Re: [PATCH] kvm-kmod vma_kernel_pagesize compatability

2009-08-23 Thread Avi Kivity
On 08/22/2009 03:38 AM, Zachary Amsden wrote: Make vma_kernel_pagesize a kvm compat API; this fixes the build with new kernels synced to 2.6.31 compiling externally for older systems. Applied, thanks. Signed-off-by: Zachary Amsdenzams...@redhat.com diff --git

Re: [PATCH] introduce kvm64 CPU

2009-08-23 Thread Avi Kivity
On 08/22/2009 12:53 AM, Andre Przywara wrote: I think this is best left to management software, which has more information about the migration pool. I believe what we want is an automatic tool that will connect to a list of machines,and determine which qemu cpu type we should use. Doesn't

Re: [PATCH] introduce kvm64 CPU

2009-08-23 Thread Avi Kivity
On 08/22/2009 12:59 AM, Andre Przywara wrote: Typically users will want more specialized greatest common denomiator cpu types; if a site has standardized on recent hardware they will want the features of that hardware exposed. Sure, but this was not the purpose of this patch. Currently KVM

Re: [PATCHv3 3/4] qemu-kvm: vhost-net implementation

2009-08-23 Thread Avi Kivity
On 08/20/2009 08:57 PM, Mark McLoughlin wrote: - I think /dev/vhost makes more sense - we shouldn't need to add another character device if we implement kernel backends for other virtio devices I'm of the opposite opinion - vhost-net and vhost-blk are related, but they're a

Re: [PATCH] Fix sysenter migration issue on AMD CPUs

2009-08-23 Thread Avi Kivity
On 08/21/2009 02:58 PM, Andre Przywara wrote: To enable cross-vendor migration we use VMCB external variables to hold the full 64bit value of the SYSENTER MSRs, which get truncated to 32bit on AMD hardware. Since we didn't intercept these MSRs, these variables were only used in the emulation

[PATCH][RESEND] x86 emulator: Add 'push/pop sreg' instructions

2009-08-23 Thread Mohammed Gamal
Signed-off-by: Mohammed Gamal m.gamal...@gmail.com --- arch/x86/kvm/emulate.c | 107 +--- 1 files changed, 101 insertions(+), 6 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index 1be5cd6..283237f 100644 ---

[PATCH][RESEND] Add push/pop instructions test in test harness

2009-08-23 Thread Mohammed Gamal
Signed-off-by: Mohammed Gamal m.gamal...@gmail.com --- kvm/user/test/x86/realmode.c | 74 ++ 1 files changed, 74 insertions(+), 0 deletions(-) diff --git a/kvm/user/test/x86/realmode.c b/kvm/user/test/x86/realmode.c index 755b5d1..04c1452 100644 ---

[PATCH][RESEND] x86 emulator: Report unhandled instructions

2009-08-23 Thread Mohammed Gamal
Report unhandled instructions in the syslog on emulation failure Signed-off-by: Mohammed Gamal m.gamal...@gmail.com --- arch/x86/kvm/emulate.c |3 ++- 1 files changed, 2 insertions(+), 1 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index cc0fe39..52a4b7d 100644

Re: [PATCH] Move irq sharing information to irqchip level.

2009-08-23 Thread Avi Kivity
On 08/21/2009 09:16 PM, Gleb Natapov wrote: On Mon, Aug 17, 2009 at 12:35:47PM +0300, Avi Kivity wrote: On 08/13/2009 08:19 PM, Gleb Natapov wrote: This removes assumptions that max GSIs is smaller than number of pins. Sharing is tracked on pin level not GSI level. Signed-off-by:

Re: [PATCH] Move irq sharing information to irqchip level.

2009-08-23 Thread Avi Kivity
On 08/23/2009 02:36 PM, Gleb Natapov wrote: The problem is that at this level it is not known if GSI is MSI or not. Current code dials with this by arbitrary assuming that GSI is MSI if it is greater then KVM_IOAPIC_NUM_PINS, but this is not enforced when routing table is installed and

Re: [PATCH] Move irq sharing information to irqchip level.

2009-08-23 Thread Gleb Natapov
On Sun, Aug 23, 2009 at 02:46:38PM +0300, Avi Kivity wrote: On 08/23/2009 02:36 PM, Gleb Natapov wrote: The problem is that at this level it is not known if GSI is MSI or not. Current code dials with this by arbitrary assuming that GSI is MSI if it is greater then KVM_IOAPIC_NUM_PINS, but

[PATCH 43/46] KVM: MMU: make page walker aware of mapping levels

2009-08-23 Thread Avi Kivity
From: Joerg Roedel joerg.roe...@amd.com The page walker may be used with nested paging too when accessing mmio areas. Make it support the additional page-level too. [ Marcelo: fix reserved bit check for 1gb pte ] Signed-off-by: Joerg Roedel joerg.roe...@amd.com Signed-off-by: Marcelo Tosatti

[PATCH 11/46] KVM: MMU: Trace guest pagetable walker

2009-08-23 Thread Avi Kivity
Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/mmu.c |3 + arch/x86/kvm/mmutrace.h| 117 arch/x86/kvm/paging_tmpl.h | 11 +++- 3 files changed, 128 insertions(+), 3 deletions(-) create mode 100644 arch/x86/kvm/mmutrace.h

[PATCH 46/46] KVM: report 1GB page support to userspace

2009-08-23 Thread Avi Kivity
From: Joerg Roedel joerg.roe...@amd.com If userspace knows that the kernel part supports 1GB pages it can enable the corresponding cpuid bit so that guests actually use GB pages. Signed-off-by: Joerg Roedel joerg.roe...@amd.com Signed-off-by: Avi Kivity a...@redhat.com ---

[PATCH 42/46] KVM: MMU: make direct mapping paths aware of mapping levels

2009-08-23 Thread Avi Kivity
From: Joerg Roedel joerg.roe...@amd.com Signed-off-by: Joerg Roedel joerg.roe...@amd.com Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/include/asm/kvm_host.h |2 +- arch/x86/kvm/mmu.c | 83 +++ arch/x86/kvm/paging_tmpl.h |6

[PATCH 45/46] KVM: MMU: enable gbpages by increasing nr of pagesizes

2009-08-23 Thread Avi Kivity
From: Joerg Roedel joerg.roe...@amd.com Signed-off-by: Joerg Roedel joerg.roe...@amd.com Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/include/asm/kvm_host.h |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/arch/x86/include/asm/kvm_host.h

[PATCH 44/46] KVM: MMU: shadow support for 1gb pages

2009-08-23 Thread Avi Kivity
From: Joerg Roedel joerg.roe...@amd.com This patch adds support for shadow paging to the 1gb page table code in KVM. With this code the guest can use 1gb pages even if the host does not support them. [ Marcelo: fix shadow page collision on pmd level if a guest 1gb page is mapped with

[PATCH 34/46] KVM: PIT: Unregister ack notifier callback when freeing

2009-08-23 Thread Avi Kivity
From: Gleb Natapov g...@redhat.com Signed-off-by: Gleb Natapov g...@redhat.com Signed-off-by: Marcelo Tosatti mtosa...@redhat.com --- arch/x86/kvm/i8254.c |2 ++ 1 files changed, 2 insertions(+), 0 deletions(-) diff --git a/arch/x86/kvm/i8254.c b/arch/x86/kvm/i8254.c index 137e548..472653c

[PATCH 21/46] KVM: make io_bus interface more robust

2009-08-23 Thread Avi Kivity
From: Gregory Haskins ghask...@novell.com Today kvm_io_bus_regsiter_dev() returns void and will internally BUG_ON if it fails. We want to create dynamic MMIO/PIO entries driven from userspace later in the series, so we need to enhance the code to be more robust with the following changes: 1)

[PATCH 22/46] KVM: add ioeventfd support

2009-08-23 Thread Avi Kivity
From: Gregory Haskins ghask...@novell.com ioeventfd is a mechanism to register PIO/MMIO regions to trigger an eventfd signal when written to by a guest. Host userspace can register any arbitrary IO address with a corresponding eventfd and then pass the eventfd to a specific end-point of interest

[PATCH 37/46] KVM: Align cr8 threshold when userspace changes cr8

2009-08-23 Thread Avi Kivity
From: Mikhail Ershov arce...@gmail.com Commit f0a3602c20 (KVM: Move interrupt injection logic to x86.c) does not update the cr8 intercept if the lapic is disabled, so when userspace updates cr8, the cr8 threshold control is not updated and we are left with illegal control fields. Fix by

[PATCH 16/46] KVM: Add trace points in irqchip code

2009-08-23 Thread Avi Kivity
From: Gleb Natapov g...@redhat.com Add tracepoint in msi/ioapic/pic set_irq() functions, in IPI sending and in the point where IRQ is placed into apic's IRR. Signed-off-by: Gleb Natapov g...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/i8259.c |3 ++

[PATCH 32/46] KVM: x86: use kvm_get_gdt() and kvm_read_ldt()

2009-08-23 Thread Avi Kivity
From: Akinobu Mita akinobu.m...@gmail.com Use kvm_get_gdt() and kvm_read_ldt() to reduce inline assembly code. Cc: Avi Kivity a...@redhat.com Cc: kvm@vger.kernel.org Signed-off-by: Akinobu Mita akinobu.m...@gmail.com Signed-off-by: Marcelo Tosatti mtosa...@redhat.com --- arch/x86/kvm/svm.c |

[PATCH 31/46] KVM: x86: use get_desc_base() and get_desc_limit()

2009-08-23 Thread Avi Kivity
From: Akinobu Mita akinobu.m...@gmail.com Use get_desc_base() and get_desc_limit() to get the base address and limit in desc_struct. Cc: Avi Kivity a...@redhat.com Cc: kvm@vger.kernel.org Signed-off-by: Akinobu Mita akinobu.m...@gmail.com Signed-off-by: Marcelo Tosatti mtosa...@redhat.com ---

[PATCH 28/46] KVM: Discard unnecessary kvm_mmu_flush_tlb() in kvm_mmu_load()

2009-08-23 Thread Avi Kivity
From: Sheng Yang sh...@linux.intel.com set_cr3() should already cover the TLB flushing. Signed-off-by: Sheng Yang sh...@linux.intel.com Signed-off-by: Marcelo Tosatti mtosa...@redhat.com --- arch/x86/kvm/mmu.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git

[PATCH 38/46] KVM: limit lapic periodic timer frequency

2009-08-23 Thread Avi Kivity
From: Marcelo Tosatti mtosa...@redhat.com Otherwise its possible to starve the host by programming lapic timer with a very high frequency. Cc: sta...@kernel.org Signed-off-by: Marcelo Tosatti mtosa...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/lapic.c |9 +

[PATCH 35/46] KVM: Drop obsolete cpu_get/put in make_all_cpus_request

2009-08-23 Thread Avi Kivity
From: Jan Kiszka jan.kis...@siemens.com spin_lock disables preemption, so we can simply read the current cpu. Signed-off-by: Jan Kiszka jan.kis...@siemens.com Signed-off-by: Marcelo Tosatti mtosa...@redhat.com --- virt/kvm/kvm_main.c |3 +-- 1 files changed, 1 insertions(+), 2 deletions(-)

[PATCH 26/46] KVM: Reduce runnability interface with arch support code

2009-08-23 Thread Avi Kivity
From: Gleb Natapov g...@redhat.com Remove kvm_cpu_has_interrupt() and kvm_arch_interrupt_allowed() from interface between general code and arch code. kvm_arch_vcpu_runnable() checks for interrupts instead. Signed-off-by: Gleb Natapov g...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com ---

[PATCH 33/46] KVM: VMX: Introduce KVM_SET_IDENTITY_MAP_ADDR ioctl

2009-08-23 Thread Avi Kivity
From: Sheng Yang sh...@linux.intel.com Now KVM allow guest to modify guest's physical address of EPT's identity mapping page. (change from v1, discard unnecessary check, change ioctl to accept parameter address rather than value) Signed-off-by: Sheng Yang sh...@linux.intel.com Signed-off-by:

[PATCH 29/46] KVM: MMU: fix missing locking in alloc_mmu_pages

2009-08-23 Thread Avi Kivity
From: Marcelo Tosatti mtosa...@redhat.com n_requested_mmu_pages/n_free_mmu_pages are used by kvm_mmu_change_mmu_pages to calculate the number of pages to zap. alloc_mmu_pages, called from the vcpu initialization path, modifies this variables without proper locking, which can result in a negative

[PATCH 39/46] KVM: fix kvm_init() error handling

2009-08-23 Thread Avi Kivity
From: Xiao Guangrong xiaoguangr...@cn.fujitsu.com Remove debugfs file if kvm_arch_init() return error Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com Signed-off-by: Avi Kivity a...@redhat.com --- virt/kvm/kvm_main.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff

[PATCH 24/46] KVM: Move exception handling to the same place as other events

2009-08-23 Thread Avi Kivity
From: Gleb Natapov g...@redhat.com Signed-off-by: Gleb Natapov g...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/x86.c | 21 + 1 files changed, 9 insertions(+), 12 deletions(-) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index

[PATCH 36/46] KVM: VMX: Avoid to return ENOTSUPP to userland

2009-08-23 Thread Avi Kivity
From: Jan Kiszka jan.kis...@web.de Choose some allowed error values for the cases VMX returned ENOTSUPP so far as these values could be returned by the KVM_RUN IOCTL. Signed-off-by: Jan Kiszka jan.kis...@siemens.com Signed-off-by: Marcelo Tosatti mtosa...@redhat.com --- arch/x86/kvm/vmx.c |

[PATCH 25/46] KVM: Move kvm_cpu_get_interrupt() declaration to x86 code

2009-08-23 Thread Avi Kivity
From: Gleb Natapov g...@redhat.com It is implemented only by x86. Signed-off-by: Gleb Natapov g...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/include/asm/kvm_host.h |1 + include/linux/kvm_host.h|1 - 2 files changed, 1 insertions(+), 1 deletions(-) diff

Re: [PATCH] Move irq sharing information to irqchip level.

2009-08-23 Thread Avi Kivity
On 08/23/2009 02:56 PM, Gleb Natapov wrote: Does msi actually care about the states? I don't think it does. That is the point. MSI doesn't care, but we don't know if GSI is MSI or not. So we toggle the bits needlessly. Just like with edge-triggered interrupts. If we

[PATCH 07/46] KVM: Use temporary variable to shorten lines.

2009-08-23 Thread Avi Kivity
From: Gleb Natapov g...@redhat.com Cosmetic only. No logic is changed by this patch. Signed-off-by: Gleb Natapov g...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com --- virt/kvm/ioapic.c | 18 ++ 1 files changed, 10 insertions(+), 8 deletions(-) diff --git

[PATCH 12/46] KVM: Document basic API

2009-08-23 Thread Avi Kivity
Document the basic API corresponding to the 2.6.22 release. Signed-off-by: Avi Kivity a...@redhat.com --- Documentation/kvm/api.txt | 683 + 1 files changed, 683 insertions(+), 0 deletions(-) create mode 100644 Documentation/kvm/api.txt diff --git

[PATCH 19/46] KVM: PIT support for HPET legacy mode

2009-08-23 Thread Avi Kivity
From: Beth Kon e...@us.ibm.com When kvm is in hpet_legacy_mode, the hpet is providing the timer interrupt and the pit should not be. So in legacy mode, the pit timer is destroyed, but the *state* of the pit is maintained. So if kvm or the guest tries to modify the state of the pit, this

[PATCH 30/46] KVM: s390: remove unused structs

2009-08-23 Thread Avi Kivity
From: Gleb Natapov g...@redhat.com They are not used by common code without defines which s390 does not have. Signed-off-by: Gleb Natapov g...@redhat.com Signed-off-by: Marcelo Tosatti mtosa...@redhat.com --- arch/s390/include/asm/kvm.h |9 - 1 files changed, 0 insertions(+), 9

[PATCH 27/46] KVM: silence lapic kernel messages that can be triggered by a guest

2009-08-23 Thread Avi Kivity
From: Gleb Natapov g...@redhat.com Some Linux versions (f8) try to read EOI register that is write only. Signed-off-by: Gleb Natapov g...@redhat.com Signed-off-by: Marcelo Tosatti mtosa...@redhat.com --- arch/x86/kvm/lapic.c |8 1 files changed, 4 insertions(+), 4 deletions(-)

[PATCH 18/46] KVM: Always report x2apic as supported feature

2009-08-23 Thread Avi Kivity
From: Gleb Natapov g...@redhat.com We emulate x2apic in software, so host support is not required. Signed-off-by: Gleb Natapov g...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/x86.c |3 +++ 1 files changed, 3 insertions(+), 0 deletions(-) diff --git

[PATCH 20/46] KVM: add module parameters documentation

2009-08-23 Thread Avi Kivity
From: Andre Przywara andre.przyw...@amd.com Signed-off-by: Andre Przywara andre.przyw...@amd.com Signed-off-by: Avi Kivity a...@redhat.com --- Documentation/kernel-parameters.txt | 39 +++ 1 files changed, 39 insertions(+), 0 deletions(-) diff --git

[PATCH 13/46] KVM: Trace shadow page lifecycle

2009-08-23 Thread Avi Kivity
Create, sync, unsync, zap. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/mmu.c | 10 +++-- arch/x86/kvm/mmutrace.h | 103 +++ 2 files changed, 109 insertions(+), 4 deletions(-) diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c

[PATCH 05/46] KVM: Add Directed EOI support to APIC emulation

2009-08-23 Thread Avi Kivity
From: Gleb Natapov g...@redhat.com Directed EOI is specified by x2APIC, but is available even when lapic is in xAPIC mode. Signed-off-by: Gleb Natapov g...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/include/asm/apicdef.h |2 ++ arch/x86/kvm/lapic.c | 38

[PATCH 06/46] KVM: x2apic interface to lapic

2009-08-23 Thread Avi Kivity
From: Gleb Natapov g...@redhat.com This patch implements MSR interface to local apic as defines by x2apic Intel specification. Signed-off-by: Gleb Natapov g...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/lapic.c | 217 -

[PATCH 14/46] KVM: fix MMIO_CONF_BASE MSR access

2009-08-23 Thread Avi Kivity
From: Andre Przywara andre.przyw...@amd.com Some Windows versions check whether the BIOS has setup MMI/O for config space accesses on AMD Fam10h CPUs, we say no by returning 0 on reads and only allow disabling of MMI/O CfgSpace setup by igoring 0 writes. Signed-off-by: Andre Przywara

[PATCH 15/46] KVM: ignore msi request if !level

2009-08-23 Thread Avi Kivity
From: Michael S. Tsirkin m...@redhat.com Irqfd sets level for interrupt to 1 and then to 0. For MSI, check level so that a single message is sent. Signed-off-by: Michael S. Tsirkin m...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com --- virt/kvm/irq_comm.c |4 +++- 1 files changed, 3

[PATCH 23/46] KVM: MMU: Fix MMU_DEBUG compile breakage

2009-08-23 Thread Avi Kivity
From: Joerg Roedel joerg.roe...@amd.com Signed-off-by: Joerg Roedel joerg.roe...@amd.com Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/mmu.c |4 ++-- 1 files changed, 2 insertions(+), 2 deletions(-) diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c index ac121b3..f1f0815

[PATCH 17/46] KVM: No need to kick cpu if not in a guest mode

2009-08-23 Thread Avi Kivity
From: Gleb Natapov g...@redhat.com This will save a couple of IPIs. Signed-off-by: Gleb Natapov g...@redhat.com Acked-by: Marcelo Tosatti mtosa...@redhat.com Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/x86.c |1 + 1 files changed, 1 insertions(+), 0 deletions(-) diff --git

[PATCH 02/46] KVM: Ignore PCI ECS I/O enablement

2009-08-23 Thread Avi Kivity
From: Andre Przywara andre.przyw...@amd.com Linux guests will try to enable access to the extended PCI config space via the I/O ports 0xCF8/0xCFC on AMD Fam10h CPU. Since we (currently?) don't use ECS, simply ignore write and read attempts. Signed-off-by: Andre Przywara andre.przyw...@amd.com

[PATCH 10/46] Revert KVM: x86: check for cr3 validity in ioctl_set_sregs

2009-08-23 Thread Avi Kivity
From: Jan Kiszka jan.kis...@web.de This reverts commit 6c20e1442bb1c62914bb85b7f4a38973d2a423ba. To my understanding, it became obsolete with the advent of the more robust check in mmu_alloc_roots (89da4ff17f). Moreover, it prevents the conceptually safe pattern 1. set sregs 2. register

[PATCH 09/46] KVM: handle AMD microcode MSR

2009-08-23 Thread Avi Kivity
From: Andre Przywara andre.przyw...@amd.com Windows 7 tries to update the CPU's microcode on some processors, so we ignore the MSR write here. The patchlevel register is already handled (returning 0), because the MSR number is the same as Intel's. Signed-off-by: Andre Przywara

[PATCH 03/46] KVM: Trace mmio

2009-08-23 Thread Avi Kivity
Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/x86.c | 11 ++- include/trace/events/kvm.h | 33 + 2 files changed, 43 insertions(+), 1 deletions(-) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index af40e23..d32e3c6 100644

[PATCH 01/46] KVM: Trace irq level and source id

2009-08-23 Thread Avi Kivity
Signed-off-by: Avi Kivity a...@redhat.com --- include/trace/events/kvm.h | 11 --- virt/kvm/irq_comm.c|2 +- 2 files changed, 9 insertions(+), 4 deletions(-) diff --git a/include/trace/events/kvm.h b/include/trace/events/kvm.h index d74b23d..035232d 100644 ---

[PATCH 00/46] KVM updates for 2.6.32 merge window (3/4)

2009-08-23 Thread Avi Kivity
Third batch of the KVM patch queue. Akinobu Mita (2): KVM: x86: use get_desc_base() and get_desc_limit() KVM: x86: use kvm_get_gdt() and kvm_read_ldt() Andre Przywara (4): KVM: Ignore PCI ECS I/O enablement KVM: handle AMD microcode MSR KVM: fix MMIO_CONF_BASE MSR access KVM: add

[PATCH 08/46] KVM: Fix apic_mmio_write return for unaligned write

2009-08-23 Thread Avi Kivity
From: Sheng Yang sh...@linux.intel.com Some in-famous OS do unaligned writing for APIC MMIO, and the return value has been missed in recent change, then the OS hangs. Signed-off-by: Sheng Yang sh...@linux.intel.com Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/lapic.c |2 +- 1

[PATCH 04/46] KVM: Trace apic registers using their symbolic names

2009-08-23 Thread Avi Kivity
Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/trace.h | 14 -- 1 files changed, 12 insertions(+), 2 deletions(-) diff --git a/arch/x86/kvm/trace.h b/arch/x86/kvm/trace.h index cd8c90d..6c2c87f 100644 --- a/arch/x86/kvm/trace.h +++ b/arch/x86/kvm/trace.h @@ -111,6

Re: [PATCH] introduce kvm64 CPU

2009-08-23 Thread Jamie Lokier
Avi Kivity wrote: On 08/22/2009 12:59 AM, Andre Przywara wrote: Typically users will want more specialized greatest common denomiator cpu types; if a site has standardized on recent hardware they will want the features of that hardware exposed. Sure, but this was not the purpose of this

Re: [PATCH 0/2] eventfd: new EFD_STATE flag

2009-08-23 Thread Avi Kivity
On 08/20/2009 09:28 PM, Michael S. Tsirkin wrote: I thought the point was to move assigned devices out of KVM? Grr. Forgot about that. That's much more important. Looks like we'll have do with a separate char device or something? We can still tunnel it through userspace.

Re: [PATCH] introduce kvm64 CPU

2009-08-23 Thread Amit Shah
On (Fri) Aug 21 2009 [23:53:41], Andre Przywara wrote: Glauber Costa wrote: On Fri, Aug 21, 2009 at 12:41 PM, Avi Kivitya...@redhat.com wrote: On 08/21/2009 12:34 AM, Andre Przywara wrote: In addition to the TCG based qemu64 type let's introduce a kvm64 CPU type, which is the least common

Re: [PATCH 0/2] eventfd: new EFD_STATE flag

2009-08-23 Thread Michael S. Tsirkin
On Sun, Aug 23, 2009 at 04:01:29PM +0300, Avi Kivity wrote: On 08/20/2009 09:28 PM, Michael S. Tsirkin wrote: I thought the point was to move assigned devices out of KVM? Grr. Forgot about that. That's much more important. Looks like we'll have do with a separate char

Re: [PATCH 0/2] eventfd: new EFD_STATE flag

2009-08-23 Thread Avi Kivity
On 08/23/2009 04:36 PM, Michael S. Tsirkin wrote: More important here is realization that eventfd is a mutex/semaphore implementation, not a generic event reporting interface as we are trying to use it. Well it is a generic event reporting interface (for example, aio uses it). -- error

Re: [PATCH 0/2] eventfd: new EFD_STATE flag

2009-08-23 Thread Michael S. Tsirkin
On Sun, Aug 23, 2009 at 04:40:51PM +0300, Avi Kivity wrote: On 08/23/2009 04:36 PM, Michael S. Tsirkin wrote: More important here is realization that eventfd is a mutex/semaphore implementation, not a generic event reporting interface as we are trying to use it. Well it is a generic

Re: [PATCH 0/2] eventfd: new EFD_STATE flag

2009-08-23 Thread Paolo Bonzini
On 08/23/2009 04:30 PM, Michael S. Tsirkin wrote: On Sun, Aug 23, 2009 at 04:40:51PM +0300, Avi Kivity wrote: On 08/23/2009 04:36 PM, Michael S. Tsirkin wrote: More important here is realization that eventfd is a mutex/semaphore implementation, not a generic event reporting interface as we are

Re: [PATCHv3 0/4] qemu-kvm: vhost net support

2009-08-23 Thread Michael S. Tsirkin
On Tue, Aug 18, 2009 at 03:11:04PM -0600, Alex Williamson wrote: On Tue, Aug 18, 2009 at 3:04 PM, Michael S. Tsirkinm...@redhat.com wrote: Did you assign ip address in host by any chance? You don't want that. Nope, just up on the host, no IP: eth10 Link encap:Ethernet HWaddr

Re: [PATCH tracing/kprobes 1/4] x86: Fix x86 instruction decoder selftest to check only .text

2009-08-23 Thread Frederic Weisbecker
On Fri, Aug 21, 2009 at 03:43:07PM -0400, Masami Hiramatsu wrote: Fix x86 instruction decoder selftest to check only .text because other sections (e.g. .notes) will have random bytes which don't need to be checked. Applied these 4 patches in

Re: [PATCHv3 0/4] qemu-kvm: vhost net support

2009-08-23 Thread Michael S. Tsirkin
OK, there is a small issue with networking setup here, but otherwise it looks like we'll have to debug it in vhost ... Forgot to ask - dmesg does not show anything interesting, does it? On Thu, Aug 20, 2009 at 04:05:04PM -0600, Alex Williamson wrote: On Thu, Aug 20, 2009 at 1:03 AM, Michael S.

[ kvm-Bugs-2843250 ] live migration fails with emulated scsi drive

2009-08-23 Thread SourceForge.net
Bugs item #2843250, was opened at 2009-08-23 21:24 Message generated for change (Comment added) made by kijiki You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2843250group_id=180599 Please note that this message will contain a full copy of the comment

[PATCH] VMX: Return to userspace on invalid state emulation failure

2009-08-23 Thread Mohammed Gamal
Return to userspace instead of repeatedly trying to emulate instructions that have already failed Signed-off-by: Mohammed Gamal m.gamal...@gmail.com --- arch/x86/kvm/vmx.c |5 - 1 files changed, 4 insertions(+), 1 deletions(-) diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index

Re: R/W HG memory mappings with kvm?

2009-08-23 Thread Avi Kivity
On 08/24/2009 12:59 AM, Stephen Donnelly wrote: On Thu, Aug 20, 2009 at 12:14 AM, Avi Kivitya...@redhat.com wrote: On 08/13/2009 07:07 AM, Stephen Donnelly wrote: npages = get_user_pages_fast(addr, 1, 1, page); returns -EFAULT, presumably because (vma-vm_flags(VM_IO |

RE: [PATCH 4/5] kvmppc: Translate eaddr for fsl_booke mmu

2009-08-23 Thread Liu Yu-B13201
-Original Message- From: Alexander Graf [mailto:a...@csgraf.de] Sent: Friday, August 21, 2009 8:39 PM To: Liu Yu-B13201 Cc: Hollis Blanchard; qemu-de...@nongnu.org; kvm-ppc@vger.kernel.org; jan.kis...@siemens.com; froy...@codesourcery.com Subject: Re: [PATCH 4/5] kvmppc: