Re: [PATCH 7/8] KVM: assigned dev: Introduce io_device for MSI-X MMIO accessing

2010-10-21 Thread Sheng Yang
On Wednesday 20 October 2010 17:46:47 Avi Kivity wrote: On 10/20/2010 10:26 AM, Sheng Yang wrote: It would be work with KVM_CAP_DEVICE_MSIX_MASK, which we would enable in the last patch. +struct kvm_assigned_msix_mmio { + __u32 assigned_dev_id; + __u64 base_addr;

Re: Packard bell easynote ml61

2010-10-21 Thread Mihamina Rakotomandimby
m...@mjw.se : Anyone run kvm on it? Find out the CPU specs and you'll be able to discover it it's possible. -- Architecte Informatique chez Blueline/Gulfsat: Administration Systeme, Recherche Developpement +261 34 56 000 19 -- To unsubscribe

Re: [PATCH 0/8][v2] MSI-X mask emulation support for assigned device

2010-10-21 Thread Sheng Yang
On Thursday 21 October 2010 03:02:24 Marcelo Tosatti wrote: On Wed, Oct 20, 2010 at 04:26:24PM +0800, Sheng Yang wrote: Here is v2. Changelog: v1-v2 The major change from v1 is I've added the in-kernel MSI-X mask emulation support, as well as adding shortcuts for reading MSI-X

Re: [PATCH] KVM Test: add -w parameter in nc command in kvm_utils.py

2010-10-21 Thread Michael Goldish
On 10/21/2010 03:57 AM, Feng Yang wrote: - Michael Goldish mgold...@redhat.com wrote: From: Michael Goldish mgold...@redhat.com To: Feng Yang fy...@redhat.com Cc: autot...@test.kernel.org, kvm@vger.kernel.org Sent: Wednesday, October 20, 2010 6:48:42 PM GMT +08:00 Beijing / Chongqing

Re: [PATCH 0/8][v2] MSI-X mask emulation support for assigned device

2010-10-21 Thread Sheng Yang
On Wednesday 20 October 2010 17:51:01 Avi Kivity wrote: On 10/20/2010 10:26 AM, Sheng Yang wrote: Here is v2. Changelog: v1-v2 The major change from v1 is I've added the in-kernel MSI-X mask emulation support, as well as adding shortcuts for reading MSI-X table. I've

Re: [PATCH 08/10] MCE: Relay UCR MCE to guest

2010-10-21 Thread Paolo Bonzini
On 10/21/2010 12:03 AM, Anthony Liguori wrote: The timeout of qemu_kvm_eat_signal is always zero. So then qemu_kvm_eat_signal purely polls and it will happily keep polling as long as there is a signal pending. So what's the point of doing a sigtimedwait() and dropping qemu_mutex? I agree

Re: [PATCH 7/8] KVM: assigned dev: Introduce io_device for MSI-X MMIO accessing

2010-10-21 Thread Sheng Yang
On Thursday 21 October 2010 06:35:11 Michael S. Tsirkin wrote: On Wed, Oct 20, 2010 at 04:26:31PM +0800, Sheng Yang wrote: It would be work with KVM_CAP_DEVICE_MSIX_MASK, which we would enable in the last patch. Signed-off-by: Sheng Yang sh...@linux.intel.com Merge this with patch 8 -

Re: [Qemu-devel] KVM call minutes for Oct 19

2010-10-21 Thread Paolo Bonzini
On 10/21/2010 03:14 AM, Alexander Graf wrote: I agree that some agent code for basic stuff like live snapshot sync with the filesystem is small enough and worth to host within qemu. Maybe we do need more than one project? No, please. That's exactly what I don't want to see. The

Re: [GIT PULL net-2.6] vhost-net: access_ok fix

2010-10-21 Thread David Miller
From: Michael S. Tsirkin m...@redhat.com Date: Tue, 19 Oct 2010 16:59:01 +0200 David, Not sure if it's too late for 2.6.36 - in case it's not, the following tree includes a last minute bugfix for vhost-net, found by code inspection. It is on top of net-2.6. Thanks! The following changes

[PATCH] Fix build on !KVM_CAP_MCE

2010-10-21 Thread Hidetoshi Seto
This patch removes following warnings: target-i386/kvm.c: In function 'kvm_put_msrs': target-i386/kvm.c:782: error: unused variable 'i' target-i386/kvm.c: In function 'kvm_get_msrs': target-i386/kvm.c:1083: error: label at end of compound statement Signed-off-by: Hidetoshi Seto

Re: [PATCH 0/8][v2] MSI-X mask emulation support for assigned device

2010-10-21 Thread Michael S. Tsirkin
On Thu, Oct 21, 2010 at 03:10:19PM +0800, Sheng Yang wrote: On Thursday 21 October 2010 03:02:24 Marcelo Tosatti wrote: On Wed, Oct 20, 2010 at 04:26:24PM +0800, Sheng Yang wrote: Here is v2. Changelog: v1-v2 The major change from v1 is I've added the in-kernel MSI-X

Re: [PATCH 8/8] KVM: Emulation MSI-X mask bits for assigned devices

2010-10-21 Thread Sheng Yang
On Wednesday 20 October 2010 16:26:32 Sheng Yang wrote: This patch enable per-vector mask for assigned devices using MSI-X. The basic idea of kernel and QEmu's responsibilities are: 1. Because QEmu owned the irq routing table, so the change of table should still go to the QEmu, like we did in

[PATCH 1/2] KVM: introduce wrapper function for creating/destroying dirty bitmaps

2010-10-21 Thread Takuya Yoshikawa
This makes it easy to change the way of allocating/freeing dirty bitmaps. Signed-off-by: Takuya Yoshikawa yoshikawa.tak...@oss.ntt.co.jp Signed-off-by: Fernando Luis Vazquez Cao ferna...@oss.ntt.co.jp --- virt/kvm/kvm_main.c | 30 +++--- 1 files changed, 23

Re: [PATCH RFC] KVM: use kmalloc() for small dirty bitmaps

2010-10-21 Thread Avi Kivity
On 10/21/2010 03:51 AM, Takuya Yoshikawa wrote: (2010/10/20 18:34), Takuya Yoshikawa wrote: ** NOT TESTED WELL YET ** Currently, we are using vmalloc() for all dirty bitmaps even though they are small enough, say 256 bytes or less. So we use kmalloc() if dirty bitmap size is less than or

[PATCH 2/2] KVM: pre-allocate one more dirty bitmap to avoid vmalloc() in x86's kvm_vm_ioctl_get_dirty_log()

2010-10-21 Thread Takuya Yoshikawa
Currently x86's kvm_vm_ioctl_get_dirty_log() needs to allocate a bitmap by vmalloc() which will be used in the next logging and this has been causing bad effect to VGA and live-migration: vmalloc() consumes extra systime, triggers tlb flush, etc. This patch resolves this issue by pre-allocating

Re: [PATCH RFC] KVM: use kmalloc() for small dirty bitmaps

2010-10-21 Thread Takuya Yoshikawa
(2010/10/21 17:38), Avi Kivity wrote: On 10/21/2010 03:51 AM, Takuya Yoshikawa wrote: (2010/10/20 18:34), Takuya Yoshikawa wrote: ** NOT TESTED WELL YET ** Currently, we are using vmalloc() for all dirty bitmaps even though they are small enough, say 256 bytes or less. So we use kmalloc() if

Re: [PATCH 8/8] KVM: Emulation MSI-X mask bits for assigned devices

2010-10-21 Thread Michael S. Tsirkin
On Thu, Oct 21, 2010 at 04:30:02PM +0800, Sheng Yang wrote: On Wednesday 20 October 2010 16:26:32 Sheng Yang wrote: This patch enable per-vector mask for assigned devices using MSI-X. The basic idea of kernel and QEmu's responsibilities are: 1. Because QEmu owned the irq routing table, so

[PATCH] x86, mce: ignore SRAO only when MCG_SER_P is available

2010-10-21 Thread Hidetoshi Seto
And restruct this block to call kvm_mce_in_exception() only when it is required. Signed-off-by: Hidetoshi Seto seto.hideto...@jp.fujitsu.com --- target-i386/kvm.c | 16 ++-- 1 files changed, 10 insertions(+), 6 deletions(-) diff --git a/target-i386/kvm.c b/target-i386/kvm.c index

[PATCH] x86, mce: broadcast mce depending on the cpu version

2010-10-21 Thread Hidetoshi Seto
There is no reason why SRAO event received by the main thread is the only one that being broadcasted. According to the x86 ASDM vol.3A 15.10.4.1, MCE signal is broadcast on processor version 06H_EH or later. This change is required to handle SRAR in smp guests. Signed-off-by: Hidetoshi Seto

Re: [PATCH RFC] KVM: use kmalloc() for small dirty bitmaps

2010-10-21 Thread Avi Kivity
On 10/21/2010 10:45 AM, Takuya Yoshikawa wrote: Well, 4K single buffer is 128MB worth of RAM. This won't help live migration much, but will help vga dirty logging, which is active at all times and uses much smaller memory slots. So I think it's worthwhile. Thanks, the patch I sent now

Re: [PATCH RFC] KVM: use kmalloc() for small dirty bitmaps

2010-10-21 Thread Takuya Yoshikawa
(2010/10/21 18:04), Avi Kivity wrote: On 10/21/2010 10:45 AM, Takuya Yoshikawa wrote: Well, 4K single buffer is 128MB worth of RAM. This won't help live migration much, but will help vga dirty logging, which is active at all times and uses much smaller memory slots. So I think it's

Re: [PATCH 7/8] KVM: assigned dev: Introduce io_device for MSI-X MMIO accessing

2010-10-21 Thread Avi Kivity
On 10/21/2010 08:46 AM, Sheng Yang wrote: + r = -EOPNOTSUPP; If the guest assigned the device to another guest, it allows the nested guest to kill the non-nested guest. Need to exit in a graceful fashion. Don't understand... It wouldn't result in kill but return to

Re: [PATCH 7/8] KVM: assigned dev: Introduce io_device for MSI-X MMIO accessing

2010-10-21 Thread Michael S. Tsirkin
On Thu, Oct 21, 2010 at 11:27:30AM +0200, Avi Kivity wrote: On 10/21/2010 08:46 AM, Sheng Yang wrote: + r = -EOPNOTSUPP; If the guest assigned the device to another guest, it allows the nested guest to kill the non-nested guest. Need to exit in a graceful fashion.

Re: [PATCH 7/8] KVM: assigned dev: Introduce io_device for MSI-X MMIO accessing

2010-10-21 Thread Avi Kivity
On 10/21/2010 11:24 AM, Michael S. Tsirkin wrote: On Thu, Oct 21, 2010 at 11:27:30AM +0200, Avi Kivity wrote: On 10/21/2010 08:46 AM, Sheng Yang wrote: + r = -EOPNOTSUPP; If the guest assigned the device to another guest, it allows the nested guest to kill

Re: [SeaBIOS] [PATCH] mark irq9 active high in DSDT

2010-10-21 Thread Avi Kivity
On 10/21/2010 04:00 AM, Kevin O'Connor wrote: On Wed, Oct 20, 2010 at 11:34:41AM +0200, Gleb Natapov wrote: In PIIX4 SCI (irq9) is active high. Seabios marks it so in interrupt override table, but some OSes (FreeBSD) require the same information to be present in DSDT too. Make it so.

[PATCH 1/4] KVM: SVM: Move guest register save out of interrupts disabled section

2010-10-21 Thread Avi Kivity
Saving guest registers is just a memory copy, and does not need to be in the critical section. Move outside the critical section to improve latency a bit. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/svm.c | 10 +- 1 files changed, 5 insertions(+), 5 deletions(-) diff

[PATCH 0/4] Lightweight svm vmload/vmsave (almost)

2010-10-21 Thread Avi Kivity
This patchset moves svm towards a lightweight vmload/vmsave path. It was hindered by CVE-2010-3698 which was discovered during its development, and by the lack of per-cpu IDT in Linux, which makes it more or less useless. However, even so it's a slight improvement, and merging it will reduce the

[PATCH 3/4] KVM: SVM: Move fs/gs/ldt save/restore to heavyweight exit path

2010-10-21 Thread Avi Kivity
ldt is never used in the kernel context; same goes for fs (x86_64) and gs (i386). So save/restore them in the heavyweight exit path instead of the lightweight path. By itself, this doesn't buy us much, but it paves the way for moving vmload and vmsave to the heavyweight exit path, since they

[PATCH 4/4] KVM: SVM: Fold save_host_msrs() and load_host_msrs() into their callers

2010-10-21 Thread Avi Kivity
This abstraction only serves to obfuscate. Remove. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/svm.c | 25 ++--- 1 files changed, 6 insertions(+), 19 deletions(-) diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index ec392d6..fad4038 100644 ---

[PATCH 2/4] KVM: SVM: Move svm-host_gs_base into a separate structure

2010-10-21 Thread Avi Kivity
More members will join it soon. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/svm.c |8 +--- 1 files changed, 5 insertions(+), 3 deletions(-) diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index 9d703e2..451590e 100644 --- a/arch/x86/kvm/svm.c +++ b/arch/x86/kvm/svm.c

Re: [Qemu-devel] KVM call minutes for Oct 19

2010-10-21 Thread Andrew Beekhof
On 10/20/2010 02:16 PM, Dor Laor wrote: On 10/20/2010 10:21 AM, Alexander Graf wrote: On 19.10.2010, at 17:14, Chris Wright wrote: Guest Agent - have one coming RSN (poke Anthony for details) Would there be a chance to have a single agent for everyone, so that we actually form a Qemu agent

Re: [Qemu-devel] KVM call minutes for Oct 19

2010-10-21 Thread Dor Laor
On 10/21/2010 12:22 PM, Andrew Beekhof wrote: On 10/20/2010 02:16 PM, Dor Laor wrote: On 10/20/2010 10:21 AM, Alexander Graf wrote: On 19.10.2010, at 17:14, Chris Wright wrote: Guest Agent - have one coming RSN (poke Anthony for details) Would there be a chance to have a single agent for

Re: [PATCH 7/8] KVM: assigned dev: Introduce io_device for MSI-X MMIO accessing

2010-10-21 Thread Michael S. Tsirkin
On Thu, Oct 21, 2010 at 11:47:18AM +0200, Avi Kivity wrote: On 10/21/2010 11:24 AM, Michael S. Tsirkin wrote: On Thu, Oct 21, 2010 at 11:27:30AM +0200, Avi Kivity wrote: On 10/21/2010 08:46 AM, Sheng Yang wrote: +r = -EOPNOTSUPP; If the guest assigned the

[ANNOUNCE] kvm-kmod-2.6.36

2010-10-21 Thread Jan Kiszka
Kernel 2.6.36 is baked, and so is the corresponding kvm-kmod now. A few fixes went in since -rc6, see below. This release also marks the end of life for the kvm-kmod-2.6.35 series - although there are a few unreleased kvm-kmod fixes in git. But the very same patches can be obtained via .36 now,

Re: [Qemu-devel] KVM call minutes for Oct 19

2010-10-21 Thread Anthony Liguori
On 10/21/2010 02:45 AM, Paolo Bonzini wrote: On 10/21/2010 03:14 AM, Alexander Graf wrote: I agree that some agent code for basic stuff like live snapshot sync with the filesystem is small enough and worth to host within qemu. Maybe we do need more than one project? No, please. That's exactly

Re: [Qemu-devel] KVM call minutes for Oct 19

2010-10-21 Thread Dor Laor
On 10/21/2010 03:02 PM, Anthony Liguori wrote: On 10/21/2010 02:45 AM, Paolo Bonzini wrote: On 10/21/2010 03:14 AM, Alexander Graf wrote: I agree that some agent code for basic stuff like live snapshot sync with the filesystem is small enough and worth to host within qemu. Maybe we do need

Re: [Qemu-devel] KVM call minutes for Oct 19

2010-10-21 Thread Anthony Liguori
Hi Andrew, On 10/21/2010 05:22 AM, Andrew Beekhof wrote: Hello from the Matahari tech-lead... Is there any documentation on the capabilities provided guest agent Anthony is creating? Perhaps we can combine efforts. Mike should be posting today or tomorrow. Also happy to provide more

Re: [Qemu-devel] KVM call minutes for Oct 19

2010-10-21 Thread Daniel P. Berrange
On Thu, Oct 21, 2010 at 08:09:44AM -0500, Anthony Liguori wrote: Hi Andrew, On 10/21/2010 05:22 AM, Andrew Beekhof wrote: Hello from the Matahari tech-lead... Is there any documentation on the capabilities provided guest agent Anthony is creating? Perhaps we can combine efforts. Mike

Re: [Qemu-devel] KVM call minutes for Oct 19

2010-10-21 Thread Anthony Liguori
On 10/21/2010 08:18 AM, Daniel P. Berrange wrote: On Thu, Oct 21, 2010 at 08:09:44AM -0500, Anthony Liguori wrote: Hi Andrew, On 10/21/2010 05:22 AM, Andrew Beekhof wrote: Hello from the Matahari tech-lead... Is there any documentation on the capabilities provided guest agent

[PATCH v2 02/22] bitops: rename generic little-endian bitops functions

2010-10-21 Thread Akinobu Mita
As a preparation for providing little-endian bitops for all architectures, This removes generic_ prefix from little-endian bitops function names in asm-generic/bitops/le.h. s/generic_find_next_le_bit/find_next_le_bit/ s/generic_find_next_zero_le_bit/find_next_zero_le_bit/

[PATCH v2 09/22] kvm: stop including asm-generic/bitops/le.h

2010-10-21 Thread Akinobu Mita
No need to include asm-generic/bitops/le.h as all architectures provide little-endian bit operations now. Signed-off-by: Akinobu Mita akinobu.m...@gmail.com Cc: Avi Kivity a...@redhat.com Cc: Marcelo Tosatti mtosa...@redhat.com Cc: kvm@vger.kernel.org --- No change from previous submission

Re: [PATCH v2 02/22] bitops: rename generic little-endian bitops functions

2010-10-21 Thread Arnd Bergmann
On Thursday 21 October 2010, Akinobu Mita wrote: As a preparation for providing little-endian bitops for all architectures, This removes generic_ prefix from little-endian bitops function names in asm-generic/bitops/le.h. s/generic_find_next_le_bit/find_next_le_bit/

[PATCHv2] Add support for async page fault to qemu

2010-10-21 Thread Gleb Natapov
Add save/restore of MSR for migration and cpuid bit. Signed-off-by: Gleb Natapov g...@redhat.com --- v1-v2 - use vmstate subsection to migrate new msr. diff --git a/qemu-kvm-x86.c b/qemu-kvm-x86.c index 59aacd0..145c863 100644 --- a/qemu-kvm-x86.c +++ b/qemu-kvm-x86.c @@ -678,6 +678,9 @@

Re: [Qemu-devel] KVM call minutes for Oct 19

2010-10-21 Thread Andrew Beekhof
On 10/21/2010 03:32 PM, Anthony Liguori wrote: On 10/21/2010 08:18 AM, Daniel P. Berrange wrote: On Thu, Oct 21, 2010 at 08:09:44AM -0500, Anthony Liguori wrote: Hi Andrew, On 10/21/2010 05:22 AM, Andrew Beekhof wrote: Hello from the Matahari tech-lead... Is there any documentation on the

Re: [PATCHv2] Add support for async page fault to qemu

2010-10-21 Thread Marcelo Tosatti
On Thu, Oct 21, 2010 at 05:08:45PM +0200, Gleb Natapov wrote: Add save/restore of MSR for migration and cpuid bit. Signed-off-by: Gleb Natapov g...@redhat.com --- v1-v2 - use vmstate subsection to migrate new msr. diff --git a/qemu-kvm-x86.c b/qemu-kvm-x86.c index 59aacd0..145c863

Re: [PATCH] x86, mce: broadcast mce depending on the cpu version

2010-10-21 Thread Marcelo Tosatti
On Thu, Oct 21, 2010 at 05:47:06PM +0900, Hidetoshi Seto wrote: There is no reason why SRAO event received by the main thread is the only one that being broadcasted. According to the x86 ASDM vol.3A 15.10.4.1, MCE signal is broadcast on processor version 06H_EH or later. This change is

VM with two interfaces

2010-10-21 Thread Nirmal Guhan
Hi, Am trying to create a VM using qemu-kvm with two interfaces(fedora12 is the host and vm) and running into an issue. Given below is the command : qemu-kvm -net nic,macaddr=$macaddress,model=pcnet -net tap,script=/etc/qemu-ifup -net nic,model=pcnet -net tap,script=/etc/qemu-ifup -m 1024 -hda

Re: [Qemu-devel] KVM call minutes for Oct 19

2010-10-21 Thread Anthony Liguori
Hi Andrew, On 10/21/2010 10:43 AM, Andrew Beekhof wrote: In that case we've done a bad job of the wiki. Windows and other distributions are a key part of the Matahari vision. Matahari is two things - an architecture, and - an implementation of the most common API sets Each set of APIs (ie.

Re: [Qemu-devel] KVM call minutes for Oct 19

2010-10-21 Thread Chris Wright
* Anthony Liguori (anth...@codemonkey.ws) wrote: So there's no doubt in my mind that if you need a way to inventory physical and virtual systems, something like Matahari becomes a very appealing option to do that. But that's not the problem space I'm trying to tackle. An example of the

Re: [PATCH] KVM: x86: Add missing inline tag to kvm_read_and_reset_pf_reason

2010-10-21 Thread Marcelo Tosatti
On Wed, Oct 20, 2010 at 06:34:54PM +0200, Jan Kiszka wrote: From: Jan Kiszka jan.kis...@siemens.com May otherwise generates build warnings about unused kvm_read_and_reset_pf_reason if included without CONFIG_KVM_GUEST enabled. Signed-off-by: Jan Kiszka jan.kis...@siemens.com ---

Re: [PATCH] KVM: Move KVM context switch into own function

2010-10-21 Thread Marcelo Tosatti
On Wed, Oct 20, 2010 at 05:56:17PM +0200, Andi Kleen wrote: From: Andi Kleen a...@linux.intel.com gcc 4.5 with some special options is able to duplicate the VMX context switch asm in vmx_vcpu_run(). This results in a compile error because the inline asm sequence uses an on local label. The

[PATCH 4/7] kvm: add save/restore of MSR_VM_HSAVE_PA

2010-10-21 Thread Marcelo Tosatti
commit 2bba4446746add456ceeb0e8359a43032a2ea333 Author: Alexander Graf ag...@suse.de Date: Thu Dec 18 15:38:32 2008 +0100 Enable nested SVM support in userspace Signed-off-by: Marcelo Tosatti mtosa...@redhat.com --- target-i386/kvm.c |5 + 1 files changed, 5 insertions(+), 0

[PATCH 1/7] x86, mce: ignore SRAO only when MCG_SER_P is available

2010-10-21 Thread Marcelo Tosatti
From: Hidetoshi Seto seto.hideto...@jp.fujitsu.com And restruct this block to call kvm_mce_in_exception() only when it is required. Signed-off-by: Hidetoshi Seto seto.hideto...@jp.fujitsu.com Signed-off-by: Marcelo Tosatti mtosa...@redhat.com --- target-i386/kvm.c | 16 ++-- 1

[PATCH 2/7] x86, mce: broadcast mce depending on the cpu version

2010-10-21 Thread Marcelo Tosatti
From: Hidetoshi Seto seto.hideto...@jp.fujitsu.com There is no reason why SRAO event received by the main thread is the only one that being broadcasted. According to the x86 ASDM vol.3A 15.10.4.1, MCE signal is broadcast on processor version 06H_EH or later. This change is required to handle

[PATCH 5/7] kvm: factor out kvm_has_msr_star

2010-10-21 Thread Marcelo Tosatti
And add kvm_has_msr_hsave_pa(), to avoid warnings on older kernels without support. Signed-off-by: Marcelo Tosatti mtosa...@redhat.com --- target-i386/kvm.c | 41 ++--- 1 files changed, 30 insertions(+), 11 deletions(-) diff --git a/target-i386/kvm.c

[PATCH 3/7] Fix build on !KVM_CAP_MCE

2010-10-21 Thread Marcelo Tosatti
From: Hidetoshi Seto seto.hideto...@jp.fujitsu.com This patch removes following warnings: target-i386/kvm.c: In function 'kvm_put_msrs': target-i386/kvm.c:782: error: unused variable 'i' target-i386/kvm.c: In function 'kvm_get_msrs': target-i386/kvm.c:1083: error: label at end of compound

[PATCH 0/7] [PULL] qemu-kvm.git uq/master queue

2010-10-21 Thread Marcelo Tosatti
The following changes since commit 633aa0acfe2c4d3e56acfe28c912796bf54de6d3: Fix pci hotplug to generate level triggered interrupt. (2010-10-20 17:23:28 -0500) are available in the git repository at: git://git.kernel.org/pub/scm/virt/kvm/qemu-kvm.git uq/master Hidetoshi Seto (3):

[PATCH 6/7] kvm: writeback SMP TSCs on migration only

2010-10-21 Thread Marcelo Tosatti
commit 6389c45441269baa2873e6feafebd17105ddeaf6 Author: Jan Kiszka jan.kis...@siemens.com Date: Mon Mar 1 18:17:26 2010 +0100 qemu-kvm: Cleanup/fix TSC and PV clock writeback Signed-off-by: Marcelo Tosatti mtosa...@redhat.com --- target-i386/kvm.c | 10 +- 1 files changed, 9

[PATCH 7/7] kvm: save/restore x86-64 MSRs on x86-64 kernels

2010-10-21 Thread Marcelo Tosatti
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com --- target-i386/kvm.c | 30 -- 1 files changed, 20 insertions(+), 10 deletions(-) diff --git a/target-i386/kvm.c b/target-i386/kvm.c index e2f7e2e..ae0a034 100644 --- a/target-i386/kvm.c +++ b/target-i386/kvm.c @@

Re: [Qemu-devel] KVM call minutes for Oct 19

2010-10-21 Thread Andrew Beekhof
On 10/21/2010 06:25 PM, Anthony Liguori wrote: Hi Andrew, On 10/21/2010 10:43 AM, Andrew Beekhof wrote: In that case we've done a bad job of the wiki. Windows and other distributions are a key part of the Matahari vision. Matahari is two things - an architecture, and - an implementation of

TSC host kernel message with kvm.git as host kernel and qemu-kvm.git as userspace

2010-10-21 Thread Lucas Meneghel Rodrigues
: guest TSC will not be reliable The host being tested in this case was RHEL 5.5 i386. Command line of the install test: /usr/local/autotest/tests/kvm/qemu -name 'vm1' -monitor unix:'/tmp/monitor-humanmonitor1-20101021-160403-PrKT',server,nowait -qmp unix:'/tmp/monitor-qmpmonitor1-20101021-160403-PrKT

2 hosts sharing iSCSI

2010-10-21 Thread Francesc Guasch
Hi. I want to build two KVM servers sharing an iSCSI storage backend. The goal is if one server falls the other starts all the guests. I've been searching for documents about best practices with KVM and iSCSI. I already read http://pve.proxmox.com/wiki/Storage_Model as adviced but I'd

Re: TSC host kernel message with kvm.git as host kernel and qemu-kvm.git as userspace

2010-10-21 Thread Zachary Amsden
On 10/21/2010 09:49 AM, Lucas Meneghel Rodrigues wrote: Hi folks, I was doing some work at one of our host machines, the one that runs upstream (Fedora 14, kvm.git as the kernel and qemu-kvm.git as userspace), and I noticed the kernel message: kvm: unreliable cycle conversion on adjustable

Re: VM with two interfaces

2010-10-21 Thread Nirmal Guhan
On Thu, Oct 21, 2010 at 9:23 AM, Nirmal Guhan vavat...@gmail.com wrote: Hi, Am trying to create a VM using qemu-kvm with two interfaces(fedora12 is the host and vm) and running into an issue. Given below is the command : qemu-kvm -net nic,macaddr=$macaddress,model=pcnet -net

Re: [PATCH 2/2] KVM: pre-allocate one more dirty bitmap to avoid vmalloc() in x86's kvm_vm_ioctl_get_dirty_log()

2010-10-21 Thread Marcelo Tosatti
On Thu, Oct 21, 2010 at 05:40:33PM +0900, Takuya Yoshikawa wrote: Currently x86's kvm_vm_ioctl_get_dirty_log() needs to allocate a bitmap by vmalloc() which will be used in the next logging and this has been causing bad effect to VGA and live-migration: vmalloc() consumes extra systime,

buildbot failure in qemu-kvm on disable_kvm_i386_debian_5_0

2010-10-21 Thread qemu-kvm
The Buildbot has detected a new failure of disable_kvm_i386_debian_5_0 on qemu-kvm. Full details are available at: http://buildbot.b1-systems.de/qemu-kvm/builders/disable_kvm_i386_debian_5_0/builds/601 Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/ Buildslave for this Build:

buildbot failure in qemu-kvm on disable_kvm_x86_64_debian_5_0

2010-10-21 Thread qemu-kvm
The Buildbot has detected a new failure of disable_kvm_x86_64_debian_5_0 on qemu-kvm. Full details are available at: http://buildbot.b1-systems.de/qemu-kvm/builders/disable_kvm_x86_64_debian_5_0/builds/600 Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/ Buildslave for this Build:

buildbot failure in qemu-kvm on disable_kvm_i386_out_of_tree

2010-10-21 Thread qemu-kvm
The Buildbot has detected a new failure of disable_kvm_i386_out_of_tree on qemu-kvm. Full details are available at: http://buildbot.b1-systems.de/qemu-kvm/builders/disable_kvm_i386_out_of_tree/builds/549 Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/ Buildslave for this Build:

buildbot failure in qemu-kvm on disable_kvm_x86_64_out_of_tree

2010-10-21 Thread qemu-kvm
The Buildbot has detected a new failure of disable_kvm_x86_64_out_of_tree on qemu-kvm. Full details are available at: http://buildbot.b1-systems.de/qemu-kvm/builders/disable_kvm_x86_64_out_of_tree/builds/549 Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/ Buildslave for this Build:

Re: [PATCH 8/8] KVM: Emulation MSI-X mask bits for assigned devices

2010-10-21 Thread Sheng Yang
On Thursday 21 October 2010 16:39:07 Michael S. Tsirkin wrote: On Thu, Oct 21, 2010 at 04:30:02PM +0800, Sheng Yang wrote: On Wednesday 20 October 2010 16:26:32 Sheng Yang wrote: This patch enable per-vector mask for assigned devices using MSI-X. The basic idea of kernel and QEmu's