Re: enabling X86_FEATURE_ARCH_PERFMON in guest

2010-08-01 Thread Avi Kivity
On 07/30/2010 08:02 PM, David S. Ahern wrote: How do I get X86_FEATURE_ARCH_PERFMON enabled for a guest? I've tried -cpu host,+perfmon and -cpu host,+arch_perfmon, but both get rejected with an error: CPU feature perfmon not found qemu doesn't know about the perfmon feature bits. Even if

Re: [RFC PATCH v8 00/16] Provide a zero-copy method on KVM virtio-net.

2010-08-01 Thread Avi Kivity
On 07/30/2010 06:46 PM, Shirley Ma wrote: Hello Avi, On Fri, 2010-07-30 at 08:02 +0300, Avi Kivity wrote: get_user_pages() is indeed slow. But what about get_user_pages_fast()? Note that when the page is first touched, get_user_pages_fast() falls back to get_user_pages(), so the latency

Re: [PATCH 1/2] KVM: x86 emulator: don't update vcpu state if instruction is restarted.

2010-08-01 Thread Gleb Natapov
On Sat, Jul 31, 2010 at 08:25:13PM +0300, Avi Kivity wrote: On 07/29/2010 03:11 PM, Gleb Natapov wrote: No need to update vcpu state since instruction is in the middle of the emulation. Signed-off-by: Gleb Natapovg...@redhat.com --- arch/x86/kvm/x86.c | 31

Re: [RFC PATCH v8 00/16] Provide a zero-copy method on KVM virtio-net.

2010-08-01 Thread Michael S. Tsirkin
On Thu, Jul 29, 2010 at 03:31:22PM -0700, Shirley Ma wrote: I did some vhost performance measurement over 10Gb ixgbe, and found that in order to get consistent BW results, netperf/netserver, qemu, vhost threads smp affinities are required. Could you provide an example of a good setup?

Re: [PATCH] vhost: locking/rcu cleanup

2010-08-01 Thread Michael S. Tsirkin
On Fri, Jul 30, 2010 at 04:49:54PM +0200, Tejun Heo wrote: Hello, On 07/29/2010 02:23 PM, Michael S. Tsirkin wrote: I saw WARN_ON(!list_empty(dev-work_list)) trigger so our custom flush is not as airtight as need be. Could be but it's also possible that something has queued something

Re: [PATCH 1/2] KVM: x86 emulator: don't update vcpu state if instruction is restarted.

2010-08-01 Thread Avi Kivity
On 08/01/2010 11:28 AM, Gleb Natapov wrote: On Sat, Jul 31, 2010 at 08:25:13PM +0300, Avi Kivity wrote: On 07/29/2010 03:11 PM, Gleb Natapov wrote: No need to update vcpu state since instruction is in the middle of the emulation. Signed-off-by: Gleb Natapovg...@redhat.com ---

Re: [PATCH repost] sched: export sched_set/getaffinity to modules

2010-08-01 Thread Michael S. Tsirkin
On Fri, Jul 30, 2010 at 04:19:01PM +0200, Oleg Nesterov wrote: Sorry for the delay, I can't be responsive these days... On 07/27, Michael S. Tsirkin wrote: On Mon, Jul 26, 2010 at 08:08:34PM +0200, Oleg Nesterov wrote: On 07/26, Sridhar Samudrala wrote: I have been testing out a

Re: [PATCH 1/2] KVM: x86 emulator: don't update vcpu state if instruction is restarted.

2010-08-01 Thread Gleb Natapov
On Sun, Aug 01, 2010 at 11:54:38AM +0300, Avi Kivity wrote: On 08/01/2010 11:28 AM, Gleb Natapov wrote: On Sat, Jul 31, 2010 at 08:25:13PM +0300, Avi Kivity wrote: On 07/29/2010 03:11 PM, Gleb Natapov wrote: No need to update vcpu state since instruction is in the middle of the emulation.

Re: [PATCH 1/2] KVM: x86 emulator: don't update vcpu state if instruction is restarted.

2010-08-01 Thread Avi Kivity
On 08/01/2010 12:01 PM, Gleb Natapov wrote: It uses rip _during_ pio. And pio emulation changes rip only at the end of emulation. But non-emulated pio does a skip_emulated_instruction() immediately (or so the code in kvm-tpr-opt.c assumes: Indeed, this is bug in non-emulated pio. But

Re: [PATCH 1/2] KVM: x86 emulator: don't update vcpu state if instruction is restarted.

2010-08-01 Thread Gleb Natapov
On Sun, Aug 01, 2010 at 12:14:40PM +0300, Avi Kivity wrote: On 08/01/2010 12:01 PM, Gleb Natapov wrote: It uses rip _during_ pio. And pio emulation changes rip only at the end of emulation. But non-emulated pio does a skip_emulated_instruction() immediately (or so the code in kvm-tpr-opt.c

Re: [PATCH 1/2] KVM: x86 emulator: don't update vcpu state if instruction is restarted.

2010-08-01 Thread Avi Kivity
On 08/01/2010 12:24 PM, Gleb Natapov wrote: On Sun, Aug 01, 2010 at 12:14:40PM +0300, Avi Kivity wrote: On 08/01/2010 12:01 PM, Gleb Natapov wrote: It uses rip _during_ pio. And pio emulation changes rip only at the end of emulation. But non-emulated pio does a skip_emulated_instruction()

Re: [PATCH 1/2] KVM: x86 emulator: don't update vcpu state if instruction is restarted.

2010-08-01 Thread Gleb Natapov
On Sun, Aug 01, 2010 at 01:00:11PM +0300, Avi Kivity wrote: On 08/01/2010 12:24 PM, Gleb Natapov wrote: On Sun, Aug 01, 2010 at 12:14:40PM +0300, Avi Kivity wrote: On 08/01/2010 12:01 PM, Gleb Natapov wrote: It uses rip _during_ pio. And pio emulation changes rip only at the end of

Re: [PATCH 1/2] KVM: x86 emulator: don't update vcpu state if instruction is restarted.

2010-08-01 Thread Avi Kivity
On 08/01/2010 01:53 PM, Gleb Natapov wrote: That requires everyone to update, or suffer major breakage. They will suffer major breakage when they update to a kvm that calls to kvm-tpr-opt.c from emulator anyway. Why? IIRC it was always this way in emulator. I'd rather fix userspace than

Re: [PATCH 1/2] KVM: x86 emulator: don't update vcpu state if instruction is restarted.

2010-08-01 Thread Gleb Natapov
On Sun, Aug 01, 2010 at 03:17:10PM +0300, Avi Kivity wrote: On 08/01/2010 01:53 PM, Gleb Natapov wrote: That requires everyone to update, or suffer major breakage. They will suffer major breakage when they update to a kvm that calls to kvm-tpr-opt.c from emulator anyway. Why? Because

Re: [PATCH 1/2] KVM: x86 emulator: don't update vcpu state if instruction is restarted.

2010-08-01 Thread Avi Kivity
On 08/01/2010 03:23 PM, Gleb Natapov wrote: On Sun, Aug 01, 2010 at 03:17:10PM +0300, Avi Kivity wrote: On 08/01/2010 01:53 PM, Gleb Natapov wrote: That requires everyone to update, or suffer major breakage. They will suffer major breakage when they update to a kvm that calls to

Re: [PATCH 1/2] KVM: x86 emulator: don't update vcpu state if instruction is restarted.

2010-08-01 Thread Gleb Natapov
On Sun, Aug 01, 2010 at 03:35:41PM +0300, Avi Kivity wrote: On 08/01/2010 03:23 PM, Gleb Natapov wrote: On Sun, Aug 01, 2010 at 03:17:10PM +0300, Avi Kivity wrote: On 08/01/2010 01:53 PM, Gleb Natapov wrote: That requires everyone to update, or suffer major breakage. They will suffer

Re: [PATCH 00/27] KVM PPC PV framework v3

2010-08-01 Thread Avi Kivity
On 07/29/2010 03:47 PM, Alexander Graf wrote: On PPC we run PR=0 (kernel mode) code in PR=1 (user mode) and don't use the hypervisor extensions. While that is all great to show that virtualization is possible, there are quite some cases where the emulation overhead of privileged instructions

Re: [PATCH 4/7] KVM: PPC: Add book3s_32 tlbie flush acceleration

2010-08-01 Thread Avi Kivity
On 07/29/2010 04:04 PM, Alexander Graf wrote: On Book3s_32 the tlbie instruction flushed effective addresses by the mask 0x0000. This is pretty hard to reflect with a hash that hashes ~0xfff, so to speed up that target we should also keep a special hash around for it. static inline u64

Re: [PATCH 0/7] Rest of my KVM-PPC patch queue

2010-08-01 Thread Avi Kivity
On 07/29/2010 04:04 PM, Alexander Graf wrote: During the past few weeks a couple of fixes have gathered in my queue. This is a dump of everything that is not related to the PV framework. Please apply on top of the PV stuff. Looks reasonable as well. I'll apply as soon as I get a review on

[PATCH 00/15] More emulator cleanups

2010-08-01 Thread Avi Kivity
This patchset further cleans up the emulator. The goal is to push segment decoding into 'struct operand', but a few things stood in the way. Avi Kivity (15): KVM: x86 emulator: push segment override out of decode_modrm() KVM: x86 emulator: use correct type for memory address in operands

[PATCH 03/15] KVM: x86 emulator: simplify xchg decode tables

2010-08-01 Thread Avi Kivity
Use X8() to avoid repetition. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/emulate.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index 61d728d..745353e 100644 --- a/arch/x86/kvm/emulate.c +++

[PATCH 04/15] KVM: x86 emulator: use SrcAcc to simplify xchg decoding

2010-08-01 Thread Avi Kivity
Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/emulate.c | 15 --- 1 files changed, 4 insertions(+), 11 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index 745353e..4d510c3 100644 --- a/arch/x86/kvm/emulate.c +++ b/arch/x86/kvm/emulate.c @@

[PATCH 12/15] KVM: x86 emulator: add NoAccess flag for memory instructions that skip access

2010-08-01 Thread Avi Kivity
Use for INVLPG, which accesses the tlb, not memory. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/emulate.c |6 -- 1 files changed, 4 insertions(+), 2 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index 5bc62f2..29312a0 100644 ---

[PATCH 10/15] KVM: x86 emulator: use struct operand for mov reg,cr and mov cr,reg for reg op

2010-08-01 Thread Avi Kivity
This is an ordinary modrm source or destination; use the standard structure representing it. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/emulate.c |9 - 1 files changed, 4 insertions(+), 5 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index

[PATCH 14/15] KVM: x86 emulator: change invlpg emulation to use src.mem.addr

2010-08-01 Thread Avi Kivity
Instead of using modrm_ea, which will soon be gone. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/emulate.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index 46a5d75..de1ed94 100644 ---

[PATCH 15/15] KVM: x86 emulator: Decode memory operands directly into a 'struct operand'

2010-08-01 Thread Avi Kivity
Since modrm operand can be either register or memory, decoding it into a 'struct operand', which can represent both, is simpler. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/include/asm/kvm_emulate.h |3 - arch/x86/kvm/emulate.c | 125

[PATCH 13/15] KVM: x86 emulator: switch LEA to use SrcMem decoding

2010-08-01 Thread Avi Kivity
The NoAccess flag will prevent memory from being accessed. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/emulate.c |4 ++-- 1 files changed, 2 insertions(+), 2 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index 29312a0..46a5d75 100644 ---

[PATCH 11/15] KVM: x86 emulator: use struct operand for mov reg,dr and mov dr,reg for reg op

2010-08-01 Thread Avi Kivity
This is an ordinary modrm source or destination; use the standard structure representing it. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/emulate.c |9 - 1 files changed, 4 insertions(+), 5 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index

[PATCH 09/15] KVM: x86 emulator: mark mov cr and mov dr as 64-bit instructions in long mode

2010-08-01 Thread Avi Kivity
Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/emulate.c |4 ++-- 1 files changed, 2 insertions(+), 2 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index d7d95de..d1a6cd7 100644 --- a/arch/x86/kvm/emulate.c +++ b/arch/x86/kvm/emulate.c @@ -2205,8

[PATCH 08/15] KVM: x86 emulator: introduce Force64 for forcing operand size to 64 bits

2010-08-01 Thread Avi Kivity
Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/emulate.c |3 ++- 1 files changed, 2 insertions(+), 1 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index a114fa9..d7d95de 100644 --- a/arch/x86/kvm/emulate.c +++ b/arch/x86/kvm/emulate.c @@ -83,6 +83,7 @@

[PATCH 06/15] KVM: x86 emulator: drop use_modrm_ea

2010-08-01 Thread Avi Kivity
Unused (and has never been). Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/include/asm/kvm_emulate.h |1 - arch/x86/kvm/emulate.c |1 - 2 files changed, 0 insertions(+), 2 deletions(-) diff --git a/arch/x86/include/asm/kvm_emulate.h

[PATCH 01/15] KVM: x86 emulator: push segment override out of decode_modrm()

2010-08-01 Thread Avi Kivity
Let it compute modrm_seg instead, and have the caller apply it. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/include/asm/kvm_emulate.h |1 + arch/x86/kvm/emulate.c | 10 ++ 2 files changed, 7 insertions(+), 4 deletions(-) diff --git

[PATCH 07/15] KVM: x86 emulator: simplify REX.W check

2010-08-01 Thread Avi Kivity
(x (x y)) == (x y) Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/emulate.c |5 ++--- 1 files changed, 2 insertions(+), 3 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index 2ae2e54..a114fa9 100644 --- a/arch/x86/kvm/emulate.c +++

[PATCH 02/15] KVM: x86 emulator: use correct type for memory address in operands

2010-08-01 Thread Avi Kivity
Currently we use a void pointer for memory addresses. That's wrong since these are guest virtual addresses which are not directly dereferencable by the host. Use the correct type, unsigned long. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/include/asm/kvm_emulate.h |6 ++-

Re: [PATCH 7/24] Understanding guest pointers to vmcs12 structures

2010-08-01 Thread Nadav Har'El
On Tue, Jun 15, 2010, Gleb Natapov wrote about Re: [PATCH 7/24] Understanding guest pointers to vmcs12 structures: +/* + * Decode the memory-address operand of a vmx instruction, according to the + * Intel spec. + */ ... +static gva_t get_vmx_mem_address(struct kvm_vcpu *vcpu, +

Re: [PATCH 7/24] Understanding guest pointers to vmcs12 structures

2010-08-01 Thread Gleb Natapov
On Sun, Aug 01, 2010 at 06:16:59PM +0300, Nadav Har'El wrote: On Tue, Jun 15, 2010, Gleb Natapov wrote about Re: [PATCH 7/24] Understanding guest pointers to vmcs12 structures: +/* + * Decode the memory-address operand of a vmx instruction, according to the + * Intel spec. + */

[PATCH] KVM: x86 emulator: fix LMSW able to clear cr0.pe

2010-08-01 Thread Avi Kivity
LMSW is documented not to be able to set cr0.pe; make it so. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/emulate.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index dc1ecff..05f80f7 100644 ---

Re: virtio module question...

2010-08-01 Thread Avi Kivity
On 07/30/2010 12:13 PM, Vasiliy G Tolstov wrote: Good night or morning If i need to some kvm module, that runs in virtualized environment and reports some statistics to qemu (disk free space, memory usage, cpu utilization) what i need to write? I need kernel module, because userspace

Re: [PATCH 4/7] KVM: PPC: Add book3s_32 tlbie flush acceleration

2010-08-01 Thread Alexander Graf
On 01.08.2010, at 16:08, Avi Kivity wrote: On 07/29/2010 04:04 PM, Alexander Graf wrote: On Book3s_32 the tlbie instruction flushed effective addresses by the mask 0x0000. This is pretty hard to reflect with a hash that hashes ~0xfff, so to speed up that target we should also keep a

Re: [PATCH 00/27] KVM PPC PV framework v3

2010-08-01 Thread Alexander Graf
On 01.08.2010, at 16:02, Avi Kivity wrote: On 07/29/2010 03:47 PM, Alexander Graf wrote: On PPC we run PR=0 (kernel mode) code in PR=1 (user mode) and don't use the hypervisor extensions. While that is all great to show that virtualization is possible, there are quite some cases where the

RE: VT-d regression issue

2010-08-01 Thread Hao, Xudong
Alex Williamson wrote: On Sat, 2010-07-31 at 16:33 +0800, Hao, Xudong wrote: Alex Williamson wrote: On Thu, 2010-07-22 at 16:03 +0300, Gleb Natapov wrote: On Thu, Jul 22, 2010 at 08:32:31PM +0800, Hao, Xudong wrote: Well, this patch works fine for me. Looks like userspace problem then.

Re: Multiplexing RFLAGS.TF

2010-08-01 Thread Jan Kiszka
Am 29.07.2010 10:37, Avi Kivity wrote: static int db_interception(struct vcpu_svm *svm) { struct kvm_run *kvm_run = svm-vcpu.run; if (!(svm-vcpu.guest_debug (KVM_GUESTDBG_SINGLESTEP | KVM_GUESTDBG_USE_HW_BP)) !svm-nmi_singlestep) {

buildbot failure in qemu-kvm on disable_kvm_x86_64_debian_5_0

2010-08-01 Thread qemu-kvm
The Buildbot has detected a new failure of disable_kvm_x86_64_debian_5_0 on qemu-kvm. Full details are available at: http://buildbot.b1-systems.de/qemu-kvm/builders/disable_kvm_x86_64_debian_5_0/builds/489 Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/ Buildslave for this Build:

Disable EPT

2010-08-01 Thread Kuniyasu Suzaki
Hello, Please tell me how to disable EPT of KVM. Can I disable EPT in BIOS menu? I did not find the option in BIOS menu of Intel DX58 (+i7) mother board. Thank you. -- suzaki -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to

buildbot failure in qemu-kvm on disable_kvm_x86_64_out_of_tree

2010-08-01 Thread qemu-kvm
The Buildbot has detected a new failure of disable_kvm_x86_64_out_of_tree on qemu-kvm. Full details are available at: http://buildbot.b1-systems.de/qemu-kvm/builders/disable_kvm_x86_64_out_of_tree/builds/438 Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/ Buildslave for this Build:

buildbot failure in qemu-kvm on disable_kvm_i386_out_of_tree

2010-08-01 Thread qemu-kvm
The Buildbot has detected a new failure of disable_kvm_i386_out_of_tree on qemu-kvm. Full details are available at: http://buildbot.b1-systems.de/qemu-kvm/builders/disable_kvm_i386_out_of_tree/builds/438 Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/ Buildslave for this Build:

RE: Alt SeaBIOS SSDT cpu hotplug

2010-08-01 Thread Liu, Jinsong
Kevin, This patch still has issue, It can boot Windows 2008 DataCenter, however, when run cpu_set cpu online command, windows 2008 Datacenter system shutdown at once. Thanks, Jinsong Sorry about that. It looks like I messed up the SSDT ScopeOp length. New patch attached below. I've

Re: Multiplexing RFLAGS.TF

2010-08-01 Thread Avi Kivity
On 08/02/2010 04:17 AM, Jan Kiszka wrote: So we need an rflags_guest_owned_bits, usually set to -1ULL, but sometimes (NMI, host debugging) clearing EFLAGS_TF. When we do that, we need to intercept instructions that influence RFLAGS.TF (POPF, IRET, INTn) and emulate them. Otherwise, the

[PATCH] KVM: x86 emulator: fix LMSW able to clear cr0.pe

2010-08-01 Thread Avi Kivity
LMSW is documented not to be able to set cr0.pe; make it so. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/emulate.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index dc1ecff..05f80f7 100644 ---

Re: Disable EPT

2010-08-01 Thread pradeepkumar
On Mon, 02 Aug 2010 10:46:13 +0900 (JST) Kuniyasu Suzaki k.suz...@aist.go.jp wrote: Hello, Please tell me how to disable EPT of KVM. Can I disable EPT in BIOS menu? I did not find the option in BIOS menu of Intel DX58 (+i7) mother board. unload kvm_intel.ko module and load it back

[PATCH] Fix memory leak in register save load due to xsave support

2010-08-01 Thread Avi Kivity
Signed-off-by: Avi Kivity a...@redhat.com --- qemu-kvm-x86.c |2 ++ 1 files changed, 2 insertions(+), 0 deletions(-) diff --git a/qemu-kvm-x86.c b/qemu-kvm-x86.c index fd426b7..4c32771 100644 --- a/qemu-kvm-x86.c +++ b/qemu-kvm-x86.c @@ -848,6 +848,7 @@ void kvm_arch_load_regs(CPUState *env,

Re: [PATCH 1/2] KVM: x86 emulator: don't update vcpu state if instruction is restarted.

2010-08-01 Thread Avi Kivity
On 08/01/2010 04:27 PM, Gleb Natapov wrote: When we are going to enable e_i_g_s by default? Optimistically, 2.6.37, so six months. May be we have enough time to fix userspace? Sure we do, but will users update? 0.12 is mature enough that some users will forget about it and not update

Re: Alt SeaBIOS SSDT cpu hotplug

2010-08-01 Thread Kevin O'Connor
On Mon, Aug 02, 2010 at 10:41:39AM +0800, Liu, Jinsong wrote: Kevin, This patch still has issue, It can boot Windows 2008 DataCenter, however, when run cpu_set cpu online command, windows 2008 Datacenter system shutdown at once. Thanks for testing. I've inspected the generated DSDT and

Re: [Qemu-devel] [PATCH] loader: pad kernel size when loaded from a uImage

2010-08-01 Thread Edgar E. Iglesias
On Sat, Jul 31, 2010 at 12:56:42AM +0200, Edgar E. Iglesias wrote: On Thu, Jul 29, 2010 at 06:48:24PM -0700, Hollis Blanchard wrote: The kernel's BSS size is lost by mkimage, which only considers file size. As a result, loading other blobs (e.g. device tree, initrd) immediately after the

Re: [PATCH 4/7] KVM: PPC: Add book3s_32 tlbie flush acceleration

2010-08-01 Thread Avi Kivity
On 07/29/2010 04:04 PM, Alexander Graf wrote: On Book3s_32 the tlbie instruction flushed effective addresses by the mask 0x0000. This is pretty hard to reflect with a hash that hashes ~0xfff, so to speed up that target we should also keep a special hash around for it. static inline u64

Re: [PATCH 0/7] Rest of my KVM-PPC patch queue

2010-08-01 Thread Avi Kivity
On 07/29/2010 04:04 PM, Alexander Graf wrote: During the past few weeks a couple of fixes have gathered in my queue. This is a dump of everything that is not related to the PV framework. Please apply on top of the PV stuff. Looks reasonable as well. I'll apply as soon as I get a review on

Re: [PATCH 4/7] KVM: PPC: Add book3s_32 tlbie flush acceleration

2010-08-01 Thread Alexander Graf
On 01.08.2010, at 16:08, Avi Kivity wrote: On 07/29/2010 04:04 PM, Alexander Graf wrote: On Book3s_32 the tlbie instruction flushed effective addresses by the mask 0x0000. This is pretty hard to reflect with a hash that hashes ~0xfff, so to speed up that target we should also keep a

Re: [PATCH 00/27] KVM PPC PV framework v3

2010-08-01 Thread Alexander Graf
On 01.08.2010, at 16:02, Avi Kivity wrote: On 07/29/2010 03:47 PM, Alexander Graf wrote: On PPC we run PR=0 (kernel mode) code in PR=1 (user mode) and don't use the hypervisor extensions. While that is all great to show that virtualization is possible, there are quite some cases where the