Re: kvmtrace and debugging kvm

2010-04-14 Thread Jan Kiszka
Manish Regmi wrote: hi, I am trying to use kvmtrace but it looks like its no longer used. in Right, kernel support was removed a few releases ago. I think it's time to drop that tool from the qemu-kvm package. kvm_main.c it is returning -EOPNOTSUP. kvmtrace -V -D test -o mykvmtest does

Re: VM performance issue in KVM guests.

2010-04-14 Thread Avi Kivity
On 04/14/2010 06:24 AM, Zhang, Xiantao wrote: Spin loops need to be addressed first, they are known to kill performance in overcommit situations. Even in overcommit case, if vcpu threads of one qemu are not scheduled or pulled to the same logical processor, the performance drop is

Kvm migration problem

2010-04-14 Thread Wagner, Kai
Hey, im from germany and new in kvm. I'll tried the how-to's from your page to migrate an windows vmware .vmdk to a kvm image. I'll also tried so start the kvm with kvm -drive file ... but that also wont work. I'll hope you could get me an answer how to migrate my vmware .vmdk to an working

Re: [PATCH V3] perf kvm: Enhance perf to collect KVM guest os statistics from host side

2010-04-14 Thread Avi Kivity
On 04/14/2030 12:05 PM, Zhang, Yanmin wrote: Here is the new patch of V3 against tip/master of April 13th if anyone wants to try it. Thanks for persisting despite the flames. Can you please separate arch/x86/kvm part of the patch? That will make for easier reviewing, and will need to

Re: AW: Kvm migration problem

2010-04-14 Thread Andre Przywara
(Please keep the list on CC:!) Wagner, Kai wrote: Hey, no i used the real .vmdk. I'll tried to convert a linux image from vmware to windows and that worked fine with kvm convert But if i do the same with a windows .vmdk i cant boot this image. It always came a bluescreen which told

Re: [PATCH V3] perf kvm: Enhance perf to collect KVM guest os statistics from host side

2010-04-14 Thread Sheng Yang
On Wednesday 14 April 2010 17:20:15 Avi Kivity wrote: On 04/14/2030 12:05 PM, Zhang, Yanmin wrote: Here is the new patch of V3 against tip/master of April 13th if anyone wants to try it. Thanks for persisting despite the flames. Can you please separate arch/x86/kvm part of the patch?

Re: [PATCH V3] perf kvm: Enhance perf to collect KVM guest os statistics from host side

2010-04-14 Thread Avi Kivity
On 04/14/2010 12:43 PM, Sheng Yang wrote: On Wednesday 14 April 2010 17:20:15 Avi Kivity wrote: On 04/14/2030 12:05 PM, Zhang, Yanmin wrote: Here is the new patch of V3 against tip/master of April 13th if anyone wants to try it. Thanks for persisting despite the flames. Can

Re: [PATCH V3] perf kvm: Enhance perf to collect KVM guest os statistics from host side

2010-04-14 Thread Sheng Yang
On Wednesday 14 April 2010 17:57:50 Avi Kivity wrote: On 04/14/2010 12:43 PM, Sheng Yang wrote: On Wednesday 14 April 2010 17:20:15 Avi Kivity wrote: On 04/14/2030 12:05 PM, Zhang, Yanmin wrote: Here is the new patch of V3 against tip/master of April 13th if anyone wants to try it.

Re: [PATCH V3] perf kvm: Enhance perf to collect KVM guest os statistics from host side

2010-04-14 Thread Avi Kivity
On 04/14/2010 01:14 PM, Sheng Yang wrote: I wouldn't like to depend on model specific behaviour. One option is to read all the information synchronously and store it in a per-cpu area with atomic instructions, then queue the NMI. Another option is to have another callback which tells us that

Re: [PATCH V3] perf kvm: Enhance perf to collect KVM guest os statistics from host side

2010-04-14 Thread Sheng Yang
On Wednesday 14 April 2010 18:33:37 Avi Kivity wrote: On 04/14/2010 01:27 PM, Sheng Yang wrote: Yes, interesting to see what the latency is. If it's reasonably short (and I expect it will be so), we can do the busy wait solution. If we have an NMI counter somewhere, we can simply wait

Re: [PATCH V3] perf kvm: Enhance perf to collect KVM guest os statistics from host side

2010-04-14 Thread Ingo Molnar
* Avi Kivity a...@redhat.com wrote: On 04/14/2030 12:05 PM, Zhang, Yanmin wrote: Here is the new patch of V3 against tip/master of April 13th if anyone wants to try it. Thanks for persisting despite the flames. Can you please separate arch/x86/kvm part of the patch? That will make

Re: [PATCH V3] perf kvm: Enhance perf to collect KVM guest os statistics from host side

2010-04-14 Thread Avi Kivity
On 04/14/2010 01:43 PM, Ingo Molnar wrote: Thanks for persisting despite the flames. Can you please separate arch/x86/kvm part of the patch? That will make for easier reviewing, and will need to go through separate trees. Once it gets into a state that it can be applied could you

KVM: x86: Push potential exception error code on task switches

2010-04-14 Thread Jan Kiszka
When a fault triggers a task switch, the error code, if it exists, has to be pushed on the new task's stack. Implement the missing bits. Signed-off-by: Jan Kiszka jan.kis...@siemens.com --- arch/x86/include/asm/kvm_emulate.h |3 ++- arch/x86/include/asm/kvm_host.h|3 ++-

Re: KVM: x86: Push potential exception error code on task switches

2010-04-14 Thread Avi Kivity
On 04/14/2010 03:11 PM, Jan Kiszka wrote: When a fault triggers a task switch, the error code, if it exists, has to be pushed on the new task's stack. Implement the missing bits. @@ -2416,12 +2417,23 @@ static int emulator_do_task_switch(struct x86_emulate_ctxt *ctxt,

Re: KVM: x86: Push potential exception error code on task switches

2010-04-14 Thread Jan Kiszka
Avi Kivity wrote: On 04/14/2010 03:11 PM, Jan Kiszka wrote: When a fault triggers a task switch, the error code, if it exists, has to be pushed on the new task's stack. Implement the missing bits. @@ -2416,12 +2417,23 @@ static int emulator_do_task_switch(struct x86_emulate_ctxt *ctxt,

Re: KVM: x86: Push potential exception error code on task switches

2010-04-14 Thread Gleb Natapov
On Wed, Apr 14, 2010 at 02:11:39PM +0200, Jan Kiszka wrote: static int emulator_do_task_switch(struct x86_emulate_ctxt *ctxt, - struct x86_emulate_ops *ops, - u16 tss_selector, int reason) +struct

Re: KVM: x86: Push potential exception error code on task switches

2010-04-14 Thread Jan Kiszka
Jan Kiszka wrote: Avi Kivity wrote: On 04/14/2010 03:11 PM, Jan Kiszka wrote: When a fault triggers a task switch, the error code, if it exists, has to be pushed on the new task's stack. Implement the missing bits. @@ -2416,12 +2417,23 @@ static int emulator_do_task_switch(struct

RE: AW: Kvm migration problem

2010-04-14 Thread Martin Maurer
-Original Message- From: kvm-ow...@vger.kernel.org [mailto:kvm-ow...@vger.kernel.org] On Behalf Of Andre Przywara Sent: Mittwoch, 14. April 2010 11:35 To: Wagner, Kai Cc: KVM list Subject: Re: AW: Kvm migration problem (Please keep the list on CC:!) Wagner, Kai wrote: Hey,

Re: KVM: x86: Push potential exception error code on task switches

2010-04-14 Thread Jan Kiszka
Gleb Natapov wrote: On Wed, Apr 14, 2010 at 02:11:39PM +0200, Jan Kiszka wrote: static int emulator_do_task_switch(struct x86_emulate_ctxt *ctxt, -struct x86_emulate_ops *ops, -u16 tss_selector, int reason) +

Re: KVM: x86: Push potential exception error code on task switches

2010-04-14 Thread Avi Kivity
On 04/14/2010 03:58 PM, Jan Kiszka wrote: The TSS descriptor (gate doesn't have a size). But isn't it possible to have a 32-bit TSS with a 16-bit CS/SS? Might be possible, but will cause troubles as the spec says: The error code is pushed on the stack as a doubleword or word

Re: KVM: x86: Push potential exception error code on task switches

2010-04-14 Thread Avi Kivity
On 04/14/2010 04:07 PM, Avi Kivity wrote: On 04/14/2010 03:58 PM, Jan Kiszka wrote: The TSS descriptor (gate doesn't have a size). But isn't it possible to have a 32-bit TSS with a 16-bit CS/SS? Might be possible, but will cause troubles as the spec says: The error code is pushed on the

Re: KVM: x86: Push potential exception error code on task switches

2010-04-14 Thread Jan Kiszka
Avi Kivity wrote: On 04/14/2010 03:58 PM, Jan Kiszka wrote: The TSS descriptor (gate doesn't have a size). But isn't it possible to have a 32-bit TSS with a 16-bit CS/SS? Might be possible, but will cause troubles as the spec says: The error code is pushed on the stack as a

[PATCH 1/2] KVM: x86: Terminate early if task_switch_16/32 failed

2010-04-14 Thread Jan Kiszka
Stop the switch immediately if task_switch_16/32 returned an error. Only if that step succeeded, the switch should actually take place and update any register states. Signed-off-by: Jan Kiszka jan.kis...@siemens.com --- arch/x86/kvm/emulate.c |2 ++ 1 files changed, 2 insertions(+), 0

[PATCH v2 2/2] KVM: x86: Push potential exception error code on task switches

2010-04-14 Thread Jan Kiszka
When a fault triggers a task switch, the error code, if existent, has to be pushed on the new task's stack. Implement the missing bits. Signed-off-by: Jan Kiszka jan.kis...@siemens.com --- Changes in v2: - push writeback into emulator_task_switch - refactored over Terminate early if

Re: [Autotest] Autotest: Unattended_install testcase always fail with rhel3.9-32 guest

2010-04-14 Thread Lucas Meneghel Rodrigues
On Wed, Apr 14, 2010 at 10:26 AM, Amos Kong ak...@redhat.com wrote: Hi Lucas, When I execute unattended_install testcases on RHEL-5.5, it always fail when using rhel3.9-32 guest. I found it blocked after packages installation. Is it related that rhel39-32 guest don't support acpi ? I've

[PATCH] kvm test: Fix i386 crossbuild

2010-04-14 Thread Jan Kiszka
This fixes make ARCH=i386 of the KVM micro tests on x86-64 hosts. Signed-off-by: Jan Kiszka jan.kis...@siemens.com --- kvm/user/config-x86-common.mak |4 +++- 1 files changed, 3 insertions(+), 1 deletions(-) diff --git a/kvm/user/config-x86-common.mak b/kvm/user/config-x86-common.mak index

Re: KVM: x86: Push potential exception error code on task switches

2010-04-14 Thread Gleb Natapov
On Wed, Apr 14, 2010 at 03:00:18PM +0200, Jan Kiszka wrote: Gleb Natapov wrote: On Wed, Apr 14, 2010 at 02:11:39PM +0200, Jan Kiszka wrote: static int emulator_do_task_switch(struct x86_emulate_ctxt *ctxt, - struct x86_emulate_ops *ops, -

[PATCH] kvm test: Add 32-bit task switch micro-test

2010-04-14 Thread Jan Kiszka
This implements a basic task switch test for 32-bit targets. It specifically stresses the case that a fault with attached error code triggers the switch via a task gate. Signed-off-by: Jan Kiszka jan.kis...@siemens.com --- Gleb, you might want to have a look at this test. When using it with my

Re: [PATCH] kvm test: Add 32-bit task switch micro-test

2010-04-14 Thread Gleb Natapov
On Wed, Apr 14, 2010 at 04:12:46PM +0200, Jan Kiszka wrote: This implements a basic task switch test for 32-bit targets. It specifically stresses the case that a fault with attached error code triggers the switch via a task gate. How do you compile this? I was sure kvm test suit is broken for

Re: [PATCH] kvm test: Add 32-bit task switch micro-test

2010-04-14 Thread Jan Kiszka
Gleb Natapov wrote: On Wed, Apr 14, 2010 at 04:12:46PM +0200, Jan Kiszka wrote: This implements a basic task switch test for 32-bit targets. It specifically stresses the case that a fault with attached error code triggers the switch via a task gate. How do you compile this? I was sure kvm

Re: [PATCH] kvm test: Add 32-bit task switch micro-test

2010-04-14 Thread Gleb Natapov
On Wed, Apr 14, 2010 at 04:41:15PM +0200, Jan Kiszka wrote: Gleb Natapov wrote: On Wed, Apr 14, 2010 at 04:12:46PM +0200, Jan Kiszka wrote: This implements a basic task switch test for 32-bit targets. It specifically stresses the case that a fault with attached error code triggers the

Re: [RFC][PATCH v3 1/3] A device for zero-copy based on KVM virtio-net.

2010-04-14 Thread Arnd Bergmann
On Friday 09 April 2010, xiaohui@intel.com wrote: From: Xin Xiaohui xiaohui@intel.com Add a device to utilize the vhost-net backend driver for copy-less data transfer between guest FE and host NIC. It pins the guest user space to the host memory and provides proto_ops as

[PATCH][STABLE] KVM: x86: Push potential exception error code on task switches

2010-04-14 Thread Jan Kiszka
When a fault triggers a task switch, the error code, if existent, has to be pushed on the new task's stack. Implement the missing bits. Signed-off-by: Jan Kiszka jan.kis...@siemens.com --- This is a backport of the proposed fix for master. It applies at least down to 2.6.32 and should be

Re: [PROBLEM] Guest with SMP =2 with kvm_clock has jumping clock every few seconds

2010-04-14 Thread John Buswell
Just a follow up on this. The hypervisor had ACPI / ACPI PM clocksource support disabled, as did the guest. This problem occurred with both tsc and jiffies clock sources on the hypervisor. With ACPI enabled and ACPI PM enabled, the clocksources on the hypervisor became hpt and acpi_pm. The

Re: [RFC][PATCH v2 0/3] Provide a zero-copy method on KVM virtio-net.

2010-04-14 Thread Michael S. Tsirkin
On Fri, Apr 02, 2010 at 03:25:00PM +0800, xiaohui@intel.com wrote: The idea is simple, just to pin the guest VM user space and then let host NIC driver has the chance to directly DMA to it. The patches are based on vhost-net backend driver. We add a device which provides proto_ops as

Re: [RFC][PATCH v3 1/3] A device for zero-copy based on KVM virtio-net.

2010-04-14 Thread Michael S. Tsirkin
On Wed, Apr 14, 2010 at 04:55:21PM +0200, Arnd Bergmann wrote: On Friday 09 April 2010, xiaohui@intel.com wrote: From: Xin Xiaohui xiaohui@intel.com Add a device to utilize the vhost-net backend driver for copy-less data transfer between guest FE and host NIC. It pins the guest

Re: [RFC][PATCH v3 1/3] A device for zero-copy based on KVM virtio-net.

2010-04-14 Thread Arnd Bergmann
On Wednesday 14 April 2010, Michael S. Tsirkin wrote: On Wed, Apr 14, 2010 at 04:55:21PM +0200, Arnd Bergmann wrote: On Friday 09 April 2010, xiaohui@intel.com wrote: From: Xin Xiaohui xiaohui@intel.com It seems that you are duplicating a lot of functionality that is already in

Re: [RFC][PATCH v3 1/3] A device for zero-copy based on KVM virtio-net.

2010-04-14 Thread Michael S. Tsirkin
On Wed, Apr 14, 2010 at 05:57:54PM +0200, Arnd Bergmann wrote: On Wednesday 14 April 2010, Michael S. Tsirkin wrote: On Wed, Apr 14, 2010 at 04:55:21PM +0200, Arnd Bergmann wrote: On Friday 09 April 2010, xiaohui@intel.com wrote: From: Xin Xiaohui xiaohui@intel.com It seems

[PATCH] KVM: MMU: Replace role.glevels with role.cr4_pae

2010-04-14 Thread Avi Kivity
There is no real distinction between glevels=3 and glevels=4; both have exactly the same format and the code is treated exactly the same way. Drop role.glevels and replace is with role.cr4_pae (which is meaningful). This simplifies the code a bit. As a side effect, it allows sharing shadow page

Re: [RFC][PATCH v3 1/3] A device for zero-copy based on KVM virtio-net.

2010-04-14 Thread Arnd Bergmann
On Wednesday 14 April 2010, Michael S. Tsirkin wrote: qemu needs the ability to inject raw packets into device from userspace, bypassing vhost/virtio (for live migration). Ok, but since there is only a write callback and no read, it won't actually be able to do this with the

Re: [PATCH 3/6] KVM MMU: optimize/cleanup for marking parent unsync

2010-04-14 Thread Marcelo Tosatti
On Wed, Apr 14, 2010 at 11:23:38AM +0800, Xiao Guangrong wrote: Marcelo Tosatti wrote: I'd prefer to not touch it. This patch avoids walk all parents and i think this overload is really unnecessary. It has other tricks in this codepath but i not noticed? :-) My point is that

Re: [PATCH 2/6] KVM MMU: fix kvm_mmu_zap_page() and its calling path

2010-04-14 Thread Marcelo Tosatti
On Wed, Apr 14, 2010 at 10:14:29AM +0800, Xiao Guangrong wrote: Marcelo Tosatti wrote: On Tue, Apr 13, 2010 at 09:34:14AM +0800, Xiao Guangrong wrote: Marcelo Tosatti wrote: @@ -1483,8 +1483,8 @@ static int mmu_zap_unsync_children(struct kvm *kvm,

Re: [PATCH] KVM: MMU: Replace role.glevels with role.cr4_pae

2010-04-14 Thread Avi Kivity
On 04/14/2010 07:20 PM, Avi Kivity wrote: There is no real distinction between glevels=3 and glevels=4; both have exactly the same format and the code is treated exactly the same way. Drop role.glevels and replace is with role.cr4_pae (which is meaningful). This simplifies the code a bit. As

Re: [PATCH] kvm test: Add 32-bit task switch micro-test

2010-04-14 Thread Gleb Natapov
On Wed, Apr 14, 2010 at 04:12:46PM +0200, Jan Kiszka wrote: Gleb, you might want to have a look at this test. When using it with my 2.6.34 queue (or below or with QEMU), I get the following, expected output: fault at 8:4002ef, prev task 18, error code 1234 post fault When using it with

Re: [PATCH] qemu-kvm: emulator tests: fix msr test

2010-04-14 Thread Marcelo Tosatti
On Tue, Apr 13, 2010 at 05:26:47PM +0300, Naphtali Sprei wrote: use correct 64 bit mode inline assembly constraints use a canonical form address when writing to the MSR_KERNEL_GS_BASE MSR Signed-off-by: Naphtali Sprei nsp...@redhat.com Applied, thanks. -- To unsubscribe from this list:

Re: [PATCH] get rid of mmu_only parameter in emulator_write_emulated()

2010-04-14 Thread Marcelo Tosatti
On Tue, Apr 13, 2010 at 10:21:56AM +0300, Gleb Natapov wrote: May be I am missing something here, but it seams we can call kvm_mmu_pte_write() directly from emulator_cmpxchg_emulated() instead of passing mmu_only down to emulator_write_emulated_onepage() and call it there. Signed-off-by:

Re: [PATCH] KVM: cleanup: limit the number of pages per memory slot

2010-04-14 Thread Marcelo Tosatti
On Tue, Apr 13, 2010 at 10:47:24PM +0900, Takuya Yoshikawa wrote: This is based on my last patch: fix the handling of dirty bitmaps to avoid overflows Sorry, this resulted in reverting part of that. === This patch limits the number of pages per memory slot to make us free from extra

Re: [PATCH] KVM: MMU: Replace role.glevels with role.cr4_pae

2010-04-14 Thread Marcelo Tosatti
On Wed, Apr 14, 2010 at 07:32:12PM +0300, Avi Kivity wrote: On 04/14/2010 07:20 PM, Avi Kivity wrote: There is no real distinction between glevels=3 and glevels=4; both have exactly the same format and the code is treated exactly the same way. Drop role.glevels and replace is with

Re: [PATCH] kvm test: Add 32-bit task switch micro-test

2010-04-14 Thread Jan Kiszka
Gleb Natapov wrote: On Wed, Apr 14, 2010 at 04:12:46PM +0200, Jan Kiszka wrote: Gleb, you might want to have a look at this test. When using it with my 2.6.34 queue (or below or with QEMU), I get the following, expected output: fault at 8:4002ef, prev task 18, error code 1234 post fault

Re: [RFC][PATCH v3 1/3] A device for zero-copy based on KVM virtio-net.

2010-04-14 Thread Michael S. Tsirkin
On Wed, Apr 14, 2010 at 06:35:57PM +0200, Arnd Bergmann wrote: On Wednesday 14 April 2010, Michael S. Tsirkin wrote: qemu needs the ability to inject raw packets into device from userspace, bypassing vhost/virtio (for live migration). Ok, but since there is only a write

Re: [RFC][PATCH v3 1/3] A device for zero-copy based on KVM virtio-net.

2010-04-14 Thread Arnd Bergmann
On Wednesday 14 April 2010 22:31:42 Michael S. Tsirkin wrote: On Wed, Apr 14, 2010 at 06:35:57PM +0200, Arnd Bergmann wrote: On Wednesday 14 April 2010, Michael S. Tsirkin wrote: qemu needs the ability to inject raw packets into device from userspace, bypassing vhost/virtio (for

Re: [RFC][PATCH v3 1/3] A device for zero-copy based on KVM virtio-net.

2010-04-14 Thread Michael S. Tsirkin
On Wed, Apr 14, 2010 at 10:39:49PM +0200, Arnd Bergmann wrote: On Wednesday 14 April 2010 22:31:42 Michael S. Tsirkin wrote: On Wed, Apr 14, 2010 at 06:35:57PM +0200, Arnd Bergmann wrote: On Wednesday 14 April 2010, Michael S. Tsirkin wrote: qemu needs the ability to inject raw

[ kvm-Bugs-2976863 ] 32PAE Windows guest blue screen when booting with apci on

2010-04-14 Thread SourceForge.net
Bugs item #2976863, was opened at 2010-03-26 02:44 Message generated for change (Comment added) made by mtosatti You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2976863group_id=180599 Please note that this message will contain a full copy of the comment

Re: [RFC][PATCH v3 1/3] A device for zero-copy based on KVM virtio-net.

2010-04-14 Thread Arnd Bergmann
On Wednesday 14 April 2010 22:40:03 Michael S. Tsirkin wrote: On Wed, Apr 14, 2010 at 10:39:49PM +0200, Arnd Bergmann wrote: Well, if the guest not only wants to send data but also receive frames coming from other machines, they need to get from the kernel into qemu, and the only way I can

Re: [PATCH v4 3/3] Inter-VM shared memory PCI device

2010-04-14 Thread Cam Macdonell
On Mon, Apr 12, 2010 at 2:56 PM, Avi Kivity a...@redhat.com wrote: On 04/08/2010 01:52 AM, Cam Macdonell wrote: Support an inter-vm shared memory device that maps a shared-memory object as a PCI device in the guest.  This patch also supports interrupts between guest by communicating over a

Re: [Autotest] [PATCH] KVM Test: Fix bug that check_image.py will check removed image.

2010-04-14 Thread Lucas Meneghel Rodrigues
On Mon, Apr 12, 2010 at 5:32 AM, Feng Yang fy...@redhat.com wrote: If set remove_image to yes, the image will be removed before check_image.py is executed as post command.  But check_img.py still try to check the removed image When it is running. This patch update check_image.py and let it do

Re: [Autotest] [PATCH] KVM test: Memory ballooning test for KVM guest

2010-04-14 Thread Lucas Meneghel Rodrigues
On Mon, Apr 12, 2010 at 8:03 AM, pradeep psuri...@linux.vnet.ibm.com wrote: sudhir kumar wrote: On Fri, Apr 9, 2010 at 2:40 PM, pradeep psuri...@linux.vnet.ibm.com wrote: Hi Lucas Thanks for your comments. Please find the patch, with suggested changes. Thanks Pradeep Signed-off-by:

Re: [PATCH V3] perf kvm: Enhance perf to collect KVM guest os statistics from host side

2010-04-14 Thread Zhang, Yanmin
On Wed, 2010-04-14 at 12:20 +0300, Avi Kivity wrote: On 04/14/2030 12:05 PM, Zhang, Yanmin wrote: Here is the new patch of V3 against tip/master of April 13th if anyone wants to try it. Thanks for persisting despite the flames. Can you please separate arch/x86/kvm part of the

Re: [Autotest] [PATCH] KVM Test: Fix bug that check_image.py will check removed image.

2010-04-14 Thread Feng Yang
- Lucas Meneghel Rodrigues l...@redhat.com wrote: From: Lucas Meneghel Rodrigues l...@redhat.com To: Feng Yang fy...@redhat.com Cc: autot...@test.kernel.org, kvm@vger.kernel.org Sent: Thursday, April 15, 2010 8:05:41 AM GMT +08:00 Beijing / Chongqing / Hong Kong / Urumqi Subject: Re: