[COMMIT master] KVM: Document KVM_SET_TSS_ADDR

2010-04-01 Thread Avi Kivity
From: Avi Kivity a...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/Documentation/kvm/api.txt b/Documentation/kvm/api.txt index 9d6e647..2cc0120 100644 --- a/Documentation/kvm/api.txt +++ b/Documentation/kvm/api.txt @@ -795,6 +795,24 @@ It is recommended to use this API

[COMMIT master] KVM: PPC: Don't export Book3S symbols on BookE

2010-04-01 Thread Avi Kivity
From: Alexander Graf ag...@suse.de Book3S knows how to convert floats to doubles and vice versa. BookE doesn't. So let's make sure we don't export them on BookE. This fixes a link error on BookE with CONFIG_KVM=y. Signed-off-by: Alexander Graf ag...@suse.de Signed-off-by: Avi Kivity

[COMMIT master] KVM: Document KVM_SET_USER_MEMORY_REGION

2010-04-01 Thread Avi Kivity
From: Avi Kivity a...@redhat.com Acked-by: Pekka Enberg penb...@cs.helsinki.fi Signed-off-by: Avi Kivity a...@redhat.com diff --git a/Documentation/kvm/api.txt b/Documentation/kvm/api.txt index d170cb4..9d6e647 100644 --- a/Documentation/kvm/api.txt +++ b/Documentation/kvm/api.txt @@ -749,6

[COMMIT master] KVM: PPC: Load VCPU for register fetching

2010-04-01 Thread Avi Kivity
From: Alexander Graf ag...@suse.de When trying to read or store vcpu register data, we should also make sure the vcpu is actually loaded, so we're 100% sure we get the correct values. Signed-off-by: Alexander Graf ag...@suse.de Signed-off-by: Avi Kivity a...@redhat.com diff --git

[COMMIT master] KVM: PPC: Implement alignment interrupt

2010-04-01 Thread Avi Kivity
From: Alexander Graf ag...@suse.de Mac OS X has some applications - namely the Finder - that require alignment interrupts to work properly. So we need to implement them. But the spec for 970 and 750 also looks different. While 750 requires the DSISR and DAR fields to reflect some instruction

[COMMIT master] Merge branch 'master' of ssh://master.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6

2010-04-01 Thread Avi Kivity
From: Avi Kivity a...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com -- To unsubscribe from this list: send the line unsubscribe kvm-commits in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

[COMMIT master] KVM: PPC: Ensure split mode works

2010-04-01 Thread Avi Kivity
From: Alexander Graf ag...@suse.de On PowerPC we can go into MMU Split Mode. That means that either data relocation is on but instruction relocation is off or vice versa. That mode didn't work properly, as we weren't always flushing entries when going into a new split mode, potentially mapping

[COMMIT master] KVM: PPC: Only use QPRs when available

2010-04-01 Thread Avi Kivity
From: Alexander Graf ag...@suse.de BookE KVM doesn't know about QPRs, so let's not try to access then. This fixes a build error on BookE KVM. Signed-off-by: Alexander Graf ag...@suse.de Signed-off-by: Avi Kivity a...@redhat.com diff --git a/arch/powerpc/kvm/powerpc.c

[COMMIT master] KVM: PPC: Implement BAT reads

2010-04-01 Thread Avi Kivity
From: Alexander Graf ag...@suse.de BATs can't only be written to, you can also read them out! So let's implement emulation for reading BAT values again. While at it, I also made BAT setting flush the segment cache, so we're absolutely sure there's no MMU state left when writing BATs.

[COMMIT master] KVM: Increase NR_IOBUS_DEVS limit to 200

2010-04-01 Thread Avi Kivity
From: Sridhar Samudrala s...@us.ibm.com This patch increases the current hardcoded limit of NR_IOBUS_DEVS from 6 to 200. We are hitting this limit when creating a guest with more than 1 virtio-net device using vhost-net backend. Each virtio-net device requires 2 such devices to service

[COMMIT master] KVM: PPC: Add emulation for dcba

2010-04-01 Thread Avi Kivity
From: Alexander Graf ag...@suse.de Mac OS X uses the dcba instruction. According to the specification it doesn't guarantee any functionality, so let's just emulate it as nop. Signed-off-by: Alexander Graf ag...@suse.de Signed-off-by: Avi Kivity a...@redhat.com diff --git

[COMMIT master] KVM: PPC: Disable MSR_FEx for Cell hosts

2010-04-01 Thread Avi Kivity
From: Alexander Graf ag...@suse.de Cell can't handle MSR_FE0 and MSR_FE1 too well. It gets dog slow. So let's just override the guest whenever we see one of the two and mask them out. See commit ddf5f75a16b3e7460ffee881795aa168dffcd0cf for reference. Signed-off-by: Alexander Graf ag...@suse.de

[COMMIT master] KVM: allow bit 10 to be cleared in MSR_IA32_MC4_CTL

2010-04-01 Thread Avi Kivity
From: Andre Przywara andre.przyw...@amd.com There is a quirk for AMD K8 CPUs in many Linux kernels (see arch/x86/kernel/cpu/mcheck/mce.c:__mcheck_cpu_apply_quirks()) that clears bit 10 in that MCE related MSR. KVM can only cope with all zeros or all ones, so it will inject a #GP into the guest,

[COMMIT master] KVM: Document replacements for KVM_EXIT_HYPERCALL

2010-04-01 Thread Avi Kivity
From: Avi Kivity a...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/Documentation/kvm/api.txt b/Documentation/kvm/api.txt index 6f36235..baa8fde 100644 --- a/Documentation/kvm/api.txt +++ b/Documentation/kvm/api.txt @@ -974,7 +974,9 @@ pending operations.

[COMMIT master] KVM: PPC: Implement emulation for lbzux and lhax

2010-04-01 Thread Avi Kivity
From: Alexander Graf ag...@suse.de We get MMIOs with the weirdest instructions. But every time we do, we need to improve our emulator to implement them. So let's do that - this time it's lbzux and lhax's round. Signed-off-by: Alexander Graf ag...@suse.de Signed-off-by: Avi Kivity

[COMMIT master] KVM: PPC: Allow userspace to unset the IRQ line

2010-04-01 Thread Avi Kivity
From: Alexander Graf ag...@suse.de Userspace can tell us that it wants to trigger an interrupt. But so far it can't tell us that it wants to stop triggering one. So let's interpret the parameter to the ioctl that we have anyways to tell us if we want to raise or lower the interrupt line.

[COMMIT master] KVM: PPC: Book3S_32 guest MMU fixes

2010-04-01 Thread Avi Kivity
From: Alexander Graf ag...@suse.de This patch makes the VSID of mapped pages always reflecting all special cases we have, like split mode. It also changes the tlbie mask to 0x0000 according to the spec. The mask we used before was incorrect. Signed-off-by: Alexander Graf ag...@suse.de

[PATCH 1/2] KVM MMU: cleanup/fix mmu audit code

2010-04-01 Thread Xiao Guangrong
This patch does: - 'sp' parameter in inspect_spte_fn() is not used, so remove it - fix 'kvm' and 'slots' is not defined in count_rmaps() - fix a bug in inspect_spte_has_rmap() Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com --- arch/x86/kvm/mmu.c | 15 --- 1 files

[PATCH 2/2] KVM MMU: record reverse mapping for spte only if it's writable

2010-04-01 Thread Xiao Guangrong
The read only spte mapping can't hurt shadow page cache, so, no need to record it. Using bit9 to record whether the spte is re-mapped Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com --- arch/x86/kvm/mmu.c | 17 +++-- arch/x86/kvm/mmu.h |1 + 2 files changed, 16

Re: [PATCH 13/21] KVM: Add support for enabling capabilities per-vcpu

2010-04-01 Thread Alexander Graf
On 01.04.2010, at 10:51, Avi Kivity wrote: On 03/24/2010 10:48 PM, Alexander Graf wrote: Some times we don't want all capabilities to be available to all our vcpus. One example for that is the OSI interface, implemented in the next patch. In order to have a generic mechanism in how to

Re: [RFC] KVM MMU: thinking of shadow page cache

2010-04-01 Thread Xiao Guangrong
Avi Kivity wrote: We've considered this in the past, it makes sense. The big question is whether any guests actually map the same page table through PDEs with different permissions (mapping the same page table through multiple PDEs is very common, but always with the same

Re:[PATCH v1 2/3] Provides multiple submits and asynchronous notifications.

2010-04-01 Thread Xin Xiaohui
The vhost-net backend now only supports synchronous send/recv operations. The patch provides multiple submits and asynchronous notifications. This is needed for zero-copy case. Signed-off-by: Xin Xiaohui xiaohui@intel.com --- Michael, Now, I made vhost to alloc/destroy the kiocb, and

Re:[PATCH 1/3] A device for zero-copy based on KVM virtio-net.

2010-04-01 Thread Xin Xiaohui
Add a device to utilize the vhost-net backend driver for copy-less data transfer between guest FE and host NIC. It pins the guest user space to the host memory and provides proto_ops as sendmsg/recvmsg to vhost-net. Signed-off-by: Xin Xiaohui xiaohui@intel.com Signed-off-by: Zhao Yu

Re: [PATCH 13/21] KVM: Add support for enabling capabilities per-vcpu

2010-04-01 Thread Avi Kivity
On 04/01/2010 12:06 PM, Alexander Graf wrote: On 01.04.2010, at 10:51, Avi Kivity wrote: On 03/24/2010 10:48 PM, Alexander Graf wrote: Some times we don't want all capabilities to be available to all our vcpus. One example for that is the OSI interface, implemented in the next

Re: [PATCH 13/21] KVM: Add support for enabling capabilities per-vcpu

2010-04-01 Thread Avi Kivity
On 03/24/2010 10:48 PM, Alexander Graf wrote: Some times we don't want all capabilities to be available to all our vcpus. One example for that is the OSI interface, implemented in the next patch. In order to have a generic mechanism in how to enable capabilities individually, this patch

Re: [PATCH v3 1/1] Shared memory uio_pci driver

2010-04-01 Thread Avi Kivity
On 03/31/2010 12:12 PM, Michael S. Tsirkin wrote: $ echo 4 /sys/.../msix/allocate $ # subdirectories 0 1 2 3 magically appear $ # bind fd 13 to msix There's no way to know, when qemu starts, how many vectors will be used by driver. So I think we can just go ahead and

Re: [PATCH 1/3] A device for zero-copy based on KVM virtio-net.

2010-04-01 Thread Michael S. Tsirkin
On Thu, Apr 01, 2010 at 05:27:18PM +0800, Xin Xiaohui wrote: Add a device to utilize the vhost-net backend driver for copy-less data transfer between guest FE and host NIC. It pins the guest user space to the host memory and provides proto_ops as sendmsg/recvmsg to vhost-net. Signed-off-by:

Re: [PATCH v3 1/1] Shared memory uio_pci driver

2010-04-01 Thread Avi Kivity
On 04/01/2010 01:59 PM, Michael S. Tsirkin wrote: On Thu, Apr 01, 2010 at 11:58:29AM +0300, Avi Kivity wrote: On 03/31/2010 12:12 PM, Michael S. Tsirkin wrote: $ echo 4 /sys/.../msix/allocate $ # subdirectories 0 1 2 3 magically appear $ # bind fd 13 to msix

Re: [Qemu-devel] Re: [questions] savevm|loadvm

2010-04-01 Thread Paul Brook
Wenhao Xu xuwenhao2...@gmail.com wrote: Hi, Juan, I am fresh to both QEMU and KVM. But so far, I notice that QEMU uses KVM_SET_USER_MEMORY_REGION to set memory region that KVM can use and uses cpu_register_physical_memory_offset to register the same memory to QEMU emulator, which

Re: [PATCH] kvm: Increase NR_IOBUS_DEVS limit to 200

2010-04-01 Thread Avi Kivity
On 03/31/2010 02:48 AM, Sridhar Samudrala wrote: This patch increases the current hardcoded limit of NR_IOBUS_DEVS from 6 to 200. We are hitting this limit when creating a guest with more than 1 virtio-net device using vhost-net backend. Each virtio-net device requires 2 such devices to service

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-01 Thread Joerg Roedel
On Wed, Mar 31, 2010 at 05:08:38PM -0700, Tom Lyon wrote: uio_pci_generic has previously been discussed on the KVM list, but this patch has nothing to do with KVM, so it is also going to LKML. But since you send it to the KVM list it should be suitable for KVM too, no? The point of this

ppc build failure

2010-04-01 Thread Avi Kivity
I get this on a 32-bit build test: arch/powerpc/kvm/powerpc.c: In function 'kvmppc_complete_mmio_load': arch/powerpc/kvm/powerpc.c:338: error: 'struct kvm_vcpu_arch' has no member named 'qpr' arch/powerpc/kvm/powerpc.c:342: error: 'struct kvm_vcpu_arch' has no member named 'qpr' This is on

[PATCH 1/2] KVM: PPC: Only use QPRs when available

2010-04-01 Thread Alexander Graf
BookE KVM doesn't know about QPRs, so let's not try to access then. This fixes a build error on BookE KVM. Signed-off-by: Alexander Graf ag...@suse.de --- arch/powerpc/kvm/powerpc.c |2 ++ 1 files changed, 2 insertions(+), 0 deletions(-) diff --git a/arch/powerpc/kvm/powerpc.c

[PATCH 2/2] KVM: PPC: Don't export Book3S symbols on BookE

2010-04-01 Thread Alexander Graf
Book3S knows how to convert floats to doubles and vice versa. BookE doesn't. So let's make sure we don't export them on BookE. This fixes a link error on BookE with CONFIG_KVM=y. Signed-off-by: Alexander Graf ag...@suse.de --- arch/powerpc/kernel/ppc_ksyms.c |2 ++ 1 files changed, 2

Re: ppc build failure

2010-04-01 Thread Alexander Graf
Avi Kivity wrote: I get this on a 32-bit build test: arch/powerpc/kvm/powerpc.c: In function 'kvmppc_complete_mmio_load': arch/powerpc/kvm/powerpc.c:338: error: 'struct kvm_vcpu_arch' has no member named 'qpr' arch/powerpc/kvm/powerpc.c:342: error: 'struct kvm_vcpu_arch' has no member named

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-01 Thread Tom Lyon
On Thursday 01 April 2010 02:09:09 am Avi Kivity wrote: On 04/01/2010 03:08 AM, Tom Lyon wrote: uio_pci_generic has previously been discussed on the KVM list, but this patch has nothing to do with KVM, so it is also going to LKML. (needs to go to lkml even if it was for kvm) The point of

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-01 Thread Tom Lyon
On Thursday 01 April 2010 05:52:18 am Joerg Roedel wrote: On Wed, Mar 31, 2010 at 05:08:38PM -0700, Tom Lyon wrote: uio_pci_generic has previously been discussed on the KVM list, but this patch has nothing to do with KVM, so it is also going to LKML. But since you send it to the KVM list it

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-01 Thread Tom Lyon
On Thursday 01 April 2010 07:25:04 am Michael S. Tsirkin wrote: On Wed, Mar 31, 2010 at 05:08:38PM -0700, Tom Lyon wrote: uio_pci_generic has previously been discussed on the KVM list, but this patch has nothing to do with KVM, so it is also going to LKML. The point of this patch is to

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-01 Thread Joerg Roedel
On Thu, Apr 01, 2010 at 08:40:34AM -0700, Tom Lyon wrote: On Thursday 01 April 2010 05:52:18 am Joerg Roedel wrote: The point of this patch is to beef up the uio_pci_generic driver so that a non-privileged user process can run a user level driver for most PCIe devices. This can only be

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-01 Thread Tom Lyon
On Thursday 01 April 2010 08:54:14 am Avi Kivity wrote: On 04/01/2010 06:39 PM, Tom Lyon wrote: - support for MSI and MSI-X interrupts (the intel 82599 VFs support only MSI-X) How does a userspace program receive those interrupts? Same as other UIO drivers - by read()ing an event

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-01 Thread Avi Kivity
On 04/01/2010 06:39 PM, Tom Lyon wrote: - support for MSI and MSI-X interrupts (the intel 82599 VFs support only MSI-X) How does a userspace program receive those interrupts? Same as other UIO drivers - by read()ing an event counter. IIRC the usual event counter is

Re: [PATCH 2/2] KVM MMU: record reverse mapping for spte only if it's writable

2010-04-01 Thread Avi Kivity
On 04/01/2010 11:52 AM, Xiao Guangrong wrote: The read only spte mapping can't hurt shadow page cache, so, no need to record it. We do need to keep track of read-only mappings, that's how swapping works. See commit ca335c8f08d. -- error compiling committee.c: too many arguments to

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-01 Thread Avi Kivity
On 04/01/2010 03:08 AM, Tom Lyon wrote: uio_pci_generic has previously been discussed on the KVM list, but this patch has nothing to do with KVM, so it is also going to LKML. (needs to go to lkml even if it was for kvm) The point of this patch is to beef up the uio_pci_generic driver so

Re: [PATCH v2] Add Mergeable RX buffer feature to vhost_net

2010-04-01 Thread Michael S. Tsirkin
On Wed, Mar 31, 2010 at 03:04:43PM -0700, David Stevens wrote: Michael S. Tsirkin m...@redhat.com wrote on 03/31/2010 05:02:28 AM: attached patch seems to be whiespace damaged as well. Does the origin pass checkpatch.pl for you? Yes, but I probably broke it in the transfer --

Re: [PATCH v3 1/1] Shared memory uio_pci driver

2010-04-01 Thread Avi Kivity
On 03/30/2010 05:52 PM, Cam Macdonell wrote: Ah, the usual ioctls are ugly, go away. It could be done via sysfs: $ cat /sys/.../msix/max-interrupts 256 $ echo 4 /sys/.../msix/allocate $ # subdirectories 0 1 2 3 magically appear $ # bind fd 13 to msix $ echo 13

Re: [PATCH 00/21] KVM: PPC: MOL bringup patches v3

2010-04-01 Thread Avi Kivity
On 03/24/2010 10:48 PM, Alexander Graf wrote: Mac-on-Linux has always lacked PPC64 host support. This is going to change now! This patchset contains minor patches to enable MOL, but is mostly about bug fixes that came out of running Mac OS X. With this set and the current svn version of MOL I

Re: How to debug problems when nothing shows up in kvm_stat on kvm-88?

2010-04-01 Thread Avi Kivity
On 03/31/2010 07:56 AM, Neo Jia wrote: hi, I am running official kvm-88 release That's pretty old. Suggest trying the latest kvm-kmod release (or latest kernel.org release with its native kvm modules) and qemu-kvm-0.12.3. with my own 32-bit .so library dlopen'ed by qemu-kvm. So it has

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-01 Thread Avi Kivity
On 04/01/2010 07:06 PM, Tom Lyon wrote: On Thursday 01 April 2010 08:54:14 am Avi Kivity wrote: On 04/01/2010 06:39 PM, Tom Lyon wrote: - support for MSI and MSI-X interrupts (the intel 82599 VFs support only MSI-X) How does a userspace program receive those interrupts?

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-01 Thread Michael S. Tsirkin
On Wed, Mar 31, 2010 at 05:08:38PM -0700, Tom Lyon wrote: uio_pci_generic has previously been discussed on the KVM list, but this patch has nothing to do with KVM, so it is also going to LKML. The point of this patch is to beef up the uio_pci_generic driver so that a non-privileged user

Re: ppc build failure

2010-04-01 Thread Avi Kivity
On 04/01/2010 04:33 PM, Alexander Graf wrote: Avi Kivity wrote: I get this on a 32-bit build test: arch/powerpc/kvm/powerpc.c: In function 'kvmppc_complete_mmio_load': arch/powerpc/kvm/powerpc.c:338: error: 'struct kvm_vcpu_arch' has no member named 'qpr' arch/powerpc/kvm/powerpc.c:342:

Re: [PATCH v3 1/1] Shared memory uio_pci driver

2010-04-01 Thread Michael S. Tsirkin
On Thu, Apr 01, 2010 at 11:58:29AM +0300, Avi Kivity wrote: On 03/31/2010 12:12 PM, Michael S. Tsirkin wrote: $ echo 4 /sys/.../msix/allocate $ # subdirectories 0 1 2 3 magically appear $ # bind fd 13 to msix There's no way to know, when qemu starts, how many vectors will

Re: [PATCH v1 2/3] Provides multiple submits and asynchronous notifications.

2010-04-01 Thread Michael S. Tsirkin
On Thu, Apr 01, 2010 at 05:14:56PM +0800, Xin Xiaohui wrote: The vhost-net backend now only supports synchronous send/recv operations. The patch provides multiple submits and asynchronous notifications. This is needed for zero-copy case. Signed-off-by: Xin Xiaohui xiaohui@intel.com ---

Re: [questions] savevm|loadvm

2010-04-01 Thread Avi Kivity
On 03/31/2010 02:31 PM, Juan Quintela wrote: Wenhao Xuxuwenhao2...@gmail.com wrote: Hi, Juan, I am fresh to both QEMU and KVM. But so far, I notice that QEMU uses KVM_SET_USER_MEMORY_REGION to set memory region that KVM can use and uses cpu_register_physical_memory_offset to register

Re: [RFC] KVM MMU: thinking of shadow page cache

2010-04-01 Thread Avi Kivity
On 04/01/2010 12:05 PM, Xiao Guangrong wrote: We've considered this in the past, it makes sense. The big question is whether any guests actually map the same page table through PDEs with different permissions (mapping the same page table through multiple PDEs is very common, but always with

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-01 Thread Joerg Roedel
On Thu, Apr 01, 2010 at 05:25:04PM +0300, Michael S. Tsirkin wrote: On Wed, Mar 31, 2010 at 05:08:38PM -0700, Tom Lyon wrote: uio_pci_generic has previously been discussed on the KVM list, but this patch has nothing to do with KVM, so it is also going to LKML. The point of this patch

Re: qemu-kvm.git stable requests

2010-04-01 Thread Avi Kivity
On 03/31/2010 11:26 AM, Alexander Graf wrote: Howdy, Apparently there was just the very first case of someone requiring my patch to enable BAR regions 4k. To enable people to use those devices with a released version, I'd suggest cherry-picking these commits into 0.12-stable: commit

Re: [PATCH v2] Add Mergeable RX buffer feature to vhost_net

2010-04-01 Thread David Stevens
kvm-ow...@vger.kernel.org wrote on 04/01/2010 03:54:15 AM: On Wed, Mar 31, 2010 at 03:04:43PM -0700, David Stevens wrote: + head.iov_base = (void *)vhost_get_vq_desc(net-dev, vq, + vq-iov, ARRAY_SIZE(vq-iov), out, in, NULL, NULL);

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-01 Thread Hans J. Koch
On Wed, Mar 31, 2010 at 05:08:38PM -0700, Tom Lyon wrote: uio_pci_generic has previously been discussed on the KVM list, but this patch has nothing to do with KVM, so it is also going to LKML. Just a side note: It would be nice if you Cc:'ed the UIO maintainers (Greg and me) on patches like

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-01 Thread Tom Lyon
On Thursday 01 April 2010 09:07:47 am Joerg Roedel wrote: On Thu, Apr 01, 2010 at 08:40:34AM -0700, Tom Lyon wrote: On Thursday 01 April 2010 05:52:18 am Joerg Roedel wrote: The point of this patch is to beef up the uio_pci_generic driver so that a non-privileged user process can run a

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-01 Thread Tom Lyon
On Thursday 01 April 2010 09:10:57 am Avi Kivity wrote: On 04/01/2010 07:06 PM, Tom Lyon wrote: On Thursday 01 April 2010 08:54:14 am Avi Kivity wrote: On 04/01/2010 06:39 PM, Tom Lyon wrote: - support for MSI and MSI-X interrupts (the intel 82599 VFs support only MSI-X) How does a

Re: [questions] savevm|loadvm

2010-04-01 Thread Wenhao Xu
Does current qemu-kvm (qemu v0.12.3) use the irqchip, pit of KVM? I cannot find any KVM_CREATE_IRQCHIP and KVM_CREATE_PIT in the qemu code. Concerning the interface between qemu and kvm, I have the following confusion: 1. How irqchip and pit of KVM collaborating with the irq and pit emulation of

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-01 Thread Joerg Roedel
On Thu, Apr 01, 2010 at 12:18:27PM -0700, Tom Lyon wrote: On Thursday 01 April 2010 09:07:47 am Joerg Roedel wrote: For the KVM use-case we need to be able to specify the io virtual address for a given process virtual address. This is not possible with the dma-api interface. So if we want

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-01 Thread Joerg Roedel
On Thu, Apr 01, 2010 at 12:24:45PM -0700, Tom Lyon wrote: For my purposes, collapsing all the MSI-Xs into one MSI-look-alike is fine, because I'd be using MSI anyways if I could. The weird Intel 82599 VF only supports MSI-X. For KVM this is not fine. The device should look in the guest as

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-01 Thread Tom Lyon
On Thursday 01 April 2010 08:54:14 am Avi Kivity wrote: On 04/01/2010 06:39 PM, Tom Lyon wrote: - support for MSI and MSI-X interrupts (the intel 82599 VFs support only MSI-X) How does a userspace program receive those interrupts? Same as other UIO drivers - by read()ing an event

RE: [PATCH v1 2/3] Provides multiple submits and asynchronous notifications.

2010-04-01 Thread Xin, Xiaohui
For the write logging, do you have a function in hand that we can recompute the log? If that, I think I can use it to recompute the log info when the logging is suddenly enabled. For the outstanding requests, do you mean all the user buffers have submitted before the logging ioctl changed?