Re: [kvm-devel] Real Mode Improvement on Intel Hosts - GSoC Project

2008-04-25 Thread Guillaume Thouvenin
On Thu, 24 Apr 2008 11:05:39 -0500 Anthony Liguori [EMAIL PROTECTED] wrote: The first stage is to detect vmentry failures and run x86_emulate() for a single instruction. If you look at the mailing list, you'll see patches from myself and Guillaume. This should be enough to allow most

Re: [kvm-devel] Real Mode Improvement on Intel Hosts - GSoC Project

2008-04-25 Thread Avi Kivity
Guillaume Thouvenin wrote: On Thu, 24 Apr 2008 11:05:39 -0500 Anthony Liguori [EMAIL PROTECTED] wrote: The first stage is to detect vmentry failures and run x86_emulate() for a single instruction. If you look at the mailing list, you'll see patches from myself and Guillaume. This

Re: [kvm-devel] Real Mode Improvement on Intel Hosts - GSoC Project

2008-04-25 Thread Guillaume Thouvenin
On Fri, 25 Apr 2008 09:51:04 +0300 Avi Kivity [EMAIL PROTECTED] wrote: [60108.040894] emulation at (46e53) rip 6e13: ea 18 6e 18 Here cs.rpl == cpl == 0 [60108.072108] emulation at (46e58) rip 6e18: 66 b8 20 00 [60108.103997] emulation at (46e5c) rip 6e1c: 8e d8 8c d0

Re: [kvm-devel] [PATCH]: Fix MSR_K7_EVNTSEL{0,3} for SVM

2008-04-25 Thread Avi Kivity
Chris Lalancette wrote: Avi Kivity wrote: Now it uses %rsi instead of %esi, and any junk in the upper bits will cause the ja to be taken. We need to get a reduced testcase to the gcc folks, this is a serious bug. Any changes in the code to work around this would be fragile.

[kvm-devel] [PATCH 0/8] EPT support for KVM v4

2008-04-25 Thread Yang, Sheng
Hi, Avi Here is the latest EPT patchset. Change from v3: 1. Build the identity mapping pagetable from kernel rather than userspace. The address was changed to 0xfffbc000ul 2. Fix the S/R and LM problem. 3. EPT enabled on 32pae host now. The 2m page should also works, though test blocked by

[kvm-devel] [PATCH 1/8] KVM: VMX: EPT Feature Detection

2008-04-25 Thread Yang, Sheng
From cd0cf53ce955328f949893316b4717f051085f5a Mon Sep 17 00:00:00 2001 From: Sheng Yang [EMAIL PROTECTED] Date: Fri, 25 Apr 2008 10:13:16 +0800 Subject: [PATCH 1/8] KVM: VMX: EPT Feature Detection Signed-off-by: Sheng Yang [EMAIL PROTECTED] --- arch/x86/kvm/vmx.c | 63

[kvm-devel] [PATCH 2/8] KVM: MMU: Move some defination

2008-04-25 Thread Yang, Sheng
From 75e9d921390a29ecf9c85dd1370103c921beacd7 Mon Sep 17 00:00:00 2001 From: Sheng Yang [EMAIL PROTECTED] Date: Fri, 25 Apr 2008 10:17:08 +0800 Subject: [PATCH 2/8] KVM: MMU: Move some defination Move some defination to mmu.h in order to building common table entries. Signed-off-by: Sheng Yang

[kvm-devel] [PATCH 3/8] KVM: Add kvm_x86_ops get_tdp_level()

2008-04-25 Thread Yang, Sheng
From 143c1240c5e5391f4e108aedfeb4491e6347d04e Mon Sep 17 00:00:00 2001 From: Sheng Yang [EMAIL PROTECTED] Date: Fri, 25 Apr 2008 10:20:22 +0800 Subject: [PATCH 3/8] KVM: Add kvm_x86_ops get_tdp_level() The function get_tdp_level() provided the number of tdp level for EPT and NPT rather than the

[kvm-devel] [PATCH 4/8] KVM: MMU: Add EPT support

2008-04-25 Thread Yang, Sheng
From 239f38236196c2321989c64d7c61ff28490b3f00 Mon Sep 17 00:00:00 2001 From: Sheng Yang [EMAIL PROTECTED] Date: Fri, 25 Apr 2008 21:13:50 +0800 Subject: [PATCH 4/8] KVM: MMU: Add EPT support Enable kvm_set_spte() to generate EPT entries. Signed-off-by: Sheng Yang [EMAIL PROTECTED] ---

[kvm-devel] [PATCH 5/8] KVM: MMU: Remove #ifdef CONFIG_X86_64 to support 4 level EPT

2008-04-25 Thread Yang, Sheng
From 169c62e33ea1dbadc8d2fbc3d4880e63caa4d6ab Mon Sep 17 00:00:00 2001 From: Sheng Yang [EMAIL PROTECTED] Date: Fri, 25 Apr 2008 21:44:42 +0800 Subject: [PATCH 5/8] KVM: MMU: Remove #ifdef CONFIG_X86_64 to support 4 level EPT Currently EPT level is 4 for both PAE and 32e. The patch remove the

[kvm-devel] [PATCH 6/8] KVM: Export necessary function for EPT

2008-04-25 Thread Yang, Sheng
From 6edba459ef83a1f2c64c3b782ce67a14e74f9330 Mon Sep 17 00:00:00 2001 From: Sheng Yang [EMAIL PROTECTED] Date: Fri, 25 Apr 2008 21:44:50 +0800 Subject: [PATCH 6/8] KVM: Export necessary function for EPT Signed-off-by: Sheng Yang [EMAIL PROTECTED] --- virt/kvm/kvm_main.c |1 + 1 files

[kvm-devel] [PATCH 7/8] KVM: VMX: Perpare a identity page table for EPT in real mode

2008-04-25 Thread Yang, Sheng
From 30448ffed0d5dad04d0538a53661764128cf05f5 Mon Sep 17 00:00:00 2001 From: Sheng Yang [EMAIL PROTECTED] Date: Fri, 25 Apr 2008 21:44:52 +0800 Subject: [PATCH 7/8] KVM: VMX: Perpare a identity page table for EPT in real mode Signed-off-by: Sheng Yang [EMAIL PROTECTED] --- arch/x86/kvm/vmx.c

[kvm-devel] [PATCH 8/8] KVM: VMX: Enable EPT feature for KVM

2008-04-25 Thread Yang, Sheng
From 592b7855a88266fa19505f0d51fe12ec0eadfa62 Mon Sep 17 00:00:00 2001 From: Sheng Yang [EMAIL PROTECTED] Date: Fri, 25 Apr 2008 22:14:06 +0800 Subject: [PATCH 8/8] KVM: VMX: Enable EPT feature for KVM Signed-off-by: Sheng Yang [EMAIL PROTECTED] --- arch/x86/kvm/mmu.c | 11 ++-

Re: [kvm-devel] [kvm-ppc-devel] Moving kvm lists to kernel.org?

2008-04-25 Thread Jes Sorensen
Avi == Avi Kivity [EMAIL PROTECTED] writes: Avi kvm-devel doesn't do manual moderation. If vger has the Avi infrastructure, I don't see why you can't continue doing this on Avi kvm-ppc-devel. Please don't do this for the kvm-ia64 list either. Avi btw, we can probably shorten the names to kvm@

[kvm-devel] KVM-66 stop working with lilo boot loader

2008-04-25 Thread Tomas Rusnak
Hello everybody I have problem to boot guests with lilo installed, after I upgrade to KVM-66 (from 65). Boot sequence always stop with LIL output. With kvm-65 everythink works great. I have also windows XP guest, which boot without problem. With -no-kvm, all my guests with lilo start

[kvm-devel] You will be surprised at how easy it is

2008-04-25 Thread Molitor
Why go for surgery when you can take and see the effects of these nutritional supplements in 6 months? http://www.esmoses.com/ - This SF.net email is sponsored by the 2008 JavaOne(SM) Conference Don't miss this year's

Re: [kvm-devel] [PATCH]: Fix MSR_K7_EVNTSEL{0,3} for SVM

2008-04-25 Thread Chris Lalancette
Avi Kivity wrote: Hmm, looking back at the dump: 1811:8d 86 00 00 ff 3f lea0x3fff(%rsi),%eax 1817:83 f8 03cmp$0x3,%eax 181a:0f 87 e2 01 00 00 ja 1a02 svm_set_msr+0x27f So while gcc is using %rsi, it loads the result

Re: [kvm-devel] [kvm-ppc-devel] [PATCH 2 of 3] Add PowerPC KVM guest wait handling support

2008-04-25 Thread Hollis Blanchard
On Friday 25 April 2008 00:56:03 Jerone Young wrote: This patch handles a guest that is in a wait state. This ensures that the guest is not allways eating up 100% cpu when it is idle. Signed-off-by: Jerone Young [EMAIL PROTECTED] diff --git a/arch/powerpc/kvm/emulate.c

Re: [kvm-devel] [kvm-ppc-devel] [PATCH 3 of 3] Add premption handlers properly wake sleeping guest

2008-04-25 Thread Hollis Blanchard
On Friday 25 April 2008 00:56:04 Jerone Young wrote: diff --git a/arch/powerpc/kvm/powerpc.c b/arch/powerpc/kvm/powerpc.c --- a/arch/powerpc/kvm/powerpc.c +++ b/arch/powerpc/kvm/powerpc.c @@ -212,6 +212,9 @@ static void kvmppc_decrementer_func(unsi { struct kvm_vcpu *vcpu = (struct

Re: [kvm-devel] [kvm-ppc-devel] [PATCH 0 of 3] Fix guest eating 100% cpu when guest is idle on PowerPC

2008-04-25 Thread Hollis Blanchard
On Friday 25 April 2008 00:56:01 Jerone Young wrote: This set of patches fixes 100% CPU usage when a guest is idle on PowerPC. This time it uses common kvm functions to sleep the guest. Looking much better now, with just a few minor issues to correct. With these patches applied, about how much

Re: [kvm-devel] [kvm-ppc-devel] [PATCH 0 of 3] Fix guest eating 100% cpu when guest is idle on PowerPC

2008-04-25 Thread Jerone Young
On Fri, 2008-04-25 at 09:00 -0500, Hollis Blanchard wrote: On Friday 25 April 2008 00:56:01 Jerone Young wrote: This set of patches fixes 100% CPU usage when a guest is idle on PowerPC. This time it uses common kvm functions to sleep the guest. Looking much better now, with just a few

Re: [kvm-devel] [PATCH 1 of 9] Lock the entire mm to prevent any mmu related operation to happen

2008-04-25 Thread Andrea Arcangeli
I somehow lost missed this email in my inbox, found it now because it was strangely still unread... Sorry for the late reply! On Tue, Apr 22, 2008 at 03:06:24PM +1000, Rusty Russell wrote: On Wednesday 09 April 2008 01:44:04 Andrea Arcangeli wrote: --- a/include/linux/mm.h +++

Re: [kvm-devel] [PATCH 1 of 9] Lock the entire mm to prevent any mmu related operation to happen

2008-04-25 Thread Andrea Arcangeli
On Fri, Apr 25, 2008 at 06:56:39PM +0200, Andrea Arcangeli wrote: + data-i_mmap_locks = vmalloc(nr_i_mmap_locks * + sizeof(spinlock_t)); This is why non-typesafe allocators suck. You want 'sizeof(spinlock_t *)' here. +

Re: [kvm-devel] performance with guests running 2.4 kernels (specifically RHEL3)

2008-04-25 Thread David S. Ahern
David S. Ahern wrote: Avi Kivity wrote: David S. Ahern wrote: I added the traces and captured data over another apparent lockup of the guest. This seems to be representative of the sequence (pid/vcpu removed). (+4776) VMEXIT [ exitcode = 0x, rip = 0x c016127c ]

Re: [kvm-devel] [PATCH]: Fix MSR_K7_EVNTSEL{0,3} for SVM

2008-04-25 Thread Chris Lalancette
Avi Kivity wrote: Hmm, looking back at the dump: 1811:8d 86 00 00 ff 3f lea0x3fff(%rsi),%eax 1817:83 f8 03cmp$0x3,%eax 181a:0f 87 e2 01 00 00 ja 1a02 svm_set_msr+0x27f So while gcc is using %rsi, it loads the result

[kvm-devel] [PATCH 0 of 2] [v2] Fix guest eating 100% cpu when guest is idle on PowerPC

2008-04-25 Thread Jerone Young
* This update consolidates patches, adds more explicit comments, and add wait check when rfi instruction is emulated. This set of patches fixes 100% CPU usage when a guest is idle on PowerPC. Idle CPU usage is now at ~15-16% CPU time. An improvment. Signed-off-by: Jeorne Young [EMAIL

Re: [kvm-devel] [PATCH 1 of 9] Lock the entire mm to prevent any mmu related operation to happen

2008-04-25 Thread Robin Holt
On Fri, Apr 25, 2008 at 06:56:40PM +0200, Andrea Arcangeli wrote: Fortunately I figured out we don't really need mm_lock in unregister because it's ok to unregister in the middle of the range_begin/end critical section (that's definitely not ok for register that's why register needs mm_lock).

[kvm-devel] [PATCH 2 of 2] Add PowerPC KVM guest wait handling support

2008-04-25 Thread Jerone Young
2 files changed, 23 insertions(+), 3 deletions(-) arch/powerpc/kvm/emulate.c | 14 ++ arch/powerpc/kvm/powerpc.c | 12 +--- This patch handles a guest that is in a wait state wake up guest that end up being recheduled and go to sleep. This ensures that the guest is not

[kvm-devel] [PATCH 1 of 2] Add idle wait support for 44x platforms

2008-04-25 Thread Jerone Young
2 files changed, 68 insertions(+), 1 deletion(-) arch/powerpc/platforms/44x/Makefile |2 - arch/powerpc/platforms/44x/idle.c | 67 +++ This patch has been accepted upstream and will be in 2.6.26. So it will eventually need to be removed when we move to

Re: [kvm-devel] QEMU/KVM [RFC]: add support for 128 PCI slots

2008-04-25 Thread Marcelo Tosatti
On Fri, Apr 25, 2008 at 11:38:21AM +0200, Alexander Graf wrote: On Apr 25, 2008, at 3:01 AM, Marcelo Tosatti wrote: Add three PCI bridges to support 128 slots. Vendor and device_id have been stolen from my test box. I/O port addresses behind each bridge are statically allocated

Re: [kvm-devel] QEMU/KVM [RFC]: add support for 128 PCI slots

2008-04-25 Thread Alexander Graf
On Apr 25, 2008, at 10:39 PM, Marcelo Tosatti wrote: On Fri, Apr 25, 2008 at 11:38:21AM +0200, Alexander Graf wrote: On Apr 25, 2008, at 3:01 AM, Marcelo Tosatti wrote: Add three PCI bridges to support 128 slots. Vendor and device_id have been stolen from my test box. I/O port

Re: [kvm-devel] Automatically hibernate XP guest on suspend?

2008-04-25 Thread Cam Macdonell
David Abrahams wrote: If I suspend my host while running a Windows XP guest, the whole machine crashes, so I was hoping to automate hibernation of the guest OS and integrate that into my host's suspend process. Does anyone know how to do that? Hi Dave, What host OS are you running? Cam

[kvm-devel] kvm-devel

2008-04-25 Thread weskypp7
实用 操作 即时 制造型企业车间管理能力提升训练高级研修班 主办单位:众人行管理咨询 时 间:2OO8 年04月19- 20 日 地 点:深圳人才酒店 时 间:2OO8 年04月26- 27 日 地 点:上海兆安酒店 联系人:凌小姐 电 话:0755-26075365 传真:0755-61351396 费用:2200元/人(包括资料费、午餐及上下午茶点等) 为什么要培训? 产品品种越来越多,产品生命周期越来越短的市场环境下,生产部生产压力 越来越大:客户要求交货期更短,更准时,且价格更低,品质更好。制造业的竞

Re: [kvm-devel] Automatically hibernate XP guest on suspend?

2008-04-25 Thread David Abrahams
Cam Macdonell wrote: David Abrahams wrote: If I suspend my host while running a Windows XP guest, the whole machine crashes, so I was hoping to automate hibernation of the guest OS and integrate that into my host's suspend process. Does anyone know how to do that? Hi Dave, What host

[kvm-devel] libkvm: initialize no_pit_creation

2008-04-25 Thread Marcelo Tosatti
Valgrind caught this: ==11754== Conditional jump or move depends on uninitialised value(s) ==11754==at 0x50C9BC: kvm_create_pit (libkvm-x86.c:153) ==11754==by 0x50CA7F: kvm_arch_create (libkvm-x86.c:178) ==11754==by 0x50AB31: kvm_create (libkvm.c:383) ==11754==by 0x4EE691:

Re: [kvm-devel] [PATCH 1 of 9] Lock the entire mm to prevent any mmu related operation to happen

2008-04-25 Thread Andrea Arcangeli
On Fri, Apr 25, 2008 at 02:25:32PM -0500, Robin Holt wrote: I think you still need mm_lock (unless I miss something). What happens when one callout is scanning mmu_notifier_invalidate_range_start() and you unlink. That list next pointer with LIST_POISON1 which is a really bad address for the

[kvm-devel] [PATCH] Fix QEMU vcpu thread race with apic_reset

2008-04-25 Thread Ryan Harper
There is a race between when the vcpu thread issues a create ioctl and when apic_reset() gets called resulting in getting a badfd error. main threadvcpu thread diff --git a/qemu/qemu-kvm.c b/qemu/qemu-kvm.c index 78127de..3513e8c 100644 --- a/qemu/qemu-kvm.c +++ b/qemu/qemu-kvm.c

Re: [kvm-devel] [PATCH] Fix QEMU vcpu thread race with apic_reset

2008-04-25 Thread Ryan Harper
* Ryan Harper [EMAIL PROTECTED] [2008-04-26 00:27]: There is a race between when the vcpu thread issues a create ioctl and when apic_reset() gets called resulting in getting a badfd error. main threadvcpu thread guilt refresh clipped my text short. main thread