[COMMIT master] KVM: Expand on help info to specify kvm intel and amd module names

2009-05-14 Thread Avi Kivity
From: Robert P. J. Day rpj...@crashcourse.ca Signed-off-by: Robert P. J. Day rpj...@crashcourse.ca Cc: Avi Kivity a...@redhat.com Signed-off-by: Andrew Morton a...@linux-foundation.org Signed-off-by: Avi Kivity a...@redhat.com diff --git a/arch/x86/kvm/Kconfig b/arch/x86/kvm/Kconfig index

[COMMIT master] KVM: x86: check for cr3 validity in mmu_alloc_roots

2009-05-14 Thread Avi Kivity
From: Marcelo Tosatti mtosa...@redhat.com Verify the cr3 address stored in vcpu-arch.cr3 points to an existant memslot. If not, inject a triple fault. Signed-off-by: Marcelo Tosatti mtosa...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/arch/x86/kvm/mmu.c

[COMMIT master] KVM: s390: Unlink vcpu on destroy - v2

2009-05-14 Thread Avi Kivity
From: Carsten Otte co...@de.ibm.com This patch makes sure we do unlink a vcpu's sie control block from the system control area in kvm_arch_vcpu_destroy. This prevents illegal accesses to the sie control block from other virtual cpus after free. Reported-by: Mijo Safradin m...@linux.vnet.ibm.com

[COMMIT master] KVM: Unprotect a page if #PF happens during NMI injection.

2009-05-14 Thread Avi Kivity
From: Gleb Natapov g...@redhat.com It is done for exception and interrupt already. Signed-off-by: Gleb Natapov g...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index 8b5ffbd..ac3d5ba 100644 --- a/arch/x86/kvm/svm.c +++

[COMMIT master] KVM: s390: use hrtimer for clock wakeup from idle - v2

2009-05-14 Thread Avi Kivity
From: Christian Borntraeger borntrae...@de.ibm.com This patch reworks the s390 clock comparator wakeup to hrtimer. The clock comparator is a per-cpu value that is compared against the TOD clock. If ckc = TOD an external interrupt 1004 is triggered. Since the clock comparator and the TOD clock

[COMMIT master] KVM: s390: optimize float int lock: spin_lock_bh -- spin_lock

2009-05-14 Thread Avi Kivity
From: Christian Borntraeger borntrae...@de.ibm.com The floating interrupt lock is only taken in process context. We can replace all spin_lock_bh with standard spin_lock calls. Signed-off-by: Christian Borntraeger borntrae...@de.ibm.com Signed-off-by: Christian Ehrhardt ehrha...@de.ibm.com

[COMMIT master] KVM: s390: Verify memory in kvm run

2009-05-14 Thread Avi Kivity
From: Carsten Otte co...@de.ibm.com This check verifies that the guest we're trying to run in KVM_RUN has some memory assigned to it. It enters an endless exception loop if this is not the case. Reported-by: Mijo Safradin m...@linux.vnet.ibm.com Signed-off-by: Carsten Otte co...@de.ibm.com

[COMMIT master] KVM: Do not allow interrupt injection from userspace if there is a pending event.

2009-05-14 Thread Avi Kivity
From: Gleb Natapov g...@redhat.com The exception will immediately close the interrupt window. Signed-off-by: Gleb Natapov g...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 33f850b..d9396a7 100644 --- a/arch/x86/kvm/x86.c +++

[COMMIT master] KVM: skip_emulated_instruction() decode instruction if size is not known

2009-05-14 Thread Avi Kivity
From: Gleb Natapov g...@redhat.com Signed-off-by: Gleb Natapov g...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index ac3d5ba..1315ce0 100644 --- a/arch/x86/kvm/svm.c +++ b/arch/x86/kvm/svm.c @@ -228,7 +228,9 @@ static void

[COMMIT master] KVM: Disable CR8 intercept if tpr patching is active

2009-05-14 Thread Avi Kivity
From: Gleb Natapov g...@redhat.com Signed-off-by: Gleb Natapov g...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 7037afa..44e87a5 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -3138,7 +3138,10 @@ static void

[COMMIT master] KVM: Do not re-execute INTn instruction.

2009-05-14 Thread Avi Kivity
From: Gleb Natapov g...@redhat.com Re-inject event instead. This is what Intel suggest. Also use correct instruction length when re-injecting soft fault/interrupt. Signed-off-by: Gleb Natapov g...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/arch/x86/include/asm/kvm_host.h

[COMMIT master] Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6

2009-05-14 Thread Avi Kivity
From: Avi Kivity a...@redhat.com Conflicts: arch/x86/kvm/x86.c Signed-off-by: Avi Kivity a...@redhat.com -- To unsubscribe from this list: send the line unsubscribe kvm-commits in the body of a message to majord...@vger.kernel.org More majordomo info at

[COMMIT master] KVM: Always request IRQ/NMI window if an interrupt is pending

2009-05-14 Thread Avi Kivity
From: Gleb Natapov g...@redhat.com Currently they are not requested if there is pending exception. Signed-off-by: Gleb Natapov g...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index e395ca4..efba9bc 100644 --- a/arch/x86/kvm/x86.c

[COMMIT master] KVM: Move exit due to NMI handling into vmx_complete_interrupts()

2009-05-14 Thread Avi Kivity
From: Gleb Natapov g...@redhat.com To save us one reading of VM_EXIT_INTR_INFO. Signed-off-by: Gleb Natapov g...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index 29b49f0..fe2ce2b 100644 --- a/arch/x86/kvm/vmx.c +++

[COMMIT master] KVM: Do not migrate pending software interrupts.

2009-05-14 Thread Avi Kivity
From: Gleb Natapov g...@redhat.com INTn will be re-executed after migration. If we wanted to migrate pending software interrupt we would need to migrate interrupt type and instruction length too, but we do not have all required info on SVM, so SVM-VMX migration would need to re-execute INTn

[PATCH -tip] x86: kvm replace MSR_IA32_TIME_STAMP_COUNTER with MSR_IA32_TSC of msr-index.h

2009-05-14 Thread Jaswinder Singh Rajput
Use standard msr-index.h's MSR declaration. MSR_IA32_TSC is better than MSR_IA32_TIME_STAMP_COUNTER as it also solves 80 column issue. Signed-off-by: Jaswinder Singh Rajput jaswinderraj...@gmail.com --- arch/x86/include/asm/kvm_host.h |2 -- arch/x86/kvm/svm.c |4 ++--

Re: [PATCHv5 1/3] virtio: find_vqs/del_vqs virtio operations

2009-05-14 Thread Christian Borntraeger
Am Wednesday 13 May 2009 21:08:58 schrieb Michael S. Tsirkin: This replaces find_vq/del_vq with find_vqs/del_vqs virtio operations, and updates all drivers. This is needed for MSI support, because MSI needs to know the total number of vectors upfront. [...] ---

Re: kvm-autotest: The automation plans?

2009-05-14 Thread Michael Goldish
- jason wang jasow...@redhat.com wrote: sudhir kumar 写道: Hi Uri/Lucas, Do you have any plans for enhancing kvm-autotest? I was looking mainly on the following 2 aspects: (1). we have standalone migration only. Is there any plans of enhancing kvm-autotest so that we can

Re: Best choice for copy/clone/snapshot

2009-05-14 Thread Avi Kivity
Ross Boylan wrote: Thanks for all the info. I have one follow up. On Wed, 2009-05-13 at 10:07 +0300, Avi Kivity wrote: As I install software onto a system I want to preserve its state--just the disk state---at various points so I can go back. What is the best

Re: event injection MACROs

2009-05-14 Thread Avi Kivity
Dong, Eddie wrote: OK. Also back to Gleb's question, the reason I want to do that is to simplify event generation mechanism in current KVM. Today KVM use additional layer of exception/nmi/interrupt such as vcpu.arch.exception.pending, vcpu-arch.interrupt.pending vcpu-arch.nmi_injected. All

Re: [ANNOUNCE] qemu-kvm-0.10.4

2009-05-14 Thread Avi Kivity
Mark McLoughlin wrote: - There will be no stable releases, as such, of the kernel module. You should use upstream linux releases instead - e.g. the latest stable release is 2.6.29.2 Actually, I do plan to release kvm-kmod-2.6.30 (and kvm-kmod-2.6.30.x). -- error compiling

Re: [KVM PATCH v7 2/3] kvm: add support for irqfd via eventfd-notification interface

2009-05-14 Thread Avi Kivity
Gregory Haskins wrote: KVM provides a complete virtual system environment for guests, including support for injecting interrupts modeled after the real exception/interrupt facilities present on the native platform (such as the IDT on x86). Virtual interrupts can come from a variety of sources

Re: kvm-autotest: The automation plans?

2009-05-14 Thread sudhir kumar
On Wed, May 13, 2009 at 11:30 PM, Michael Goldish mgold...@redhat.com wrote: - sudhir kumar smalik...@gmail.com wrote: Hi Uri/Lucas, Do you have any plans for enhancing kvm-autotest? I was looking mainly on the following 2 aspects: (1). we have standalone migration only. Is there any

XP smp using a lot of CPU

2009-05-14 Thread Johannes Schlatow
I had a similar problem some weeks ago. Finally I found out that my VM running WinXP was working on a non-acpi system (maybe I started kvm with -no-acpi option during the installation). In the Device Manager there has to be the entry Computer-ACPI Multiprocessor PC. Otherwise the VM produced 100%

Re: kvm-autotest: The automation plans?

2009-05-14 Thread sudhir kumar
On Thu, May 14, 2009 at 12:22 PM, jason wang jasow...@redhat.com wrote: sudhir kumar 写道: Hi Uri/Lucas, Do you have any plans for enhancing kvm-autotest? I was looking mainly on the following 2 aspects: (1). we have standalone migration only. Is there any plans of enhancing kvm-autotest

Re: [PATCH][KVM-AUTOTEST] TAP network support in kvm-autotest

2009-05-14 Thread Michael Goldish
Hi Jason, We already have patches that implement similar functionality here in TLV, as mentioned in the to-do list (item #4 under 'Framework'). They're not yet committed upstream because they're still quite fresh. Still, your patch looks good and is quite similar to mine. The main difference is

Re: kvm-autotest: The automation plans?

2009-05-14 Thread Michael Goldish
- sudhir kumar smalik...@gmail.com wrote: On Thu, May 14, 2009 at 12:22 PM, jason wang jasow...@redhat.com wrote: sudhir kumar 写道: Hi Uri/Lucas, Do you have any plans for enhancing kvm-autotest? I was looking mainly on the following 2 aspects: (1). we have standalone

[PATCHv6 0/4] virtio: MSI-X support

2009-05-14 Thread Michael S. Tsirkin
Here's the latest draft of virtio patches. This is on top of Rusty's recent virtqueue list + name patch, which is included in series for completeness. Changelog: changes since v5: fix build on s390 (only patch 2/4 modified) Michael S. Tsirkin (3): virtio: find_vqs/del_vqs virtio

[PATCHv6 1/4] virtio: add names to virtqueue struct, mapping from devices to queues.

2009-05-14 Thread Michael S. Tsirkin
From: Rusty Russell ru...@rustcorp.com.au Add a linked list of all virtqueues for a virtio device: this helps for debugging and is also needed for upcoming interface change. Also, add a name field for clearer debug messages. Signed-off-by: Rusty Russell ru...@rustcorp.com.au --- including this

[PATCHv6 4/4] virtio_pci: optional MSI-X support

2009-05-14 Thread Michael S. Tsirkin
This implements optional MSI-X support in virtio_pci. MSI-X is used whenever the host supports at least 2 MSI-X vectors: 1 for configuration changes and 1 for virtqueues. Per-virtqueue vectors are allocated if enough vectors available. Signed-off-by: Michael S. Tsirkin m...@redhat.com ---

Re: [KVM PATCH v7 3/3] kvm: add iofd support

2009-05-14 Thread Avi Kivity
Gregory Haskins wrote: iofd is a mechanism to register PIO/MMIO regions to trigger an eventfd signal when written to. Userspace can register any arbitrary address with a corresponding eventfd. Please start a separate patchset for this so I can merge irqfd. diff --git

Re: kvm-autotest: The automation plans?

2009-05-14 Thread Michael Goldish
- sudhir kumar smalik...@gmail.com wrote: On Wed, May 13, 2009 at 11:30 PM, Michael Goldish mgold...@redhat.com wrote: - sudhir kumar smalik...@gmail.com wrote: Hi Uri/Lucas, Do you have any plans for enhancing kvm-autotest? I was looking mainly on the following 2

Re: [KVM PATCH v7 2/3] kvm: add support for irqfd via eventfd-notification interface

2009-05-14 Thread Avi Kivity
Gregory Haskins wrote: KVM provides a complete virtual system environment for guests, including support for injecting interrupts modeled after the real exception/interrupt facilities present on the native platform (such as the IDT on x86). Virtual interrupts can come from a variety of sources

Re: [KVM PATCH v7 2/3] kvm: add support for irqfd via eventfd-notification interface

2009-05-14 Thread Gregory Haskins
Avi Kivity wrote: Gregory Haskins wrote: KVM provides a complete virtual system environment for guests, including support for injecting interrupts modeled after the real exception/interrupt facilities present on the native platform (such as the IDT on x86). Virtual interrupts can come from a

Re: [KVM PATCH v7 3/3] kvm: add iofd support

2009-05-14 Thread Gregory Haskins
Avi Kivity wrote: Gregory Haskins wrote: iofd is a mechanism to register PIO/MMIO regions to trigger an eventfd signal when written to. Userspace can register any arbitrary address with a corresponding eventfd. Please start a separate patchset for this so I can merge irqfd. Ack. Will

Re: [PATCH] don't use a 32-bit bit type as offset argument.

2009-05-14 Thread Avi Kivity
Glauber Costa wrote: In the call path of kvm_get_dirty_pages_log_range(), its caller kvm_get_dirty_bitmap_cb() passes the target_phys_addr_t both as start_addr and the offset. So, using int will make dirty tracking over 4G fail completely. Applied, thanks. Of course we should be using

Re: [KVM PATCH v7 2/3] kvm: add support for irqfd via eventfd-notification interface

2009-05-14 Thread Avi Kivity
Gregory Haskins wrote: Please fget() the new fd and compare the filps; fds aren't meaningful in the kernel. You can also drop _irqfd::fd. I like this as a second option... It may also be useful to compare the gsi, this allows a make-before-break switchover: ...but I like this

Re: [KVM PATCH v7 3/3] kvm: add iofd support

2009-05-14 Thread Avi Kivity
Gregory Haskins wrote: +#define KVM_IOFD_FLAG_PIO (1 1) + +struct kvm_iofd { +__u64 addr; +__u32 len; +__u32 fd; +__u32 flags; +__u8 pad[12]; +}; + Please add a data match capability. virtio uses a write with the data containing the queue ID, and we want a

Re: i8042.c: No controller found - no keyboard when I type in BIOS

2009-05-14 Thread Tomasz Chmielewski
Tomasz Chmielewski schrieb: The keyboard is not present after I reboot the guest and usually type before Linux is started. It does not happen always. Observed with kvm-83, kvm-84, kvm-85 on multiple KVM hosts (different hardware). Anyone else seeing this? If you're not sure, do something

Re: [KVM PATCH v7 2/3] kvm: add support for irqfd via eventfd-notification interface

2009-05-14 Thread Gregory Haskins
Avi Kivity wrote: Gregory Haskins wrote: Please fget() the new fd and compare the filps; fds aren't meaningful in the kernel. You can also drop _irqfd::fd. I like this as a second option... It may also be useful to compare the gsi, this allows a make-before-break switchover:

Re: i8042.c: No controller found - no keyboard when I type in BIOS

2009-05-14 Thread Tomasz Chmielewski
Tomasz Chmielewski schrieb: Tomasz Chmielewski schrieb: The keyboard is not present after I reboot the guest and usually type before Linux is started. It does not happen always. Observed with kvm-83, kvm-84, kvm-85 on multiple KVM hosts (different hardware). Anyone else seeing this? If

RE: event injection MACROs

2009-05-14 Thread Dong, Eddie
Avi Kivity wrote: Dong, Eddie wrote: OK. Also back to Gleb's question, the reason I want to do that is to simplify event generation mechanism in current KVM. Today KVM use additional layer of exception/nmi/interrupt such as vcpu.arch.exception.pending, vcpu-arch.interrupt.pending

Re: event injection MACROs

2009-05-14 Thread Gleb Natapov
On Thu, May 14, 2009 at 09:43:33PM +0800, Dong, Eddie wrote: Avi Kivity wrote: Dong, Eddie wrote: OK. Also back to Gleb's question, the reason I want to do that is to simplify event generation mechanism in current KVM. Today KVM use additional layer of exception/nmi/interrupt such

Unicode Error

2009-05-14 Thread Gilberto Nunes
Hi all I'm newbie on list. I have deploy a system here, with a Ubuntu Server running KVM. Well, when I run virt-clone command, I get this error: CMD: virt-clone -o vm01 -n VMUbuntu-2 -f /virt/ubuntu-2.img RESULT: Traceback (most recent call last): File /usr/lib/python2.6/logging/__init__.py,

Re: Unicode Error

2009-05-14 Thread Javier Guerra
On Thu, May 14, 2009 at 9:16 AM, Gilberto Nunes gilberto.nu...@selbetti.com.br wrote: Hi all I'm newbie on list. I have deploy a system here, with a Ubuntu Server running KVM. Well, when I run virt-clone command, I get this error: CMD: virt-clone -o vm01 -n VMUbuntu-2 -f /virt/ubuntu-2.img

Re: XP smp using a lot of CPU

2009-05-14 Thread Kevin Shanahan
On Wed, May 13, 2009 at 09:56:18AM +0300, Avi Kivity wrote: Ross Boylan wrote: I just installed XP into a new VM, specifying -smp 2 for the machine. According to top, it's using nearly 200% of a cpu even when I'm not doing anything. Is this real CPU useage, or just a reporting problem (just

RE: event injection MACROs

2009-05-14 Thread Dong, Eddie
Gleb Natapov wrote: On Thu, May 14, 2009 at 09:43:33PM +0800, Dong, Eddie wrote: Avi Kivity wrote: Dong, Eddie wrote: OK. Also back to Gleb's question, the reason I want to do that is to simplify event generation mechanism in current KVM. Today KVM use additional layer of

Re: [PATCH v4 resend 5/6] VT-d: cleanup iommu_flush_iotlb_psi and flush_unmaps

2009-05-14 Thread David Woodhouse
On Thu, 2009-05-14 at 10:32 +0800, Yu Zhao wrote: Make iommu_flush_iotlb_psi() and flush_unmaps() more readable. This doesn't apply any more. -- David WoodhouseOpen Source Technology Centre david.woodho...@intel.com Intel Corporation --

Re: XP smp using a lot of CPU

2009-05-14 Thread Ross Boylan
On Thu, 2009-05-14 at 12:19 +0200, Johannes Schlatow wrote: I had a similar problem some weeks ago. Finally I found out that my VM running WinXP was working on a non-acpi system (maybe I started kvm with -no-acpi option during the installation). In the Device Manager there has to be the entry

Re: event injection MACROs

2009-05-14 Thread Gleb Natapov
On Thu, May 14, 2009 at 10:34:11PM +0800, Dong, Eddie wrote: Gleb Natapov wrote: On Thu, May 14, 2009 at 09:43:33PM +0800, Dong, Eddie wrote: Avi Kivity wrote: Dong, Eddie wrote: OK. Also back to Gleb's question, the reason I want to do that is to simplify event generation mechanism

Re: [PATCH] kvm: user: include arch specific headers from $(KERNELDIR)

2009-05-14 Thread Arnd Bergmann
On Thursday 14 May 2009, Avi Kivity wrote: There aren't the real kernel headers, just cheap copies carried in qemu-kvm.git which have been appropriately postprocessed.  We do this since the kvm external module can run on a much older kernel, so there is no natural place to find it

Re: [KVM PATCH v7 2/3] kvm: add support for irqfd via eventfd-notification interface

2009-05-14 Thread Gregory Haskins
Avi Kivity wrote: Gregory Haskins wrote: KVM provides a complete virtual system environment for guests, including support for injecting interrupts modeled after the real exception/interrupt facilities present on the native platform (such as the IDT on x86). Virtual interrupts can come from a

Re: [PATCH] kvm: user: include arch specific headers from $(KERNELDIR)

2009-05-14 Thread Avi Kivity
Arnd Bergmann wrote: On Thursday 14 May 2009, Avi Kivity wrote: There aren't the real kernel headers, just cheap copies carried in qemu-kvm.git which have been appropriately postprocessed. We do this since the kvm external module can run on a much older kernel, so there is no natural

Re: [PATCH] kvm: user: include arch specific headers from $(KERNELDIR)

2009-05-14 Thread Arnd Bergmann
On Thursday 14 May 2009, Avi Kivity wrote: I usually add a readlink -f in there due to my innate fear of relative directories and cd. There is one already in the only place where this gets used: KERNELDIR=$(readlink -f $kerneldir) It also gets shown in the configure --help output, but I

profiling virtio (blk in this case)

2009-05-14 Thread Eran Rom
The Host--Guest calls in virtio_blk (using the generic virtio kick/notify) are as follows: Guest-Host --- do_virtlkb_request calls kick in the guest side causing handle_output to be called on the host side. Host-Guest --- virtio_blk_rw_complete calls notify in the host side

Re: [PATCH] bios: Fix MADT corruption and RSDT size when using -acpitable

2009-05-14 Thread Beth Kon
Anthony Liguori wrote: Vincent Minet wrote: External ACPI tables are counted twice for the RSDT size and the load address for the first external table is in the MADT (interrupt override entries are overwritten). Signed-off-by: Vincent Minet vinc...@vincent-minet.net Beth, I think you had

[KVM PATCH v8] kvm: add support for irqfd via eventfd-notification interface

2009-05-14 Thread Gregory Haskins
KVM provides a complete virtual system environment for guests, including support for injecting interrupts modeled after the real exception/interrupt facilities present on the native platform (such as the IDT on x86). Virtual interrupts can come from a variety of sources (emulated devices,

[PATCH v8] qemu-kvm: add irqfd support

2009-05-14 Thread Gregory Haskins
irqfd lets you create an eventfd based file-desriptor to inject interrupts to a kvm guest. We associate one gsi per fd for fine-grained routing. Signed-off-by: Gregory Haskins ghask...@novell.com --- kvm/libkvm/libkvm.c | 57 +++

RE: Status of pci passthrough work?

2009-05-14 Thread Passera, Pablo R
Amit, I trying to use PVDMA. I've downloaded a kernel snapshot from the your kvm git, but I couldn't download a snapshot or the repo from your kvm-userspace tree. I tried to launch the VM using kvm-85 user space but it hangs before loading it. Should it work with kvm-85 user space? Do

Re: [Qemu-devel] Re: Question about KVM and PC speaker

2009-05-14 Thread Sebastian Herbszt
malc wrote: On Wed, 13 May 2009, Sebastian Herbszt wrote: Jan Kiszka wrote: Moreover, does sound work at all with your qemu? The image I tried [1] issues two beeps after loading (obviously via direct hw access) - a good way to check general support. Note that one reason for broken host

Re: XP smp using a lot of CPU

2009-05-14 Thread Ross Boylan
On Wed, 2009-05-13 at 09:56 +0300, Avi Kivity wrote: Ross Boylan wrote: I just installed XP into a new VM, specifying -smp 2 for the machine. According to top, it's using nearly 200% of a cpu even when I'm not doing anything. Is this real CPU useage, or just a reporting problem (just as

RFC: convert KVMTRACE to event traces

2009-05-14 Thread Marcelo Tosatti
Convert custom marker based KVMTRACE to event trace. Applies on top of git://git.kernel.org/pub/scm/linux/kernel/git/mingo/linux-2.6-x86.git See Documentation/trace/events.txt and commit 7ce7e4249921d5073e764f7ff7ad83cfa9894bd7 if you're interested in playing with event traces. Index:

[PATCH] Allow to override sync source

2009-05-14 Thread Jan Kiszka
In order to allow sync'ing the kmod dir against arbitrary kernels trees, extend the sync script to accept alternative paths and adjust the Makefile accordingly. Signed-off-by: Jan Kiszka jan.kis...@siemens.com --- Makefile |3 ++- sync | 14 +++--- 2 files changed, 13

[PATCH v3] kvm: x86: Allow PIT emulation without speaker port

2009-05-14 Thread Jan Kiszka
The in-kernel speaker emulation is only a dummy and also unneeded from the performance point of view. Rather, it takes user space support to generate sound output on the host, e.g. console beeps. To allow this, introduce KVM_CREATE_PIT2 which controls in-kernel speaker port emulation via a flag

[PATCH v4] qemu-kvm: Make PC speaker emulation aware of in-kernel PIT

2009-05-14 Thread Jan Kiszka
When using the in-kernel PIT the speaker emulation has to synchronize the PIT state with KVM. Enhance the existing speaker sound device and allow it to take over port 0x61 by using KVM_CREATE_PIT2 where available. This unbreaks -soundhw pcspk in KVM mode. Changes in v4: - preserve full PIT state

KVM VT-d2?

2009-05-14 Thread Fischer, Anna
Does KVM already take advantage of Intel VT-d2 features, e.g. interrupt remapping support? Has anyone verified how it improves interrupt delivery for PCI pass-through devices? Thanks, Anna -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to

[KVM-AUTOTEST PATCH] Instead of trying to remove kvm modules with rmmod, use modprobe -r, as it handles module dependencies better

2009-05-14 Thread Lucas Meneghel Rodrigues
In certain situations, trying to do a rmmod on the kvm modules might generate errors, as there is a chain of dependencies involved. Instead, let's use modprobe -r, as it handles dependencies. Signed-off-by: Lucas Meneghel Rodrigues mrodr...@redhat.com diff --git

RE: KVM VT-d2?

2009-05-14 Thread Kay, Allen M
We have verified VT-d2 features works with PCI passthrough on KVM. To enable it, you need to turn on interrupt remapping in kernel config. Interrupt remapping is a security/isolation feature where interrupt delivery is qualified with device's bus/device/function in interrupt remapping table

Re: [Qemu-devel] Re: Question about KVM and PC speaker

2009-05-14 Thread malc
On Thu, 14 May 2009, Sebastian Herbszt wrote: malc wrote: On Wed, 13 May 2009, Sebastian Herbszt wrote: Jan Kiszka wrote: Moreover, does sound work at all with your qemu? The image I tried [1] issues two beeps after loading (obviously via direct hw access) - a good way to

RE: KVM VT-d2?

2009-05-14 Thread Fischer, Anna
I thought that one use case of VT-d2 interrupt remapping was to be able to safely and more efficiently deliver interrupts to the CPU that runs the particular VCPU of the guest that owns the I/O device that issues the interrupt. Shouldn't there at least be some performance (e.g. latency)

virtio_net with RSS?

2009-05-14 Thread Fischer, Anna
Are there any plans to enhance virtio_net with receive-side scaling capabilities, so that an SMP guest OS can balance its network processing load more equally across multiple CPUs? Thanks, Anna -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to

RE: KVM VT-d2?

2009-05-14 Thread Kay, Allen M
In both interrupt remapping and no interrupt remapping cases, interrupts from the passthrough device are still delivered to the host kernel. KVM then injects the interrupt to guest via vlapic-vioapic-vmcs path. The value add from interrupt remapping is that a new source ID field in interrupt

[ kvm-Bugs-2638990 ] Segfault 284

2009-05-14 Thread SourceForge.net
Bugs item #2638990, was opened at 2009-02-25 23:35 Message generated for change (Settings changed) made by sf-robot You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2638990group_id=180599 Please note that this message will contain a full copy of the comment

Re: [KVM PATCH v7 2/3] kvm: add support for irqfd via eventfd-notification interface

2009-05-14 Thread Davide Libenzi
On Thu, 14 May 2009, Gregory Haskins wrote: Avi Kivity wrote: Gregory Haskins wrote: KVM provides a complete virtual system environment for guests, including support for injecting interrupts modeled after the real exception/interrupt facilities present on the native platform (such as

Re: kvm-autotest: The automation plans?

2009-05-14 Thread jason wang
Michael Goldish 写道: - jason wang jasow...@redhat.com wrote: sudhir kumar 写道: Hi Uri/Lucas, Do you have any plans for enhancing kvm-autotest? I was looking mainly on the following 2 aspects: (1). we have standalone migration only. Is there any plans of enhancing kvm-autotest so

PCI pass-through of multi-function device

2009-05-14 Thread Fischer, Anna
Does KVM allow passing through a full multi-function PCI device to a guest, and make that device appear as a whole multi-function device rather than as multiple PCI single-function devices (e.g. Xen only does the latter where all PCI devices appear with function ID being 0 in the guest)?

KVM 10/Gb Ethernet PCIe passthrough with Linux/iSCSI and large block sizes

2009-05-14 Thread Nicholas A. Bellinger
Greetings all, The first test results for Linux/iSCSI Initiators and targets for large block sizes using 10 Gb/sec Ethernet + PCIe device-passthrough into Linux/KVM guests have been posted at: http://linux-iscsi.org/index.php/KVM-LIO-Target So far, the results have been quite impressive using

Re: [PATCHv6 2/4] virtio: find_vqs/del_vqs virtio operations

2009-05-14 Thread Rusty Russell
And here's the fixup patch I applied: diff --git a/drivers/lguest/lguest_device.c b/drivers/lguest/lguest_device.c --- a/drivers/lguest/lguest_device.c +++ b/drivers/lguest/lguest_device.c @@ -318,11 +318,11 @@ static void lg_del_vqs(struct virtio_dev struct virtqueue *vq, *n;