[PATCH] irq assignment

2008-06-18 Thread Xu, Anthony
From 67806cc642cb666fb59fec60115fee37b80ecb3a Mon Sep 17 00:00:00 2001 From: Anthony Xu [EMAIL PROTECTED] Date: Wed, 18 Jun 2008 14:32:46 -0400 Subject: [PATCH] Irq assignment 1. use bimodal _PRT 2. pci device can use irq 15, reduce interrupt sharing 3. test by running linux guest in kvm-ia64,

Re: [PATCH] libkvm: export init for coalesced MMIO support

2008-06-18 Thread Laurent Vivier
Le mercredi 18 juin 2008 à 00:22 -0500, Carlo Marcelo Arenas Belon a écrit : complement 2680f3df932a3119880a692609943587ecc8f409 to export the definition for kvm_init_coalesced_mmio as it is used by the per arch libkvm as shown by the following warning : libkvm-x86.c: In function

Re: guests locking up issue

2008-06-18 Thread William Boughton
with KVM-70 my host: dual quad core Intel E5320 4G ram Debian Etch 2.6.26-rc6 x86_64 my guest: debian etch 2.6.26-rc6 x86_64 512 Mb ram I rebuild my guest kernels without CONFIG_KVM_CLOCK, just with CONFIG_HAVE_KVM=y It now seems far more stable with -smp 4 started with:

PCI PT: irq issue

2008-06-18 Thread Ben-Ami Yassour
Amit, With the current implementation we have an issue if the driver on the host was never loaded. To be able to run kvm with passthrough we have to load and then unload the driver on the host at least once. After that it works ok. Note that after doing the load and unload the irq as reported

Re: [kvm-devel] pinning, tsc and apic

2008-06-18 Thread Avi Kivity
(catching up on unread email) Chris Wright wrote: Is this with pinning? We at least know we're losing small bits on migration. From my measurements it's ~3000 (outliers are 10-20k). Also, what happens if you roll back to kvm-userspace 7f5c4d15ece5? I'm using this: diff -up

Re: [PATCH 0 of 2] Remove --disable-cpu-emulation for qemu

2008-06-18 Thread Avi Kivity
Jerone Young wrote: These patches remove all traces of --disable-cpu-emulation configuration flag. I kind of like --disable-cpu-emulation. It means we have the choice of kvm-only (low footprint, shuts up the security people), qemu-only (running cross-arch or on older cpu), and mixed

Re: [PATCH 0 of 2] Remove --disable-cpu-emulation for qemu

2008-06-18 Thread Avi Kivity
Avi Kivity wrote: Jerone Young wrote: These patches remove all traces of --disable-cpu-emulation configuration flag. I kind of like --disable-cpu-emulation. It means we have the choice of kvm-only (low footprint, shuts up the security people), qemu-only (running cross-arch or on older

Re: [PATCH 1/1] kvm: qemu: Add VIRTIO_F_NOTIFY_ON_EMPTY

2008-06-18 Thread Avi Kivity
Mark McLoughlin wrote: Set the VIRTIO_F_NOTIFY_ON_EMPTY feature bit so the guest can rely on us notifying them when the queue is empty. Also, only notify when the available queue is empty *and* when we've finished with all the buffers we had detached. Right now, when the queue is empty, we

Re: [PATCH] make qemu compile for kvm/ia64

2008-06-18 Thread Avi Kivity
Xu, Anthony wrote: From 7b2c2612b21b895cd14e632fea845c03b6e1dedc Mon Sep 17 00:00:00 2001 From: Anthony Xu [EMAIL PROTECTED] Date: Thu, 29 May 2008 13:14:56 -0400 Subject: [PATCH] Make qemu compile for kvm-ia64 Since merging with Qemu upsteram, it can't be compiled for kvm-ia64 @@ -620,7

Re: [Patch] Japanese keyboard support

2008-06-18 Thread Avi Kivity
Akio Takebe wrote: Hi, This patch improves jp106 keyboard. You can use '-k ja' option of qemu. Please send this to qemu-devel, so non-kvm users can also make use of this patch. Thanks. kvm will get it on the next merge. -- I have a truly marvellous patch that fixes the bug which this

Re: Linux with kvm-intel locks up VMplayer guest is started

2008-06-18 Thread Avi Kivity
Anthony Liguori wrote: We know exactly what the problem is. KVM activates VT unconditionally. There's no hardware mechanism to arbitrate access to VT. KVM is the only thing in the Linux kernel that uses VT so we don't have a software mechanism to arbitrate access to VT. If the VMware

Re: fullscreen help / request

2008-06-18 Thread Avi Kivity
Hugh Roper wrote: Dear List, I'm using a dual-monitor setup. When switching to fullscreen mode (via ctrl-alt-f) is it possible to expand to the active monitor? At the moment it centres between the monitors, which have different resolutions. I use Twin View Xinerama for the dual-screen

Re: [PATCH 4/5] kvm: qemu: Use vringfd to eliminate copies

2008-06-18 Thread Avi Kivity
Rusty Russell wrote: Yeah, every time I get close to benchmarking I find another bug :( But I've spent some time optimising the normal lguest net device, so we'll have a fair comparison. In theory vringfd will get us zero copy from guest sendfile out to external machines. For anything else

Re: [PATCH 1/5] vring: Replace mmap() interface with ioctl()

2008-06-18 Thread Avi Kivity
Mark McLoughlin wrote: On Fri, 2008-06-13 at 17:09 +0300, Avi Kivity wrote: Mark McLoughlin wrote: - .ioctl = vring_ioctl, + .unlocked_ioctl = vring_ioctl, + .compat_ioctl = vring_compat_ioctl, I think you can set compat_ioctl = vring_ioctl

Re: Scheduling of VCPUs and allocation of Guest Physical Memory

2008-06-18 Thread Avi Kivity
Sukanto Ghosh wrote: I saw that KVM has guest SMP support upto 4 VCPUs. Are these VCPUs modelled as threads of 'the process representing the VM' ? Yes. If it is, then, when a signal is sent to the that process by the QEMU process, shouldn't all of the VCPUs (for that VM) exit to the

Re: hrtimers bug

2008-06-18 Thread Avi Kivity
Brian Jackson wrote: Don't know if this is a kvm bug or not, but figured I'd send it anyway. Just in case. http://www.theiggy.com/tmp/hrtimers_bug.png It doesn't seem to be a bug at all. Perhaps it should be converted to a printk(). -- I have a truly marvellous patch that fixes the bug

Re: [ANNOUNCE] kvm-70 release

2008-06-18 Thread Avi Kivity
Farkas Levente wrote: Avi Kivity wrote: This release was cooking for far too long, and as a result there are plenty of changes. Windows XP SMP performance is much improved for AMD hosts or Intel hosts without FlexPriority (performance with FlexPriority should already be very good). There

Re: [Patch] fix Oops at shutdown guest

2008-06-18 Thread Avi Kivity
Akio Takebe wrote: Hi, I got a Oops message when I shutdown a guest on x86_32 machine. The patch fixes this issue. Applied, thanks. -- I have a truly marvellous patch that fixes the bug which this signature is too narrow to contain. -- To unsubscribe from this list: send the line

Re: [PATCH] libkvm: export init for coalesced MMIO support

2008-06-18 Thread Avi Kivity
Carlo Marcelo Arenas Belon wrote: complement 2680f3df932a3119880a692609943587ecc8f409 to export the definition for kvm_init_coalesced_mmio as it is used by the per arch libkvm as shown by the following warning : Applied, thanks. -- I have a truly marvellous patch that fixes the bug which

[patch 1/7] kvm: qemu: inform valid C2 state in ACPI table

2008-06-18 Thread Marcelo Tosatti
Inform C2 state support via ACPI's CST per-processor package. Signed-off-by: Marcelo Tosatti [EMAIL PROTECTED] Index: kvm-userspace.tip/bios/acpi-dsdt.dsl === --- kvm-userspace.tip.orig/bios/acpi-dsdt.dsl +++

[patch 2/7] kvm: qemu: disable c2 via _CST notification

2008-06-18 Thread Marcelo Tosatti
Write an invalid latency value the first time the guest attempts to idle via P_LVL2 port. This way the TSC is considered unreliable, and we get away with the costs relative to APIC timer broadcasts on enter/exit necessary for C1+. Signed-off-by: Marcelo Tosatti [EMAIL PROTECTED] Index:

[patch 4/7] libkvm: handle_io return handler value

2008-06-18 Thread Marcelo Tosatti
This makes it possible for PIO handlers (such as the ACPI PLVL2 one) force the current vcpu to main_loop(). Signed-off-by: Marcelo Tosatti [EMAIL PROTECTED] Index: kvm-userspace.tip/libkvm/libkvm.c === ---

[patch 6/7] kvm: qemu: enable in-kernel C2 emulation / userspace emulation

2008-06-18 Thread Marcelo Tosatti
Enable the in-kernel C2 emulation after the _CST notification has been triggered. Emulate in userspace for -no-kvm-irqchip case. Signed-off-by: Marcelo Tosatti [EMAIL PROTECTED] Index: kvm-userspace.tip/qemu/hw/acpi.c === ---

Re: [ANNOUNCE] kvm-70 release

2008-06-18 Thread Andrea Arcangeli
On Wed, Jun 18, 2008 at 11:50:52AM -0500, Charles Duffy wrote: CONFIG_KALLSYMS is indeed defined, but kallsyms_lookup_name doesn't appear to be exported in this kernel. Ok I'm aware that kallsyms_lookup_name isn't exported in recent kernels, and when I implemented the patch I verified that the

Re: [PATCH 1/1] kvm: qemu: Add VIRTIO_F_NOTIFY_ON_EMPTY

2008-06-18 Thread Mark McLoughlin
On Wed, 2008-06-18 at 06:31 -0700, Avi Kivity wrote: Mark McLoughlin wrote: Set the VIRTIO_F_NOTIFY_ON_EMPTY feature bit so the guest can rely on us notifying them when the queue is empty. Also, only notify when the available queue is empty *and* when we've finished with all the

Re: Linux with kvm-intel locks up VMplayer guest is started

2008-06-18 Thread devzero
i`d like to give a comment about those claims in this thread (see below), vmware kernel part would be closed source or binary module. i think, they arenŽt. they just are not available via public/opensource code repository. just go and download workstation 6.5 beta from:

Re: [PATCH] KVM: PCIPT: VT-d: fix guest unmap

2008-06-18 Thread Anthony Liguori
Ben-Ami Yassour wrote: On Tue, 2008-06-17 at 16:29 -0500, Anthony Liguori wrote: I think the current VT-d code needs some reworking. We should build the table as the shadow page table gets built. We should suppress iotlb flushes unless the table is actually being updated. I'm not

Re: [PATCH 0 of 2] Remove --disable-cpu-emulation for qemu

2008-06-18 Thread Anthony Liguori
Avi Kivity wrote: Avi Kivity wrote: Jerone Young wrote: These patches remove all traces of --disable-cpu-emulation configuration flag. I kind of like --disable-cpu-emulation. It means we have the choice of kvm-only (low footprint, shuts up the security people), qemu-only (running

Re: Linux with kvm-intel locks up VMplayer guest is started

2008-06-18 Thread Anthony Liguori
Avi Kivity wrote: Anthony Liguori wrote: We know exactly what the problem is. KVM activates VT unconditionally. There's no hardware mechanism to arbitrate access to VT. KVM is the only thing in the Linux kernel that uses VT so we don't have a software mechanism to arbitrate access to VT.

Re: [patch 0/7] force the TSC unreliable by reporting C2 state

2008-06-18 Thread Marcelo Tosatti
On Wed, Jun 18, 2008 at 04:02:39PM -0500, Anthony Liguori wrote: Have we yet determined why the TSC is so unstable in the first place? In theory, it should be relatively stable on single-node Intel and Barcelona chips. If the host enters C2/C3, or changes CPU frequency, it becomes

Re: [PATCH] KVM: PCIPT: VT-d: fix guest unmap

2008-06-18 Thread Anthony Liguori
Muli Ben-Yehuda wrote: On Wed, Jun 18, 2008 at 03:48:33PM -0500, Anthony Liguori wrote: Right. But this is not ideal. Instead of pinning up-front, it would make more sense IMHO to build the VT-d table as the shadow page table gets faulted in. In certain circumstances, this will result in

Re: [patch 0/7] force the TSC unreliable by reporting C2 state

2008-06-18 Thread Anthony Liguori
Marcelo Tosatti wrote: On Wed, Jun 18, 2008 at 04:02:39PM -0500, Anthony Liguori wrote: Have we yet determined why the TSC is so unstable in the first place? In theory, it should be relatively stable on single-node Intel and Barcelona chips. If the host enters C2/C3, or

Re: [patch 0/7] force the TSC unreliable by reporting C2 state

2008-06-18 Thread Marcelo Tosatti
On Wed, Jun 18, 2008 at 04:42:40PM -0500, Anthony Liguori wrote: Marcelo Tosatti wrote: On Wed, Jun 18, 2008 at 04:02:39PM -0500, Anthony Liguori wrote: Have we yet determined why the TSC is so unstable in the first place? In theory, it should be relatively stable on single-node Intel

Re: [patch 0/7] force the TSC unreliable by reporting C2 state

2008-06-18 Thread john stultz
On Wed, 2008-06-18 at 19:41 -0300, Marcelo Tosatti wrote: On Wed, Jun 18, 2008 at 04:42:40PM -0500, Anthony Liguori wrote: Marcelo Tosatti wrote: On Wed, Jun 18, 2008 at 04:02:39PM -0500, Anthony Liguori wrote: Have we yet determined why the TSC is so unstable in the first place?

RE: [patch 0/7] force the TSC unreliable by reporting C2 state

2008-06-18 Thread Nakajima, Jun
On 6/18/2008 3:57:16 PM, john stultz wrote: On Wed, 2008-06-18 at 19:41 -0300, Marcelo Tosatti wrote: On Wed, Jun 18, 2008 at 04:42:40PM -0500, Anthony Liguori wrote: Marcelo Tosatti wrote: On Wed, Jun 18, 2008 at 04:02:39PM -0500, Anthony Liguori wrote: Have we yet

Re: Linux with kvm-intel locks up VMplayer guest is started

2008-06-18 Thread Eli Collins
Hi Martin, This lockup is fixed in the latest dot releases of Workstation, Player, and Server. The vmmon module now checks if VT is already enabled (actually it just tests if CR4.VMXE is set since checking if the cpu is in VMX mode is a pain). The vmmon module enables VMX mode when world

[PATCH] bios: Makefile ACPI DSDT generation

2008-06-18 Thread Alex Williamson
Hi Avi, This builds on your preprocessor work for cleaning up the DSDT and makes it trivially easy to change the CPU and PCI hotplug slot count. I'm thinking about splitting a few SSDTs out of the monolithic DSDT, and generating some of the code at compile time should make that easier. This

Re: [kvm-devel] performance with guests running 2.4 kernels (specifically RHEL3)

2008-06-18 Thread David S. Ahern
Avi: We did not get a chance to do this at the Forum. I'd be interested in whatever options you have for reducing the scan time further (e.g., try to get scan time down to 1-2 seconds). thanks, david Avi Kivity wrote: David S. Ahern wrote: I gave a shot at implementing your suggestion, but

Re: [PATCH] bios: Makefile ACPI DSDT generation

2008-06-18 Thread Marcelo Tosatti
On Wed, Jun 18, 2008 at 09:29:22PM -0600, Alex Williamson wrote: Hi Avi, This builds on your preprocessor work for cleaning up the DSDT and makes it trivially easy to change the CPU and PCI hotplug slot count. I'm thinking about splitting a few SSDTs out of the monolithic DSDT, and