RE: [PATCH] KVM: Split up MSI-X assigned device IRQ handler

2011-09-13 Thread Tian, Kevin
From: Jan Kiszka Sent: Tuesday, September 13, 2011 12:58 AM The threaded IRQ handler for MSI-X has almost nothing in common with the INTx/MSI handler. Move its code into a dedicated handler. if it's desired to further go down this cleanup path, there's also no need to register ack notifier

Re: [Qemu-devel] About hotplug multifunction

2011-09-13 Thread Gleb Natapov
On Tue, Sep 13, 2011 at 02:57:20PM +0900, Isaku Yamahata wrote: On Sun, Sep 11, 2011 at 12:05:17PM +0300, Michael S. Tsirkin wrote: On Sat, Sep 10, 2011 at 02:43:11AM +0900, Isaku Yamahata wrote: pci/pcie hot plug needs clean up for multifunction hotplug in long term. Only single function

Re: [Qemu-devel] About hotplug multifunction

2011-09-13 Thread Isaku Yamahata
On Tue, Sep 13, 2011 at 09:52:49AM +0300, Gleb Natapov wrote: On Tue, Sep 13, 2011 at 02:57:20PM +0900, Isaku Yamahata wrote: On Sun, Sep 11, 2011 at 12:05:17PM +0300, Michael S. Tsirkin wrote: On Sat, Sep 10, 2011 at 02:43:11AM +0900, Isaku Yamahata wrote: pci/pcie hot plug needs clean

Re: [PATCH] KVM: Split up MSI-X assigned device IRQ handler

2011-09-13 Thread Jan Kiszka
On 2011-09-13 08:40, Tian, Kevin wrote: From: Jan Kiszka Sent: Tuesday, September 13, 2011 12:58 AM The threaded IRQ handler for MSI-X has almost nothing in common with the INTx/MSI handler. Move its code into a dedicated handler. if it's desired to further go down this cleanup path,

RE: [PATCH] KVM: Split up MSI-X assigned device IRQ handler

2011-09-13 Thread Tian, Kevin
From: Jan Kiszka [mailto:jan.kis...@siemens.com] Sent: Tuesday, September 13, 2011 3:30 PM On 2011-09-13 08:40, Tian, Kevin wrote: From: Jan Kiszka Sent: Tuesday, September 13, 2011 12:58 AM The threaded IRQ handler for MSI-X has almost nothing in common with the INTx/MSI handler.

[PATCH 00/14] Emulator decode generalization

2011-09-13 Thread Avi Kivity
- merge dst/src/src2 decode - generalize %seg embedded in opcode decode plus a fix. Avi Kivity (14): KVM: x86 emulator: fix Src2CL decode KVM: x86 emulator: convert group 3 instructions to direct decode KVM: x86 emulator: move memop, memopp into emulation context KVM: x86 emulator: split

[PATCH 03/14] KVM: x86 emulator: move memop, memopp into emulation context

2011-09-13 Thread Avi Kivity
Simplifies further generalization of decode. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/include/asm/kvm_emulate.h |2 ++ arch/x86/kvm/emulate.c | 34 +- 2 files changed, 19 insertions(+), 17 deletions(-) diff --git

[PATCH 01/14] KVM: x86 emulator: fix Src2CL decode

2011-09-13 Thread Avi Kivity
Src2CL decode (used for double width shifts) erronously decodes only bit 3 of %rcx, instead of bits 7:0. Fix by decoding %cl in its entirety. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/emulate.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git

[PATCH 06/14] KVM: x86 emulator: switch src2 to generic decode_operand()

2011-09-13 Thread Avi Kivity
Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/emulate.c | 51 --- 1 files changed, 26 insertions(+), 25 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index 8c65ff2..88d32fc 100644 --- a/arch/x86/kvm/emulate.c

[PATCH 14/14] KVM: x86 emulator: convert push %sreg/pop %sreg to direct decode

2011-09-13 Thread Avi Kivity
Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/emulate.c | 44 +++- 1 files changed, 15 insertions(+), 29 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index bd3e488..f1e3be1 100644 --- a/arch/x86/kvm/emulate.c +++

[PATCH 12/14] KVM: x86 emulator: streamline decode of segment registers

2011-09-13 Thread Avi Kivity
The opcodes push %seg pop %seg l%seg, %mem, %reg (e.g. lds/les/lss/lfs/lgs) all have an segment register encoded in the instruction. To allow reuse, decode the segment number into src2 during the decode stage instead of the execution stage. Signed-off-by: Avi Kivity a...@redhat.com ---

[PATCH 10/14] KVM: x86 emulator: switch src decode to decode_operand()

2011-09-13 Thread Avi Kivity
Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/emulate.c | 156 +++ 1 files changed, 63 insertions(+), 93 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index 17a8910..e46809b 100644 --- a/arch/x86/kvm/emulate.c

[PATCH 13/14] KVM: x86 emulator: switch lds/les/lss/lfs/lgs to direct decode

2011-09-13 Thread Avi Kivity
Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/emulate.c | 22 +++--- 1 files changed, 7 insertions(+), 15 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index ab48611..bd3e488 100644 --- a/arch/x86/kvm/emulate.c +++

[PATCH 07/14] KVM: x86 emulator: free up some flag bits near src, dst

2011-09-13 Thread Avi Kivity
Op fields are going to grow by a bit, we need two free bits. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/emulate.c |8 1 files changed, 4 insertions(+), 4 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index 88d32fc..00e0904 100644 ---

[PATCH 11/14] KVM: x86 emulator: simplify OpMem64 decode

2011-09-13 Thread Avi Kivity
Use the same technique as the other OpMem variants, and goto mem_common. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/emulate.c |9 - 1 files changed, 4 insertions(+), 5 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index e46809b..1c95935

[PATCH 05/14] KVM: x86 emulator: expand decode flags to 64 bits

2011-09-13 Thread Avi Kivity
Unifiying the operands means not taking advantage of the fact that some operand types can only go into certain operands (for example, DI can only be used by the destination), so we need more bits to hold the operand type. Signed-off-by: Avi Kivity a...@redhat.com ---

[PATCH 08/14] KVM: x86 emulator: switch OpImmUByte decode to decode_imm()

2011-09-13 Thread Avi Kivity
Similar to SrcImmUByte. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/emulate.c |5 + 1 files changed, 1 insertions(+), 4 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index 00e0904..a0d6ceb 100644 --- a/arch/x86/kvm/emulate.c +++

[PATCH 04/14] KVM: x86 emulator: split dst decode to a generic decode_operand()

2011-09-13 Thread Avi Kivity
Instead of decoding each operand using its own code, use a generic function. Start with the destination operand. Signed-off-by: Avi Kivity a...@redhat.com --- arch/x86/kvm/emulate.c | 146 --- 1 files changed, 87 insertions(+), 59 deletions(-) diff

[PATCH 09/14] KVM: x86 emulator: qualify OpReg inhibit_byte_regs hack

2011-09-13 Thread Avi Kivity
OpReg decoding has a hack that inhibits byte registers for movsx and movzx instructions. It should be replaced by something better, but meanwhile, qualify that the hack is only active for the destination operand. Note these instructions only use OpReg for the destination, but better to be

[PATCH kvm-unit-tests] emulator: test shld, shrd

2011-09-13 Thread Avi Kivity
Used to be broken in multiple ways. Signed-off-by: Avi Kivity a...@redhat.com --- x86/emulator.c | 11 +++ 1 files changed, 11 insertions(+), 0 deletions(-) diff --git a/x86/emulator.c b/x86/emulator.c index d4f0363..73079f8 100644 --- a/x86/emulator.c +++ b/x86/emulator.c @@ -642,6

Re: [PATCH v3 01/11] KVM: MMU: avoid pte_list_desc running out in kvm_mmu_pte_write

2011-09-13 Thread Avi Kivity
On 08/30/2011 05:34 AM, Xiao Guangrong wrote: kvm_mmu_pte_write is unsafe since we need to alloc pte_list_desc in the function when spte is prefetched, unfortunately, we can not know how many spte need to be prefetched on this path, that means we can use out of the free pte_list_desc object in

Re: [Qemu-devel] About hotplug multifunction

2011-09-13 Thread Michael S. Tsirkin
On Tue, Sep 13, 2011 at 09:52:49AM +0300, Gleb Natapov wrote: On Tue, Sep 13, 2011 at 02:57:20PM +0900, Isaku Yamahata wrote: On Sun, Sep 11, 2011 at 12:05:17PM +0300, Michael S. Tsirkin wrote: On Sat, Sep 10, 2011 at 02:43:11AM +0900, Isaku Yamahata wrote: pci/pcie hot plug needs clean

Re: [Qemu-devel] About hotplug multifunction

2011-09-13 Thread Gleb Natapov
On Tue, Sep 13, 2011 at 01:05:00PM +0300, Michael S. Tsirkin wrote: On Tue, Sep 13, 2011 at 09:52:49AM +0300, Gleb Natapov wrote: On Tue, Sep 13, 2011 at 02:57:20PM +0900, Isaku Yamahata wrote: On Sun, Sep 11, 2011 at 12:05:17PM +0300, Michael S. Tsirkin wrote: On Sat, Sep 10, 2011 at

Re: [PATCH 3/3] iommu/core: split mapping to page sizes as supported by the hardware

2011-09-13 Thread Roedel, Joerg
On Wed, Sep 07, 2011 at 02:53:24PM -0400, Ohad Ben-Cohen wrote: drivers/iommu/amd_iommu.c | 20 ++- drivers/iommu/intel-iommu.c | 20 ++- drivers/iommu/iommu.c | 129 +++ drivers/iommu/msm_iommu.c |8 ++-

Re: [PATCH v3 01/11] KVM: MMU: avoid pte_list_desc running out in kvm_mmu_pte_write

2011-09-13 Thread Xiao Guangrong
On 09/13/2011 05:51 PM, Avi Kivity wrote: On 08/30/2011 05:34 AM, Xiao Guangrong wrote: kvm_mmu_pte_write is unsafe since we need to alloc pte_list_desc in the function when spte is prefetched, unfortunately, we can not know how many spte need to be prefetched on this path, that means we can

Re: [PATCH 3/3] iommu/core: split mapping to page sizes as supported by the hardware

2011-09-13 Thread Roedel, Joerg
On Tue, Sep 13, 2011 at 06:34:23AM -0400, Ohad Ben-Cohen wrote: Hi Joerg, On Tue, Sep 13, 2011 at 1:10 PM, Roedel, Joerg joerg.roe...@amd.com wrote: Please split this patch into the core-change and patches for the individual iommu-drivers and post this as a seperate patch-set. But we'll

Re: [PATCH v3 05/11] KVM: MMU: do not mark accessed bit on pte write path

2011-09-13 Thread Avi Kivity
On 08/30/2011 05:35 AM, Xiao Guangrong wrote: In current code, the accessed bit is always set when page fault occurred, do not need to set it on pte write path What about speculative sptes that are then only accessed via emulation? -- error compiling committee.c: too many arguments to

Re: [PATCH v3 06/11] KVM: MMU: cleanup FNAME(invlpg)

2011-09-13 Thread Avi Kivity
On 08/30/2011 05:36 AM, Xiao Guangrong wrote: Directly Use mmu_page_zap_pte to zap spte in FNAME(invlpg), also remove the same code between FNAME(invlpg) and FNAME(sync_page) +static gpa_t FNAME(get_first_pte_gpa)(struct kvm_mmu_page *sp) spte +{ + int offset = 0; + + if

Re: [PATCH v3 11/11] KVM: MMU: improve write flooding detected

2011-09-13 Thread Avi Kivity
On 08/30/2011 05:38 AM, Xiao Guangrong wrote: Detecting write-flooding does not work well, when we handle page written, if the last speculative spte is not accessed, we treat the page is write-flooding, however, we can speculative spte on many path, such as pte prefetch, page synced, that means

Re: About hotplug multifunction

2011-09-13 Thread Amos Kong
Hi all, After reading the pci driver code, I found a problem. There is a list for each slot, (slot-funcs) it will be inited in acpiphp_glue.c:register_slot() before hotpluging device, and only one entry(func 0) will be added to it, no new entry will be added to the list when hotpluging devices

Re: [PATCH 3/3] iommu/core: split mapping to page sizes as supported by the hardware

2011-09-13 Thread Ohad Ben-Cohen
On Tue, Sep 13, 2011 at 1:44 PM, Roedel, Joerg joerg.roe...@amd.com wrote: Not necessarily. You could implement this side-by-side with the old code until all drivers are converted and remove the old code then. This keeps bisectability. Ok. Intel IOMMU does not support arbitrary page-sizes,

[PATCH] qemu-kvm: Fix build without VNC support

2011-09-13 Thread Boris Dolgov
Hello! Qemu-kvm 0.15.0 doesn't build with vnc support disabled. The following patch fixes the problem: Signed-off-by: Boris Dolgov bo...@dolgov.name - monitor.c~ 2011-08-09 12:40:29.0 + +++ monitor.c 2011-09-13 13:02:40.0 + @@ -1221,10 +1221,12 @@ static int

[PATCH] KVM: PPC: Fix build failure with HV KVM and CBE

2011-09-13 Thread Alexander Graf
When running with HV KVM and CBE config options enabled, I get build failures like the following: arch/powerpc/kernel/head_64.o: In function `cbe_system_error_hv': (.text+0x1228): undefined reference to `do_kvm_0x1202' arch/powerpc/kernel/head_64.o: In function `cbe_maintenance_hv':

Re: About hotplug multifunction

2011-09-13 Thread Amos Kong
- Original Message - Hi all, I've tested with WinXp guest, the multifunction hotplug works. After reading the pci driver code, I found a problem. There is a list for each slot, (slot-funcs) it will be inited in acpiphp_glue.c:register_slot() before hotpluging device, and only one

[PATCH 1/2] KVM: emulate lapic tsc deadline timer for guest

2011-09-13 Thread Liu, Jinsong
From 7b12021e1d1b79797b49e41cc0a7be05a6180d9a Mon Sep 17 00:00:00 2001 From: Liu, Jinsong jinsong@intel.com Date: Tue, 13 Sep 2011 21:52:54 +0800 Subject: [PATCH] KVM: emulate lapic tsc deadline timer for guest This patch emulate lapic tsc deadline timer for guest: Enumerate tsc deadline

[PATCH 2/2] Qemu co-operation with kvm tsc deadline timer

2011-09-13 Thread Liu, Jinsong
From c1b502d6548fcc41592cd90acc82109ee949df75 Mon Sep 17 00:00:00 2001 From: Liu, Jinsong jinsong@intel.com Date: Tue, 13 Sep 2011 22:05:30 +0800 Subject: [PATCH] Qemu co-operation with kvm tsc deadline timer KVM add emulation of lapic tsc deadline timer for guest. This patch is co-operation

Re: [PATCH 02/10] Driver core: Add iommu_ops to bus_type

2011-09-13 Thread Roedel, Joerg
Hi Greg, On Wed, Sep 07, 2011 at 03:44:45PM -0400, Greg KH wrote: The IOMMUs are usually devices on the bus itself, so they are initialized after the bus is set up and the devices on it are populated. So the function can not be called on bus initialization because the IOMMU is not

Re: [PATCH 02/10] Driver core: Add iommu_ops to bus_type

2011-09-13 Thread Greg KH
On Tue, Sep 13, 2011 at 04:54:02PM +0200, Roedel, Joerg wrote: --- a/include/linux/device.h +++ b/include/linux/device.h @@ -22,6 +22,7 @@ #include linux/types.h #include linux/module.h #include linux/pm.h +#include linux/iommu.h Ick, please don't add new #includes to device.h, it makes

Re: [PATCH 2/2] Qemu co-operation with kvm tsc deadline timer

2011-09-13 Thread Jan Kiszka
On 2011-09-13 16:38, Liu, Jinsong wrote: From c1b502d6548fcc41592cd90acc82109ee949df75 Mon Sep 17 00:00:00 2001 From: Liu, Jinsong jinsong@intel.com Date: Tue, 13 Sep 2011 22:05:30 +0800 Subject: [PATCH] Qemu co-operation with kvm tsc deadline timer KVM add emulation of lapic tsc

Re: [PATCH 02/10] Driver core: Add iommu_ops to bus_type

2011-09-13 Thread Roedel, Joerg
On Tue, Sep 13, 2011 at 10:58:55AM -0400, Greg KH wrote: On Tue, Sep 13, 2011 at 04:54:02PM +0200, Roedel, Joerg wrote: --- a/include/linux/device.h +++ b/include/linux/device.h @@ -22,6 +22,7 @@ #include linux/types.h #include linux/module.h #include linux/pm.h +#include

Re: [PATCH 02/10] Driver core: Add iommu_ops to bus_type

2011-09-13 Thread Roedel, Joerg
On Tue, Sep 13, 2011 at 10:58:55AM -0400, Greg KH wrote: On Tue, Sep 13, 2011 at 04:54:02PM +0200, Roedel, Joerg wrote: --- a/include/linux/device.h +++ b/include/linux/device.h @@ -22,6 +22,7 @@ #include linux/types.h #include linux/module.h #include linux/pm.h +#include

Re: [PATCH 02/10] Driver core: Add iommu_ops to bus_type

2011-09-13 Thread Greg KH
On Tue, Sep 13, 2011 at 05:38:11PM +0200, Roedel, Joerg wrote: On Tue, Sep 13, 2011 at 10:58:55AM -0400, Greg KH wrote: On Tue, Sep 13, 2011 at 04:54:02PM +0200, Roedel, Joerg wrote: --- a/include/linux/device.h +++ b/include/linux/device.h @@ -22,6 +22,7 @@ #include linux/types.h

Re: [PATCH] kvm-tool: remove addr_type - unused but set variable

2011-09-13 Thread Pekka Enberg
On Wed, Sep 7, 2011 at 9:48 PM, Hagen Paul Pfeifer ha...@jauu.net wrote: Signed-off-by: Hagen Paul Pfeifer ha...@jauu.net Cc: Sasha Levin levinsasha...@gmail.com Applied, thanks! -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to

Re: [PATCH v3 03/11] KVM: x86: retry non-page-table writing instruction

2011-09-13 Thread Xiao Guangrong
On 09/13/2011 06:47 PM, Avi Kivity wrote: On 08/30/2011 05:35 AM, Xiao Guangrong wrote: If the emulation is caused by #PF and it is non-page_table writing instruction, it means the VM-EXIT is caused by shadow page protected, we can zap the shadow page and retry this instruction directly

Re: [PATCH v3 05/11] KVM: MMU: do not mark accessed bit on pte write path

2011-09-13 Thread Xiao Guangrong
On 09/13/2011 06:53 PM, Avi Kivity wrote: On 08/30/2011 05:35 AM, Xiao Guangrong wrote: In current code, the accessed bit is always set when page fault occurred, do not need to set it on pte write path What about speculative sptes that are then only accessed via emulation? The gfn is read

Re: [PATCH v3 06/11] KVM: MMU: cleanup FNAME(invlpg)

2011-09-13 Thread Xiao Guangrong
On 09/13/2011 07:00 PM, Avi Kivity wrote: On 08/30/2011 05:36 AM, Xiao Guangrong wrote: Directly Use mmu_page_zap_pte to zap spte in FNAME(invlpg), also remove the same code between FNAME(invlpg) and FNAME(sync_page) +static gpa_t FNAME(get_first_pte_gpa)(struct kvm_mmu_page *sp) spte

Re: [PATCH 08/13] xen/pvticketlock: disable interrupts while blocking

2011-09-13 Thread Don Zickus
On Wed, Sep 07, 2011 at 08:09:37PM +0300, Avi Kivity wrote: But then the downside here is we accidentally handle an NMI that was latched. This would cause a 'Dazed on confused' message as that NMI was already handled by the previous NMI. We are working on an algorithm to detect this

Re: [PATCH 08/13] xen/pvticketlock: disable interrupts while blocking

2011-09-13 Thread Andi Kleen
So I got around to implementing this and it seems to work great. The back to back NMIs are detected properly using the %rip and that info is passed to the NMI notifier. That info is used to determine if only the first handler to report 'handled' is executed or _all_ the handlers are

Re: [PATCH v3 11/11] KVM: MMU: improve write flooding detected

2011-09-13 Thread Xiao Guangrong
On 09/13/2011 07:07 PM, Avi Kivity wrote: On 08/30/2011 05:38 AM, Xiao Guangrong wrote: Detecting write-flooding does not work well, when we handle page written, if the last speculative spte is not accessed, we treat the page is write-flooding, however, we can speculative spte on many path,

Re: [PATCH 08/13] xen/pvticketlock: disable interrupts while blocking

2011-09-13 Thread Don Zickus
On Tue, Sep 13, 2011 at 09:03:20PM +0200, Andi Kleen wrote: So I got around to implementing this and it seems to work great. The back to back NMIs are detected properly using the %rip and that info is passed to the NMI notifier. That info is used to determine if only the first handler to

Re: [PATCH v3 01/11] KVM: MMU: avoid pte_list_desc running out in kvm_mmu_pte_write

2011-09-13 Thread Xiao Guangrong
On 09/13/2011 06:50 PM, Avi Kivity wrote: On 09/13/2011 01:24 PM, Xiao Guangrong wrote: On 09/13/2011 05:51 PM, Avi Kivity wrote: On 08/30/2011 05:34 AM, Xiao Guangrong wrote: kvm_mmu_pte_write is unsafe since we need to alloc pte_list_desc in the function when spte is prefetched,

[PATCH v2 1/6] iommu/core: split mapping to page sizes as supported by the hardware

2011-09-13 Thread Ohad Ben-Cohen
When mapping a memory region, split it to page sizes as supported by the iommu hardware. Always prefer bigger pages, when possible, in order to reduce the TLB pressure. The logic to do that is now added to the IOMMU core, so neither the iommu drivers themselves nor users of the IOMMU API have to

Re: [PATCH 08/13] xen/pvticketlock: disable interrupts while blocking

2011-09-13 Thread Don Zickus
On Tue, Sep 13, 2011 at 09:03:20PM +0200, Andi Kleen wrote: So I got around to implementing this and it seems to work great. The back to back NMIs are detected properly using the %rip and that info is passed to the NMI notifier. That info is used to determine if only the first handler to

Re: [PATCH 08/13] xen/pvticketlock: disable interrupts while blocking

2011-09-13 Thread Andi Kleen
Or are you saying an NMI in an idle system will have the same %rip thus falsely detecting a back-to-back NMI? Yup. Another problem is very long running instructions, like WBINVD and some others. If there's a high frequency NMI it may well hit multiple times in a single instance. -Andi --

Re: [PATCH 0/4] Avoid soft lockup message when KVM is stopped by host

2011-09-13 Thread Eric B Munson
On Fri, 09 Sep 2011, Marcelo Tosatti wrote: On Thu, Sep 01, 2011 at 02:27:49PM -0600, emun...@mgebm.net wrote: On Thu, 01 Sep 2011 14:24:12 -0500, Anthony Liguori wrote: On 08/30/2011 07:26 AM, Marcelo Tosatti wrote: On Mon, Aug 29, 2011 at 05:27:11PM -0600, Eric B Munson wrote:

Re: [PATCH 08/13] xen/pvticketlock: disable interrupts while blocking

2011-09-13 Thread Andi Kleen
On Tue, Sep 13, 2011 at 04:53:18PM -0400, Don Zickus wrote: On Tue, Sep 13, 2011 at 09:58:38PM +0200, Andi Kleen wrote: Or are you saying an NMI in an idle system will have the same %rip thus falsely detecting a back-to-back NMI? Yup. Hmm. That sucks. Is there another register

RE: [PATCH 2/2] Qemu co-operation with kvm tsc deadline timer

2011-09-13 Thread Liu, Jinsong
Jan Kiszka wrote: On 2011-09-13 16:38, Liu, Jinsong wrote: From c1b502d6548fcc41592cd90acc82109ee949df75 Mon Sep 17 00:00:00 2001 From: Liu, Jinsong jinsong@intel.com Date: Tue, 13 Sep 2011 22:05:30 +0800 Subject: [PATCH] Qemu co-operation with kvm tsc deadline timer KVM add

[PATCH] pci: clean all funcs when hot-removing multifunc device

2011-09-13 Thread Amos Kong
CC: kvm@vger.kernel.org - Original Message - 'slot-funcs' is initialized in acpiphp_glue.c:register_slot() before hotpluging device, and only one entry(func 0) is added to it, no new entry will be added to the list when hotpluging devices to the slot. When we release the whole device,

[PATCH] KVM: PPC: Fix build failure with HV KVM and CBE

2011-09-13 Thread Alexander Graf
When running with HV KVM and CBE config options enabled, I get build failures like the following: arch/powerpc/kernel/head_64.o: In function `cbe_system_error_hv': (.text+0x1228): undefined reference to `do_kvm_0x1202' arch/powerpc/kernel/head_64.o: In function `cbe_maintenance_hv':

Re: [PATCH 0/4] Avoid soft lockup message when KVM is stopped by host

2011-09-13 Thread Eric B Munson
On Fri, 09 Sep 2011, Marcelo Tosatti wrote: On Thu, Sep 01, 2011 at 02:27:49PM -0600, emun...@mgebm.net wrote: On Thu, 01 Sep 2011 14:24:12 -0500, Anthony Liguori wrote: On 08/30/2011 07:26 AM, Marcelo Tosatti wrote: On Mon, Aug 29, 2011 at 05:27:11PM -0600, Eric B Munson wrote: