[PATCH] kvm: qemu: virtio: move virtqueue_next_desc() around

2008-11-27 Thread Avi Kivity
From: Mark McLoughlin [EMAIL PROTECTED] virtio_next_desc() is only used in virtqueue_pop(), so move them alongside one another. Signed-off-by: Mark McLoughlin [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] diff --git a/qemu/hw/virtio.c b/qemu/hw/virtio.c index 8fac354..fe0a120

[PATCH] kvm: qemu: virtio: introduce virtqueue_fill() and virtqueue_flush()

2008-11-27 Thread Avi Kivity
From: Mark McLoughlin [EMAIL PROTECTED] Split virtqueue_push() into two logical steps - adding an element to the used ring and notifying the other side of added elements. This is needed because with the mergeable receive buffers scheme we will add buffers to the used ring as we copy the packet

[PATCH] kvm: testsuite: test 'pop mem' instruction when stack is on mmio

2008-11-27 Thread Avi Kivity
From: Avi Kivity [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] diff --git a/user/test/x86/emulator.c b/user/test/x86/emulator.c index c9f7e97..3abbb3d 100644 --- a/user/test/x86/emulator.c +++ b/user/test/x86/emulator.c @@ -136,6 +136,7 @@ void test_pop(void *mem)

[PATCH] KVM: x86 emulator: allow pop from mmio

2008-11-27 Thread Avi Kivity
From: Avi Kivity [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c index 2555762..70242f5 100644 --- a/arch/x86/kvm/x86_emulate.c +++ b/arch/x86/kvm/x86_emulate.c @@ -1063,9 +1063,9 @@ static int emulate_pop(struct

[PATCH] KVM: x86 emulator: switch 'pop reg' instruction to emulate_pop()

2008-11-27 Thread Avi Kivity
From: Avi Kivity [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c index 70242f5..702de98 100644 --- a/arch/x86/kvm/x86_emulate.c +++ b/arch/x86/kvm/x86_emulate.c @@ -1389,14 +1389,11 @@ special_insn:

Re: [PATCH] markers: comment marker_synchronize_unregister() on data dependency

2008-11-27 Thread Mathieu Desnoyers
* Wu Fengguang ([EMAIL PROTECTED]) wrote: On Thu, Nov 27, 2008 at 03:23:06AM +0200, Lai Jiangshan wrote: Wu Fengguang wrote: [updated patch to include Documentation/markers.txt changes] Add document and comments on marker_synchronize_unregister(): it should be called before freeing

Re: [PATCH] markers: comment marker_synchronize_unregister() on data dependency

2008-11-27 Thread Wu Fengguang
On Thu, Nov 27, 2008 at 10:00:03AM +0200, Mathieu Desnoyers wrote: * Wu Fengguang ([EMAIL PROTECTED]) wrote: + +marker_synchronize_unregister() must be called before the first occurrence of You should probably say .. must be called between probe unregistration and the first

RE: Weekly KVM Test report, kernel 30d95f ... userspace fc94d1 ...

2008-11-27 Thread Xu, Jiajun
On Wednesday, November 26, 2008 8:43 PM [EMAIL PROTECTED] wrote: Xu, Jiajun wrote: The call trace messages in guest: ### Kernel BUG at block/elevator.c:560 invalid opcode: [1] SMP last sysfs file: /block/hda/removable This suggests something happened to /dev/hda.

[PATCH] KVM: Qemu: Build fix for !CONFIG_GDBSTUB case.

2008-11-27 Thread Zhang, Xiantao
From ee96ecb2c86e820278f3332d32a452f31c72dc30 Mon Sep 17 00:00:00 2001 From: Xiantao Zhang [EMAIL PROTECTED] Date: Thu, 27 Nov 2008 17:23:27 +0800 Subject: [PATCH] KVM: Qemu: Build fix for !CONFIG_GDBSTUB case. Once CONFIG_GDBSTUB not configured, compile will generate error. Signed-off-by:

[PATCH] KVM: Qemu: push_nmi should be only used by I386 Arch.

2008-11-27 Thread Zhang, Xiantao
From 1b89616f99abc8e0983ef58a1f984f31a52fe828 Mon Sep 17 00:00:00 2001 From: Xiantao Zhang [EMAIL PROTECTED] Date: Thu, 27 Nov 2008 17:24:51 +0800 Subject: [PATCH] KVM: Qemu: push_nmi should be only used by I386 Arch. Use TARGET_I386 to exclude other archs. Signed-off-by: Xiantao Zhang [EMAIL

[PATCH] KVM: external module: Fix for printk support.

2008-11-27 Thread Zhang, Xiantao
From b1fc7f3303d9e141e27bff593fb05ada59910b09 Mon Sep 17 00:00:00 2001 From: Xiantao Zhang [EMAIL PROTECTED] Date: Thu, 27 Nov 2008 17:27:05 +0800 Subject: [PATCH] KVM: external module: Fix for printk support. kvm-intel module added printk support in kernel, this patch fix build failure with it.

RE: [PATCH][3/3] kvm/ia64: external module: Add printk support for kvm-intel.

2008-11-27 Thread Zhang, Xiantao
Please drop the previous one. Xiantao From c86bee60542097fd2064cb4ae4e0d6a555b1e688 Mon Sep 17 00:00:00 2001 From: Xiantao Zhang [EMAIL PROTECTED] Date: Thu, 27 Nov 2008 17:39:13 +0800 Subject: [PATCH] KVM: external module: Fix for printk support. kvm-intel module added printk support in

Re: [PATCH 00/12] Add support for nested SVM (kernel) v7

2008-11-27 Thread Joerg Roedel
On Tue, Nov 25, 2008 at 08:17:00PM +0100, Alexander Graf wrote: The current generation of virtualization extensions only supports one VM layer. While we can't change that, it is pretty easy to emulate the CPU's behavior and implement the virtualization opcodes ourselves. This patchset does

Re: Weekly KVM Test report, kernel 30d95f ... userspace fc94d1 ...

2008-11-27 Thread Avi Kivity
Xu, Jiajun wrote: On Wednesday, November 26, 2008 8:43 PM [EMAIL PROTECTED] wrote: Xu, Jiajun wrote: The call trace messages in guest: ### Kernel BUG at block/elevator.c:560 invalid opcode: [1] SMP last sysfs file: /block/hda/removable This suggests

[PATCH 0/5] KVM: Improved guest debugging / debug register emulation

2008-11-27 Thread Jan Kiszka
This is the kernel part of the guest debugging / debug register emulation patch series. Changes since last round: - Reinject both soft *and* hard exceptions in vmx_complete_interrupts() Find the patches also at git://git.kiszka.org/linux-kvm.git gdb-queue Jan -- Siemens AG, Corporate

[PATCH 3/5] KVM: VMX: Ensure interruptibility when single-stepping

2008-11-27 Thread Jan Kiszka
When single-stepping, we have to ensure that the INT1 can make it through even if the guest itself is uninterruptible due to MOV SS or STI. VMENTRY will fail otherwise. Signed-off-by: Jan Kiszka [EMAIL PROTECTED] --- arch/x86/kvm/vmx.c | 10 -- 1 files changed, 8 insertions(+), 2

[PATCH 5/5] KVM: x86: Wire-up hardware breakpoints for guest debugging

2008-11-27 Thread Jan Kiszka
Add the remaining bits to make use of debug registers also for guest debugging, thus enabling the use of hardware breakpoints and watchpoints. Signed-off-by: Jan Kiszka [EMAIL PROTECTED] --- arch/x86/kvm/svm.c |5 + arch/x86/kvm/vmx.c |5 + arch/x86/kvm/x86.c | 14

[PATCH 1/5] VMX: Support for injecting software exceptions

2008-11-27 Thread Jan Kiszka
VMX differentiates between processor and software generated exceptions when injecting them into the guest. Extend vmx_queue_exception accordingly (and refactor related constants) so that we can use this service reliably for the new guest debugging framework. Signed-off-by: Jan Kiszka [EMAIL

[PATCH 2/5] KVM: New guest debug interface

2008-11-27 Thread Jan Kiszka
This rips out the support for KVM_DEBUG_GUEST and introduces a new IOCTL instead: KVM_SET_GUEST_DEBUG. The IOCTL payload consists of a generic part, controlling the main switch and the single-step feature. The arch specific part adds an x86 interface for intercepting both types of debug exceptions

[PATCH 4/5] KVM: x86: Virtualize debug registers

2008-11-27 Thread Jan Kiszka
So far KVM only had basic x86 debug register support, once introduced to realize guest debugging that way. The guest itself was not able to use those registers. This patch now adds (almost) full support for guest self-debugging via hardware registers. It refactors the code, moving generic parts

[ kvm-Bugs-2351676 ] Guests hang periodically on Ubuntu-8.10

2008-11-27 Thread SourceForge.net
Bugs item #2351676, was opened at 2008-11-26 19:59 Message generated for change (Comment added) made by technologov You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2351676group_id=180599 Please note that this message will contain a full copy of the comment

[PATCH 5/5] kvm-userspace: Provide compat wrapper for set_debugreg

2008-11-27 Thread Jan Kiszka
Older set_debugreg macros did not allow to pass the register number as constant (without additional typcasting). Catch this as the latest kvm debug changes make use of this property. Signed-off-by: Jan Kiszka [EMAIL PROTECTED] --- kernel/x86/external-module-compat.h | 10 ++ 1 files

Re: [PATCH] KVM: Qemu: push_nmi should be only used by I386 Arch.

2008-11-27 Thread Jan Kiszka
Zhang, Xiantao wrote: From 1b89616f99abc8e0983ef58a1f984f31a52fe828 Mon Sep 17 00:00:00 2001 From: Xiantao Zhang [EMAIL PROTECTED] Date: Thu, 27 Nov 2008 17:24:51 +0800 Subject: [PATCH] KVM: Qemu: push_nmi should be only used by I386 Arch. Use TARGET_I386 to exclude other archs.

Re: [PATCH] Prevent trace call into unloaded module text

2008-11-27 Thread Avi Kivity
Wu Fengguang wrote: Below is the updated patch. Applied, thanks. -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to [EMAIL PROTECTED] More majordomo info at

[PATCH 3/5] kvm-userspace: Switch to new guest debug interface

2008-11-27 Thread Jan Kiszka
This patch switches both libkvm as well as the qemu pieces over to the new guest debug interface. It comes with full support for software-based breakpoints (via guest code modification), hardware-assisted breakpoints and watchpoints (x86-only so far). Breakpoint management is done inside

Re: [PATCH 0/5] kvm: qemu: virtio_net: add support for mergeable rx buffers

2008-11-27 Thread Mark McLoughlin
On Thu, 2008-11-27 at 14:45 +0200, Avi Kivity wrote: Mark McLoughlin wrote: Hi, The mergeable receive buffers scheme has been in the Linux virtio_net driver in net-next-2.6 for a while now, so it's probably safe to assume what's there now is the final iteration of the ABI.

Re: [PATCH] KVM: Qemu: Build fix for !CONFIG_GDBSTUB case.

2008-11-27 Thread Jan Kiszka
Zhang, Xiantao wrote: From ee96ecb2c86e820278f3332d32a452f31c72dc30 Mon Sep 17 00:00:00 2001 From: Xiantao Zhang [EMAIL PROTECTED] Date: Thu, 27 Nov 2008 17:23:27 +0800 Subject: [PATCH] KVM: Qemu: Build fix for !CONFIG_GDBSTUB case. Once CONFIG_GDBSTUB not configured, compile will generate

[PATCH 2/5] QEMU: Use sys-queue.h for break/watchpoint managment

2008-11-27 Thread Jan Kiszka
This switches cpu_break/watchpoint_* to TAILQ wrappers, simplifying the code and also fixing a use after release issue in cpu_break/watchpoint_remove_all. Signed-off-by: Jan Kiszka [EMAIL PROTECTED] --- qemu/cpu-defs.h |9 ++-- qemu/cpu-exec.c |2 -

Re: [PATCH 0/5] kvm: qemu: virtio_net: add support for mergeable rx buffers

2008-11-27 Thread Avi Kivity
Mark McLoughlin wrote: Hi, The mergeable receive buffers scheme has been in the Linux virtio_net driver in net-next-2.6 for a while now, so it's probably safe to assume what's there now is the final iteration of the ABI. The following patches implement support for the scheme in

[PATCH 4/5] kvm-userspace: Remove obsolete special_reload_dr7 hack

2008-11-27 Thread Jan Kiszka
Host debug registers are now properly saved and restored before/after entering the guest. Signed-off-by: Jan Kiszka [EMAIL PROTECTED] --- kernel/x86/external-module-compat.h |2 -- kernel/x86/hack-module.awk |4 kernel/x86/preempt.c|6 -- 3 files

[PATCH 0/5] KVM-userspace: Improved guest debugging / debug register emulation

2008-11-27 Thread Jan Kiszka
Now that QEMU merged the core parts of my gdbstub rework, it's time to post corresponding KVM support for review and (hopefully) inclusion. The user space series still comes with two QEMU patches, but those are already merged upstream, KVM just need to merge latest SVN head. Changes since last

[PATCH 0/2] [v2] Support VT-d multiple device assignment for KVM

2008-11-27 Thread Han, Weidong
This patchset supports VT-d multiple device assignment for KVM. Main changes from V1 to V2: Fixed all comments from Avi and Fenghua. Main changes on patch 1: - implement independent low level functions for kvm, then won't impact native VT-d. - add reference count of iommu which used by domain -

[PATCH 2/2] [v2] KVM: Change to use new APIs for KVM VT-d

2008-11-27 Thread Han, Weidong
This patch changes to use new APIs for KVM VT-d, and add device deassignment for hotplug. Signed-off-by: Weidong Han [EMAIL PROTECTED] --- include/linux/kvm.h |5 ++ include/linux/kvm_host.h | 23 -- virt/kvm/kvm_main.c | 49 - virt/kvm/vtd.c

[PATCH 1/5] QEMU: Add TAILQ_FOREACH_SAFE

2008-11-27 Thread Jan Kiszka
Add TAILQ iterator that allows to safely remove elements while walking the list. Signed-off-by: Jan Kiszka [EMAIL PROTECTED] --- qemu/sys-queue.h |5 + 1 files changed, 5 insertions(+), 0 deletions(-) diff --git a/qemu/sys-queue.h b/qemu/sys-queue.h index 3d0773e..ad5c8fb 100644 ---

[PATCH/Request for review]: check for fops-owner in anon_inode_getfd

2008-11-27 Thread Christian Borntraeger
Am Dienstag, 25. November 2008 schrieb Avi Kivity: I agree with your analysis, and also that the anon_inodes change is useful. If it's acceptable to the vfs/anon_inode maintainers, I'll apply the patch. I think it is a good idea to strip the fs specific changes into a separate patch for

Re: [PATCH] kvm-userspace: fix module build with --kerneldir

2008-11-27 Thread Eduardo Habkost
Excerpts from Avi Kivity's message of Qua Nov 26 14:00:42 -0200 2008: Jan Kiszka wrote: Avi Kivity wrote: snip If the user specified $kerneldir, it should be in the form /lib/modules/$version/build, no? This is not sufficiently generic. KVM should to accept arbitrary paths to

Re: [PATCH 2/2] [v2] KVM: Change to use new APIs for KVM VT-d

2008-11-27 Thread Joerg Roedel
On Thu, Nov 27, 2008 at 09:49:13PM +0800, Han, Weidong wrote: This patch changes to use new APIs for KVM VT-d, and add device deassignment for hotplug. Somehow we always step on each others feed :-) I just wrote a patch series to factor the VT-d API into a generic one which I can plug into for

[PATCH 5/9] VT-d: add domain init and destroy functions for IOMMU API

2008-11-27 Thread Joerg Roedel
Signed-off-by: Joerg Roedel [EMAIL PROTECTED] --- drivers/pci/intel-iommu.c | 24 1 files changed, 24 insertions(+), 0 deletions(-) diff --git a/drivers/pci/intel-iommu.c b/drivers/pci/intel-iommu.c index 5c8baa4..b958b6f 100644 --- a/drivers/pci/intel-iommu.c +++

[PATCH 6/9] VT-d: add device attach and detach functions for IOMMU API

2008-11-27 Thread Joerg Roedel
Signed-off-by: Joerg Roedel [EMAIL PROTECTED] --- drivers/pci/intel-iommu.c | 32 1 files changed, 32 insertions(+), 0 deletions(-) diff --git a/drivers/pci/intel-iommu.c b/drivers/pci/intel-iommu.c index b958b6f..a90c832 100644 --- a/drivers/pci/intel-iommu.c

[PATCH 1/9] KVM: rename vtd.c to iommu.c

2008-11-27 Thread Joerg Roedel
Impace: file renamed The code in the vtd.c file can be reused for other IOMMUs as well. So rename it to make it clear that it handle more than VT-d. Signed-off-by: Joerg Roedel [EMAIL PROTECTED] --- arch/ia64/kvm/Makefile |2 +- arch/x86/kvm/Makefile |2 +- virt/kvm/iommu.c |

[PATCH 2/9] introcude linux/iommu.h for an iommu api

2008-11-27 Thread Joerg Roedel
This patch introduces the API to abstract the exported VT-d functions for KVM into a generic API. This way the AMD IOMMU implementation can plug into this API later. Signed-off-by: Joerg Roedel [EMAIL PROTECTED] --- include/linux/iommu.h | 100 +

[PATCH 8/9] VT-d: register functions for the IOMMU API

2008-11-27 Thread Joerg Roedel
Signed-off-by: Joerg Roedel [EMAIL PROTECTED] --- drivers/pci/intel-iommu.c | 13 + 1 files changed, 13 insertions(+), 0 deletions(-) diff --git a/drivers/pci/intel-iommu.c b/drivers/pci/intel-iommu.c index 8fa0269..71b4d2f 100644 --- a/drivers/pci/intel-iommu.c +++

[PATCH 4/9] select IOMMU_API when DMAR and/or AMD_IOMMU is selected

2008-11-27 Thread Joerg Roedel
These two IOMMUs can implement the current version of this API. So select the API if one or both of these IOMMU drivers is selected. Signed-off-by: Joerg Roedel [EMAIL PROTECTED] --- arch/ia64/Kconfig |3 +++ arch/x86/Kconfig |3 +++ drivers/base/Makefile |1 + 3 files

[PATCH 0/9] Factor VT-d KVM functions into a generic API

2008-11-27 Thread Joerg Roedel
Hi, this patch series makes the current KVM device passthrough code generic enough so that other IOMMU implementation can also plug into this code. It works by factoring the functions Vt-d code exports to KVM into a generic interface which allows different backends. This a basic implementation

[PATCH 3/9] add frontend implementation for the IOMMU API

2008-11-27 Thread Joerg Roedel
Signed-off-by: Joerg Roedel [EMAIL PROTECTED] --- drivers/base/iommu.c | 94 ++ 1 files changed, 94 insertions(+), 0 deletions(-) create mode 100644 drivers/base/iommu.c diff --git a/drivers/base/iommu.c b/drivers/base/iommu.c new file mode

[PATCH 7/9] VT-d: add domain map and iova_to_phys functions for IOMMU API

2008-11-27 Thread Joerg Roedel
Signed-off-by: Joerg Roedel [EMAIL PROTECTED] --- drivers/pci/intel-iommu.c | 22 ++ 1 files changed, 22 insertions(+), 0 deletions(-) diff --git a/drivers/pci/intel-iommu.c b/drivers/pci/intel-iommu.c index a90c832..8fa0269 100644 --- a/drivers/pci/intel-iommu.c +++

Re: [osrc-patches] [PATCH 0/9] Factor VT-d KVM functions into a generic API

2008-11-27 Thread Joerg Roedel
On Thu, Nov 27, 2008 at 04:40:45PM +0100, Joerg Roedel wrote: Hi, this patch series makes the current KVM device passthrough code generic enough so that other IOMMU implementation can also plug into this code. It works by factoring the functions Vt-d code exports to KVM into a generic

[ kvm-Bugs-2353811 ] Solaris 10 guest unstable

2008-11-27 Thread SourceForge.net
Bugs item #2353811, was opened at 2008-11-27 16:44 Message generated for change (Tracker Item Submitted) made by Item Submitter You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2353811group_id=180599 Please note that this message will contain a full copy of

Re: [PATCH 1/9] KVM: rename vtd.c to iommu.c

2008-11-27 Thread Avi Kivity
Joerg Roedel wrote: Impace: file renamed impact? The code in the vtd.c file can be reused for other IOMMUs as well. So rename it to make it clear that it handle more than VT-d. Signed-off-by: Joerg Roedel [EMAIL PROTECTED] --- arch/ia64/kvm/Makefile |2 +- arch/x86/kvm/Makefile |

kvm-79 works on rhel5.2??

2008-11-27 Thread carlopmart
Hi all, somebodu has tested kvm-79 under rhel5.2?? Any bugs or errors?? I will try to install two windows 2003 r2 guests and two rhel5.2 on this server ... Thanks. -- CL Martinez carlopmart {at} gmail {d0t} com -- To unsubscribe from this list: send the line unsubscribe kvm in the body of

Re: [PATCH 1/9] KVM: rename vtd.c to iommu.c

2008-11-27 Thread Joerg Roedel
On Thu, Nov 27, 2008 at 06:32:56PM +0200, Avi Kivity wrote: Joerg Roedel wrote: Impace: file renamed impact? Yeah, patches for x86 should have such a line in the description. I just added it here too because of the many x86-patches I did in the last time. Depending on the way this will

Re: [PATCH] markers: comment marker_synchronize_unregister() on data dependency

2008-11-27 Thread Mathieu Desnoyers
* Wu Fengguang ([EMAIL PROTECTED]) wrote: On Thu, Nov 27, 2008 at 10:00:03AM +0200, Mathieu Desnoyers wrote: * Wu Fengguang ([EMAIL PROTECTED]) wrote: + +marker_synchronize_unregister() must be called before the first occurrence of You should probably say .. must be

Re: [PATCH/Request for review]: check for fops-owner in anon_inode_getfd

2008-11-27 Thread Davide Libenzi
On Thu, 27 Nov 2008, Christian Borntraeger wrote: Am Dienstag, 25. November 2008 schrieb Avi Kivity: I agree with your analysis, and also that the anon_inodes change is useful. If it's acceptable to the vfs/anon_inode maintainers, I'll apply the patch. I think it is a good idea to

[PATCH v2]: check for fops-owner in anon_inode_getfd

2008-11-27 Thread Christian Borntraeger
+ if (fops-owner !try_module_get(fops-owner)) + return -ENOENT; + error = get_unused_fd_flags(flags); if (error 0) return error; What if get_unused_fd_flags() (or the following error-returing ops) fails after a successful try_module_get()? Right,

Re: [PATCH v2]: check for fops-owner in anon_inode_getfd

2008-11-27 Thread Davide Libenzi
On Thu, 27 Nov 2008, Christian Borntraeger wrote: + if (fops-owner !try_module_get(fops-owner)) + return -ENOENT; + error = get_unused_fd_flags(flags); if (error 0) return error; What if get_unused_fd_flags() (or the following error-returing ops)

[PATCH 0/3] KVM-userspace: add NUMA support for guests

2008-11-27 Thread Andre Przywara
Hi, this patch series introduces multiple NUMA nodes support within KVM guests. This will improve the performance of guests which are bigger than one node (number of VCPUs and/or amount of memory) and also allows better balancing by taking better usage of each node's memory. It also improves

[PATCH 1/3] KVM-userspace: introduce -nodes command line option

2008-11-27 Thread Andre Przywara
The attached patch parses a list of host nodes given on the command line and passes it on to lower levels (namely qemu-kvm.c) Signed-off-by: Andre Przywara [EMAIL PROTECTED] -- Andre Przywara AMD-Operating System Research Center (OSRC), Dresden, Germany Tel: +49 351 277-84917 to satisfy

[PATCH 2/3] KVM-userspace: allocate guest resources from different host nodes

2008-11-27 Thread Andre Przywara
According to the host node map given on the command line the VCPUs are pinned to the respective node (allowing at least scheduling between the cores belonging to this node). The mmap'ed guest memory will be bound to the correct host nodes (this will of course not take effect until the memory

[PATCH 3/3] KVM-userspace: generate a SRAT table to describe the guests NUMA topology

2008-11-27 Thread Andre Przywara
According to the number of nodes passed in the CMOS RAM (offset 0x3e) the BIOS code generates a SRAT (System Resources Affinity Table) to describe which (V)CPU and which part of memory is assigned to a certain node. This will then be read and hopefully honored by the guest OS. Signed-off-by:

RE: [PATCH] KVM: Qemu: Build fix for !CONFIG_GDBSTUB case.

2008-11-27 Thread Zhang, Xiantao
Jan Kiszka wrote: Zhang, Xiantao wrote: From ee96ecb2c86e820278f3332d32a452f31c72dc30 Mon Sep 17 00:00:00 2001 From: Xiantao Zhang [EMAIL PROTECTED] Date: Thu, 27 Nov 2008 17:23:27 +0800 Subject: [PATCH] KVM: Qemu: Build fix for !CONFIG_GDBSTUB case. Once CONFIG_GDBSTUB not configured,

RE: [PATCH 2/2] [v2] KVM: Change to use new APIs for KVM VT-d

2008-11-27 Thread Han, Weidong
Joerg Roedel wrote: On Thu, Nov 27, 2008 at 09:49:13PM +0800, Han, Weidong wrote: This patch changes to use new APIs for KVM VT-d, and add device deassignment for hotplug. Somehow we always step on each others feed :-) I just wrote a patch series to factor the VT-d API into a generic one

RE: [PATCH] KVM: Qemu: push_nmi should be only used by I386 Arch.

2008-11-27 Thread Zhang, Xiantao
Jan Kiszka wrote: Zhang, Xiantao wrote: From 1b89616f99abc8e0983ef58a1f984f31a52fe828 Mon Sep 17 00:00:00 2001 From: Xiantao Zhang [EMAIL PROTECTED] Date: Thu, 27 Nov 2008 17:24:51 +0800 Subject: [PATCH] KVM: Qemu: push_nmi should be only used by I386 Arch. Use TARGET_I386 to exclude

RE: [PATCH 2/9] introcude linux/iommu.h for an iommu api

2008-11-27 Thread Han, Weidong
Joerg Roedel wrote: This patch introduces the API to abstract the exported VT-d functions for KVM into a generic API. This way the AMD IOMMU implementation can plug into this API later. Signed-off-by: Joerg Roedel [EMAIL PROTECTED] --- include/linux/iommu.h | 100

RE: [PATCH 3/9] add frontend implementation for the IOMMU API

2008-11-27 Thread Han, Weidong
Joerg Roedel wrote: Signed-off-by: Joerg Roedel [EMAIL PROTECTED] --- drivers/base/iommu.c | 94 ++ 1 files changed, 94 insertions(+), 0 deletions(-) create mode 100644 drivers/base/iommu.c diff --git a/drivers/base/iommu.c

[ kvm-Bugs-2327497 ] NFS copy makes guest network unstable

2008-11-27 Thread SourceForge.net
Bugs item #2327497, was opened at 2008-11-22 07:53 Message generated for change (Comment added) made by jiajun You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2327497group_id=180599 Please note that this message will contain a full copy of the comment

Re: kvm-79 works on rhel5.2??

2008-11-27 Thread Eric Blanchard
Hi, Yes I have tested kvm-79 on RHEL 5.2 i386 host (with kernel 2.6.18-92.1.18.el5PAE) and Yes it is working properly (only tested with Linux guests). In order to build a bridged network configuration for VMs and host, I just had to build the *tunctl* command (got sources from UML project