[PATCH] kvm: Fix kvm startup script

2008-08-13 Thread Avi Kivity
From: Sheng Yang [EMAIL PROTECTED] Signed-off-by: Sheng Yang [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] diff --git a/kvm b/kvm index 2a7dc85..cb9ecf8 100755 --- a/kvm +++ b/kvm @@ -18,6 +18,14 @@ config = ShellConfigParser() config.read('config.mak') external_module =

[PATCH] kvm: qemu: Remove virtio_net tx ring-full heuristic

2008-08-13 Thread Avi Kivity
From: Mark McLoughlin [EMAIL PROTECTED] virtio_net tries to guess when it has received a tx notification from the guest whether it indicates that the guest has no more room in the tx ring and it should immediately flush the queued buffers. The heuristic is based on the fact that there are 128

[PATCH] kvm: qemu: Fix virtio_net tx timer

2008-08-13 Thread Avi Kivity
From: Mark McLoughlin [EMAIL PROTECTED] The current virtio_net tx timer is 2ns, which doesn't make any sense. Set it to a more reasonable 250us instead. However, even though we were requesting a 2ns tx timer, it was actually getting limited to MIN_TIMER_REARM_US which is currently 250us. So,

[PATCH] kvm: qemu: Add VIRTIO_F_NOTIFY_ON_EMPTY

2008-08-13 Thread Avi Kivity
From: Mark McLoughlin [EMAIL PROTECTED] Set the VIRTIO_F_NOTIFY_ON_EMPTY feature bit so the guest can rely on us notifying them when the queue is empty. Also, only notify when the available queue is empty *and* when we've finished with all the buffers we had detached. Right now, when the queue

[PATCH] kvm: qemu: Disable recv notifications until avail buffers exhausted

2008-08-13 Thread Avi Kivity
From: Mark McLoughlin [EMAIL PROTECTED] Once we know we have buffers available on the receive ring, we can safely disable notifications. Signed-off-by: Mark McLoughlin [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] diff --git a/qemu/hw/virtio-net.c b/qemu/hw/virtio-net.c index

[PATCH] kvm: qemu: Move some code around for the next commit

2008-08-13 Thread Avi Kivity
From: Mark McLoughlin [EMAIL PROTECTED] Signed-off-by: Mark McLoughlin [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] diff --git a/qemu/vl.c b/qemu/vl.c index 126944d..f5aacf0 100644 --- a/qemu/vl.c +++ b/qemu/vl.c @@ -4369,19 +4369,6 @@ typedef struct TAPState { unsigned int

[PATCH] KVM: VMX: Clean up magic number 0x66 in init_rmode_tss

2008-08-13 Thread Avi Kivity
From: Sheng Yang [EMAIL PROTECTED] Signed-off-by: Sheng Yang [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index c4510fe..337670b 100644 --- a/arch/x86/kvm/vmx.c +++ b/arch/x86/kvm/vmx.c @@ -1732,7 +1732,8 @@ static int

[PATCH] KVM: remove unused field from the assigned dev struct

2008-08-13 Thread Avi Kivity
From: Ben-Ami Yassour [EMAIL PROTECTED] Remove unused field: struct kvm_assigned_pci_dev assigned_dev from struct: struct kvm_assigned_dev_kernel Signed-off-by: Ben-Ami Yassour [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] diff --git a/include/asm-x86/kvm_host.h

[PATCH] KVM: set debug registers after schedulable section

2008-08-13 Thread Avi Kivity
From: Marcelo Tosatti [EMAIL PROTECTED] The vcpu thread can be preempted after the guest_debug_pre() callback, resulting in invalid debug registers on the new vcpu. Move it inside the non-preemptable section. Signed-off-by: Marcelo Tosatti [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL

[PATCH] kvm: configure: fix qemu options with multiple arguments

2008-08-13 Thread Avi Kivity
From: Avi Kivity [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] diff --git a/configure b/configure index 72337c9..3bb10ce 100755 --- a/configure +++ b/configure @@ -8,7 +8,7 @@ objcopy=objcopy want_module=1 qemu_cflags= qemu_ldflags= -qemu_opts= +qemu_opts=() cross_prefix=

[PATCH] kvm: qemu: use proper open call for init file

2008-08-13 Thread Avi Kivity
From: Philippe Gerum [EMAIL PROTECTED] This patch fixes misspelled calls to qemu_fopen_file(). Signed-off-by: Philippe Gerum [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] diff --git a/qemu/hw/ds1225y.c b/qemu/hw/ds1225y.c index 3b91b4f..b1d0284 100644 --- a/qemu/hw/ds1225y.c +++

[ kvm-Bugs-2042889 ] guest: device offline, then kernel panic

2008-08-13 Thread SourceForge.net
Bugs item #2042889, was opened at 2008-08-08 13:16 Message generated for change (Comment added) made by ravpl You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2042889group_id=180599 Please note that this message will contain a full copy of the comment

[PATCH] kvm: Fix kvm startup script

2008-08-13 Thread Yang, Sheng
From 4993375c0d67fd5eb47891dee48300880aceff1e Mon Sep 17 00:00:00 2001 From: Sheng Yang [EMAIL PROTECTED] Date: Wed, 13 Aug 2008 15:39:29 +0800 Subject: [PATCH] kvm: Fix kvm startup script Signed-off-by: Sheng Yang [EMAIL PROTECTED] --- kvm | 16 +--- 1 files changed, 13

[PATCH 1/2] KVM: trace: Add event mask support

2008-08-13 Thread Yang, Sheng
From bb7cc3fd1e549d38d6bda10a06feda9339de9d3e Mon Sep 17 00:00:00 2001 From: Sheng Yang [EMAIL PROTECTED] Date: Wed, 13 Aug 2008 14:29:43 +0800 Subject: [PATCH] KVM: trace: Add event mask support Allow user space application to specify one or morefilter masks to limit the events being captured

Re: [PATCH 1/2] KVM: trace: Add event mask support

2008-08-13 Thread Avi Kivity
Yang, Sheng wrote: From bb7cc3fd1e549d38d6bda10a06feda9339de9d3e Mon Sep 17 00:00:00 2001 From: Sheng Yang [EMAIL PROTECTED] Date: Wed, 13 Aug 2008 14:29:43 +0800 Subject: [PATCH] KVM: trace: Add event mask support Allow user space application to specify one or morefilter masks to limit the

Re: [PATCH] kvm: Fix kvm startup script

2008-08-13 Thread Avi Kivity
Yang, Sheng wrote: From 4993375c0d67fd5eb47891dee48300880aceff1e Mon Sep 17 00:00:00 2001 From: Sheng Yang [EMAIL PROTECTED] Date: Wed, 13 Aug 2008 15:39:29 +0800 Subject: [PATCH] kvm: Fix kvm startup script Applied, thanks. -- error compiling committee.c: too many arguments to function

Re: [PATCH 1/2] KVM: trace: Add event mask support

2008-08-13 Thread Yang, Sheng
On Wednesday 13 August 2008 16:04:59 Avi Kivity wrote: Yang, Sheng wrote: From bb7cc3fd1e549d38d6bda10a06feda9339de9d3e Mon Sep 17 00:00:00 2001 From: Sheng Yang [EMAIL PROTECTED] Date: Wed, 13 Aug 2008 14:29:43 +0800 Subject: [PATCH] KVM: trace: Add event mask support Allow user

Re: [PATCH 3/4] Fix dependencies to run dyngen early enough

2008-08-13 Thread Avi Kivity
Philippe Gerum wrote: Add dependency to get dyngen-opc.h generated prior to compiling qemu/exec.c. qemu-devel material as well. -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to

Re: [PATCH 4/4] Fix --disable-kvm build

2008-08-13 Thread Avi Kivity
Philippe Gerum wrote: static void vga_map(PCIDevice *pci_dev, int region_num, uint32_t addr, uint32_t size, int type) diff --git a/qemu/qemu-kvm.h b/qemu/qemu-kvm.h index 7e28428..9ba81a3 100644 --- a/qemu/qemu-kvm.h +++ b/qemu/qemu-kvm.h @@ -114,6 +114,10 @@ extern

Re: [REGRESSION?] -no-kvm-irqchip broken with kvm.git

2008-08-13 Thread Jan Kiszka
Avi Kivity wrote: Jan Kiszka wrote: I thought I tested out -no-kvm-irqchip, but apprently not well enough. I'll try to see what went wrong. Should this issue have been fixed meanwhile? I just gave latest git a try and - as far as I recall my tests before holiday correctly - things

Re: [PATCH 2/4] Provide dummy cpu_vendor_string

2008-08-13 Thread Avi Kivity
Philippe Gerum wrote: This patch defines cpu_vendor_string for linux-user builds. Applied, thanks. -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to [EMAIL PROTECTED] More majordomo

[PATCH 1/1] Fix --disable-kvm build

2008-08-13 Thread Philippe Gerum
Avi Kivity wrote: Philippe Gerum wrote: static void vga_map(PCIDevice *pci_dev, int region_num, uint32_t addr, uint32_t size, int type) diff --git a/qemu/qemu-kvm.h b/qemu/qemu-kvm.h index 7e28428..9ba81a3 100644 --- a/qemu/qemu-kvm.h +++ b/qemu/qemu-kvm.h @@ -114,6

[ kvm-Bugs-2042889 ] guest: device offline, then kernel panic

2008-08-13 Thread SourceForge.net
Bugs item #2042889, was opened at 2008-08-08 13:16 Message generated for change (Comment added) made by ravpl You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2042889group_id=180599 Please note that this message will contain a full copy of the comment

Re: [PATCH 1/1] KVM: remove unused field from the assigned dev struct

2008-08-13 Thread Avi Kivity
Ben-Ami Yassour wrote: Remove unused field: struct kvm_assigned_pci_dev assigned_dev from struct: struct kvm_assigned_dev_kernel Applied, thanks. -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a

Re: [PATCH 1/2] VT-d: changes to support KVM

2008-08-13 Thread Yang, Sheng
On Thursday 07 August 2008 22:14:46 Ben-Ami Yassour wrote: From: Kay, Allen M [EMAIL PROTECTED] This patch extends the VT-d driver to support KVM Seems OK to me. Avi, is this patch good enough to send to PCI guys to have a review? -- regards Yang, Sheng [Ben: fixed memory pinning]

Re: [PATCH 1/2] VT-d: changes to support KVM

2008-08-13 Thread Avi Kivity
Yang, Sheng wrote: On Thursday 07 August 2008 22:14:46 Ben-Ami Yassour wrote: From: Kay, Allen M [EMAIL PROTECTED] This patch extends the VT-d driver to support KVM Seems OK to me. Avi, is this patch good enough to send to PCI guys to have a review? I think so. There are some

Re: [PATCH 2/2] KVM: Device assignemnt with VT-d

2008-08-13 Thread Yang, Sheng
On Thursday 07 August 2008 22:14:47 Ben-Ami Yassour wrote: Based on a patch by: Kay, Allen M [EMAIL PROTECTED] This patch enables pci device assignment based on VT-d support. When a device is assigned to the guest, the guest memory is pinned and the mapping is updated in the VT-d IOMMU. I

Re: [PATCH 2/2] KVM: Device assignemnt with VT-d

2008-08-13 Thread Avi Kivity
Yang, Sheng wrote: On Thursday 07 August 2008 22:14:47 Ben-Ami Yassour wrote: Based on a patch by: Kay, Allen M [EMAIL PROTECTED] This patch enables pci device assignment based on VT-d support. When a device is assigned to the guest, the guest memory is pinned and the mapping is updated in

Re: [Xen-devel] Re: Announcing: Open OVF project source code availibility

2008-08-13 Thread Ian Jackson
Daniel P. Berrange writes ([Xen-devel] Re: Announcing: Open OVF project source code availibility): Building an XML-RPC interface just to call into functions for manipulating OVF files is rather overkill. Also it is far from clear whether merely changing the concrete representation of the

Re: [PATCH 2/2] KVM: Device assignemnt with VT-d

2008-08-13 Thread Yang, Sheng
On Wednesday 13 August 2008 17:46:03 Avi Kivity wrote: Yang, Sheng wrote: On Thursday 07 August 2008 22:14:47 Ben-Ami Yassour wrote: Based on a patch by: Kay, Allen M [EMAIL PROTECTED] This patch enables pci device assignment based on VT-d support. When a device is assigned to the

Re: [patch 0/2] do not run halted vcpu's

2008-08-13 Thread Avi Kivity
Marcelo Tosatti wrote: Avi Kivity wrote: Any reason this is not in __vcpu_run()? Our main loop could look like while (no reason to stop) if (runnable) enter guest else block deal with aftermath kvm_emulate_halt would then simply modify the mp

Re: [patch 1/2] KVM: x86: set debug registers after schedulable section

2008-08-13 Thread Avi Kivity
Marcelo Tosatti wrote: The vcpu thread can be preempted after the guest_debug_pre() callback, resulting in invalid debug registers on the new vcpu. Move it inside the non-preemptable section. Applied, thanks. -- error compiling committee.c: too many arguments to function -- To

Re: [patch 2/2] KVM: x86: do not execute halted vcpus (v2)

2008-08-13 Thread Avi Kivity
Avi Kivity wrote: Marcelo Tosatti wrote: Offline or uninitialized vcpu's can be executed if requested to perform userspace work. Follow Avi's suggestion to handle halted vcpu's in the main loop, simplifying kvm_emulate_halt(). Introduce a new vcpu-requests bit to indicate events that promote

Re: [PATCH 5/9] substitute is_allocated_mem with more general is_containing_region

2008-08-13 Thread Avi Kivity
Glauber Costa wrote: Signed-off-by: Glauber Costa [EMAIL PROTECTED] --- libkvm/libkvm.c | 34 +- libkvm/libkvm.h |2 +- qemu/qemu-kvm.c |2 +- 3 files changed, 23 insertions(+), 15 deletions(-) diff --git a/libkvm/libkvm.c b/libkvm/libkvm.c index

Re: [RFC 0/9] Memory registration rework

2008-08-13 Thread Avi Kivity
Glauber Costa wrote: Hi folks, The following series contain a proposal for our memory registration framework. This is by no means complete, and rather, a first step only. This first step, btw, has the goal of taking the kvm-specific memory registration functions from all over the code, so we

Re: [PATCH 5/9] substitute is_allocated_mem with more general is_containing_region

2008-08-13 Thread Glauber Costa
On Wed, Aug 13, 2008 at 8:41 AM, Avi Kivity [EMAIL PROTECTED] wrote: Glauber Costa wrote: Signed-off-by: Glauber Costa [EMAIL PROTECTED] --- libkvm/libkvm.c | 34 +- libkvm/libkvm.h |2 +- qemu/qemu-kvm.c |2 +- 3 files changed, 23 insertions(+),

[PATCH] KVM: Device assignment: Check for privileges before assigning irq

2008-08-13 Thread Amit Shah
Even though we don't share irqs at the moment, we should ensure regular user processes don't try to allocate system resources. We check for capability to access IO devices (CAP_SYS_RAWIO) before we request_irq on behalf of the guest. Noticed by Avi. Signed-off-by: Amit Shah [EMAIL PROTECTED]

Re: [PATCH 6/9] move kvm_cpu_register_memory_area into qemu's

2008-08-13 Thread Anthony Liguori
Glauber Costa wrote: Turn the explicit calls to kvm_cpu_register_memoy_area() an empty function. Provide a __kvm_cpu_register_memory_area() that is called from within cpu_register_memory_area(). To avoid registering mmio regions to the hypervisor, since we depend on them faulting, we keep track

Re: [PATCH 1/4] Use proper open call for init file

2008-08-13 Thread Anthony Liguori
Avi Kivity wrote: Philippe Gerum wrote: This patch fixes misspelled calls to qemu_fopen_file(). Please send to qemu-devel as this is a generic qemu issue, not kvm specific. qemu_fopen_file() only exists in KVM (it's one of the live migration changes). Regards, Anthony Liguori --

Re: [PATCH 1/1] kvm: qemu: Handle tap fds with IFF_VNET_HDR

2008-08-13 Thread Avi Kivity
Mark McLoughlin wrote: Okay, I've just sent a patch to add TUNGETIFF: http://marc.info/?l=linux-netdevm=121863813904363 See below patch for how we'd use it. Don't apply this until the kernel patch is accepted, obviously. Please repost once that's in. The -help string is what libvirt

Re: [PATCH 1/1] kvm: qemu: Handle tap fds with IFF_VNET_HDR

2008-08-13 Thread Daniel P. Berrange
On Wed, Aug 13, 2008 at 07:24:30PM +0300, Avi Kivity wrote: Mark McLoughlin wrote: Okay, I've just sent a patch to add TUNGETIFF: http://marc.info/?l=linux-netdevm=121863813904363 See below patch for how we'd use it. Don't apply this until the kernel patch is accepted, obviously.

KVM Guest detection

2008-08-13 Thread jd
Hi Is there a way to detect if a particular machine is a VM running on KVM hypervisor or not. i.e from within a guest can one figure out if it is running on top of a hypervisor and not physical machine ? [For both Linux guests and Windows guests ] /Jd -- To unsubscribe from this

Re: KVM Guest detection

2008-08-13 Thread Anthony Liguori
jd wrote: Hi Is there a way to detect if a particular machine is a VM running on KVM hypervisor or not. i.e from within a guest can one figure out if it is running on top of a hypervisor and not physical machine ? [For both Linux guests and Windows guests ] The preferred way of doing

Re: SR-IOV: patches are available for Linux kernel [4/4]

2008-08-13 Thread Randy Dunlap
On Tue, 12 Aug 2008 16:46:39 +0800 Zhao, Yu wrote: [PATCH 4/4] PCI: document SR-IOV SR-IOV Documentation. Signed-off-by: Yu Zhao [EMAIL PROTECTED] Signed-off-by: Eddie Dong [EMAIL PROTECTED] --- Documentation/ABI/testing/sysfs-bus-pci | 13 ++ Documentation/PCI/00-INDEX

Re: KVM Guest detection

2008-08-13 Thread jd
Thanks. Good to know that most hypervisors are using this mechanism. /Jd --- On Wed, 8/13/08, Anthony Liguori [EMAIL PROTECTED] wrote: From: Anthony Liguori [EMAIL PROTECTED] Subject: Re: KVM Guest detection To: [EMAIL PROTECTED] Cc: KVM List kvm@vger.kernel.org Date: Wednesday, August

Re: [PATCH] kvm: bios: Put AP boot up code to 0x1000

2008-08-13 Thread Sebastian Herbszt
Avi Kivity wrote: The AP enters HALT state with IF=0. What can make it resume at the following jmp 1b? NMI? SMI? Yes, but also INIT. Are you sure the AP will continue after the hlt instruction on INIT? I think it will start to execute code from the reset vector (0xfff0). We might

Re: SR-IOV: patches are available for Linux kernel [4/4]

2008-08-13 Thread Greg KH
On Wed, Aug 13, 2008 at 01:09:16PM -0700, Randy Dunlap wrote: On Tue, 12 Aug 2008 16:46:39 +0800 Zhao, Yu wrote: [PATCH 4/4] PCI: document SR-IOV SR-IOV Documentation. Signed-off-by: Yu Zhao [EMAIL PROTECTED] Signed-off-by: Eddie Dong [EMAIL PROTECTED] ---

[RFC][PATCH v2] VMX: Invalid guest state emulation

2008-08-13 Thread Mohammed Gamal
This patch aims to allow emulation whenever guest state is not valid for VMX operation. This usually happens in mode switches with guests such as older versions of gfxboot and FreeDOS with HIMEM. The patch aims to address this issue, it introduces the following: - A function that invokes the

[PATCH 4/5] uhci: rewrite UHCI emulator, fully async operation with multiple outstanding transactions

2008-08-13 Thread Max Krasnyansky
This is esentially a re-write of the QEMU UHCI layer. My initial goal was to support fully async operation with multiple outstanding async transactions. Along the way I realized that I can greatly simplify and cleanup the overall logic. There was a lot of duplicate and confusing code in the UHCI

[PATCH 5/5] husb: rewrite Linux host USB layer, fully async operation

2008-08-13 Thread Max Krasnyansky
This is a follow up to the async UHCI patch. Both BULK and ISOC transactions are now fully asynchrounous. I left CONTROL synchronous for now, ideally we want it to be async too and it should not be that hard to do now. This patch obviously requires UHCI patch. The combo has been tested with