Re: [PATCH 3/3] Provide control over unmapped pages (v4)

2011-02-14 Thread Balbir Singh
* MinChan Kim minchan@gmail.com [2011-02-10 14:41:44]: I don't know why the part of message is deleted only when I send you. Maybe it's gmail bug. I hope mail sending is successful in this turn. :) On Thu, Feb 10, 2011 at 2:33 PM, Minchan Kim minchan@gmail.com wrote: Sorry for

[PATCH] qemu-kvm: Clean up IOAPIC after upstream merge

2011-02-14 Thread Jan Kiszka
Drop base_address from the vmstate, upstream decided against managing it at device level. Continuing to interpret the vmstate field would break compatibility with upstream. Instead, fetch the base addres from the sysbus device state when setting the in-kernel state. Moreover, drop redundant

Re: [Qemu-devel] KVM call minutes for Feb 8

2011-02-14 Thread Paolo Bonzini
On 02/13/2011 08:57 PM, Anthony Liguori wrote: It shouldn't be able to dead lock if the locking is designed right. As an aside, one advantage of the qemuthread wrappers is that we can add lockdep mechanisms. (It's true that these could be added to glib as well, but getting stuff into glib

[PATCH V6 1/4 resend] nmi: convert cpu_index to cpu-index

2011-02-14 Thread Lai Jiangshan
cpu-index which uses hyphen is better name. Signed-off-by: Lai Jiangshan la...@cn.fujitsu.com --- diff --git a/hmp-commands.hx b/hmp-commands.hx index 5d4cb9e..e43ac7c 100644 --- a/hmp-commands.hx +++ b/hmp-commands.hx @@ -721,7 +721,7 @@ ETEXI #if defined(TARGET_I386) { .name

[PATCH V6 2/4 resend] nmi: make cpu-index argument optional

2011-02-14 Thread Lai Jiangshan
When the argument cpu-index is not given, then nmi command will inject NMI on all CPUs. This simulate the nmi button on physical machine. Note: it will allow non-argument nmi command and change the human monitor behavior. Thanks to Markus Armbruster for correcting the logic detecting

[PATCH V6 3/4 resend] qmp,nmi: convert do_inject_nmi() to QObject

2011-02-14 Thread Lai Jiangshan
Make we can inject NMI via qemu-monitor-protocol. We use inject-nmi for the qmp command name, the meaning is clearer. Signed-off-by: Lai Jiangshan la...@cn.fujitsu.com --- diff --git a/hmp-commands.hx b/hmp-commands.hx index b2c6cd6..6d3e7d2 100644 --- a/hmp-commands.hx +++ b/hmp-commands.hx @@

[PATCH V6 4/4 resend] nmi: report error(QError) when the cpu-index is invalid

2011-02-14 Thread Lai Jiangshan
When cpu-index is found invalid in runtime, it will report QERR_INVALID_PARAMETER_VALUE. Signed-off-by: Lai Jiangshan la...@cn.fujitsu.com --- diff --git a/monitor.c b/monitor.c index 1b1c0ba..82935f0 100644 --- a/monitor.c +++ b/monitor.c @@ -2563,6 +2563,7 @@ static int do_inject_nmi(Monitor

Re: [PATCH V6 1/4] nmi: convert cpu_index to cpu-index

2011-02-14 Thread Lai Jiangshan
On 02/09/2011 07:48 PM, Luiz Capitulino wrote: You should use Anthony's tree: git://git.qemu.org/qemu.git Done, thank you for your concern and patience. see my sent emails: [PATCH V6 1/4 resend] [PATCH V6 2/4 resend] [PATCH V6 3/4 resend] [PATCH V6 4/4 resend] Thanks again. Lai -- To

Re: [Qemu-devel] KVM call minutes for Feb 8

2011-02-14 Thread Gleb Natapov
On Sun, Feb 13, 2011 at 01:38:12PM -0600, Anthony Liguori wrote: On 02/13/2011 12:08 PM, Gleb Natapov wrote: On Sun, Feb 13, 2011 at 10:56:30AM -0600, Anthony Liguori wrote: qemu -device i440fx,id=nb -device piix3,id=sb,chipset=nb -device ioapic,id=ioapic,chipset=sb -device

Re: [RFC PATCH V2 0/5] macvtap TX zero copy between guest and host kernel

2011-02-14 Thread Michael S. Tsirkin
On Fri, Dec 10, 2010 at 01:51:31AM -0800, Shirley Ma wrote: This patchset add supports for TX zero-copy between guest and host kernel through vhost. It significantly reduces CPU utilization on the local host on which the guest is located (It reduced 30-50% CPU usage for vhost thread for single

Re: Migration of WinXP Guest - usb+network failure

2011-02-14 Thread Gerd Hoffmann
On 02/08/11 14:32, Peter Lieven wrote: Hi, is there any known issue when migrating a WinXP SP3 guest with qemu-kvm 0.13.0 or qemu-kvm-0.12.5? If I migrate such a guest with a Realtek rtl8139 Network Device and an USB Mouse Tablet after migration the USB Tablet doesn't work any more and

[PATCH 0/3] Optimize STI; HLT while an interrupt is pending

2011-02-14 Thread Avi Kivity
If the guest executes the following code sequence CLI ... (interrupt becomes pending) STI HLT then we will exit on HLT, enter the guest, and exit immediately again on virtual interrupt pending. As this is wasteful, this patch set short circuits the whole operation to inject the

[PATCH 1/3] KVM: VMX: Cache CPU_BASED_VM_EXEC_CONTROL VMCS field

2011-02-14 Thread Avi Kivity
The CPU_BASED_VM_EXEC_CONTROL VMCS field is write-only, so we can cache it in the vcpu structure and avoid a costly vmcs_read32() every time we want to change a bit. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/vmx.c | 60 +-- 1

[PATCH 2/3] KVM: VMX: Short circuit STI; HLT while an interrupt is pending

2011-02-14 Thread Avi Kivity
Short-circuit an STI; HLT sequence while an interrupt is pending: instead of halting, re-entering the guest, and exiting immediately on an interrupt window exit, go directly to the last step. Saves a vmexit on workloads where interrupts are received synchronously; an example is a disk backed by

[PATCH 3/3] KVM: SVM: Short circuit STI; HLT while an interrupt is pending

2011-02-14 Thread Avi Kivity
Short-circuit an STI; HLT sequence while an interrupt is pending: instead of halting, re-entering the guest, and exiting immediately on an interrupt window exit, go directly to the last step. Saves a vmexit on workloads where interrupts are received synchronously; an example is a disk backed by

[Bug 27052] Module KVM : unable to handle kernel NULL pointer dereference at

2011-02-14 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=27052 --- Comment #35 from Avi Kivity a...@redhat.com 2011-02-14 14:52:24 --- Even if it isn't a kvm bug, it needs to be fixed. -- Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email --- You are receiving this mail because:

Possible netfilter-related memory corruption in 2.6.37

2011-02-14 Thread Avi Kivity
We see severe memory corruption in kvm while used in conjunction with bridge/netfilter. Enabling slab debugging points the finger at a netfilter chain invoked from the bridge code. Can someone take a look? https://bugzilla.kernel.org/show_bug.cgi?id=27052 -- error compiling committee.c: too

Re: Possible netfilter-related memory corruption in 2.6.37

2011-02-14 Thread Eric Dumazet
Le lundi 14 février 2011 à 16:58 +0200, Avi Kivity a écrit : We see severe memory corruption in kvm while used in conjunction with bridge/netfilter. Enabling slab debugging points the finger at a netfilter chain invoked from the bridge code. Can someone take a look?

Re: Possible netfilter-related memory corruption in 2.6.37

2011-02-14 Thread Jan Engelhardt
On Monday 2011-02-14 16:11, Eric Dumazet wrote: Le lundi 14 février 2011 à 16:58 +0200, Avi Kivity a écrit : We see severe memory corruption in kvm while used in conjunction with bridge/netfilter. Enabling slab debugging points the finger at a netfilter chain invoked from the bridge code.

[PATCH 08/37] kvm: Drop redundant kvm_enabled from kvm_cpu_thread_fn

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com Signed-off-by: Jan Kiszka jan.kis...@siemens.com Signed-off-by: Marcelo Tosatti mtosa...@redhat.com --- cpus.c |4 ++-- 1 files changed, 2 insertions(+), 2 deletions(-) diff --git a/cpus.c b/cpus.c index 0abc009..8232d44 100644 --- a/cpus.c +++

[PATCH 09/37] kvm: Handle kvm_init_vcpu errors

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com Do not ignore errors of kvm_init_vcpu, they are fatal. Signed-off-by: Jan Kiszka jan.kis...@siemens.com Signed-off-by: Marcelo Tosatti mtosa...@redhat.com --- cpus.c | 19 +++ 1 files changed, 15 insertions(+), 4 deletions(-) diff --git

[PATCH 00/37] [PULL] qemu-kvm.git uq/master queue

2011-02-14 Thread Marcelo Tosatti
The following changes since commit 8668f61d20eac971d116ebbe8436b4ae963884a8: vmmouse: fix queue_size field initialization (2011-02-12 17:44:11 +) are available in the git repository at: git://git.kernel.org/pub/scm/virt/kvm/qemu-kvm.git uq/master Anthony PERARD (1): Introduce

[PATCH 25/37] Fix a few coding style violations in cpus.c

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com No functional changes. Signed-off-by: Jan Kiszka jan.kis...@siemens.com Signed-off-by: Marcelo Tosatti mtosa...@redhat.com --- cpus.c | 71 +++ 1 files changed, 44 insertions(+), 27

[PATCH 24/37] Refactor cpu_has_work/any_cpu_has_work in cpus.c

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com Avoid duplicate use of the function name cpu_has_work, it's confusing, also their scope. Refactor cpu_has_work to cpu_thread_is_idle and do the same with any_cpu_has_work. Signed-off-by: Jan Kiszka jan.kis...@siemens.com Signed-off-by: Marcelo Tosatti

[PATCH 15/37] Set up signalfd under !CONFIG_IOTHREAD

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com Will be required for SIGBUS handling. For obvious reasons, this will remain a nop on Windows hosts. Signed-off-by: Jan Kiszka jan.kis...@siemens.com Reviewed-by: Paolo Bonzini pbonz...@redhat.com Signed-off-by: Marcelo Tosatti mtosa...@redhat.com ---

[PATCH 27/37] Refactor debug and vmstop request interface

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com Instead of fiddling with debug_requested and vmstop_requested directly, introduce qemu_system_debug_request and turn qemu_system_vmstop_request into a public interface. This aligns those services with exiting ones in vl.c. Signed-off-by: Jan Kiszka

[PATCH 06/37] Flatten the main loop

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com First of all, vm_can_run is a misnomer, it actually means no request pending. Moreover, there is no need to check all pending requests twice, the first time via the inner loop check and then again when actually processing the requests. We can simply remove

[PATCH 16/37] kvm: Fix race between timer signals and vcpu entry under !IOTHREAD

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com Found by Stefan Hajnoczi: There is a race in kvm_cpu_exec between checking for exit_request on vcpu entry and timer signals arriving before KVM starts to catch them. Plug it by blocking both timer related signals also on !CONFIG_IOTHREAD and process those

[PATCH 17/37] kvm: Add MCE signal support for !CONFIG_IOTHREAD

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com Currently, we only configure and process MCE-related SIGBUS events if CONFIG_IOTHREAD is enabled. The groundwork is laid, we just need to factor out the required handler registration and system configuration. Signed-off-by: Jan Kiszka

[PATCH 03/37] Process vmstop requests in IO thread

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com A pending vmstop request is also a reason to leave the inner main loop. So far we ignored it, and pending stop requests issued over VCPU threads were simply ignored. Signed-off-by: Jan Kiszka jan.kis...@siemens.com Signed-off-by: Marcelo Tosatti

[PATCH 18/37] Introduce VCPU self-signaling service

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com Introduce qemu_cpu_kick_self to send SIG_IPI to the calling VCPU context. First user will be kvm. Signed-off-by: Jan Kiszka jan.kis...@siemens.com Signed-off-by: Marcelo Tosatti mtosa...@redhat.com --- cpus.c| 21 +

[PATCH 22/37] kvm: make tsc stable over migration and machine start

2011-02-14 Thread Marcelo Tosatti
From: Glauber Costa glom...@redhat.com If the machine is stopped, we should not record two different tsc values upon a save operation. The same problem happens with kvmclock. But kvmclock is taking a different diretion, being now seen as a separate device. Since this is unlikely to happen with

[PATCH 11/37] Refactor signal setup functions in cpus.c

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com Move {tcg,kvm}_init_ipi and block_io_signals to avoid prototypes, rename the former two to clarify that they deal with more than SIG_IPI. No functional changes - except for the tiny fixup of strerror usage. The forward declaration of sigbus_handler is just

[PATCH 34/37] Introduce log_start/log_stop in CPUPhysMemoryClient

2011-02-14 Thread Marcelo Tosatti
From: Anthony PERARD anthony.per...@citrix.com In order to use log_start/log_stop with Xen as well in the vga code, this two operations have been put in CPUPhysMemoryClient. The two new functions cpu_physical_log_start,cpu_physical_log_stop are used in hw/vga.c and replace the

[PATCH 37/37] kvm: x86: Introduce kvmclock device to save/restore its state

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com If kvmclock is used, which implies the kernel supports it, register a kvmclock device with the sysbus. Its main purpose is to save and restore the kernel state on migration, but this will also allow to visualize it one day. Signed-off-by: Jan Kiszka

[PATCH 04/37] Trigger exit from cpu_exec_all on pending IO events

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com Except for timer events, we currently do not leave the loop over all VCPUs if an IO event was filed. That may cause unexpected IO latencies under !CONFIG_IOTHREAD in SMP scenarios. Fix it by setting the global exit_request which breaks the loop.

[PATCH 31/37] kvm: Drop return values from kvm_arch_pre/post_run

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com We do not check them, and the only arch with non-empty implementations always returns 0 (this is also true for qemu-kvm). Signed-off-by: Jan Kiszka jan.kis...@siemens.com CC: Alexander Graf ag...@suse.de Signed-off-by: Marcelo Tosatti mtosa...@redhat.com

[PATCH 29/37] kvm: Separate TCG from KVM cpu execution

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com Mixing up TCG bits with KVM already led to problems around eflags emulation on x86. Moreover, quite some code that TCG requires on cpu enty/exit is useless for KVM. So dispatch between tcg_cpu_exec and kvm_cpu_exec as early as possible. The core logic of

[PATCH 20/37] kvm: Remove static return code of kvm_handle_io

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com Improve the readability of the exit dispatcher by moving the static return value of kvm_handle_io to its caller. Signed-off-by: Jan Kiszka jan.kis...@siemens.com Signed-off-by: Marcelo Tosatti mtosa...@redhat.com --- kvm-all.c | 17 - 1

[PATCH 05/37] Leave inner main_loop faster on pending requests

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com If there is any pending request that requires us to leave the inner loop if main_loop, makes sure we do this as soon as possible by enforcing non-blocking IO processing. At this change, move variable definitions out of the inner loop to improve

[PATCH 33/37] kvm: Remove unneeded memory slot reservation

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com The number of slots and the location of private ones changed several times in KVM's early days. However, it's stable since 2.6.29 (our required baseline), and slots 8..11 are no longer reserved since then. So remove this unneeded restriction.

[PATCH 21/37] kvm: Leave kvm_cpu_exec directly after KVM_EXIT_SHUTDOWN

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com The reset we issue on KVM_EXIT_SHUTDOWN implies that we should also leave the VCPU loop. As we now check for exit_request which is set by qemu_system_reset_request, this bug is no longer critical. Still it's an unneeded extra turn. Signed-off-by: Jan

[PATCH 10/37] kvm: Provide sigbus services arch-independently

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com Provide arch-independent kvm_on_sigbus* stubs to remove the #ifdef'ery from cpus.c. This patch also fixes --disable-kvm build by providing the missing kvm_on_sigbus_vcpu kvm-stub. Signed-off-by: Jan Kiszka jan.kis...@siemens.com Reviewed-by: Paolo Bonzini

[PATCH 23/37] Refactor kvmtcg function names in cpus.c

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com Pure interface cosmetics: Ensure that only kvm core services (as declared in kvm.h) start with kvm_. Prepend qemu_ to those that violate this rule in cpus.c. Also rename the corresponding tcg functions for the sake of consistency. Signed-off-by: Jan Kiszka

[PATCH 35/37] cirrus: Remove obsolete kvm.h include

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com Signed-off-by: Jan Kiszka jan.kis...@siemens.com Signed-off-by: Marcelo Tosatti mtosa...@redhat.com --- hw/cirrus_vga.c |1 - 1 files changed, 0 insertions(+), 1 deletions(-) diff --git a/hw/cirrus_vga.c b/hw/cirrus_vga.c index 5f45b5d..2724f7b 100644

[PATCH 30/37] kvm: x86: Prepare VCPU loop for in-kernel irqchip

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com Effectively no functional change yet as kvm_irqchip_in_kernel still only returns 0, but this patch will allow qemu-kvm to adopt the VCPU loop of upsteam KVM. Signed-off-by: Jan Kiszka jan.kis...@siemens.com Signed-off-by: Marcelo Tosatti

[PATCH 01/37] Prevent abortion on multiple VCPU kicks

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com If we call qemu_cpu_kick more than once before the target was able to process the signal, pthread_kill will fail, and qemu will abort. Prevent this by avoiding the redundant signal. This logic can be found in qemu-kvm as well. Signed-off-by: Jan Kiszka

[PATCH 14/37] kvm: Call qemu_kvm_eat_signals also under !CONFIG_IOTHREAD

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com Move qemu_kvm_eat_signals around and call it also when the IO-thread is not used. Do not yet process SIGBUS, will be armed in a separate step. Signed-off-by: Jan Kiszka jan.kis...@siemens.com Signed-off-by: Marcelo Tosatti mtosa...@redhat.com --- cpus.c |

[PATCH 02/37] Stop current VCPU on synchronous reset requests

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com If some I/O operation ends up calling qemu_system_reset_request in VCPU context, we record this and inform the io-thread, but we do not terminate the VCPU loop. This can lead to fairly unexpected behavior if the triggering reset operation is supposed to

[PATCH 13/37] kvm: Refactor qemu_kvm_eat_signals

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com We do not use the timeout, so drop its logic. As we always poll our signals, we do not need to drop the global lock. Removing those calls allows some further simplifications. Also fix the error processing of sigpending at this chance. Signed-off-by: Jan

[PATCH 12/37] kvm: Set up signal mask also for !CONFIG_IOTHREAD

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com Block SIG_IPI, unblock it during KVM_RUN, just like in io-thread mode. It's unused so far, but this infrastructure will be required for self-IPIs and to process SIGBUS plus, in KVM mode, SIGIO and SIGALRM. As Windows doesn't support signal services, we need

[PATCH 32/37] kvm: x86: Catch and report failing IRQ and NMI injections

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com We do not need to abort, but the user should be notified that weird things go on. Signed-off-by: Jan Kiszka jan.kis...@siemens.com Signed-off-by: Marcelo Tosatti mtosa...@redhat.com --- target-i386/kvm.c | 16 +--- 1 files changed, 13

[PATCH 28/37] Move debug exception handling out of cpu_exec

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com To prepare splitting up KVM and TCG CPU entry/exit, move the debug exception into cpus.c and invoke cpu_handle_debug_exception on return from qemu_cpu_exec. This also allows to clean up the debug request signaling: We can assign the job of informing

[PATCH 36/37] kvm: Make kvm_state globally available

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com KVM-assisted devices need access to it but we have no clean channel to distribute a reference. As a workaround until there is a better solution, export kvm_state for global use, though use should remain restricted to the mentioned scenario. Signed-off-by:

[PATCH 19/37] kvm: Unconditionally reenter kernel after IO exits

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com KVM requires to reenter the kernel after IO exits in order to complete instruction emulation. Failing to do so will leave the kernel state inconsistently behind. To ensure that we will get back ASAP, we issue a self-signal that will cause KVM_RUN to return

[PATCH 07/37] kvm: Report proper error on GET_VCPU_MMAP_SIZE failures

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com Signed-off-by: Jan Kiszka jan.kis...@siemens.com Signed-off-by: Marcelo Tosatti mtosa...@redhat.com --- kvm-all.c |1 + 1 files changed, 1 insertions(+), 0 deletions(-) diff --git a/kvm-all.c b/kvm-all.c index 2ec9e09..55f6ac3 100644 --- a/kvm-all.c

[PATCH 26/37] Improve vm_stop reason declarations

2011-02-14 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com Define and use dedicated constants for vm_stop reasons, they actually have nothing to do with the EXCP_* defines used so far. At this chance, specify more detailed reasons so that VM state change handlers can evaluate them. Signed-off-by: Jan Kiszka

Re: [PATCH] qemu-kvm: Prepare IOAPIC for upstream merge

2011-02-14 Thread Marcelo Tosatti
On Mon, Feb 07, 2011 at 12:59:34PM +0100, Jan Kiszka wrote: Drop base_address from the vmstate, upstream decided against managing it at device level. Instead, fetch it from the sysbus device state when setting the in-kernel state. Moreover, merge ioapic_pre_load into ioapic_post_load as

[Bug 27052] Module KVM : unable to handle kernel NULL pointer dereference at

2011-02-14 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=27052 --- Comment #36 from prochazka prochazka.nico...@gmail.com 2011-02-14 15:50:02 --- I agree with you but i must resend this problem to kernel module bridge or netfilter, I must isolate the issue . Regards, Nicolas Prochazka. -- Configure

Re: Possible netfilter-related memory corruption in 2.6.37

2011-02-14 Thread Eric Dumazet
Le lundi 14 février 2011 à 16:18 +0100, Jan Engelhardt a écrit : On Monday 2011-02-14 16:11, Eric Dumazet wrote: Le lundi 14 février 2011 à 16:58 +0200, Avi Kivity a écrit : We see severe memory corruption in kvm while used in conjunction with bridge/netfilter. Enabling slab debugging

[Bug 27052] Module KVM : unable to handle kernel NULL pointer dereference at

2011-02-14 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=27052 --- Comment #37 from prochazka prochazka.nico...@gmail.com 2011-02-14 15:51:14 --- Sorry I do not read your post to netfilter devel list. Nicolas -- Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email --- You are

Re: [PATCH] qemu-kvm: Prepare IOAPIC for upstream merge

2011-02-14 Thread Jan Kiszka
On 2011-02-14 16:43, Marcelo Tosatti wrote: On Mon, Feb 07, 2011 at 12:59:34PM +0100, Jan Kiszka wrote: Drop base_address from the vmstate, upstream decided against managing it at device level. Instead, fetch it from the sysbus device state when setting the in-kernel state. Moreover, merge

[Bug 27052] Module KVM : unable to handle kernel NULL pointer dereference at

2011-02-14 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=27052 --- Comment #38 from Avi Kivity a...@redhat.com 2011-02-14 16:02:06 --- Please revert ca44ac386181ba7 and try again (with netfilter enabled). -- Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email --- You are

Re: Possible netfilter-related memory corruption in 2.6.37

2011-02-14 Thread Patrick McHardy
Am 14.02.2011 16:50, schrieb Eric Dumazet: Le lundi 14 février 2011 à 16:18 +0100, Jan Engelhardt a écrit : On Monday 2011-02-14 16:11, Eric Dumazet wrote: Le lundi 14 février 2011 à 16:58 +0200, Avi Kivity a écrit : We see severe memory corruption in kvm while used in conjunction with

Re: Possible netfilter-related memory corruption in 2.6.37

2011-02-14 Thread Eric Dumazet
Le lundi 14 février 2011 à 17:24 +0100, Patrick McHardy a écrit : Am 14.02.2011 16:50, schrieb Eric Dumazet: Le lundi 14 février 2011 à 16:18 +0100, Jan Engelhardt a écrit : On Monday 2011-02-14 16:11, Eric Dumazet wrote: Le lundi 14 février 2011 à 16:58 +0200, Avi Kivity a écrit : We

Re: Possible netfilter-related memory corruption in 2.6.37

2011-02-14 Thread Patrick McHardy
Am 14.02.2011 17:29, schrieb Eric Dumazet: Le lundi 14 février 2011 à 17:24 +0100, Patrick McHardy a écrit : Also, I wonder if RCU rules are respected in nf_iterate(). For example this line is really suspicious : *i = (*i)-prev; Yeah, that definitely looks wrong. How about this instead?

Re: Possible netfilter-related memory corruption in 2.6.37

2011-02-14 Thread Eric Dumazet
Le lundi 14 février 2011 à 17:37 +0100, Patrick McHardy a écrit : Am 14.02.2011 17:29, schrieb Eric Dumazet: Le lundi 14 février 2011 à 17:24 +0100, Patrick McHardy a écrit : Also, I wonder if RCU rules are respected in nf_iterate(). For example this line is really suspicious : *i =

Re: Possible netfilter-related memory corruption in 2.6.37

2011-02-14 Thread Patrick McHardy
Am 14.02.2011 17:48, schrieb Eric Dumazet: Le lundi 14 février 2011 à 17:37 +0100, Patrick McHardy a écrit : Am 14.02.2011 17:29, schrieb Eric Dumazet: Le lundi 14 février 2011 à 17:24 +0100, Patrick McHardy a écrit : Also, I wonder if RCU rules are respected in nf_iterate(). For example this

Re: RFC: New API for PPC for vcpu mmu access

2011-02-14 Thread Scott Wood
On Sun, 13 Feb 2011 23:43:40 +0100 Alexander Graf ag...@suse.de wrote: struct kvmppc_book3e_tlb_entry { union { __u64 mas8_1; struct { __u32 mas8; __u32 mas1; }; }; __u64 mas2; union {

Re: [Qemu-devel] KVM call minutes for Feb 8

2011-02-14 Thread Blue Swirl
On Mon, Feb 14, 2011 at 12:42 AM, Anthony Liguori anth...@codemonkey.ws wrote: On 02/13/2011 03:00 PM, Blue Swirl wrote: On Sun, Feb 13, 2011 at 9:57 PM, Anthony Liguorianth...@codemonkey.ws  wrote: On 02/13/2011 01:37 PM, Blue Swirl wrote: On Sun, Feb 13, 2011 at 5:31 PM, Anthony

Re: PCI Passthrough, error: The driver 'pci-stub' is occupying your device 0000:08:06.2

2011-02-14 Thread Alex Williamson
On Sat, 2011-02-12 at 16:04 +, James Neave wrote: On Tue, Feb 8, 2011 at 10:17 AM, James Neave robo...@gmail.com wrote: On Tue, Feb 8, 2011 at 9:59 AM, Kenni Lund ke...@kelu.dk wrote: 2011/2/7 Daniel P. Berrange berra...@redhat.com: On Sat, Feb 05, 2011 at 04:34:01PM +, James Neave

KVM call agenda for Feb 15

2011-02-14 Thread Chris Wright
Please send in any agenda items you are interested in covering. thanks, -chris -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

nbd block device backend - 'improvements'

2011-02-14 Thread Nicholas Thomas
Hi, I've been doing some work with /block/nbd.c with the aim of improving its behaviour when the NBD server is inaccessible or goes away. Current behaviour is to exit on startup if connecting to the NBD server fails for any reason. If the connection dies once KVM is started, the VM stays up but

[RESEND][PATCH] qemu-kvm: Drop vga dirty logging workarounds

2011-02-14 Thread Jan Kiszka
These diffs to upstream should all date back to the days qemu-kvm supported vga dirty logging with restricted/broken kvm kernel modules. We no longer do, so there is no need for those workarounds. Even worse they can trigger internal bug checks these days: BUG: kvm_dirty_pages_log_change: invalid

Slow disk IO on virtio kvm guests with Centos 5.5 as hypervisor

2011-02-14 Thread Thomas Broda
Hi, I've set up a KVM hypervisor for testing purposes. It's running on an AMD Quad-Core Phenom with a local RAID5 which is made of three disks connected to a hardware RAID controller. On top of this, there an LVM volume. dd'ing /dev/zero to a testfile gives me a throughput of about 400MB/s

Re: [Qemu-devel] [PATCH 00/37] [PULL] qemu-kvm.git uq/master queue

2011-02-14 Thread Anthony Liguori
On 02/14/2011 09:22 AM, Marcelo Tosatti wrote: The following changes since commit 8668f61d20eac971d116ebbe8436b4ae963884a8: vmmouse: fix queue_size field initialization (2011-02-12 17:44:11 +) are available in the git repository at: git://git.kernel.org/pub/scm/virt/kvm/qemu-kvm.git

Re: RFC: New API for PPC for vcpu mmu access

2011-02-14 Thread Alexander Graf
On 14.02.2011, at 18:11, Scott Wood scottw...@freescale.com wrote: On Sun, 13 Feb 2011 23:43:40 +0100 Alexander Graf ag...@suse.de wrote: struct kvmppc_book3e_tlb_entry { union { __u64 mas8_1; struct { __u32 mas8; __u32 mas1; }; };

Re: [Qemu-devel] KVM call minutes for Feb 8

2011-02-14 Thread Anthony Liguori
On 02/14/2011 11:31 AM, Blue Swirl wrote: I don't understand. The caller just does if (isa_serial_init()) { error(); } or if (serial_init()) { error(); } If you mean inside isa_serial_init() vs. serial_init(), that may be true since isa_serial_init has to check for qdev failures, but the

Re: RFC: New API for PPC for vcpu mmu access

2011-02-14 Thread Scott Wood
On Mon, 14 Feb 2011 21:19:19 +0100 Alexander Graf ag...@suse.de wrote: There's no nack here :). The only thing that needs to change is the anonymous part, as that's a gnu extension. Just name the structs and unions and all is well. Ah, I thought it was an aesthetic objection -- didn't

Re: [Qemu-devel] KVM call minutes for Feb 8

2011-02-14 Thread Blue Swirl
On Mon, Feb 14, 2011 at 10:53 PM, Anthony Liguori anth...@codemonkey.ws wrote: On 02/14/2011 11:31 AM, Blue Swirl wrote: I don't understand. The caller just does if (isa_serial_init()) {   error(); } or if (serial_init()) {   error(); } If you mean inside isa_serial_init() vs.

Re: [Qemu-devel] KVM call minutes for Feb 8

2011-02-14 Thread Anthony Liguori
On 02/14/2011 03:25 PM, Blue Swirl wrote: I'd still like to have the inline wrapper over the factory interface, probably with similar signature to isa_serial_new. Then there would be two functions, one going through qdev and the other bypassing it. I don't see how that would be useful. The

Re: [Qemu-devel] KVM call agenda for Feb 15

2011-02-14 Thread Anthony Liguori
On 02/14/2011 11:56 AM, Chris Wright wrote: Please send in any agenda items you are interested in covering. -rc2 is tagged and waiting for announcement. Please take a look at -rc2 and make sure there is nothing critical missing. Will tag 0.14.0 very late tomorrow but unless there's

Re: [RFC PATCH V2 0/5] macvtap TX zero copy between guest and host kernel

2011-02-14 Thread Shirley Ma
On Mon, 2011-02-14 at 15:09 +0200, Michael S. Tsirkin wrote: What's the status here? Since there are core net changes, we'll need to see the final version soon if it's to appear in 2.6.39. I am updating the patch and retesting it for the new kernel. I am trying to understand why zero copy

Re: RFC: New API for PPC for vcpu mmu access

2011-02-14 Thread Alexander Graf
On 14.02.2011, at 22:16, Scott Wood wrote: On Mon, 14 Feb 2011 21:19:19 +0100 Alexander Graf ag...@suse.de wrote: There's no nack here :). The only thing that needs to change is the anonymous part, as that's a gnu extension. Just name the structs and unions and all is well. Ah, I

Re: RFC: New API for PPC for vcpu mmu access

2011-02-14 Thread Scott Wood
On Tue, 15 Feb 2011 00:39:51 +0100 Alexander Graf ag...@suse.de wrote: On 14.02.2011, at 22:16, Scott Wood wrote: On Mon, 14 Feb 2011 21:19:19 +0100 Alexander Graf ag...@suse.de wrote: The struct name should also have a version indicator - it's the data descriptor only a single

Re: RFC: New API for PPC for vcpu mmu access

2011-02-14 Thread Alexander Graf
On 15.02.2011, at 00:49, Scott Wood wrote: On Tue, 15 Feb 2011 00:39:51 +0100 Alexander Graf ag...@suse.de wrote: On 14.02.2011, at 22:16, Scott Wood wrote: On Mon, 14 Feb 2011 21:19:19 +0100 Alexander Graf ag...@suse.de wrote: The struct name should also have a version indicator -

Re: RFC: New API for PPC for vcpu mmu access

2011-02-14 Thread Scott Wood
On Sun, 13 Feb 2011 23:43:40 +0100 Alexander Graf ag...@suse.de wrote: struct kvmppc_book3e_tlb_entry { union { __u64 mas8_1; struct { __u32 mas8; __u32 mas1; }; }; __u64 mas2; union {

Re: RFC: New API for PPC for vcpu mmu access

2011-02-14 Thread Alexander Graf
On 14.02.2011, at 18:11, Scott Wood scottw...@freescale.com wrote: On Sun, 13 Feb 2011 23:43:40 +0100 Alexander Graf ag...@suse.de wrote: struct kvmppc_book3e_tlb_entry { union { __u64 mas8_1; struct { __u32 mas8; __u32 mas1; }; };

Re: RFC: New API for PPC for vcpu mmu access

2011-02-14 Thread Alexander Graf
On 14.02.2011, at 22:16, Scott Wood wrote: On Mon, 14 Feb 2011 21:19:19 +0100 Alexander Graf ag...@suse.de wrote: There's no nack here :). The only thing that needs to change is the anonymous part, as that's a gnu extension. Just name the structs and unions and all is well. Ah, I

Re: RFC: New API for PPC for vcpu mmu access

2011-02-14 Thread Alexander Graf
On 15.02.2011, at 00:49, Scott Wood wrote: On Tue, 15 Feb 2011 00:39:51 +0100 Alexander Graf ag...@suse.de wrote: On 14.02.2011, at 22:16, Scott Wood wrote: On Mon, 14 Feb 2011 21:19:19 +0100 Alexander Graf ag...@suse.de wrote: The struct name should also have a version indicator -