[PATCH] viostor driver. switch to full-duplex mode.

2009-09-23 Thread Vadim Rozenfeld
repository: /home/vadimr/shares/kvm-guest-drivers-windows branch: master commit ed4b9ade27b56e9ee37461c2cf72e46d75633e9c Author: Vadim Rozenfeldvroze...@redhat.com Date: Wed Sep 23 11:28:48 2009 +0300 [PATCH] viostor driver. switch to full-duplex mode. Signed-off-by: Vadim

Re: [PATCH 2/5] Don't call svm_complete_interrupts for nested guests

2009-09-23 Thread Alexander Graf
Am 22.09.2009 um 18:26 schrieb Joerg Roedel j...@8bytes.org: On Fri, Sep 18, 2009 at 03:00:29PM +0200, Alexander Graf wrote: SVM has some cleanup code, that tries to reinject interrupts and exceptions when the guest didn't manage to deal with them yet. It basically transfers them to KVM

Re: [PATCH 2/5] Don't call svm_complete_interrupts for nested guests

2009-09-23 Thread Alexander Graf
Am 22.09.2009 um 18:26 schrieb Joerg Roedel j...@8bytes.org: On Fri, Sep 18, 2009 at 03:00:29PM +0200, Alexander Graf wrote: SVM has some cleanup code, that tries to reinject interrupts and exceptions when the guest didn't manage to deal with them yet. It basically transfers them to KVM

Re: [PATCH 3/5] Don't #VMEXIT(INTR) if we still have event_inj waiting

2009-09-23 Thread Alexander Graf
Am 22.09.2009 um 18:39 schrieb Joerg Roedel j...@8bytes.org: On Fri, Sep 18, 2009 at 03:00:30PM +0200, Alexander Graf wrote: Real hardware would first process the event_inj field and then notify the host that an interrupt is waiting. Does it really? I couldn't find this in the SVM spec.

Re: [PATCH 2/5] Don't call svm_complete_interrupts for nested guests

2009-09-23 Thread Gleb Natapov
On Wed, Sep 23, 2009 at 01:05:57AM -0700, Alexander Graf wrote: Am 22.09.2009 um 18:26 schrieb Joerg Roedel j...@8bytes.org: On Fri, Sep 18, 2009 at 03:00:29PM +0200, Alexander Graf wrote: SVM has some cleanup code, that tries to reinject interrupts and exceptions when the guest didn't

Re: [PATCH] Update halted state from mpstate only in case of inkernel irq chip

2009-09-23 Thread Avi Kivity
On 09/22/2009 05:51 PM, Gleb Natapov wrote: Otherwise cpu is always unhalted by call to kvm_arch_get_registers() Applied, thanks. -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to

Re: [PATCH] Don't call kvm_cpu_synchronize_state() if there is no irqchip events to process.

2009-09-23 Thread Avi Kivity
On 09/22/2009 05:51 PM, Gleb Natapov wrote: Signed-off-by: Gleb Natapovg...@redhat.com Applied, thanks. -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org

Re: [PATCH] Don't call cpu_synchronize_state() in apic_init_reset()

2009-09-23 Thread Avi Kivity
On 09/22/2009 05:51 PM, Gleb Natapov wrote: Each caller of the function already calls it. Signed-off-by: Gleb Natapovg...@redhat.com --- hw/apic.c |1 - 1 files changed, 0 insertions(+), 1 deletions(-) diff --git a/hw/apic.c b/hw/apic.c index 3a2e128..a9d1fb8 100644 --- a/hw/apic.c +++

Re: [PATCH] qemu-kvm: fix no gsi routing warning

2009-09-23 Thread Avi Kivity
On 09/21/2009 10:50 PM, Michael S. Tsirkin wrote: On Mon, Sep 21, 2009 at 05:56:13PM +0300, Avi Kivity wrote: On 09/21/2009 05:51 PM, Michael S. Tsirkin wrote: When running on host kernel which does not let the guest manupulate the gsi routing, and user requested MSI-X to be enabled,

Re: Possible problem with -no-kvm-irqchip -no-kvm-pit qemu options detected during git daily testing

2009-09-23 Thread Avi Kivity
On 09/21/2009 10:24 PM, Lucas Meneghel Rodrigues wrote: Ok, tests ended, indeed a problem showed up - we still have the problem I reported with the options -no-kvm-irqchip -no-kvm-pit *when* are coupled with the option -smp 2. If -smp 2 is not present, qemu works fine with the options

buildbot failure in qemu-kvm on disable_kvm_x86_64_out_of_tree

2009-09-23 Thread qemu-kvm
The Buildbot has detected a new failure of disable_kvm_x86_64_out_of_tree on qemu-kvm. Full details are available at: http://buildbot.b1-systems.de/qemu-kvm/builders/disable_kvm_x86_64_out_of_tree/builds/19 Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/ Buildslave for this Build:

buildbot failure in qemu-kvm on disable_kvm_x86_64_debian_5_0

2009-09-23 Thread qemu-kvm
The Buildbot has detected a new failure of disable_kvm_x86_64_debian_5_0 on qemu-kvm. Full details are available at: http://buildbot.b1-systems.de/qemu-kvm/builders/disable_kvm_x86_64_debian_5_0/builds/70 Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/ Buildslave for this Build:

buildbot failure in qemu-kvm on disable_kvm_i386_debian_5_0

2009-09-23 Thread qemu-kvm
The Buildbot has detected a new failure of disable_kvm_i386_debian_5_0 on qemu-kvm. Full details are available at: http://buildbot.b1-systems.de/qemu-kvm/builders/disable_kvm_i386_debian_5_0/builds/71 Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/ Buildslave for this Build:

RE: Virtio net driver for Windows 2008 R2

2009-09-23 Thread Yan Vugenfirer
Now :) You can compile the drivers from the git://git.kernel.org/pub/scm/virt/kvm/kvm-guest-drivers-windows.git Use Vista drivers for Win2008R2 if you use default build scripts. You can also use latest WDK and compile the code for Windows 2008 R2. Please keep in mind that you need to test sign

[PATCH] Test 802.1Q vlan of nic

2009-09-23 Thread Amos Kong
Test 802.1Q vlan of nic, config it by vconfig command. 1) Create two VMs 2) Setup guests in different vlan by vconfig and test communication by ping using hard-coded ip address 3) Setup guests in same vlan and test communication by ping 4) Recover the vlan config Signed-off-by: Amos Kong

[PATCH] [RESEND] KVM:VMX: Add support for Pause-Loop Exiting

2009-09-23 Thread Zhai, Edwin
Avi, This is the patch to enable PLE, which depends on the a small change of Linux scheduler (see http://lkml.org/lkml/2009/5/20/447). According to our discussion last time, one missing part is that if PLE exit, pick up an unscheduled vcpu at random and schedule it. But further investigation

Re: [PATCH] [RESEND] KVM:VMX: Add support for Pause-Loop Exiting

2009-09-23 Thread Avi Kivity
On 09/23/2009 05:04 PM, Zhai, Edwin wrote: Avi, This is the patch to enable PLE, which depends on the a small change of Linux scheduler (see http://lkml.org/lkml/2009/5/20/447). According to our discussion last time, one missing part is that if PLE exit, pick up an unscheduled vcpu at random

Re: [PATCHv5 3/3] vhost_net: a kernel-level virtio server

2009-09-23 Thread Gregory Haskins
Avi Kivity wrote: On 09/22/2009 12:43 AM, Ira W. Snyder wrote: Sure, virtio-ira and he is on his own to make a bus-model under that, or virtio-vbus + vbus-ira-connector to use the vbus framework. Either model can work, I agree. Yes, I'm having to create my own bus model, a-la

Re: [PATCHv5 3/3] vhost_net: a kernel-level virtio server

2009-09-23 Thread Avi Kivity
On 09/23/2009 05:26 PM, Gregory Haskins wrote: Yes, I'm having to create my own bus model, a-la lguest, virtio-pci, and virtio-s390. It isn't especially easy. I can steal lots of code from the lguest bus model, but sometimes it is good to generalize, especially after the fourth

Re: [PATCHv5 3/3] vhost_net: a kernel-level virtio server

2009-09-23 Thread Gregory Haskins
Avi Kivity wrote: On 09/23/2009 05:26 PM, Gregory Haskins wrote: Yes, I'm having to create my own bus model, a-la lguest, virtio-pci, and virtio-s390. It isn't especially easy. I can steal lots of code from the lguest bus model, but sometimes it is good to generalize, especially after

Re: [PATCH] Don't call cpu_synchronize_state() in apic_init_reset()

2009-09-23 Thread Jan Kiszka
Avi Kivity wrote: On 09/22/2009 05:51 PM, Gleb Natapov wrote: Each caller of the function already calls it. Signed-off-by: Gleb Natapovg...@redhat.com --- hw/apic.c |1 - 1 files changed, 0 insertions(+), 1 deletions(-) diff --git a/hw/apic.c b/hw/apic.c index 3a2e128..a9d1fb8

Re: [PATCH] Don't call cpu_synchronize_state() in apic_init_reset()

2009-09-23 Thread Avi Kivity
On 09/23/2009 06:07 PM, Jan Kiszka wrote: Avi Kivity wrote: On 09/22/2009 05:51 PM, Gleb Natapov wrote: Each caller of the function already calls it. Signed-off-by: Gleb Natapovg...@redhat.com --- hw/apic.c |1 - 1 files changed, 0 insertions(+), 1 deletions(-) diff --git

Re: [PATCH] Don't call cpu_synchronize_state() in apic_init_reset()

2009-09-23 Thread Jan Kiszka
Avi Kivity wrote: On 09/23/2009 06:07 PM, Jan Kiszka wrote: Avi Kivity wrote: On 09/22/2009 05:51 PM, Gleb Natapov wrote: Each caller of the function already calls it. Signed-off-by: Gleb Natapovg...@redhat.com --- hw/apic.c |1 - 1 files changed, 0 insertions(+), 1

sync guest calls made async on host - SQLite performance

2009-09-23 Thread Matthew Tippett
Hi, I would like to call attention to the SQLite performance under KVM in the current Ubuntu Alpha. http://www.phoronix.com/scan.php?page=articleitem=linux_2631_kvmnum=3 SQLite's benchmark as part of the Phoronix Test Suite is typically IO limited and is affected by both disk and filesystem

Re: [PATCHv5 3/3] vhost_net: a kernel-level virtio server

2009-09-23 Thread Gregory Haskins
Gregory Haskins wrote: Avi Kivity wrote: On 09/23/2009 05:26 PM, Gregory Haskins wrote: Yes, I'm having to create my own bus model, a-la lguest, virtio-pci, and virtio-s390. It isn't especially easy. I can steal lots of code from the lguest bus model, but sometimes it is good to

[PATCH 0/3] ksm support for kvm v2

2009-09-23 Thread Izik Eidus
Hope i fixed everything i was asked... please tell me if I forgot anything. Izik Eidus (3): kvm: dont hold pagecount reference for mapped sptes pages add SPTE_HOST_WRITEABLE flag to the shadow ptes add support for change_pte mmu notifiers arch/x86/include/asm/kvm_host.h |1 +

[PATCH 1/3] kvm: dont hold pagecount reference for mapped sptes pages

2009-09-23 Thread Izik Eidus
When using mmu notifiers, we are allowed to remove the page count reference tooken by get_user_pages to a specific page that is mapped inside the shadow page tables. This is needed so we can balance the pagecount against mapcount checking. (Right now kvm increase the pagecount and does not

[PATCH 2/3] add SPTE_HOST_WRITEABLE flag to the shadow ptes

2009-09-23 Thread Izik Eidus
this flag notify that the host physical page we are pointing to from the spte is write protected, and therefore we cant change its access to be write unless we run get_user_pages(write = 1). (this is needed for change_pte support in kvm) Signed-off-by: Izik Eidus iei...@redhat.com ---

[PATCH 3/3] add support for change_pte mmu notifiers

2009-09-23 Thread Izik Eidus
this is needed for kvm if it want ksm to directly map pages into its shadow page tables. Signed-off-by: Izik Eidus iei...@redhat.com --- arch/x86/include/asm/kvm_host.h |1 + arch/x86/kvm/mmu.c | 64 +- virt/kvm/kvm_main.c | 14

Re: [PATCH 3/3] add support for change_pte mmu notifiers

2009-09-23 Thread Izik Eidus
Izik Eidus wrote: this is needed for kvm if it want ksm to directly map pages into its shadow page tables. Signed-off-by: Izik Eidus iei...@redhat.com --- arch/x86/include/asm/kvm_host.h |1 + arch/x86/kvm/mmu.c | 64 +-

[PATCH 0/3] kvm ksm support v3

2009-09-23 Thread Izik Eidus
Change from v2 : remove unused if. Thanks. Izik Eidus (3): kvm: dont hold pagecount reference for mapped sptes pages add SPTE_HOST_WRITEABLE flag to the shadow ptes add support for change_pte mmu notifiers arch/x86/include/asm/kvm_host.h |1 + arch/x86/kvm/mmu.c | 84

[PATCH 1/3] kvm: dont hold pagecount reference for mapped sptes pages

2009-09-23 Thread Izik Eidus
When using mmu notifiers, we are allowed to remove the page count reference tooken by get_user_pages to a specific page that is mapped inside the shadow page tables. This is needed so we can balance the pagecount against mapcount checking. (Right now kvm increase the pagecount and does not

[PATCH 2/3] add SPTE_HOST_WRITEABLE flag to the shadow ptes

2009-09-23 Thread Izik Eidus
this flag notify that the host physical page we are pointing to from the spte is write protected, and therefore we cant change its access to be write unless we run get_user_pages(write = 1). (this is needed for change_pte support in kvm) Signed-off-by: Izik Eidus iei...@redhat.com ---

[PATCH 3/3] add support for change_pte mmu notifiers

2009-09-23 Thread Izik Eidus
this is needed for kvm if it want ksm to directly map pages into its shadow page tables. Signed-off-by: Izik Eidus iei...@redhat.com --- arch/x86/include/asm/kvm_host.h |1 + arch/x86/kvm/mmu.c | 62 +- virt/kvm/kvm_main.c | 14

Re: [PATCH] x86: Pick up local arch trace header

2009-09-23 Thread Jorge Lucángeli Obes
On Sun, Sep 20, 2009 at 3:49 PM, Aidan Marks ai...@cisco.com wrote: Ah, right. ok.  hmm, still getting these symbol warnings: vger kvm-kmod # git checkout -b queue origin/queue M       linux-2.6 Branch queue set up to track remote branch queue from origin. Switched to a new branch 'queue'

Re: [PATCHv5 3/3] vhost_net: a kernel-level virtio server

2009-09-23 Thread Avi Kivity
On 09/23/2009 08:58 PM, Gregory Haskins wrote: It also pulls parts of the device model into the host kernel. That is the point. Most of it needs to be there for performance. To clarify this point: There are various aspects about designing high-performance virtual devices such

Re: [PATCHv5 3/3] vhost_net: a kernel-level virtio server

2009-09-23 Thread Gregory Haskins
Avi Kivity wrote: On 09/23/2009 08:58 PM, Gregory Haskins wrote: It also pulls parts of the device model into the host kernel. That is the point. Most of it needs to be there for performance. To clarify this point: There are various aspects about designing high-performance

[PATCH] kvm: allocate correct size for dirty bitmap

2009-09-23 Thread Bruce Rogers
The dirty bitmap copied out to userspace is stored in a long array, and gets copied out to userspace accordingly. This patch accounts for that correctly. Currently I'm seeing kvm crashing due to writing beyond the end of the alloc'd dirty bitmap memory, because the buffer has the wrong size.

[PATCH: kvm 1/6] Code motion. Separate timer intialization into an indepedent function.

2009-09-23 Thread Zachary Amsden
Signed-off-by: Zachary Amsden zams...@redhat.com --- arch/x86/kvm/x86.c | 23 +++ 1 files changed, 15 insertions(+), 8 deletions(-) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index fedac9d..15d2ace 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@

[PATCH: kvm 3/6] Fix hotadd of CPUs for KVM.

2009-09-23 Thread Zachary Amsden
Both VMX and SVM require per-cpu memory allocation, which is done at module init time, for only online cpus. When bringing a new CPU online, we must also allocate this structure. The method chosen to implement this is to make the CPU online notifier available via a call to the arch code. This

[PATCH: kvm 4/6] Fix hotremove of CPUs for KVM.

2009-09-23 Thread Zachary Amsden
In the process of bringing down CPUs, the SVM / VMX structures associated with those CPUs are not freed. This may cause leaks when unloading and reloading the KVM module, as only the structures associated with online CPUs are cleaned up. Signed-off-by: Zachary Amsden zams...@redhat.com ---

[PATCH: kvm 5/6] Don't unconditionally clear cpu_khz_tsc in hardware_enable.

2009-09-23 Thread Zachary Amsden
For the non-hotplug case, this TSC speed should be available; instead, clear cpu_khz_tsc when bringing down a CPU so it is recomputed at the next bringup. Signed-off-by: Zachary Amsden zams...@redhat.com --- arch/x86/kvm/x86.c | 12 +--- 1 files changed, 5 insertions(+), 7 deletions(-)

[PATCH: kvm 6/6] Math is hard; let's do some cooking.

2009-09-23 Thread Zachary Amsden
CPU frequency change callback provides new TSC frequency for us, and in the same units (kHz), so there is no reason to do any math. Signed-off-by: Zachary Amsden zams...@redhat.com --- arch/x86/kvm/x86.c |5 + 1 files changed, 1 insertions(+), 4 deletions(-) diff --git

[PATCH: kvm 2/6] Kill the confusing tsc_ref_khz and ref_freq variables.

2009-09-23 Thread Zachary Amsden
They are globals, not clearly protected by any ordering or locking, and vulnerable to various startup races. Instead, for variable TSC machines, register the cpufreq notifier and get the TSC frequency directly from the cpufreq machinery. Not only is it always right, it is also perfectly

linux-next: tree build failure

2009-09-23 Thread Stephen Rothwell
Hi all, Today's linux-next build (powerpc ppc44x_defconfig) failed like this: In file included from arch/powerpc/kvm/booke.c:31: arch/powerpc/kvm/timing.h: In function 'kvmppc_account_exit_stat': arch/powerpc/kvm/timing.h:51: error: bit-field 'anonymous' width not an integer constant In file