[COMMIT] [WIN-GUEST-DRIVERS] viostor driver.Add memory read barrier - synch with fix for Linux guests by Michael S. Tsirkinm...@redhat.com

2009-11-01 Thread Yan Vugenfirer
repository: C:/dev/kvm-guest-drivers-windows branch: master commit b68b7671ab3dd07f7f16e819db2d4060bbaeb901 Author: Yan Vugenfirer yvuge...@redhat.com Date: Sun Nov 1 15:23:20 2009 +0200 [WIN-GUEST-DRIVERS] viostor driver.Add memory read barrier - synch with fix for Linux guests by Michael

[COMMIT] [WIN-GUEST-DRIVERS] Fix the driver version report through OID. Will fix the warning during MS tests.

2009-11-01 Thread Yan Vugenfirer
repository: C:/dev/kvm-guest-drivers-windows branch: master commit e4808e72e5d12fa97b17dfd2d1e465a6c6331e8a Author: Yan Vugenfirer yvuge...@redhat.com Date: Sun Nov 1 15:59:18 2009 +0200 [WIN-GUEST-DRIVERS] Fix the driver version report through OID. Will fix the warning during MS tests.

[COMMIT master] vmxcap: support msrs with numerical subfields

2009-11-01 Thread Avi Kivity
From: Avi Kivity a...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/kvm/scripts/vmxcap b/kvm/scripts/vmxcap index 50fb86e..93051c6 100755 --- a/kvm/scripts/vmxcap +++ b/kvm/scripts/vmxcap @@ -59,6 +59,29 @@ class Control(object): s = 'yes' print

[COMMIT master] Make vapic.S into optional rom

2009-11-01 Thread Avi Kivity
From: Gleb Natapov g...@redhat.com Signed-off-by: Gleb Natapov g...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/Makefile b/Makefile index ea568f5..acd9108 100644 --- a/Makefile +++ b/Makefile @@ -259,6 +259,7 @@ pxe-ne2k_pci.bin pxe-rtl8139.bin pxe-pcnet.bin pxe-e1000.bin

[COMMIT master] vmxcap: improve bool formatting

2009-11-01 Thread Avi Kivity
From: Avi Kivity a...@redhat.com yes/no replaces True/False. Signed-off-by: Avi Kivity a...@redhat.com diff --git a/kvm/scripts/vmxcap b/kvm/scripts/vmxcap index ec909b3..b7f58ac 100755 --- a/kvm/scripts/vmxcap +++ b/kvm/scripts/vmxcap @@ -79,7 +79,8 @@ class Misc(object): fmt

[COMMIT master] Fix qemu-kvm sigsegv at exit

2009-11-01 Thread Avi Kivity
From: Marcelo Tosatti mtosa...@redhat.com Michael reported a qemu-kvm SIGSEGV at shutdown: Program received signal SIGSEGV, Segmentation fault. [Switching to Thread 0x411d0940 (LWP 14446)] 0x0040afb4 in qemu_mod_timer (ts=0x19f0fd0, expire_time=62275467335) at

[COMMIT master] vmxcap: report MISC and EPT/VPID capabilities

2009-11-01 Thread Avi Kivity
From: Avi Kivity a...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/kvm/scripts/vmxcap b/kvm/scripts/vmxcap index 93051c6..ec909b3 100755 --- a/kvm/scripts/vmxcap +++ b/kvm/scripts/vmxcap @@ -7,6 +7,7 @@ MSR_IA32_VMX_EXIT_CTLS = 0x483 MSR_IA32_VMX_ENTRY_CTLS = 0x484

[COMMIT master] make-release: Direct upload via scp

2009-11-01 Thread Avi Kivity
From: Jan Kiszka jan.kis...@siemens.com Signed-off-by: Jan Kiszka jan.kis...@siemens.com diff --git a/scripts/make-release b/scripts/make-release index f9205e3..5fabe1a 100755 --- a/scripts/make-release +++ b/scripts/make-release @@ -91,5 +91,5 @@ tar cjf $tarball -C $tmpdir $name rm -rf

[COMMIT master] KVM: VMX: Remove vmx-msr_offset_efer

2009-11-01 Thread Avi Kivity
From: Avi Kivity a...@redhat.com This variable is used to communicate between a caller and a callee; switch to a function argument instead. Signed-off-by: Avi Kivity a...@redhat.com diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index 85f97d1..99c34f1 100644 --- a/arch/x86/kvm/vmx.c +++

[COMMIT master] KVM: VMX: move CR3/PDPTR update to vmx_set_cr3

2009-11-01 Thread Avi Kivity
From: Marcelo Tosatti mtosa...@redhat.com GUEST_CR3 is updated via kvm_set_cr3 whenever CR3 is modified from outside guest context. Similarly pdptrs are updated via load_pdptrs. Let kvm_set_cr3 perform the update, removing it from the vcpu_run fast path. Signed-off-by: Marcelo Tosatti

[COMMIT master] Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6

2009-11-01 Thread Avi Kivity
From: Avi Kivity a...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com -- To unsubscribe from this list: send the line unsubscribe kvm-commits in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

[COMMIT master] KVM: VMX: Use proper slot index for kvm_set_shared_msr

2009-11-01 Thread Avi Kivity
From: Jan Kiszka jan.kis...@siemens.com We were missing one indirection here to translate from vmx-local to x86 slot indices, and this caused subtle host crashes. Signed-off-by: Jan Kiszka jan.kis...@siemens.com Signed-off-by: Avi Kivity a...@redhat.com diff --git a/arch/x86/kvm/vmx.c

Re: [PATCH] KVM: VMX: Use proper slot index for kvm_set_shared_msr

2009-11-01 Thread Avi Kivity
On 10/29/2009 07:13 PM, Avi Kivity wrote: On 10/29/2009 06:53 PM, Jan Kiszka wrote: We were missing one indirection here to translate from vmx-local to x86 slot indices, and this caused subtle host crashes. Ahh, good catch. How did it work? And, of course, applied. Thanks. -- error

Re: block virtio excessive VIRTIO_PCI_ISR reads

2009-11-01 Thread Avi Kivity
On 10/29/2009 05:47 PM, Saul Tamari wrote: Hi, The current qemu-kvm from the git indeed adds the MSI-x capability to the virtio block device. With MSI-x enabled on the virtio block device, there aren't VIRTIO_PCI_ISR reads on the unused device. There shouldn't be VIRTIO_PCI_ISR reads on

Re: kernel bug in kvm_intel

2009-11-01 Thread Tejun Heo
Hello, Avi Kivity wrote: Only, that merge doesn't change virt/kvm or arch/x86/kvm. Tejun, anything known bad about that merge? ada3fa15 kills kvm. Nothing rings a bell at the moment. How does it kill kvm? One big difference caused by that merge is use of sparse areas near the top of

Re: kernel bug in kvm_intel

2009-11-01 Thread Avi Kivity
On 11/01/2009 12:00 PM, Tejun Heo wrote: Hello, Avi Kivity wrote: Only, that merge doesn't change virt/kvm or arch/x86/kvm. Tejun, anything known bad about that merge? ada3fa15 kills kvm. Nothing rings a bell at the moment. How does it kill kvm? One big difference caused by that

[PATCH] viostor driver.Add memory barrier - synch with fix for Linux guests by Michael S. Tsirkin m...@redhat.com

2009-11-01 Thread Vadim Rozenfeld
repository: /home/vadimr/shares/kvm-guest-drivers-windows branch: XP commit 6906acfc2d5f58df43ebc9c190e1447ff6e63a01 Author: Vadim Rozenfeldvroze...@redhat.com Date: Sun Nov 1 11:54:03 2009 +0200 [PATCH] viostor driver.Add memory read barrier - synch with fix for Linux guests by Michael

Re: kernel bug in kvm_intel

2009-11-01 Thread Tejun Heo
Hello, Avi Kivity wrote: We get a page fault immediately (next instruction) after returning from the guest when running with oprofile. The page fault address does not match anything the instruction does, so presumably it is one of the accesses the processor performs in order to service an

Re: block virtio excessive VIRTIO_PCI_ISR reads

2009-11-01 Thread Saul Tamari
You are right. After enabling MSI-x for the virtio block device I now only see VIRTIO_PCI_QUEUE_NOTIFY writes and there aren't any VIRTIO_PCI_ISR reads anymore. Thanks, Saul On Sun, Nov 1, 2009 at 11:23 AM, Avi Kivity a...@redhat.com wrote: On 10/29/2009 05:47 PM, Saul Tamari wrote: Hi,

Re: kernel bug in kvm_intel

2009-11-01 Thread Avi Kivity
On 11/01/2009 12:45 PM, Tejun Heo wrote: Hello, Avi Kivity wrote: We get a page fault immediately (next instruction) after returning from the guest when running with oprofile. The page fault address does not match anything the instruction does, so presumably it is one of the accesses the

[PATCH 00/11] KVM: Add asynchronous page fault for PV guest.

2009-11-01 Thread Gleb Natapov
KVM virtualize guest memory by means of shadow pages or HW assistance like NPT/EPT. Not all memory used by a guest is mapped into the guest address space or even present in a host memory at any given time. When vcpu tries to access memory page that is not mapped into guest address space KVM is

[PATCH 04/11] Export __get_user_pages_fast.

2009-11-01 Thread Gleb Natapov
Signed-off-by: Gleb Natapov g...@redhat.com --- arch/x86/mm/gup.c |2 ++ 1 files changed, 2 insertions(+), 0 deletions(-) diff --git a/arch/x86/mm/gup.c b/arch/x86/mm/gup.c index 71da1bc..cea0dfe 100644 --- a/arch/x86/mm/gup.c +++ b/arch/x86/mm/gup.c @@ -8,6 +8,7 @@ #include linux/mm.h

[PATCH 07/11] Retry fault before vmentry

2009-11-01 Thread Gleb Natapov
When page is swapped in it is mapped into guest memory only after guest tries to access it again and generate another fault. To save this fault we can map it immediately since we know that guest is going to access the page. Signed-off-by: Gleb Natapov g...@redhat.com ---

[PATCH 10/11] Handle async PF in non preemptable context.

2009-11-01 Thread Gleb Natapov
If async page fault is received by idle task or when preemp_count is not zero guest cannot reschedule, so make wait for page hypercall and comtinue only after a page is ready. Signed-off-by: Gleb Natapov g...@redhat.com --- arch/x86/kernel/kvm.c | 16 +++- 1 files changed, 15

[PATCH 03/11] Handle asynchronous page fault in a PV guest.

2009-11-01 Thread Gleb Natapov
Asynchronous page fault notifies vcpu that page it is trying to access is swapped out by a host. In response guest puts a task that caused the fault to sleep until page is swapped in again. When missing page is brought back into the memory guest is notified and task resumes execution.

[PATCH 01/11] Add shared memory hypercall to PV Linux guest.

2009-11-01 Thread Gleb Natapov
Add hypercall that allows guest and host to setup per cpu shared memory. Signed-off-by: Gleb Natapov g...@redhat.com --- arch/x86/include/asm/kvm_host.h |3 + arch/x86/include/asm/kvm_para.h | 11 + arch/x86/kernel/kvm.c | 82 +++

[PATCH 11/11] Send async PF when guest is not in userspace too.

2009-11-01 Thread Gleb Natapov
Signed-off-by: Gleb Natapov g...@redhat.com --- arch/x86/kvm/mmu.c | 16 ++-- 1 files changed, 6 insertions(+), 10 deletions(-) diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c index 3d33994..21ec65a 100644 --- a/arch/x86/kvm/mmu.c +++ b/arch/x86/kvm/mmu.c @@ -2358,7 +2358,7

[PATCH 09/11] Maintain preemptability count even for !CONFIG_PREEMPT kernels

2009-11-01 Thread Gleb Natapov
Do not preempt kernel. Just maintain counter to know if task can sleep. Signed-off-by: Gleb Natapov g...@redhat.com --- include/linux/hardirq.h |6 ++ include/linux/preempt.h | 22 -- kernel/sched.c |6 -- lib/kernel_lock.c |1 + 4 files

[PATCH 06/11] Inject asynchronous page fault into a guest if page is swapped out.

2009-11-01 Thread Gleb Natapov
If guest access swapped out memory do not swap it in from vcpu thread context. Setup slow work to do swapping and send async page fault to a guest. Allow async page fault injection only when guest is in user mode since otherwise guest may be in non-sleepable context and will not be able to

[PATCH 08/11] Add wait for page hypercall.

2009-11-01 Thread Gleb Natapov
We want to be able to inject async pagefault into guest event if a guest is not executing userspace code. But in this case guest may receive async page fault in non-sleepable context. In this case it will be able to make wait for page hypercall vcpu will be put to sleep until page is swapped in

[PATCH 05/11] Add get_user_pages() variant that fails if major fault is required.

2009-11-01 Thread Gleb Natapov
This patch add get_user_pages() variant that only succeeds if getting a reference to a page doesn't require major fault. Signed-off-by: Gleb Natapov g...@redhat.com --- fs/ncpfs/mmap.c|2 ++ include/linux/mm.h |5 + mm/filemap.c |3 +++ mm/memory.c| 31

[PATCH 02/11] Add handle page fault PV helper.

2009-11-01 Thread Gleb Natapov
Allow paravirtualized guest to do special handling for some page faults. Signed-off-by: Gleb Natapov g...@redhat.com --- arch/x86/include/asm/paravirt.h |7 +++ arch/x86/include/asm/paravirt_types.h |4 arch/x86/kernel/paravirt.c|8

RE: [PATCH] viostor driver.Add memory barrier - synch with fix for Linux guests by Michael S. Tsirkin m...@redhat.com

2009-11-01 Thread Yan Vugenfirer
Committed. Thanks. -Original Message- From: kvm-ow...@vger.kernel.org [mailto:kvm-ow...@vger.kernel.org] On Behalf Of Vadim Rozenfeld Sent: Sunday, November 01, 2009 12:41 PM To: kvm@vger.kernel.org Subject: [PATCH] viostor driver.Add memory barrier - synch with fix for Linux

Re: [PATCH 5/5] Fix kdump under KVM.

2009-11-01 Thread Avi Kivity
On 10/30/2009 02:23 PM, Chris Lalancette wrote: In the meantime, I've gotten the set_irq from IRQ context that Avi suggested working, and the fixing up of this IOAPIC check is the last bit to actually get kdump working. There are two problems with that: - kvm_set_irq() calls some

Re: CPU troubles with kvm 83 redhat 5.4 windows 2008 server 64 bits

2009-11-01 Thread Avi Kivity
On 10/29/2009 05:11 PM, Arnaud Maillet wrote: Hello world, I used to use Xen on my server but due to a non-patched cygwin problem I installed kvm 83 on my redhat 5.4 with the red hat rpm. I found some troubles with a windows 2008 server 64 bits guest. When I install a software like an

Re: [PATCH v2] fix qemu-kvm sigsegv at exit

2009-11-01 Thread Avi Kivity
On 10/29/2009 12:38 AM, Marcelo Tosatti wrote: This will miss an event at the very beginning of the loop (powerdown requested before we had a chance to spin up?). I think it should be fine since there will be a pending signal which will break us out of kvm_cpu_exec() before it has a chance to

Re: Interrupt Assignment on host

2009-11-01 Thread Avi Kivity
On 10/28/2009 11:16 PM, Erik Rull wrote: Hi all, after several tests it seems that the interrupt assignment on the host systems influences the kvm performance drastically. If eth0, video and usb are on seperate interrupts the perfomance is way better than if they are shared (that means on the

Re: CPU change causes hanging of .NET apps

2009-11-01 Thread Avi Kivity
On 10/28/2009 11:13 PM, Erik Rull wrote: Hi all, when changing the CPU from the default QEMU32 one to e.g. the n270 or the core2duo no .NET apps will work under Windows XP as guest. Switching back and everything is fine. The Pentium Emulation on the other side works fine! The Application

buildbot failure in qemu-kvm on default_x86_64_out_of_tree

2009-11-01 Thread qemu-kvm
The Buildbot has detected a new failure of default_x86_64_out_of_tree on qemu-kvm. Full details are available at: http://buildbot.b1-systems.de/qemu-kvm/builders/default_x86_64_out_of_tree/builds/74 Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/ Buildslave for this Build: b1_qemu_kvm_1

buildbot failure in qemu-kvm on default_i386_out_of_tree

2009-11-01 Thread qemu-kvm
The Buildbot has detected a new failure of default_i386_out_of_tree on qemu-kvm. Full details are available at: http://buildbot.b1-systems.de/qemu-kvm/builders/default_i386_out_of_tree/builds/73 Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/ Buildslave for this Build: b1_qemu_kvm_2

vga_arb warning [was: mmotm 2009-11-01-10-01 uploaded]

2009-11-01 Thread Jiri Slaby
On 11/01/2009 07:07 PM, a...@linux-foundation.org wrote: The mm-of-the-moment snapshot 2009-11-01-10-01 has been uploaded to Hi, I got the following warning while booting an image in qemu-kvm: WARNING: at fs/attr.c:158 notify_change+0x2da/0x310() Hardware name: Modules linked in: Pid: 1, comm:

PCI Passthrough and graphic cards ...

2009-11-01 Thread Michael McStarfighter
Hi, I've got a Kubuntu host and two dedicated graphic cards. Now I want to create a Windows Seven guest for KVM and give the guest one of the graphic cards (it isn't in business on my host). The informations I got is only that PCI passthrough is possible, but I've got no more details about it

Re: [PATCH 08/27] Add SLB switching code for entry/exit

2009-11-01 Thread Michael Neuling
This is the really low level of guest entry/exit code. Book3s_64 has an SLB, which stores all ESID - VSID mappings we're currently aware of. The segments in the guest differ from the ones on the host, so we need to switch the SLB to tell the MMU that we're in a new context. So we store

Re: [PATCH 11/27] Add book3s_64 Host MMU handling

2009-11-01 Thread Michael Neuling
snip +static void invalidate_pte(struct hpte_cache *pte) +{ + dprintk_mmu(KVM: Flushing SPT %d: 0x%llx (0x%llx) - 0x%llx\n, + i, pte-pte.eaddr, pte-pte.vpage, pte-host_va); + + ppc_md.hpte_invalidate(pte-slot, pte-host_va, +MMU_PAGE_4K,

Re: CPU change causes hanging of .NET apps

2009-11-01 Thread Erik Rull
Hi Avi, the Host CPU is a Intel Core2Duo - VT capable and enabled! Best regards, Erik Avi Kivity wrote: On 10/28/2009 11:13 PM, Erik Rull wrote: Hi all, when changing the CPU from the default QEMU32 one to e.g. the n270 or the core2duo no .NET apps will work under Windows XP as guest.

Re: [PATCH 01/11] Add shared memory hypercall to PV Linux guest.

2009-11-01 Thread Rik van Riel
On 11/01/2009 06:56 AM, Gleb Natapov wrote: Add hypercall that allows guest and host to setup per cpu shared memory. While it is pretty obvious that we should implement the asynchronous pagefaults for KVM, so a swap-in of a page the host swapped out does not stall the entire virtual CPU, I

Re: CPU change causes hanging of .NET apps

2009-11-01 Thread Avi Kivity
On 11/02/2009 01:45 AM, Erik Rull wrote: Hi Avi, Please don't top-post. the Host CPU is a Intel Core2Duo - VT capable and enabled! The problem is that one of the flags that -cpu core2duo enables is implemented incorrectly, so it leads to .net breakage. These flags are pni, lm, nx,

Re: [PATCH 01/11] Add shared memory hypercall to PV Linux guest.

2009-11-01 Thread Gleb Natapov
On Sun, Nov 01, 2009 at 11:27:15PM -0500, Rik van Riel wrote: On 11/01/2009 06:56 AM, Gleb Natapov wrote: Add hypercall that allows guest and host to setup per cpu shared memory. While it is pretty obvious that we should implement the asynchronous pagefaults for KVM, so a swap-in of a page

Re: [PATCH 11/27] Add book3s_64 Host MMU handling

2009-11-01 Thread Michael Neuling
snip +static void invalidate_pte(struct hpte_cache *pte) +{ + dprintk_mmu(KVM: Flushing SPT %d: 0x%llx (0x%llx) - 0x%llx\n, + i, pte-pte.eaddr, pte-pte.vpage, pte-host_va); + + ppc_md.hpte_invalidate(pte-slot, pte-host_va, +MMU_PAGE_4K,