[PATCH] Merge branch 'qemu-cvs'

2009-02-19 Thread Avi Kivity
From: Avi Kivity a...@redhat.com * qemu-cvs: Fix cpu_physical_memory_rw() for 64-bit I/O accesses Avoid running audio ctl's when vm is not running -- To unsubscribe from this list: send the line unsubscribe kvm-commits in the body of a message to majord...@vger.kernel.org More majordomo info

[PATCH] kvm: external module: backward compatibility for compound_head()

2009-02-19 Thread Avi Kivity
From: Avi Kivity a...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/kernel/external-module-compat-comm.h b/kernel/external-module-compat-comm.h index 6e9a90a..527ab58 100644 --- a/kernel/external-module-compat-comm.h +++ b/kernel/external-module-compat-comm.h @@ -734,3

[PATCH] KVM: MMU: remove redundant check in mmu_set_spte

2009-02-19 Thread Avi Kivity
From: Joerg Roedel joerg.roe...@amd.com The following code flow is unnecessary: if (largepage) was_rmapped = is_large_pte(*shadow_pte); else was_rmapped = 1; The is_large_pte() function will always evaluate to one here because the (largepage

Re: With -vnc option, can I still use ctrl+alt + n?

2009-02-19 Thread Neo Jia
On Wed, Feb 18, 2009 at 11:38 PM, Tomasz Chmielewski man...@wpkg.org wrote: Neo Jia schrieb: hi, I am trying kvm-84 and with -vnc option I can't use ctrl + alt + n key to get the qemu system console. Is there anyway to make this work? Use Qemu/KVM monitor and it's sendkey function. Sorry,

Re: With -vnc option, can I still use ctrl+alt + n?

2009-02-19 Thread Alexander Graf
On 19.02.2009, at 09:11, Neo Jia neo...@gmail.com wrote: On Wed, Feb 18, 2009 at 11:38 PM, Tomasz Chmielewski man...@wpkg.org wrote: Neo Jia schrieb: hi, I am trying kvm-84 and with -vnc option I can't use ctrl + alt + n key to get the qemu system console. Is there anyway to make this

Re: With -vnc option, can I still use ctrl+alt + n?

2009-02-19 Thread Dongsheng Song
2009/2/19 Alexander Graf ag...@suse.de: You could pass -monitor stdio to qemu. That gives you the monitor on the shell you started qemu from. So if I run kvm as daemon: kvm -name Linux-x64 -smp 2 -m 2048M -hda hda.img \ -cdrom ../../var/iso/debian-500-amd64-DVD-1.iso \ -net

Re: With -vnc option, can I still use ctrl+alt + n?

2009-02-19 Thread Neo Jia
On Thu, Feb 19, 2009 at 12:22 AM, Alexander Graf ag...@suse.de wrote: On 19.02.2009, at 09:11, Neo Jia neo...@gmail.com wrote: On Wed, Feb 18, 2009 at 11:38 PM, Tomasz Chmielewski man...@wpkg.org wrote: Neo Jia schrieb: hi, I am trying kvm-84 and with -vnc option I can't use ctrl + alt

qemu info registers doesn't match the one I saw from kgdb?

2009-02-19 Thread Neo Jia
hi, I am seeing something different between info registers from qemu monitor window vs. kgdb. This is a 32-bit Linux guest running on KVM-84. When I just break into the guest kernel with kgdb, I tried the follwoing commands: (qemu) info registers EAX=00010060 EBX=c0471e3c ECX=

Re: Houston, we have May 15, 1953 (says guest when host uses cpufreq, and dies)

2009-02-19 Thread Gerd Hoffmann
Anthony Liguori wrote: Are you suggesting that one should use cpufreq on a CPU without a constant tsc? Isn't this just asking for trouble? Depends on the (guest) clock source ;) tsc isn't going to do well obviously. kvmclock is designed to handle tsc frequency changes just fine. And with the

Re: Houston, we have May 15, 1953 (says guest when host uses cpufreq, and dies)

2009-02-19 Thread Tomasz Chmielewski
Gerd Hoffmann schrieb: Anthony Liguori wrote: Are you suggesting that one should use cpufreq on a CPU without a constant tsc? Isn't this just asking for trouble? Depends on the (guest) clock source ;) tsc isn't going to do well obviously. kvmclock is designed to handle tsc frequency

[PATCH 1/1] kvm: bios: make MMIO address page aligned in guest

2009-02-19 Thread Han, Weidong
MMIO of some devices are not page aligned, such as some EHCI controllers and virtual Realtek NIC in guest. Current guest bios doesn't guarantee the start address of MMIO page aligned. This may result in failure of device assignment, because KVM only allow to register page aligned memory slots. For

Re: qemu info registers doesn't match the one I saw from kgdb?

2009-02-19 Thread Jan Kiszka
Neo Jia wrote: hi, I am seeing something different between info registers from qemu monitor window vs. kgdb. This is a 32-bit Linux guest running on KVM-84. When I just break into the guest kernel with kgdb, I tried the follwoing commands: (qemu) info registers EAX=00010060

Re: Houston, we have May 15, 1953 (says guest when host uses cpufreq, and dies)

2009-02-19 Thread Gerd Hoffmann
Tomasz Chmielewski wrote: So with Linux virtio guests I may have luck, but not so with Windows, which can't (yet?) use kvm-clock. Correct? tsc isn't the only clocksource, there are also hpet and acpi (pm timer), they shouldn't have trouble with tsc freq changes. Dunno what windows uses by

Re: copyless virtio net thoughts?

2009-02-19 Thread Rusty Russell
On Thursday 19 February 2009 02:54:06 Arnd Bergmann wrote: On Wednesday 18 February 2009, Rusty Russell wrote: 2) Direct NIC attachment This is particularly interesting with SR-IOV or other multiqueue nics, but for boutique cases or benchmarks, could be for normal NICs. So far I have

[PATCH] kvm mmu: fix another largepage memory leak

2009-02-19 Thread Joerg Roedel
In the paging_fetch function rmap_remove is called after setting a large pte to non-present. This causes rmap_remove to not drop the reference to the large page. The result is a memory leak of that page. Signed-off-by: Joerg Roedel joerg.roe...@amd.com --- arch/x86/kvm/paging_tmpl.h |2 +- 1

Re: copyless virtio net thoughts?

2009-02-19 Thread Rusty Russell
On Thursday 19 February 2009 10:01:42 Simon Horman wrote: On Wed, Feb 18, 2009 at 10:08:00PM +1030, Rusty Russell wrote: 2) Direct NIC attachment This is particularly interesting with SR-IOV or other multiqueue nics, but for boutique cases or benchmarks, could be for normal NICs. So far

Re: copyless virtio net thoughts?

2009-02-19 Thread Chris Wright
* Simon Horman (ho...@verge.net.au) wrote: On Wed, Feb 18, 2009 at 10:08:00PM +1030, Rusty Russell wrote: 2) Direct NIC attachment This is particularly interesting with SR-IOV or other multiqueue nics, but for boutique cases or benchmarks, could be for normal NICs. So far I have some very

Re: [PATCH] kvm mmu: fix another largepage memory leak

2009-02-19 Thread Marcelo Tosatti
On Thu, Feb 19, 2009 at 12:18:56PM +0100, Joerg Roedel wrote: In the paging_fetch function rmap_remove is called after setting a large pte to non-present. This causes rmap_remove to not drop the reference to the large page. The result is a memory leak of that page. Signed-off-by: Joerg

Re: Houston, we have May 15, 1953 (says guest when host uses cpufreq, and dies)

2009-02-19 Thread Tomasz Chmielewski
Marcelo Tosatti schrieb: On Wed, Feb 18, 2009 at 09:02:31PM +0100, Tomasz Chmielewski wrote: Marcelo Tosatti schrieb: On Wed, Feb 18, 2009 at 08:18:50PM +0100, Tomasz Chmielewski wrote: Marcelo Tosatti schrieb: - what CPU frequency will the guests show? Current host frequency? Host

Re: copyless virtio net thoughts?

2009-02-19 Thread Arnd Bergmann
On Thursday 19 February 2009, Rusty Russell wrote: Not quite: I think PCI passthrough IMHO is the *wrong* way to do it: it makes migrate complicated (if not impossible), and requires emulation or the same NIC on the destination host. This would be the *host* seeing the virtual functions

[PATCH] kvm/qemu: use statfs to determine size of huge pages

2009-02-19 Thread Joerg Roedel
The current method of finding out the size of huge pages does not work reliable anymore. Current Linux supports more than one huge page size but /proc/meminfo only show one of the supported sizes. To find out the real page size used can be found by calling statfs. This patch changes kvm/qemu to

Re: [PATCH v3.14] Report IRQ injection status to userspace.

2009-02-19 Thread Avi Kivity
Gleb Natapov wrote: IRQ injection status is either -1 (if there was no CPU found that should except the interrupt because IRQ was masked or ioapic was misconfigured or ...) or = 0 in that case the number indicates to how many CPUs interrupt was injected. If the value is 0 it means that the

Re: Recent kvm and vmware server comparisons?

2009-02-19 Thread Hans de Bruin
Martin Maurer wrote: I suppose no-one has any? VMware includes in its EULA (End User License Agreement) a prohibition for any licensee to publish benchmark results without VMware's approval. (see https://www.vmware.com/tryvmware/eula.php) Maybe this is a reason why all published VMWare

[ kvm-Bugs-2617499 ] Patch from upstream attached

2009-02-19 Thread SourceForge.net
Bugs item #2617499, was opened at 2009-02-19 12:33 Message generated for change (Tracker Item Submitted) made by Item Submitter You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2617499group_id=180599 Please note that this message will contain a full copy of

[ kvm-Bugs-2617499 ] Patch from upstream attached

2009-02-19 Thread SourceForge.net
Bugs item #2617499, was opened at 2009-02-19 12:33 Message generated for change (Comment added) made by toxxic You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2617499group_id=180599 Please note that this message will contain a full copy of the comment

[ kvm-Bugs-2556746 ] FreeBSD/PC-BSD text screen corruption

2009-02-19 Thread SourceForge.net
Bugs item #2556746, was opened at 2009-02-02 04:19 Message generated for change (Comment added) made by toxxic You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2556746group_id=180599 Please note that this message will contain a full copy of the comment

kvm-userspace build break (linux/types.h)

2009-02-19 Thread Hollis Blanchard
A recent kernel merge breaks kvm-userspace build: make[1]: Entering directory `/root/hollisb/kvm-userspace.git/libkvm' gcc -m64 -D__x86_64__ -MMD -MF ./.libkvm.d -g -fomit-frame-pointer -Wall -fno-stack-protector -I /root/hollisb/kvm-userspace.git/kernel/include -c -o

Re: kvm-userspace build break (linux/types.h)

2009-02-19 Thread Joerg Roedel
On Thu, Feb 19, 2009 at 03:50:14PM -0600, Hollis Blanchard wrote: A recent kernel merge breaks kvm-userspace build: make[1]: Entering directory `/root/hollisb/kvm-userspace.git/libkvm' gcc -m64 -D__x86_64__ -MMD -MF ./.libkvm.d -g -fomit-frame-pointer -Wall

Re: copyless virtio net thoughts?

2009-02-19 Thread Simon Horman
On Thu, Feb 19, 2009 at 10:06:17PM +1030, Rusty Russell wrote: On Thursday 19 February 2009 10:01:42 Simon Horman wrote: On Wed, Feb 18, 2009 at 10:08:00PM +1030, Rusty Russell wrote: 2) Direct NIC attachment This is particularly interesting with SR-IOV or other multiqueue nics, but

centos 5.x on kvm-83 doesnt think pentium pro has fast system calls

2009-02-19 Thread Steven Stovall
Why wouldn't SEP be recognized by kvm-83 running a centos 5.x guest on a ppro? Steven -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

RE: kvm-userspace build break (linux/types.h)

2009-02-19 Thread Zhang, Xiantao
For x86 and ia64, linux/types.h will be hacked to asm/types.h when syncing the source. You may consult kernel/x86/hack-module.awk to get the answer. Xiantao Joerg Roedel wrote: On Thu, Feb 19, 2009 at 03:50:14PM -0600, Hollis Blanchard wrote: A recent kernel merge breaks kvm-userspace

Re: Recent kvm and vmware server comparisons?

2009-02-19 Thread Thomas Fjellstrom
On Thursday 19 February 2009, Hans de Bruin wrote: Martin Maurer wrote: I suppose no-one has any? VMware includes in its EULA (End User License Agreement) a prohibition for any licensee to publish benchmark results without VMware's approval. (see

[PATCH v10 3/7] PCI: reserve bus range for SR-IOV device

2009-02-19 Thread Yu Zhao
Signed-off-by: Yu Zhao yu.z...@intel.com --- drivers/pci/iov.c | 34 ++ drivers/pci/pci.h |5 + drivers/pci/probe.c |3 +++ 3 files changed, 42 insertions(+), 0 deletions(-) diff --git a/drivers/pci/iov.c b/drivers/pci/iov.c index

[PATCH v10 0/7] PCI: Linux kernel SR-IOV support

2009-02-19 Thread Yu Zhao
Greetings, Following patches are intended to support SR-IOV capability in the Linux kernel. With these patches, people can turn a PCI device with the capability into multiple ones from software perspective, which will benefit KVM and achieve other purposes such as QoS, security, and etc. SR-IOV

[PATCH v10 2/7] PCI: restore saved SR-IOV state

2009-02-19 Thread Yu Zhao
Signed-off-by: Yu Zhao yu.z...@intel.com --- drivers/pci/iov.c | 29 + drivers/pci/pci.c |1 + drivers/pci/pci.h |4 3 files changed, 34 insertions(+), 0 deletions(-) diff --git a/drivers/pci/iov.c b/drivers/pci/iov.c index e6736d4..3bca8f8 100644 ---

[PATCH v10 1/7] PCI: initialize and release SR-IOV capability

2009-02-19 Thread Yu Zhao
Signed-off-by: Yu Zhao yu.z...@intel.com --- drivers/pci/Kconfig | 13 drivers/pci/Makefile |3 + drivers/pci/iov.c| 181 ++ drivers/pci/pci.c|7 ++ drivers/pci/pci.h| 37 ++ drivers/pci/probe.c

[PATCH v10 4/7] PCI: add SR-IOV API for Physical Function driver

2009-02-19 Thread Yu Zhao
Signed-off-by: Yu Zhao yu.z...@intel.com --- drivers/pci/iov.c | 348 +++ drivers/pci/pci.h |3 + include/linux/pci.h | 14 ++ 3 files changed, 365 insertions(+), 0 deletions(-) diff --git a/drivers/pci/iov.c b/drivers/pci/iov.c index

[PATCH v10 5/7] PCI: handle SR-IOV Virtual Function Migration

2009-02-19 Thread Yu Zhao
Signed-off-by: Yu Zhao yu.z...@intel.com --- drivers/pci/iov.c | 119 +++ drivers/pci/pci.h |4 ++ include/linux/pci.h |6 +++ 3 files changed, 129 insertions(+), 0 deletions(-) diff --git a/drivers/pci/iov.c b/drivers/pci/iov.c index

[PATCH v10 6/7] PCI: document SR-IOV sysfs entries

2009-02-19 Thread Yu Zhao
Signed-off-by: Yu Zhao yu.z...@intel.com --- Documentation/ABI/testing/sysfs-bus-pci | 27 +++ 1 files changed, 27 insertions(+), 0 deletions(-) diff --git a/Documentation/ABI/testing/sysfs-bus-pci b/Documentation/ABI/testing/sysfs-bus-pci index ceddcff..84dc100 100644

[PATCH v10 7/7] PCI: manual for SR-IOV user and driver developer

2009-02-19 Thread Yu Zhao
Signed-off-by: Yu Zhao yu.z...@intel.com --- Documentation/DocBook/kernel-api.tmpl |1 + Documentation/PCI/pci-iov-howto.txt | 99 + 2 files changed, 100 insertions(+), 0 deletions(-) create mode 100644 Documentation/PCI/pci-iov-howto.txt diff --git

[ kvm-Bugs-2609423 ] Segmentation fault when creating guest on PAE host

2009-02-19 Thread SourceForge.net
Bugs item #2609423, was opened at 2009-02-17 07:30 Message generated for change (Comment added) made by jiajun You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2609423group_id=180599 Please note that this message will contain a full copy of the comment

Re: [Qemu-devel] [PATCH 1/5] kvm/powerpc: Enable MPIC for E500 platform.

2009-02-19 Thread Aurelien Jarno
On Tue, Feb 17, 2009 at 04:55:51PM +0200, Blue Swirl wrote: On 2/17/09, Liu Yu yu@freescale.com wrote: MPIC and OpenPIC have very similar design. So a lot of code can be reused. Modification mainly include: 1. keep struct openpic_t to the maximum size of both MPIC and OpenPIC.