10-CURRENT code freezes and bhyve

2013-08-26 Thread Aryeh Friedman
What is the schedule, functionality goal and such for bhyve in regards to
the 10-CURRENT code freeze coming up (according to the rel_eng page) on 9/17
___
freebsd-virtualization@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-virtualization
To unsubscribe, send any mail to 
freebsd-virtualization-unsubscr...@freebsd.org


Re: CFT: nested page table integration with amd64/pmap

2013-08-26 Thread Ivan Voras
On 23/08/2013 23:57, Peter Grehan wrote:
 I always wondered about virtualization environments which have pageable
 guest memory - how does the guest kernel handle situations where it
 really needs non-pageable memory? Does is simply not care because for
 it the memory access looks just like it isn't paged but is simply very,
 very slow?
 
  Yes - from the guest's point of view, what it thinks is physical memory
 appears wired.
 
 What about time-sensitive situations (like the originally
 mentioned PCI-passthrough)?
 
  PCI passthru is a special case since the h/w requires that the target
 of a DMA transfer is present - there is currently no way for the IOMMU
 to generate the equivalent of page faults. So, for PCI passthru, all of
 guest memory has to be wired host memory.
 
  For time-sensitive situations, there's not a lot of options other than
 forcing guest memory to be wired, since there isn't visibility into the
 host without having o/s-specific tools that could communicate this
 information to the hypervisor.

Ok, that is how I understood it also, but I thought that maybe there was
some way of telling which guest memory belongs to the kernel and only
wire those pages.




signature.asc
Description: OpenPGP digital signature


Re: CFT: nested page table integration with amd64/pmap

2013-08-26 Thread Peter Grehan

  For time-sensitive situations, there's not a lot of options other than
forcing guest memory to be wired, since there isn't visibility into the
host without having o/s-specific tools that could communicate this
information to the hypervisor.


Ok, that is how I understood it also, but I thought that maybe there was
some way of telling which guest memory belongs to the kernel and only
wire those pages.


 Not in a general way. That's where you need a hypervisor-specific 
module in the guest to pass on this info e.g. vmware-tools.


later,

Peter.

___
freebsd-virtualization@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-virtualization
To unsubscribe, send any mail to 
freebsd-virtualization-unsubscr...@freebsd.org


Re: 10-CURRENT code freezes and bhyve

2013-08-26 Thread Neel Natu
Hi Aryeh,

On Mon, Aug 26, 2013 at 12:14 AM, Aryeh Friedman
aryeh.fried...@gmail.comwrote:

 What is the schedule, functionality goal and such for bhyve in regards to
 the 10-CURRENT code freeze coming up (according to the rel_eng page) on
 9/17


- AMD/SVM support (ready to go)
- integrate bhyve nested page tables with amd64/pmap (code is being
reviewed)
- ahci device emulation (WIP, GSoC project)
- e1000 device emulation (WIP)

best
Neel

___
 freebsd-virtualization@freebsd.org mailing list
 http://lists.freebsd.org/mailman/listinfo/freebsd-virtualization
 To unsubscribe, send any mail to 
 freebsd-virtualization-unsubscr...@freebsd.org

___
freebsd-virtualization@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-virtualization
To unsubscribe, send any mail to 
freebsd-virtualization-unsubscr...@freebsd.org