Re: [patch 08/16] KVM: x86: introduce facility to support vsyscall pvclock, via MSR

2012-11-05 Thread Glauber Costa
On 11/02/2012 05:00 PM, Marcelo Tosatti wrote: On Fri, Nov 02, 2012 at 02:23:06PM +0400, Glauber Costa wrote: On 11/02/2012 01:39 AM, Marcelo Tosatti wrote: On Thu, Nov 01, 2012 at 06:28:31PM +0400, Glauber Costa wrote: On 11/01/2012 02:47 AM, Marcelo Tosatti wrote: Allow a guest to register

Re: [patch 09/16] x86: kvm guest: pvclock vsyscall support

2012-11-05 Thread Marcelo Tosatti
On Fri, Nov 02, 2012 at 01:42:41PM +0400, Glauber Costa wrote: On 11/01/2012 02:47 AM, Marcelo Tosatti wrote: + info = pvclock_get_vsyscall_time_info(cpu); + + low = (int)__pa(info) | 1; + high = ((u64)__pa(per_cpu(hv_clock, cpu)) 32); + ret =

Re: [PATCH] seabios/pci: enable 64 bit bar on seabios

2012-11-05 Thread Gerd Hoffmann
Hi, I just want to enable 64 bit bars for KVM usage, seabios 1.7.0 is used in current qemu-kvm, which not handle 64 bit bars yet. I cloned seabios code from kernel.org(seems no 64 bit bars supporting), but I was not taking notice of the tree on http://git.qemu.org/, yes it has already done

RE: [PATCH] seabios/pci: enable 64 bit bar on seabios

2012-11-05 Thread Hao, Xudong
-Original Message- From: Gerd Hoffmann [mailto:kra...@redhat.com] Sent: Monday, November 05, 2012 5:08 PM To: Hao, Xudong Cc: ke...@koconnor.net; seab...@seabios.org; kvm@vger.kernel.org; a...@redhat.com Subject: Re: [PATCH] seabios/pci: enable 64 bit bar on seabios Hi, I

Chat about Snabb Switch at KVM Summit this week?

2012-11-05 Thread Luke Gorrie
Hello all, I would like to introduce my new project and see if there are people on this list who would like to meet up at KVM Summit this week and give me some feedback. I have a new project called Snabb Switch and it's an open source ethernet switch for hypervisors. I'm aiming for a specific

[PATCH] KVM: MMU: lazily drop large spte

2012-11-05 Thread Xiao Guangrong
Do not drop large spte until it can be insteaded by small pages so that the guest can happliy read memory through it The idea is from Avi: | As I mentioned before, write-protecting a large spte is a good idea, | since it moves some work from protect-time to fault-time, so it reduces | jitter.

[PATCH 1/5] KVM: MMU: cleanup mapping-level

2012-11-05 Thread Xiao Guangrong
Use min() to cleanup mapping_level Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com --- arch/x86/kvm/mmu.c |3 +-- 1 files changed, 1 insertions(+), 2 deletions(-) diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c index 1d8869c..692ebb1 100644 --- a/arch/x86/kvm/mmu.c +++

[PATCH 2/5] KVM: MMU: simplify mmu_set_spte

2012-11-05 Thread Xiao Guangrong
In order to detecting spte remapping, we can simply check whether the spte has already been pointing to the pfn even if the spte is not the last spte for middle spte is pointing to the kernel pfn which can not be mapped to userspace Also, update slot and stat.lpages iff the spte is not remapped

[PATCH 3/5] KVM: MMU: simplify set_spte

2012-11-05 Thread Xiao Guangrong
It is more cleaner if we can update pte_access fist then set spte according to pte_access, also introduce gfn_need_write_protect to check whether the gfn need to be write-protected Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com --- arch/x86/kvm/mmu.c | 109

[PATCH 4/5] KVM: MMU: move adjusting softmmu pte access to FNAME(page_fault)

2012-11-05 Thread Xiao Guangrong
Then, no mmu specified code exists in the common function and drop two parameters in set_spte Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com --- arch/x86/kvm/mmu.c | 42 +++--- arch/x86/kvm/paging_tmpl.h | 25

[PATCH 5/5] KVM: MMU: remove pt_access in mmu_set_spte

2012-11-05 Thread Xiao Guangrong
It is only used in debug code, so drop it Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com --- arch/x86/kvm/mmu.c | 16 +++- arch/x86/kvm/paging_tmpl.h |9 - 2 files changed, 11 insertions(+), 14 deletions(-) diff --git a/arch/x86/kvm/mmu.c

Re: 3.7-rc2 build failure on s390x

2012-11-05 Thread Christian Borntraeger
On 31/10/12 11:32, Alexander Graf wrote: On 23.10.2012, at 08:20, Christian Borntraeger borntrae...@de.ibm.com wrote: On 22/10/12 23:14, Alexander Graf wrote: Hi Christian, During our normal Factory kernel builds, s390x seems to choke:

Re: [Qemu-devel] Ubuntu/Debian Installer + Virtio-SCSI - Bad ram pointer

2012-11-05 Thread Peter Lieven
Am 31.10.2012 um 15:08 schrieb ronnie sahlberg: On Tue, Oct 30, 2012 at 10:48 PM, Stefan Hajnoczi stefa...@gmail.com wrote: On Tue, Oct 30, 2012 at 10:09 PM, ronnie sahlberg ronniesahlb...@gmail.com wrote: About half a year there was an issue where recent kernels had added support to start

Re: 3.7-rc2 build failure on s390x

2012-11-05 Thread Jeff Mahoney
On 11/5/12 8:08 AM, Christian Borntraeger wrote: On 31/10/12 11:32, Alexander Graf wrote: On 23.10.2012, at 08:20, Christian Borntraeger borntrae...@de.ibm.com wrote: On 22/10/12 23:14, Alexander Graf wrote: Hi Christian, During our normal Factory kernel builds, s390x seems to choke:

Re: [PATCH v11] kvm: notify host when the guest is panicked

2012-11-05 Thread Hu Tao
On Tue, Oct 30, 2012 at 10:30:02PM -0400, Sasha Levin wrote: On Tue, Oct 30, 2012 at 9:48 PM, Wen Congyang we...@cn.fujitsu.com wrote: At 10/31/2012 09:12 AM, Marcelo Tosatti Wrote: It has been asked earlier why a simple virtio device is not usable for this (with no response IIRC). 1.

Mellanox IB PCI passthrough fails with qemu-kvm=1.1.2

2012-11-05 Thread Vlastimil Holer
Hi, we have been using PCI passthrough with the Mellanox IB interface (MT27500 Family [ConnectX-3]) on Debian 6.0.6, kernel 3.2.23 and qemu-kvm-1.0 (both from backports). It worked fine until latest update in backports to qemu-kvm-1.1.2. With newer versions IB device probe in guest fails leaving