On 17 November 2014 15:58, Ard Biesheuvel ard.biesheu...@linaro.org wrote:
Readonly memslots are often used to implement emulation of ROMs and
NOR flashes, in which case the guest may legally map these regions as
uncached.
To deal with the incoherency associated with uncached guest mappings,
On 19/11/2014 04:17, nick wrote:
Greeting Gleb and other maintainers, I known this may not be that
easy to fix but if someone is willing to send me the fault addresses
or a hardware manual in order to fix and add the correct return
correct addresses for the fix mes in the emulate.c for the
Dear all,
As indicated on http://www.linux-kvm.org/page/Bugs, I am seeking directions as
to where to post the following bug (or support request):
I am running KVM virtualization hosts both with Centos 6 and Centos 7 (all
installed from packages and updated to the current version). The guests
On 19/11/2014 11:36, Prof. Dr. Michael Schefczyk wrote:
I am running KVM virtualization hosts both with Centos 6 and Centos
7 (all installed from packages and updated to the current version).
The guests are Centos, Debian, Windows 2008 R2 and Windows 7
machines. I am using qcow2 virtual
On 19/11/2014 09:51, Ard Biesheuvel wrote:
On 17 November 2014 15:58, Ard Biesheuvel ard.biesheu...@linaro.org wrote:
Readonly memslots are often used to implement emulation of ROMs and
NOR flashes, in which case the guest may legally map these regions as
uncached.
To deal with the
On 19/11/2014 09:51, Ard Biesheuvel wrote:
On 17 November 2014 15:58, Ard Biesheuvel ard.biesheu...@linaro.org wrote:
Readonly memslots are often used to implement emulation of ROMs and
NOR flashes, in which case the guest may legally map these regions as
uncached.
To deal with the
Dear Recipient,
You have been awarded the sum of 8,000,000.00 (Eight Million Pounds sterling)
with reference number 77100146 by office of the ministry of finance UK.Send us
your personal details to deliver your funds.
Gloria Peter
--
To unsubscribe from this list: send the line unsubscribe
Hi Mario,
On Fri, Nov 07, 2014 at 12:51:39PM -0800, Mario Smarduch wrote:
On 11/07/2014 12:20 PM, Christoffer Dall wrote:
On Thu, Oct 09, 2014 at 07:34:07PM -0700, Mario Smarduch wrote:
This patch enables ARMv8 dirty page logging and unifies ARMv7/ARMv8 code.
Signed-off-by: Mario
On Tue, Nov 11, 2014 at 02:48:25PM +0530, Anup Patel wrote:
Hi All,
I have second thoughts about rebasing KVM PMU patches
to Marc's irq-forwarding patches.
The PMU IRQs (when virtualized by KVM) are not exactly
forwarded IRQs because they are shared between Host
and Guest.
Scenario1
Commit 10e38fc7cab6 (KVM: x86: Emulator flag for instruction that only support
16-bit addresses in real mode) introduced NoBigReal for instructions such as
MONITOR. Apparetnly, the Intel SDM description that led to this patch is
misleading. Since no instruction is using NoBigReal, it is safe to
When segment is accessed, real hardware does not perform any privilege level
checks. In contrast, KVM emulator does. This causes some discrepencies from
real hardware. For instance, reading from readable code segment may fail due to
incorrect segment checks. In addition, it introduces unnecassary
This patch-set fixes 4 bugs in the __linearize emulator function, and makes
some cleanup of the function.
Patches 2 to 5 deal with separate bugs.
Patch 1 and 6 introduce minor enhancement and have no functional implications.
The first patch reverts a patch which was written by this patch author.
When performing segmented-read/write in the emulator for stack operations, it
ignores the stack size, and uses the ad_bytes as indication for the pointer
size. As a result, a wrong address may be accessed.
To fix this behavior, we can remove the masking of address in __linearize and
perform it
If branch (e.g., jmp, ret) causes limit violations, since the target IP
limit, the #GP exception occurs before the branch. In other words, the RIP
pushed on the stack should be that of the branch and not that of the target.
To do so, we can call __linearize, with new EIP, which also saves us
In __linearize there is check of the condition whether to check if masking of
the linear address is needed. It occurs immediately after switch that
evaluates the same condition. Merge them.
Signed-off-by: Nadav Amit na...@cs.technion.ac.il
---
arch/x86/kvm/emulate.c | 3 +--
1 file changed, 1
When SS is used using a non-canonical address, an #SS exception is generated on
real hardware. KVM emulator causes a #GP instead. Fix it to behave as real x86
CPU.
Signed-off-by: Nadav Amit na...@cs.technion.ac.il
---
arch/x86/kvm/emulate.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
On 19/11/2014 16:43, Nadav Amit wrote:
When performing segmented-read/write in the emulator for stack operations, it
ignores the stack size, and uses the ad_bytes as indication for the pointer
size. As a result, a wrong address may be accessed.
To fix this behavior, we can remove the
register_address has been a duplicate of address_mask ever since the
ancestor of __linearize was born in 90de84f50b42 (KVM: x86 emulator:
preserve an operand's segment identity, 2010-11-17).
However, we can put it to a better use by including the call to reg_read
in register_address. Similarly,
The check on the higher limit of the segment, and the check on the
maximum accessible size, is the same for both expand-up and
expand-down segments. Only the computation of lim varies.
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
arch/x86/kvm/emulate.c | 13 -
1 file
On 19/11/2014 13:48, Nicholas Krause wrote:
Removes fix me comments for needing fault addresses to be returned in certain
functions if they fail as they are stored and included in this file via the \
header file,paging_tmpl.h.
KVM: x86: Remove FIXMEs in emulate.c
Remove fixme
On 19/11/2014 16:43, Nadav Amit wrote:
This patch-set fixes 4 bugs in the __linearize emulator function, and makes
some cleanup of the function.
Patches 2 to 5 deal with separate bugs.
Patch 1 and 6 introduce minor enhancement and have no functional implications.
The first patch reverts
Hi Zhang,
On Fri, Oct 31, 2014 at 09:26:09AM +0800, zhanghailiang wrote:
On 2014/10/30 20:49, Dr. David Alan Gilbert wrote:
* zhanghailiang (zhang.zhanghaili...@huawei.com) wrote:
On 2014/10/30 1:46, Andrea Arcangeli wrote:
Hi Zhanghailiang,
On Mon, Oct 27, 2014 at 05:32:51PM +0800,
On 11/19/2014 06:39 AM, Christoffer Dall wrote:
Hi Mario,
On Fri, Nov 07, 2014 at 12:51:39PM -0800, Mario Smarduch wrote:
On 11/07/2014 12:20 PM, Christoffer Dall wrote:
On Thu, Oct 09, 2014 at 07:34:07PM -0700, Mario Smarduch wrote:
This patch enables ARMv8 dirty page logging and unifies
KVM for ia64 has been marked as broken not just once, but twice even,
and the last patch from the maintainer is now roughly 5 years old.
Time for it to rest in piece.
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
The patch was edited to keep its size decent, by dropping
all
On 11/14/2014 04:56 AM, Alexander Graf wrote:
Am 14.11.2014 um 00:29 schrieb Suresh E. Warrier
warr...@linux.vnet.ibm.com:
This patch adds trace points in the guest entry and exit code and also
for exceptions handled by the host in kernel mode - hypercalls and page
faults. The new
Hi Laszlo,
couple observations.
I'm wondering if access from qemu and guest won't
result in mixed memory attributes and if that's acceptable
to the CPU.
Also is if you update memory from qemu you may break
dirty page logging/migration. Unless there is some other way
you keep track. Of
On 2014/11/20 5:05, Paolo Bonzini wrote:
KVM for ia64 has been marked as broken not just once, but twice even,
and the last patch from the maintainer is now roughly 5 years old.
Time for it to rest in piece.
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
I think we also need to sync
Hi all,
If I press the one of Insert/Delete/Home/End/PageUp/PageDown/UpArrow/
DownArrow/LeftArrow/RightArrow key w/o releasing, then lots of interrupts
will be injected to vm(win7/win2008), about 8000/s, the system become very slow,
bringing very bad experience. But the other keys are okay.
And,
On 2014/11/20 2:49, Andrea Arcangeli wrote:
Hi Zhang,
On Fri, Oct 31, 2014 at 09:26:09AM +0800, zhanghailiang wrote:
On 2014/10/30 20:49, Dr. David Alan Gilbert wrote:
* zhanghailiang (zhang.zhanghaili...@huawei.com) wrote:
On 2014/10/30 1:46, Andrea Arcangeli wrote:
Hi Zhanghailiang,
On
-Original Message-
From: Jiang Liu [mailto:jiang@linux.intel.com]
Sent: Tuesday, November 11, 2014 9:36 PM
To: Wu, Feng; g...@kernel.org; pbonz...@redhat.com;
dw...@infradead.org; j...@8bytes.org; t...@linutronix.de;
mi...@redhat.com; h...@zytor.com; x...@kernel.org
Cc:
On 2014/11/20 12:53, Wu, Feng wrote:
-Original Message-
snit
+ /*
+* Initialize Posted-Interrupt Descriptor
+*/
+
+ pi_clear_sn(vmx-pi_desc);
+ vmx-pi_desc.nv = POSTED_INTR_VECTOR;
+
+ /* Physical mode for Notificaiton Event */
+ vmx-pi_desc.ndm = 0;
+
On 20/11/2014 03:20, Zhang Haoyu wrote:
Hi all,
If I press the one of Insert/Delete/Home/End/PageUp/PageDown/UpArrow/
DownArrow/LeftArrow/RightArrow key w/o releasing, then lots of interrupts
will be injected to vm(win7/win2008), about 8000/s, the system become very
slow,
bringing very
On 20/11/2014 02:16, Chen, Tiejun wrote:
On 2014/11/20 5:05, Paolo Bonzini wrote:
KVM for ia64 has been marked as broken not just once, but twice even,
and the last patch from the maintainer is now roughly 5 years old.
Time for it to rest in piece.
Signed-off-by: Paolo Bonzini
On 20/11/2014 03:20, Zhang Haoyu wrote:
Hi all,
If I press the one of Insert/Delete/Home/End/PageUp/PageDown/UpArrow/
DownArrow/LeftArrow/RightArrow key w/o releasing, then lots of interrupts
will be injected to vm(win7/win2008), about 8000/s, the system become very
slow,
bringing very
On Thu, Nov 20, 2014 at 02:59:36PM +0800, Zhang Haoyu wrote:
On 20/11/2014 03:20, Zhang Haoyu wrote:
Hi all,
If I press the one of Insert/Delete/Home/End/PageUp/PageDown/UpArrow/
DownArrow/LeftArrow/RightArrow key w/o releasing, then lots of interrupts
will be injected to
With Posted-Interrupts support in Intel CPU and IOMMU, an external
interrupt from assigned-devices could be directly delivered to a
virtual CPU in a virtual machine. Instead of hacking KVM and Intel
IOMMU drivers, we propose a platform independent interface to target
an interrupt to a specific
On Wed, Nov 19, 2014 at 10:05:43PM +0100, Paolo Bonzini wrote:
KVM for ia64 has been marked as broken not just once, but twice even,
and the last patch from the maintainer is now roughly 5 years old.
Time for it to rest in piece.
Acked-by: Gleb Natapov g...@kernel.org
Next step is to move
On 11/14/2014 04:56 AM, Alexander Graf wrote:
Am 14.11.2014 um 00:29 schrieb Suresh E. Warrier
warr...@linux.vnet.ibm.com:
This patch adds trace points in the guest entry and exit code and also
for exceptions handled by the host in kernel mode - hypercalls and page
faults. The new
38 matches
Mail list logo