[PATCH] kvm: qemu: fix framebuffer address range

2008-12-14 Thread Avi Kivity
From: Avi Kivity a...@redhat.com typo, missing zero. Signed-off-by: Avi Kivity a...@redhat.com diff --git a/qemu/qemu-kvm.c b/qemu/qemu-kvm.c index 121873e..c5a5880 100644 --- a/qemu/qemu-kvm.c +++ b/qemu/qemu-kvm.c @@ -803,7 +803,7 @@ static int must_use_aliases_target(target_phys_addr_t addr)

[PATCH] kvm: qemu: Switch to KVM_CAP_USER_NMI

2008-12-14 Thread Avi Kivity
From: Jan Kiszka jan.kis...@siemens.com Adopt to new KVM_CAP_USER_NMI interface for injecting NMIs from qemu user space. As this capability is only provided on archs actually requiring it, we can also drop a lot of empty arch stubs. Signed-off-by: Jan Kiszka jan.kis...@siemens.com Signed-off-by:

[PATCH] kvm: qemu: virtio: enable VIRTIO_ZERO_COPY

2008-12-14 Thread Avi Kivity
From: Mark McLoughlin mar...@redhat.com Fixes an oops in the bounce buffer malloc in virtqueue_pop() I have seen twice so far. We still need to track this down, but it's very hard to reproduce. Signed-off-by: Mark McLoughlin mar...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com diff --git

[PATCH] KVM: x86: Rework user space NMI injection as KVM_CAP_USER_NMI

2008-12-14 Thread Avi Kivity
From: Jan Kiszka jan.kis...@siemens.com There is no point in doing the ready_for_nmi_injection/ request_nmi_window dance with user space. First, we don't do this for in-kernel irqchip anyway, while the code path is the same as for user space irqchip mode. And second, there is nothing to loose if

[PATCH] kvm: qemu: ppc: fix configure enabling kvm for ppc

2008-12-14 Thread Avi Kivity
From: Christian Ehrhardt ehrha...@linux.vnet.ibm.com The configure script is missing the target/host cpu sync for powerpc kvm. Signed-off-by: Christian Ehrhardt ehrha...@linux.vnet.ibm.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/qemu/configure b/qemu/configure index

[PATCH] kvm: qemu: Update VGA display for whole Video memory for kvm/ia64

2008-12-14 Thread Avi Kivity
From: root r...@vti-demo.(none) Since ia64 use 64K page size by default and each bank memory only has 32K size , so VGA optimization for legacy mmio range 0xa-0xc doesn't work. Comment out the code for ia64. Before adding the dirty log machanism, always update Videmo memory to make

[PATCH] kvm: qemu: ppc: use virtio-blk header

2008-12-14 Thread Avi Kivity
From: Christian Ehrhardt ehrha...@linux.vnet.ibm.com virtio_blk_init now is in a separate header Signed-off-by: Christian Ehrhardt ehrha...@linux.vnet.ibm.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/qemu/hw/ppc440_bamboo.c b/qemu/hw/ppc440_bamboo.c index 79e4ea8..57d04f9 100644

[PATCH] kvm: libkvm: Add the stub for kvm_{create, destroy}_memory_alias for ia64.

2008-12-14 Thread Avi Kivity
From: root r...@vti-demo.(none) Signed-off-by: Xiantao Zhang xiantao.zh...@intel.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/libkvm/libkvm-ia64.c b/libkvm/libkvm-ia64.c index f3afc56..2f15675 100644 --- a/libkvm/libkvm-ia64.c +++ b/libkvm/libkvm-ia64.c @@ -67,3 +67,16 @@ void

[PATCH 02/36] KVM: x86 emulator: consolidate emulation of two operand instructions

2008-12-14 Thread Avi Kivity
No need to repeat the same assembly block over and over. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/x86_emulate.c | 79 +++ 1 files changed, 28 insertions(+), 51 deletions(-) diff --git a/arch/x86/kvm/x86_emulate.c

[PATCH 01/36] KVM: x86 emulator: reduce duplication in one operand emulation thunks

2008-12-14 Thread Avi Kivity
Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/x86_emulate.c | 66 +++ 1 files changed, 23 insertions(+), 43 deletions(-) diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c index 8f60ace..5f87d3e 100644 ---

[PATCH 00/36] KVM Updates for 2.6.29 (part 3 of 3)

2008-12-14 Thread Avi Kivity
This is the third batch of the 2.6.29 merge window queue. Amit Shah (1): KVM: x86 emulator: Fix handling of VMMCALL instruction Avi Kivity (8): KVM: x86 emulator: reduce duplication in one operand emulation thunks KVM: x86 emulator: consolidate emulation of two operand instructions KVM:

[PATCH 09/36] KVM: x86 emulator: fix ret emulation

2008-12-14 Thread Avi Kivity
'ret' did not set the operand type or size for the destination, so writeback ignored it. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/x86_emulate.c |2 ++ 1 files changed, 2 insertions(+), 0 deletions(-) diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c

[PATCH 07/36] KVM: x86 emulator: allow pop from mmio

2008-12-14 Thread Avi Kivity
Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/x86_emulate.c |6 +++--- 1 files changed, 3 insertions(+), 3 deletions(-) diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c index 2555762..70242f5 100644 --- a/arch/x86/kvm/x86_emulate.c +++

[PATCH 04/36] KVM: s390: Fix memory leak of vcpu-run

2008-12-14 Thread Avi Kivity
From: Christian Borntraeger borntrae...@de.ibm.com The s390 backend of kvm never calls kvm_vcpu_uninit. This causes a memory leak of vcpu-run pages. Lets call kvm_vcpu_uninit in kvm_arch_vcpu_destroy to free the vcpu-run. Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com Acked-by:

[PATCH 06/36] KVM: x86 emulator: Extract 'pop' sequence into a function

2008-12-14 Thread Avi Kivity
Switch 'pop r/m' instruction to use the new function. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/x86_emulate.c | 21 + 1 files changed, 17 insertions(+), 4 deletions(-) diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c index

[PATCH 14/36] KVM: remove the IRQ ACK notifier assertions

2008-12-14 Thread Avi Kivity
From: Mark McLoughlin mar...@redhat.com We will obviously never pass a NULL struct kvm_irq_ack_notifier* to this functions. They are always embedded in the assigned device structure, so the assertion add nothing. The irqchip_in_kernel() assertion is very out of place - clearly this little

[PATCH 11/36] KVM: Remove extraneous semicolon after do/while

2008-12-14 Thread Avi Kivity
Notices by Guillaume Thouvenin. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/x86_emulate.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c index e8c87cc..69b330b 100644 ---

[PATCH 10/36] KVM: x86 emulator: fix popf emulation

2008-12-14 Thread Avi Kivity
Set operand type and size to get correct writeback behavior. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/x86_emulate.c |2 ++ 1 files changed, 2 insertions(+), 0 deletions(-) diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c index 72ae86b..e8c87cc 100644

[PATCH 15/36] KVM: make kvm_unregister_irq_ack_notifier() safe

2008-12-14 Thread Avi Kivity
From: Mark McLoughlin mar...@redhat.com We never pass a NULL notifier pointer here, but we may well pass a notifier struct which hasn't previously been registered. Guard against this by using hlist_del_init() which will not do anything if the node hasn't been added to the list and, when removing

[PATCH 17/36] KVM: add KVM_USERSPACE_IRQ_SOURCE_ID assertions

2008-12-14 Thread Avi Kivity
From: Mark McLoughlin mar...@redhat.com Make sure kvm_request_irq_source_id() never returns KVM_USERSPACE_IRQ_SOURCE_ID. Likewise, check that kvm_free_irq_source_id() never accepts KVM_USERSPACE_IRQ_SOURCE_ID. Signed-off-by: Mark McLoughlin mar...@redhat.com Signed-off-by: Avi Kivity

[PATCH 05/36] KVM: Prevent trace call into unloaded module text

2008-12-14 Thread Avi Kivity
From: Wu Fengguang fengguang...@intel.com Add marker_synchronize_unregister() before module unloading. This prevents possible trace calls into unloaded module text. Signed-off-by: Wu Fengguang w...@linux.intel.com Signed-off-by: Avi Kivity a...@redhat.com --- virt/kvm/kvm_trace.c |1 + 1

[PATCH 33/36] KVM: MMU: collapse remote TLB flushes on root sync

2008-12-14 Thread Avi Kivity
From: Marcelo Tosatti mtosa...@redhat.com Collapse remote TLB flushes on root sync. kernbench is 2.7% faster on 4-way guest. Improvements have been seen with other loads such as AIM7. Signed-off-by: Marcelo Tosatti mtosa...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com ---

[PATCH 18/36] KVM: split out kvm_free_assigned_irq()

2008-12-14 Thread Avi Kivity
From: Mark McLoughlin mar...@redhat.com Split out the logic corresponding to undoing assign_irq() and clean it up a bit. Signed-off-by: Mark McLoughlin mar...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com --- virt/kvm/kvm_main.c | 29 ++--- 1 files changed, 22

[PATCH 16/36] KVM: don't fee an unallocated irq source id

2008-12-14 Thread Avi Kivity
From: Mark McLoughlin mar...@redhat.com Set assigned_dev-irq_source_id to -1 so that we can avoid freeing a source ID which we never allocated. Signed-off-by: Mark McLoughlin mar...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com --- virt/kvm/kvm_main.c |7 +-- 1 files changed, 5

[PATCH 25/36] KVM: Really remove a slot when a user ask us so

2008-12-14 Thread Avi Kivity
From: Glauber Costa glom...@redhat.com Right now, KVM does not remove a slot when we do a register ioctl for size 0 (would be the expected behaviour). Instead, we only mark it as empty, but keep all bitmaps and allocated data structures present. It completely nullifies our chances of reusing

[PATCH 31/36] KVM: x86 emulator: Fix handling of VMMCALL instruction

2008-12-14 Thread Avi Kivity
From: Amit Shah amit.s...@redhat.com The VMMCALL instruction doesn't get recognised and isn't processed by the emulator. This is seen on an Intel host that tries to execute the VMMCALL instruction after a guest live migrates from an AMD host. Signed-off-by: Amit Shah amit.s...@redhat.com

[PATCH 12/36] KVM: fix sparse warning

2008-12-14 Thread Avi Kivity
From: Hannes Eder han...@hanneseder.net Impact: make global function static virt/kvm/kvm_main.c:85:6: warning: symbol 'kvm_rebooting' was not declared. Should it be static? Signed-off-by: Hannes Eder han...@hanneseder.net Signed-off-by: Avi Kivity a...@redhat.com --- virt/kvm/kvm_main.c |

[PATCH 35/36] KVM: MMU: prepopulate the shadow on invlpg

2008-12-14 Thread Avi Kivity
From: Marcelo Tosatti mtosa...@redhat.com If the guest executes invlpg, peek into the pagetable and attempt to prepopulate the shadow entry. Also stop dirty fault updates from interfering with the fork detector. 2% improvement on RHEL3/AIM7. Signed-off-by: Marcelo Tosatti mtosa...@redhat.com

[PATCH 13/36] KVM: VMX: fix sparse warning

2008-12-14 Thread Avi Kivity
From: Hannes Eder han...@hanneseder.net Impact: make global function static arch/x86/kvm/vmx.c:134:3: warning: symbol 'vmx_capability' was not declared. Should it be static? Signed-off-by: Hannes Eder han...@hanneseder.net Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/vmx.c |

[PATCH 36/36] x86: KVM guest: kvm_get_tsc_khz: return khz, not lpj

2008-12-14 Thread Avi Kivity
From: Eduardo Habkost ehabk...@redhat.com kvm_get_tsc_khz() currently returns the previously-calculated preset_lpj value, but it is in loops-per-jiffy, not kHz. The current code works correctly only when HZ=1000. Signed-off-by: Eduardo Habkost ehabk...@redhat.com Signed-off-by: Avi Kivity

[PATCH 20/36] powerpc/44x: declare tlb_44x_index for use in C code

2008-12-14 Thread Avi Kivity
From: Hollis Blanchard holl...@us.ibm.com KVM currently ignores the host's round robin TLB eviction selection, instead maintaining its own TLB state and its own round robin index. However, by participating in the normal 44x TLB selection, we can drop the alternate TLB processing in KVM. This

[PATCH 28/36] KVM: x86 emulator: add a new implied 1 Src decode type

2008-12-14 Thread Avi Kivity
From: Guillaume Thouvenin guillaume.thouve...@ext.bull.net Add SrcOne operand type when we need to decode an implied '1' like with regular shift instruction Signed-off-by: Guillaume Thouvenin guillaume.thouve...@ext.bull.net Signed-off-by: Avi Kivity a...@redhat.com ---

[PATCH 23/36] KVM: ppc: Implement in-kernel exit timing statistics

2008-12-14 Thread Avi Kivity
From: Hollis Blanchard holl...@us.ibm.com Existing KVM statistics are either just counters (kvm_stat) reported for KVM generally or trace based aproaches like kvm_trace. For KVM on powerpc we had the need to track the timings of the different exit types. While this could be achieved parsing data

[PATCH 30/36] KVM: x86 emulator: add the emulation of shld and shrd instructions

2008-12-14 Thread Avi Kivity
From: Guillaume Thouvenin guillaume.thouve...@ext.bull.net Add emulation of shld and shrd instructions Signed-off-by: Guillaume Thouvenin guillaume.thouve...@ext.bull.net Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/x86_emulate.c | 17 +++-- 1 files changed, 15

[PATCH 29/36] KVM: x86 emulator: add the assembler code for three operands

2008-12-14 Thread Avi Kivity
From: Guillaume Thouvenin guillaume.thouve...@ext.bull.net Add the assembler code for instruction with three operands and one operand is stored in ECX register Signed-off-by: Guillaume Thouvenin guillaume.thouve...@ext.bull.net Signed-off-by: Avi Kivity a...@redhat.com ---

[PATCH 32/36] KVM: MMU: use page array in unsync walk

2008-12-14 Thread Avi Kivity
From: Marcelo Tosatti mtosa...@redhat.com Instead of invoking the handler directly collect pages into an array so the caller can work with it. Simplifies TLB flush collapsing. Signed-off-by: Marcelo Tosatti mtosa...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com ---

Re: [PATCH] kvm-userspace: Switch to KVM_CAP_USER_NMI

2008-12-14 Thread Avi Kivity
Jan Kiszka wrote: [Hope I will not cause troubles to other archs this time.] Adopt to new KVM_CAP_USER_NMI interface for injecting NMIs from qemu user space. As this capability is only provided on archs actually requiring it, we can also drop a lot of empty arch stubs. Applied, thanks. --

Re: [PATCH 0 of 6] powerpc updates to kvm-userspace

2008-12-14 Thread Avi Kivity
Christian Ehrhardt wrote: This patch series fixes kvm-userspace to build for powerpc again. It also aligns some code to match qemu upstream (where some ppc patches went in). Applied all, thanks. -- error compiling committee.c: too many arguments to function -- To unsubscribe from this

Re: [PATCH] kvm: qemu: virtio: enable VIRTIO_ZERO_COPY

2008-12-14 Thread Avi Kivity
Mark McLoughlin wrote: Anthony intended to enable VIRTIO_ZERO_COPY before submitting, so do that now. Fixes an oops in the bounce buffer malloc in virtqueue_pop() I have seen twice so far. We still need to track this down, but it's very hard to reproduce. Applied, thanks. -- error

[PATCH] Vmchannel PCI device.

2008-12-14 Thread Gleb Natapov
There is a need for communication channel between host and various agents that are running inside a VM guest. The channel will be used for statistic gathering, logging, cut paste, host screen resolution changes notification, guest configuration etc. It is undesirable to use TCP/IP for this

[PATCH] AF_VMCHANNEL address family for guest-host communication.

2008-12-14 Thread Gleb Natapov
There is a need for communication channel between host and various agents that are running inside a VM guest. The channel will be used for statistic gathering, logging, cut paste, host screen resolution changes notifications, guest configuration etc. It is undesirable to use TCP/IP for this

Re: [PATCH 1 of 6] [PATCH] kvm-userspace: ppc: fix compatfd build decision

2008-12-14 Thread Avi Kivity
qemu-kvm.c uses qemu_eventfd/qemu_signalfd. The code of compatfd takes care if CONFIG_eventfd/CONFIG_signalfd is really enabled. But currently compatfd is not build if --disable-aio is set. This patch lets compatfd.c build if USE_KVM is set to allow qemu-kvm to be linked in all cases

Re: [Qemu-devel] [PATCH] Vmchannel PCI device.

2008-12-14 Thread Gleb Natapov
On Sun, Dec 14, 2008 at 02:28:23PM +0200, Blue Swirl wrote: On 12/14/08, Gleb Natapov g...@redhat.com wrote: There is a need for communication channel between host and various agents that are running inside a VM guest. The channel will be used for statistic gathering, logging, cut paste,

[ kvm-Bugs-2411975 ] Vista can not boot up on PAE host

2008-12-14 Thread SourceForge.net
Bugs item #2411975, was opened at 2008-12-09 17:24 Message generated for change (Comment added) made by avik You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2411975group_id=180599 Please note that this message will contain a full copy of the comment

[ kvm-Bugs-2411975 ] Vista can not boot up on PAE host

2008-12-14 Thread SourceForge.net
Bugs item #2411975, was opened at 2008-12-09 17:24 Message generated for change (Settings changed) made by avik You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2411975group_id=180599 Please note that this message will contain a full copy of the comment

Re: [Qemu-devel] [PATCH] Vmchannel PCI device.

2008-12-14 Thread Blue Swirl
On 12/14/08, Gleb Natapov g...@redhat.com wrote: There is a need for communication channel between host and various agents that are running inside a VM guest. The channel will be used for statistic gathering, logging, cut paste, host screen resolution changes notification, guest

Re: [PATCH] AF_VMCHANNEL address family for guest-host communication.

2008-12-14 Thread Evgeniy Polyakov
Hi Gleb. On Sun, Dec 14, 2008 at 01:50:55PM +0200, Gleb Natapov (g...@redhat.com) wrote: There is a need for communication channel between host and various agents that are running inside a VM guest. The channel will be used for statistic gathering, logging, cut paste, host screen resolution

Re: [PATCH] AF_VMCHANNEL address family for guest-host communication.

2008-12-14 Thread Gleb Natapov
Hi Evgeniy, On Sun, Dec 14, 2008 at 03:23:20PM +0300, Evgeniy Polyakov wrote: On Sun, Dec 14, 2008 at 01:50:55PM +0200, Gleb Natapov (g...@redhat.com) wrote: There is a need for communication channel between host and various agents that are running inside a VM guest. The channel will be

[ kvm-Bugs-1971512 ] failure to migrate guests with more than 4GB of RAM

2008-12-14 Thread SourceForge.net
Bugs item #1971512, was opened at 2008-05-25 00:45 Message generated for change (Comment added) made by avik You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=1971512group_id=180599 Please note that this message will contain a full copy of the comment

Re: [PATCH 2 of 5] add can_dma/post_dma for direct IO

2008-12-14 Thread Andrea Arcangeli
On Sat, Dec 13, 2008 at 03:11:57PM -0600, Anthony Liguori wrote: cause an overflow. You will naturally validate this in the map() function because you cannot map something that is greater than can fit in a void *. When you told me to pass ram_addr_t instead of size_t in my patch, I didn't

Re: [PATCH 2 of 5] add can_dma/post_dma for direct IO

2008-12-14 Thread Avi Kivity
Andrea Arcangeli wrote: To me map/unmap looks backwards. There's absolutely no point at all to pretend that RAM isn't always mapped. Actually, with Xen, RAM may be unmapped due do Xen limitations when qemu runs on dom0 mode. But I think map/unmap makes sense even disregarding Xen: if we

Re: [PATCH 2 of 5] add can_dma/post_dma for direct IO

2008-12-14 Thread Andrea Arcangeli
On Sun, Dec 14, 2008 at 07:01:38PM +0200, Avi Kivity wrote: Actually, with Xen, RAM may be unmapped due do Xen limitations when qemu runs on dom0 mode. But I think map/unmap makes sense even disregarding I realize xen 32bit has issues... Qemu/KVM 32bit also has the same issues but there's no

Re: [Qemu-devel] Re: [PATCH 2 of 5] add can_dma/post_dma for direct IO

2008-12-14 Thread Jamie Lokier
Anthony Liguori wrote: Let me clarify this a bit more. The problem we're trying to address today is the encapsulating knowledge of phys_ram_base. We want to minimize the amount of code that makes any assumptions about phys_ram_base. Your current API still accesses phys_ram_base directly

Re: [Qemu-devel] Re: [PATCH 2 of 5] add can_dma/post_dma for direct IO

2008-12-14 Thread Anthony Liguori
Avi Kivity wrote: Anthony Liguori wrote: There are N users of this code, all of which would need to cope with the failure. Or there could be one user (dma.c) which handles the failure and the bouncing. N should be small long term. It should only be for places that would interact

Re: [Qemu-devel] [PATCH] Vmchannel PCI device.

2008-12-14 Thread Anthony Liguori
Gleb Natapov wrote: On Sun, Dec 14, 2008 at 02:28:23PM +0200, Blue Swirl wrote: On 12/14/08, Gleb Natapov g...@redhat.com wrote: There is a need for communication channel between host and various agents that are running inside a VM guest. The channel will be used for statistic

Re: [PATCH] Vmchannel PCI device.

2008-12-14 Thread Anthony Liguori
Gleb Natapov wrote: diff --git a/hw/pc.c b/hw/pc.c index 73dd8bc..57e3b1d 100644 --- a/hw/pc.c +++ b/hw/pc.c @@ -1095,7 +1095,7 @@ static void pc_init1(ram_addr_t ram_size, int vga_ram_size, } } -/* Add virtio block devices */ +/* Add virtio devices */ Please don't

Re: [Qemu-devel] [PATCH] Vmchannel PCI device.

2008-12-14 Thread Gleb Natapov
On Sun, Dec 14, 2008 at 01:15:42PM -0600, Anthony Liguori wrote: Gleb Natapov wrote: On Sun, Dec 14, 2008 at 02:28:23PM +0200, Blue Swirl wrote: On 12/14/08, Gleb Natapov g...@redhat.com wrote: There is a need for communication channel between host and various agents that are

Re: [Qemu-devel] Re: [PATCH 2 of 5] add can_dma/post_dma for direct IO

2008-12-14 Thread Avi Kivity
Anthony Liguori wrote: I've thought quite a bit about it, and I'm becoming less convinced that this sort of API is going to be helpful. I was thinking that we need to make one minor change to the map API I proposed. It should return a mapped size as an output parameter and take a flag as to

Re: [PATCH 2 of 5] add can_dma/post_dma for direct IO

2008-12-14 Thread Avi Kivity
Andrea Arcangeli wrote: On Sun, Dec 14, 2008 at 07:01:38PM +0200, Avi Kivity wrote: Actually, with Xen, RAM may be unmapped due do Xen limitations when qemu runs on dom0 mode. But I think map/unmap makes sense even disregarding I realize xen 32bit has issues... Qemu/KVM 32bit also

Re: [Qemu-devel] [PATCH] Vmchannel PCI device.

2008-12-14 Thread Daniel P. Berrange
On Sun, Dec 14, 2008 at 01:15:42PM -0600, Anthony Liguori wrote: Gleb Natapov wrote: On Sun, Dec 14, 2008 at 02:28:23PM +0200, Blue Swirl wrote: On 12/14/08, Gleb Natapov g...@redhat.com wrote: There is a need for communication channel between host and various agents that are

Re: [Qemu-devel] [PATCH] Vmchannel PCI device.

2008-12-14 Thread Anthony Liguori
Gleb Natapov wrote: On Sun, Dec 14, 2008 at 01:15:42PM -0600, Anthony Liguori wrote: I don't know why do you think that we are going to use that for closed code or something. It will be used by libvirt and it is open source last I checked. For what? vmchannel was developed for SPICE,

Re: [Qemu-devel] [PATCH] Vmchannel PCI device.

2008-12-14 Thread Anthony Liguori
Daniel P. Berrange wrote: On Sun, Dec 14, 2008 at 01:15:42PM -0600, Anthony Liguori wrote: One non-QEMU backend I can see being implemented is a DBus daemon, providing a simple bus for RPC calls between guests host. The main problem with external backends is that they cannot easily

Re: [Qemu-devel] Re: [PATCH 2 of 5] add can_dma/post_dma for direct IO

2008-12-14 Thread Anthony Liguori
Avi Kivity wrote: Anthony Liguori wrote: I've thought quite a bit about it, and I'm becoming less convinced that this sort of API is going to be helpful. I was thinking that we need to make one minor change to the map API I proposed. It should return a mapped size as an output parameter and

Re: [Qemu-devel] [PATCH] Vmchannel PCI device.

2008-12-14 Thread Daniel P. Berrange
On Sun, Dec 14, 2008 at 04:56:49PM -0600, Anthony Liguori wrote: Daniel P. Berrange wrote: On Sun, Dec 14, 2008 at 01:15:42PM -0600, Anthony Liguori wrote: One non-QEMU backend I can see being implemented is a DBus daemon, providing a simple bus for RPC calls between guests host. The

Poor write- and overall performance

2008-12-14 Thread Arne Kepp
Hi, I'm testing KVM 80 (prepackaged from lfarkas.org) on CentOS 5.2 (both guest and host) and comparing against Xen 3.3.0. The only modification I've really made is that I've set noatime on both guest and host. The guest is running straight from an LVM volume and is assigned 4 Gb RAM and 4

Re: [Qemu-devel] [PATCH] Vmchannel PCI device.

2008-12-14 Thread Paul Brook
On Sunday 14 December 2008, Gleb Natapov wrote: There is a need for communication channel between host and various agents that are running inside a VM guest. The channel will be used for statistic gathering, logging, cut paste, host screen resolution changes notification, guest configuration

Re: [Qemu-devel] Re: [PATCH 2 of 5] add can_dma/post_dma for direct IO

2008-12-14 Thread Paul Brook
That's pointless; cirrus for example has 8MB of mmio while a cpu-to-vram blit is in progress, and some random device we'll add tomorrow could easily introduce more. Our APIs shouldn't depend on properties of emulated hardware, at least as much as possible. One way to think of what I'm

Re: [Qemu-devel] [PATCH] Vmchannel PCI device.

2008-12-14 Thread Thiemo Seufer
Daniel P. Berrange wrote: [snip] If you don't have QEMU as a broker, it makes it very hard for QEMU to virtualization all of the resources exposed to the guest. This complicates things like save/restore and complicates security policies since you now have things being done on behalf of

Re: [Qemu-devel] [PATCH] Vmchannel PCI device.

2008-12-14 Thread Anthony Liguori
Paul Brook wrote: On Sunday 14 December 2008, Gleb Natapov wrote: There is a need for communication channel between host and various agents that are running inside a VM guest. The channel will be used for statistic gathering, logging, cut paste, host screen resolution changes notification,

Re: [Qemu-devel] [PATCH] Vmchannel PCI device.

2008-12-14 Thread Anthony Liguori
Daniel P. Berrange wrote: On Sun, Dec 14, 2008 at 04:56:49PM -0600, Anthony Liguori wrote: Daniel P. Berrange wrote: On Sun, Dec 14, 2008 at 01:15:42PM -0600, Anthony Liguori wrote: One non-QEMU backend I can see being implemented is a DBus daemon, providing a simple bus for RPC

Re: [Qemu-devel] Re: [PATCH 2 of 5] add can_dma/post_dma for direct IO

2008-12-14 Thread Anthony Liguori
Paul Brook wrote: That's pointless; cirrus for example has 8MB of mmio while a cpu-to-vram blit is in progress, and some random device we'll add tomorrow could easily introduce more. Our APIs shouldn't depend on properties of emulated hardware, at least as much as possible. One way to

Re: How to use PCI-passthrough with kvm

2008-12-14 Thread w1ndoz
Hi Weidong, Thank you for your answer. I tried to test latest Avi's kvm.git and kvm-userspace.git. but, kvm-userspace fails to compile. I used the following git repositories: git clone git://git.kernel.org/pub/scm/linux/kernel/git/avi/kvm-userspace.git vtd $ ./configure $ make make -C libkvm

RE: How to use PCI-passthrough with kvm

2008-12-14 Thread Han, Weidong
I think you need sync with kernel code: $ ./configure $ cd kernel $ make sync LINUX=../../kvm -- kvm kernel directory $ cd .. $ make $ make install BTW, you should also need following patch to pass compilation. --- kernel/x86/external-module-compat.h |2 +- 1 files changed, 1

Re: Poor write- and overall performance

2008-12-14 Thread Avi Kivity
Arne Kepp wrote: Hi, I'm testing KVM 80 (prepackaged from lfarkas.org) on CentOS 5.2 (both guest and host) and comparing against Xen 3.3.0. The only modification I've really made is that I've set noatime on both guest and host. The guest is running straight from an LVM volume and is assigned

Re: [PATCH] AF_VMCHANNEL address family for guest-host communication.

2008-12-14 Thread David Miller
From: Gleb Natapov g...@redhat.com Date: Sun, 14 Dec 2008 13:50:55 +0200 It is undesirable to use TCP/IP for this purpose since network connectivity may not exist between host and guest and if it exists the traffic can be not routable between host and guest for security reasons or TCP/IP

Re: [PATCH] AF_VMCHANNEL address family for guest-host communication.

2008-12-14 Thread Gleb Natapov
On Sun, Dec 14, 2008 at 10:44:36PM -0800, David Miller wrote: From: Gleb Natapov g...@redhat.com Date: Sun, 14 Dec 2008 13:50:55 +0200 It is undesirable to use TCP/IP for this purpose since network connectivity may not exist between host and guest and if it exists the traffic can be not