Re: Windows XP x64 SP2 KVM Guest Virtio Drivers

2014-03-11 Thread Vadim Rozenfeld
On Mon, 2014-03-10 at 23:24 -0600, OwN-3m-All wrote:
 I was hoping for a virtio storage driver.  I'd like to use a virtio disk 
 rather than ide.  However, it does not seem to be possible with XP x64 
 because such a driver does not exist?  Also, the viostor driver for 
 Server 2003 x64 does not work for XP x64.
That's strange. While WXP 64-bit is not officially supported, I remember
I tested W2K3 64-bit viostor driver on WXP 64-bit SP2.
You said it fails with BSOD. Can you tell me the bug check code please?

Cheers,
Vadim.
  
 
 
 On 2/16/2014 6:05 AM, Yan Vugenfirer wrote:
  Hi,
 
  WinXP 64bit is a strange bird.
 
  Which driver did you tried to install: virtio-net, virtio-block or 
  something else?
 
 
  Best regards,
  Yan.
 
  On Feb 14, 2014, at 3:37 AM, OwN-3m-All own3m...@gmail.com wrote:
 
  Hi Guys,
 
  Does a virtio KVM driver exist for Windows XP x64 SP2?  If not, would it be
  possible to create one / adapt the Server 2003 version somehow?  I tried
  using the Server 2003 x64 drivers (from
  http://www.linux-kvm.org/page/WindowsGuestDrivers), but they didn't work.
  The drivers would install, but then XP x64 would just blue screen and
  never boot up again.
 
  Hoping there's a driver!
 
  --
  To unsubscribe from this list: send the line unsubscribe kvm in
  the body of a message to majord...@vger.kernel.org
  More majordomo info at  http://vger.kernel.org/majordomo-info.html
 


--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Bug 67061] [BISECTED][Nested]L2 guest boot up fail(kvm on kvm).

2014-03-11 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=67061

Paolo Bonzini bonz...@gnu.org changed:

   What|Removed |Added

 Status|NEW |RESOLVED
 CC||bonz...@gnu.org
 Resolution|--- |CODE_FIX

--- Comment #4 from Paolo Bonzini bonz...@gnu.org ---
I agree with the explanation in comment 3.

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: Question about suspended virtual machine resources on a kvm hypervisor

2014-03-11 Thread Paolo Bonzini

Il 10/03/2014 21:33, William Heath ha scritto:

Hi All,

I am working with OnApp for a cloud solution.  In order to do billing
correctly, I am curious what resources are freed up when a virtual
machine is suspended on a kvm hypervisor.  Are cpu, ram, and disk all
freed up or what is reallocated to other virtual machines etc...?


A suspended VM uses no CPU.  It still uses RAM, and files are still open 
even though no I/O should happen.


Paolo

--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: Question about suspended virtual machine resources on a kvm hypervisor

2014-03-11 Thread William Heath
So is the CPU re-allocated to other virtual machines that need them?
I take it then that RAM and disk usage are not reallocated?

-Tim

On Mon, Mar 10, 2014 at 9:49 PM, Paolo Bonzini pbonz...@redhat.com wrote:
 Il 10/03/2014 21:33, William Heath ha scritto:

 Hi All,

 I am working with OnApp for a cloud solution.  In order to do billing
 correctly, I am curious what resources are freed up when a virtual
 machine is suspended on a kvm hypervisor.  Are cpu, ram, and disk all
 freed up or what is reallocated to other virtual machines etc...?


 A suspended VM uses no CPU.  It still uses RAM, and files are still open
 even though no I/O should happen.

 Paolo

--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: Question about suspended virtual machine resources on a kvm hypervisor

2014-03-11 Thread Paolo Bonzini

Il 11/03/2014 09:10, William Heath ha scritto:

So is the CPU re-allocated to other virtual machines that need them?


In KVM, virtual CPUs are just threads; if a thread does not want to run, 
the Linux scheduler does not give it any CPU.  If the virtual machine 
monitor you're using is QEMU, the virtual CPU threads of a suspended VM 
will be waiting on a condition variable until the VM is resumed.



I take it then that RAM and disk usage are not reallocated?


No.  But RAM can be swapped out, for both suspended and running VMs.

Paolo
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


How to apply for Google Summer of Code

2014-03-11 Thread Stefan Hajnoczi
Dear students,
Applications for Google Summer of Code opened on Monday, 10th of March
and will continue until Friday, 21st of March.

The common question we are getting is How do I apply? :).

Here is the application checklist:

1. Choose a project idea and get in touch with the mentor.  The
project ideas and mentors are listed here:
http://qemu-project.org/Google_Summer_of_Code_2014

2. Put together a rough project plan (design + schedule) that breaks
down the solution you are proposing.  You can email a draft to your
mentor for feedback or ask for clarifications about the project idea.

3. Go to http://google-melange.com/, log in and submit your
application form for QEMU.  The application template is here:
https://www.google-melange.com/gsoc/org2/google/gsoc2014/qemu

Remember the deadline for applications Friday, 21st of March.  You can
reach mentors on #qemu-gsoc on irc.oftc.net or via email.

Stefan
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: Enhancement for PLE handler in KVM

2014-03-11 Thread Paolo Bonzini

Il 11/03/2014 15:12, Li, Bin (Bin) ha scritto:

- For the guest OS which doesn't use the hyper call interface, there
will be no impact to them. The proposed ple handler enhancement has
structured to use the hint only if the guest OS using the new
proposed hyper call. And it is per VM only.
The VM which running general guest OS ( linux / windows) will still
use the today's ple hanlder to boost vCPUs. While the other VM,
which using new hyper call indicating the lock get and release, the
ple handler for this VM will boost the lock holder only.


No, if there is a jitter problem we want to fix it for all guest OSes, 
not just for those that use a big kernel lock.



- The main advantage of this proposal is that, it reliably solves
the problem. Any other option which could prevent the problem from
happening thoroughly?


You haven't proved this yet.  My impression is that, on a 
non-overcommitted system, your proposal is exactly the same as a fair 
lock with paravirtualization (except more expensive for the lock taker, 
even when there is no contention).


I think I understand why, on an overcommitted system, you could still 
have jitter with pv ticketlocks and not with your infrastructure.  The 
reason is that pv ticketlocks do not attempt to donate the quantum to 
the lock holder.  Is there anything we can do to fix *this*?  I would 
accept a new hypercall KVM_HC_HALT_AND_YIELD_TO_CPU that takes an APIC 
id, donates the quantum to that CPU, and puts the originating CPU in 
halted state.


If this is not enough, it's up to you to disprove this and explain why 
the two have different jitter characteristics.  To do this, you need to 
implement paravirtualized fair locks in your kernel (and possibly 
halt-and-yield), measure the difference in jitter, *trace what's 
happening on the host to characterize the benefits of your solution*, etc.



- Using hyper call to mark lock status does increase cpu
consumption. But the impact to the system is very much depending on
lock usage character in the guest OS.

  For the guest OS, which typically doing less frequent kernel lock,
but longer operation for each kernel lock, the overall impact from
hype call could *NOT *be an issue.


Again, if there is a jitter problem we want to fix it for all locks, 
like we did for pv ticketlocks.


Paolo
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[PATCH] KVM: SVM: fix cr8 intercept window

2014-03-11 Thread Radim Krčmář
We always disable cr8 intercept in its handler, but only re-enable it
if handling KVM_REQ_EVENT, so there can be a window where we do not
intercept cr8 writes, which allows an interrupt to disrupt a higher
priority task.

Fix this by disabling intercepts in the same function that re-enables
them when needed. This fixes BSOD in Windows 2008.

Cc: sta...@vger.kernel.org
Signed-off-by: Radim Krčmář rkrc...@redhat.com
---
 arch/x86/kvm/svm.c | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index 64d9bb9..f676c18 100644
--- a/arch/x86/kvm/svm.c
+++ b/arch/x86/kvm/svm.c
@@ -3003,10 +3003,8 @@ static int cr8_write_interception(struct vcpu_svm *svm)
u8 cr8_prev = kvm_get_cr8(svm-vcpu);
/* instruction emulation calls kvm_set_cr8() */
r = cr_interception(svm);
-   if (irqchip_in_kernel(svm-vcpu.kvm)) {
-   clr_cr_intercept(svm, INTERCEPT_CR8_WRITE);
+   if (irqchip_in_kernel(svm-vcpu.kvm))
return r;
-   }
if (cr8_prev = kvm_get_cr8(svm-vcpu))
return r;
kvm_run-exit_reason = KVM_EXIT_SET_TPR;
@@ -3568,6 +3566,8 @@ static void update_cr8_intercept(struct kvm_vcpu *vcpu, 
int tpr, int irr)
if (is_guest_mode(vcpu)  (vcpu-arch.hflags  HF_VINTR_MASK))
return;
 
+   clr_cr_intercept(svm, INTERCEPT_CR8_WRITE);
+
if (irr == -1)
return;
 
-- 
1.8.5.3

--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[no subject]

2014-03-11 Thread Mohan Krishna
unsubscribe kvm
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: Linux 3.13: BUG: soft lockup - CPU#1 stuck for 22s! [qemu-kvm:2653]

2014-03-11 Thread Jason S. Wagner

Hi all,

Over the weekend, Linux 3.13.6 was installed on my machine. When I 
started gnome-boxes on Monday morning, my VM halted during boot. Only a 
portion of the VESA BIOS init output was displayed on-screen before the 
halt. Backtraces occasionally appeared in dmesg 
(http://pastebin.com/uUiNLmJ6). Some other programs were prevented from 
performing some tasks while the VM was running.


While investigating, I was directed to an earlier KVM bug report 
(https://lkml.org/lkml/2014/2/11/487). I downgraded to Linux 3.12.9 and 
rebooted, and now my VM is starting. Unfortunately, I'm very new to 
Linux, so I'm not sure what the next steps would be.


Host system info:
Arch Linux (current with updates), 64-bit with UEFI boot
Intel Haswell CPU (i5-4670K)
32GB RAM
Intel 240GB SSD
GNOME 3.10.x
gnome-boxes 3.10.x

Guest OS info:
Windows 7, 64-bit
2GB of RAM allocated
Beyond setting disk and RAM sizes when initializing the VM, I have 
trusted the gnome-boxes defaults and have not altered the machine 
configuration in any way.


Let me know if there is any additional logging that would be useful. I 
can certainly re-install the problematic kernel outside of business 
hours.


--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [PATCH] KVM: SVM: fix cr8 intercept window

2014-03-11 Thread Marcelo Tosatti
On Tue, Mar 11, 2014 at 07:11:18PM +0100, Radim Krčmář wrote:
 We always disable cr8 intercept in its handler, but only re-enable it
 if handling KVM_REQ_EVENT, so there can be a window where we do not
 intercept cr8 writes, which allows an interrupt to disrupt a higher
 priority task.
 
 Fix this by disabling intercepts in the same function that re-enables
 them when needed. This fixes BSOD in Windows 2008.
 
 Cc: sta...@vger.kernel.org
 Signed-off-by: Radim Krčmář rkrc...@redhat.com
 ---
  arch/x86/kvm/svm.c | 6 +++---
  1 file changed, 3 insertions(+), 3 deletions(-)
 
 diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
 index 64d9bb9..f676c18 100644
 --- a/arch/x86/kvm/svm.c
 +++ b/arch/x86/kvm/svm.c
 @@ -3003,10 +3003,8 @@ static int cr8_write_interception(struct vcpu_svm *svm)
   u8 cr8_prev = kvm_get_cr8(svm-vcpu);
   /* instruction emulation calls kvm_set_cr8() */
   r = cr_interception(svm);
 - if (irqchip_in_kernel(svm-vcpu.kvm)) {
 - clr_cr_intercept(svm, INTERCEPT_CR8_WRITE);
 + if (irqchip_in_kernel(svm-vcpu.kvm))
   return r;
 - }
   if (cr8_prev = kvm_get_cr8(svm-vcpu))
   return r;
   kvm_run-exit_reason = KVM_EXIT_SET_TPR;
 @@ -3568,6 +3566,8 @@ static void update_cr8_intercept(struct kvm_vcpu *vcpu, 
 int tpr, int irr)
   if (is_guest_mode(vcpu)  (vcpu-arch.hflags  HF_VINTR_MASK))
   return;
  
 + clr_cr_intercept(svm, INTERCEPT_CR8_WRITE);
 +
   if (irr == -1)
   return;

Shouldnt IRR be injected if TPR  IRR ? (via KVM_REQ_EVENT).

1) IRR has interrupt 10.
2) TPR now 9 due to CR8 write.
3) 10 should be injected.

Also not clearing the intercept can cause continuous CR8 writes to 
exit until KVM_REQ_EVENT ? 

--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html