[매일경제신문사] 바이러스- 발견 경고

2012-11-26 Thread Administrator
발신자 : kvm@vger.kernel.org 수신자 : SEMIANGEL 제목 : Returned mail: Data format error 첨부 파일명 : attachment.zip(attachment.exe) 검사 결과 : attachment.zip/attachment.exe ( Win32/MyDoom.worm.M ) - 압축 파일(압축을 푼 후 다시 검사하십시오.) attachment.zip - 삭제 안녕하세요. 매일경제신문사 메일서버 관리자입니다. 보내주신 메일에서 바이러스가 발견되었습니다. 치료가 가능하면

Re: [PATCH v2 5/6] x86: Enable ack interrupt on vmexit

2012-11-26 Thread Gleb Natapov
On Mon, Nov 26, 2012 at 05:44:29AM +, Zhang, Yang Z wrote: Avi Kivity wrote on 2012-11-25: On 11/25/2012 03:03 PM, Gleb Natapov wrote: On Sun, Nov 25, 2012 at 02:55:26PM +0200, Avi Kivity wrote: On 11/22/2012 05:22 PM, Gleb Natapov wrote: On Wed, Nov 21, 2012 at 04:09:38PM +0800, Yang

KVM call agenda for 2012-11-27

2012-11-26 Thread Juan Quintela
Hi Please send in any agenda topics you are interested in. Later, Juan. -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [PATCH v2 6/6] x86, apicv: Add Posted Interrupt supporting

2012-11-26 Thread Gleb Natapov
On Mon, Nov 26, 2012 at 03:51:04AM +, Zhang, Yang Z wrote: Gleb Natapov wrote on 2012-11-25: On Wed, Nov 21, 2012 at 04:09:39PM +0800, Yang Zhang wrote: Posted Interrupt allows vAPICV interrupts to inject into guest directly without any vmexit. - When delivering a interrupt to

Re: qemu-kvm-1.2.0: double free or corruption in VNC code

2012-11-26 Thread Stefan Hajnoczi
On Fri, Nov 23, 2012 at 08:24:32PM +0100, Nikola Ciprich wrote: Please also post the exact package version you are using - the line numbers change between releases and depend on which patches have been applied to the source tree. The distro exact package version allows me to download the

Re: KVM Disk i/o or VM activities causes soft lockup?

2012-11-26 Thread Stefan Hajnoczi
On Fri, Nov 23, 2012 at 10:34:16AM -0800, Vincent Li wrote: On Thu, Nov 22, 2012 at 11:29 PM, Stefan Hajnoczi stefa...@gmail.com wrote: On Wed, Nov 21, 2012 at 03:36:50PM -0800, Vincent Li wrote: We have users running on redhat based distro (Kernel 2.6.32-131.21.1.el6.x86_64 ) with kvm,

Re: Re: Re: Re: Re: [RFC PATCH 0/2] kvm/vmx: Output TSC offset

2012-11-26 Thread Yoshihiro YUNOMAE
Hi Marcelo, (2012/11/24 7:46), Marcelo Tosatti wrote: On Thu, Nov 22, 2012 at 02:21:20PM +0900, Yoshihiro YUNOMAE wrote: Hi Marcelo, (2012/11/21 7:51), Marcelo Tosatti wrote: On Tue, Nov 20, 2012 at 07:36:33PM +0900, Yoshihiro YUNOMAE wrote: Hi Marcelo, Sorry for the late reply.

Re: Invoking guest os script, without guest having network connectivity?

2012-11-26 Thread Stefan Hajnoczi
On Sat, Nov 24, 2012 at 06:40:39PM +0200, Shlomi Tsadok wrote: I'm looking for a way to configure the guest networking(including IP) dynamically, using a custom script, right after VM creation. Is there a similar feature in KVM/Libvirt as the Invoke-VMScript in of VMware's PowerCLI? It

[Bug 50921] kvm hangs booting Windows 2000

2012-11-26 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=50921 Alan a...@lxorguk.ukuu.org.uk changed: What|Removed |Added CC||a...@lxorguk.ukuu.org.uk

[PATCH V3 RFC 0/2] kvm: Improving undercommit scenarios

2012-11-26 Thread Raghavendra K T
In some special scenarios like #vcpu = #pcpu, PLE handler may prove very costly, because there is no need to iterate over vcpus and do unsuccessful yield_to burning CPU. The first patch optimizes all the yield_to by bailing out when there is no need to continue in yield_to (i.e., when there is

[PATCH V3 RFC 1/2] sched: Bail out of yield_to when source and target runqueue has one task

2012-11-26 Thread Raghavendra K T
From: Peter Zijlstra pet...@infradead.org In case of undercomitted scenarios, especially in large guests yield_to overhead is significantly high. when run queue length of source and target is one, take an opportunity to bail out and return -ESRCH. This return condition can be further exploited to

[PATCH V3 RFC 2/2] kvm: Handle yield_to failure return code for potential undercommit case

2012-11-26 Thread Raghavendra K T
From: Raghavendra K T raghavendra...@linux.vnet.ibm.com yield_to returns -ESRCH, When source and target of yield_to run queue length is one. When we see three successive failures of yield_to we assume we are in potential undercommit case and abort from PLE handler. The assumption is backed by low

RE: [PATCH v2 6/6] x86, apicv: Add Posted Interrupt supporting

2012-11-26 Thread Zhang, Yang Z
Gleb Natapov wrote on 2012-11-26: On Mon, Nov 26, 2012 at 03:51:04AM +, Zhang, Yang Z wrote: Gleb Natapov wrote on 2012-11-25: On Wed, Nov 21, 2012 at 04:09:39PM +0800, Yang Zhang wrote: Posted Interrupt allows vAPICV interrupts to inject into guest directly without any vmexit. - When

Re: [PATCH 4/5] KVM: PPC: Book3S HV: Don't give the guest RW access to RO pages

2012-11-26 Thread Alexander Graf
On 24.11.2012, at 10:32, Paul Mackerras wrote: On Sat, Nov 24, 2012 at 10:05:37AM +0100, Alexander Graf wrote: On 23.11.2012, at 23:13, Paul Mackerras pau...@samba.org wrote: On Fri, Nov 23, 2012 at 04:47:45PM +0100, Alexander Graf wrote: On 22.11.2012, at 10:28, Paul Mackerras

Re: [PATCH 3/5] KVM: PPC: Book3S HV: Improve handling of local vs. global TLB invalidations

2012-11-26 Thread Alexander Graf
On 23.11.2012, at 23:07, Paul Mackerras wrote: On Fri, Nov 23, 2012 at 04:43:03PM +0100, Alexander Graf wrote: On 22.11.2012, at 10:28, Paul Mackerras wrote: - With the possibility of the host paging out guest pages, the use of H_LOCAL by an SMP guest is dangerous since the guest could

[Bug 50921] kvm hangs booting Windows 2000

2012-11-26 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=50921 --- Comment #13 from Lucio Crusca lu...@sulweb.org 2012-11-26 13:13:56 --- @Alan: see comment #5, since then I've always tested with and without vbox modules. @Gleb: can't run on 3.5.0 right now, I'll take the stack trace ASAP. --

Re: [PATCH 1/5] KVM: PPC: Book3S HV: Handle guest-caused machine checks on POWER7 without panicking

2012-11-26 Thread Alexander Graf
On 23.11.2012, at 22:42, Paul Mackerras wrote: On Fri, Nov 23, 2012 at 03:13:09PM +0100, Alexander Graf wrote: On 22.11.2012, at 10:25, Paul Mackerras wrote: + /* Do they have an SLB shadow buffer registered? */ + slb = vcpu-arch.slb_shadow.pinned_addr; + if (!slb) +

Re: [PATCH 0/3] KVM: PPC: Fixes for PR-KVM on POWER7

2012-11-26 Thread Alexander Graf
On 05.11.2012, at 04:40, Paul Mackerras wrote: Here are some fixes for PR-style KVM. With these I can successfully run a pseries (PAPR) guest under PR KVM on a POWER7. (This is all running inside a HV KVM virtual machine.) The patches are against Alex Graf's kvm-ppc-next branch. Thanks a

Re: [PATCH V3 RFC 1/2] sched: Bail out of yield_to when source and target runqueue has one task

2012-11-26 Thread Andrew Jones
On Mon, Nov 26, 2012 at 05:37:54PM +0530, Raghavendra K T wrote: From: Peter Zijlstra pet...@infradead.org In case of undercomitted scenarios, especially in large guests yield_to overhead is significantly high. when run queue length of source and target is one, take an opportunity to bail

Re: [PATCH V3 RFC 2/2] kvm: Handle yield_to failure return code for potential undercommit case

2012-11-26 Thread Andrew Jones
On Mon, Nov 26, 2012 at 05:38:04PM +0530, Raghavendra K T wrote: From: Raghavendra K T raghavendra...@linux.vnet.ibm.com yield_to returns -ESRCH, When source and target of yield_to run queue length is one. When we see three successive failures of yield_to we assume we are in potential

Re: [PATCH v2 6/6] x86, apicv: Add Posted Interrupt supporting

2012-11-26 Thread Gleb Natapov
On Mon, Nov 26, 2012 at 12:29:54PM +, Zhang, Yang Z wrote: Gleb Natapov wrote on 2012-11-26: On Mon, Nov 26, 2012 at 03:51:04AM +, Zhang, Yang Z wrote: Gleb Natapov wrote on 2012-11-25: On Wed, Nov 21, 2012 at 04:09:39PM +0800, Yang Zhang wrote: Posted Interrupt allows vAPICV

Re: [PATCH] MAINTAINERS: Add git tree link for PPC KVM

2012-11-26 Thread Alexander Graf
On 16.10.2012, at 07:01, Michael Ellerman wrote: Signed-off-by: Michael Ellerman mich...@ellerman.id.au Thanks, applied to kvm-ppc-next. Alex --- MAINTAINERS |1 + 1 file changed, 1 insertion(+) diff --git a/MAINTAINERS b/MAINTAINERS index e73060f..32dc107 100644 ---

Re: [PATCH V3 RFC 2/2] kvm: Handle yield_to failure return code for potential undercommit case

2012-11-26 Thread Andrew Jones
On Mon, Nov 26, 2012 at 02:43:02PM +0100, Andrew Jones wrote: On Mon, Nov 26, 2012 at 05:38:04PM +0530, Raghavendra K T wrote: From: Raghavendra K T raghavendra...@linux.vnet.ibm.com yield_to returns -ESRCH, When source and target of yield_to run queue length is one. When we see three

Re: [PATCH] vfio powerpc: enabled and supported on powernv platform

2012-11-26 Thread Alex Williamson
On Thu, 2012-11-22 at 11:56 +, Sethi Varun-B16395 wrote: -Original Message- From: linux-kernel-ow...@vger.kernel.org [mailto:linux-kernel- ow...@vger.kernel.org] On Behalf Of Alex Williamson Sent: Tuesday, November 20, 2012 11:50 PM To: Alexey Kardashevskiy Cc: Benjamin

Re: [PATCH v8 1/2] x86/kexec: add a new atomic notifier list for kdump

2012-11-26 Thread Eric W. Biederman
Zhang Yanfei zhangyan...@cn.fujitsu.com writes: This patch adds an atomic notifier list named crash_notifier_list. Currently, when loading kvm-intel module, a notifier will be registered in the list to enable vmcss loaded on all cpus to be VMCLEAR'd if needed. crash_notifier_list ick gag

Re: [PATCH] vhost-blk: Add vhost-blk support v5

2012-11-26 Thread Michael S. Tsirkin
On Mon, Nov 19, 2012 at 10:26:41PM +0200, Michael S. Tsirkin wrote: Userspace bits: - 1) LKVM The latest vhost-blk userspace bits for kvm tool can be found here: g...@github.com:asias/linux-kvm.git blk.vhost-blk 2) QEMU The latest vhost-blk userspace

Re: [PATCH] vfio powerpc: enabled and supported on powernv platform

2012-11-26 Thread Alex Williamson
On Fri, 2012-11-23 at 13:02 +1100, Alexey Kardashevskiy wrote: On 22/11/12 22:56, Sethi Varun-B16395 wrote: -Original Message- From: linux-kernel-ow...@vger.kernel.org [mailto:linux-kernel- ow...@vger.kernel.org] On Behalf Of Alex Williamson Sent: Tuesday, November 20, 2012

Re: The smp_affinity cannot work correctly on guest os when PCI passthrough device using msi/msi-x with KVM

2012-11-26 Thread Alex Williamson
On Fri, 2012-11-23 at 11:06 +0800, yi li wrote: Hi Guys, there have a issue about smp_affinity cannot work correctly on guest os when PCI passthrough device using msi/msi-x with KVM. My reason: pcpu will occur a lot of ipi interrupt to find the vcpu to handle the irq. so the guest os

Re: [PATCH 0/1] [PULL] qemu-kvm.git uq/master queue

2012-11-26 Thread Anthony Liguori
Marcelo Tosatti mtosa...@redhat.com writes: The following changes since commit 1ccbc2851282564308f790753d7158487b6af8e2: qemu-sockets: Fix parsing of the inet option 'to'. (2012-11-21 12:07:59 +0400) are available in the git repository at:

Re: The smp_affinity cannot work correctly on guest os when PCI passthrough device using msi/msi-x with KVM

2012-11-26 Thread yi li
hi Alex, the qemu-kvm version 1.2. Thanks. YiLi 2012/11/26 Alex Williamson alex.william...@redhat.com: On Fri, 2012-11-23 at 11:06 +0800, yi li wrote: Hi Guys, there have a issue about smp_affinity cannot work correctly on guest os when PCI passthrough device using msi/msi-x with KVM. My

Re: [PATCH v8 1/2] x86/kexec: add a new atomic notifier list for kdump

2012-11-26 Thread Gleb Natapov
On Mon, Nov 26, 2012 at 09:08:54AM -0600, Eric W. Biederman wrote: Zhang Yanfei zhangyan...@cn.fujitsu.com writes: This patch adds an atomic notifier list named crash_notifier_list. Currently, when loading kvm-intel module, a notifier will be registered in the list to enable vmcss loaded

Re: [PATCH v8 1/2] x86/kexec: add a new atomic notifier list for kdump

2012-11-26 Thread Eric W. Biederman
Gleb Natapov g...@redhat.com writes: On Mon, Nov 26, 2012 at 09:08:54AM -0600, Eric W. Biederman wrote: Zhang Yanfei zhangyan...@cn.fujitsu.com writes: This patch adds an atomic notifier list named crash_notifier_list. Currently, when loading kvm-intel module, a notifier will be

Re: [PATCH v8 1/2] x86/kexec: add a new atomic notifier list for kdump

2012-11-26 Thread Gleb Natapov
On Mon, Nov 26, 2012 at 11:43:10AM -0600, Eric W. Biederman wrote: Gleb Natapov g...@redhat.com writes: On Mon, Nov 26, 2012 at 09:08:54AM -0600, Eric W. Biederman wrote: Zhang Yanfei zhangyan...@cn.fujitsu.com writes: This patch adds an atomic notifier list named crash_notifier_list.

Re: [PATCH] vfio powerpc: enabled and supported on powernv platform

2012-11-26 Thread Alex Williamson
On Mon, 2012-11-26 at 08:18 -0700, Alex Williamson wrote: On Fri, 2012-11-23 at 13:02 +1100, Alexey Kardashevskiy wrote: On 22/11/12 22:56, Sethi Varun-B16395 wrote: -Original Message- From: linux-kernel-ow...@vger.kernel.org [mailto:linux-kernel- ow...@vger.kernel.org]

Re: [PATCH v8 1/2] x86/kexec: add a new atomic notifier list for kdump

2012-11-26 Thread Eric W. Biederman
Gleb Natapov g...@redhat.com writes: On Mon, Nov 26, 2012 at 11:43:10AM -0600, Eric W. Biederman wrote: Gleb Natapov g...@redhat.com writes: On Mon, Nov 26, 2012 at 09:08:54AM -0600, Eric W. Biederman wrote: Zhang Yanfei zhangyan...@cn.fujitsu.com writes: This patch adds an atomic

Re: [PATCH 1/2] vfio powerpc: implemented IOMMU driver for VFIO

2012-11-26 Thread Alex Williamson
On Fri, 2012-11-23 at 20:03 +1100, Alexey Kardashevskiy wrote: VFIO implements platform independent stuff such as a PCI driver, BAR access (via read/write on a file descriptor or direct mapping when possible) and IRQ signaling. The platform dependent part includes IOMMU initialization and

[PATCH V3 0/2] Resend - IA32_TSC_ADJUST support for KVM

2012-11-26 Thread Will Auld
Resending these as the mail seems to have not fully worked last Wed. Marcelo, I have addressed your comments for this patch set (V3), the following patch for QEMU-KVM and for adding a test case for tsc_adjust also to follow today. Thanks, Will Will Auld (2): Add code to track call

[PATCH V3 1/2] Resend - Add code to track call origin for msr assignment.

2012-11-26 Thread Will Auld
In order to track who initiated the call (host or guest) to modify an msr value I have changed function call parameters along the call path. The specific change is to add a struct pointer parameter that points to (index, data, caller) information rather than having this information passed as

[PATCH V3 2/2] Resend - Enabling IA32_TSC_ADJUST for KVM guest VM support

2012-11-26 Thread Will Auld
CPUID.7.0.EBX[1]=1 indicates IA32_TSC_ADJUST MSR 0x3b is supported Basic design is to emulate the MSR by allowing reads and writes to a guest vcpu specific location to store the value of the emulated MSR while adding the value to the vmcs tsc_offset. In this way the IA32_TSC_ADJUST value will be

[PATCH V2] Resend - Enabling IA32_TSC_ADJUST for Qemu KVM guest VMs

2012-11-26 Thread Will Auld
CPUID.7.0.EBX[1]=1 indicates IA32_TSC_ADJUST MSR 0x3b is supported Basic design is to emulate the MSR by allowing reads and writes to the hypervisor vcpu specific locations to store the value of the emulated MSRs. In this way the IA32_TSC_ADJUST value will be included in all reads to the TSC MSR

Re: [PATCH V3 1/2] Resend - Add code to track call origin for msr assignment.

2012-11-26 Thread Gleb Natapov
Comments are still not addressed. On Mon, Nov 26, 2012 at 10:40:51AM -0800, Will Auld wrote: In order to track who initiated the call (host or guest) to modify an msr value I have changed function call parameters along the call path. The specific change is to add a struct pointer parameter

Re: [PATCH v2 00/18] KVM for MIPS32 Processors

2012-11-26 Thread David Daney
I have several general questions about this patch... On 11/21/2012 06:33 PM, Sanjay Lal wrote: The following patchset implements KVM support for MIPS32R2 processors, using Trap Emulate, with basic runtime binary translation to improve performance. The goal has been to keep the Guest kernel

Re: [Qemu-devel] [PATCH V2] Resend - Enabling IA32_TSC_ADJUST for Qemu KVM guest VMs

2012-11-26 Thread Andreas Färber
Hello, Am 26.11.2012 19:42, schrieb Will Auld: CPUID.7.0.EBX[1]=1 indicates IA32_TSC_ADJUST MSR 0x3b is supported Basic design is to emulate the MSR by allowing reads and writes to the hypervisor vcpu specific locations to store the value of the emulated MSRs. In this way the

Re: The smp_affinity cannot work correctly on guest os when PCI passthrough device using msi/msi-x with KVM

2012-11-26 Thread Alex Williamson
On Tue, 2012-11-27 at 00:47 +0800, yi li wrote: hi Alex, the qemu-kvm version 1.2. And is the device making use of MSI-X or MSI interrupts. MSI-X should work on 1.2, MSI does not yet support vector updates for affinity, but patches are welcome. Thanks, Alex 2012/11/26 Alex Williamson

Re: Performance issue

2012-11-26 Thread George-Cristian Bîrzan
On Sun, Nov 25, 2012 at 6:17 PM, George-Cristian Bîrzan g...@birzan.org wrote: On Sun, Nov 25, 2012 at 5:19 PM, Gleb Natapov g...@redhat.com wrote: What Windows is this? Can you try changing -cpu host to -cpu host,+hv_relaxed? This is on Windows Server 2008 R2 (sorry, forgot to mention that I

[Bug 50891] The smp_affinity cannot work correctly on guest os when PCI passthrough device using msi/msi-x with KVM

2012-11-26 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=50891 Alex Williamson alex.william...@redhat.com changed: What|Removed |Added CC|

RE: [PATCH V3 1/2] Resend - Add code to track call origin for msr assignment.

2012-11-26 Thread Auld, Will
Gleb, Marcelo, Sorry Gleb, I did not see comments from you but I have now found them. In doing so I also found one form Marcelo that I missed. What I believe is now outstanding to be addressed are: From Gleb: - You've changed function pointer signature here, but emulator_set_msr() remained

Re: [PATCH RFC V2 0/5] Separate consigned (expected steal) from steal time.

2012-11-26 Thread Michael Wolf
On 10/22/2012 10:33 AM, Rik van Riel wrote: On 10/16/2012 10:23 PM, Michael Wolf wrote: In the case of where you have a system that is running in a capped or overcommitted environment the user may see steal time being reported in accounting tools such as top or vmstat. This can cause confusion

Re: pci_enable_msix() fails with ENOMEM/EINVAL

2012-11-26 Thread Alex Williamson
On Thu, 2012-11-22 at 10:52 +0200, Alex Lyakas wrote: Hi Alex, thanks for your response. I printed out the vector and entry values of dev-host_msix_entries[i] within assigned_device_enable_host_msix() before call to request_threaded_irq(). I see that they are all 0s: kernel: [

Re: [Bug 50921] kvm hangs booting Windows 2000

2012-11-26 Thread Xiao Guangrong
On 11/24/2012 09:44 PM, bugzilla-dae...@bugzilla.kernel.org wrote: https://bugzilla.kernel.org/show_bug.cgi?id=50921 --- Comment #5 from Lucio Crusca lu...@sulweb.org 2012-11-24 13:44:16 --- Here the first tests results: vbox modules do not make a difference (tried rmmod vboxpci

[Bug 50921] kvm hangs booting Windows 2000

2012-11-26 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=50921 --- Comment #14 from Anonymous Emailer anonym...@kernel-bugs.osdl.org 2012-11-26 20:10:11 --- Reply-To: xiaoguangr...@linux.vnet.ibm.com On 11/24/2012 09:44 PM, bugzilla-dae...@bugzilla.kernel.org wrote:

Re: KVM Disk i/o or VM activities causes soft lockup?

2012-11-26 Thread Vincent Li
On Mon, Nov 26, 2012 at 2:58 AM, Stefan Hajnoczi stefa...@gmail.com wrote: On Fri, Nov 23, 2012 at 10:34:16AM -0800, Vincent Li wrote: On Thu, Nov 22, 2012 at 11:29 PM, Stefan Hajnoczi stefa...@gmail.com wrote: On Wed, Nov 21, 2012 at 03:36:50PM -0800, Vincent Li wrote: We have users running

Re: [Bug 50921] kvm hangs booting Windows 2000

2012-11-26 Thread Xiao Guangrong
Sorry, forgot to CC Lucio Crusca. On 11/27/2012 04:09 AM, Xiao Guangrong wrote: On 11/24/2012 09:44 PM, bugzilla-dae...@bugzilla.kernel.org wrote: https://bugzilla.kernel.org/show_bug.cgi?id=50921 --- Comment #5 from Lucio Crusca lu...@sulweb.org 2012-11-24 13:44:16 --- Here the first

[Bug 50921] kvm hangs booting Windows 2000

2012-11-26 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=50921 --- Comment #15 from Anonymous Emailer anonym...@kernel-bugs.osdl.org 2012-11-26 20:29:28 --- Reply-To: xiaoguangr...@linux.vnet.ibm.com Sorry, forgot to CC Lucio Crusca. On 11/27/2012 04:09 AM, Xiao Guangrong wrote: On 11/24/2012 09:44

Re: [PATCH V3 1/2] Resend - Add code to track call origin for msr assignment.

2012-11-26 Thread Gleb Natapov
On Mon, Nov 26, 2012 at 07:42:28PM +, Auld, Will wrote: Gleb, Marcelo, Sorry Gleb, I did not see comments from you but I have now found them. In doing so I also found one form Marcelo that I missed. What I believe is now outstanding to be addressed are: From Gleb: - You've changed

[PATCH 0/5] Alter steal time reporting in KVM

2012-11-26 Thread Michael Wolf
In the case of where you have a system that is running in a capped or overcommitted environment the user may see steal time being reported in accounting tools such as top or vmstat. This can cause confusion for the end user. To ease the confusion this patch set adds the idea of consigned

[PATCH 1/5] Alter the amount of steal time reported by the guest.

2012-11-26 Thread Michael Wolf
Modify the amount of stealtime that the kernel reports via the /proc interface. Steal time will now be broken down into steal_time and consigned_time. Consigned_time will represent the amount of time that is expected to be lost due to overcommitment of the physical cpu or by using cpu capping.

[PATCH 2/5] Expand the steal time msr to also contain the consigned time.

2012-11-26 Thread Michael Wolf
Add a consigned field. This field will hold the time lost due to capping or overcommit. The rest of the time will still show up in the steal-time field. Signed-off-by: Michael Wolf m...@linux.vnet.ibm.com --- arch/x86/include/asm/paravirt.h |4 ++--

[PATCH 3/5] Add the code to send the consigned time from the host to the guest

2012-11-26 Thread Michael Wolf
Add the code to send the consigned time from the host to the guest. Signed-off-by: Michael Wolf m...@linux.vnet.ibm.com --- arch/x86/include/asm/kvm_host.h |1 + arch/x86/include/asm/kvm_para.h |3 ++- arch/x86/include/asm/paravirt.h |4 ++-- arch/x86/kernel/kvm.c |3

[PATCH 4/5] Add a timer to allow the separation of consigned from steal time.

2012-11-26 Thread Michael Wolf
Add a timer to the host. This will define the period. During a period the first n ticks will go into the consigned bucket. Any other ticks that occur within the period will be placed in the stealtime bucket. Signed-off-by: Michael Wolf m...@linux.vnet.ibm.com ---

[PATCH 5/5] Add an ioctl to communicate the consign limit to the host.

2012-11-26 Thread Michael Wolf
Add an ioctl to communicate the consign limit to the host. Signed-off-by: Michael Wolf m...@linux.vnet.ibm.com --- arch/x86/kvm/x86.c |6 ++ include/linux/kvm_host.h |2 ++ include/uapi/linux/kvm.h |2 ++ virt/kvm/kvm_main.c |7 +++ 4 files changed, 17

[PATCH 3/5] Add the code to send the consigned time from the host to the guest

2012-11-26 Thread Michael Wolf
Add the code to send the consigned time from the host to the guest. Signed-off-by: Michael Wolf m...@linux.vnet.ibm.com --- arch/x86/include/asm/kvm_host.h |1 + arch/x86/include/asm/kvm_para.h |3 ++- arch/x86/include/asm/paravirt.h |4 ++-- arch/x86/kernel/kvm.c |3

[PATCH 4/5] Add a timer to allow the separation of consigned from steal time.

2012-11-26 Thread Michael Wolf
Add a timer to the host. This will define the period. During a period the first n ticks will go into the consigned bucket. Any other ticks that occur within the period will be placed in the stealtime bucket. Signed-off-by: Michael Wolf m...@linux.vnet.ibm.com ---

[PATCH 0/5] Alter stealtime reporting in KVM

2012-11-26 Thread Michael Wolf
In the case of where you have a system that is running in a capped or overcommitted environment the user may see steal time being reported in accounting tools such as top or vmstat. This can cause confusion for the end user. To ease the confusion this patch set adds the idea of consigned

[PATCH 1/5] Alter the amount of steal time reported by the guest.

2012-11-26 Thread Michael Wolf
Modify the amount of stealtime that the kernel reports via the /proc interface. Steal time will now be broken down into steal_time and consigned_time. Consigned_time will represent the amount of time that is expected to be lost due to overcommitment of the physical cpu or by using cpu capping.

[PATCH 2/5] Expand the steal time msr to also contain the consigned time.

2012-11-26 Thread Michael Wolf
Add a consigned field. This field will hold the time lost due to capping or overcommit. The rest of the time will still show up in the steal-time field. Signed-off-by: Michael Wolf m...@linux.vnet.ibm.com --- arch/x86/include/asm/paravirt.h |4 ++--

Re: [PATCH 3/5] KVM: PPC: Book3S HV: Improve handling of local vs. global TLB invalidations

2012-11-26 Thread Paul Mackerras
On Mon, Nov 26, 2012 at 02:10:33PM +0100, Alexander Graf wrote: On 23.11.2012, at 23:07, Paul Mackerras wrote: On Fri, Nov 23, 2012 at 04:43:03PM +0100, Alexander Graf wrote: On 22.11.2012, at 10:28, Paul Mackerras wrote: - With the possibility of the host paging out guest pages,

Re: [PATCH 1/5] KVM: PPC: Book3S HV: Handle guest-caused machine checks on POWER7 without panicking

2012-11-26 Thread Paul Mackerras
On Mon, Nov 26, 2012 at 02:15:16PM +0100, Alexander Graf wrote: On 23.11.2012, at 22:42, Paul Mackerras wrote: On Fri, Nov 23, 2012 at 03:13:09PM +0100, Alexander Graf wrote: On 22.11.2012, at 10:25, Paul Mackerras wrote: + /* Do they have an SLB shadow buffer registered? */ +

Re: [PATCH 1/5] KVM: PPC: Book3S HV: Handle guest-caused machine checks on POWER7 without panicking

2012-11-26 Thread Alexander Graf
On 26.11.2012, at 22:33, Paul Mackerras wrote: On Mon, Nov 26, 2012 at 02:15:16PM +0100, Alexander Graf wrote: On 23.11.2012, at 22:42, Paul Mackerras wrote: On Fri, Nov 23, 2012 at 03:13:09PM +0100, Alexander Graf wrote: On 22.11.2012, at 10:25, Paul Mackerras wrote: + /* Do they

Re: [PATCH 3/5] KVM: PPC: Book3S HV: Improve handling of local vs. global TLB invalidations

2012-11-26 Thread Alexander Graf
On 26.11.2012, at 22:48, Paul Mackerras wrote: On Mon, Nov 26, 2012 at 02:10:33PM +0100, Alexander Graf wrote: On 23.11.2012, at 23:07, Paul Mackerras wrote: On Fri, Nov 23, 2012 at 04:43:03PM +0100, Alexander Graf wrote: On 22.11.2012, at 10:28, Paul Mackerras wrote: - With the

Re: [PATCH 1/5] KVM: PPC: Book3S HV: Handle guest-caused machine checks on POWER7 without panicking

2012-11-26 Thread Alexander Graf
On 26.11.2012, at 22:55, Alexander Graf wrote: On 26.11.2012, at 22:33, Paul Mackerras wrote: On Mon, Nov 26, 2012 at 02:15:16PM +0100, Alexander Graf wrote: On 23.11.2012, at 22:42, Paul Mackerras wrote: On Fri, Nov 23, 2012 at 03:13:09PM +0100, Alexander Graf wrote: On

[Bug 50921] kvm hangs booting Windows 2000

2012-11-26 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=50921 --- Comment #16 from Lucio Crusca lu...@sulweb.org 2012-11-26 22:14:15 --- @xiaoguangrong: YOU ARE THE MAN! 'emulate_invalid_guest_state = 0' did the trick, now I have win2000 running in a 3.6.7 kvm guest! Thanks. Still guessing why it works

Re: [PATCH] x86, kvm: Remove incorrect redundant assembly constraint

2012-11-26 Thread H. Peter Anvin
On 11/25/2012 11:22 PM, Paolo Bonzini wrote: Il 21/11/2012 23:41, H. Peter Anvin ha scritto: From: H. Peter Anvin h...@linux.intel.com In __emulate_1op_rax_rdx, we use +a and +d which are input/output constraints, and *then* use a and d as input constraints. This is incorrect, but happens

Re: [PATCH 1/5] KVM: PPC: Book3S HV: Handle guest-caused machine checks on POWER7 without panicking

2012-11-26 Thread Paul Mackerras
On Mon, Nov 26, 2012 at 11:03:48PM +0100, Alexander Graf wrote: On 26.11.2012, at 22:55, Alexander Graf wrote: On 26.11.2012, at 22:33, Paul Mackerras wrote: On Mon, Nov 26, 2012 at 02:15:16PM +0100, Alexander Graf wrote: On 23.11.2012, at 22:42, Paul Mackerras wrote: On

Re: [PATCH 3/5] KVM: PPC: Book3S HV: Improve handling of local vs. global TLB invalidations

2012-11-26 Thread Paul Mackerras
On Mon, Nov 26, 2012 at 11:03:19PM +0100, Alexander Graf wrote: On 26.11.2012, at 22:48, Paul Mackerras wrote: On Mon, Nov 26, 2012 at 02:10:33PM +0100, Alexander Graf wrote: On 23.11.2012, at 23:07, Paul Mackerras wrote: On Fri, Nov 23, 2012 at 04:43:03PM +0100, Alexander Graf

Re: [PATCH 3/3] KVM: x86: improve reexecute_instruction

2012-11-26 Thread Marcelo Tosatti
On Tue, Nov 20, 2012 at 07:59:53AM +0800, Xiao Guangrong wrote: The current reexecute_instruction can not well detect the failed instruction emulation. It allows guest to retry all the instructions except it accesses on error pfn. For example, some cases are nested-write-protect - if the

Re: [PATCH 2/3] KVM: x86: let reexecute_instruction work for tdp

2012-11-26 Thread Marcelo Tosatti
On Tue, Nov 20, 2012 at 07:59:10AM +0800, Xiao Guangrong wrote: Currently, reexecute_instruction refused to retry all instructions. If nested npt is used, the emulation may be caused by shadow page, it can be fixed by dropping the shadow page Signed-off-by: Xiao Guangrong

Re: Re: Re: Re: Re: [RFC PATCH 0/2] kvm/vmx: Output TSC offset

2012-11-26 Thread Marcelo Tosatti
On Mon, Nov 26, 2012 at 08:05:10PM +0900, Yoshihiro YUNOMAE wrote: 500h. event tsc_write tsc_offset=-3000 Then a guest trace containing events with a TSC timestamp. Which tsc_offset to use? (that is the problem, which unless i am mistaken can only be solved easily if the guest can convert

Re: [PATCH v2] KVM: PPC: Book3S HV: Handle guest-caused machine checks on POWER7 without panicking

2012-11-26 Thread Paul Mackerras
On Tue, Nov 27, 2012 at 12:16:28AM +0100, Alexander Graf wrote: On 24.11.2012, at 09:37, Paul Mackerras wrote: Currently, if a machine check interrupt happens while we are in the guest, we exit the guest and call the host's machine check handler, which tends to cause the host to panic.

Re: [PATCH 3/5] KVM: PPC: Book3S HV: Improve handling of local vs. global TLB invalidations

2012-11-26 Thread Alexander Graf
On 27.11.2012, at 00:16, Paul Mackerras wrote: On Mon, Nov 26, 2012 at 11:03:19PM +0100, Alexander Graf wrote: On 26.11.2012, at 22:48, Paul Mackerras wrote: On Mon, Nov 26, 2012 at 02:10:33PM +0100, Alexander Graf wrote: On 23.11.2012, at 23:07, Paul Mackerras wrote: On Fri, Nov

Re: [PATCH v2] KVM: PPC: Book3S HV: Handle guest-caused machine checks on POWER7 without panicking

2012-11-26 Thread Alexander Graf
On 27.11.2012, at 00:18, Paul Mackerras wrote: On Tue, Nov 27, 2012 at 12:16:28AM +0100, Alexander Graf wrote: On 24.11.2012, at 09:37, Paul Mackerras wrote: Currently, if a machine check interrupt happens while we are in the guest, we exit the guest and call the host's machine check

Re: [PATCH 0/4] AER-KVM: Error containment of PCI pass-thru devices assigned to KVM guests

2012-11-26 Thread Marcelo Tosatti
On Tue, Nov 20, 2012 at 02:09:46PM +, Pandarathil, Vijaymohan R wrote: -Original Message- From: Stefan Hajnoczi [mailto:stefa...@gmail.com] Sent: Tuesday, November 20, 2012 5:41 AM To: Pandarathil, Vijaymohan R Cc: kvm@vger.kernel.org; linux-...@vger.kernel.org;

Re: [PATCH] x86, kvm: Remove incorrect redundant assembly constraint

2012-11-26 Thread Marcelo Tosatti
On Mon, Nov 26, 2012 at 02:48:50PM -0800, H. Peter Anvin wrote: On 11/25/2012 11:22 PM, Paolo Bonzini wrote: Il 21/11/2012 23:41, H. Peter Anvin ha scritto: From: H. Peter Anvin h...@linux.intel.com In __emulate_1op_rax_rdx, we use +a and +d which are input/output constraints, and

Re: [PATCH] x86, kvm: Remove incorrect redundant assembly constraint

2012-11-26 Thread H. Peter Anvin
On 11/26/2012 03:48 PM, Marcelo Tosatti wrote: Gleb, Marcelo: are you going to apply this or would you prefer I took it in x86/urgent? -hpa Feel free to merge it through x86/urgent. I presume that's an Acked-by? -hpa -- To unsubscribe from this list: send the line

Re: [PATCH v2] KVM: PPC: Book3S HV: Handle guest-caused machine checks on POWER7 without panicking

2012-11-26 Thread Paul Mackerras
On Tue, Nov 27, 2012 at 12:20:08AM +0100, Alexander Graf wrote: Hrm. Promise to run checkpatch yourself next time and I'll fix it up for you this time ;) OK, will do, thanks. :) Paul. -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to

Re: [PATCH] vfio powerpc: enabled and supported on powernv platform

2012-11-26 Thread Benjamin Herrenschmidt
On Mon, 2012-11-26 at 11:04 -0700, Alex Williamson wrote: Ok, I see tces are put on shutdown via tce_iommu_detach_group, so you're more concerned about the guest simply mapping over top of it's own mappings. Is that common? Is it common enough for every multi-page mapping to assume it will

Re: The smp_affinity cannot work correctly on guest os when PCI passthrough device using msi/msi-x with KVM

2012-11-26 Thread yi li
Alex, Thanks for your reply, and i will check it agiain with msi-x. YiLi 2012/11/27 Alex Williamson alex.william...@redhat.com: On Tue, 2012-11-27 at 00:47 +0800, yi li wrote: hi Alex, the qemu-kvm version 1.2. And is the device making use of MSI-X or MSI interrupts. MSI-X should work

Re: [PATCH] x86, kvm: Remove incorrect redundant assembly constraint

2012-11-26 Thread Marcelo Tosatti
On Mon, Nov 26, 2012 at 03:49:36PM -0800, H. Peter Anvin wrote: On 11/26/2012 03:48 PM, Marcelo Tosatti wrote: Gleb, Marcelo: are you going to apply this or would you prefer I took it in x86/urgent? -hpa Feel free to merge it through x86/urgent. I presume that's an

[Bug 50891] The smp_affinity cannot work correctly on guest os when PCI passthrough device using msi/msi-x with KVM

2012-11-26 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=50891 --- Comment #2 from liyi yiliker...@gmail.com 2012-11-27 00:57:28 --- sorry, i am not clearly it. 1:i am sure the device using the MSI-X, the test is failed. check the attribute, entry-msi_attrib.is_msix is 1. pls, the qemu kvm version

[PATCH V4 0/2] Enable guest use of TSC_ADJUST functionality

2012-11-26 Thread Will Auld
This reversion, V4, addresses a couple of issues I missed from Gleb and Marcelo. Thanks, Will Will Auld (2): Add code to track call origin for msr assignment. Enabling IA32_TSC_ADJUST for KVM guest VM support arch/x86/include/asm/cpufeature.h | 1 + arch/x86/include/asm/kvm_host.h | 15

Re: [PATCH v8 1/2] x86/kexec: add a new atomic notifier list for kdump

2012-11-26 Thread Zhang Yanfei
于 2012年11月27日 02:18, Eric W. Biederman 写道: Gleb Natapov g...@redhat.com writes: On Mon, Nov 26, 2012 at 11:43:10AM -0600, Eric W. Biederman wrote: Gleb Natapov g...@redhat.com writes: On Mon, Nov 26, 2012 at 09:08:54AM -0600, Eric W. Biederman wrote: Zhang Yanfei zhangyan...@cn.fujitsu.com

[PATCH V4 1/2] Add code to track call origin for msr assignment.

2012-11-26 Thread Will Auld
In order to track who initiated the call (host or guest) to modify an msr value I have changed function call parameters along the call path. The specific change is to add a struct pointer parameter that points to (index, data, caller) information rather than having this information passed as

[PATCH V4 2/2] Enabling IA32_TSC_ADJUST for KVM guest VM support

2012-11-26 Thread Will Auld
CPUID.7.0.EBX[1]=1 indicates IA32_TSC_ADJUST MSR 0x3b is supported Basic design is to emulate the MSR by allowing reads and writes to a guest vcpu specific location to store the value of the emulated MSR while adding the value to the vmcs tsc_offset. In this way the IA32_TSC_ADJUST value will be

[PATCH V3] target-i386: Enabling IA32_TSC_ADJUST for QEMU KVM guest VMs

2012-11-26 Thread Will Auld
CPUID.7.0.EBX[1]=1 indicates IA32_TSC_ADJUST MSR 0x3b is supported Basic design is to emulate the MSR by allowing reads and writes to the hypervisor vcpu specific locations to store the value of the emulated MSRs. In this way the IA32_TSC_ADJUST value will be included in all reads to the TSC MSR

RE: [Qemu-devel] [PATCH V2] Resend - Enabling IA32_TSC_ADJUST for QEMU KVM guest VMs

2012-11-26 Thread Auld, Will
Andreas, Thanks. I just sent the update patch (V3) to address your comments. Will -Original Message- From: kvm-ow...@vger.kernel.org [mailto:kvm-ow...@vger.kernel.org] On Behalf Of Andreas Färber Sent: Monday, November 26, 2012 11:05 AM To: Auld, Will Cc: Will Auld; qemu-devel;

Re: [PATCH v8 1/2] x86/kexec: add a new atomic notifier list for kdump

2012-11-26 Thread Eric W. Biederman
Zhang Yanfei zhangyan...@cn.fujitsu.com writes: So in summary, 1. a specific callback function instead of a notifier? Yes. 2. Instead of calling vmclear_local_loaded_vmcss, the vmclear operation will just call the vmclear on every vmcss loaded on the cpu? like below: static

Re: [Qemu-devel] [PATCH V3] target-i386: Enabling IA32_TSC_ADJUST for QEMU KVM guest VMs

2012-11-26 Thread Andreas Färber
Am 27.11.2012 02:40, schrieb Will Auld: CPUID.7.0.EBX[1]=1 indicates IA32_TSC_ADJUST MSR 0x3b is supported Basic design is to emulate the MSR by allowing reads and writes to the hypervisor vcpu specific locations to store the value of the emulated MSRs. In this way the IA32_TSC_ADJUST value

Re: [PATCH v8 1/2] x86/kexec: add a new atomic notifier list for kdump

2012-11-26 Thread Zhang Yanfei
于 2012年11月27日 09:49, Eric W. Biederman 写道: Zhang Yanfei zhangyan...@cn.fujitsu.com writes: So in summary, 1. a specific callback function instead of a notifier? Yes. 2. Instead of calling vmclear_local_loaded_vmcss, the vmclear operation will just call the vmclear on every vmcss

RE: [Qemu-devel] [PATCH V3] target-i386: Enabling IA32_TSC_ADJUST for QEMU KVM guest VMs

2012-11-26 Thread Auld, Will
Sorry, let me figure this out and resend. Thanks, Will -Original Message- From: kvm-ow...@vger.kernel.org [mailto:kvm-ow...@vger.kernel.org] On Behalf Of Andreas Färber Sent: Monday, November 26, 2012 5:51 PM To: Auld, Will Cc: Will Auld; qemu-devel; Gleb; mtosa...@redhat.com;

[PATCH V4] target-i386: Enabling IA32_TSC_ADJUST for Qemu KVM guest VMs

2012-11-26 Thread Will Auld
CPUID.7.0.EBX[1]=1 indicates IA32_TSC_ADJUST MSR 0x3b is supported Basic design is to emulate the MSR by allowing reads and writes to the hypervisor vcpu specific locations to store the value of the emulated MSRs. In this way the IA32_TSC_ADJUST value will be included in all reads to the TSC MSR

  1   2   >