[COMMIT master] device-assignment: Fix off-by-one in header check

2010-12-13 Thread Avi Kivity
From: Alex Williamson alex.william...@redhat.com Include the first byte at 40h or else access might go to the hardware instead of the emulated config space, resulting in capability loops, since the ordering is different. Signed-off-by: Alex Williamson alex.william...@redhat.com Signed-off-by:

[COMMIT master] pci: Remove PCI_CAPABILITY_CONFIG_*

2010-12-13 Thread Avi Kivity
From: Alex Williamson alex.william...@redhat.com Half of these aren't used anywhere, the other half are wrong. Now that device assignment is trying to match physical hardware offsets for PCI capabilities, we can't round up the MSI and MSI-X length. MSI-X is always 12 bytes. MSI is variable

[COMMIT master] pci: Error on PCI capability collisions

2010-12-13 Thread Avi Kivity
From: Alex Williamson alex.william...@redhat.com Nothing good can happen when we overlap capabilities Signed-off-by: Alex Williamson alex.william...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/hw/pci.c b/hw/pci.c index b08113d..288d6fd 100644 --- a/hw/pci.c +++ b/hw/pci.c

[COMMIT master] device-assignment: Error checking when adding capabilities

2010-12-13 Thread Avi Kivity
From: Alex Williamson alex.william...@redhat.com Signed-off-by: Alex Williamson alex.william...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/hw/device-assignment.c b/hw/device-assignment.c index 1a90a89..0ae04de 100644 --- a/hw/device-assignment.c +++

[COMMIT master] device-assignment: pass through and stub more PCI caps

2010-12-13 Thread Avi Kivity
From: Alex Williamson alex.william...@redhat.com Some drivers depend on finding capabilities like power management, PCI express/X, vital product data, or vendor specific fields. Now that we have better capability support, we can pass more of these tables through to the guest. Note that VPD and

[COMMIT master] KVM: SVM: Add clean-bit for intercetps, tsc-offset and pause filter count

2010-12-13 Thread Avi Kivity
From: Joerg Roedel joerg.roe...@amd.com This patch adds the clean-bit for intercepts-vectors, the TSC offset and the pause-filter count to the appropriate places. The IO and MSR permission bitmaps are not subject to this bit. Signed-off-by: Joerg Roedel joerg.roe...@amd.com Signed-off-by: Avi

[COMMIT master] KVM: SVM: Add clean-bit for IOPM_BASE and MSRPM_BASE

2010-12-13 Thread Avi Kivity
From: Joerg Roedel joerg.roe...@amd.com This patch adds the clean bit for the physical addresses of the MSRPM and the IOPM. It does not need to be set in the code because the only place where these values are changed is the nested-svm vmrun and vmexit path. These functions already mark the

[COMMIT master] KVM: SVM: Add clean-bits infrastructure code

2010-12-13 Thread Avi Kivity
From: Roedel, Joerg joerg.roe...@amd.com This patch adds the infrastructure for the implementation of the individual clean-bits. Signed-off-by: Joerg Roedel joerg.roe...@amd.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/arch/x86/include/asm/svm.h b/arch/x86/include/asm/svm.h index

[COMMIT master] KVM: SVM: Add clean-bit for the ASID

2010-12-13 Thread Avi Kivity
From: Joerg Roedel joerg.roe...@amd.com This patch implements the clean-bit for the asid in the vmcb. Signed-off-by: Joerg Roedel joerg.roe...@amd.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index 1802f7c..a3fd9ba 100644 ---

[COMMIT master] KVM: SVM: Add clean-bit for interrupt state

2010-12-13 Thread Avi Kivity
From: Joerg Roedel joerg.roe...@amd.com This patch implements the clean-bit for all interrupt related state in the vmcb. This corresponds to vmcb offset 0x60-0x67. Signed-off-by: Joerg Roedel joerg.roe...@amd.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/arch/x86/kvm/svm.c

[COMMIT master] KVM: SVM: Add clean-bit for control registers

2010-12-13 Thread Avi Kivity
From: Joerg Roedel joerg.roe...@amd.com This patch implements the CRx clean-bit for the vmcb. This bit covers cr0, cr3, cr4, and efer. Signed-off-by: Joerg Roedel joerg.roe...@amd.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index

[COMMIT master] KVM: SVM: Add clean-bit for Segements and CPL

2010-12-13 Thread Avi Kivity
From: Joerg Roedel joerg.roe...@amd.com This patch implements the clean-bit defined for the cs, ds, ss, an es segemnts and the current cpl saved in the vmcb. Signed-off-by: Joerg Roedel joerg.roe...@amd.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/arch/x86/kvm/svm.c

[COMMIT master] KVM: SVM: Add clean-bit for LBR state

2010-12-13 Thread Avi Kivity
From: Joerg Roedel joerg.roe...@amd.com This patch implements the clean-bit for all LBR related state. This includes the debugctl, br_from, br_to, last_excp_from, and last_excp_to msrs. Signed-off-by: Joerg Roedel joerg.roe...@amd.com Signed-off-by: Avi Kivity a...@redhat.com diff --git

[COMMIT master] KVM: SVM: Add clean-bit for CR2 register

2010-12-13 Thread Avi Kivity
From: Joerg Roedel joerg.roe...@amd.com This patch implements the clean-bit for the cr2 register in the vmcb. Signed-off-by: Joerg Roedel joerg.roe...@amd.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index 85d3350..e5db339 100644 ---

[COMMIT master] KVM: MMU: rename 'no_apf' to 'prefault'

2010-12-13 Thread Avi Kivity
From: Xiao Guangrong xiaoguangr...@cn.fujitsu.com It's the speculative path if 'no_apf = 1' and we will specially handle this speculative path in the later patch, so 'prefault' is better to fit the sense. Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com Signed-off-by: Avi Kivity

[COMMIT master] KVM: SVM: Remove flush_guest_tlb function

2010-12-13 Thread Avi Kivity
From: Joerg Roedel joerg.roe...@amd.com This function is unused and there is svm_flush_tlb which does the same. So this function can be removed. Signed-off-by: Joerg Roedel joerg.roe...@amd.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index

[COMMIT master] KVM: MMU: fix accessed bit set on prefault path

2010-12-13 Thread Avi Kivity
From: Xiao Guangrong xiaoguangr...@cn.fujitsu.com Retry #PF is the speculative path, so don't set the accessed bit Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c index 4954de9..04f9033

[COMMIT master] KVM: MMU: retry #PF for softmmu

2010-12-13 Thread Avi Kivity
From: Xiao Guangrong xiaoguangr...@cn.fujitsu.com Retry #PF for softmmu only when the current vcpu has the same cr3 as the time when #PF occurs Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/arch/x86/include/asm/kvm_host.h

[COMMIT master] KVM: SVM: Use svm_flush_tlb instead of force_new_asid

2010-12-13 Thread Avi Kivity
From: Joerg Roedel joerg.roe...@amd.com This patch replaces all calls to force_new_asid which are intended to flush the guest-tlb by the more appropriate function svm_flush_tlb. As a side-effect the force_new_asid function is removed. Signed-off-by: Joerg Roedel joerg.roe...@amd.com

[COMMIT master] KVM: SVM: Implement Flush-By-Asid feature

2010-12-13 Thread Avi Kivity
From: Joerg Roedel joerg.roe...@amd.com This patch adds the new flush-by-asid of upcoming AMD processors to the KVM-AMD module. Signed-off-by: Joerg Roedel joerg.roe...@amd.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/arch/x86/include/asm/svm.h b/arch/x86/include/asm/svm.h index

[COMMIT master] KVM: VMX: add module parameter to avoid trapping HLT instructions (v5)

2010-12-13 Thread Avi Kivity
From: Anthony Liguori aligu...@us.ibm.com In certain use-cases, we want to allocate guests fixed time slices where idle guest cycles leave the machine idling. There are many approaches to achieve this but the most direct is to simply avoid trapping the HLT instruction which lets the guest

[COMMIT master] KVM: Fix OSXSAVE after migration

2010-12-13 Thread Avi Kivity
From: Sheng Yang sh...@linux.intel.com CPUID's OSXSAVE is a mirror of CR4.OSXSAVE bit. We need to update the CPUID after migration. KVM-Stable-Tag. Signed-off-by: Sheng Yang sh...@linux.intel.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c

[COMMIT master] KVM: MMU: Fix incorrect direct page write protection due to ro host page

2010-12-13 Thread Avi Kivity
From: Avi Kivity a...@redhat.com If KVM sees a read-only host page, it will map it as read-only to prevent breaking a COW. However, if the page was part of a large guest page, KVM incorrectly extends the write protection to the entire large page frame instead of limiting it to the normal host

[COMMIT master] KVM: Fix build error on s390 due to missing tlbs_dirty

2010-12-13 Thread Avi Kivity
From: Avi Kivity a...@redhat.com Make it available for all archs. Signed-off-by: Avi Kivity a...@redhat.com diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h index bd0da8f..b5021db 100644 --- a/include/linux/kvm_host.h +++ b/include/linux/kvm_host.h @@ -256,8 +256,8 @@ struct kvm

[COMMIT master] KVM: SVM: Do not report xsave in supported cpuid

2010-12-13 Thread Avi Kivity
From: Joerg Roedel joerg.roe...@amd.com To support xsave properly for the guest the SVM module need software support for it. As long as this is not present do not report the xsave as supported feature in cpuid. As a side-effect this patch moves the bit() helper function into the x86.h file so

Re: [PATCH v2 1/4] genirq: Introduce driver-readable IRQ status word

2010-12-13 Thread Thomas Gleixner
On Sun, 12 Dec 2010, Jan Kiszka wrote: Am 12.12.2010 18:29, Thomas Gleixner wrote: Also we should name it different than status, drv_status perhaps, to avoid confusion with the irq_desc status. OK, will address both in a succeeding round (just waiting for potential further comments). No

Re: USB Passthrough 1.1 performance problem...

2010-12-13 Thread Alexander Graf
On 12.12.2010, at 23:31, Erik Brakkee wrote: Jan Kiszka wrote: Are there some tuning parameters I can use or perhaps even kernel configuration paramters on the host to solve this? Cheers Erik Host:Motherboard Supermicro X8DTi-F, Intel Xeon L5630, 12MB OS: Opensuse

Re: [PATCH V2] qemu,kvm: Enable user space NMI injection for kvm guest

2010-12-13 Thread Lai Jiangshan
On 12/10/2010 04:41 PM, Jan Kiszka wrote: Am 10.12.2010 08:42, Lai Jiangshan wrote: Make use of the new KVM_NMI IOCTL to send NMIs into the KVM guest if the user space raised them. (example: qemu monitor's nmi command) Signed-off-by: Lai Jiangshan la...@cn.fujitsu.com --- diff --git

Re: [RFC PATCH 0/3] directed yield for Pause Loop Exiting

2010-12-13 Thread Balbir Singh
* Avi Kivity a...@redhat.com [2010-12-11 09:31:24]: On 12/10/2010 07:03 AM, Balbir Singh wrote: Scheduler people, please flame me with anything I may have done wrong, so I can do it right for a next version :) This is a good problem statement, there are other things to consider as

Re: [PATCH v2 0/4] KVM genirq: Enable adaptive IRQ sharing for passed-through devices

2010-12-13 Thread Michael S. Tsirkin
On Sun, Dec 12, 2010 at 12:22:40PM +0100, Jan Kiszka wrote: The result may look simpler on first glance than v1, but it comes with more subtle race scenarios IMO. I thought them through, hopefully catching all, but I would appreciate any skeptical review. Thought about the races till my head

Re: [PATCH v2 4/4] KVM: Allow host IRQ sharing for passed-through PCI 2.3 devices

2010-12-13 Thread Avi Kivity
On 12/12/2010 01:22 PM, Jan Kiszka wrote: From: Jan Kiszkajan.kis...@siemens.com PCI 2.3 allows to generically disable IRQ sources at device level. This enables us to share IRQs of such devices on the host side when passing them to a guest. However, IRQ disabling via the PCI config space is

[PATCH 1/2] KVM: MMU: don't make direct sp read-only if !map_writable

2010-12-13 Thread Xiao Guangrong
Currently, if the page is not allowed to write, then it can drop ACC_WRITE_MASK in pte_access, and the direct sp's access is: gw-pt_access gw-pte_access so, it also removes the write access in the direct sp. There is a problem: if the access of those pages which map thought the same

[PATCH 2/2] KVM: MMU: audit: allow audit more guests at the same time

2010-12-13 Thread Xiao Guangrong
It only allows to audit one guest in the system since: - 'audit_point' is a glob variable - mmu_audit_disable() is called in kvm_mmu_destroy(), so audit is disabled after a guest exited this patch fix those issues then allow to audit more guests at the same time Signed-off-by: Xiao Guangrong

Re: [PATCH 1/2] KVM: MMU: don't make direct sp read-only if !map_writable

2010-12-13 Thread Avi Kivity
On 12/13/2010 12:31 PM, Xiao Guangrong wrote: Currently, if the page is not allowed to write, then it can drop ACC_WRITE_MASK in pte_access, and the direct sp's access is: gw-pt_access gw-pte_access so, it also removes the write access in the direct sp. There is a problem: if the

Re: USB Passthrough 1.1 performance problem...

2010-12-13 Thread Gerd Hoffmann
Hi, I am using a tv card in a VM and get jerky video.As I understand it, the VM is using USB 1.1. However, when I set the USB controller in the BIOS of my server to Fullspeed (12 Mbit/s) which is the USB 1.1 speed I am able to get perfect results on the host but still on the guest the video

[GIT PULL net-next-2.6] vhost-net: tools, cleanups, optimizations

2010-12-13 Thread Michael S. Tsirkin
Please merge the following tree for 2.6.38. Thanks! The following changes since commit ad1184c6cf067a13e8cb2a4e7ccc407f947027d0: net: au1000_eth: remove unused global variable. (2010-12-11 12:01:48 -0800) are available in the git repository at:

Re: [Qemu-devel] SCSI Command support over VirtIO Block device

2010-12-13 Thread अनुज
Hi 2010/12/13 Stefan Hajnoczi stefa...@gmail.com: On Dec 13, 2010 5:14 AM, अनुज anu...@gmail.com wrote: Hi I am trying to implement VirtIO support for a proprietary OS. And It would be great if I am able to process SCSI commands over VirtIO Block device. I tried to execute INQUIRY

Re: trace_printk() support in trace-cmd

2010-12-13 Thread Masami Hiramatsu
(2010/12/13 2:47), Avi Kivity wrote: On 12/12/2010 07:43 PM, Arnaldo Carvalho de Melo wrote: Em Sun, Dec 12, 2010 at 07:42:06PM +0200, Avi Kivity escreveu: On 12/12/2010 07:36 PM, Arnaldo Carvalho de Melo wrote: Em Sun, Dec 12, 2010 at 06:35:24PM +0200, Avi Kivity escreveu: On

Re: [RFC PATCH 0/3] directed yield for Pause Loop Exiting

2010-12-13 Thread Avi Kivity
On 12/11/2010 03:57 PM, Balbir Singh wrote: * Avi Kivitya...@redhat.com [2010-12-11 09:31:24]: On 12/10/2010 07:03 AM, Balbir Singh wrote: Scheduler people, please flame me with anything I may have done wrong, so I can do it right for a next version :) This is a good

Re: [PATCH] pci: Fix PCI capabilities collision error value

2010-12-13 Thread Avi Kivity
On 12/09/2010 06:16 PM, Alex Williamson wrote: Signed-off-by: Alex Williamsonalex.william...@redhat.com Applied, thanks. -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to

Re: [PATCH] [qemu-kvm-next-tree] fix compile error of hw/device-assignment.c

2010-12-13 Thread Avi Kivity
On 12/09/2010 08:43 AM, Wei Yongjun wrote: Fix the following compile error in next tree: CCx86_64-softmmu/device-assignment.o hw/device-assignment.c: In function ‘assigned_device_pci_cap_init’: hw/device-assignment.c:1463: error: ‘PCI_PM_CTRL_NO_SOFT_RST’ undeclared (first use in this

Re: [PATCH] kvm: cleanup CR8 handling

2010-12-13 Thread Avi Kivity
On 12/08/2010 01:27 PM, Andre Przywara wrote: The handling of CR8 writes in KVM is currently somewhat cumbersome. This patch makes it look like the other CR register handlers and fixes a possible issue in VMX, where the RIP would be incremented despite an injected #GP. unsigned long

Re: [PATCH 2/5] kvm/svm: enhance MOV CR intercept handler

2010-12-13 Thread Avi Kivity
On 12/10/2010 03:51 PM, Andre Przywara wrote: Newer SVM implementations provide the GPR number in the VMCB, so that the emulation path is no longer necesarry to handle CR register access intercepts. Implement the handling in svm.c and use it when the info is provided. Signed-off-by: Andre

Re: [PATCH 3/5] kvm/svm: enhance mov DR intercept handler

2010-12-13 Thread Avi Kivity
On 12/10/2010 03:51 PM, Andre Przywara wrote: Newer SVM implementations provide the GPR number in the VMCB, so that the emulation path is no longer necesarry to handle debug register access intercepts. Implement the handling in svm.c and use it when the info is provided. + + if (!err) +

Re: [PATCH 5/5] kvm/svm: copy instruction bytes from VMCB

2010-12-13 Thread Avi Kivity
On 12/10/2010 03:51 PM, Andre Przywara wrote: In case of a nested page fault or an intercepted #PF newer SVM implementations provide a copy of the faulting instruction bytes in the VMCB. Use these bytes to feed the instruction emulator and avoid the costly guest instruction fetch in this case.

Re: [RFC PATCH 0/3] directed yield for Pause Loop Exiting

2010-12-13 Thread Balbir Singh
* Avi Kivity a...@redhat.com [2010-12-13 13:57:37]: On 12/11/2010 03:57 PM, Balbir Singh wrote: * Avi Kivitya...@redhat.com [2010-12-11 09:31:24]: On 12/10/2010 07:03 AM, Balbir Singh wrote: Scheduler people, please flame me with anything I may have done wrong, so I can do

Re: [RFC PATCH 0/3] directed yield for Pause Loop Exiting

2010-12-13 Thread Avi Kivity
On 12/13/2010 02:39 PM, Balbir Singh wrote: * Avi Kivitya...@redhat.com [2010-12-13 13:57:37]: On 12/11/2010 03:57 PM, Balbir Singh wrote: * Avi Kivitya...@redhat.com [2010-12-11 09:31:24]: On 12/10/2010 07:03 AM, Balbir Singh wrote: Scheduler people, please flame

In what order are the CPUs discovered?

2010-12-13 Thread Henry Pepper
Hi Where can I find out, the order in which the CPUs are discovered? When having: - Multiple sockets. - Multiple cores. - Hyper-threading (HTT). E.g. a single Socket with two cores and HTT enabled on both cores. This would be 4 CPUs. Would cpu0 and cpu1 be the first core, and cpu2 and 3

Re: [PATCH v2 1/2] Do not register kvmclock savevm section if kvmclock is disabled.

2010-12-13 Thread Glauber Costa
On Wed, 2010-12-08 at 17:31 -0200, Marcelo Tosatti wrote: On Tue, Dec 07, 2010 at 03:12:36PM -0200, Glauber Costa wrote: On Mon, 2010-12-06 at 19:04 -0200, Marcelo Tosatti wrote: On Mon, Dec 06, 2010 at 09:03:46AM -0500, Glauber Costa wrote: Usually nobody usually thinks about that

[PATCH] KVM: Correct kvm_pio tracepoint count field

2010-12-13 Thread Avi Kivity
Currently, we record '1' for count regardless of the real count. Fix. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/x86.c |4 ++-- 1 files changed, 2 insertions(+), 2 deletions(-) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 8d76150..cf5fab1 100644 ---

Re: trace_printk() support in trace-cmd

2010-12-13 Thread Steven Rostedt
On Sun, 2010-12-12 at 18:10 +0200, Avi Kivity wrote: On 11/23/2010 12:52 PM, Avi Kivity wrote: I see a trace_printk() commit in trace-cmd.git. Is that related? If not, I'll work on getting a small sample of the problem. Sample: http://people.redhat.com/akivity/trace.dat.bz2 You

Re: trace_printk() support in trace-cmd

2010-12-13 Thread Avi Kivity
On 12/13/2010 05:26 PM, Steven Rostedt wrote: On Sun, 2010-12-12 at 18:10 +0200, Avi Kivity wrote: On 11/23/2010 12:52 PM, Avi Kivity wrote: I see a trace_printk() commit in trace-cmd.git. Is that related? If not, I'll work on getting a small sample of the problem. Sample:

Re: trace_printk() support in trace-cmd

2010-12-13 Thread Steven Rostedt
On Mon, 2010-12-13 at 17:43 +0200, Avi Kivity wrote: What's your work flow? Do you load kvm modules after you start the trace, or are they always loaded? Loaded on boot. Via initramfs? Are the trace_printk's in the core kernel too, and not being printed? I don't have any

Re: [PATCH 2/2] tools/virtio: virtio_test tool

2010-12-13 Thread Michael S. Tsirkin
On Mon, Dec 06, 2010 at 02:37:05PM -0200, Thiago Farina wrote: On Mon, Nov 29, 2010 at 3:16 PM, Michael S. Tsirkin m...@redhat.com wrote: +#define container_of(ptr, type, member) ({                     \ +       const typeof( ((type *)0)-member ) *__mptr = (ptr);    \ +       (type *)(

Re: [RFC PATCH 0/3] directed yield for Pause Loop Exiting

2010-12-13 Thread Rik van Riel
On 12/11/2010 08:57 AM, Balbir Singh wrote: If the vpcu holding the lock runs more and capped, the timeslice transfer is a heuristic that will not help. That indicates you really need the cap to be per guest, and not per VCPU. Having one VCPU spin on a lock (and achieve nothing), because the

Re: trace_printk() support in trace-cmd

2010-12-13 Thread Avi Kivity
On 12/13/2010 06:28 PM, Steven Rostedt wrote: On Mon, 2010-12-13 at 17:43 +0200, Avi Kivity wrote: What's your work flow? Do you load kvm modules after you start the trace, or are they always loaded? Loaded on boot. Via initramfs? No, regular printks. Are the

Re: trace_printk() support in trace-cmd

2010-12-13 Thread Avi Kivity
On 12/13/2010 07:05 PM, Avi Kivity wrote: On 12/13/2010 06:28 PM, Steven Rostedt wrote: On Mon, 2010-12-13 at 17:43 +0200, Avi Kivity wrote: What's your work flow? Do you load kvm modules after you start the trace, or are they always loaded? Loaded on boot. Via initramfs? No,

Re: [PATCH 2/2] tools/virtio: virtio_test tool

2010-12-13 Thread Michael S. Tsirkin
On Mon, Dec 06, 2010 at 03:23:02PM +1030, Rusty Russell wrote: On Tue, 30 Nov 2010 03:46:37 am Michael S. Tsirkin wrote: This is the userspace part of the tool: it includes a bunch of stubs for linux APIs, somewhat simular to linuxsched. This makes it possible to recompile the ring code in

Re: [GIT PULL net-next-2.6] vhost-net: tools, cleanups, optimizations

2010-12-13 Thread Michael S. Tsirkin
On Mon, Dec 13, 2010 at 12:44:13PM +0200, Michael S. Tsirkin wrote: Please merge the following tree for 2.6.38. Thanks! Um, I sent this out before I noticed the mail from Rusty with some questions on the test code. I missed that and assumed no comments - no issues, perhaps wrongly. Rusty - I

Re: Freezing Windows 2008 x64bit guest

2010-12-13 Thread Manfred Heubach
Gleb Natapov gleb at redhat.com writes: On Wed, Jul 28, 2010 at 12:53:02AM +0300, Harri Olin wrote: Gleb Natapov wrote: On Wed, Jul 21, 2010 at 09:25:31AM +0300, Harri Olin wrote: Gleb Natapov kirjoitti: On Mon, Jul 19, 2010 at 10:17:02AM +0300, Harri Olin wrote: Gleb Natapov

Re: Freezing Windows 2008 x64bit guest

2010-12-13 Thread Dor Laor
On 12/13/2010 09:42 PM, Manfred Heubach wrote: Gleb Natapovglebat redhat.com writes: On Wed, Jul 28, 2010 at 12:53:02AM +0300, Harri Olin wrote: Gleb Natapov wrote: On Wed, Jul 21, 2010 at 09:25:31AM +0300, Harri Olin wrote: Gleb Natapov kirjoitti: On Mon, Jul 19, 2010 at 10:17:02AM

Re: Freezing Windows 2008 x64bit guest

2010-12-13 Thread Vadim Rozenfeld
On Mon, 2010-12-13 at 22:12 +0200, Dor Laor wrote: On 12/13/2010 09:42 PM, Manfred Heubach wrote: Gleb Natapovglebat redhat.com writes: On Wed, Jul 28, 2010 at 12:53:02AM +0300, Harri Olin wrote: Gleb Natapov wrote: On Wed, Jul 21, 2010 at 09:25:31AM +0300, Harri Olin wrote:

[RESEND PATCH v3 0/2] Minimal RAM API support

2010-12-13 Thread Alex Williamson
No comments since v3, please apply. Thanks, Alex v3: - Address review comments - pc registers all memory below 4G in one chunk Let me know if there are any further issues. v2: - Move to Makefile.objs - Move structures to memory.c and create a callback function - Fix memory leak I

[RESEND PATCH v3 1/2] Minimal RAM API support

2010-12-13 Thread Alex Williamson
This adds a minimum chunk of Anthony's RAM API support so that we can identify actual VM RAM versus all the other things that make use of qemu_ram_alloc. Signed-off-by: Alex Williamson alex.william...@redhat.com --- Makefile.objs |1 + cpu-common.h |2 + memory.c | 97

[RESEND PATCH v3 2/2] RAM API: Make use of it for x86 PC

2010-12-13 Thread Alex Williamson
Register the actual VM RAM using the new API Signed-off-by: Alex Williamson alex.william...@redhat.com --- hw/pc.c |9 +++-- 1 files changed, 3 insertions(+), 6 deletions(-) diff --git a/hw/pc.c b/hw/pc.c index e1b2667..1554164 100644 --- a/hw/pc.c +++ b/hw/pc.c @@ -913,14 +913,11 @@

Re: [RESEND PATCH v3 1/2] Minimal RAM API support

2010-12-13 Thread Anthony Liguori
On 12/13/2010 02:47 PM, Alex Williamson wrote: This adds a minimum chunk of Anthony's RAM API support so that we can identify actual VM RAM versus all the other things that make use of qemu_ram_alloc. Signed-off-by: Alex Williamsonalex.william...@redhat.com --- Makefile.objs |1 +

Re: [Qemu-devel] [RESEND PATCH v3 1/2] Minimal RAM API support

2010-12-13 Thread Blue Swirl
On Mon, Dec 13, 2010 at 8:47 PM, Alex Williamson alex.william...@redhat.com wrote: This adds a minimum chunk of Anthony's RAM API support so that we can identify actual VM RAM versus all the other things that make use of qemu_ram_alloc. Signed-off-by: Alex Williamson

[RESEND PATCH] exec: Implement qemu_ram_free_from_ptr()

2010-12-13 Thread Alex Williamson
Required for regions mapped via qemu_ram_alloc_from_ptr(). VFIO and ivshmem will make use of this to remove mappings when devices are hot unplugged. Signed-off-by: Alex Williamson alex.william...@redhat.com --- No comments on original patch. Obvious missing function. Cam has since requested

[PATCH v4 1/2] Minimal RAM API support

2010-12-13 Thread Alex Williamson
This adds a minimum chunk of Anthony's RAM API support so that we can identify actual VM RAM versus all the other things that make use of qemu_ram_alloc. Signed-off-by: Alex Williamson alex.william...@redhat.com --- Makefile.objs |1 + cpu-common.h |2 + memory.c | 94

[PATCH v4 0/2] Minimal RAM API support

2010-12-13 Thread Alex Williamson
Update per comments, Thanks, Alex v4: - ram_slot - RamSlot (per CODING_STYLE) - drop qemu_ prefix from functions (per CODING_STYLE) - mallocz - malloc - drop extraneous return from void function v3: - Address review comments - pc registers all memory below 4G in one chunk Let me know

[PATCH v4 2/2] RAM API: Make use of it for x86 PC

2010-12-13 Thread Alex Williamson
Register the actual VM RAM using the new API Signed-off-by: Alex Williamson alex.william...@redhat.com --- hw/pc.c |9 +++-- 1 files changed, 3 insertions(+), 6 deletions(-) diff --git a/hw/pc.c b/hw/pc.c index e1b2667..87adca2 100644 --- a/hw/pc.c +++ b/hw/pc.c @@ -913,14 +913,11 @@

[PATCH] RFC: delay pci_update_mappings for 64-bit BARs

2010-12-13 Thread Cam Macdonell
Do not call pci_update_mappings on the lower 32-bits of a 64-bit bar. Wait for the upper 32 or else Qemu will try to map on just the lower 32 which is probably going to corrupt memory. I was encountering crashes when mapping certain PCI region sizes. The problem turns out that

Re: [PATCH v2 0/4] KVM genirq: Enable adaptive IRQ sharing for passed-through devices

2010-12-13 Thread Jan Kiszka
Am 13.12.2010 11:10, Michael S. Tsirkin wrote: On Sun, Dec 12, 2010 at 12:22:40PM +0100, Jan Kiszka wrote: The result may look simpler on first glance than v1, but it comes with more subtle race scenarios IMO. I thought them through, hopefully catching all, but I would appreciate any skeptical

[PATCH v3 0/4] KVM genirq: Enable adaptive IRQ sharing for passed-through devices

2010-12-13 Thread Jan Kiszka
This addresses the review comments of the previous round: - renamed irq_data::status to drv_status - moved drv_status around to unbreak GENERIC_HARDIRQS_NO_DEPRECATED - fixed signature of get_irq_status (irq is now unsigned int) - converted register_lock into a global one - fixed critical

[PATCH v3 1/4] genirq: Introduce driver-readable IRQ status word

2010-12-13 Thread Jan Kiszka
From: Jan Kiszka jan.kis...@siemens.com This associates a status word with every IRQ descriptor. Drivers can obtain its content via get_irq_status(irq). First use case will be propagating the interrupt sharing state. Signed-off-by: Jan Kiszka jan.kis...@siemens.com --- include/linux/interrupt.h

[PATCH v3 4/4] KVM: Allow host IRQ sharing for passed-through PCI 2.3 devices

2010-12-13 Thread Jan Kiszka
From: Jan Kiszka jan.kis...@siemens.com PCI 2.3 allows to generically disable IRQ sources at device level. This enables us to share IRQs of such devices on the host side when passing them to a guest. However, IRQ disabling via the PCI config space is more costly than masking the line via

[PATCH v3 2/4] genirq: Inform handler about line sharing state

2010-12-13 Thread Jan Kiszka
From: Jan Kiszka jan.kis...@siemens.com This enabled interrupt handlers to retrieve the current line sharing state via the new interrupt status word so that they can adapt to it. The switch from shared to exclusive is generally uncritical and can thus be performed on demand. However, preparing a

[PATCH v3 3/4] genirq: Add support for IRQF_COND_ONESHOT

2010-12-13 Thread Jan Kiszka
From: Jan Kiszka jan.kis...@siemens.com Provide an adaptive version of IRQF_ONESHOT: If the line is exclusively used, IRQF_COND_ONESHOT provides the same semantics as IRQF_ONESHOT. If it is shared, the line will be unmasked directly after the hardirq handler, just as if IRQF_COND_ONESHOT was not

[PATCH 0/5] pci-assign: Host IRQ sharing suppport + some fixes and cleanups

2010-12-13 Thread Jan Kiszka
This series includes cleanups of the PCI config access of assigned devices, fixes a corner case in this area, removes that suspicious VGA hunk from assigned_dev_pci_read_config, and finally enables support for the latest host IRQ sharing support via PCI-2.3 interrupt masking. See the patches for

[PATCH 1/5] pci-assign: Clean up assigned_dev_pci_read/write_config

2010-12-13 Thread Jan Kiszka
From: Jan Kiszka jan.kis...@siemens.com Use rages_overlap and proper constants to match the access range against regions that need special handling. This also fixes yet uncaught high-byte write access to the command register. Moreover, use more constants instead of magic numbers. Signed-off-by:

[PATCH 2/5] pci-assign: Fix dword read at PCI_COMMAND

2010-12-13 Thread Jan Kiszka
From: Jan Kiszka jan.kis...@siemens.com If we emulate the command register, we must only read its content from the shadow config space. For dword read of both PCI_COMMAND and PCI_STATUS, at least the latter must be read from the device. For simplicity reasons and as the code path is not

[PATCH 4/5] pci-assign: Convert need_emulate_cmd into a bitmask

2010-12-13 Thread Jan Kiszka
From: Jan Kiszka jan.kis...@siemens.com Define a mask of PCI command register bits that need to be emulated, i.e. read back from their shadow state. We will need this for selectively emulating the INTx mask bit. Note: No initialization of emulate_cmd_mask to zero needed, the device state is

[PATCH 5/5] pci-assign: Use PCI-2.3-based shared legacy interrupts

2010-12-13 Thread Jan Kiszka
From: Jan Kiszka jan.kis...@siemens.com Enable the new KVM feature that allows legacy interrupt sharing for PCI-2.3-compliant devices. This requires to synchronize any guest change of the INTx mask bit to the kernel. Signed-off-by: Jan Kiszka jan.kis...@siemens.com --- hw/device-assignment.c |

Re: USB Passthrough 1.1 performance problem...

2010-12-13 Thread Jan Kiszka
Am 12.12.2010 23:31, Erik Brakkee wrote: Jan Kiszka wrote: Are there some tuning parameters I can use or perhaps even kernel configuration paramters on the host to solve this? Cheers Erik Host:Motherboard Supermicro X8DTi-F, Intel Xeon L5630, 12MB OS: Opensuse 11.3

Re: USB Passthrough 1.1 performance problem...

2010-12-13 Thread Kenni Lund
2010/12/12 Erik Brakkee e...@brakkee.org: Does this mean I have a chance now that PCI passthrough of my WinTV PVR-500 might work now? Passthrough of a PVR-500 has been working for a long time. I've been running with passthrough of a PVR-500 in my HTPC, since November/December 2009...so it

Re: [PATCH 2/5] pci-assign: Fix dword read at PCI_COMMAND

2010-12-13 Thread Alex Williamson
On Tue, 2010-12-14 at 00:25 +0100, Jan Kiszka wrote: From: Jan Kiszka jan.kis...@siemens.com If we emulate the command register, we must only read its content from the shadow config space. For dword read of both PCI_COMMAND and PCI_STATUS, at least the latter must be read from the device.

Re: [PATCH 1/5] pci-assign: Clean up assigned_dev_pci_read/write_config

2010-12-13 Thread Alex Williamson
On Tue, 2010-12-14 at 00:25 +0100, Jan Kiszka wrote: From: Jan Kiszka jan.kis...@siemens.com Use rages_overlap and proper constants to match the access range against regions that need special handling. This also fixes yet uncaught high-byte write access to the command register. Moreover, use

Re: [PATCH 3/5] pci-assign: Remove suspicious hunk from assigned_dev_pci_read_config

2010-12-13 Thread Alex Williamson
On Tue, 2010-12-14 at 00:25 +0100, Jan Kiszka wrote: From: Jan Kiszka jan.kis...@siemens.com No one can remember where this came from, and it looks very hacky anyway (we return 0 for config space address 0xfc of _every_ assigned device, not only vga as the comment claims). So better remove

Re: [PATCH 4/5] pci-assign: Convert need_emulate_cmd into a bitmask

2010-12-13 Thread Alex Williamson
On Tue, 2010-12-14 at 00:25 +0100, Jan Kiszka wrote: From: Jan Kiszka jan.kis...@siemens.com Define a mask of PCI command register bits that need to be emulated, i.e. read back from their shadow state. We will need this for selectively emulating the INTx mask bit. Note: No initialization

KVM call agenda for Dec 14

2010-12-13 Thread Chris Wright
Please send in any agenda items you are interested in covering. thanks, -chris -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [PATCH 5/5] pci-assign: Use PCI-2.3-based shared legacy interrupts

2010-12-13 Thread Alex Williamson
On Tue, 2010-12-14 at 00:25 +0100, Jan Kiszka wrote: From: Jan Kiszka jan.kis...@siemens.com Enable the new KVM feature that allows legacy interrupt sharing for PCI-2.3-compliant devices. This requires to synchronize any guest change of the INTx mask bit to the kernel. Signed-off-by: Jan

Re: USB Passthrough 1.1 performance problem...

2010-12-13 Thread Kenni Lund
2010/12/14 Erik Brakkee e...@brakkee.org: From: Kenni Lund ke...@kelu.dk Does this mean I have a chance now that PCI passthrough of my WinTV PVR-500 might work now? Passthrough of a PVR-500 has been working for a long time. I've been running with passthrough of a PVR-500 in my HTPC, since

Re: [PATCH 1/2] KVM: MMU: don't make direct sp read-only if !map_writable

2010-12-13 Thread Xiao Guangrong
On 12/13/2010 06:32 PM, Avi Kivity wrote: On 12/13/2010 12:31 PM, Xiao Guangrong wrote: Currently, if the page is not allowed to write, then it can drop ACC_WRITE_MASK in pte_access, and the direct sp's access is: gw-pt_access gw-pte_access so, it also removes the write access in the

Re: [Qemu-devel] [PATCH] RFC: delay pci_update_mappings for 64-bit BARs

2010-12-13 Thread Isaku Yamahata
On Mon, Dec 13, 2010 at 03:43:44PM -0700, Cam Macdonell wrote: Do not call pci_update_mappings on the lower 32-bits of a 64-bit bar. Wait for the upper 32 or else Qemu will try to map on just the lower 32 which is probably going to corrupt memory. I was encountering crashes when mapping

[RFC -v2 PATCH 1/3] kvm: keep track of which task is running a KVM vcpu

2010-12-13 Thread Rik van Riel
Keep track of which task is running a KVM vcpu. This helps us figure out later what task to wake up if we want to boost a vcpu that got preempted. Unfortunately there are no guarantees that the same task always keeps the same vcpu, so we can only track the task across a single run of the vcpu.

[RFC -v2 PATCH 2/3] sched: add yield_to function

2010-12-13 Thread Rik van Riel
Add a yield_to function to the scheduler code, allowing us to give the remainder of our timeslice to another thread. We may want to use this to provide a sys_yield_to system call one day. Signed-off-by: Rik van Riel r...@redhat.com Signed-off-by: Marcelo Tosatti mtosa...@redhat.com --- - move to

[RFC -v2 PATCH 0/3] directed yield for Pause Loop Exiting

2010-12-13 Thread Rik van Riel
When running SMP virtual machines, it is possible for one VCPU to be spinning on a spinlock, while the VCPU that holds the spinlock is not currently running, because the host scheduler preempted it to run something else. Both Intel and AMD CPUs have a feature that detects when a virtual CPU is

[RFC -v2 PATCH 3/3] kvm: use yield_to instead of sleep in kvm_vcpu_on_spin

2010-12-13 Thread Rik van Riel
Instead of sleeping in kvm_vcpu_on_spin, which can cause gigantic slowdowns of certain workloads, we instead use yield_to to hand the rest of our timeslice to another vcpu in the same KVM guest. Signed-off-by: Rik van Riel r...@redhat.com Signed-off-by: Marcelo Tosatti mtosa...@redhat.com diff

Re: [GIT PULL net-next-2.6] vhost-net: tools, cleanups, optimizations

2010-12-13 Thread Rusty Russell
On Tue, 14 Dec 2010 03:54:47 am Michael S. Tsirkin wrote: On Mon, Dec 13, 2010 at 12:44:13PM +0200, Michael S. Tsirkin wrote: Please merge the following tree for 2.6.38. Thanks! Um, I sent this out before I noticed the mail from Rusty with some questions on the test code. I missed that

SMBIOS support in Qemu?

2010-12-13 Thread Anjali Kulkarni
Hi, Which version of Qemu contains the Smbios code? If I have to get the code in my repo, is there any place I can get the complete set of patches? Thanks Anjali -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo

  1   2   >