[Bug 42779] KVM domain hangs after loading initrd with Xenomai kernel

2012-02-16 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=42779 --- Comment #10 from Gleb 2012-02-16 08:04:22 --- (In reply to comment #8) > Not sure what you mean by installing trace-cmd before capturing the trace--I > did do that, otherwise I wouldn't have had a trace-cmd to run. The package I meant tha

[Bug 42779] KVM domain hangs after loading initrd with Xenomai kernel

2012-02-16 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=42779 Jan Kiszka changed: What|Removed |Added CC||jan.kis...@web.de --- Comment #11 from J

[Bug 42779] KVM domain hangs after loading initrd with Xenomai kernel

2012-02-16 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=42779 --- Comment #12 from Gleb 2012-02-16 08:40:37 --- Can you try disabling CONFIG_FB in your guest kernel? -- Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email --- You are receiving this mail because: --- You are w

Re: performance trouble

2012-02-16 Thread David Cure
hello, Le Tue, Feb 14, 2012 at 03:40:30PM +0200, Gleb Natapov ecrivait : > > Try to add -no-hpet to qemu command line and see if it helps. I add this line in my xml definition for libvirt : in the clock block. And I see the -no-hpet in the command line : /usr/b

Re: [Qemu-devel] [RFC] Next gen kvm api

2012-02-16 Thread Gleb Natapov
On Wed, Feb 15, 2012 at 03:59:33PM -0600, Anthony Liguori wrote: > On 02/15/2012 07:39 AM, Avi Kivity wrote: > >On 02/07/2012 08:12 PM, Rusty Russell wrote: > >>>I would really love to have this, but the problem is that we'd need a > >>>general purpose bytecode VM with binding to some kernel APIs.

Re: performance trouble

2012-02-16 Thread Gleb Natapov
On Thu, Feb 16, 2012 at 09:55:53AM +0100, David Cure wrote: > hello, > > Le Tue, Feb 14, 2012 at 03:40:30PM +0200, Gleb Natapov ecrivait : > > > > Try to add -no-hpet to qemu command line and see if it helps. > > I add this line in my xml definition for libvirt : > >

Re: performance trouble

2012-02-16 Thread David Cure
Le Tue, Feb 14, 2012 at 03:32:16PM +0200, Avi Kivity ecrivait : > > It's reading the HPET like crazy. There are also tons of interrupts. > Please use the windows performance tools to see which devices trigger > these interrupts. > > The HPET issue will be fixed by the hyper-V enlightenments, bu

[PATCH] Synchronize cpu state with kernel before poking into registers.

2012-02-16 Thread Gleb Natapov
Call to kvm_cpu_synchronize_state() is missing. kvm_arch_stop_on_emulation_error may look at outdated registers here. Signed-off-by: Gleb Natapov diff --git a/target-i386/kvm.c b/target-i386/kvm.c index 7079e87..51d0ae7 100644 --- a/target-i386/kvm.c +++ b/target-i386/kvm.c @@ -2020,6 +2020,7 @@

[PATCH v4 3/3] KVM: PPC: epapr: install ev_idle hcall for e500 guest

2012-02-16 Thread Liu Yu
If the guest hypervisor node contains "has-idle" property. Signed-off-by: Liu Yu --- v4: 1. discard the CONFIG_E500 to make code for all powerpc platform 2. code cleanup arch/powerpc/kernel/epapr.S | 29 + arch/powerpc/kernel/epapr_para.c | 13 -

[PATCH v4 1/3] KVM: PPC: epapr: Factor out the epapr init

2012-02-16 Thread Liu Yu
from the kvm guest paravirt init code. Signed-off-by: Liu Yu --- v4: 1. code cleanup 2. move kvm_hypercall_start() to epapr_hypercall_start() arch/powerpc/Kconfig|4 ++ arch/powerpc/include/asm/epapr_hcalls.h |2 + arch/powerpc/kernel/Makefile|1 + ar

[PATCH v4 2/3] KVM: PPC: epapr: Add idle hcall support for host

2012-02-16 Thread Liu Yu
And add a new flag definition in kvm_ppc_pvinfo to indicate whether host support EV_IDLE hcall. Signed-off-by: Liu Yu --- v4: no change arch/powerpc/include/asm/kvm_para.h | 14 -- arch/powerpc/kvm/powerpc.c |8 include/linux/kvm.h |2 ++

Re: [PATCH v4 1/3] KVM: PPC: epapr: Factor out the epapr init

2012-02-16 Thread Alexander Graf
On 16.02.2012, at 10:26, Liu Yu wrote: > from the kvm guest paravirt init code. > > Signed-off-by: Liu Yu > --- > v4: > 1. code cleanup > 2. move kvm_hypercall_start() to epapr_hypercall_start() > > arch/powerpc/Kconfig|4 ++ > arch/powerpc/include/asm/epapr_hcalls.h |

Re: [PATCH v4 2/3] KVM: PPC: epapr: Add idle hcall support for host

2012-02-16 Thread Alexander Graf
On 16.02.2012, at 10:26, Liu Yu wrote: > And add a new flag definition in kvm_ppc_pvinfo to indicate > whether host support EV_IDLE hcall. > > Signed-off-by: Liu Yu > --- > v4: > no change > > arch/powerpc/include/asm/kvm_para.h | 14 -- > arch/powerpc/kvm/powerpc.c |

Re: [PATCH v4 3/3] KVM: PPC: epapr: install ev_idle hcall for e500 guest

2012-02-16 Thread Alexander Graf
On 16.02.2012, at 10:26, Liu Yu wrote: > If the guest hypervisor node contains "has-idle" property. > > Signed-off-by: Liu Yu > --- > v4: > 1. discard the CONFIG_E500 to make code for all powerpc platform > 2. code cleanup > > arch/powerpc/kernel/epapr.S | 29 +

Re: [Qemu-devel] [RFC] Next gen kvm api

2012-02-16 Thread Avi Kivity
On 02/16/2012 12:21 AM, Arnd Bergmann wrote: > ioctl is good for hardware devices and stuff that you want to enumerate > and/or control permissions on. For something like KVM that is really a > core kernel service, a syscall makes much more sense. > > I would certainly never mix the two concepts: I

[Bug 42779] KVM domain hangs after loading initrd with Xenomai kernel

2012-02-16 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=42779 Avi Kivity changed: What|Removed |Added CC||a...@redhat.com --- Comment #13 from Avi

[Bug 42779] KVM domain hangs after loading initrd with Xenomai kernel

2012-02-16 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=42779 --- Comment #14 from Jan Kiszka 2012-02-16 11:51:05 --- Because the selected CPU type doesn't support SSE? Didn't check the config yet, but I bet that's the reason. -- Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email -

IO_PAGE_FAULT while starting xorg

2012-02-16 Thread edm
Hi, I got this error while doing startx with 3.2.6 kernel and I can't start xorg: [   54.683907] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0 domain=0x0018 address=0x000220583200 flags=0x0010] I saw the same error in this mailing list (http://www.spinics.net/lists/kvm/msg48472.html) so

Re: [PATCH 1/2] KVM: mmu_notifier: Flush TLBs before releasing mmu_lock

2012-02-16 Thread Avi Kivity
On 02/16/2012 06:50 AM, Xiao Guangrong wrote: > I think we do not need handle all tlb-flushed request here since all of these > request can be delayed to the point where mmu-lock is released , we can simply > do it: > > void kvm_mmu_defer_remote_flush(kvm, need_flush) > { > if (need_flush) >

Consistent VM backup via snapshot

2012-02-16 Thread Michael Weiser
Hello, I am trying to backup a KVM VM by creating a snapshot of the running VM and extracting that snapshot from the running VM using qemu-img convert. Sources on the net suggest that I would get an image that contains all the machine state of the snapshot. So when I run the VM it would continue t

[Bug 42782] New: IO_PAGE_FAULT while starting xorg

2012-02-16 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=42782 Summary: IO_PAGE_FAULT while starting xorg Product: Virtualization Version: unspecified Kernel Version: 3.2.6 Platform: All OS/Version: Linux Tree: Mainline Status: NE

[Bug 42782] IO_PAGE_FAULT while starting xorg

2012-02-16 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=42782 --- Comment #1 from edm 2012-02-16 12:14:28 --- Created an attachment (id=72398) --> (https://bugzilla.kernel.org/attachment.cgi?id=72398) dmesg output -- Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email --- You a

[Bug 42782] IO_PAGE_FAULT while starting xorg

2012-02-16 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=42782 --- Comment #2 from edm 2012-02-16 12:17:11 --- Created an attachment (id=72399) --> (https://bugzilla.kernel.org/attachment.cgi?id=72399) dmidecode output -- Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email --- Y

[Bug 42782] IO_PAGE_FAULT while starting xorg

2012-02-16 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=42782 --- Comment #3 from edm 2012-02-16 12:17:43 --- Created an attachment (id=72400) --> (https://bugzilla.kernel.org/attachment.cgi?id=72400) lspci -vv output -- Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email --- Y

[PATCH] correctly mask pmc index bits in RDPMC instruction emulation

2012-02-16 Thread Gleb Natapov
Signed-off-by: Gleb Natapov diff --git a/arch/x86/kvm/pmu.c b/arch/x86/kvm/pmu.c index 7aad544..3e48c1d 100644 --- a/arch/x86/kvm/pmu.c +++ b/arch/x86/kvm/pmu.c @@ -413,7 +413,7 @@ int kvm_pmu_read_pmc(struct kvm_vcpu *vcpu, unsigned pmc, u64 *data) struct kvm_pmc *counters; u64

Re: [PATCH uq/master] Synchronize cpu state with kernel before poking into registers.

2012-02-16 Thread Jan Kiszka
On 2012-02-16 10:12, Gleb Natapov wrote: > Call to kvm_cpu_synchronize_state() is missing. > kvm_arch_stop_on_emulation_error may > look at outdated registers here. > > Signed-off-by: Gleb Natapov > diff --git a/target-i386/kvm.c b/target-i386/kvm.c > index 7079e87..51d0ae7 100644 > --- a/target

[PATCH 0/2] Fix build on i386 due to the latest tsc changes

2012-02-16 Thread Avi Kivity
The code fixed by the second patch looks suspect though: nsdiff = data - kvm->arch.last_tsc_write; nsdiff = (nsdiff * 1000) / vcpu->arch.virtual_tsc_khz; before the division, nsdiff is in tsc units. Dividing it by tsc_khz/1000 is equivalent to multiplying it by 100 and dividing it by tsc

[PATCH 1/2] KVM: Fix 64-bit division in kvm_set_tsc_khz()

2012-02-16 Thread Avi Kivity
Breaks i386 build. Signed-off-by: Avi Kivity --- arch/x86/kvm/x86.c | 11 +-- 1 files changed, 9 insertions(+), 2 deletions(-) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 1312f13..1d71b13 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -978,6 +978,13 @@ stat

[PATCH 2/2] KVM: Fix 64-bit division in kvm_write_tsc()

2012-02-16 Thread Avi Kivity
Breaks i386 build. Signed-off-by: Avi Kivity --- arch/x86/kvm/x86.c |7 +++ 1 files changed, 7 insertions(+), 0 deletions(-) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 1d71b13..c9d99e5 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -1034,7 +1034,14 @@ void k

Re: [PATCH 0/2] Fix build on i386 due to the latest tsc changes

2012-02-16 Thread Avi Kivity
On 02/16/2012 03:48 PM, Avi Kivity wrote: > The code fixed by the second patch looks suspect though: > > nsdiff = data - kvm->arch.last_tsc_write; > nsdiff = (nsdiff * 1000) / vcpu->arch.virtual_tsc_khz; > > before the division, nsdiff is in tsc units. Dividing it by > tsc_khz/1000 is equivale

[PATCH] arch/powerpc/kvm/book3s_hv.c: included linux/sched.h twice

2012-02-16 Thread Danny Kukawka
arch/powerpc/kvm/book3s_hv.c: included 'linux/sched.h' twice, remove the duplicate. Signed-off-by: Danny Kukawka --- arch/powerpc/kvm/book3s_hv.c |1 - 1 files changed, 0 insertions(+), 1 deletions(-) diff --git a/arch/powerpc/kvm/book3s_hv.c b/arch/powerpc/kvm/book3s_hv.c index 336983d..a7

Re: [PATCH] Synchronize cpu state with kernel before poking into registers.

2012-02-16 Thread Avi Kivity
On 02/16/2012 11:12 AM, Gleb Natapov wrote: > Call to kvm_cpu_synchronize_state() is missing. > kvm_arch_stop_on_emulation_error may > look at outdated registers here. > > Thanks, applied to uq/master. -- error compiling committee.c: too many arguments to function -- To unsubscribe from this l

[Bug 42782] IO_PAGE_FAULT while starting xorg

2012-02-16 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=42782 Joerg Roedel changed: What|Removed |Added CC||j...@8bytes.org --- Comment #4 from Jo

Re: [PATCH] BUG in pv_clock when overflow condition is detected

2012-02-16 Thread Avi Kivity
On 02/15/2012 07:18 PM, Igor Mammedov wrote: > > On 02/15/2012 01:23 PM, Igor Mammedov wrote: > > >>> static u64 pvclock_get_nsec_offset(struct pvclock_shadow_time > > >>> *shadow) > > >>> { > > >>> -u64 delta = native_read_tsc() - shadow->tsc_timestamp; > > >>> +u64 delta; > > >>> +

Re: [PATCH 3/4 V13] Add ioctl for KVM_KVMCLOCK_CTRL

2012-02-16 Thread Avi Kivity
On 02/08/2012 05:07 PM, Eric B Munson wrote: > Now that we have a flag that will tell the guest it was suspended, create an > interface for that communication using a KVM ioctl. > > + > +Capability: KVM_CAP_KVMCLOCK_CTRL > +Architectures: Any that implement pvclocks (currently x86 only) > +Type: vc

Re: [Qemu-devel] [RFC] Next gen kvm api

2012-02-16 Thread Anthony Liguori
On 02/16/2012 02:57 AM, Gleb Natapov wrote: On Wed, Feb 15, 2012 at 03:59:33PM -0600, Anthony Liguori wrote: On 02/15/2012 07:39 AM, Avi Kivity wrote: On 02/07/2012 08:12 PM, Rusty Russell wrote: I would really love to have this, but the problem is that we'd need a general purpose bytecode VM

Re: [PATCH v3 4/9] target-i386: Add infrastructure for reporting TPR MMIO accesses

2012-02-16 Thread Jan Kiszka
On 2012-02-16 16:21, Avi Kivity wrote: > On 02/14/2012 05:13 PM, Jan Kiszka wrote: >> Note that KVM without in-kernel irqchip will report the address after >> the instruction that triggered a write access. In contrast, read >> accesses will return the precise information. >> > > Well this is wierd

Re: [PATCH v3 6/9] kvmvapic: Introduce TPR access optimization for Windows guests

2012-02-16 Thread Avi Kivity
On 02/14/2012 05:13 PM, Jan Kiszka wrote: > This enables acceleration for MMIO-based TPR registers accesses of > 32-bit Windows guest systems. It is mostly useful with KVM enabled, > either on older Intel CPUs (without flexpriority feature, can also be > manually disabled for testing) or any curren

Re: [PATCH v3 4/9] target-i386: Add infrastructure for reporting TPR MMIO accesses

2012-02-16 Thread Avi Kivity
On 02/14/2012 05:13 PM, Jan Kiszka wrote: > Note that KVM without in-kernel irqchip will report the address after > the instruction that triggered a write access. In contrast, read > accesses will return the precise information. > Well this is wierd. We could retro-doc one or the other behaviour,

Re: [PATCH] arch/powerpc/kvm/book3s_hv.c: included linux/sched.h twice

2012-02-16 Thread Avi Kivity
On 02/16/2012 03:55 PM, Danny Kukawka wrote: > arch/powerpc/kvm/book3s_hv.c: included 'linux/sched.h' twice, > remove the duplicate. > Thanks, applied. -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of

Re: [PATCH] correctly mask pmc index bits in RDPMC instruction emulation

2012-02-16 Thread Avi Kivity
On 02/16/2012 02:44 PM, Gleb Natapov wrote: > Signed-off-by: Gleb Natapov > Thanks, applied and queued for 3.3 -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord...@vger.kernel.org

Re: [KVM paravirt issue?] Re: vsyscall=emulate regression

2012-02-16 Thread Avi Kivity
On 02/15/2012 09:36 PM, Andy Lutomirski wrote: > Hi, kvm people- > > Here's a strange failure. It could be a bug in something > RHEL6-specific, but it could be a generic issue that only triggers > with a paravirt guest with old userspace on a non-ept host. There was > a bug like this on Xen, and

Re: [PATCH 3/3] KVM: perf: kvm events analysis tool

2012-02-16 Thread Arnaldo Carvalho de Melo
Em Wed, Feb 15, 2012 at 10:05:08PM -0700, David Ahern escreveu: > On 2/15/12 9:59 PM, Xiao Guangrong wrote: > > > > > >Okay, i will post the next version after collecting your new comments! > > > >Thanks for your time, David! :) > > > > I had more comments, but got sidetracked and forgot to come b

Re: [KVM paravirt issue?] Re: vsyscall=emulate regression

2012-02-16 Thread Andy Lutomirski
On Thu, Feb 16, 2012 at 8:17 AM, Avi Kivity wrote: > On 02/15/2012 09:36 PM, Andy Lutomirski wrote: >> Hi, kvm people- >> >> Here's a strange failure.  It could be a bug in something >> RHEL6-specific, but it could be a generic issue that only triggers >> with a paravirt guest with old userspace o

[Bug 42779] KVM domain hangs after loading initrd with Xenomai kernel

2012-02-16 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=42779 --- Comment #15 from madenginee...@gmail.com 2012-02-16 16:48:56 --- I set the kernel up for an AMD Geode LX800 (CONFIG_MGEODE_LX), which does supposedly support SSE. No idea why it would have built using MMX if that is now deprecated in favor

[Bug 42779] KVM domain hangs after loading initrd with Xenomai kernel

2012-02-16 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=42779 --- Comment #16 from madenginee...@gmail.com 2012-02-16 16:51:10 --- Background: I'm using KVM as a test platform for code destined for a panel PC using a Geode LX800. -- Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email

Re: [PATCH v4 3/3] KVM: PPC: epapr: install ev_idle hcall for e500 guest

2012-02-16 Thread Scott Wood
On 02/16/2012 04:24 AM, Alexander Graf wrote: > On 16.02.2012, at 10:26, Liu Yu wrote: >> +_GLOBAL(epapr_ev_idle) >> +epapr_ev_idle: >> +rlwinmr3,r1,0,0,31-THREAD_SHIFT/* current thread_info */ >> +lwzr4,TI_LOCAL_FLAGS(r3)/* set napping bit */ >> +orir4,r4,_TLF_NAPP

Re: [PATCH v4 1/3] KVM: PPC: epapr: Factor out the epapr init

2012-02-16 Thread Scott Wood
On 02/16/2012 03:26 AM, Liu Yu wrote: > from the kvm guest paravirt init code. > > Signed-off-by: Liu Yu > --- > v4: > 1. code cleanup > 2. move kvm_hypercall_start() to epapr_hypercall_start() > > arch/powerpc/Kconfig|4 ++ > arch/powerpc/include/asm/epapr_hcalls.h |

Re: [KVM paravirt issue?] Re: vsyscall=emulate regression

2012-02-16 Thread Avi Kivity
On 02/16/2012 06:45 PM, Andy Lutomirski wrote: > > > >> So I could have messed up, or there could be a subtle > >> bug somewhere. Any ideas? > > > > What's the code trying to do? Execute an instruction from an > > non-executable page, trap the #PF, and emulate? And what are the > > symptoms? wro

Re: [PATCH v4 3/3] KVM: PPC: epapr: install ev_idle hcall for e500 guest

2012-02-16 Thread Scott Wood
On 02/16/2012 03:26 AM, Liu Yu wrote: > If the guest hypervisor node contains "has-idle" property. > > Signed-off-by: Liu Yu > --- > v4: > 1. discard the CONFIG_E500 to make code for all powerpc platform > 2. code cleanup Is the TLF_NAPPING stuff supported on all powerpc platforms? -Scott -- T

Re: [PATCH v4 3/3] KVM: PPC: epapr: install ev_idle hcall for e500 guest

2012-02-16 Thread Alexander Graf
On 16.02.2012, at 17:58, Scott Wood wrote: > On 02/16/2012 04:24 AM, Alexander Graf wrote: >> On 16.02.2012, at 10:26, Liu Yu wrote: >>> +_GLOBAL(epapr_ev_idle) >>> +epapr_ev_idle: >>> +rlwinmr3,r1,0,0,31-THREAD_SHIFT/* current thread_info */ >>> +lwzr4,TI_LOCAL_FLAGS(r3)

[Bug 42779] KVM domain hangs after loading initrd with Xenomai kernel

2012-02-16 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=42779 --- Comment #17 from Jan Kiszka 2012-02-16 17:24:34 --- (In reply to comment #15) > I set the kernel up for an AMD Geode LX800 (CONFIG_MGEODE_LX), which does > supposedly support SSE. No idea why it would have built using MMX if that is > now

Re: [PATCH v4 3/3] KVM: PPC: epapr: install ev_idle hcall for e500 guest

2012-02-16 Thread Scott Wood
On 02/16/2012 11:18 AM, Alexander Graf wrote: > > On 16.02.2012, at 17:58, Scott Wood wrote: > >> On 02/16/2012 04:24 AM, Alexander Graf wrote: >>> On 16.02.2012, at 10:26, Liu Yu wrote: +_GLOBAL(epapr_ev_idle) +epapr_ev_idle: +rlwinmr3,r1,0,0,31-THREAD_SHIFT/* current

Re: [PATCH v4 3/3] KVM: PPC: epapr: install ev_idle hcall for e500 guest

2012-02-16 Thread Alexander Graf
On 16.02.2012, at 18:28, Scott Wood wrote: > On 02/16/2012 11:18 AM, Alexander Graf wrote: >> >> On 16.02.2012, at 17:58, Scott Wood wrote: >> >>> On 02/16/2012 04:24 AM, Alexander Graf wrote: On 16.02.2012, at 10:26, Liu Yu wrote: > +_GLOBAL(epapr_ev_idle) > +epapr_ev_idle: >

[Bug 42779] KVM domain hangs after loading initrd with Xenomai kernel

2012-02-16 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=42779 --- Comment #18 from Avi Kivity 2012-02-16 17:30:47 --- As a workaround you can use -cpu blah,-3dnow. But we'll have to implement mmx movq. -- Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email --- You are receiving

Re: [KVM paravirt issue?] Re: vsyscall=emulate regression

2012-02-16 Thread Andy Lutomirski
On Thu, Feb 16, 2012 at 9:14 AM, Avi Kivity wrote: > On 02/16/2012 06:45 PM, Andy Lutomirski wrote: >> > >> >> So I could have messed up, or there could be a subtle >> >> bug somewhere.  Any ideas? >> > >> > What's the code trying to do?  Execute an instruction from an >> > non-executable page, tr

Re: [PATCH v4 3/3] KVM: PPC: epapr: install ev_idle hcall for e500 guest

2012-02-16 Thread Scott Wood
On 02/16/2012 11:30 AM, Alexander Graf wrote: > > On 16.02.2012, at 18:28, Scott Wood wrote: > >> On 02/16/2012 11:18 AM, Alexander Graf wrote: >>> Hrm. But we can clobber ctr, right? So how about we make the generic >>> version do a bctr and then just do a small C wrapper that takes lr, moves

Re: [PATCH v4 3/3] KVM: PPC: epapr: install ev_idle hcall for e500 guest

2012-02-16 Thread Alexander Graf
On 16.02.2012, at 18:36, Scott Wood wrote: > On 02/16/2012 11:30 AM, Alexander Graf wrote: >> >> On 16.02.2012, at 18:28, Scott Wood wrote: >> >>> On 02/16/2012 11:18 AM, Alexander Graf wrote: Hrm. But we can clobber ctr, right? So how about we make the generic version do a bctr and

Offline

2012-02-16 Thread Avi Kivity
I'll be on vacation again, from Sunday (the 19th) until the following Sunday. Unfortunately, Marcelo is on vacation as well, so there won't be anyone to tend to patches. This is doubly unfortunate since there are still unreviewed patches on the list. I'll do my best to catch up a little tomorrow

Re: [KVM paravirt issue?] Re: vsyscall=emulate regression

2012-02-16 Thread Avi Kivity
On 02/16/2012 07:35 PM, Andy Lutomirski wrote: > > > > so it seems like kvm doesn't set PF_INSTR? > > Yes, this is on purpose, and you're almost certainly right (and I feel > dumb for not figuring this out immediately). The error message is: > > segfault at ff600400 ip ff600400 sp

Re: [RFC PATCH v0 1/2] net: bridge: propagate FDB table into hardware

2012-02-16 Thread Shradha Shah
Hello, Please find my comments inline. Regards, Shradha Shah On 02/16/2012 03:58 AM, Ben Hutchings wrote: > [I'm just catching up with this after getting my own driver changes into > shape.] > > On Fri, 2012-02-10 at 10:18 -0500, jamal wrote: >> Hi John, >> >> I went backwards to summarize at t

Re: [Qemu-devel] [RFC] Next gen kvm api

2012-02-16 Thread Avi Kivity
On 02/15/2012 04:08 PM, Alexander Graf wrote: > > > > Well, the scatter/gather registers I proposed will give you just one > > register or all of them. > > One register is hardly any use. We either need all ways of a respective > address to do a full fledged lookup or all of them. I should have

Re: [Qemu-devel] [RFC] Next gen kvm api

2012-02-16 Thread Avi Kivity
On 02/16/2012 03:04 AM, Michael Ellerman wrote: > > > > ioctl is good for hardware devices and stuff that you want to enumerate > > and/or control permissions on. For something like KVM that is really a > > core kernel service, a syscall makes much more sense. > > Yeah maybe. That distinction is a

Re: [Qemu-devel] [RFC] Next gen kvm api

2012-02-16 Thread Alexander Graf
On 16.02.2012, at 20:24, Avi Kivity wrote: > On 02/15/2012 04:08 PM, Alexander Graf wrote: >>> >>> Well, the scatter/gather registers I proposed will give you just one >>> register or all of them. >> >> One register is hardly any use. We either need all ways of a respective >> address to do a

Re: [Qemu-devel] [RFC] Next gen kvm api

2012-02-16 Thread Avi Kivity
On 02/16/2012 04:46 PM, Anthony Liguori wrote: >> What will it buy us? Surely not speed. Entering a guest is not much >> (if at all) faster than exiting to userspace and any non trivial >> operation will require exit to userspace anyway, > > > You can emulate the PIT/RTC entirely within the guest u

Re: [Qemu-devel] [RFC] Next gen kvm api

2012-02-16 Thread Avi Kivity
On 02/16/2012 09:34 PM, Alexander Graf wrote: > On 16.02.2012, at 20:24, Avi Kivity wrote: > > > On 02/15/2012 04:08 PM, Alexander Graf wrote: > >>> > >>> Well, the scatter/gather registers I proposed will give you just one > >>> register or all of them. > >> > >> One register is hardly any use.

[PATCH 1/4 V14] Add flag to indicate that a vm was stopped by the host

2012-02-16 Thread Eric B Munson
This flag will be used to check if the vm was stopped by the host when a soft lockup was detected. The host will set the flag when it stops the guest. On resume, the guest will check this flag if a soft lockup is detected and skip issuing the warning. Signed-off-by: Eric B Munson Cc: mi...@redh

[PATCH 0/4 V14] Avoid soft lockup message when KVM is stopped by host

2012-02-16 Thread Eric B Munson
Changes from V13: Expand on KVM_KVMCLOCK_CTRL ioctl documentation Changes from V12: Re-add missing kvm.c code after rebase Rename CAP to KVM_CAP_KVMCLOCK_CTRL Rename ioctl to KVM_KVMCLOCK_CTRL Changes from V11: Re-add asm-generic stub Correct api.txt typo add kvm_make_request() call after setting

[PATCH 3/4 V13] Add ioctl for KVM_KVMCLOCK_CTRL

2012-02-16 Thread Eric B Munson
Now that we have a flag that will tell the guest it was suspended, create an interface for that communication using a KVM ioctl. Signed-off-by: Eric B Munson Cc: mi...@redhat.com Cc: h...@zytor.com Cc: ry...@linux.vnet.ibm.com Cc: aligu...@us.ibm.com Cc: mtosa...@redhat.com Cc: kvm@vger.kernel.o

[PATCH 4/4 V14] Add check for suspended vm in softlockup detector

2012-02-16 Thread Eric B Munson
A suspended VM can cause spurious soft lockup warnings. To avoid these, the watchdog now checks if the kernel knows it was stopped by the host and skips the warning if so. When the watchdog is reset successfully, clear the guest paused flag. Signed-off-by: Eric B Munson Cc: mi...@redhat.com Cc:

[PATCH 2/4 V14] Add functions to check if the host has stopped the vm

2012-02-16 Thread Eric B Munson
When a host stops or suspends a VM it will set a flag to show this. The watchdog will use these functions to determine if a softlockup is real, or the result of a suspended VM. Signed-off-by: Eric B Munson asm-generic changes Acked-by: Arnd Bergmann Cc: mi...@redhat.com Cc: h...@zytor.com Cc: r

Re: [PATCH 3/4 V13] Add ioctl for KVM_KVMCLOCK_CTRL

2012-02-16 Thread Eric B Munson
On Thu, 16 Feb 2012, Eric B Munson wrote: > Now that we have a flag that will tell the guest it was suspended, create an > interface for that communication using a KVM ioctl. > > Signed-off-by: Eric B Munson Sorry, this is actually V14. signature.asc Description: Digital signature

Re: [Qemu-devel] [RFC] Next gen kvm api

2012-02-16 Thread Scott Wood
On 02/16/2012 01:38 PM, Avi Kivity wrote: > On 02/16/2012 09:34 PM, Alexander Graf wrote: >> On 16.02.2012, at 20:24, Avi Kivity wrote: >> >>> On 02/15/2012 04:08 PM, Alexander Graf wrote: > > Well, the scatter/gather registers I proposed will give you just one > register or all of them

[Bug 42779] KVM domain hangs after loading initrd with Xenomai kernel

2012-02-16 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=42779 --- Comment #19 from madenginee...@gmail.com 2012-02-16 22:01:38 --- Doesn't seem to help. I used -cpu core2duo,-3dnow (since core2duo is the name that libvirt, my usual launcher for qemu, has been using), failed on the same movq. Also tried -

Re: [Qemu-devel] [RFC] Next gen kvm api

2012-02-16 Thread Michael Ellerman
On Thu, 2012-02-16 at 21:28 +0200, Avi Kivity wrote: > On 02/16/2012 03:04 AM, Michael Ellerman wrote: > > > > > > ioctl is good for hardware devices and stuff that you want to enumerate > > > and/or control permissions on. For something like KVM that is really a > > > core kernel service, a sysca

Re: [Qemu-devel] [RFC] Next gen kvm api

2012-02-16 Thread Alexander Graf
On 16.02.2012, at 20:38, Avi Kivity wrote: > On 02/16/2012 09:34 PM, Alexander Graf wrote: >> On 16.02.2012, at 20:24, Avi Kivity wrote: >> >>> On 02/15/2012 04:08 PM, Alexander Graf wrote: > > Well, the scatter/gather registers I proposed will give you just one > register or all of

Re: [Qemu-devel] [RFC] Next gen kvm api

2012-02-16 Thread Alexander Graf
On 16.02.2012, at 21:41, Scott Wood wrote: > On 02/16/2012 01:38 PM, Avi Kivity wrote: >> On 02/16/2012 09:34 PM, Alexander Graf wrote: >>> On 16.02.2012, at 20:24, Avi Kivity wrote: >>> On 02/15/2012 04:08 PM, Alexander Graf wrote: >> >> Well, the scatter/gather registers I propos

RE: [PATCH v4 2/3] KVM: PPC: epapr: Add idle hcall support for host

2012-02-16 Thread Liu Yu-B13201
> -Original Message- > From: Alexander Graf [mailto:ag...@suse.de] > Sent: Thursday, February 16, 2012 6:20 PM > To: Liu Yu-B13201 > Cc: ; ; d...@ozlabs.org>; Wood Scott-B07421; Liu Yu-B13201 > Subject: Re: [PATCH v4 2/3] KVM: PPC: epapr: Add idle hcall support for > host > > > > On 1

Re: [PATCH v4 2/3] KVM: PPC: epapr: Add idle hcall support for host

2012-02-16 Thread Alexander Graf
On 17.02.2012, at 03:13, Liu Yu-B13201 wrote: > > >> -Original Message- >> From: Alexander Graf [mailto:ag...@suse.de] >> Sent: Thursday, February 16, 2012 6:20 PM >> To: Liu Yu-B13201 >> Cc: ; ; > d...@ozlabs.org>; Wood Scott-B07421; Liu Yu-B13201 >> Subject: Re: [PATCH v4 2/3] KVM: PP

Re: KVM: perf: a smart tool to analyse kvm events

2012-02-16 Thread Xiao Guangrong
On 02/16/2012 11:52 PM, Pradeep Kumar wrote: > Xiao, > > i tried your perf events patch set on RHEL 6.1 host and failed to trace > kvm-events with below error message. > > [root@kvm perf]# ./perf kvm-events report > Warning: unknown op '{' > Warning: Error: expected type 5 but read 1 >

Re: [PATCH 1/2] KVM: mmu_notifier: Flush TLBs before releasing mmu_lock

2012-02-16 Thread Xiao Guangrong
On 02/16/2012 07:57 PM, Avi Kivity wrote: > Suppose at point A another thread executes defer_remote_flush(), > commit_remote_flush(), and defer_remote_flush() again. This brings the > balue of tlbs_dirty back to 1 again, with the tlbs dirty. The cmpxchg() > then resets tlbs_dirty, leaving the a

kvm + raid1 showstopper bug

2012-02-16 Thread Pete Ashdown
I've been waiting for some response from the Ubuntu team regarding a bug on launchpad, but it appears that it isn't being taken seriously: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/745785 We are running Ubuntu Natty 11.04 with KVM with our storage on RAID10 + drbd. While we were runnin

buildbot failure in kvm on next-s390

2012-02-16 Thread kvm
The Buildbot has detected a new failure on builder next-s390 while building kvm. Full details are available at: http://buildbot.b1-systems.de/kvm/builders/next-s390/builds/447 Buildbot URL: http://buildbot.b1-systems.de/kvm/ Buildslave for this Build: b1_kvm_1 Build Reason: The Nightly schedule

buildbot failure in kvm on next-ppc64

2012-02-16 Thread kvm
The Buildbot has detected a new failure on builder next-ppc64 while building kvm. Full details are available at: http://buildbot.b1-systems.de/kvm/builders/next-ppc64/builds/446 Buildbot URL: http://buildbot.b1-systems.de/kvm/ Buildslave for this Build: b1_kvm_1 Build Reason: The Nightly sched

buildbot failure in kvm on next-ppc44x

2012-02-16 Thread kvm
The Buildbot has detected a new failure on builder next-ppc44x while building kvm. Full details are available at: http://buildbot.b1-systems.de/kvm/builders/next-ppc44x/builds/445 Buildbot URL: http://buildbot.b1-systems.de/kvm/ Buildslave for this Build: b1_kvm_1 Build Reason: The Nightly sch

buildbot failure in kvm on next-x86_64

2012-02-16 Thread kvm
The Buildbot has detected a new failure on builder next-x86_64 while building kvm. Full details are available at: http://buildbot.b1-systems.de/kvm/builders/next-x86_64/builds/445 Buildbot URL: http://buildbot.b1-systems.de/kvm/ Buildslave for this Build: b1_kvm_1 Build Reason: The Nightly sch

[PATCH] KVM: Avoid zapping unrelated shadows in __kvm_set_memory_region()

2012-02-16 Thread Takuya Yoshikawa
We do not need to zap all shadow pages of the guest when we create or destroy a slot in this function. To change this, we make kvm_mmu_zap_all()/kvm_arch_flush_shadow() zap only those which have mappings into a given slot. Furthermore, the condition to see if we have any mmio sptes to clear is ch