Re: [PATCH 2/3] arm/arm64: speed up spinlocks and atomic ops

2015-06-29 Thread Andrew Jones
On Mon, Jun 29, 2015 at 12:28:32PM +0200, Christoffer Dall wrote: On Thu, Jun 25, 2015 at 06:12:18PM +0200, Andrew Jones wrote: spinlock torture tests made it clear that checking mmu_enabled() every time we call spin_lock is a bad idea. why a bad idea? Does it break, is it slow? Just

Re: [PATCH 2/3] arm/arm64: speed up spinlocks and atomic ops

2015-06-29 Thread Christoffer Dall
On Mon, Jun 29, 2015 at 12:44:27PM +0200, Andrew Jones wrote: On Mon, Jun 29, 2015 at 12:28:32PM +0200, Christoffer Dall wrote: On Thu, Jun 25, 2015 at 06:12:18PM +0200, Andrew Jones wrote: spinlock torture tests made it clear that checking mmu_enabled() every time we call spin_lock is a

RE: [v4 08/16] KVM: kvm-vfio: User API for IRQ forwarding

2015-06-29 Thread Wu, Feng
-Original Message- From: Alex Williamson [mailto:alex.william...@redhat.com] Sent: Friday, June 19, 2015 4:04 AM To: Wu, Feng Cc: Eric Auger; Avi Kivity; kvm@vger.kernel.org; linux-ker...@vger.kernel.org; pbonz...@redhat.com; mtosa...@redhat.com; Joerg Roedel Subject: Re: [v4

Re: [PATCH] kvmtool: don't use PCI config space IRQ line field

2015-06-29 Thread Andre Przywara
Hi Will, On 29/06/15 11:10, Will Deacon wrote: Hi Andre, On Thu, Jun 18, 2015 at 06:19:53PM +0100, Andre Przywara wrote: I am tempted to remove shmem, since it's broken: a) there is no upstream driver, only some out-of-tree uio driver module in some Github repo Right, but that's the

Re: [PATCH 0/3] KVM: arm: Implement software vGICv2 emulation

2015-06-29 Thread Christoffer Dall
On Mon, Jun 29, 2015 at 4:11 PM, Andre Przywara andre.przyw...@arm.com wrote: Hi, On 29/06/15 13:52, Christoffer Dall wrote: Hi Pavel, [Please cc the kvm/arm list for such patches according to the MAINTAINERS file in the future] On Mon, Jun 29, 2015 at 12:53:46PM +0300, Pavel Fedin wrote:

[Bug 100661] New: kernel panic in vmx_vcpu_run

2015-06-29 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=100661 Bug ID: 100661 Summary: kernel panic in vmx_vcpu_run Product: Virtualization Version: unspecified Kernel Version: 4.1.0+ Hardware: All OS: Linux Tree:

Re: [PATCH 0/3] KVM: arm: Implement software vGICv2 emulation

2015-06-29 Thread Andre Przywara
Hi, On 29/06/15 13:52, Christoffer Dall wrote: Hi Pavel, [Please cc the kvm/arm list for such patches according to the MAINTAINERS file in the future] On Mon, Jun 29, 2015 at 12:53:46PM +0300, Pavel Fedin wrote: Some hardware (like Raspberry Pi 2) is capable of running KVM, however lacks

[Bug 100661] kernel panic in vmx_vcpu_run

2015-06-29 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=100661 --- Comment #1 from Lidong Chen jemmy858...@gmail.com --- Created attachment 181311 -- https://bugzilla.kernel.org/attachment.cgi?id=181311action=edit objdump result -- You are receiving this mail because: You are watching the assignee of the

Re: [PATCH 3/3] KVM: arm: Enable vGICv2 software emulation

2015-06-29 Thread Marc Zyngier
On 29/06/15 13:37, Pavel Fedin wrote: Hello! Hold on a second. In your cover letter, your saying RPi-2. The RPi-2 doesn't have a GIC at all, so I'd really like to know *how* you end-up in the GICv2 probe function? I'm not on RPi-2. I am on some Samsung's proprietary hardware which

Re: [PATCH 0/3] KVM: arm: Implement software vGICv2 emulation

2015-06-29 Thread Christoffer Dall
Hi Pavel, [Please cc the kvm/arm list for such patches according to the MAINTAINERS file in the future] On Mon, Jun 29, 2015 at 12:53:46PM +0300, Pavel Fedin wrote: Some hardware (like Raspberry Pi 2) is capable of running KVM, however lacks functional vGIC registers. This series introduces

[Bug 100661] kernel panic in vmx_vcpu_run

2015-06-29 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=100661 --- Comment #2 from Lidong Chen jemmy858...@gmail.com --- i think the stack is broken. so the rsi value is error. vcpu-arch.regs_avail = ~((1 VCPU_REGS_RIP) | (1 VCPU_REGS_RSP) bf8d: 48 8b 75 98 mov

RE: [PATCH 3/3] KVM: arm: Enable vGICv2 software emulation

2015-06-29 Thread Pavel Fedin
Hello! Hold on a second. In your cover letter, your saying RPi-2. The RPi-2 doesn't have a GIC at all, so I'd really like to know *how* you end-up in the GICv2 probe function? I'm not on RPi-2. I am on some Samsung's proprietary hardware which suffers from this problem. Actually it has

RE: [v4 08/16] KVM: kvm-vfio: User API for IRQ forwarding

2015-06-29 Thread Wu, Feng
-Original Message- From: Joerg Roedel [mailto:j...@8bytes.org] Sent: Monday, June 29, 2015 5:23 PM To: Wu, Feng Cc: Alex Williamson; Eric Auger; Avi Kivity; kvm@vger.kernel.org; linux-ker...@vger.kernel.org; pbonz...@redhat.com; mtosa...@redhat.com Subject: Re: [v4 08/16] KVM:

[Bug 100671] New: vmwrite error in vmx_vcpu_run

2015-06-29 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=100671 Bug ID: 100671 Summary: vmwrite error in vmx_vcpu_run Product: Virtualization Version: unspecified Kernel Version: 4.1.0+ Hardware: Intel OS: Linux Tree:

Re: [PATCH 1/3] arm/arm64: spinlocks: fix memory barriers

2015-06-29 Thread Christoffer Dall
On Thu, Jun 25, 2015 at 06:12:17PM +0200, Andrew Jones wrote: It shouldn't be necessary to use a barrier on the way into spin_lock. We'll be focused on a single address until we get it (exclusively) set, and then we'll do a barrier on the way out. Also, it does make sense to do a barrier on

Re: [PATCH 2/3] arm/arm64: speed up spinlocks and atomic ops

2015-06-29 Thread Christoffer Dall
On Thu, Jun 25, 2015 at 06:12:18PM +0200, Andrew Jones wrote: spinlock torture tests made it clear that checking mmu_enabled() every time we call spin_lock is a bad idea. why a bad idea? Does it break, is it slow? As most tests will want the MMU enabled the entire time, then just hard code

Re: [PATCH 0/3] KVM: arm: Implement software vGICv2 emulation

2015-06-29 Thread Marc Zyngier
Hi Pavel, On 29/06/15 10:53, Pavel Fedin wrote: Some hardware (like Raspberry Pi 2) is capable of running KVM, however lacks functional vGIC registers. This series introduces software vGIC emulation for such machines, allowing to fully use virtualization capabilities I'm really not keen on

Re: [v4 08/16] KVM: kvm-vfio: User API for IRQ forwarding

2015-06-29 Thread Joerg Roedel
On Mon, Jun 29, 2015 at 09:14:54AM +, Wu, Feng wrote: Do you mean updating the hardware IRTEs for all the entries in the irq routing table, no matter whether it is the updated one? Right, that's what I mean. It seems wrong to me to work around the API interface by creating a diff between

[PATCH 1/3] KVM: arm: Add basic infrastructure for software vGIC emulation

2015-06-29 Thread Pavel Fedin
Two main functions (vgic_get_pending_irq() and vgic_clear_pending_irq()) are responsible for ACK and EOI respectively. Maintenance code path refactored in order to accommodate these changes. The main problem is that __kvm_vgic_sync_hwstate() is called before I/O emulation takes place, therefore

[PATCH 0/3] KVM: arm: Implement software vGICv2 emulation

2015-06-29 Thread Pavel Fedin
Some hardware (like Raspberry Pi 2) is capable of running KVM, however lacks functional vGIC registers. This series introduces software vGIC emulation for such machines, allowing to fully use virtualization capabilities Pavel Fedin (3): KVM: arm: Add basic infrastructure for software vGIC

[PATCH 2/3] KVM: arm: Introduce software emulation of vGICv2 CPU interface

2015-06-29 Thread Pavel Fedin
The emulation code is activated by setting params-vcpu_base to zero Signed-off-by: Pavel Fedin p.fe...@samsung.com --- include/kvm/arm_vgic.h | 1 + virt/kvm/arm/vgic-v2-emul.c | 60 - 2 files changed, 55 insertions(+), 6 deletions(-) diff --git

[PATCH 3/3] KVM: arm: Enable vGICv2 software emulation

2015-06-29 Thread Pavel Fedin
The emulation code is automatically enabled when one of vGIC resources is missing from the device tree Signed-off-by: Pavel Fedin p.fe...@samsung.com --- virt/kvm/arm/vgic-v2.c | 29 ++--- virt/kvm/arm/vgic.c| 10 ++ 2 files changed, 20 insertions(+), 19

Re: [PATCH] kvmtool: Add parameter to specifiy number of threads in thread_pool

2015-06-29 Thread Andreas Herrmann
On Mon, Jun 29, 2015 at 10:45:03AM +0100, Will Deacon wrote: On Mon, Jun 29, 2015 at 08:45:44AM +0100, Andreas Herrmann wrote: With current code the number of threads added to the thread_pool equals number of online CPUs. Thus on an OcteonIII cn78xx system we usually have 48 threads per

[PATCH] KVM: x86: remove data variable from kvm_get_msr_common

2015-06-29 Thread Nicolas Iooss
Commit 609e36d372ad (KVM: x86: pass host_initiated to functions that read MSRs) modified kvm_get_msr_common function to use msr_info-data instead of data but missed one occurrence. Replace it and remove the unused local variable. Fixes: 609e36d372ad (KVM: x86: pass host_initiated to functions

Re: [PATCH] kvmtool: Add parameter to specifiy number of threads in thread_pool

2015-06-29 Thread Will Deacon
On Mon, Jun 29, 2015 at 08:45:44AM +0100, Andreas Herrmann wrote: With current code the number of threads added to the thread_pool equals number of online CPUs. Thus on an OcteonIII cn78xx system we usually have 48 threads per guest just for the thread_pool. IMHO this is overkill for guests

[PATCH v2] kvmtool: Add parameter to specifiy number of threads in thread_pool

2015-06-29 Thread Andreas Herrmann
With current code the number of threads added to the thread_pool equals number of online CPUs. So on cn78xx we usually have 48 threads per guest just for the thread_pool. IMHO this is overkill for guests that just have a few vCPUs and/or if a guest is pinned to a subset of host CPUs. E.g. #

Re: [PATCH 3/3] KVM: arm: Enable vGICv2 software emulation

2015-06-29 Thread Marc Zyngier
On 29/06/15 10:53, Pavel Fedin wrote: The emulation code is automatically enabled when one of vGIC resources is missing from the device tree Hold on a second. In your cover letter, your saying RPi-2. The RPi-2 doesn't have a GIC at all, so I'd really like to know *how* you end-up in the GICv2

[PATCH 1/1] KVM: s390: virtio-ccw: don't overwrite config space values

2015-06-29 Thread Christian Borntraeger
From: Cornelia Huck cornelia.h...@de.ibm.com Eric noticed problems with vhost-scsi and virtio-ccw: vhost-scsi complained about overwriting values in the config space, which was triggered by a broken implementation of virtio-ccw's config get/set routines. It was probably sheer luck that we did not

[PATCH 0/1] KVM: s390: virtio-ccw: Fix config space values

2015-06-29 Thread Christian Borntraeger
Paolo, here is fix targetted for kvm/master (4.2) that fixes an issue with virtio config space on s390. It mostly manifests in vhost-scsi not working properly on s390. The problem itself might affect other things as well so cc stable/target 4.2. @Michael FYI, sending this via Paolo as most

Re: [PATCH 02/13] KVM: extend struct kvm_msi to hold a 32-bit device ID

2015-06-29 Thread Andre Przywara
Hi Christoffer, thanks for your time to reviewing this! Was probably no pleasure ;-) On 28/06/15 20:12, Christoffer Dall wrote: On Fri, May 29, 2015 at 10:53:18AM +0100, Andre Przywara wrote: The ARM GICv3 ITS MSI controller requires a device ID to be able to assign the proper interrupt

Re: [PATCH 0/3] KVM: arm: Implement software vGICv2 emulation

2015-06-29 Thread Marc Zyngier
On 29/06/15 15:11, Andre Przywara wrote: Hi, On 29/06/15 13:52, Christoffer Dall wrote: Hi Pavel, [Please cc the kvm/arm list for such patches according to the MAINTAINERS file in the future] On Mon, Jun 29, 2015 at 12:53:46PM +0300, Pavel Fedin wrote: Some hardware (like Raspberry Pi

[PATCH 0/7] KVM: arm/arm64: gsi routing support

2015-06-29 Thread Eric Auger
With the advent of GICv3 ITS in-kernel emulation, KVM GSI routing appears to be requested. More specifically MSI routing is needed. irqchip routing does not sound to be really useful on arm but usage of MSI routing also mandates to integrate irqchip routing. The initial implementation of irqfd on

Re: [PATCH v3 01/11] KVM: arm: plug guest debug exploit

2015-06-29 Thread Christoffer Dall
On Mon, Jun 22, 2015 at 06:41:24PM +0800, Zhichao Huang wrote: Hardware debugging in guests is not intercepted currently, it means that a malicious guest can bring down the entire machine by writing to the debug registers. This patch enable trapping of all debug registers, preventing the

Re: [PATCH 02/13] KVM: extend struct kvm_msi to hold a 32-bit device ID

2015-06-29 Thread Christoffer Dall
On Mon, Jun 29, 2015 at 03:53:12PM +0100, Andre Przywara wrote: Hi Christoffer, thanks for your time to reviewing this! Was probably no pleasure ;-) On 28/06/15 20:12, Christoffer Dall wrote: On Fri, May 29, 2015 at 10:53:18AM +0100, Andre Przywara wrote: The ARM GICv3 ITS MSI

Re: [v4 08/16] KVM: kvm-vfio: User API for IRQ forwarding

2015-06-29 Thread Alex Williamson
On Mon, 2015-06-29 at 13:27 +, Wu, Feng wrote: -Original Message- From: Alex Williamson [mailto:alex.william...@redhat.com] Sent: Friday, June 19, 2015 4:04 AM To: Wu, Feng Cc: Eric Auger; Avi Kivity; kvm@vger.kernel.org; linux-ker...@vger.kernel.org;

[PATCH 7/7] KVM: arm: implement kvm_set_msi by gsi direct mapping

2015-06-29 Thread Eric Auger
If the ITS modality is not available, let's simply support MSI injection by transforming the MSI.data into an SPI ID. This becomes possible to use KVM_SIGNAL_MSI ioctl for arm too. Signed-off-by: Eric Auger eric.au...@linaro.org --- arch/arm/kvm/Kconfig | 1 + virt/kvm/arm/vgic.c | 5 + 2

[PATCH 3/7] KVM: irqchip: convey devid to kvm_set_msi

2015-06-29 Thread Eric Auger
on ARM, a devid field is conveyed in kvm_msi struct. Let's choose the routing type and struct according to its availability and fill the corresponding struct. Also remove the flag check now this latter can be non null. Signed-off-by: Eric Auger eric.au...@linaro.org --- virt/kvm/irqchip.c | 18

[PATCH 4/7] KVM: arm/arm64: enable irqchip routing

2015-06-29 Thread Eric Auger
This patch adds compilation and link against irqchip. On ARM, irqchip routing is not really useful since there is a single irqchip. However main motivation behind using irqchip code is to enable MSI routing code. With the support of in-kernel GICv3 ITS emulation, it now seems to be a MUST HAVE

[PATCH 5/7] KVM: arm/arm64: build a default routing table

2015-06-29 Thread Eric Auger
Implement a default routing table made of flat irqchip routing entries (gsi = irqchip.pin) covering the VGIC SPI indexes. This routing table is overwritten by the first user-space call to KVM_SET_GSI_ROUTING ioctl. Signed-off-by: Eric Auger eric.au...@linaro.org --- PATCH: creation ---

[PATCH 6/7] KVM: arm/arm64: enable MSI routing

2015-06-29 Thread Eric Auger
Up to now, only irqchip routing entries could be set. This patch adds the capability to insert MSI routing entries, extended or standard ones. Although standard MSI entries can be set, their injection still is not supported. For ARM64, let's also increase KVM_MAX_IRQ_ROUTES to 4096: include SPI

[PATCH 1/7] KVM: api: add kvm_irq_routing_extended_msi

2015-06-29 Thread Eric Auger
On ARM, the MSI msg (address and data) comes along with out-of-band device ID information. The device ID encodes the device that composes the MSI msg. Let's create a new routing entry type, dubbed KVM_IRQ_ROUTING_EXTENDED_MSI and use the __u32 pad space to convey the device ID. Signed-off-by:

[PATCH 2/7] KVM: kvm_host: add kvm_extended_msi

2015-06-29 Thread Eric Auger
Add a new kvm_extended_msi struct to store the additional device ID specific to ARM. kvm_kernel_irq_routing_entry union now encompasses this new struct. Signed-off-by: Eric Auger eric.au...@linaro.org --- RFC - PATCH: - reword the commit message after change in first patch (uapi) ---

Re: [RFC PATCH] KVM: arm/arm64: Don't let userspace update CNTVOFF once guest is running

2015-06-29 Thread Claudio Fontana
On 26.06.2015 06:49, Jan Kiszka wrote: On 2015-06-25 11:25, Claudio Fontana wrote: On 25.06.2015 11:10, Peter Maydell wrote: On 25 June 2015 at 09:59, Claudio Fontana claudio.font...@huawei.com wrote: Once the VM is created, I think QEMU should not request kvm to change the virtual offset

Re: [RFC PATCH] KVM: arm/arm64: Don't let userspace update CNTVOFF once guest is running

2015-06-29 Thread Peter Maydell
On 29 June 2015 at 18:20, Claudio Fontana claudio.font...@huawei.com wrote: On 26.06.2015 06:49, Jan Kiszka wrote: QEMU has the concept of write-back levels: KVM_PUT_RUNTIME_STATE, KVM_PUT_RESET_STATE and KVM_PUT_FULL_STATE. I suspect this registers is just sorted into the wrong category, thus

Re: [PATCH] arm64/kvm: Add generic v8 KVM target

2015-06-29 Thread Peter Maydell
On 29 June 2015 at 18:30, Marc Zyngier marc.zyng...@arm.com wrote: On 29/06/15 18:13, Chalamarla, Tirumalesh wrote: Will this also prevents migrating between same implementations, if no how is this identified. This shouldn't. It is pretty easy to look at the incoming guest's MIDR, and verify

Re: [PATCH] arm64/kvm: Add generic v8 KVM target

2015-06-29 Thread Marc Zyngier
On 29/06/15 18:38, Peter Maydell wrote: On 29 June 2015 at 18:30, Marc Zyngier marc.zyng...@arm.com wrote: On 29/06/15 18:13, Chalamarla, Tirumalesh wrote: Will this also prevents migrating between same implementations, if no how is this identified. This shouldn't. It is pretty easy to look

Re: [PATCH] arm64/kvm: Add generic v8 KVM target

2015-06-29 Thread Marc Zyngier
On 29/06/15 18:13, Chalamarla, Tirumalesh wrote: On Jun 26, 2015, at 2:53 AM, Christoffer Dall christoffer.d...@linaro.org wrote: On Thu, Jun 25, 2015 at 02:49:08PM +0100, Peter Maydell wrote: On 25 June 2015 at 14:44, Marc Zyngier marc.zyng...@arm.com wrote: It should always be possible

Re: [PATCH] kvmtool: don't use PCI config space IRQ line field

2015-06-29 Thread Will Deacon
Hi Andre, On Thu, Jun 18, 2015 at 06:19:53PM +0100, Andre Przywara wrote: I am tempted to remove shmem, since it's broken: a) there is no upstream driver, only some out-of-tree uio driver module in some Github repo Right, but that's the same for qemu and we've already made the jump of merging

Re: [Bug 100671] New: vmwrite error in vmx_vcpu_run

2015-06-29 Thread Bandan Das
bugzilla-dae...@bugzilla.kernel.org writes: Can you please provide a little bit more information ? When does the write error happen and what guest/host are you running ? If it's a regression, would it be possible for you to bisect it ? Is Bug 100661 related to the same hardware ? Bandan

Re: [PATCH] arm64/kvm: Add generic v8 KVM target

2015-06-29 Thread Chalamarla, Tirumalesh
On Jun 29, 2015, at 10:52 AM, Marc Zyngier marc.zyng...@arm.com wrote: On 29/06/15 18:38, Peter Maydell wrote: On 29 June 2015 at 18:30, Marc Zyngier marc.zyng...@arm.com wrote: On 29/06/15 18:13, Chalamarla, Tirumalesh wrote: Will this also prevents migrating between same implementations,

Re: [PATCH] arm64/kvm: Add generic v8 KVM target

2015-06-29 Thread Chalamarla, Tirumalesh
On Jun 26, 2015, at 2:53 AM, Christoffer Dall christoffer.d...@linaro.org wrote: On Thu, Jun 25, 2015 at 02:49:08PM +0100, Peter Maydell wrote: On 25 June 2015 at 14:44, Marc Zyngier marc.zyng...@arm.com wrote: It should always be possible to emulate a known CPU on a generic host, and it

Re: [PATCH v3 06/11] KVM: arm: add trap handlers for 32-bit debug registers

2015-06-29 Thread Christoffer Dall
On Mon, Jun 22, 2015 at 06:41:29PM +0800, Zhichao Huang wrote: Add handlers for all the 32-bit debug registers. Signed-off-by: Zhichao Huang zhichao.hu...@linaro.org --- arch/arm/include/asm/kvm_asm.h | 12 arch/arm/include/asm/kvm_host.h | 3 + arch/arm/kernel/asm-offsets.c |

[PATCH] kvmtool: Add parameter to specifiy number of threads in thread_pool

2015-06-29 Thread Andreas Herrmann
With current code the number of threads added to the thread_pool equals number of online CPUs. Thus on an OcteonIII cn78xx system we usually have 48 threads per guest just for the thread_pool. IMHO this is overkill for guests that just have a few vCPUs and/or if a guest is pinned to a subset of

Re: vfio: powerpc/spapr: One function call less in tce_iommu_attach_group() after kzalloc() failure

2015-06-29 Thread SF Markus Elfring
tcegrp will be NULL and kfree() can handle this just fine The affected function did not show this API knowledge, did it? (is not it the whole point of this patchset - remove the check and just call kfree() even if the pointer is NULL?). Partly, yes. And if you wanted another label, I

[PATCH] kvmtool, mips: Support more than 256 MB guest memory

2015-06-29 Thread Andreas Herrmann
Two guest memory regions need to be defined and two mem= parameters need to be passed to guest kernel to support more than 256 MB. Signed-off-by: Andreas Herrmann andreas.herrm...@caviumnetworks.com --- mips/include/kvm/kvm-arch.h | 10 ++ mips/kvm.c | 36

How to map a guest kernel page non-readable?

2015-06-29 Thread Asia Slowinska
Hello, My host is an x86-64 with EPT enabled, my guest is 32b. I'd like to observe all read accesses to a kernel guest page. I thought of mapping this page unreadable, and then monitor tdp_page_fault() to catch accesses to the interesting guest page. According to the Intel manual (Table 28-6,

RE: [v4 08/16] KVM: kvm-vfio: User API for IRQ forwarding

2015-06-29 Thread Wu, Feng
-Original Message- From: Joerg Roedel [mailto:j...@8bytes.org] Sent: Monday, June 29, 2015 5:06 PM To: Wu, Feng Cc: Alex Williamson; Eric Auger; Avi Kivity; kvm@vger.kernel.org; linux-ker...@vger.kernel.org; pbonz...@redhat.com; mtosa...@redhat.com Subject: Re: [v4 08/16] KVM:

Re: [v4 08/16] KVM: kvm-vfio: User API for IRQ forwarding

2015-06-29 Thread Joerg Roedel
Hi Feng, On Thu, Jun 25, 2015 at 09:11:52AM -0600, Alex Williamson wrote: So the trouble is that QEMU vfio updates a single MSI vector, but that just updates a single entry within a whole table of routes, then the whole table is pushed to KVM. But in kvm_set_irq_routing() we have access to

[Bug 100671] vmwrite error in vmx_vcpu_run

2015-06-29 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=100671 --- Comment #2 from Lidong Chen jemmy858...@gmail.com --- When does the write error happen and what guest/host are you running ? this error happen when the guest os is booting. the guest os kernel verison is also 4.1.0+. If it's a regression,

Re: vfio: powerpc/spapr: One function call less in tce_iommu_attach_group() after kzalloc() failure

2015-06-29 Thread Alexey Kardashevskiy
On 06/29/2015 04:02 PM, SF Markus Elfring wrote: tcegrp will be NULL and kfree() can handle this just fine The affected function did not show this API knowledge, did it? but you fixed this in 1/2 :) (is not it the whole point of this patchset - remove the check and just call kfree()

[Bug 100671] vmwrite error in vmx_vcpu_run

2015-06-29 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=100671 Bandan Das b...@makefile.in changed: What|Removed |Added CC||b...@makefile.in ---

Re: [PATCH v3 04/11] KVM: arm: common infrastructure for handling AArch32 CP14/CP15

2015-06-29 Thread Christoffer Dall
On Mon, Jun 22, 2015 at 06:41:27PM +0800, Zhichao Huang wrote: As we're about to trap a bunch of CP14 registers, let's rework the CP15 handling so it can be generalized and work with multiple tables. Signed-off-by: Zhichao Huang zhichao.hu...@linaro.org --- arch/arm/kvm/coproc.c