Re: [kvm-devel] Enlarging the quemu window

2007-05-06 Thread Dor Laor
Hello,

 I had installed kvm and windows on a Linux machine.

 I start kvm by :
 /usr/local/kvm/bin/qemu-system-x86_64 . -hda vdisk.img -boot c -m 384
-no-
kvm

 The qemu window where windows run is about a quarter of a screen.

 Is there a way to enlarge it so it will be bigger ?

If you'll change the guest resolution you'll get bigger window.

 is there a way to cause this window to be full screen ?

Press Atl-ctrl-f for full screen and back.


 Regards,
 Ian

---
--
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of DB2 express and take
control of your XML. No limits. Just data. Click to get it now.
http://sourceforge.net/powerbar/db2/
___
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel

-
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of DB2 express and take
control of your XML. No limits. Just data. Click to get it now.
http://sourceforge.net/powerbar/db2/
___
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel


Re: [kvm-devel] System time issues - 64 bit guest

2007-05-06 Thread Dor Laor
I've got a problem where my guest VM's system clock is very inaccurate.
The
host computer is running 4 guest VM's, 2 32-bit Linux (Debian Sarge), 1
Windows XP and 1 64 bit Linux (Debian Etch).

The problem I have is that the system clock on the 64 bit Deabin Etch
VM is
always either running slow or fast (around 90% to 200% of the correct
speed).  The unusual thing is that the other guest VM's do not seem to
share
the same probelm.


- Is it an ACPI/APIC enabled guest? If so try using acpi=off nolapic in
the kernel's command line and see what's happens again.
  There is a patch for fixing PIC irq delivery when lapic is enabled
sent by  
  He Qing, it might be usefull for you
[http://www.mail-archive.com/[EMAIL PROTECTED]/msg10094.html], I
doesn't reproduce on my 64bit guest.

- Another option is to see if the specific VM uses /dev/rtc on the host.
  If it does, remove the /dev/rtc file and re-execute the vm and see
what happens. You can send us the output of time ssh vm-ip 'time sleep
10'

HTH,
Dor


The guest VM does report the following errors in the output of dmesg:

No virus found in this outgoing message.
Checked by AVG Free Edition.
Version: 7.5.467 / Virus Database: 269.6.2/787 - Release Date:
3/05/2007
2:11 PM



---
--
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of DB2 express and take
control of your XML. No limits. Just data. Click to get it now.
http://sourceforge.net/powerbar/db2/
___
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel

-
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of DB2 express and take
control of your XML. No limits. Just data. Click to get it now.
http://sourceforge.net/powerbar/db2/
___
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel


Re: [kvm-devel] [PATCH 0/4] Kernel side patches for in-kernel APIC

2007-05-06 Thread Avi Kivity
Gregory Haskins wrote:
 The following is my kernel side patch series for adding in-kernel APIC logic.
 By default, the code enters level-0 mode and should be compatible with
 existing userspace.  I have a patch series for userspace which enables
 level-1 mode which I will forward after this one.

 I have incorporated most of the feedback I have received to date.  There were
 a few things that I had initially agreed to do that you may find missing from
 the changes.  I found a few places where my original decisions made more sense
 to me than what I agreed to change, so I left them pending further
 discussion.  E.g. kvm_irqpin_t was going to change to kvm_cpuirq_t but I
 decided against it for reasons I can discuss if anyone is so inclined.
   

Please do (it doesn't really matter; just curious).  Also please provide 
in the future a changelog relative to previous patches so that it is 
easier to review.  It's fairly difficult to keep track of think with a 
long release cycle.


 level-0 has been tested with both 32 bit windows and 64-bit linux *before* I
 moved to git-HEAD.  They both worked without any discernable differences in
 behavior.

 I then bumped up to git-HEAD and adjusted all my patches to get ready for
 submission.  Unfortunately I seem to have run into a (known/unknown)
 regression(*) in the KVM codebase with that update where things arent working
 quite right.  What I did confirm was that the system behaves the same both
 with and without my patches for both level-0 and level-1 behavior.  It is now
 at a point where testers could start to look at my patches and provide
 bug/performance feedback in addition to the code review comments.  All are
 welcome.  
   

Yes, we did have some regressions; I think I fixed all of them but of 
course I can't tell for sure.  Please try with latest HEAD, and if not 
let me know.

I'll review once I manage to get kvm-22 out; probably Monday or 
Tuesday.  Sorry about the delay.

Incidentally the latest changes should make the performance advantages 
of in-kernel lapic more noticable (or maybe, noticable) as the 
difference between guest-kernel switch times and guest-userspace 
switch times is increasing.



-- 
error compiling committee.c: too many arguments to function


-
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of DB2 express and take
control of your XML. No limits. Just data. Click to get it now.
http://sourceforge.net/powerbar/db2/
___
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel


Re: [kvm-devel] [PATCH 0/4] Kernel side patches for in-kernel APIC

2007-05-06 Thread Avi Kivity
Gregory Haskins wrote:
 On Thu, May 3, 2007 at  2:57 PM, in message
 
 [EMAIL PROTECTED],
 Nakajima, Jun [EMAIL PROTECTED] wrote: 

   
 This sounds good, but when will this get incorporated in the tree?

 The reason I'm asking is that I've got X64 Vista up on KVM as well (with
 patches to EFER and CR8 handling), and I'm wondering if I should hold on
 because the code for CR8 handling would be different (and this in- kernel
 APIC code would be preferable for that).  
 

 While I can't comment on when it goes into the tree (that's the Qumranet guys 
 call), additional testing will help push the ball forward.  So if you have 
 some spare cycles, please give it a whirl and let us know what you find.  

 Note that I have found/fixed a few issues in the patches since I sent the 
 mail yesterday (including a nasty host kernel OOPS during level-0 shutdown).  
 However, in the interest of trying not to spam the list more than once a week 
 with a relatively large patch queue, I didn't send it out. ;) If interested 
 in testing, email me directly and I will get you the latest.
   

Please do post (perhaps just the incremental).  People can ignore it if 
they're not interested.

By the way, Windows is by far the most sensitive guest to apic issues, 
and has the most to gain, so testing with that is quite important.

 Also, please share your APIC related patches (if you can).  If its something 
 that is applicable to my work, I will see if I can get it integrated in.
   

Yes please.  I'd also like to keep the old model working so we can 
isolate problems more easily.


-- 
error compiling committee.c: too many arguments to function


-
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of DB2 express and take
control of your XML. No limits. Just data. Click to get it now.
http://sourceforge.net/powerbar/db2/
___
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel


Re: [kvm-devel] faster boot with -no-kvm?

2007-05-06 Thread Avi Kivity
David Abrahams wrote:
 
 A subsequent reboot went much faster.  Wow, the virtual machine really
 blazes now!  Wish I'd known about that earlier, thanks!
   
   
 Looks like something the wiki wants to know about too.
 

 Seems like it's already there:
 http://kvm.qumranet.com/kvmwiki/Windows_ACPI_Workaround

 It doesn't seem all that easy to find some things on the wiki.  I wish
 I knew what to suggest that would improve things, but I don't.
   

Well, I wrote that page as a reaction to that conversation, so it isn't 
surprising you couldn't find it before.


-- 
error compiling committee.c: too many arguments to function


-
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of DB2 express and take
control of your XML. No limits. Just data. Click to get it now.
http://sourceforge.net/powerbar/db2/
___
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel


Re: [kvm-devel] [PATCH] Don't fault when guest tries to read IA32_EBL_CR_POWERON MSR

2007-05-06 Thread Avi Kivity
Matthew Gregan wrote:
 Hi,

 Attempting to boot the default 'bsd' kernel of OpenBSD 4.1 i386 in a guest
 fails early in the kernel init inside p3_get_bus_clock while trying to read
 the IA32_EBL_CR_POWERON MSR.  KVM logs an 'unhandled MSR' message and the
 guest kernel faults.

 This patch is sufficient to allow OpenBSD to boot, after which it seems to
 run fine.  I'm not sure if this is the correct solution for dealing with
 this particular MSR, but it works for me.

   

Applied, thanks.

-- 
error compiling committee.c: too many arguments to function


-
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of DB2 express and take
control of your XML. No limits. Just data. Click to get it now.
http://sourceforge.net/powerbar/db2/
___
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel


[kvm-devel] [GIT PULL][RESEND] KVM updates for Linux 2.6.22

2007-05-06 Thread Avi Kivity
Linus,

Please pull from the repository and branch

   git://git.kernel.org/pub/scm/linux/kernel/git/avi/kvm.git for-linus

to receive the pending kvm updates for 2.6.22.  The changes increase
the range of guests we support, improve performance, fix various bugs,
and improve the userspace interface.

Adrian Bunk (1):
   KVM: fix an if() condition

Anthony Liguori (4):
   KVM: Lazy FPU support for SVM
   KVM: VMX: Properly shadow the CR0 register in the vcpu struct
   KVM: VMX: Add lazy FPU support for VT
   KVM: SVM: Only save/restore MSRs when needed

Avi Kivity (51):
   KVM: Use own minor number
   KVM: Export linux/kvm.h
   KVM: Fix bogus sign extension in mmu mapping audit
   KVM: Use a shared page for kernel/user communication when runing 
a vcpu
   KVM: Do not communicate to userspace through cpu registers during PIO
   KVM: Handle cpuid in the kernel instead of punting to userspace
   KVM: Remove the 'emulated' field from the userspace interface
   KVM: Remove minor wart from KVM_CREATE_VCPU ioctl
   KVM: Renumber ioctls
   KVM: Add method to check for backwards-compatible API extensions
   KVM: Allow userspace to process hypercalls which have no kernel 
handler
   KVM: Fold kvm_run::exit_type into kvm_run::exit_reason
   KVM: Add a special exit reason when exiting due to an interrupt
   KVM: Initialize the apic_base msr on svm too
   KVM: Add guest mode signal mask
   KVM: Allow kernel to select size of mmap() buffer
   KVM: Future-proof argument-less ioctls
   KVM: Avoid guest virtual addresses in string pio userspace interface
   KVM: MMU: Remove unnecessary check for pdptr access
   KVM: MMU: Remove global pte tracking
   KVM: Workaround vmx inability to virtualize the reset state
   KVM: Remove set_cr0_no_modeswitch() arch op
   KVM: Modify guest segments after potentially switching modes
   KVM: Hack real-mode segments on vmx from KVM_SET_SREGS
   KVM: Don't allow the guest to turn off the cpu cache
   KVM: Remove unused and write-only variables
   KVM: MMU: Fix hugepage pdes mapping same physical address with 
different access
   KVM: SVM: Ensure timestamp counter monotonicity
   KVM: Use list_move()
   KVM: Remove debug message
   KVM: x86 emulator: fix bit string operations operand size
   KVM: Simply gfn_to_page()
   KVM: Add physical memory aliasing feature
   KVM: Add fpu get/set operations
   KVM: Use kernel-standard types
   KVM: Initialize cr0 to indicate an fpu is present
   KVM: Handle partial pae pdptr
   KVM: Use slab caches to allocate mmu data structures
   KVM: Retry sleeping allocation if atomic allocation fails
   KVM: SVM: Report hardware exit reason to userspace instead of dmesg
   KVM: Handle guest page faults when emulating mmio
   KVM: VMX: Reduce unnecessary saving of host msrs
   KVM: VMX: Don't switch 64-bit msrs for 32-bit guests
   KVM: Fold drivers/kvm/kvm_vmx.h into drivers/kvm/vmx.c
   KVM: VMX: Only save/restore MSR_K6_STAR if necessary
   KVM: Per-vcpu statistics
   KVM: Allow passing 64-bit values to the emulated read/write API
   KVM: Don't complain about cpu erratum AA15
   KVM: Remove extraneous guest entry on mmio read
   KVM: Don't require explicit indication of completion of mmio or pio
   KVM: Remove unused 'instruction_length'

Dor Laor (3):
   KVM: Fix guest register corruption on paravirt hypercall
   KVM: Use the generic skip_emulated_instruction() in hypercall code
   KVM: Add mmu cache clear function

Eric Sesterhenn / Snakebyte (1):
   KVM: Fix overflow bug in overflow detection code

Joerg Roedel (2):
   KVM: SVM: forbid guest to execute monitor/mwait
   KVM: SVM: enable LBRV virtualization if available

Michal Piotrowski (1):
   KVM: Remove unused function

Sergey Kiselev (1):
   KVM: Handle writes to MCG_STATUS msr

Yaozu Dong (2):
   KVM: MMU: Avoid heavy ASSERT at non debug mode.
   KVM: VMX: Avoid unnecessary vcpu_load()/vcpu_put() cycles

  drivers/kvm/kvm.h  |  100 --
  drivers/kvm/kvm_main.c |  792 
+---
  drivers/kvm/kvm_svm.h  |   13 +-
  drivers/kvm/kvm_vmx.h  |   14 -
  drivers/kvm/mmu.c  |  154 +++---
  drivers/kvm/paging_tmpl.h  |   12 +-
  drivers/kvm/svm.c  |  197 +++
  drivers/kvm/svm.h  |6 +
  drivers/kvm/vmx.c  |  273 +++-
  drivers/kvm/x86_emulate.c  |   51 +---
  drivers/kvm/x86_emulate.h  |   32 +--
  include/linux/Kbuild   |1 +
  include/linux/kvm.h|  133 ++---
  include/linux/miscdevice.h |1 +
  14 files changed, 1301 insertions(+), 478 deletions(-)
  delete mode 100644 drivers/kvm/kvm_vmx.h

-
This SF.net email is sponsored by DB2 Express

[kvm-devel] kvmfs

2007-05-06 Thread Mark Ryden
Hi,
Could anybody tell a few sentences anout kvmfs: what is it for ?
I did not find anything in the FAQ; googling for it did not give a valuable
info either.
Mark

-
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of DB2 express and take
control of your XML. No limits. Just data. Click to get it now.
http://sourceforge.net/powerbar/db2/
___
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel


Re: [kvm-devel] kvmfs

2007-05-06 Thread Avi Kivity
Mark Ryden wrote:
 Hi,
 Could anybody tell a few sentences anout kvmfs: what is it for ?
 I did not find anything in the FAQ; googling for it did not give a valuable
   

It's a pseudo filesystem for generating inodes; it's just glue to get 
things working; it has no specific functionality.

I'll rip it out in favor of ainofs [1] soon.


[1] http://lwn.net/Articles/228903/

-- 
error compiling committee.c: too many arguments to function


-
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of DB2 express and take
control of your XML. No limits. Just data. Click to get it now.
http://sourceforge.net/powerbar/db2/
___
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel


Re: [kvm-devel] [PATCH 1/4] ACE documentation

2007-05-06 Thread Arnd Bergmann
On Sunday 06 May 2007, Wink Saville wrote:
 +Atomic Code Execution (ACE) allows code to execute as if it was
 +surrounded by spin_lock_irqsave and spin_unlock_irqrestore without
 +requiring actual access to the processor flags register.

I guess you mean spin_{un,}lock_irq here, right? The save/restore
part had me confused for quite a while when trying to understand
what you are doing.

 Thus code 
 +executing within the ACE area can also be executed from user space or
 +kernel space. This is accomplished by using spin locks when executing
 +within the ACE area and changes to arch/x86_64/kernel/entry.S such that
 +when an interrupt occurs while executing code in the ACE area that code
 +will be completed before the interrupt is dispatched.

I don't understand how you can write to the spinlock when coming from
user space. If the page is writable, how do you make sure the user can't
write malicious code or data into it?

 +The modifications to entry.S starts at the label ace_common plus the
 +macro HANDLE_ACE immediately following. HANDLE_ACE invokes ace_common
 +at the beginning of each interrupt, if it finds that code in the ACE
 +area was interrupted it causes the ACE code to resume execution prior
 +to handling the interrupt.

You add eight instruction to every interrupt entry, have you measured
whether that makes a difference in timing?

 +The code for the ACE area is in the file arch/x86_64/kernel/ace.S. This
 +file contains all of the code that maybe executed by the kernel or
 +user-space. To be able to share this code with user space the code is
 +also compiled by user space, but this is only to generate the jump
 +table. Other techniques are possible, but this is the current
 +implementation and can be seen in the directory test/ace.

Can't you put this into the vdso? Calling into the right place sounds
like a problem that is already solved.

 +The ACE area is initialized by calling
 +drivers/ace/ace_device.c/ace_init() from init/main.c/start_kernel().

I don't understand what you even want the character device for,
shouldn't the memory just always be there?

 +4. ACE area API Reference
 +
 +ACE supports the following API:
 +
 +uint64_t ace_inc_counter(void)
 +
 +  Increment the counter
 +
 +
 +uint64_t ace_inc_timer_counter(void)
 +
 +  Increment the timer counter
 +
 +
 +void ace_get_counters(uint64_t *counter, uint64_t *timer_counter)
 +
 +  Return the counter and timer counter

None of these functions sound like you need such a complex infrastructure
to do them, setting single values can be done with atomic operations from
user space. Is there anything more complex that you plan to add as the
next step?

Arnd 

-
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of DB2 express and take
control of your XML. No limits. Just data. Click to get it now.
http://sourceforge.net/powerbar/db2/
___
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel


Re: [kvm-devel] kvmfs

2007-05-06 Thread Mark Ryden
Thanks, Avi.

I thought that this kvmfs is somehow connected to
a synthetic file system that can be used to control one or more KVM
virtual machines running on a computer.

see:
http://www.linuxsymposium.org/2007/view_abstract.php?content_key=102

I assume there is no connection between your kvm and this project ?

Regards,
Mark


On 5/6/07, Avi Kivity [EMAIL PROTECTED] wrote:
 Mark Ryden wrote:
  Hi,
  Could anybody tell a few sentences anout kvmfs: what is it for ?
  I did not find anything in the FAQ; googling for it did not give a valuable
 

 It's a pseudo filesystem for generating inodes; it's just glue to get
 things working; it has no specific functionality.

 I'll rip it out in favor of ainofs [1] soon.


 [1] http://lwn.net/Articles/228903/

 --
 error compiling committee.c: too many arguments to function



-
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of DB2 express and take
control of your XML. No limits. Just data. Click to get it now.
http://sourceforge.net/powerbar/db2/
___
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel


Re: [kvm-devel] kvmfs

2007-05-06 Thread Avi Kivity
Mark Ryden wrote:
 Thanks, Avi.

 I thought that this kvmfs is somehow connected to
 a synthetic file system that can be used to control one or more KVM
 virtual machines running on a computer.

 see:
 http://www.linuxsymposium.org/2007/view_abstract.php?content_key=102

 I assume there is no connection between your kvm and this project ?


Ah, okay.  There are two kvmfs's.

What I described is a kvm-internal thing.  The paper appears to describe 
something that is used to manage kvm as a whole.  I don't really know 
anything about it, I guess I'll have to attend the presentation.


-- 
error compiling committee.c: too many arguments to function


-
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of DB2 express and take
control of your XML. No limits. Just data. Click to get it now.
http://sourceforge.net/powerbar/db2/
___
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel


[kvm-devel] [ kvm-Bugs-1713790 ] Crashing booting HaikuOS

2007-05-06 Thread SourceForge.net
Bugs item #1713790, was opened at 2007-05-06 12:37
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting: 
https://sourceforge.net/tracker/?func=detailatid=893831aid=1713790group_id=180599

Please note that this message will contain a full copy of the comment thread,
including the initial issue submission, for this request,
not just the latest update.
Category: None
Group: None
Status: Open
Resolution: None
Priority: 5
Private: No
Submitted By: Leonardo Silva Amaral (leleobhz)
Assigned to: Nobody/Anonymous (nobody)
Summary: Crashing booting HaikuOS

Initial Comment:
After start kvm, when show the haiku graphics (fast), it crashes. 
Works without kvm (-no-kvm opt), with returns:

[EMAIL PROTECTED]:~/COISASQUEGOSTO/OS/BeOS/HAIKU$ kvm -hda haiku.image
unhandled vm exit:  0x8021
rax  rbx  rcx  rdx 
0600
rsi  rdi  rsp  rbp 

r8   r9   r10  r11 

r12  r13  r14  r15 

rip fff0 rflags 00023002
cs f000 (/ p 1 dpl 3 db 0 s 1 type 3 l 0 g 0 avl 0)
ds  (/ p 1 dpl 3 db 0 s 1 type 3 l 0 g 0 avl 0)
es  (/ p 1 dpl 3 db 0 s 1 type 3 l 0 g 0 avl 0)
ss  (/ p 1 dpl 3 db 0 s 1 type 3 l 0 g 0 avl 0)
fs  (/ p 1 dpl 3 db 0 s 1 type 3 l 0 g 0 avl 0)
gs  (/ p 1 dpl 3 db 0 s 1 type 3 l 0 g 0 avl 0)
tr  (0885/2088 p 1 dpl 0 db 0 s 0 type b l 0 g 0 avl 0)
ldt  (/ p 1 dpl 0 db 0 s 0 type 0 l 0 g 0 avl 0)
gdt 0/
idt 0/
cr0 6010 cr2 0 cr3 0 cr4 0 cr8 0 efer 0
Cancelado (core dumped)

-no-acpi dont get results. Strace -f dont return notting than a lot of ioctl 
and the crash on final. GDB returns notting more, but give-me time for a 
screenshot (attached). Versions:

[EMAIL PROTECTED]:~$ dpkg -l kvm
Desejado=U=Desconhecido/Instalar/Remover/aPagar/H=Manter
| status=Não/Instalado/arquiv.-Config./U=Descomp./Falhou-config/H=semi-inst.
|/ Erro?=(nenhum)/H=Mantido/precisa-Reinst./X=os dois problemas (status,Erro: 
maiúsculas=ruim)
||/ Nome  Versão   Descrição
+++-=-=-==
ii  kvm   16-1ubuntu2   Full 
virtualization on x86 hardware
[EMAIL PROTECTED]:~$ uname -a
Linux zorg 2.6.20-15-generic #2 SMP Sun Apr 15 07:36:31 UTC 2007 i686 GNU/Linux

Kubuntu Feisty (7.04).

--

You can respond by visiting: 
https://sourceforge.net/tracker/?func=detailatid=893831aid=1713790group_id=180599

-
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of DB2 express and take
control of your XML. No limits. Just data. Click to get it now.
http://sourceforge.net/powerbar/db2/
___
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel


Re: [kvm-devel] [PATCH 1/4] ACE documentation

2007-05-06 Thread Arnd Bergmann
On Sunday 06 May 2007, Wink Saville wrote:
 
   Thus code
   +executing within the ACE area can also be executed from user space or
   +kernel space. This is accomplished by using spin locks when executing
   +within the ACE area and changes to arch/x86_64/kernel/entry.S such that
   +when an interrupt occurs while executing code in the ACE area that code
   +will be completed before the interrupt is dispatched.
 
  I don't understand how you can write to the spinlock when coming from
  user space. If the page is writable, how do you make sure the user can't
  write malicious code or data into it?
 
 Trusted code should only be allowed access to the feature, at the moment
 it is enforced by requiring the applications to have root permissions to
 open the character device driver.

This is a serious problem. There is a reason why we normally do things
with system calls. Unless you can come up with a safe and reasonably clean
way for unprivileged applications to use your code, I don't see how you
expect it to get merged in the kernel.

  Can't you put this into the vdso? Calling into the right place sounds
  like a problem that is already solved.
 
 Possibly, but it isn't universally available, I hope to use this technique
 on other architectures.

It should be possible to implement vdso on any architecture that is still
missing it. Not easy, but it's an established way of doing things and a lot
cleaner than making up your own linkage model.
 
Arnd 

-
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of DB2 express and take
control of your XML. No limits. Just data. Click to get it now.
http://sourceforge.net/powerbar/db2/
___
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel


[kvm-devel] Error on compile userspace code

2007-05-06 Thread Jun Koi
Hello,

Now our userspace code is in git repo, and separated from kernel code?
So I think the  instruction from http://kvm.qumranet.com/kvmwiki/HOWTO
is not relevant anymore if we are to compile/install userspace code
(with qemu) from scratch?

I compiled kvm kernel first (kvm22), then pull userspace repo, then:

./configure --prefix=/usr
make

But I got error like this:

make -C kernel
make[1]: Entering directory `/home/jun/projects/kvm/userspace/kernel'
make -C /lib/modules/2.6.20-15-generic/build M=`pwd` $@
make[2]: Entering directory `/usr/src/linux-headers-2.6.20-15-generic'
make[3]: *** No rule to make target
`/home/jun/projects/kvm/userspace/kernel/svm.o', needed by
`/home/jun/projects/kvm/userspace/kernel/kvm.o'.  Stop.
make[2]: *** [_module_/home/jun/projects/kvm/userspace/kernel] Error 2
make[2]: Leaving directory `/usr/src/linux-headers-2.6.20-15-generic'
make[1]: *** [all] Error 2
make[1]: Leaving directory `/home/jun/projects/kvm/userspace/kernel'
make: *** [kernel] Error 2



Moreover, there is no README or INSTALL file in userspace repo at all.
So it is really confused on how to compile/install userspace code.

Any hint to fix this?

Thanks,
Jun

-
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of DB2 express and take
control of your XML. No limits. Just data. Click to get it now.
http://sourceforge.net/powerbar/db2/
___
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel


[kvm-devel] kvm-22 and Vista support

2007-05-06 Thread Jorge Lucángeli Obes
 The happy theme of today's kvm is the significant performance
 improvements, brought to you by a growing team of developers.  I've
 clocked kbuild at within 25% of native.  This release also introduces
 support for 32-bit Windows Vista.

 Changes from kvm-21:
 - Significant performance improvements (Anthony Liguori, Eddie Dong,
 Qing He, me)
 - Fix longstanding bug: time runs at double speed on x86_64 Linux (Qing He)
 - Windows Vista 32-bit support (Qing He, Jun Nakajima)
 - Support for kvm abi 10 modules
 - Minor updates

Hi Avi, hi all,

Let me start by congratulating you on the amazing work you are doing
with kvm. I've been using a 32-bit Windows XP guest on a 64-bit
Xubuntu Feisty host for quite some time now with no glitches at all
and extremely good performance.

I have also tried using Windows Vista with kvm. Until now, I had (of
course) the same ACPI problem as everybody. I had decided to compile
the new BIOS by hand. Imagine my suprise when I saw the third entry in
the above list =). I rushed to get my Vista Ultimate installation DVD.
The install went great, I even managed to create a user. However, I
did not get past this. After creating my user, the guest reboots (or
more precisely, it shuts down since I'm running 'no-reboot') and when
I start it again, it stops with what I believe is a real mode error:

[EMAIL PROTECTED]:~/stuff/qemu$ sudo qemu-system-x86_64 vista.img -m 512
-no-reboot -localtime -no-rtc
exception 13 (0)
rax 6010 rbx 4200 rcx 00ff rdx
0001
rsi 0180 rdi 7000 rsp 1e60 rbp
1e98
r8   r9   r10  r11

r12  r13  r14  r15

rip 9a12 rflags 00033006
cs  (/ p 1 dpl 3 db 0 s 1 type 3 l 0 g 0 avl 0)
ds  (/ p 1 dpl 3 db 0 s 1 type 3 l 0 g 0 avl 0)
es  (/ p 1 dpl 3 db 0 s 1 type 3 l 0 g 0 avl 0)
ss  (/ p 1 dpl 3 db 0 s 1 type 3 l 0 g 0 avl 0)
fs  (/ p 1 dpl 3 db 0 s 1 type 3 l 0 g 0 avl 0)
gs  (/ p 1 dpl 3 db 0 s 1 type 3 l 0 g 0 avl 0)
tr  (2085/2088 p 1 dpl 0 db 0 s 0 type b l 0 g 0 avl 0)
ldt  (/ p 1 dpl 0 db 0 s 0 type 2 l 0 g 0 avl 0)
gdt bb68/27
idt 0/3ff
cr0 6010 cr2 0 cr3 0 cr4 0 cr8 0 efer 0
Aborted

Running with 'no-kvm' manages to solve this but I don't get to the
login screen. The guest quits unexpectedly while on the Vista
bootsplash. It's a 32-bit Vista Ultimate guest on the same 64-bit
Xubuntu Feisty host, kernel 2.6.20.3 Ubuntu branch, and kvm-22
(modules and userspace).

Any ideas? Have you guys done anything special to get Vista running?
What can I do to find out what's going on?

Yours,
Jorge

-
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of DB2 express and take
control of your XML. No limits. Just data. Click to get it now.
http://sourceforge.net/powerbar/db2/
___
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel