Re: [PATCH 3/3] arm, arm64: KVM: handle potential incoherency of readonly memslots

2014-11-19 Thread Ard Biesheuvel
On 17 November 2014 15:58, Ard Biesheuvel ard.biesheu...@linaro.org wrote: Readonly memslots are often used to implement emulation of ROMs and NOR flashes, in which case the guest may legally map these regions as uncached. To deal with the incoherency associated with uncached guest mappings,

Re: Fix Mes in emulate.c

2014-11-19 Thread Paolo Bonzini
On 19/11/2014 04:17, nick wrote: Greeting Gleb and other maintainers, I known this may not be that easy to fix but if someone is willing to send me the fault addresses or a hardware manual in order to fix and add the correct return correct addresses for the fix mes in the emulate.c for the

Bug Repoting Directions Request

2014-11-19 Thread Prof. Dr. Michael Schefczyk
Dear all, As indicated on http://www.linux-kvm.org/page/Bugs, I am seeking directions as to where to post the following bug (or support request): I am running KVM virtualization hosts both with Centos 6 and Centos 7 (all installed from packages and updated to the current version). The guests

Re: Bug Repoting Directions Request

2014-11-19 Thread Paolo Bonzini
On 19/11/2014 11:36, Prof. Dr. Michael Schefczyk wrote: I am running KVM virtualization hosts both with Centos 6 and Centos 7 (all installed from packages and updated to the current version). The guests are Centos, Debian, Windows 2008 R2 and Windows 7 machines. I am using qcow2 virtual

Re: [PATCH 3/3] arm, arm64: KVM: handle potential incoherency of readonly memslots

2014-11-19 Thread Paolo Bonzini
On 19/11/2014 09:51, Ard Biesheuvel wrote: On 17 November 2014 15:58, Ard Biesheuvel ard.biesheu...@linaro.org wrote: Readonly memslots are often used to implement emulation of ROMs and NOR flashes, in which case the guest may legally map these regions as uncached. To deal with the

Re: [PATCH 3/3] arm, arm64: KVM: handle potential incoherency of readonly memslots

2014-11-19 Thread Paolo Bonzini
On 19/11/2014 09:51, Ard Biesheuvel wrote: On 17 November 2014 15:58, Ard Biesheuvel ard.biesheu...@linaro.org wrote: Readonly memslots are often used to implement emulation of ROMs and NOR flashes, in which case the guest may legally map these regions as uncached. To deal with the

Payment

2014-11-19 Thread Finance Department
Dear Recipient, You have been awarded the sum of 8,000,000.00 (Eight Million Pounds sterling) with reference number 77100146 by office of the ministry of finance UK.Send us your personal details to deliver your funds. Gloria Peter -- To unsubscribe from this list: send the line unsubscribe

Re: [PATCH 3/3] arm/arm64: Enable Dirty Page logging for ARMv8 move log read, tlb flush to generic code

2014-11-19 Thread Christoffer Dall
Hi Mario, On Fri, Nov 07, 2014 at 12:51:39PM -0800, Mario Smarduch wrote: On 11/07/2014 12:20 PM, Christoffer Dall wrote: On Thu, Oct 09, 2014 at 07:34:07PM -0700, Mario Smarduch wrote: This patch enables ARMv8 dirty page logging and unifies ARMv7/ARMv8 code. Signed-off-by: Mario

Re: [RFC PATCH 0/6] ARM64: KVM: PMU infrastructure support

2014-11-19 Thread Christoffer Dall
On Tue, Nov 11, 2014 at 02:48:25PM +0530, Anup Patel wrote: Hi All, I have second thoughts about rebasing KVM PMU patches to Marc's irq-forwarding patches. The PMU IRQs (when virtualized by KVM) are not exactly forwarded IRQs because they are shared between Host and Guest. Scenario1

[PATCH 1/6] KVM: x86: Revert NoBigReal patch in the emulator

2014-11-19 Thread Nadav Amit
Commit 10e38fc7cab6 (KVM: x86: Emulator flag for instruction that only support 16-bit addresses in real mode) introduced NoBigReal for instructions such as MONITOR. Apparetnly, the Intel SDM description that led to this patch is misleading. Since no instruction is using NoBigReal, it is safe to

[PATCH 3/6] KVM: x86: Emulator performs privilege checks on __linearize

2014-11-19 Thread Nadav Amit
When segment is accessed, real hardware does not perform any privilege level checks. In contrast, KVM emulator does. This causes some discrepencies from real hardware. For instance, reading from readable code segment may fail due to incorrect segment checks. In addition, it introduces unnecassary

[PATCH 0/6] KVM: x86: __linearize emulator fixes and minor cleanup

2014-11-19 Thread Nadav Amit
This patch-set fixes 4 bugs in the __linearize emulator function, and makes some cleanup of the function. Patches 2 to 5 deal with separate bugs. Patch 1 and 6 introduce minor enhancement and have no functional implications. The first patch reverts a patch which was written by this patch author.

[PATCH 2/6] KVM: x86: Stack size is overridden by __linearize

2014-11-19 Thread Nadav Amit
When performing segmented-read/write in the emulator for stack operations, it ignores the stack size, and uses the ad_bytes as indication for the pointer size. As a result, a wrong address may be accessed. To fix this behavior, we can remove the masking of address in __linearize and perform it

[PATCH 4/6] KVM: x86: Perform limit checks when assigning EIP

2014-11-19 Thread Nadav Amit
If branch (e.g., jmp, ret) causes limit violations, since the target IP limit, the #GP exception occurs before the branch. In other words, the RIP pushed on the stack should be that of the branch and not that of the target. To do so, we can call __linearize, with new EIP, which also saves us

[PATCH 6/6] KVM: x86: Move __linearize masking of la into switch

2014-11-19 Thread Nadav Amit
In __linearize there is check of the condition whether to check if masking of the linear address is needed. It occurs immediately after switch that evaluates the same condition. Merge them. Signed-off-by: Nadav Amit na...@cs.technion.ac.il --- arch/x86/kvm/emulate.c | 3 +-- 1 file changed, 1

[PATCH 5/6] KVM: x86: Non-canonical access using SS should cause #SS

2014-11-19 Thread Nadav Amit
When SS is used using a non-canonical address, an #SS exception is generated on real hardware. KVM emulator causes a #GP instead. Fix it to behave as real x86 CPU. Signed-off-by: Nadav Amit na...@cs.technion.ac.il --- arch/x86/kvm/emulate.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)

Re: [PATCH 2/6] KVM: x86: Stack size is overridden by __linearize

2014-11-19 Thread Paolo Bonzini
On 19/11/2014 16:43, Nadav Amit wrote: When performing segmented-read/write in the emulator for stack operations, it ignores the stack size, and uses the ad_bytes as indication for the pointer size. As a result, a wrong address may be accessed. To fix this behavior, we can remove the

[PATCH] KVM: emulator: remove code duplication in register_address{,_increment}

2014-11-19 Thread Paolo Bonzini
register_address has been a duplicate of address_mask ever since the ancestor of __linearize was born in 90de84f50b42 (KVM: x86 emulator: preserve an operand's segment identity, 2010-11-17). However, we can put it to a better use by including the call to reg_read in register_address. Similarly,

[PATCH] KVM: emulate: remove duplicated limit check

2014-11-19 Thread Paolo Bonzini
The check on the higher limit of the segment, and the check on the maximum accessible size, is the same for both expand-up and expand-down segments. Only the computation of lim varies. Signed-off-by: Paolo Bonzini pbonz...@redhat.com --- arch/x86/kvm/emulate.c | 13 - 1 file

Re: [PATCH] x86: Remove Fix Mes in emulate.c from needing fault addresses

2014-11-19 Thread Paolo Bonzini
On 19/11/2014 13:48, Nicholas Krause wrote: Removes fix me comments for needing fault addresses to be returned in certain functions if they fail as they are stored and included in this file via the \ header file,paging_tmpl.h. KVM: x86: Remove FIXMEs in emulate.c Remove fixme

Re: [PATCH 0/6] KVM: x86: __linearize emulator fixes and minor cleanup

2014-11-19 Thread Paolo Bonzini
On 19/11/2014 16:43, Nadav Amit wrote: This patch-set fixes 4 bugs in the __linearize emulator function, and makes some cleanup of the function. Patches 2 to 5 deal with separate bugs. Patch 1 and 6 introduce minor enhancement and have no functional implications. The first patch reverts

Re: [PATCH 00/17] RFC: userfault v2

2014-11-19 Thread Andrea Arcangeli
Hi Zhang, On Fri, Oct 31, 2014 at 09:26:09AM +0800, zhanghailiang wrote: On 2014/10/30 20:49, Dr. David Alan Gilbert wrote: * zhanghailiang (zhang.zhanghaili...@huawei.com) wrote: On 2014/10/30 1:46, Andrea Arcangeli wrote: Hi Zhanghailiang, On Mon, Oct 27, 2014 at 05:32:51PM +0800,

Re: [PATCH 3/3] arm/arm64: Enable Dirty Page logging for ARMv8 move log read, tlb flush to generic code

2014-11-19 Thread Mario Smarduch
On 11/19/2014 06:39 AM, Christoffer Dall wrote: Hi Mario, On Fri, Nov 07, 2014 at 12:51:39PM -0800, Mario Smarduch wrote: On 11/07/2014 12:20 PM, Christoffer Dall wrote: On Thu, Oct 09, 2014 at 07:34:07PM -0700, Mario Smarduch wrote: This patch enables ARMv8 dirty page logging and unifies

[PATCH] KVM: ia64: remove

2014-11-19 Thread Paolo Bonzini
KVM for ia64 has been marked as broken not just once, but twice even, and the last patch from the maintainer is now roughly 5 years old. Time for it to rest in piece. Signed-off-by: Paolo Bonzini pbonz...@redhat.com --- The patch was edited to keep its size decent, by dropping all

Re: [PATCH] KVM: PPC: Book3S HV: Tracepoints for KVM HV guest interactions

2014-11-19 Thread Suresh E. Warrier
On 11/14/2014 04:56 AM, Alexander Graf wrote: Am 14.11.2014 um 00:29 schrieb Suresh E. Warrier warr...@linux.vnet.ibm.com: This patch adds trace points in the guest entry and exit code and also for exceptions handled by the host in kernel mode - hypercalls and page faults. The new

Re: [PATCH 3/3] arm, arm64: KVM: handle potential incoherency of readonly memslots

2014-11-19 Thread Mario Smarduch
Hi Laszlo, couple observations. I'm wondering if access from qemu and guest won't result in mixed memory attributes and if that's acceptable to the CPU. Also is if you update memory from qemu you may break dirty page logging/migration. Unless there is some other way you keep track. Of

Re: [PATCH] KVM: ia64: remove

2014-11-19 Thread Chen, Tiejun
On 2014/11/20 5:05, Paolo Bonzini wrote: KVM for ia64 has been marked as broken not just once, but twice even, and the last patch from the maintainer is now roughly 5 years old. Time for it to rest in piece. Signed-off-by: Paolo Bonzini pbonz...@redhat.com --- I think we also need to sync

[question] lots of interrupts injected to vm when pressing some key w/o releasing

2014-11-19 Thread Zhang Haoyu
Hi all, If I press the one of Insert/Delete/Home/End/PageUp/PageDown/UpArrow/ DownArrow/LeftArrow/RightArrow key w/o releasing, then lots of interrupts will be injected to vm(win7/win2008), about 8000/s, the system become very slow, bringing very bad experience. But the other keys are okay. And,

Re: [PATCH 00/17] RFC: userfault v2

2014-11-19 Thread zhanghailiang
On 2014/11/20 2:49, Andrea Arcangeli wrote: Hi Zhang, On Fri, Oct 31, 2014 at 09:26:09AM +0800, zhanghailiang wrote: On 2014/10/30 20:49, Dr. David Alan Gilbert wrote: * zhanghailiang (zhang.zhanghaili...@huawei.com) wrote: On 2014/10/30 1:46, Andrea Arcangeli wrote: Hi Zhanghailiang, On

RE: [PATCH 02/13] KVM: Initialize VT-d Posted-Interrtups Descriptor

2014-11-19 Thread Wu, Feng
-Original Message- From: Jiang Liu [mailto:jiang@linux.intel.com] Sent: Tuesday, November 11, 2014 9:36 PM To: Wu, Feng; g...@kernel.org; pbonz...@redhat.com; dw...@infradead.org; j...@8bytes.org; t...@linutronix.de; mi...@redhat.com; h...@zytor.com; x...@kernel.org Cc:

Re: [PATCH 02/13] KVM: Initialize VT-d Posted-Interrtups Descriptor

2014-11-19 Thread Jiang Liu
On 2014/11/20 12:53, Wu, Feng wrote: -Original Message- snit + /* +* Initialize Posted-Interrupt Descriptor +*/ + + pi_clear_sn(vmx-pi_desc); + vmx-pi_desc.nv = POSTED_INTR_VECTOR; + + /* Physical mode for Notificaiton Event */ + vmx-pi_desc.ndm = 0; +

Re: [question] lots of interrupts injected to vm when pressing some key w/o releasing

2014-11-19 Thread Paolo Bonzini
On 20/11/2014 03:20, Zhang Haoyu wrote: Hi all, If I press the one of Insert/Delete/Home/End/PageUp/PageDown/UpArrow/ DownArrow/LeftArrow/RightArrow key w/o releasing, then lots of interrupts will be injected to vm(win7/win2008), about 8000/s, the system become very slow, bringing very

Re: [PATCH] KVM: ia64: remove

2014-11-19 Thread Paolo Bonzini
On 20/11/2014 02:16, Chen, Tiejun wrote: On 2014/11/20 5:05, Paolo Bonzini wrote: KVM for ia64 has been marked as broken not just once, but twice even, and the last patch from the maintainer is now roughly 5 years old. Time for it to rest in piece. Signed-off-by: Paolo Bonzini

Re: [question] lots of interrupts injected to vm when pressing somekey w/o releasing

2014-11-19 Thread Zhang Haoyu
On 20/11/2014 03:20, Zhang Haoyu wrote: Hi all, If I press the one of Insert/Delete/Home/End/PageUp/PageDown/UpArrow/ DownArrow/LeftArrow/RightArrow key w/o releasing, then lots of interrupts will be injected to vm(win7/win2008), about 8000/s, the system become very slow, bringing very

Re: [question] lots of interrupts injected to vm when pressing somekey w/o releasing

2014-11-19 Thread Gleb Natapov
On Thu, Nov 20, 2014 at 02:59:36PM +0800, Zhang Haoyu wrote: On 20/11/2014 03:20, Zhang Haoyu wrote: Hi all, If I press the one of Insert/Delete/Home/End/PageUp/PageDown/UpArrow/ DownArrow/LeftArrow/RightArrow key w/o releasing, then lots of interrupts will be injected to

[RFC Patch V1] genirq: Introduce irq_set_vcpu_affinity() to target an interrupt to a VCPU

2014-11-19 Thread Jiang Liu
With Posted-Interrupts support in Intel CPU and IOMMU, an external interrupt from assigned-devices could be directly delivered to a virtual CPU in a virtual machine. Instead of hacking KVM and Intel IOMMU drivers, we propose a platform independent interface to target an interrupt to a specific

Re: [PATCH] KVM: ia64: remove

2014-11-19 Thread Gleb Natapov
On Wed, Nov 19, 2014 at 10:05:43PM +0100, Paolo Bonzini wrote: KVM for ia64 has been marked as broken not just once, but twice even, and the last patch from the maintainer is now roughly 5 years old. Time for it to rest in piece. Acked-by: Gleb Natapov g...@kernel.org Next step is to move

Re: [PATCH] KVM: PPC: Book3S HV: Tracepoints for KVM HV guest interactions

2014-11-19 Thread Suresh E. Warrier
On 11/14/2014 04:56 AM, Alexander Graf wrote: Am 14.11.2014 um 00:29 schrieb Suresh E. Warrier warr...@linux.vnet.ibm.com: This patch adds trace points in the guest entry and exit code and also for exceptions handled by the host in kernel mode - hypercalls and page faults. The new