[PATCH] KVM: MMU: optimize set_spte for page sync

2008-11-26 Thread Avi Kivity
From: Marcelo Tosatti [EMAIL PROTECTED] The write protect verification in set_spte is unnecessary for page sync. Its guaranteed that, if the unsync spte was writable, the target page does not have a write protected shadow (if it had, the spte would have been write protected under mmu_lock by

[PATCH] kvm: external module: backward compatibility for msidef.h

2008-11-26 Thread Avi Kivity
From: Avi Kivity [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] diff --git a/kernel/include-compat/asm-x86/msidef.h b/kernel/include-compat/asm-x86/msidef.h new file mode 100644 index 000..6706b30 --- /dev/null +++ b/kernel/include-compat/asm-x86/msidef.h @@ -0,0 +1,55 @@

[PATCH] kvm: qemu: Fix apic -no-kvm with SMP

2008-11-26 Thread Avi Kivity
From: Jan Kiszka [EMAIL PROTECTED] Fix condition for the !kvm_enabled() case. Signed-off-by: Jan Kiszka [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] diff --git a/qemu/hw/apic.c b/qemu/hw/apic.c index 8836784..6657276 100644 --- a/qemu/hw/apic.c +++ b/qemu/hw/apic.c @@ -436,7

[PATCH] KVM: Move ack notifier register and IRQ sourcd ID request

2008-11-26 Thread Avi Kivity
From: Sheng Yang [EMAIL PROTECTED] Distinguish common part for device assignment and INTx part, perparing for refactor later. Signed-off-by: Sheng Yang [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c index 4727c08..8966fd1

[PATCH] KVM: Add assigned_device_msi_dispatch()

2008-11-26 Thread Avi Kivity
From: Sheng Yang [EMAIL PROTECTED] The function is used to dispatch MSI to lapic according to MSI message address and message data. Signed-off-by: Sheng Yang [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c index

[PATCH] KVM: Add fields for MSI device assignment

2008-11-26 Thread Avi Kivity
From: Sheng Yang [EMAIL PROTECTED] Prepared for kvm_arch_assigned_device_msi_dispatch(). Signed-off-by: Sheng Yang [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] diff --git a/include/linux/kvm.h b/include/linux/kvm.h index 44fd7fa..bb283c3 100644 --- a/include/linux/kvm.h +++

[PATCH] kvm: testsuite: Fix halt callback

2008-11-26 Thread Avi Kivity
From: Jan Kiszka [EMAIL PROTECTED] Change halt callback in testsuite to conform with latest refactorings. Signed-off-by: Jan Kiszka [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] diff --git a/user/main.c b/user/main.c index 70c1da2..dceec99 100644 --- a/user/main.c +++

[PATCH] KVM: Enable MSI for device assignment

2008-11-26 Thread Avi Kivity
From: Sheng Yang [EMAIL PROTECTED] We enable guest MSI and host MSI support in this patch. The userspace want to enable MSI should set KVM_DEV_IRQ_ASSIGN_ENABLE_MSI in the assigned_irq's flag. Function would return -ENOTTY if can't enable MSI, userspace shouldn't set MSI Enable bit when

[PATCH] x86: KVM guest: sign kvmclock as paravirt

2008-11-26 Thread Avi Kivity
From: Glauber Costa [EMAIL PROTECTED] Currently, we only set the KVM paravirt signature in case of CONFIG_KVM_GUEST. However, it is possible to have it turned off, while CONFIG_KVM_CLOCK is turned on. This is also a paravirt case, and should be shown accordingly. Signed-off-by: Glauber Costa

[PATCH] KVM: Separate update irq to a single function

2008-11-26 Thread Avi Kivity
From: Sheng Yang [EMAIL PROTECTED] Separate INTx enabling part to a independence function, so that we can add MSI enabling part easily. Signed-off-by: Sheng Yang [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c index

[PATCH] KVM: x86 emulator: reduce duplication in one operand emulation thunks

2008-11-26 Thread Avi Kivity
From: Avi Kivity [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] diff --git a/arch/x86/kvm/x86_emulate.c b/arch/x86/kvm/x86_emulate.c index 8f60ace..5f87d3e 100644 --- a/arch/x86/kvm/x86_emulate.c +++ b/arch/x86/kvm/x86_emulate.c @@ -359,6 +359,12 @@ static u16 group2_table[] = {

[PATCH] kvm: external module: fix to work with 2.6.28 kernel

2008-11-26 Thread Avi Kivity
From: Mark McLoughlin [EMAIL PROTECTED] If you run header-sync against a kernel which has asm/kvm.h but not e.g. asm/vmx.h then $(wildcard $(headers-new)) returns a string with expanded kvm.h path and the vmx.h glob removed. We then pass the original globs to rsync causing that to fail when vmx.h

Re: [PATCH 1/2] PCI: allow pci driver to support only dynids

2008-11-26 Thread Jean Delvare
Hi Chris, On Tue, 25 Nov 2008 19:36:10 -0800, Chris Wright wrote: commit b41d6cf38e27 (PCI: Check dynids driver_data value for validity) requires all drivers to include an id table to try and match driver_data. Before validating driver_data check driver has an id table. Sorry for missing

Re: [PATCH 0/9][v6] Enable MSI for KVM

2008-11-26 Thread Avi Kivity
Sheng Yang wrote: Hi MSI patchset v6 is coming... v5-v6 Addressed all comments from Avi on v5. I also set msi2intx=0 in non-x86 architecture machines. Applied all, thanks. -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line

Re: [PATCH] Add KVM version to monitor info version

2008-11-26 Thread Daniel P. Berrange
On Wed, Nov 26, 2008 at 11:22:03AM +0100, Bj?rn Mork wrote: Trying to track the current KVM head as closely as possible, I often find myself wondering which KVM version a particular guest instance is running. The attached patch adds this information to the monitor command info version:

Re: [PATCH] kvm-userspace: Cleanup user space NMI injection

2008-11-26 Thread Avi Kivity
Jan Kiszka wrote: Cleanup redundant check for an open NMI window before injecting. This will no longer be supported by the kernel, and it was broken by design anyway. This change still allows to run the user space against older kernel modules. Hm. For interrupts we need to check, since

[PATCH] markers: comment usage of marker_synchronize_unregister()

2008-11-26 Thread Wu Fengguang
Add more comments to marker_synchronize_unregister() in order to reduce the chance of misusing. Based on comments from Lai Jiangshan [EMAIL PROTECTED]. Cc: Lai Jiangshan [EMAIL PROTECTED] Cc: Mathieu Desnoyers [EMAIL PROTECTED] Signed-off-by: Wu Fengguang [EMAIL PROTECTED] --- I'm still not

Re: Weekly KVM Test report, kernel 30d95f ... userspace fc94d1 ...

2008-11-26 Thread Avi Kivity
Xu, Jiajun wrote: The call trace messages in guest: ### Kernel BUG at block/elevator.c:560 invalid opcode: [1] SMP last sysfs file: /block/hda/removable This suggests something happened to /dev/hda. Could be a timeout or something. Are there any messages in the log

Re: [Patch 4/5] x86_emulator: add the assembler code for three operands

2008-11-26 Thread Avi Kivity
Guillaume Thouvenin wrote: It's the only code with shld instruction. I don't see how you can have three different shld instructions here. I'm sure that I'm missing something here because for me, when we emulate the shld instruction, the code produced is the same. I mean that src.val and dst.val

Re: Host-guest channel interface advice needed

2008-11-26 Thread Arnd Bergmann
On Wednesday 26 November 2008, Gleb Natapov wrote: The interfaces that are being considered are netlink socket (only datagram semantics, linux specific), new socket family or character device with different minor number for each channel. Which one better suits for the purpose?  Is there other

[PATCH 0/2] two refcount and leak fixes for kvm on s390

2008-11-26 Thread Christian Borntraeger
Hello Avi, here are two fixes for kvm on s390. [PATCH 1/2] kvm-s390: Fix refcounting and allow module unload [PATCH 2/2] kvm-s390: Fix memory leak of vcpu-run None of the fixed problems is severe. So I guess this should be scheduled for the next merge window. Thanks Christian -- To

[PATCH 1/2] kvm-s390: Fix refcounting and allow module unload

2008-11-26 Thread Christian Borntraeger
From: Christian Borntraeger [EMAIL PROTECTED] Currently it is impossible to unload the kvm module on s390. This patch fixes kvm_arch_destroy_vm to release all cpus. This make it possible to unload the module. In addition we stop messing with the module refcount in arch code. Signed-off-by:

[PATCH 2/2] kvm-s390: Fix memory leak of vcpu-run

2008-11-26 Thread Christian Borntraeger
From: Christian Borntraeger [EMAIL PROTECTED] The s390 backend of kvm never calls kvm_vcpu_uninit. This causes a memory leak of vcpu-run pages. Lets call kvm_vcpu_uninit in kvm_arch_vcpu_destroy to free the vcpu-run. Signed-off-by: Christian Borntraeger [EMAIL PROTECTED] Acked-by: Carsten Otte

Re: [PATCH] kvm-userspace: fix module build with --kerneldir

2008-11-26 Thread Maik Hentsche
Avi Kivity [EMAIL PROTECTED] wrote: Can't the version be determined directly from kernedir itself? e.g. kerneldir is /lib/modules/$version/build? How do you get $version if you are crosscompiling? In this case the usual way of asking uname doesn't work. Instead you somehow need to get the

Re: [PATCH] Prevent trace call into unloaded module text

2008-11-26 Thread Wu Fengguang
On Wed, Nov 26, 2008 at 01:17:55PM +0200, Avi Kivity wrote: Wu Fengguang wrote: Add marker_synchronize_unregister() before module unloading. This prevents possible trace calls into unloaded module text. Signed-off-by: Wu Fengguang [EMAIL PROTECTED] --- diff --git a/virt/kvm/kvm_main.c

Re: [PATCH] Prevent trace call into unloaded module text

2008-11-26 Thread Wu Fengguang
On Wed, Nov 26, 2008 at 07:46:19PM +0800, Wu Fengguang wrote: On Wed, Nov 26, 2008 at 01:17:55PM +0200, Avi Kivity wrote: Wu Fengguang wrote: Add marker_synchronize_unregister() before module unloading. This prevents possible trace calls into unloaded module text. Signed-off-by: Wu

Re: [PATCH] Prevent trace call into unloaded module text

2008-11-26 Thread Avi Kivity
Wu Fengguang wrote: Add marker_synchronize_unregister() before module unloading. This prevents possible trace calls into unloaded module text. Signed-off-by: Wu Fengguang [EMAIL PROTECTED] --- diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c index a87f45e..64f38b3 100644 ---

Re: KVM: MMU: optimize set_spte for page sync

2008-11-26 Thread Avi Kivity
Marcelo Tosatti wrote: Here it goes. KVM: MMU: optimize set_spte for page sync The write protect verification in set_spte is unnecessary for page sync. Its guaranteed that, if the unsync spte was writable, the target page does not have a write protected shadow (if it had, the spte would have

Re: [PATCH] Add KVM version to monitor info version

2008-11-26 Thread Glauber Costa
On Wed, Nov 26, 2008 at 8:55 AM, Daniel P. Berrange [EMAIL PROTECTED] wrote: On Wed, Nov 26, 2008 at 11:22:03AM +0100, Bj?rn Mork wrote: Trying to track the current KVM head as closely as possible, I often find myself wondering which KVM version a particular guest instance is running. The

Re: [PATCH 2/2] KVM: Change to use new APIs for KVM VT-d

2008-11-26 Thread Avi Kivity
Han, Weidong wrote: This patch changes to use new APIs for KVM VT-d, and add device deassignment for hotplug. index 44fd7fa..558bc32 100644 --- a/include/linux/kvm.h +++ b/include/linux/kvm.h @@ -425,6 +425,8 @@ struct kvm_trace_rec { struct

[ kvm-Bugs-2215532 ] SMP IA32e RHEL5.1 guest can not boot up

2008-11-26 Thread SourceForge.net
Bugs item #2215532, was opened at 2008-11-01 22:58 Message generated for change (Comment added) made by jiajun You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2215532group_id=180599 Please note that this message will contain a full copy of the comment

[PATCH 4/5] kvm: qemu: virtio-net: split iov_fill() out from virtio_net_receive()

2008-11-26 Thread Mark McLoughlin
Simplifies the current code, but more especially, simplifies the implementation of the mergeable receive buffers scheme. Signed-off-by: Mark McLoughlin [EMAIL PROTECTED] --- qemu/hw/virtio-net.c | 27 ++- 1 files changed, 18 insertions(+), 9 deletions(-) diff --git

[PATCH 3/5] kvm: qemu: virtio: split some helpers out of virtqueue_pop()

2008-11-26 Thread Mark McLoughlin
The mergeable receive buffer scheme will introduce a new function which peeks at how much buffer space is available in the queue. Split out some helper functions from virtqueue_pop() for that purpose. Signed-off-by: Mark McLoughlin [EMAIL PROTECTED] --- qemu/hw/virtio.c | 45

[PATCH 1/5] kvm: qemu: virtio: move virtqueue_next_desc() around

2008-11-26 Thread Mark McLoughlin
virtio_next_desc() is only used in virtqueue_pop(), so move them alongside one another. Signed-off-by: Mark McLoughlin [EMAIL PROTECTED] --- qemu/hw/virtio.c | 30 +++--- 1 files changed, 15 insertions(+), 15 deletions(-) diff --git a/qemu/hw/virtio.c

[PATCH 5/5] kvm: qemu: virtio-net: add a new virtio-net receive buffer scheme

2008-11-26 Thread Mark McLoughlin
Currently, in order to receive large packets, the guest must allocate max-sized packet buffers and pass them to the host. Each of these max-sized packets occupy 20 ring entries, which means we can only transfer a maximum of 12 packets in a single batch with a 256 entry ring. When receiving

[PATCH 2/5] kvm: qemu: virtio: introduce virtqueue_fill() and virtqueue_flush()

2008-11-26 Thread Mark McLoughlin
Split virtqueue_push() into two logical steps - adding an element to the used ring and notifying the other side of added elements. This is needed because with the mergeable receive buffers scheme we will add buffers to the used ring as we copy the packet data into them but we only want to notify

[SR-IOV driver example 0/3] introduction

2008-11-26 Thread Yu Zhao
SR-IOV drivers of Intel 82576 NIC are available. There are two parts of the drivers: Physical Function driver and Virtual Function driver. The PF driver is based on the IGB driver and is used to control PF to allocate hardware specific resources and interface with the SR-IOV core. The VF driver is

Re: Host-guest channel interface advice needed

2008-11-26 Thread Gleb Natapov
On Wed, Nov 26, 2008 at 04:07:01PM +0300, Evgeniy Polyakov wrote: On Wed, Nov 26, 2008 at 02:39:19PM +0200, Gleb Natapov ([EMAIL PROTECTED]) wrote: The interfaces that are being considered are netlink socket (only datagram semantics, linux specific), new socket family or character device

[PATCH] Add KVM version to monitor info version

2008-11-26 Thread Bjørn Mork
Trying to track the current KVM head as closely as possible, I often find myself wondering which KVM version a particular guest instance is running. The attached patch adds this information to the monitor command info version: (qemu) info version 0.9.1 (kvm-79) Signed-off-by: Bjørn Mork

Host-guest channel interface advice needed

2008-11-26 Thread Gleb Natapov
Hello, I'd like to ask what would be the best user space interface for generic guest-host communication channel. The channel will be used to pass mouse events to/from a guest or by managements software to communicate with agents running in a guests or for something similar. The interfaces that

[SR-IOV driver example 1/3] PF driver: allocate hardware specific resource

2008-11-26 Thread Yu Zhao
This patch makes the IGB driver allocate hardware resource (rx/tx queues) for Virtual Functions. All operations in this patch are hardware specific. --- drivers/net/igb/Makefile|2 +- drivers/net/igb/e1000_82575.c |1 + drivers/net/igb/e1000_82575.h | 61

[SR-IOV driver example 2/3] PF driver: integrate with SR-IOV core

2008-11-26 Thread Yu Zhao
This patch integrates the IGB driver with the SR-IOV core. It shows how the SR-IOV API is used to support the capability. Obviously people does not need to put much effort to integrate the PF driver with SR-IOV core. All SR-IOV standard stuff are handled by SR-IOV core and PF driver only concerns

Re: [PATCH 1/2] PCI: allow pci driver to support only dynids

2008-11-26 Thread Chris Wright
* Jean Delvare ([EMAIL PROTECTED]) wrote: As a side note, I am curious what PCI driver we do have which has driver-probe defined but no driver-id_table. Did you hit an actual issue or are you fixing a theoretical one? Such a driver was patch 2/2. http://lkml.org/lkml/2008/11/26/11 It's meant

Using virtio drivers under Windows 2003 R2 SP2 guest

2008-11-26 Thread carlopmart
Hi all, Recently I have installed a ubuntu server to use as a virtual host. I need to install two Windows 2003 R2 SP2 guests on it, and I would like to use virtio drivers for networking but I see that these drivers only exists for Windows XP and Windows 2000, is it correct?? can I use it for

Re: Using virtio drivers under Windows 2003 R2 SP2 guest

2008-11-26 Thread Jorge Lucángeli Obes
On Wed, Nov 26, 2008 at 1:47 PM, carlopmart [EMAIL PROTECTED] wrote: Hi all, Recently I have installed a ubuntu server to use as a virtual host. I need to install two Windows 2003 R2 SP2 guests on it, and I would like to use virtio drivers for networking but I see that these drivers only

Re: [PATCH] kvm-userspace: fix module build with --kerneldir

2008-11-26 Thread Avi Kivity
Maik Hentsche wrote: If the user specified $kerneldir, it should be in the form /lib/modules/$version/build, no? Ah sorry, I did not know of this requirement. My kerneldir is /tmp/linux (I build inside chroot). I took it from the depmod manpage, but if you're building from

Re: [PATCH] kvm-userspace: Cleanup user space NMI injection

2008-11-26 Thread Avi Kivity
Jan Kiszka wrote: Hm. For interrupts we need to check, since the interrupt might be deasserted or masked while the window is closed. Is there no way that this can happen for NMIs? In our emulation, but I also think in real life, there is no way to deassert an NMI. Therefore, our user

Re: [PATCH] kvm: header-sync: fix to work with 2.6.28 kernel

2008-11-26 Thread Avi Kivity
Mark McLoughlin wrote: If you run header-sync against a kernel which has asm/kvm.h but not e.g. asm/vmx.h then $(wildcard $(headers-new)) returns a string with expanded kvm.h path and the vmx.h glob removed. We then pass the original globs to rsync causing that to fail when vmx.h can't be found:

[ kvm-Bugs-2351433 ] unhandled vm exit: 0x80000021 running UnixWare guest

2008-11-26 Thread SourceForge.net
Bugs item #2351433, was opened at 2008-11-26 17:39 Message generated for change (Tracker Item Submitted) made by Item Submitter You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2351433group_id=180599 Please note that this message will contain a full copy of

[ kvm-Bugs-2351433 ] unhandled vm exit: 0x80000021 running UnixWare guest

2008-11-26 Thread SourceForge.net
Bugs item #2351433, was opened at 2008-11-26 17:39 Message generated for change (Comment added) made by hughesj You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2351433group_id=180599 Please note that this message will contain a full copy of the comment

RE: Using virtio drivers under Windows 2003 R2 SP2 guest

2008-11-26 Thread Martin Maurer
Subject: Re: Using virtio drivers under Windows 2003 R2 SP2 guest On Wed, Nov 26, 2008 at 1:47 PM, carlopmart [EMAIL PROTECTED] wrote: Hi all, Recently I have installed a ubuntu server to use as a virtual host. I need to install two Windows 2003 R2 SP2 guests on it, and I would like

Re: [SR-IOV driver example 2/3] PF driver: integrate with SR-IOV core

2008-11-26 Thread Greg KH
On Wed, Nov 26, 2008 at 10:21:56PM +0800, Yu Zhao wrote: This patch integrates the IGB driver with the SR-IOV core. It shows how the SR-IOV API is used to support the capability. Obviously people does not need to put much effort to integrate the PF driver with SR-IOV core. All SR-IOV standard

Re: [SR-IOV driver example 3/3] VF driver tar ball

2008-11-26 Thread Greg KH
On Wed, Nov 26, 2008 at 10:40:43PM +0800, Yu Zhao wrote: The attachment is the VF driver for Intel 82576 NIC. Please don't attach things as tarballs, we can't review or easily read them at all. Care to resend it? thanks, greg k-h -- To unsubscribe from this list: send the line unsubscribe kvm

Re: [SR-IOV driver example 0/3] introduction

2008-11-26 Thread Greg KH
On Wed, Nov 26, 2008 at 10:03:03PM +0800, Yu Zhao wrote: SR-IOV drivers of Intel 82576 NIC are available. There are two parts of the drivers: Physical Function driver and Virtual Function driver. The PF driver is based on the IGB driver and is used to control PF to allocate hardware specific

Re: [SR-IOV driver example 2/3] PF driver: integrate with SR-IOV core

2008-11-26 Thread Chris Wright
* Greg KH ([EMAIL PROTECTED]) wrote: +static int +igb_virtual(struct pci_dev *pdev, int nr_virtfn) +{ + unsigned char my_mac_addr[6] = {0x00, 0xDE, 0xAD, 0xBE, 0xEF, 0xFF}; + struct net_device *netdev = pci_get_drvdata(pdev); + struct igb_adapter *adapter =

[ kvm-Bugs-2351676 ] Guests hang periodically on Ubuntu-8.10

2008-11-26 Thread SourceForge.net
Bugs item #2351676, was opened at 2008-11-26 12:59 Message generated for change (Tracker Item Submitted) made by Item Submitter You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2351676group_id=180599 Please note that this message will contain a full copy of

[ kvm-Bugs-2351433 ] unhandled vm exit: 0x80000021 running UnixWare guest

2008-11-26 Thread SourceForge.net
Bugs item #2351433, was opened at 2008-11-26 17:39 Message generated for change (Comment added) made by hughesj You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2351433group_id=180599 Please note that this message will contain a full copy of the comment

Re: [Qemu-devel] [PATCH 1/1] Virtio block device support

2008-11-26 Thread Hollis Blanchard
On Wed, 2008-11-26 at 12:11 -0600, Hollis Blanchard wrote: From: Anthony Liguori [EMAIL PROTECTED] Hmm, this is not my patch. :) Let me try again... -- Hollis Blanchard IBM Linux Technology Center -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to

[PATCH] Remove TARGET_PAGE_SIZE from virtio interface

2008-11-26 Thread Hollis Blanchard
TARGET_PAGE_SIZE should only be used internal to qemu, not in guest/host interfaces. The virtio frontend code in Linux uses two constants (PFN shift and vring alignment) for the interface, so update qemu to match. I've tested this with PowerPC KVM and confirmed that it fixes virtio problems when

Re: [Qemu-devel] [PATCH 2/2] Virtio block device support

2008-11-26 Thread Hollis Blanchard
On Tue, 2008-11-25 at 15:57 -0600, Anthony Liguori wrote: This has been posted before but I believe it now has addressed all outstanding concerns. I'd like to apply it if there are no objections. This patch adds virtio-blk support to QEMU. virtio-blk is a paravirtual disk controller that

Re: [PATCH] Remove TARGET_PAGE_SIZE from virtio interface

2008-11-26 Thread Hollis Blanchard
On Wed, 2008-11-26 at 12:22 -0600, Hollis Blanchard wrote: diff --git a/hw/virtio.h b/hw/virtio.h index 1df8f83..c23f38c 100644 --- a/hw/virtio.h +++ b/hw/virtio.h @@ -47,6 +47,11 @@ /* This means don't interrupt guest when buffer consumed. */ #define VRING_AVAIL_F_NO_INTERRUPT1

RE: [PATCH 1/2] VT-d: Support multiple device assignment for KVM

2008-11-26 Thread Yu, Fenghua
Avi Kivity wrote: Han, Weidong wrote: In order to support multiple device assignment for KVM, this patch does following main changes: - extend dmar_domain to own multiple devices from different iommus, use a bitmap of iommus to replace iommu pointer in dmar_domain. - add a flag

RE: [SR-IOV driver example 2/3] PF driver: integrate with SR-IOV core

2008-11-26 Thread Nakajima, Jun
On 11/26/2008 8:58:59 AM, Greg KH wrote: On Wed, Nov 26, 2008 at 10:21:56PM +0800, Yu Zhao wrote: This patch integrates the IGB driver with the SR-IOV core. It shows how the SR-IOV API is used to support the capability. Obviously people does not need to put much effort to integrate the PF

Re: [SR-IOV driver example 2/3] PF driver: integrate with SR-IOV core

2008-11-26 Thread Greg KH
On Wed, Nov 26, 2008 at 11:27:10AM -0800, Nakajima, Jun wrote: On 11/26/2008 8:58:59 AM, Greg KH wrote: On Wed, Nov 26, 2008 at 10:21:56PM +0800, Yu Zhao wrote: This patch integrates the IGB driver with the SR-IOV core. It shows how the SR-IOV API is used to support the capability.

Re: [SR-IOV driver example 0/3] introduction

2008-11-26 Thread Jeff Garzik
Yu Zhao wrote: SR-IOV drivers of Intel 82576 NIC are available. There are two parts of the drivers: Physical Function driver and Virtual Function driver. The PF driver is based on the IGB driver and is used to control PF to allocate hardware specific resources and interface with the SR-IOV core.

Re: [PATCH 1/2] PCI: allow pci driver to support only dynids

2008-11-26 Thread Jean Delvare
Hi Chris, On Wed, 26 Nov 2008 07:19:40 -0800, Chris Wright wrote: * Jean Delvare ([EMAIL PROTECTED]) wrote: As a side note, I am curious what PCI driver we do have which has driver-probe defined but no driver-id_table. Did you hit an actual issue or are you fixing a theoretical one?

[PATCH] markers: comment marker_synchronize_unregister() on data dependency

2008-11-26 Thread Wu Fengguang
[updated patch to include Documentation/markers.txt changes] Add document and comments on marker_synchronize_unregister(): it should be called before freeing resources that the probes depend on. Based on comments from Lai Jiangshan and Mathieu Desnoyers. Cc: Lai Jiangshan [EMAIL PROTECTED] Cc:

Re: [PATCH] markers: comment marker_synchronize_unregister() on data dependency

2008-11-26 Thread Lai Jiangshan
Wu Fengguang wrote: [updated patch to include Documentation/markers.txt changes] Add document and comments on marker_synchronize_unregister(): it should be called before freeing resources that the probes depend on. Based on comments from Lai Jiangshan and Mathieu Desnoyers. Cc: Lai

Re: [PATCH] markers: comment marker_synchronize_unregister() on data dependency

2008-11-26 Thread Wu Fengguang
On Thu, Nov 27, 2008 at 03:23:06AM +0200, Lai Jiangshan wrote: Wu Fengguang wrote: [updated patch to include Documentation/markers.txt changes] Add document and comments on marker_synchronize_unregister(): it should be called before freeing resources that the probes depend on. Based

[ kvm-Bugs-2327497 ] NFS copy makes guest network unstable

2008-11-26 Thread SourceForge.net
Bugs item #2327497, was opened at 2008-11-22 07:53 Message generated for change (Comment added) made by jiajun You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2327497group_id=180599 Please note that this message will contain a full copy of the comment

Re: [PATCH 5/5] kvm: expose MSI capability to guest

2008-11-26 Thread Sheng Yang
On Monday 24 November 2008 19:50:35 Sheng Yang wrote: Signed-off-by: Sheng Yang [EMAIL PROTECTED] Oh, hold this one for a moment... I don't want to deal with compatible problem of deliver msi_msg, so I would send out gsi-msi mapping patch and update the userspace patch. -- regards Yang,