Re: Call for help: moving the kvm wiki

2008-10-12 Thread Avi Kivity
Tomasz Chmielewski wrote: As you may have noticed, the kvm wiki is overrun by spammers. It the past I've regularly cleaned up the spam, but some time ago I've given up. So I'm looking for a volunteer to locate a spam-free public wiki host (candidates include wiki.kernel.org and

Re: [PATCH 5/5] kvm: qemu: Improve virtio_net recv buffer allocation scheme

2008-10-12 Thread Avi Kivity
Mark McLoughlin wrote: From: Herbert Xu [EMAIL PROTECTED] Currently, in order to receive large packets, the guest must allocate max-sized packet buffers and pass them to the host. Each of these max-sized packets occupy 20 ring entries, which means we can only transfer a maximum of 12 packets in

[ANNOUNCE] kvm-77 release

2008-10-12 Thread Avi Kivity
This release fixes the -std-vga regression which bothered those of us who have large or widescreen monitors (note the option is now named '-vga std' due to upstream qemu changes). Other significant changes include better disk performance if you have a fast host storage subsystem. Changes

Re: ACPI

2008-10-12 Thread Avi Kivity
jd wrote: Hi We ship some images (that kicks the install ) out of the box and would like to know peoples experiences and developer opinions on ACPI. This would help us determine if this should be enabled by default or not. -- For Windows guests -- For Linix guests I recommend you

[PATCH][RFC] vmchannel a data channel between host and guest.

2008-10-12 Thread Gleb Natapov
Hello, Sometimes there is a need to pass various bits of information between host and guest (mostly for management purposes such as host screen resolution changes or runtime statistics of a guest). To do that we need some way to pass data between host and guest. Attached patch implements

bridging a wifi interface into kvm guest possible?

2008-10-12 Thread Michael Tokarev
[cross-posted to netdev and kvm lists] [..which failed due to wrong (old) kvm address. Please excuse me for the repost] Hello! I'm trying to set up a [virtual/guest] network of hosts to form something like a DMZ and a gateway, but in virtual hardware instead of real hardware. One of the

[ kvm-Bugs-2138166 ] Vista guest fails to start on kvm-76

2008-10-12 Thread SourceForge.net
Bugs item #2138166, was opened at 2008-09-30 08:39 Message generated for change (Comment added) made by johnrrousseau You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2138166group_id=180599 Please note that this message will contain a full copy of the

[PATCH] read UUID from qemu

2008-10-12 Thread Gleb Natapov
Similar patch was sent to bochs devel list, but I propose to apply this patch now rather than waiting for bochs developers to apply it and then merger. --- Add support for new FW configuration channel to the BIOS. Read UUID from QEMU using this channel. Signed-off-by: Gleb Natapov [EMAIL

Re: [Qemu-devel] [RFC] Disk integrity in QEMU

2008-10-12 Thread Dor Laor
Avi Kivity wrote: Chris Wright wrote: I think it's safe to say the perf folks are concerned w/ data integrity first, stable/reproducible results second, and raw performance third. So seeing data cached in host was simply not what they expected. I think write through is sufficient. However

Re: [Qemu-devel] [RFC] Disk integrity in QEMU

2008-10-12 Thread Jamie Lokier
Dor Laor wrote: Actually this is what happens on mainline qemu with cache=off. Have I understood right that cache=off on a qcow2 image only uses O_DIRECT for the leaf image, and the chain of base images don't use O_DIRECT? Sometimes on a memory constrained host, where the (collective) guest

Re: [Qemu-devel] [RFC] Disk integrity in QEMU

2008-10-12 Thread Jamie Lokier
Chris Wright wrote: Either wt or uncached (so host O_DSYNC or O_DIRECT) would suffice to get it through to host's storage subsytem, and I think that's been the core of the discussion (plus defaults, etc). Just want to point out that the storage commitment from O_DIRECT can be _weaker_ than

[PATCH] qemu: qemu_fopen_fd: differentiate between reader and writer user

2008-10-12 Thread Uri Lublin
Currently qemu_fopen_ops accepts both get_buffer and put_buffer, but if both are given (non NULL) we encounter problems: 1. There is only one buffer and index, which may mean data corruption. 2. qemu_flush (which is also called by qemu_fclose) is writing (flushing) some of the data that

[ kvm-Bugs-2149609 ] Booting IA32e Windows guest meets BSOD

2008-10-12 Thread SourceForge.net
Bugs item #2149609, was opened at 2008-10-06 16:25 Message generated for change (Comment added) made by kiszka You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2149609group_id=180599 Please note that this message will contain a full copy of the comment

Re: [PATCH] qemu: qemu_fopen_fd: differentiate between reader and writer user

2008-10-12 Thread Avi Kivity
Uri Lublin wrote: Currently qemu_fopen_ops accepts both get_buffer and put_buffer, but if both are given (non NULL) we encounter problems: 1. There is only one buffer and index, which may mean data corruption. 2. qemu_flush (which is also called by qemu_fclose) is writing (flushing)

Re: [Qemu-devel] [RFC] Disk integrity in QEMU

2008-10-12 Thread Anthony Liguori
Jamie Lokier wrote: Dor Laor wrote: Actually this is what happens on mainline qemu with cache=off. Have I understood right that cache=off on a qcow2 image only uses O_DIRECT for the leaf image, and the chain of base images don't use O_DIRECT? Yeah, that's a bug IMHO and in my

Re: [Qemu-devel] [RFC] Disk integrity in QEMU

2008-10-12 Thread Anthony Liguori
Dor Laor wrote: Avi Kivity wrote: Since there is ongoing effort (both by IT and developers) to keep the base images as big as possible, it guarantees that this data is best suited for caching in the host while the private leaf images will be uncached. A proper CAS solution is really such a

Re: [PATCH] qemu: qemu_fopen_fd: differentiate between reader and writer user

2008-10-12 Thread Anthony Liguori
Avi Kivity wrote: Uri Lublin wrote: Currently qemu_fopen_ops accepts both get_buffer and put_buffer, but if both are given (non NULL) we encounter problems: 1. There is only one buffer and index, which may mean data corruption. 2. qemu_flush (which is also called by qemu_fclose) is writing

Re: [PATCH] qemu: qemu_fopen_fd: differentiate between reader and writer user

2008-10-12 Thread Avi Kivity
Anthony Liguori wrote: The proposed patch is less that ideal IMO as it introduces limitations on what you can do with a file. An alternative implementation would add a read/write mode to the buffer, based on the last access type. When switching from read to write, we drop the buffer, and

Re: kvm-76 fails to boot kubuntu 64bits (ok with kvm-75)

2008-10-12 Thread Xavier Gnata
John Rousseau wrote: My guess is it's this: https://sourceforge.net/tracker/?func=detailatid=893831aid=2138166group_id=180599 -John Xavier Gnata wrote: Hi, kubuntu 64bits 8.10 beta boots without problem with kvm-75 using this command line: qemu-system-x86_64 -no-quit -serial

Re: [Qemu-devel] [RFC] Disk integrity in QEMU

2008-10-12 Thread Izik Eidus
Avi Kivity wrote: LRU typically makes fairly bad decisions since it throws most of the information it has away. I recommend looking up LRU-K and similar algorithms, just to get a feel for this; it is basically the simplest possible algorithm short of random selection. Note that Linux doesn't

Re: with kerenl 2.6.27, CONFIG_KVM_GUEST does not work

2008-10-12 Thread Held Bernhard
Does the attached work for you? Avi, do you have thoughts on how to proceed with pvmmu? Using hypercalls instead of faults can still be beneficial (for the first write before page goes out of sync, or for non-leaf tables which currently don't go oos). But at the current state pvmmu should

Re: [PATCH] qemu: qemu_fopen_fd: differentiate between reader and writer user

2008-10-12 Thread Anthony Liguori
Avi Kivity wrote: Anthony Liguori wrote: The proposed patch is less that ideal IMO as it introduces limitations on what you can do with a file. An alternative implementation would add a read/write mode to the buffer, based on the last access type. When switching from read to write, we drop

Re: [kvm] Re: [PATCH 0/5] bios: 4G updates

2008-10-12 Thread Kevin O'Connor
Hi, On Thu, Oct 02, 2008 at 03:33:58PM +0300, Avi Kivity wrote: Alex Williamson wrote: It works, so I pushed it out. Alex, can you rebase your bios patches on top of current HEAD? I updated and resent the first patch in the 4 patch follow-on to this one. The remaining 3 patches

Re: [PATCH 1/2] KVM: Handle multiple interrupt sources

2008-10-12 Thread Sheng Yang
On Saturday 11 October 2008 16:10:51 Amit Shah wrote: From: Sheng Yang [EMAIL PROTECTED] Keep a record of current interrupt state before injecting. Don't assert/deassert repeatedly, so that every caller of kvm_set_irq() can be identified as a separate interrupt source for the IOAPIC/PIC to

Re: [ Re: unhandled vm exit: 0x80000021 vcpu_id 0]

2008-10-12 Thread Sheng Yang
Hi Pier The only thing I can tell that is, seems guest completely messed up... It ran into some non-code segment. unhandled vm exit: 0x8021 vcpu_id 0 rax 0007 rbx 1490 rcx rdx 19a0 rsi rdi rsp

Re: [PATCH] qemu: qemu_fopen_fd: differentiate between reader and writer user

2008-10-12 Thread Anthony Liguori
Anthony Liguori wrote: Also, having checks and the read and write functions to determine if the is_write flag is set along with whether buf_index 0 that fprintf()'d and aborted would be good for debugging. I have a patch that does this along with fixing a few other bugs. It's attached.

Re: [PATCH 1/2] KVM: Handle multiple interrupt sources

2008-10-12 Thread Amit Shah
- Sheng Yang [EMAIL PROTECTED] wrote: On Saturday 11 October 2008 16:10:51 Amit Shah wrote: From: Sheng Yang [EMAIL PROTECTED] Keep a record of current interrupt state before injecting. Don't assert/deassert repeatedly, so that every caller of kvm_set_irq() can be identified as a

Re: [PATCH 1/2] KVM: Handle multiple interrupt sources

2008-10-12 Thread Sheng Yang
On Monday 13 October 2008 13:06:18 Amit Shah wrote: - Sheng Yang [EMAIL PROTECTED] wrote: On Saturday 11 October 2008 16:10:51 Amit Shah wrote: From: Sheng Yang [EMAIL PROTECTED] Keep a record of current interrupt state before injecting. Don't assert/deassert repeatedly, so that