Re: Kernel mode VGAs?

2012-02-14 Thread Jan Kiszka
On 2012-02-14 08:12, Gerhard Wiesinger wrote: Hello, Current QEMU-KVM VGA implementation have the following problem with legacy OS (e.g. DOS with INT10h calls): Performance is low on accessing A000:0 page and doing bank switching at the 64k page. Do we already understand the mode and

Re: [Qemu-devel] [PATCH v2 5/8] kvmvapic: Introduce TPR access optimization for Windows guests

2012-02-14 Thread Jan Kiszka
On 2012-02-14 08:54, Gleb Natapov wrote: On Mon, Feb 13, 2012 at 08:22:21PM +0100, Jan Kiszka wrote: Unfortunately, this is only an internal structure, not officially documented by MS. However, all supported OS versions a legacy by now, no longer changing its structure. This and a note about

Re: [Qemu-devel] [PATCH v2 5/8] kvmvapic: Introduce TPR access optimization for Windows guests

2012-02-14 Thread Gleb Natapov
On Tue, Feb 14, 2012 at 09:55:46AM +0100, Jan Kiszka wrote: On 2012-02-14 08:54, Gleb Natapov wrote: On Mon, Feb 13, 2012 at 08:22:21PM +0100, Jan Kiszka wrote: Unfortunately, this is only an internal structure, not officially documented by MS. However, all supported OS versions a legacy by

Re: AESNI and guest hosts

2012-02-14 Thread Ryan Brown
Sorry for being a noob here, Any clues with this?, anyone ... On Mon, Feb 13, 2012 at 2:05 AM, Ryan Brown mp3g...@gmail.com wrote: Host/KVM server is running linux 3.2.4 (Debian wheezy), and guest kernel is running 3.2.5. The cpu is an E3-1230, but for some reason its not able to supply the

Re: [RFC] need to improve slot creation/destruction? -- Re: [RFC][PATCH] srcu: Implement call_srcu()

2012-02-14 Thread Avi Kivity
On 02/10/2012 03:25 PM, Takuya Yoshikawa wrote: Avi Kivity a...@redhat.com wrote: 2. When we create(and shift?) a memory slot, we call kvm_arch_flush_shadow() to clear all mmio sptes, again not restricted to that slot. /* * If the new memory slot is created, we need to

Re: [RFC] need to improve slot creation/destruction? -- Re: [RFC][PATCH] srcu: Implement call_srcu()

2012-02-14 Thread Avi Kivity
On 02/10/2012 07:16 PM, Marcelo Tosatti wrote: On Thu, Feb 09, 2012 at 04:25:36PM +0200, Avi Kivity wrote: On 02/08/2012 08:45 PM, Marcelo Tosatti wrote: BTW do we really need fast slot creation/destruction? At the moment yes. Boot a RHEL/Fedora installation disk (or any other

Re: Pe: [PATCH v5 1/3] virtio-scsi: first version

2012-02-14 Thread Paolo Bonzini
On 02/14/2012 02:11 AM, Michael S. Tsirkin wrote: On Tue, Feb 14, 2012 at 11:49:55AM +1100, ronnie sahlberg wrote: By just exposing this device to the kernel, the kernel keeps sending, or if not the kernel maybe some other process trying to poll the status? every few seconds :

The way of mapping BIOS into the guest's address space

2012-02-14 Thread Yang Bai
Hi all, Since on X86, bios is always at the end of the address space, so I have some thought about how to implement the seabios support for kvm tool. 1. using kvm__register_mem to map the end of address space to the guest then copy the code of seabios to this mem region. Just emulating the bios

Re: The way of mapping BIOS into the guest's address space

2012-02-14 Thread Pekka Enberg
On Tue, Feb 14, 2012 at 1:03 PM, Yang Bai hamo...@gmail.com wrote: Since on X86, bios is always at the end of the address space, so I have some thought about how to implement the seabios support for kvm tool. 1. using kvm__register_mem to map the end of address space to the guest then copy

Re: The way of mapping BIOS into the guest's address space

2012-02-14 Thread Cyrill Gorcunov
On Tue, Feb 14, 2012 at 01:10:59PM +0200, Pekka Enberg wrote: On Tue, Feb 14, 2012 at 1:03 PM, Yang Bai hamo...@gmail.com wrote: Since on X86, bios is always at the end of the address space, so I have some thought about how to implement the seabios support for kvm tool. 1. using

Re: [RFC PATCH v0 1/2] net: bridge: propagate FDB table into hardware

2012-02-14 Thread jamal
On Mon, 2012-02-13 at 07:13 -0800, John Fastabend wrote: The use case here is multiple VFs but the same solution should work with multiple PFs as well. FDB controls should be independent of how the ports are exposed VFs, PFs, VMDQ/queue pairs, macvlan, etc. Makes sense. With events and

Re: [Qemu-devel] [PATCH RFC] seabios: add OSHP method stub

2012-02-14 Thread Paul Brook
In a nutshell, I don't know what a SHPC is (nor OSHP), so I'm looking for an additional Ack. No problem, I'll get an Ack :) Meanwhile - here's a summary, as far as I understand it. Originally PCI SIG only defined the electrical and mechanical requirements from hotplug, no standard

Re: performance trouble

2012-02-14 Thread Avi Kivity
On 02/10/2012 12:09 PM, David Cure wrote: hello, Le Sun, Feb 05, 2012 at 11:38:34AM +0200, Avi Kivity ecrivait : Please post a trace as documented in http://www.linux-kvm.org/page/Tracing. I made the trace : started just before the slow function launch and stoped

Re: The way of mapping BIOS into the guest's address space

2012-02-14 Thread Cyrill Gorcunov
On Tue, Feb 14, 2012 at 09:20:18PM +0800, Yang Bai wrote: And will seabios replace the present bios implement or co-exsit? Ideally we should get rid of our minibios completely and only have seabios here instead. Cyrill -- To unsubscribe from this list: send the line unsubscribe kvm in

Re: [Qemu-devel] [PATCH RFC] seabios: add OSHP method stub

2012-02-14 Thread Michael S. Tsirkin
On Tue, Feb 14, 2012 at 12:49:08PM +, Paul Brook wrote: In a nutshell, I don't know what a SHPC is (nor OSHP), so I'm looking for an additional Ack. No problem, I'll get an Ack :) Meanwhile - here's a summary, as far as I understand it. Originally PCI SIG only defined the

Re: performance trouble

2012-02-14 Thread Gleb Natapov
On Tue, Feb 14, 2012 at 03:32:16PM +0200, Avi Kivity wrote: On 02/10/2012 12:09 PM, David Cure wrote: hello, Le Sun, Feb 05, 2012 at 11:38:34AM +0200, Avi Kivity ecrivait : Please post a trace as documented in http://www.linux-kvm.org/page/Tracing. I made the

Re: [Qemu-devel] [PATCH RFC] seabios: add OSHP method stub

2012-02-14 Thread Paul Brook
Now an OS can have a standard driver and use it to activate hotplug functionality. This is OS hotplug (OSHP). So presumably this will work on targets that don't have ACPI? Assuming a competent guest OS of course. Have you tested this? This being the qemu side of things? I run

Re: performance trouble

2012-02-14 Thread Vadim Rozenfeld
- Original Message - From: Avi Kivity a...@redhat.com To: David Cure k...@cure.nom.fr Cc: kvm@vger.kernel.org, Vadim Rozenfeld vroze...@redhat.com Sent: Tuesday, February 14, 2012 3:32:16 PM Subject: Re: performance trouble On 02/10/2012 12:09 PM, David Cure wrote: hello,

Re: Win 2000 driver for -vga std ?

2012-02-14 Thread Reeted
On 02/14/12 07:25, Michael Tokarev wrote: On 14.02.2012 05:42, Reeted wrote: Hello, subject says it all The driver for windows 2000 for the -vga std should be the Anapa VBE Vesa VBEMP if I understand correctly but I cannot on earth find this executable http://navozhdeniye.narod.ru/vbemp.htm

Re: [Qemu-devel] [PATCH RFC] seabios: add OSHP method stub

2012-02-14 Thread Michael S. Tsirkin
On Tue, Feb 14, 2012 at 01:47:59PM +, Paul Brook wrote: Now an OS can have a standard driver and use it to activate hotplug functionality. This is OS hotplug (OSHP). So presumably this will work on targets that don't have ACPI? Assuming a competent guest OS of course. Have

Re: KVM call agenda for Tuesday 14

2012-02-14 Thread Juan Quintela
Juan Quintela quint...@redhat.com wrote: Hi Please send in any agenda items you are interested in covering. As there are no topics, call is cancelled. Happy hacking, Juan. PD. You should use the extra time to draw a qemu mascot O:-) Cheers, Juan. -- To unsubscribe from this list: send

[Bug 42755] KVM is being extremely slow on AMD Athlon64 4000+ Dual Core 2.1GHz Brisbane

2012-02-14 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=42755 --- Comment #28 from Avi Kivity a...@redhat.com 2012-02-14 14:47:38 --- (In reply to comment #27) and there soon will be video capture with 'perf top' http://vbox7.com/play:199e9ede30 Run it while the guest is also running. --

Re: The way of mapping BIOS into the guest's address space

2012-02-14 Thread cody
On 02/14/2012 07:03 PM, Yang Bai wrote: Hi all, Since on X86, bios is always at the end of the address space, so I have some thought about how to implement the seabios support for kvm tool. 1. using kvm__register_mem to map the end of address space to the guest then copy the code of seabios to

[PATCH v3 5/9] kvmvapic: Add option ROM

2012-02-14 Thread Jan Kiszka
This imports and builds the original VAPIC option ROM of qemu-kvm. Its interaction with QEMU is described in the commit that introduces the corresponding device model. Signed-off-by: Jan Kiszka jan.kis...@siemens.com --- .gitignore |1 + Makefile |2

[PATCH v3 7/9] kvmvapic: Simplify mp/up_set_tpr

2012-02-14 Thread Jan Kiszka
The CH registers is only written, never read. So we can remove these operations and, in case of up_set_tpr, also the ECX push/pop. Signed-off-by: Jan Kiszka jan.kis...@siemens.com --- pc-bios/optionrom/kvmvapic.S |6 +- 1 files changed, 1 insertions(+), 5 deletions(-) diff --git

[PATCH v3 2/9] Remove useless casts from cpu iterators

2012-02-14 Thread Jan Kiszka
CPUState::next_cpu is already CPUState *. Signed-off-by: Jan Kiszka jan.kis...@siemens.com --- cpus.c |8 1 files changed, 4 insertions(+), 4 deletions(-) diff --git a/cpus.c b/cpus.c index d0c8340..4e65894 100644 --- a/cpus.c +++ b/cpus.c @@ -853,7 +853,7 @@ static int

[PATCH v3 1/9] kvm: Set cpu_single_env only once

2012-02-14 Thread Jan Kiszka
As we have thread-local cpu_single_env now and KVM uses exactly one thread per VCPU, we can drop the cpu_single_env updates from the loop and initialize this variable only once during setup. Signed-off-by: Jan Kiszka jan.kis...@siemens.com --- cpus.c|1 + kvm-all.c |5 - 2 files

[PATCH v3 9/9] kvmvapic: Use optionrom helpers

2012-02-14 Thread Jan Kiszka
Use OPTION_ROM_START/END from the common header file, add comment to init code. Signed-off-by: Jan Kiszka jan.kis...@siemens.com --- pc-bios/optionrom/kvmvapic.S | 18 -- 1 files changed, 8 insertions(+), 10 deletions(-) diff --git a/pc-bios/optionrom/kvmvapic.S

[PATCH v3 4/9] target-i386: Add infrastructure for reporting TPR MMIO accesses

2012-02-14 Thread Jan Kiszka
This will allow the APIC core to file a TPR access report. Depending on the accelerator and kernel irqchip mode, it will either be delivered right away or queued for later reporting. In TCG mode, we can restart the triggering instruction and can therefore forward the event directly. KVM does not

[PATCH v3 3/9] Allow to use pause_all_vcpus from VCPU context

2012-02-14 Thread Jan Kiszka
In order to perform critical manipulations on the VM state in the context of a VCPU, specifically code patching, stopping and resuming of all VCPUs may be necessary. resume_all_vcpus is already compatible, now enable pause_all_vcpus for this use case by stopping the calling context before starting

[PATCH v3 8/9] optionsrom: Reserve space for checksum

2012-02-14 Thread Jan Kiszka
Always add a byte before the final 512-bytes alignment to reserve the space for the ROM checksum. Signed-off-by: Jan Kiszka jan.kis...@siemens.com --- pc-bios/optionrom/optionrom.h |3 ++- 1 files changed, 2 insertions(+), 1 deletions(-) diff --git a/pc-bios/optionrom/optionrom.h

[PATCH v3 0/9] uq/master: TPR access optimization for Windows guests

2012-02-14 Thread Jan Kiszka
v3 comes with the following changes: - clear TPR access report on system reset (in case we load a guest without the option ROM) - addressed review comments on details in kvmvapic.c - streamlined 16-bit VAPIC port handling - included cleanup for useless next_cpu casts in cpus.c (to avoid

[PATCH v3 6/9] kvmvapic: Introduce TPR access optimization for Windows guests

2012-02-14 Thread Jan Kiszka
This enables acceleration for MMIO-based TPR registers accesses of 32-bit Windows guest systems. It is mostly useful with KVM enabled, either on older Intel CPUs (without flexpriority feature, can also be manually disabled for testing) or any current AMD processor. The approach introduced here is

Re: level in kvm_mmu_page_role

2012-02-14 Thread Avi Kivity
On 02/13/2012 11:30 PM, Sanidhya Kashyap wrote: I have been going through the kvm code but didn't get the significance of level in kvm_mmu_page_role. So, it would be nice if anyone can explain it what is its use? It's the page table level. Level 1 contains page table entries pointing to 4k

Re: [PATCH 0/4 V13] Avoid soft lockup message when KVM is stopped by host

2012-02-14 Thread Eric B Munson
On Wed, 08 Feb 2012, Eric B Munson wrote: When a guest kernel is stopped by the host hypervisor it can look like a soft lockup to the guest kernel. This false warning can mask later soft lockup warnings which may be real. This patch series adds a method for a host hypervisor to

Re: The way of mapping BIOS into the guest's address space

2012-02-14 Thread Pekka Enberg
On Tue, Feb 14, 2012 at 09:20:18PM +0800, Yang Bai wrote: And will seabios replace the present bios implement or co-exsit? On Tue, Feb 14, 2012 at 3:32 PM, Cyrill Gorcunov gorcu...@openvz.org wrote: Ideally we should get rid of our minibios completely and only have seabios here instead. No,

Re: The way of mapping BIOS into the guest's address space

2012-02-14 Thread Cyrill Gorcunov
On Tue, Feb 14, 2012 at 05:35:47PM +0200, Pekka Enberg wrote: On Tue, Feb 14, 2012 at 09:20:18PM +0800, Yang Bai wrote: And will seabios replace the present bios implement or co-exsit? On Tue, Feb 14, 2012 at 3:32 PM, Cyrill Gorcunov gorcu...@openvz.org wrote: Ideally we should get rid of

Re: The way of mapping BIOS into the guest's address space

2012-02-14 Thread Pekka Enberg
On Tue, Feb 14, 2012 at 5:38 PM, Cyrill Gorcunov gorcu...@openvz.org wrote: Ideally we should get rid of our minibios completely and only have seabios here instead. No, no, they should co-exist. There's absolutely no reason to force people to use a BIOS to boot Linux. I meant run-time (ie

Re: [PATCH 0/4 V13] Avoid soft lockup message when KVM is stopped by host

2012-02-14 Thread Marcelo Tosatti
On Tue, Feb 14, 2012 at 10:29:31AM -0500, Eric B Munson wrote: On Wed, 08 Feb 2012, Eric B Munson wrote: When a guest kernel is stopped by the host hypervisor it can look like a soft lockup to the guest kernel. This false warning can mask later soft lockup warnings which may be

Re: [PATCH 0/4 V13] Avoid soft lockup message when KVM is stopped by host

2012-02-14 Thread Eric B Munson
On Tue, 14 Feb 2012, Marcelo Tosatti wrote: On Tue, Feb 14, 2012 at 10:29:31AM -0500, Eric B Munson wrote: On Wed, 08 Feb 2012, Eric B Munson wrote: When a guest kernel is stopped by the host hypervisor it can look like a soft lockup to the guest kernel. This false warning

Re: [PATCH 0/4 V13] Avoid soft lockup message when KVM is stopped by host

2012-02-14 Thread Marcelo Tosatti
On Tue, Feb 14, 2012 at 10:50:13AM -0500, Eric B Munson wrote: On Tue, 14 Feb 2012, Marcelo Tosatti wrote: On Tue, Feb 14, 2012 at 10:29:31AM -0500, Eric B Munson wrote: On Wed, 08 Feb 2012, Eric B Munson wrote: When a guest kernel is stopped by the host hypervisor it can look

[PATCH] virt: Fix migration bg command

2012-02-14 Thread Lucas Meneghel Rodrigues
In migration tests, the command we were using as a 'watchdog' command was tcpdump, but without specifying which interface it should listen to. As this may fail depending on the interface ordering, let's change the command to listen in all interfaces, since this way it's safer and the command won't

Re: [PATCH 1/2] KVM: mmu_notifier: Flush TLBs before releasing mmu_lock

2012-02-14 Thread Andrea Arcangeli
On Fri, Feb 10, 2012 at 03:28:31PM +0900, Takuya Yoshikawa wrote: Other threads may process the same page in that small window and skip TLB flush and then return before these functions do flush. It's correct to flush the shadow MMU TLB without the mmu_lock only in the context of mmu notifier

Re: [PATCH 2/2] KVM: MMU: Flush TLBs only once in invlpg() before releasing mmu_lock

2012-02-14 Thread Andrea Arcangeli
On Tue, Feb 14, 2012 at 01:56:17PM +0900, Takuya Yoshikawa wrote: (2012/02/14 13:36), Takuya Yoshikawa wrote: BTW, do you think that kvm_mmu_flush_tlb() should be moved inside of the mmu_lock critical section? Ah, forget about this. Trivially no. Yes the reason is that it's the local

Re: [PATCH 1/2] KVM: mmu_notifier: Flush TLBs before releasing mmu_lock

2012-02-14 Thread Andrea Arcangeli
On Fri, Feb 10, 2012 at 03:52:49PM +0800, Xiao Guangrong wrote: On 02/10/2012 02:28 PM, Takuya Yoshikawa wrote: Other threads may process the same page in that small window and skip TLB flush and then return before these functions do flush. It is possible that flush tlb in mmu lock

Re: [PATCH 1/2] KVM: mmu_notifier: Flush TLBs before releasing mmu_lock

2012-02-14 Thread Marcelo Tosatti
On Tue, Feb 14, 2012 at 06:10:44PM +0100, Andrea Arcangeli wrote: On Fri, Feb 10, 2012 at 03:28:31PM +0900, Takuya Yoshikawa wrote: Other threads may process the same page in that small window and skip TLB flush and then return before these functions do flush. It's correct to flush the

Re: [VT-d reboot problems] Re: [PATCH] x86 / reboot: Blacklist Dell OptiPlex 990 known to require PCI reboot

2012-02-14 Thread Bastien ROUCARIES
On Tue, Jan 31, 2012 at 1:15 PM, Ingo Molnar mi...@elte.hu wrote: (added KVM folks to the Cc:) * Bastien ROUCARIES roucaries.bast...@gmail.com wrote: Ping^2 Bastien On Mon, Jan 23, 2012 at 11:28 AM, Bastien ROUCARIES roucaries.bast...@gmail.com wrote: On Mon, Jan 16, 2012 at 8:21 PM,

Re: AESNI and guest hosts

2012-02-14 Thread Brian Jackson
On Tuesday, February 14, 2012 03:31:10 AM Ryan Brown wrote: Sorry for being a noob here, Any clues with this?, anyone ... On Mon, Feb 13, 2012 at 2:05 AM, Ryan Brown mp3g...@gmail.com wrote: Host/KVM server is running linux 3.2.4 (Debian wheezy), and guest kernel is running 3.2.5. The cpu

Re: [PATCH 1/2] KVM: mmu_notifier: Flush TLBs before releasing mmu_lock

2012-02-14 Thread Andrea Arcangeli
On Tue, Feb 14, 2012 at 03:29:47PM -0200, Marcelo Tosatti wrote: The problem the patch is fixing is not related to page freeing, but rmap_write_protect. From 8bf3f6f06fcdfd097b6c6ec51531d8292fa0d81d Can't find the commit on kvm.git. (replace A (get_dirty_log) with

Re: [RFC PATCH v0 1/2] net: bridge: propagate FDB table into hardware

2012-02-14 Thread John Fastabend
On 2/14/2012 5:18 AM, jamal wrote: On Mon, 2012-02-13 at 07:13 -0800, John Fastabend wrote: The use case here is multiple VFs but the same solution should work with multiple PFs as well. FDB controls should be independent of how the ports are exposed VFs, PFs, VMDQ/queue pairs, macvlan, etc.

Re: [RFC PATCH v0 1/2] net: bridge: propagate FDB table into hardware

2012-02-14 Thread Stephen Hemminger
On Tue, 14 Feb 2012 10:57:04 -0800 John Fastabend john.r.fastab...@intel.com wrote: On 2/14/2012 5:18 AM, jamal wrote: On Mon, 2012-02-13 at 07:13 -0800, John Fastabend wrote: The use case here is multiple VFs but the same solution should work with multiple PFs as well. FDB controls

Re: [RFC PATCH v0 1/2] net: bridge: propagate FDB table into hardware

2012-02-14 Thread John Fastabend
On 2/14/2012 11:05 AM, Stephen Hemminger wrote: On Tue, 14 Feb 2012 10:57:04 -0800 John Fastabend john.r.fastab...@intel.com wrote: On 2/14/2012 5:18 AM, jamal wrote: On Mon, 2012-02-13 at 07:13 -0800, John Fastabend wrote: The use case here is multiple VFs but the same solution should

Re: [PATCH 1/2] KVM: mmu_notifier: Flush TLBs before releasing mmu_lock

2012-02-14 Thread Marcelo Tosatti
On Tue, Feb 14, 2012 at 07:53:56PM +0100, Andrea Arcangeli wrote: On Tue, Feb 14, 2012 at 03:29:47PM -0200, Marcelo Tosatti wrote: The problem the patch is fixing is not related to page freeing, but rmap_write_protect. From 8bf3f6f06fcdfd097b6c6ec51531d8292fa0d81d Can't find the commit on

Re: [PATCH 0/4 V13] Avoid soft lockup message when KVM is stopped by host

2012-02-14 Thread Eric B Munson
On Tue, 14 Feb 2012, Marcelo Tosatti wrote: On Tue, Feb 14, 2012 at 10:50:13AM -0500, Eric B Munson wrote: On Tue, 14 Feb 2012, Marcelo Tosatti wrote: On Tue, Feb 14, 2012 at 10:29:31AM -0500, Eric B Munson wrote: On Wed, 08 Feb 2012, Eric B Munson wrote: When a guest

Re: AESNI and guest hosts

2012-02-14 Thread Ryan Brown
Thanks for the reply, I was thinking AESNI was supported in the way SSE/MMX and other cpu flags are supported? is a QEMU or a KVM issue? On Wed, Feb 15, 2012 at 7:18 AM, Brian Jackson i...@theiggy.com wrote: On Tuesday, February 14, 2012 03:31:10 AM Ryan Brown wrote: Sorry for being a noob

Re: The way of mapping BIOS into the guest's address space

2012-02-14 Thread Kevin O'Connor
On Tue, Feb 14, 2012 at 04:13:42PM +0400, Cyrill Gorcunov wrote: On Tue, Feb 14, 2012 at 01:10:59PM +0200, Pekka Enberg wrote: On Tue, Feb 14, 2012 at 1:03 PM, Yang Bai hamo...@gmail.com wrote: Since on X86, bios is always at the end of the address space, so I have some thought about how

buildbot failure in kvm on i386

2012-02-14 Thread kvm
The Buildbot has detected a new failure on builder i386 while building kvm. Full details are available at: http://buildbot.b1-systems.de/kvm/builders/i386/builds/454 Buildbot URL: http://buildbot.b1-systems.de/kvm/ Buildslave for this Build: b1_kvm_1 Build Reason: The Nightly scheduler named

[Bug 42755] KVM is being extremely slow on AMD Athlon64 4000+ Dual Core 2.1GHz Brisbane

2012-02-14 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=42755 --- Comment #29 from Rosen sandik...@yandex.ru 2012-02-15 07:49:35 --- (In reply to comment #28) (In reply to comment #27) and there soon will be video capture with 'perf top' http://vbox7.com/play:199e9ede30 Run it while the guest