Re: [PATCH 22/24] Correct handling of idt vectoring info

2010-09-20 Thread Nadav Har'El
On Thu, Jun 17, 2010, Gleb Natapov wrote about Re: [PATCH 22/24] Correct handling of idt vectoring info: On Sun, Jun 13, 2010 at 03:33:50PM +0300, Nadav Har'El wrote: In the normal non-nested case, the idt_vectoring_info case is treated after the exit. However, in the nested case a decision

Re: cpu hotplug

2010-09-20 Thread Gleb Natapov
On Sun, Sep 19, 2010 at 05:57:25PM -0400, Kevin O'Connor wrote: On Sun, Sep 19, 2010 at 06:24:33PM +0200, Conrad Wood wrote: a script with my exact steps is below. Result is reproducible. [...] echo Ejecting CPU #4 echo cpu_set 4 offline | nc ${MONITORHOST} ${MONITORPORT} /dev/null

Re: cpu hotplug

2010-09-20 Thread Gleb Natapov
On Sun, Sep 19, 2010 at 06:03:31PM -0400, Kevin O'Connor wrote: On Sun, Sep 19, 2010 at 06:12:14PM +0200, Gleb Natapov wrote: On Sun, Sep 19, 2010 at 12:04:51PM -0400, Kevin O'Connor wrote: I'm confused. The cpu_set x offline doesn't appear to do anything for me. It does not disable the

Re: [PATCH] SVM: do not generate external interrupt exit if other exit is pending

2010-09-20 Thread Gleb Natapov
On Sun, Sep 19, 2010 at 08:19:33PM +0200, Joerg Roedel wrote: On Sun, Sep 19, 2010 at 07:50:27PM +0200, Gleb Natapov wrote: On Sun, Sep 19, 2010 at 07:29:41PM +0200, Joerg Roedel wrote: On Sun, Sep 19, 2010 at 06:41:27PM +0200, Gleb Natapov wrote: Nested SVM checks for external interrupt

Re: [RFC PATCH v9 12/16] Add mp(mediate passthru) device.

2010-09-20 Thread xiaohui . xin
From: Xin Xiaohui xiaohui@intel.com --- Michael, I have move the ioctl to configure the locked memory to vhost and check the limit with mm-locked_vm. please have a look. Thanks Xiaohui drivers/vhost/mpassthru.c | 74 +-- drivers/vhost/net.c

[PATCHv2] SVM: do not generate external interrupt exit if other exit is pending

2010-09-20 Thread Gleb Natapov
Nested SVM checks for external interrupt after injecting nested exception. In case there is external interrupt pending the code generates external interrupt exit and overwrites previous exit info. If previously injected exception already generated exit it will be lost. Signed-off-by: Gleb Natapov

Re: [PATCHv2] SVM: do not generate external interrupt exit if other exit is pending

2010-09-20 Thread Roedel, Joerg
On Mon, Sep 20, 2010 at 04:15:32AM -0400, Gleb Natapov wrote: Nested SVM checks for external interrupt after injecting nested exception. In case there is external interrupt pending the code generates external interrupt exit and overwrites previous exit info. If previously injected exception

Re: [PATCH 22/24] Correct handling of idt vectoring info

2010-09-20 Thread Gleb Natapov
On Mon, Sep 20, 2010 at 08:37:04AM +0200, Nadav Har'El wrote: Why can't you do that using existing exception/nmi/interrupt queues that we have, but instead you effectively disable vmx_complete_interrupts() by patch 18 when in nested mode and add logically same code in this patch. I.e after

Re: [PATCH trace-cmd] plugin_kvm: disassemble instructions for kvm_emulate_insn

2010-09-20 Thread Avi Kivity
On 09/19/2010 04:33 PM, Avi Kivity wrote: Override kvm_emulate_insn formatting to use a disassembler to format the emulated instruction. If a disassembler (udis86) is not available, fall back to showing the instruction bytes in hex. Signed-off-by: Avi Kivitya...@redhat.com --- Note 1: on top

Re: [PATCH 22/24] Correct handling of idt vectoring info

2010-09-20 Thread Nadav Har'El
On Mon, Sep 20, 2010, Gleb Natapov wrote about Re: [PATCH 22/24] Correct handling of idt vectoring info: But your code disables normal path even if L0 is the one who should handle exit and re-inject event into L2. Look at what nested SVM is doing. It is checking in handle_exit() if vmexit

Re: [PATCH 22/24] Correct handling of idt vectoring info

2010-09-20 Thread Avi Kivity
On 09/20/2010 12:03 PM, Nadav Har'El wrote: On Mon, Sep 20, 2010, Gleb Natapov wrote about Re: [PATCH 22/24] Correct handling of idt vectoring info: But your code disables normal path even if L0 is the one who should handle exit and re-inject event into L2. Look at what nested SVM is

Re: [PATCH 22/24] Correct handling of idt vectoring info

2010-09-20 Thread Gleb Natapov
On Mon, Sep 20, 2010 at 12:03:40PM +0200, Nadav Har'El wrote: On Mon, Sep 20, 2010, Gleb Natapov wrote about Re: [PATCH 22/24] Correct handling of idt vectoring info: But your code disables normal path even if L0 is the one who should handle exit and re-inject event into L2. Look at what

[PATCH] Remove qemu-kvm-helper.c

2010-09-20 Thread Avi Kivity
No longer used. Signed-off-by: Avi Kivity a...@redhat.com --- qemu-kvm-helper.c | 35 --- 1 files changed, 0 insertions(+), 35 deletions(-) delete mode 100644 qemu-kvm-helper.c diff --git a/qemu-kvm-helper.c b/qemu-kvm-helper.c deleted file mode 100644 index

[PATCH v2] Remove qemu-kvm-helper.c

2010-09-20 Thread Avi Kivity
No longer used. Signed-off-by: Avi Kivity a...@redhat.com --- v2: update Makefile Makefile.target |1 - qemu-kvm-helper.c | 35 --- 2 files changed, 0 insertions(+), 36 deletions(-) delete mode 100644 qemu-kvm-helper.c diff --git a/Makefile.target

Re: [RFC PATCH v9 12/16] Add mp(mediate passthru) device.

2010-09-20 Thread Michael S. Tsirkin
On Mon, Sep 20, 2010 at 04:08:48PM +0800, xiaohui@intel.com wrote: From: Xin Xiaohui xiaohui@intel.com --- Michael, I have move the ioctl to configure the locked memory to vhost It's ok to move this to vhost but vhost does not know how much memory is needed by the backend. So I

Re: [PATCHv2] vhost-net: add dhclient work-around from userspace

2010-09-20 Thread xming
Hi, I think I am hitting this, in a weird way :D. Running 0.12.90, vhost_net and kernel 2.6.35.4, I have troubles to get dhcp clients to work except an old dhcp client pump seems to work out of the box. Below are the output of dhcpcd, isc's dhcp client and busybox' udhcpc. My dhcp server is in a

Re: Tracing KVM with Systemtap

2010-09-20 Thread Rayson Ho
On Wed, 2010-09-08 at 15:08 +0100, Stefan Hajnoczi wrote: Hi Rayson, For the KVM kernel module Linux trace events are already used. For example, see arch/x86/kvm/trace.h and check out /sys/kernel/debug/tracing/events/kvm/*. There is a set of useful static trace points for vm_exit/vm_enter,

Re: .img on nfs, relative on ram, consuming mass ram

2010-09-20 Thread TOURNIER Frédéric
Heres my benches, done in two days so dates are weird and results are very approximative. What surprises me are in the Part 2, swap occured. In 3 and 4, the ram is eaten up, even if the vm just booted. Part 0 End of boot : bash-3.1$ free total

Re: Tracing KVM with Systemtap

2010-09-20 Thread Stefan Hajnoczi
On Mon, Sep 20, 2010 at 2:19 PM, Rayson Ho r...@redhat.com wrote: On Wed, 2010-09-08 at 15:08 +0100, Stefan Hajnoczi wrote: Hi Rayson, For the KVM kernel module Linux trace events are already used.  For example, see arch/x86/kvm/trace.h and check out /sys/kernel/debug/tracing/events/kvm/*.  

Re: .img on nfs, relative on ram, consuming mass ram

2010-09-20 Thread Andre Przywara
TOURNIER Frédéric wrote: Heres my benches, done in two days so dates are weird and results are very approximative. What surprises me are in the Part 2, swap occured. I don't know exactly why, but I have seen a small usage of swap occasionally without real memory pressure. So I'd consider this

[PATCH 1/2] KVM: fix the description of kvm-amd.nested in documentation

2010-09-20 Thread Xiao Guangrong
The default state of 'kvm-amd.nested' is enabled now, so fix the documentation Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com --- Documentation/kernel-parameters.txt |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/Documentation/kernel-parameters.txt

[PATCH 2/2] KVM: document 'kvm.mmu_audit' parameter

2010-09-20 Thread Xiao Guangrong
Document this parameter into Documentation/kernel-parameters.txt Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com --- Documentation/kernel-parameters.txt |4 1 files changed, 4 insertions(+), 0 deletions(-) diff --git a/Documentation/kernel-parameters.txt

[PATCH 1/4] KVM: MMU: rename 'sp-root_count' to 'sp-active_count'

2010-09-20 Thread Xiao Guangrong
Now, sp-root_count is only used by the root sp, in the later patch, we will increase it to keep unsync sp alive while it's out of 'kvm-mmu_lock''s protection, so rename the name to fits its use Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com --- arch/x86/include/asm/kvm_host.h |

[PATCH 2/4] KVM: MMU: support unsync sp out of the protection of 'mmu_lock'

2010-09-20 Thread Xiao Guangrong
It allows keep unsync sp alive while it's out of the protection, later we can use kvm_mmu_free_page() to free it if !sp-active_count Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com --- arch/x86/kvm/mmu.c | 16 ++-- 1 files changed, 10 insertions(+), 6 deletions(-) diff

[PATCH 3/4] KVM: MMU: move reserved bits check to FNAME(update_pte)

2010-09-20 Thread Xiao Guangrong
Move reserved bits check then invlpg path can use it Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com --- arch/x86/kvm/mmu.c |3 --- arch/x86/kvm/paging_tmpl.h |4 2 files changed, 4 insertions(+), 3 deletions(-) diff --git a/arch/x86/kvm/mmu.c

[PATCH 4/4] KVM: MMU: Don't touch unsync sp in kvm_mmu_pte_write()

2010-09-20 Thread Xiao Guangrong
Gfn may have many shadow pages, when one sp need be synced, we write protected sp-gfn and sync this sp but we keep other shadow pages asynchronous So, while gfn happen page fault, let it not touches unsync page, the unsync page only updated at invlpg/flush TLB time Signed-off-by: Xiao Guangrong

[PATCH 1/9] msix: avoid leaking kvm data on init failure

2010-09-20 Thread Avi Kivity
Move initialization after we're certain to succeed, so we don't leak memory on failure. Signed-off-by: Avi Kivity a...@redhat.com --- hw/msix.c | 13 +++-- 1 files changed, 7 insertions(+), 6 deletions(-) diff --git a/hw/msix.c b/hw/msix.c index 3dd0456..312439a 100644 --- a/hw/msix.c

[PATCH 2/9] msix: make kvm specific initialization a function

2010-09-20 Thread Avi Kivity
Signed-off-by: Avi Kivity a...@redhat.com --- hw/msix.c | 19 +-- 1 files changed, 13 insertions(+), 6 deletions(-) diff --git a/hw/msix.c b/hw/msix.c index 312439a..2e2ce5a 100644 --- a/hw/msix.c +++ b/hw/msix.c @@ -48,6 +48,17 @@ int msix_supported; #ifdef CONFIG_KVM /*

[PATCH 4/9] msix: move definitions from msix.c to msix.h

2010-09-20 Thread Avi Kivity
This allows us to reuse them from the kvm support code. Signed-off-by: Avi Kivity a...@redhat.com --- hw/msix.c | 27 --- hw/msix.h | 26 ++ 2 files changed, 26 insertions(+), 27 deletions(-) diff --git a/hw/msix.c b/hw/msix.c index

[PATCH 3/9] msix: move kvm specific msix notify into a function

2010-09-20 Thread Avi Kivity
Signed-off-by: Avi Kivity a...@redhat.com --- hw/msix.c | 19 +++ 1 files changed, 15 insertions(+), 4 deletions(-) diff --git a/hw/msix.c b/hw/msix.c index 2e2ce5a..d762870 100644 --- a/hw/msix.c +++ b/hw/msix.c @@ -159,6 +159,18 @@ static void kvm_msix_del(PCIDevice *dev,

[PATCH 6/9] msix: move kvm support functions to kvm-all.c and kvm-stub.c

2010-09-20 Thread Avi Kivity
This removes the dependency on CONFIG_KVM. Signed-off-by: Avi Kivity a...@redhat.com --- hw/msix.c | 137 kvm-all.c | 124 ++ kvm-stub.c | 28 kvm.h | 16

[PATCH 9/9] Move msix.o build back to Makefile.objs

2010-09-20 Thread Avi Kivity
Now that hw/msix.c does not depend on CONFIG_KVM, remove it from Makefile.target and put it back in Makefile.objs. Signed-off-by: Avi Kivity a...@redhat.com --- Makefile.objs |4 +--- Makefile.target |4 2 files changed, 1 insertions(+), 7 deletions(-) diff --git a/Makefile.objs

[PATCH 7/9] msix: Move kvm_enabled() guards to kvm-all.c functions

2010-09-20 Thread Avi Kivity
Simplifies the msix code. Signed-off-by: Avi Kivity a...@redhat.com --- hw/msix.c | 22 -- kvm-all.c | 18 ++ kvm-stub.c |2 +- 3 files changed, 27 insertions(+), 15 deletions(-) diff --git a/hw/msix.c b/hw/msix.c index bdec0b3..fc4cbb1 100644 ---

[PATCH 5/9] Add missing #include to hw/irq.h

2010-09-20 Thread Avi Kivity
Needs qemu-common.h for qemu_irq. Signed-off-by: Avi Kivity a...@redhat.com --- hw/irq.h |2 ++ 1 files changed, 2 insertions(+), 0 deletions(-) diff --git a/hw/irq.h b/hw/irq.h index 5daae44..e9f0542 100644 --- a/hw/irq.h +++ b/hw/irq.h @@ -1,6 +1,8 @@ #ifndef QEMU_IRQ_H #define

[PATCH 0/9] msix/kvm integration cleanups

2010-09-20 Thread Avi Kivity
This cleans up msix/kvm integration a bit. The really important patch is the last one, which allows msix.o to be part of non-target-specific build. Avi Kivity (9): msix: avoid leaking kvm data on init failure msix: make kvm specific initialization a function msix: move kvm specific msix

[PATCH 8/9] Protect qemu-kvm.h declarations with NEED_CPU_H

2010-09-20 Thread Avi Kivity
Target-specific definitions need to be qualified with NEED_CPU_H so kvm.h can be included from non-target-specific files. Signed-off-by: Avi Kivity a...@redhat.com --- kvm-stub.c |1 + qemu-kvm.h | 21 - 2 files changed, 21 insertions(+), 1 deletions(-) diff --git

Re: [PATCH 2/4] KVM: MMU: support unsync sp out of the protection of 'mmu_lock'

2010-09-20 Thread Avi Kivity
On 09/20/2010 04:19 PM, Xiao Guangrong wrote: It allows keep unsync sp alive while it's out of the protection, later we can use kvm_mmu_free_page() to free it if !sp-active_count Don't understand. Of course unsync pages exist outside mmu_lock...? diff --git a/arch/x86/kvm/mmu.c

Re: [PATCH 4/4] KVM: MMU: Don't touch unsync sp in kvm_mmu_pte_write()

2010-09-20 Thread Avi Kivity
On 09/20/2010 04:21 PM, Xiao Guangrong wrote: Gfn may have many shadow pages, when one sp need be synced, we write protected sp-gfn and sync this sp but we keep other shadow pages asynchronous So, while gfn happen page fault, let it not touches unsync page, the unsync page only updated at

Re: .img on nfs, relative on ram, consuming mass ram

2010-09-20 Thread TOURNIER Frédéric
On Mon, 20 Sep 2010 16:00:53 +0200 Andre Przywara andre.przyw...@amd.com wrote: TOURNIER Frédéric wrote: Heres my benches, done in two days so dates are weird and results are very approximative. What surprises me are in the Part 2, swap occured. I don't know exactly why, but I have seen

Re: [KVM timekeeping fixes 4/4] TSC catchup mode

2010-09-20 Thread Marcelo Tosatti
On Sat, Sep 18, 2010 at 02:38:15PM -1000, Zachary Amsden wrote: Negate the effects of AN TYM spell while kvm thread is preempted by tracking conversion factor to the highest TSC rate and catching the TSC up when it has fallen behind the kernel view of time. Note that once triggered, we don't

Re: [KVM timekeeping fixes 1/4] Fix kvmclock bug

2010-09-20 Thread Marcelo Tosatti
On Sat, Sep 18, 2010 at 02:38:12PM -1000, Zachary Amsden wrote: If preempted after kvmclock values are updated, but before hardware virtualization is entered, the last tsc time as read by the guest is never set. It underflows the next time kvmclock is updated if there has not yet been a

Re: [PATCH] Add RAM - physical addr mapping in MCE simulation

2010-09-20 Thread Marcelo Tosatti
On Sun, Sep 19, 2010 at 09:00:33AM +0800, Huang Ying wrote: In QEMU-KVM, physical address != RAM address. While MCE simulation needs physical address instead of RAM address. So kvm_physical_memory_addr_from_ram() is implemented to do the conversion, and it is invoked before being filled in the

KVM call agenda for Sept 21

2010-09-20 Thread Chris Wright
Please send in any agenda items you are interested in covering. thanks, -chris -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: KVM call agenda for Sept 21

2010-09-20 Thread Avi Kivity
On 09/20/2010 06:44 PM, Chris Wright wrote: Please send in any agenda items you are interested in covering. nested vmx: the resurrection. Nice to see it progressing again, but there's still a lot of ground to cover. Perhaps we can involve Intel to speed things up? -- error compiling

Re: [PATCH 4/9] msix: move definitions from msix.c to msix.h

2010-09-20 Thread Michael S. Tsirkin
On Mon, Sep 20, 2010 at 05:06:45PM +0200, Avi Kivity wrote: This allows us to reuse them from the kvm support code. Signed-off-by: Avi Kivity a...@redhat.com I would rather all dealings with MSI-X table stayed in one place. All we need is just the entry, so let's add APIs to retrieve MSIX

Re: [PATCH 0/9] msix/kvm integration cleanups

2010-09-20 Thread Michael S. Tsirkin
On Mon, Sep 20, 2010 at 05:06:41PM +0200, Avi Kivity wrote: This cleans up msix/kvm integration a bit. The really important patch is the last one, which allows msix.o to be part of non-target-specific build. I actually thoought this later move should be done in a different way: - add all

Re: [PATCH 8/9] Protect qemu-kvm.h declarations with NEED_CPU_H

2010-09-20 Thread Michael S. Tsirkin
On Mon, Sep 20, 2010 at 05:06:49PM +0200, Avi Kivity wrote: Target-specific definitions need to be qualified with NEED_CPU_H so kvm.h can be included from non-target-specific files. Signed-off-by: Avi Kivity a...@redhat.com Long term, would be cleaner to split this into two files ... ---

Re: [PATCH 3/4] KVM: VMX: Emulated real mode interrupt injection

2010-09-20 Thread Marcelo Tosatti
On Sun, Sep 19, 2010 at 02:34:07PM +0200, Avi Kivity wrote: From: Mohammed Gamal m.gamal...@gmail.com Replace the inject-as-software-interrupt hack we currently have with emulated injection. Signed-off-by: Mohammed Gamal m.gamal...@gmail.com Signed-off-by: Avi Kivity a...@redhat.com ---

[GIT PULL net-2.6] vhost-net: fix range checking

2010-09-20 Thread Michael S. Tsirkin
David, The following tree includes a bugfix for vhost-net. It is on top of net-2.6. Please merge it for 2.6.36. Thanks! The following changes since commit 053d8f6622701f849fda2ca2c9ae596c13599ba9: Merge branch 'vhost-net' of git://git.kernel.org/pub/scm/linux/kernel/git/mst/vhost (2010-09-09

Re: [GIT PULL net-2.6] vhost-net: fix range checking

2010-09-20 Thread David Miller
From: Michael S. Tsirkin m...@redhat.com Date: Mon, 20 Sep 2010 19:42:22 +0200 git://git.kernel.org/pub/scm/linux/kernel/git/mst/vhost.git vhost-net Pulled, thanks! -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More

Re: [PATCH trace-cmd] plugin_kvm: disassemble instructions for kvm_emulate_insn

2010-09-20 Thread Steven Rostedt
On Mon, 2010-09-20 at 11:51 +0200, Avi Kivity wrote: On 09/19/2010 04:33 PM, Avi Kivity wrote: Override kvm_emulate_insn formatting to use a disassembler to format the emulated instruction. If a disassembler (udis86) is not available, fall back to showing the instruction bytes in hex.

Re: [PATCH] KVM: Convert PIC lock from raw spinlock to ordinary spinlock

2010-09-20 Thread Marcelo Tosatti
On Sun, Sep 19, 2010 at 06:44:07PM +0200, Avi Kivity wrote: The PIC code used to be called from preempt_disable() context, which wasn't very good for PREEMPT_RT. That is no longer the case, so move back from raw_spinlock_t to spinlock_t. Signed-off-by: Avi Kivity a...@redhat.com ---

Re: [PATCH v2] Remove qemu-kvm-helper.c

2010-09-20 Thread Marcelo Tosatti
On Mon, Sep 20, 2010 at 01:01:50PM +0200, Avi Kivity wrote: No longer used. Signed-off-by: Avi Kivity a...@redhat.com --- v2: update Makefile Makefile.target |1 - qemu-kvm-helper.c | 35 --- 2 files changed, 0 insertions(+), 36 deletions(-)

Re: [PATCHv2] SVM: do not generate external interrupt exit if other exit is pending

2010-09-20 Thread Marcelo Tosatti
On Mon, Sep 20, 2010 at 10:15:32AM +0200, Gleb Natapov wrote: Nested SVM checks for external interrupt after injecting nested exception. In case there is external interrupt pending the code generates external interrupt exit and overwrites previous exit info. If previously injected exception

Re: [PATCH 0/2] unit-tests: Add tests to measure svm instruction latencys

2010-09-20 Thread Marcelo Tosatti
On Sun, Sep 19, 2010 at 03:56:49PM +0200, Joerg Roedel wrote: Hi, here are two patches for the svm unit-test framework that measure the latency of the emulated vmrun, vmload, and vmsave instructions as well as the latency of emulated vmexits. On my Phenom II X6 1090T running in P0 it

Re: [PATCH] kvm: fix irqfd assign/deassign race

2010-09-20 Thread Marcelo Tosatti
On Sun, Sep 19, 2010 at 07:02:31PM +0200, Michael S. Tsirkin wrote: I think I see the following (theoretical) race: During irqfd assign, we drop irqfds lock before we schedule inject work. Therefore, deassign running on another CPU could cause shutdown and flush to run before inject,

Re: KVM call agenda for Sept 21

2010-09-20 Thread Michael S. Tsirkin
On Mon, Sep 20, 2010 at 06:50:55PM +0200, Avi Kivity wrote: On 09/20/2010 06:44 PM, Chris Wright wrote: Please send in any agenda items you are interested in covering. nested vmx: the resurrection. Nice to see it progressing again, but there's still a lot of ground to cover. Perhaps we

Re: KVM call agenda for Sept 21

2010-09-20 Thread Anthony Liguori
On 09/20/2010 02:15 PM, Michael S. Tsirkin wrote: On Mon, Sep 20, 2010 at 06:50:55PM +0200, Avi Kivity wrote: On 09/20/2010 06:44 PM, Chris Wright wrote: Please send in any agenda items you are interested in covering. nested vmx: the resurrection. Nice to see it

Re: [PATCHv2] vhost-net: add dhclient work-around from userspace

2010-09-20 Thread Michael S. Tsirkin
On Mon, Sep 20, 2010 at 02:12:40PM +0200, xming wrote: Hi, I think I am hitting this, in a weird way :D. Running 0.12.90, vhost_net and kernel 2.6.35.4, I have troubles to get dhcp clients to work except an old dhcp client pump seems to work out of the box. Below are the output of dhcpcd,

Re: [PATCH 1/2] KVM: fix the description of kvm-amd.nested in documentation

2010-09-20 Thread Marcelo Tosatti
On Mon, Sep 20, 2010 at 10:16:45PM +0800, Xiao Guangrong wrote: The default state of 'kvm-amd.nested' is enabled now, so fix the documentation Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com --- Documentation/kernel-parameters.txt |2 +- 1 files changed, 1 insertions(+), 1

Re: cpu hotplug

2010-09-20 Thread Kevin O'Connor
On Mon, Sep 20, 2010 at 08:50:17AM +0200, Gleb Natapov wrote: On Sun, Sep 19, 2010 at 06:03:31PM -0400, Kevin O'Connor wrote: I was wrong. The cpu_set x offline does send an event to the guest OS. SeaBIOS even forwards the event along - as far as I can tell a Notify(CPxx, 3) event is

Re: [KVM timekeeping fixes 4/4] TSC catchup mode

2010-09-20 Thread Zachary Amsden
On 09/20/2010 05:38 AM, Marcelo Tosatti wrote: On Sat, Sep 18, 2010 at 02:38:15PM -1000, Zachary Amsden wrote: Negate the effects of AN TYM spell while kvm thread is preempted by tracking conversion factor to the highest TSC rate and catching the TSC up when it has fallen behind the kernel

RE: [RFC PATCH v9 12/16] Add mp(mediate passthru) device.

2010-09-20 Thread Xin, Xiaohui
From: Michael S. Tsirkin [mailto:m...@redhat.com] Sent: Monday, September 20, 2010 7:37 PM To: Xin, Xiaohui Cc: net...@vger.kernel.org; kvm@vger.kernel.org; linux-ker...@vger.kernel.org; mi...@elte.hu; da...@davemloft.net; herb...@gondor.hengli.com.au; jd...@linux.intel.com Subject: Re: [RFC PATCH

[PATCH 0/2] Make all linux guests to use cdrom instead of floppy to hold answer file

2010-09-20 Thread Lucas Meneghel Rodrigues
This patchset contains a lot of much needed cleanups for the unattended install setup code. As the final user visible result, it is now possible to use both floppy as cdrom to hold the kickstart/autoyast file (cdrom default). Lucas Meneghel Rodrigues (2): KVM test: Cleaning up

[PATCH 1/2] KVM test: Cleaning up scripts/unattended.py

2010-09-20 Thread Lucas Meneghel Rodrigues
Over the months, scripts/unattended.py received a lot of expansions, which made code difficult to read and understand. This patch gives some much needed cleanup to the code: * Configuration key variables are directly translated to class attributes, making up for shorter, cleaner code * All non

RE: KVM call agenda for Sept 21

2010-09-20 Thread Nakajima, Jun
Avi Kivity wrote on Mon, 20 Sep 2010 at 09:50:55: On 09/20/2010 06:44 PM, Chris Wright wrote: Please send in any agenda items you are interested in covering. nested vmx: the resurrection. Nice to see it progressing again, but there's still a lot of ground to cover. Perhaps we can