Re: [PATCH 6/6 v3] PCI: document the change

2008-10-16 Thread Anirban Chakraborty
On Oct 13, 2008, at 9:46 PM, Matthew Wilcox wrote: On Tue, Oct 14, 2008 at 12:18:40PM +0800, Dong, Eddie wrote: Matthew Wilcox wrote: On Tue, Oct 14, 2008 at 10:14:35AM +0800, Yu Zhao wrote: As Eddie said, we have two problems here: 1) User has to set device specific parameters of a VF when

Re: [PATCH 1/3] KVM: x86: Relax accept conditions of kvm_apic_accept_pic_intr

2008-10-16 Thread Sheng Yang
On Wednesday 15 October 2008 22:27:49 Jan Kiszka wrote: > Aligning in-kernel kvm_apic_accept_pic_intr with its user space mate, > this patch relaxes the conditions under which PIC IRQs are accepted > by LVT0. This reflects reality and allows to reuse the service for the > NMI watchdog use case. > >

Re: [PATCH] qemu: qemu_fopen_fd: differentiate between reader and writer user

2008-10-16 Thread Anthony Liguori
Uri Lublin wrote: That is true, but in the case I mentioned above it would take the management tool some time (guest down time) to realize what happens, and to send "cont" to the SRC. With end-of-migration messages SRC discovers DST fails and immediately continues. I agree those messages add

[PATCH] KVM: Qemu: Define the macro CONFIG_$ARCH for building userspace.

2008-10-16 Thread Zhang, Xiantao
>From 7bba897e8f00c0d2e850e7b8f47cc491cb1f5dee Mon Sep 17 00:00:00 2001 From: Xiantao Zhang <[EMAIL PROTECTED]> Date: Fri, 17 Oct 2008 09:07:01 +0800 Subject: [PATCH] KVM: Qemu: Define the macro CONFIG_$ARCH for building userspace. Currently, make sync will use unifdef to hack some header files, b

Re: KVM can't install Windows

2008-10-16 Thread Charles Duffy
Bill Davidsen wrote: I need a Win98SE VM to do some software testing and support. Unfortunately KVM seems to not be able to run 98SE, although it runs a bunch of more recent Windows versions I can't use for this. I really don't want to support multiple VM servers, and there is pressure to go t

KVM can't install Windows

2008-10-16 Thread Bill Davidsen
I need a Win98SE VM to do some software testing and support. Unfortunately KVM seems to not be able to run 98SE, although it runs a bunch of more recent Windows versions I can't use for this. I really don't want to support multiple VM servers, and there is pressure to go to VISTA and VMware. B

Re: kvm hangs when rebooting a guest VM

2008-10-16 Thread Bernhard Schmidt
Bernhard Schmidt <[EMAIL PROTECTED]> wrote: > I have a small but annoying issue. > > Host: > * AMD Athlon64 > * Debian Lenny, Kernel 2.6.26-1-amd64 > * kvm-72 (Debian package) or kvm-76 (self-built) > > Guest: > * monolithic vanilla 2.6.26, KVM_GUEST and KVM_CLOCK, VIRTIO for both > block device

[ kvm-Bugs-2171940 ] SCSI: Windows (XP) Full Format fails to complete on SCSI

2008-10-16 Thread SourceForge.net
Bugs item #2171940, was opened at 2008-10-16 16:59 Message generated for change (Comment added) made by lvivier You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=893831&aid=2171940&group_id=180599 Please note that this message will contain a full copy of the comment t

Re: problem with pxe boot off private bridge

2008-10-16 Thread Steve Ofsthun
Stephen Dennis wrote: > Hello > > My aim is to have a VM with 2 network interfaces, one bridged to the outside > world and the other bridged on a private network. From the private interface > this VM runs DHCP and PXE services to start and install VM's which have one > network interface tapped on

[ kvm-Bugs-2088475 ] OpenSuse10.2 can not be installed

2008-10-16 Thread SourceForge.net
Bugs item #2088475, was opened at 2008-09-02 01:37 Message generated for change (Comment added) made by jiajun You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=893831&aid=2088475&group_id=180599 Please note that this message will contain a full copy of the comment th

Handle INIT before SIPI.

2008-10-16 Thread Gleb Natapov
Handle INIT before SIPI. If SIPI was issued before CPU handled INIT signal the CPU is not reseted. Signed-off-by: Gleb Natapov <[EMAIL PROTECTED]> diff --git a/qemu/qemu-kvm.c b/qemu/qemu-kvm.c index 577f2b2..dae05b0 100644 --- a/qemu/qemu-kvm.c +++ b/qemu/qemu-kvm.c @@ -349,13 +349,20

[ kvm-Bugs-2171940 ] SCSI: Windows (XP) Full Format fails to complete on SCSI

2008-10-16 Thread SourceForge.net
Bugs item #2171940, was opened at 2008-10-16 16:59 Message generated for change (Tracker Item Submitted) made by Item Submitter You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=893831&aid=2171940&group_id=180599 Please note that this message will contain a full copy

[ kvm-Bugs-2088475 ] OpenSuse10.2 can not be installed

2008-10-16 Thread SourceForge.net
Bugs item #2088475, was opened at 2008-09-02 11:37 Message generated for change (Comment added) made by technologov You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=893831&aid=2088475&group_id=180599 Please note that this message will contain a full copy of the comme

Re: [PATCH] qemu: qemu_fopen_fd: differentiate between reader and writer user

2008-10-16 Thread Uri Lublin
Avi Kivity wrote: Uri Lublin wrote: Weren't there some acks flowing back on the old protocol to let the source now things are fine? There were, but there aren't now. They don't improve reliability. Why do you think they don't improve reliability ? The Ack/Go messages catch the scenario w

Re: [PATCH] qemu: qemu_fopen_fd: differentiate between reader and writer user

2008-10-16 Thread Avi Kivity
Uri Lublin wrote: Weren't there some acks flowing back on the old protocol to let the source now things are fine? There were, but there aren't now. They don't improve reliability. Why do you think they don't improve reliability ? The Ack/Go messages catch the scenario where SRC finishes s

Re: [PATCH] qemu: qemu_fopen_fd: differentiate between reader and writer user

2008-10-16 Thread Uri Lublin
Anthony Liguori wrote: Avi Kivity wrote: Anthony Liguori wrote: Uri Lublin wrote: Anthony Liguori wrote: I have already cut your text, but I don't understand the comment about not being "full duplex". Is there a reason why migration needs to be bidirectional? I don't think there's a fund

Re: [PATCH] qemu: qemu_fopen_fd: differentiate between reader and writer user

2008-10-16 Thread Anthony Liguori
Avi Kivity wrote: Anthony Liguori wrote: Uri Lublin wrote: Anthony Liguori wrote: I have already cut your text, but I don't understand the comment about not being "full duplex". Is there a reason why migration needs to be bidirectional? I don't think there's a fundamental reason it needs

Re: [PATCH 01/10] Add CPUID feature flag for SVM v4

2008-10-16 Thread Alexander Graf
On 15.10.2008, at 21:31, Alexander Graf wrote: This patch adds the CPUID feature flag for SVM in the x86 Linux headers. Looks like the full leaf 0x8001 found its way into mainline, so this patch is not necessary anymore. Alex Signed-off-by: Alexander Graf <[EMAIL PROTECTED]> ---

Re: commit 641fb03992b20aa640781a245f6b7136f0b845e4 broke MMU

2008-10-16 Thread Alexander Graf
On 16.10.2008, at 10:58, Avi Kivity wrote: I think this was fixed by e74bb3fa8e55284dc6fdd68aa9da833ce07a4295 ("KVM: MMU: sync root on paravirt TLB flush"). Eh, yes. Sorry for the fuss - it works now. Alex -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a mes

Re: [PATCH] qemu: qemu_fopen_fd: differentiate between reader and writer user

2008-10-16 Thread Uri Lublin
Anthony Liguori wrote: Uri Lublin wrote: Anthony Liguori wrote: I have already cut your text, but I don't understand the comment about not being "full duplex". Is there a reason why migration needs to be bidirectional? I don't think there's a fundamental reason it needs to be and I think

Re: How can I tell KVM is actually using AMD-V virtualization extensions?

2008-10-16 Thread Avi Kivity
Veiko Kukk wrote: Hi! My desktop machine is HP dc5750 SFF, CPU is AMD Athlon(tm) 64 X2 Dual Core Processor 4600+, /proc/cpuinfo lists svm flag. I'm using 2.6.27 kernel on FC9, qemu-system-x86_64 "info version" 0.9.1. How can I be absolutely sure, that my kvm virtual machines are using AMD-V

RE: [patch] kvm-userland - raise max vcpus to 256 for ia64

2008-10-16 Thread Zhang, Xiantao
It needs the kernel patch I sent to mailing list yesterday. Avi, Could you check-in attached patch and queue it for 2.6.28? Thanks! Xiantao Jes Sorensen wrote: > Hi, > > We can now boot upto 60 vcpus on ia64, but thats just the beginning. > Would you please add this one to the kvm-userland tr

Re: [PATCH][RFC] Prepare virtio for upstream QEMU merging

2008-10-16 Thread Avi Kivity
Anthony Liguori wrote: But that will require refactoring a lot of these optimizations. In order to do that right, they need to be presented on qemu-devel. It's a whole lot easier to do that incrementally so that people can digest it all instead of blasting a big series. Can you elaborate?

Re: [PATCH] read UUID from qemu

2008-10-16 Thread Avi Kivity
Gleb Natapov wrote: Similar patch was sent to bochs devel list, but I propose to apply this patch now rather than waiting for bochs developers to apply it and then merger. --- Add support for new FW configuration channel to the BIOS. Read UUID from QEMU using this channel. Applied, thanks

Re: How can I tell KVM is actually using AMD-V virtualization extensions?

2008-10-16 Thread Dor Laor
Veiko Kukk wrote: Hi! My desktop machine is HP dc5750 SFF, CPU is AMD Athlon(tm) 64 X2 Dual Core Processor 4600+, /proc/cpuinfo lists svm flag. I'm using 2.6.27 kernel on FC9, qemu-system-x86_64 "info version" 0.9.1. How can I be absolutely sure, that my kvm virtual machines are using AMD-V

Re: kvm/ia64: Fix halt emulation logic.

2008-10-16 Thread Avi Kivity
Zhang, Xiantao wrote: Attached the updated one. Thanks! Xiantao From 8d827b19ba03dee74edeb5e2bcc23bed7b9f38ea Mon Sep 17 00:00:00 2001 From: Xiantao Zhang <[EMAIL PROTECTED]> Date: Thu, 16 Oct 2008 15:58:15 +0800 Subject: [PATCH] kvm/ia64: Fix halt emulation logic. Common halt halding logic is

[patch] kvm-userland - raise max vcpus to 256 for ia64

2008-10-16 Thread Jes Sorensen
Hi, We can now boot upto 60 vcpus on ia64, but thats just the beginning. Would you please add this one to the kvm-userland tree. Thanks, Jes Raise max number of vcpus for ia64 to 256. Signed-off-by: Jes Sorensen <[EMAIL PROTECTED]> --- libkvm/kvm-common.h | 11 +++ qemu/vl.c

[PATCH 1/2] KVM: MMU: Extend kvm_mmu_page->slot_bitmap size

2008-10-16 Thread Sheng Yang
Otherwise set_bit() for private memory slot(above KVM_MEMORY_SLOTS) would corrupted memory in 32bit host. Signed-off-by: Sheng Yang <[EMAIL PROTECTED]> --- arch/x86/kvm/mmu.c |6 +++--- include/asm-x86/kvm_host.h |8 +--- 2 files changed, 8 insertions(+), 6 deletions(-) diff

[PATCH 2/2] KVM: VMX: Move private memory slot position

2008-10-16 Thread Sheng Yang
PCI device assignment would map guest MMIO spaces as separate slot, so it is possible that the device has more than 2 MMIO spaces and overwrite current private memslot. The patch move private memory slot to the top of userspace visible memory slots. Signed-off-by: Sheng Yang <[EMAIL PROTECTED]> -

Re: [PATCH 1/1] kvm: fix wrong position of clean cscope

2008-10-16 Thread Avi Kivity
Sheng Yang wrote: My fault... Applied, thanks. -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

RE: kvm/ia64: Fix halt emulation logic.

2008-10-16 Thread Zhang, Xiantao
Attached the updated one. Thanks! Xiantao >From 8d827b19ba03dee74edeb5e2bcc23bed7b9f38ea Mon Sep 17 00:00:00 2001 From: Xiantao Zhang <[EMAIL PROTECTED]> Date: Thu, 16 Oct 2008 15:58:15 +0800 Subject: [PATCH] kvm/ia64: Fix halt emulation logic. Common halt halding logic is changed by x86 side, th

[PATCH 1/1] kvm: fix wrong position of clean cscope

2008-10-16 Thread Sheng Yang
My fault... Signed-off-by: Sheng Yang <[EMAIL PROTECTED]> --- Makefile |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/Makefile b/Makefile index 6581679..64e296d 100644 --- a/Makefile +++ b/Makefile @@ -110,8 +110,8 @@ srpm: clean: for i in $(if $(WANT_MODULE),

Re: kvm/ia64: Fix halt emulation logic.

2008-10-16 Thread Avi Kivity
Zhang, Xiantao wrote: smp_call_function_single() will call the function on the current cpu if instructed, so this change is unneeded. Aha, Thanks for pointing this. Yes, it is unnecessary. Could you help to remove it directly ? or need me have a resend. Please resend, since I can't tes

Re: commit 641fb03992b20aa640781a245f6b7136f0b845e4 broke MMU

2008-10-16 Thread Avi Kivity
Alexander Graf wrote: Hi, while trying to run the current openSUSE on git KVM I found that the installation doesn't even boot properly. I bisected the problem down to commit 641fb03992b20aa640781a245f6b7136f0b845e4, as of which udev shows strange errors. I reproduced the incorrect behavior

RE: kvm/ia64: Fix halt emulation logic.

2008-10-16 Thread Zhang, Xiantao
Avi Kivity wrote: > Zhang, Xiantao wrote: >> Hi, Avi >> This is the key fix for 2.6.28 merge. Without this patch, guest >> may hang once configured with more than 2 vcpus, it is because x86 >> side changed the halt handling's common logic, but it misses to >> change ia64 side. >> > >> @@ -3

Re: [PATCH][RFC] vmchannel a data channel between host and guest.

2008-10-16 Thread Gleb Natapov
On Wed, Oct 15, 2008 at 10:56:02AM -0500, Anthony Liguori wrote: > Gleb Natapov wrote: >> Andrew, >> >> On Wed, Oct 15, 2008 at 07:18:52AM -0700, Andrew Biggadike wrote: >> >>> Gleb Natapov <[EMAIL PROTECTED]> wrote: >>> > Of course, you should also take a look at VMware's VMCI. If we'

Re: kvm/ia64: Fix halt emulation logic.

2008-10-16 Thread Avi Kivity
Zhang, Xiantao wrote: Hi, Avi This is the key fix for 2.6.28 merge. Without this patch, guest may hang once configured with more than 2 vcpus, it is because x86 side changed the halt handling's common logic, but it misses to change ia64 side. @@ -398,8 +400,11 @@ static int handle_global

Re: [v2] Shared guest irq support

2008-10-16 Thread Avi Kivity
Amit Shah wrote: +#define KVM_USERSPACE_IRQ_SOURCE_ID1 << 0 + This is dangerous, if used in an expression together with a higher precedence operator. I fixed it and applied. Thanks to all involved. Thanks; however, Sheng suggested we should use set_bit to set the correspon

Re: [v2] Shared guest irq support

2008-10-16 Thread Avi Kivity
Sheng Yang wrote: +#define KVM_USERSPACE_IRQ_SOURCE_ID1 << 0 + This is dangerous, if used in an expression together with a higher precedence operator. I fixed it and applied. Thanks to all involved. Wait a minute I think I reserved source id 0 to userspace, rather than

Re: [PATCH] KVM: VMX: Move private memory slot position

2008-10-16 Thread Sheng Yang
On Thursday 16 October 2008 16:26:07 Avi Kivity wrote: > Yang, Sheng wrote: > > I've found the reason... It's because that kvm_mmu_page->slot_bitmap is > > unsigned long, and if use KVM_MEMORY_SLOTS + xxx, it would beyond 32 in > > pae, then memory corrupted. > > > > But reduce supported memory slo

Re: [PATCH][RFC] vmchannel a data channel between host and guest.

2008-10-16 Thread Gleb Natapov
On Wed, Oct 15, 2008 at 09:02:30AM -0500, Anthony Liguori wrote: >>> like struct sockaddr_un. As long as the strings were unique, they >>> could be in whatever format people wanted. >>> >>> >> So basically what you are saying is that you want to use string IDs instead >> of >> numerical ID

Re: [v2] Shared guest irq support

2008-10-16 Thread Amit Shah
* On Thursday 16 Oct 2008 13:51:38 Avi Kivity wrote: > Zhang, Xiantao wrote: > > Forget to modify the from item generated automatically by git. Modified > > to Sheng Yang <[EMAIL PROTECTED]> :) > > Xiantao > > > > From c0d1ad6327c01ba0584922022bef48c971bbf18a Mon Sep 17 00:00:00 2001 > > From: Sh

Re: [v2] Shared guest irq support

2008-10-16 Thread Sheng Yang
On Thursday 16 October 2008 16:21:38 Avi Kivity wrote: > Zhang, Xiantao wrote: > > Forget to modify the from item generated automatically by git. Modified > > to Sheng Yang <[EMAIL PROTECTED]> :) > > Xiantao > > > > From c0d1ad6327c01ba0584922022bef48c971bbf18a Mon Sep 17 00:00:00 2001 > > From:

RE: [PATCH] kvm/ia64: Makefile fix for forcing to re-generate asm-offsets.h

2008-10-16 Thread Zhang, Xiantao
Avi Kivity wrote: > Zhang, Xiantao wrote: >> Hi, Avi >> Please apply this urgent fix for 2.6.28 merge. Thanks! >> > > Applied, and will queue for 2.6.28. Is it needed for 2.6.26 and .27? > If not, why not? It should be an issue here, and also needs for 2.6.26 and 27. For end-users, it shou

Re: [PATCH] kvm/ia64: Makefile fix for forcing to re-generate asm-offsets.h

2008-10-16 Thread Avi Kivity
Zhang, Xiantao wrote: Hi, Avi Please apply this urgent fix for 2.6.28 merge. Thanks! Applied, and will queue for 2.6.28. Is it needed for 2.6.26 and .27? If not, why not? -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line "un

Re: [PATCH] KVM: VMX: Move private memory slot position

2008-10-16 Thread Avi Kivity
Yang, Sheng wrote: I've found the reason... It's because that kvm_mmu_page->slot_bitmap is unsigned long, and if use KVM_MEMORY_SLOTS + xxx, it would beyond 32 in pae, then memory corrupted. But reduce supported memory slot number to 28 or extend slot_bitmap, or other methods? Slot_bitmap hav

Re: [v2] Shared guest irq support

2008-10-16 Thread Avi Kivity
Zhang, Xiantao wrote: Forget to modify the from item generated automatically by git. Modified to Sheng Yang <[EMAIL PROTECTED]> :) Xiantao From c0d1ad6327c01ba0584922022bef48c971bbf18a Mon Sep 17 00:00:00 2001 From: Sheng Yang <[EMAIL PROTECTED]> Date: Wed, 15 Oct 2008 20:15:06 +0800 Subject:

Re: [PATCH] qemu: qemu_fopen_fd: differentiate between reader and writer user

2008-10-16 Thread Avi Kivity
Anthony Liguori wrote: Yeah, I tried to implement the read/write mode buffer and it ends up not to work very nicely. I don't remember the precise issue, but I hit some sort of wall that I thought was a fundamental limitation. I ended up forcing the QEMUFile to be in either read or write mod

Re: [PATCH] qemu: qemu_fopen_fd: differentiate between reader and writer user

2008-10-16 Thread Avi Kivity
Anthony Liguori wrote: Uri Lublin wrote: Anthony Liguori wrote: I have already cut your text, but I don't understand the comment about not being "full duplex". Is there a reason why migration needs to be bidirectional? I don't think there's a fundamental reason it needs to be and I think