KVM call agenda for Mar 23

2010-03-23 Thread Chris Wright
Please send in any agenda items you are interested in covering. Yes, usability is a valid topic esp. if you promise to come w/ GUI patches. thanks, -chris -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at

KVM call minutes for Mar 23

2010-03-23 Thread Chris Wright
migration (we didn't end last week) - monotonic increasing version doesn't capture individual features (backporting features may not require earlier features, now id is incorrect) - use subsections - can create new namespace within subsection (ide/$featre/$distro) - would need to

Re: MSI-X not enabled for ixgbe device-passthrough

2010-03-25 Thread Chris Wright
* Hannes Reinecke (h...@suse.de) wrote: Hi all, I'm trying to setup a system with device-passthrough for an ixgbe NIC. The device itself seems to work, but it isn't using MSI-X. So some more advanced features like DCB offloading etc won't work. Please send the relevant dmesg from the

Re: MSI-X not enabled for ixgbe device-passthrough

2010-03-26 Thread Chris Wright
* Hannes Reinecke (h...@suse.de) wrote: Chris Wright wrote: * Hannes Reinecke (h...@suse.de) wrote: Hi all, I'm trying to setup a system with device-passthrough for an ixgbe NIC. The device itself seems to work, but it isn't using MSI-X. So some more advanced features like DCB

Re: KSM without VT / KSM for all memory

2010-03-26 Thread Chris Wright
* Gordan Bobic (gor...@bobich.net) wrote: Is it possible to use KSM: 1) Without hardware VT support Yes. KSM and hardware virtualization support are technically not related. 2) For all memory in a system, without patching all applications to register with it No. Right now, an app must

Re: KSM without VT / KSM for all memory

2010-03-26 Thread Chris Wright
* Gordan Bobic (gor...@bobich.net) wrote: Chris Wright wrote: 2) For all memory in a system, without patching all applications to register with it No. Right now, an app must be modified to call madvise(MADV_MERGEABLE). Further, the core scanning loop that ksmd performs is based on per

Re: Hardware performance events are not counted by perf in a 2.6.31.12 KVM guest

2010-03-26 Thread Chris Wright
* Naresh Rapolu (nrap...@purdue.edu) wrote: perf tool does not count hardware performance events ( cache misses etc) in a KVM guest The guest does not see a PMU. For basic profiling you can use timer based in guest, but there is not yet support for PMU. thanks, -chris -- To unsubscribe

Re: MSI-X not enabled for ixgbe device-passthrough

2010-03-29 Thread Chris Wright
* Hannes Reinecke (h...@suse.de) wrote: Ah. So I'll have to shout at Alex Graf. No problems there :-) I like that, when in doubt, shout at Alex ;-) thanks, -chris -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More

Re: [RFC] vhost-blk implementation

2010-03-29 Thread Chris Wright
* Badari Pulavarty (pbad...@us.ibm.com) wrote: I modified my vhost-blk implementation to offload work to work_queues instead of doing synchronously. Infact, I tried to spread the work across all the CPUs. But to my surprise, this did not improve the performance compared to virtio-blk. I see

Re: PCI passthrough resource remapping

2010-03-29 Thread Chris Wright
* Alexander Graf (ag...@suse.de) wrote: On 30.03.2010, at 01:00, Kenni Lund wrote: 2010/3/29 Alexander Graf ag...@suse.de: On 29.03.2010, at 19:23, Kenni Lund wrote: 2010/1/9 Alexander Graf ag...@suse.de: On 09.01.2010, at 03:45, Ryan C. Underwood wrote: I have a

Re: [RFC] vhost-blk implementation

2010-03-29 Thread Chris Wright
* Badari Pulavarty (pbad...@us.ibm.com) wrote: On Mon, 2010-03-29 at 23:37 +0300, Avi Kivity wrote: On 03/29/2010 09:20 PM, Chris Wright wrote: Your io wait time is twice as long and your throughput is about half. I think the qmeu block submission does an extra attempt at merging

Re: PCI passthrough resource remapping

2010-03-29 Thread Chris Wright
* Kenni Lund (ke...@kelu.dk) wrote: Client dmesg: http://pastebin.com/uNG4QK5j Host dmesg: http://pastebin.com/jZu3WKZW I just verified it and I do get the call trace in the host (which disables IRQ 19, used by the PCI USB card), exactly at the same second It looks like IRQ 19 is shared

Re: Setting nx bit in virtual CPU

2010-03-29 Thread Chris Wright
* Richard Simpson (rs1...@huskydog.org.uk) wrote: So, is there any way of having the nx bit and the benefits of KVM acceleration. WFM here (both current git tree and 0.12.3) w/ either -cpu host or -cpu qemu64. The code definitly does what you'd expect in both those cases. thanks, -chris -- To

KVM call agenda for Mar 30

2010-03-29 Thread Chris Wright
- vhost-blk Please send in any additional agenda items you are interested in covering. thanks, -chris -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

KVM call minutes for Mar 30

2010-03-30 Thread Chris Wright
vhost-blk - started w/ vhost-net, nice and modular - qemu merging requests, so outperforming (throughput) for sequential write - random read/write and sequential reads are comparable or better - can't do e.g. qcow2 - spreading work across all cpu workqueues - are there cases where we expect

Re: PCI passthrough resource remapping

2010-03-30 Thread Chris Wright
* Kenni Lund (ke...@kelu.dk) wrote: 2010/3/30 Chris Wright chr...@redhat.com: * Kenni Lund (ke...@kelu.dk) wrote: Client dmesg: http://pastebin.com/uNG4QK5j Host dmesg: http://pastebin.com/jZu3WKZW I just verified it and I do get the call trace in the host (which disables IRQ 19, used

Re: PCI passthrough resource remapping

2010-03-30 Thread Chris Wright
* Kenni Lund (ke...@kelu.dk) wrote: 2010/3/31 Alexander Graf ag...@suse.de: The easiest thing coming to mind is to unplug the ivtv card for now. It's really only to verify that the patch does something useful :-). This was not sufficient. Same issue with the ivtv card unplugged...if I

Re: PCI passthrough resource remapping

2010-03-30 Thread Chris Wright
* Kenni Lund (ke...@kelu.dk) wrote: 2010/3/31 Chris Wright chr...@redhat.com: So I suppose I'll need to get rid of this shared IRQ before I can conclude anything on the patch in git. Hmm, is there some cleaver way of fixing this in Linux, or do I have to fix it by changing BIOS IRQ

Re: PCI passthrough resource remapping

2010-03-31 Thread Chris Wright
* Kenni Lund (ke...@kelu.dk) wrote: 2010/3/31 Chris Wright chr...@redhat.com: * Kenni Lund (ke...@kelu.dk) wrote: 2010/3/31 Chris Wright chr...@redhat.com: So I suppose I'll need to get rid of this shared IRQ before I can conclude anything on the patch in git. Hmm, is there some cleaver

Re: PCI passthrough resource remapping

2010-03-31 Thread Chris Wright
* Alexander Graf (ag...@suse.de) wrote: Kenni Lund wrote: 2010/3/31 Kenni Lund ke...@kelu.dk: Booting the guest and tuning to a DVB-T channel _works_ !!! :-D Thanks a lot for your help...I have one more question, though: If I have two devices (like the ivtv tuner and the USB card)

Re: bnx2 driver for NIC passthrough

2010-04-05 Thread Chris Wright
* Xiong Wang (xiong...@gmail.com) wrote: I have an ibm X3650M2 box with two onboard broadcom NICs,I assign one of the NIC to the KVM guest,I can see the NIC in the guest VM,but the bnx2 driver can not load successfully, is there any solution to fix this? This device can not be successfully

KVM call agenda for Apr 6

2010-04-05 Thread Chris Wright
Please send in any agenda items you are interested in covering. thanks, -chris -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

KVM call minutes for Apr 6

2010-04-06 Thread Chris Wright
Management stack again - qemud? - external mgmt stack, qemu/kvm devs less inclined to care - Oh, you're using virsh, try #virt on OFTC - standard libvirt issues - concern about speed of adopting kvm features - complicated, XML hard to understand - being slowed by hv agnositc - ... -

Re: hugetlbfs and KSM

2010-04-09 Thread Chris Wright
* Bernhard Schmidt (be...@birkenwald.de) wrote: * KSM seems to be largely ineffective (100MB saved - 1.3MB saved) Am I doing something wrong? Is this a bug? Is this generally impossible with large pages (which might explain the lower load on the host, if large pages are not scanned)? Or is

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-09 Thread Chris Wright
* Avi Kivity (a...@redhat.com) wrote: On 04/02/2010 08:05 PM, Greg KH wrote: - access to all config space, but BARs must be translated so userspace cannot attack the host Specifically, intermediated access to config space. For example, need to know about MSI/MSI-X updates in config space.

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for?non-privileged processes

2010-04-09 Thread Chris Wright
* Tom Lyon (p...@lyon-about.com) wrote: On Friday 09 April 2010 02:58:19 am Avi Kivity wrote: - access to all config space, but BARs must be translated so userspace cannot attack the host Please elaborate. All of PCI config? All of PCIe config? Seems like a huge mess. All of config

KVM call agenda for Apr 13

2010-04-13 Thread Chris Wright
Please send in any agenda items you are interested in covering. thanks, -chris -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

KVM call agenda for Apr 20

2010-04-19 Thread Chris Wright
Please send in any agenda items you are interested in covering. thanks, -chris -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

KVM call minutes for Apr 20

2010-04-20 Thread Chris Wright
call agenda - send out a bit earlier - cancel call if no agenda 0.12.4 - expect when Anthony is back online KVM Forum 2010 - call for papers is out...send in your proposals! -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More

KVM call agenda for Apr 27

2010-04-26 Thread Chris Wright
Please send in any agenda items you are interested in covering. While I don't expect it to be the case this week, if we have a lack of agenda items I'll cancel the week's call. thanks, -chris -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to

Re: KVM call agenda for Apr 27

2010-04-26 Thread Chris Wright
* Anthony Liguori (anth...@codemonkey.ws) wrote: On 04/26/2010 12:26 PM, Chris Wright wrote: Please send in any agenda items you are interested in covering. While I don't expect it to be the case this week, if we have a lack of agenda items I'll cancel the week's call. - qemu management

KVM call minutes for Apr 27

2010-04-27 Thread Chris Wright
qemu management interface (and libvirt) - qemu standardizing guest enumeration itself - fs w/ QMP sockets in well-known location per guest or qemud for enumeration - QMP C library - QMP for runtime guest mgmt, but not guest launch, storage pools, networking - selinux, cgroups, tc, etc..done in

Re: KVM call minutes for Apr 27

2010-04-27 Thread Chris Wright
* Justin M. Forbes (jmfor...@linuxtx.org) wrote: On Tue, Apr 27, 2010 at 09:11:00AM -0700, Chris Wright wrote: stable tree policy (push vs. pull and call for stable volunteers) - historically pull based (cherry picking) - doesn't scale wwell - push based...submit patches directly

KVM call agenda for May 4

2010-05-03 Thread Chris Wright
Please send in any agenda items you are interested in covering. If we have a lack of agenda items I'll cancel the week's call. thanks, -chris -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at

KVM call minutes for May 4

2010-05-04 Thread Chris Wright
KVM Forum topic ideas - mgmt interface (qemud) - working breakout sessions are welcome at the Forum stable tree - have a volunteer (thanks Justin) - Anthony will write up proposal which is basically - bug fixes actively proposed for stable tree - stable maintainer collects and applies -

KVM call agenda for May 11

2010-05-10 Thread Chris Wright
Please send in any agenda items you are interested in covering. If we have a lack of agenda items I'll cancel the week's call. thanks, -chris -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at

Re: KVM call agenda for May 11

2010-05-11 Thread Chris Wright
* Chris Wright (chr...@redhat.com) wrote: Please send in any agenda items you are interested in covering. If we have a lack of agenda items I'll cancel the week's call. No agenda, so no call this week. thanks, -chris -- To unsubscribe from this list: send the line unsubscribe kvm in the body

Re: [RFC PATCH] sysfs: bin_attr permission checking

2010-05-12 Thread Chris Wright
* Greg KH (g...@kroah.com) wrote: On Wed, May 12, 2010 at 12:28:28PM -0700, Chris Wright wrote: * Greg KH (g...@kroah.com) wrote: On Wed, May 12, 2010 at 11:47:13AM -0700, Chris Wright wrote: The PCI config space bin_attr read handler has a hardcoded CAP_SYS_ADMIN check to verify

Re: [PATCH] device-assignment: fix failure to exit on shared IRQ

2010-05-12 Thread Chris Wright
alex.william...@redhat.com Acked-by: Chris Wright chr...@redhat.com -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

[PATCH 2/2] pci: allow sysfs file owner to read device dependent config space

2010-05-12 Thread Chris Wright
check will not allow read access beyond the config header. With this patch the sysfs file owner is also considered privileged enough to read all of the config space. Signed-off-by: Chris Wright chr...@sous-sol.org --- drivers/pci/pci-sysfs.c |4 +++- 1 files changed, 3 insertions(+), 1

Re: [PATCH 2/2] pci: allow sysfs file owner to read device dependent config space

2010-05-13 Thread Chris Wright
* Alan Cox (a...@lxorguk.ukuu.org.uk) wrote: On Wed, 12 May 2010 18:29:57 -0700 Chris Wright chr...@sous-sol.org wrote: The PCI config space bin_attr read handler has a hardcoded CAP_SYS_ADMIN check to verify privileges before allowing a user to read device dependent config space

Re: Prevent IRQ sharing for PCI passthrough

2010-05-13 Thread Chris Wright
* Avi Kivity (a...@redhat.com) wrote: On 05/13/2010 07:57 PM, Dirk Gouders wrote: Hello List, please don't shout at me if the answer to my question is too obvious, We won't shout at you. but in the German Linux Magazine I read an article about passing PCI devices to KVM guests and the

[PATCH 2/2 v2] pci: check caps from sysfs file open to read device dependent config space

2010-05-13 Thread Chris Wright
/libvirt point of view because it is not prepared to do this setup before dropping privileges and launching the VM. thanks, -chris -- From: Chris Wright chr...@sous-sol.org Subject: [PATCH 2/2 v2] pci: check caps from sysfs file open to read device dependent config space The PCI config space

Re: [PATCH 2/2 v2] pci: check caps from sysfs file open to read device dependent config space

2010-05-13 Thread Chris Wright
* Greg KH (g...@kroah.com) wrote: On Thu, May 13, 2010 at 10:43:07AM -0700, Chris Wright wrote: * Alan Cox (a...@lxorguk.ukuu.org.uk) wrote: I agree with the problem - but IMHO the fix is to require opening the file checks CAP_SYS_something instead: not to hack the read method and make

Re: [PATCH] kvm: remove CAP_SYS_RAWIO requirement from kvm_vm_ioctl_assign_irq

2010-05-13 Thread Chris Wright
* Alex Williamson (alex.william...@redhat.com) wrote: Remove this check in an effort to allow kvm guests to run without root privileges. This capability check doesn't seem to add any security since the device needs to have already been added via the assign device ioctl and the io actually

KVM call agenda for May 18

2010-05-17 Thread Chris Wright
Please send in any agenda items you are interested in covering. If we have a lack of agenda items I'll cancel the week's call. thanks, -chris -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at

KVM call minutes for May 18

2010-05-18 Thread Chris Wright
0.13 release - push out to July 1st - esp. important to solidy/crispen QMP - 1 rc to shake out brown paper bag bugs, then final release block i/o performance (high CPU consumption) - memset can be removed (patch posted, queued by kwolf) - cpu_physical_memory_rw known, should gather data block

Re: KVM call agenda for May 18

2010-05-18 Thread Chris Wright
* Brian Jackson (i...@theiggy.com) wrote: On Tuesday 18 May 2010 08:52:36 Anthony Liguori wrote: On 05/18/2010 01:59 AM, Brian Jackson wrote: On Monday 17 May 2010 22:23:46 Chris Wright wrote: Please send in any agenda items you are interested in covering. If we have a lack

[PATCH qemu-kvm] device-assignment: add config fd qdev property

2010-05-19 Thread Chris Wright
the file was opened. Signed-off-by: Chris Wright chr...@redhat.com --- hw/device-assignment.c | 12 1 files changed, 8 insertions(+), 4 deletions(-) diff --git a/hw/device-assignment.c b/hw/device-assignment.c index eb31c78..172f0c9 100644 --- a/hw/device-assignment.c +++ b/hw/device

Re: [PATCH qemu-kvm] device-assignment: add config fd qdev property

2010-05-19 Thread Chris Wright
* Anthony Liguori (anth...@codemonkey.ws) wrote: An fd as a qdev property seems like a bad idea to me. What is your concern? I'm not sure I have a better suggestion though. Anything else requires inventing some new commandline options and monitor comnmands (-pcidevice anyone? ;-). I'm not

Re: [PATCH qemu-kvm] device-assignment: add config fd qdev property

2010-05-19 Thread Chris Wright
* Anthony Liguori (anth...@codemonkey.ws) wrote: On 05/19/2010 04:10 PM, Chris Wright wrote: * Anthony Liguori (anth...@codemonkey.ws) wrote: An fd as a qdev property seems like a bad idea to me. What is your concern? qdev properties are supposed to represent device tunables. A file

Re: [PATCH] device-assignment: Don't use libpci

2010-05-20 Thread Chris Wright
-by: Alex Williamson alex.william...@redhat.com Looks good to me. Acked-by: Chris Wright chr...@redhat.com -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [PATCH] device-assignment: Don't use libpci

2010-05-20 Thread Chris Wright
* Chris Wright (chr...@redhat.com) wrote: * Alex Williamson (alex.william...@redhat.com) wrote: We've already got an open fd for PCI config space for the device, we might as well use it. This also makes sure that if we're making use of a privileged file descriptor opened for us, we use

[PATCH qemu-kvm 1/2] device-assignment: use stdint types

2010-05-20 Thread Chris Wright
Use stdint types to avoid extra reliance on pci/pci.h header. Cc: Alex Williamson alex.william...@redhat.com Signed-off-by: Chris Wright chr...@redhat.com --- hw/device-assignment.c |6 +++--- 1 files changed, 3 insertions(+), 3 deletions(-) diff --git a/hw/device-assignment.c b/hw/device

[PATCH qemu-kvm 2/2] device-assignment: Don't use libpci

2010-05-20 Thread Chris Wright
Williamson alex.william...@redhat.com [chrisw: kill pci_dev, configure check for header, narrow header requirement] Signed-off-by: Chris Wright chr...@redhat.com --- configure | 14 +- hw/device-assignment.c | 68 hw/device

Re: [PATCH qemu-kvm] device-assignment: add config fd qdev property

2010-05-24 Thread Chris Wright
* Alex Williamson (alex.william...@redhat.com) wrote: On Wed, 2010-05-19 at 12:00 -0700, Chris Wright wrote: When libvirt launches a guest it first chowns the relevenat /sys/bus/pci/.../config file for an assigned device then drops privileges. This causes an issue for device assignment

KVM call agenda for May 25

2010-05-24 Thread Chris Wright
Please send in any agenda items you are interested in covering. If we have a lack of agenda items I'll cancel the week's call. thanks, -chris -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at

Re: [PATCH] device-assignment: don't truncate MSIX capabilities table size

2010-05-25 Thread Chris Wright
* Alex Williamson (alex.william...@redhat.com) wrote: PCI_MSIX_TABSIZE is 0x07ff while not an issue now, i think that only works for little endian -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at

Re: [PATCH] device-assignment: don't truncate MSIX capabilities table size

2010-05-25 Thread Chris Wright
* Alex Williamson (alex.william...@redhat.com) wrote: On Tue, 2010-05-25 at 16:09 -0700, Chris Wright wrote: * Alex Williamson (alex.william...@redhat.com) wrote: PCI_MSIX_TABSIZE is 0x07ff while not an issue now, i think that only works for little endian Yep. This is consistent

Re: device passthrough

2010-05-28 Thread Chris Wright
* Mu Lin (m...@juniper.net) wrote: Is there any method to directly assign a device to Guest OS without VT-d? Assuming you mean a PCI device, no, there isn't. Without an IOMMU[1] you can't directly assign a PCI device to a guest (nor is it safe). There have been patches floating around to

Re: device passthrough

2010-05-28 Thread Chris Wright
* Mu Lin (m...@juniper.net) wrote: Do you know where is the patch, I just need something quick and dirty for now, my shining new board does have VT-d but the BIOS is not ready yet, I want to have something working now. Sorry, I don't have a handy pointer. You can search for either pv dma

KVM call agenda for June 1

2010-05-31 Thread Chris Wright
Please send in any agenda items you are interested in covering. If we have a lack of agenda items I'll cancel the week's call. thanks, -chris -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at

Re: [PATCH] VFIO driver: Non-privileged user level PCI drivers

2010-06-01 Thread Chris Wright
* Avi Kivity (a...@redhat.com) wrote: On 06/02/2010 12:26 AM, Tom Lyon wrote: I'm not really opposed to multiple devices per domain, but let me point out how I ended up here. First, the driver has two ways of mapping pages, one based on the iommu api and one based on the dma_map_sg api.

Re: [PATCH] VFIO driver: Non-privileged user level PCI drivers

2010-06-02 Thread Chris Wright
* Avi Kivity (a...@redhat.com) wrote: The interface would only work for clients which support it: kvm, vhost, and iommu/devices with restartable dma. BTW, there is no such thing as restartable dma. There is a provision in new specs (read: no real hardware) that allows a device to request pages

Re: [PATCH] VFIO driver: Non-privileged user level PCI drivers

2010-06-02 Thread Chris Wright
* Joerg Roedel (j...@8bytes.org) wrote: On Wed, Jun 02, 2010 at 02:21:00PM +0300, Michael S. Tsirkin wrote: On Wed, Jun 02, 2010 at 01:12:25PM +0200, Joerg Roedel wrote: Even if it is bound to a domain the userspace driver could program the device to do dma to unmapped regions causing

KVM call agenda for June 8

2010-06-07 Thread Chris Wright
Please send in any agenda items you are interested in covering. If we have a lack of agenda items I'll cancel the week's call. thanks, -chris -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at

Re: [RFC] Virtual Machine Device Queues(VMDq) support on KVM

2009-09-21 Thread Chris Wright
* Stephen Hemminger (shemmin...@vyatta.com) wrote: On Mon, 21 Sep 2009 16:37:22 +0930 Rusty Russell ru...@rustcorp.com.au wrote: Actually this framework can apply to traditional network adapters which have just one tx/rx queue pair. And applications using the same user/kernel

Re: qemu-kvm: require 4K aligned resource size for memory

2009-10-22 Thread Chris Wright
* Michael S. Tsirkin (m...@redhat.com) wrote: KVM does not virtualize low address bits for memory accesses, so we must require that PCI BAR size is a multiple of 4K for passthrough to work (this also guarantees that address is 4K aligned). Users of recent linux kernels can force resource

[PATCH] qemu-kvm: compatfd: trivial compile fix

2009-12-14 Thread Chris Wright
: *** [compatfd.o] Error 1 Signed-off-by: Chris Wright chr...@redhat.com --- compatfd.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/compatfd.c b/compatfd.c index e87bb9e..4a00d95 100644 --- a/compatfd.c +++ b/compatfd.c @@ -118,9 +118,9 @@ int qemu_signalfd(const sigset_t

Re: [PATCH 1/3] Enable non page boundary BAR device assignment

2009-12-15 Thread Chris Wright
* Alexander Graf (ag...@suse.de) wrote: @@ -405,7 +511,7 @@ static int assigned_dev_register_regions(PCIRegion *io_regions, } else { pci_dev-v_addrs[i].u.r_virtbase = mmap(NULL, - (cur_region-size + 0xFFF)

Re: [PATCH 2/3] Split off sysfs id retrieval

2009-12-15 Thread Chris Wright
at this before (w/ the same intention) and concluded it wasn't a benefit (of course, I can't recall why now...re-reading libpci, as long as we force PCI_ACCESS_SYS_BUS_PCI it does the right read). Anyway, this is a simple, nice cleanup. Acked-by: Chris Wright chr...@redhat.com -- To unsubscribe from

Re: [PATCH 3/3] Inform users about busy device assignment attempt

2009-12-15 Thread Chris Wright
* Alexander Graf (ag...@suse.de) wrote: +static void assign_failed_examine(AssignedDevice *dev) +{ +char name[PATH_MAX], dir[PATH_MAX], driver[PATH_MAX] = {}, *ns; +uint16_t vendor_id, device_id; +int r; + +/* XXX implement multidomain */ +sprintf(dir,

Re: [PATCH 3/3] Inform users about busy device assignment attempt

2009-12-15 Thread Chris Wright
* Alexander Graf (ag...@suse.de) wrote: Chris Wright wrote: * Alexander Graf (ag...@suse.de) wrote: +static void assign_failed_examine(AssignedDevice *dev) +{ +char name[PATH_MAX], dir[PATH_MAX], driver[PATH_MAX] = {}, *ns; +uint16_t vendor_id, device_id; +int r

Re: [PATCH 1/3] Enable non page boundary BAR device assignment

2009-12-15 Thread Chris Wright
* Michael S. Tsirkin (m...@redhat.com) wrote: On Tue, Dec 15, 2009 at 11:50:23AM -0800, Chris Wright wrote: * Alexander Graf (ag...@suse.de) wrote: @@ -405,7 +511,7 @@ static int assigned_dev_register_regions(PCIRegion *io_regions, } else { pci_dev

Re: [PATCH 1/3] Enable non page boundary BAR device assignment

2009-12-15 Thread Chris Wright
* Alexander Graf (ag...@suse.de) wrote: Michael S. Tsirkin wrote: Existing code first page aligned address, passes this to mmap, Did you mean page aligned size? then adds page offset. I do not know why. Could be e.g. to handle different libc/kernel versions. If we are not sure it is not

Re: pci-stub error and MSI-X for KVM guest

2009-12-21 Thread Chris Wright
* Fischer, Anna (anna.fisc...@hp.com) wrote: I am running Fedora Core 12 with a 2.6.31 kernel. I use the Intel 82576 SR-IOV network card and want to assign its Virtual Functions (VFs) to separate KVM guests. My guests also run Fedora Core 12 with a 2.6.31 kernel. I use the latest igb driver in

Re: wifi pci card issue in windows host.

2009-12-21 Thread Chris Wright
* Dmitri Seletski (drj...@gmail.com) wrote: Dmitri Seletski wrote: Hello folks. My goal is to make my pci based network card work under windows guest.(obviously using windows drivers) this is device i am interested in: 01:07.0 Network controller: Atheros Communications Inc. AR5416

Re: pci-stub error and MSI-X for KVM guest

2009-12-21 Thread Chris Wright
* Fischer, Anna (anna.fisc...@hp.com) wrote: Subject: Re: pci-stub error and MSI-X for KVM guest This works fine in principle and I can see the PCI device in the guest under lspci. However, the 82576 VF driver requires the OS to support MSI-X. My Fedora installation is configured with

[PATCH] vhost-net: comment use of invalid fd when setting vhost backend

2009-12-22 Thread Chris Wright
This looks like an error case, but it's just a special case to shutdown the backend. Clarify with a comment. Signed-off-by: Chris Wright chr...@redhat.com --- drivers/vhost/net.c |1 + 1 files changed, 1 insertions(+), 0 deletions(-) diff --git a/drivers/vhost/net.c b/drivers/vhost/net.c

[PATCH] vhost-net: defer f-private_data until setup succeeds

2009-12-22 Thread Chris Wright
Trivial change, just for readability. The filp is not installed on failure, so the current code is not incorrect (also vhost_dev_init currently has no failure case). This just treats setting f-private_data as something with global scope (sure, true only after fd_install). Signed-off-by: Chris

Re: [GIT PULL] AlacrityVM guest drivers for 2.6.33

2009-12-23 Thread Chris Wright
* Avi Kivity (a...@redhat.com) wrote: On 12/23/2009 02:14 PM, Andi Kleen wrote: http://www.redhat.com/f/pdf/summit/cwright_11_open_source_virt.pdf See slide 32. This is without vhost-net. Thanks. Do you also have latency numbers? No. Copying Chris. This was with the tx mitigation timer

Re: [Alacrityvm-devel] [GIT PULL] AlacrityVM guest drivers for 2.6.33

2009-12-23 Thread Chris Wright
* Peter W. Morreale (pmorre...@novell.com) wrote: On Wed, 2009-12-23 at 13:14 +0100, Andi Kleen wrote: http://www.redhat.com/f/pdf/summit/cwright_11_open_source_virt.pdf See slide 32. This is without vhost-net. Thanks. Do you also have latency numbers? It seems like there's

Re: [GIT PULL] AlacrityVM guest drivers for 2.6.33

2009-12-23 Thread Chris Wright
* Anthony Liguori (anth...@codemonkey.ws) wrote: The poor packet latency of virtio-net is a result of the fact that we do software timer based TX mitigation. We do this such that we can decrease the number of exits per-packet and increase throughput. We set a timer for 250ms and

[PATCH qemu-kvm] device assignment: default requires IOMMU

2009-12-23 Thread Chris Wright
did (not require an IOMMU, and fail to work properly). Cc: Alexander Graf ag...@suse.de Cc: Dmitri Seletski drj...@gmail.com Cc: Sheng Yang sh...@linux.intel.com Signed-off-by: Chris Wright chr...@redhat.com --- hw/device-assignment.c | 17 + 1 files changed, 9 insertions(+), 8

Re: kvm: unable to handle kernel NULL pointer dereference

2008-06-04 Thread Chris Wright
* Tobias Diedrich ([EMAIL PROTECTED]) wrote: BUG: unable to handle kernel NULL pointer dereference at 0008 IP: [8021d44f] svm_vcpu_run+0x34/0x351 PGD 7e01b067 PUD 7bc86067 PMD 0 Oops: [1] PREEMPT CPU 0 Modules linked in: zaurus cdc_ether usbnet snd_hda_intel

Re: kvm: unable to handle kernel NULL pointer dereference

2008-06-05 Thread Chris Wright
* Tobias Diedrich ([EMAIL PROTECTED]) wrote: PM: Creating hibernation image: PM: Need to copy 126181 pages PM: Normal pages needed: 126181 + 1024 + 38, available pages: 397721 x86 PAT enabled: cpu 0, old 0x7040600070406, new 0x7010600070106 svm_cpu_init: svm_data is NULL on 0 Yeah, this is

Re: [RFC] CPUID usage for interaction between Hypervisors and Linux.

2008-10-01 Thread Chris Wright
* Anthony Liguori ([EMAIL PROTECTED]) wrote: We've already gone down the road of trying to make standard paravirtual interfaces (via virtio). No one was sufficiently interested in collaborating. I don't see why other paravirtualizations are going to be much different. The point is to

Re: [RFC] CPUID usage for interaction between Hypervisors and Linux.

2008-10-01 Thread Chris Wright
* Anthony Liguori ([EMAIL PROTECTED]) wrote: And arguably, storing TSC frequency in CPUID is a terrible interface because the TSC frequency can change any time a guest is entered. It True for older hardware, newer hardware should fix this. I guess the point is, the are numbers that are

Re: thread/core siblings info for guests

2008-10-06 Thread Chris Wright
* Kamble, Nitin A ([EMAIL PROTECTED]) wrote: From: Avi Kivity [mailto:[EMAIL PROTECTED] Indeed finer control over cpuid is needed. We need to support at least three modes: - default: expose some machine that is likely to be widely supported - host: expose as much of the host cpu as we can

Re: [Qemu-devel] [RFC] Disk integrity in QEMU

2008-10-11 Thread Chris Wright
* Mark Wagner ([EMAIL PROTECTED]) wrote: I think that are two distinct arguments going on here. My main concern is that I don't think that this a simple what do we make the default cache policy be issue. I think that regardless of the cache policy, if something in the guest requests

Re: [PATCH 0/16 v6] PCI: Linux kernel SR-IOV support

2008-11-06 Thread Chris Wright
we really know what the One True Usage model is for VF devices. Chris Wright has some ideas, I have some ideas and Yu Zhao has some ideas. I bet there's other people who have other ideas too. I'd love to hear those ideas. First there's the question of how to represent the VF on the host

[PATCH 1/2] PCI: allow pci driver to support only dynids

2008-11-25 Thread Chris Wright
commit b41d6cf38e27 (PCI: Check dynids driver_data value for validity) requires all drivers to include an id table to try and match driver_data. Before validating driver_data check driver has an id table. Cc: Jean Delvare [EMAIL PROTECTED] Cc: Milton Miller [EMAIL PROTECTED] Signed-off-by: Chris

[PATCH 2/2] PCI: pci-stub module to reserve pci device

2008-11-25 Thread Chris Wright
/sys/bus/pci/devices/:00:19.0/driver - ../../../bus/pci/drivers/pci-stub Cc: Kay, Allen M [EMAIL PROTECTED] Cc: Nakajima, Jun [EMAIL PROTECTED] Signed-off-by: Chris Wright [EMAIL PROTECTED] --- drivers/pci/Kconfig|9 + drivers/pci/Makefile |2 ++ drivers/pci/pci-stub.c

Re: [PATCH 2/2] PCI: pci-stub module to reserve pci device

2008-11-25 Thread Chris Wright
* Greg KH ([EMAIL PROTECTED]) wrote: On Tue, Nov 25, 2008 at 07:38:39PM -0800, Chris Wright wrote: When doing device assignment with KVM there's currently nothing to protect the device from having a driver in the host as well as the guest. This trivial module just binds the pci device

[PATCH 2/2 v2] PCI: pci-stub module to reserve pci device

2008-11-25 Thread Chris Wright
/sys/bus/pci/devices/:00:19.0/driver - ../../../bus/pci/drivers/pci-stub Cc: Kay, Allen M [EMAIL PROTECTED] Cc: Nakajima, Jun [EMAIL PROTECTED] Signed-off-by: Chris Wright [EMAIL PROTECTED] Acked-by: Greg Kroah-Hartman [EMAIL PROTECTED] --- drivers/pci/Kconfig|9 + drivers/pci

Re: [PATCH 1/2] PCI: allow pci driver to support only dynids

2008-11-26 Thread Chris Wright
* Jean Delvare ([EMAIL PROTECTED]) wrote: As a side note, I am curious what PCI driver we do have which has driver-probe defined but no driver-id_table. Did you hit an actual issue or are you fixing a theoretical one? Such a driver was patch 2/2. http://lkml.org/lkml/2008/11/26/11 It's meant

Re: [SR-IOV driver example 2/3] PF driver: integrate with SR-IOV core

2008-11-26 Thread Chris Wright
* Greg KH ([EMAIL PROTECTED]) wrote: +static int +igb_virtual(struct pci_dev *pdev, int nr_virtfn) +{ + unsigned char my_mac_addr[6] = {0x00, 0xDE, 0xAD, 0xBE, 0xEF, 0xFF}; + struct net_device *netdev = pci_get_drvdata(pdev); + struct igb_adapter *adapter =

Re: [PATCH 3/4] add ksm kernel shared memory driver.

2008-12-02 Thread Chris Wright
* Alan Cox ([EMAIL PROTECTED]) wrote: + r = !memcmp(old_digest, sha1_item-sha1val, SHA1_DIGEST_SIZE); + mutex_unlock(sha1_lock); + if (r) { + char *old_addr, *new_addr; + old_addr = kmap_atomic(oldpage, KM_USER0); + new_addr = kmap_atomic(newpage,

Re: [PATCH 3/4] add ksm kernel shared memory driver.

2008-12-02 Thread Chris Wright
* Alan Cox ([EMAIL PROTECTED]) wrote: On Tue, 2 Dec 2008 10:07:24 -0800 Chris Wright [EMAIL PROTECTED] wrote: * Alan Cox ([EMAIL PROTECTED]) wrote: + r = !memcmp(old_digest, sha1_item-sha1val, SHA1_DIGEST_SIZE); + mutex_unlock(sha1_lock); + if (r

Re: [Qemu-devel] [RFC] Replace posix-aio with custom thread pool

2008-12-12 Thread Chris Wright
* Anthony Liguori (anth...@codemonkey.ws) wrote: Chris Wright wrote: * Anthony Liguori (anth...@codemonkey.ws) wrote: It's available in recent kernels I see! so the fix is easy. Only problem is how to pass CLONE_IO to pthread_create... We'll have to make a linux-only change and call clone

  1   2   3   4   >