Re: [PATCH] mm: mmu_notifier: fix inconsistent memory between secondary MMU and host

2012-08-23 Thread Xiao Guangrong
On 08/23/2012 12:37 AM, Andrea Arcangeli wrote: On Wed, Aug 22, 2012 at 11:51:17AM +0800, Xiao Guangrong wrote: Hmm, in KSM code, i found this code in replace_page: set_pte_at_notify(mm, addr, ptep, mk_pte(kpage, vma-vm_page_prot)); It is possible to establish a writable pte, no? Hugh

Re: [PATCH 3.6] KVM: x86 emulator: use stack size attribute to mask rsp in stack ops

2012-08-23 Thread Marcelo Tosatti
On Sun, Aug 19, 2012 at 02:34:31PM +0300, Avi Kivity wrote: The sub-register used to access the stack (sp, esp, or rsp) is not determined by the address size attribute like other memory references, but by the stack segment's B bit (if not in x86_64 mode). Fix by using the existing

[GIT PULL] KVM fixes for 3.6-rc3

2012-08-23 Thread Marcelo Tosatti
Linus, Please pull from git://git.kernel.org/pub/scm/virt/kvm/kvm.git master To receive the following KVM bug fixes: Alan Cox (1): ppc: e500_tlb memset clears nothing Alexander Graf (1): KVM: PPC: Add cache flush on page map Avi Kivity (1): KVM: x86 emulator: use stack

Re: [PATCH] mm: mmu_notifier: fix inconsistent memory between secondary MMU and host

2012-08-23 Thread Xiao Guangrong
On 08/23/2012 03:50 AM, Andrea Arcangeli wrote: Hi Andrew, On Wed, Aug 22, 2012 at 12:15:35PM -0700, Andrew Morton wrote: On Wed, 22 Aug 2012 18:29:55 +0200 Andrea Arcangeli aarca...@redhat.com wrote: On Wed, Aug 22, 2012 at 02:03:41PM +0800, Xiao Guangrong wrote: On 08/21/2012 11:06 PM,

[PATCH] kvm/book3s: fix build error caused by gfn_to_hva_memslot()

2012-08-23 Thread Gavin Shan
The build error was caused by that builtin functions are calling the functions implemented in modules. That was introduced by the following commit. commit 4d8b81abc47b83a1939e59df2fdb0e98dfe0eedd The patches fix that to convert the gfn to hva in direct way. Signed-off-by: Gavin Shan

[PATCH 1/2] PCI: Use local parameter pci_device_id for pci_get_subsys/class()

2012-08-23 Thread Feng Tang
From 57a28ee5e7662ca28ba4c793aa037d64bd082dee Mon Sep 17 00:00:00 2001 From: Feng Tang feng.t...@intel.com Date: Wed, 22 Aug 2012 15:41:51 +0800 Subject: [PATCH 1/2] PCI: Use local parameter pci_device_id for pci_get_subsys/class() This fixes a kernel warning https://lkml.org/lkml/2012/7/31/682

[PATCH 2/2] PCI: Remove the obsolete no_pci_devices() check

2012-08-23 Thread Feng Tang
From 9f2f3bbdf65f669e091c72b9648a4a0394ce28f5 Mon Sep 17 00:00:00 2001 From: Feng Tang feng.t...@intel.com Date: Thu, 23 Aug 2012 14:55:48 +0800 Subject: [PATCH 2/2] PCI: Remove the obsolete no_pci_devices() check In function pci_get_subsys() there is a check: /* *

Recommended way access KVM data structures from other kernel subsystems ?

2012-08-23 Thread Pandarathil, Vijaymohan R
Hi, I am looking for the recommended approach for accessing KVM driver data from other kernel components. In my case, I need to set some global variable/state in KVM driver from one of the NMI handlers. I see that using kvm_x86_ops is one option. I can define a new function as part of

RE: [PATCH v10 07/14] KVM: ARM: Memory virtualization setup

2012-08-23 Thread Min-gyu Kim
Dear Christoffer Dall, In you code, kvm_alloc_stage2_pgd function allocates page table and memset. isn't it necessary to clean the data cache after memset? For reference, pgd_alloc cleans the area with clean_dcache_area. There's some situation that cleaning is not necessary, and

Re: [PATCH v3] KVM: x86 emulator: access GPRs on demand

2012-08-23 Thread Marcelo Tosatti
On Sun, Aug 19, 2012 at 12:32:36PM +0300, Avi Kivity wrote: On 08/17/2012 08:29 PM, Marcelo Tosatti wrote: On Thu, Aug 16, 2012 at 05:54:49PM +0300, Avi Kivity wrote: Instead of populating the the entire register file, read in registers as they are accessed, and write back only the modified

Re: [PATCH] kvm/book3s: fix build error caused by gfn_to_hva_memslot()

2012-08-23 Thread Takuya Yoshikawa
On Thu, 23 Aug 2012 15:42:49 +0800 Gavin Shan sha...@linux.vnet.ibm.com wrote: The build error was caused by that builtin functions are calling the functions implemented in modules. That was introduced by the following commit. commit 4d8b81abc47b83a1939e59df2fdb0e98dfe0eedd The patches

RE: [PATCH] kvm/fpu: Enable fully eager restore kvm FPU

2012-08-23 Thread Hao, Xudong
-Original Message- From: kvm-ow...@vger.kernel.org [mailto:kvm-ow...@vger.kernel.org] On Behalf Of Avi Kivity Sent: Monday, August 20, 2012 6:43 PM To: Roedel, Joerg Cc: Hao, Xudong; kvm@vger.kernel.org; Zhang, Xiantao Subject: Re: [PATCH] kvm/fpu: Enable fully eager restore kvm FPU

Re: [PATCH 1/2] kvm tools: Respect guest tcp window size

2012-08-23 Thread Pekka Enberg
On Thu, Aug 23, 2012 at 4:26 AM, Asias He asias.he...@gmail.com wrote: Respect guest tcp window size and stop sending tcp segments to guest if guest's receive window is closed. This fixes the TCP hang I'm seeing where guest and host are transferring big chuck of data. Awesome! This problem

Re: [PATCH 1/2] kvm tools: Respect guest tcp window size

2012-08-23 Thread Asias He
On Thu, Aug 23, 2012 at 5:31 PM, Pekka Enberg penb...@kernel.org wrote: On Thu, Aug 23, 2012 at 4:26 AM, Asias He asias.he...@gmail.com wrote: Respect guest tcp window size and stop sending tcp segments to guest if guest's receive window is closed. This fixes the TCP hang I'm seeing where

Re: [PATCH 1/2] kvm tools: Respect guest tcp window size

2012-08-23 Thread Pekka Enberg
On Thu, Aug 23, 2012 at 12:36 PM, Asias He asias.he...@gmail.com wrote: while (1) { + pos = payload; ret = read(sk-fd, payload, UIP_MAX_TCP_PAYLOAD); if (ret = 0 || ret UIP_MAX_TCP_PAYLOAD) goto out; -

Re: [PATCH v9 5/6] introduce a new qom device to deal with panicked event

2012-08-23 Thread Jan Kiszka
On 2012-08-23 04:32, Wen Congyang wrote: If the target is x86/x86_64, the guest's kernel will write 0x01 to the port KVM_PV_EVENT_PORT when it is panciked. This patch introduces a new qom device kvm_pv_ioport to listen this I/O port, and deal with panicked event according to panicked_action's

[PATCH v3 uq/master 6/6] kvm: Stop flushing coalesced MMIO on vmexit

2012-08-23 Thread Jan Kiszka
The memory subsystem will now take care of flushing whenever affected regions are accessed or the memory mapping changes. Signed-off-by: Jan Kiszka jan.kis...@siemens.com --- kvm-all.c |2 -- 1 files changed, 0 insertions(+), 2 deletions(-) diff --git a/kvm-all.c b/kvm-all.c index

[PATCH v3 uq/master 4/6] memory: Flush coalesced MMIO on mapping and state changes

2012-08-23 Thread Jan Kiszka
Flush pending coalesced MMIO before performing mapping or state changes that could affect the event orderings or route the buffered requests to a wrong region. Signed-off-by: Jan Kiszka jan.kis...@siemens.com --- memory.c |1 + 1 files changed, 1 insertions(+), 0 deletions(-) diff --git

[PATCH v3 uq/master 1/6] memory: Flush coalesced MMIO on selected region access

2012-08-23 Thread Jan Kiszka
Instead of flushing pending coalesced MMIO requests on every vmexit, this provides a mechanism to selectively flush when memory regions related to the coalesced one are accessed. This first of all includes the coalesced region itself but can also applied to other regions, e.g. of the same device,

[PATCH v3 uq/master 2/6] memory: Use transaction_begin/commit also for single-step operations

2012-08-23 Thread Jan Kiszka
Wrap also simple operations consisting only of a single step with memory_region_transaction_begin/commit. This allows to perform additional steps like coalesced MMIO flushing from a single place. This requires dropping some micro-optimizations: The skipping of topology updates after updating

[PATCH v3 uq/master 3/6] memory: Fold memory_region_update_topology into memory_region_transaction_commit

2012-08-23 Thread Jan Kiszka
Simplify the code as we are using now only a subset of the original features of memory_region_update_topology. Signed-off-by: Jan Kiszka jan.kis...@siemens.com --- memory.c | 39 +++ 1 files changed, 11 insertions(+), 28 deletions(-) diff --git a/memory.c

[PATCH v3 uq/master 0/6] kvm: Get coalesced MMIO flushing out of the hot-path

2012-08-23 Thread Jan Kiszka
This is just a repost, now targeting uq/master as agreed. No changes compared to v2 except that i82378: Remove bogus MMIO coalescing was dropped as it is already in QEMU upstream by now. Original description: We currently flush the coalesced MMIO buffer on every vmexit to userspace. KVM only

[PATCH v3 uq/master 5/6] VGA: Flush coalesced MMIO on related MMIO/PIO accesses

2012-08-23 Thread Jan Kiszka
In preparation of stopping to flush coalesced MMIO unconditionally on vmexits, mark VGA MMIO and PIO regions as synchronous /wrt coalesced MMIO and flush the buffer explicitly on PIO accesses that do not use generic memory regions yet. Signed-off-by: Jan Kiszka jan.kis...@siemens.com ---

KVM: x86: do not retain disabled or invalid pvclock address

2012-08-23 Thread Marcelo Tosatti
In case an invalid or disabled gpa is written to the SYSTEM_TIME MSR, do not retain its value. This is not documented behaviour, nor should be supported. Also clear it on system reset. Not doing so can hide bugs. Signed-off-by: Marcelo Tosatti mtosa...@redhat.com diff --git

Re: [PATCH] KVM: trace the events of mmu_notifier

2012-08-23 Thread Marcelo Tosatti
On Tue, Aug 21, 2012 at 05:51:35PM +0800, Xiao Guangrong wrote: mmu_notifier is the interface to broadcast the mm events to KVM, the tracepoints introduced in this patch can trace all these events, it is very helpful for us to notice and fix the bug caused by mm Signed-off-by: Xiao Guangrong

Re: [PATCH v2] kvm-all.c: Move init of irqchip_inject_ioctl out of kvm_irqchip_create()

2012-08-23 Thread Marcelo Tosatti
On Tue, Aug 21, 2012 at 12:27:51PM +0200, Jan Kiszka wrote: On 2012-08-21 10:25, Peter Maydell wrote: On 21 August 2012 09:19, Jan Kiszka jan.kis...@siemens.com wrote: On 2012-08-15 13:08, Peter Maydell wrote: Move the init of the irqchip_inject_ioctl field of KVMState out of

Re: [PATCH v4 4/8] KVM-HV: Add VCPU running/pre-empted state for guest

2012-08-23 Thread Marcelo Tosatti
On Tue, Aug 21, 2012 at 04:56:43PM +0530, Nikunj A. Dadhania wrote: From: Nikunj A. Dadhania nik...@linux.vnet.ibm.com Hypervisor code to indicate guest running/pre-empteded status through msr. The page is now pinned during MSR write time and use kmap_atomic/kunmap_atomic to access the

Re: [PATCH v4 0/8] KVM paravirt remote flush tlb

2012-08-23 Thread Marcelo Tosatti
On Tue, Aug 21, 2012 at 04:55:52PM +0530, Nikunj A. Dadhania wrote: Remote flushing api's does a busy wait which is fine in bare-metal scenario. But with-in the guest, the vcpus might have been pre-empted or blocked. In this scenario, the initator vcpu would end up busy-waiting for a long

Re: [PATCH v4 3/8] KVM Guest: Add VCPU running/pre-empted state for guest

2012-08-23 Thread Marcelo Tosatti
On Tue, Aug 21, 2012 at 04:56:35PM +0530, Nikunj A. Dadhania wrote: From: Nikunj A. Dadhania nik...@linux.vnet.ibm.com The patch adds guest code for msr between guest and hypervisor. The msr will export the vcpu running/pre-empted information to the guest from host. This will enable guest to

[qemu-kvm] source code compile error: No rule to make target `../libhw64/virtio-console.o', needed by `qemu-system-x86_64'

2012-08-23 Thread Wangpan
Hi all, I got this error when I compile the source tarball qemu-kvm-1.1.1.tar.gz and qemu-kvm-1.1.0.tar.gz and as well as codes clone from git://git.kernel.org/pub/scm/virt/kvm/qemu-kvm.git, the compile command I used is ./configure make. I google this error but find nothing, I have no idea

Re: [PATCH] KVM: trace the events of mmu_notifier

2012-08-23 Thread Xiao Guangrong
On 08/23/2012 05:24 PM, Marcelo Tosatti wrote: On Tue, Aug 21, 2012 at 05:51:35PM +0800, Xiao Guangrong wrote: mmu_notifier is the interface to broadcast the mm events to KVM, the tracepoints introduced in this patch can trace all these events, it is very helpful for us to notice and fix the

[PATCH V2 1/2] kvm tools: Make tcp between guest/host virtual ip work in UIP mode

2012-08-23 Thread Asias He
This pach makes tcp between 'guest ip' and 'host virtual ip' work in UIP mode. (The defulat guest ip is 192.168.33.15, host virtual ip is 192.168.33.1) guest$ wget http://192.168.33.1/file guest$ ssh 192.168.33.1 Without this patch, user has to figure out the ip address of host's interface

[PATCH V2 2/2] kvm tools: Respect guest tcp window size

2012-08-23 Thread Asias He
Respect guest tcp window size and stop sending tcp segments to guest if guest's receive window is closed. This fixes the TCP hang I'm seeing where guest and host are transferring big chuck of data. This problem was not triggered when guest and external host communicates, probably because guest

[Bug 34282] general protection fault when starting virtual machine with qemu

2012-08-23 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=34282 Alan a...@lxorguk.ukuu.org.uk changed: What|Removed |Added Status|NEW |RESOLVED

Re: [PATCH] KVM: trace the events of mmu_notifier

2012-08-23 Thread Marcelo Tosatti
On Thu, Aug 23, 2012 at 08:30:15PM +0800, Xiao Guangrong wrote: On 08/23/2012 05:24 PM, Marcelo Tosatti wrote: On Tue, Aug 21, 2012 at 05:51:35PM +0800, Xiao Guangrong wrote: mmu_notifier is the interface to broadcast the mm events to KVM, the tracepoints introduced in this patch can trace

Re: [PATCH v3 uq/master 0/6] kvm: Get coalesced MMIO flushing out of the hot-path

2012-08-23 Thread Marcelo Tosatti
On Thu, Aug 23, 2012 at 01:02:28PM +0200, Jan Kiszka wrote: This is just a repost, now targeting uq/master as agreed. No changes compared to v2 except that i82378: Remove bogus MMIO coalescing was dropped as it is already in QEMU upstream by now. Original description: We currently flush

Re: [PATCH 3/5] KVM: PPC: Book3S HV: Handle memory slot deletion and modification correctly

2012-08-23 Thread Marcelo Tosatti
On Sat, Aug 18, 2012 at 06:32:25AM +1000, Benjamin Herrenschmidt wrote: On Fri, 2012-08-17 at 15:39 -0300, Marcelo Tosatti wrote: On Fri, Aug 17, 2012 at 05:06:18PM +1000, Benjamin Herrenschmidt wrote: On Wed, 2012-08-15 at 14:59 -0300, Marcelo Tosatti wrote: The guest should not

Re: [PATCH v2] kvm-all.c: Move init of irqchip_inject_ioctl out of kvm_irqchip_create()

2012-08-23 Thread Peter Maydell
On 23 August 2012 10:13, Marcelo Tosatti mtosa...@redhat.com wrote: On Tue, Aug 21, 2012 at 12:27:51PM +0200, Jan Kiszka wrote: On 2012-08-21 10:25, Peter Maydell wrote: On 21 August 2012 09:19, Jan Kiszka jan.kis...@siemens.com wrote: As it's not yet merged, some late comment:

Re: [PATCH v10 07/14] KVM: ARM: Memory virtualization setup

2012-08-23 Thread Christoffer Dall
On Thu, Aug 23, 2012 at 4:12 AM, Min-gyu Kim mingyu84@samsung.com wrote: Dear Christoffer Dall, Hi Min-gyu (it's not considered best practice to top-post in these types of mailing list, please post inline or bottom-post in the future). In you code, kvm_alloc_stage2_pgd function allocates

Re: [kvmarm] [PATCH v10 06/14] KVM: ARM: Hypervisor inititalization

2012-08-23 Thread Lei Wen
Hi Christoffer, [snip] diff --git a/arch/arm/kvm/init.S b/arch/arm/kvm/init.S index 1dc8926..4db26cb 100644 --- a/arch/arm/kvm/init.S +++ b/arch/arm/kvm/init.S @@ -15,5 +15,135 @@ * along with this program; if not, write to the Free Software * Foundation, 51 Franklin Street, Fifth

Re: [kvmarm] [PATCH v10 06/14] KVM: ARM: Hypervisor inititalization

2012-08-23 Thread Christoffer Dall
On Thu, Aug 23, 2012 at 11:08 AM, Lei Wen adrian.w...@gmail.com wrote: Hi Christoffer, [snip] diff --git a/arch/arm/kvm/init.S b/arch/arm/kvm/init.S index 1dc8926..4db26cb 100644 --- a/arch/arm/kvm/init.S +++ b/arch/arm/kvm/init.S @@ -15,5 +15,135 @@ * along with this program; if not,

qemu-kvm 1.1.1 hangs using 100% CPU when using ES1370 emulation

2012-08-23 Thread Mike Gerber
Hi, I'm using a KVM guest to stream audio using darkice to an icecast2 server on the same guest. The guest uses an emulated ES1370 sound card to capture the host's audio input (ASUS Xonar DX) using the ALSA backend. After 1 or 2 days, the qemu-kvm process locks up, using up 100% CPU, apparently

Re: qemu-kvm 1.1.1 hangs using 100% CPU when using ES1370 emulation

2012-08-23 Thread Jan Kiszka
[likely not kvm related, CC'ing the appropriate community] On 2012-08-23 18:16, Mike Gerber wrote: Hi, I'm using a KVM guest to stream audio using darkice to an icecast2 server on the same guest. The guest uses an emulated ES1370 sound card to capture the host's audio input (ASUS Xonar

Re: [PATCH v2 00/20] pci-assign: Refactor for upstream merge

2012-08-23 Thread Marcelo Tosatti
On Fri, Aug 17, 2012 at 08:58:48AM +0200, Jan Kiszka wrote: With this series, we are getting very close to obsoleting qemu-kvm. It refactors hw/device-assignment.c and the associated KVM helper functions into a form that should allow merging them into QEMU. Once the series is acceptable for

Re: Question: Timekeeping between Host and Guest with NTP

2012-08-23 Thread Marcelo Tosatti
On Wed, Aug 22, 2012 at 05:46:52PM +0900, Aritoki TAKADA wrote: Hello, I'm planning to configure timekeeping between KVM host and guest, but I'm confused by different suggestions. The point is whether NTP should be working on guest or not. Here are the suggestions I found. Red Hat

[PATCH RFC 0/3] Add guest cpu_entitlement reporting

2012-08-23 Thread Michael Wolf
This is an RFC regarding the reporting of stealtime. In the case of where you have a system that is running with partial processors such as KVM the user may see steal time being reported in accounting tools such as top or vmstat. This can cause confusion for the end user. To ease the confusion

[PATCH RFC 1/3] Add a sysctl interface to control and report the cpu entitlement setting.

2012-08-23 Thread Michael Wolf
This setting will later be used to compute an expected steal time. Signed-off-by: Michael Wolf m...@linux.vnet.ibm.com --- Documentation/sysctl/kernel.txt | 14 ++ fs/proc/stat.c |1 + kernel/sysctl.c | 10 ++ 3 files changed, 25

[PATCH RFC 3/3] Modify the amount of stealtime that the kernel reports via the /proc interface.

2012-08-23 Thread Michael Wolf
Stealtime will be adjusted based on the cpu entitlement setting. The user will supply the cpu_entitlement which is the percentage of cpu the guest can expect to receive. The expected steal time is based on the expected steal percentage which is 100 - cpu_entitlement. If steal_time is less than

[PATCH RFC 2/3] Add a hypercall to retrieve the cpu entitlement value from the host.

2012-08-23 Thread Michael Wolf
If the hypercall is not implemented on the host a default value of 100 will be used. This value will be stored in /proc/sys/kernel/cpu_entitlements. Signed-off-by: Michael Wolf m...@linux.vnet.ibm.com --- arch/x86/kvm/x86.c |8 fs/proc/stat.c |9 +

[PATCH v7 0/3] KVM: perf: kvm events analysis tool

2012-08-23 Thread Dong Hao
From: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com Changelog: - rebased it on Arnaldo's git tree perf/core branch the change from Arnaldo's comments: - directly get event from evsel-tp_format - remove die() and return the proper error code - rename thread-private to thread-priv the change

[PATCH v7 2/3] KVM: x86: trace mmio begin and complete

2012-08-23 Thread Dong Hao
From: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com 'perf kvm stat record/report' will use kvm_exit and kvm_mmio(read...) to calculate mmio read emulated time for the old kernel, in order to trace mmio read event more exactly, we add kvm_mmio_begin to trace the time when mmio read begins, also,

[PATCH v7 3/3] KVM: perf: kvm events analysis tool

2012-08-23 Thread Dong Hao
From: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com Add 'perf kvm stat' support to analyze kvm vmexit/mmio/ioport smartly Usage: - kvm stat run a command and gather performance counter statistics, it is the alias of perf stat - trace kvm events: perf kvm stat record, or, if other

[PATCH v7 1/3] KVM: x86: export svm/vmx exit code and vector code to userspace

2012-08-23 Thread Dong Hao
From: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com Exporting KVM exit information to userspace to be consumed by perf. [ Dong Hao haod...@linux.vnet.ibm.com: rebase it on acme's git tree ] Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com Signed-off-by: Dong Hao

Re: [PATCH] kvm/book3s: fix build error caused by gfn_to_hva_memslot()

2012-08-23 Thread Takuya Yoshikawa
Alex, what do you think about this? On Thu, 23 Aug 2012 16:35:15 +0800 Gavin Shan sha...@linux.vnet.ibm.com wrote: On Thu, Aug 23, 2012 at 05:24:00PM +0900, Takuya Yoshikawa wrote: On Thu, 23 Aug 2012 15:42:49 +0800 Gavin Shan sha...@linux.vnet.ibm.com wrote: The build error was caused by

Re: [PATCH] kvm/book3s: fix build error caused by gfn_to_hva_memslot()

2012-08-23 Thread Xiao Guangrong
On 08/24/2012 09:54 AM, Takuya Yoshikawa wrote: Alex, what do you think about this? On Thu, 23 Aug 2012 16:35:15 +0800 Gavin Shan sha...@linux.vnet.ibm.com wrote: On Thu, Aug 23, 2012 at 05:24:00PM +0900, Takuya Yoshikawa wrote: On Thu, 23 Aug 2012 15:42:49 +0800 Gavin Shan

Re: KVM-enabled Linux 3.2 won't boot in kvm

2012-08-23 Thread Neal Murphy
On Saturday 18 August 2012 22:04:20 Neal Murphy wrote: I've been using KVM for a few years now. I've had little trouble with it. But now it's got me treed. I cannot get a KVM-enabled Linux 3.2.27 kernel to boot in qemu-kvm unless I specify '-no-kvm'. I've used a similarly-built and -

Re: [GIT PULL] KVM fixes for 3.6-rc3

2012-08-23 Thread Linus Torvalds
On Thu, Aug 23, 2012 at 12:30 AM, Marcelo Tosatti mtosa...@redhat.com wrote: Please pull from git://git.kernel.org/pub/scm/virt/kvm/kvm.git master To receive the following KVM bug fixes: I'm not seeing what you claim is there. This commit seems to be missing: forgot to push? Avi Kivity

Re: [PATCH RFC 0/3] Add guest cpu_entitlement reporting

2012-08-23 Thread Glauber Costa
On 08/24/2012 03:14 AM, Michael Wolf wrote: This is an RFC regarding the reporting of stealtime. In the case of where you have a system that is running with partial processors such as KVM the user may see steal time being reported in accounting tools such as top or vmstat. This can cause

Re: [PATCH v4 4/8] KVM-HV: Add VCPU running/pre-empted state for guest

2012-08-23 Thread Nikunj A Dadhania
On Thu, 23 Aug 2012 08:46:22 -0300, Marcelo Tosatti mtosa...@redhat.com wrote: On Tue, Aug 21, 2012 at 04:56:43PM +0530, Nikunj A. Dadhania wrote: From: Nikunj A. Dadhania nik...@linux.vnet.ibm.com Hypervisor code to indicate guest running/pre-empteded status through msr. The page is now

Re: [PATCH v4 3/8] KVM Guest: Add VCPU running/pre-empted state for guest

2012-08-23 Thread Nikunj A Dadhania
On Thu, 23 Aug 2012 06:36:43 -0300, Marcelo Tosatti mtosa...@redhat.com wrote: On Tue, Aug 21, 2012 at 04:56:35PM +0530, Nikunj A. Dadhania wrote: +void kvm_disable_vcpu_state(void) +{ + if (!has_vcpu_state) + return; + + wrmsr(MSR_KVM_VCPU_STATE, 0, 0); wrmsrl

Re: [PATCH] kvm/book3s: fix build error caused by gfn_to_hva_memslot()

2012-08-23 Thread Xiao Guangrong
On 08/24/2012 09:54 AM, Takuya Yoshikawa wrote: Alex, what do you think about this? On Thu, 23 Aug 2012 16:35:15 +0800 Gavin Shan sha...@linux.vnet.ibm.com wrote: On Thu, Aug 23, 2012 at 05:24:00PM +0900, Takuya Yoshikawa wrote: On Thu, 23 Aug 2012 15:42:49 +0800 Gavin Shan