[PATCH 16/35] kvm: Improve reporting of fatal errors

2011-01-06 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com Report KVM_EXIT_UNKNOWN, KVM_EXIT_FAIL_ENTRY, and KVM_EXIT_EXCEPTION with more details to stderr. The latter two are so far x86-only, so move them into the arch-specific handler. Integrate the Intel real mode warning on KVM_EXIT_FAIL_ENTRY that qemu-kvm

[PATCH 20/35] kvm: x86: Remove redundant mp_state initialization

2011-01-06 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com kvm_arch_reset_vcpu initializes mp_state, and that function is invoked right after kvm_arch_init_vcpu. Signed-off-by: Jan Kiszka jan.kis...@siemens.com Signed-off-by: Marcelo Tosatti mtosa...@redhat.com --- target-i386/kvm.c |2 -- 1 files changed, 0

[PATCH 27/35] kvm: x86: Fix !CONFIG_KVM_PARA build

2011-01-06 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com If we lack kvm_para.h, MSR_KVM_ASYNC_PF_EN is not defined. The change in kvm_arch_init_vcpu is just for consistency reasons. Signed-off-by: Jan Kiszka jan.kis...@siemens.com Signed-off-by: Marcelo Tosatti mtosa...@redhat.com --- target-i386/kvm.c |8

[PATCH 05/35] Add function for checking mca broadcast of CPU

2011-01-06 Thread Marcelo Tosatti
From: Jin Dongming jin.dongm...@np.css.fujitsu.com Add function for checking whether current CPU support mca broadcast. Signed-off-by: Jin Dongming jin.dongm...@np.css.fujitsu.com Signed-off-by: Marcelo Tosatti mtosa...@redhat.com --- target-i386/cpu.h|1 + target-i386/helper.c | 33

[PATCH 04/35] Add broadcast option for mce command

2011-01-06 Thread Marcelo Tosatti
From: Jin Dongming jin.dongm...@np.css.fujitsu.com When the following test case is injected with mce command, maybe user could not get the expected result. DATA command cpu bank status mcg_status addr misc (qemu) mce 1 10xbd00 0x05

[PATCH 34/35] kvm: x86: Implicitly clear nmi_injected/pending on reset

2011-01-06 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com All CPUX86State variables before CPU_COMMON are automatically cleared on reset. Reorder nmi_injected and nmi_pending to avoid having to touch them explicitly. Signed-off-by: Jan Kiszka jan.kis...@siemens.com Signed-off-by: Marcelo Tosatti

[PATCH 09/35] kvm: x86: Fix DPL write back of segment registers

2011-01-06 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com The DPL is stored in the flags and not in the selector. In fact, the RPL may differ from the DPL at some point in time, and so we were corrupting the guest state so far. Signed-off-by: Jan Kiszka jan.kis...@siemens.com Signed-off-by: Avi Kivity

[PATCH 30/35] kvm: Consolidate must-have capability checks

2011-01-06 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com Instead of splattering the code with #ifdefs and runtime checks for capabilities we cannot work without anyway, provide central test infrastructure for verifying their availability both at build and runtime. Signed-off-by: Jan Kiszka jan.kis...@siemens.com

[PATCH 06/35] kvm: introduce kvm_mce_in_progress

2011-01-06 Thread Marcelo Tosatti
From: Jin Dongming jin.dongm...@np.css.fujitsu.com Share same error handing, and rename this function after MCIP (Machine Check In Progress) flag. Signed-off-by: Hidetoshi Seto seto.hideto...@jp.fujitsu.com Signed-off-by: Jin Dongming jin.dongm...@np.css.fujitsu.com Signed-off-by: Marcelo

[PATCH 07/35] kvm: kvm_mce_inj_* subroutines for templated error injections

2011-01-06 Thread Marcelo Tosatti
From: Jin Dongming jin.dongm...@np.css.fujitsu.com Refactor codes for maintainability. Signed-off-by: Hidetoshi Seto seto.hideto...@jp.fujitsu.com Signed-off-by: Jin Dongming jin.dongm...@np.css.fujitsu.com Signed-off-by: Marcelo Tosatti mtosa...@redhat.com --- target-i386/kvm.c | 111

[PATCH 24/35] Synchronize VCPU states before reset

2011-01-06 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com This is required to support keeping VCPU states across a system reset. If we do not read the current state before the reset, cpu_synchronize_all_post_reset may write back incorrect state information. The first user of this will be MCE MSR synchronization

[PATCH 25/35] kvm: x86: Drop MCE MSRs write back restrictions

2011-01-06 Thread Marcelo Tosatti
From: Jan Kiszka jan.kis...@siemens.com There is no need to restrict writing back MCE MSRs to reset or full state updates as setting their values has no side effects. Signed-off-by: Jan Kiszka jan.kis...@siemens.com CC: Huang Ying ying.hu...@intel.com Signed-off-by: Marcelo Tosatti

Re: FIXED: Re: [Qemu-devel] possible regression in qemu-kvm 0.13.0 (memtest)

2011-01-06 Thread Blue Swirl
On Thu, Jan 6, 2011 at 4:41 PM, Serge E. Hallyn se...@hallyn.com wrote: Thanks, Stefan.  That patch actually doesn't compile for me, because it leaves references in hw/pckbd.c to both ioport92_write and ioport92_read, which it deletes from there.  Should ioport92_read just be renamed to

Re: [PATCH 26/35] kvm: Eliminate KVMState arguments

2011-01-06 Thread Anthony Liguori
On 01/06/2011 11:56 AM, Marcelo Tosatti wrote: From: Jan Kiszkajan.kis...@siemens.com QEMU supports only one VM, so there is only one kvm_state per process, and we gain nothing passing a reference to it around. Eliminate any need to refer to it outside of kvm-all.c. Signed-off-by: Jan

[KVM-AUTOTEST PATCH] scripts/unattended.py: don't ignore exceptions on floppy setup

2011-01-06 Thread Eduardo Habkost
Oops. I guess it was not intended to ignore the exception, but just do cleanup in case of errors. Signed-off-by: Eduardo Habkost ehabk...@redhat.com --- client/tests/kvm/scripts/unattended.py |1 + 1 files changed, 1 insertions(+), 0 deletions(-) diff --git

Re: [KVM TSC trapping / migration 1/2] Add TSC trapping for SVM and VMX

2011-01-06 Thread Zachary Amsden
On 01/06/2011 01:32 AM, Avi Kivity wrote: On 01/06/2011 12:10 PM, Zachary Amsden wrote: Reasons to trap the TSC are numerous, but we want to avoid it as much as possible for performance reasons. We provide two conservative modes via modules parameters and userspace hinting. First, the module

[PATCH] unattended.py: Make sure qemu-img built from git is used

2011-01-06 Thread Lucas Meneghel Rodrigues
Rather than what it was found on the user's PATH. Signed-off-by: Lucas Meneghel Rodrigues l...@redhat.com --- client/tests/kvm/scripts/unattended.py |7 --- 1 files changed, 4 insertions(+), 3 deletions(-) diff --git a/client/tests/kvm/scripts/unattended.py

Re: [KVM TSC trapping / migration 1/2] Add TSC trapping for SVM and VMX

2011-01-06 Thread Zachary Amsden
On 01/06/2011 01:38 AM, Alexander Graf wrote: On 06.01.2011, at 12:30, Zachary Amsden wrote: On 01/06/2011 12:41 AM, Alexander Graf wrote: Am 06.01.2011 um 11:10 schrieb Zachary Amsdenzams...@redhat.com: Reasons to trap the TSC are numerous, but we want to avoid it as

Re: [KVM TSC trapping / migration 2/2] Add TSC KHZ MSR

2011-01-06 Thread Zachary Amsden
On 01/06/2011 01:40 AM, Alexander Graf wrote: On 06.01.2011, at 12:27, Zachary Amsden wrote: On 01/06/2011 12:34 AM, Alexander Graf wrote: Am 06.01.2011 um 11:10 schrieb Zachary Amsdenzams...@redhat.com: Use an MSR to allow soft migration to hosts which do not support TSC

Re: Flow Control and Port Mirroring Revisited

2011-01-06 Thread Jesse Gross
On Thu, Jan 6, 2011 at 7:44 AM, Simon Horman ho...@verge.net.au wrote: On Thu, Jan 06, 2011 at 11:22:42AM +0100, Eric Dumazet wrote: Le jeudi 06 janvier 2011 à 18:33 +0900, Simon Horman a écrit : Hi, Back in October I reported that I noticed a problem whereby flow control breaks down

Re: [KVM TSC trapping / migration 1/2] Add TSC trapping for SVM and VMX

2011-01-06 Thread Alexander Graf
On 06.01.2011, at 21:24, Zachary Amsden wrote: On 01/06/2011 01:38 AM, Alexander Graf wrote: On 06.01.2011, at 12:30, Zachary Amsden wrote: On 01/06/2011 12:41 AM, Alexander Graf wrote: Am 06.01.2011 um 11:10 schrieb Zachary Amsdenzams...@redhat.com: Reasons to trap

Re: Flow Control and Port Mirroring Revisited

2011-01-06 Thread Simon Horman
On Thu, Jan 06, 2011 at 02:28:18PM +0100, Eric Dumazet wrote: Le jeudi 06 janvier 2011 à 21:44 +0900, Simon Horman a écrit : Hi Eric ! Thanks for the advice. I had thought about the socket buffer but at some point it slipped my mind. In any case the following patch seems to

Re: Flow Control and Port Mirroring Revisited

2011-01-06 Thread Simon Horman
On Thu, Jan 06, 2011 at 05:38:01PM -0500, Jesse Gross wrote: [ snip ] I know that everyone likes a nice netperf result but I agree with Michael that this probably isn't the right question to be asking. I don't think that socket buffers are a real solution to the flow control problem: they

subscription

2011-01-06 Thread lzy....@gmail.com
subscription -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [KVM TSC trapping / migration 1/2] Add TSC trapping for SVM and VMX

2011-01-06 Thread Zachary Amsden
On 01/06/2011 12:38 PM, Alexander Graf wrote: snip Sure, I'm not saying your patch is bad or goes in the wrong direction. I'd just think it'd be awesome to have an easy way for the guest OS to know that something as crucial as TSC reading speed got changed, hopefully even TSC frequency.

Re: [RFC -v3 PATCH 2/3] sched: add yield_to function

2011-01-06 Thread Mike Galbraith
On Wed, 2011-01-05 at 18:04 +0100, Peter Zijlstra wrote: On Wed, 2011-01-05 at 17:57 +0100, Mike Galbraith wrote: + p_cfs_rq = cfs_rq_of(pse); + local = 1; + } +#endif + + /* Tell the scheduler that we'd really like pse to run next. */ +

Re: cgroup limits only affect kvm guest under certain conditions

2011-01-06 Thread KAMEZAWA Hiroyuki
On Thu, 06 Jan 2011 14:15:37 +0100 Dominik Klein d...@in-telegence.net wrote: Hi I am playing with cgroups and try to limit block io for guests. The proof of concept is: # mkdir /dev/cgroup/blkio # mount -t cgroup -o blkio blkio /dev/cgroup/blkio/ # cd blkio/ # mkdir test # cd test/

[PATCH] device-assignment: Add fields to VMStateDescription

2011-01-06 Thread Alex Williamson
If the migration destination specifies an assigned device, qemu will segfault because there is always expected to be an end marker for fields. Add to our dummy VMStateDescription to avoid this. Signed-off-by: Alex Williamson alex.william...@redhat.com --- hw/device-assignment.c |5 - 1

Re: cgroup limits only affect kvm guest under certain conditions

2011-01-06 Thread Dominik Klein
qemu consists of several threads. Cgroup works per thread now. Could you double check all threads for qemu are in a cgroup ? I think you have to write all thread-ID to tasks file when you move qemu after starting it. As stated yesterday: Yes, that was the problem. Works as expected now,

[PATCH v2 1/3] KVM: fix rcu usage warning in kvm_arch_vcpu_ioctl_set_sregs()

2011-01-06 Thread Xiao Guangrong
Fix: [ 1001.499596] === [ 1001.499599] [ INFO: suspicious rcu_dereference_check() usage. ] [ 1001.499601] --- [ 1001.499604] include/linux/kvm_host.h:301 invoked rcu_dereference_check() without

[PATCH v2 2/3] KVM: send IPI to vcpu only when it's in guest mode

2011-01-06 Thread Xiao Guangrong
We can interrupt the vcpu only when it's running in guest mode to reduce IPI It looks like only ia64 and x86 need to send IPI to other vcpus, so i only add the implementation of 'vcpu-guest_mode' in ia64, but i don't know ia64 well, please point out the right way for me if the implementation is

[PATCH v2 3/3] KVM: make make_all_cpus_request() lockless

2011-01-06 Thread Xiao Guangrong
Now, we have 'vcpu-guest_mode' to judge whether need to send ipi to other cpus, this way is very exact, so checking request bit is needless, then we can drop the spinlock let it's collateral Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com --- include/linux/kvm_host.h |6 --

Re: [PATCH] KVM: PPC: Fix SPRG get/set for Book3S and BookE

2011-01-06 Thread Marcelo Tosatti
On Wed, Dec 29, 2010 at 01:51:25PM -0600, Peter Tyser wrote: Previously SPRGs 4-7 were improperly read and written in kvm_arch_vcpu_ioctl_get_regs() and kvm_arch_vcpu_ioctl_set_regs(); Signed-off-by: Peter Tyser pty...@xes-inc.com --- I noticed this while grepping for somthing unrelated and

error: building kvm for powerpc using cross compiler on x86

2011-01-06 Thread Dushyant Bansal
I want to build kvm kernel module for powerpc using cross compiler. I downloaded kernel source code from http://www.linux-kvm.org/page/PowerPC_440_Host_Kernel. Inside that kvm_source folder when I do make ARCH=powerpc menuconfig, inside virtualization menu, option kvm is not present. I have

Re: error: building kvm for powerpc using cross compiler on x86

2011-01-06 Thread Hollis Blanchard
On Thu, Jan 6, 2011 at 10:39 AM, Dushyant Bansal cs5070...@cse.iitd.ac.in wrote: I want to build kvm kernel module for powerpc using cross compiler. I downloaded kernel source code from http://www.linux-kvm.org/page/PowerPC_440_Host_Kernel. Inside that kvm_source folder when I do make

Re: error: building kvm for powerpc using cross compiler on x86

2011-01-06 Thread Dushyant
Hi, Thanks for the response. My aim is to install kvm on a powerpc system. I will give a detailed description of the environment. Host arch: x86 kernel: 2.6.32.25 (ubuntu 10.04 32 bit) I have emulated powerpc using qemu-system-ppc and installed debian on top of this. guest os:

<    1   2