[kvm-devel] Extboot Option ROM rewritten in C - v2

2008-04-16 Thread Nguyen Anh Quynh
Hi Anthony, I found a bug in the last code: send_command() failed to copy back the result into extboot_cmd structure. This patch fixes it. I succesfully tested this version with guest Win2K (fully updated, scsi boot) and Linux 2.6.25-rc8 (virtio). Let me know if you can boot Windows with this ve

Re: [kvm-devel] Chaning disks from IDE to SCSI on a Windows VM

2008-04-16 Thread Elmar Haneke
> That's it. If anyone can attest to this procedures and report, it would > be greatly appreciated. I did try to do so But I do get an "disk read error". kvm is invoked via qemu-system-x86_64 \ -m 768 \ -drive file=Vista.img,if=scsi,bus=0,index=0,media=disk,boot=on \

Re: [kvm-devel] finally see her naked

2008-04-16 Thread Elliott
Discover new ways to grow your man device http://www.bugehaej.com/ - This SF.net email is sponsored by the 2008 JavaOne(SM) Conference Don't miss this year's exciting event. There's still time to save $100. Use priority code

Re: [kvm-devel] [patch 2/2] QEMU: decrease console "refresh rate" with -nographic

2008-04-16 Thread Avi Kivity
Anthony Liguori wrote: >> >> What about aio completions? The only race-free way to handle both >> posix aio completion and fd readiness is signals AFAIK. > > We poll aio completion after the select don't we? Worst case scenario > we miss a signal and wait to poll after the next select event. T

Re: [kvm-devel] performance with guests running 2.4 kernels (specifically RHEL3)

2008-04-16 Thread Avi Kivity
David S. Ahern wrote: > I have been looking at RHEL3 based guests lately, and to say the least the > performance is horrible. Rather than write a long tome on what I've done and > observed, I'd like to find out if anyone has some insights or known problem > areas running 2.4 guests. The short of it

[kvm-devel] KVM Test result, kernel 8d3a833.., userspace bae043c..

2008-04-16 Thread Yunfeng Zhao
Hi All, This is today's KVM test result against kvm.git 8d3a833dc9d42f0967e57717f89c518375d6a417 and kvm-userspace.git bae043c2ddf35ed1965f062131394afa75e45b17. Three Old Issues: 1. Booting four guests likely fails https://sourceforge.net/track

Re: [kvm-devel] [patch 2/2] QEMU: decrease console "refresh rate" with -nographic

2008-04-16 Thread Anders
Avi Kivity wrote: > if select() doesn't enable signals (like you can do with pselect) you > may sit for a long time in select() until the timer expires. Hm. Does the guest timer affect host userspace in all configurations? The original trigger for my SIGIO patch was that opening a VNC connection

Re: [kvm-devel] [patch 2/2] QEMU: decrease console "refresh rate" with -nographic

2008-04-16 Thread Avi Kivity
Anders wrote: > Avi Kivity wrote: > > >> if select() doesn't enable signals (like you can do with pselect) you >> may sit for a long time in select() until the timer expires. >> > > Hm. Does the guest timer affect host userspace in all configurations? The > original trigger for my SIGIO pat

Re: [kvm-devel] Automatic page sharing/consolidation

2008-04-16 Thread Avi Kivity
Enrico Weigelt wrote: > Hi folks, > > I'm using dozens of VE's / jails to separate applications > (even complete webapps w/ their own httpd) for easier maintenance > and better security. But this tends to consume a lot of memory, > since code sharing (.so's) cannot take effect here (each jail/VE >

Re: [kvm-devel] Automatic page sharing/consolidation

2008-04-16 Thread Izik Eidus
Avi Kivity wrote: > Enrico Weigelt wrote: >> Hi folks, >> >> I'm using dozens of VE's / jails to separate applications >> (even complete webapps w/ their own httpd) for easier maintenance >> and better security. But this tends to consume a lot of memory, >> since code sharing (.so's) cannot take ef

[kvm-devel] [PATCH 1/1] Enble a guest to access a device's memory mapped I/O regions directly.

2008-04-16 Thread benami
From: Ben-Ami Yassour <[EMAIL PROTECTED]> Signed-off-by: Ben-Ami Yassour <[EMAIL PROTECTED]> Signed-off-by: Muli Ben-Yehuda <[EMAIL PROTECTED]> --- libkvm/libkvm.c | 24 qemu/hw/pci-passthrough.c | 89 +++-- qemu/hw/pci-passthroug

[kvm-devel] [PATCH 1/1] Enble a guest to access a device's memory mapped I/O regions directly.

2008-04-16 Thread benami
From: Ben-Ami Yassour <[EMAIL PROTECTED]> Signed-off-by: Ben-Ami Yassour <[EMAIL PROTECTED]> Signed-off-by: Muli Ben-Yehuda <[EMAIL PROTECTED]> --- libkvm/libkvm.c | 24 qemu/hw/pci-passthrough.c | 89 +++-- qemu/hw/pci-passthroug

[kvm-devel] [PATCH 1/1] Enble a guest to access a device's memory mapped I/O regions directly.

2008-04-16 Thread benami
From: Ben-Ami Yassour <[EMAIL PROTECTED]> Signed-off-by: Ben-Ami Yassour <[EMAIL PROTECTED]> Signed-off-by: Muli Ben-Yehuda <[EMAIL PROTECTED]> --- arch/x86/kvm/mmu.c | 59 +-- arch/x86/kvm/paging_tmpl.h | 19 + include/linux/kvm_hos

[kvm-devel] direct mmio for passthrough - kernel part

2008-04-16 Thread benami
This patch for PCI passthrough devices enables a guest to access a device's memory mapped I/O regions directly, without requiring the host to trap and emulate every MMIO access. Updated from last version: we create a memory slot for each MMIO region of the guest's devices, and then use the /sys/

[kvm-devel] Announcement: Proxmox Virtual Environment

2008-04-16 Thread Dietmar Maurer
Hi all, I am glad to announce the first beta release of 'Proxmox Virtual Environment' - an open source virtualization platform for the enterprise. The main features are: - All code is GPL - OpenVZ and KVM support - bare metal installer (debian etch 64) - Backup/r

[kvm-devel] [PATCH 1/1] Enble a guest to access a device's memory mapped I/O regions directly.

2008-04-16 Thread benami
From: Ben-Ami Yassour <[EMAIL PROTECTED]> Signed-off-by: Ben-Ami Yassour <[EMAIL PROTECTED]> Signed-off-by: Muli Ben-Yehuda <[EMAIL PROTECTED]> --- arch/x86/kvm/mmu.c | 59 +-- arch/x86/kvm/paging_tmpl.h | 19 + include/linux/kvm_hos

Re: [kvm-devel] [patch 2/2] QEMU: decrease console "refresh rate" with -nographic

2008-04-16 Thread Anthony Liguori
Avi Kivity wrote: > Anthony Liguori wrote: >>> >>> What about aio completions? The only race-free way to handle both >>> posix aio completion and fd readiness is signals AFAIK. >> >> We poll aio completion after the select don't we? Worst case >> scenario we miss a signal and wait to poll after

[kvm-devel] [PATCH 2/2] virtio-s390: Change virtio interrupt definitions to follow architecture

2008-04-16 Thread Carsten Otte
From: Christian Borntraeger <[EMAIL PROTECTED]> This patch changes the interrupt defintions for virtio on s390. We now use the extint number 0x2603, which is used as a host interrupt already by z/VM for pfault and dasd_diag. We will use subcode 0x0D to distinguish virtio from dasd and pfault. Sig

Re: [kvm-devel] Announcement: Proxmox Virtual Environment

2008-04-16 Thread Alexey Eremenko
On Wed, Apr 16, 2008 at 1:14 PM, Dietmar Maurer <[EMAIL PROTECTED]> wrote: > Hi all, > > I am glad to announce the first beta release of 'Proxmox Virtual > Environment' - an open source virtualization platform for the > enterprise. > > The main features are: > > - All code is GPL >

[kvm-devel] [PATCH 0/2] kvm-s390 fixes

2008-04-16 Thread Carsten Otte
Hi Avi, these two fixes repair two things in kvm-s390: - #1 makes kvm complile again on s390 after a common code change - #2 changes our virtio interrupt definitions to the values that will be reserved for kvm use in s390 architecture I'd be great if both could make 2.6.26. so long, Carsten

[kvm-devel] [PATCH 1/2] kvm-s390: provide get/set_mp_state stubs to fix compile error

2008-04-16 Thread Carsten Otte
From: Christian Borntraeger <[EMAIL PROTECTED]> Since commit ded6fb24fb694bcc5f308a02ec504d45fbc8aaa6 Author: Marcelo Tosatti <[EMAIL PROTECTED]> Date: Fri Apr 11 13:24:45 2008 -0300 KVM: add ioctls to save/store mpstate kvm does not compile on s390. This patch provides ioctl stubs for s

Re: [kvm-devel] Extboot Option ROM rewritten in C - v2

2008-04-16 Thread Anthony Liguori
Nguyen Anh Quynh wrote: > Hi Anthony, > > I found a bug in the last code: send_command() failed to copy back the > result into extboot_cmd structure. This patch fixes it. > > I succesfully tested this version with guest Win2K (fully updated, > scsi boot) and Linux 2.6.25-rc8 (virtio). > > Let me kn

Re: [kvm-devel] [patch 2/2] QEMU: decrease console "refresh rate" with -nographic

2008-04-16 Thread Carsten Otte
Anthony Liguori wrote: > There is a 5th option. Do away with the use of posix aio. We get > absolutely no benefit from it because it's limited to a single thread. > Fabrice has reverted a patch to change that in the past. How about using linux aio for it? It seems much better, because it does

[kvm-devel] [ANNOUNCE] kvm-66 release

2008-04-16 Thread Avi Kivity
Today's new kvm architecture is ia64, aka Itanium 2. Like s390, it is only provided in the git tree, not in the tarball. Windows and Linux guests are supported. On good old x86, we have a the new kvmtrace performance monitoring framework together with a sizable number of bug fixes. Changes f

[kvm-devel] [PATCH 5/5] SVM: remove now obsolete FIXME comment

2008-04-16 Thread Joerg Roedel
With the usage of the V_TPR field this comment is now obsolet. Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]> --- arch/x86/kvm/svm.c |7 --- 1 files changed, 0 insertions(+), 7 deletions(-) diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index 61bb2cb..d643605 100644 --- a/arch/x86

[kvm-devel] [PATCH 3/5] SVM: sync V_TPR with LAPIC.TPR if CR8 write intercept is disabled

2008-04-16 Thread Joerg Roedel
If the CR8 write intercept is disabled the V_TPR field of the VMCB needs to be synced with the TPR field in the local apic. Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]> --- arch/x86/kvm/svm.c | 12 1 files changed, 12 insertions(+), 0 deletions(-) diff --git a/arch/x86/kvm/svm.

[kvm-devel] [PATCH 0/5] SVM CR8 optimization patches

2008-04-16 Thread Joerg Roedel
This patch series implements optimizations to the CR8 intercept handling in SVM. With these patches applied CR8 reads are not intercepted anymore. The writes to CR8 are only intercepted if the TPR masks interrupts. This significantly reduces the number of total CR8 intercepts when running Windows 6

[kvm-devel] [PATCH 4/5] SVM: disable CR8 intercept when tpr is not masking interrupts

2008-04-16 Thread Joerg Roedel
This patch disables the intercept of CR8 writes if the TPR is not masking interrupts. This reduces the total number CR8 intercepts to below 1 percent of what we have without this patch using Windows 64 bit guests. Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]> --- arch/x86/kvm/svm.c | 31 +

[kvm-devel] [PATCH] SVM: remove selective CR0 comment

2008-04-16 Thread Joerg Roedel
There is not selective cr0 intercept bug. The code in the comment sets the CR0.PG bit. But KVM sets the CR4.PG bit for SVM always to implement the paged real mode. So the 'mov %eax,%cr0' instruction does not change the CR0.PG bit. Selective CR0 intercepts only occur when a bit is actually changed.

Re: [kvm-devel] Extboot Option ROM rewritten in C - v2

2008-04-16 Thread Anthony Liguori
Anthony Liguori wrote: > A couple general comments. > > I'd feel a lot more comfortable with the int13 handler returning an > int and the asm stub code uses that result to determine how to set > CF. You set CF deep within the function stack and there's no > guarantee that GCC isn't going to sto

[kvm-devel] [PATCH 2/5] X86: export kvm_lapic_set_tpr to modules

2008-04-16 Thread Joerg Roedel
This patch exports the kvm_lapic_set_tpr() function from the lapic code to modules. It is required in the kvm-amd module to optimize CR8 intercepts. Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]> --- arch/x86/kvm/lapic.c |1 + 1 files changed, 1 insertions(+), 0 deletions(-) diff --git a/ar

[kvm-devel] [PATCH 1/5] SVM: sync TPR value to V_TPR field in the VMCB

2008-04-16 Thread Joerg Roedel
This patch adds syncing of the lapic.tpr field to the V_TPR field of the VMCB. With this change we can safely remove the CR8 read intercept. Signed-off-by: Joerg Roedel <[EMAIL PROTECTED]> --- arch/x86/kvm/svm.c | 18 -- 1 files changed, 16 insertions(+), 2 deletions(-) diff --

Re: [kvm-devel] [PATCH 1/2] kvm-s390: provide ge t/set_mp_state stubs to fix compile error

2008-04-16 Thread Hollis Blanchard
By the way Marcelo, it would be polite to provide these stubs yourself to avoid breaking the build on other architectures. It looks like IA64 is still broken because of this. -- Hollis Blanchard IBM Linux Technology Center On Wednesday 16 April 2008 09:06:34 Carsten Otte wrote: > From: Christi

[kvm-devel] Second KVM process hangs eating 80-100% CPU on host during startup

2008-04-16 Thread Alex Davis
Host software: Linux 2.6.24.4 KVM 65 (I am using the kernel modules from this release). X11 7.2 from Xorg SDL 1.2.13 GCC 4.1.1 Glibc 2.4 Host hardware: Asus P5B Deluxe (P965 chipset based) motherboard 4 GB RAM Intel E6700 CPU Guest software: Slackware 12.0 installed from CD-ROM. Command used to

Re: [kvm-devel] [PATCH 1 of 9] Lock the entire mm to prevent any mmu related operation to happen

2008-04-16 Thread Robin Holt
I don't think this lock mechanism is completely working. I have gotten a few failures trying to dereference 0x100100 which appears to be LIST_POISON1. Thanks, Robin - This SF.net email is sponsored by the 2008 JavaOne(SM) C

Re: [kvm-devel] Extboot Option ROM rewritten in C - v2

2008-04-16 Thread Anthony Liguori
A couple general comments. I'd feel a lot more comfortable with the int13 handler returning an int and the asm stub code uses that result to determine how to set CF. You set CF deep within the function stack and there's no guarantee that GCC isn't going to stomp on it. I also don't think we w

[kvm-devel] [PATCH] kvm: move kvmclock initialization inside kvm_guest_init

2008-04-16 Thread Glauber Costa
It makes no sense for the clock initialization to be hanging around in setup_32.c when we have a generic kvm guest initialization function available. So, we move kvmclock_init() inside such a function, leading to a cleaner code. Signed-off-by: Glauber Costa <[EMAIL PROTECTED]> --- arch/x86/kernel

Re: [kvm-devel] [PATCH] kvm: move kvmclock initialization inside kvm_guest_init

2008-04-16 Thread Glauber de Oliveira Costa
Glauber Costa wrote: > It makes no sense for the clock initialization to be > hanging around in setup_32.c when we have a generic kvm guest > initialization function available. So, we move kvmclock_init() > inside such a function, leading to a cleaner code. > > Signed-off-by: Glauber Costa <[EMAIL

Re: [kvm-devel] [PATCH 1/2] kvm-s390: provide get/set_mp_state stubs to fix compile error

2008-04-16 Thread Marcelo Tosatti
On Wed, Apr 16, 2008 at 11:21:05AM -0500, Hollis Blanchard wrote: > By the way Marcelo, it would be polite to provide these stubs yourself to > avoid breaking the build on other architectures. Indeed, should have been more careful. > It looks like IA64 is still broken because of this. Now I'm n

[kvm-devel] [PATCH] add virtio disk geometry feature

2008-04-16 Thread Ryan Harper
From: Ryan Harper <[EMAIL PROTECTED]> Rather than faking up some geometry, allow the backend to push the disk geometry via virtio pci config option. Keep the old geo code around for compatibility. Signed-off-by: Ryan Harper <[EMAIL PROTECTED]> Reviewed-by: Anthony Liguori <[EMAIL PROTECTED]> di

[kvm-devel] [PATCH] pass virtio disk geometry via config space

2008-04-16 Thread Ryan Harper
From: Ryan Harper <[EMAIL PROTECTED]> Rather than faking up some geometry, allow the backend to push the disk geometry via virtio pci config option. Keep the old geo code around for compatibility. Signed-off-by: Ryan Harper <[EMAIL PROTECTED]> Reviewed-by: Anthony Liguori <[EMAIL PROTECTED]> di

Re: [kvm-devel] [PATCH 1 of 9] Lock the entire mm to prevent any mmu related operation to happen

2008-04-16 Thread Robin Holt
On Wed, Apr 16, 2008 at 11:35:38AM -0700, Christoph Lameter wrote: > On Wed, 16 Apr 2008, Robin Holt wrote: > > > I don't think this lock mechanism is completely working. I have > > gotten a few failures trying to dereference 0x100100 which appears to > > be LIST_POISON1. > > How does xpmem unre

Re: [kvm-devel] [PATCH 1 of 9] Lock the entire mm to prevent any mmu related operation to happen

2008-04-16 Thread Christoph Lameter
On Wed, 16 Apr 2008, Robin Holt wrote: > I don't think this lock mechanism is completely working. I have > gotten a few failures trying to dereference 0x100100 which appears to > be LIST_POISON1. How does xpmem unregistering of notifiers work? ---

Re: [kvm-devel] [PATCH 1 of 9] Lock the entire mm to prevent any mmu related operation to happen

2008-04-16 Thread Christoph Lameter
On Wed, 16 Apr 2008, Robin Holt wrote: > On Wed, Apr 16, 2008 at 11:35:38AM -0700, Christoph Lameter wrote: > > On Wed, 16 Apr 2008, Robin Holt wrote: > > > > > I don't think this lock mechanism is completely working. I have > > > gotten a few failures trying to dereference 0x100100 which appear

Re: [kvm-devel] [Qemu-devel] [PATCH 1/5] PCI DMA API (v3)

2008-04-16 Thread Blue Swirl
On 4/16/08, Anthony Liguori <[EMAIL PROTECTED]> wrote: > This patch introduces a DMA API and plumbs support through the DMA layer. We > use a mostly opaque structure, IOVector to represent a scatter/gather list of > physical memory. Associated with each IOVector is a read/write function and >

Re: [kvm-devel] Second KVM process hangs eating 80-100% CPU on host during startup

2008-04-16 Thread Alex Davis
--- Alex Davis <[EMAIL PROTECTED]> wrote: > Host software: > Linux 2.6.24.4 > KVM 65 (I am using the kernel modules from this release). > X11 7.2 from Xorg > SDL 1.2.13 > GCC 4.1.1 > Glibc 2.4 > > Host hardware: > Asus P5B Deluxe (P965 chipset based) motherboard > 4 GB RAM > Intel E6700 CPU > >

Re: [kvm-devel] [Qemu-devel] [PATCH 1/5] PCI DMA API (v3)

2008-04-16 Thread Anthony Liguori
Blue Swirl wrote: > On 4/16/08, Anthony Liguori <[EMAIL PROTECTED]> wrote: > >> This patch introduces a DMA API and plumbs support through the DMA layer. We >> use a mostly opaque structure, IOVector to represent a scatter/gather list >> of >> physical memory. Associated with each IOVector

[kvm-devel] KVM: MMU: kvm_pv_mmu_op should not take mmap_sem

2008-04-16 Thread Marcelo Tosatti
kvm_pv_mmu_op should not take mmap_sem. All gfn_to_page() callers down in the MMU processing will take it if necessary, so as it is it can deadlock. Apparently a leftover from the days before slots_lock. Signed-off-by: Marcelo Tosatti <[EMAIL PROTECTED]> diff --git a/arch/x86/kvm/mmu.c b/arch/

Re: [kvm-devel] [PATCH] add virtio disk geometry feature

2008-04-16 Thread Rusty Russell
On Thursday 17 April 2008 04:56:37 Ryan Harper wrote: > From: Ryan Harper <[EMAIL PROTECTED]> > > Rather than faking up some geometry, allow the backend to push the disk > geometry via virtio pci config option. Keep the old geo code around for > compatibility. Hi Ryan, Looks good! Some brief

Re: [kvm-devel] [PATCH] add virtio disk geometry feature

2008-04-16 Thread Anthony Liguori
Rusty Russell wrote: > On Thursday 17 April 2008 04:56:37 Ryan Harper wrote: > >> From: Ryan Harper <[EMAIL PROTECTED]> >> >> Rather than faking up some geometry, allow the backend to push the disk >> geometry via virtio pci config option. Keep the old geo code around for >> compatibility. >>

[kvm-devel] [RFC] Multiple QEMU AIO implementations

2008-04-16 Thread Anthony Liguori
This isn't fully cooked yet, but pretty close. The basic idea is to make the aio usage in block-raw go to a set of function pointers and allow multiple simultaneous AIO implementations. I converted the posix-aio support to this, and also introduced a "unix" aio which just uses O_NONBLOCK and

Re: [kvm-devel] [PATCH] add virtio disk geometry feature

2008-04-16 Thread Hollis Blanchard
On Wednesday 16 April 2008 16:32:30 Anthony Liguori wrote: > > diff --git a/drivers/block/virtio_blk.c b/drivers/block/virtio_blk.c > > --- a/drivers/block/virtio_blk.c > > +++ b/drivers/block/virtio_blk.c > > @@ -157,10 +157,25 @@ static int virtblk_ioctl(struct inode *i > >  /* We provide getgeo

Re: [kvm-devel] disappointing speed with virtio_blk

2008-04-16 Thread Gerd von Egidy
Hi Marcelo, > virtio-blk is doing synchronous IO which blocks the guest CPU. > > This is especially bad for write intensive loads where the guest > will hang in the host write throttling logic. > > In the meantime please try the following patch: > > http://www.mail-archive.com/kvm-devel@lists.sour

Re: [kvm-devel] disappointing speed with virtio_blk

2008-04-16 Thread Marcelo Tosatti
On Thu, Apr 17, 2008 at 01:05:50AM +0200, Gerd von Egidy wrote: > Hi Marcelo, > > > virtio-blk is doing synchronous IO which blocks the guest CPU. > > > > This is especially bad for write intensive loads where the guest > > will hang in the host write throttling logic. > > > > In the meantime plea

Re: [kvm-devel] [RFC] Multiple QEMU AIO implementations

2008-04-16 Thread Marcelo Tosatti
On Wed, Apr 16, 2008 at 04:36:42PM -0500, Anthony Liguori wrote: > This isn't fully cooked yet, but pretty close. The basic idea is to > make the aio usage in block-raw go to a set of function pointers and > allow multiple simultaneous AIO implementations. The AIO API looks great. Looking forwa

[kvm-devel] [PATCH 0/3] Qemu crashes with pci passthrough

2008-04-16 Thread Glauber de Oliveira Costa
Hi, I've got some qemu crashes while trying to passthrough an ide device to a kvm guest. After some investigation, it turned out that register_ioport_{read/write} will abort on errors instead of returning a meaningful error. However, even if we do return an error, the asynchronous nature of pci

[kvm-devel] [PATCH 2/3] map regions as registered

2008-04-16 Thread Glauber de Oliveira Costa
From: Glauber Costa <[EMAIL PROTECTED]> map which io registers where already sucessfuly registered Signed-off-by: Glauber Costa <[EMAIL PROTECTED]> --- qemu/hw/pci.c |5 +++-- qemu/hw/pci.h |3 +++ 2 files changed, 6 insertions(+), 2 deletions(-) diff --git a/qemu/hw/pci.c b/qemu/hw/pci

[kvm-devel] [PATCH 1/3] don't exit on errors while registering ioports

2008-04-16 Thread Glauber de Oliveira Costa
From: Glauber Costa <[EMAIL PROTECTED]> Currently, any error in register_ioports make qemu abort through hw_error(). But there are situations in which those errors are not fatal. Just return < 0 instead Signed-off-by: Glauber Costa <[EMAIL PROTECTED]> --- qemu/vl.c | 12 +++- 1 files c

[kvm-devel] [PATCH 3/3] propagate errors from ioport registering up to pci level

2008-04-16 Thread Glauber de Oliveira Costa
From: Glauber Costa <[EMAIL PROTECTED]> In situations like pci-passthrough, the ioport registering can fail, because another device is already present and in charge for an io address. The current state would crash qemu, but we can propagate the errors up to the pci layer, avoiding it. Signed-off-

Re: [kvm-devel] Extboot Option ROM rewritten in C - v2

2008-04-16 Thread Nguyen Anh Quynh
On Thu, Apr 17, 2008 at 12:02 AM, Anthony Liguori <[EMAIL PROTECTED]> wrote: > A couple general comments. > > I'd feel a lot more comfortable with the int13 handler returning an int and > the asm stub code uses that result to determine how to set CF. You set CF > deep within the function stack an

[kvm-devel] Extboot Option ROM rewritten in C - v3

2008-04-16 Thread Nguyen Anh Quynh
This patch replaces the current assembly code of Extboot option rom with new C code. Patch is against kvm-66. This version returns an error code in case int 13 handler cannot handle a requested function. Signed-off-by: Nguyen Anh Quynh <[EMAIL PROTECTED]> # diffstat extboot3.diff b/extboot/Mak

[kvm-devel] [ kvm-Bugs-1944629 ] Can't boot smp guests on ia32e host

2008-04-16 Thread SourceForge.net
Bugs item #1944629, was opened at 2008-04-17 13:44 Message generated for change (Tracker Item Submitted) made by Item Submitter You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1944629&group_id=180599 Please note that this message will contain a full copy

[kvm-devel] KVM Test result, kernel eeff99b.., userspace cd6ac04.. -- One new issue

2008-04-16 Thread Yunfeng Zhao
Hi All, This is today's KVM test result against kvm.git eeff99b6f7e47630356cf2aee2e58d1b3e1af931 and kvm-userspace.git cd6ac0431e01c01c7870aadfafc6ddaf09a8fb95. One New Issue 1.Can't boot smp guests on ia32e host https://sourceforge.net/tracker/

Re: [kvm-devel] Extboot Option ROM rewritten in C - v3

2008-04-16 Thread H. Peter Anvin
Nguyen Anh Quynh wrote: > This patch replaces the current assembly code of Extboot option rom > with new C code. Patch is against kvm-66. > > This version returns an error code in case int 13 handler cannot > handle a requested function. > > Signed-off-by: Nguyen Anh Quynh <[EMAIL PROTECTED]> >

Re: [kvm-devel] Extboot Option ROM rewritten in C - v3

2008-04-16 Thread H. Peter Anvin
> + .globl linux_boot > +linux_boot: > + cli > + cld > + mov $0x9000, %ax > + mov %ax, %ds > + mov %ax, %es > + mov %ax, %fs > + mov %ax, %gs > + mov %ax, %ss > + mov $0x8ffe, %sp > + ljmp $0x9000 + 0x20, $0 The hard use of segment 9000 is really highly