivity wrote:
>>> Dong, Eddie wrote:
OK.
Also back to Gleb's question, the reason I want to do that is to
simplify event generation mechanism in current KVM.
Today KVM use additional
On Thu, 2009-05-14 at 10:32 +0800, Yu Zhao wrote:
> Make iommu_flush_iotlb_psi() and flush_unmaps() more readable.
This doesn't apply any more.
--
David WoodhouseOpen Source Technology Centre
david.woodho...@intel.com Intel Corporation
--
On Thu, 2009-05-14 at 12:19 +0200, Johannes Schlatow wrote:
> I had a similar problem some weeks ago. Finally I found out that my VM
> running WinXP was working on a non-acpi system (maybe I started kvm
> with -no-acpi option during the installation). In the Device Manager
> there has to be the ent
On Thu, May 14, 2009 at 10:34:11PM +0800, Dong, Eddie wrote:
> Gleb Natapov wrote:
> > On Thu, May 14, 2009 at 09:43:33PM +0800, Dong, Eddie wrote:
> >> Avi Kivity wrote:
> >>> Dong, Eddie wrote:
> OK.
> Also back to Gleb's question, the reason I want to do that is to
> simplify even
On Thursday 14 May 2009, Avi Kivity wrote:
>
> There aren't the real kernel headers, just cheap copies carried in
> qemu-kvm.git which have been appropriately postprocessed. We do this
> since the kvm external module can run on a much older kernel, so there
> is no natural place to find it hea
Avi Kivity wrote:
> Gregory Haskins wrote:
>> KVM provides a complete virtual system environment for guests, including
>> support for injecting interrupts modeled after the real
>> exception/interrupt
>> facilities present on the native platform (such as the IDT on x86).
>> Virtual interrupts can c
Arnd Bergmann wrote:
On Thursday 14 May 2009, Avi Kivity wrote:
There aren't the real kernel headers, just cheap copies carried in
qemu-kvm.git which have been appropriately postprocessed. We do this
since the kvm external module can run on a much older kernel, so there
is no natural place
On Thursday 14 May 2009, Avi Kivity wrote:
> I usually add a readlink -f in there due to my innate fear of relative
> directories and cd.
There is one already in the only place where this gets used:
KERNELDIR=$(readlink -f $kerneldir)
It also gets shown in the configure --help output, but I sup
The "Host<-->Guest" calls in virtio_blk (using the generic virtio kick/notify)
are as follows:
Guest->Host
---
do_virtlkb_request calls kick in the guest side causing handle_output to be
called on the host side.
Host->Guest
---
virtio_blk_rw_complete calls notify in the host side
Anthony Liguori wrote:
Vincent Minet wrote:
External ACPI tables are counted twice for the RSDT size and the load
address for the first external table is in the MADT (interrupt override
entries are overwritten).
Signed-off-by: Vincent Minet
Beth,
I think you had a patch attempting to add
KVM provides a complete virtual system environment for guests, including
support for injecting interrupts modeled after the real exception/interrupt
facilities present on the native platform (such as the IDT on x86).
Virtual interrupts can come from a variety of sources (emulated devices,
pass-thro
irqfd lets you create an eventfd based file-desriptor to inject interrupts
to a kvm guest. We associate one gsi per fd for fine-grained routing.
Signed-off-by: Gregory Haskins
---
kvm/libkvm/libkvm.c | 57 +++
kvm/libkvm/libkvm.h | 26 +++
Amit,
I trying to use PVDMA. I've downloaded a kernel snapshot from the your
kvm git, but I couldn't download a snapshot or the repo from your kvm-userspace
tree. I tried to launch the VM using kvm-85 user space but it hangs before
loading it. Should it work with kvm-85 user space? Do yo
malc wrote:
On Wed, 13 May 2009, Sebastian Herbszt wrote:
Jan Kiszka wrote:
> Moreover, does sound work at all with your qemu?
> The image I tried [1] issues two beeps after loading (obviously via
> direct hw access) - a good way to check general support. Note that one
> reason for broken host
On Wed, 2009-05-13 at 09:56 +0300, Avi Kivity wrote:
> Ross Boylan wrote:
> > I just installed XP into a new VM, specifying -smp 2 for the machine.
> > According to top, it's using nearly 200% of a cpu even when I'm not
> > doing anything.
> >
> > Is this real CPU useage, or just a reporting proble
Convert custom marker based KVMTRACE to event trace.
Applies on top of
git://git.kernel.org/pub/scm/linux/kernel/git/mingo/linux-2.6-x86.git
See Documentation/trace/events.txt and commit
7ce7e4249921d5073e764f7ff7ad83cfa9894bd7 if you're interested in playing
with event traces.
Index: linux-2.6
In order to allow sync'ing the kmod dir against arbitrary kernels trees,
extend the sync script to accept alternative paths and adjust the
Makefile accordingly.
Signed-off-by: Jan Kiszka
---
Makefile |3 ++-
sync | 14 +++---
2 files changed, 13 insertions(+), 4 deletions(-)
The in-kernel speaker emulation is only a dummy and also unneeded from
the performance point of view. Rather, it takes user space support to
generate sound output on the host, e.g. console beeps.
To allow this, introduce KVM_CREATE_PIT2 which controls in-kernel
speaker port emulation via a flag pa
When using the in-kernel PIT the speaker emulation has to synchronize
the PIT state with KVM. Enhance the existing speaker sound device and
allow it to take over port 0x61 by using KVM_CREATE_PIT2 where
available. This unbreaks -soundhw pcspk in KVM mode.
Changes in v4:
- preserve full PIT state
Does KVM already take advantage of Intel VT-d2 features, e.g. interrupt
remapping support? Has anyone verified how it improves interrupt delivery for
PCI pass-through devices?
Thanks,
Anna
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@v
In certain situations, trying to do a rmmod on the kvm modules might
generate errors, as there is a chain of dependencies involved. Instead,
let's use modprobe -r, as it handles dependencies.
Signed-off-by: Lucas Meneghel Rodrigues
diff --git a/client/tests/kvm_runtest_2/kvm_install.py b/client/
We have verified VT-d2 features works with PCI passthrough on KVM. To enable
it, you need to turn on interrupt remapping in kernel config.
Interrupt remapping is a security/isolation feature where interrupt delivery is
qualified with device's bus/device/function in interrupt remapping table ent
On Thu, 14 May 2009, Sebastian Herbszt wrote:
> malc wrote:
> > On Wed, 13 May 2009, Sebastian Herbszt wrote:
> >
> > > Jan Kiszka wrote:
> > > > Moreover, does sound work at all with your qemu?
> > > > The image I tried [1] issues two beeps after loading (obviously via
> > > > direct hw access)
I thought that one use case of VT-d2 interrupt remapping was to be able to
safely and more efficiently deliver interrupts to the CPU that runs the
particular VCPU of the guest that owns the I/O device that issues the
interrupt. Shouldn't there at least be some performance (e.g. latency)
improve
Are there any plans to enhance virtio_net with receive-side scaling
capabilities, so that an SMP guest OS can balance its network processing load
more equally across multiple CPUs?
Thanks,
Anna
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord..
In both interrupt remapping and no interrupt remapping cases, interrupts from
the passthrough device are still delivered to the host kernel. KVM then
injects the interrupt to guest via vlapic->vioapic->vmcs path.
The value add from interrupt remapping is that a new source ID field in
interrupt
On Tuesday 05 May 2009 11:41:55 Sheng Yang wrote:
> This meant to be with commit: adcf3594f9580bdf9b5e71f271b6088b185e017e,
> otherwise QEmu only counts the MSI-X entries, but won't fill it...
>
> Signed-off-by: Sheng Yang
> ---
> hw/device-assignment.c |2 --
> 1 files changed, 0 insertions(
Bugs item #2638990, was opened at 2009-02-25 23:35
Message generated for change (Settings changed) made by sf-robot
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=2638990&group_id=180599
Please note that this message will contain a full copy of the comme
On Thu, 14 May 2009, Gregory Haskins wrote:
> Avi Kivity wrote:
> > Gregory Haskins wrote:
> >> KVM provides a complete virtual system environment for guests, including
> >> support for injecting interrupts modeled after the real
> >> exception/interrupt
> >> facilities present on the native platf
Davide Libenzi wrote:
> On Thu, 14 May 2009, Gregory Haskins wrote:
>
>
>> Avi Kivity wrote:
>>
>>> Gregory Haskins wrote:
>>>
KVM provides a complete virtual system environment for guests, including
support for injecting interrupts modeled after the real
exception/int
Michael Goldish 写道:
- "jason wang" wrote:
sudhir kumar 写道:
Hi Uri/Lucas,
Do you have any plans for enhancing kvm-autotest?
I was looking mainly on the following 2 aspects:
(1).
we have standalone migration only. Is there any plans of enhancing
kvm-autotest so that we can trigger
On Thu, 14 May 2009 08:24:53 pm Michael S. Tsirkin wrote:
> Here's the latest draft of virtio patches.
> This is on top of Rusty's recent virtqueue list + name patch,
> which is included in series for completeness.
Thanks, I've applied these. They should hit linux-next Monday or Tuesday.
Thanks!
Does KVM allow passing through a full multi-function PCI device to a guest, and
make that device appear as a whole multi-function device rather than as
multiple PCI single-function devices (e.g. Xen only does the latter where all
PCI devices appear with function ID being 0 in the guest)?
Thanks
Greetings all,
The first test results for Linux/iSCSI Initiators and targets for large
block sizes using 10 Gb/sec Ethernet + PCIe device-passthrough into
Linux/KVM guests have been posted at:
http://linux-iscsi.org/index.php/KVM-LIO-Target
So far, the results have been quite impressive using th
And here's the fixup patch I applied:
diff --git a/drivers/lguest/lguest_device.c b/drivers/lguest/lguest_device.c
--- a/drivers/lguest/lguest_device.c
+++ b/drivers/lguest/lguest_device.c
@@ -318,11 +318,11 @@ static void lg_del_vqs(struct virtio_dev
struct virtqueue *vq, *n;
li
69 matches
Mail list logo