FYI: Upgrade from pc-0.12 / pc-014 vs. savevm section kvmclock

2012-11-23 Thread Philipp Hahn
Hello, I'm using libvirt to manage my KVM instances. I created a VM with qemu-kvm-0.12, later upgraded to qemu-kvm-0.14 and took a snapshot using libvirt. As the original VM was created with qemu-kvm-0.12, libvirt stored pc-0.12 with its XML data. Now I upgraded to qemu-kvm-1.1.2, where

[PATCH 1/2] vfio powerpc: implemented IOMMU driver for VFIO

2012-11-23 Thread Alexey Kardashevskiy
VFIO implements platform independent stuff such as a PCI driver, BAR access (via read/write on a file descriptor or direct mapping when possible) and IRQ signaling. The platform dependent part includes IOMMU initialization and handling. This patch implements an IOMMU driver for VFIO which does

[PATCH 0/2] vfio powerpc: implemented and enabled

2012-11-23 Thread Alexey Kardashevskiy
The series includes IOMMU implementation and necessary IOMMU groups initialization. Alexey Kardashevskiy (2): vfio powerpc: implemented IOMMU driver for VFIO vfio powerpc: enabled on powernv platform arch/powerpc/include/asm/iommu.h |6 + arch/powerpc/kernel/iommu.c | 141

[PATCH 2/2] vfio powerpc: enabled on powernv platform

2012-11-23 Thread Alexey Kardashevskiy
This patch initializes IOMMU groups based on the IOMMU configuration discovered during the PCI scan on POWERNV (POWER non virtualized) platform. The IOMMU groups are to be used later by VFIO driver (PCI pass through). It also implements an API for mapping/unmapping pages for guest PCI drivers and

Re: [PATCHv4] virtio-spec: virtio network device RFS support

2012-11-23 Thread Michael S. Tsirkin
On Fri, Nov 23, 2012 at 01:17:36PM +0800, Jason Wang wrote: ... specifying the number of the last transmit and receive queue that is going to be used; thus out of transmitq0..transmitqn and receiveq0..receiveqn where n=virtqueue_pairs will be used. In this description, looks like n+1

Re: [PATCH v2 0/8] kvm tools: add support for ARMv7 processors

2012-11-23 Thread Pekka Enberg
On Thu, 22 Nov 2012, Will Deacon wrote: Hello, This is version two of the patches I originally posted here: http://www.spinics.net/lists/kvm/msg82447.html Changes since version one include: - MAX_MEMORY no longer needlessly page-aligned for ARM - Use xread instead of

RE: [PATCH v2 3/6] x86, apicv: add virtual interrupt delivery support

2012-11-23 Thread Zhang, Yang Z
Gleb Natapov wrote on 2012-11-22: On Wed, Nov 21, 2012 at 04:09:36PM +0800, Yang Zhang wrote: Virtual interrupt delivery avoids KVM to inject vAPIC interrupts manually, which is fully taken care of by the hardware. This needs some special awareness into existing interrupr injection path: -

[PATCHv5] virtio-spec: virtio network device RFS support

2012-11-23 Thread Michael S. Tsirkin
Add RFS support to virtio network device. Add a new feature flag VIRTIO_NET_F_RFS for this feature, a new configuration field max_virtqueue_pairs to detect supported number of virtqueues as well as a new command VIRTIO_NET_CTRL_RFS to program packet steering for unidirectional protocols. ---

[PATCH 0/1] [PULL] qemu-kvm.git uq/master queue

2012-11-23 Thread Marcelo Tosatti
The following changes since commit 1ccbc2851282564308f790753d7158487b6af8e2: qemu-sockets: Fix parsing of the inet option 'to'. (2012-11-21 12:07:59 +0400) are available in the git repository at: git://git.kernel.org/pub/scm/virt/kvm/qemu-kvm.git uq/master Bruce Rogers (1): Legacy

[PATCH 1/1] Legacy qemu-kvm options have no argument

2012-11-23 Thread Marcelo Tosatti
From: Bruce Rogers brog...@suse.com The options no-kvm, no-kvm-pit, no-kvm-pit-reinjection, and no-kvm-irqchip should be marked as having no argument. Signed-off-by: Bruce Rogers brog...@suse.com Reviewed-by: Jan Kiszka jan.kis...@siemens.com Signed-off-by: Marcelo Tosatti mtosa...@redhat.com

Fwd: Performance issue

2012-11-23 Thread George-Cristian Bîrzan
On Fri, Nov 23, 2012 at 9:26 AM, Stefan Hajnoczi stefa...@gmail.com wrote: Hi George-Cristian, On IRC you mentioned you found a solution. Any updates? Are you still seeing the performance problem? It wasn't a solution, I just thought I knew why. I was thinking the 73Mbps were coming in at

Re: [PATCH 1/5] KVM: PPC: Book3S HV: Handle guest-caused machine checks on POWER7 without panicking

2012-11-23 Thread Alexander Graf
On 22.11.2012, at 10:25, Paul Mackerras wrote: Currently, if a machine check interrupt happens while we are in the guest, we exit the guest and call the host's machine check handler, which tends to cause the host to panic. Some machine checks can be triggered by the guest; for example, if

Re: [PATCH v2 1/8] rbtree: include linux/compiler.h for definition of __always_inline

2012-11-23 Thread Will Deacon
Hi Sasha, On Thu, Nov 22, 2012 at 06:44:34PM +, Sasha Levin wrote: On 11/22/2012 10:58 AM, Will Deacon wrote: Commit 29fc7c5a4f516d388fb6e1f6d24bfb04b8093e54 upstream. rb_erase_augmented() is a static function annotated with __always_inline. This causes a compile failure when

Re: [PATCH v2 0/8] kvm tools: add support for ARMv7 processors

2012-11-23 Thread Will Deacon
On Fri, Nov 23, 2012 at 11:22:24AM +, Pekka Enberg wrote: On Thu, 22 Nov 2012, Will Deacon wrote: This is version two of the patches I originally posted here: http://www.spinics.net/lists/kvm/msg82447.html [...] I applied patches 1-7. I'll wait for a new revision of the final

[PATCH v3] kvm tools: add support for ARMv7 processors

2012-11-23 Thread Will Deacon
This patch adds initial support for ARMv7 processors (more specifically, Cortex-A15) to kvmtool. Everything is driven by FDT, including dynamic generation of virtio nodes for MMIO devices (PCI is not used due to lack of a suitable host-bridge). The virtual timers and virtual interrupt controller

Re: [PATCH v3] kvm tools: add support for ARMv7 processors

2012-11-23 Thread Marc Zyngier
On 23/11/12 14:40, Will Deacon wrote: This patch adds initial support for ARMv7 processors (more specifically, Cortex-A15) to kvmtool. Everything is driven by FDT, including dynamic generation of virtio nodes for MMIO devices (PCI is not used due to lack of a suitable host-bridge). The

Re: [PATCH v4 1/5] ARM: arch_timers: switch to physical timers if HYP mode is available

2012-11-23 Thread Will Deacon
On Sat, Nov 10, 2012 at 03:46:05PM +, Christoffer Dall wrote: From: Marc Zyngier marc.zyng...@arm.com If we're booted in HYP mode, it is possible that we'll run some kind of virtualized environment. In this case, it is a better to switch to the physical timers, and leave the virtual

Re: [PATCH v4 2/5] ARM: KVM: arch_timers: Add minimal infrastructure

2012-11-23 Thread Will Deacon
On Sat, Nov 10, 2012 at 03:46:12PM +, Christoffer Dall wrote: From: Marc Zyngier marc.zyng...@arm.com Add some very minimal architected timer related infrastructure. For the moment, we just provide empty structures, and enable/disable access to the physical timer across world switch.

Re: [PATCH 3/5] KVM: PPC: Book3S HV: Improve handling of local vs. global TLB invalidations

2012-11-23 Thread Alexander Graf
On 22.11.2012, at 10:28, Paul Mackerras wrote: When we change or remove a HPT (hashed page table) entry, we can do either a global TLB invalidation (tlbie) that works across the whole machine, or a local invalidation (tlbiel) that only affects this core. Currently we do local invalidations

Re: [PATCH 4/5] KVM: PPC: Book3S HV: Don't give the guest RW access to RO pages

2012-11-23 Thread Alexander Graf
On 22.11.2012, at 10:28, Paul Mackerras wrote: Currently, if the guest does an H_PROTECT hcall requesting that the permissions on a HPT entry be changed to allow writing, we make the requested change even if the page is marked read-only in the host Linux page tables. This is a problem since

Re: [PATCH 0/5] KVM: PPC: Fix various bugs and vulnerabilities in HV KVM

2012-11-23 Thread Alexander Graf
On 22.11.2012, at 10:24, Paul Mackerras wrote: This series of patches fixes various bugs that we have found recently. The bugs fixed in patches 1, 3 and 4 are also vulnerabilities where the guest could cause the host to crash or could access host memory inappropriately. The bug fixed in

Re: [PATCH v4 3/5] ARM: KVM: arch_timers: Add guest timer core support

2012-11-23 Thread Will Deacon
On Sat, Nov 10, 2012 at 03:46:19PM +, Christoffer Dall wrote: From: Marc Zyngier marc.zyng...@arm.com We can inject a timer interrupt into the guest as a result of three possible events: - The virtual timer interrupt has fired while we were still executing the guest - The timer

Re: [PATCH v4 4/5] ARM: KVM: arch_timers: Add timer world switch

2012-11-23 Thread Will Deacon
On Sat, Nov 10, 2012 at 03:46:25PM +, Christoffer Dall wrote: From: Marc Zyngier marc.zyng...@arm.com Do the necessary save/restore dance for the timers in the world switch code. In the process, allow the guest to read the physical counter, which is useful for its own clock_event_device.

Re: [PATCH v4 5/5] ARM: KVM: arch_timers: Wire the init code and config option

2012-11-23 Thread Will Deacon
On Sat, Nov 10, 2012 at 03:46:32PM +, Christoffer Dall wrote: From: Marc Zyngier marc.zyng...@arm.com It is now possible to select CONFIG_KVM_ARM_TIMER to enable the KVM architected timer support. Signed-off-by: Marc Zyngier marc.zyng...@arm.com Signed-off-by: Christoffer Dall

Re: [Qemu-devel] [PATCH 1/1] Legacy qemu-kvm options have no argument

2012-11-23 Thread Andreas Färber
Am 23.11.2012 13:41, schrieb Marcelo Tosatti: From: Bruce Rogers brog...@suse.com The options no-kvm, no-kvm-pit, no-kvm-pit-reinjection, and no-kvm-irqchip should be marked as having no argument. Signed-off-by: Bruce Rogers brog...@suse.com Reviewed-by: Jan Kiszka jan.kis...@siemens.com

Re: [PATCH v4 3/5] ARM: KVM: arch_timers: Add guest timer core support

2012-11-23 Thread Marc Zyngier
On 23/11/12 16:17, Will Deacon wrote: On Sat, Nov 10, 2012 at 03:46:19PM +, Christoffer Dall wrote: From: Marc Zyngier marc.zyng...@arm.com We can inject a timer interrupt into the guest as a result of three possible events: - The virtual timer interrupt has fired while we were still

Re: [PATCH v4 3/5] ARM: KVM: arch_timers: Add guest timer core support

2012-11-23 Thread Will Deacon
On Fri, Nov 23, 2012 at 04:52:12PM +, Marc Zyngier wrote: On 23/11/12 16:17, Will Deacon wrote: diff --git a/arch/arm/kvm/reset.c b/arch/arm/kvm/reset.c index b80256b..7463f5b 100644 --- a/arch/arm/kvm/reset.c +++ b/arch/arm/kvm/reset.c @@ -37,6 +37,12 @@ static struct kvm_regs

Re: [PATCH v4 4/5] ARM: KVM: arch_timers: Add timer world switch

2012-11-23 Thread Marc Zyngier
On 23/11/12 16:30, Will Deacon wrote: On Sat, Nov 10, 2012 at 03:46:25PM +, Christoffer Dall wrote: From: Marc Zyngier marc.zyng...@arm.com Do the necessary save/restore dance for the timers in the world switch code. In the process, allow the guest to read the physical counter, which is

Re: [PATCH v4 3/5] ARM: KVM: arch_timers: Add guest timer core support

2012-11-23 Thread Marc Zyngier
On 23/11/12 17:00, Will Deacon wrote: On Fri, Nov 23, 2012 at 04:52:12PM +, Marc Zyngier wrote: On 23/11/12 16:17, Will Deacon wrote: diff --git a/arch/arm/kvm/reset.c b/arch/arm/kvm/reset.c index b80256b..7463f5b 100644 --- a/arch/arm/kvm/reset.c +++ b/arch/arm/kvm/reset.c @@ -37,6

Re: KVM Disk i/o or VM activities causes soft lockup?

2012-11-23 Thread Vincent Li
On Thu, Nov 22, 2012 at 11:29 PM, Stefan Hajnoczi stefa...@gmail.com wrote: On Wed, Nov 21, 2012 at 03:36:50PM -0800, Vincent Li wrote: We have users running on redhat based distro (Kernel 2.6.32-131.21.1.el6.x86_64 ) with kvm, when customer made cron job script to copy large files between kvm

Re: qemu-kvm-1.2.0: double free or corruption in VNC code

2012-11-23 Thread Nikola Ciprich
Please also post the exact package version you are using - the line numbers change between releases and depend on which patches have been applied to the source tree. The distro exact package version allows me to download the source tree that was used to build this binary and check the

Nested VMX stability - module parameters?

2012-11-23 Thread Ian Pilcher
I am trying to use nested KVM (VMX) to set up Red Hat Enterprise Virtualization (RHEV) on a single Fedora 17 host. The host hardware is an Intel DQ67SW board with a Core i7 2600 processor. I have successfully set up the environment, but I have experienced at least 2 host kernel panics.

Re: [PATCH 3/5] KVM: PPC: Book3S HV: Improve handling of local vs. global TLB invalidations

2012-11-23 Thread Paul Mackerras
On Fri, Nov 23, 2012 at 04:43:03PM +0100, Alexander Graf wrote: On 22.11.2012, at 10:28, Paul Mackerras wrote: - With the possibility of the host paging out guest pages, the use of H_LOCAL by an SMP guest is dangerous since the guest could possibly retain and use a stale TLB entry

Re: [PATCH 1/5] KVM: PPC: Book3S HV: Handle guest-caused machine checks on POWER7 without panicking

2012-11-23 Thread Paul Mackerras
On Fri, Nov 23, 2012 at 03:13:09PM +0100, Alexander Graf wrote: On 22.11.2012, at 10:25, Paul Mackerras wrote: + /* Do they have an SLB shadow buffer registered? */ + slb = vcpu-arch.slb_shadow.pinned_addr; + if (!slb) + return; Mind to explain this case? What

Re: [PATCH 4/5] KVM: PPC: Book3S HV: Don't give the guest RW access to RO pages

2012-11-23 Thread Paul Mackerras
On Fri, Nov 23, 2012 at 04:47:45PM +0100, Alexander Graf wrote: On 22.11.2012, at 10:28, Paul Mackerras wrote: Currently, if the guest does an H_PROTECT hcall requesting that the permissions on a HPT entry be changed to allow writing, we make the requested change even if the page is

Re: Re: Re: Re: [RFC PATCH 0/2] kvm/vmx: Output TSC offset

2012-11-23 Thread Marcelo Tosatti
On Thu, Nov 22, 2012 at 02:21:20PM +0900, Yoshihiro YUNOMAE wrote: Hi Marcelo, (2012/11/21 7:51), Marcelo Tosatti wrote: On Tue, Nov 20, 2012 at 07:36:33PM +0900, Yoshihiro YUNOMAE wrote: Hi Marcelo, Sorry for the late reply. (2012/11/17 4:15), Marcelo Tosatti wrote: On Wed, Nov 14,

Re: [PATCH 1/5] KVM: PPC: Book3S HV: Handle guest-caused machine checks on POWER7 without panicking

2012-11-23 Thread Alexander Graf
On 22.11.2012, at 10:25, Paul Mackerras wrote: Currently, if a machine check interrupt happens while we are in the guest, we exit the guest and call the host's machine check handler, which tends to cause the host to panic. Some machine checks can be triggered by the guest; for example, if

Re: [PATCH 3/5] KVM: PPC: Book3S HV: Improve handling of local vs. global TLB invalidations

2012-11-23 Thread Alexander Graf
On 22.11.2012, at 10:28, Paul Mackerras wrote: When we change or remove a HPT (hashed page table) entry, we can do either a global TLB invalidation (tlbie) that works across the whole machine, or a local invalidation (tlbiel) that only affects this core. Currently we do local invalidations

Re: [PATCH 4/5] KVM: PPC: Book3S HV: Don't give the guest RW access to RO pages

2012-11-23 Thread Alexander Graf
On 22.11.2012, at 10:28, Paul Mackerras wrote: Currently, if the guest does an H_PROTECT hcall requesting that the permissions on a HPT entry be changed to allow writing, we make the requested change even if the page is marked read-only in the host Linux page tables. This is a problem since

Re: [PATCH 3/5] KVM: PPC: Book3S HV: Improve handling of local vs. global TLB invalidations

2012-11-23 Thread Paul Mackerras
On Fri, Nov 23, 2012 at 04:43:03PM +0100, Alexander Graf wrote: On 22.11.2012, at 10:28, Paul Mackerras wrote: - With the possibility of the host paging out guest pages, the use of H_LOCAL by an SMP guest is dangerous since the guest could possibly retain and use a stale TLB entry

Re: [PATCH 1/5] KVM: PPC: Book3S HV: Handle guest-caused machine checks on POWER7 without panicking

2012-11-23 Thread Paul Mackerras
On Fri, Nov 23, 2012 at 03:13:09PM +0100, Alexander Graf wrote: On 22.11.2012, at 10:25, Paul Mackerras wrote: + /* Do they have an SLB shadow buffer registered? */ + slb = vcpu-arch.slb_shadow.pinned_addr; + if (!slb) + return; Mind to explain this case? What