Re: [PATCH] VMX: Fix and improve guest state validity checks

2010-05-13 Thread Avi Kivity
On 05/11/2010 07:52 PM, Mohammed Gamal wrote: - Add 's' and 'g' field checks on segment registers - Correct SS checks for request and descriptor privilege levels Signed-off-by: Mohammed Gamalm.gamal...@gmail.com --- arch/x86/kvm/vmx.c | 73 +++

Re: [Qemu-devel] Re: Another SIGFPE in display code, now in cirrus

2010-05-13 Thread Avi Kivity
On 05/12/2010 09:11 PM, Stefano Stabellini wrote: On Wed, 12 May 2010, Jamie Lokier wrote: Stefano Stabellini wrote: On Wed, 12 May 2010, Avi Kivity wrote: It's useful if you have a one-line horizontal pattern you want to propagate all over. It might be useful

Re: Another SIGFPE in display code, now in cirrus

2010-05-13 Thread Paolo Bonzini
On 05/12/2010 05:57 PM, Stefano Stabellini wrote: I guess even a src blt pitch of 0 could be useful there, however in practice I think the only rop function that was written with this case in mind has: dstpitch -= bltwidth; srcpitch -= bltwidth; if (dstpitch 0 || srcpitch 0) { /* is 0

[GIT PULL] last minute vhost-net fix

2010-05-13 Thread Michael S. Tsirkin
David, if it's not too late, please pull the following last minute fix into 2.6.34. Thanks! The following changes since commit de02d72bb3cc5b3d4c873db4ca8291723dd48479: Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-2.6 (2010-05-10 22:53:41 -0700)

Re: [PATCH 2/2] pci: allow sysfs file owner to read device dependent config space

2010-05-13 Thread Alan Cox
On Wed, 12 May 2010 18:29:57 -0700 Chris Wright chr...@sous-sol.org wrote: The PCI config space bin_attr read handler has a hardcoded CAP_SYS_ADMIN check to verify privileges before allowing a user to read device dependent config space. This is meant to protect from an unprivileged user

Re: [PATCH 2/2] pci: allow sysfs file owner to read device dependent config space

2010-05-13 Thread Avi Kivity
On 05/13/2010 04:29 AM, Chris Wright wrote: The PCI config space bin_attr read handler has a hardcoded CAP_SYS_ADMIN check to verify privileges before allowing a user to read device dependent config space. This is meant to protect from an unprivileged user potentially locking up the box. When

Re: [RFC][PATCH RFC 10/12] KVM: move dirty bitmaps to user space

2010-05-13 Thread Takuya Yoshikawa
mark_page_dirty is called with the mmu_lock spinlock held in set_spte. Must find a way to move it outside of the spinlock section. Oh, it's a serious problem. I have to consider it. Avi, Marcelo, Sorry but I have to say that mmu_lock spin_lock problem was completely out of my mind.

Re: [PATCH 2/2] pci: allow sysfs file owner to read device dependent config space

2010-05-13 Thread Daniel P. Berrange
On Thu, May 13, 2010 at 01:56:53PM +0300, Avi Kivity wrote: On 05/13/2010 04:29 AM, Chris Wright wrote: The PCI config space bin_attr read handler has a hardcoded CAP_SYS_ADMIN check to verify privileges before allowing a user to read device dependent config space. This is meant to protect

[PATCH 2/7] KVM: x86: Add missing locking to arch specific vcpu ioctls

2010-05-13 Thread Avi Kivity
Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/x86.c |6 ++ 1 files changed, 6 insertions(+), 0 deletions(-) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 4b1433f..f54ec24 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -1844,6 +1844,7 @@ static int

[PATCH 1/7] KVM: PPC: Add missing vcpu_load()/vcpu_put() in vcpu ioctls

2010-05-13 Thread Avi Kivity
Signed-off-by: Avi Kivity a...@redhat.com --- arch/powerpc/kvm/book3s.c | 10 ++ arch/powerpc/kvm/booke.c | 15 ++- 2 files changed, 24 insertions(+), 1 deletions(-) diff --git a/arch/powerpc/kvm/book3s.c b/arch/powerpc/kvm/book3s.c index 11f226f..b998abf 100644 ---

[PATCH 4/7] KVM: x86: Lock arch specific vcpu ioctls centrally

2010-05-13 Thread Avi Kivity
Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/x86.c | 41 ++--- 1 files changed, 2 insertions(+), 39 deletions(-) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index eedb23b..8b9e5ec 100644 --- a/arch/x86/kvm/x86.c +++

[PATCH 0/7] Consolidate vcpu ioctl locking

2010-05-13 Thread Avi Kivity
Avi Kivity (7): KVM: PPC: Add missing vcpu_load()/vcpu_put() in vcpu ioctls KVM: x86: Add missing locking to arch specific vcpu ioctls KVM: move vcpu locking to dispatcher for generic vcpu ioctls KVM: x86: Lock arch specific vcpu ioctls centrally KVM: s390: Centrally lock arch specific

[PATCH 6/7] KVM: PPC: Centralize locking of arch specific vcpu ioctls

2010-05-13 Thread Avi Kivity
Signed-off-by: Avi Kivity a...@redhat.com --- arch/powerpc/kvm/powerpc.c | 12 1 files changed, 8 insertions(+), 4 deletions(-) diff --git a/arch/powerpc/kvm/powerpc.c b/arch/powerpc/kvm/powerpc.c index e0fae7a..caeed7b 100644 --- a/arch/powerpc/kvm/powerpc.c +++

[PATCH 3/7] KVM: move vcpu locking to dispatcher for generic vcpu ioctls

2010-05-13 Thread Avi Kivity
All vcpu ioctls need to be locked, so instead of locking each one specifically we lock at the generic dispatcher. This patch only updates generic ioctls and leaves arch specific ioctls alone. Signed-off-by: Avi Kivity a...@redhat.com --- arch/ia64/kvm/kvm-ia64.c | 11 ---

[PATCH 5/7] KVM: s390: Centrally lock arch specific vcpu ioctls

2010-05-13 Thread Avi Kivity
Signed-off-by: Avi Kivity a...@redhat.com --- arch/s390/kvm/kvm-s390.c | 40 +--- 1 files changed, 17 insertions(+), 23 deletions(-) diff --git a/arch/s390/kvm/kvm-s390.c b/arch/s390/kvm/kvm-s390.c index e80f55e..28cd8fd 100644 --- a/arch/s390/kvm/kvm-s390.c

[PATCH 7/7] KVM: Consolidate arch specific vcpu ioctl locking

2010-05-13 Thread Avi Kivity
Now that all arch specific ioctls have centralized locking, it is easy to move it to the central dispatcher. Signed-off-by: Avi Kivity a...@redhat.com --- arch/powerpc/kvm/powerpc.c | 11 --- arch/s390/kvm/kvm-s390.c | 13 ++--- arch/x86/kvm/x86.c |2 --

Re: [PATCH 0/7] Consolidate vcpu ioctl locking

2010-05-13 Thread Alexander Graf
On 13.05.2010, at 13:17, Avi Kivity wrote: Avi Kivity (7): KVM: PPC: Add missing vcpu_load()/vcpu_put() in vcpu ioctls KVM: x86: Add missing locking to arch specific vcpu ioctls KVM: move vcpu locking to dispatcher for generic vcpu ioctls KVM: x86: Lock arch specific vcpu ioctls

Re: [PATCH 0/7] Consolidate vcpu ioctl locking

2010-05-13 Thread Avi Kivity
On 05/13/2010 02:57 PM, Alexander Graf wrote: Mind to give a high level overview on where you're moving which locks? Um, looks like I forgot to fill in the patchset header. Sorry. The patches move all vcpu ioctl locking from the individual ioctl handlers (e.g.

Re: [PATCH 0/7] Consolidate vcpu ioctl locking

2010-05-13 Thread Avi Kivity
On 05/13/2010 03:03 PM, Avi Kivity wrote: On 05/13/2010 03:01 PM, Avi Kivity wrote: On 05/13/2010 02:57 PM, Alexander Graf wrote: Mind to give a high level overview on where you're moving which locks? Um, looks like I forgot to fill in the patchset header. Sorry. Gar, I actually wrote

Re: [PATCH 0/7] Consolidate vcpu ioctl locking

2010-05-13 Thread Alexander Graf
On 13.05.2010, at 14:03, Avi Kivity wrote: On 05/13/2010 03:03 PM, Avi Kivity wrote: On 05/13/2010 03:01 PM, Avi Kivity wrote: On 05/13/2010 02:57 PM, Alexander Graf wrote: Mind to give a high level overview on where you're moving which locks? Um, looks like I forgot to fill in the

Re: [PATCH 0/7] Consolidate vcpu ioctl locking

2010-05-13 Thread Avi Kivity
On 05/13/2010 03:18 PM, Alexander Graf wrote: [PATCH 0/7] Consolidate vcpu ioctl locking In general, all vcpu ioctls need to take the vcpu mutex, but each one does it (or not) individually. This is cumbersome and error prone. This patchset moves all locking to a central place. This is

KVM and the OOM-Killer

2010-05-13 Thread James Stevens
This is *NOT* a KVM issue, but may be worth adding into the FAQ... We have a KVM host with 48Gb of RAM and run about 20 KVM clients on it. After some time - different time depending on the kernel version - the VM host kernel will start OOM-Killing the VM clients, even when there is lots of

Re: KVM and the OOM-Killer

2010-05-13 Thread Avi Kivity
On 05/13/2010 03:20 PM, James Stevens wrote: This is *NOT* a KVM issue, but may be worth adding into the FAQ... We have a KVM host with 48Gb of RAM and run about 20 KVM clients on it. After some time - different time depending on the kernel version - the VM host kernel will start OOM-Killing

Re: KVM and the OOM-Killer

2010-05-13 Thread James Stevens
I'd go with 64-bit at 2GB and above. It's both faster and safer. safer, how? (apart from no lowmem exhaust). On a different subject, the qemu documentation says a guest VM can only have 2Gb of memory - does this still apply when using a 64bit host O/S ? The lowmem load is about 0.5% of

Re: KVM and the OOM-Killer

2010-05-13 Thread Johannes Stezenbach
On Thu, May 13, 2010 at 03:39:20PM +0300, Avi Kivity wrote: On 05/13/2010 03:20 PM, James Stevens wrote: General advice seems to be, if you have more than 16Gb RAM then you should run the VM host 64bit. We didn't see this issue on a server with 32Gb running the same set of VMs. I'd

Re: [Qemu-devel] [RFC PATCH 0/2] Sheepdog: distributed storage system for QEMU

2010-05-13 Thread MORITA Kazutaka
At Thu, 13 May 2010 04:46:46 +0900, MORITA Kazutaka wrote: On 2010/05/12 20:38, Kevin Wolf wrote: I'll have a closer look at your code later, but one thing I noticed is that the new block driver is something in between a protocol and a format driver (just like vvfat, which should stop

Re: KVM and the OOM-Killer

2010-05-13 Thread Avi Kivity
On 05/13/2010 04:39 PM, James Stevens wrote: I'd go with 64-bit at 2GB and above. It's both faster and safer. safer, how? (apart from no lowmem exhaust). Nothing apart from that (well, if you run nonpae you lose NX protection). On a different subject, the qemu documentation says a guest

Re: [Qemu-devel] Re: Another SIGFPE in display code, now in cirrus

2010-05-13 Thread Michael Tokarev
Stefano Stabellini wrote: [] diff --git a/hw/cirrus_vga.c b/hw/cirrus_vga.c index 9f61a01..81c443b 100644 --- a/hw/cirrus_vga.c +++ b/hw/cirrus_vga.c The same as with previous patch: Yellow screen (instead of crashing), and two lines on the stderr: BUG: kvm_dirty_pages_log_enable_slot:

Wiki docs on counting and tracing KVM perf events

2010-05-13 Thread Stefan Hajnoczi
How to count and trace KVM perf events: http://www.linux-kvm.org/page/Perf_events I want to draw attention to this because traditional kvm_stat and kvm_trace use has been moving over to the debugfs based tracing mechanisms. Perhaps we can flesh out documentation and examples of common perf

Re: [PATCH 2/2] pci: allow sysfs file owner to read device dependent config space

2010-05-13 Thread Chris Wright
* Alan Cox (a...@lxorguk.ukuu.org.uk) wrote: On Wed, 12 May 2010 18:29:57 -0700 Chris Wright chr...@sous-sol.org wrote: The PCI config space bin_attr read handler has a hardcoded CAP_SYS_ADMIN check to verify privileges before allowing a user to read device dependent config space. This

Re: [Qemu-devel] Re: Another SIGFPE in display code, now in cirrus

2010-05-13 Thread Jamie Lokier
Stefano Stabellini wrote: I think we need to consider only dstpitch for a full invalidate. We might be copying an offscreen bitmap into the screen, and srcpitch is likely to be the bitmap width instead of the screen pitch. Agreed. Even when copying on-screen (or partially on-screen),

Re: [SeaBIOS] [PATCHv2] Support for booting from virtio disks

2010-05-13 Thread Avi Kivity
On 05/10/2010 06:58 PM, Anthony Liguori wrote: Isn't this problem unrelated to this patch? I mean if I start qemu with two ide devices can I specify from qemu command line which one I want to boot from? That's sort of what I'm asking. If you compare this approach to extboot, extboot

Prevent IRQ sharing for PCI passthrough

2010-05-13 Thread Dirk Gouders
Hello List, please don't shout at me if the answer to my question is too obvious, but in the German Linux Magazine I read an article about passing PCI devices to KVM guests and the authors said that shared interrupt funcionality has to be disabled which I read as it is possible to disable shared

Re: Prevent IRQ sharing for PCI passthrough

2010-05-13 Thread Avi Kivity
On 05/13/2010 07:57 PM, Dirk Gouders wrote: Hello List, please don't shout at me if the answer to my question is too obvious, We won't shout at you. but in the German Linux Magazine I read an article about passing PCI devices to KVM guests and the authors said that shared interrupt

Re: Prevent IRQ sharing for PCI passthrough

2010-05-13 Thread Chris Wright
* Avi Kivity (a...@redhat.com) wrote: On 05/13/2010 07:57 PM, Dirk Gouders wrote: Hello List, please don't shout at me if the answer to my question is too obvious, We won't shout at you. but in the German Linux Magazine I read an article about passing PCI devices to KVM guests and the

[PATCH 2/2 v2] pci: check caps from sysfs file open to read device dependent config space

2010-05-13 Thread Chris Wright
* Alan Cox (a...@lxorguk.ukuu.org.uk) wrote: I agree with the problem - but IMHO the fix is to require opening the file checks CAP_SYS_something instead: not to hack the read method and make it even weirder and more un-Linux than it is now. This patch does that. Not as convenient from the

Re: [Qemu-devel] Re: Another SIGFPE in display code, now in cirrus

2010-05-13 Thread Stefano Stabellini
On Thu, 13 May 2010, Michael Tokarev wrote: Stefano Stabellini wrote: [] diff --git a/hw/cirrus_vga.c b/hw/cirrus_vga.c index 9f61a01..81c443b 100644 --- a/hw/cirrus_vga.c +++ b/hw/cirrus_vga.c The same as with previous patch: Yellow screen (instead of crashing), and two lines on the

Re: KVM and the OOM-Killer

2010-05-13 Thread David S. Ahern
Not sure I like the idea of running a 64bit user space kernel on top of a 32bit host, prefer to re-install. Can I just replace my kernel with a 64bit one, or do I have to re-install the host O/S ? You can run 32-bit userspace with a 64-bit kernel, or reinstall, whichever you prefer. I

Re: [PATCH 2/2 v2] pci: check caps from sysfs file open to read device dependent config space

2010-05-13 Thread Greg KH
On Thu, May 13, 2010 at 10:43:07AM -0700, Chris Wright wrote: * Alan Cox (a...@lxorguk.ukuu.org.uk) wrote: I agree with the problem - but IMHO the fix is to require opening the file checks CAP_SYS_something instead: not to hack the read method and make it even weirder and more un-Linux than

Re: [PATCH 2/2 v2] pci: check caps from sysfs file open to read device dependent config space

2010-05-13 Thread Chris Wright
* Greg KH (g...@kroah.com) wrote: On Thu, May 13, 2010 at 10:43:07AM -0700, Chris Wright wrote: * Alan Cox (a...@lxorguk.ukuu.org.uk) wrote: I agree with the problem - but IMHO the fix is to require opening the file checks CAP_SYS_something instead: not to hack the read method and make it

Re: [PATCH 0/7] Consolidate vcpu ioctl locking

2010-05-13 Thread Alexander Graf
Am 13.05.2010 um 14:29 schrieb Avi Kivity a...@redhat.com: On 05/13/2010 03:18 PM, Alexander Graf wrote: [PATCH 0/7] Consolidate vcpu ioctl locking In general, all vcpu ioctls need to take the vcpu mutex, but each one does it (or not) individually. This is cumbersome and error prone.

[PATCH net-next] ixgbevf: Enable GRO by default

2010-05-13 Thread Shirley Ma
Enable GRO by default for performance. Signed-off-by: Shirley Ma x...@us.ibm.com --- drivers/net/ixgbevf/ixgbevf_main.c |1 + 1 files changed, 1 insertions(+), 0 deletions(-) diff --git a/drivers/net/ixgbevf/ixgbevf_main.c b/drivers/net/ixgbevf/ixgbevf_main.c index 40f47b8..1bbb05e

Re: network between host and guest

2010-05-13 Thread Thanasis
on 05/13/2010 10:48 PM dry...@sky-haven.net wrote the following: Ar 10.05.10 10:46, scríobh Thanasis: I have installed kvm (app-emulation/qemu-kvm-0.12.3-r1) on linux (a laptop with gentoo linux) and MS Windows 7 as guest. Here is what info I get about the network on each one: 1) on linux

Re: [PATCH 1/2] x86 emulator: Add missing decoder flags for sub instruction

2010-05-13 Thread Marcelo Tosatti
On Wed, May 12, 2010 at 01:39:21AM +0300, Mohammed Gamal wrote: This adds missing decoder flags for sub instructions (opcodes 0x2c - 0x2d) Signed-off-by: Mohammed Gamal m.gamal...@gmail.com --- arch/x86/kvm/emulate.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) Applied

[GIT PULL] KVM updates for 2.6.34-rc7

2010-05-13 Thread Marcelo Tosatti
Linus, please pull from git://git.kernel.org/pub/scm/virt/kvm/kvm.git kvm-updates/2.6.34 To receive the following updates: Dongxiao Xu (1): KVM: x86: Call vcpu_load and vcpu_put in cpuid_update Jan Kiszka (1): KVM: VMX: blocked-by-sti must not defer NMI injections Joerg Roedel

Re: [PATCH] VMX: Fix and improve guest state validity checks

2010-05-13 Thread Mohammed Gamal
On Thu, May 13, 2010 at 9:24 AM, Avi Kivity a...@redhat.com wrote: On 05/11/2010 07:52 PM, Mohammed Gamal wrote: - Add 's' and 'g' field checks on segment registers - Correct SS checks for request and descriptor privilege levels Signed-off-by: Mohammed Gamalm.gamal...@gmail.com ---  

Re: [PATCH 1/2] x86 emulator: Add missing decoder flags for sub instruction

2010-05-13 Thread Mohammed Gamal
On Thu, May 13, 2010 at 9:50 PM, Marcelo Tosatti mtosa...@redhat.com wrote: On Wed, May 12, 2010 at 01:39:21AM +0300, Mohammed Gamal wrote: This adds missing decoder flags for sub instructions (opcodes 0x2c - 0x2d) Signed-off-by: Mohammed Gamal m.gamal...@gmail.com ---  

Re: [PATCH v5 4/5] Inter-VM shared memory PCI device

2010-05-13 Thread Cam Macdonell
On Mon, May 10, 2010 at 5:59 AM, Avi Kivity a...@redhat.com wrote: On 04/21/2010 08:53 PM, Cam Macdonell wrote: + +        /* allocate/initialize space for interrupt handling */ +        s-eventfds = qemu_mallocz(s-nr_alloc_guests * sizeof(int *)); +        s-eventfd_table =

[QEMU-KVM]: Megasas + TCM_Loop + SG_IO into Windows XP guests

2010-05-13 Thread Nicholas A. Bellinger
Greetings Hannes and co, I have been spending a bit of time trying Megasas HBA emulation + TCM_Loop + SG_IO with a Windows XP SP2 KVM guests.. So far, I noticed that hw/scsi-generic.c:execute_command_run() using bdev_aio_ioctl() appears to be broken for XP guests, which causes the first 36-byte

Re: [PATCH -v2] KVM, Fix QEMU-KVM is killed by guest SRAO MCE

2010-05-13 Thread Marcelo Tosatti
On Wed, May 12, 2010 at 02:44:03PM +0800, Huang Ying wrote: In common cases, guest SRAO MCE will cause corresponding poisoned page be un-mapped and SIGBUS be sent to QEMU-KVM, then QEMU-KVM will relay the MCE to guest OS. But it is reported that if the poisoned page is accessed in guest

Re: pci device passthrough: Failed to assign irq

2010-05-13 Thread Gerd v. Egidy
I'm trying to pass a pcie-device into a kvm guest. qemu-kvm is started by libvirt with this command: [...] Failed to assign irq for hostdev0: Operation not permitted Perhaps you are assigning a device that shares an IRQ with another device? Found out what was causing the issue: Current

Re: [PATCH] kvm: remove CAP_SYS_RAWIO requirement from kvm_vm_ioctl_assign_irq

2010-05-13 Thread Chris Wright
* Alex Williamson (alex.william...@redhat.com) wrote: Remove this check in an effort to allow kvm guests to run without root privileges. This capability check doesn't seem to add any security since the device needs to have already been added via the assign device ioctl and the io actually

Re: [PATCH net-next] ixgbevf: Enable GRO by default

2010-05-13 Thread Jeff Kirsher
On Thu, May 13, 2010 at 12:51, Shirley Ma mashi...@us.ibm.com wrote: Enable GRO by default for performance. Signed-off-by: Shirley Ma x...@us.ibm.com ---  drivers/net/ixgbevf/ixgbevf_main.c |    1 +  1 files changed, 1 insertions(+), 0 deletions(-) diff --git

Re: [PATCH] kvm: remove CAP_SYS_RAWIO requirement from kvm_vm_ioctl_assign_irq

2010-05-13 Thread Alex Williamson
On Thu, 2010-05-13 at 15:06 -0700, Chris Wright wrote: * Alex Williamson (alex.william...@redhat.com) wrote: Remove this check in an effort to allow kvm guests to run without root privileges. This capability check doesn't seem to add any security since the device needs to have already been

Re: [PATCH -v2] KVM, Fix QEMU-KVM is killed by guest SRAO MCE

2010-05-13 Thread Huang Ying
On Fri, 2010-05-14 at 05:43 +0800, Marcelo Tosatti wrote: On Wed, May 12, 2010 at 02:44:03PM +0800, Huang Ying wrote: @@ -1975,6 +1976,27 @@ static int __direct_map(struct kvm_vcpu return pt_write; } +static void kvm_send_hwpoison_signal(struct kvm *kvm, gfn_t gfn) +{ +

[PATCH 2/3] x86: Export FPU API for KVM use

2010-05-13 Thread Sheng Yang
Also add some more constants. Signed-off-by: Sheng Yang sh...@linux.intel.com --- Do we need to rename task_xstate_cachep? It's not only for task struct now. arch/x86/include/asm/i387.h |2 ++ arch/x86/include/asm/xsave.h |3 +++ arch/x86/kernel/i387.c |3 ++-

[PATCH 1/3] x86: Split fpu_save_init() to fpu_save() and fpu_clear()

2010-05-13 Thread Sheng Yang
fpu_save() would be used later by KVM. Signed-off-by: Sheng Yang sh...@linux.intel.com --- arch/x86/include/asm/i387.h | 71 ++- 1 files changed, 43 insertions(+), 28 deletions(-) diff --git a/arch/x86/include/asm/i387.h b/arch/x86/include/asm/i387.h

[PATCH 0/3] Convert KVM to use FPU API

2010-05-13 Thread Sheng Yang
This patchset based on Avi's FPU API patchset. Sheng Yang (3): x86: Split fpu_save_init() to fpu_save() and fpu_clear() x86: Export FPU API for KVM use KVM: x86: Use FPU API arch/x86/include/asm/i387.h | 73 --- arch/x86/include/asm/kvm_host.h |

[PATCH 3/3] KVM: x86: Use FPU API

2010-05-13 Thread Sheng Yang
Convert KVM to use generic FPU API. Signed-off-by: Sheng Yang sh...@linux.intel.com --- arch/x86/include/asm/kvm_host.h | 18 +- arch/x86/kvm/x86.c | 73 --- 2 files changed, 23 insertions(+), 68 deletions(-) diff --git

[PATCH 2/7] KVM: x86: Add missing locking to arch specific vcpu ioctls

2010-05-13 Thread Avi Kivity
Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/x86.c |6 ++ 1 files changed, 6 insertions(+), 0 deletions(-) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 4b1433f..f54ec24 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -1844,6 +1844,7 @@ static int

[PATCH 5/7] KVM: s390: Centrally lock arch specific vcpu ioctls

2010-05-13 Thread Avi Kivity
Signed-off-by: Avi Kivity a...@redhat.com --- arch/s390/kvm/kvm-s390.c | 40 +--- 1 files changed, 17 insertions(+), 23 deletions(-) diff --git a/arch/s390/kvm/kvm-s390.c b/arch/s390/kvm/kvm-s390.c index e80f55e..28cd8fd 100644 --- a/arch/s390/kvm/kvm-s390.c

[PATCH 7/7] KVM: Consolidate arch specific vcpu ioctl locking

2010-05-13 Thread Avi Kivity
Now that all arch specific ioctls have centralized locking, it is easy to move it to the central dispatcher. Signed-off-by: Avi Kivity a...@redhat.com --- arch/powerpc/kvm/powerpc.c | 11 --- arch/s390/kvm/kvm-s390.c | 13 ++--- arch/x86/kvm/x86.c |2 --

Re: [RFC][PATCH 0/12] KVM, x86, ppc, asm-generic: moving dirty bitmaps to user space

2010-05-13 Thread Avi Kivity
On 05/10/2010 03:26 PM, Takuya Yoshikawa wrote: No doubt get.org - get.opt is measurable, but get.opt-switch.opt is problematic. Have you tried profiling to see where the time is spent (well I can guess, clearing the write access from the sptes). Sorry but no, and I agree with your guess.

Re: [PATCH 0/7] Consolidate vcpu ioctl locking

2010-05-13 Thread Avi Kivity
On 05/13/2010 02:57 PM, Alexander Graf wrote: Mind to give a high level overview on where you're moving which locks? Um, looks like I forgot to fill in the patchset header. Sorry. The patches move all vcpu ioctl locking from the individual ioctl handlers (e.g.