Re: [PATCH] virtio-ring: Use threshold for switching to indirect descriptors

2011-12-01 Thread Sasha Levin
On Thu, 2011-12-01 at 09:58 +0200, Michael S. Tsirkin wrote: On Thu, Dec 01, 2011 at 01:12:25PM +1030, Rusty Russell wrote: On Wed, 30 Nov 2011 18:11:51 +0200, Sasha Levin levinsasha...@gmail.com wrote: On Tue, 2011-11-29 at 16:58 +0200, Avi Kivity wrote: On 11/29/2011 04:54 PM,

Re: [RFC] virtio: use mandatory barriers for remote processor vdevs

2011-12-01 Thread Michael S. Tsirkin
On Thu, Dec 01, 2011 at 12:58:59PM +1030, Rusty Russell wrote: On Thu, 1 Dec 2011 01:13:07 +0200, Michael S. Tsirkin m...@redhat.com wrote: For x86, stores into memory are ordered. So I think that yes, smp_XXX can be selected at compile time. So let's forget the virtio strangeness for

Re: [PATCH] kvm tools: Process virito blk requests in separate thread

2011-12-01 Thread Pekka Enberg
On Wed, 30 Nov 2011, Asias He wrote: In virtio net's notify_vq(), we simply signal the tx/rx handle thread and return. Why not use the threadpool? No. Sasha? -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo

Re: [PATCH] kvm tools: Process virito blk requests in separate thread

2011-12-01 Thread Sasha Levin
On Thu, 2011-12-01 at 10:48 +0200, Pekka Enberg wrote: On Wed, 30 Nov 2011, Asias He wrote: In virtio net's notify_vq(), we simply signal the tx/rx handle thread and return. Why not use the threadpool? No. Sasha? I was looking into the concept of adding 'dedicated' threads to the

Re: [RFC] virtio: use mandatory barriers for remote processor vdevs

2011-12-01 Thread Michael S. Tsirkin
On Thu, Dec 01, 2011 at 08:14:26AM +0200, Ohad Ben-Cohen wrote: On Thu, Dec 1, 2011 at 1:13 AM, Michael S. Tsirkin m...@redhat.com wrote: For x86, stores into memory are ordered. So I think that yes, smp_XXX can be selected at compile time. But then you can't use the same kernel image for

Re: [Qemu-devel] KVM call minutes for November 29

2011-12-01 Thread Avi Kivity
On 11/29/2011 09:10 PM, Markus Armbruster wrote: Avi Kivity a...@redhat.com writes: On 11/29/2011 05:51 PM, Juan Quintela wrote: How to do high level stuff? - python? One of the disadvantages of the various scripting languages is the lack of static type checking, which makes it

Re: [PATCH] virtio-ring: Use threshold for switching to indirect descriptors

2011-12-01 Thread Michael S. Tsirkin
On Thu, Dec 01, 2011 at 10:09:37AM +0200, Sasha Levin wrote: On Thu, 2011-12-01 at 09:58 +0200, Michael S. Tsirkin wrote: On Thu, Dec 01, 2011 at 01:12:25PM +1030, Rusty Russell wrote: On Wed, 30 Nov 2011 18:11:51 +0200, Sasha Levin levinsasha...@gmail.com wrote: On Tue, 2011-11-29

Re: [Embeddedxen-devel] [Xen-devel] [ANNOUNCE] Xen port to Cortex-A15 / ARMv7 with virt extensions

2011-12-01 Thread Ian Campbell
On Wed, 2011-11-30 at 18:32 +, Stefano Stabellini wrote: On Wed, 30 Nov 2011, Arnd Bergmann wrote: KVM and Xen at least both fall into the single-return-value category, so we should be able to agree on a calling conventions. KVM does not have an hcall API on ARM yet, and I see no

Re: [PATCH 2/5] KVM: MMU: audit: replace mmu audit tracepoint with jump-lable

2011-12-01 Thread Avi Kivity
On 11/30/2011 11:43 AM, Xiao Guangrong wrote: Subject: [PATCH] KVM: MMU: audit: inline audit function inline audit function and little cleanup Thanks, applied. -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line unsubscribe kvm in

Re: [Xen-devel] [ANNOUNCE] Xen port to Cortex-A15 / ARMv7 with virt extensions

2011-12-01 Thread Ian Campbell
On Wed, 2011-11-30 at 18:15 +, Arnd Bergmann wrote: On Wednesday 30 November 2011, Ian Campbell wrote: On Wed, 2011-11-30 at 14:32 +, Arnd Bergmann wrote: On Wednesday 30 November 2011, Ian Campbell wrote: What I suggested to the KVM developers is to start out with the vexpress

Re: [PATCH] kvm tools: Process virito blk requests in separate thread

2011-12-01 Thread Pekka Enberg
On Thu, Dec 1, 2011 at 10:58 AM, Sasha Levin levinsasha...@gmail.com wrote: I was looking into the concept of adding 'dedicated' threads to the threadpool, since when the threadpool was added originally one of the purposes was to have all worker threads in a single place. This way we could

Re: [PATCH RFC V3 2/4] kvm hypervisor : Add a hypercall to KVM hypervisor to support pv-ticketlocks

2011-12-01 Thread Avi Kivity
On 11/30/2011 10:59 AM, Raghavendra K T wrote: Add a hypercall to KVM hypervisor to support pv-ticketlocks KVM_HC_KICK_CPU allows the calling vcpu to kick another vcpu out of halt state. The presence of these hypercalls is indicated to guest via

RE: Thanks

2011-12-01 Thread Song Li
l am a Staff of Hang Seng Bank HongKong, I do not know if we can work together in transferring $19,500,000.USD from my bank. Finally if you are interested I shall provide you with more details. my private Email: mrsong.l...@yahoo.cn -- To unsubscribe from this list: send the line unsubscribe kvm

RE: Thanks

2011-12-01 Thread Song Li
l am a Staff of Hang Seng Bank HongKong, I do not know if we can work together in transferring $19,500,000.USD from my bank. Finally if you are interested I shall provide you with more details. my private Email: mrsong.l...@yahoo.cn -- To unsubscribe from this list: send the line unsubscribe kvm

Re: [PATCH v2 0/3] PCI: Rework config space locking, add INTx masking services

2011-12-01 Thread Jan Kiszka
On 2011-11-04 09:45, Jan Kiszka wrote: [ Rebase of v1 over yesterday's linux-next ] This series tries to heal the currently broken locking scheme around PCI config space accesses. We have an interface lock out access via sysfs, but that service wrongly assumes it is only called by one

[patch 02/12] [PATCH] kvm-s390-ucontrol: per vcpu address spaces

2011-12-01 Thread Carsten Otte
This patch introduces two ioctls for virtual cpus, that are only valid for kernel virtual machines that are controlled by userspace. Each virtual cpu has its individual address space in this mode of operation, and each address space is backed by the gmap implementation just like the address space

[patch 07/12] [PATCH] kvm-s390-ucontrol: interface to inject faults on a vcpu page table

2011-12-01 Thread Carsten Otte
This patch allows the user to fault in pages on a virtual cpus address space for user controlled virtual machines. Typically this is superfluous because userspace can just create a mapping and let the kernel's page fault logic take are of it. There is one exception: SIE won't start if the lowcore

[patch 00/12] User controlled virtual machines

2011-12-01 Thread Carsten Otte
Hi Avi, Hi Marcelo, this patch series introduces an interface to allow a privileged userspace program to control a KVM virtual machine. The interface is intended for use by a machine simulator called CECSIM that can simulate an entire mainframe machine with nested virtualization and I/O for the

[patch 06/12] [PATCH] kvm-s390-ucontrol: disable in-kernel irq stack

2011-12-01 Thread Carsten Otte
This patch disables the in-kernel interrupt stack for KVM virtual machines that are controlled by user. Userspace has to take care of handling interrupts on its own. Signed-off-by: Carsten Otte co...@de.ibm.com --- Index: linux-2.5-cecsim/arch/s390/kvm/kvm-s390.c

[patch 01/12] [PATCH] kvm-s390: ioctl to switch to user controlled virtual machines

2011-12-01 Thread Carsten Otte
This patch introduces a new config option for user controlled kernel virtual machines. It introduces a new ioctl named KVM_S390_ENABLE_UCONTROL on the kvm file descriptor which allows for a one way transition from a regular kernel virtual machine to a user controlled virtual machine. The virtual

[patch 10/12] [PATCH] kvm-s390: storage key interface

2011-12-01 Thread Carsten Otte
This patch introduces an interface to access the guest visible storage keys. It supports three operations that model the behavior that SSKE/ISKE/RRBE instructions would have if they were issued by the guest. These instructions are all documented in the z architecture principles of operation book.

[patch 03/12] [PATCH] kvm-s390-ucontrol: export page faults to user

2011-12-01 Thread Carsten Otte
This patch introduces a new exit reason in the kvm_run structure named KVM_EXIT_UCONTROL. This exit indicates, that a virtual cpu has regognized a fault on the host page table. The idea is that userspace can handle this fault by mapping memory at the fault location into the cpu's address space and

[patch 11/12] [PATCH] kvm-s390-ucontrol: announce capability for user controlled vms

2011-12-01 Thread Carsten Otte
This patch announces a new capability KVM_CAP_S390_UCONTROL that indicates that kvm can now support virtual machines that are controlled by userspace. Signed-off-by: Carsten Otte co...@de.ibm.com --- --- arch/s390/kvm/kvm-s390.c |3 +++ include/linux/kvm.h |1 + 2 files changed, 4

[patch 04/12] [PATCH] kvm-s390-ucontrol: export SIE control block to user

2011-12-01 Thread Carsten Otte
This patch exports the SIE hardware control block to userspace via the mapping of the vcpu file descriptor. Signed-off-by: Carsten Otte co...@de.ibm.com --- --- arch/s390/include/asm/kvm_host.h |2 ++ virt/kvm/kvm_main.c |5 + 2 files changed, 7 insertions(+) ---

[patch 09/12] [PATCH] kvm-s390: fix assumption for KVM_MAX_VCPUS

2011-12-01 Thread Carsten Otte
This patch fixes definition of the idle_mask and the local_int array in kvm_s390_float_interrupt. Previous definition had 64 cpus max hardcoded instead of using KVM_MAX_VCPUS. Signed-off-by: Carsten Otte co...@de.ibm.com --- Index: linux-2.5-cecsim/arch/s390/include/asm/kvm_host.h

[patch 05/12] [PATCH] kvm-s390-ucontrol: disable in-kernel handling of SIE intercepts

2011-12-01 Thread Carsten Otte
This patch disables in-kernel handling of SIE intercepts for user controlled virtual machines. All intercepts are passed to userspace via KVM_EXIT_SIE exit reason just like SIE intercepts that cannot be handled in-kernel for regular KVM guests. Signed-off-by: Carsten Otte co...@de.ibm.com ---

[patch 08/12] [PATCH] kvm-s390-ucontrol: disable sca

2011-12-01 Thread Carsten Otte
This patch makes sure user controlled virtual machines do not use a system control area (sca). This is needed in order to create virtual machines with more cpus than the size of the sca [64]. Signed-off-by: Carsten Otte co...@de.ibm.com --- Index: linux-2.5-cecsim/arch/s390/kvm/kvm-s390.c

[patch 12/12] From: Carsten Otte co...@de.ibm.com

2011-12-01 Thread Carsten Otte
This patch fixes the return code of kvm_arch_vcpu_ioctl in case of an unkown ioctl number. Signed-off-by: Carsten Otte co...@de.ibm.com --- Index: linux-2.5-cecsim/arch/s390/kvm/kvm-s390.c === ---

Re: [patch 00/12] User controlled virtual machines

2011-12-01 Thread Avi Kivity
On 12/01/2011 02:57 PM, Carsten Otte wrote: Hi Avi, Hi Marcelo, this patch series introduces an interface to allow a privileged userspace program to control a KVM virtual machine. The interface is intended for use by a machine simulator called CECSIM that can simulate an entire mainframe

Re: [patch 01/12] [PATCH] kvm-s390: ioctl to switch to user controlled virtual machines

2011-12-01 Thread Avi Kivity
On 12/01/2011 02:57 PM, Carsten Otte wrote: This patch introduces a new config option for user controlled kernel virtual machines. It introduces a new ioctl named KVM_S390_ENABLE_UCONTROL on the kvm file descriptor which allows for a one way transition from a regular kernel virtual machine to

Re: [patch 02/12] [PATCH] kvm-s390-ucontrol: per vcpu address spaces

2011-12-01 Thread Avi Kivity
On 12/01/2011 02:57 PM, Carsten Otte wrote: This patch introduces two ioctls for virtual cpus, that are only valid for kernel virtual machines that are controlled by userspace. Each virtual cpu has its individual address space in this mode of operation, and each address space is backed by the

Re: [patch 04/12] [PATCH] kvm-s390-ucontrol: export SIE control block to user

2011-12-01 Thread Avi Kivity
On 12/01/2011 02:57 PM, Carsten Otte wrote: This patch exports the SIE hardware control block to userspace via the mapping of the vcpu file descriptor. Signed-off-by: Carsten Otte co...@de.ibm.com --- --- arch/s390/include/asm/kvm_host.h |2 ++ virt/kvm/kvm_main.c |5

Re: [patch 04/12] [PATCH] kvm-s390-ucontrol: export SIE control block to user

2011-12-01 Thread Avi Kivity
On 12/01/2011 02:57 PM, Carsten Otte wrote: This patch exports the SIE hardware control block to userspace via the mapping of the vcpu file descriptor. else if (vmf-pgoff == KVM_COALESCED_MMIO_PAGE_OFFSET) page = virt_to_page(vcpu-kvm-coalesced_mmio_ring); #endif +#if

Re: [patch 01/12] [PATCH] kvm-s390: ioctl to switch to user controlled virtual machines

2011-12-01 Thread Avi Kivity
On 12/01/2011 03:15 PM, Avi Kivity wrote: + + if (kvm-arch.gmap) + gmap_free(kvm-arch.gmap); + + kvm-arch.gmap = NULL; Locking? What happens if a vcpu is created afterwards? Having read the code, I think you can repurpose the argument of KVM_CREATE_VM to be a vm

Re: [patch 00/12] User controlled virtual machines

2011-12-01 Thread Avi Kivity
On 12/01/2011 03:10 PM, Avi Kivity wrote: On 12/01/2011 02:57 PM, Carsten Otte wrote: Hi Avi, Hi Marcelo, this patch series introduces an interface to allow a privileged userspace program to control a KVM virtual machine. The interface is intended for use by a machine simulator called

monitor flag on native kvm tool guest

2011-12-01 Thread Daniele Carollo
Hi, my name's Daniele and I'm using the native linux kvm tool. If I try to execute it in this way ./kvm run -d ~/linux-0.2.img I get a kernel panic like this: http://paste.org/41673 Only using the addictional option -p idle=halt I can run a virtual machine. Printing cat /proc/cpuinfo on the host i

[PATCH 0/2] qemu-io tests: More fine grained control of qemu paths

2011-12-01 Thread Lucas Meneghel Rodrigues
In automated test environments, we often build and test qemu from arbitrary paths, rather than installing them on standard PATH directories. Of course, appending directories to PATH might produce the desired result, but making it possible to specify arbitrary qemu paths through environment

[PATCH 1/2] check: print relevant path information

2011-12-01 Thread Lucas Meneghel Rodrigues
Print the paths of the programs under test (qemu, qemu-img and qemu-io). Signed-off-by: Lucas Meneghel Rodrigues l...@redhat.com --- check |3 +++ 1 files changed, 3 insertions(+), 0 deletions(-) diff --git a/check b/check index 84ef3e5..8499a04 100755 --- a/check +++ b/check @@ -158,6

[PATCH 2/2] common.config: Allow use of arbitrary qemu* paths

2011-12-01 Thread Lucas Meneghel Rodrigues
Since we might want to test arbitrary qemu, qemu-img and qemu-io paths, allow users to specify environment variable values for QEMU_PROG, QEMU_IMG_PROG and QEMU_IO_PROG so the testsuite will use those values rather than find them on PATH. Obviously, if such env variables are not set prior to

Re: monitor flag on native kvm tool guest

2011-12-01 Thread Avi Kivity
On 12/01/2011 03:37 PM, Daniele Carollo wrote: Hi, my name's Daniele and I'm using the native linux kvm tool. If I try to execute it in this way ./kvm run -d ~/linux-0.2.img I get a kernel panic like this: http://paste.org/41673 Only using the addictional option -p idle=halt I can run a

Re: monitor flag on native kvm tool guest

2011-12-01 Thread Sasha Levin
On Thu, 2011-12-01 at 15:48 +0200, Avi Kivity wrote: On 12/01/2011 03:37 PM, Daniele Carollo wrote: Hi, my name's Daniele and I'm using the native linux kvm tool. If I try to execute it in this way ./kvm run -d ~/linux-0.2.img I get a kernel panic like this: http://paste.org/41673 Only

Re: monitor flag on native kvm tool guest

2011-12-01 Thread Avi Kivity
On 12/01/2011 03:50 PM, Sasha Levin wrote: On Thu, 2011-12-01 at 15:48 +0200, Avi Kivity wrote: On 12/01/2011 03:37 PM, Daniele Carollo wrote: Hi, my name's Daniele and I'm using the native linux kvm tool. If I try to execute it in this way ./kvm run -d ~/linux-0.2.img I get a

Re: monitor flag on native kvm tool guest

2011-12-01 Thread Daniele Carollo
Il 01 dicembre 2011 14:48, Avi Kivity a...@redhat.com ha scritto: On 12/01/2011 03:37 PM, Daniele Carollo wrote: Hi, my name's Daniele and I'm using the native linux kvm tool. If I try to execute it in this way ./kvm run -d ~/linux-0.2.img I get a kernel panic like this:

Re: monitor flag on native kvm tool guest

2011-12-01 Thread Avi Kivity
On 12/01/2011 03:54 PM, Daniele Carollo wrote: Il 01 dicembre 2011 14:48, Avi Kivity a...@redhat.com ha scritto: On 12/01/2011 03:37 PM, Daniele Carollo wrote: Hi, my name's Daniele and I'm using the native linux kvm tool. If I try to execute it in this way ./kvm run -d ~/linux-0.2.img I

Re: [patch 04/12] [PATCH] kvm-s390-ucontrol: export SIE control block to user

2011-12-01 Thread Carsten Otte
On 01.12.2011 14:26, Avi Kivity wrote: On 12/01/2011 02:57 PM, Carsten Otte wrote: This patch exports the SIE hardware control block to userspace via the mapping of the vcpu file descriptor. else if (vmf-pgoff == KVM_COALESCED_MMIO_PAGE_OFFSET) page =

Re: [patch 04/12] [PATCH] kvm-s390-ucontrol: export SIE control block to user

2011-12-01 Thread Avi Kivity
On 12/01/2011 03:59 PM, Carsten Otte wrote: On 01.12.2011 14:26, Avi Kivity wrote: On 12/01/2011 02:57 PM, Carsten Otte wrote: This patch exports the SIE hardware control block to userspace via the mapping of the vcpu file descriptor. else if (vmf-pgoff ==

Re: [patch 01/12] [PATCH] kvm-s390: ioctl to switch to user controlled virtual machines

2011-12-01 Thread Martin Schwidefsky
On Thu, 01 Dec 2011 15:15:03 +0200 Avi Kivity a...@redhat.com wrote: + + if (kvm-arch.gmap) + gmap_free(kvm-arch.gmap); + + kvm-arch.gmap = NULL; Locking? What happens if a vcpu is created afterwards? I guess you don't mind too much since this is a privileged

Re: [PATCH] Guest stop notification

2011-12-01 Thread Jan Kiszka
On 2011-11-29 22:36, Eric B Munson wrote: Often when a guest is stopped from the qemu console, it will report spurious soft lockup warnings on resume. There are kernel patches being discussed that will give the host the ability to tell the guest that it is being stopped and should ignore the

Re: [PATCH 1/2] [PATCH RFC v2 1/2] hyper-v: introduce Hyper-V support infrastructure.

2011-12-01 Thread Jan Kiszka
On 2011-10-23 17:39, Vadim Rozenfeld wrote: --- Makefile.target |2 + target-i386/cpuid.c | 14 ++ target-i386/hyperv.c | 65 ++ target-i386/hyperv.h | 37 4 files changed, 118

Re: [PATCH 2/2] [PATCH RFC v2 2/2] hyper-v: initialize Hyper-V CPUID leaves.

2011-12-01 Thread Jan Kiszka
On 2011-10-23 17:39, Vadim Rozenfeld wrote: --- target-i386/kvm.c | 73 +++- 1 files changed, 71 insertions(+), 2 deletions(-) diff --git a/target-i386/kvm.c b/target-i386/kvm.c index 82fec8c..c061e3b 100644 --- a/target-i386/kvm.c +++

Re: [PATCH v2 0/3] PCI: Rework config space locking, add INTx masking services

2011-12-01 Thread Jesse Barnes
On Thu, 01 Dec 2011 13:04:15 +0100 Jan Kiszka jan.kis...@siemens.com wrote: On 2011-11-04 09:45, Jan Kiszka wrote: [ Rebase of v1 over yesterday's linux-next ] This series tries to heal the currently broken locking scheme around PCI config space accesses. We have an interface lock

Re: [Embeddedxen-devel] [Xen-devel] [ANNOUNCE] Xen port to Cortex-A15 / ARMv7 with virt extensions

2011-12-01 Thread Stefano Stabellini
On Thu, 1 Dec 2011, Ian Campbell wrote: On Wed, 2011-11-30 at 18:32 +, Stefano Stabellini wrote: On Wed, 30 Nov 2011, Arnd Bergmann wrote: KVM and Xen at least both fall into the single-return-value category, so we should be able to agree on a calling conventions. KVM does not have

Re: [PATCH 0/4] KVM: Dirty logging optimization using rmap

2011-12-01 Thread Avi Kivity
On 11/30/2011 09:03 AM, Xiao Guangrong wrote: On 11/29/2011 08:01 PM, Avi Kivity wrote: On 11/29/2011 01:56 PM, Xiao Guangrong wrote: On 11/29/2011 07:20 PM, Avi Kivity wrote: We used to have a bitmap in a shadow page with a bit set for every slot pointed to by the page. If we

Re: [Android-virt] [Embeddedxen-devel] [Xen-devel] [ANNOUNCE] Xen port to Cortex-A15 / ARMv7 with virt extensions

2011-12-01 Thread Catalin Marinas
On Thu, Dec 01, 2011 at 10:26:37AM +, Ian Campbell wrote: On Wed, 2011-11-30 at 18:32 +, Stefano Stabellini wrote: On Wed, 30 Nov 2011, Arnd Bergmann wrote: KVM and Xen at least both fall into the single-return-value category, so we should be able to agree on a calling

Re: [PATCH 0/4] KVM: Dirty logging optimization using rmap

2011-12-01 Thread Avi Kivity
On 11/30/2011 07:15 AM, Takuya Yoshikawa wrote: (2011/11/30 14:02), Takuya Yoshikawa wrote: IIUC, even though O(1) is O(1) at the timing of GET DIRTY LOG, it needs O(N) write protections with respect to the total number of dirty pages: distributed, but actually each page fault, which should

Re: [Android-virt] [Embeddedxen-devel] [Xen-devel] [ANNOUNCE] Xen port to Cortex-A15 / ARMv7 with virt extensions

2011-12-01 Thread Arnd Bergmann
On Thursday 01 December 2011, Catalin Marinas wrote: Given the way register banking is done on AArch64, issuing an HVC on a 32-bit guest OS doesn't require translation on a 64-bit hypervisor. We have a similar implementation at the SVC level (for 32-bit user apps on a 64-bit kernel), the only

Re: [Android-virt] [Embeddedxen-devel] [Xen-devel] [ANNOUNCE] Xen port to Cortex-A15 / ARMv7 with virt extensions

2011-12-01 Thread Ian Campbell
On Thu, 2011-12-01 at 15:10 +, Catalin Marinas wrote: On Thu, Dec 01, 2011 at 10:26:37AM +, Ian Campbell wrote: On Wed, 2011-11-30 at 18:32 +, Stefano Stabellini wrote: On Wed, 30 Nov 2011, Arnd Bergmann wrote: KVM and Xen at least both fall into the single-return-value

Re: [Android-virt] [Embeddedxen-devel] [Xen-devel] [ANNOUNCE] Xen port to Cortex-A15 / ARMv7 with virt extensions

2011-12-01 Thread Catalin Marinas
On Thu, Dec 01, 2011 at 03:42:19PM +, Arnd Bergmann wrote: On Thursday 01 December 2011, Catalin Marinas wrote: Given the way register banking is done on AArch64, issuing an HVC on a 32-bit guest OS doesn't require translation on a 64-bit hypervisor. We have a similar implementation at

Re: [Android-virt] [Embeddedxen-devel] [Xen-devel] [ANNOUNCE] Xen port to Cortex-A15 / ARMv7 with virt extensions

2011-12-01 Thread Arnd Bergmann
On Thursday 01 December 2011, Catalin Marinas wrote: On Thu, Dec 01, 2011 at 03:42:19PM +, Arnd Bergmann wrote: On Thursday 01 December 2011, Catalin Marinas wrote: How do you deal with signed integer arguments passed into SVC or HVC from a caller? If I understand the architecture

Re: [Android-virt] [Embeddedxen-devel] [Xen-devel] [ANNOUNCE] Xen port to Cortex-A15 / ARMv7 with virt extensions

2011-12-01 Thread Catalin Marinas
On Thu, Dec 01, 2011 at 04:44:40PM +, Arnd Bergmann wrote: On Thursday 01 December 2011, Catalin Marinas wrote: On Thu, Dec 01, 2011 at 03:42:19PM +, Arnd Bergmann wrote: On Thursday 01 December 2011, Catalin Marinas wrote: How do you deal with signed integer arguments passed into

Re: [PATCH] Guest stop notification

2011-12-01 Thread Eric B Munson
On Thu, 01 Dec 2011, Jan Kiszka wrote: On 2011-11-29 22:36, Eric B Munson wrote: Often when a guest is stopped from the qemu console, it will report spurious soft lockup warnings on resume. There are kernel patches being discussed that will give the host the ability to tell the guest

Re: [PATCH] Guest stop notification

2011-12-01 Thread Eric B Munson
On Thu, 01 Dec 2011, Jan Kiszka wrote: On 2011-11-29 22:36, Eric B Munson wrote: Often when a guest is stopped from the qemu console, it will report spurious soft lockup warnings on resume. There are kernel patches being discussed that will give the host the ability to tell the guest

Re: [Qemu-devel] [RFC PATCH] Exporting Guest RAM information for NUMA binding

2011-12-01 Thread Dipankar Sarma
On Wed, Nov 30, 2011 at 06:41:13PM +0100, Andrea Arcangeli wrote: On Wed, Nov 30, 2011 at 09:52:37PM +0530, Dipankar Sarma wrote: create the guest topology correctly and optimize for NUMA. This would work for us. Even on the case of 1 guest that fits in one node, you're not going to max

[PATCH V2] Guest stop notification

2011-12-01 Thread Eric B Munson
Often when a guest is stopped from the qemu console, it will report spurious soft lockup warnings on resume. There are kernel patches being discussed that will give the host the ability to tell the guest that it is being stopped and should ignore the soft lockup warning that generates. This

Re: [PATCH] Guest stop notification

2011-12-01 Thread Arend van Spriel
On 12/01/2011 06:19 PM, Eric B Munson wrote: On Thu, 01 Dec 2011, Jan Kiszka wrote: On 2011-11-29 22:36, Eric B Munson wrote: + static void cpu_update_state(void *opaque, int running, RunState state) { CPUState *env = opaque; if (running) { env-tsc_valid = false;

Re: [PATCH] Guest stop notification

2011-12-01 Thread Jan Kiszka
On 2011-12-01 18:19, Eric B Munson wrote: On Thu, 01 Dec 2011, Jan Kiszka wrote: On 2011-11-29 22:36, Eric B Munson wrote: Often when a guest is stopped from the qemu console, it will report spurious soft lockup warnings on resume. There are kernel patches being discussed that will give

Re: [PATCH] Guest stop notification

2011-12-01 Thread Jan Kiszka
On 2011-12-01 18:31, Arend van Spriel wrote: On 12/01/2011 06:19 PM, Eric B Munson wrote: On Thu, 01 Dec 2011, Jan Kiszka wrote: On 2011-11-29 22:36, Eric B Munson wrote: + static void cpu_update_state(void *opaque, int running, RunState state) { CPUState *env = opaque; if

Re: [PATCH] Guest stop notification

2011-12-01 Thread Jan Kiszka
On 2011-12-01 18:22, Eric B Munson wrote: On Thu, 01 Dec 2011, Jan Kiszka wrote: On 2011-11-29 22:36, Eric B Munson wrote: Often when a guest is stopped from the qemu console, it will report spurious soft lockup warnings on resume. There are kernel patches being discussed that will give

Re: [Qemu-devel] [RFC PATCH] Exporting Guest RAM information for NUMA binding

2011-12-01 Thread Andrea Arcangeli
On Thu, Dec 01, 2011 at 10:55:20PM +0530, Dipankar Sarma wrote: On Wed, Nov 30, 2011 at 06:41:13PM +0100, Andrea Arcangeli wrote: On Wed, Nov 30, 2011 at 09:52:37PM +0530, Dipankar Sarma wrote: create the guest topology correctly and optimize for NUMA. This would work for us. Even on

Re: [Qemu-devel] [RFC PATCH] Exporting Guest RAM information for NUMA binding

2011-12-01 Thread Peter Zijlstra
On Wed, 2011-11-23 at 16:03 +0100, Andrea Arcangeli wrote: Hi! On Mon, Nov 21, 2011 at 07:51:21PM -0600, Anthony Liguori wrote: Fundamentally, the entity that should be deciding what memory should be present and where it should located is the kernel. I'm fundamentally opposed to

Re: [Qemu-devel] [RFC PATCH] Exporting Guest RAM information for NUMA binding

2011-12-01 Thread Dipankar Sarma
On Thu, Dec 01, 2011 at 06:36:23PM +0100, Andrea Arcangeli wrote: On Thu, Dec 01, 2011 at 10:55:20PM +0530, Dipankar Sarma wrote: On Wed, Nov 30, 2011 at 06:41:13PM +0100, Andrea Arcangeli wrote: On Wed, Nov 30, 2011 at 09:52:37PM +0530, Dipankar Sarma wrote: create the guest topology

[PATCH 1/2] KVM: VMX: Notify if VMX is already in use

2011-12-01 Thread Sasha Levin
Currently we silently fail if VMX is already in use by a different virtualization technology. This is bad since it's non-obvious for the user, and its not too uncommon for users to have several of these installed on same host. This patch adds a message to notify the user of the problem. Cc:

[PATCH 2/2] KVM: SVM: Notify if SVM is already in use

2011-12-01 Thread Sasha Levin
Currently we silently fail if SVM is already in use by a different virtualization technology. This is bad since it's non-obvious for the user, and its not too uncommon for users to have several of these installed on same host. This patch adds a message to notify the user of the problem. Cc:

[PATCH] KVM: Veirfy memory slot only for readability

2011-12-01 Thread Sasha Levin
It's enough for memory slot to be readable, as the comment above the check states. A user should be able to create read-only memory slot. Cc: Avi Kivity a...@redhat.com Cc: Marcelo Tosatti mtosa...@redhat.com Cc: kvm@vger.kernel.org Signed-off-by: Sasha Levin levinsasha...@gmail.com ---

Re: [PATCH RFC V3 2/4] kvm hypervisor : Add a hypercall to KVM hypervisor to support pv-ticketlocks

2011-12-01 Thread Raghavendra K T
[ CCing Jeremy's new email ID ] Hi Avi, Thanks for review and inputs. On 12/01/2011 04:41 PM, Avi Kivity wrote: On 11/30/2011 10:59 AM, Raghavendra K T wrote: The hypercall needs to be documented in Documentation/virtual/kvm/hypercalls.txt. Yes, Sure 'll document. hypercalls.txt is a new

Re: [Qemu-devel] [RFC PATCH] vfio: VFIO Driver core framework

2011-12-01 Thread Stuart Yoder
The attributes are not intrinsic features of the domain.  User space will need to set them.  But in thinking about it a bit more I think the attributes are more properties of the domain rather than a per map() operation characteristic.  I think a separate API might be appropriate.  Define a

Re: [Qemu-devel] [RFC PATCH] vfio: VFIO Driver core framework

2011-12-01 Thread Alex Williamson
On Thu, 2011-12-01 at 14:58 -0600, Stuart Yoder wrote: The attributes are not intrinsic features of the domain. User space will need to set them. But in thinking about it a bit more I think the attributes are more properties of the domain rather than a per map() operation

Re: [PATCH 0/5 V4] Avoid soft lockup message when KVM is stopped by host

2011-12-01 Thread Marcelo Tosatti
On Tue, Nov 29, 2011 at 04:35:34PM -0500, Eric B Munson wrote: Changes from V3: Include CC's on patch 3 Drop clear flag ioctl and have the watchdog clear the flag when it is reset Changes from V2: A new kvm functions defined in kvm_para.h, the only change to pvclock is the initial flag

Re: [PATCH] Guest stop notification

2011-12-01 Thread Marcelo Tosatti
On Thu, Dec 01, 2011 at 06:36:17PM +0100, Jan Kiszka wrote: On 2011-12-01 18:22, Eric B Munson wrote: On Thu, 01 Dec 2011, Jan Kiszka wrote: On 2011-11-29 22:36, Eric B Munson wrote: Often when a guest is stopped from the qemu console, it will report spurious soft lockup warnings on

Re: [PATCH] Guest stop notification

2011-12-01 Thread Marcelo Tosatti
On Thu, Dec 01, 2011 at 12:19:38PM -0500, Eric B Munson wrote: On Thu, 01 Dec 2011, Jan Kiszka wrote: On 2011-11-29 22:36, Eric B Munson wrote: Often when a guest is stopped from the qemu console, it will report spurious soft lockup warnings on resume. There are kernel patches

Re: [PATCH] Guest stop notification

2011-12-01 Thread Eric B Munson
On Thu, 01 Dec 2011, Marcelo Tosatti wrote: On Thu, Dec 01, 2011 at 06:36:17PM +0100, Jan Kiszka wrote: On 2011-12-01 18:22, Eric B Munson wrote: On Thu, 01 Dec 2011, Jan Kiszka wrote: On 2011-11-29 22:36, Eric B Munson wrote: Often when a guest is stopped from the qemu console,

[PATCH 0/2] Suport for qemu-iotests from inside KVM autotest

2011-12-01 Thread Lucas Meneghel Rodrigues
Currently, qemu-iotests is implemented outside the KVM autotest realm. Although convenient if you want to test the default qemu shipped with your distro, it's not so convenient to integrate with the KVM autotest workflow. In order to take advantage of the fact kvm autotest tests are already

[PATCH 1/2] KVM test: Make tests aware of the qemu-io path

2011-12-01 Thread Lucas Meneghel Rodrigues
As it is important for qemu-iotests that this particular program is used. Signed-off-by: Lucas Meneghel Rodrigues l...@redhat.com --- client/tests/kvm/base.cfg.sample |1 + client/tests/kvm/tests.cfg.sample |4 client/virt/kvm_installer.py | 24 3

[PATCH 2/2] KVM test: Introduce qemu_iotests for the KVM test

2011-12-01 Thread Lucas Meneghel Rodrigues
In order to run always the latest up to date qemu iotests on all KVM branches, insert qemu-iotests execution inside KVM autotest. It'll attempt to git fetch the latest contents of the qemu-iotests test suite, then carry on with tests, reporting errors to autotest. Besides having the latest test,

Re: [PATCH] virtio-ring: Use threshold for switching to indirect descriptors

2011-12-01 Thread Rusty Russell
On Thu, 1 Dec 2011 12:26:42 +0200, Michael S. Tsirkin m...@redhat.com wrote: On Thu, Dec 01, 2011 at 10:09:37AM +0200, Sasha Levin wrote: On Thu, 2011-12-01 at 09:58 +0200, Michael S. Tsirkin wrote: We'll presumably need some logic to increment is back, to account for random workload

Re: [RFC] virtio: use mandatory barriers for remote processor vdevs

2011-12-01 Thread Rusty Russell
On Thu, 1 Dec 2011 10:12:37 +0200, Michael S. Tsirkin m...@redhat.com wrote: On Thu, Dec 01, 2011 at 12:58:59PM +1030, Rusty Russell wrote: On Thu, 1 Dec 2011 01:13:07 +0200, Michael S. Tsirkin m...@redhat.com wrote: For x86, stores into memory are ordered. So I think that yes, smp_XXX

Re: [PATCH] KVM: Veirfy memory slot only for readability

2011-12-01 Thread Takuya Yoshikawa
(2011/12/02 4:42), Sasha Levin wrote: It's enough for memory slot to be readable, as the comment above the check states. A user should be able to create read-only memory slot. I submitted the original patch like you to speed up page table walking, a hot path in KVM, and Avi applied the patch

Re: [PATCH 1/3] net: use this_cpu_xxx replace percpu_xxx funcs

2011-12-01 Thread Alex,Shi
On Mon, 2011-11-21 at 17:00 +0800, Alex,Shi wrote: On Thu, 2011-10-20 at 16:38 +0800, Eric Dumazet wrote: Le jeudi 20 octobre 2011 à 15:32 +0800, Alex,Shi a écrit : percpu_xxx funcs are duplicated with this_cpu_xxx funcs, so replace them for further code clean up. And in preempt

Re: [PATCH] KVM: Veirfy memory slot only for readability

2011-12-01 Thread Takuya Yoshikawa
(2011/12/02 10:15), Takuya Yoshikawa wrote: (2011/12/02 4:42), Sasha Levin wrote: It's enough for memory slot to be readable, as the comment above the check states. A user should be able to create read-only memory slot. Note: at that time, it looked to me that the API did not allow me to

Re: [RFC PATCH] vfio: VFIO Driver core framework

2011-12-01 Thread Alexey Kardashevskiy
On 29/11/11 16:48, Alex Williamson wrote: On Tue, 2011-11-29 at 15:34 +1100, Alexey Kardashevskiy wrote: Hi! On 29/11/11 14:46, Alex Williamson wrote: On Tue, 2011-11-29 at 12:52 +1100, Alexey Kardashevskiy wrote: Hi! I tried (successfully) to run it on POWER and while doing that I found

Re: [PATCH] KVM: Veirfy memory slot only for readability

2011-12-01 Thread Sasha Levin
On Fri, 2011-12-02 at 12:16 +0900, Takuya Yoshikawa wrote: (2011/12/02 10:15), Takuya Yoshikawa wrote: (2011/12/02 4:42), Sasha Levin wrote: It's enough for memory slot to be readable, as the comment above the check states. A user should be able to create read-only memory slot. Note:

[PATCH] kvm: make vcpu life cycle separated from kvm instance

2011-12-01 Thread Liu Ping Fan
From: Liu Ping Fan pingf...@linux.vnet.ibm.com Currently, vcpu can be destructed only when kvm instance destroyed. Change this to vcpu's destruction taken when its refcnt is zero, and then vcpu MUST and CAN be destroyed before kvm's destroy. Signed-off-by: Liu Ping Fan

Re: [PATCH] KVM: Veirfy memory slot only for readability

2011-12-01 Thread Takuya Yoshikawa
(2011/12/02 14:46), Sasha Levin wrote: On Fri, 2011-12-02 at 12:16 +0900, Takuya Yoshikawa wrote: (2011/12/02 10:15), Takuya Yoshikawa wrote: (2011/12/02 4:42), Sasha Levin wrote: It's enough for memory slot to be readable, as the comment above the check states. A user should be able to

[PATCH 1/2] kvm tools: Remove double 'init=' kernel param

2011-12-01 Thread Sasha Levin
Signed-off-by: Sasha Levin levinsasha...@gmail.com --- tools/kvm/builtin-run.c |3 --- 1 files changed, 0 insertions(+), 3 deletions(-) diff --git a/tools/kvm/builtin-run.c b/tools/kvm/builtin-run.c index 43cf2c4..33de4f6 100644 --- a/tools/kvm/builtin-run.c +++ b/tools/kvm/builtin-run.c @@

[PATCH 2/2] kvm tools: Allow easily sandboxing applications within a guest

2011-12-01 Thread Sasha Levin
This patch adds a '--sandbox' argument when used in conjuction with a custom rootfs, it allows running a script or an executable in the guest environment by using executables and other files from the host. This is useful when testing code that might cause problems on the host, or to automate

Re: [PATCH 2/2] kvm tools: Allow easily sandboxing applications within a guest

2011-12-01 Thread Pekka Enberg
On Fri, Dec 2, 2011 at 9:16 AM, Sasha Levin levinsasha...@gmail.com wrote: This patch adds a '--sandbox' argument when used in conjuction with a custom rootfs, it allows running a script or an executable in the guest environment by using executables and other files from the host. This is

Re: [PATCH 2/2] kvm tools: Allow easily sandboxing applications within a guest

2011-12-01 Thread Sasha Levin
On Fri, 2011-12-02 at 09:26 +0200, Pekka Enberg wrote: On Fri, Dec 2, 2011 at 9:16 AM, Sasha Levin levinsasha...@gmail.com wrote: This patch adds a '--sandbox' argument when used in conjuction with a custom rootfs, it allows running a script or an executable in the guest environment by

Re: [PATCH 2/2] kvm tools: Allow easily sandboxing applications within a guest

2011-12-01 Thread Pekka Enberg
On Fri, 2011-12-02 at 09:26 +0200, Pekka Enberg wrote: On Fri, Dec 2, 2011 at 9:16 AM, Sasha Levin levinsasha...@gmail.com wrote: This patch adds a '--sandbox' argument when used in conjuction with a custom rootfs, it allows running a script or an executable in the guest environment by using

Re: [PATCH 2/2] kvm tools: Allow easily sandboxing applications within a guest

2011-12-01 Thread Sasha Levin
On Fri, 2011-12-02 at 09:39 +0200, Pekka Enberg wrote: On Fri, 2011-12-02 at 09:26 +0200, Pekka Enberg wrote: On Fri, Dec 2, 2011 at 9:16 AM, Sasha Levin levinsasha...@gmail.com wrote: This patch adds a '--sandbox' argument when used in conjuction with a custom rootfs, it allows

Re: [PATCH 2/2] kvm tools: Allow easily sandboxing applications within a guest

2011-12-01 Thread Pekka Enberg
On Fri, Dec 2, 2011 at 9:44 AM, Sasha Levin levinsasha...@gmail.com wrote: Would it not be better to introduce a new command that works like 'perf stat', for example:    ./kvm sandbox -k kernel to test -- trinity --mode=random --quiet -i ? So basically proxy the first set of parameters to

  1   2   >