Re: [PATCH 1/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-09 Thread Joerg Roedel
Btw. This patch posting is broken. It suffers from line-wraps which make it impossible to apply as-is. I was able to fix it but please consider this in your next posting. On Wed, Mar 31, 2010 at 05:12:35PM -0700, Tom Lyon wrote: --- linux-2.6.33/drivers/uio/uio_pci_generic.c2010-02-24

Re: [Autotest] [PATCH] KVM test: Memory ballooning test for KVM guest

2010-04-09 Thread pradeep
Hi Lucas Thanks for your comments. Please find the patch, with suggested changes. Thanks Pradeep Signed-off-by: Pradeep Kumar Surisetty psuri...@linux.vnet.ibm.com --- diff -uprN autotest-old/client/tests/kvm/tests/balloon_check.py autotest/client/tests/kvm/tests/balloon_check.py ---

[PATCH RFC 0/5] KVM: Moving dirty bitmaps to userspace: double buffering approach

2010-04-09 Thread Takuya Yoshikawa
Hi, this is the first version! We've first implemented the x86 specific parts without introducing new APIs: so this code works with current qemu-kvm. Although we have many things to do, we'd like to get some comments to see we are going to the right direction. Note: we are now testing this

[PATCH RFC 2/5] KVM: use a rapper function to calculate the sizes of dirty bitmaps

2010-04-09 Thread Takuya Yoshikawa
We will use this later in other parts. Signed-off-by: Takuya Yoshikawa yoshikawa.tak...@oss.ntt.co.jp Signed-off-by: Fernando Luis Vazquez Cao ferna...@oss.ntt.co.jp --- arch/powerpc/kvm/book3s.c |2 +- arch/x86/kvm/x86.c|2 +- include/linux/kvm_host.h |5 +

[PATCH RFC 3/5] KVM: Use rapper functions to create and destroy dirty bitmaps

2010-04-09 Thread Takuya Yoshikawa
For x86, we will change the allocation and free parts to do_mmap() and do_munmap(). This patch makes it cleaner. Signed-off-by: Takuya Yoshikawa yoshikawa.tak...@oss.ntt.co.jp Signed-off-by: Fernando Luis Vazquez Cao ferna...@oss.ntt.co.jp --- virt/kvm/kvm_main.c | 27

[PATCH RFC 4/5] KVM: add new members to the memory slot for double buffering of bitmaps

2010-04-09 Thread Takuya Yoshikawa
Currently, x86 vmalloc()s a dirty bitmap every time when we swich to the next dirty bitmap. To avoid this, we use the double buffering technique: we also move the bitmaps to userspace, so that extra bitmaps will not use the precious kernel resource. This idea is based on Avi's suggestion.

[PATCH RFC 5/5] KVM: This is the main part of the moving dirty bitmaps to user space

2010-04-09 Thread Takuya Yoshikawa
By this patch, bitmap allocation is replaced with do_mmap() and bitmap manipulation is replaced with *_user() functions. Note that this does not change the APIs between kernel and user space. To get more advantage from this hack, we need to add a new interface for triggering the bitmap swith and

[RFC][PATCH v3 0/3] Provide a zero-copy method on KVM virtio-net.

2010-04-09 Thread xiaohui . xin
The idea is simple, just to pin the guest VM user space and then let host NIC driver has the chance to directly DMA to it. The patches are based on vhost-net backend driver. We add a device which provides proto_ops as sendmsg/recvmsg to vhost-net to send/recv directly to/from the NIC driver. KVM

[RFC][PATCH v3 1/3] A device for zero-copy based on KVM virtio-net.

2010-04-09 Thread xiaohui . xin
From: Xin Xiaohui xiaohui@intel.com Add a device to utilize the vhost-net backend driver for copy-less data transfer between guest FE and host NIC. It pins the guest user space to the host memory and provides proto_ops as sendmsg/recvmsg to vhost-net. Signed-off-by: Xin Xiaohui

[RFC][PATCH v3 3/3] Let host NIC driver to DMA to guest user space.

2010-04-09 Thread xiaohui . xin
From: Xin Xiaohui xiaohui@intel.com The patch let host NIC driver to receive user space skb, then the driver has chance to directly DMA to guest user space buffers thru single ethX interface. Signed-off-by: Xin Xiaohui xiaohui@intel.com Signed-off-by: Zhao Yu yzha...@gmail.com

[RFC][PATCH v3 2/3] Provides multiple submits and asynchronous notifications.

2010-04-09 Thread xiaohui . xin
From: Xin Xiaohui xiaohui@intel.com The vhost-net backend now only supports synchronous send/recv operations. The patch provides multiple submits and asynchronous notifications. This is needed for zero-copy case. Signed-off-by: Xin Xiaohui xiaohui@intel.com --- drivers/vhost/net.c |

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-09 Thread Avi Kivity
On 04/02/2010 08:05 PM, Greg KH wrote: Currently kvm does device assignment with its own code, I'd like to unify it with uio, not split it off. Separate notifications for msi-x interrupts are just as useful for uio as they are for kvm. I agree, there should not be a difference here for

Re: [Autotest] [PATCH] KVM test: Memory ballooning test for KVM guest

2010-04-09 Thread sudhir kumar
On Fri, Apr 9, 2010 at 2:40 PM, pradeep psuri...@linux.vnet.ibm.com wrote: Hi Lucas Thanks for your comments. Please find the patch, with suggested changes. Thanks Pradeep Signed-off-by: Pradeep Kumar Surisetty psuri...@linux.vnet.ibm.com --- diff -uprN

Re: [Qemu-devel] [GSoC 2010] Pass-through filesystem support.

2010-04-09 Thread Luiz Capitulino
On Thu, 8 Apr 2010 18:01:01 +0200 Mohammed Gamal m.gamal...@gmail.com wrote: Hi, Now that Cam is almost done with his ivshmem patches, I was thinking of another idea for GSoC which is improving the pass-though filesystems. I've got some questions on that: 1- What does the community prefer

Re: [PATCH] vhost: Make it more scalable by creating a vhost thread per device.

2010-04-09 Thread Sridhar Samudrala
On Thu, 2010-04-08 at 17:14 -0700, Rick Jones wrote: Here are the results with netperf TCP_STREAM 64K guest to host on a 8-cpu Nehalem system. I presume you mean 8 core Nehalem-EP, or did you mean 8 processor Nehalem-EX? Yes. It is a 2 socket quad-core Nehalem. so i guess it is a 8 core

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-09 Thread Tom Lyon
On Friday 09 April 2010 02:58:19 am Avi Kivity wrote: On 04/02/2010 08:05 PM, Greg KH wrote: Currently kvm does device assignment with its own code, I'd like to unify it with uio, not split it off. Separate notifications for msi-x interrupts are just as useful for uio as they are for

Re: [PATCH 1/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-09 Thread Tom Lyon
Mea culpa. On Friday 09 April 2010 02:08:55 am Joerg Roedel wrote: Btw. This patch posting is broken. It suffers from line-wraps which make it impossible to apply as-is. I was able to fix it but please consider this in your next posting. On Wed, Mar 31, 2010 at 05:12:35PM -0700, Tom Lyon

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for?non-privileged processes

2010-04-09 Thread Joerg Roedel
On Fri, Apr 09, 2010 at 09:34:16AM -0700, Tom Lyon wrote: The 'check' items are already done, not fully tested; probably available next week. Can we leave the others for future patches? Please? And I definitely need help with the PCI config stuff. Yeah, go in small steps forward. Just

Re: [Qemu-devel] [GSoC 2010] Pass-through filesystem support.

2010-04-09 Thread jvrao
Luiz Capitulino wrote: On Thu, 8 Apr 2010 18:01:01 +0200 Mohammed Gamal m.gamal...@gmail.com wrote: Hi, Now that Cam is almost done with his ivshmem patches, I was thinking of another idea for GSoC which is improving the pass-though filesystems. I've got some questions on that: 1- What

Re: [PATCH] vhost: Make it more scalable by creating a vhost thread per device.

2010-04-09 Thread Rick Jones
Sridhar Samudrala wrote: On Thu, 2010-04-08 at 17:14 -0700, Rick Jones wrote: Here are the results with netperf TCP_STREAM 64K guest to host on a 8-cpu Nehalem system. I presume you mean 8 core Nehalem-EP, or did you mean 8 processor Nehalem-EX? Yes. It is a 2 socket quad-core Nehalem. so

Re: [Qemu-devel] [GSoC 2010] Pass-through filesystem support.

2010-04-09 Thread Mohammed Gamal
On Fri, Apr 9, 2010 at 7:11 PM, jvrao jv...@linux.vnet.ibm.com wrote: Luiz Capitulino wrote: On Thu, 8 Apr 2010 18:01:01 +0200 Mohammed Gamal m.gamal...@gmail.com wrote: Hi, Now that Cam is almost done with his ivshmem patches, I was thinking of another idea for GSoC which is improving the

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-09 Thread Avi Kivity
On 04/09/2010 07:34 PM, Tom Lyon wrote: - access to all config space, but BARs must be translated so userspace cannot attack the host Please elaborate. All of PCI config? All of PCIe config? Seems like a huge mess. Yes. Anything a guest's device driver may want to access. The

Re: hugetlbfs and KSM

2010-04-09 Thread Chris Wright
* Bernhard Schmidt (be...@birkenwald.de) wrote: * KSM seems to be largely ineffective (100MB saved - 1.3MB saved) Am I doing something wrong? Is this a bug? Is this generally impossible with large pages (which might explain the lower load on the host, if large pages are not scanned)? Or is

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-09 Thread Chris Wright
* Avi Kivity (a...@redhat.com) wrote: On 04/02/2010 08:05 PM, Greg KH wrote: - access to all config space, but BARs must be translated so userspace cannot attack the host Specifically, intermediated access to config space. For example, need to know about MSI/MSI-X updates in config space.

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for?non-privileged processes

2010-04-09 Thread Chris Wright
* Tom Lyon (p...@lyon-about.com) wrote: On Friday 09 April 2010 02:58:19 am Avi Kivity wrote: - access to all config space, but BARs must be translated so userspace cannot attack the host Please elaborate. All of PCI config? All of PCIe config? Seems like a huge mess. All of config

Re: [Qemu-devel] [GSoC 2010] Pass-through filesystem support.

2010-04-09 Thread Jamie Lokier
Mohammed Gamal wrote: 2- With respect to CIFS. I wonder how the shares are supposed to be exposed to the guest. Should the Samba server be modified to be able to use unix domain sockets instead of TCP ports and then QEMU communicating on these sockets. With that approach, how should the guest

Re: [Qemu-devel] [GSoC 2010] Pass-through filesystem support.

2010-04-09 Thread Mohammed Gamal
On Fri, Apr 9, 2010 at 11:22 PM, Jamie Lokier ja...@shareable.org wrote: Mohammed Gamal wrote: 2- With respect to CIFS. I wonder how the shares are supposed to be exposed to the guest. Should the Samba server be modified to be able to use unix domain sockets instead of TCP ports and then QEMU

Re: [Qemu-devel] [GSoC 2010] Pass-through filesystem support.

2010-04-09 Thread Javier Guerra Giraldez
On Fri, Apr 9, 2010 at 5:17 PM, Mohammed Gamal m.gamal...@gmail.com wrote: That's all good and well. The question now is which direction would the community prefer to go. Would everyone be just happy with virtio-9p passthrough? Would it support multiple OSs (Windows comes to mind here)? Or

Re: [Qemu-devel] [GSoC 2010] Pass-through filesystem support.

2010-04-09 Thread Mohammed Gamal
On Sat, Apr 10, 2010 at 12:22 AM, Javier Guerra Giraldez jav...@guerrag.com wrote: On Fri, Apr 9, 2010 at 5:17 PM, Mohammed Gamal m.gamal...@gmail.com wrote: That's all good and well. The question now is which direction would the community prefer to go. Would everyone be just happy with

Re: Setting nx bit in virtual CPU

2010-04-09 Thread Andre Przywara
Richard Simpson wrote: On 08/04/10 09:52, Andre Przywara wrote: Can you try to boot the attached multiboot kernel, which just outputs a brief CPUID dump? $ qemu-kvm -kernel cpuid_mb -vnc :0 (Unfortunately I have no serial console support in there yet, so you either have to write the values