Re: [PATCH][RESEND] x86 emulator: Add 'push/pop sreg' instructions

2009-08-24 Thread Avi Kivity
On 08/23/2009 02:24 PM, Mohammed Gamal wrote: Signed-off-by: Mohammed Gamalm.gamal...@gmail.com Applied, thanks. +static int emulate_pop_sreg(struct x86_emulate_ctxt *ctxt, +struct x86_emulate_ops *ops, int seg) +{ + struct decode_cache *c =ctxt-decode;

Re: [PATCH][RESEND] x86 emulator: Introduce No64 decode option

2009-08-24 Thread Avi Kivity
On 08/23/2009 02:24 PM, Mohammed Gamal wrote: Introduces a new decode option No64, which is used for instructions that are invalid in long mode. Applied, thanks. -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line unsubscribe kvm

Re: [PATCH][RESEND] x86 emulator: Report unhandled instructions

2009-08-24 Thread Avi Kivity
On 08/23/2009 02:24 PM, Mohammed Gamal wrote: Report unhandled instructions in the syslog on emulation failure Applied, thanks. -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to

Re: [PATCH][RESEND] Add push/pop instructions test in test harness

2009-08-24 Thread Avi Kivity
On 08/23/2009 02:24 PM, Mohammed Gamal wrote: Signed-off-by: Mohammed Gamalm.gamal...@gmail.com Applied, thanks. -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to

Re: [PATCH] VMX: Return to userspace on invalid state emulation failure

2009-08-24 Thread Avi Kivity
On 08/24/2009 07:07 AM, Mohammed Gamal wrote: Return to userspace instead of repeatedly trying to emulate instructions that have already failed Signed-off-by: Mohammed Gamalm.gamal...@gmail.com --- arch/x86/kvm/vmx.c |5 - 1 files changed, 4 insertions(+), 1 deletions(-) diff --git

[ kvm-Bugs-2351676 ] Guests hang periodically on Ubuntu-8.10

2009-08-24 Thread SourceForge.net
Bugs item #2351676, was opened at 2008-11-26 19:59 Message generated for change (Comment added) made by z-image You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2351676group_id=180599 Please note that this message will contain a full copy of the comment

vhost net: performance with ping benchmark

2009-08-24 Thread Michael S. Tsirkin
At Rusty's suggestion, I tested vhost base performance with ping. Results below, and seem to be what you'd expect. I'm working on TSO support, expect results shortly. latency with ping (lower is better): native: [r...@virtlab17 ~]# ping -c 100 -f -q 21.1.50.4 PING 21.1.50.4 (21.1.50.4)

[PATCH v4 0/9] make interrupt injection lockless (almost)

2009-08-24 Thread Gleb Natapov
kvm-irq_lock protects too much stuff, but still fail to protect everything it was design to protect (see ack notifiers call in pic). I want to make IRQ injection fast path as lockless as possible. This patch series removes kvm-irq_lock from irq injection path effectively making interrupt injection

[PATCH v4 3/9] Change irq routing table to use gsi indexed array.

2009-08-24 Thread Gleb Natapov
Use gsi indexed array instead of scanning all entries on each interrupt injection. Signed-off-by: Gleb Natapov g...@redhat.com --- include/linux/kvm_host.h | 16 +++-- virt/kvm/irq_comm.c | 88 +++-- virt/kvm/kvm_main.c |1 - 3 files

[PATCH v4 2/9] Move irq sharing information to irqchip level.

2009-08-24 Thread Gleb Natapov
This removes assumptions that max GSIs is smaller than number of pins. Sharing is tracked on pin level not GSI level. Signed-off-by: Gleb Natapov g...@redhat.com --- arch/x86/include/asm/kvm_host.h |1 - arch/x86/kvm/irq.h |1 + include/linux/kvm_host.h|2 +-

[PATCH v4 1/9] Call pic_clear_isr() on pic reset to reuse logic there.

2009-08-24 Thread Gleb Natapov
Also move call of ack notifiers after pic state change. Signed-off-by: Gleb Natapov g...@redhat.com --- arch/x86/kvm/i8259.c | 22 +- 1 files changed, 9 insertions(+), 13 deletions(-) diff --git a/arch/x86/kvm/i8259.c b/arch/x86/kvm/i8259.c index 01f1516..ccc941a 100644

[PATCH v4 4/9] Maintain back mapping from irqchip/pin to gsi.

2009-08-24 Thread Gleb Natapov
Maintain back mapping from irqchip/pin to gsi to speedup interrupt acknowledgment notifications. Signed-off-by: Gleb Natapov g...@redhat.com --- arch/ia64/include/asm/kvm.h |1 + arch/x86/include/asm/kvm.h |1 + include/linux/kvm_host.h|1 + virt/kvm/irq_comm.c | 31

[PATCH v4 5/9] Move irq routing data structure to rcu locking

2009-08-24 Thread Gleb Natapov
Signed-off-by: Gleb Natapov g...@redhat.com --- virt/kvm/irq_comm.c | 16 +++- 1 files changed, 11 insertions(+), 5 deletions(-) diff --git a/virt/kvm/irq_comm.c b/virt/kvm/irq_comm.c index 6a8434d..8350050 100644 --- a/virt/kvm/irq_comm.c +++ b/virt/kvm/irq_comm.c @@ -159,7

[PATCH v4 7/9] Convert irq notifiers lists to RCU locking.

2009-08-24 Thread Gleb Natapov
Use RCU locking for mask/ack notifiers lists. Signed-off-by: Gleb Natapov g...@redhat.com --- virt/kvm/irq_comm.c | 22 -- 1 files changed, 12 insertions(+), 10 deletions(-) diff --git a/virt/kvm/irq_comm.c b/virt/kvm/irq_comm.c index d7393d6..71a5a43 100644 ---

[PATCH v4 6/9] Move irq ack notifier list to arch independent code.

2009-08-24 Thread Gleb Natapov
Mask irq notifier list is already there. Signed-off-by: Gleb Natapov g...@redhat.com --- arch/ia64/include/asm/kvm_host.h |1 - arch/x86/include/asm/kvm_host.h |1 - include/linux/kvm_host.h |1 + virt/kvm/irq_comm.c |5 ++--- virt/kvm/kvm_main.c

[PATCH v4 8/9] Move IO APIC to its own lock.

2009-08-24 Thread Gleb Natapov
Signed-off-by: Gleb Natapov g...@redhat.com --- arch/ia64/kvm/kvm-ia64.c |7 +--- arch/x86/kvm/i8259.c | 22 +--- arch/x86/kvm/lapic.c |5 +-- arch/x86/kvm/x86.c | 10 + virt/kvm/ioapic.c| 80 +++---

[PATCH v4 9/9] Drop kvm-irq_lock lock from irq injection path.

2009-08-24 Thread Gleb Natapov
The only thing it protects now is interrupt injection into lapic and this can work lockless. Even now with kvm-irq_lock in place access to lapic is not entirely serialized since vcpu access doesn't take kvm-irq_lock. Signed-off-by: Gleb Natapov g...@redhat.com --- arch/ia64/kvm/kvm-ia64.c |2

[PATCH] VMX: Return to userspace on invalid state emulation failure

2009-08-24 Thread Mohammed Gamal
Return to userspace instead of repeatedly trying to emulate instructions that have already failed Signed-off-by: Mohammed Gamal m.gamal...@gmail.com --- arch/x86/kvm/vmx.c |6 +- 1 files changed, 5 insertions(+), 1 deletions(-) diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index

[PATCH][RFC] Use return value from kvm_set_irq() to re-inject PIT interrupts.

2009-08-24 Thread Gleb Natapov
Use return value from kvm_set_irq() to track coalesced PIT interrupts instead of ack/mask notifiers. Signed-off-by: Gleb Natapov g...@redhat.com diff --git a/arch/x86/kvm/i8254.c b/arch/x86/kvm/i8254.c index b857ca3..0b63991 100644 --- a/arch/x86/kvm/i8254.c +++ b/arch/x86/kvm/i8254.c @@ -231,20

Re: [PATCH] Fix sysenter migration issue on AMD CPUs

2009-08-24 Thread Thomas Besser
Andre Przywara wrote: Stephane, Thomas: Can you verify this? I'm not very familiar with compiling kvm-mod from git sources. And your patch does not apply to svm.c shipped with kernel 2.6.30.5 So at the moment I have no clue, how to verify. Is there any short howto out there, how to get kvm

Re: [PATCH] Fix sysenter migration issue on AMD CPUs

2009-08-24 Thread Andre Przywara
Thomas Besser wrote: Andre Przywara wrote: Stephane, Thomas: Can you verify this? I'm not very familiar with compiling kvm-mod from git sources. And your patch does not apply to svm.c shipped with kernel 2.6.30.5 You shouldn't have seen any problems with 2.6.30.5, since the code in question

Re: [PATCH] Fix sysenter migration issue on AMD CPUs

2009-08-24 Thread Thomas Besser
Andre Przywara wrote: Thomas Besser wrote: Andre Przywara wrote: Stephane, Thomas: Can you verify this? I'm not very familiar with compiling kvm-mod from git sources. And your patch does not apply to svm.c shipped with kernel 2.6.30.5 You shouldn't have seen any problems with 2.6.30.5,

[no subject]

2009-08-24 Thread Igor Trindade Oliveira
subscribe kvm Veja quais são os assuntos do momento no Yahoo! +Buscados http://br.maisbuscados.yahoo.com -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to

Re: qemu-kvm segfaults in qemu_del_timer (0.10.5 and 0.10.6)

2009-08-24 Thread Chris Webb
Chris Webb ch...@arachsys.com writes: With the following applied, VNC connections and disconnections still work correctly, so it doesn't horribly break anything, but I can't immediately confirm whether it will cure the rare segfaults as I haven't yet found a rapid way of reproducing the

Re: [PATCH][RFC] Use return value from kvm_set_irq() to re-inject PIT interrupts.

2009-08-24 Thread Marcelo Tosatti
On Mon, Aug 24, 2009 at 03:06:23PM +0300, Gleb Natapov wrote: Use return value from kvm_set_irq() to track coalesced PIT interrupts instead of ack/mask notifiers. Gleb, What is the advantage of doing so? Ack notifiers are asynchronous notifications. Using the return value from kvm_set_irq

Re: [PATCH][RFC] Use return value from kvm_set_irq() to re-inject PIT interrupts.

2009-08-24 Thread Gleb Natapov
On Mon, Aug 24, 2009 at 01:32:56PM -0300, Marcelo Tosatti wrote: On Mon, Aug 24, 2009 at 03:06:23PM +0300, Gleb Natapov wrote: Use return value from kvm_set_irq() to track coalesced PIT interrupts instead of ack/mask notifiers. Gleb, What is the advantage of doing so? Current code

Re: [PATCH][RFC] Use return value from kvm_set_irq() to re-inject PIT interrupts.

2009-08-24 Thread Marcelo Tosatti
On Mon, Aug 24, 2009 at 08:16:46PM +0300, Gleb Natapov wrote: On Mon, Aug 24, 2009 at 01:32:56PM -0300, Marcelo Tosatti wrote: On Mon, Aug 24, 2009 at 03:06:23PM +0300, Gleb Natapov wrote: Use return value from kvm_set_irq() to track coalesced PIT interrupts instead of ack/mask notifiers.

Re: [RFC] defer skb allocation in virtio_net -- mergable buff part

2009-08-24 Thread Shirley Ma
Hello Avi, Thanks for you review. I was on vacation last week. On Sun, 2009-08-16 at 16:47 +0300, Avi Kivity wrote: Alternatives include: - store the link in the page itself - have an array of pages per list element instead of just one pointer - combine the two, store an array of page

Re: [PATCH][RFC] Use return value from kvm_set_irq() to re-inject PIT interrupts.

2009-08-24 Thread Gleb Natapov
On Mon, Aug 24, 2009 at 02:44:27PM -0300, Marcelo Tosatti wrote: On Mon, Aug 24, 2009 at 08:16:46PM +0300, Gleb Natapov wrote: On Mon, Aug 24, 2009 at 01:32:56PM -0300, Marcelo Tosatti wrote: On Mon, Aug 24, 2009 at 03:06:23PM +0300, Gleb Natapov wrote: Use return value from

Re: [PATCH 0/2] eventfd: new EFD_STATE flag

2009-08-24 Thread Avi Kivity
On 08/24/2009 09:25 PM, Davide Libenzi wrote: Indeed, the default eventfd behaviour is like, well, an event. Signaling (kernel side) or writing (userspace side), signals the event. Waiting (reading) it, will reset the event. If you use EFD_SEMAPHORE, you get a semaphore-like behavior. Events and

Re: [PATCH 0/2] eventfd: new EFD_STATE flag

2009-08-24 Thread Davide Libenzi
On Sun, 23 Aug 2009, Michael S. Tsirkin wrote: On Sun, Aug 23, 2009 at 04:40:51PM +0300, Avi Kivity wrote: On 08/23/2009 04:36 PM, Michael S. Tsirkin wrote: More important here is realization that eventfd is a mutex/semaphore implementation, not a generic event reporting interface as we

Re: [PATCH][RFC] Use return value from kvm_set_irq() to re-inject PIT interrupts.

2009-08-24 Thread Gleb Natapov
On Mon, Aug 24, 2009 at 09:19:05PM +0300, Gleb Natapov wrote: It is obviously wrong thing to do from assigned devices POV. Thats not entirely clear to me. So what happens if a guest with PIC assigned device resets with a pending IRR? The host interrupt line will be kept disabled, even

Re: vbus design points: shm and shm-signals

2009-08-24 Thread Anthony Liguori
Gregory Haskins wrote: Gregory Haskins wrote: Ingo Molnar wrote: We all love faster code and better management interfaces and tons of your prior patches got accepted by Avi. This time you didnt even _try_ to improve virtio. Im sorry, but you are mistaken:

Re: vbus design points: shm and shm-signals

2009-08-24 Thread Gregory Haskins
Hi Anthony, Anthony Liguori wrote: Gregory Haskins wrote: Gregory Haskins wrote: Ingo Molnar wrote: We all love faster code and better management interfaces and tons of your prior patches got accepted by Avi. This time you didnt even _try_ to improve virtio. Im sorry, but

user question: graphic acceleration for CAD

2009-08-24 Thread Aleks
Hello Community, I just want to ask if it is planned to support 3d acceleration features for windows guests on linux hosts to enhance windows based CAD applications. I am not aware of the features modern CAD software is using so I cannot provide a list of requested features, sorry. I am not sure

Re: vhost net: performance with ping benchmark

2009-08-24 Thread Michael S. Tsirkin
On Mon, Aug 24, 2009 at 11:12:41AM +0300, Michael S. Tsirkin wrote: At Rusty's suggestion, I tested vhost base performance with ping. Results below, and seem to be what you'd expect. Rusty, any chance you could look at the code? Is it in reasonable shape? I think it makes sense to merge it

Re: vbus design points: shm and shm-signals

2009-08-24 Thread Gregory Haskins
Gregory Haskins wrote: Anthony Liguori wrote: Fundamentally, how is this different than the virtio-add_buf concept? From my POV, they are at different levels. Calling vbus-shm() is for establishing a shared-memory region including routing the memory and signal-path contexts. You do this

Re: [PATCH 0/2] eventfd: new EFD_STATE flag

2009-08-24 Thread Michael S. Tsirkin
On Mon, Aug 24, 2009 at 11:25:01AM -0700, Davide Libenzi wrote: On Sun, 23 Aug 2009, Michael S. Tsirkin wrote: On Sun, Aug 23, 2009 at 04:40:51PM +0300, Avi Kivity wrote: On 08/23/2009 04:36 PM, Michael S. Tsirkin wrote: More important here is realization that eventfd is a

Re: [PATCH 0/2] eventfd: new EFD_STATE flag

2009-08-24 Thread Davide Libenzi
On Mon, 24 Aug 2009, Avi Kivity wrote: On 08/24/2009 09:25 PM, Davide Libenzi wrote: Indeed, the default eventfd behaviour is like, well, an event. Signaling (kernel side) or writing (userspace side), signals the event. Waiting (reading) it, will reset the event. If you use

Re: [PATCH 0/2] eventfd: new EFD_STATE flag

2009-08-24 Thread Paolo Bonzini
There are userspace libraries that do almost everything, but you hardly see things like pthread_(EFD_STATE-like)_create() or similar system interfaces based on such abstraction. It actually seems as close to a condition variable as an eventfd can be. Paolo -- To unsubscribe from this list:

Re: [PATCH 0/2] eventfd: new EFD_STATE flag

2009-08-24 Thread Davide Libenzi
On Tue, 25 Aug 2009, Michael S. Tsirkin wrote: On Mon, Aug 24, 2009 at 11:25:01AM -0700, Davide Libenzi wrote: On Sun, 23 Aug 2009, Michael S. Tsirkin wrote: On Sun, Aug 23, 2009 at 04:40:51PM +0300, Avi Kivity wrote: On 08/23/2009 04:36 PM, Michael S. Tsirkin wrote: More

Re: [PATCH 0/2] eventfd: new EFD_STATE flag

2009-08-24 Thread Davide Libenzi
On Tue, 25 Aug 2009, Paolo Bonzini wrote: There are userspace libraries that do almost everything, but you hardly see things like pthread_(EFD_STATE-like)_create() or similar system interfaces based on such abstraction. It actually seems as close to a condition variable as an eventfd

[PATCH] VMX: Return to userspace on invalid state emulation failure

2009-08-24 Thread Mohammed Gamal
Return to userspace instead of repeatedly trying to emulate instructions that have already failed Signed-off-by: Mohammed Gamal m.gamal...@gmail.com --- arch/x86/kvm/vmx.c |6 +- 1 files changed, 5 insertions(+), 1 deletions(-) diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index

Re: vbus design points: shm and shm-signals

2009-08-24 Thread Anthony Liguori
Gregory Haskins wrote: Hi Anthony, Fundamentally, how is this different than the virtio-add_buf concept? From my POV, they are at different levels. Calling vbus-shm() is for establishing a shared-memory region including routing the memory and signal-path contexts. You do this once

Re: vbus design points: shm and shm-signals

2009-08-24 Thread Anthony Liguori
Anthony Liguori wrote: IOW, I can envision a model that looked like PCI - virtio-pci - virtio-shm - virtio-ring - virtio-net Let me stress that what's important here is that devices target either virtio-ring or virtio-shm. If we had another transport, those drivers would be agnostic toward

Re: [PATCHv3 0/4] qemu-kvm: vhost net support

2009-08-24 Thread Alex Williamson
On Sun, Aug 23, 2009 at 1:22 PM, Michael S. Tsirkinm...@redhat.com wrote: Just had a different, but slightly similar problem when the host running qemu had forwarding enabled. Is it possible your host is forwarding the packets somewhere else, and that's why we get the dupes? sysctl -w

[ kvm-Bugs-2829519 ] extboot.bin is not built

2009-08-24 Thread SourceForge.net
Bugs item #2829519, was opened at 2009-07-30 09:13 Message generated for change (Comment added) made by sf-robot You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2829519group_id=180599 Please note that this message will contain a full copy of the comment

[ kvm-Bugs-2725669 ] kvm init script breaks network interfaces with multiple IPs

2009-08-24 Thread SourceForge.net
Bugs item #2725669, was opened at 2009-04-01 20:44 Message generated for change (Settings changed) made by sf-robot You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2725669group_id=180599 Please note that this message will contain a full copy of the comment

[ kvm-Bugs-2543539 ] Can't install Windows 98

2009-08-24 Thread SourceForge.net
Bugs item #2543539, was opened at 2009-01-28 17:44 Message generated for change (Settings changed) made by sf-robot You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2543539group_id=180599 Please note that this message will contain a full copy of the comment

[ kvm-Bugs-2099075 ] qcow2 images corruption

2009-08-24 Thread SourceForge.net
Bugs item #2099075, was opened at 2008-09-07 19:22 Message generated for change (Settings changed) made by sf-robot You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2099075group_id=180599 Please note that this message will contain a full copy of the comment

[ kvm-Bugs-1906189 ] All SMP guests often halt

2009-08-24 Thread SourceForge.net
Bugs item #1906189, was opened at 2008-03-03 11:33 Message generated for change (Comment added) made by sf-robot You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=1906189group_id=180599 Please note that this message will contain a full copy of the comment

[ kvm-Bugs-1941302 ] Cannot boot guests with hugetlbfs

2009-08-24 Thread SourceForge.net
Bugs item #1941302, was opened at 2008-04-13 11:21 Message generated for change (Settings changed) made by sf-robot You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=1941302group_id=180599 Please note that this message will contain a full copy of the comment

[ kvm-Bugs-1984384 ] soft lockup - CPU#5 stuck for 11s! [qemu-system-x86:4966]

2009-08-24 Thread SourceForge.net
Bugs item #1984384, was opened at 2008-06-04 11:49 Message generated for change (Comment added) made by sf-robot You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=1984384group_id=180599 Please note that this message will contain a full copy of the comment

[ kvm-Bugs-2024740 ] Win2003 SMP installation crash

2009-08-24 Thread SourceForge.net
Bugs item #2024740, was opened at 2008-07-22 14:36 Message generated for change (Settings changed) made by sf-robot You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2024740group_id=180599 Please note that this message will contain a full copy of the comment

[ kvm-Bugs-2490866 ] repeatable corruption with qcow2 on kvm-79

2009-08-24 Thread SourceForge.net
Bugs item #2490866, was opened at 2009-01-06 21:10 Message generated for change (Comment added) made by sf-robot You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2490866group_id=180599 Please note that this message will contain a full copy of the comment

[ kvm-Bugs-1831632 ] Windows XP setup Performance regression

2009-08-24 Thread SourceForge.net
Bugs item #1831632, was opened at 2007-11-14 08:46 Message generated for change (Comment added) made by sf-robot You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=1831632group_id=180599 Please note that this message will contain a full copy of the comment

[ kvm-Bugs-1929279 ] kernel BUG at kvm-64/kernel/mmu.c:560!

2009-08-24 Thread SourceForge.net
Bugs item #1929279, was opened at 2008-03-30 11:21 Message generated for change (Settings changed) made by sf-robot You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=1929279group_id=180599 Please note that this message will contain a full copy of the comment

Re: vhost net: performance with ping benchmark

2009-08-24 Thread Anthony Liguori
Michael S. Tsirkin wrote: On Mon, Aug 24, 2009 at 11:12:41AM +0300, Michael S. Tsirkin wrote: At Rusty's suggestion, I tested vhost base performance with ping. Results below, and seem to be what you'd expect. Rusty, any chance you could look at the code? Is it in reasonable shape? I

kvm-76 aborted on on ibm server

2009-08-24 Thread Haneef Syed
Using kvm-76 on 2.6.21mv kernel on ibm server x3650(64bit processor) target, I got the following error.Any suggestions.. unhandled vm exit: 0x8021 vcpu_id 0 rax b101 rbx rcx rdx rsi rdi rsp

KVM pvmmu: do not batch pte updates from interrupt context

2009-08-24 Thread Marcelo Tosatti
Commit b8bcfe997e4 made paravirt pte updates synchronous in interrupt context. Unfortunately the KVM pv mmu code caches the lazy/nonlazy mode internally, so a pte update from interrupt context during a lazy mmu operation can be batched while it should be performed synchronously.

Re: vhost net: performance with ping benchmark

2009-08-24 Thread Avi Kivity
On 08/25/2009 05:22 AM, Anthony Liguori wrote: I think 2.6.32 is pushing it. 2.6.32 is pushing it, but we need to push it. I think some time is needed to flush out the userspace interface. In particular, I don't think Mark's comments have been adequately addressed. If a version were

Re: [PATCH 0/2] eventfd: new EFD_STATE flag

2009-08-24 Thread Avi Kivity
On 08/25/2009 01:08 AM, Davide Libenzi wrote: Is that really difficult to understand where I'm standing, leaving the KVM hat off for a moment? I understand it perfectly. I take the same position with kvm. I'm providing more data in the hope that you'll change you mind, not trying to

[COMMIT master] KVM: x86 emulator: Report unhandled instructions

2009-08-24 Thread Avi Kivity
From: Mohammed Gamal m.gamal...@gmail.com Report unhandled instructions in the syslog on emulation failure Signed-off-by: Mohammed Gamal m.gamal...@gmail.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index 1f0ff4a..3d6a562 100644 ---

[COMMIT master] KVM: x86 emulator: Introduce No64 decode option

2009-08-24 Thread Avi Kivity
From: Mohammed Gamal m.gamal...@gmail.com Introduces a new decode option No64, which is used for instructions that are invalid in long mode. Signed-off-by: Mohammed Gamal m.gamal...@gmail.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c

[COMMIT master] KVM: Don't pass kvm_run arguments

2009-08-24 Thread Avi Kivity
From: Avi Kivity a...@redhat.com They're just copies of vcpu-run, which is readily accessible. Signed-off-by: Avi Kivity a...@redhat.com diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h index 33901be..b080590 100644 --- a/arch/x86/include/asm/kvm_host.h +++