[ kvm-Bugs-2832416 ] Hot-added device is not visible in guest after migration

2010-06-29 Thread SourceForge.net
Bugs item #2832416, was opened at 2009-08-05 09:49 Message generated for change (Comment added) made by haoxudong You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2832416group_id=180599 Please note that this message will contain a full copy of the comment

Biweekly KVM Test report, kernel cfe149e... qemu bc3a9cc...

2010-06-29 Thread Hao, Xudong
Hi, all, This is KVM biweekly test result against kvm.git: cfe149e91b823a75eb7a86e81bfa7c6fce42c744 and qemu-kvm.git: bc3a9ccc5ddea4c0c713ef6fb3c11d9a88cec169. There is 2 qemu issues found, the first one is qemu fail to parse B:D.F with old qemu command; the other is qemu fail to parse -net

Re: [PATCH v2 3/10] KVM: MMU: fix direct sp's access corruptted

2010-06-29 Thread Avi Kivity
On 06/29/2010 04:17 AM, Xiao Guangrong wrote: If B is writeable-and-dirty, then it's D bit is already set, and we don't need to do anything. If B is writeable-and-clean, then we'll have an spte pointing to a read-only sp, so we'll get a write fault on access and an opportunity to set the D

Re: [RFC] virtio: Support releasing lock during kick

2010-06-29 Thread Stefan Hajnoczi
On Mon, Jun 28, 2010 at 4:55 PM, Marcelo Tosatti mtosa...@redhat.com wrote: On Wed, Jun 23, 2010 at 10:24:02PM +0100, Stefan Hajnoczi wrote: The virtio block device holds a lock during I/O request processing. Kicking the virtqueue while the lock is held results in long lock hold times and

Re: [RFC] virtio: Support releasing lock during kick

2010-06-29 Thread Avi Kivity
On 06/29/2010 10:08 AM, Stefan Hajnoczi wrote: Is it incorrect to have the following pattern? spin_lock_irqsave(q-queue_lock); spin_unlock(q-queue_lock); spin_lock(q-queue_lock); spin_unlock_irqrestore(q-queue_lock); Perfectly legitimate. spin_lock_irqsave() is equivalent to

Re: [PATCH 11/26] KVM: PPC: Make RMO a define

2010-06-29 Thread Segher Boessenkool
On PowerPC it's very normal to not support all of the physical RAM in real mode. Oh? Are you referring to real mode limit, or 32-bit implementations with more than 32 address lines, or something else? The former. Okay. In that case, the hypervisor can usually access all of physical

Re: [PATCH] device-assignment: Rework name of assigned pci device

2010-06-29 Thread Hidetoshi Seto
Thanks Markus, (2010/06/29 14:28), Markus Armbruster wrote: Hidetoshi Seto seto.hideto...@jp.fujitsu.com writes: Hao, Xudong xudong@intel.com writes: When assign one PCI device, qemu fail to parse the command line: qemu-system_x86 -smp 2 -m 1024 -hda /path/to/img -pcidevice host=00:19.0

Re: [PATCHv2] vhost-net: add dhclient work-around from userspace

2010-06-29 Thread David Miller
From: Michael S. Tsirkin m...@redhat.com Date: Mon, 28 Jun 2010 13:08:07 +0300 Userspace virtio server has the following hack so guests rely on it, and we have to replicate it, too: Use port number to detect incoming IPv4 DHCP response packets, and fill in the checksum for these. The

Re: [PATCH 24/26] KVM: PPC: PV mtmsrd L=0 and mtmsr

2010-06-29 Thread Segher Boessenkool
There is also a form of mtmsr where all bits need to be addressed. While the PPC64 Linux kernel behaves resonably well here, the PPC32 one never uses the L=1 form but does mtmsr even for simple things like only changing EE. You make it sound like the 32-bit kernel does something stupid,

Re: [PATCH v2 3/10] KVM: MMU: fix direct sp's access corruptted

2010-06-29 Thread Avi Kivity
On 06/29/2010 10:06 AM, Avi Kivity wrote: On 06/29/2010 04:17 AM, Xiao Guangrong wrote: If B is writeable-and-dirty, then it's D bit is already set, and we don't need to do anything. If B is writeable-and-clean, then we'll have an spte pointing to a read-only sp, so we'll get a write fault

Re: [PATCH v2 3/10] KVM: MMU: fix direct sp's access corruptted

2010-06-29 Thread Xiao Guangrong
Avi Kivity wrote: On 06/29/2010 04:17 AM, Xiao Guangrong wrote: If B is writeable-and-dirty, then it's D bit is already set, and we don't need to do anything. If B is writeable-and-clean, then we'll have an spte pointing to a read-only sp, so we'll get a write fault on access and an

Re: [PATCH v2 3/10] KVM: MMU: fix direct sp's access corruptted

2010-06-29 Thread Xiao Guangrong
Avi Kivity wrote: Note: - modifying walk_addr() to call kvm_mmu_pte_write() is probably not so bad. It's rare that a large pte walk sets the dirty bit, and it's probably rare to share those large ptes. Still, I think the fetch() change is better since it's more local. - there was

Re: [PATCH 11/26] KVM: PPC: Make RMO a define

2010-06-29 Thread Alexander Graf
On 29.06.2010, at 09:52, Segher Boessenkool wrote: Also, it seems you construct the physical address by masking out bits from the effective address. Most implementations will trap or machine check if you address outside of physical address space, instead. Well the only case where I

Re: [PATCH v2 8/10] KVM: MMU: prefetch ptes when intercepted guest #PF

2010-06-29 Thread Xiao Guangrong
Marcelo Tosatti wrote: + +if (sp-role.level PT_PAGE_TABLE_LEVEL) +return; + +if (sp-role.direct) +return direct_pte_prefetch(vcpu, sptep); Can never happen. Marcelo, Thanks for your comment. You mean that we can't meet sp-role.direct here? could you

Re: [PATCH v2 3/10] KVM: MMU: fix direct sp's access corruptted

2010-06-29 Thread Avi Kivity
On 06/29/2010 10:45 AM, Xiao Guangrong wrote: - there was once talk that instead of folding pt_access and pte_access together into the leaf sp-role.access, each sp level would have its own access permissions. In this case we don't even have to get a new direct sp, only change the

Re: [PATCH v2 3/10] KVM: MMU: fix direct sp's access corruptted

2010-06-29 Thread Xiao Guangrong
Avi Kivity wrote: On 06/29/2010 10:35 AM, Xiao Guangrong wrote: We have now if (is_shadow_present_pte(*sptep) !is_large_pte(*sptep)) continue; So we need to add a check, if sp-role.access doesn't match pt_access pte_access, we need to get a new sp with the correct

Re: [PATCH v2 3/10] KVM: MMU: fix direct sp's access corruptted

2010-06-29 Thread Avi Kivity
On 06/29/2010 12:04 PM, Xiao Guangrong wrote: Simply replace (*spte SPTE_NO_DIRTY) with a condition that checks whether sp-access is consistent with gw-pt(e)_access. If the guest mapping is writable and it !dirty, we mark SPTE_NO_DIRTY flag in the spte, when the next #PF occurs, we

Re: [PATCH v2 3/10] KVM: MMU: fix direct sp's access corruptted

2010-06-29 Thread Xiao Guangrong
Avi Kivity wrote: On 06/29/2010 12:04 PM, Xiao Guangrong wrote: Simply replace (*spte SPTE_NO_DIRTY) with a condition that checks whether sp-access is consistent with gw-pt(e)_access. If the guest mapping is writable and it !dirty, we mark SPTE_NO_DIRTY flag in the spte, when the

Re: [PATCH v5] KVM: VMX: Execute WBINVD to keep data consistency with assigned devices

2010-06-29 Thread Avi Kivity
On 06/29/2010 06:16 AM, Sheng Yang wrote: Some guest device driver may leverage the Non-Snoop I/O, and explicitly WBINVD or CLFLUSH to a RAM space. Since migration may occur before WBINVD or CLFLUSH, we need to maintain data consistency either by: 1: flushing cache (wbinvd) when the guest is

Re: KVM + VTd on a DX58SO reports No IOMMU found.

2010-06-29 Thread Avi Kivity
On 06/29/2010 07:49 AM, ewheeler wrote: Hello, I have been scouring mailing lists, the wiki, and talked with iggy on freenode/#kvm who suggested that I ask on the list. KVM reports that I do not have an IOMMU, however, dmesg reports both DMAR and IOMMU. In addition, I know that this board

Re: [PATCH 0/3][RFC] NUMA: add host side pinning

2010-06-29 Thread Avi Kivity
On 06/28/2010 07:20 PM, Anthony Liguori wrote: To avoid this I'd like to see the pinning done from within QEMU. I am not sure whether calling numactl via system() and friends is OK, I'd prefer to run the syscalls directly (like in patch 3/3) and pull the necessary options into the -numa

Re: [PATCH 0/3][RFC] NUMA: add host side pinning

2010-06-29 Thread Avi Kivity
On 06/28/2010 07:17 PM, Anthony Liguori wrote: On 06/24/2010 06:12 AM, Avi Kivity wrote: On 06/24/2010 01:58 PM, Andre Przywara wrote: So who would create the /dev/shm/nodeXX files? Currently it is QEMU. It creates a somewhat unique filename, opens and unlinks it. The difference would be to

Re: [PATCH 01/26] KVM: PPC: Introduce shared page

2010-06-29 Thread Alexander Graf
Avi Kivity wrote: On 06/26/2010 02:24 AM, Alexander Graf wrote: For transparent variable sharing between the hypervisor and guest, I introduce a shared page. This shared page will contain all the registers the guest can read and write safely without exiting guest context. This patch only

Re: [KVM-AUTOTEST PATCH] KVM test: Windows unattended_install: don't start the telnet service at startup

2010-06-29 Thread Michael Goldish
On 06/29/2010 04:33 AM, Chen Cao wrote: On Mon, Jun 28, 2010 at 05:54:18PM +0300, Michael Goldish wrote: The telnet service isn't used by kvm-autotest (AFAIK) and may interfere with rss.exe (port 23). Michael, I think it is better to leave the port 23 (and also 22) alone, people may

Re: [PATCH v5] KVM: VMX: Execute WBINVD to keep data consistency with assigned devices

2010-06-29 Thread Jan Kiszka
Avi Kivity wrote: On 06/29/2010 06:16 AM, Sheng Yang wrote: Some guest device driver may leverage the Non-Snoop I/O, and explicitly WBINVD or CLFLUSH to a RAM space. Since migration may occur before WBINVD or CLFLUSH, we need to maintain data consistency either by: 1: flushing cache (wbinvd)

Re: [PATCH v5] KVM: VMX: Execute WBINVD to keep data consistency with assigned devices

2010-06-29 Thread Roedel, Joerg
On Mon, Jun 28, 2010 at 11:16:59PM -0400, Sheng Yang wrote: Some guest device driver may leverage the Non-Snoop I/O, and explicitly WBINVD or CLFLUSH to a RAM space. Since migration may occur before WBINVD or CLFLUSH, we need to maintain data consistency either by: 1: flushing cache (wbinvd)

Re: [PATCH v5] KVM: VMX: Execute WBINVD to keep data consistency with assigned devices

2010-06-29 Thread Avi Kivity
On 06/29/2010 01:32 PM, Jan Kiszka wrote: Avi Kivity wrote: On 06/29/2010 06:16 AM, Sheng Yang wrote: Some guest device driver may leverage the Non-Snoop I/O, and explicitly WBINVD or CLFLUSH to a RAM space. Since migration may occur before WBINVD or CLFLUSH, we need to maintain data

Re: [PATCH v5] KVM: VMX: Execute WBINVD to keep data consistency with assigned devices

2010-06-29 Thread Avi Kivity
On 06/29/2010 01:14 PM, Roedel, Joerg wrote: On Mon, Jun 28, 2010 at 11:16:59PM -0400, Sheng Yang wrote: Some guest device driver may leverage the Non-Snoop I/O, and explicitly WBINVD or CLFLUSH to a RAM space. Since migration may occur before WBINVD or CLFLUSH, we need to maintain data

Re: [PATCH 01/26] KVM: PPC: Introduce shared page

2010-06-29 Thread Avi Kivity
On 06/29/2010 12:54 PM, Alexander Graf wrote: Code repeats 3x. Share please. Looking at this again, I could combine the 3 lines of init code into 3 lines of code that do a generic function call and then error checking. And I could convert the one free_page line with one function call

Re: [PATCH v2 8/10] KVM: MMU: prefetch ptes when intercepted guest #PF

2010-06-29 Thread Marcelo Tosatti
On Tue, Jun 29, 2010 at 04:07:40PM +0800, Xiao Guangrong wrote: Marcelo Tosatti wrote: + + if (sp-role.level PT_PAGE_TABLE_LEVEL) + return; + + if (sp-role.direct) + return direct_pte_prefetch(vcpu, sptep); Can never happen. Marcelo, Thanks for

[KVM-AUTOTEST PATCH v3] [RFC] KVM test: add python client for rss file transfer services

2010-06-29 Thread Michael Goldish
See details in docstrings in rss_file_transfer.py. See protocol details in rss.cpp. Changes from v2: - Raise FileTransferNotFoundError if no files/dirs are transferred (due to a bad path or wildcard pattern) - Make all connection related errors in the base class raise FileTransferConnectError

Re: random crash in post_kvm_run()

2010-06-29 Thread Avi Kivity
On 06/28/2010 08:28 PM, BuraphaLinux Server wrote: Hello, I have tried qemu_kvm 0.12.4 release and also git from about 1/2 an hour ago. In both cases, I crash in the post_kvm_run() function on the line about: pthread_mutex_lock(qemu_mutex); The command I use to run qemu worked great

[KVM-AUTOTEST PATCH v3] [RFC] KVM test: rss.cpp: add file transfer support

2010-06-29 Thread Michael Goldish
Enable RSS to send/receive files and directory trees (recursively). See protocol details in rss.cpp. Changes from v2: - Use ports 10022 and 10023 by default instead of 22 and 23. Changes from v1: - Expand environment variables (e.g. %WinDir%) in all paths. - Change text box limit to 16384

[KVM-AUTOTEST PATCH v2] KVM test: enable file transfers for Windows guests

2010-06-29 Thread Michael Goldish
This will only work with the most recent rss.exe. Usage examples: vm.copy_files_from(r'C:\foobar\*', test.debugdir, timeout=30) vm.copy_files_from(r'%SystemRoot%\memory.dmp', '/tmp/', timeout=60) vm.copy_files_to('/usr/local', r'C:\Windows', timeout=600) Changes from v1: - Use ports 10022 and

[KVM-AUTOTEST PATCH] KVM test: setuprss.bat: use 'netsh advfirewall' to disable firewall

2010-06-29 Thread Michael Goldish
In addition to 'netsh firewall ...' use 'netsh advfirewall ...' which seems to be the preferred way of changing firewall settings in Win7. ('netsh firewall ...' results in the firewall being disabled only for one type of network (e.g. public networks) but not for the other (home networks).)

[KVM-AUTOTEST PATCH] KVM test: setuprss.bat: let rss.exe use its default ports

2010-06-29 Thread Michael Goldish
Don't tell rss.exe to use port 22. Signed-off-by: Michael Goldish mgold...@redhat.com --- client/tests/kvm/deps/setuprss.bat |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/client/tests/kvm/deps/setuprss.bat b/client/tests/kvm/deps/setuprss.bat index 1adff0f..97298cd

[KVM-AUTOTEST PATCH] KVM test: kvm.py: add exception class name to failure message

2010-06-29 Thread Michael Goldish
This will result in more informative messages, e.g.: Test failed: FileTransferConnectError: Could not connect to server instead of Test failed: Could not connect to server Signed-off-by: Michael Goldish mgold...@redhat.com --- client/tests/kvm/kvm.py |3 ++- 1 files changed, 2

Re: [PATCH v5] KVM: VMX: Execute WBINVD to keep data consistency with assigned devices

2010-06-29 Thread Roedel, Joerg
On Tue, Jun 29, 2010 at 06:44:25AM -0400, Avi Kivity wrote: On 06/29/2010 01:14 PM, Roedel, Joerg wrote: On Mon, Jun 28, 2010 at 11:16:59PM -0400, Sheng Yang wrote: Some guest device driver may leverage the Non-Snoop I/O, and explicitly WBINVD or CLFLUSH to a RAM space. Since

Re: [PATCH v5] KVM: VMX: Execute WBINVD to keep data consistency with assigned devices

2010-06-29 Thread Roedel, Joerg
On Tue, Jun 29, 2010 at 06:42:57AM -0400, Avi Kivity wrote: On 06/29/2010 01:32 PM, Jan Kiszka wrote: Correctness is more important than performance. Since we don't know whether the guest needs it or not, we have to enable it. The user may disable it if he likes. Can't this code only be

Re: [PATCH v5] KVM: VMX: Execute WBINVD to keep data consistency with assigned devices

2010-06-29 Thread Avi Kivity
On 06/29/2010 03:28 PM, Roedel, Joerg wrote: Do you mean, KVM_IOMMU_CACHE_COHERENCY should be set for the AMD IOMMU? No, as far as I understand it the KVM_IOMMU_CACHE_COHERENCY flag is only there because there are VT-d IOMMUs that does not support the snoop force bit. In the AMD IOMMU

Re: [PATCH v5] KVM: VMX: Execute WBINVD to keep data consistency with assigned devices

2010-06-29 Thread Avi Kivity
On 06/29/2010 03:32 PM, Roedel, Joerg wrote: On Tue, Jun 29, 2010 at 06:42:57AM -0400, Avi Kivity wrote: On 06/29/2010 01:32 PM, Jan Kiszka wrote: Correctness is more important than performance. Since we don't know whether the guest needs it or not, we have to enable it. The

Re: [PATCH] KVM: PPC: Add generic hpte management functions

2010-06-29 Thread Alexander Graf
Avi Kivity wrote: On 06/28/2010 11:55 AM, Alexander Graf wrote: + +static inline u64 kvmppc_mmu_hash_pte(u64 eaddr) { +return hash_64(eaddr PTE_SIZE, HPTEG_HASH_BITS_PTE); +} + +static inline u64 kvmppc_mmu_hash_vpte(u64 vpage) { +return hash_64(vpage 0xfULL,

Re: [PATCH] KVM: PPC: Add generic hpte management functions

2010-06-29 Thread Avi Kivity
On 06/29/2010 03:56 PM, Alexander Graf wrote: Avi Kivity wrote: On 06/28/2010 11:55 AM, Alexander Graf wrote: + +static inline u64 kvmppc_mmu_hash_pte(u64 eaddr) { +return hash_64(eaddrPTE_SIZE, HPTEG_HASH_BITS_PTE); +} + +static inline u64 kvmppc_mmu_hash_vpte(u64

Re: [PATCH] KVM: PPC: Add generic hpte management functions

2010-06-29 Thread Alexander Graf
Avi Kivity wrote: On 06/29/2010 03:56 PM, Alexander Graf wrote: Avi Kivity wrote: On 06/28/2010 11:55 AM, Alexander Graf wrote: + +static inline u64 kvmppc_mmu_hash_pte(u64 eaddr) { +return hash_64(eaddrPTE_SIZE, HPTEG_HASH_BITS_PTE); +} + +static inline u64

Re: [PATCHv2] vhost-net: add dhclient work-around from userspace

2010-06-29 Thread Michael S. Tsirkin
On Tue, Jun 29, 2010 at 12:36:47AM -0700, David Miller wrote: From: Michael S. Tsirkin m...@redhat.com Date: Mon, 28 Jun 2010 13:08:07 +0300 Userspace virtio server has the following hack so guests rely on it, and we have to replicate it, too: Use port number to detect incoming IPv4

Re: [PATCH] KVM: PPC: Add generic hpte management functions

2010-06-29 Thread Avi Kivity
On 06/29/2010 04:06 PM, Alexander Graf wrote: Are we looking at the same link? Looks good to me there. We're probably looking at the same link but looking at different things. I'm whining about static u64 f() { ... } as opposed to the more sober static u64 f()

Re: [PATCH v5] KVM: VMX: Execute WBINVD to keep data consistency with assigned devices

2010-06-29 Thread Marcelo Tosatti
On Tue, Jun 29, 2010 at 11:16:59AM +0800, Sheng Yang wrote: Some guest device driver may leverage the Non-Snoop I/O, and explicitly WBINVD or CLFLUSH to a RAM space. Since migration may occur before WBINVD or CLFLUSH, we need to maintain data consistency either by: 1: flushing cache (wbinvd)

Re: [PATCH v5] KVM: VMX: Execute WBINVD to keep data consistency with assigned devices

2010-06-29 Thread Avi Kivity
On 06/29/2010 04:25 PM, Marcelo Tosatti wrote: + smp_call_function_single(vcpu-cpu, + wbinvd_ipi, NULL, 1); + } + kvm_x86_ops-vcpu_load(vcpu, cpu); if (unlikely(per_cpu(cpu_tsc_khz, cpu) == 0)) {

Re: [PATCH v5] KVM: VMX: Execute WBINVD to keep data consistency with assigned devices

2010-06-29 Thread Marcelo Tosatti
On Tue, Jun 29, 2010 at 04:28:35PM +0300, Avi Kivity wrote: On 06/29/2010 04:25 PM, Marcelo Tosatti wrote: + smp_call_function_single(vcpu-cpu, + wbinvd_ipi, NULL, 1); + } + kvm_x86_ops-vcpu_load(vcpu, cpu); if

Re: [PATCH v5] KVM: VMX: Execute WBINVD to keep data consistency with assigned devices

2010-06-29 Thread Roedel, Joerg
On Tue, Jun 29, 2010 at 08:35:35AM -0400, Avi Kivity wrote: On 06/29/2010 03:28 PM, Roedel, Joerg wrote: The flag indicates to kvm that it doesn't need to worry about iommu cache coherency issues (for example, it can ignore wbinvd), so it needs to be set. THe following code if

Re: [Qemu-devel] KVM Call agenda for June 29

2010-06-29 Thread Anthony Liguori
On 06/28/2010 02:03 PM, Juan Quintela wrote: Please send in any agenda items you are interested in covering. If we have a lack of agenda items I'll cancel the week's call. After last week debacle, I will wait until 10 mins before call to cancel it. Thanks for posting earlier this week.

Re: [Qemu-devel] KVM Call agenda for June 29

2010-06-29 Thread Chris Wright
* Anthony Liguori (anth...@codemonkey.ws) wrote: On 06/28/2010 02:03 PM, Juan Quintela wrote: Please send in any agenda items you are interested in covering. If we have a lack of agenda items I'll cancel the week's call. After last week debacle, I will wait until 10 mins before call to

Re: [PATCH v5] KVM: VMX: Execute WBINVD to keep data consistency with assigned devices

2010-06-29 Thread Avi Kivity
On 06/29/2010 04:35 PM, Marcelo Tosatti wrote: work_on_cpu() loop instead of smp_call_function_many(), to avoid executing wbinvd with interrupts disabled. Why? wbinvd is not interruptible. Right. But still, smp_call_function_many() is going to busy-spin until the target CPUs

Re: KVM + VTd on a DX58SO reports No IOMMU found.

2010-06-29 Thread ewheeler
On Tue, 2010-06-29 at 12:42 +0300, Avi Kivity wrote: On 06/29/2010 07:49 AM, ewheeler wrote: KVM reports that I do not have an IOMMU, however, dmesg reports both DMAR and IOMMU. In addition, I know that this board supports VT-d. Specific details are available here:

Re: KVM + VTd on a DX58SO reports No IOMMU found.

2010-06-29 Thread Avi Kivity
On 06/29/2010 05:11 PM, ewheeler wrote: On Tue, 2010-06-29 at 12:42 +0300, Avi Kivity wrote: On 06/29/2010 07:49 AM, ewheeler wrote: KVM reports that I do not have an IOMMU, however, dmesg reports both DMAR and IOMMU. In addition, I know that this board supports VT-d. Specific

Re: KVM + VTd on a DX58SO reports No IOMMU found.

2010-06-29 Thread ewheeler
On Tue, 2010-06-29 at 17:49 +0300, Avi Kivity wrote: On 06/29/2010 05:11 PM, ewheeler wrote: On Tue, 2010-06-29 at 12:42 +0300, Avi Kivity wrote: On 06/29/2010 07:49 AM, ewheeler wrote: KVM reports that I do not have an IOMMU, however, dmesg reports both DMAR and IOMMU. In

[ kvm-Bugs-3022896 ] bad network performance with 10Gbit

2010-06-29 Thread SourceForge.net
Bugs item #3022896, was opened at 2010-06-29 18:39 Message generated for change (Tracker Item Submitted) made by You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=3022896group_id=180599 Please note that this message will contain a full copy of the comment

[ kvm-Bugs-3022896 ] bad network performance with 10Gbit

2010-06-29 Thread SourceForge.net
Bugs item #3022896, was opened at 2010-06-29 18:39 Message generated for change (Comment added) made by jessorensen You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=3022896group_id=180599 Please note that this message will contain a full copy of the comment

Status update

2010-06-29 Thread Eduard - Gabriel Munteanu
Hi everybody, Here's a status update (a public one this time) on my work: --- Accomplishments: - [DONE] Generic IOMMU API for devices - [DONE] PIIX IDE uses the new API - [DONE] Permissions handling Bonus: - [DONE] RTL8139 converted Objectives: - [WIP] Reporting IO page faults in the event

[PATCH] device-assignment: Clear assigned_dev irq type

2010-06-29 Thread Alex Williamson
Commit 96abccb5 cleared assigned_irq_data.flags when an irq is disabled, but what we really want is to clear assigned_dev-irq_requested_type. Signed-off-by: Alex Williamson alex.william...@redhat.com Found-by: Juan Quintela quint...@redhat.com --- hw/device-assignment.c |4 ++-- 1 files

Re: [PATCH] device-assignment: Clear assigned_dev irq type

2010-06-29 Thread Chris Wright
* Alex Williamson (alex.william...@redhat.com) wrote: Commit 96abccb5 cleared assigned_irq_data.flags when an irq is disabled, but what we really want is to clear assigned_dev-irq_requested_type. Signed-off-by: Alex Williamson alex.william...@redhat.com Found-by: Juan Quintela

Re: [PATCH v5] KVM: VMX: Execute WBINVD to keep data consistency with assigned devices

2010-06-29 Thread Marcelo Tosatti
On Tue, Jun 29, 2010 at 04:50:49PM +0300, Avi Kivity wrote: On 06/29/2010 04:35 PM, Marcelo Tosatti wrote: work_on_cpu() loop instead of smp_call_function_many(), to avoid executing wbinvd with interrupts disabled. Why? wbinvd is not interruptible. Right. But still,

Re: [PATCH] device-assignment: Clear assigned_dev irq type

2010-06-29 Thread Juan Quintela
Alex Williamson alex.william...@redhat.com wrote: Commit 96abccb5 cleared assigned_irq_data.flags when an irq is disabled, but what we really want is to clear assigned_dev-irq_requested_type. Signed-off-by: Alex Williamson alex.william...@redhat.com Found-by: Juan Quintela quint...@redhat.com

Hypervisor detection from within a Linux VM

2010-06-29 Thread Chetan Loke
Hello, Requirement: I have the need to support my apps(running on a Linux VM) on different *nix hypervisors(ESX/Xen etc). I need to know on which hypervisor my app is running. I read the CPUID usage thread - http://thread.gmane.org/gmane.comp.emulators.kvm.devel/22643 but to be honest in the end

Re: Hypervisor detection from within a Linux VM

2010-06-29 Thread Anthony Liguori
On 06/29/2010 04:25 PM, Chetan Loke wrote: Hello, Requirement: I have the need to support my apps(running on a Linux VM) on different *nix hypervisors(ESX/Xen etc). I need to know on which hypervisor my app is running. I read the CPUID usage thread -

[PATCH] KVM test: Add Makefile on deps/ subdir

2010-06-29 Thread Lucas Meneghel Rodrigues
With this makefile, it's possible to comfortably compile both rss.exe and finish.exe on a recent Fedora box with the mingw packages installed. This is a nice convenience and saves people of memorizing the compiler command lines. Signed-off-by: Lucas Meneghel Rodrigues l...@redhat.com ---

[PATCH] virt-what.in: Added VMware virt detection using cpuid in wrapper script

2010-06-29 Thread Chetan Loke
Brief discussion thread - http://lkml.org/lkml/2010/6/29/355 Added VMware detection via cpuid.Mimic'd VMware's balloon driver's init-time check(cpuid followed by dmi-checks). Moved the existing logic into a simple function to achieve that. Tested virt-what.in(ran as a script) and

Re: Hypervisor detection from within a Linux VM

2010-06-29 Thread Chetan Loke
On Tue, Jun 29, 2010 at 5:44 PM, Anthony Liguori anth...@codemonkey.ws wrote: On 06/29/2010 04:25 PM, Chetan Loke wrote: It can be done entirely in userspace.  Take a look at virt-what: http://people.redhat.com/~rjones/virt-what/ Just posted a patch for virt-what.in which can be used as a

Re: [PATCH v2 8/10] KVM: MMU: prefetch ptes when intercepted guest #PF

2010-06-29 Thread Xiao Guangrong
Marcelo Tosatti wrote: Also prefetch should be disabled for EPT, due to lack of accessed bit. But we call mmu_set_spte() with speculative == false, it not touch the accessed bit. There is no accessed bit on EPT. So the aging code (kvm_age_rmapp) considers any present translation as

[PATCH v6 1/2] KVM: VMX: Execute WBINVD to keep data consistency with assigned devices

2010-06-29 Thread Sheng Yang
Some guest device driver may leverage the Non-Snoop I/O, and explicitly WBINVD or CLFLUSH to a RAM space. Since migration may occur before WBINVD or CLFLUSH, we need to maintain data consistency either by: 1: flushing cache (wbinvd) when the guest is scheduled out if there is no wbinvd exit, or 2:

[PATCH v6 2/2] KVM: Using workqueue for WBINVD

2010-06-29 Thread Sheng Yang
It would buy us the ability to schedule compared to smp_call_function(). Signed-off-by: Sheng Yang sh...@linux.intel.com --- But I am not sure if it worth the complexity. Anyway WBINVD itself can't be interrupted, so the benefit should come to the caller cpu I think. And that would extended the

Re: [PATCH 11/26] KVM: PPC: Make RMO a define

2010-06-29 Thread Segher Boessenkool
On PowerPC it's very normal to not support all of the physical RAM in real mode. Oh? Are you referring to real mode limit, or 32-bit implementations with more than 32 address lines, or something else? The former. Okay. In that case, the hypervisor can usually access all of physical

Re: [PATCH 11/26] KVM: PPC: Make RMO a define

2010-06-29 Thread Alexander Graf
On 29.06.2010, at 09:32, Segher Boessenkool wrote: On PowerPC it's very normal to not support all of the physical RAM in real mode. Oh? Are you referring to real mode limit, or 32-bit implementations with more than 32 address lines, or something else? The former. Okay. In that

Re: [PATCH 11/26] KVM: PPC: Make RMO a define

2010-06-29 Thread Alexander Graf
On 29.06.2010, at 09:52, Segher Boessenkool wrote: Also, it seems you construct the physical address by masking out bits from the effective address. Most implementations will trap or machine check if you address outside of physical address space, instead. Well the only case where I

Re: [PATCH 01/26] KVM: PPC: Introduce shared page

2010-06-29 Thread Alexander Graf
Avi Kivity wrote: On 06/26/2010 02:24 AM, Alexander Graf wrote: For transparent variable sharing between the hypervisor and guest, I introduce a shared page. This shared page will contain all the registers the guest can read and write safely without exiting guest context. This patch only

Re: [PATCH 01/26] KVM: PPC: Introduce shared page

2010-06-29 Thread Avi Kivity
On 06/29/2010 12:54 PM, Alexander Graf wrote: Code repeats 3x. Share please. Looking at this again, I could combine the 3 lines of init code into 3 lines of code that do a generic function call and then error checking. And I could convert the one free_page line with one function call

Re: [PATCH] KVM: PPC: Add generic hpte management functions

2010-06-29 Thread Alexander Graf
Avi Kivity wrote: On 06/28/2010 11:55 AM, Alexander Graf wrote: + +static inline u64 kvmppc_mmu_hash_pte(u64 eaddr) { +return hash_64(eaddr PTE_SIZE, HPTEG_HASH_BITS_PTE); +} + +static inline u64 kvmppc_mmu_hash_vpte(u64 vpage) { +return hash_64(vpage 0xfULL,

Re: [PATCH] KVM: PPC: Add generic hpte management functions

2010-06-29 Thread Avi Kivity
On 06/29/2010 03:56 PM, Alexander Graf wrote: Avi Kivity wrote: On 06/28/2010 11:55 AM, Alexander Graf wrote: + +static inline u64 kvmppc_mmu_hash_pte(u64 eaddr) { +return hash_64(eaddrPTE_SIZE, HPTEG_HASH_BITS_PTE); +} + +static inline u64 kvmppc_mmu_hash_vpte(u64

Re: [PATCH] KVM: PPC: Add generic hpte management functions

2010-06-29 Thread Alexander Graf
Avi Kivity wrote: On 06/29/2010 03:56 PM, Alexander Graf wrote: Avi Kivity wrote: On 06/28/2010 11:55 AM, Alexander Graf wrote: + +static inline u64 kvmppc_mmu_hash_pte(u64 eaddr) { +return hash_64(eaddrPTE_SIZE, HPTEG_HASH_BITS_PTE); +} + +static inline u64

Re: [PATCH] KVM: PPC: Add generic hpte management functions

2010-06-29 Thread Avi Kivity
On 06/29/2010 04:06 PM, Alexander Graf wrote: Are we looking at the same link? Looks good to me there. We're probably looking at the same link but looking at different things. I'm whining about static u64 f() { ... } as opposed to the more sober static u64 f()