Re: Guest mode question

2012-09-19 Thread Steven
On Sun, Sep 16, 2012 at 2:32 AM, Nadav Har'El n...@math.technion.ac.il wrote: On Sat, Sep 15, 2012, Steven wrote about Guest mode question: Hi, I have a question about vm execution in the guest mode. Suppose I have two VMs on a machine. Is it possible that both VMs are in the guest mode? Like

Re: [PATCHv4] virtio-spec: virtio network device multiqueue support

2012-09-19 Thread Michael S. Tsirkin
On Wed, Sep 19, 2012 at 11:10:10AM +0930, Rusty Russell wrote: Tom Herbert therb...@google.com writes: On Tue, Sep 11, 2012 at 10:49 PM, Rusty Russell ru...@rustcorp.com.auwrote: Perhaps Tom can explain how we avoid out-of-order receive for the accelerated RFS case? It's not clear to

Re: [PATCH 2/2] KVM: PPC: Book3S: Implement floating-point state get/set functions

2012-09-19 Thread Alexander Graf
On 19.09.2012, at 05:37, Benjamin Herrenschmidt b...@kernel.crashing.org wrote: On Fri, 2012-09-14 at 03:44 +0200, Alexander Graf wrote: We're slowly moving towards ONE_REG. ARM is already going full steam ahead and I'd like to have every new register in PPC be modeled with it as well.

Re: [PATCH v10 2/2] kvm: Add resampling irqfds for level triggered interrupts

2012-09-19 Thread Avi Kivity
On 09/18/2012 06:16 AM, Alex Williamson wrote: To emulate level triggered interrupts, add a resample option to KVM_IRQFD. When specified, a new resamplefd is provided that notifies the user when the irqchip has been resampled by the VM. This may, for instance, indicate an EOI. Also in this

Re: [PATCH v10 2/2] kvm: Add resampling irqfds for level triggered interrupts

2012-09-19 Thread Michael S. Tsirkin
On Wed, Sep 19, 2012 at 11:59:33AM +0300, Avi Kivity wrote: @@ -247,9 +383,36 @@ kvm_irqfd_assign(struct kvm *kvm, struct kvm_irqfd *args) /* This fd is used for another irq already. */ ret = -EBUSY; spin_unlock_irq(kvm-irqfds.lock); +

Re: [PATCH v10 2/2] kvm: Add resampling irqfds for level triggered interrupts

2012-09-19 Thread Avi Kivity
On 09/19/2012 12:08 PM, Michael S. Tsirkin wrote: Whoa. Can't we put the resampler entry somewhere we don't need to search for it? Like a kvm_kernel_irq_routing_entry, that's indexed by gsi already (kvm_irq_routing_table::rt_entries[gsi]). I'm not sure why would we bother optimizing this,

Re: [PATCH 1/5]KVM: x86, apicv: add APICv register virtualization support

2012-09-19 Thread Avi Kivity
On 09/18/2012 05:38 PM, Li, Jiongxi wrote: +static int handle_apic_write(struct kvm_vcpu *vcpu) { + unsigned long exit_qualification = vmcs_readl(EXIT_QUALIFICATION); + u32 offset = exit_qualification 0xfff; + + /* APIC-write VM exit is trap-like and thus no need to adjust IP */

Re: [RfC PATCH] vga: add mmio bar to standard vga

2012-09-19 Thread Avi Kivity
On 09/18/2012 12:51 PM, Gerd Hoffmann wrote: This patch adds a mmio bar to the qemu standard vga which allows to access the standard vga registers and bochs dispi interface registers via mmio. diff --git a/hw/vga-pci.c b/hw/vga-pci.c index 9abbada..e05e2ef 100644 --- a/hw/vga-pci.c +++

Re: [PATCH 02/15] ARM: Add page table and page defines needed by KVM

2012-09-19 Thread Will Deacon
On Tue, Sep 18, 2012 at 11:01:27PM +0100, Christoffer Dall wrote: On Tue, Sep 18, 2012 at 8:47 AM, Will Deacon will.dea...@arm.com wrote: On Sat, Sep 15, 2012 at 04:34:43PM +0100, Christoffer Dall wrote: +#define L_PTE2_SHAREDL_PTE_SHARED +#define L_PTE2_READ

Re: [kvmarm] [PATCH 05/15] ARM: Expose PMNC bitfields for KVM use

2012-09-19 Thread Will Deacon
On Wed, Sep 19, 2012 at 05:09:34AM +0100, Rusty Russell wrote: Will Deacon will.dea...@arm.com writes: On Sat, Sep 15, 2012 at 04:35:02PM +0100, Christoffer Dall wrote: From: Rusty Russell rusty.russ...@linaro.org We want some of these for use in KVM, so pull them out of

Re: [PATCH v3] kvm/fpu: Enable fully eager restore kvm FPU

2012-09-19 Thread Avi Kivity
On 09/18/2012 04:08 AM, Hao, Xudong wrote: The objective of the change is to disable lazy fpu loading (that is, host fpu loaded in guest and vice-versa), Not vice versa. We allow the guest fpu loaded in the host, but save it on heavyweight exit or task switch. when some bit except the

KVM hypervisor - hardware issues? - Of topic

2012-09-19 Thread hampus.l...@ongame.com
Hi, We are facing big problems with our esxi 5 and HP DL585 G7 environment. Several of our HP servers reboots/hangs randomly without leaving any trace in any logs. HP hardware diag shows no errors in hardware and vmware support are clueless. My finding when searching for a reason is that

Re: [PATCH v2 1/2] KVM: PPC: Book3S HV: Get/set guest SPRs using the GET/SET_ONE_REG interface

2012-09-19 Thread Alexander Graf
On 19.09.2012, at 02:02, Paul Mackerras wrote: On Tue, Sep 18, 2012 at 04:06:25PM +0200, Alexander Graf wrote: Could you please merge the registers that you share with book3s pr into shared code? OK - that's just DAR and DSISR for this patch, isn't it? Unfortunately yes. Basically all of

Re: KVM hypervisor - hardware issues? - Of topic

2012-09-19 Thread Jan Kiszka
On 2012-09-19 12:42, hampus.l...@ongame.com wrote: Hi, We are facing big problems with our esxi 5 and HP DL585 G7 environment. Several of our HP servers reboots/hangs randomly without leaving any trace in any logs. HP hardware diag shows no errors in hardware and vmware support are

Re: [RfC PATCH] vga: add mmio bar to standard vga

2012-09-19 Thread Gerd Hoffmann
+ * 0x0400 - 0x041f vga ioports (0x3c0 - 0x3df), remapped 1:1 Do they support word accesses to set both index and data? + * 0x0500 - 0x0515 bochs dispi interface registers, mapped flat without + * index/data ports. Use (index 1) as offset for + *

Re: Guest mode question

2012-09-19 Thread Nadav Har'El
On Wed, Sep 19, 2012, Steven wrote about Re: Guest mode question: thanks for your reply. My question is regarding the the normal single-level virtualization. Suppose that the physical machine has only one core and 2 VMs. Each VM has one vcpu, so there are two vcpu threads running with the

reply

2012-09-19 Thread MHERNANM
You won Two Million Pounds in the Honda company. For claims reply by sending: Full Age;Names, Addrs,phone No to:hndaca...@gmail.com -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at

Re: [RfC PATCH] vga: add mmio bar to standard vga

2012-09-19 Thread Avi Kivity
On 09/19/2012 02:35 PM, Gerd Hoffmann wrote: Looks like word writes are supported provided the memory API breaks up writes in little endian order. Better to make it explicit. Like the attached incremental patch? Very like. -- error compiling committee.c: too many arguments to function

Re: [PATCH 00/15] KVM/ARM Implementation

2012-09-19 Thread Avi Kivity
On 09/15/2012 06:34 PM, Christoffer Dall wrote: The following series implements KVM support for ARM processors, specifically on the Cortex A-15 platform. We feel this is ready to be merged. Work is done in collaboration between Columbia University, Virtual Open Systems and ARM/Linaro.

Re: [PATCH 2/2] target-i386: Fix default Hypervisor level for hypervisor-vendor=kvm.

2012-09-19 Thread Eduardo Habkost
On Tue, Sep 18, 2012 at 03:32:04PM -0400, Don Slutz wrote: On 09/18/12 13:00, Eduardo Habkost wrote: On Tue, Sep 18, 2012 at 10:49:53AM -0400, Don Slutz wrote: From http://lkml.indiana.edu/hypermail/linux/kernel/1205.0/00100.html EAX should be KVM_CPUID_FEATURES (0x4001) not 0. If kvm

Re: [RFC][PATCH] Improving directed yield scalability for PLE handler

2012-09-19 Thread Avi Kivity
On 09/18/2012 06:03 AM, Andrew Theurer wrote: On Sun, 2012-09-16 at 11:55 +0300, Avi Kivity wrote: On 09/14/2012 12:30 AM, Andrew Theurer wrote: The concern I have is that even though we have gone through changes to help reduce the candidate vcpus we yield to, we still have a very poor

Re: [PATCH v10 2/2] kvm: Add resampling irqfds for level triggered interrupts

2012-09-19 Thread Alex Williamson
On Wed, 2012-09-19 at 12:10 +0300, Avi Kivity wrote: On 09/19/2012 12:08 PM, Michael S. Tsirkin wrote: Whoa. Can't we put the resampler entry somewhere we don't need to search for it? Like a kvm_kernel_irq_routing_entry, that's indexed by gsi already

Re: [PATCH 1/3] KVM: Move KVM_SET_ONE_REG/KVM_GET_ONE_REG to generic code.

2012-09-19 Thread Alexander Graf
On 05.09.2012, at 09:58, Rusty Russell wrote: Avi has indicated that this is the future. For now, make it dependent on KVM_HAVE_ONE_REG (and define that for PPC and S/390). Signed-off-by: Rusty Russell rusty.russ...@linaro.org Acked-by: Alexander Graf ag...@suse.de Alex -- To

Re: [PATCH 2/3] KVM: Add KVM_REG_SIZE() helper.

2012-09-19 Thread Alexander Graf
On 05.09.2012, at 09:58, Rusty Russell wrote: Useful helper for getting length of register given id. Signed-off-by: Rusty Russell rusty.russ...@linaro.org Acked-by: Alexander Graf ag...@suse.de Alex --- include/linux/kvm.h |2 ++ 1 file changed, 2 insertions(+) diff --git

[PATCH] mm: call invalidate_range_end in do_wp_page even for zero pages

2012-09-19 Thread Haggai Eran
The previous patch mm: wrap calls to set_pte_at_notify with invalidate_range_start and invalidate_range_end only called the invalidate_range_end mmu notifier function in do_wp_page when the new_page variable wasn't NULL. This was done in order to only call invalidate_range_end after

Re: [PATCH 3/3] KVM: Add KVM_VCPU_GET_REG_LIST/KVM_CAP_REG_LIST.

2012-09-19 Thread Alexander Graf
On 05.09.2012, at 09:58, Rusty Russell wrote: This is a generic interface to find out what you can use KVM_GET_ONE_REG/KVM_SET_ONE_REG on. Archs need to define KVM_HAVE_REG_LIST and then kvm_arch_num_regs() and kvm_arch_copy_reg_indices() functions. It's inspired by

Re: [PATCH v10 2/2] kvm: Add resampling irqfds for level triggered interrupts

2012-09-19 Thread Avi Kivity
On 09/19/2012 04:54 PM, Alex Williamson wrote: On Wed, 2012-09-19 at 12:10 +0300, Avi Kivity wrote: On 09/19/2012 12:08 PM, Michael S. Tsirkin wrote: Whoa. Can't we put the resampler entry somewhere we don't need to search for it? Like a kvm_kernel_irq_routing_entry, that's indexed by

Re: [KVM] Guest Debugging Facilities in KVM

2012-09-19 Thread Avi Kivity
On 09/17/2012 10:36 PM, Dean Pucsek wrote: Hello, For my Masters thesis I am investigating the usage of Intel VT-x and branch tracing in the domain of malware analysis. Essentially what I'm aiming to do is trace the execution of a guest VM and then pass that trace on to some other

Re: [PATCH 4/5]KVM:x86, apicv: add interface for poking EOI exit bitmap

2012-09-19 Thread Avi Kivity
On 09/17/2012 02:28 PM, Li, Jiongxi wrote: +++ b/arch/x86/kvm/lapic.c @@ -499,8 +499,13 @@ static int __apic_accept_irq(struct kvm_lapic *apic, int delivery_mode, if (trig_mode) { apic_debug(level trig mode for vector %d, vector);

Re: [KVM] Guest Debugging Facilities in KVM

2012-09-19 Thread Jan Kiszka
On 2012-09-19 16:38, Avi Kivity wrote: On 09/17/2012 10:36 PM, Dean Pucsek wrote: Hello, For my Masters thesis I am investigating the usage of Intel VT-x and branch tracing in the domain of malware analysis. Essentially what I'm aiming to do is trace the execution of a guest VM and then

Re: [PATCH 2/5]KVM:x86, apicv: adjust for virtual interrupt delivery

2012-09-19 Thread Avi Kivity
On 09/14/2012 05:15 PM, Li, Jiongxi wrote: @@ -5293,16 +5300,27 @@ static int vcpu_enter_guest(struct kvm_vcpu *vcpu) } if (kvm_check_request(KVM_REQ_EVENT, vcpu) || req_int_win) { + /* update archtecture specific hints for APIC virtual interrupt delivery */ +

Re: [PATCH v2 7/7] s390/kvm: In-kernel channel subsystem support.

2012-09-19 Thread Avi Kivity
On 09/19/2012 05:47 PM, Alexander Graf wrote: On 04.09.2012, at 17:13, Cornelia Huck wrote: Handle most support for channel I/O instructions in the kernel itself. Only asynchronous functions (such as the start function) need to be handled by userspace. Phew. This is a lot of code for

Re: [KVM] Guest Debugging Facilities in KVM

2012-09-19 Thread Avi Kivity
On 09/19/2012 05:45 PM, Jan Kiszka wrote: On 2012-09-19 16:38, Avi Kivity wrote: On 09/17/2012 10:36 PM, Dean Pucsek wrote: Hello, For my Masters thesis I am investigating the usage of Intel VT-x and branch tracing in the domain of malware analysis. Essentially what I'm aiming to do is

Re: [PATCH 2/5]KVM:x86, apicv: adjust for virtual interrupt delivery

2012-09-19 Thread Avi Kivity
On 09/17/2012 02:28 PM, Li, Jiongxi wrote: +} else if (kvm_apic_vid_enabled(vcpu)) { +if (kvm_cpu_has_interrupt_apic_vid(vcpu) +kvm_x86_ops-interrupt_allowed(vcpu)) { +kvm_queue_interrupt(vcpu, +

Macvtap bug: contractor wanted

2012-09-19 Thread Richard Davies
Hi. We run a cloud compute provider using qemu-kvm and macvtap and are keen to find a paid contractor to fix a bug with unusably slow inbound networking over macvtap. We originally reported the bug in this thread (report copied below): http://marc.info/?t=13451109862 We have also

Re: NFS over RDMA small block DIRECT_IO bug

2012-09-19 Thread Steve Dickson
On 09/18/2012 10:03 AM, Andrew Holway wrote: Hi Steve, Do you think these patches will make their way into the redhat kernel sometime soon? The process would start by opening a bz at bugzilla.redhat.com... If you like, you can send me the pointer to the bz and I'll make sure it gets

Re: [PATCH v2 5/9] KVM: MMU: Optimize pte permission checks

2012-09-19 Thread Avi Kivity
On 09/18/2012 09:45 AM, Xiao Guangrong wrote: On 09/16/2012 08:07 PM, Avi Kivity wrote: @@ -3672,20 +3672,17 @@ static int vcpu_mmio_gva_to_gpa(struct kvm_vcpu *vcpu, unsigned long gva, gpa_t *gpa, struct x86_exception *exception,

Re: [PATCH v2 9/9] KVM: MMU: Avoid access/dirty update loop if all is well

2012-09-19 Thread Avi Kivity
On 09/18/2012 10:21 AM, Xiao Guangrong wrote: On 09/16/2012 08:07 PM, Avi Kivity wrote: +/* + * On a write fault, fold the dirty bit into accessed_dirty by shifting it one + * place right. + * + * On a read fault, do nothing. + */ +accessed_dirty = pte

Re: [PATCH v2 3/5] s390: Add new channel I/O based virtio transport.

2012-09-19 Thread Alexander Graf
Just a really quick glimpse. This patch is huge :). On 04.09.2012, at 17:13, Cornelia Huck wrote: Add a new virtio transport that uses channel commands to perform virtio operations. Add a new machine type s390-ccw that uses this virtio-ccw transport and make it the default machine for

Re: [PATCH v2 4/5] s390: Virtual channel subsystem support for !KVM.

2012-09-19 Thread Alexander Graf
On 04.09.2012, at 17:13, Cornelia Huck wrote: Provide css support for the !KVM case as well. As mentioned in my previous reply to the kvm side of this, I don't see any reason why we should split the code at such a high level. Why can't KVM and !KVM share the same code? If we run into

Re: [PATCH v2 5/5] [HACK] Handle multiple virtio aliases.

2012-09-19 Thread Alexander Graf
On 04.09.2012, at 17:13, Cornelia Huck wrote: This patch enables using both virtio-xxx-s390 and virtio-xxx-ccw by making the alias lookup code verify that a driver is actually registered. (Only included in order to allow testing of virtio-ccw; should be replaced by cleaning up the virtio

Re: [PATCH v2 6/9] KVM: MMU: Simplify walk_addr_generic() loop

2012-09-19 Thread Avi Kivity
On 09/18/2012 09:53 AM, Xiao Guangrong wrote: On 09/16/2012 08:07 PM, Avi Kivity wrote: -pt_access = ACC_ALL; +pt_access = pte_access = ACC_ALL; +++walker-level; -for (;;) { +do { gfn_t real_gfn; unsigned long host_addr; +

Re: [PATCH 2/2] target-i386: Fix default Hypervisor level for hypervisor-vendor=kvm.

2012-09-19 Thread Don Slutz
On 09/19/12 09:20, Eduardo Habkost wrote: On Tue, Sep 18, 2012 at 03:32:04PM -0400, Don Slutz wrote: On 09/18/12 13:00, Eduardo Habkost wrote: On Tue, Sep 18, 2012 at 10:49:53AM -0400, Don Slutz wrote: From http://lkml.indiana.edu/hypermail/linux/kernel/1205.0/00100.html EAX should be

[PATCH v3 02/10] KVM: MMU: Optimize gpte_access() slightly

2012-09-19 Thread Avi Kivity
If nx is disabled, then is gpte[63] is set we will hit a reserved bit set fault before checking permissions; so we can ignore the setting of efer.nxe. Reviewed-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/paging_tmpl.h | 4 +--- 1

[PATCH v3 04/10] KVM: MMU: Update accessed and dirty bits after guest pagetable walk

2012-09-19 Thread Avi Kivity
While unspecified, the behaviour of Intel processors is to first perform the page table walk, then, if the walk was successful, to atomically update the accessed and dirty bits of walked paging elements. While we are not required to follow this exactly, doing so will allow us to perform the

[PATCH v3 05/10] KVM: MMU: Optimize pte permission checks

2012-09-19 Thread Avi Kivity
walk_addr_generic() permission checks are a maze of branchy code, which is performed four times per lookup. It depends on the type of access, efer.nxe, cr0.wp, cr4.smep, and in the near future, cr4.smap. Optimize this away by precalculating all variants and storing them in a bitmap. The bitmap

[PATCH v3 06/10] KVM: MMU: Simplify walk_addr_generic() loop

2012-09-19 Thread Avi Kivity
The page table walk is coded as an infinite loop, with a special case on the last pte. Code it as an ordinary loop with a termination condition on the last pte (large page or walk length exhausted), and put the last pte handling code after the loop where it belongs. Reviewed-by: Xiao Guangrong

[PATCH v3 08/10] KVM: MMU: Eliminate eperm temporary

2012-09-19 Thread Avi Kivity
'eperm' is no longer used in the walker loop, so we can eliminate it. Reviewed-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/paging_tmpl.h | 5 + 1 file changed, 1 insertion(+), 4 deletions(-) diff --git

[PATCH v3 07/10] KVM: MMU: Optimize is_last_gpte()

2012-09-19 Thread Avi Kivity
Instead of branchy code depending on level, gpte.ps, and mmu configuration, prepare everything in a bitmap during mode changes and look it up during runtime. Reviewed-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/include/asm/kvm_host.h

[PATCH v3 09/10] KVM: MMU: Avoid access/dirty update loop if all is well

2012-09-19 Thread Avi Kivity
Keep track of accessed/dirty bits; if they are all set, do not enter the accessed/dirty update loop. Reviewed-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/paging_tmpl.h | 26 -- 1 file changed, 20

[PATCH v3 01/10] KVM: MMU: Push clean gpte write protection out of gpte_access()

2012-09-19 Thread Avi Kivity
gpte_access() computes the access permissions of a guest pte and also write-protects clean gptes. This is wrong when we are servicing a write fault (since we'll be setting the dirty bit momentarily) but correct when instantiating a speculative spte, or when servicing a read fault (since we'll

[PATCH v3 10/10] KVM: MMU: Eliminate pointless temporary 'ac'

2012-09-19 Thread Avi Kivity
'ac' essentially reconstructs the 'access' variable we already have, except for the PFERR_PRESENT_MASK and PFERR_RSVD_MASK. As these are not used by callees, just use 'access' directly. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/paging_tmpl.h | 5 + 1 file changed, 1

[PATCH v3 00/10] Optimize page table walk

2012-09-19 Thread Avi Kivity
The page table walk has gotten crufty over the years and is threatening to become even more crufty when SMAP is introduced. Clean it up (and optimize it) somewhat. v3: fix another boolflip pointed out by Xiao Guangrong some cosmetics v2: fix SMEP false positive by moving checks to the

[PATCH v3 03/10] KVM: MMU: Move gpte_access() out of paging_tmpl.h

2012-09-19 Thread Avi Kivity
We no longer rely on paging_tmpl.h defines; so we can move the function to mmu.c. Rely on zero extension to 64 bits to get the correct nx behaviour. Reviewed-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/mmu.c | 10

Re: [PATCH v2 3/4] s390/kvm: Add a channel I/O based virtio transport driver.

2012-09-19 Thread Alexander Graf
On 04.09.2012, at 17:13, Cornelia Huck wrote: Add a driver for kvm guests that matches virtual ccw devices provided by the host as virtio bridge devices. These virtio-ccw devices use a special set of channel commands in order to perform virtio functions. Signed-off-by: Cornelia Huck

Re: [PATCH v2 1/2] KVM: PPC: Book3S HV: Get/set guest SPRs using the GET/SET_ONE_REG interface

2012-09-19 Thread Scott Wood
On 09/18/2012 07:02:42 PM, Paul Mackerras wrote: On Tue, Sep 18, 2012 at 04:06:25PM +0200, Alexander Graf wrote: Could you please merge the registers that you share with book3s pr into shared code? OK - that's just DAR and DSISR for this patch, isn't it? And basically all of the FP/VMX/VSX

Re: [PATCH v2 7/9] KVM: MMU: Optimize is_last_gpte()

2012-09-19 Thread Avi Kivity
On 09/18/2012 10:36 AM, Xiao Guangrong wrote: On 09/16/2012 08:07 PM, Avi Kivity wrote: Instead of branchy code depending on level, gpte.ps, and mmu configuration, prepare everything in a bitmap during mode changes and look it up during runtime. Avi, Can we introduce ignore_bits_mask[]

Re: [PATCH v2 7/9] KVM: MMU: Optimize is_last_gpte()

2012-09-19 Thread Avi Kivity
On 09/19/2012 08:17 PM, Avi Kivity wrote: On 09/18/2012 10:36 AM, Xiao Guangrong wrote: On 09/16/2012 08:07 PM, Avi Kivity wrote: Instead of branchy code depending on level, gpte.ps, and mmu configuration, prepare everything in a bitmap during mode changes and look it up during runtime.

[PATCH] Enabling IA32_TSC_ADJUST for guest VM

2012-09-19 Thread Auld, Will
From 9982bb73460b05c1328068aae047b14b2294e2da Mon Sep 17 00:00:00 2001 From: Will Auld will.a...@intel.com Date: Wed, 12 Sep 2012 18:10:56 -0700 Subject: [PATCH] Enabling IA32_TSC_ADJUST for guest VM CPUID.7.0.EBX[1]=1 indicates IA32_TSC_ADJUST MSR 0x3b is supported Basic design is to emulate

[PATCH] Enabling IA32_TSC_ADJUST for Qemu KVM guest VMs

2012-09-19 Thread Auld, Will
From 9d5201975d2c9da4da8a945fcd9531c9fb2073c0 Mon Sep 17 00:00:00 2001 From: Will Auld will.a...@intel.com Date: Wed, 12 Sep 2012 18:31:41 -0700 Subject: [PATCH] Enabling IA32_TSC_ADJUST for Qemu KVM guest VMs CPUID.7.0.EBX[1]=1 indicates IA32_TSC_ADJUST MSR 0x3b is supported Basic design is to

Re: [PATCH] Enabling IA32_TSC_ADJUST for Qemu KVM guest VMs

2012-09-19 Thread Jan Kiszka
On 2012-09-19 19:49, Auld, Will wrote: From 9d5201975d2c9da4da8a945fcd9531c9fb2073c0 Mon Sep 17 00:00:00 2001 From: Will Auld will.a...@intel.com Date: Wed, 12 Sep 2012 18:31:41 -0700 Subject: [PATCH] Enabling IA32_TSC_ADJUST for Qemu KVM guest VMs CPUID.7.0.EBX[1]=1 indicates

Re: [PATCH v10 2/2] kvm: Add resampling irqfds for level triggered interrupts

2012-09-19 Thread Alex Williamson
On Wed, 2012-09-19 at 11:59 +0300, Avi Kivity wrote: On 09/18/2012 06:16 AM, Alex Williamson wrote: @@ -92,6 +156,43 @@ irqfd_shutdown(struct work_struct *work) */ flush_work_sync(irqfd-inject); + if (irqfd-resampler) { + struct _irqfd_resampler *resampler =

Re: [Qemu-devel] [RfC PATCH] vga: add mmio bar to standard vga

2012-09-19 Thread Blue Swirl
On Tue, Sep 18, 2012 at 9:51 AM, Gerd Hoffmann kra...@redhat.com wrote: This patch adds a mmio bar to the qemu standard vga which allows to access the standard vga registers and bochs dispi interface registers via mmio. Cc: Benjamin Herrenschmidt b...@kernel.crashing.org Signed-off-by: Gerd

Re: [PATCH v10 2/2] kvm: Add resampling irqfds for level triggered interrupts

2012-09-19 Thread Michael S. Tsirkin
On Wed, Sep 19, 2012 at 12:23:13PM -0600, Alex Williamson wrote: On Wed, 2012-09-19 at 11:59 +0300, Avi Kivity wrote: On 09/18/2012 06:16 AM, Alex Williamson wrote: @@ -92,6 +156,43 @@ irqfd_shutdown(struct work_struct *work) */ flush_work_sync(irqfd-inject); + if

Re: [PATCH v2 1/2] KVM: PPC: Book3S HV: Get/set guest SPRs using the GET/SET_ONE_REG interface

2012-09-19 Thread Alexander Graf
On 19.09.2012, at 19:14, Scott Wood scottw...@freescale.com wrote: On 09/18/2012 07:02:42 PM, Paul Mackerras wrote: On Tue, Sep 18, 2012 at 04:06:25PM +0200, Alexander Graf wrote: Could you please merge the registers that you share with book3s pr into shared code? OK - that's just DAR

Re: [PATCH v10 2/2] kvm: Add resampling irqfds for level triggered interrupts

2012-09-19 Thread Alex Williamson
On Wed, 2012-09-19 at 21:48 +0300, Michael S. Tsirkin wrote: On Wed, Sep 19, 2012 at 12:23:13PM -0600, Alex Williamson wrote: On Wed, 2012-09-19 at 11:59 +0300, Avi Kivity wrote: On 09/18/2012 06:16 AM, Alex Williamson wrote: @@ -92,6 +156,43 @@ irqfd_shutdown(struct work_struct *work)

Re: [Qemu-devel] [PATCH v3 05/17] target-i386: Add x86_set_hyperv.

2012-09-19 Thread Eduardo Habkost
On Mon, Sep 17, 2012 at 10:00:55AM -0400, Don Slutz wrote: This is used to set the cpu object's hypervisor level to the default for Microsoft's Hypervisor. Signed-off-by: Don Slutz d...@cloudswitch.com --- target-i386/cpu.c | 10 ++ 1 files changed, 10 insertions(+), 0

[PATCH] KVM: x86: Fix guest debug across vcpu INIT reset

2012-09-19 Thread Jan Kiszka
If we reset a vcpu on INIT, make sure to not touch dr7 as stored in the VMCS/VMCB and also switch_db_regs if guest debugging is using hardware breakpoints. Otherwise, the vcpu will not trigger hardware breakpoints until userspace issues another KVM_SET_GUEST_DEBUG IOCTL for it. Found while trying

Re: [PATCH v10 2/2] kvm: Add resampling irqfds for level triggered interrupts

2012-09-19 Thread Michael S. Tsirkin
On Wed, Sep 19, 2012 at 01:23:35PM -0600, Alex Williamson wrote: On Wed, 2012-09-19 at 21:48 +0300, Michael S. Tsirkin wrote: On Wed, Sep 19, 2012 at 12:23:13PM -0600, Alex Williamson wrote: On Wed, 2012-09-19 at 11:59 +0300, Avi Kivity wrote: On 09/18/2012 06:16 AM, Alex Williamson

what does SVM_EXIT_VMRUN mean?

2012-09-19 Thread Steven
hi, I am wondering what the exit code SVM_EXIT_VMRUN means? Its name is not as clear as SVM_EXIT_READ_CR0. Thanks. - Steven -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at

Re: [PATCH v2 4/5] KVM: MMU: introduce page_fault_start and page_fault_end

2012-09-19 Thread Marcelo Tosatti
On Tue, Sep 18, 2012 at 04:15:32PM +0800, Xiao Guangrong wrote: On 09/15/2012 11:25 PM, Marcelo Tosatti wrote: On Fri, Sep 14, 2012 at 05:59:06PM +0800, Xiao Guangrong wrote: Wrap the common operations into these two functions Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com

Re: [Qemu-devel] [PATCH v3 05/17] target-i386: Add x86_set_hyperv.

2012-09-19 Thread Don Slutz
On 09/19/12 15:32, Eduardo Habkost wrote: On Mon, Sep 17, 2012 at 10:00:55AM -0400, Don Slutz wrote: This is used to set the cpu object's hypervisor level to the default for Microsoft's Hypervisor. Signed-off-by: Don Slutz d...@cloudswitch.com --- target-i386/cpu.c | 10 ++ 1

Re: [PATCH 02/15] ARM: Add page table and page defines needed by KVM

2012-09-19 Thread Christoffer Dall
On Wed, Sep 19, 2012 at 5:21 AM, Will Deacon will.dea...@arm.com wrote: On Tue, Sep 18, 2012 at 11:01:27PM +0100, Christoffer Dall wrote: On Tue, Sep 18, 2012 at 8:47 AM, Will Deacon will.dea...@arm.com wrote: On Sat, Sep 15, 2012 at 04:34:43PM +0100, Christoffer Dall wrote: +#define

Re: [PATCH 04/15] ARM: idmap: only initialize HYP idmap when HYP mode is available

2012-09-19 Thread Christoffer Dall
On Tue, Sep 18, 2012 at 9:03 AM, Will Deacon will.dea...@arm.com wrote: On Sat, Sep 15, 2012 at 04:34:55PM +0100, Christoffer Dall wrote: From: Marc Zyngier marc.zyng...@arm.com Signed-off-by: Marc Zyngier marc.zyng...@arm.com --- arch/arm/mm/idmap.c |4 1 file changed, 4

[kvm:queue 41/42] arch/s390/kvm/interrupt.c:428:12: warning: ignoring return value of 'vcpu_load', declared with attribute warn_unused_result

2012-09-19 Thread Fengguang Wu
Hi Michael, FYI, there are new compile warnings show up in tree: git://git.kernel.org/pub/scm/virt/kvm/kvm.git queue head: 879238fecc051d95037ae76332916209a7770709 commit: 9fc77441e5e1bf80b794cc546d2243ee9f4afb75 [41/42] KVM: make processes waiting on vcpu mutex killable config:

RE: [PATCH v3] kvm/fpu: Enable fully eager restore kvm FPU

2012-09-19 Thread Hao, Xudong
-Original Message- From: Avi Kivity [mailto:a...@redhat.com] Sent: Wednesday, September 19, 2012 6:24 PM To: Hao, Xudong Cc: Marcelo Tosatti; kvm@vger.kernel.org; Zhang, Xiantao Subject: Re: [PATCH v3] kvm/fpu: Enable fully eager restore kvm FPU That may be: static bool

Re: [PATCH v2 4/5] KVM: MMU: introduce page_fault_start and page_fault_end

2012-09-19 Thread Xiao Guangrong
On 09/19/2012 07:43 AM, Marcelo Tosatti wrote: - error pfn / mmio pfn / invalid pfn relation Have the meaning of this bits unified in a single function/helper, see comment to patch 1 (perhaps you can further improve). Sorry, more detail? Should force the reader of the code to understand

Re: [PATCH v3 10/10] KVM: MMU: Eliminate pointless temporary 'ac'

2012-09-19 Thread Xiao Guangrong
On 09/20/2012 12:36 AM, Avi Kivity wrote: 'ac' essentially reconstructs the 'access' variable we already have, except for the PFERR_PRESENT_MASK and PFERR_RSVD_MASK. As these are not used by callees, just use 'access' directly. Reviewed-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com

[Bug 47451] need to re-load driver in guest to make a hot-plug VF work

2012-09-19 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=47451 --- Comment #2 from Jay Ren yongjie@intel.com 2012-09-20 03:36:31 --- (In reply to comment #1) The steps to reproduce don't indicate what you've done in the host to prepare the device. Is igbvf loaded in the host? No, I don't load

Re: what does SVM_EXIT_VMRUN mean?

2012-09-19 Thread Nadav Har'El
On Wed, Sep 19, 2012, Steven wrote about what does SVM_EXIT_VMRUN mean?: hi, I am wondering what the exit code SVM_EXIT_VMRUN means? Its name is not as clear as SVM_EXIT_READ_CR0. Thanks. This exit happens when the guest ran the VMRUN instruction. In other words, the guest is a hypervisor and

[Bug 47451] need to re-load driver in guest to make a hot-plug VF work

2012-09-19 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=47451 --- Comment #3 from Alex Williamson alex.william...@redhat.com 2012-09-20 04:36:50 --- (In reply to comment #2) (In reply to comment #1) Can we narrow down the kvm.git commit range at all? The one provided is over 12k commits covering

Re: Can't use USB devices in their designated applications on Windows Vista guest

2012-09-19 Thread Michael Tokarev
On 18.09.2012 09:56, Dirk Heinrichs wrote: Hi, I have a really strange problem using USB devices in a Windows Vista (32bit) guest. After adding a USB device (an Adroid phone or a GPS navigation device) to the guest, Vista starts to install the driver(s) for the new device just as it

Re: [kvm:queue 41/42] arch/s390/kvm/interrupt.c:428:12: warning: ignoring return value of 'vcpu_load', declared with attribute warn_unused_result

2012-09-19 Thread Michael S. Tsirkin
On Thu, Sep 20, 2012 at 08:16:08AM +0800, Fengguang Wu wrote: Hi Michael, FYI, there are new compile warnings show up in tree: git://git.kernel.org/pub/scm/virt/kvm/kvm.git queue head: 879238fecc051d95037ae76332916209a7770709 commit: 9fc77441e5e1bf80b794cc546d2243ee9f4afb75 [41/42]

RE: Can't use USB devices in their designated applications on Windows Vista guest

2012-09-19 Thread Justin Chudgar
I've got exactly the same symptoms as Dirk. I'm using the same host kernel, qemu-kvm 1.2.0 and both WinXP-32 and Win7-64 guests. I've tried both default-USB 1.1 and USB 2.0 settings for the guest USB controller. In all cases, Windows loads the device drivers, but the software on the gust cannot

[PATCH] KVM: x86: Convert kvm_arch_vcpu_reset into private kvm_vcpu_reset

2012-09-19 Thread Jan Kiszka
From: Jan Kiszka jan.kis...@siemens.com There are no external callers of this function as there is no concept of resetting a vcpu from generic code. Signed-off-by: Jan Kiszka jan.kis...@siemens.com --- arch/x86/kvm/x86.c |8 +--- include/linux/kvm_host.h |1 - 2 files changed,

[PATCH] KVM: x86: Make emulator_fix_hypercall static

2012-09-19 Thread Jan Kiszka
From: Jan Kiszka jan.kis...@siemens.com No users outside of kvm/x86.c. Signed-off-by: Jan Kiszka jan.kis...@siemens.com --- arch/x86/kvm/x86.c |4 ++-- 1 files changed, 2 insertions(+), 2 deletions(-) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 3701471..24f2278 100644 ---

Re: [Qemu-devel] [RfC PATCH] vga: add mmio bar to standard vga

2012-09-19 Thread Gerd Hoffmann
Hi, +vbe_ioport_write_index(d-vga, 0, index); +return vbe_ioport_read_data(d-vga, 0); These functions are only available with CONFIG_BOCHS_VBE #defined, so this code should be conditional as well. But building without CONFIG_BOCHS_VBE is not very useful since it's used by the

Re: [PATCH 2/2] KVM: PPC: Book3S: Implement floating-point state get/set functions

2012-09-19 Thread Alexander Graf
On 19.09.2012, at 05:37, Benjamin Herrenschmidt b...@kernel.crashing.org wrote: On Fri, 2012-09-14 at 03:44 +0200, Alexander Graf wrote: We're slowly moving towards ONE_REG. ARM is already going full steam ahead and I'd like to have every new register in PPC be modeled with it as well.

Re: [PATCH v2 1/2] KVM: PPC: Book3S HV: Get/set guest SPRs using the GET/SET_ONE_REG interface

2012-09-19 Thread Alexander Graf
On 19.09.2012, at 02:02, Paul Mackerras wrote: On Tue, Sep 18, 2012 at 04:06:25PM +0200, Alexander Graf wrote: Could you please merge the registers that you share with book3s pr into shared code? OK - that's just DAR and DSISR for this patch, isn't it? Unfortunately yes. Basically all of

Re: [PATCH v2 1/2] KVM: PPC: Book3S HV: Get/set guest SPRs using the GET/SET_ONE_REG interface

2012-09-19 Thread Scott Wood
On 09/18/2012 07:02:42 PM, Paul Mackerras wrote: On Tue, Sep 18, 2012 at 04:06:25PM +0200, Alexander Graf wrote: Could you please merge the registers that you share with book3s pr into shared code? OK - that's just DAR and DSISR for this patch, isn't it? And basically all of the FP/VMX/VSX

Re: [PATCH v2 1/2] KVM: PPC: Book3S HV: Get/set guest SPRs using the GET/SET_ONE_REG interface

2012-09-19 Thread Alexander Graf
On 19.09.2012, at 19:14, Scott Wood scottw...@freescale.com wrote: On 09/18/2012 07:02:42 PM, Paul Mackerras wrote: On Tue, Sep 18, 2012 at 04:06:25PM +0200, Alexander Graf wrote: Could you please merge the registers that you share with book3s pr into shared code? OK - that's just DAR