Re: KVM call agenda for July 27

2010-07-27 Thread Markus Armbruster
Anthony Liguori anth...@codemonkey.ws writes: - any additional input on probed_raw? Isn't it a fait accompli? I stopped providing input when commit 79368c81 appeared. -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More

i am a newer in kvm and help wanted.

2010-07-27 Thread cs-jerry**
hi all, i just started learning kvm and i want to get a clear way to learn it. i know that qemu uses ioctl to control vm. so i want to know the code entry of create cpu/memory of vm in qemu. in which file can i find them and get a clear understanding of it. any help will be appreciated.

Re: [PATCH UPDATED 1/3] vhost: replace vhost_workqueue with per-vhost kthread

2010-07-27 Thread Tejun Heo
Hello, On 07/26/2010 09:57 PM, Michael S. Tsirkin wrote: For freeze, it probably is okay but for stop, I think it's better to keep the semantics straight forward. What are the semantics then? What do we want stop followed by queue and flush to do? One scenario I can think of is the

Re: [PATCH UPDATED 1/3] vhost: replace vhost_workqueue with per-vhost kthread

2010-07-27 Thread Tejun Heo
Hello, On 07/26/2010 10:19 PM, Michael S. Tsirkin wrote: Let's try to define what do we want to achieve then. Do you want code that flushes workers not to block when workers are frozen? How will we handle work submitted when worker is frozen? As I wrote earlier, it's not necessarily about

where is the implementation of qemu_kvm?

2010-07-27 Thread cs-jerry**
in qemu/vl.c function main calls qemu_main, int main(int argc, char **argv) { qemu_main(argc, argv, NULL); } but there is no implementation of qemu_main() found. where is the entry point?N‹§²æìr¸›yúèšØb²X¬¶Ç§vØ^–)Þº{.nÇ+‰·¤¾h§¶›¡Ü¨}©ž²Æ zÚj:+v‰¨¾«‘êçzZ+€Ê+zf£¢·hšˆ§~†­†Ûiÿûàz¹

USB card passthrough - Has anyone succeeded?

2010-07-27 Thread Kenni Lund
Hi list I did some KVM testing with help from Alexander Graf and Chris Wright back in March, trying to passthrough various USB 2.0 PCI cards and onboard Intel USB hubs. I never got it to work completely, I ended up with some timing issues or similar, causing artifacts in the picture from a

Creating guest/image from live physical machine?

2010-07-27 Thread Emmanuel Noobadmin
I've been searching for howto on this but all the guides/docs I've found seem to assume that we would want to either convert from an existing VMWare/Xen VM or install a whole new VM. So my question is: is it possible to create an image of a running physical machine and then start it on another

Re: 2.6.35-rc1 regression with pvclock and smp guests

2010-07-27 Thread Avi Kivity
On 07/26/2010 11:47 AM, Andre Przywara wrote: Does this go away with CONFIG_DEBUG_RODATA=n? If so, it's a known bug in the atomic_*() clobber lists. Unfortunately the bug persists even with CONFIG_DEBUG_RODATA disabled. The debug options I had enabled now are: CONFIG_DEBUG_DEVRES=y

Re: how to debug unhandled vm exit: 0x11?

2010-07-27 Thread Avi Kivity
On 07/26/2010 08:58 PM, ewheeler wrote: O n 07/26/2010 07:01 PM, Neo Jia wrote: hi, I am seeing an unhandled vm exit: 0x11 on Win7 with KVM-88 release and wondering if I am still able to dump the code from guest OS when this happens. But it looks that all instructions are 0s after adding one

Re: KVM call agenda for July 27

2010-07-27 Thread Daniel P. Berrange
On Mon, Jul 26, 2010 at 05:28:21PM -0500, Anthony Liguori wrote: On 07/26/2010 04:28 PM, Chris Wright wrote: Please send in any agenda items you are interested in covering. - 0.13 update I'll pre-empt the 0.13 question with an answer. I'm just testing the VNC changes and if all

Re: 2.6.35-rc1 regression with pvclock and smp guests

2010-07-27 Thread Andre Przywara
Avi Kivity wrote: On 07/26/2010 11:47 AM, Andre Przywara wrote: Does this go away with CONFIG_DEBUG_RODATA=n? If so, it's a known bug in the atomic_*() clobber lists. Unfortunately the bug persists even with CONFIG_DEBUG_RODATA disabled. The debug options I had enabled now are:

Re: 2.6.35-rc1 regression with pvclock and smp guests

2010-07-27 Thread Avi Kivity
On 07/27/2010 02:49 PM, Andre Przywara wrote: What is the guest executing when it hangs? Both VCPUs are halted, the monitor and System.map tell me it's in native_safe_halt(). The code sequence confirms this, it is an intentional sti;hlt condition. Using -smp 16 also shows that all 16 VCPUs

Re: 2.6.35-rc1 regression with pvclock and smp guests

2010-07-27 Thread Andre Przywara
Avi Kivity wrote: On 07/27/2010 02:49 PM, Andre Przywara wrote: What is the guest executing when it hangs? Both VCPUs are halted, the monitor and System.map tell me it's in native_safe_halt(). The code sequence confirms this, it is an intentional sti;hlt condition. Using -smp 16 also shows

Re: 2.6.35-rc1 regression with pvclock and smp guests

2010-07-27 Thread Avi Kivity
On 07/27/2010 03:21 PM, Andre Przywara wrote: Avi Kivity wrote: On 07/27/2010 02:49 PM, Andre Przywara wrote: What is the guest executing when it hangs? Both VCPUs are halted, the monitor and System.map tell me it's in native_safe_halt(). The code sequence confirms this, it is an

Re: KVM call agenda for July 27

2010-07-27 Thread Anthony Liguori
On 07/27/2010 02:19 AM, Markus Armbruster wrote: Anthony Liguorianth...@codemonkey.ws writes: - any additional input on probed_raw? Isn't it a fait accompli? I stopped providing input when commit 79368c81 appeared. No. 79368c81 was to close the security hole (and I do

Re: [Qemu-devel] [RFC PATCH 03/14] KVM Test: Add a common ping module for network related tests

2010-07-27 Thread Lucas Meneghel Rodrigues
On Tue, 2010-07-20 at 09:35 +0800, Amos Kong wrote: The kvm_net_utils.py is a just a place that wraps common network related commands which is used to do the network-related tests. Use -1 as the packet ratio for loss analysis. Use quiet mode when doing the flood ping. Signed-off-by: Jason

Re: [RFC PATCH 04/14] KVM-test: Add a new subtest ping

2010-07-27 Thread Lucas Meneghel Rodrigues
On Tue, 2010-07-20 at 09:35 +0800, Amos Kong wrote: This test use ping to check the virtual nics, it contains two kinds of test: 1. Packet loss ratio test, ping the guest with different size of packets. 2. Stress test, flood ping guest then use ordinary ping to test the network. The interval

[PATCH 0/6] Nonatomic interrupt injection

2010-07-27 Thread Avi Kivity
This patchset changes interrupt injection to be done from normal process context instead of interrupts disabled context. This is useful for real mode interrupt injection on Intel without the current hacks (injecting as a software interrupt of a vm86 task), reducing latencies, and later, for

[PATCH 5/6] KVM: Non-atomic interrupt injection

2010-07-27 Thread Avi Kivity
Change the interrupt injection code to work from preemptible, interrupts enabled context. This works by adding a -cancel_injection() operation that undoes an injection in case we were not able to actually enter the guest (this condition could never happen with atomic injection). Signed-off-by:

[PATCH 3/6] KVM: VMX: Move real-mode interrupt injection fixup to vmx_complete_interrupts()

2010-07-27 Thread Avi Kivity
This allows reuse of vmx_complete_interrupts() for cancelling injections. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/vmx.c |9 ++--- 1 files changed, 6 insertions(+), 3 deletions(-) diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index 7483da7..738b21f 100644 ---

[PATCH 6/6] KVM: VMX: Move fixup_rmode_irq() to avoid forward declaration

2010-07-27 Thread Avi Kivity
No code changes. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/vmx.c | 47 +++ 1 files changed, 23 insertions(+), 24 deletions(-) diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index 4122baa..7686a7a 100644 ---

[PATCH 2/6] KVM: VMX: Split up vmx_complete_interrupts()

2010-07-27 Thread Avi Kivity
vmx_complete_interrupts() does too much, split it up: - vmx_vcpu_run() gets the cache important vmcs fields part - a new vmx_complete_atomic_exit() gets the parts that must be done atomically - a new vmx_recover_nmi_blocking() does what its name says - vmx_complete_interrupts() retains the

[PATCH 1/6] KVM: Check for pending events before attempting injection

2010-07-27 Thread Avi Kivity
Instead of blindly attempting to inject an event before each guest entry, check for a possible event first in vcpu-requests. Sites that can trigger event injection are modified to set KVM_REQ_EVENT: - interrupt, nmi window opening - ppr updates - i8259 output changes - local apic irr changes -

[PATCH 4/6] KVM: VMX: Parameterize vmx_complete_interrupts() for both exit and entry

2010-07-27 Thread Avi Kivity
Currently vmx_complete_interrupts() can decode event information from vmx exit fields into the generic kvm event queues. Make it able to decode the information from the entry fields as well by parametrizing it. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/vmx.c | 34

Re: [Qemu-devel] Re: KVM call agenda for July 27

2010-07-27 Thread Jes Sorensen
On 07/27/10 02:13, Alex Williamson wrote: On Mon, 2010-07-26 at 18:28 -0500, Anthony Liguori wrote: On 07/26/2010 05:28 PM, Anthony Liguori wrote: On 07/26/2010 04:28 PM, Chris Wright wrote: Please send in any agenda items you are interested in covering. - 0.13 update I'll pre-empt the

Re: [Qemu-devel] Re: KVM call agenda for July 27

2010-07-27 Thread Kevin Wolf
Am 27.07.2010 15:00, schrieb Anthony Liguori: On 07/27/2010 02:19 AM, Markus Armbruster wrote: Anthony Liguorianth...@codemonkey.ws writes: - any additional input on probed_raw? Isn't it a fait accompli? I stopped providing input when commit 79368c81 appeared. No.

Re: KVM call agenda for July 27

2010-07-27 Thread Anthony Liguori
On 07/27/2010 06:51 AM, Daniel P. Berrange wrote: On Mon, Jul 26, 2010 at 05:28:21PM -0500, Anthony Liguori wrote: On 07/26/2010 04:28 PM, Chris Wright wrote: Please send in any agenda items you are interested in covering. - 0.13 update I'll pre-empt the 0.13 question

Re: KVM call agenda for July 27

2010-07-27 Thread Cole Robinson
On 07/27/2010 09:30 AM, Anthony Liguori wrote: On 07/27/2010 06:51 AM, Daniel P. Berrange wrote: On Mon, Jul 26, 2010 at 05:28:21PM -0500, Anthony Liguori wrote: On 07/26/2010 04:28 PM, Chris Wright wrote: Please send in any agenda items you are interested in covering. -

Re: 2.6.35-rc1 regression with pvclock and smp guests

2010-07-27 Thread Andre Przywara
Avi Kivity wrote: On 07/27/2010 03:21 PM, Andre Przywara wrote: Avi Kivity wrote: On 07/27/2010 02:49 PM, Andre Przywara wrote: What is the guest executing when it hangs? Both VCPUs are halted, the monitor and System.map tell me it's in native_safe_halt(). The code sequence confirms

Re: 2.6.35-rc1 regression with pvclock and smp guests

2010-07-27 Thread Avi Kivity
On 07/27/2010 04:48 PM, Andre Przywara wrote: Wierd. Maybe the clock goes crazy. Let's see if it jumps forward alot: } while (unlikely(last != ret)); + + { +static u64 last_report; +if (ret last_report + 1) { +last_report = ret;

Re: [RFC PATCH 05/14] KVM-test: Add a subtest jumbo

2010-07-27 Thread Lucas Meneghel Rodrigues
On Tue, 2010-07-20 at 09:35 +0800, Amos Kong wrote: According to different nic model set different MTU for it. And ping from guest to host, to see whether tested size can be received by host. Signed-off-by: Jason Wang jasow...@redhat.com Signed-off-by: Amos Kong ak...@redhat.com --- 0

Re: [Qemu-devel] [RFC PATCH 06/14] KVM-test: Add basic file transfer test

2010-07-27 Thread Lucas Meneghel Rodrigues
On Tue, 2010-07-20 at 09:35 +0800, Amos Kong wrote: This test is the basic test of transfering file between host and guest. Try to transfer a large file from host to guest, and transfer it back to host, then compare the files by diff command. The default file size is 4000M, scp timeout is

Re: 2.6.35-rc1 regression with pvclock and smp guests

2010-07-27 Thread Andre Przywara
Avi Kivity wrote: On 07/27/2010 04:48 PM, Andre Przywara wrote: Wierd. Maybe the clock goes crazy. Let's see if it jumps forward alot: } while (unlikely(last != ret)); + + { +static u64 last_report; +if (ret last_report + 1) { +

KVM call minutes for July 27

2010-07-27 Thread Chris Wright
0.13 - -rc0 tagged, propagating now - no more features, bug fix only - although a few things, like shared memory device, are still feasible qemu64 cpu model - currently model 2 - this cpu simply does not exist at all in the real world - model 13 or higher windows 32bit will enable MSI/-X

Re: [Qemu-devel] Re: KVM call agenda for July 27

2010-07-27 Thread Markus Armbruster
Kevin Wolf kw...@redhat.com writes: Am 27.07.2010 15:00, schrieb Anthony Liguori: On 07/27/2010 02:19 AM, Markus Armbruster wrote: Anthony Liguorianth...@codemonkey.ws writes: - any additional input on probed_raw? Isn't it a fait accompli? I stopped providing input when commit

Re: [Qemu-devel] Re: KVM call agenda for July 27

2010-07-27 Thread Anthony Liguori
On 07/27/2010 10:22 AM, Markus Armbruster wrote: Kevin Wolfkw...@redhat.com writes: Am 27.07.2010 15:00, schrieb Anthony Liguori: On 07/27/2010 02:19 AM, Markus Armbruster wrote: Anthony Liguorianth...@codemonkey.ws writes: - any additional input on

Re: [Qemu-devel] Re: KVM call agenda for July 27

2010-07-27 Thread Daniel P. Berrange
On Tue, Jul 27, 2010 at 10:28:04AM -0500, Anthony Liguori wrote: On 07/27/2010 10:22 AM, Markus Armbruster wrote: Kevin Wolfkw...@redhat.com writes: Am 27.07.2010 15:00, schrieb Anthony Liguori: On 07/27/2010 02:19 AM, Markus Armbruster wrote: Anthony

Re: [PATCH repost] sched: export sched_set/getaffinity to modules

2010-07-27 Thread Michael S. Tsirkin
On Mon, Jul 26, 2010 at 08:08:34PM +0200, Oleg Nesterov wrote: On 07/26, Sridhar Samudrala wrote: I have been testing out a similar patch that uses kernel_thread() without CLONE_FILES flag rather than create_kthread() and then closing the files. !CLONE_FILES can't help. copy_files()

[PATCH 1/2] KVM: SVM: Sync efer back into nested vmcb

2010-07-27 Thread Joerg Roedel
This patch fixes a bug in a nested hypervisor that heavily switches between real-mode and long-mode. The problem is fixed by syncing back efer into the guest vmcb on emulated vmexit. Signed-off-by: Joerg Roedel joerg.roe...@amd.com --- arch/x86/kvm/svm.c |1 + 1 files changed, 1

[PATCH 0/2] Nested SVM fix and next_rip emulation

2010-07-27 Thread Joerg Roedel
Hi Avi, Marcelo, here are two small patches for kvm-amd. The first patch fixes a small bug in nested svm efer handling. The second patch implements emulation for the next_rip feature. Regards, Joerg -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a

[PATCH 2/2] KVM: SVM: Emulate next_rip svm feature

2010-07-27 Thread Joerg Roedel
This patch implements the emulations of the svm next_rip feature in the nested svm implementation in kvm. Signed-off-by: Joerg Roedel joerg.roe...@amd.com --- arch/x86/kvm/svm.c |8 +++- 1 files changed, 7 insertions(+), 1 deletions(-) diff --git a/arch/x86/kvm/svm.c

Re: [Qemu-devel] Re: KVM call agenda for July 27

2010-07-27 Thread Avi Kivity
On 07/27/2010 06:28 PM, Anthony Liguori wrote: If we add docs/deprecated-features.txt, schedule removal for at least 1 year in the future, and put a warning in the code that prints whenever raw is probed, I think I could warm up to this. Since libvirt should be insulating users from this

Re: [Qemu-devel] Re: KVM call agenda for July 27

2010-07-27 Thread Daniel P. Berrange
On Tue, Jul 27, 2010 at 07:17:06PM +0300, Avi Kivity wrote: On 07/27/2010 06:28 PM, Anthony Liguori wrote: If we add docs/deprecated-features.txt, schedule removal for at least 1 year in the future, and put a warning in the code that prints whenever raw is probed, I think I could warm up

Re: [Qemu-devel] Re: KVM call agenda for July 27

2010-07-27 Thread Chris Wright
* Daniel P. Berrange (berra...@redhat.com) wrote: On Tue, Jul 27, 2010 at 07:17:06PM +0300, Avi Kivity wrote: On 07/27/2010 06:28 PM, Anthony Liguori wrote: If we add docs/deprecated-features.txt, schedule removal for at least 1 year in the future, and put a warning in the code that

Re: [Qemu-devel] Re: KVM call agenda for July 27

2010-07-27 Thread Avi Kivity
On 07/27/2010 07:29 PM, Chris Wright wrote: QEMU stderr+out is already recorded in /var/lib/libvirt/qemu/$GUESTNAME.log along with the env variables and argv used to spawn it. Or did you mean provide an API + virsh command /virt-manager UI for accessing the logs ? I read that to

Re: [Qemu-devel] Re: KVM call agenda for July 27

2010-07-27 Thread Chris Wright
* Avi Kivity (a...@redhat.com) wrote: On 07/27/2010 07:29 PM, Chris Wright wrote: QEMU stderr+out is already recorded in /var/lib/libvirt/qemu/$GUESTNAME.log along with the env variables and argv used to spawn it. Or did you mean provide an API + virsh command /virt-manager UI for accessing

Re: [Qemu-devel] Re: KVM call agenda for July 27

2010-07-27 Thread Avi Kivity
On 07/27/2010 07:36 PM, Chris Wright wrote: If things work there's no reason for the user to go look at the logs. An exclamation point invites clicking. Even better would be an ABRT plugin, so if something goes (marginally) wrong, the siren pops up and you're invited to report the bug.

Re: [Qemu-devel] Re: KVM call agenda for July 27

2010-07-27 Thread Daniel P. Berrange
On Tue, Jul 27, 2010 at 09:29:13AM -0700, Chris Wright wrote: * Daniel P. Berrange (berra...@redhat.com) wrote: On Tue, Jul 27, 2010 at 07:17:06PM +0300, Avi Kivity wrote: On 07/27/2010 06:28 PM, Anthony Liguori wrote: If we add docs/deprecated-features.txt, schedule removal for at

Re: [Qemu-devel] Re: KVM call agenda for July 27

2010-07-27 Thread Avi Kivity
On 07/27/2010 07:42 PM, Daniel P. Berrange wrote: I read that to mean...propagate stderr from qemu to be right in front of the user. So that's output from virsh or in virt-manager. Trouble is, that's only useful (at best) when starting a guest. Perhaps some virt-manager thing (an

Re: [Qemu-devel] Re: KVM call agenda for July 27

2010-07-27 Thread Avi Kivity
On 07/27/2010 07:47 PM, Avi Kivity wrote: On 07/27/2010 07:42 PM, Daniel P. Berrange wrote: I read that to mean...propagate stderr from qemu to be right in front of the user. So that's output from virsh or in virt-manager. Trouble is, that's only useful (at best) when starting a guest.

[PATCH v8 5/5] RESEND: Inter-VM shared memory PCI device

2010-07-27 Thread Cam Macdonell
resend for bug fix related to removal of irqfd Support an inter-vm shared memory device that maps a shared-memory object as a PCI device in the guest. This patch also supports interrupts between guest by communicating over a unix domain socket. This patch applies to the qemu-kvm repository.

Re: [Qemu-devel] Re: KVM call agenda for July 27

2010-07-27 Thread Daniel P. Berrange
On Tue, Jul 27, 2010 at 07:42:34PM +0300, Avi Kivity wrote: On 07/27/2010 07:36 PM, Chris Wright wrote: If things work there's no reason for the user to go look at the logs. An exclamation point invites clicking. Even better would be an ABRT plugin, so if something goes (marginally)

Re: [Qemu-devel] Re: KVM call agenda for July 27

2010-07-27 Thread Avi Kivity
On 07/27/2010 08:01 PM, Daniel P. Berrange wrote: It's annoying to us old hands, but it does give that nice integrated system feel that we're missing, and it works even if virt-manager is in the background (or if you don't use virt-manager at all). Given that there's a kerneloops pluging

Re: [PATCH 2/2] KVM: SVM: Emulate next_rip svm feature

2010-07-27 Thread Avi Kivity
On 07/27/2010 07:14 PM, Joerg Roedel wrote: This patch implements the emulations of the svm next_rip feature in the nested svm implementation in kvm. Signed-off-by: Joerg Roedeljoerg.roe...@amd.com --- arch/x86/kvm/svm.c |8 +++- 1 files changed, 7 insertions(+), 1 deletions(-)

Re: [PATCH 1/2] KVM: SVM: Sync efer back into nested vmcb

2010-07-27 Thread Avi Kivity
On 07/27/2010 07:14 PM, Joerg Roedel wrote: This patch fixes a bug in a nested hypervisor that heavily switches between real-mode and long-mode. The problem is fixed by syncing back efer into the guest vmcb on emulated vmexit. This is vmware? IIRC their old kernel was 32-bit, so they need to

Re: [PATCH UPDATED 1/3] vhost: replace vhost_workqueue with per-vhost kthread

2010-07-27 Thread Michael S. Tsirkin
On Mon, Jul 26, 2010 at 09:31:58PM +0200, Tejun Heo wrote: Hello, On 07/26/2010 09:14 PM, Tejun Heo wrote: On 07/26/2010 06:51 PM, Michael S. Tsirkin wrote: I noticed that with vhost, flush_work was getting the worker pointer as well. Can we live with this API change? Yeah, the

[ANNOUNCE] qemu-kvm-0.12.5

2010-07-27 Thread Marcelo Tosatti
qemu-kvm-0.12.5 is now available. This release is based on the upstream qemu 0.12.5, plus kvm-specific enhancements. Please see the original qemu 0.12.5 release announcement for details. This release can be used with the kvm kernel modules provided by your distribution kernel, or by the

Make vhost multi-threaded and associate each thread to its guest's cgroup

2010-07-27 Thread Michael S. Tsirkin
Sridhar, I pushed a patchset with all known issues fixed, on my vhost-net-next branch. For now this ignores the cpu mask issue, addressing only the cgroups issue. Would appreciate testing and reports. Thanks, -- MST -- To unsubscribe from this list: send the line unsubscribe kvm in the body of

Re: 2.6.35-rc1 regression with pvclock and smp guests

2010-07-27 Thread Arjan Koers
On 2010-07-26 20:59, Arjan Koers wrote: I ran into the same problem. 2.6.34.1 and 2.6.35-rc6 SMP guest kernels hang during boot. It appears that last is way ahead of ret twice. The kernel boots with this debug patch that makes the clock go backwards if the difference is big: last =

Re: [PATCH 0/3] Fix pusha tests

2010-07-27 Thread Marcelo Tosatti
On Sun, Jul 25, 2010 at 02:39:43PM +0300, Avi Kivity wrote: The pusha tests fail on AMD, which virtualizes real mode correctly. Fix the tests. Avi Kivity (3): test: realmode: fix pusha test test: realmode: initialize all bits of esp test: realmode: fix pusha test stack

Re: [PATCH v4] device-assignment: Use PCI I/O port sysfs resource file when available

2010-07-27 Thread Marcelo Tosatti
On Fri, Jul 23, 2010 at 03:47:18PM -0600, Alex Williamson wrote: When supported by the host kernel, we can use read/write on the PCI sysfs resource file for I/O port regions. This allows us to avoid raw in/out commands and works with deprivileged guests via libvirt. Signed-off-by: Alex

Re: [PATCH 1/3] KVM test: separate expect status updates from ac_test_setup_pte() function

2010-07-27 Thread Marcelo Tosatti
On Fri, Jul 23, 2010 at 12:59:49PM +0800, Xiao Guangrong wrote: Separate expect status updates operation, later we can just modify the access way(i,e the AC_ACCESS_* flags) Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com --- kvm/test/x86/access.c | 131

Re: 2.6.35-rc1 regression with pvclock and smp guests

2010-07-27 Thread Andre Przywara
Andre Przywara wrote: Avi Kivity wrote: On 07/27/2010 04:48 PM, Andre Przywara wrote: Wierd. Maybe the clock goes crazy. Let's see if it jumps forward alot: } while (unlikely(last != ret)); + + { +static u64 last_report; +if (ret last_report +

Re: Freezing Windows 2008 x64bit guest

2010-07-27 Thread Harri Olin
Gleb Natapov wrote: On Wed, Jul 21, 2010 at 09:25:31AM +0300, Harri Olin wrote: Gleb Natapov kirjoitti: On Mon, Jul 19, 2010 at 10:17:02AM +0300, Harri Olin wrote: Gleb Natapov kirjoitti: On Thu, Jul 15, 2010 at 03:19:44PM +0200, Christoph Adomeit wrote: But one Windows 2008 64 Bit Server

Re: [PATCH V3] VFIO driver: Non-privileged user level PCI drivers

2010-07-27 Thread Tom Lyon
[ Sorry for the long hiatus, I've been wrapped up in other issues.] I think the fundamental issue to resolve is to decide on the model which the VFIO driver presents to its users. Fundamentally, VFIO as part of the OS must protect the system from its users and also protect the users from each

[PATCH] test: Add emulator test for iret instruction

2010-07-27 Thread Mohammed Gamal
This adds a unit test for real mode emulation of the iret instruction Signed-off-by: Mohammed Gamal m.gamal...@gmail.com --- kvm/test/x86/realmode.c | 23 +++ 1 files changed, 23 insertions(+), 0 deletions(-) diff --git a/kvm/test/x86/realmode.c b/kvm/test/x86/realmode.c

[PATCH] x86 emulator: Add IRET instruction

2010-07-27 Thread Mohammed Gamal
Ths patch adds IRET instruction (opcode 0xcf). Currently, only IRET in real mode is emulated. Protected mode support is to be added later if needed. Signed-off-by: Mohammed Gamal m.gamal...@gmail.com Changes from v1: - Corrected handling of eflags --- arch/x86/kvm/emulate.c | 69

[PATCH] test: Add emulator test for iret instruction

2010-07-27 Thread Mohammed Gamal
This adds a unit test for real mode emulation of the iret instruction Signed-off-by: Mohammed Gamal m.gamal...@gmail.com --- kvm/test/x86/realmode.c | 23 +++ 1 files changed, 23 insertions(+), 0 deletions(-) diff --git a/kvm/test/x86/realmode.c b/kvm/test/x86/realmode.c

Re: [PATCH V3] VFIO driver: Non-privileged user level PCI drivers

2010-07-27 Thread Michael S. Tsirkin
On Tue, Jul 27, 2010 at 03:13:14PM -0700, Tom Lyon wrote: [ Sorry for the long hiatus, I've been wrapped up in other issues.] I think the fundamental issue to resolve is to decide on the model which the VFIO driver presents to its users. Fundamentally, VFIO as part of the OS must protect

Re: Make vhost multi-threaded and associate each thread to its guest's cgroup

2010-07-27 Thread Sridhar Samudrala
On Tue, 2010-07-27 at 23:42 +0300, Michael S. Tsirkin wrote: Sridhar, I pushed a patchset with all known issues fixed, on my vhost-net-next branch. For now this ignores the cpu mask issue, addressing only the cgroups issue. Would appreciate testing and reports. I had to apply the

Re: Make vhost multi-threaded and associate each thread to its guest's cgroup

2010-07-27 Thread Michael S. Tsirkin
On Tue, Jul 27, 2010 at 05:41:41PM -0700, Sridhar Samudrala wrote: On Tue, 2010-07-27 at 23:42 +0300, Michael S. Tsirkin wrote: Sridhar, I pushed a patchset with all known issues fixed, on my vhost-net-next branch. For now this ignores the cpu mask issue, addressing only the cgroups

vhost mergeable buffers guest's cgroup

2010-07-27 Thread Michael S. Tsirkin
Sridhar, David, I pushed a mergeable buffers patchset on my vhost-net-next branch, on top of the threading changes. This is a minimal patch, which in my testing has zero impact on non-mergeable path. Please give this a spin and let me know. Thanks! -- MST -- To unsubscribe from this list:

Re: vhost mergeable buffers guest's cgroup

2010-07-27 Thread Michael S. Tsirkin
On Wed, Jul 28, 2010 at 04:27:35AM +0300, Michael S. Tsirkin wrote: Sridhar, David, I pushed a mergeable buffers patchset on my vhost-net-next branch, on top of the threading changes. This is a minimal patch, which in my testing has zero impact on non-mergeable path. Please give this a

Re: 2.6.35-rc1 regression with pvclock and smp guests

2010-07-27 Thread Zachary Amsden
On 07/27/2010 11:51 AM, Andre Przywara wrote: Andre Przywara wrote: Avi Kivity wrote: On 07/27/2010 04:48 PM, Andre Przywara wrote: Wierd. Maybe the clock goes crazy. Let's see if it jumps forward alot: } while (unlikely(last != ret)); + + { +static u64

Re: [PATCH] x86 emulator: Add IRET instruction

2010-07-27 Thread Avi Kivity
On 07/28/2010 02:06 AM, Mohammed Gamal wrote: Ths patch adds IRET instruction (opcode 0xcf). Currently, only IRET in real mode is emulated. Protected mode support is to be added later if needed. @@ -1778,6 +1778,69 @@ static int emulate_popa(struct x86_emulate_ctxt *ctxt, return rc;

Re: [PATCH] test: Add emulator test for iret instruction

2010-07-27 Thread Avi Kivity
On 07/28/2010 02:22 AM, Mohammed Gamal wrote: This adds a unit test for real mode emulation of the iret instruction Signed-off-by: Mohammed Gamalm.gamal...@gmail.com --- kvm/test/x86/realmode.c | 23 +++ 1 files changed, 23 insertions(+), 0 deletions(-) diff --git

Re: [PATCH] test: Add emulator test for iret instruction

2010-07-27 Thread Avi Kivity
On 07/28/2010 07:21 AM, Avi Kivity wrote: On 07/28/2010 02:22 AM, Mohammed Gamal wrote: This adds a unit test for real mode emulation of the iret instruction Signed-off-by: Mohammed Gamalm.gamal...@gmail.com --- kvm/test/x86/realmode.c | 23 +++ 1 files changed, 23