Re: [kvm-devel] [PATCH] KVM x86: Handle hypercalls for assigned PCI devices

2008-04-30 Thread Muli Ben-Yehuda
On Wed, Apr 30, 2008 at 01:48:38AM +0300, Avi Kivity wrote: Amit Shah wrote: + if (is_error_page(host_page)) { + printk(KERN_INFO %s: gfn %p not valid\n, + __func__, (void *)page_gfn); + r = -1; r = -1 is not really informative. Better use some

Re: [kvm-devel] [PATCH] Handle vma regions with no backing page (v2)

2008-04-30 Thread Muli Ben-Yehuda
On Tue, Apr 29, 2008 at 02:09:20PM -0500, Anthony Liguori wrote: This patch allows VMA's that contain no backing page to be used for guest memory. This is a drop-in replacement for Ben-Ami's first page in his direct mmio series. Here, we continue to allow mmio pages to be represented in the

Re: [kvm-devel] [PATCH] x86 DMA: Handle devices assigned to the guest by the host

2008-04-30 Thread Muli Ben-Yehuda
On Tue, Apr 29, 2008 at 01:37:29PM +0300, Amit Shah wrote: dma_alloc_coherent() doesn't call dma_ops-alloc_coherent in case no IOMMU translations are necessary. I always thought this was a huge wart in the x86-64 DMA ops. Would there be strong resistance to fixing it so that alloc_coherent

Re: [kvm-devel] [PATCH] Handle vma regions with no backing page (v2)

2008-04-30 Thread Anthony Liguori
Muli Ben-Yehuda wrote: On Tue, Apr 29, 2008 at 02:09:20PM -0500, Anthony Liguori wrote: This patch allows VMA's that contain no backing page to be used for guest memory. This is a drop-in replacement for Ben-Ami's first page in his direct mmio series. Here, we continue to allow mmio

Re: [kvm-devel] [PATCH] Handle vma regions with no backing page (v2)

2008-04-30 Thread Andrea Arcangeli
On Wed, Apr 30, 2008 at 11:59:47AM +0300, Avi Kivity wrote: The code is not trying to find a vma for the address, but a vma for the address which also has VM_PFNMAP set. The cases for vma not found, or vma found, but not VM_PFNMAP, are folded together. Muli's saying the comparison is

Re: [kvm-devel] [PATCH] Handle vma regions with no backing page (v2)

2008-04-30 Thread Avi Kivity
Andrea Arcangeli wrote: On Wed, Apr 30, 2008 at 11:59:47AM +0300, Avi Kivity wrote: The code is not trying to find a vma for the address, but a vma for the address which also has VM_PFNMAP set. The cases for vma not found, or vma found, but not VM_PFNMAP, are folded together.

Re: [kvm-devel] small author mixup

2008-04-30 Thread Avi Kivity
Christian Borntraeger wrote: Am Sonntag, 27. April 2008 schrieb Avi Kivity: Carsten Otte (4): s390: KVM preparation: provide hook to enable pgstes in user pagetable KVM: s390: interrupt subsystem, cpu timer, waitpsw KVM: s390: API documentation s390: KVM guest:

[kvm-devel] [ kvm-Bugs-1953353 ] could not load PC BIOS '/path/to/bios.bin' on -m 4096

2008-04-30 Thread SourceForge.net
Bugs item #1953353, was opened at 2008-04-28 13:50 Message generated for change (Comment added) made by ravpl You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=1953353group_id=180599 Please note that this message will contain a full copy of the comment

Re: [kvm-devel] small author mixup (was: git pull KVM updates for 2.6.26rc)

2008-04-30 Thread Ingo Molnar
* Christian Borntraeger [EMAIL PROTECTED] wrote: While it is not a typical case, is there a better way of specifying multiple authors to avoid future confusion? i think the established rule is that there's one Author field per commit. Multiple authors should either submit a tree with

Re: [kvm-devel] [PATCH] Handle vma regions with no backing page (v2)

2008-04-30 Thread Avi Kivity
Muli Ben-Yehuda wrote: @@ -544,19 +545,35 @@ pfn_t gfn_to_pfn(struct kvm *kvm, gfn_t gfn) npages = get_user_pages(current, current-mm, addr, 1, 1, 1, page, NULL); -if (npages != 1) { -get_page(bad_page); -return

Re: [kvm-devel] Moving kvm lists to kernel.org?

2008-04-30 Thread Avi Kivity
David Miller wrote: I've created (and tested) all of these lists. Thanks. I about a week I'll make the sourceforge lists read-only. -- Any sufficiently difficult bug is indistinguishable from a feature. - This

Re: [kvm-devel] [PATCH] x86: handle double and triple faults for every exception

2008-04-30 Thread Avi Kivity
Jan Kiszka wrote: Joerg Roedel wrote: The current KVM x86 exception code handles double and triple faults only for page fault exceptions. This patch extends this detection for every exception that gets queued for the guest. Signed-off-by: Joerg Roedel [EMAIL PROTECTED] Cc: Jan Kiszka

Re: [kvm-devel] [PATCH] x86: handle double and triple faults for every exception

2008-04-30 Thread Joerg Roedel
On Wed, Apr 30, 2008 at 10:45:12AM +0200, Jan Kiszka wrote: Joerg Roedel wrote: The current KVM x86 exception code handles double and triple faults only for page fault exceptions. This patch extends this detection for every exception that gets queued for the guest. Signed-off-by: Joerg

[kvm-devel] Windows PV driver for KVM

2008-04-30 Thread Jiang, Yunhong
I noticed there is a windows PV driver based on virtIO in http://sourceforge.net/project/showfiles.php?group_id=180599 But when I enable the driver in guest, the guest will hang. I'm using changeset around April, 18. Since the driver is created in March, I assume the changeset in Apri should be

Re: [kvm-devel] performance with guests running 2.4 kernels (specifically RHEL3)

2008-04-30 Thread Avi Kivity
David S. Ahern wrote: Another tidbit for you guys as I make my way through various permutations: I installed the RHEL3 hugemem kernel and the guest behavior is *much* better. System time still has some regular hiccups that are higher than xen and esx (e.g., 1 minute samples out of 5 show

[kvm-devel] [ANNOUNCE] kvm mailing lists moving

2008-04-30 Thread Avi Kivity
In about a week, the various kvm lists will move to vger.kenel.org. This will improve responsiveness, and reduce spam and advertising. Please subscribe to the lists you are interested in as soon as possible. You can subscribe by sending an email to [EMAIL PROTECTED], with the following lines

Re: [kvm-devel] [PATCH] x86: handle double and triple faults for every exception

2008-04-30 Thread Jan Kiszka
Avi Kivity wrote: Jan Kiszka wrote: Joerg Roedel wrote: The current KVM x86 exception code handles double and triple faults only for page fault exceptions. This patch extends this detection for every exception that gets queued for the guest. Signed-off-by: Joerg Roedel [EMAIL

Re: [kvm-devel] Wiki: Add SMP Count to Guest Support Status

2008-04-30 Thread Fabian Deutsch
Avi Kivity wrote: Fabian Deutsch wrote: Hey. I've been trying Microsoft Windows 2003 a couple of times. The wiki tells me that everything should work okay. It does, when using -smp 1, but gets ugly when using -smp 2 or so. SO might it be useful, to add the column smp to the Guest

Re: [kvm-devel] [PATCH] x86: handle double and triple faults for every exception

2008-04-30 Thread Avi Kivity
Jan Kiszka wrote: Clear the pending original exception when raising a triple fault. This allows to re-use the vcpu instance, e.g. after a reset which is typically issued as reaction on the triple fault. Signed-off-by: Jan Kiszka [EMAIL PROTECTED] --- arch/x86/kvm/x86.c |4 +++- 1

Re: [kvm-devel] [PATCH] x86: handle double and triple faults for every exception

2008-04-30 Thread Jan Kiszka
Joerg Roedel wrote: The current KVM x86 exception code handles double and triple faults only for page fault exceptions. This patch extends this detection for every exception that gets queued for the guest. Signed-off-by: Joerg Roedel [EMAIL PROTECTED] Cc: Jan Kiszka [EMAIL PROTECTED] ---

[kvm-devel] [PATCH] libkvm: dump all errors to stderr

2008-04-30 Thread Jan Kiszka
Minor cleanup I came across while reverting printf instrumentations. Signed-off-by: Jan Kiszka [EMAIL PROTECTED] --- libkvm/libkvm-x86.c |4 ++-- libkvm/libkvm.c |4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) Index: b/libkvm/libkvm-x86.c

[kvm-devel] [PATCH] libkvm: fix physical_memory calculation

2008-04-30 Thread Jan Kiszka
This looks bogus, but it is so far without practical impact (phys_start is always 0 when we do the calculation). Signed-off-by: Jan Kiszka [EMAIL PROTECTED] --- libkvm/libkvm.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) Index: b/libkvm/libkvm.c

Re: [kvm-devel] Fwd: [kvm-ppc-devel] [PATCH] kvmppc: deliver INTERRUPT_FP_UNAVAIL to the guest

2008-04-30 Thread Avi Kivity
Hollis Blanchard wrote: Acked-by: Hollis Blanchard [EMAIL PROTECTED] Avi, please apply for 2.6.26. Sure thing. Thanks. -- Any sufficiently difficult bug is indistinguishable from a feature. - This SF.net email is

[kvm-devel] [ kvm-Bugs-1953353 ] could not load PC BIOS '/path/to/bios.bin' on -m 4096

2008-04-30 Thread SourceForge.net
Bugs item #1953353, was opened at 2008-04-28 07:50 Message generated for change (Comment added) made by mtosatti You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=1953353group_id=180599 Please note that this message will contain a full copy of the comment

Re: [kvm-devel] performance with guests running 2.4 kernels (specifically RHEL3)

2008-04-30 Thread David S. Ahern
Avi Kivity wrote: David S. Ahern wrote: Another tidbit for you guys as I make my way through various permutations: I installed the RHEL3 hugemem kernel and the guest behavior is *much* better. System time still has some regular hiccups that are higher than xen and esx (e.g., 1 minute

Re: [kvm-devel] performance with guests running 2.4 kernels (specifically RHEL3)

2008-04-30 Thread Avi Kivity
David S. Ahern wrote: Avi Kivity wrote: David S. Ahern wrote: Another tidbit for you guys as I make my way through various permutations: I installed the RHEL3 hugemem kernel and the guest behavior is *much* better. System time still has some regular hiccups that are higher than

Re: [kvm-devel] performance with guests running 2.4 kernels (specifically RHEL3)

2008-04-30 Thread Daniel P. Berrange
On Wed, Apr 30, 2008 at 07:39:53AM -0600, David S. Ahern wrote: Avi Kivity wrote: David S. Ahern wrote: Another tidbit for you guys as I make my way through various permutations: I installed the RHEL3 hugemem kernel and the guest behavior is *much* better. System time still has some

[kvm-devel] [ kvm-Bugs-1953353 ] could not load PC BIOS '/path/to/bios.bin' on -m 4096

2008-04-30 Thread SourceForge.net
Bugs item #1953353, was opened at 2008-04-28 14:50 Message generated for change (Comment added) made by izike You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=1953353group_id=180599 Please note that this message will contain a full copy of the comment

Re: [kvm-devel] [PATCH] Handle vma regions with no backing page (v2)

2008-04-30 Thread Carsten Otte
Avi Kivity wrote: Hollis/Xiantao/Carsten, can you confirm that this approach works for you? Carsten, I believe you don't have mmio, but at least this shouldn't interfere. Should work fine on s390 afaics. - This SF.net

[kvm-devel] You make me wet real quick

2008-04-30 Thread Cauley
My neighbor keeps me awake all night with their late night activities http://www.poieuean.com/ - This SF.net email is sponsored by the 2008 JavaOne(SM) Conference Don't miss this year's exciting event. There's still time to

Re: [kvm-devel] performance with guests running 2.4 kernels (specifically RHEL3)

2008-04-30 Thread David S. Ahern
Yes, the 4G/4G patch and the 64G options are both enabled for the hugemem kernel: CONFIG_HIGHMEM64G=y CONFIG_X86_4G=y Differences between the standard kernel and the hugemem kernel: # diff config-2.4.21-47.ELsmp config-2.4.21-47.ELhugemem 2157,2158c2157,2158 CONFIG_M686=y #

[kvm-devel] small author mixup (was: git pull KVM updates for 2.6.26rc)

2008-04-30 Thread Christian Borntraeger
Am Sonntag, 27. April 2008 schrieb Avi Kivity: Carsten Otte (4): s390: KVM preparation: provide hook to enable pgstes in user pagetable KVM: s390: interrupt subsystem, cpu timer, waitpsw KVM: s390: API documentation s390: KVM guest: detect when running on kvm

Re: [kvm-devel] [PATCH] Handle vma regions with no backing page (v2)

2008-04-30 Thread Hollis Blanchard
On Tuesday 29 April 2008 18:12:51 Anthony Liguori wrote: IIUC PPC correctly, all IO pages have corresponding struct pages.  This means that get_user_pages() would succeed and you can reference count them?  In this case, we would never take the VM_PFNMAP path. Is that correct? I think

Re: [kvm-devel] [PATCH] Handle vma regions with no backing page (v2)

2008-04-30 Thread Anthony Liguori
Andrea Arcangeli wrote: On Tue, Apr 29, 2008 at 06:12:51PM -0500, Anthony Liguori wrote: IIUC PPC correctly, all IO pages have corresponding struct pages. This means that get_user_pages() would succeed and you can reference count them? In this case, we would never take the VM_PFNMAP

[kvm-devel] [PATCH] make setup_secondary_clock definition dependent on local apic

2008-04-30 Thread Glauber Costa
since the pv_apic_ops are only present if CONFIG_X86_LOCAL_APIC is compiled in, kvmclock failed to build without this option. This patch fixes this Signed-off-by: Glauber Costa [EMAIL PROTECTED] --- arch/x86/kernel/kvmclock.c |4 1 files changed, 4 insertions(+), 0 deletions(-) diff

[kvm-devel] [ kvm-Bugs-1952988 ] in-kernel PIT blocks DragonFlyBSD from booting

2008-04-30 Thread SourceForge.net
Bugs item #1952988, was opened at 2008-04-27 15:25 Message generated for change (Comment added) made by carenas You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=1952988group_id=180599 Please note that this message will contain a full copy of the comment

[kvm-devel] [PATCH] x86: add missing kvmtrace bits

2008-04-30 Thread Joerg Roedel
This patch adds some kvmtrace bits to the generic x86 code where it is instrumented from SVM. Signed-off-by: Joerg Roedel [EMAIL PROTECTED] --- arch/x86/kvm/x86.c | 25 - 1 files changed, 20 insertions(+), 5 deletions(-) diff --git a/arch/x86/kvm/x86.c

[kvm-devel] [PATCH] SVM: add missing kvmtrace markers

2008-04-30 Thread Joerg Roedel
This patch adds the missing kvmtrace markers to the svm module of kvm. Signed-off-by: Joerg Roedel [EMAIL PROTECTED] --- arch/x86/kvm/svm.c | 26 +- 1 files changed, 25 insertions(+), 1 deletions(-) diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index

[kvm-devel] [PATCH] SVM: implement dedicated NMI exit handler

2008-04-30 Thread Joerg Roedel
With an exit handler for NMI intercepts its possible to account them using kvmtrace. Signed-off-by: Joerg Roedel [EMAIL PROTECTED] --- arch/x86/kvm/svm.c |7 ++- 1 files changed, 6 insertions(+), 1 deletions(-) diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index ab22615..6dce863

[kvm-devel] [PATCH] SVM: implement dedicated INTR exit handler

2008-04-30 Thread Joerg Roedel
With an exit handler for INTR intercepts its possible to account them using kvmtrace. Signed-off-by: Joerg Roedel [EMAIL PROTECTED] --- arch/x86/kvm/svm.c |8 +++- 1 files changed, 7 insertions(+), 1 deletions(-) diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index

[kvm-devel] [PATCH] VMX: move APIC_ACCESS trace entry to generic code

2008-04-30 Thread Joerg Roedel
This patch moves the trace entry for APIC accesses from the VMX code to the generic lapic code. This way APIC accesses from SVM will also be traced. Signed-off-by: Joerg Roedel [EMAIL PROTECTED] --- arch/x86/kvm/lapic.c |4 arch/x86/kvm/vmx.c |2 -- 2 files changed, 4

[kvm-devel] [PATCH] SVM: add tracing support for TDP page faults

2008-04-30 Thread Joerg Roedel
To distinguish between real page faults and nested page faults they should be traced as different events. This is implemented by this patch. Signed-off-by: Joerg Roedel [EMAIL PROTECTED] --- arch/x86/kvm/svm.c|4 include/asm-x86/kvm.h |1 + 2 files changed, 5 insertions(+), 0

[kvm-devel] [PATCH] kvm-userspace: add kvmtrace format for TDP events

2008-04-30 Thread Joerg Roedel
This patch adds a format line for TDP page faults to the formats file. Signed-off-by: Joerg Roedel [EMAIL PROTECTED] --- user/formats |1 + 1 files changed, 1 insertions(+), 0 deletions(-) diff --git a/user/formats b/user/formats index 5313a47..c6c49d6 100644 --- a/user/formats +++

[kvm-devel] [PATCH 0/6] SVM: complete support for kvmtrace

2008-04-30 Thread Joerg Roedel
This series of patches adds the missing kvmtrace markers to the SVM specific code paths in KVM. Further it adds a new trace event for TDP page faults. The diffstat: arch/x86/kvm/lapic.c |4 arch/x86/kvm/svm.c| 45 ++--- arch/x86/kvm/vmx.c

Re: [kvm-devel] [PATCH] x86: handle double and triple faults for every exception

2008-04-30 Thread Jan Kiszka
Avi Kivity wrote: Jan Kiszka wrote: Clear the pending original exception when raising a triple fault. This allows to re-use the vcpu instance, e.g. after a reset which is typically issued as reaction on the triple fault. Signed-off-by: Jan Kiszka [EMAIL PROTECTED] --- arch/x86/kvm/x86.c

[kvm-devel] [PATCH] kvm_show_code for ROM code

2008-04-30 Thread Jan Kiszka
Userland-located ROM memory is not available via kvm-physical_memory + guest_address. To let kvm_show_code also dump useful information when some problem in ROM (BIOS...) occurs, this patch first tries to obtain the memory content via the mmio_read callback - maybe not 100% clean, but works at

[kvm-devel] KVM: PIT: support mode 4

2008-04-30 Thread Marcelo Tosatti
The in-kernel PIT emulation ignores pending timers if operating under mode 4, which for example DragonFlyBSD uses (and Plan9 too, apparently). Mode 4 seems to be similar to one-shot mode, other than the fact that it starts counting after the next CLK pulse once programmed, while mode 1 starts

[kvm-devel] cirrusfb division by zero

2008-04-30 Thread Marcelo Tosatti
Anthony, The following sequence crashes F9 guests, when using VNC: # modprobe cirrusfb # vbetool post Results in Floating point exception at: cirrus_do_copy() { depth = s-get_bpp((VGAState *)s) / 8 ... sx = (src % (width * depth)) / depth; ... } Problem is that -get_bpp

[kvm-devel] [ kvm-Bugs-1905703 ] SMP 8-way guests fail to boot

2008-04-30 Thread SourceForge.net
Bugs item #1905703, was opened at 2008-03-02 10:49 Message generated for change (Comment added) made by mtosatti You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=1905703group_id=180599 Please note that this message will contain a full copy of the comment

[kvm-devel] [ kvm-Bugs-1919354 ] Booting four guests likely fails

2008-04-30 Thread SourceForge.net
Bugs item #1919354, was opened at 2008-03-19 04:18 Message generated for change (Comment added) made by mtosatti You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=1919354group_id=180599 Please note that this message will contain a full copy of the comment

[kvm-devel] [ kvm-Bugs-1881418 ] win xp guest BSOD and host kernel oops if -smb path

2008-04-30 Thread SourceForge.net
Bugs item #1881418, was opened at 2008-01-28 16:55 Message generated for change (Comment added) made by mtosatti You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=1881418group_id=180599 Please note that this message will contain a full copy of the comment

Re: [kvm-devel] KVM: PIT: support mode 4

2008-04-30 Thread Avi Kivity
Marcelo Tosatti wrote: The in-kernel PIT emulation ignores pending timers if operating under mode 4, which for example DragonFlyBSD uses (and Plan9 too, apparently). Mode 4 seems to be similar to one-shot mode, other than the fact that it starts counting after the next CLK pulse once

Re: [kvm-devel] [PATCH] x86: handle double and triple faults for every exception

2008-04-30 Thread Avi Kivity
Jan Kiszka wrote: Yes, the following still works for me. But I'm not the right person to ask if there are obscure cases where you may not want this clearing while just editing some registers (I'm thinking of debugger scenarios now). Applied, as the bug we're fixing is much more likely

[kvm-devel] [ kvm-Bugs-1905703 ] SMP 8-way guests fail to boot

2008-04-30 Thread SourceForge.net
Bugs item #1905703, was opened at 2008-03-02 15:49 Message generated for change (Comment added) made by jroedel You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=1905703group_id=180599 Please note that this message will contain a full copy of the comment

Re: [kvm-devel] [PATCH 0/6] SVM: complete support for kvmtrace

2008-04-30 Thread Avi Kivity
Joerg Roedel wrote: This series of patches adds the missing kvmtrace markers to the SVM specific code paths in KVM. Further it adds a new trace event for TDP page faults. Thanks, applied all. Please use git format-patch -n (or format.numbered = auto) so that patch order is explicit. --

Re: [kvm-devel] cirrusfb division by zero

2008-04-30 Thread Anthony Liguori
Marcelo Tosatti wrote: Anthony, The following sequence crashes F9 guests, when using VNC: # modprobe cirrusfb # vbetool post Results in Floating point exception at: cirrus_do_copy() { depth = s-get_bpp((VGAState *)s) / 8 ... sx = (src % (width * depth)) / depth;

Re: [kvm-devel] WARNING: at /usr/src/modules/kvm/mmu.c:390 account_shadowed()

2008-04-30 Thread Thomas Cataldo
On Sat, Apr 26, 2008 at 10:08 AM, Avi Kivity [EMAIL PROTECTED] wrote: Marcelo Tosatti wrote: On Wed, Apr 23, 2008 at 09:30:06AM +0300, Avi Kivity wrote: as I got no reply, I guess it is a bad setup on my part. If that might help, this happenned while I was doing a make -j on

Re: [kvm-devel] Windows PV driver for KVM

2008-04-30 Thread Avi Kivity
Jiang, Yunhong wrote: I noticed there is a windows PV driver based on virtIO in http://sourceforge.net/project/showfiles.php?group_id=180599 But when I enable the driver in guest, the guest will hang. I'm using changeset around April, 18. Since the driver is created in March, I assume the

[kvm-devel] [PATCH] use common code for i386 and x86_64

2008-04-30 Thread Glauber Costa
There is no reason why should i386 and x86_64 code for rdtsc be different. Unify them. --- cpu-all.h | 11 +-- 1 files changed, 1 insertions(+), 10 deletions(-) diff --git a/cpu-all.h b/cpu-all.h index 2a2b197..1c9e2a3 100644 --- a/cpu-all.h +++ b/cpu-all.h @@ -930,16 +930,7 @@ static

[kvm-devel] [PATCH] Don't leak EPT identity page table

2008-04-30 Thread Anthony Liguori
In vmx.c:alloc_identity_pagetable() we grab a reference to the EPT identity page table via gfn_to_page(). We never release this reference though. This patch releases the reference to this page on VM destruction. I haven't tested this with EPT. Signed-off-by: Anthony Liguori [EMAIL PROTECTED]

Re: [kvm-devel] [PATCH] Update kernel/Makefile and remove x86 only entries

2008-04-30 Thread Avi Kivity
Jerone Young wrote: This patch removes static x86 entries and makes things work for multiple archs. Signed-off-by: Jerone Young [EMAIL PROTECTED] diff --git a/kernel/Makefile b/kernel/Makefile --- a/kernel/Makefile +++ b/kernel/Makefile @@ -1,5 +1,10 @@ include ../config.mak include

Re: [kvm-devel] [PATCH 1 of 3] Remove dynamic allocation of /hypervisor node from device tree in memory

2008-04-30 Thread Avi Kivity
Jerone Young wrote: 1 file changed, 1 deletion(-) qemu/hw/ppc440_bamboo.c |1 - In 2.6.26 wait is now enabled by default. With this the /hypervisor node will not be need to be idetified to enable the guest to go into wait state while idle. Signed-off-by: Jerone Young [EMAIL

[kvm-devel] [PATCH] Handle vma regions with no backing page (v3)

2008-04-30 Thread Anthony Liguori
This patch allows VMA's that contain no backing page to be used for guest memory. This is a drop-in replacement for Ben-Ami's first page in his direct mmio series. Here, we continue to allow mmio pages to be represented in the rmap. Since v1, I've taken into account Andrea's suggestions at

Re: [kvm-devel] [kvm-ppc-devel] [PATCH] Fix kvm-userspace configure script so that cc=gcc

2008-04-30 Thread Hollis Blanchard
On Wednesday 30 April 2008 15:53:47 Jerone Young wrote: 1 file changed, 1 insertion(+), 1 deletion(-) configure |2 +- This fixes compilation for cross compilers as many do not create a ${cross_prefix}cc link. But the do a ${cross_prefix}gcc. This is what the kernel does so this will

Re: [kvm-devel] [kvm-ppc-devel] [PATCH] Update kernel/Makefile and remove x86 only entries

2008-04-30 Thread Hollis Blanchard
On Wednesday 30 April 2008 15:16:09 Avi Kivity wrote:  hack = $(call _hack,$T/$(strip $1)) + +ifneq '$(filter $(ARCH_DIR), x86)' '' +HACK_FILES = kvm_main.c \ + mmu.c \ + vmx.c \ + svm.c \ + x86.c \ + irq.h +endif  

[kvm-devel] [PATCH] Fix kvm-userspace configure script so that cc=gcc

2008-04-30 Thread Jerone Young
1 file changed, 1 insertion(+), 1 deletion(-) configure |2 +- This fixes compilation for cross compilers as many do not create a ${cross_prefix}cc link. But the do a ${cross_prefix}gcc. This is what the kernel does so this will work for everyone. This breaks some who do not have a cc link

[kvm-devel] [PATCH] [RESEND] Update kernel/Makefile and remove x86 only entries

2008-04-30 Thread Jerone Young
1 file changed, 23 insertions(+), 13 deletions(-) kernel/Makefile | 36 +++- This patch removes static x86 entries and makes things work for multiple archs. Signed-off-by: Jerone Young [EMAIL PROTECTED] diff --git a/kernel/Makefile b/kernel/Makefile ---

[kvm-devel] More queries on guest swapping in KVM

2008-04-30 Thread Arn
Hi , Regarding the guest swapping mechanism (host ability to swap out guest pages), 1) Can the host swap out any page of a guest VM ? (including the guest's kernel pages) 2) Does the guest know its page has been swapped out or is this transparent to the guest ? ( I think the guest wouldn't know

[kvm-devel] [ kvm-Bugs-1881418 ] win xp guest BSOD and host kernel oops if -smb path

2008-04-30 Thread SourceForge.net
Bugs item #1881418, was opened at 2008-01-28 21:55 Message generated for change (Comment added) made by fishor-flex You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=1881418group_id=180599 Please note that this message will contain a full copy of the comment