[Qemu-devel] [PATCH v2] ivshmem: add a new PIO BAR3(Doorbell) besides MMIO BAR0 to reduce notification time

2011-11-17 Thread zanghongyong
From: Hongyong Zang This patch, adds a PIO BAR3 for guest notifying qemu. And we find the new notification way of PIO BAR3 reduces 30% time in comparison with the original MMIO BAR0 way. Signed-off-by: Hongyong Zang --- hw/ivshmem.c | 24 ++-- kvm-all.c| 23 ++

Re: [RFC] [ver3 PATCH 3/6] virtio_net: virtio_net driver changes

2011-11-17 Thread Sasha Levin
On Fri, 2011-11-18 at 01:08 +, Ben Hutchings wrote: > On Fri, 2011-11-11 at 18:34 +0530, Krishna Kumar wrote: > > Changes for multiqueue virtio_net driver. > [...] > > @@ -677,25 +730,35 @@ static struct rtnl_link_stats64 *virtnet > > { > > struct virtnet_info *vi = netdev_priv(dev); > >

Re: [RFC] [ver3 PATCH 3/6] virtio_net: virtio_net driver changes

2011-11-17 Thread Ben Hutchings
On Fri, 2011-11-11 at 18:34 +0530, Krishna Kumar wrote: > Changes for multiqueue virtio_net driver. [...] > @@ -677,25 +730,35 @@ static struct rtnl_link_stats64 *virtnet > { > struct virtnet_info *vi = netdev_priv(dev); > int cpu; > - unsigned int start; > > for_each_possi

Re: [net-next-2.6 PATCH 0/6 v4] macvlan: MAC Address filtering support for passthru mode

2011-11-17 Thread Ben Hutchings
On Thu, 2011-11-17 at 16:32 -0800, Greg Rose wrote: > On 11/17/2011 4:15 PM, Ben Hutchings wrote: > > Sorry to come to this rather late. > > > > On Tue, 2011-11-08 at 23:55 -0800, Roopa Prabhu wrote: > > [...] > >> v2 -> v3 > >> - Moved set and get filter ops from rtnl_link_ops to netdev_ops > >>

Re: [net-next-2.6 PATCH 0/6 v4] macvlan: MAC Address filtering support for passthru mode

2011-11-17 Thread Greg Rose
On 11/17/2011 4:15 PM, Ben Hutchings wrote: Sorry to come to this rather late. On Tue, 2011-11-08 at 23:55 -0800, Roopa Prabhu wrote: [...] v2 -> v3 - Moved set and get filter ops from rtnl_link_ops to netdev_ops - Support for SRIOV VFs. [Note: The get filters msg (in the way current

Re: [net-next-2.6 PATCH 1/6 v4] rtnetlink: Netlink interface for setting MAC and VLAN filters

2011-11-17 Thread Ben Hutchings
On Tue, 2011-11-08 at 23:55 -0800, Roopa Prabhu wrote: > From: Roopa Prabhu > > This patch introduces the following netlink interface to set > MAC and VLAN filters on an network interface. It can be used to > set RX filter on any network interface (if supported by the driver) and > also on a SRIO

Re: [net-next-2.6 PATCH 0/6 v4] macvlan: MAC Address filtering support for passthru mode

2011-11-17 Thread Ben Hutchings
Sorry to come to this rather late. On Tue, 2011-11-08 at 23:55 -0800, Roopa Prabhu wrote: [...] > v2 -> v3 > - Moved set and get filter ops from rtnl_link_ops to netdev_ops > - Support for SRIOV VFs. > [Note: The get filters msg (in the way current get rtnetlink handles > it) might

[PATCH 2/4] client.virt.tests: trans_hugepage.defrag - cleanups + move common area

2011-11-17 Thread Lucas Meneghel Rodrigues
1) Removed unused imports 2) Trimmed down error message 3) Moved to the common area Signed-off-by: Lucas Meneghel Rodrigues --- client/tests/kvm/tests/trans_hugepage_defrag.py | 86 --- client/virt/tests/trans_hugepage_defrag.py | 86 +++ 2 files

[PATCH 4/4] virt.virt_test_setup: Improve logging of the THP test setup

2011-11-17 Thread Lucas Meneghel Rodrigues
Make the utils.run("pgrep khugepaged") silent, also, print info on what are the config values for THP and what are the tests executed with khugepaged. This gives a much better idea of what is going on with the test. Signed-off-by: Lucas Meneghel Rodrigues --- client/virt/virt_test_setup.py | 3

[PATCH 3/4] client.virt.tests: trans_hugepage.base - cleanups + move common area

2011-11-17 Thread Lucas Meneghel Rodrigues
1) Removed unused imports 2) Removed unused variables 3) Moved to the common area Signed-off-by: Lucas Meneghel Rodrigues --- client/tests/kvm/tests/trans_hugepage.py | 127 -- client/virt/tests/trans_hugepage.py | 127 ++ 2 files ch

[PATCH 1/4] client.virt.tests: trans_hugepage.swapping: cleanups + move common area

2011-11-17 Thread Lucas Meneghel Rodrigues
1) Remove unused imports 2) Change mistaken raise statement 3) Move it to the common test area Signed-off-by: Lucas Meneghel Rodrigues --- client/tests/kvm/tests/trans_hugepage_swapping.py | 115 - client/virt/tests/trans_hugepage_swapping.py | 113

[PATCH 0/4] virt tests: Improvements to trans_hugepage subtest

2011-11-17 Thread Lucas Meneghel Rodrigues
Miscelaneous code cleanups and better logging for the operations executed during THP test setup. Lucas Meneghel Rodrigues (4): client.virt.tests: trans_hugepage.swapping: cleanups + move common area client.virt.tests: trans_hugepage.defrag - cleanups + move common area client.virt.te

RE: [net-next-2.6 PATCH 0/8 RFC v2] macvlan: MAC Address filtering support for passthru mode

2011-11-17 Thread Ben Hutchings
On Tue, 2011-10-25 at 08:59 -0700, Rose, Gregory V wrote: > > -Original Message- > > From: Michael S. Tsirkin [mailto:m...@redhat.com] > > Sent: Tuesday, October 25, 2011 8:46 AM > > To: Roopa Prabhu > > Cc: net...@vger.kernel.org; s...@us.ibm.com; dragos.tatu...@gmail.com; > > a...@arndb.d

RE: [net-next-2.6 PATCH 0/8 RFC v2] macvlan: MAC Address filtering support for passthru mode

2011-11-17 Thread Ben Hutchings
On Thu, 2011-10-20 at 13:43 -0700, Rose, Gregory V wrote: > > -Original Message- > > From: Roopa Prabhu [mailto:ropra...@cisco.com] [...] > > Moving the ops to netdev should be trivial. You probably want the ops to > > work on the VF via the PF, like the existing ndo_set_vf_mac etc. > > Th

[PATCH v2] KVM: PPC: booke: Improve timer register emulation

2011-11-17 Thread Scott Wood
Decrementers are now properly driven by TCR/TSR, and the guest has full read/write access to these registers. The decrementer keeps ticking (and setting the TSR bit) regardless of whether the interrupts are enabled with TCR. The decrementer stops at zero, rather than going negative. Decrementers

Re: [RFC PATCH] vfio: VFIO Driver core framework

2011-11-17 Thread Scott Wood
On Thu, Nov 17, 2011 at 01:22:17PM -0700, Alex Williamson wrote: > On Wed, 2011-11-16 at 11:52 -0500, Konrad Rzeszutek Wilk wrote: > > On Fri, Nov 11, 2011 at 03:10:56PM -0700, Alex Williamson wrote: > > What would be the return value if somebody tried to unmask an edge one? > > Should that be docu

Re: [RFC PATCH] vfio: VFIO Driver core framework

2011-11-17 Thread Alex Williamson
On Wed, 2011-11-16 at 11:47 -0600, Scott Wood wrote: > On 11/11/2011 04:10 PM, Alex Williamson wrote: > > > > Thanks Konrad! Comments inline. > > > > On Fri, 2011-11-11 at 12:51 -0500, Konrad Rzeszutek Wilk wrote: > >> On Thu, Nov 03, 2011 at 02:12:24PM -0600, Alex Williamson wrote: > >>> +When

Re: [RFC PATCH] vfio: VFIO Driver core framework

2011-11-17 Thread Alex Williamson
On Wed, 2011-11-16 at 11:52 -0500, Konrad Rzeszutek Wilk wrote: > On Fri, Nov 11, 2011 at 03:10:56PM -0700, Alex Williamson wrote: > > > > + > > > > +Regions are described by a struct vfio_region_info, which is retrieved > > > > by > > > > +using the GET_REGION_INFO ioctl with vfio_region_info.in

Re: kvm-tools: can't seem to set guest_mac and KVM_GET_SUPPORTED_CPUID failed.

2011-11-17 Thread Avi Kivity
On 11/17/2011 07:13 PM, David Evensky wrote: > func 000d ind 0001 flags 0001 -> 0001 > > func 8001 ind flags -> 0001 > 28100800 > func 000d ind 0003 flags 0001 -> > 0

Re: kvm-tools: can't seem to set guest_mac and KVM_GET_SUPPORTED_CPUID failed.

2011-11-17 Thread David Evensky
Avi, sure: evensky@waltz:~$ gcc supported-cpuid.c -o supported-cpuid evensky@waltz:~$ ./supported-cpuid Returned entries: 37 func ind flags -> 000d 756e6547 6c65746e 49656e69 func 0001 ind flags -> 000206a7 01100800 16b82203 0f8bfb

Re: kvm-tools: can't seem to set guest_mac and KVM_GET_SUPPORTED_CPUID failed.

2011-11-17 Thread Avi Kivity
On 11/17/2011 06:29 PM, David Evensky wrote: > Avi, > > evensky@waltz:~/megatux/vmatic$ perl -e 'for $cnt (1..1){ $o=`taskset > 0x01 ./4sasha`; chomp($o); $histogram{$o}++}; for $o (sort keys > %histogram){print "$o: $histogram{$o}\n"}' > KVM_GET_SUPPORTED_CPUID returned -1 with errno 7: 3 >

Re: kvm-tools: can't seem to set guest_mac and KVM_GET_SUPPORTED_CPUID failed.

2011-11-17 Thread David Evensky
Avi, evensky@waltz:~/megatux/vmatic$ perl -e 'for $cnt (1..1){ $o=`taskset 0x01 ./4sasha`; chomp($o); $histogram{$o}++}; for $o (sort keys %histogram){print "$o: $histogram{$o}\n"}' KVM_GET_SUPPORTED_CPUID returned -1 with errno 7: 3 Returned entries: 31: 9995 Returned entries: 32: 1 Return

Re: kvm-tools: can't seem to set guest_mac and KVM_GET_SUPPORTED_CPUID failed.

2011-11-17 Thread Avi Kivity
On 11/17/2011 06:12 PM, David Evensky wrote: > > evensky@waltz:~/megatux/vmatic$ perl -e 'for $cnt (1..10){ $o=`./4sasha`; > chomp($o); $histogram{$o}++}; for $o (keys %histogram){print "$o: > $histogram{$o}\n"}' > Returned entries: 31: 99987 > Returned entries: 56: 1 > KVM_GET_SUPPORTED_CPUI

Re: kvm-tools: can't seem to set guest_mac and KVM_GET_SUPPORTED_CPUID failed.

2011-11-17 Thread Sasha Levin
On Thu, 2011-11-17 at 08:12 -0800, David Evensky wrote: > > evensky@waltz:~/megatux/vmatic$ perl -e 'for $cnt (1..10){ $o=`./4sasha`; > chomp($o); $histogram{$o}++}; for $o (keys %histogram){print "$o: > $histogram{$o}\n"}' > Returned entries: 31: 99987 > Returned entries: 56: 1 > KVM_GET_SU

Re: kvm-tools: can't seem to set guest_mac and KVM_GET_SUPPORTED_CPUID failed.

2011-11-17 Thread David Evensky
evensky@waltz:~/megatux/vmatic$ perl -e 'for $cnt (1..10){ $o=`./4sasha`; chomp($o); $histogram{$o}++}; for $o (keys %histogram){print "$o: $histogram{$o}\n"}' Returned entries: 31: 99987 Returned entries: 56: 1 KVM_GET_SUPPORTED_CPUID returned -1 with errno 7: 8 Returned entries: 37: 4 \d

Re: kvm-tools: can't seem to set guest_mac and KVM_GET_SUPPORTED_CPUID failed.

2011-11-17 Thread David Evensky
On Thu, Nov 17, 2011 at 08:07:35AM +0200, Sasha Levin wrote: > On Wed, 2011-11-16 at 16:42 -0800, David Evensky wrote: > > > > ... > This should be '-n mode=tap,guest_mac=00:11:11:11:11:11' > ... Thanks! > > > > Also, when I start the guest I sometimes get the following error message: > > > >

Re: kvm-tools: can't seem to set guest_mac and KVM_GET_SUPPORTED_CPUID failed.

2011-11-17 Thread Avi Kivity
On 11/17/2011 05:52 PM, Sasha Levin wrote: > On Thu, 2011-11-17 at 07:50 -0800, David Evensky wrote: > > It prints 'Returned entries: 31' > > \dae > > Thats the OK scenario, could you run it several times to see if you can > trigger it to print something else? Maybe with 'taskset' to get it to run

Re: kvm-tools: can't seem to set guest_mac and KVM_GET_SUPPORTED_CPUID failed.

2011-11-17 Thread Sasha Levin
On Thu, 2011-11-17 at 07:50 -0800, David Evensky wrote: > It prints 'Returned entries: 31' > \dae Thats the OK scenario, could you run it several times to see if you can trigger it to print something else? -- Sasha. -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body

Re: kvm-tools: can't seem to set guest_mac and KVM_GET_SUPPORTED_CPUID failed.

2011-11-17 Thread David Evensky
It prints 'Returned entries: 31' \dae On Thu, Nov 17, 2011 at 05:43:49PM +0200, Sasha Levin wrote: > On Thu, 2011-11-17 at 07:38 -0800, David Evensky wrote: > > On Thu, Nov 17, 2011 at 08:56:38AM +0200, Sasha Levin wrote: > > > On Thu, 2011-11-17 at 08:53 +0200, Pekka Enberg wrote: > > > > On Thu

Re: kvm-tools: can't seem to set guest_mac and KVM_GET_SUPPORTED_CPUID failed.

2011-11-17 Thread Sasha Levin
On Thu, 2011-11-17 at 07:38 -0800, David Evensky wrote: > On Thu, Nov 17, 2011 at 08:56:38AM +0200, Sasha Levin wrote: > > On Thu, 2011-11-17 at 08:53 +0200, Pekka Enberg wrote: > > > On Thu, Nov 17, 2011 at 8:07 AM, Sasha Levin > > > wrote: > > > >> Also, when I start the guest I sometimes get t

Re: kvm-tools: can't seem to set guest_mac and KVM_GET_SUPPORTED_CPUID failed.

2011-11-17 Thread David Evensky
On Thu, Nov 17, 2011 at 08:56:38AM +0200, Sasha Levin wrote: > On Thu, 2011-11-17 at 08:53 +0200, Pekka Enberg wrote: > > On Thu, Nov 17, 2011 at 8:07 AM, Sasha Levin > > wrote: > > >> Also, when I start the guest I sometimes get the following error message: > > > David, which host kernel d

Re: [patch 2/2] [PATCH] kvm-s390: pseudo page fault support

2011-11-17 Thread Christian Borntraeger
>> +VCPU_EVENT(vcpu, 5, "synchronous page fault at guest %lx user %lx", >> + current->thread.gmap_addr, uaddr); >> + >> +fault_in_pages_readable((char __user *)uaddr, PAGE_SIZE); >> +} > > These may make sense as tracepoints (this is what x86 does). The > kvm_stat script kno

Re: [Qemu-devel] [PATCH] ivshmem: use PIO for BAR0(Doorbell) instead of MMIO to reduce notification time

2011-11-17 Thread Avi Kivity
On 11/17/2011 04:48 PM, Sasha Levin wrote: > On Thu, 2011-11-17 at 16:36 +0200, Avi Kivity wrote: > > On 11/14/2011 05:56 AM, zanghongy...@huawei.com wrote: > > > From: Hongyong Zang > > > > > > Ivshmem(nahanni) is a mechanism for sharing host memory with VMs running > > > on the same host. Curre

Re: [patch 2/2] [PATCH] kvm-s390: pseudo page fault support

2011-11-17 Thread Carsten Otte
On 17.11.2011 15:18, Avi Kivity wrote: Backports to distros, even if you happened to name my favourite, do not override upstream considerations. "as soon as we find time" doesn't inspire confidence either. If async_pf.c is better, let's do that (btw async_pf.c did not find itself in generic cod

Re: [Qemu-devel] [PATCH] ivshmem: use PIO for BAR0(Doorbell) instead of MMIO to reduce notification time

2011-11-17 Thread Sasha Levin
On Thu, 2011-11-17 at 16:36 +0200, Avi Kivity wrote: > On 11/14/2011 05:56 AM, zanghongy...@huawei.com wrote: > > From: Hongyong Zang > > > > Ivshmem(nahanni) is a mechanism for sharing host memory with VMs running on > > the same host. Currently, guest notifies qemu by reading or writing ivshmem

Re: [Qemu-devel] [PATCH] ivshmem: use PIO for BAR0(Doorbell) instead of MMIO to reduce notification time

2011-11-17 Thread Avi Kivity
On 11/14/2011 05:56 AM, zanghongy...@huawei.com wrote: > From: Hongyong Zang > > Ivshmem(nahanni) is a mechanism for sharing host memory with VMs running on > the same host. Currently, guest notifies qemu by reading or writing ivshmem > device's PCI MMIO BAR0(Doorbell). > > This patch, changes t

Re: [PATCH 3.2] Revert "KVM: PPC: Add support for explicit HIOR setting"

2011-11-17 Thread Avi Kivity
On 11/17/2011 04:26 PM, Alexander Graf wrote: > This reverts commit a15bd354f083f20f257db450488db52ac27df439. > > It exceeded the padding on the SREGS struct, rendering the ABI > backwards-incompatible. > > Thanks, applied and queued for 3.2. -- error compiling committee.c: too many arguments to

[PATCH 3.2] Revert "KVM: PPC: Add support for explicit HIOR setting"

2011-11-17 Thread Alexander Graf
This reverts commit a15bd354f083f20f257db450488db52ac27df439. It exceeded the padding on the SREGS struct, rendering the ABI backwards-incompatible. Conflicts: arch/powerpc/kvm/powerpc.c include/linux/kvm.h --- arch/powerpc/include/asm/kvm.h|8 arch/powerpc/

Re: [patch 2/2] [PATCH] kvm-s390: pseudo page fault support

2011-11-17 Thread Avi Kivity
On 11/17/2011 03:38 PM, Carsten Otte wrote: > >>> +init = kzalloc(sizeof(*init), GFP_ATOMIC); >>> +if (!init) >>> +return; >>> + >>> +done = kzalloc(sizeof(*done), GFP_ATOMIC); >>> +if (!done) >>> +goto out_init; >>> + >>> +event = kzalloc(sizeof(*event), GFP_ATO

[PATCH v2 4/4] kvm tools: Add event idx support to virtio-blk

2011-11-17 Thread Sasha Levin
Signed-off-by: Sasha Levin --- tools/kvm/virtio/blk.c |7 +-- 1 files changed, 5 insertions(+), 2 deletions(-) diff --git a/tools/kvm/virtio/blk.c b/tools/kvm/virtio/blk.c index ed4e099..9495f28 100644 --- a/tools/kvm/virtio/blk.c +++ b/tools/kvm/virtio/blk.c @@ -93,7 +93,8 @@ void virti

[PATCH v2 3/4] kvm tools: Support event idx in virtio-net

2011-11-17 Thread Sasha Levin
Support event idx both when using vhost and when using simple TAP mode. I did simple TCP stream performance test with vhost, and it showed another 9% increase over regular vhost mode. Signed-off-by: Sasha Levin --- tools/kvm/virtio/net.c | 12 1 files changed, 8 insertions(+), 4

[PATCH v2 2/4] kvm tools: Prepare support for VIRTIO_RING_F_EVENT_IDX

2011-11-17 Thread Sasha Levin
This patch is the base for enabling support for event index feature in the virtio spec. We do so by updating and evaluating the used/avail event idx in the virtio ring functions. Actual usage of this flag is in the following patches. The results are less notifications between the guest and host

[PATCH v2 1/4] kvm tools: Add '--no-dhcp' to disable kernel DHCP

2011-11-17 Thread Sasha Levin
This new option disables the kernel DHCP which runs when starting a custom rootfs. This is useful when we want to start a rootfs but are using a network other than the usermode IP proxy (a network which doesn't provide DHCP). Signed-off-by: Sasha Levin --- tools/kvm/builtin-run.c |9 +++

Re: [PATCH 1/4] kvm tools: Support VIRTIO_RING_F_EVENT_IDX

2011-11-17 Thread Pekka Enberg
> On Thu, 2011-11-17 at 15:24 +0200, Pekka Enberg wrote: >> On Thu, Nov 17, 2011 at 3:04 PM, Sasha Levin wrote: >> > Support the event index feature in the virtio spec. >> > >> > The results are less notifications between the guest and host, and in >> > result faster operation of the virt queues.

Re: [patch 2/2] [PATCH] kvm-s390: pseudo page fault support

2011-11-17 Thread Carsten Otte
On 17.11.2011 14:18, Avi Kivity wrote: + copy_from_guest(vcpu,&pfault_token, vcpu->arch.pfault_token, + 8); Missing error check? Good catch, will fix. + init = kzalloc(sizeof(*init), GFP_ATOMIC); + if (!init) + return; + + done = kz

Re: [PATCH 1/4] kvm tools: Support VIRTIO_RING_F_EVENT_IDX

2011-11-17 Thread Sasha Levin
On Thu, 2011-11-17 at 15:24 +0200, Pekka Enberg wrote: > On Thu, Nov 17, 2011 at 3:04 PM, Sasha Levin wrote: > > Support the event index feature in the virtio spec. > > > > The results are less notifications between the guest and host, and in > > result faster operation of the virt queues. > > > >

Re: [PATCH 1/4] kvm tools: Support VIRTIO_RING_F_EVENT_IDX

2011-11-17 Thread Pekka Enberg
On Thu, Nov 17, 2011 at 3:04 PM, Sasha Levin wrote: > Support the event index feature in the virtio spec. > > The results are less notifications between the guest and host, and in > result faster operation of the virt queues. > > Signed-off-by: Sasha Levin What's this patch doing? There's no men

Re: [patch 2/2] [PATCH] kvm-s390: pseudo page fault support

2011-11-17 Thread Avi Kivity
On 11/17/2011 01:19 PM, Carsten Otte wrote: > From: Carsten Otte > > This patch adds support for pseudo page faults. The corresponding > interface is implemented according to the documentation in CP > programming services. > Diagnose 258 allows to register compare and check masks for pseudo > page

[PATCH 3/4] kvm tools: Support event idx in virtio-net

2011-11-17 Thread Sasha Levin
Support event idx both when using vhost and when using simple TAP mode. I did simple TCP stream performance test with vhost, and it showed another 9% increase over regular vhost mode. Signed-off-by: Sasha Levin --- tools/kvm/virtio/net.c | 12 1 files changed, 8 insertions(+), 4

[PATCH 4/4] kvm tool: Add event idx support to virtio-blk

2011-11-17 Thread Sasha Levin
Signed-off-by: Sasha Levin --- tools/kvm/virtio/blk.c |7 +-- 1 files changed, 5 insertions(+), 2 deletions(-) diff --git a/tools/kvm/virtio/blk.c b/tools/kvm/virtio/blk.c index ed4e099..9495f28 100644 --- a/tools/kvm/virtio/blk.c +++ b/tools/kvm/virtio/blk.c @@ -93,7 +93,8 @@ void virti

[PATCH 2/4] kvm tools: Add '--no-dhcp' to disable kernel DHCP

2011-11-17 Thread Sasha Levin
This new option disables the kernel DHCP which runs when starting a custom rootfs. This is useful when we want to start a rootfs but are using a network other than the usermode IP proxy (a network which doesn't provide DHCP). Signed-off-by: Sasha Levin --- tools/kvm/builtin-run.c |9 +++

[PATCH 1/4] kvm tools: Support VIRTIO_RING_F_EVENT_IDX

2011-11-17 Thread Sasha Levin
Support the event index feature in the virtio spec. The results are less notifications between the guest and host, and in result faster operation of the virt queues. Signed-off-by: Sasha Levin --- tools/kvm/include/kvm/virtio.h |7 +++ 1 files changed, 7 insertions(+), 0 deletions(-) d

[PATCH] KVM test: Remove monotonic_time.tsc from the list of tests

2011-11-17 Thread Lucas Meneghel Rodrigues
The TSC is unstable on guests, hence there's no guarantee that this test will pass, it may pass or fail. Therefore, let's just remove it from the config. CC: Avi Kivity Signed-off-by: Lucas Meneghel Rodrigues --- .../virt/autotest_control/monotonic_time.control |3 --- 1 files changed, 0

Re: [RFC PATCH] kvm tools, qcow: Add the support for copy-on-write clusters

2011-11-17 Thread Pekka Enberg
Hi, (I'm Cc'ing Prasad too.) On Thu, Nov 17, 2011 at 9:50 AM, Lan Tianyu wrote: > When meeting request to write the cluster without copied flag, > allocate a new cluster and write original data with modification > to the new cluster. This also can add support for the writing > operation of the q

Re: [Qemu-devel] [PATCH] ivshmem: use PIO for BAR0(Doorbell) instead of MMIO to reduce notification time

2011-11-17 Thread Zang Hongyong
于 2011/11/16,星期三 2:43, Cam Macdonell 写道: On Sun, Nov 13, 2011 at 8:56 PM, wrote: From: Hongyong Zang Ivshmem(nahanni) is a mechanism for sharing host memory with VMs running on the same host. Currently, guest notifies qemu by reading or writing ivshmem device's PCI MMIO BAR0(Doorbell). This

Re: [patch 3/4] [PATCH] kvm: Fix tprot locking

2011-11-17 Thread Martin Schwidefsky
On Thu, 17 Nov 2011 12:15:52 +0100 Martin Schwidefsky wrote: > On Thu, 17 Nov 2011 12:27:41 +0200 > Avi Kivity wrote: > > > On 11/17/2011 12:00 PM, Carsten Otte wrote: > > > From: Christian Borntraeger > > > > > > There is a potential host deadlock in the tprot intercept handling. > > > We mu

[patch 2/2] [PATCH] kvm-s390: pseudo page fault support

2011-11-17 Thread Carsten Otte
From: Carsten Otte This patch adds support for pseudo page faults. The corresponding interface is implemented according to the documentation in CP programming services. Diagnose 258 allows to register compare and check masks for pseudo page faults, and the guest can cancel these masks again. For

[patch 0/2] kvm-s390: asnychronous page faults

2011-11-17 Thread Carsten Otte
Hi Avi, these patches implement asynchronous page faults for kvm on s390. Sorry for being slower on sending patches than you're reviewing, I guess these will answer your question on __gmap_fault ;-). I think we should push both of these via Martin, his patch alone would break kvm on s390, mine alo

[patch 1/2] [PATCH] kvm: nowait retry for asynchronous page faults

2011-11-17 Thread Carsten Otte
From: Martin Schwidefsky Add FAULT_FLAG_RETRY_NOWAIT to the fault flags if the host is processing a guest fault. In case of a fault retry exit sie64a() with the gmap_fault indication set. This makes it possible to handle asynchronous page faults without the need for mm notifiers. Signed-off-by:

Re: [patch 3/4] [PATCH] kvm: Fix tprot locking

2011-11-17 Thread Martin Schwidefsky
On Thu, 17 Nov 2011 12:27:41 +0200 Avi Kivity wrote: > On 11/17/2011 12:00 PM, Carsten Otte wrote: > > From: Christian Borntraeger > > > > There is a potential host deadlock in the tprot intercept handling. > > We must not hold the mmap semaphore while resolving the guest > > address. If usersp

Re: [patch 0/4] kvm-s390 patches

2011-11-17 Thread Avi Kivity
On 11/17/2011 12:00 PM, Carsten Otte wrote: > Hi Avi, > > these patches are bugfixes for kvm on s390. Could you please apply > them? > All applied, thanks. Patch 2 had rejects (you didn't have the diagnose 0x10 patch in your tree), it should be good, but please double check kvm.git next. Should

Re: [patch 3/4] [PATCH] kvm: Fix tprot locking

2011-11-17 Thread Avi Kivity
On 11/17/2011 12:00 PM, Carsten Otte wrote: > From: Christian Borntraeger > > There is a potential host deadlock in the tprot intercept handling. > We must not hold the mmap semaphore while resolving the guest > address. If userspace is remapping, then the memory detection in > the guest is broke

[PATCH 1/2] KVM: Don't fail KVM_GET_SUPPORTED_CPUID if nent is just right

2011-11-17 Thread Sasha Levin
If we pass just enough entries to KVM_GET_SUPPORTED_CPUID, we would still fail with -E2BIG due to wrong comparisons. Cc: Avi Kivity Cc: Marcelo Tosatti Signed-off-by: Sasha Levin --- arch/x86/kvm/x86.c | 12 ++-- 1 files changed, 6 insertions(+), 6 deletions(-) diff --git a/arch/x86

[PATCH 2/2] KVM: Correct documentation of KVM_GET_SUPPORTED_CPUID

2011-11-17 Thread Sasha Levin
If the amount of entries available passed to KVM_GET_SUPPORTED_CPUID is too big we don't fail, we just adjust it to the amount actually needed and fill the entries. Cc: Avi Kivity Cc: Marcelo Tosatti Signed-off-by: Sasha Levin --- Documentation/virtual/kvm/api.txt |7 +++ 1 files chang

Re: [patch 2/4] [PATCH] kvm-s390: handle SIGP sense running intercepts.

2011-11-17 Thread Christian Borntraeger
On 17/11/11 11:15, Avi Kivity wrote: > On 11/17/2011 12:00 PM, Carsten Otte wrote: >> From: Cornelia Huck >> >> SIGP sense running may cause an intercept on higher level >> virtualization, so handle it by checking the CPUSTAT_RUNNING flag. >> > > What does "higher level virtualization" mean? Run

Re: [patch 2/4] [PATCH] kvm-s390: handle SIGP sense running intercepts.

2011-11-17 Thread Avi Kivity
On 11/17/2011 12:00 PM, Carsten Otte wrote: > From: Cornelia Huck > > SIGP sense running may cause an intercept on higher level > virtualization, so handle it by checking the CPUSTAT_RUNNING flag. > What does "higher level virtualization" mean? -- error compiling committee.c: too many arguments

Re: kvm-tools: can't seem to set guest_mac and KVM_GET_SUPPORTED_CPUID failed.

2011-11-17 Thread Sasha Levin
On Thu, 2011-11-17 at 11:04 +0200, Avi Kivity wrote: > On 11/17/2011 08:56 AM, Sasha Levin wrote: > > On Thu, 2011-11-17 at 08:53 +0200, Pekka Enberg wrote: > > > On Thu, Nov 17, 2011 at 8:07 AM, Sasha Levin > > > wrote: > > > >> Also, when I start the guest I sometimes get the following error >

[patch 3/4] [PATCH] kvm: Fix tprot locking

2011-11-17 Thread Carsten Otte
From: Christian Borntraeger There is a potential host deadlock in the tprot intercept handling. We must not hold the mmap semaphore while resolving the guest address. If userspace is remapping, then the memory detection in the guest is broken anyway so we can safely separate the address transla

[patch 1/4] [PATCH] kvm-s390: Fix RUNNING flag misinterpretation.

2011-11-17 Thread Carsten Otte
From: Cornelia Huck CPUSTAT_RUNNING was implemented signifying that a vcpu is not stopped. This is not, however, what the architecture says: RUNNING should be set when the host is acting on the behalf of the guest operating system. CPUSTAT_RUNNING has been changed to be set in kvm_arch_vcpu_load

[patch 0/4] kvm-s390 patches

2011-11-17 Thread Carsten Otte
Hi Avi, these patches are bugfixes for kvm on s390. Could you please apply them? thanks, Carsten -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

[patch 4/4] [PATCH] kvm: announce SYNC_MMU

2011-11-17 Thread Carsten Otte
From: Christian Borntraeger KVM on s390 always had a sync mmu. Any mapping change in userspace mapping was always reflected immediately in the guest mapping. - In older code the guest mapping was just an offset - In newer code the last level page table is shared Signed-off-by: Christian Borntra

[patch 2/4] [PATCH] kvm-s390: handle SIGP sense running intercepts.

2011-11-17 Thread Carsten Otte
From: Cornelia Huck SIGP sense running may cause an intercept on higher level virtualization, so handle it by checking the CPUSTAT_RUNNING flag. Signed-off-by: Cornelia Huck Signed-off-by: Carsten Otte --- arch/s390/include/asm/kvm_host.h |1 + arch/s390/kvm/kvm-s390.c |1 +

Re: [PATCH] remove unneeded vmx_load_host_state() calls.

2011-11-17 Thread Avi Kivity
On 11/17/2011 10:56 AM, Gleb Natapov wrote: > vmx_load_host_state() does not handle msrs switching (except > MSR_KERNEL_GS_BASE) since commit 26bb0981b3f. Remove call to it > where it is no longer make sense. > > Applied, thanks. -- error compiling committee.c: too many arguments to function --

Re: [PATCHv3 00/10] KVM in-guest performance monitoring

2011-11-17 Thread Peter Zijlstra
On Thu, 2011-11-10 at 14:57 +0200, Gleb Natapov wrote: > This patchset exposes an emulated version 2 architectural performance > monitoring unit to KVM guests. The PMU is emulated using perf_events, > so the host kernel can multiplex host-wide, host-user, and the > guest on available resources. >

Re: [PATCHv3 06/10] x86, perf: disable non available architectural events.

2011-11-17 Thread Peter Zijlstra
On Thu, 2011-11-10 at 14:57 +0200, Gleb Natapov wrote: > + > + /* disable event that reported as not presend by cpuid */ > + for_each_set_bit(bit, x86_pmu.events_mask, > + min(x86_pmu.events_mask_len, x86_pmu.max_events)) > + intel_perfmon_event_map[i

Re: [PATCH 0/4] KVM: Dirty logging optimization using rmap

2011-11-17 Thread Avi Kivity
On 11/14/2011 11:20 AM, Takuya Yoshikawa wrote: > This is a revised version of my previous work. I hope that > the patches are more self explanatory than before. > > Thanks, applied. -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line

Re: [PATCH 0/6] pci-assign: Multiple fixes and cleanups

2011-11-17 Thread Avi Kivity
On 11/16/2011 10:45 PM, Alex Williamson wrote: > These patches are all independent. Patch 1 & 2 fix serious > usability bugs. Patches 3-6 are more subtle things that > Markus was able to find with Coverity. > > Patch 1 fixes https://bugs.launchpad.net/qemu/+bug/875723 > > I also tested https://bu

Re: kvm-tools: can't seem to set guest_mac and KVM_GET_SUPPORTED_CPUID failed.

2011-11-17 Thread Avi Kivity
On 11/17/2011 08:56 AM, Sasha Levin wrote: > On Thu, 2011-11-17 at 08:53 +0200, Pekka Enberg wrote: > > On Thu, Nov 17, 2011 at 8:07 AM, Sasha Levin > > wrote: > > >> Also, when I start the guest I sometimes get the following error message: > > >> > > >> # kvm run -k /path/to/bzImage-3.0.8 -m 2

[PATCH] remove unneeded vmx_load_host_state() calls.

2011-11-17 Thread Gleb Natapov
vmx_load_host_state() does not handle msrs switching (except MSR_KERNEL_GS_BASE) since commit 26bb0981b3f. Remove call to it where it is no longer make sense. Signed-off-by: Gleb Natapov diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index a6535ba..e5f73f3 100644 --- a/arch/x86/kvm/vmx.c ++