[PATCH] kvm: qemu: fix kvm_tpr_opt_setup() args

2009-01-07 Thread Avi Kivity
From: Mark McLoughlin mar...@redhat.com Fixes: qemu-kvm.h:110: warning: function declaration isn’t a prototype Signed-off-by: Mark McLoughlin mar...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/qemu/kvm-tpr-opt.c b/qemu/kvm-tpr-opt.c index f2a3a1e..b3d26aa 100644 ---

[PATCH] KVM: mmu_notifiers release method

2009-01-07 Thread Avi Kivity
From: Marcelo Tosatti mtosa...@redhat.com The destructor for huge pages uses the backing inode for adjusting hugetlbfs accounting. Hugepage mappings are destroyed by exit_mmap, after mmu_notifier_release, so there are no notifications through unmap_hugepage_range at this point. The hugetlbfs

KVM host kernel hang

2009-01-07 Thread Alexander Graf
Hi, while trying to run a current openSUSE in VMWare ESX in KVM (using NPT), some KVM code seems to be stuck in an endless loop. The qemu process hangs, I can't attach gdb to it and the kernel module seems to be hanging in a place where I don't see any looping code. One CPU is definitely stuck in

[PATCH] CPUID Masking MSRs

2009-01-07 Thread Alexander Graf
Current AMD CPUs support masking of CPUID bits. Using this functionality, a VMM can limit what features are exposed to the guest, even if it's not using SVM/VMX. While I'm not aware of any open source hypervisor that uses these MSRs atm, VMware ESX does and patches exist for Xen, where trapping

Re: [PATCH] kvm: compat: define marker_synchronize_unregister on older kernels

2009-01-07 Thread Avi Kivity
Eduardo Habkost wrote: marker_synchronize_unregister() is available only on 2.6.28. However, its definition is very simple, so we can define it if it is missing. This fixes compilation of kvm_trace.c against older kernels. Applied, thanks. -- error compiling committee.c: too many

Re: __purge_vmap_area_lazy crash with CONFIG_PREEMPT_RCU=y

2009-01-07 Thread Avi Kivity
Marcelo Tosatti wrote: Ok, the bug seems to be gone now. Avi, can you apply the kernel patch please? Done. -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More

Re: [PATCH] CPUID Masking MSRs

2009-01-07 Thread Avi Kivity
Alexander Graf wrote: Current AMD CPUs support masking of CPUID bits. Using this functionality, a VMM can limit what features are exposed to the guest, even if it's not using SVM/VMX. While I'm not aware of any open source hypervisor that uses these MSRs atm, VMware ESX does and patches exist

Re: [PATCH] CPUID Masking MSRs

2009-01-07 Thread Alexander Graf
On 07.01.2009, at 11:07, Avi Kivity wrote: Alexander Graf wrote: Current AMD CPUs support masking of CPUID bits. Using this functionality, a VMM can limit what features are exposed to the guest, even if it's not using SVM/VMX. While I'm not aware of any open source hypervisor that uses

Re: [PATCH] kvm: qemu: fix kvm_tpr_opt_setup() args

2009-01-07 Thread Avi Kivity
Mark McLoughlin wrote: Fixes: qemu-kvm.h:110: warning: function declaration isn’t a prototype Applied, thanks. -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to

Re: [PATCH] CPUID Masking MSRs

2009-01-07 Thread Avi Kivity
Alexander Graf wrote: Note that Intel has similar functionality, called FlexMigration IIRC, likely using different MSRs. Hum. I'll take a look at it to see if that's as easy to implement then. It's probably easy (well supporting both might be tricky) but if you don't have a real test case

[PATCH] kvm: qemu: fix kvm_tpr_opt_setup() args

2009-01-07 Thread Mark McLoughlin
Fixes: qemu-kvm.h:110: warning: function declaration isn’t a prototype Signed-off-by: Mark McLoughlin mar...@redhat.com --- qemu/kvm-tpr-opt.c |2 +- qemu/qemu-kvm.h|2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/qemu/kvm-tpr-opt.c b/qemu/kvm-tpr-opt.c index

Re: KVM host kernel hang

2009-01-07 Thread Avi Kivity
Alexander Graf wrote: Hi, while trying to run a current openSUSE in VMWare ESX in KVM (using NPT), some KVM code seems to be stuck in an endless loop. The qemu process hangs, I can't attach gdb to it and the kernel module seems to be hanging in a place where I don't see any looping code. One

Re: [PATCH] KVM: MMU: Segregate mmu pages created with different cr4.pge settings

2009-01-07 Thread Avi Kivity
Alexander Graf wrote: Using this patch it works. But if I read it correctly, that doesn't actually fix anything but only treats NPT/EPT special, which it shouldn't, should it? The patch doesn't fix the bug but is nevertheless correct. cr4.pge only matters to the mmu if using the shadow mmu;

[PATCH 07/10] KVM: Unified the delivery of IOAPIC and MSI

2009-01-07 Thread Sheng Yang
Signed-off-by: Sheng Yang sh...@linux.intel.com --- include/linux/kvm_host.h |3 ++ virt/kvm/ioapic.c| 84 virt/kvm/irq_comm.c | 86 -- 3 files changed, 86 insertions(+), 87 deletions(-)

[PATCH 01/10] KVM: Add a route layer to convert MSI message to GSI

2009-01-07 Thread Sheng Yang
Avi's purpose, to use single kvm_set_irq() to deal with all interrupt, including MSI. So here is it. struct gsi_route_entry is a mapping from a special gsi(with KVM_GSI_MSG_MASK) to MSI/MSI-X message address/data. And the struct can also be extended for other purpose. Now we support up to 256

Re: [PATCH] KVM: MMU: Segregate mmu pages created with different cr4.pge settings

2009-01-07 Thread Marcelo Tosatti
On Wed, Jan 07, 2009 at 12:19:26PM +0200, Avi Kivity wrote: Alexander Graf wrote: Using this patch it works. But if I read it correctly, that doesn't actually fix anything but only treats NPT/EPT special, which it shouldn't, should it? The patch doesn't fix the bug but is nevertheless

[PATCH 0/6][v3] Userspace support for MSI

2009-01-07 Thread Sheng Yang
Update from v2: Change API to gsi_route. -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

[PATCH 1/6] kvm: Replace force type convert with container_of()

2009-01-07 Thread Sheng Yang
Signed-off-by: Sheng Yang sh...@linux.intel.com --- qemu/hw/device-assignment.c | 20 1 files changed, 12 insertions(+), 8 deletions(-) diff --git a/qemu/hw/device-assignment.c b/qemu/hw/device-assignment.c index d5eb7b2..f357d17 100644 --- a/qemu/hw/device-assignment.c

[PATCH 5/6] Support for device capability

2009-01-07 Thread Sheng Yang
This framework can be easily extended to support device capability, like MSI/MSI-x. Signed-off-by: Sheng Yang sh...@linux.intel.com --- qemu/hw/pci.c | 85 + qemu/hw/pci.h | 30 2 files changed, 115 insertions(+), 0

[PATCH 6/6] kvm: expose MSI capability to guest

2009-01-07 Thread Sheng Yang
Signed-off-by: Sheng Yang sh...@linux.intel.com --- qemu/hw/device-assignment.c | 111 --- qemu/hw/device-assignment.h |7 +++ 2 files changed, 111 insertions(+), 7 deletions(-) diff --git a/qemu/hw/device-assignment.c b/qemu/hw/device-assignment.c

[PATCH 2/6] Make device assignment depend on libpci

2009-01-07 Thread Sheng Yang
Which is used later for capability detection. Signed-off-by: Sheng Yang sh...@linux.intel.com --- qemu/Makefile.target |1 + qemu/configure | 20 2 files changed, 21 insertions(+), 0 deletions(-) diff --git a/qemu/Makefile.target b/qemu/Makefile.target index

[PATCH 3/6] kvm: ioctl for gsi_route

2009-01-07 Thread Sheng Yang
Signed-off-by: Sheng Yang sh...@linux.intel.com --- libkvm/libkvm.c | 27 +++ libkvm/libkvm.h |8 2 files changed, 35 insertions(+), 0 deletions(-) diff --git a/libkvm/libkvm.c b/libkvm/libkvm.c index 0408fdb..6d53f38 100644 --- a/libkvm/libkvm.c +++

[PATCH 4/6] Figure out device capability

2009-01-07 Thread Sheng Yang
Try to figure out device capability in update_dev_cap(). Now we are only care about MSI capability. The function pci_find_cap_offset original function wrote by Allen for Xen. Notice the function need root privilege to work. This depends on libpci to work. Signed-off-by: Allen Kay

Re: [PATCH] CPUID Masking MSRs

2009-01-07 Thread Andre Przywara
Alexander Graf wrote: Well if I could take the FlexMigration design into account when putting variables in the vcpu context, that'd be great. But I can't seem to find it in the Intel documentation, so I'll leave it for now. Not real documentation (tell me if you find some!), but this code shows

[PATCH 04/10] KVM: Using ioapic_irqchip() macro for kvm_set_irq

2009-01-07 Thread Sheng Yang
Signed-off-by: Sheng Yang sh...@linux.intel.com --- virt/kvm/irq_comm.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/virt/kvm/irq_comm.c b/virt/kvm/irq_comm.c index 7460e7f..f5e2d2c 100644 --- a/virt/kvm/irq_comm.c +++ b/virt/kvm/irq_comm.c @@ -39,7 +39,7 @@ void

[PATCH 02/10] KVM: Using gsi route for MSI device assignment

2009-01-07 Thread Sheng Yang
Convert MSI userspace interface to support gsi_msg mapping(and nobody should be the user of the old interface...). Signed-off-by: Sheng Yang sh...@linux.intel.com --- include/linux/kvm_host.h |1 - virt/kvm/kvm_main.c | 79 ++ 2 files

[PATCH 09/10] KVM: Update intr delivery func to accept unsigned long* bitmap

2009-01-07 Thread Sheng Yang
Would be used with bit ops, and would be easily extended if KVM_MAX_VCPUS is increased. Signed-off-by: Sheng Yang sh...@linux.intel.com --- arch/x86/kvm/lapic.c |8 include/linux/kvm_host.h |2 +- virt/kvm/ioapic.c|4 ++-- virt/kvm/ioapic.h|4 ++--

[PATCH 03/10] KVM: Improve MSI dispatch function

2009-01-07 Thread Sheng Yang
Prepare to merge with kvm_set_irq(). Signed-off-by: Sheng Yang sh...@linux.intel.com --- virt/kvm/kvm_main.c |8 1 files changed, 4 insertions(+), 4 deletions(-) diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c index 0a59245..717e1b0 100644 --- a/virt/kvm/kvm_main.c +++

[PATCH 10/10] KVM: bit ops for deliver_bitmap

2009-01-07 Thread Sheng Yang
It's also convenient when we extend KVM supported vcpu number in the future. Signed-off-by: Sheng Yang sh...@linux.intel.com --- arch/x86/kvm/lapic.c |7 --- virt/kvm/ioapic.c| 24 +--- virt/kvm/irq_comm.c | 17 + 3 files changed, 26

[PATCH 0/10][v4]GSI route layer for MSI/MSI-X

2009-01-07 Thread Sheng Yang
Update from v3: Addressed Avi's comment, improve struct gsi_route_entry and use a pair of ioctl to handle them(including some specific interrupt routing) all. Now only support MSI/MSI-X. -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to

[PATCH 05/10] KVM: Merge MSI handling to kvm_set_irq

2009-01-07 Thread Sheng Yang
Using kvm_set_irq to handle all interrupt injection. Signed-off-by: Sheng Yang sh...@linux.intel.com --- include/linux/kvm_host.h |2 +- virt/kvm/irq_comm.c | 79 +++-- virt/kvm/kvm_main.c | 79

Re: [PATCH] CPUID Masking MSRs

2009-01-07 Thread Alexander Graf
On 07.01.2009, at 12:16, Andre Przywara wrote: Alexander Graf wrote: Well if I could take the FlexMigration design into account when putting variables in the vcpu context, that'd be great. But I can't seem to find it in the Intel documentation, so I'll leave it for now. Not real

Re: [PATCH] KVM: MMU: Segregate mmu pages created with different cr4.pge settings

2009-01-07 Thread Avi Kivity
Marcelo Tosatti wrote: Let me shoot at one direction: a shadow page with PGE bit in either state is created. Later that shadow page is nuked (via mmu notifiers, for example). I doubt that mmu notifiers were invoked in this case (the bug would be very rare); in any case we flush the tlb.

Re: KVM host kernel hang

2009-01-07 Thread Alexander Graf
On 07.01.2009, at 11:15, Avi Kivity wrote: Alexander Graf wrote: Hi, while trying to run a current openSUSE in VMWare ESX in KVM (using NPT), some KVM code seems to be stuck in an endless loop. The qemu process hangs, I can't attach gdb to it and the kernel module seems to be hanging in a

Re: KVM host kernel hang

2009-01-07 Thread Avi Kivity
Alexander Graf wrote: I have CONFIG_LOCKDEP_SUPPORT=y. How do I make it detect that it's actually locking itself up? Btw: The issue seems to be easily reproducible :-) Perhaps CONFIG_PROVE_LOCKING and CONFIG_LOCKDEP. _SUPPORT just indicates the arch can do it if you want, IIUC. -- error

Re: KVM host kernel hang

2009-01-07 Thread Alexander Graf
Avi Kivity wrote: Alexander Graf wrote: I have CONFIG_LOCKDEP_SUPPORT=y. How do I make it detect that it's actually locking itself up? Btw: The issue seems to be easily reproducible :-) Perhaps CONFIG_PROVE_LOCKING and CONFIG_LOCKDEP. _SUPPORT just indicates the arch can do it if you

Re: [PATCH] KVM: MMU: Segregate mmu pages created with different cr4.pge settings

2009-01-07 Thread Marcelo Tosatti
On Wed, Jan 07, 2009 at 01:32:41PM +0200, Avi Kivity wrote: Marcelo Tosatti wrote: Let me shoot at one direction: a shadow page with PGE bit in either state is created. Later that shadow page is nuked (via mmu notifiers, for example). I doubt that mmu notifiers were invoked in this case

Re: KVM host kernel hang

2009-01-07 Thread Avi Kivity
Alexander Graf wrote: Avi Kivity wrote: Alexander Graf wrote: I have CONFIG_LOCKDEP_SUPPORT=y. How do I make it detect that it's actually locking itself up? Btw: The issue seems to be easily reproducible :-) Perhaps CONFIG_PROVE_LOCKING and CONFIG_LOCKDEP. _SUPPORT just

routed tap devices

2009-01-07 Thread Sterling Windmill
I am using kvm-82 on a 64-bit host and giving my virtual machines routed tap devices and utilizing proxy arp to provide them connectivity. My host has two ethernet adapters, one connected to the WAN and the other is a private link to another server with a private IP address. Even though I'm

[PATCH 0/6] ATS capability support for Intel IOMMU

2009-01-07 Thread Yu Zhao
This patch series implements Address Translation Service support for the Intel IOMMU. ATS provides ability for the PCI Endpoint to request the DMA address translation from the IOMMU and cache the translation in the Endpoint to alleviate IOMMU pressure and improve the hardware performance in the

[PATCH 1/6] PCI: support the ATS capability

2009-01-07 Thread Yu Zhao
The ATS spec can be found at http://www.pcisig.com/specifications/iov/ats/ (it requires membership). Signed-off-by: Yu Zhao yu.z...@intel.com --- drivers/pci/pci.c| 68 ++ include/linux/pci.h | 15 ++ include/linux/pci_regs.h

[PATCH 2/6] VT-d: parse ATSR in DMA Remapping Reporting Structure

2009-01-07 Thread Yu Zhao
Parse the Root Port ATS Capability Reporting Structure in DMA Remapping Reporting Structure ACPI table. Signed-off-by: Yu Zhao yu.z...@intel.com --- drivers/pci/dmar.c | 114 -- include/linux/dmar.h|9 +++ include/linux/intel-iommu.h

[PATCH 3/6] VT-d: add queue invalidation fault status support

2009-01-07 Thread Yu Zhao
Check fault register after submitting an queue invalidation request. Signed-off-by: Yu Zhao yu.z...@intel.com --- drivers/pci/dmar.c | 59 +++-- drivers/pci/intr_remapping.c | 21 -- include/linux/intel-iommu.h |4 ++- 3 files

[PATCH 4/6] VT-d: add device IOTLB invalidation support

2009-01-07 Thread Yu Zhao
Support device IOTLB invalidation to flush the translation cached in the Endpoint. Signed-off-by: Yu Zhao yu.z...@intel.com --- drivers/pci/dmar.c | 63 -- include/linux/intel-iommu.h | 13 - 2 files changed, 72 insertions(+), 4

[PATCH 5/6] VT-d: cleanup iommu_flush_iotlb_psi and flush_unmaps

2009-01-07 Thread Yu Zhao
Make iommu_flush_iotlb_psi() and flush_unmaps() easier to read. Signed-off-by: Yu Zhao yu.z...@intel.com --- drivers/pci/intel-iommu.c | 46 +--- 1 files changed, 22 insertions(+), 24 deletions(-) diff --git a/drivers/pci/intel-iommu.c

[PATCH 6/6] VT-d: support the device IOTLB

2009-01-07 Thread Yu Zhao
Support device IOTLB (i.e. ATS) for both native and KVM environments. Signed-off-by: Yu Zhao yu.z...@intel.com --- drivers/pci/intel-iommu.c | 97 +- include/linux/intel-iommu.h |1 + 2 files changed, 95 insertions(+), 3 deletions(-) diff --git

Re: [PATCH 01/10] KVM: Add a route layer to convert MSI message to GSI

2009-01-07 Thread Marcelo Tosatti
Hi Sheng, On Wed, Jan 07, 2009 at 06:42:37PM +0800, Sheng Yang wrote: Avi's purpose, to use single kvm_set_irq() to deal with all interrupt, including MSI. So here is it. struct gsi_route_entry is a mapping from a special gsi(with KVM_GSI_MSG_MASK) to MSI/MSI-X message address/data. And

[ kvm-Bugs-2030703 ] Virtio Vista drivers

2009-01-07 Thread SourceForge.net
Bugs item #2030703, was opened at 2008-07-29 05:05 Message generated for change (Comment added) made by roy-anonymous You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2030703group_id=180599 Please note that this message will contain a full copy of the

[ kvm-Bugs-2490866 ] repeatable corruption with qcow2 on kvm-79

2009-01-07 Thread SourceForge.net
Bugs item #2490866, was opened at 2009-01-07 05:10 Message generated for change (Comment added) made by roy-anonymous You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2490866group_id=180599 Please note that this message will contain a full copy of the

[PATCH 2/5][RFC] virtio-net: Add load/save for status bits

2009-01-07 Thread Alex Williamson
virtio-net: Add load/save for status bits Signed-off-by: Alex Williamson alex.william...@hp.com --- hw/virtio-net.c | 10 -- 1 files changed, 8 insertions(+), 2 deletions(-) diff --git a/hw/virtio-net.c b/hw/virtio-net.c index bfb7510..77e3077 100644 --- a/hw/virtio-net.c +++

[PATCH 4/5][RFC] virti-net: Enable filtering based on MAC, promisc, broadcast and allmulti

2009-01-07 Thread Alex Williamson
virti-net: Enable filtering based on MAC, promisc, broadcast and allmulti Signed-off-by: Alex Williamson alex.william...@hp.com --- hw/virtio-net.c | 22 ++ 1 files changed, 22 insertions(+), 0 deletions(-) diff --git a/hw/virtio-net.c b/hw/virtio-net.c index

[PATCH 5/5][RFC] virtio-net: Add additional MACs via a filter table

2009-01-07 Thread Alex Williamson
virtio-net: Add additional MACs via a filter table Signed-off-by: Alex Williamson alex.william...@hp.com --- hw/virtio-net.c | 27 +-- hw/virtio-net.h |4 2 files changed, 29 insertions(+), 2 deletions(-) diff --git a/hw/virtio-net.c b/hw/virtio-net.c index

[ kvm-Bugs-2030703 ] Virtio Vista drivers

2009-01-07 Thread SourceForge.net
Bugs item #2030703, was opened at 2008-07-28 23:05 Message generated for change (Comment added) made by martinmaurer You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2030703group_id=180599 Please note that this message will contain a full copy of the

[PATCH 0/5][RFC] virtio-net: MAC filtering

2009-01-07 Thread Alex Williamson
This series is based on some of the work Mark McLoughlin has been doing, so isn't going to apply until that makes it into the tree. The goal is to enable MAC filtering at the qemu/kvm level for virtio-net packets. I start by adding the capability to set the MAC address, naming the bits in the

[PATCH 1/5][RFC] virtio-net: Allow setting the MAC address via set_config

2009-01-07 Thread Alex Williamson
virtio-net: Allow setting the MAC address via set_config Rename get_config for simplicity Signed-off-by: Alex Williamson alex.william...@hp.com --- hw/virtio-net.c | 21 +++-- 1 files changed, 19 insertions(+), 2 deletions(-) diff --git a/hw/virtio-net.c b/hw/virtio-net.c

[PATCH 3/5][RFC] virtio-net: Name the status bits, adding promisc and allmulti

2009-01-07 Thread Alex Williamson
virtio-net: Name the status bits, adding promisc and allmulti Signed-off-by: Alex Williamson alex.william...@hp.com --- hw/virtio-net.c | 36 hw/virtio-net.h | 11 ++- 2 files changed, 34 insertions(+), 13 deletions(-) diff --git

[PATCH 0/2][RFC] virtio_net: MAC filtering

2009-01-07 Thread Alex Williamson
This series builds on some of the patches Mark McLoughlin has sent out recently, so likely won't apply to any current trees until those get upstream. The goal is to enable MAC filtering at the kvm/qemu level for virtio-net packets. Promiscuous and allmulti mode are handled by adding bits to

[PATCH 1/2][RFC] virtio_net: Enable setting MAC, promisc, and allmulti mode

2009-01-07 Thread Alex Williamson
virtio_net: Enable setting MAC, promisc, and allmulti mode Signed-off-by: Alex Williamson alex.william...@hp.com --- drivers/net/virtio_net.c | 79 include/linux/virtio_net.h | 11 ++ 2 files changed, 82 insertions(+), 8 deletions(-) diff

[PATCH 2/2][RFC] virtio_net: Add MAC fitler table support

2009-01-07 Thread Alex Williamson
virtio_net: Add MAC fitler table support Signed-off-by: Alex Williamson alex.william...@hp.com --- drivers/net/virtio_net.c | 52 +--- include/linux/virtio_net.h |6 - 2 files changed, 54 insertions(+), 4 deletions(-) diff --git

Re: [PATCH 3/5][RFC] virtio-net: Name the status bits, adding promisc and allmulti

2009-01-07 Thread Anthony Liguori
Alex Williamson wrote: virtio-net: Name the status bits, adding promisc and allmulti Signed-off-by: Alex Williamson alex.william...@hp.com --- hw/virtio-net.c | 36 hw/virtio-net.h | 11 ++- 2 files changed, 34 insertions(+), 13 deletions(-)

Re: [PATCH 2/5][RFC] virtio-net: Add load/save for status bits

2009-01-07 Thread Anthony Liguori
Alex Williamson wrote: virtio-net: Add load/save for status bits Signed-off-by: Alex Williamson alex.william...@hp.com --- hw/virtio-net.c | 10 -- 1 files changed, 8 insertions(+), 2 deletions(-) diff --git a/hw/virtio-net.c b/hw/virtio-net.c index bfb7510..77e3077 100644 ---

Re: [PATCH 3/5][RFC] virtio-net: Name the status bits, adding promisc and allmulti

2009-01-07 Thread Alex Williamson
On Wed, 2009-01-07 at 12:09 -0600, Anthony Liguori wrote: Alex Williamson wrote: virtio-net: Name the status bits, adding promisc and allmulti I'd prefer the use of #define's like we have today. bit fields have really weird packing and ordering properties across architectures. Ok,

Re: [PATCH 0/2][RFC] virtio_net: MAC filtering

2009-01-07 Thread Anthony Liguori
Alex Williamson wrote: This series builds on some of the patches Mark McLoughlin has sent out recently, so likely won't apply to any current trees until those get upstream. The goal is to enable MAC filtering at the kvm/qemu level for virtio-net packets. Promiscuous and allmulti mode are

Re: [PATCH] virtio_net: add link status handling

2009-01-07 Thread Mark McLoughlin
Hi Rusty, On Fri, 2008-12-12 at 18:34 +1030, Rusty Russell wrote: On Thursday 11 December 2008 05:04:44 Mark McLoughlin wrote: On Tue, 2008-12-09 at 21:11 -0600, Anthony Liguori wrote: Rusty Russell wrote: On Wednesday 10 December 2008 08:02:14 Anthony Liguori wrote: It would be

Re: [PATCH 0/2][RFC] virtio_net: MAC filtering

2009-01-07 Thread Alex Williamson
On Wed, 2009-01-07 at 12:14 -0600, Anthony Liguori wrote: Alex Williamson wrote: As noted in the RFC thread adding the kvm/qemu backing, this does increase the size of the virtio-net device I/O port space, up to 1kB with PCI rounding if we add a 4k entry VLAN bitmap. A 64 device limit

Re: [PATCH 0/2][RFC] virtio_net: MAC filtering

2009-01-07 Thread Anthony Liguori
Alex Williamson wrote: On Wed, 2009-01-07 at 12:14 -0600, Anthony Liguori wrote: Alex Williamson wrote: As noted in the RFC thread adding the kvm/qemu backing, this does increase the size of the virtio-net device I/O port space, up to 1kB with PCI rounding if we add a 4k entry VLAN

Re: KVM host kernel hang

2009-01-07 Thread Alexander Graf
On 07.01.2009, at 14:53, Avi Kivity a...@redhat.com wrote: Alexander Graf wrote: Avi Kivity wrote: Alexander Graf wrote: I have CONFIG_LOCKDEP_SUPPORT=y. How do I make it detect that it's actually locking itself up? Btw: The issue seems to be easily reproducible :-) Perhaps

Re: BUG() with SCSI-interfaced disk images

2009-01-07 Thread John Morrissey
On Fri, Dec 26, 2008 at 04:00:28PM -0500, John Morrissey wrote: I'm encountering a kernel BUG() in guests using SCSI-interfaced disk images. I've tried with the Debian packaging of KVM 79 and 82; both exhibit the same behavior (disclaimer: Debian has about a dozen patches in their kvm

Re: [PATCH 05/10] KVM: Merge MSI handling to kvm_set_irq

2009-01-07 Thread Marcelo Tosatti
On Wed, Jan 07, 2009 at 06:42:41PM +0800, Sheng Yang wrote: Using kvm_set_irq to handle all interrupt injection. Signed-off-by: Sheng Yang sh...@linux.intel.com --- include/linux/kvm_host.h |2 +- virt/kvm/irq_comm.c | 79 +++--

[ kvm-Bugs-2030703 ] Virtio Vista drivers

2009-01-07 Thread SourceForge.net
Bugs item #2030703, was opened at 2008-07-29 00:05 Message generated for change (Comment added) made by thekozmo You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2030703group_id=180599 Please note that this message will contain a full copy of the comment

Re: [PATCH 09/10] KVM: Update intr delivery func to accept unsigned long* bitmap

2009-01-07 Thread Marcelo Tosatti
Better separate the bitmap patches from this series to ease merging of the MSI changes. On Wed, Jan 07, 2009 at 06:42:45PM +0800, Sheng Yang wrote: Would be used with bit ops, and would be easily extended if KVM_MAX_VCPUS is increased. Signed-off-by: Sheng Yang sh...@linux.intel.com ---

[ kvm-Bugs-2493108 ] Win2k problems on some (not all) Intel hosts

2009-01-07 Thread SourceForge.net
Bugs item #2493108, was opened at 2009-01-08 12:53 Message generated for change (Tracker Item Submitted) made by Item Submitter You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2493108group_id=180599 Please note that this message will contain a full copy of

Userspace specific host irq?

2009-01-07 Thread Sheng Yang
Hi all This piece of code puzzled me at all time: virt/kvm/kvm_main.c:assigned_device_update_intx() if (airq-host_irq) adev-host_irq = airq-host_irq; else adev-host_irq = adev-dev-irq; I don't know why we can let

[PATCH] kvm: userspace: change vtd.o to iommu.o in Kbuild

2009-01-07 Thread Huang, Wei W
vtd.c has been renamed to iommu.c, need to change it in Kbuild accordingly. Signed-off-by: Wei Huang wei.w.hu...@intel.com --- kernel/x86/Kbuild |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/kernel/x86/Kbuild b/kernel/x86/Kbuild index c4723b1..48339b4 100644 ---