[PATCH] KVM: PCIPT: VT-d support

2008-07-10 Thread Ben-Ami Yassour
From: Kay, Allen M [EMAIL PROTECTED] This patch includes the functions to support VT-d for passthrough devices. [Ben: fixed memory pinning] Signed-off-by: Kay, Allen M [EMAIL PROTECTED] Signed-off-by: Weidong Han [EMAIL PROTECTED] Signed-off-by: Ben-Ami Yassour [EMAIL PROTECTED] ---

[PATCH] VT-d : changes to support KVM

2008-07-10 Thread Ben-Ami Yassour
From: Kay, Allen M [EMAIL PROTECTED] This patch extends the VT-d driver to support KVM [Ben: fixed memory pinning] Signed-off-by: Kay, Allen M [EMAIL PROTECTED] Signed-off-by: Weidong Han [EMAIL PROTECTED] Signed-off-by: Ben-Ami Yassour [EMAIL PROTECTED] --- drivers/pci/dmar.c

Re: [Qemu-devel] [RFC][PATCH] Add HPET emulation to qemu

2008-07-10 Thread Samuel Thibault
Cool! Does it now happen that qemu no longer wakes up every 10ms? If not, please try to make sure it happens, that would eventually fix that power leak :) Samuel -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to [EMAIL PROTECTED] More majordomo info at

Re: [PATCH] KVM: PCIPT: VT-d support

2008-07-10 Thread Ben-Ami Yassour
On Wed, 2008-07-09 at 10:49 -0500, Anthony Liguori wrote: Ben-Ami Yassour wrote: From: Kay, Allen M [EMAIL PROTECTED] This patch includes the functions to support VT-d for passthrough devices. [Ben: fixed memory pinning] Signed-off-by: Kay, Allen M [EMAIL PROTECTED]

Re: KSM Algorithm

2008-07-10 Thread Izik Eidus
ציטוט Sukanto Ghosh: Can anyone answer these queries regarding KSM ? How does KSM offers its services through the /dev/ksm device ? ioctls Are every guest pages scanned in KVM while using KSM or page-scanning and sharing is triggered on some event (low memory, etc) ? no, the scanning

Re: [PATCH] KVM: PCIPT: VT-d support

2008-07-10 Thread Yang, Sheng
On Thursday 10 July 2008 17:14:42 Ben-Ami Yassour wrote: From: Kay, Allen M [EMAIL PROTECTED] This patch includes the functions to support VT-d for passthrough devices. [Ben: fixed memory pinning] Signed-off-by: Kay, Allen M [EMAIL PROTECTED] Signed-off-by: Weidong Han [EMAIL PROTECTED]

Re: [PATCH] KVM: PCIPT: VT-d support

2008-07-10 Thread Yang, Sheng
On Thursday 10 July 2008 17:51:53 Ben-Ami Yassour wrote: On Thu, 2008-07-10 at 17:30 +0800, Yang, Sheng wrote: On Thursday 10 July 2008 17:14:42 Ben-Ami Yassour wrote: From: Kay, Allen M [EMAIL PROTECTED] This patch includes the functions to support VT-d for passthrough devices.

Re: [PATCH 2/5] kvmtrace: make cycle calculation architecture aware

2008-07-10 Thread Yang, Sheng
On Wednesday 09 July 2008 23:03:19 Hollis Blanchard wrote: On Wed, 2008-07-09 at 11:17 +0200, Christian Ehrhardt wrote: So the question that is left before changing that is, if the original author had something special in mind chosing cycles here. I added Eric on CC for that. I wait

[PATCH 7/9] kvm-userspace: kvmtrace_format: add ppc instruction emulation

2008-07-10 Thread ehrhardt
From: Christian Ehrhardt [EMAIL PROTECTED] This patch adds the handling of the ppc instruction emulation trace records. Due to the fact that those are more complex than the classic formats file way this patch adds a check of the event id and maps to the internal handler function if needed (other

[PATCH 0/5] kvmtrace: powerpc support and timestamps for KVM_TRACE

2008-07-10 Thread ehrhardt
From: Christian Ehrhardt [EMAIL PROTECTED] Chaning kvmtrace code to use timestamp and add powerpc support. This is the revised series including the feedback from the earlier submission this week. I now also added the userspace changes which completes the series. The series contains nine patches

[PATCH 1/9] kvmtrace: Remove use of bit fields in kvm trace structure v3

2008-07-10 Thread ehrhardt
From: Christian Ehrhardt [EMAIL PROTECTED] From: Jerone Young [EMAIL PROTECTED] This patch fixes kvmtrace use on big endian systems. When using bit fields the compiler will lay data out in the wrong order expected when laid down into a file. This fixes it by using one variable instead of using

[PATCH 8/9] kvm-userspace: kvmtrace_format: add statistic section

2008-07-10 Thread ehrhardt
From: Christian Ehrhardt [EMAIL PROTECTED] Usually people don't want to read thousands of trace log lines to interpret the data, a condensed statistic about the traced events is usually better to read. This patch adds a new command line switch -s that tells kvmtrace_format to generate statistics

Re: KSM Algorithm

2008-07-10 Thread Sukanto Ghosh
Doesn't KSM notifies KVM about the shared pages so that KVM can update its sptes accordingly or is it done by KSM itself ? when using kvm, mmu notifiers is a must for ksm, (mmu notifiers update kvm about the changes in the host page table) What about KSM being used by someone other than

Re: KSM Algorithm

2008-07-10 Thread Izik Eidus
ציטוט Sukanto Ghosh: Doesn't KSM notifies KVM about the shared pages so that KVM can update its sptes accordingly or is it done by KSM itself ? when using kvm, mmu notifiers is a must for ksm, (mmu notifiers update kvm about the changes in the host page table) What about KSM

Re: KSM Algorithm

2008-07-10 Thread Sukanto Ghosh
got it. thanks On Fri, Jul 11, 2008 at 12:50 AM, Izik Eidus [EMAIL PROTECTED] wrote: ציטוט Sukanto Ghosh: Doesn't KSM notifies KVM about the shared pages so that KVM can update its sptes accordingly or is it done by KSM itself ? when using kvm, mmu notifiers is a must for ksm, (mmu

Re: [PATCH] mask out clflush

2008-07-10 Thread Anthony Liguori
Yang, Sheng wrote: On Wednesday 09 July 2008 02:29:44 Glauber Costa wrote: clflush is a non-privileged instruction that flushes the cacheline given by its parameter, in terms of linear address. As it is non-privileged, it is quite tricky, because a guest doing clflush will actually be trying

Re: [PATCH 2/5] kvmtrace: make cycle calculation architecture aware

2008-07-10 Thread Avi Kivity
Yang, Sheng wrote: On Wednesday 09 July 2008 23:03:19 Hollis Blanchard wrote: On Wed, 2008-07-09 at 11:17 +0200, Christian Ehrhardt wrote: So the question that is left before changing that is, if the original author had something special in mind chosing cycles here. I added Eric on CC

Re: [PATCH] mask out clflush

2008-07-10 Thread Avi Kivity
Anthony Liguori wrote: Yang, Sheng wrote: On Wednesday 09 July 2008 02:29:44 Glauber Costa wrote: clflush is a non-privileged instruction that flushes the cacheline given by its parameter, in terms of linear address. As it is non-privileged, it is quite tricky, because a guest doing clflush

Re: KSM Algorithm

2008-07-10 Thread Sukanto Ghosh
One more query, what if multiple processes call ioctl KSM_CREATE_SCAN ? Will there be multiple scanners ? Consider a scenario where two processes A B separately call KSM_CREATE_SCAN and then start registering some memory pages/areas via KSM_CREATE_SHARED_MEMORY_AREA ioctl. Lets say A registers 4

Re: KSM Algorithm

2008-07-10 Thread Izik Eidus
ציטוט Sukanto Ghosh: One more query, what if multiple processes call ioctl KSM_CREATE_SCAN ? Will there be multiple scanners ? yes Consider a scenario where two processes A B separately call KSM_CREATE_SCAN and then start registering some memory pages/areas via

Re: [PATCH] Ignore DEBUGCTL MSRs

2008-07-10 Thread Avi Kivity
Alexander Graf wrote: Avi Kivity wrote: Alexander Graf wrote: Netware writes and reads to the DEBUGCTL and LAST*IP MSRs without further checks and is really confused to receive a #GP during that. To make it happy we should just make them stubs, which is exactly what SVM already does. To

Re: [PATCH] mask out clflush

2008-07-10 Thread Avi Kivity
Anthony Liguori wrote: It's equivalent to a read from a VT perspective so if the read would trap, the clflush instruction will trap. Reads don't normally go through the emulator. Is the guest clflush()ing mmio addresses? Strange as these are not normally cached. -- error compiling

Re: [PATCH] mask out clflush

2008-07-10 Thread Avi Kivity
Glauber Costa wrote: clflush is a non-privileged instruction that flushes the cacheline given by its parameter, in terms of linear address. As it is non-privileged, it is quite tricky, because a guest doing clflush will actually be trying to flush a host kernel address. We need to allow

Re: [PATCH] mask out clflush

2008-07-10 Thread Anthony Liguori
Avi Kivity wrote: Anthony Liguori wrote: It's equivalent to a read from a VT perspective so if the read would trap, the clflush instruction will trap. Reads don't normally go through the emulator. Is the guest clflush()ing mmio addresses? Strange as these are not normally cached. It

Re: [PATCH] Add HPET support to BIOS

2008-07-10 Thread Ryan Harper
* Elizabeth Kon [EMAIL PROTECTED] [2008-07-09 23:07]: This patch, written by Ryan Harper, adds HPET support to BIOS. Based on hpet changes to Xen's hvm firmware/rombios. Signed-off-by: Beth Kon [EMAIL PROTECTED] Signed-off-by: Ryan Harper [EMAIL PROTECTED] -- Ryan Harper Software Engineer;

[ kvm-Bugs-2009439 ] data corruption with virtio-blk

2008-07-10 Thread SourceForge.net
Bugs item #2009439, was opened at 2008-07-03 06:51 Message generated for change (Settings changed) made by markmc You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2009439group_id=180599 Please note that this message will contain a full copy of the comment

Re: [PATCH] KVM: PCIPT: VT-d support

2008-07-10 Thread Muli Ben-Yehuda
On Thu, Jul 10, 2008 at 06:07:27PM +0800, Yang, Sheng wrote: I think it's may be unnecessary to map pages when device assigned. The table can be set up along with set_memory_region(), it covered all memory slots already, or I miss something here? VT-d is only initialized after the slots are

Re: KVM: MMU: nuke shadowed pgtable pages and pte's on memslot destruction

2008-07-10 Thread Avi Kivity
Marcelo Tosatti wrote: On Mon, Jul 07, 2008 at 02:31:55PM -0300, Marcelo Tosatti wrote: On Sun, Jul 06, 2008 at 12:15:56AM +0300, Avi Kivity wrote: Marcelo Tosatti wrote: On Sat, Jul 05, 2008 at 08:25:30PM +0300, Avi Kivity wrote: @@ -1955,6 +1955,22 @@ void

Re: [PATCH] mask out clflush

2008-07-10 Thread Glauber Costa
On Thu, Jul 10, 2008 at 11:20 AM, Anthony Liguori [EMAIL PROTECTED] wrote: Avi Kivity wrote: Anthony Liguori wrote: It's equivalent to a read from a VT perspective so if the read would trap, the clflush instruction will trap. Reads don't normally go through the emulator. Is the guest

Re: [PATCH] mask out clflush

2008-07-10 Thread Avi Kivity
Glauber Costa wrote: On Thu, Jul 10, 2008 at 11:20 AM, Anthony Liguori [EMAIL PROTECTED] wrote: Avi Kivity wrote: Anthony Liguori wrote: It's equivalent to a read from a VT perspective so if the read would trap, the clflush instruction will trap. Reads don't normally

Re: [PATCH 0/7][RFC] Enable kvm/ia-64 to build kvm components in userspace.

2008-07-10 Thread Avi Kivity
Zhang, Xiantao wrote: I agree that for automatic testing it's more of a burden; but it needs to be done, especially as some kvm features are only enabled on newer kernels. The external module is convenient, but it's not a substitute for the real thing. So, I have a question here, When

Re: [PATCH] KVM: PCIPT: VT-d support

2008-07-10 Thread Avi Kivity
Muli Ben-Yehuda wrote: On Thu, Jul 10, 2008 at 06:07:27PM +0800, Yang, Sheng wrote: I think it's may be unnecessary to map pages when device assigned. The table can be set up along with set_memory_region(), it covered all memory slots already, or I miss something here? VT-d is only

Re: [PATCH] mask out clflush

2008-07-10 Thread Anthony Liguori
Avi Kivity wrote: Glauber Costa wrote: On Thu, Jul 10, 2008 at 11:20 AM, Anthony Liguori [EMAIL PROTECTED] wrote: Avi Kivity wrote: Anthony Liguori wrote: It's equivalent to a read from a VT perspective so if the read would trap, the clflush instruction will trap. Reads

Re: [PATCH] mask out clflush

2008-07-10 Thread Avi Kivity
Anthony Liguori wrote: yes. It is address 0xc8821000, apparently part of a pci controller initialization. qemu pci starts at 0xe000 IIRC. So maybe the guest is flushing random addresses just to be annoying. That's a virtual address, not a physical address IIUC. Ah, of course.

Re: [PATCH] Add HPET support to BIOS

2008-07-10 Thread Sebastian Herbszt
Beth Kon wrote: This patch, written by Ryan Harper, adds HPET support to BIOS. Signed-off-by: Beth Kon [EMAIL PROTECTED] diff --git a/bios/Makefile b/bios/Makefile index 48022ea..3e73fb5 100644 --- a/bios/Makefile +++ b/bios/Makefile @@ -40,7 +40,7 @@ LIBS = -lm RANLIB = ranlib BCC = bcc

Re: [Regression] kvm-userspace: VM freezes after booting FreeDOS

2008-07-10 Thread Mohammed Gamal
On Thu, Jul 10, 2008 at 6:47 PM, Mohammed Gamal [EMAIL PROTECTED] wrote: After updating my kvm-userspace tree to the latest git tree. I am no more able to run FreeDOS. The VM freezes after choosing any of the boot options. I am running both latest kvm.git and kvm-userspace.git Forgot to

Re: [PATCH] Add HPET support to BIOS

2008-07-10 Thread Ryan Harper
* Sebastian Herbszt [EMAIL PROTECTED] [2008-07-10 10:46]: Hey Sebastian, Thanks for the review, Beth Kon wrote: This patch, written by Ryan Harper, adds HPET support to BIOS. Signed-off-by: Beth Kon [EMAIL PROTECTED] diff --git a/bios/Makefile b/bios/Makefile index 48022ea..3e73fb5

Re: [PATCH] Add HPET support to BIOS

2008-07-10 Thread Sebastian Herbszt
Ryan Harper wrote: Hey Sebastian, Thanks for the review, Beth Kon wrote: This patch, written by Ryan Harper, adds HPET support to BIOS. Signed-off-by: Beth Kon [EMAIL PROTECTED] diff --git a/bios/Makefile b/bios/Makefile index 48022ea..3e73fb5 100644 --- a/bios/Makefile +++

Re: [Regression] kvm-userspace: VM freezes after booting FreeDOS

2008-07-10 Thread Anthony Liguori
Mohammed Gamal wrote: On Thu, Jul 10, 2008 at 7:31 PM, Anthony Liguori [EMAIL PROTECTED] wrote: Mohammed Gamal wrote: After updating my kvm-userspace tree to the latest git tree. I am no more able to run FreeDOS. The VM freezes after choosing any of the boot options. I am running both

Re: [PATCH] mask out clflush

2008-07-10 Thread Glauber Costa
On Thu, Jul 10, 2008 at 12:39 PM, Avi Kivity [EMAIL PROTECTED] wrote: Anthony Liguori wrote: yes. It is address 0xc8821000, apparently part of a pci controller initialization. qemu pci starts at 0xe000 IIRC. So maybe the guest is flushing random addresses just to be annoying. That's

Re: patch: qemu + hugetlbfs..

2008-07-10 Thread john cooper
Anthony Liguori wrote: +#include asm/param.h I don't think this is necessary anymore. Depending on a Linux headers breaks the QEMU build on other unices so it's a bad thing. It is no longer required, but see below. hpage is a misnomer too as we aren't actually dependent on huge pages

Re: Live migration without SDL

2008-07-10 Thread Brian Jackson
You can get to the monitor the same way in vnc as you do with the sdl gui. You can also have the monitor connected to a socket or network port. See the qemu docs for more info. On Thursday 10 July 2008 3:51:44 pm Ty! Boyack wrote: Folks, I'm afraid I'm missing something very basic here.

Re: patch: qemu + hugetlbfs..

2008-07-10 Thread Anthony Liguori
john cooper wrote: Anthony Liguori wrote: john cooper wrote: As it currently exists alloc_hpage_mem() is tied to the notion of huge page allocation as it will reference gethugepagesize() irrespective of *mem_path. So even in the case of tmpfs backed files, if the host kernel has been

Re: Live migration without SDL

2008-07-10 Thread David Mair
Ty! Boyack wrote: Folks, I'm afraid I'm missing something very basic here. I'm looking to try out the live migration facility, and all the documentation I'm seeing shows to initiate the migration by going to the qemu monitor from the SDL windows (alt-ctrl-2). However, I'd like to run my

Re: [Regression] kvm-userspace: VM freezes after booting FreeDOS

2008-07-10 Thread Mohammed Gamal
On Fri, Jul 11, 2008 at 12:22 AM, Jan Kiszka [EMAIL PROTECTED] wrote: Mohammed Gamal wrote: On Thu, Jul 10, 2008 at 11:02 PM, Anthony Liguori [EMAIL PROTECTED] wrote: Mohammed Gamal wrote: On Thu, Jul 10, 2008 at 7:31 PM, Anthony Liguori [EMAIL PROTECTED] wrote: Mohammed Gamal wrote:

Re: KVM: MMU: nuke shadowed pgtable pages and pte's on memslot destruction

2008-07-10 Thread Marcelo Tosatti
KVM: MMU: improve invalid shadow root page handling Harden kvm_mmu_zap_page() against invalid root pages that had been shadowed from memslots that are gone. Signed-off-by: Marcelo Tosatti [EMAIL PROTECTED] diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c index ff7cf63..7f57da6 100644 ---

RE: [PATCH 0/7][RFC] Enable kvm/ia-64 to build kvm components in userspace.

2008-07-10 Thread Zhang, Xiantao
Avi Kivity wrote: Zhang, Xiantao wrote: I agree that for automatic testing it's more of a burden; but it needs to be done, especially as some kvm features are only enabled on newer kernels. The external module is convenient, but it's not a substitute for the real thing. So, I have

Re: [PATCH 2/5] kvmtrace: make cycle calculation architecture aware

2008-07-10 Thread Yang, Sheng
On Thursday 10 July 2008 21:32:29 Avi Kivity wrote: Yang, Sheng wrote: On Wednesday 09 July 2008 23:03:19 Hollis Blanchard wrote: On Wed, 2008-07-09 at 11:17 +0200, Christian Ehrhardt wrote: So the question that is left before changing that is, if the original author had something special

KVM Test result, kernel cc453ce.., userspace 6787f5a.. -- One Issue Fixed

2008-07-10 Thread Xu, Jiajun
Hi All, This is today's KVM test result against kvm.git cc453ceef31019dcddff453d35a608ca2c659fec and kvm-userspace.git 6787f5a048c17e4ec4eb7858804795888449cd96. One Issue Fixed: 1. vista auto-unattended installation failed on kvm guests

[PATCH 03/04] KVM: external module: Allow non-x86 archs to build in userspace.

2008-07-10 Thread Zhang, Xiantao
From 989c9551664988535608bb4051e654ffe5e5ddb0 Mon Sep 17 00:00:00 2001 From: Xiantao Zhang [EMAIL PROTECTED] Date: Wed, 2 Jul 2008 17:04:19 +0800 Subject: [PATCH] KVM: external module: Allow non-x86 archs to build in userspace. This patch targets for allowing kvm/ia64 to build in userspace. For

[PATCH 04/04] KVM: userspace: Enable rpm build for kvm/ia64

2008-07-10 Thread Zhang, Xiantao
From ce37b613776ea71ed2c75c8302985aecb5e6799f Mon Sep 17 00:00:00 2001 From: Xiantao Zhang [EMAIL PROTECTED] Date: Fri, 11 Jul 2008 13:13:52 +0800 Subject: [PATCH] KVM: userspace: Enable rpm build for kvm/ia64 Enable make rpm for kvm/ia64. Signed-off-by: Xiantao Zhang [EMAIL PROTECTED] ---