[KVM-AUTOTEST][PATCH] kvm_runtest_2.py: print exception info with kvm_log.error().

2009-04-16 Thread Uri Lublin
From: Michael Goldish mgold...@redhat.com We do this so that tests don't have to print the exception info themselves. Signed-off-by: Michael Goldish mgold...@redhat.com Signed-off-by: Uri Lublin u...@redhat.com diff --git a/client/tests/kvm_runtest_2/kvm_runtest_2.py

[KVM-AUTOTEST][PATCH] RHEL-4.7-i386.steps: make the installation boot faster.

2009-04-16 Thread Uri Lublin
From: Michael Goldish mgold...@redhat.com Add an initial step that detects the first boot screen and hits ENTER. Currently we wait for a timeout to expire, which takes a while. Signed-off-by: Michael Goldish mgold...@redhat.com diff --git a/client/tests/kvm_runtest_2/steps/RHEL-4.7-i386.steps

[KVM-AUTOTEST][PATCH] kvm_tests.py: do not explicitly print reason for failure.

2009-04-16 Thread Uri Lublin
From: Michael Goldish mgold...@redhat.com No need to print the reason in the test itself -- kvm_runtest_2.py takes care of this now. Specifically, replace blocks such as: message = Error message kvm_log.error(message) raise error.TestFail, message with: raise error.TestFail, Error message

[KVM-AUTOTEST][PATCH] kvm_tests.py: print output of migration_test_command only upon failure.

2009-04-16 Thread Uri Lublin
From: Michael Goldish mgold...@redhat.com Print outputs (before and after migration) of migration_test_command only if they differ. Currently we print them anyway, and the outputs can be very long. Signed-off-by: Michael Goldish mgold...@redhat.com diff --git

[KVM-AUTOTEST][PATCH] kvm_tests.py: run_boot(): get 'cmd_reboot' from VM params, not test params.

2009-04-16 Thread Uri Lublin
From: Michael Goldish mgold...@redhat.com 'cmd_reboot' is a VM param, so get it using vm.get_params().get(cmd_reboot). Currently it is taken from the test params. This is a mistake. Signed-off-by: Michael Goldish mgold...@redhat.com diff --git a/client/tests/kvm_runtest_2/kvm_tests.py

[KVM-AUTOTEST][PATCH] Add WinXP.64 and Win2003.64 guests.

2009-04-16 Thread Uri Lublin
From: Alexey Eromenko aerom...@redhat.com 1. Add variants for WinXP.64 and Win2003.64 to kvm_tests.cfg.sample. 2. Convert WinXP.64 and Win2003.64 step files to the new format. Signed-off-by: Alexey Eromenko aerom...@redhat.com Signed-off-by: Michael Goldish mgold...@redhat.com Signed-off-by: Uri

[KVM-AUTOTEST][PATCH] kvm_tests.cfg.sample: Add virtio block device variant.

2009-04-16 Thread Uri Lublin
From: Alexey Eromenko aerom...@redhat.com 1. Add virtio block device variant 'virtio_blk' next to 'ide' and 'scsi'. 2. Filter out unsupported guests. Signed-off-by: Alexey Eromenko aerom...@redhat.com Signed-off-by: Michael Goldish mgold...@redhat.com Signed-off-by: Uri Lublin u...@redhat.com

[KVM-AUTOTEST][PATCH] kvm_tests.cfg: Windows guests: find ssh/telnet iso under windows directory

2009-04-16 Thread Uri Lublin
From: Uri Lublin u...@redhat.com Not under linux directory. Signed-off-by: Uri Lublin u...@redhat.com diff --git a/client/tests/kvm_runtest_2/kvm_tests.cfg.sample b/client/tests/kvm_runtest_2/kvm_tests.cfg.sample index 8227b5f..942f07e 100644 ---

[KVM-AUTOTEST][PATCH] kvm_utils.py, kvm_vm.py: print debugging info upon command failure.

2009-04-16 Thread Uri Lublin
From: Michael Goldish mgold...@redhat.com In VM.send_monitor_cmd(), kvm_spawn.get_command_status_output() and kvm_spawn.read_until_output_matches(), print some information upon failure (exit status and/or output so far). Also add function kvm_utils.format_str_for_message() which helps in

[KVM-AUTOTEST][PATCH] kvm_tests.cfg.sample: do not run bonnie and dbench on openSUSE-11 (no gcc).

2009-04-16 Thread Uri Lublin
From: Alexey Eromenko aerom...@redhat.com Signed-off-by: Alexey Eromenko aerom...@redhat.com Signed-off-by: Michael Goldish mgold...@redhat.com Signed-off-by: Uri Lublin u...@redhat.com diff --git a/client/tests/kvm_runtest_2/kvm_tests.cfg.sample

[KVM-AUTOTEST][PATCH] kvm_tests.cfg: make migration 2 (dst-src) depend on migration 1 (src-dst)

2009-04-16 Thread Uri Lublin
From: Uri Lublin u...@redhat.com If the first migration failed, skip the second migration. Signed-off-by: Uri Lublin u...@redhat.com diff --git a/client/tests/kvm_runtest_2/kvm_tests.cfg.sample b/client/tests/kvm_runtest_2/kvm_tests.cfg.sample index b0b75b2..8227b5f 100644 ---

[KVM-AUTOTEST][PATCH] kvm_tests.cfg.sample: do not run linux_s3 on DSL and RHEL-3.9.

2009-04-16 Thread Uri Lublin
From: Alexey Eromenko aerom...@redhat.com These guests apparently do not support S3. Signed-off-by: Alexey Eromenko aerom...@redhat.com Signed-off-by: Michael Goldish mgold...@redhat.com Signed-off-by: Uri Lublin u...@redhat.com diff --git a/client/tests/kvm_runtest_2/kvm_tests.cfg.sample

RE: Luvalley-2 has been released: running KVM below any operating system

2009-04-16 Thread Zhang, Xiantao
How about performance comparision with kvm guests? Xiantao -Original Message- From: kvm-ow...@vger.kernel.org [mailto:kvm-ow...@vger.kernel.org] On Behalf Of Xiaodong Yi Sent: Thursday, April 16, 2009 9:54 AM To: kvm@vger.kernel.org Subject: Luvalley-2 has been released: running KVM

Re: kvm with OpenBSD 4.5

2009-04-16 Thread Dongsheng Song
kvm-84 has same error. How to disable oos optimization, is there a switch? 2009/4/16 Brian Jackson i...@theiggy.com: You might want to try 84 with oos optimization off (or better yet 85 when it comes out). There was a bug recently (post 84) fixed that affected some BSDs. On Wednesday 15

Re: KVM: x86: use kvm_set_cr3/cr4 in ioctl_set_sregs

2009-04-16 Thread Avi Kivity
Marcelo Tosatti wrote: Matt T. Yourst notes that kvm_arch_vcpu_ioctl_set_sregs lacks validity checking for the new cr3 value: Userspace callers of KVM_SET_SREGS can pass a bogus value of cr3 to the kernel. This will trigger a NULL pointer access in gfn_to_rmap() when userspace next tries to

Re: KVM: x86: use kvm_set_cr3/cr4 in ioctl_set_sregs

2009-04-16 Thread Marcelo Tosatti
On Thu, Apr 16, 2009 at 11:56:15AM +0300, Avi Kivity wrote: Marcelo Tosatti wrote: Matt T. Yourst notes that kvm_arch_vcpu_ioctl_set_sregs lacks validity checking for the new cr3 value: Userspace callers of KVM_SET_SREGS can pass a bogus value of cr3 to the kernel. This will trigger a NULL

[PATCH] KVM: ia64: Flush all TLBs once guest's memory mapping changes.

2009-04-16 Thread Zhang, Xiantao
From dcb73b5db2e91213a2536542945645caaf23bfe3 Mon Sep 17 00:00:00 2001 From: Xiantao Zhang xiantao.zh...@intel.com Date: Thu, 16 Apr 2009 17:59:16 +0800 Subject: [PATCH] KVM: ia64: Flush all TLBs once guest's memory mapping changes. Flush all vcpu's TLB entries once changes guest's memory

Re: [PATCH] deal with interrupt shadow state for emulated instruction

2009-04-16 Thread Avi Kivity
H. Peter Anvin wrote: Avi Kivity wrote: Why do we care? The guest can only harm itself, and if it wants to disable interrupts, it would be a lot easier for it to run a plain 'cli'. I guess it would be a problem if we emulated 'mov ss' for ordinary userspace or vm86 mode, but we don't.

Re: KVM: x86: use kvm_set_cr3/cr4 in ioctl_set_sregs

2009-04-16 Thread Avi Kivity
Marcelo Tosatti wrote: Humpf. And something like this? Or GP# instead of triple fault? diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 148cde2..3e63bac 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -3986,7 +3986,10 @@ int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu

KVM: x86: check for cr3 validity in ioctl_set_sregs

2009-04-16 Thread Marcelo Tosatti
Matt T. Yourst notes that kvm_arch_vcpu_ioctl_set_sregs lacks validity checking for the new cr3 value: Userspace callers of KVM_SET_SREGS can pass a bogus value of cr3 to the kernel. This will trigger a NULL pointer access in gfn_to_rmap() when userspace next tries to call KVM_RUN on the

Re: [PATCH 4/4] add ksm kernel shared memory driver.

2009-04-16 Thread Andrea Arcangeli
On Wed, Apr 15, 2009 at 05:43:03PM -0700, Jeremy Fitzhardinge wrote: Shouldn't that be kmap_atomic's job anyway? Otherwise it would be hard to No because those are full noops in no-highmem kernels. I commented in other email why I think it's safe thanks to the wrprotect + smp tlb flush of the

Re: KVM: x86: check for cr3 validity in ioctl_set_sregs

2009-04-16 Thread Avi Kivity
Marcelo Tosatti wrote: Matt T. Yourst notes that kvm_arch_vcpu_ioctl_set_sregs lacks validity checking for the new cr3 value: Userspace callers of KVM_SET_SREGS can pass a bogus value of cr3 to the kernel. This will trigger a NULL pointer access in gfn_to_rmap() when userspace next tries

Re: KVM: x86: check for cr3 validity in ioctl_set_sregs

2009-04-16 Thread Avi Kivity
Avi Kivity wrote: Marcelo Tosatti wrote: Matt T. Yourst notes that kvm_arch_vcpu_ioctl_set_sregs lacks validity checking for the new cr3 value: Userspace callers of KVM_SET_SREGS can pass a bogus value of cr3 to the kernel. This will trigger a NULL pointer access in gfn_to_rmap() when

Re: [PATCH 1/2] Make BIOS irq0-inti2 override configurable from userspace

2009-04-16 Thread Avi Kivity
Beth Kon wrote: These patches resolve the irq0-inti2 override issue, and get the hpet working on kvm with and without -no-kvm-irqchip (i.e., when hpet takes over, it disables userspace or in-kernel pit as appropriate). The irq0-inti2 override will always be used unless the kernel cannot do

[ kvm-Bugs-2768533 ] SCSI: VM unable to reboot from SCSI controller

2009-04-16 Thread SourceForge.net
Bugs item #2768533, was opened at 2009-04-16 16:01 Message generated for change (Tracker Item Submitted) made by technologov You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2768533group_id=180599 Please note that this message will contain a full copy of

Re: [PATCH] KVM: ia64: Flush all TLBs once guest's memory mapping changes.

2009-04-16 Thread Avi Kivity
Zhang, Xiantao wrote: From dcb73b5db2e91213a2536542945645caaf23bfe3 Mon Sep 17 00:00:00 2001 From: Xiantao Zhang xiantao.zh...@intel.com Date: Thu, 16 Apr 2009 17:59:16 +0800 Subject: [PATCH] KVM: ia64: Flush all TLBs once guest's memory mapping changes. Flush all vcpu's TLB entries once

hanging while install OpenSolaris (Nov 2008 version)

2009-04-16 Thread Peter Teoh
I got a mid-way hang while installing OpenSolaris on KVM guest yesterday. The hardware is kvm-intel enabled. I tried the same thing on Athlon64, but it does not have svm hardware enabled. So qemu startup saying /dev/kvm cannot be found, even though i had explicitly insmod kvm, and dmesg show

AW: AW: AW: AW: AW: KVM performance

2009-04-16 Thread BRAUN, Stefanie
Hello, I've compiled a new kernel v2.6.27-rc5 with the modified svm.c. But the behaviour of the vlc process in the guest is still the same. I've exported additional cpu features to the guest, e.g. mmxext with kvm-84. But no performance changes. I was not able to export the cpu flags 3dnow and

Re: kvm with OpenBSD 4.5

2009-04-16 Thread Brian Jackson
it's a module option to the kvm option. parm: oos_shadow:bool On Thursday 16 April 2009 03:43:56 Dongsheng Song wrote: kvm-84 has same error. How to disable oos optimization, is there a switch? 2009/4/16 Brian Jackson i...@theiggy.com: You might want to try 84 with oos

[ kvm-Bugs-2768533 ] SCSI/VirtIO: VM unable to reboot from non-IDE controller

2009-04-16 Thread SourceForge.net
Bugs item #2768533, was opened at 2009-04-16 16:01 Message generated for change (Settings changed) made by technologov You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2768533group_id=180599 Please note that this message will contain a full copy of the

[ kvm-Bugs-2768533 ] SCSI/VirtIO: VM unable to reboot from non-IDE controller

2009-04-16 Thread SourceForge.net
Bugs item #2768533, was opened at 2009-04-16 16:01 Message generated for change (Comment added) made by technologov You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2768533group_id=180599 Please note that this message will contain a full copy of the comment

Getting VT-d passthru to work

2009-04-16 Thread Nadolski, Ed
Hi List, I'm a newbie at kvm/linux so hopefully I'm not asking anything too obvious. Can anyone please recommend the best bits to use for getting VT-d passthru to work? I've tried kvm-84 with Fedora 10, but the kernel is 2.6.27.5. I'm trying the Fedora 11 Beta but I've hit other issues. My

Re: AW: AW: AW: AW: AW: KVM performance

2009-04-16 Thread Avi Kivity
BRAUN, Stefanie wrote: Hello, I've compiled a new kernel v2.6.27-rc5 with the modified svm.c. But the behaviour of the vlc process in the guest is still the same. I've exported additional cpu features to the guest, e.g. mmxext with kvm-84. But no performance changes. I was not able to export

Re: kvm with OpenBSD 4.5

2009-04-16 Thread FRLinux
On Thu, Apr 16, 2009 at 4:59 AM, Theo de Raadt dera...@cvs.openbsd.org wrote: If they claim to provide a proper i386/amd64 vm environment, and we don't run properly ... Look, considering we run very well on 99% of PCs, it means they their claims are balony. I concur, I had problems with

Re: [PATCH 4/4] add ksm kernel shared memory driver.

2009-04-16 Thread Jeremy Fitzhardinge
Andrea Arcangeli wrote: On Wed, Apr 15, 2009 at 05:43:03PM -0700, Jeremy Fitzhardinge wrote: Shouldn't that be kmap_atomic's job anyway? Otherwise it would be hard to No because those are full noops in no-highmem kernels. I commented in other email why I think it's safe thanks to the

Re: [PATCH 0/4] ksm - dynamic page sharing driver for linux v3

2009-04-16 Thread Nick Piggin
On Wednesday 15 April 2009 08:09:03 Andrew Morton wrote: On Thu, 9 Apr 2009 06:58:37 +0300 Izik Eidus iei...@redhat.com wrote: KSM is a linux driver that allows dynamicly sharing identical memory pages between one or more processes. Generally looks OK to me. But that doesn't mean

Re: [PATCH 0/4] ksm - dynamic page sharing driver for linux v3

2009-04-16 Thread Izik Eidus
Nick Piggin wrote: On Wednesday 15 April 2009 08:09:03 Andrew Morton wrote: On Thu, 9 Apr 2009 06:58:37 +0300 Izik Eidus iei...@redhat.com wrote: KSM is a linux driver that allows dynamicly sharing identical memory pages between one or more processes. Generally looks OK to

Re: hanging while install OpenSolaris (Nov 2008 version)

2009-04-16 Thread Marcelo Tosatti
On Thu, Apr 16, 2009 at 09:11:03AM -0400, Peter Teoh wrote: I got a mid-way hang while installing OpenSolaris on KVM guest yesterday. The hardware is kvm-intel enabled. I tried the same thing on Athlon64, but it does not have svm hardware enabled. So qemu startup saying /dev/kvm cannot be

Re: tlb flushing after spin_unlock of mmu lock

2009-04-16 Thread Marcelo Tosatti
Peter, On Sat, Apr 11, 2009 at 12:45:21AM -0400, Peter Teoh wrote: In this function, the TLB flushing comes before spin unlock, void kvm_mmu_slot_remove_write_access(struct kvm *kvm, int slot) { struct kvm_mmu_page *sp; spin_lock(kvm-mmu_lock);

Re: hanging while install OpenSolaris (Nov 2008 version)

2009-04-16 Thread Frank Ch. Eigler
Peter Teoh htmldevelo...@gmail.com writes: I got a mid-way hang while installing OpenSolaris on KVM guest yesterday. [...] How can i debug via kvmtrace (or systemtap) to find out at which point it hanged? [...] In recent kernels, kvm tracing is done by markers, which systemtap can attach

Re: Split kvm source tarballs

2009-04-16 Thread Christoph Hellwig
Any idea when the split will happen? -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [PATCH] deal with interrupt shadow state for emulated instruction

2009-04-16 Thread H. Peter Anvin
Avi Kivity wrote: We don't emulate guest user mode. Well, if guest userspace can convince its kernel to give it access to some memory mapped I/O register, I guess it can execute repeated 'mov ss, mmio' and starve the guest kernel. It doesn't need a MMIO register to do that, even.

Re: [PATCH -tip 3/6 V4.1] x86: instruction decorder API

2009-04-16 Thread Masami Hiramatsu
H. Peter Anvin wrote: Jim Keniston wrote: For user-space probing, we've been concentrating on native-built executables. Am I correct in thinking that we'll see 16-bit or V86 mode only on legacy apps built elsewhere? In any case, it only makes sense to build on the kvm folks' work in this

Re: [PATCH -tip 3/6 V4.1] x86: instruction decorder API

2009-04-16 Thread H. Peter Anvin
Masami Hiramatsu wrote: Hmm, I have an idea about instruction table. Usually, instruction tables are encoded with code defined by each decoder/emulator. This method will show their internal code directly, and is hard to maintain when the opcode map is updated. Instead of that, I'd like to

Re: [PATCH -tip 3/6 V4.1] x86: instruction decorder API

2009-04-16 Thread Jim Keniston
On Thu, 2009-04-16 at 19:31 -0400, Masami Hiramatsu wrote: ... Hmm, I have an idea about instruction table. Usually, instruction tables are encoded with code defined by each decoder/emulator. This method will show their internal code directly, and is hard to maintain when the opcode map is

Re: [PATCH -tip 3/6 V4.1] x86: instruction decorder API

2009-04-16 Thread H. Peter Anvin
Jim Keniston wrote: It looks like AT2(Ev,Gv) would yield the same bits as AT2(Gv,Ev). It'd be nice not to lose the operand-order information. And we'd have to make clear whether which notation we're using -- src,dest as in the gnu assembler, or dest,src as in the AMD (and Intel?) manuals.

Re: kvm with OpenBSD 4.5

2009-04-16 Thread Dongsheng Song
2009/4/16 Brian Jackson i...@theiggy.com: it's a module option to the kvm option. parm:           oos_shadow:bool When I set 'oos_shadow=Y' for kvm-84 module, OpenBSD 4.5 stopped after display 'clock: unknown CMOS layout'. When I set 'oos_shadow=N' for kvm-84 module, OpenBSD 4.5 go farther,

Re: kvm with OpenBSD 4.5

2009-04-16 Thread Dongsheng Song
No good news, same as kvm-84 vanilla. 2009/4/17 David S. Ahern daah...@cisco.com: I believe this is the patch that should fix the problem: Index: kvm/arch/x86/kvm/mmu.c === --- kvm.orig/arch/x86/kvm/mmu.c +++

Re: kvm with OpenBSD 4.5

2009-04-16 Thread David S. Ahern
Have you seen this thread: http://article.gmane.org/gmane.comp.emulators.kvm.devel/28649 It's the one that resulted in these patches by Marcelo: http://article.gmane.org/gmane.comp.emulators.kvm.devel/30452 http://article.gmane.org/gmane.comp.emulators.kvm.devel/30453 david Dongsheng Song

Re: kvm with OpenBSD 4.5

2009-04-16 Thread Dongsheng Song
I don't think it's a cr3 OOS optimisation break, as kvm-72 faild too. 2009/4/17 David S. Ahern daah...@cisco.com: Have you seen this thread: http://article.gmane.org/gmane.comp.emulators.kvm.devel/28649 It's the one that resulted in these patches by Marcelo:

[PATCH] return default values for apic probe functions.

2009-04-16 Thread Glauber Costa
As KVM cpus runs on threads, it is possible that we call kvm_load_registers() from a cpu thread, while the apic has not yet fully initialized. kvm_load_registers() is called from ap_main_loop. This is not a problem when we're starting the whole machine together, but is a problem for hotplug,