[PATCH 1/2 v3] kvm: notify host when guest panicked

2012-03-08 Thread Wen Congyang
The implementation is the same as xen: register panic notifier, and call hypercall when the guest is paniced. Signed-off-by: Wen Congyang we...@cn.fujitsu.com --- arch/x86/kernel/kvm.c| 12 include/linux/kvm_para.h |1 + 2 files changed, 13 insertions(+), 0 deletions(-)

[PATCH 2/2 v3] kvm: set exit_reason to KVM_EXIT_GUEST_PANICKED when guest panicked

2012-03-08 Thread Wen Congyang
This patch introduces new request bit KVM_REQ_GUEST_PANICEKD. If this bit is set, set vcpu's exit_reason to KVM_EXIT_GUEST_PANICKED. And then the user space can know the guest panicked. Signed-off-by: Wen Congyang we...@cn.fujitsu.com --- arch/x86/kvm/x86.c | 11 +++

[PATCH 1/2 v3] update linux-headers

2012-03-08 Thread Wen Congyang
Signed-off-by: Wen Congyang we...@cn.fujitsu.com --- linux-headers/asm-s390/kvm.h |2 ++ linux-headers/linux/kvm.h |7 +++ linux-headers/linux/kvm_para.h |1 + 3 files changed, 10 insertions(+), 0 deletions(-) diff --git a/linux-headers/asm-s390/kvm.h

[PATCH 2/2 v3] deal with guest panicked event

2012-03-08 Thread Wen Congyang
When the host knows the guest is panicked, it will set exit_reason to KVM_EXIT_GUEST_PANICKED. So if qemu receive this exit_reason, we can send a event to tell management application that the guest is panicked and set the guest status to RUN_STATE_PANICKED. Signed-off-by: Wen Congyang

about KVM patches for 3.3

2012-03-08 Thread Takuya Yoshikawa
3.3 may be released soon, but there are some fixes not sent to upstream yet. One of them, mine, fixes a clear regression from 3.2. Thanks, Takuya -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at

Re: [PATCH] KVM: x86: add paging gcc optimization

2012-03-08 Thread Avi Kivity
On 03/07/2012 10:02 PM, Davidlohr Bueso wrote: From: Davidlohr Bueso d...@gnu.org Since most guests will have paging enabled for memory management, add likely() and unlikely() optimizations around is_paging() checks. Signed-off-by: Davidlohr Bueso d...@gnu.org --- arch/x86/kvm/mmu.c |

Re: about KVM patches for 3.3

2012-03-08 Thread Avi Kivity
On 03/08/2012 11:37 AM, Takuya Yoshikawa wrote: 3.3 may be released soon, but there are some fixes not sent to upstream yet. One of them, mine, fixes a clear regression from 3.2. Right, we're planning to let them be tested in kvm.git for a few more days (since one of the fixes is very

Re: [PATCH-WIP 01/13] xen/arm: use r12 to pass the hypercall number to the hypervisor

2012-03-08 Thread Richard Earnshaw
On 02/03/12 21:15, Nicolas Pitre wrote: [ coming back from vacation and trying to catch up ] On Wed, 29 Feb 2012, Dave Martin wrote: Just had a chat with some tools guys -- apparently, when passing register arguments to gcc inline asms there really isn't a guarantee that those variables

Re: [PATCH 2/2 v3] deal with guest panicked event

2012-03-08 Thread Jan Kiszka
On 2012-03-08 09:07, Wen Congyang wrote: When the host knows the guest is panicked, it will set exit_reason to KVM_EXIT_GUEST_PANICKED. So if qemu receive this exit_reason, we can send a event to tell management application that the guest is panicked and set the guest status to

Re: [PATCH 2/2 v3] deal with guest panicked event

2012-03-08 Thread Wen Congyang
At 03/08/2012 06:08 PM, Jan Kiszka Wrote: On 2012-03-08 09:07, Wen Congyang wrote: When the host knows the guest is panicked, it will set exit_reason to KVM_EXIT_GUEST_PANICKED. So if qemu receive this exit_reason, we can send a event to tell management application that the guest is panicked

[PATCH v4 0/4] qemu-kvm: pci-assign: Host IRQ sharing suppport

2012-03-08 Thread Jan Kiszka
This enables support for the host IRQ sharing support via PCI-2.3 interrupt masking. See the patches for details. Patch 1 3 could be considered for uq/master although we have no use case for the changes in upstream yet. Changes in v4: - add patch for kvm_has_intx_set_mask - do not issue

[PATCH v4 1/4] kvm: Update kernel headers against kvm.git

2012-03-08 Thread Jan Kiszka
Required for INTx masking / host IRQ sharing support of assigned devices. Corresponding kvm.git hash: 186195928e Signed-off-by: Jan Kiszka jan.kis...@siemens.com --- linux-headers/asm-s390/kvm.h |2 ++ linux-headers/linux/kvm.h|6 ++ 2 files changed, 8 insertions(+), 0

[PATCH v4 2/4] kvm: Introduce kvm_has_intx_set_mask

2012-03-08 Thread Jan Kiszka
Will be used by PCI device assignment code. Signed-off-by: Jan Kiszka jan.kis...@siemens.com --- kvm-all.c |8 kvm.h |1 + 2 files changed, 9 insertions(+), 0 deletions(-) diff --git a/kvm-all.c b/kvm-all.c index 7fed5c9..471293d 100644 --- a/kvm-all.c +++ b/kvm-all.c @@

[PATCH v4 3/4] pci-assign: Use PCI-2.3-based shared legacy interrupts

2012-03-08 Thread Jan Kiszka
Enable the new KVM feature that allows legacy interrupt sharing for PCI-2.3-compliant devices. This requires to synchronize any guest change of the INTx mask bit to the kernel. The feature is controlled by the property 'share_intx' and is off by default for now. Signed-off-by: Jan Kiszka

[PATCH v4 4/4] pci_assign: Flip defaults of prefer_msi and share_intx

2012-03-08 Thread Jan Kiszka
INTx sharing is a bit more expensive than exclusive host interrupts, but this channel is not supposed to be used for high-performance scenarios anyway. Modern devices support MSI/MSI-X and do not depend on using INTx under critical workload, real old devices do not support INTx sharing anyway.

[RESEND][PATCH 2/2 v3] deal with guest panicked event

2012-03-08 Thread Wen Congyang
When the host knows the guest is panicked, it will set exit_reason to KVM_EXIT_GUEST_PANICKED. So if qemu receive this exit_reason, we can send a event to tell management application that the guest is panicked and set the guest status to RUN_STATE_PANICKED. Signed-off-by: Wen Congyang

Re: [PATCH] kvm: svm: count all irq windows exit

2012-03-08 Thread Joerg Roedel
On Thu, Mar 08, 2012 at 06:07:56PM +0800, Jason Wang wrote: Also count the exits of fast-path. And align it with how it is counted in VMX. Signed-off-by: Jason Wang jasow...@redhat.com Acked-by: Joerg Roedel joerg.roe...@amd.com --- arch/x86/kvm/svm.c |2 +- 1 files changed, 1

[PATCH v2] KVM: x86: add paging gcc optimization

2012-03-08 Thread Davidlohr Bueso
From: Davidlohr Bueso d...@gnu.org Since most guests will have paging enabled for memory management, add likely() optimization around CR0.PG checks. Signed-off-by: Davidlohr Bueso d...@gnu.org --- arch/x86/kvm/x86.h |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git

Re: [PATCH 0/2 v3] kvm: notify host when guest panicked

2012-03-08 Thread Avi Kivity
On 03/08/2012 09:57 AM, Wen Congyang wrote: We can know the guest is paniced when the guest runs on xen. But we do not have such feature on kvm. Another purpose of this feature is: management app(for example: libvirt) can do auto dump when the guest is crashed. If management app does not do

[PATCH] KVM: schedule debugsfs statistics for removal

2012-03-08 Thread Avi Kivity
Deprecated in favour of tracepoints. Signed-off-by: Avi Kivity a...@redhat.com --- Documentation/feature-removal-schedule.txt |7 +++ 1 files changed, 7 insertions(+), 0 deletions(-) diff --git a/Documentation/feature-removal-schedule.txt b/Documentation/feature-removal-schedule.txt

Re: [RESEND][PATCH 2/2 v3] deal with guest panicked event

2012-03-08 Thread Avi Kivity
On 03/08/2012 12:15 PM, Wen Congyang wrote: When the host knows the guest is panicked, it will set exit_reason to KVM_EXIT_GUEST_PANICKED. So if qemu receive this exit_reason, we can send a event to tell management application that the guest is panicked and set the guest status to

Re: [RESEND][PATCH 2/2 v3] deal with guest panicked event

2012-03-08 Thread Daniel P. Berrange
On Thu, Mar 08, 2012 at 01:28:56PM +0200, Avi Kivity wrote: On 03/08/2012 12:15 PM, Wen Congyang wrote: When the host knows the guest is panicked, it will set exit_reason to KVM_EXIT_GUEST_PANICKED. So if qemu receive this exit_reason, we can send a event to tell management application

Re: [PATCH] KVM: x86: add paging gcc optimization

2012-03-08 Thread Davidlohr Bueso
On Thu, 2012-03-08 at 11:45 +0200, Avi Kivity wrote: On 03/07/2012 10:02 PM, Davidlohr Bueso wrote: From: Davidlohr Bueso d...@gnu.org Since most guests will have paging enabled for memory management, add likely() and unlikely() optimizations around is_paging() checks.

Re: [RESEND][PATCH 2/2 v3] deal with guest panicked event

2012-03-08 Thread Avi Kivity
On 03/08/2012 01:36 PM, Daniel P. Berrange wrote: On Thu, Mar 08, 2012 at 01:28:56PM +0200, Avi Kivity wrote: On 03/08/2012 12:15 PM, Wen Congyang wrote: When the host knows the guest is panicked, it will set exit_reason to KVM_EXIT_GUEST_PANICKED. So if qemu receive this exit_reason,

Re: linux-next: Tree for Mar 7 (kvm)

2012-03-08 Thread Avi Kivity
On 03/08/2012 12:56 AM, Randy Dunlap wrote: On 03/06/2012 11:10 PM, Stephen Rothwell wrote: Hi all, Changes since 20120306: The kvm tree lost its build failure. I'm getting this build error on X86_32 (i386): arch/x86/kvm/x86.c:1042: Error: no instruction mnemonic suffix given

Re: [RESEND][PATCH 2/2 v3] deal with guest panicked event

2012-03-08 Thread Daniel P. Berrange
On Thu, Mar 08, 2012 at 01:52:45PM +0200, Avi Kivity wrote: On 03/08/2012 01:36 PM, Daniel P. Berrange wrote: On Thu, Mar 08, 2012 at 01:28:56PM +0200, Avi Kivity wrote: On 03/08/2012 12:15 PM, Wen Congyang wrote: When the host knows the guest is panicked, it will set exit_reason to

[PATCH] KVM: Fix unsigned asm instruction in kvm_write_tsc()

2012-03-08 Thread Avi Kivity
'idiv', when given a memory operand, can't determine the instruction size. Provide it explicitly. Reported-by: Randy Dunlap rdun...@xenotime.net Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/x86.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git

Re: [PATCH-WIP 01/13] xen/arm: use r12 to pass the hypercall number to the hypervisor

2012-03-08 Thread Dave Martin
On Thu, Mar 08, 2012 at 09:58:23AM +, Richard Earnshaw wrote: On 02/03/12 21:15, Nicolas Pitre wrote: [ coming back from vacation and trying to catch up ] On Wed, 29 Feb 2012, Dave Martin wrote: Just had a chat with some tools guys -- apparently, when passing register arguments to

Re: [PATCH v9 2/4] KVM: PPC: epapr: Add idle hcall support for host

2012-03-08 Thread Alexander Graf
On 08.03.2012, at 05:18, Yoder Stuart-B08248 wrote: -Original Message- From: Alexander Graf [mailto:ag...@suse.de] Sent: Wednesday, March 07, 2012 5:39 PM To: Wood Scott-B07421 Cc: Yoder Stuart-B08248; kvm-...@vger.kernel.org; kvm@vger.kernel.org Subject: Re: [PATCH v9 2/4]

[PATCH 0/5] [PULL] qemu-kvm.git uq/master queue

2012-03-08 Thread Marcelo Tosatti
The following changes since commit e32605062cd62c2a958ad28a6ad7de4eeab12027: xilinx_zynq: machine model initial version (2012-03-07 02:20:19 +0100) are available in the git repository at: git://git.kernel.org/pub/scm/virt/kvm/qemu-kvm.git uq/master Jan Kiszka (4): i8254: Factor out

[PATCH 4/5] kvm: x86: Add user space part for in-kernel i8254

2012-03-08 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com This provides the required user space stubs to enable the in-kernel i8254 emulation of KVM. The in-kernel model supports lost tick compensation according to the delay policy. This is enabled by default and can be switched off via a device property.

[PATCH 3/5] kvm: Add kvm_has_pit_state2 helper

2012-03-08 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com To be used for in-kernel PIT emulation. Signed-off-by: Jan Kiszka jan.kis...@siemens.com Signed-off-by: Avi Kivity a...@redhat.com --- kvm-all.c | 10 ++ kvm-stub.c |5 + kvm.h |1 + 3 files changed, 16 insertions(+), 0

[PATCH 1/5] i8254: Factor out base class for KVM reuse

2012-03-08 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com Applying the concept used for the *PICs once again: establish a base class for the i8254 that can be used both by the current user space emulation and the upcoming KVM in-kernel version. We share most of the public interface of the i8254, specifically to

[PATCH 5/5] kvm: fill in padding to help valgrind

2012-03-08 Thread Marcelo Tosatti
From: Michael S. Tsirkin m...@redhat.com valgrind warns about padding fields which are passed to vcpu ioctls uninitialized. This is not an error in practice because kvm ignored padding. Since the ioctls in question are off data path and the cost is zero anyway, initialize padding to 0 to suppress

[PATCH 2/5] i8254: Open-code timer restore

2012-03-08 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com Same as for the APIC: To enable migration between accelerated and non-accelerated models, we need to arm the channel 0 timer only inside the emulated PIT model. The common code just saves/restores that timer to the the next_transition_time field.

[KVM-autotest] tests.cgroup: Fix cfg parameters

2012-03-08 Thread Lukas Doktor
Hi, I find out (IMO) better solution of smp parameter in cgroup testing. It doesn't need any changes to import order and it. Also now when cgroup_speeds is set the test calculates SMP from it. See pull request on: https://github.com/autotest/autotest/pull/225 Kind regards, Lukáš Doktor -- To

[PATCH] [KVM-autotest] tests.cgroup: Fix cfg parameters

2012-03-08 Thread Lukas Doktor
This patch solves the problem with smp parameter. * cpu_cfs_util - test creates the first VM instead of preprocess * cpu_share - 'cgroup_use_max_smp' cfg parameter let test calculate smp * cpuset_cpus - when cpusets is defined it calculates smp from it. Otherwise user can force

native kvm tool hrtimer problem

2012-03-08 Thread Daniele Carollo
Hi all, for an university study, I'm doing some network test between two vm using native linux kvm tool and connected via tap/virtio/vhost. When I run my script (several consecutive iperf tcp and udp execution), the first vm freeze with a message like: hrtimer: interrupt took * ns. Is this a bug?

Re: native kvm tool hrtimer problem

2012-03-08 Thread Pekka Enberg
On Thu, Mar 8, 2012 at 4:32 PM, Daniele Carollo carollo.d...@gmail.com wrote: for an university study, I'm doing some network test between two vm using native linux kvm tool and connected via tap/virtio/vhost. When I run my script (several consecutive iperf tcp and udp execution), the first vm

Re: native kvm tool hrtimer problem

2012-03-08 Thread Cyrill Gorcunov
On Thu, Mar 08, 2012 at 05:11:16PM +0200, Pekka Enberg wrote: On Thu, Mar 8, 2012 at 4:32 PM, Daniele Carollo carollo.d...@gmail.com wrote: for an university study, I'm doing some network test between two vm using native linux kvm tool and connected via tap/virtio/vhost. When I run my

Re: native kvm tool hrtimer problem

2012-03-08 Thread Daniele Carollo
Il giorno 08 marzo 2012 16:13, Cyrill Gorcunov gorcu...@openvz.org ha scritto: On Thu, Mar 08, 2012 at 05:11:16PM +0200, Pekka Enberg wrote: On Thu, Mar 8, 2012 at 4:32 PM, Daniele Carollo carollo.d...@gmail.com wrote: for an university study, I'm doing some network test between two vm

building with today qemu-kvm git fail (vcard_emul_nss.c)

2012-03-08 Thread Alexandre DERUMIER
Hi, i'm trying to build the last kvm git, ./configure --prefix=/usr --datadir=/usr/share/kvm --docdir=/usr/share/doc/pve-qemu-kvm --sysconfdir=/etc --disable-xen --enable-vnc-tls --enable-sdl --enable-uuid --enable-linux-aio and build fail on vcard_emul_nss.c cc1: warnings being treated as

Re: [PATCH v2] KVM: x86: add paging gcc optimization

2012-03-08 Thread Christian Borntraeger
On 08/03/12 12:45, Davidlohr Bueso wrote: From: Davidlohr Bueso d...@gnu.org Since most guests will have paging enabled for memory management, add likely() optimization around CR0.PG checks. { - return kvm_read_cr0_bits(vcpu, X86_CR0_PG); + return likely(kvm_read_cr0_bits(vcpu,

Re: native kvm tool hrtimer problem

2012-03-08 Thread Cyrill Gorcunov
On Thu, Mar 08, 2012 at 04:31:17PM +0100, Daniele Carollo wrote: I don't really use the tap interface so lets CC Asias. Which guest kernel are you using, btw? Yup, Asias was using it, if my memory doesn't betray me. Also both -- host and guest kernel versions might be useful to

Trunk interface in host machine

2012-03-08 Thread David Seira
Hi list, I'm installing several virtual machines with kvm. In the host machine I've configured several vlan interfaces, then I've matched the guest machine interface with the host vlan interface; it works correctly. The problem is that I want to create the vlan in the guest machine; how I must

[RFC 0/2] kvm: Transcendent Memory (tmem) on KVM

2012-03-08 Thread Akshay Karle
Hi, We are undergraduate engineering students of Maharashtra Academy of Engineering, Pune, India and we are working on a project entitled 'Transcendent Memory on KVM' as a part of our academics. The project members are: 1. Ashutosh Tripathi 2. Shreyas Mahure 3. Nishant Gulhane 4. Akshay Karle

[RFC 1/2] kvm: host-side changes for tmem on KVM

2012-03-08 Thread Akshay Karle
From: Akshay Karle akshay.a.ka...@gmail.com Subject: [RFC 1/2] kvm: host-side changes for tmem on KVM Working at host: Once the guest exits to the kvm host, the host determines that the guest exited to perform some tmem operation(done at kvm_emulate_hypercall)and then we use zcache to implement

Re: [PATCH v4 3/4] pci-assign: Use PCI-2.3-based shared legacy interrupts

2012-03-08 Thread Alex Williamson
On Thu, 2012-03-08 at 11:10 +0100, Jan Kiszka wrote: Enable the new KVM feature that allows legacy interrupt sharing for PCI-2.3-compliant devices. This requires to synchronize any guest change of the INTx mask bit to the kernel. The feature is controlled by the property 'share_intx' and is

[RFC 2/2] kvm: guest-side changes for tmem on KVM

2012-03-08 Thread Akshay Karle
From: Akshay Karle akshay.a.ka...@gmail.com Subject: [RFC 2/2] kvm: guest-side changes for tmem on KVM Working in the guest: At the kvm guest, we add the appropriate tmem shims to intercept the tmem operations and then invoke the kvm hypercalls to exit to the host and perform these operations.

Re: [PATCH v4 3/4] pci-assign: Use PCI-2.3-based shared legacy interrupts

2012-03-08 Thread Jan Kiszka
On 2012-03-08 18:00, Alex Williamson wrote: On Thu, 2012-03-08 at 11:10 +0100, Jan Kiszka wrote: Enable the new KVM feature that allows legacy interrupt sharing for PCI-2.3-compliant devices. This requires to synchronize any guest change of the INTx mask bit to the kernel. The feature is

Re: [PATCH-WIP 01/13] xen/arm: use r12 to pass the hypercall number to the hypervisor

2012-03-08 Thread Nicolas Pitre
On Thu, 8 Mar 2012, Richard Earnshaw wrote: On 02/03/12 21:15, Nicolas Pitre wrote: So, to me, the gcc documentation is perfectly clear on this topic. there really _is_ a guarantee that those asm marked variables will be in the expected registers on entry to the inline asm, given that the

Re: [PATCH] PPC: Don't sync timebase when inside VM

2012-03-08 Thread McClintock Matthew-B29882
On Fri, Mar 2, 2012 at 11:17 AM, Scott Wood scottw...@freescale.com wrote: On 03/02/2012 10:30 AM, Alexander Graf wrote: On 02.03.2012, at 17:20, Scott Wood wrote: On Fri, Mar 02, 2012 at 03:12:33PM +0100, Alexander Graf wrote: When running inside a virtual machine, we can not modify

Re: [RFC 1/2] kvm: host-side changes for tmem on KVM

2012-03-08 Thread Bobby Powers
On Thu, Mar 8, 2012 at 11:54 AM, Akshay Karle akshay.a.ka...@gmail.com wrote: From: Akshay Karle akshay.a.ka...@gmail.com Subject: [RFC 1/2] kvm: host-side changes for tmem on KVM Working at host: Once the guest exits to the kvm host, the host determines that the guest exited to perform

Re: [RFC 2/2] kvm: guest-side changes for tmem on KVM

2012-03-08 Thread Bobby Powers
On Thu, Mar 8, 2012 at 12:02 PM, Akshay Karle akshay.a.ka...@gmail.com wrote: From: Akshay Karle akshay.a.ka...@gmail.com Subject: [RFC 2/2] kvm: guest-side changes for tmem on KVM Working in the guest: At the kvm guest, we add the appropriate tmem shims to intercept the tmem operations and

Virtio Block Device Queue Depth

2012-03-08 Thread George Bottas
Hi list, I have a question regarding changing the queue size that is set in virtio_blk_init(). The current value is 128, which results in setting the queue depth in the Windows guest device to 8. Does anyone know if changing this value to defined maximum (1024) going to result in any issues?

[PATCH v5 3/4] pci-assign: Use PCI-2.3-based shared legacy interrupts

2012-03-08 Thread Jan Kiszka
Enable the new KVM feature that allows legacy interrupt sharing for PCI-2.3-compliant devices. This requires to synchronize any guest change of the INTx mask bit to the kernel. The feature is controlled by the property 'share_intx' and is off by default for now. Signed-off-by: Jan Kiszka

Re: [PATCH] PPC: Don't sync timebase when inside VM

2012-03-08 Thread Scott Wood
On 03/08/2012 11:31 AM, McClintock Matthew-B29882 wrote: On Fri, Mar 2, 2012 at 11:17 AM, Scott Wood scottw...@freescale.com wrote: On 03/02/2012 10:30 AM, Alexander Graf wrote: On 02.03.2012, at 17:20, Scott Wood wrote: Again, for 85xx we should *never* sync the timebase in the kernel,

Re: [PATCH] PPC: Don't sync timebase when inside VM

2012-03-08 Thread McClintock Matthew-B29882
On Thu, Mar 8, 2012 at 12:20 PM, Scott Wood scottw...@freescale.com wrote: On 03/08/2012 11:31 AM, McClintock Matthew-B29882 wrote: On Fri, Mar 2, 2012 at 11:17 AM, Scott Wood scottw...@freescale.com wrote: On 03/02/2012 10:30 AM, Alexander Graf wrote: On 02.03.2012, at 17:20, Scott Wood

Re: [PATCH] PPC: Don't sync timebase when inside VM

2012-03-08 Thread Scott Wood
On 03/08/2012 12:24 PM, McClintock Matthew-B29882 wrote: On Thu, Mar 8, 2012 at 12:20 PM, Scott Wood scottw...@freescale.com wrote: On 03/08/2012 11:31 AM, McClintock Matthew-B29882 wrote: On Fri, Mar 2, 2012 at 11:17 AM, Scott Wood scottw...@freescale.com wrote: On 03/02/2012 10:30 AM,

Re: [PATCH] PPC: Don't sync timebase when inside VM

2012-03-08 Thread McClintock Matthew-B29882
On Thu, Mar 8, 2012 at 12:43 PM, Scott Wood scottw...@freescale.com wrote: On 03/08/2012 12:24 PM, McClintock Matthew-B29882 wrote: On Thu, Mar 8, 2012 at 12:20 PM, Scott Wood scottw...@freescale.com wrote: On 03/08/2012 11:31 AM, McClintock Matthew-B29882 wrote: On Fri, Mar 2, 2012 at 11:17

Re: [PATCH-WIP 01/13] xen/arm: use r12 to pass the hypercall number to the hypervisor

2012-03-08 Thread Richard Earnshaw
On 08/03/12 17:21, Nicolas Pitre wrote: On Thu, 8 Mar 2012, Richard Earnshaw wrote: On 02/03/12 21:15, Nicolas Pitre wrote: So, to me, the gcc documentation is perfectly clear on this topic. there really _is_ a guarantee that those asm marked variables will be in the expected registers on

Re: [PATCH v2] KVM: x86: add paging gcc optimization

2012-03-08 Thread Davidlohr Bueso
On Thu, 2012-03-08 at 16:47 +0100, Christian Borntraeger wrote: On 08/03/12 12:45, Davidlohr Bueso wrote: From: Davidlohr Bueso d...@gnu.org Since most guests will have paging enabled for memory management, add likely() optimization around CR0.PG checks. { - return

Re: [PATCH v4] KVM: Factor out kvm_vcpu_kick to arch-generic code

2012-03-08 Thread Christoffer Dall
Any news on the status of this? On Thu, Feb 9, 2012 at 8:45 PM, Alexander Graf ag...@suse.de wrote: On 10.02.2012, at 02:40, Christoffer Dall wrote: The kvm_vcpu_kick function performs roughly the same funcitonality on most all architectures, so we shouldn't have separate copies. PowerPC

KVM: x86: fix kvm_write_tsc() TSC matching thinko

2012-03-08 Thread Marcelo Tosatti
kvm_write_tsc() converts from guest TSC to microseconds, not nanoseconds as intended. The result is that the window for matching is 1000 seconds, not 1 second. Microsecond precision is enough for checking whether the TSC write delta is within the heuristic values, so use it instead of

Re: [PATCH] KVM: Fix unsigned asm instruction in kvm_write_tsc()

2012-03-08 Thread Marcelo Tosatti
On Thu, Mar 08, 2012 at 01:57:23PM +0200, Avi Kivity wrote: 'idiv', when given a memory operand, can't determine the instruction size. Provide it explicitly. Reported-by: Randy Dunlap rdun...@xenotime.net Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/x86.c |2 +- 1

Re: [PATCH v4] KVM: Factor out kvm_vcpu_kick to arch-generic code

2012-03-08 Thread Scott Wood
On 03/08/2012 03:44 PM, Christoffer Dall wrote: Any news on the status of this? On Thu, Feb 9, 2012 at 8:45 PM, Alexander Graf ag...@suse.de wrote: Apart from this little glitch the patch looks fine to me. But I'd like to have Scott and Paul ack it too. ACK -Scott -- To unsubscribe from

Re: [PATCH] KVM: Cleanup the kvm_print functions and introduce pr_XX wrappers

2012-03-08 Thread Christoffer Dall
Any comments on this one? On Thu, Feb 9, 2012 at 3:57 PM, Christoffer Dall c.d...@virtualopensystems.com wrote: From: Christoffer Dall c.d...@virtualopensystems.com Introduces a couple of print functions, which are essentially wrappers around standard printk functions, with a KVM: prefix.

Re: [PATCH] KVM: expose Intel cpu new features to guest

2012-03-08 Thread Marcelo Tosatti
On Tue, Feb 28, 2012 at 05:15:46AM +, Liu, Jinsong wrote: From ecd8be962f69393c183f941bfdbd7a7d3876d442 Mon Sep 17 00:00:00 2001 From: Liu, Jinsong jinsong@intel.com Date: Mon, 27 Feb 2012 05:19:32 +0800 Subject: [PATCH] KVM: expose Intel cpu new features to guest Intel recently

Re: [PATCH 19/38] KVM: PPC: e500mc: add load inst fixup

2012-03-08 Thread Marcelo Tosatti
On Wed, Feb 29, 2012 at 01:09:47AM +0100, Alexander Graf wrote: There's always a chance we're unable to read a guest instruction. The guest could have its TLB mapped execute-, but not readable, something odd happens and our TLB gets flushed. So it's a good idea to be prepared for that case and

Re: [PATCH v6 1/2] KVM: resize kvm_io_range array dynamically

2012-03-08 Thread Marcelo Tosatti
On Thu, Mar 08, 2012 at 10:03:55AM +0800, Amos Kong wrote: This patch makes the kvm_io_range array can be resized dynamically. Signed-off-by: Amos Kong ak...@redhat.com --- include/linux/kvm_host.h |5 +++-- virt/kvm/kvm_main.c | 38 ++ 2

Re: [Qemu-devel] virtio-blk performance regression and qemu-kvm

2012-03-08 Thread Ross Becker
I just joined in order to chime in here- I'm seeing the exact same thing as Reeted; I've got a machine with a storage subsystem capable of 400k IOPs, and when I punch the storage up to VMs, each VM seems to top out at around 15-20k IOPs. I've managed to get to 115k IOPs by creating 8 VMs,

Re: [PATCH 3/4 changelog-v2] KVM: Switch to srcu-less get_dirty_log()

2012-03-08 Thread Marcelo Tosatti
On Thu, Mar 08, 2012 at 10:35:45AM +0900, Takuya Yoshikawa wrote: Marcelo Tosatti mtosa...@redhat.com wrote: What is worrying are large memory cases: think of the 50GB slot case. 100ms hold time is pretty bad (and reacquiring the lock is relatively simple). OK, I agree basically.

Re: [PATCH 0/2 v3] kvm: notify host when guest panicked

2012-03-08 Thread Wen Congyang
At 03/08/2012 07:13 PM, Avi Kivity Wrote: On 03/08/2012 09:57 AM, Wen Congyang wrote: We can know the guest is paniced when the guest runs on xen. But we do not have such feature on kvm. Another purpose of this feature is: management app(for example: libvirt) can do auto dump when the guest

Re: [PATCH v3 1/7] RTC: Remove the logic to update time format when DM bit changed

2012-03-08 Thread Marcelo Tosatti
On Fri, Mar 02, 2012 at 06:59:04AM +, Zhang, Yang Z wrote: Change DM(date mode) and 24/12 control bit don't affect the internal registers. It only indicates what format is using for those registers. So we don't need to update time format when it is modified. Signed-off-by: Yang Zhang

RE: [PATCH v3 1/7] RTC: Remove the logic to update time format when DM bit changed

2012-03-08 Thread Zhang, Yang Z
-Original Message- From: Marcelo Tosatti [mailto:mtosa...@redhat.com] Sent: Friday, March 09, 2012 9:36 AM --- hw/mc146818rtc.c | 10 +- 1 files changed, 1 insertions(+), 9 deletions(-) diff --git a/hw/mc146818rtc.c b/hw/mc146818rtc.c index a46fdfc..9b49cbc 100644

RE: [PATCH v3 1/7] RTC: Remove the logic to update time format when DM bit changed

2012-03-08 Thread Zhang, Yang Z
I think the better fixing is to update the cmos before reading the RTC. And in my patch, it will do it. best regards yang -Original Message- From: Zhang, Yang Z Sent: Friday, March 09, 2012 9:54 AM To: Marcelo Tosatti Cc: qemu-de...@nongnu.org; Jan Kiszka; kvm@vger.kernel.org;

Re: RFC: Device isolation groups

2012-03-08 Thread David Gibson
On Wed, Feb 29, 2012 at 12:30:55PM -0700, Alex Williamson wrote: On Thu, 2012-02-02 at 12:24 +1100, David Gibson wrote: On Wed, Feb 01, 2012 at 01:08:39PM -0700, Alex Williamson wrote: [snip] Any update to this series? It would be great if we could map out the functionality to the point of

Re: [PATCH v6 1/2] KVM: resize kvm_io_range array dynamically

2012-03-08 Thread Amos Kong
On 09/03/12 07:20, Marcelo Tosatti wrote: On Thu, Mar 08, 2012 at 10:03:55AM +0800, Amos Kong wrote: This patch makes the kvm_io_range array can be resized dynamically. Signed-off-by: Amos Kongak...@redhat.com --- include/linux/kvm_host.h |5 +++-- virt/kvm/kvm_main.c | 38

[PATCH v7 0/2] fix ENOSPC issue of iobus dev

2012-03-08 Thread Amos Kong
Boot up qemu-kvm guest with 232 multiple functions disks, qemu will report a ENOSPC error, it's not good to statically increase iobus array. This patchset makes kvm_io_range array can be resized dynamically, and change dev limit to 1000. Changes from v1: - fix typo: kvm_io_bus_range -

[PATCH v7 1/2] KVM: resize kvm_io_range array dynamically

2012-03-08 Thread Amos Kong
This patch makes the kvm_io_range array can be resized dynamically. Signed-off-by: Amos Kong ak...@redhat.com --- include/linux/kvm_host.h |5 +++-- virt/kvm/kvm_main.c | 38 ++ 2 files changed, 21 insertions(+), 22 deletions(-) diff --git

[PATCH v7 2/2] KVM: set upper bounds for iobus dev to limit userspace

2012-03-08 Thread Amos Kong
kvm_io_bus devices are used for ioevent, pit, pic, ioapic, coalesced_mmio. Currently Qemu only emulates one PCI bus, it contains 32 slots, one slot contains 8 functions, maximum of supported PCI devices: 1 * 32 * 8 = 256. One virtio-blk takes one iobus device, one virtio-net(vhost=on) takes two

Re: [PATCH v9 2/4] KVM: PPC: epapr: Add idle hcall support for host

2012-03-08 Thread Alexander Graf
On 08.03.2012, at 05:18, Yoder Stuart-B08248 wrote: -Original Message- From: Alexander Graf [mailto:ag...@suse.de] Sent: Wednesday, March 07, 2012 5:39 PM To: Wood Scott-B07421 Cc: Yoder Stuart-B08248; kvm-ppc@vger.kernel.org; k...@vger.kernel.org Subject: Re: [PATCH v9 2/4]

Re: [PATCH] PPC: Don't sync timebase when inside VM

2012-03-08 Thread McClintock Matthew-B29882
On Fri, Mar 2, 2012 at 11:17 AM, Scott Wood scottw...@freescale.com wrote: On 03/02/2012 10:30 AM, Alexander Graf wrote: On 02.03.2012, at 17:20, Scott Wood wrote: On Fri, Mar 02, 2012 at 03:12:33PM +0100, Alexander Graf wrote: When running inside a virtual machine, we can not modify

Re: [PATCH] PPC: Don't sync timebase when inside VM

2012-03-08 Thread Scott Wood
On 03/08/2012 11:31 AM, McClintock Matthew-B29882 wrote: On Fri, Mar 2, 2012 at 11:17 AM, Scott Wood scottw...@freescale.com wrote: On 03/02/2012 10:30 AM, Alexander Graf wrote: On 02.03.2012, at 17:20, Scott Wood wrote: Again, for 85xx we should *never* sync the timebase in the kernel,

Re: [PATCH] PPC: Don't sync timebase when inside VM

2012-03-08 Thread McClintock Matthew-B29882
On Thu, Mar 8, 2012 at 12:20 PM, Scott Wood scottw...@freescale.com wrote: On 03/08/2012 11:31 AM, McClintock Matthew-B29882 wrote: On Fri, Mar 2, 2012 at 11:17 AM, Scott Wood scottw...@freescale.com wrote: On 03/02/2012 10:30 AM, Alexander Graf wrote: On 02.03.2012, at 17:20, Scott Wood

Re: [PATCH] PPC: Don't sync timebase when inside VM

2012-03-08 Thread Scott Wood
On 03/08/2012 12:24 PM, McClintock Matthew-B29882 wrote: On Thu, Mar 8, 2012 at 12:20 PM, Scott Wood scottw...@freescale.com wrote: On 03/08/2012 11:31 AM, McClintock Matthew-B29882 wrote: On Fri, Mar 2, 2012 at 11:17 AM, Scott Wood scottw...@freescale.com wrote: On 03/02/2012 10:30 AM,

Re: [PATCH] PPC: Don't sync timebase when inside VM

2012-03-08 Thread McClintock Matthew-B29882
On Thu, Mar 8, 2012 at 12:43 PM, Scott Wood scottw...@freescale.com wrote: On 03/08/2012 12:24 PM, McClintock Matthew-B29882 wrote: On Thu, Mar 8, 2012 at 12:20 PM, Scott Wood scottw...@freescale.com wrote: On 03/08/2012 11:31 AM, McClintock Matthew-B29882 wrote: On Fri, Mar 2, 2012 at 11:17

Re: [PATCH v4] KVM: Factor out kvm_vcpu_kick to arch-generic code

2012-03-08 Thread Christoffer Dall
Any news on the status of this? On Thu, Feb 9, 2012 at 8:45 PM, Alexander Graf ag...@suse.de wrote: On 10.02.2012, at 02:40, Christoffer Dall wrote: The kvm_vcpu_kick function performs roughly the same funcitonality on most all architectures, so we shouldn't have separate copies. PowerPC

Re: [PATCH v4] KVM: Factor out kvm_vcpu_kick to arch-generic code

2012-03-08 Thread Scott Wood
On 03/08/2012 03:44 PM, Christoffer Dall wrote: Any news on the status of this? On Thu, Feb 9, 2012 at 8:45 PM, Alexander Graf ag...@suse.de wrote: Apart from this little glitch the patch looks fine to me. But I'd like to have Scott and Paul ack it too. ACK -Scott -- To unsubscribe from

Re: [PATCH 19/38] KVM: PPC: e500mc: add load inst fixup

2012-03-08 Thread Marcelo Tosatti
On Wed, Feb 29, 2012 at 01:09:47AM +0100, Alexander Graf wrote: There's always a chance we're unable to read a guest instruction. The guest could have its TLB mapped execute-, but not readable, something odd happens and our TLB gets flushed. So it's a good idea to be prepared for that case and