[ kvm-Bugs-1985977 ] Guests crash while rebooting

2008-06-10 Thread SourceForge.net
Bugs item #1985977, was opened at 2008-06-06 10:42 Message generated for change (Comment added) made by yunfeng You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1985977&group_id=180599 Please note that this message will contain a full copy of the comment t

Re: Doubts regarding Shadow Page Table Management in KVM

2008-06-10 Thread Sukanto Ghosh
I think I have cleared the issue regarding the reverse mapping. I missed the fact, that the write permission is associated with the PTE. I thought that it was associated only with the kernel structures maintaining the physical page-frame. But I want to confirm whether a shadowed guest page re

RE: [PATCH] do not use extra env field.

2008-06-10 Thread Xu, Anthony
Avi Kivity wrote: > Glauber Costa wrote: >> There's no need to polute the already poluted CPUState >> with "ready_for_interrupt_injection". We can compute it >> in the few times we use it, and be fine. >> > >> #define CPUState CPUIA64State >> diff --git a/qemu/target-ia64/op_helper.c >> b/qemu/t

Re: Oops for sale

2008-06-10 Thread Avi Kivity
Gerd Hoffmann wrote: Avi Kivity wrote: The unshadow-on-userspace-access heuristic is broken. Since it is also bad for Xenner, try removing the following lines: spte |= PT_WRITABLE_MASK; Well, that line should better not be removed. I get a hang otherwise, guess due to running

Re: [patch] kvm with mmu notifier v18

2008-06-10 Thread Marcelo Tosatti
Hi Andrea, On Thu, Jun 05, 2008 at 06:47:17PM +0200, Andrea Arcangeli wrote: > latest version, I removed ->release already before posting the last > one because by the time vm destroy runs no more guest mode can run, so > sptes are irrelevant and no cpu can follow the secondary tlb anymore > becau

Re: KVM Test result, kernel ff5bdac.., userspace eb2fd67.. -- One New Issue

2008-06-10 Thread john cooper
Marcelo Tosatti wrote: This is a get_user_pages() with hugetlb-vma's bug, not KVM's problem, fixed by: commit 5b23dbe8173c212d6a326e35347b038705603d39 Author: Adam Litke <[EMAIL PROTECTED]> Date: Wed Nov 14 16:59:33 2007 -0800 I'd say so. Just to close the loop here, attached is a trivial pa

RE: [PATCH 0/4][VTD] kvm vt-d support kernel changes

2008-06-10 Thread Kay, Allen M
Muli, The userpsace branch is located at: git.kernel.org/pub/scm/linux/kernel/git/amit/kvm-userspace.git vtd I forgot to send out the userspace patch last night. :-) Allen >-Original Message- >From: Muli Ben-Yehuda [mailto:[EMAIL PROTECTED] >Sent: Tuesday, June 10, 2008 5:53 AM >To: K

[PATCH 1/1][VTD] vt-d userspace patch

2008-06-10 Thread Kay, Allen M
Added vtd.o to Kbuild. Signed-off-by: Allen M. Kay <[EMAIL PROTECTED]> - Vt-d userspace branch located at: git.kernel.org/pub/scm/linux/kernel/git/amit/kvm-userspace.git vtd vtd_userspace.patch Description: vtd_userspace.patch

[PATCH 2 of 2] Create dyngen dependency for exec.o for those who still have dyngen

2008-06-10 Thread Jerone Young
1 file changed, 2 insertions(+) qemu/Makefile.target |2 ++ This patch adds a make file dependency for compiling exec.c with archs that still have dyngen dependencies. This allows powerpc qemu to now compile without the --disable-cpu-emulation flag. Signed-off-by: Jerone Young <[EMAIL PROT

[PATCH 0 of 2] Remove --disable-cpu-emulation for qemu

2008-06-10 Thread Jerone Young
These patches remove all traces of --disable-cpu-emulation configuration flag. Signed-off-by: Jerone Young <[EMAIL PROTECTED]> 6 files changed, 2 insertions(+), 227 deletions(-) qemu/Makefile.target |6 -- qemu/configure | 13 - qemu/target-i386/fake-exec.c | 54 --

[PATCH 1 of 2] Remove qemu files and entries associated with --disable-cpu-emulation configure argument

2008-06-10 Thread Jerone Young
6 files changed, 227 deletions(-) qemu/Makefile.target |4 - qemu/configure | 13 - qemu/target-i386/fake-exec.c | 54 - qemu/target-ia64/fake-exec.c | 44 - qemu/target-ppc/fake-exec.c | 104 -

Re: KVM: MMU: large page update_pte issue with non-PAE 32-bit guests

2008-06-10 Thread Marcelo Tosatti
On Tue, Jun 10, 2008 at 12:33:49AM +0200, Andrea Arcangeli wrote: > On Sun, Jun 08, 2008 at 11:35:49PM -0300, Marcelo Tosatti wrote: > > > > kvm_mmu_pte_write() does not handle 32-bit non-PAE large page backed > > guests properly. It will instantiate two 2MB sptes pointing to the same > > physical

Re: [PATCH 4/4][VTD] vt-d specific files in KVM

2008-06-10 Thread Muli Ben-Yehuda
On Tue, Jun 10, 2008 at 10:24:06AM -0500, Anthony Liguori wrote: > If you add the MMIO page to the IOMMU table, then the behavior is > going to be identical to what occurs on bare metal which IMHO is a > good thing. Why jump through hoops to change what may or may not be > an error condition inste

Re: [PATCH 4/4][VTD] vt-d specific files in KVM

2008-06-10 Thread Anthony Liguori
Muli Ben-Yehuda wrote: On Tue, Jun 10, 2008 at 10:02:45AM -0500, Anthony Liguori wrote: Why? Wouldn't MMIO pages have to be mapped in the VT-d page table in order to support pass-through? It certainly can't hurt, can it? By MMIO pages we refer to pages which are mapped (or can mappe

Re: [PATCH 4/4][VTD] vt-d specific files in KVM

2008-06-10 Thread Muli Ben-Yehuda
On Tue, Jun 10, 2008 at 10:02:45AM -0500, Anthony Liguori wrote: > Why? Wouldn't MMIO pages have to be mapped in the VT-d page table > in order to support pass-through? It certainly can't hurt, can it? By MMIO pages we refer to pages which are mapped (or can mapped) to device MMIO regions. In o

Re: [PATCH 4/4][VTD] vt-d specific files in KVM

2008-06-10 Thread Anthony Liguori
Muli Ben-Yehuda wrote: On Tue, Jun 10, 2008 at 09:26:04AM -0500, Anthony Liguori wrote: Checking against pfn_valid() isn't enough to differentiate between RAM and MMIO areas. I think the consensus was that we also need to check PageReserved(), i.e., if (pfn_valid(pfn) && !PageReserved(pfn_t

Re: [PATCH 4/4][VTD] vt-d specific files in KVM

2008-06-10 Thread Muli Ben-Yehuda
On Tue, Jun 10, 2008 at 09:26:04AM -0500, Anthony Liguori wrote: >> Checking against pfn_valid() isn't enough to differentiate between >> RAM and MMIO areas. I think the consensus was that we also need to >> check PageReserved(), i.e., >> >> if (pfn_valid(pfn) && !PageReserved(pfn_to_page(pfn))) .

Doubts regarding Shadow Page Table Management in KVM

2008-06-10 Thread Sukanto Ghosh
Hi all, I was reading the "The shadowy depths of the KVM MMU" presentation by Avi Kivity. From my understanding of shadow page-table, Guest Page Table : maps GV -> GP Shadow Page Table : maps GV -> HP What is meant by shadowed guest page ? (Does it refer to : the guest PT pages that h

[ROM] virtio-net etherboot ROM

2008-06-10 Thread Laurent Vivier
You can find attached to this e-mail an etherboot ROM supporting virtio-net device. Laurent -- - [EMAIL PROTECTED] --- "The best way to predict the future is to invent it." - Alan Kay pxe-virtio.bin Description: Binary data

[PATCH] Add virtio-net driver

2008-06-10 Thread Laurent Vivier
This patch allows to boot from network using the virtio-net adapter provided by KVM. It applies on etherboot-5.4 sources from git://git.etherboot.org/scm/etherboot.git [why etherboot-5.4 ? because it doesn't hang like gPXE and ROM size is only 32 KB] Signed-off-by: Laurent Vivier <[EMAIL PROTE

Re: [PATCH 4/4][VTD] vt-d specific files in KVM

2008-06-10 Thread Anthony Liguori
Muli Ben-Yehuda wrote: On Mon, Jun 09, 2008 at 05:43:15PM -0700, Kay, Allen M wrote: vt-d specific files in KVM for contructing vt-d page tables and programming vt-d context entries. Hi Allen, Some comments below, patches will follow up. Signed-off-by: Allen M. Kay <[EMAIL PROTE

[PATCH] Do not calculate linear rip in emulation failure report

2008-06-10 Thread Glauber Costa
If we're not gonna do anything (case in which failure is already reported), we do not need to even bother with calculating the linear rip. This is a nitpick, but I saw it while doing some testing, so here's the patch. Signed-off-by: Glauber Costa <[EMAIL PROTECTED]> --- arch/x86/kvm/x86.c |4

Re: [PATCH]: Fake emulate Intel perfctr MSRs

2008-06-10 Thread Chris Lalancette
Chris Lalancette wrote: > Attached is a patch for fake emulating Intel perfctr MSRs, similar to the > recent > patch to fake emulate the AMD perfctr MSRs. This is needed for a reason > similar > for the previous patch; older linux guests (in this case, 2.6.9) can attempt > to > access the MSR's

Re: [PATCH 0/4][VTD] kvm vt-d support kernel changes

2008-06-10 Thread Muli Ben-Yehuda
On Mon, Jun 09, 2008 at 05:39:12PM -0700, Kay, Allen M wrote: > Following four patches contains changes for enabling VT-d PCI > passthrough. The patches are located at: > > git.kernel.org/pub/scm/linux/kernel/git/amit/kvm.git vtd Allen, which userspace tree did you test this against (branch and

Re: [PATCH 4/4][VTD] vt-d specific files in KVM

2008-06-10 Thread Muli Ben-Yehuda
On Mon, Jun 09, 2008 at 05:43:15PM -0700, Kay, Allen M wrote: > vt-d specific files in KVM for contructing vt-d page tables and > programming vt-d context entries. Hi Allen, Some comments below, patches will follow up. > Signed-off-by: Allen M. Kay <[EMAIL PROTECTED]> > > diff --git a/arch/x86

Re: [PATCH 2/4][VTD] modifications to intel-iommu.c.

2008-06-10 Thread Muli Ben-Yehuda
On Mon, Jun 09, 2008 at 05:41:29PM -0700, Kay, Allen M wrote: > Modification to intel-iommu.c to support vt-d page table and context > table mapping in kvm. Mods to dmar.c and iova.c are due to header > file moves to include/linux. Hi Allen, Minor comments below, patches to follow up. > Signed

migration amd -> intel

2008-06-10 Thread Thomas Mueller
hi in the wiki i read that migration fro amd to intel and back should work. i tried it several times an i get an error (kernel 2.6.25 / kvm-69): host a) /usr/bin/kvm -drive file=drive0.qcow2,media=disk,boot=on,if=ide -net tap,ifname=vnet2 -net nic,model=e1000,macaddr=00:16:3e:7d:8e:96 -monit

[RFC]RE: [PATCH] kvm-ia64 irq assignment 1/2 kernel

2008-06-10 Thread Xu, Anthony
Thanks for comments Basically we are on the same page, while I didn't find your patch about irq assignment, can you post it in this thread again, thx? Below patch makes all PCI devices use level-trigger , active low interrupt, it worked well when running linux guest, I didn't try windows guest yet

Re: [PATCH] kvm-ia64 irq assignment 1/2 kernel

2008-06-10 Thread Alexander Graf
On Jun 10, 2008, at 8:33 AM, Xu, Anthony wrote: Avi Kivity wrote: I suggest modifying the firmware to report the interrupts as active high. Since Xen does not emulate polarity, the change will not affect it and the firmware can continue to be shared. I'd also recommend fixing Xen to emul