Network performance data

2013-06-27 Thread Bill Rich
Hello All, I've run into a problem with getting network performance data on Windows VMs running on KVM. When I check the network data in the Windows task manager on the VM, it remains at zero, even if large amounts of data are being transferred. This has been tested on Windows Server 2008r2 using

Re: [GIT PULL] KVM/ARM queue for 3.11

2013-06-27 Thread Gleb Natapov
On Wed, Jun 26, 2013 at 12:05:54PM -0700, Christoffer Dall wrote: Hi Gleb and Paolo, The following changes since commit 87d41fb4da6467622b7a87fd6afe8071abab6dae: KVM: s390: Fixed priority of execution in STSI (2013-06-20 23:33:01 +0200) are available in the git repository at:

Re: [PATCH 3/8] vfio: add external user support

2013-06-27 Thread Stephen Rothwell
Hi Alexy, On Thu, 27 Jun 2013 15:02:31 +1000 Alexey Kardashevskiy a...@ozlabs.ru wrote: index c488da5..54192b2 100644 --- a/drivers/vfio/vfio.c +++ b/drivers/vfio/vfio.c @@ -1370,6 +1370,59 @@ static const struct file_operations vfio_device_fops = { }; /** + * External user API,

Re: [PATCH 3/8] vfio: add external user support

2013-06-27 Thread Stephen Rothwell
Hi Alexy, On Thu, 27 Jun 2013 15:02:31 +1000 Alexey Kardashevskiy a...@ozlabs.ru wrote: +/* Allows an external user (for example, KVM) to unlock an IOMMU group */ +static void vfio_group_del_external_user(struct file *filep) +{ + struct vfio_group *group = filep-private_data; + +

[patch] vfio/type1: fix a leak on error path

2013-06-27 Thread Dan Carpenter
If vfio_unmap_unpin() returns an error then we leak split. I've moved the allocation later in the function to fix this. Signed-off-by: Dan Carpenter dan.carpen...@oracle.com diff --git a/drivers/vfio/vfio_iommu_type1.c b/drivers/vfio/vfio_iommu_type1.c index 98231d1..657f6a8 100644 ---

[PATCH v2] vfio: add external user support

2013-06-27 Thread Alexey Kardashevskiy
VFIO is designed to be used via ioctls on file descriptors returned by VFIO. However in some situations support for an external user is required. The first user is KVM on PPC64 (SPAPR TCE protocol) which is going to use the existing VFIO groups for exclusive access in real/virtual mode in the

Re: [RFC PATCH] uio: uio_pci_generic: Add support for MSI interrupts

2013-06-27 Thread Michael S. Tsirkin
On Wed, Jun 26, 2013 at 03:30:23PM -0700, Guenter Roeck wrote: Enable support for MSI interrupts if the device supports it. Since MSI interrupts are edge triggered, it is no longer necessary to disable interrupts in the kernel and re-enable them from user-space. Instead, clearing the interrupt

[RFC 1/5] VSOCK: Introduce vsock_find_unbound_socket and vsock_bind_dgram_generic

2013-06-27 Thread Asias He
Signed-off-by: Asias He as...@redhat.com --- net/vmw_vsock/af_vsock.c | 70 net/vmw_vsock/af_vsock.h | 2 ++ 2 files changed, 72 insertions(+) diff --git a/net/vmw_vsock/af_vsock.c b/net/vmw_vsock/af_vsock.c index 593071d..bc76ddb 100644 ---

[RFC 2/5] VSOCK: Introduce virtio-vsock-common.ko

2013-06-27 Thread Asias He
This module contains the common code and header files for the following virtio-vsock and virtio-vhost kernel modules. Signed-off-by: Asias He as...@redhat.com --- include/linux/virtio_vsock.h| 200 +++ include/uapi/linux/virtio_ids.h | 1 +

[RFC 3/5] VSOCK: Introduce virtio-vsock.ko

2013-06-27 Thread Asias He
VM sockets virtio transport implementation. This module runs in guest kernel. Signed-off-by: Asias He as...@redhat.com --- net/vmw_vsock/virtio_transport.c | 424 +++ 1 file changed, 424 insertions(+) create mode 100644 net/vmw_vsock/virtio_transport.c diff

[RFC 5/5] VSOCK: Add Makefile and Kconfig

2013-06-27 Thread Asias He
Enable virtio-vsock and vhost-vsock. Signed-off-by: Asias He as...@redhat.com --- drivers/vhost/Kconfig | 4 drivers/vhost/Kconfig.vsock | 7 +++ drivers/vhost/Makefile | 5 + net/vmw_vsock/Kconfig | 18 ++ net/vmw_vsock/Makefile | 4 5

[RFC 4/5] VSOCK: Introduce vhost-vsock.ko

2013-06-27 Thread Asias He
VM sockets vhost transport implementation. This module runs in host kernel. Signed-off-by: Asias He as...@redhat.com --- drivers/vhost/vsock.c | 534 ++ drivers/vhost/vsock.h | 4 + 2 files changed, 538 insertions(+) create mode 100644

Re: i/o threads

2013-06-27 Thread Stefan Hajnoczi
On Wed, Jun 26, 2013 at 03:53:21PM +0200, folkert wrote: I noticed that on my 3 VMs running server, that there are 10-20 threads doing i/o. As the VMs are running on HDDs and not SSDs I think that is counterproductive: won't these threads make the HDDs seek back and forth constantly? The

Re: [PATCH v3 4/6] KVM: MMU: fast invalidate all mmio sptes

2013-06-27 Thread Gleb Natapov
On Fri, Jun 07, 2013 at 04:51:26PM +0800, Xiao Guangrong wrote: This patch tries to introduce a very simple and scale way to invalidate all mmio sptes - it need not walk any shadow pages and hold mmu-lock KVM maintains a global mmio valid generation-number which is stored in

Re: [PATCH v3 4/6] KVM: MMU: fast invalidate all mmio sptes

2013-06-27 Thread Gleb Natapov
On Thu, Jun 27, 2013 at 11:29:00AM +0300, Gleb Natapov wrote: On Fri, Jun 07, 2013 at 04:51:26PM +0800, Xiao Guangrong wrote: This patch tries to introduce a very simple and scale way to invalidate all mmio sptes - it need not walk any shadow pages and hold mmu-lock KVM maintains a

Re: [PATCH v3 4/6] KVM: MMU: fast invalidate all mmio sptes

2013-06-27 Thread Gleb Natapov
On Thu, Jun 27, 2013 at 12:01:10PM +0300, Gleb Natapov wrote: On Thu, Jun 27, 2013 at 11:29:00AM +0300, Gleb Natapov wrote: On Fri, Jun 07, 2013 at 04:51:26PM +0800, Xiao Guangrong wrote: This patch tries to introduce a very simple and scale way to invalidate all mmio sptes - it need not

Re: [PATCH v3 4/6] KVM: MMU: fast invalidate all mmio sptes

2013-06-27 Thread Gleb Natapov
On Thu, Jun 27, 2013 at 12:14:24PM +0300, Gleb Natapov wrote: On Thu, Jun 27, 2013 at 12:01:10PM +0300, Gleb Natapov wrote: On Thu, Jun 27, 2013 at 11:29:00AM +0300, Gleb Natapov wrote: On Fri, Jun 07, 2013 at 04:51:26PM +0800, Xiao Guangrong wrote: This patch tries to introduce a very

Re: [nVMX w/ Haswell] KVM unit-tests in L1 - eventinj test fails trying to send NMI

2013-06-27 Thread Kashyap Chamarthy
On Wed, Jun 26, 2013 at 10:49 PM, Jan Kiszka jan.kis...@web.de wrote: On 2013-06-26 10:03, Kashyap Chamarthy wrote: Thanks for the note, it's very helpful! This test actually fails on older CPUs as well, and I can finally reproduce the issue that Jay also reported. I'm not able to cure it by

Re: [PATCH 3/8] vfio: add external user support

2013-06-27 Thread Benjamin Herrenschmidt
On Thu, 2013-06-27 at 16:59 +1000, Stephen Rothwell wrote: +/* Allows an external user (for example, KVM) to unlock an IOMMU group */ +static void vfio_group_del_external_user(struct file *filep) +{ + struct vfio_group *group = filep-private_data; + + BUG_ON(filep-f_op !=

Re: [PATCH v3 4/6] KVM: MMU: fast invalidate all mmio sptes

2013-06-27 Thread Xiao Guangrong
On 06/27/2013 05:21 PM, Gleb Natapov wrote: On Thu, Jun 27, 2013 at 12:14:24PM +0300, Gleb Natapov wrote: On Thu, Jun 27, 2013 at 12:01:10PM +0300, Gleb Natapov wrote: On Thu, Jun 27, 2013 at 11:29:00AM +0300, Gleb Natapov wrote: On Fri, Jun 07, 2013 at 04:51:26PM +0800, Xiao Guangrong wrote:

Re: [PATCH v3 4/6] KVM: MMU: fast invalidate all mmio sptes

2013-06-27 Thread Gleb Natapov
On Thu, Jun 27, 2013 at 05:50:08PM +0800, Xiao Guangrong wrote: On 06/27/2013 05:21 PM, Gleb Natapov wrote: On Thu, Jun 27, 2013 at 12:14:24PM +0300, Gleb Natapov wrote: On Thu, Jun 27, 2013 at 12:01:10PM +0300, Gleb Natapov wrote: On Thu, Jun 27, 2013 at 11:29:00AM +0300, Gleb Natapov

Re: [PATCH-next v2] kvm: don't try to take mmu_lock while holding the main raw kvm_lock

2013-06-27 Thread Paolo Bonzini
Il 27/06/2013 04:56, Paul Gortmaker ha scritto: Il 26/06/2013 20:11, Paul Gortmaker ha scritto: spin_unlock(kvm-mmu_lock); + kvm_put_kvm(kvm); srcu_read_unlock(kvm-srcu, idx); kvm_put_kvm needs to go last. I can fix when applying,

Re: [RFC 0/5] Introduce VM Sockets virtio transport

2013-06-27 Thread Michael S. Tsirkin
On Thu, Jun 27, 2013 at 03:59:59PM +0800, Asias He wrote: Hello guys, In commit d021c344051af91 (VSOCK: Introduce VM Sockets), VMware added VM Sockets support. VM Sockets allows communication between virtual machines and the hypervisor. VM Sockets is able to use different hyervisor neutral

Re: [RFC 2/5] VSOCK: Introduce virtio-vsock-common.ko

2013-06-27 Thread Michael S. Tsirkin
On Thu, Jun 27, 2013 at 04:00:01PM +0800, Asias He wrote: This module contains the common code and header files for the following virtio-vsock and virtio-vhost kernel modules. Signed-off-by: Asias He as...@redhat.com --- include/linux/virtio_vsock.h| 200 +++

Re: [RFC 4/5] VSOCK: Introduce vhost-vsock.ko

2013-06-27 Thread Michael S. Tsirkin
On Thu, Jun 27, 2013 at 04:00:03PM +0800, Asias He wrote: VM sockets vhost transport implementation. This module runs in host kernel. Signed-off-by: Asias He as...@redhat.com Has any thought been given to how this affects migration? I don't see any API for an application to move to a

Re: [PATCH 3/8] vfio: add external user support

2013-06-27 Thread Alexey Kardashevskiy
On 06/27/2013 07:42 PM, Benjamin Herrenschmidt wrote: On Thu, 2013-06-27 at 16:59 +1000, Stephen Rothwell wrote: +/* Allows an external user (for example, KVM) to unlock an IOMMU group */ +static void vfio_group_del_external_user(struct file *filep) +{ + struct vfio_group *group =

Re: [PATCH v3 4/6] KVM: MMU: fast invalidate all mmio sptes

2013-06-27 Thread Xiao Guangrong
On 06/27/2013 06:19 PM, Gleb Natapov wrote: On Thu, Jun 27, 2013 at 05:50:08PM +0800, Xiao Guangrong wrote: On 06/27/2013 05:21 PM, Gleb Natapov wrote: On Thu, Jun 27, 2013 at 12:14:24PM +0300, Gleb Natapov wrote: On Thu, Jun 27, 2013 at 12:01:10PM +0300, Gleb Natapov wrote: On Thu, Jun 27,

Re: [PATCH 3/4] KVM: PPC: Add support for IOMMU in-kernel handling

2013-06-27 Thread David Gibson
On Sun, Jun 23, 2013 at 10:41:24PM -0600, Alex Williamson wrote: On Mon, 2013-06-24 at 13:52 +1000, David Gibson wrote: On Sat, Jun 22, 2013 at 08:28:06AM -0600, Alex Williamson wrote: On Sat, 2013-06-22 at 22:03 +1000, David Gibson wrote: On Thu, Jun 20, 2013 at 08:55:13AM -0600, Alex

Re: [PATCH-next] kvm: don't try to take mmu_lock while holding the main raw kvm_lock

2013-06-27 Thread Gleb Natapov
On Tue, Jun 25, 2013 at 06:34:03PM -0400, Paul Gortmaker wrote: In commit e935b8372cf8 (KVM: Convert kvm_lock to raw_spinlock), I am copying Jan, the author of the patch. Commit message says: Code under this lock requires non-preemptibility, but which code exactly is this? Is this still true?

Re: [PATCH v3 4/6] KVM: MMU: fast invalidate all mmio sptes

2013-06-27 Thread Gleb Natapov
On Thu, Jun 27, 2013 at 07:05:20PM +0800, Xiao Guangrong wrote: On 06/27/2013 06:19 PM, Gleb Natapov wrote: On Thu, Jun 27, 2013 at 05:50:08PM +0800, Xiao Guangrong wrote: On 06/27/2013 05:21 PM, Gleb Natapov wrote: On Thu, Jun 27, 2013 at 12:14:24PM +0300, Gleb Natapov wrote: On Thu, Jun

Re: [PATCH-next] kvm: don't try to take mmu_lock while holding the main raw kvm_lock

2013-06-27 Thread Paolo Bonzini
Il 27/06/2013 13:09, Gleb Natapov ha scritto: On Tue, Jun 25, 2013 at 06:34:03PM -0400, Paul Gortmaker wrote: In commit e935b8372cf8 (KVM: Convert kvm_lock to raw_spinlock), I am copying Jan, the author of the patch. Commit message says: Code under this lock requires non-preemptibility, but

Re: [PATCH-next] kvm: don't try to take mmu_lock while holding the main raw kvm_lock

2013-06-27 Thread Gleb Natapov
On Thu, Jun 27, 2013 at 01:38:29PM +0200, Paolo Bonzini wrote: Il 27/06/2013 13:09, Gleb Natapov ha scritto: On Tue, Jun 25, 2013 at 06:34:03PM -0400, Paul Gortmaker wrote: In commit e935b8372cf8 (KVM: Convert kvm_lock to raw_spinlock), I am copying Jan, the author of the patch. Commit

Re: [PATCH RFC V10 0/18] Paravirtualized ticket spinlocks

2013-06-27 Thread Raghavendra K T
On 06/26/2013 02:03 PM, Raghavendra K T wrote: On 06/24/2013 06:47 PM, Andrew Jones wrote: On Mon, Jun 24, 2013 at 06:10:14PM +0530, Raghavendra K T wrote: Results: === base = 3.10-rc2 kernel patched = base + this series The test was on 32 core (model: Intel(R) Xeon(R) CPU X7560) HT

Re: [PATCH-next] kvm: don't try to take mmu_lock while holding the main raw kvm_lock

2013-06-27 Thread Paolo Bonzini
Il 27/06/2013 13:43, Gleb Natapov ha scritto: I am copying Jan, the author of the patch. Commit message says: Code under this lock requires non-preemptibility, but which code exactly is this? Is this still true? hardware_enable_nolock/hardware_disable_nolock does. I suspected

Re: [PATCH-next] kvm: don't try to take mmu_lock while holding the main raw kvm_lock

2013-06-27 Thread Jan Kiszka
On 2013-06-27 13:38, Paolo Bonzini wrote: Il 27/06/2013 13:09, Gleb Natapov ha scritto: On Tue, Jun 25, 2013 at 06:34:03PM -0400, Paul Gortmaker wrote: In commit e935b8372cf8 (KVM: Convert kvm_lock to raw_spinlock), I am copying Jan, the author of the patch. Commit message says: Code under

Re: [PATCH-next] kvm: don't try to take mmu_lock while holding the main raw kvm_lock

2013-06-27 Thread Gleb Natapov
On Thu, Jun 27, 2013 at 02:16:07PM +0200, Jan Kiszka wrote: On 2013-06-27 13:38, Paolo Bonzini wrote: Il 27/06/2013 13:09, Gleb Natapov ha scritto: On Tue, Jun 25, 2013 at 06:34:03PM -0400, Paul Gortmaker wrote: In commit e935b8372cf8 (KVM: Convert kvm_lock to raw_spinlock), I am copying

Re: [PATCH-next] kvm: don't try to take mmu_lock while holding the main raw kvm_lock

2013-06-27 Thread Paolo Bonzini
Il 27/06/2013 14:32, Gleb Natapov ha scritto: In commit e935b8372cf8 (KVM: Convert kvm_lock to raw_spinlock), I am copying Jan, the author of the patch. Commit message says: Code under this lock requires non-preemptibility, but which code exactly is this? Is this still true?

Re: [PATCH-next] kvm: don't try to take mmu_lock while holding the main raw kvm_lock

2013-06-27 Thread Paolo Bonzini
Il 27/06/2013 15:00, Paolo Bonzini ha scritto: Il 27/06/2013 14:32, Gleb Natapov ha scritto: In commit e935b8372cf8 (KVM: Convert kvm_lock to raw_spinlock), I am copying Jan, the author of the patch. Commit message says: Code under this lock requires non-preemptibility, but which code exactly

Re: [PATCH 1/3] KVM: VMX: Use proper types to access const arrays

2013-06-27 Thread Paolo Bonzini
Il 26/06/2013 20:36, Mathias Krause ha scritto: Use a const pointer type instead of casting away the const qualifier from const arrays. Keep the pointer array on the stack, nonetheless. Making it static just increases the object size. Signed-off-by: Mathias Krause mini...@googlemail.com ---

Re: [PATCH 2/3] KVM: VMX: Use size_t to store sizeof() values

2013-06-27 Thread Paolo Bonzini
Il 26/06/2013 20:36, Mathias Krause ha scritto: The type for storing values of the sizeof operator should be size_t. No semantical changes, only type correctness. Signed-off-by: Mathias Krause mini...@googlemail.com --- arch/x86/kvm/vmx.c |4 ++-- 1 file changed, 2 insertions(+), 2

Re: [PATCH 3/3] KVM: x86: Drop useless cast

2013-06-27 Thread Paolo Bonzini
Il 26/06/2013 20:36, Mathias Krause ha scritto: Void pointers don't need no casting, drop it. Signed-off-by: Mathias Krause mini...@googlemail.com --- arch/x86/kvm/x86.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index

Re: [PATCH 1/3] KVM: VMX: Use proper types to access const arrays

2013-06-27 Thread Mathias Krause
On 27 June 2013 15:33, Paolo Bonzini pbonz...@redhat.com wrote: Il 26/06/2013 20:36, Mathias Krause ha scritto: Use a const pointer type instead of casting away the const qualifier from const arrays. Keep the pointer array on the stack, nonetheless. Making it static just increases the object

Re: [Qemu-devel] x86-64 apic panic on shutdown on 1.4.93.

2013-06-27 Thread Luiz Capitulino
On Wed, 26 Jun 2013 00:52:31 -0500 Rob Landley r...@landley.net wrote: I intermittently get this from current kernels running under currentish qemu-git. Look familiar to anybody? Which kernel do you run in the host? Is the guest doing anything special? reboot: machine restart general

Re: [PATCH 1/3] KVM: VMX: Use proper types to access const arrays

2013-06-27 Thread Paolo Bonzini
Il 27/06/2013 15:42, Mathias Krause ha scritto: The const int is not particularly useful, but doesn't hurt either. It's more of a hint for the compiler to take the values verbatim instead of allocating stack space for them. But it'll probably already do it even without that hint. It won't

Re: [RFC PATCH] uio: uio_pci_generic: Add support for MSI interrupts

2013-06-27 Thread Guenter Roeck
On Thu, Jun 27, 2013 at 10:45:01AM +0300, Michael S. Tsirkin wrote: On Wed, Jun 26, 2013 at 03:30:23PM -0700, Guenter Roeck wrote: Enable support for MSI interrupts if the device supports it. Since MSI interrupts are edge triggered, it is no longer necessary to disable interrupts in the

Re: Bug#707257: linux-image-3.8-1-686-pae: KVM crashes with entry failed, hardware error 0x80000021

2013-06-27 Thread Stefan Pietsch
On 26.06.2013 12:47, Gleb Natapov wrote: On Mon, Jun 24, 2013 at 10:42:57PM +0200, Stefan Pietsch wrote: On 24.06.2013 14:30, Gleb Natapov wrote: On Mon, Jun 24, 2013 at 01:59:34PM +0200, Stefan Pietsch wrote: As soon as I remove kvmvapic.bin the virtual machine boots with qemu-kvm 1.5.0. I

Re: [patch] vfio/type1: fix a leak on error path

2013-06-27 Thread Alex Williamson
On Thu, 2013-06-27 at 10:07 +0300, Dan Carpenter wrote: If vfio_unmap_unpin() returns an error then we leak split. I've moved the allocation later in the function to fix this. Thanks for spotting this and for the patch. The allocation is done early because if we get an allocation failure

Re: [PATCH v2] vfio: add external user support

2013-06-27 Thread Alex Williamson
On Thu, 2013-06-27 at 17:14 +1000, Alexey Kardashevskiy wrote: VFIO is designed to be used via ioctls on file descriptors returned by VFIO. However in some situations support for an external user is required. The first user is KVM on PPC64 (SPAPR TCE protocol) which is going to use the

Re: [Qemu-devel] [PATCH qom-cpu v2 20/29] kvm: Change kvm_remove_all_breakpoints() argument to CPUState

2013-06-27 Thread Andreas Färber
Am 17.06.2013 18:17, schrieb Paolo Bonzini: Il 16/06/2013 17:57, Andreas Färber ha scritto: Signed-off-by: Andreas Färber afaer...@suse.de --- gdbstub.c| 2 +- include/sysemu/kvm.h | 2 +- kvm-all.c| 5 ++--- kvm-stub.c | 2 +- 4 files changed, 5

Re: [RFC PATCH] uio: uio_pci_generic: Add support for MSI interrupts

2013-06-27 Thread Guenter Roeck
On Thu, Jun 27, 2013 at 10:45:01AM +0300, Michael S. Tsirkin wrote: On Wed, Jun 26, 2013 at 03:30:23PM -0700, Guenter Roeck wrote: Enable support for MSI interrupts if the device supports it. Since MSI interrupts are edge triggered, it is no longer necessary to disable interrupts in the

Re: [PATCH 8/8] KVM: PPC: Add hugepage support for IOMMU in-kernel handling

2013-06-27 Thread Scott Wood
On 06/27/2013 12:02:36 AM, Alexey Kardashevskiy wrote: +/* + * The KVM guest can be backed with 16MB pages. + * In this case, we cannot do page counting from the real mode + * as the compound pages are used - they are linked in a list + * with pointers as virtual addresses which are inaccessible

Re: [RFC 0/5] Introduce VM Sockets virtio transport

2013-06-27 Thread Sasha Levin
Hi Asias, Looks nice! Some comments inline below (I've removed anything that mst already commented on). On 06/27/2013 03:59 AM, Asias He wrote: Hello guys, In commit d021c344051af91 (VSOCK: Introduce VM Sockets), VMware added VM Sockets support. VM Sockets allows communication between virtual

Re: Network performance data

2013-06-27 Thread Brian Jackson
On Thursday, June 27, 2013 1:09:37 AM CDT, Bill Rich wrote: Hello All, I've run into a problem with getting network performance data on Windows VMs running on KVM. When I check the network data in the Windows task manager on the VM, it remains at zero, even if large amounts of data are being

Re: Migration route from Parallels on Mac for Windows images?

2013-06-27 Thread Brian Jackson
On Wednesday, June 26, 2013 8:25:54 PM CDT, Ken Roberts wrote: Sorry for the user query but I'm not finding expertise on the Linux mailing lists I belong to. The web site says one-off user questions are OK. I have a few VM images on Parallels 8 for Mac. I want them to be on KVM/Linux.

Re: Bug#707257: linux-image-3.8-1-686-pae: KVM crashes with entry failed, hardware error 0x80000021

2013-06-27 Thread Gleb Natapov
On Thu, Jun 27, 2013 at 04:09:50PM +0200, Stefan Pietsch wrote: On 26.06.2013 12:47, Gleb Natapov wrote: On Mon, Jun 24, 2013 at 10:42:57PM +0200, Stefan Pietsch wrote: On 24.06.2013 14:30, Gleb Natapov wrote: On Mon, Jun 24, 2013 at 01:59:34PM +0200, Stefan Pietsch wrote: As soon as I

[PATCH v3 41/45] powerpc: Use get/put_online_cpus_atomic() to prevent CPU offline

2013-06-27 Thread Srivatsa S. Bhat
Once stop_machine() is gone from the CPU offline path, we won't be able to depend on disabling preemption to prevent CPUs from going offline from under us. Use the get/put_online_cpus_atomic() APIs to prevent CPUs from going offline, while invoking from atomic context. Cc: Benjamin Herrenschmidt

[PATCH v3 29/45] KVM: Use get/put_online_cpus_atomic() to prevent CPU offline

2013-06-27 Thread Srivatsa S. Bhat
Once stop_machine() is gone from the CPU offline path, we won't be able to depend on disabling preemption to prevent CPUs from going offline from under us. Use the get/put_online_cpus_atomic() APIs to prevent CPUs from going offline, while invoking from atomic context. Acked-by: Paolo Bonzini

Re:

2013-06-27 Thread emirates
Did You Recieve Our Last Notification!! -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [PATCH v2] vfio: add external user support

2013-06-27 Thread Alexey Kardashevskiy
On 06/28/2013 01:44 AM, Alex Williamson wrote: On Thu, 2013-06-27 at 17:14 +1000, Alexey Kardashevskiy wrote: VFIO is designed to be used via ioctls on file descriptors returned by VFIO. However in some situations support for an external user is required. The first user is KVM on PPC64

Re: [PATCH v2] vfio: add external user support

2013-06-27 Thread Alex Williamson
On Fri, 2013-06-28 at 08:57 +1000, Alexey Kardashevskiy wrote: On 06/28/2013 01:44 AM, Alex Williamson wrote: On Thu, 2013-06-27 at 17:14 +1000, Alexey Kardashevskiy wrote: VFIO is designed to be used via ioctls on file descriptors returned by VFIO. However in some situations support

Re: Migration route from Parallels on Mac for Windows images?

2013-06-27 Thread Ken Roberts
-- Ken Roberts k...@9ci.com ken.roberts163 @ skype 605-222-5758 @ cell On Jun 27, 2013, at 2:33 PM, Brian Jackson i...@theiggy.com wrote: On Wednesday, June 26, 2013 8:25:54 PM CDT, Ken Roberts wrote: Sorry for the user query but I'm not finding expertise on the Linux mailing lists I

Re: [PATCH v2] vfio: add external user support

2013-06-27 Thread Alexey Kardashevskiy
On 06/28/2013 10:41 AM, Alex Williamson wrote: On Fri, 2013-06-28 at 08:57 +1000, Alexey Kardashevskiy wrote: On 06/28/2013 01:44 AM, Alex Williamson wrote: On Thu, 2013-06-27 at 17:14 +1000, Alexey Kardashevskiy wrote: VFIO is designed to be used via ioctls on file descriptors returned by

Re: [RFC 0/5] Introduce VM Sockets virtio transport

2013-06-27 Thread Andy King
Hi Michael, __u32 guest_cid; Given that cid is like an IP address, 32 bit seems too limiting. I would go for a 64 bit one or maybe even 128 bit, so that e.g. GUIDs can be used there. That's likely based on what vSockets uses, which is in turn based on what the VMCI device

Re: [PATCH v2] vfio: add external user support

2013-06-27 Thread Alex Williamson
On Fri, 2013-06-28 at 11:38 +1000, Alexey Kardashevskiy wrote: On 06/28/2013 10:41 AM, Alex Williamson wrote: On Fri, 2013-06-28 at 08:57 +1000, Alexey Kardashevskiy wrote: On 06/28/2013 01:44 AM, Alex Williamson wrote: On Thu, 2013-06-27 at 17:14 +1000, Alexey Kardashevskiy wrote: VFIO

Re: [RFC 4/5] VSOCK: Introduce vhost-vsock.ko

2013-06-27 Thread Andy King
Hi Michael, + u32 cid = VHOST_VSOCK_DEFAULT_HOST_CID; + return cid; +} + Interesting. So all hosts in fact have the same CID? Host here means the thing _below_ the VM. Any process running on the host OS can be addressed with cid 2. Each VM gets its own cid. So communication is

watchdog: print stolen time increment at softlockup detection

2013-06-27 Thread Marcelo Tosatti
One possibility for a softlockup report in a Linux VM, is that the host system is overcommitted to the point where the watchdog task is unable to make progress (unable to touch the watchdog). Maintain the increment in stolen time for the period of softlockup threshold detection (20 seconds by

Re: [PATCH v2] vfio: add external user support

2013-06-27 Thread Alexey Kardashevskiy
On 06/28/2013 12:37 PM, Alex Williamson wrote: On Fri, 2013-06-28 at 11:38 +1000, Alexey Kardashevskiy wrote: On 06/28/2013 10:41 AM, Alex Williamson wrote: On Fri, 2013-06-28 at 08:57 +1000, Alexey Kardashevskiy wrote: On 06/28/2013 01:44 AM, Alex Williamson wrote: On Thu, 2013-06-27 at

Re: [RFC 0/5] Introduce VM Sockets virtio transport

2013-06-27 Thread Asias He
On Thu, Jun 27, 2013 at 07:25:40PM -0700, Andy King wrote: Hi Michael, __u32 guest_cid; Given that cid is like an IP address, 32 bit seems too limiting. I would go for a 64 bit one or maybe even 128 bit, so that e.g. GUIDs can be used there. That's likely based on what

Re: [PATCH 3/8] vfio: add external user support

2013-06-27 Thread Stephen Rothwell
Hi Alexy, On Thu, 27 Jun 2013 15:02:31 +1000 Alexey Kardashevskiy a...@ozlabs.ru wrote: index c488da5..54192b2 100644 --- a/drivers/vfio/vfio.c +++ b/drivers/vfio/vfio.c @@ -1370,6 +1370,59 @@ static const struct file_operations vfio_device_fops = { }; /** + * External user API,

Re: [PATCH 3/8] vfio: add external user support

2013-06-27 Thread Stephen Rothwell
Hi Alexy, On Thu, 27 Jun 2013 15:02:31 +1000 Alexey Kardashevskiy a...@ozlabs.ru wrote: +/* Allows an external user (for example, KVM) to unlock an IOMMU group */ +static void vfio_group_del_external_user(struct file *filep) +{ + struct vfio_group *group = filep-private_data; + +

Re: [PATCH 3/8] vfio: add external user support

2013-06-27 Thread Benjamin Herrenschmidt
On Thu, 2013-06-27 at 16:59 +1000, Stephen Rothwell wrote: +/* Allows an external user (for example, KVM) to unlock an IOMMU group */ +static void vfio_group_del_external_user(struct file *filep) +{ + struct vfio_group *group = filep-private_data; + + BUG_ON(filep-f_op !=

Re: [PATCH 3/8] vfio: add external user support

2013-06-27 Thread Alexey Kardashevskiy
On 06/27/2013 07:42 PM, Benjamin Herrenschmidt wrote: On Thu, 2013-06-27 at 16:59 +1000, Stephen Rothwell wrote: +/* Allows an external user (for example, KVM) to unlock an IOMMU group */ +static void vfio_group_del_external_user(struct file *filep) +{ + struct vfio_group *group =

Re: [PATCH 3/4] KVM: PPC: Add support for IOMMU in-kernel handling

2013-06-27 Thread David Gibson
On Sun, Jun 23, 2013 at 10:41:24PM -0600, Alex Williamson wrote: On Mon, 2013-06-24 at 13:52 +1000, David Gibson wrote: On Sat, Jun 22, 2013 at 08:28:06AM -0600, Alex Williamson wrote: On Sat, 2013-06-22 at 22:03 +1000, David Gibson wrote: On Thu, Jun 20, 2013 at 08:55:13AM -0600, Alex

Re: [PATCH 8/8] KVM: PPC: Add hugepage support for IOMMU in-kernel handling

2013-06-27 Thread Scott Wood
On 06/27/2013 12:02:36 AM, Alexey Kardashevskiy wrote: +/* + * The KVM guest can be backed with 16MB pages. + * In this case, we cannot do page counting from the real mode + * as the compound pages are used - they are linked in a list + * with pointers as virtual addresses which are inaccessible

[PATCH v3 41/45] powerpc: Use get/put_online_cpus_atomic() to prevent CPU offline

2013-06-27 Thread Srivatsa S. Bhat
Once stop_machine() is gone from the CPU offline path, we won't be able to depend on disabling preemption to prevent CPUs from going offline from under us. Use the get/put_online_cpus_atomic() APIs to prevent CPUs from going offline, while invoking from atomic context. Cc: Benjamin Herrenschmidt

Re:

2013-06-27 Thread emirates
Did You Recieve Our Last Notification!! -- To unsubscribe from this list: send the line unsubscribe kvm-ppc in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html