RE: [PATCHv5 3/3] vhost_net: a kernel-level virtio server

2009-09-13 Thread Xin, Xiaohui
>The irqfd/ioeventfd patches are part of Avi's kvm.git tree: >git://git.kernel.org/pub/scm/linux/kernel/git/avi/kvm.git > >I expect them to be merged by 2.6.32-rc1 - right, Avi? Michael, I think I have the kernel patch for kvm_irqfd and kvm_ioeventfd, but missed the qemu side patch for irqfd and

Re: [Autotest] [PATCH 12/19] KVM test: Add new module kvm_test_utils.py

2009-09-13 Thread Yolkfull Chow
On Wed, Sep 09, 2009 at 09:12:05PM +0300, Michael Goldish wrote: > This module is meant to reduce code size by performing common test procedures. > Generally, code here should look like test code. > More specifically: > - Functions in this module should raise exceptions if things go wrong >

Re: [PATCH 2/3] add SPTE_HOST_WRITEABLE flag to the shadow ptes

2009-09-13 Thread Avi Kivity
On 09/10/2009 07:38 PM, Izik Eidus wrote: this flag notify that the host physical page we are pointing to from the spte is write protected, and therefore we cant change its access to be write unless we run get_user_pages(write = 1). (this is needed for change_pte support in kvm) diff --git a/

Re: Running kvm/use/kvmctl just segfault

2009-09-13 Thread Avi Kivity
On 09/14/2009 04:38 AM, shawn du wrote: Are these commands right? ./kvmctl -s 1 -m 256 test/x86/smptest.flat or ./kvmctl -s 1 -m 128 text/x86/bootstrap test/x86/smptest.flat That is the correct way. However I haven't tested the smp tests in a while (probably since kvm gained smp support

Re: [PATCH -v2] QEMU-KVM: MCE: Relay UCR MCE to guest

2009-09-13 Thread Avi Kivity
On 09/14/2009 05:55 AM, Huang Ying wrote: Hi, Avi, On Thu, 2009-09-10 at 17:35 +0800, Andi Kleen wrote: (also, I if we can't handle guest-mode SIGBUS I think it would be nice to raise it again so the process terminates due to the SIGBUS). For SIGBUS we can not relay to guest as M

Re: [PATCH -v2] QEMU-KVM: MCE: Relay UCR MCE to guest

2009-09-13 Thread Avi Kivity
On 09/10/2009 12:35 PM, Andi Kleen wrote: (also, I if we can't handle guest-mode SIGBUS I think it would be nice to raise it again so the process terminates due to the SIGBUS). For SIGBUS we can not relay to guest as MCE, we can either abort or reset SIGBUS to SIGDFL and re-raise it. Bot

Re: [PATCH] Activate Virtualization On Demand

2009-09-13 Thread Avi Kivity
On 09/09/2009 05:18 PM, Alexander Graf wrote: X86 CPUs need to have some magic happening to enable the virtualization extensions on them. This magic can result in unpleasant results for users, like blocking other VMMs from working (vmx) or using invalid TLB entries (svm). Currently KVM activates

Re: [RFC] KVM: x86: conditionally acquire/release slots_lock on entry/exit

2009-09-13 Thread Avi Kivity
On 09/14/2009 01:49 AM, Marcelo Tosatti wrote: I think synchronize_srcu() will be deferred until the fault path is complete (and srcu_read_unlock() runs). Copying someone who knows for sure. Yes, synchronize_srcu() will block until srcu_read_unlock() in this scenario, assuming that th

Re: [Autotest] [PATCH] Adding a userspace application crash handling system to autotest

2009-09-13 Thread Lucas Meneghel Rodrigues
Hi John, do you think the code looks good enough for inclusion? On Tue, Sep 8, 2009 at 10:53 AM, Lucas Meneghel Rodrigues wrote: > This patch adds a system to watch user space segmentation > faults, writing core dumps and some degree of core dump > analysis report. We believe that such a system w

Biweekly KVM Test report, kernel 8f54d... qemu 33ed1...

2009-09-13 Thread Xu, Jiajun
Hi All, This Weekly KVM Testing Report against lastest kvm.git 8f54df0733e2b592151a38c44cf0f8b2ba1ecce8 and qemu-kvm.git 33ed13e101bc18a4b98dc3385b0037295557710a. There is no new bug found in this two weeks. There are 7 old bugs open in bug tracking. Seven Old Issues: ==

Re: [PATCH -v2] QEMU-KVM: MCE: Relay UCR MCE to guest

2009-09-13 Thread Huang Ying
Hi, Avi, On Thu, 2009-09-10 at 17:35 +0800, Andi Kleen wrote: > > > (also, I if we can't handle guest-mode SIGBUS I think it would be nice > > > to raise it again so the process terminates due to the SIGBUS). > > > > For SIGBUS we can not relay to guest as MCE, we can either abort or > > reset

Re: Running kvm/use/kvmctl just segfault

2009-09-13 Thread shawn du
Are these commands right? ./kvmctl -s 1 -m 256 test/x86/smptest.flat or ./kvmctl -s 1 -m 128 text/x86/bootstrap test/x86/smptest.flat And I am using Linux kernel 2.6.27.18 downloaded from Ubuntu repository, my qemu-kvm is qemu-kvm-0.11.0-rc1 downloaded from kvm website. Before that, I just make

Re: [RFC] KVM: x86: conditionally acquire/release slots_lock on entry/exit

2009-09-13 Thread Marcelo Tosatti
On Sun, Sep 13, 2009 at 09:26:52AM -0700, Paul E. McKenney wrote: > On Sun, Sep 13, 2009 at 06:42:49PM +0300, Avi Kivity wrote: > > On 09/11/2009 01:30 AM, Marcelo Tosatti wrote: > >> > >>> We don't need to stop vcpus, just kick them out of guest mode to let > >>> them notice the new data. SRCU do

Re: [RFC] KVM: x86: conditionally acquire/release slots_lock on entry/exit

2009-09-13 Thread Paul E. McKenney
On Sun, Sep 13, 2009 at 06:42:49PM +0300, Avi Kivity wrote: > On 09/11/2009 01:30 AM, Marcelo Tosatti wrote: >> >>> We don't need to stop vcpus, just kick them out of guest mode to let >>> them notice the new data. SRCU does that well. >>> >> Two problems: >> >> 1. The removal of memslots/al

[PATCH QEMU-KVM 2/2] test: Add vmcall latency test

2009-09-13 Thread Avi Kivity
Signed-off-by: Avi Kivity --- kvm/user/test/x86/vmexit.c |8 1 files changed, 8 insertions(+), 0 deletions(-) diff --git a/kvm/user/test/x86/vmexit.c b/kvm/user/test/x86/vmexit.c index 364837f..bd1895f 100644 --- a/kvm/user/test/x86/vmexit.c +++ b/kvm/user/test/x86/vmexit.c @@ -30,1

[PATCH QEMU-KVM 0/2] vmcall latency test

2009-09-13 Thread Avi Kivity
This patchset adds a vmcall latency test to the test suite. Avi Kivity (2): test: Allow adding mode vmexit latency tests test: Add vmcall latency test kvm/user/test/x86/vmexit.c | 40 1 files changed, 36 insertions(+), 4 deletions(-) -- To unsubscr

[PATCH QEMU-KVM 1/2] test: Allow adding mode vmexit latency tests

2009-09-13 Thread Avi Kivity
Make the latency test run on an array of function pointers, which can be expanded with more tests. Signed-off-by: Avi Kivity --- kvm/user/test/x86/vmexit.c | 32 1 files changed, 28 insertions(+), 4 deletions(-) diff --git a/kvm/user/test/x86/vmexit.c b/kvm/us

Re: [RFC] KVM: x86: conditionally acquire/release slots_lock on entry/exit

2009-09-13 Thread Avi Kivity
On 09/11/2009 01:30 AM, Marcelo Tosatti wrote: We don't need to stop vcpus, just kick them out of guest mode to let them notice the new data. SRCU does that well. Two problems: 1. The removal of memslots/aliases and zapping of mmu (to remove any shadow pages with stale sp->gfn) must be

[PATCH 09/10] test: fix realmode test print_serial() direction flag

2009-09-13 Thread Avi Kivity
Clear the direction flag to get the correct output. Signed-off-by: Avi Kivity --- kvm/user/test/x86/realmode.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/kvm/user/test/x86/realmode.c b/kvm/user/test/x86/realmode.c index 0db09b8..f9e303f 100644 --- a/kvm/user/test/x

[PATCH 07/10] test: switch output format to elf

2009-09-13 Thread Avi Kivity
This can be loaded by multiboot (qemu -kernel ...) Signed-off-by: Avi Kivity --- kvm/user/flat.lds |2 -- 1 files changed, 0 insertions(+), 2 deletions(-) diff --git a/kvm/user/flat.lds b/kvm/user/flat.lds index d61bec3..4120595 100644 --- a/kvm/user/flat.lds +++ b/kvm/user/flat.lds @@ -1,5

[PATCH 06/10] test: use real APIC instead of fake APIC

2009-09-13 Thread Avi Kivity
smp temporarily disabled Signed-off-by: Avi Kivity --- kvm/user/test/x86/cstart64.S |9 ++--- 1 files changed, 6 insertions(+), 3 deletions(-) diff --git a/kvm/user/test/x86/cstart64.S b/kvm/user/test/x86/cstart64.S index 3f193a3..912bcf8 100644 --- a/kvm/user/test/x86/cstart64.S +++ b/

[PATCH 10/10] test: port readmode tests to multiboot

2009-09-13 Thread Avi Kivity
Signed-off-by: Avi Kivity --- kvm/user/test/x86/realmode.c | 52 --- kvm/user/test/x86/realmode.lds |6 + 2 files changed, 43 insertions(+), 15 deletions(-) diff --git a/kvm/user/test/x86/realmode.c b/kvm/user/test/x86/realmode.c index f9e303f..9bf

[PATCH 08/10] test: Remove smp support from access.c

2009-09-13 Thread Avi Kivity
Doesn't do anthing anyway. Signed-off-by: Avi Kivity --- kvm/user/test/x86/access.c |4 ++-- 1 files changed, 2 insertions(+), 2 deletions(-) diff --git a/kvm/user/test/x86/access.c b/kvm/user/test/x86/access.c index 272a4ef..5eadff8 100644 --- a/kvm/user/test/x86/access.c +++ b/kvm/user/te

[PATCH 05/10] test: Map 4GB of memory

2009-09-13 Thread Avi Kivity
Needed so the APIC can be accessed at address 0xfee0. Signed-off-by: Avi Kivity --- kvm/user/test/x86/cstart64.S |7 +-- 1 files changed, 5 insertions(+), 2 deletions(-) diff --git a/kvm/user/test/x86/cstart64.S b/kvm/user/test/x86/cstart64.S index 805938b..3f193a3 100644 --- a/kvm/

[PATCH 04/10] test: add multiboot headers to startup files

2009-09-13 Thread Avi Kivity
With these headers, multiboot can launch us directly in protected mode. Signed-off-by: Avi Kivity --- kvm/user/test/x86/cstart.S |9 + kvm/user/test/x86/cstart64.S |9 + 2 files changed, 18 insertions(+), 0 deletions(-) diff --git a/kvm/user/test/x86/cstart.S b/kvm/use

[PATCH 03/10] test: Set up a default stack

2009-09-13 Thread Avi Kivity
multiboot doesn't give us any stack, so we need to set one up. Signed-off-by: Avi Kivity --- kvm/user/test/x86/cstart64.S |1 + 1 files changed, 1 insertions(+), 0 deletions(-) diff --git a/kvm/user/test/x86/cstart64.S b/kvm/user/test/x86/cstart64.S index 432a3dc..4f116f9 100644 --- a/kvm/u

[PATCH 00/10][QEMU-KVM] Port test suite to multiboot

2009-09-13 Thread Avi Kivity
Currently the test suite uses a custom control program and BIOS as a loader. This is clumsy and annoying to work with. This patch series ports the test suite to load with the multiboot support provided by qemu -kernel. Test binaries are now ordinary elf objects (though still with the extension .f

[PATCH 01/10] Add test device for use with the test suite

2009-09-13 Thread Avi Kivity
The test device implements: - a serial port (0xf1) - an exit port (0xf4) - a memory size port (0xd1) It is planned to replace these with the standard serial and firmware configuration ports. Signed-off-by: Avi Kivity --- hw/pc.c | 28 qemu-options.hx |

[PATCH 02/10] test: load image immediately after program headers

2009-09-13 Thread Avi Kivity
Otherwise, ld places the image somewhere where multiboot can't find the multiboot headers. Signed-off-by: Avi Kivity --- kvm/user/flat.lds |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/kvm/user/flat.lds b/kvm/user/flat.lds index 61f1057..d61bec3 100644 --- a/kvm/user/

Re: [PATCH 4/4] Make cpu runnable after sipi

2009-09-13 Thread Gleb Natapov
On Sun, Sep 13, 2009 at 03:05:21PM +0300, Avi Kivity wrote: > On 09/13/2009 11:30 AM, Gleb Natapov wrote: > >Signed-off-by: Gleb Natapov > >--- > > hw/apic.c |3 +++ > > 1 files changed, 3 insertions(+), 0 deletions(-) > > > >diff --git a/hw/apic.c b/hw/apic.c > >index 11d4759..ac5e7ba 100644

Re: [PATCH 4/4] Make cpu runnable after sipi

2009-09-13 Thread Avi Kivity
On 09/13/2009 11:30 AM, Gleb Natapov wrote: Signed-off-by: Gleb Natapov --- hw/apic.c |3 +++ 1 files changed, 3 insertions(+), 0 deletions(-) diff --git a/hw/apic.c b/hw/apic.c index 11d4759..ac5e7ba 100644 --- a/hw/apic.c +++ b/hw/apic.c @@ -534,6 +534,9 @@ void apic_sipi(CPUState *env)

Re: [PATCHv5 3/3] vhost_net: a kernel-level virtio server

2009-09-13 Thread Michael S. Tsirkin
On Fri, Sep 11, 2009 at 12:00:21PM -0400, Gregory Haskins wrote: > FWIW: VBUS handles this situation via the "memctx" abstraction. IOW, > the memory is not assumed to be a userspace address. Rather, it is a > memctx-specific address, which can be userspace, or any other type > (including hardware

Re: Running kvm/use/kvmctl just segfault

2009-09-13 Thread Avi Kivity
On 09/13/2009 11:38 AM, shawn du wrote: Hi, No matter what flatfile in the test/x86 directory I provide, it just "Segmentation fault". Does these tests still work? The tests do work. How are you launching them? -- error compiling committee.c: too many arguments to function -- To unsubs

Running kvm/use/kvmctl just segfault

2009-09-13 Thread shawn du
Hi, No matter what flatfile in the test/x86 directory I provide, it just "Segmentation fault". Does these tests still work? Regards, Shawn -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.ke

[PATCH 3/4] set correct CS seg limit and flags on sipi

2009-09-13 Thread Gleb Natapov
This one was sent to qemu upstream. Include it here because next patch needs it. Signed-off-by: Gleb Natapov --- hw/apic.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/hw/apic.c b/hw/apic.c index 68e5de3..11d4759 100644 --- a/hw/apic.c +++ b/hw/apic.c @@ -531,7 +531,

[PATCH 2/4] Use kvm_cpu_synchronize_state() instead of kvm_arch_(save|load)_regs()

2009-09-13 Thread Gleb Natapov
Signed-off-by: Gleb Natapov --- qemu-kvm-x86.c |3 +-- 1 files changed, 1 insertions(+), 2 deletions(-) diff --git a/qemu-kvm-x86.c b/qemu-kvm-x86.c index ee678df..6e5bcc5 100644 --- a/qemu-kvm-x86.c +++ b/qemu-kvm-x86.c @@ -1671,10 +1671,9 @@ uint32_t kvm_arch_get_supported_cpuid(CPUState

[PATCH 1/4] Remove unused function.

2009-09-13 Thread Gleb Natapov
kvm_arch_update_regs_for_sipi() is not used anymore. Signed-off-by: Gleb Natapov --- qemu-kvm-ia64.c |4 qemu-kvm-x86.c | 10 -- qemu-kvm.h |1 - 3 files changed, 0 insertions(+), 15 deletions(-) diff --git a/qemu-kvm-ia64.c b/qemu-kvm-ia64.c index 062fbd4..d26c2a9

[PATCH 4/4] Make cpu runnable after sipi

2009-09-13 Thread Gleb Natapov
Signed-off-by: Gleb Natapov --- hw/apic.c |3 +++ 1 files changed, 3 insertions(+), 0 deletions(-) diff --git a/hw/apic.c b/hw/apic.c index 11d4759..ac5e7ba 100644 --- a/hw/apic.c +++ b/hw/apic.c @@ -534,6 +534,9 @@ void apic_sipi(CPUState *env) env->segs[R_CS].l