[PATCH v2 2/3] KVM: PPC: Book3S HV: Make a HPTE removal function available

2012-11-20 Thread Paul Mackerras
This makes a HPTE removal function, kvmppc_do_h_remove(), available outside book3s_hv_rm_mmu.c. This will be used by the HPT writing code. Signed-off-by: Paul Mackerras pau...@samba.org --- v2: basically unchanged from v1, just rediffed arch/powerpc/include/asm/kvm_book3s.h |3 +++

[PATCH v2 1/3] KVM: PPC: Book3S HV: Add a mechanism for recording modified HPTEs

2012-11-20 Thread Paul Mackerras
This uses a bit in our record of the guest view of the HPTE to record when the HPTE gets modified. We use a reserved bit for this, and ensure that this bit is always cleared in HPTE values returned to the guest. The recording of modified HPTEs is only done if other code indicates its interest by

[PATCH v2 3/3] KVM: PPC: Book3S HV: Provide a method for userspace to read and write the HPT

2012-11-20 Thread Paul Mackerras
A new ioctl, KVM_PPC_GET_HTAB_FD, returns a file descriptor. Reads on this fd return the contents of the HPT (hashed page table), writes create and/or remove entries in the HPT. There is a new capability, KVM_CAP_PPC_HTAB_FD, to indicate the presence of the ioctl. The ioctl takes an argument

Re: [patch 18/18] KVM: x86: update pvclock area conditionally, on cpu migration

2012-11-20 Thread Glauber Costa
On 11/20/2012 01:58 AM, Marcelo Tosatti wrote: As requested by Glauber, do not update kvmclock area on vcpu-pcpu migration, in case the host has stable TSC. This is to reduce cacheline bouncing. Signed-off-by: Marcelo Tosatti mtosa...@redhat.com Index: vsyscall/arch/x86/kvm/x86.c

[PATCH] KVM: PPC: Book3S HV: Fix bug causing loss of page dirty state

2012-11-20 Thread Paul Mackerras
This fixes a bug where adding a new guest HPT entry via the H_ENTER hcall would lose the changed bit in the reverse map information for the guest physical page being mapped. The result was that the KVM_GET_DIRTY_LOG could return a zero bit for the page even though the page had been modified by

Re: [patch 00/18] pvclock vsyscall support + KVM hypervisor support (v5)

2012-11-20 Thread Glauber Costa
On 11/20/2012 01:57 AM, Marcelo Tosatti wrote: This patchset, based on earlier work by Jeremy Fitzhardinge, implements paravirtual clock vsyscall support. It should be possible to implement Xen support relatively easily. It reduces clock_gettime from 500 cycles to 200 cycles on my

Re: [PATCH] KVM: PPC: Book3S HV: Fix bug causing loss of page dirty state

2012-11-20 Thread Alexander Graf
On 20.11.2012, at 10:01, Paul Mackerras wrote: This fixes a bug where adding a new guest HPT entry via the H_ENTER hcall would lose the changed bit in the reverse map information for the guest physical page being mapped. The result was that the KVM_GET_DIRTY_LOG could return a zero bit for

Re: [PATCH v2 3/3] KVM: PPC: Book3S HV: Provide a method for userspace to read and write the HPT

2012-11-20 Thread Alexander Graf
On 20.11.2012, at 09:57, Paul Mackerras wrote: A new ioctl, KVM_PPC_GET_HTAB_FD, returns a file descriptor. Reads on this fd return the contents of the HPT (hashed page table), writes create and/or remove entries in the HPT. There is a new capability, KVM_CAP_PPC_HTAB_FD, to indicate the

Re: [PATCH 2/3] s390: Virtual channel subsystem support.

2012-11-20 Thread Cornelia Huck
On Mon, 19 Nov 2012 14:30:00 +0100 Alexander Graf ag...@suse.de wrote: On 31.10.2012, at 17:24, Cornelia Huck wrote: Provide a mechanism for qemu to provide fully virtual subchannels to the guest. In the KVM case, this relies on the kernel's css support for I/O and machine check

Re: [kvmarm] [PATCH v4 09/14] KVM: ARM: Emulation framework and CP15 emulation

2012-11-20 Thread Rusty Russell
Peter Maydell peter.mayd...@linaro.org writes: On 19 November 2012 15:01, Will Deacon will.dea...@arm.com wrote: On Sat, Nov 10, 2012 at 03:43:13PM +, Christoffer Dall wrote: +/* + * A15-specific CP15 registers. + * Important: Must be sorted ascending by CRn, CRM, Op1, Op2 + */ +static

Re: [PATCH v4 0/2] x86: clear vmcss on all cpus when doing kdump if necessary

2012-11-20 Thread zhangyanfei
于 2012年11月20日 08:32, Marcelo Tosatti 写道: On Fri, Nov 16, 2012 at 06:12:58PM +0800, zhangyanfei wrote: Hello Marcelo, Any thoughts? I thought a function call was OK, but its better to have all code in vmx.c. Please have an atomic notifier in kexec.c (registered by KVM module via

Re: [PATCH v11] kvm: notify host when the guest is panicked

2012-11-20 Thread Hu Tao
Hi Marcelo, On Tue, Nov 13, 2012 at 12:19:08AM -0200, Marcelo Tosatti wrote: On Fri, Nov 09, 2012 at 03:17:39PM -0500, Sasha Levin wrote: On Mon, Nov 5, 2012 at 8:58 PM, Hu Tao hu...@cn.fujitsu.com wrote: But in the case of panic notification, more dependency means more chances of

Re: Re: Re: [RFC PATCH 0/2] kvm/vmx: Output TSC offset

2012-11-20 Thread Yoshihiro YUNOMAE
Hi Marcelo, Sorry for the late reply. (2012/11/17 4:15), Marcelo Tosatti wrote: On Wed, Nov 14, 2012 at 05:26:10PM +0900, Yoshihiro YUNOMAE wrote: Thank you for commenting on my patch set. (2012/11/14 11:31), Steven Rostedt wrote: On Tue, 2012-11-13 at 18:03 -0800, David Sharp wrote: On

Re: Re: Re: [RFC PATCH 0/2] kvm/vmx: Output TSC offset

2012-11-20 Thread Yoshihiro YUNOMAE
Hi Steven, Sorry for the late reply. (2012/11/17 0:05), Steven Rostedt wrote: On Wed, 2012-11-14 at 17:26 +0900, Yoshihiro YUNOMAE wrote: Thank you for commenting on my patch set. (2012/11/14 11:31), Steven Rostedt wrote: On Tue, 2012-11-13 at 18:03 -0800, David Sharp wrote: On Tue, Nov

Re: [PATCH v2 3/3] KVM: PPC: Book3S HV: Provide a method for userspace to read and write the HPT

2012-11-20 Thread Paul Mackerras
On Tue, Nov 20, 2012 at 10:16:24AM +0100, Alexander Graf wrote: Documentation is out of sync :). Oops, sorry... :) Applied all 3 with fixed documentation. Great, thanks. Regards, Paul. -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to

Re: [PATCH 1/3] KVM: x86: clean up reexecute_instruction

2012-11-20 Thread Gleb Natapov
On Tue, Nov 20, 2012 at 07:58:32AM +0800, Xiao Guangrong wrote: Little cleanup for reexecute_instruction, also use gpa_to_gfn in retry_instruction Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com --- arch/x86/kvm/x86.c | 13 ++--- 1 files changed, 6 insertions(+),

[PATCH] KVM: Retire as maintainer

2012-11-20 Thread Avi Kivity
After six and a half years of writing and maintaining KVM, it is time to move to new things. Update my MAINTAINERS entry to reflect that. Signed-off-by: Avi Kivity a...@redhat.com --- CREDITS | 5 + MAINTAINERS | 1 - 2 files changed, 5 insertions(+), 1 deletion(-) diff --git a/CREDITS

Re: [PATCH] KVM: Retire as maintainer

2012-11-20 Thread Avi Kivity
On 11/20/2012 02:26 PM, Avi Kivity wrote: After six and a half years of writing and maintaining KVM, it is time to move to new things. Update my MAINTAINERS entry to reflect that. Gleb, please send an incremental patch (against kvm.git master) installing yourself as a new co-maintainer. --

[PATCH] KVM: taking co-maintenance

2012-11-20 Thread Gleb Natapov
Updating MAINTAINERS file. Signed-off-by: Gleb Natapov g...@redhat.com diff --git a/MAINTAINERS b/MAINTAINERS index 6b5b0b7..b273360 100644 --- a/MAINTAINERS +++ b/MAINTAINERS @@ -4281,6 +4281,7 @@ F:include/linux/sunrpc/ KERNEL VIRTUAL MACHINE (KVM) M: Marcelo Tosatti

Re: [PATCH] KVM: taking co-maintenance

2012-11-20 Thread Avi Kivity
On 11/20/2012 02:37 PM, Gleb Natapov wrote: Updating MAINTAINERS file. Applied, thanks. -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at

[GIT PULL] KVM maintainership update

2012-11-20 Thread Avi Kivity
Linus, please pull from: git://git.kernel.org/pub/scm/virt/kvm/kvm.git master to receive this MAINTAINERS update. After many years of maintaining KVM, I am moving on. It was a real pleasure for me to work with so many talented and dedicated hackers on this project. Replacing me will be one

[RFC v4 1/8] linux-headers: Add ARM KVM headers (not for upstream)

2012-11-20 Thread Peter Maydell
This commit adds the ARM KVM headers. This is not to go to QEMU upstream -- the correct path there is that the KVM code will be committed to a mainline upstream kernel, and then upstream QEMU can do a bulk header update from the upstream kernel, which will allow us to drop this temporary commit.

[RFC v4 8/8] oslib-posix: Align to permit transparent hugepages on ARM Linux

2012-11-20 Thread Peter Maydell
ARM Linux (like x86-64 Linux) can use transparent hugepages for KVM if memory blocks are 2MiB aligned; set QEMU_VMALLOC_ALIGN accordingly. Signed-off-by: Peter Maydell peter.mayd...@linaro.org --- oslib-posix.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/oslib-posix.c

[RFC v4 6/8] hw/kvm/arm_gic: Implement support for KVM in-kernel ARM GIC

2012-11-20 Thread Peter Maydell
Implement support for using the KVM in-kernel GIC for ARM. Signed-off-by: Peter Maydell peter.mayd...@linaro.org --- hw/a15mpcore.c |8 ++- hw/arm/Makefile.objs |1 + hw/kvm/arm_gic.c | 169 ++ 3 files changed, 177 insertions(+),

[RFC v4 0/8] QEMU: Support KVM on ARM

2012-11-20 Thread Peter Maydell
Round 4 of the QEMU patches to support KVM for ARM on Cortex-A15 hardware. It's intended for use with the kernel tree at git://github.com/virtualopensystems/linux-kvm-arm.git kvm-arm-v14-vgic-timers Still RFC pending the kernel patches actually being accepted upstream... Changes v3 to v4: *

Re: [PATCH] vhost-blk: Add vhost-blk support v5

2012-11-20 Thread Michael S. Tsirkin
On Tue, Nov 20, 2012 at 02:39:40PM +0800, Asias He wrote: On 11/20/2012 04:26 AM, Michael S. Tsirkin wrote: On Mon, Nov 19, 2012 at 04:53:42PM +0800, Asias He wrote: vhost-blk is an in-kernel virito-blk device accelerator. Due to lack of proper in-kernel AIO interface, this version

Re: [PATCH 0/4] AER-KVM: Error containment of PCI pass-thru devices assigned to KVM guests

2012-11-20 Thread Stefan Hajnoczi
On Tue, Nov 20, 2012 at 06:31:48AM +, Pandarathil, Vijaymohan R wrote: Add support for error containment when a PCI pass-thru device assigned to a KVM guest encounters an error. This is for PCIe devices/drivers that support AER functionality. When the OS is notified of an error in a

Re: [kvmarm] [RFC v4 8/8] oslib-posix: Align to permit transparent hugepages on ARM Linux

2012-11-20 Thread Alexander Graf
On 11/20/2012 02:31 PM, Peter Maydell wrote: ARM Linux (like x86-64 Linux) can use transparent hugepages for KVM if memory blocks are 2MiB aligned; set QEMU_VMALLOC_ALIGN accordingly. Signed-off-by: Peter Maydellpeter.mayd...@linaro.org --- oslib-posix.c |2 +- 1 file changed, 1

[RFC v4 7/8] configure: Enable KVM on ARM

2012-11-20 Thread Peter Maydell
Enable KVM on ARM hosts, now that all the necessary components for it exist. Signed-off-by: Peter Maydell peter.mayd...@linaro.org --- configure |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/configure b/configure index 780b19a..2438d6d 100755 --- a/configure +++

[RFC v4 2/8] ARM: KVM: Add support for KVM on ARM architecture

2012-11-20 Thread Peter Maydell
From: Christoffer Dall cd...@cs.columbia.edu Add basic support for KVM on ARM architecture. Signed-off-by: Christoffer Dall cd...@cs.columbia.edu [PMM: Minor tweaks and code cleanup, switch to ONE_REG] Signed-off-by: Peter Maydell peter.mayd...@linaro.org --- hw/arm_pic.c | 26

[RFC v4 3/8] ARM KVM: save and load VFP registers from kernel

2012-11-20 Thread Peter Maydell
Add support for saving and restoring VFP register state from the kernel. This includes a check that the KVM-created CPU has full VFP support (as the TCG Cortex-A15 model always does), since for the moment ARM QEMU doesn't have any way to tweak optional features on created CPUs. Signed-off-by:

[RFC v4 4/8] hw/arm_gic: Add presave/postload hooks

2012-11-20 Thread Peter Maydell
Add presave/postload hooks to the ARM GIC common base class. These will be used by the KVM in-kernel GIC subclass to sync state between kernel and userspace when migrating. Signed-off-by: Peter Maydell peter.mayd...@linaro.org Reviewed-by: Andreas Färber afaer...@suse.de --- hw/arm_gic_common.c

[RFC v4 5/8] target-arm: Use MemoryListener to identify GIC base address for KVM

2012-11-20 Thread Peter Maydell
When using an in-kernel GIC with KVM, we need to tell the kernel where the GIC's memory mapped registers live. Do this by registering a MemoryListener which tracks where the board model maps the A15's private peripherals, so we can finish the GIC initialisation when the GIC is actually mapped.

Re: [kvmarm] [RFC v4 8/8] oslib-posix: Align to permit transparent hugepages on ARM Linux

2012-11-20 Thread Christoffer Dall
On Tue, Nov 20, 2012 at 8:54 AM, Alexander Graf ag...@suse.de wrote: On 11/20/2012 02:31 PM, Peter Maydell wrote: ARM Linux (like x86-64 Linux) can use transparent hugepages for KVM if memory blocks are 2MiB aligned; set QEMU_VMALLOC_ALIGN accordingly. Signed-off-by: Peter

RE: [PATCH 0/4] AER-KVM: Error containment of PCI pass-thru devices assigned to KVM guests

2012-11-20 Thread Pandarathil, Vijaymohan R
-Original Message- From: Stefan Hajnoczi [mailto:stefa...@gmail.com] Sent: Tuesday, November 20, 2012 5:41 AM To: Pandarathil, Vijaymohan R Cc: kvm@vger.kernel.org; linux-...@vger.kernel.org; qemu-de...@nongnu.org; linux-ker...@vger.kernel.org Subject: Re: [PATCH 0/4] AER-KVM:

Re: [kvmarm] [RFC v4 8/8] oslib-posix: Align to permit transparent hugepages on ARM Linux

2012-11-20 Thread Alexander Graf
On 11/20/2012 02:55 PM, Christoffer Dall wrote: On Tue, Nov 20, 2012 at 8:54 AM, Alexander Grafag...@suse.de wrote: On 11/20/2012 02:31 PM, Peter Maydell wrote: ARM Linux (like x86-64 Linux) can use transparent hugepages for KVM if memory blocks are 2MiB aligned; set QEMU_VMALLOC_ALIGN

Re: [kvmarm] [RFC v4 8/8] oslib-posix: Align to permit transparent hugepages on ARM Linux

2012-11-20 Thread Peter Maydell
On 20 November 2012 14:37, Alexander Graf ag...@suse.de wrote: On 11/20/2012 02:55 PM, Christoffer Dall wrote: On Tue, Nov 20, 2012 at 8:54 AM, Alexander Grafag...@suse.de wrote: On 11/20/2012 02:31 PM, Peter Maydell wrote: ARM Linux (like x86-64 Linux) can use transparent hugepages for KVM

Re: KVM call agenda for 2012-11-20

2012-11-20 Thread Juan Quintela
Juan Quintela quint...@redhat.com wrote: Hi Please send in any agenda topics you are interested in. As there are no topic's call is cancelled. happy hacking, Juan. -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More

messed up with xml-files and configuration of a VM

2012-11-20 Thread Lentes, Bernd
Hi, first, i'm new to kvm. I'm running KVM on a sles 11 sp2, kernel 3.0.13-0.27-default. My guest is an Ubuntu 12.0.4 LTS 64bit. The guest has attached a CDROM, using an iso-file from a CIFS-Share. I detached it with the virtual machine manager (0.9.0). I don't see the cd-rom anymore in the

Re: [RFC PATCH 13/16] kvm tools: keep track of registered memory banks in struct kvm

2012-11-20 Thread Will Deacon
Hi Sasha, On Tue, Nov 13, 2012 at 04:37:38AM +, Sasha Levin wrote: On 11/12/2012 06:57 AM, Will Deacon wrote: struct kvm { struct kvm_arch arch; struct kvm_config cfg; @@ -49,6 +56,7 @@ struct kvm { u64 ram_size; void

Re: [PATCH] vfio powerpc: enabled and supported on powernv platform

2012-11-20 Thread Alex Williamson
On Tue, 2012-11-20 at 11:48 +1100, Alexey Kardashevskiy wrote: VFIO implements platform independent stuff such as a PCI driver, BAR access (via read/write on a file descriptor or direct mapping when possible) and IRQ signaling. The platform dependent part includes IOMMU initialization and

Re: [PATCH 1/3] KVM: x86: clean up reexecute_instruction

2012-11-20 Thread Xiao Guangrong
On 11/20/2012 08:11 PM, Gleb Natapov wrote: On Tue, Nov 20, 2012 at 07:58:32AM +0800, Xiao Guangrong wrote: Little cleanup for reexecute_instruction, also use gpa_to_gfn in retry_instruction Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com --- arch/x86/kvm/x86.c | 13

Re: [RFC PATCH 13/16] kvm tools: keep track of registered memory banks in struct kvm

2012-11-20 Thread Sasha Levin
On 11/20/2012 12:15 PM, Will Deacon wrote: Hi Sasha, On Tue, Nov 13, 2012 at 04:37:38AM +, Sasha Levin wrote: On 11/12/2012 06:57 AM, Will Deacon wrote: struct kvm { struct kvm_arch arch; struct kvm_config cfg; @@ -49,6 +56,7 @@ struct kvm { u64

Re: [PATCH v11] kvm: notify host when the guest is panicked

2012-11-20 Thread Marcelo Tosatti
On Tue, Nov 20, 2012 at 06:09:48PM +0800, Hu Tao wrote: Hi Marcelo, On Tue, Nov 13, 2012 at 12:19:08AM -0200, Marcelo Tosatti wrote: On Fri, Nov 09, 2012 at 03:17:39PM -0500, Sasha Levin wrote: On Mon, Nov 5, 2012 at 8:58 PM, Hu Tao hu...@cn.fujitsu.com wrote: But in the case of panic

Re: [PATCH v5] kvm/fpu: Enable fully eager restore kvm FPU

2012-11-20 Thread Marcelo Tosatti
On Wed, Nov 07, 2012 at 10:01:11AM +0800, Xudong Hao wrote: Romove fpu lazy restore logic, using eager restore totally. v5 changes from v4: - remove lazy fpu restore totally, fpu eager restore does not have performance regression and simple the code. v4 changes from v3: - Wrap up some

Re: [PATCH 4/5] KVM: MMU: move adjusting softmmu pte access to FNAME(page_fault)

2012-11-20 Thread Marcelo Tosatti
On Mon, Nov 05, 2012 at 08:12:07PM +0800, Xiao Guangrong wrote: Then, no mmu specified code exists in the common function and drop two parameters in set_spte Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com arch/x86/kvm/mmu.c | 42

Re: [PATCH 2/5] KVM: MMU: simplify mmu_set_spte

2012-11-20 Thread Marcelo Tosatti
On Tue, Nov 13, 2012 at 04:39:44PM +0800, Xiao Guangrong wrote: On 11/13/2012 07:12 AM, Marcelo Tosatti wrote: On Mon, Nov 05, 2012 at 08:10:08PM +0800, Xiao Guangrong wrote: In order to detecting spte remapping, we can simply check whether the spte has already been pointing to the pfn even

Re: [PATCH 3/5] KVM: MMU: simplify set_spte

2012-11-20 Thread Marcelo Tosatti
On Mon, Nov 05, 2012 at 08:11:03PM +0800, Xiao Guangrong wrote: It is more cleaner if we can update pte_access fist then set spte according to pte_access, also introduce gfn_need_write_protect to check whether the gfn need to be write-protected Signed-off-by: Xiao Guangrong

Re: Re: Re: [RFC PATCH 0/2] kvm/vmx: Output TSC offset

2012-11-20 Thread Marcelo Tosatti
On Tue, Nov 20, 2012 at 07:36:33PM +0900, Yoshihiro YUNOMAE wrote: Hi Marcelo, Sorry for the late reply. (2012/11/17 4:15), Marcelo Tosatti wrote: On Wed, Nov 14, 2012 at 05:26:10PM +0900, Yoshihiro YUNOMAE wrote: Thank you for commenting on my patch set. (2012/11/14 11:31), Steven

Re: [PATCH 2/5] KVM: MMU: simplify mmu_set_spte

2012-11-20 Thread Xiao Guangrong
On 11/21/2012 06:18 AM, Marcelo Tosatti wrote: - child = page_header(pte PT64_BASE_ADDR_MASK); - drop_parent_pte(child, sptep); - kvm_flush_remote_tlbs(vcpu-kvm); How come its safe to drop this case? We use if (pfn != spte_to_pfn(*sptep))

Re: [PATCH 3/5] KVM: MMU: simplify set_spte

2012-11-20 Thread Xiao Guangrong
On 11/21/2012 06:24 AM, Marcelo Tosatti wrote: On Mon, Nov 05, 2012 at 08:11:03PM +0800, Xiao Guangrong wrote: It is more cleaner if we can update pte_access fist then set spte according to pte_access, also introduce gfn_need_write_protect to check whether the gfn need to be write-protected

Re: [PATCH 4/5] KVM: MMU: move adjusting softmmu pte access to FNAME(page_fault)

2012-11-20 Thread Xiao Guangrong
On 11/21/2012 06:27 AM, Marcelo Tosatti wrote: @@ -544,6 +544,21 @@ static int FNAME(page_fault)(struct kvm_vcpu *vcpu, gva_t addr, u32 error_code, return 0; } +if (write_fault !(walker.pte_access ACC_WRITE_MASK) + !is_write_protection(vcpu) !user_fault)

Re: [PATCH 2/5] KVM: MMU: simplify mmu_set_spte

2012-11-20 Thread Marcelo Tosatti
On Wed, Nov 21, 2012 at 07:23:26AM +0800, Xiao Guangrong wrote: On 11/21/2012 06:18 AM, Marcelo Tosatti wrote: -child = page_header(pte PT64_BASE_ADDR_MASK); -drop_parent_pte(child, sptep); -

Interrupt controller updates

2012-11-20 Thread Benjamin Herrenschmidt
Hi Jan ! David (CC) want to make some progress with our in-kernel PIC. From memory, one of the outcomes of the BOF was that we need to move the existing enable in-kernel PIC from generic KVM init to machine init in order to be able to add an argument indicating the model use by the arch/platform

RE: Guest performance is reduced after live migration

2012-11-20 Thread Shouta.Uehara
Dear all I continue watching a mailing list whether a similar problem is reported because a problem does not seem to happen to others. Any information, however small, would be appreciated. regards -Original Message- From: Uehara, Shouta (shouta.ueh...@jp.yokogawa.com) Sent: Friday,

[PATCH v5 0/2] x86: vmclear vmcss on all cpus when doing kdump if necessary

2012-11-20 Thread Zhang Yanfei
Currently, kdump just makes all the logical processors leave VMX operation by executing VMXOFF instruction, so any VMCSs active on the logical processors may be corrupted. But, sometimes, we need the VMCSs to debug guest images contained in the host vmcore. To prevent the corruption, we should

[PATCH v5 1/2] x86/kexec: VMCLEAR vmcss on all cpus if necessary

2012-11-20 Thread Zhang Yanfei
This patch adds an atomic notifier list named crash_notifier_list. When loading kvm-intel module, a notifier will be registered in the list to enable vmcss loaded on all cpus to be VMCLEAR'd if needed. Signed-off-by: Zhang Yanfei zhangyan...@cn.fujitsu.com --- arch/x86/include/asm/kexec.h |2

[PATCH v5 2/2] KVM-INTEL: add a notifier and a bitmap to support VMCLEAR in kdump

2012-11-20 Thread Zhang Yanfei
The notifier will be registered in crash_notifier_list when loading kvm-intel module. And the bitmap indicates whether we should do VMCLEAR operation in kdump. The bits in the bitmap are set/unset according to different conditions. Signed-off-by: Zhang Yanfei zhangyan...@cn.fujitsu.com ---

Re: [PATCH 2/5] KVM: MMU: simplify mmu_set_spte

2012-11-20 Thread Xiao Guangrong
On 11/21/2012 07:51 AM, Marcelo Tosatti wrote: On Wed, Nov 21, 2012 at 07:23:26AM +0800, Xiao Guangrong wrote: On 11/21/2012 06:18 AM, Marcelo Tosatti wrote: -child = page_header(pte PT64_BASE_ADDR_MASK); -drop_parent_pte(child, sptep); -

RE: [PATCH v5] kvm/fpu: Enable fully eager restore kvm FPU

2012-11-20 Thread Hao, Xudong
-Original Message- From: Marcelo Tosatti [mailto:mtosa...@redhat.com] Sent: Wednesday, November 21, 2012 6:00 AM To: Hao, Xudong Cc: a...@redhat.com; kvm@vger.kernel.org Subject: Re: [PATCH v5] kvm/fpu: Enable fully eager restore kvm FPU On Wed, Nov 07, 2012 at 10:01:11AM +0800,

Re: Guest performance is reduced after live migration

2012-11-20 Thread Xiao Guangrong
On 11/21/2012 09:25 AM, shouta.ueh...@jp.yokogawa.com wrote: Dear allI I continue watching a mailing list whether a similar problem is reported because a problem does not seem to happen to others. Any information, however small, would be appreciated. I am digging into it, but did not get

Re: [PATCH] vhost-blk: Add vhost-blk support v5

2012-11-20 Thread Asias He
On 11/20/2012 09:37 PM, Michael S. Tsirkin wrote: On Tue, Nov 20, 2012 at 02:39:40PM +0800, Asias He wrote: On 11/20/2012 04:26 AM, Michael S. Tsirkin wrote: On Mon, Nov 19, 2012 at 04:53:42PM +0800, Asias He wrote: vhost-blk is an in-kernel virito-blk device accelerator. Due to lack of

Re: messed up with xml-files and configuration of a VM

2012-11-20 Thread Stefan Hajnoczi
On Tue, Nov 20, 2012 at 5:13 PM, Lentes, Bernd bernd.len...@helmholtz-muenchen.de wrote: first, i'm new to kvm. I'm running KVM on a sles 11 sp2, kernel 3.0.13-0.27-default. My guest is an Ubuntu 12.0.4 LTS 64bit. The guest has attached a CDROM, using an iso-file from a CIFS-Share. I

Re: qemu-kvm-1.2.0: double free or corruption

2012-11-20 Thread Stefan Hajnoczi
On Mon, Nov 19, 2012 at 8:56 AM, Nikola Ciprich nikola.cipr...@linuxbox.cz wrote: on one of our servers, windows 2008 KVM suddenly crashed. I see following in libvirt log: *** glibc detected *** /usr/bin/qemu-kvm: double free or corruption (!prev): 0x7fc634008cd0 *** === Backtrace:

Re: qemu-kvm-1.2.0: double free or corruption in VNC code

2012-11-20 Thread Nikola Ciprich
Hello Stefan, thanks! here it goes.. *** glibc detected *** /usr/bin/qemu-kvm: double free or corruption (!prev): 0x7fc634008cd0 *** === Backtrace: = /lib64/libc.so.6(+0x75916)[0x7fc9026f4916] /lib64/libc.so.6(+0x78443)[0x7fc9026f7443]

[PATCH v2 2/3] KVM: PPC: Book3S HV: Make a HPTE removal function available

2012-11-20 Thread Paul Mackerras
This makes a HPTE removal function, kvmppc_do_h_remove(), available outside book3s_hv_rm_mmu.c. This will be used by the HPT writing code. Signed-off-by: Paul Mackerras pau...@samba.org --- v2: basically unchanged from v1, just rediffed arch/powerpc/include/asm/kvm_book3s.h |3 +++

[PATCH v2 1/3] KVM: PPC: Book3S HV: Add a mechanism for recording modified HPTEs

2012-11-20 Thread Paul Mackerras
This uses a bit in our record of the guest view of the HPTE to record when the HPTE gets modified. We use a reserved bit for this, and ensure that this bit is always cleared in HPTE values returned to the guest. The recording of modified HPTEs is only done if other code indicates its interest by

[PATCH v2 3/3] KVM: PPC: Book3S HV: Provide a method for userspace to read and write the HPT

2012-11-20 Thread Paul Mackerras
A new ioctl, KVM_PPC_GET_HTAB_FD, returns a file descriptor. Reads on this fd return the contents of the HPT (hashed page table), writes create and/or remove entries in the HPT. There is a new capability, KVM_CAP_PPC_HTAB_FD, to indicate the presence of the ioctl. The ioctl takes an argument

[PATCH] KVM: PPC: Book3S HV: Fix bug causing loss of page dirty state

2012-11-20 Thread Paul Mackerras
This fixes a bug where adding a new guest HPT entry via the H_ENTER hcall would lose the changed bit in the reverse map information for the guest physical page being mapped. The result was that the KVM_GET_DIRTY_LOG could return a zero bit for the page even though the page had been modified by

Re: [PATCH] KVM: PPC: Book3S HV: Fix bug causing loss of page dirty state

2012-11-20 Thread Alexander Graf
On 20.11.2012, at 10:01, Paul Mackerras wrote: This fixes a bug where adding a new guest HPT entry via the H_ENTER hcall would lose the changed bit in the reverse map information for the guest physical page being mapped. The result was that the KVM_GET_DIRTY_LOG could return a zero bit for

Re: [PATCH v2 3/3] KVM: PPC: Book3S HV: Provide a method for userspace to read and write the HPT

2012-11-20 Thread Alexander Graf
On 20.11.2012, at 09:57, Paul Mackerras wrote: A new ioctl, KVM_PPC_GET_HTAB_FD, returns a file descriptor. Reads on this fd return the contents of the HPT (hashed page table), writes create and/or remove entries in the HPT. There is a new capability, KVM_CAP_PPC_HTAB_FD, to indicate the