[COMMIT master] KVM: VMX: Use macros instead of hex value on cr0 initialization

2009-10-26 Thread Avi Kivity
From: Eduardo Habkost ehabk...@redhat.com This should have no effect, it is just to make the code clearer. Signed-off-by: Eduardo Habkost ehabk...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index 364263a..1773017 100644 ---

[COMMIT master] Merge commit 'tip/x86/entry'

2009-10-26 Thread Avi Kivity
From: Avi Kivity a...@redhat.com Merge the user-return-notifier infrastructure. Signed-off-by: Avi Kivity a...@redhat.com -- To unsubscribe from this list: send the line unsubscribe kvm-commits in the body of a message to majord...@vger.kernel.org More majordomo info at

[COMMIT master] KVM: SVM: init_vmcb(): remove redundant save-cr0 initialization

2009-10-26 Thread Avi Kivity
From: Eduardo Habkost ehabk...@redhat.com The svm_set_cr0() call will initialize save-cr0 properly even when npt is enabled, clearing the NW and CD bits as expected, so we don't need to initialize it manually for npt_enabled anymore. Signed-off-by: Eduardo Habkost ehabk...@redhat.com

[COMMIT master] Fix user return notifier build

2009-10-26 Thread Avi Kivity
From: Avi Kivity a...@redhat.com When CONFIG_USER_RETURN_NOTIFIER is set, we need to link kernel/user-return-notifier.o. Signed-off-by: Avi Kivity a...@redhat.com diff --git a/kernel/Makefile b/kernel/Makefile index b8d4cd8..0ae57a8 100644 --- a/kernel/Makefile +++ b/kernel/Makefile @@ -95,6

[COMMIT master] KVM: SVM: Reset cr0 properly on vcpu reset

2009-10-26 Thread Avi Kivity
From: Eduardo Habkost ehabk...@redhat.com svm_vcpu_reset() was not properly resetting the contents of the guest-visible cr0 register, causing the following issue: https://bugzilla.redhat.com/show_bug.cgi?id=525699 Without resetting cr0 properly, the vcpu was running the SIPI bootstrap routine

[COMMIT master] KVM: VMX: Move MSR_KERNEL_GS_BASE out of the vmx autoload msr area

2009-10-26 Thread Avi Kivity
From: Avi Kivity a...@redhat.com Currently MSR_KERNEL_GS_BASE is saved and restored as part of the guest/host msr reloading. Since we wish to lazy-restore all the other msrs, save and reload MSR_KERNEL_GS_BASE explicitly instead of using the common code. Signed-off-by: Avi Kivity

[COMMIT master] KVM: Fix Xen hvm msr ioctl by adding a flags field

2009-10-26 Thread Avi Kivity
From: Avi Kivity a...@redhat.com So we can extend it later. Signed-off-by: Avi Kivity a...@redhat.com diff --git a/Documentation/kvm/api.txt b/Documentation/kvm/api.txt index f504e0b..36594ba 100644 --- a/Documentation/kvm/api.txt +++ b/Documentation/kvm/api.txt @@ -608,8 +608,8 @@ page of a

[COMMIT master] KVM: powerpc: Fix BUILD_BUG_ON condition

2009-10-26 Thread Avi Kivity
From: Hollis Blanchard holl...@us.ibm.com The old BUILD_BUG_ON implementation didn't work with __builtin_constant_p(). Fixing that revealed this test had been inverted for a long time without anybody noticing... Signed-off-by: Hollis Blanchard holl...@us.ibm.com Signed-off-by: Avi Kivity

[COMMIT master] KVM: x86 shared msr infrastructure

2009-10-26 Thread Avi Kivity
From: Avi Kivity a...@redhat.com The various syscall-related MSRs are fairly expensive to switch. Currently we switch them on every vcpu preemption, which is far too often: - if we're switching to a kernel thread (idle task, threaded interrupt, kernel-mode virtio server (vhost-net), for

[COMMIT master] KVM: remove duplicated task_switch check

2009-10-26 Thread Avi Kivity
From: Gleb Natapov g...@redhat.com Probably introduced by a bad merge. Signed-off-by: Gleb Natapov g...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index be968f1..2ef3906 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@

[COMMIT master] Merge commit 'tip/x86/entry'

2009-10-26 Thread Avi Kivity
From: Avi Kivity a...@redhat.com -- To unsubscribe from this list: send the line unsubscribe kvm-commits in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

[COMMIT master] KVM: get_tss_base_addr() should return a gpa_t

2009-10-26 Thread Avi Kivity
From: Gleb Natapov g...@redhat.com If TSS we are switching to resides in high memory task switch will fail since address will be truncated. Windows2k3 does this sometimes when running with more then 4G Cc: sta...@kernel.org Signed-off-by: Gleb Natapov g...@redhat.com Signed-off-by: Avi Kivity

Re: [ANNOUNCE] Sheepdog: Distributed Storage System for KVM

2009-10-26 Thread MORITA Kazutaka
On 2009/10/25 17:51, Dietmar Maurer wrote: Do you support multiple guests accessing the same image? A VM image can be attached to any VMs but one VM at a time; multiple running VMs cannot access to the same VM image. I guess this is a problem when you want to do live migrations? Yes,

Re: [PATCH 4/4] KVM: x86: Add VCPU substate for NMI states

2009-10-26 Thread Jan Kiszka
Avi Kivity wrote: On 10/15/2009 01:27 PM, Jan Kiszka wrote: Perhaps it makes sense to query about individual states, including existing ones? That will allow us to deprecate and then phase out broken states. It's probably not worth it. You may do this already with the given design:

Re: I/O performance of VirtIO

2009-10-26 Thread Jan Kiszka
Avi Kivity wrote: On 10/23/2009 12:06 AM, Alexander Graf wrote: Am 22.10.2009 um 18:29 schrieb Avi Kivity a...@redhat.com: On 10/13/2009 08:35 AM, Jan Kiszka wrote: It can be particularly slow if you use in-kernel irqchips and the default NIC emulation (up to 10 times slower), some effect I

Re: List of unaccessible x86 states

2009-10-26 Thread Avi Kivity
On 10/25/2009 06:45 PM, Alexander Graf wrote: It's not. We can't use the guest memory for hsave because then the guest could break the l1 state, so a malicious hypervisor could break us. Guest hsave should be used for storing guest state when switching into the nested guest, not host state.

Re: I/O performance of VirtIO

2009-10-26 Thread Avi Kivity
On 10/26/2009 10:12 AM, Jan Kiszka wrote: No. Dedicated I/O threads provide parallelism. All latency needs is to have SIGIO sent on all file descriptors (or rather, in qemu-kvm with irqchip, to have all file descriptors in the poll() call). Jan, does slirp add new connections to the select

Re: [PATCH] virtio-net: fix data corruption with OOM

2009-10-26 Thread Michael S. Tsirkin
On Mon, Oct 26, 2009 at 12:11:51PM +1030, Rusty Russell wrote: On Mon, 26 Oct 2009 03:33:40 am Michael S. Tsirkin wrote: virtio net used to unlink skbs from send queues on error, but ever since 48925e372f04f5e35fec6269127c62b2c71ab794 we do not do this. This causes guest data corruption and

Re: 64 bit guest much faster ?

2009-10-26 Thread Gerd Hoffmann
On 10/23/09 17:54, Stefan wrote: Hello, I have a simple question (sorry I'm a kvm beginner): Is it right that a 64bit guest (8 CPUs, 16GB) is much faster than a 32bit guest (8 CPUs, 16GB PAE). Yes. With *that* much memory the 32bit guest

Jan Kiszka to maintain kvm-kmod

2009-10-26 Thread Avi Kivity
I am pleased to announce that Jan Kiszka has agreed to maintain kvm-kmod.git, the backporting kit that allows running modern kvm code on older kernels. Jan will release kvm-kmod-2.6.x.y packages and kvm-kmod-2.6.x-rcy packages, while Marcelo and I will (with Jan's help) release

Re: [PATCH] virtio-net: fix data corruption with OOM

2009-10-26 Thread Michael S. Tsirkin
On Mon, Oct 26, 2009 at 12:11:51PM +1030, Rusty Russell wrote: On Mon, 26 Oct 2009 03:33:40 am Michael S. Tsirkin wrote: virtio net used to unlink skbs from send queues on error, but ever since 48925e372f04f5e35fec6269127c62b2c71ab794 we do not do this. This causes guest data corruption and

Re: List of unaccessible x86 states

2009-10-26 Thread Alexander Graf
Am 26.10.2009 um 09:33 schrieb Avi Kivity a...@redhat.com: On 10/25/2009 06:45 PM, Alexander Graf wrote: It's not. We can't use the guest memory for hsave because then the guest could break the l1 state, so a malicious hypervisor could break us. Guest hsave should be used for storing

Re: List of unaccessible x86 states

2009-10-26 Thread Joerg Roedel
On Sun, Oct 25, 2009 at 11:49:35AM +0200, Avi Kivity wrote: On 10/24/2009 12:35 PM, Alexander Graf wrote: Hm, thinking about this again, it might be useful to have an currently in nested VM flag here. That way userspace can decide if it needs to get out of the nested state (for migration) or

Re: List of unaccessible x86 states

2009-10-26 Thread Avi Kivity
On 10/26/2009 11:11 AM, Alexander Graf wrote: L1 hsave stores the architected state saved by vmrun, e.g. cs.sel, next_rip, cr0, cr3, etc. The host intercept bitmap is not state since it is calculated from the L1 intercept bitmap and host code. Indeed it can be different from host to host

Re: List of unaccessible x86 states

2009-10-26 Thread Avi Kivity
On 10/26/2009 11:17 AM, Joerg Roedel wrote: On Sun, Oct 25, 2009 at 11:49:35AM +0200, Avi Kivity wrote: On 10/24/2009 12:35 PM, Alexander Graf wrote: Hm, thinking about this again, it might be useful to have an currently in nested VM flag here. That way userspace can decide if it

Re: vhost-net patches

2009-10-26 Thread Michael S. Tsirkin
On Fri, Oct 23, 2009 at 09:23:40AM -0700, Shirley Ma wrote: I also hit guest skb_xmit panic. If these are the same panics I have seen myself, they are probably fixed with recent virtio patches I sent to Rusty. I put them on my vhost.git tree to make it easier for you to test. If you see any more

Re: List of unaccessible x86 states

2009-10-26 Thread Joerg Roedel
On Mon, Oct 26, 2009 at 11:21:12AM +0200, Avi Kivity wrote: On 10/26/2009 11:17 AM, Joerg Roedel wrote: On Sun, Oct 25, 2009 at 11:49:35AM +0200, Avi Kivity wrote: On 10/24/2009 12:35 PM, Alexander Graf wrote: Hm, thinking about this again, it might be useful to have an currently in nested VM

Re: List of unaccessible x86 states

2009-10-26 Thread Avi Kivity
On 10/26/2009 11:30 AM, Joerg Roedel wrote: Which host state? As far as I can tell, it can all be regenerated. The state which is loaded into the vcpu when a #vmexit is emulated. This includes segments, control registers and the host rip for example. All of this state does not

Re: List of unaccessible x86 states

2009-10-26 Thread Joerg Roedel
On Mon, Oct 26, 2009 at 11:39:46AM +0200, Avi Kivity wrote: On 10/26/2009 11:30 AM, Joerg Roedel wrote: Which host state? As far as I can tell, it can all be regenerated. The state which is loaded into the vcpu when a #vmexit is emulated. This includes segments, control registers and the

Re: List of unaccessible x86 states

2009-10-26 Thread Avi Kivity
On 10/26/2009 11:56 AM, Joerg Roedel wrote: On Mon, Oct 26, 2009 at 11:39:46AM +0200, Avi Kivity wrote: On 10/26/2009 11:30 AM, Joerg Roedel wrote: Which host state? As far as I can tell, it can all be regenerated. The state which is loaded into the vcpu when a

Re: 64 bit guest much faster ?

2009-10-26 Thread Avi Kivity
On 10/26/2009 10:58 AM, Gerd Hoffmann wrote: On 10/23/09 17:54, Stefan wrote: Hello, I have a simple question (sorry I'm a kvm beginner): Is it right that a 64bit guest (8 CPUs, 16GB) is much faster than a 32bit guest (8 CPUs, 16GB PAE). Yes.

kvm problems on new hardware

2009-10-26 Thread Danny ter Haar
Hello, I have a KVM virtualization problem. I've put together new hardware (supermicro) server with 2 E5530 cpu's and memory disk to start experimenting with virtualization. I intend to use the www.proxmox.com system/setup. I installed proxmox and started stress testing the hardware: parallel

Re: 64 bit guest much faster ?

2009-10-26 Thread Michael Tokarev
Avi Kivity wrote: On 10/26/2009 10:58 AM, Gerd Hoffmann wrote: On 10/23/09 17:54, Stefan wrote: Hello, I have a simple question (sorry I'm a kvm beginner): Is it right that a 64bit guest (8 CPUs, 16GB) is much faster than a 32bit guest (8 CPUs, 16GB PAE).

Re: 64 bit guest much faster ?

2009-10-26 Thread Avi Kivity
On 10/26/2009 12:42 PM, Michael Tokarev wrote: Oh yes, without ept/npt the slowdown should indeed be significant with this much memory. How it is with 4Gb guest/mem without PAE (I mean, with CONFIG_HIGHMEM_4G=y)? Or even 2Gb? In case of npt or without. It'll be slow. Just use x86_64

Re: List of unaccessible x86 states

2009-10-26 Thread Joerg Roedel
On Mon, Oct 26, 2009 at 12:09:25PM +0200, Avi Kivity wrote: On 10/26/2009 11:56 AM, Joerg Roedel wrote: On Mon, Oct 26, 2009 at 11:39:46AM +0200, Avi Kivity wrote: On 10/26/2009 11:30 AM, Joerg Roedel wrote: Which host state? As far as I can tell, it can all be regenerated. The state which

Re: List of unaccessible x86 states

2009-10-26 Thread Avi Kivity
On 10/26/2009 12:45 PM, Joerg Roedel wrote: Ok, parts of the state can be saved in guest memory. But thats currently not done. This will need some care to not introduce a security hole. But it shouldn't be too difficult. The state thats not reproducible in an sane way is the intercept bitmap

Re: List of unaccessible x86 states

2009-10-26 Thread Joerg Roedel
On Mon, Oct 26, 2009 at 12:56:31PM +0200, Avi Kivity wrote: On 10/26/2009 12:45 PM, Joerg Roedel wrote: * nested intercepts These are part of the guest vmcb. The host nested intercepts can be recalculated, no? * for nested nested paging: guest nested cr3 value Part of the guest

[PATCH] Make vapic.S into optional rom

2009-10-26 Thread Gleb Natapov
Signed-off-by: Gleb Natapov g...@redhat.com diff --git a/Makefile b/Makefile index ea568f5..acd9108 100644 --- a/Makefile +++ b/Makefile @@ -259,6 +259,7 @@ pxe-ne2k_pci.bin pxe-rtl8139.bin pxe-pcnet.bin pxe-e1000.bin \ bamboo.dtb petalogix-s3adsp1800.dtb \ multiboot.bin BLOBS += extboot.bin

Re: [PATCH] Make vapic.S into optional rom

2009-10-26 Thread Avi Kivity
On 10/26/2009 01:42 PM, Gleb Natapov wrote: Need to remove the original implementation. What was this tested on? -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to

Re: [PATCH] Make vapic.S into optional rom

2009-10-26 Thread Gleb Natapov
On Mon, Oct 26, 2009 at 02:31:21PM +0200, Avi Kivity wrote: On 10/26/2009 01:42 PM, Gleb Natapov wrote: Need to remove the original implementation. That's in submodule now. Different repository. May it's worth to leave it in for a while? What was this tested on? WindowsXP 32 bit

Re: [PATCH] Make vapic.S into optional rom

2009-10-26 Thread Avi Kivity
On 10/26/2009 02:33 PM, Gleb Natapov wrote: On Mon, Oct 26, 2009 at 02:31:21PM +0200, Avi Kivity wrote: On 10/26/2009 01:42 PM, Gleb Natapov wrote: Need to remove the original implementation. That's in submodule now. Different repository. May it's worth to leave it in for a while?

Re: [PATCH] Make vapic.S into optional rom

2009-10-26 Thread Gleb Natapov
On Mon, Oct 26, 2009 at 02:36:47PM +0200, Avi Kivity wrote: On 10/26/2009 02:33 PM, Gleb Natapov wrote: On Mon, Oct 26, 2009 at 02:31:21PM +0200, Avi Kivity wrote: On 10/26/2009 01:42 PM, Gleb Natapov wrote: Need to remove the original implementation. That's in submodule now. Different

[PATCH] remove vapic.S from pcbios

2009-10-26 Thread Gleb Natapov
Compiled as option rom now. Signed-off-by: Gleb Natapov g...@redhat.com diff --git a/Makefile b/Makefile index 434d64e..bcd3ee2 100644 --- a/Makefile +++ b/Makefile @@ -105,8 +105,8 @@ rombios32.bin: rombios32.out rombios.h objcopy -O binary $ $@ ./biossums -pad $@

Re: [PATCH] Make vapic.S into optional rom

2009-10-26 Thread Avi Kivity
On 10/26/2009 01:42 PM, Gleb Natapov wrote: Signed-off-by: Gleb Natapovg...@redhat.com Applied this and the pcbios patch as well. Thanks. -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a

buildbot failure in qemu-kvm on default_x86_64_out_of_tree

2009-10-26 Thread qemu-kvm
The Buildbot has detected a new failure of default_x86_64_out_of_tree on qemu-kvm. Full details are available at: http://buildbot.b1-systems.de/qemu-kvm/builders/default_x86_64_out_of_tree/builds/67 Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/ Buildslave for this Build: b1_qemu_kvm_1

buildbot failure in qemu-kvm on default_x86_64_debian_5_0

2009-10-26 Thread qemu-kvm
The Buildbot has detected a new failure of default_x86_64_debian_5_0 on qemu-kvm. Full details are available at: http://buildbot.b1-systems.de/qemu-kvm/builders/default_x86_64_debian_5_0/builds/126 Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/ Buildslave for this Build: b1_qemu_kvm_1

buildbot failure in qemu-kvm on default_i386_out_of_tree

2009-10-26 Thread qemu-kvm
The Buildbot has detected a new failure of default_i386_out_of_tree on qemu-kvm. Full details are available at: http://buildbot.b1-systems.de/qemu-kvm/builders/default_i386_out_of_tree/builds/65 Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/ Buildslave for this Build: b1_qemu_kvm_2

buildbot failure in qemu-kvm on default_i386_debian_5_0

2009-10-26 Thread qemu-kvm
The Buildbot has detected a new failure of default_i386_debian_5_0 on qemu-kvm. Full details are available at: http://buildbot.b1-systems.de/qemu-kvm/builders/default_i386_debian_5_0/builds/128 Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/ Buildslave for this Build: b1_qemu_kvm_2

Re: [Alacrityvm-devel] [KVM PATCH v2 1/2] KVM: export lockless GSI attribute

2009-10-26 Thread Gregory Haskins
Avi Kivity wrote: On 10/23/2009 04:38 AM, Gregory Haskins wrote: Certain GSI's support lockless injecton, but we have no way to detect which ones at the GSI level. Knowledge of this attribute will be useful later in the series so that we can optimize irqfd injection paths for cases where we

RE: [Qemu-devel] net packet storms with multiple NICs

2009-10-26 Thread Krumme, Chris
-Original Message- From: qemu-devel-bounces+chris.krumme=windriver@nongnu.org [mailto:qemu-devel-bounces+chris.krumme=windriver@nongnu.o rg] On Behalf Of Avi Kivity Sent: Sunday, October 25, 2009 9:23 AM To: Mark McLoughlin Cc: Michael Tokarev; qemu-de...@nongnu.org; KVM

Re: [Qemu-devel] net packet storms with multiple NICs

2009-10-26 Thread Avi Kivity
On 10/26/2009 03:40 PM, Krumme, Chris wrote: Well, it is. vlan=x really means the ethernet segment named x. If you connect all your guest nics to one vlan, you are connecting them all to one ethernet segment, so any packet transmitted on one will be reflected on others. Whether this is a

[PATCH] KVM test: Unattended install: Mount isos as read only

2009-10-26 Thread Lucas Meneghel Rodrigues
Sometimes CD images can be located on read only NFS shares, so allways pass the ro option to the CD mount command on the unattended.py setup script. Signed-off-by: Lucas Meneghel Rodrigues l...@redhat.com --- client/tests/kvm/scripts/unattended.py |4 ++-- 1 files changed, 2 insertions(+), 2

Re: [Alacrityvm-devel] [KVM PATCH v2 1/2] KVM: export lockless GSI attribute

2009-10-26 Thread Gregory Haskins
Gregory Haskins wrote: Avi Kivity wrote: On 10/23/2009 04:38 AM, Gregory Haskins wrote: Certain GSI's support lockless injecton, but we have no way to detect which ones at the GSI level. Knowledge of this attribute will be useful later in the series so that we can optimize irqfd injection

[KVM PATCH v3 0/3] irqfd enhancements, and irq_routing fixes

2009-10-26 Thread Gregory Haskins
(Applies to kvm.git/master:11b06403) The following patches are cleanups/enhancements for IRQFD now that we have lockless interrupt injection. For more details, please see the patch headers. These patches pass checkpatch, and are fully tested. Please consider for merging. Patch 1/3 is a fix

[KVM PATCH v3 3/3] KVM: Directly inject interrupts if they support lockless operation

2009-10-26 Thread Gregory Haskins
IRQFD currently uses a deferred workqueue item to execute the injection operation. It was originally designed this way because kvm_set_irq() required the caller to hold the irq_lock mutex, and the eventfd callback is invoked from within a non-preemptible critical section. With the advent of

[KVM PATCH v3 1/3] KVM: fix race in irq_routing logic

2009-10-26 Thread Gregory Haskins
The current code suffers from the following race condition: thread-1thread-2 --- kvm_set_irq() { rcu_read_lock() irq_rt = rcu_dereference(table); rcu_read_unlock();

[KVM PATCH v3 2/3] KVM: export lockless GSI attribute

2009-10-26 Thread Gregory Haskins
Certain GSI's support lockless injecton, but we have no way to detect which ones at the GSI level. Knowledge of this attribute will be useful later in the series so that we can optimize irqfd injection paths for cases where we know the code will not sleep. Therefore, we provide an API to query a

[ANNOUNCE] kvm-kmod-2.6.31.5

2009-10-26 Thread Jan Kiszka
This package contains the kvm external modules, using the sources from latest stable Linux release 2.6.31.5. It can be used to update the kernel-side support of kvm without upgrading the host kernel. This release has been tested on x86 down to host kernel 2.6.27 and builds down to 2.6.24.

Re: Jan Kiszka to maintain kvm-kmod

2009-10-26 Thread Jan Kiszka
Avi Kivity wrote: I am pleased to announce that Jan Kiszka has agreed to maintain kvm-kmod.git, the backporting kit that allows running modern kvm code on older kernels. Jan will release kvm-kmod-2.6.x.y packages and kvm-kmod-2.6.x-rcy packages, while Marcelo and I will (with Jan's help)

Re: qemu-kvm: sigsegv at exit

2009-10-26 Thread Marcelo Tosatti
On Thu, Oct 22, 2009 at 06:57:27PM -0200, Marcelo Tosatti wrote: On Thu, Oct 22, 2009 at 02:00:15PM +0200, Michael S. Tsirkin wrote: Hi! I'm sometimes getting segfaults when I kill qemu. This time I caught it when qemu was under gdb: Program received signal SIGSEGV,

Re: [PATCH] virtio-net: fix data corruption with OOM

2009-10-26 Thread Michael S. Tsirkin
On Mon, Oct 26, 2009 at 12:11:51PM +1030, Rusty Russell wrote: On Mon, 26 Oct 2009 03:33:40 am Michael S. Tsirkin wrote: virtio net used to unlink skbs from send queues on error, but ever since 48925e372f04f5e35fec6269127c62b2c71ab794 we do not do this. This causes guest data corruption and

KVM: VMX: move CR3/PDPTR update to vmx_set_cr3

2009-10-26 Thread Marcelo Tosatti
GUEST_CR3 is updated via kvm_set_cr3 whenever CR3 is modified from outside guest context. Similarly pdptrs are updated via load_pdptrs. Let kvm_set_cr3 perform the update, removing it from the vcpu_run fast path. Signed-off-by: Marcelo Tosatti mtosa...@redhat.com Index: b/arch/x86/kvm/vmx.c

performance regression in virtio-net in 2.6.32-rc4

2009-10-26 Thread Michael S. Tsirkin
Hi! I noticed a performance regression in virtio net: going from 2.6.31 to 2.6.32-rc4 I see this, for guest to host communication: [...@tuck ~]$ ssh robin sh streamtest1 TCP STREAM TEST from 0.0.0.0 (0.0.0.0) port 0 AF_INET to 11.0.0.3 (11.0.0.3) port 0 AF_INET : demo Recv SendSend Socket

Re: qemu-kvm: sigsegv at exit

2009-10-26 Thread Michael S. Tsirkin
On Mon, Oct 26, 2009 at 04:43:11PM -0200, Marcelo Tosatti wrote: On Thu, Oct 22, 2009 at 06:57:27PM -0200, Marcelo Tosatti wrote: On Thu, Oct 22, 2009 at 02:00:15PM +0200, Michael S. Tsirkin wrote: Hi! I'm sometimes getting segfaults when I kill qemu. This time I caught it when

KVM: MMU: update invlpg handler comment

2009-10-26 Thread Marcelo Tosatti
Large page translations are always synchronized (either in level 3 or level 2), so its not necessary to properly deal with them in the invlpg handler. Signed-off-by: Marcelo Tosatti mtosa...@redhat.com Index: b/arch/x86/kvm/paging_tmpl.h

Re: fix qemu-kvm sigsegv at exit

2009-10-26 Thread Gleb Natapov
On Mon, Oct 26, 2009 at 04:46:02PM -0200, Marcelo Tosatti wrote: Michael reported a qemu-kvm SIGSEGV at shutdown: Program received signal SIGSEGV, Segmentation fault. [Switching to Thread 0x411d0940 (LWP 14446)] 0x0040afb4 in qemu_mod_timer (ts=0x19f0fd0, expire_time=62275467335)

Re: fix qemu-kvm sigsegv at exit

2009-10-26 Thread Marcelo Tosatti
On Mon, Oct 26, 2009 at 08:58:49PM +0200, Gleb Natapov wrote: On Mon, Oct 26, 2009 at 04:46:02PM -0200, Marcelo Tosatti wrote: Michael reported a qemu-kvm SIGSEGV at shutdown: Program received signal SIGSEGV, Segmentation fault. [Switching to Thread 0x411d0940 (LWP 14446)]

Re: [PATCH] virtio-net: fix data corruption with OOM

2009-10-26 Thread Michael S. Tsirkin
On Mon, Oct 26, 2009 at 08:42:43PM +0200, Michael S. Tsirkin wrote: On Mon, Oct 26, 2009 at 12:11:51PM +1030, Rusty Russell wrote: On Mon, 26 Oct 2009 03:33:40 am Michael S. Tsirkin wrote: virtio net used to unlink skbs from send queues on error, but ever since

-cpu host AMD Host

2009-10-26 Thread Martin Gallant
Is “–cpu host” supported on AMD hosts? Whenever I try to use this option on a Windows Vista/7 client, I get blue screen. Removing the option, the client works fine. Host kernel 2.6.31.4.  Userspace is qemu-kvm-0.11.0. (Previous versions fail too) /proc/cpuinfo snippet: vendor_id   :

Re: vhost-net patches

2009-10-26 Thread Michael S. Tsirkin
On Fri, Oct 23, 2009 at 09:23:40AM -0700, Shirley Ma wrote: Hello Michael, Some initial vhost test netperf results on my T61 laptop from the working tap device are here, latency has been significant decreased, but throughput from guest to host has huge regression. I also hit guest skb_xmit

Re: [PATCH 00/27] Add KVM support for Book3s_64 (PPC64) hosts v5

2009-10-26 Thread Hollis Blanchard
On Sun, 2009-10-25 at 15:01 +0200, Avi Kivity wrote: On 10/23/2009 02:33 AM, Hollis Blanchard wrote: On Wed, 2009-10-21 at 17:03 +0200, Alexander Graf wrote: KVM for PowerPC only supports embedded cores at the moment. While it makes sense to virtualize on small machines, it's even

xp guest, blue screen c0000221 on boot

2009-10-26 Thread Andrew Olney
Hangs on boot, xp guest: STOP: c221 Unknown Hard Error \SystemRoot\System32\ntdll.dll Will boot into safe mode, but _not_ into safe mode with networking. Boots into non-MS VMs fine. * what cpu model (examples: Intel Core Duo, Intel Core 2 Duo, AMD Opteron 2210). See /proc/cpuinfo

Re: [ANNOUNCE] kvm-kmod-2.6.31.5

2009-10-26 Thread Alexander Graf
On 26.10.2009, at 18:26, Jan Kiszka wrote: This package contains the kvm external modules, using the sources from latest stable Linux release 2.6.31.5. It can be used to update the kernel-side support of kvm without upgrading the host kernel. This release has been tested on x86 down to host

Re: vhost-net patches

2009-10-26 Thread Shirley Ma
Hello Miachel, On Mon, 2009-10-26 at 22:05 +0200, Michael S. Tsirkin wrote: Shirley, could you please test the following patch? With this patch, the performance has gained from 1xxx to 2xxx Mb/s, still has some performance gap compared to without vhost. It was 3xxxMb/s before from guest to host

Re: vhost-net patches

2009-10-26 Thread Shirley Ma
Pulled your git tree, didn't see the panic. Thanks Shirley -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: vhost-net patches

2009-10-26 Thread Shirley Ma
On Sun, 2009-10-25 at 11:11 +0200, Michael S. Tsirkin wrote: What is vnet0? That's a tap interface. I am binding raw socket to a tap interface and it doesn't work. Does it support? Thanks Shirley -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to

[ kvm-Bugs-2886754 ] Extreme slow down using -cpu host

2009-10-26 Thread SourceForge.net
Bugs item #2886754, was opened at 2009-10-26 23:41 Message generated for change (Tracker Item Submitted) made by nwxi You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2886754group_id=180599 Please note that this message will contain a full copy of the

Re: [PATCH 00/27] Add KVM support for Book3s_64 (PPC64) hosts v5

2009-10-26 Thread Olof Johansson
Not sure which patch in the series this is needed for since I applied them all, but I got: CC arch/powerpc/kvm/timing.o arch/powerpc/kvm/timing.c:205: error: 'THIS_MODULE' undeclared here (not in a function) Signed-off-by: Olof Johansson o...@lixom.net diff --git

Re: [PATCH 00/27] Add KVM support for Book3s_64 (PPC64) hosts v5

2009-10-26 Thread Hollis Blanchard
On Mon, 2009-10-26 at 18:06 -0500, Olof Johansson wrote: Not sure which patch in the series this is needed for since I applied them all, but I got: CC arch/powerpc/kvm/timing.o arch/powerpc/kvm/timing.c:205: error: 'THIS_MODULE' undeclared here (not in a function)

[PATCH] KVM test: Add new program cd_hash.py

2009-10-26 Thread Lucas Meneghel Rodrigues
A new program that evaluates hash strings, intended to help kvm autotest administrators was added, cd_hash. Usage: cd_hash.py [options] Options: -h, --helpshow this help message and exit -i FILENAME, --iso=FILENAME path to a ISO file whose hash string will

Re: [PATCH 00/27] Add KVM support for Book3s_64 (PPC64) hosts v5

2009-10-26 Thread Olof Johansson
On Oct 26, 2009, at 6:20 PM, Hollis Blanchard wrote: For some reason, I'm not seeing this build break, but the patch is obviously correct. Acked-by: Hollis Blanchard holl...@us.ibm.com I saw it when building with pasemi_defconfig + manually enabled KVM options (all available). -Olof --

Virtio block module slower than IDE

2009-10-26 Thread Floris Bos
Hi, I am running Proxmox 1.4 (which uses the 2.6.30.1 kvm modules) and am experiencing performance problems with Linux guests using the virtio_blk module. Especially with random IO it is a lot slower than IDE. Ubuntu 9.10 VM on LVM storage with VirtIO: === bonnie++ -s 16384

Re: [PATCH] virtio-net: fix data corruption with OOM

2009-10-26 Thread David Miller
From: Michael S. Tsirkin m...@redhat.com Date: Mon, 26 Oct 2009 11:07:13 +0200 Another, and hopefully the last, note, is that git-am can only handle Subject/From lines at the beginning of the message. So git style of the mail would be ... I think it's weird. We could invent some kind of

Re: KVM: VMX: move CR3/PDPTR update to vmx_set_cr3

2009-10-26 Thread Yang, Sheng
On Tuesday 27 October 2009 02:48:33 Marcelo Tosatti wrote: GUEST_CR3 is updated via kvm_set_cr3 whenever CR3 is modified from outside guest context. Similarly pdptrs are updated via load_pdptrs. Let kvm_set_cr3 perform the update, removing it from the vcpu_run fast path. Looks fine to me.

Re: [KVM PATCH v3 1/3] KVM: fix race in irq_routing logic

2009-10-26 Thread Paul E. McKenney
On Mon, Oct 26, 2009 at 12:21:57PM -0400, Gregory Haskins wrote: The current code suffers from the following race condition: thread-1thread-2 --- kvm_set_irq() { rcu_read_lock() irq_rt =

[PATCH] KVM Test: Add re.IGNORECASE to re.compile to verify_ip_address_ in kvm_utils.py

2009-10-26 Thread Cao, Chen
Since the mac address is (changed to) lowercase and the output of 'arping' is in uppercase, we need re.IGNORECASE in the re.compile. (the re.IGNORECASE in the re.search function takes no effect on the compiled regex.) Signed-off-by: Cao, Chen k...@redhat.com --- client/tests/kvm/kvm_utils.py |

[PATCH 1/2] KVM-test: Add execute permission to qemu-ifup script

2009-10-26 Thread Amos Kong
qemu-ifup is a script for setting network bridge. If no execute permission, always face this problem: autotest/client/tests/kvm/scripts/qemu-ifup: could not launch network script Could not initialize device 'tap Signed-off-by: Amos Kong ak...@redhat.com --- 0 files changed, 0 insertions(+), 0

[PATCH 2/2] KSM-test: Test 802.1Q vlan of nic

2009-10-26 Thread Amos Kong
Test 802.1Q vlan of nic, config it by vconfig command. 1) Create two VMs 2) Setup guests in different vlan by vconfig and test communication by ping using hard-coded ip address 3) Setup guests in same vlan and test communication by ping 4) Recover the vlan config The subnet of vlan can be

Re: [Autotest] [PATCH] Test 802.1Q vlan of nic

2009-10-26 Thread Amos Kong
On Wed, Oct 21, 2009 at 06:37:56PM +0800, Amos Kong wrote: On Tue, Oct 20, 2009 at 09:19:50AM -0400, Michael Goldish wrote: See comments below. Hi all, Thanks for your reply. . Agree with you. When I test this case, the original get_command_status() always cause special read

Re: [PATCH 00/27] Add KVM support for Book3s_64 (PPC64) hosts v5

2009-10-26 Thread Hollis Blanchard
On Sun, 2009-10-25 at 15:01 +0200, Avi Kivity wrote: On 10/23/2009 02:33 AM, Hollis Blanchard wrote: On Wed, 2009-10-21 at 17:03 +0200, Alexander Graf wrote: KVM for PowerPC only supports embedded cores at the moment. While it makes sense to virtualize on small machines, it's even

Re: [PATCH 00/27] Add KVM support for Book3s_64 (PPC64) hosts v5

2009-10-26 Thread Hollis Blanchard
On Mon, 2009-10-26 at 18:06 -0500, Olof Johansson wrote: Not sure which patch in the series this is needed for since I applied them all, but I got: CC arch/powerpc/kvm/timing.o arch/powerpc/kvm/timing.c:205: error: 'THIS_MODULE' undeclared here (not in a function)

Re: [PATCH 00/27] Add KVM support for Book3s_64 (PPC64) hosts v5

2009-10-26 Thread Olof Johansson
On Oct 26, 2009, at 6:20 PM, Hollis Blanchard wrote: For some reason, I'm not seeing this build break, but the patch is obviously correct. Acked-by: Hollis Blanchard holl...@us.ibm.com I saw it when building with pasemi_defconfig + manually enabled KVM options (all available). -Olof --