Mellanox IB PCI passthrough fails with qemu-kvm>=1.1.2

2012-11-05 Thread Vlastimil Holer
Hi, we have been using PCI passthrough with the Mellanox IB interface (MT27500 Family [ConnectX-3]) on Debian 6.0.6, kernel 3.2.23 and qemu-kvm-1.0 (both from backports). It worked fine until latest update in backports to qemu-kvm-1.1.2. With newer versions IB device probe in guest fails leaving f

Re: [PATCH v11] kvm: notify host when the guest is panicked

2012-11-05 Thread Hu Tao
On Tue, Oct 30, 2012 at 10:30:02PM -0400, Sasha Levin wrote: > On Tue, Oct 30, 2012 at 9:48 PM, Wen Congyang wrote: > > At 10/31/2012 09:12 AM, Marcelo Tosatti Wrote: > >> It has been asked earlier why a simple virtio device is not usable > >> for this (with no response IIRC). > > > > 1. We can't

Re: 3.7-rc2 build failure on s390x

2012-11-05 Thread Jeff Mahoney
On 11/5/12 8:08 AM, Christian Borntraeger wrote: > On 31/10/12 11:32, Alexander Graf wrote: >> >> >> On 23.10.2012, at 08:20, Christian Borntraeger >> wrote: >> >>> On 22/10/12 23:14, Alexander Graf wrote: Hi Christian, During our normal Factory kernel builds, s390x seems to choke:

Re: [Qemu-devel] Ubuntu/Debian Installer + Virtio-SCSI -> Bad ram pointer

2012-11-05 Thread Peter Lieven
Am 31.10.2012 um 15:08 schrieb ronnie sahlberg: > On Tue, Oct 30, 2012 at 10:48 PM, Stefan Hajnoczi wrote: >> On Tue, Oct 30, 2012 at 10:09 PM, ronnie sahlberg >> wrote: >>> About half a year there was an issue where recent kernels had added >>> support to start using new scsi opcodes, but the

Re: 3.7-rc2 build failure on s390x

2012-11-05 Thread Christian Borntraeger
On 31/10/12 11:32, Alexander Graf wrote: > > > On 23.10.2012, at 08:20, Christian Borntraeger wrote: > >> On 22/10/12 23:14, Alexander Graf wrote: >>> Hi Christian, >>> >>> During our normal Factory kernel builds, s390x seems to choke: >>> >>> /home/abuild/rpmbuild/BUILD/kernel-default-3.7.rc2/

[PATCH 5/5] KVM: MMU: remove pt_access in mmu_set_spte

2012-11-05 Thread Xiao Guangrong
It is only used in debug code, so drop it Signed-off-by: Xiao Guangrong --- arch/x86/kvm/mmu.c | 16 +++- arch/x86/kvm/paging_tmpl.h |9 - 2 files changed, 11 insertions(+), 14 deletions(-) diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c index 4229e78..1fa

[PATCH 4/5] KVM: MMU: move adjusting softmmu pte access to FNAME(page_fault)

2012-11-05 Thread Xiao Guangrong
Then, no mmu specified code exists in the common function and drop two parameters in set_spte Signed-off-by: Xiao Guangrong --- arch/x86/kvm/mmu.c | 42 +++--- arch/x86/kvm/paging_tmpl.h | 25 - 2 files changed, 31 insertion

[PATCH 3/5] KVM: MMU: simplify set_spte

2012-11-05 Thread Xiao Guangrong
It is more cleaner if we can update pte_access fist then set spte according to pte_access, also introduce gfn_need_write_protect to check whether the gfn need to be write-protected Signed-off-by: Xiao Guangrong --- arch/x86/kvm/mmu.c | 109 1

[PATCH 2/5] KVM: MMU: simplify mmu_set_spte

2012-11-05 Thread Xiao Guangrong
In order to detecting spte remapping, we can simply check whether the spte has already been pointing to the pfn even if the spte is not the last spte for middle spte is pointing to the kernel pfn which can not be mapped to userspace Also, update slot and stat.lpages iff the spte is not remapped S

[PATCH 1/5] KVM: MMU: cleanup mapping-level

2012-11-05 Thread Xiao Guangrong
Use min() to cleanup mapping_level Signed-off-by: Xiao Guangrong --- arch/x86/kvm/mmu.c |3 +-- 1 files changed, 1 insertions(+), 2 deletions(-) diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c index 1d8869c..692ebb1 100644 --- a/arch/x86/kvm/mmu.c +++ b/arch/x86/kvm/mmu.c @@ -831,8 +83

[PATCH] KVM: MMU: lazily drop large spte

2012-11-05 Thread Xiao Guangrong
Do not drop large spte until it can be insteaded by small pages so that the guest can happliy read memory through it The idea is from Avi: | As I mentioned before, write-protecting a large spte is a good idea, | since it moves some work from protect-time to fault-time, so it reduces | jitter. Thi

Chat about Snabb Switch at KVM Summit this week?

2012-11-05 Thread Luke Gorrie
Hello all, I would like to introduce my new project and see if there are people on this list who would like to meet up at KVM Summit this week and give me some feedback. I have a new project called Snabb Switch and it's an open source ethernet switch for hypervisors. I'm aiming for a specific poi

RE: [PATCH] seabios/pci: enable 64 bit bar on seabios

2012-11-05 Thread Hao, Xudong
> -Original Message- > From: Gerd Hoffmann [mailto:kra...@redhat.com] > Sent: Monday, November 05, 2012 5:08 PM > To: Hao, Xudong > Cc: ke...@koconnor.net; seab...@seabios.org; kvm@vger.kernel.org; > a...@redhat.com > Subject: Re: [PATCH] seabios/pci: enable 64 bit bar on seabios > > Hi,

Re: [PATCH] seabios/pci: enable 64 bit bar on seabios

2012-11-05 Thread Gerd Hoffmann
Hi, > I just want to enable 64 bit bars for KVM usage, seabios 1.7.0 is > used in current qemu-kvm, which not handle 64 bit bars yet. I cloned > seabios code from kernel.org(seems no 64 bit bars supporting), but I > was not taking notice of the tree on http://git.qemu.org/, yes it has > already

Re: [patch 09/16] x86: kvm guest: pvclock vsyscall support

2012-11-05 Thread Marcelo Tosatti
On Fri, Nov 02, 2012 at 01:42:41PM +0400, Glauber Costa wrote: > On 11/01/2012 02:47 AM, Marcelo Tosatti wrote: > > + info = pvclock_get_vsyscall_time_info(cpu); > > + > > + low = (int)__pa(info) | 1; > > + high = ((u64)__pa(&per_cpu(hv_clock, cpu)) >> 32); > > + ret = native_write_msr_safe

Re: [patch 08/16] KVM: x86: introduce facility to support vsyscall pvclock, via MSR

2012-11-05 Thread Glauber Costa
On 11/02/2012 05:00 PM, Marcelo Tosatti wrote: > On Fri, Nov 02, 2012 at 02:23:06PM +0400, Glauber Costa wrote: >> On 11/02/2012 01:39 AM, Marcelo Tosatti wrote: >>> On Thu, Nov 01, 2012 at 06:28:31PM +0400, Glauber Costa wrote: On 11/01/2012 02:47 AM, Marcelo Tosatti wrote: > Allow a gues