Re: [PATCH v2 0/3] Fix task switches into/out of VM86

2012-01-30 Thread Kevin Wolf
Am 27.01.2012 20:52, schrieb Gleb Natapov: On Fri, Jan 27, 2012 at 08:23:33PM +0100, Kevin Wolf wrote: I believe this should work with both VMX and SVM now. Gleb, Jörg, can one of you test this with SVM? I did some testing on my buggy processor and it looks as good as it gets, but it would be

Re: [PATCH v4 0/3] virtio-scsi driver

2012-01-30 Thread Paolo Bonzini
On 01/20/2012 05:45 PM, Paolo Bonzini wrote: This is the first implementation of the virtio-scsi driver, a virtual HBA that will be supported by KVM. It implements a subset of the spec, in particular it does not implement asynchronous notifications for either LUN reset/removal/addition or

Re: [PATCH v2 0/3] Fix task switches into/out of VM86

2012-01-30 Thread Gleb Natapov
On Mon, Jan 30, 2012 at 09:48:33AM +0100, Kevin Wolf wrote: Am 27.01.2012 20:52, schrieb Gleb Natapov: On Fri, Jan 27, 2012 at 08:23:33PM +0100, Kevin Wolf wrote: I believe this should work with both VMX and SVM now. Gleb, Jörg, can one of you test this with SVM? I did some testing on my

Re: [PATCH] Fix i8259 for target-arches not supporting KVM

2012-01-30 Thread Jan Kiszka
On 2012-01-29 14:18, Sergei Trofimovich wrote: From: Sergei Trofimovich sly...@gentoo.org $ ./configure --target-list=alpha-softmmu make CCalpha-softmmu/i8259.o cc1: warnings being treated as errors /home/slyfox/dev/git/qemu-kvm/hw/i8259.c: In function

Re: [PATCH 0/9] pci-assign: 64bit MMIO + better MSI-X table support

2012-01-30 Thread Jan Kiszka
On 2012-01-28 15:21, Alex Williamson wrote: Patch 1 2 here are independent of the rest, but I include them here to avoid conflicts. The first patch enables exposing MMIO BARs as their native width to the guest. I added a config option for this with the default to use the existing behavior

Re: [PATCH v2 3/4] uq/master: Add CPU eject handling for acpi_piix4

2012-01-30 Thread Vasilis Liaskovitis
On Thu, Jan 26, 2012 at 12:46:18PM +0200, Avi Kivity wrote: On 01/24/2012 04:56 PM, Vasilis Liaskovitis wrote: On Tue, Jan 24, 2012 at 11:28:41AM +0100, Jan Kiszka wrote: On 2012-01-24 11:10, Vasilis Liaskovitis wrote: Add stub functions for CPU eject callback. Define cpu_acpi_eject

Re: [PATCH v2 0/3] Fix task switches into/out of VM86

2012-01-30 Thread Gleb Natapov
On Mon, Jan 30, 2012 at 10:55:41AM +0200, Gleb Natapov wrote: On Mon, Jan 30, 2012 at 09:48:33AM +0100, Kevin Wolf wrote: Am 27.01.2012 20:52, schrieb Gleb Natapov: On Fri, Jan 27, 2012 at 08:23:33PM +0100, Kevin Wolf wrote: I believe this should work with both VMX and SVM now. Gleb,

Re: [PATCH v2 3/3] KVM: x86 emulator: Allow PM/VM86 switch during task switch

2012-01-30 Thread Avi Kivity
On 01/27/2012 09:23 PM, Kevin Wolf wrote: Task switches can switch between Protected Mode and VM86. The current mode must be updated during the task switch emulation so that the new segment selectors are interpreted correctly and privilege checks succeed. VMX code calculates the CPL from the

Re: [PATCH v2 0/3] Fix task switches into/out of VM86

2012-01-30 Thread Kevin Wolf
Am 30.01.2012 09:55, schrieb Gleb Natapov: On Mon, Jan 30, 2012 at 09:48:33AM +0100, Kevin Wolf wrote: Am 27.01.2012 20:52, schrieb Gleb Natapov: On Fri, Jan 27, 2012 at 08:23:33PM +0100, Kevin Wolf wrote: I believe this should work with both VMX and SVM now. Gleb, Jörg, can one of you test

Re: [PATCH v2 1/3] KVM: x86 emulator: Fix task switch privilege checks

2012-01-30 Thread Avi Kivity
On 01/27/2012 09:23 PM, Kevin Wolf wrote: Currently, all task switches check privileges against the DPL of the TSS. This is only correct for jmp/call to a TSS. If a task gate is used, the DPL of this take gate is used for the check instead. Exceptions, external interrupts and iret shouldn't

Re: [PATCH v2 0/3] Fix task switches into/out of VM86

2012-01-30 Thread Avi Kivity
On 01/30/2012 12:35 PM, Kevin Wolf wrote: Am 30.01.2012 09:55, schrieb Gleb Natapov: On Mon, Jan 30, 2012 at 09:48:33AM +0100, Kevin Wolf wrote: Am 27.01.2012 20:52, schrieb Gleb Natapov: On Fri, Jan 27, 2012 at 08:23:33PM +0100, Kevin Wolf wrote: I believe this should work with both VMX

Re: [PATCH v2 0/3] Fix task switches into/out of VM86

2012-01-30 Thread Gleb Natapov
On Mon, Jan 30, 2012 at 11:35:00AM +0100, Kevin Wolf wrote: Am 30.01.2012 09:55, schrieb Gleb Natapov: On Mon, Jan 30, 2012 at 09:48:33AM +0100, Kevin Wolf wrote: Am 27.01.2012 20:52, schrieb Gleb Natapov: On Fri, Jan 27, 2012 at 08:23:33PM +0100, Kevin Wolf wrote: I believe this should

Re: [PATCH v2 0/3] Fix task switches into/out of VM86

2012-01-30 Thread Gleb Natapov
On Mon, Jan 30, 2012 at 12:45:15PM +0200, Avi Kivity wrote: On 01/30/2012 12:35 PM, Kevin Wolf wrote: Am 30.01.2012 09:55, schrieb Gleb Natapov: On Mon, Jan 30, 2012 at 09:48:33AM +0100, Kevin Wolf wrote: Am 27.01.2012 20:52, schrieb Gleb Natapov: On Fri, Jan 27, 2012 at 08:23:33PM

Re: [PATCH v2 3/3] KVM: x86 emulator: Allow PM/VM86 switch during task switch

2012-01-30 Thread Gleb Natapov
On Mon, Jan 30, 2012 at 12:24:11PM +0200, Avi Kivity wrote: + ctxt-ops-set_segment(ctxt, selector, desc, base3, seg); } @@ -2273,6 +2281,24 @@ static int load_state_from_tss32(struct x86_emulate_ctxt *ctxt, return emulate_gp(ctxt, 0); ctxt-_eip = tss-eip;

Re: [PATCH v2 3/3] KVM: x86 emulator: Allow PM/VM86 switch during task switch

2012-01-30 Thread Kevin Wolf
Am 30.01.2012 11:24, schrieb Avi Kivity: On 01/27/2012 09:23 PM, Kevin Wolf wrote: Task switches can switch between Protected Mode and VM86. The current mode must be updated during the task switch emulation so that the new segment selectors are interpreted correctly and privilege checks

Re: [PATCH v2 3/3] KVM: x86 emulator: Allow PM/VM86 switch during task switch

2012-01-30 Thread Gleb Natapov
On Mon, Jan 30, 2012 at 12:05:37PM +0100, Kevin Wolf wrote: + + /* + * If we're switching between Protected Mode and VM86, we need to make + * sure to update the mode before loading the segment descriptors so + * that the selectors are interpreted correctly. + * + * Need

Re: [PATCH v2 1/3] KVM: x86 emulator: Fix task switch privilege checks

2012-01-30 Thread Kevin Wolf
Am 30.01.2012 11:39, schrieb Avi Kivity: On 01/27/2012 09:23 PM, Kevin Wolf wrote: Currently, all task switches check privileges against the DPL of the TSS. This is only correct for jmp/call to a TSS. If a task gate is used, the DPL of this take gate is used for the check instead. Exceptions,

Re: [PATCH v2 0/3] Fix task switches into/out of VM86

2012-01-30 Thread Avi Kivity
On 01/30/2012 12:50 PM, Gleb Natapov wrote: On Mon, Jan 30, 2012 at 12:45:15PM +0200, Avi Kivity wrote: On 01/30/2012 12:35 PM, Kevin Wolf wrote: Am 30.01.2012 09:55, schrieb Gleb Natapov: On Mon, Jan 30, 2012 at 09:48:33AM +0100, Kevin Wolf wrote: Am 27.01.2012 20:52, schrieb Gleb

Re: [PATCH v2 3/3] KVM: x86 emulator: Allow PM/VM86 switch during task switch

2012-01-30 Thread Avi Kivity
On 01/30/2012 12:56 PM, Gleb Natapov wrote: On Mon, Jan 30, 2012 at 12:24:11PM +0200, Avi Kivity wrote: + ctxt-ops-set_segment(ctxt, selector, desc, base3, seg); } @@ -2273,6 +2281,24 @@ static int load_state_from_tss32(struct x86_emulate_ctxt *ctxt, return

Re: [PATCH v2 3/3] KVM: x86 emulator: Allow PM/VM86 switch during task switch

2012-01-30 Thread Gleb Natapov
On Mon, Jan 30, 2012 at 02:02:14PM +0200, Avi Kivity wrote: On 01/30/2012 12:56 PM, Gleb Natapov wrote: On Mon, Jan 30, 2012 at 12:24:11PM +0200, Avi Kivity wrote: + ctxt-ops-set_segment(ctxt, selector, desc, base3, seg); } @@ -2273,6 +2281,24 @@ static int

Re: [PATCH v2 0/3] Fix task switches into/out of VM86

2012-01-30 Thread Gleb Natapov
On Mon, Jan 30, 2012 at 01:59:34PM +0200, Avi Kivity wrote: On 01/30/2012 12:50 PM, Gleb Natapov wrote: On Mon, Jan 30, 2012 at 12:45:15PM +0200, Avi Kivity wrote: On 01/30/2012 12:35 PM, Kevin Wolf wrote: Am 30.01.2012 09:55, schrieb Gleb Natapov: On Mon, Jan 30, 2012 at 09:48:33AM

Re: [PATCH v2 0/3] Fix task switches into/out of VM86

2012-01-30 Thread Gleb Natapov
On Mon, Jan 30, 2012 at 01:59:34PM +0200, Avi Kivity wrote: It's best to make it independent (like svm, and force vmx to emulate this behaviour). Real mode forces cpl to 0, vm86 forces cpl to 3, protected mode (and I think long mode) uses cs.rpl. This is what vmx does, not svm.

Re: [PATCH v2 3/3] KVM: x86 emulator: Allow PM/VM86 switch during task switch

2012-01-30 Thread Avi Kivity
On 01/30/2012 01:05 PM, Kevin Wolf wrote: Am 30.01.2012 11:24, schrieb Avi Kivity: On 01/27/2012 09:23 PM, Kevin Wolf wrote: Task switches can switch between Protected Mode and VM86. The current mode must be updated during the task switch emulation so that the new segment selectors are

Re: [PATCH v2 3/3] KVM: x86 emulator: Allow PM/VM86 switch during task switch

2012-01-30 Thread Avi Kivity
On 01/30/2012 02:04 PM, Gleb Natapov wrote: On Mon, Jan 30, 2012 at 02:02:14PM +0200, Avi Kivity wrote: On 01/30/2012 12:56 PM, Gleb Natapov wrote: On Mon, Jan 30, 2012 at 12:24:11PM +0200, Avi Kivity wrote: + ctxt-ops-set_segment(ctxt, selector, desc, base3, seg); }

Re: [PATCH v2 0/3] Fix task switches into/out of VM86

2012-01-30 Thread Avi Kivity
On 01/30/2012 02:16 PM, Gleb Natapov wrote: On Mon, Jan 30, 2012 at 01:59:34PM +0200, Avi Kivity wrote: On 01/30/2012 12:50 PM, Gleb Natapov wrote: On Mon, Jan 30, 2012 at 12:45:15PM +0200, Avi Kivity wrote: On 01/30/2012 12:35 PM, Kevin Wolf wrote: Am 30.01.2012 09:55, schrieb Gleb

Re: [PATCH v2 0/3] Fix task switches into/out of VM86

2012-01-30 Thread Avi Kivity
On 01/30/2012 02:31 PM, Gleb Natapov wrote: On Mon, Jan 30, 2012 at 01:59:34PM +0200, Avi Kivity wrote: It's best to make it independent (like svm, and force vmx to emulate this behaviour). Real mode forces cpl to 0, vm86 forces cpl to 3, protected mode (and I think long mode) uses

Re: [PATCH v2 0/3] Fix task switches into/out of VM86

2012-01-30 Thread Gleb Natapov
On Mon, Jan 30, 2012 at 03:28:07PM +0200, Avi Kivity wrote: On 01/30/2012 02:31 PM, Gleb Natapov wrote: On Mon, Jan 30, 2012 at 01:59:34PM +0200, Avi Kivity wrote: It's best to make it independent (like svm, and force vmx to emulate this behaviour). Real mode forces cpl to 0, vm86

Re: [PATCH v2 0/3] Fix task switches into/out of VM86

2012-01-30 Thread Avi Kivity
On 01/30/2012 03:29 PM, Gleb Natapov wrote: On Mon, Jan 30, 2012 at 03:28:07PM +0200, Avi Kivity wrote: On 01/30/2012 02:31 PM, Gleb Natapov wrote: On Mon, Jan 30, 2012 at 01:59:34PM +0200, Avi Kivity wrote: It's best to make it independent (like svm, and force vmx to emulate

Re: [PATCH 0/9] pci-assign: 64bit MMIO + better MSI-X table support

2012-01-30 Thread Alex Williamson
On Mon, 2012-01-30 at 11:11 +0100, Jan Kiszka wrote: On 2012-01-28 15:21, Alex Williamson wrote: Patch 1 2 here are independent of the rest, but I include them here to avoid conflicts. The first patch enables exposing MMIO BARs as their native width to the guest. I added a config option

Re: [PATCH v2 3/3] KVM: x86 emulator: Allow PM/VM86 switch during task switch

2012-01-30 Thread Kevin Wolf
Am 30.01.2012 14:23, schrieb Avi Kivity: On 01/30/2012 01:05 PM, Kevin Wolf wrote: Am 30.01.2012 11:24, schrieb Avi Kivity: On 01/27/2012 09:23 PM, Kevin Wolf wrote: Task switches can switch between Protected Mode and VM86. The current mode must be updated during the task switch emulation so

E1000 virtio will not respect set MTU

2012-01-30 Thread Markus Kovero
Hi, I've encountered interesting problem. This happens with Linux 3.1.4, libvirt 0.9.6, qemu-kvm 0.15.1 and Linux 3.2.1, libvirt 0.9.9, qemu-kvm 1.0. It seems guest OS NIC does not respect MTU that has been set on interface when using e1000 or virtio drivers, everything works well when

Re: [PATCH v2 3/3] KVM: x86 emulator: Allow PM/VM86 switch during task switch

2012-01-30 Thread Avi Kivity
On 01/30/2012 04:01 PM, Kevin Wolf wrote: Am 30.01.2012 14:23, schrieb Avi Kivity: On 01/30/2012 01:05 PM, Kevin Wolf wrote: Am 30.01.2012 11:24, schrieb Avi Kivity: On 01/27/2012 09:23 PM, Kevin Wolf wrote: Task switches can switch between Protected Mode and VM86. The current mode must

Re: [PATCH 3/4 V10] Add ioctl for KVMCLOCK_GUEST_STOPPED

2012-01-30 Thread Avi Kivity
On 01/17/2012 08:40 PM, Eric B Munson wrote: Now that we have a flag that will tell the guest it was suspended, create an interface for that communication using a KVM ioctl. diff --git a/Documentation/virtual/kvm/api.txt b/Documentation/virtual/kvm/api.txt index e1d94bf..1931e5c 100644

Re: [PATCH 0/4 V10] Avoid soft lockup message when KVM is stopped by host

2012-01-30 Thread Avi Kivity
On 01/27/2012 10:45 PM, Eric B Munson wrote: Just poking to make sure this set hasn't fallen through the cracks. Sorry, was on vacation and am still recovering. -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line unsubscribe kvm in

Re: [PATCH 3/4 V10] Add ioctl for KVMCLOCK_GUEST_STOPPED

2012-01-30 Thread Avi Kivity
On 01/30/2012 05:07 PM, Avi Kivity wrote: +Parameters: None +Returns: 0 on success, -1 on error + +This signals to the host kernel that the specified guest is being paused by +userspace. The host will set a flag in the pvclock structure that is checked +from the soft lockup

Re: [PATCH v2 3/3] KVM: x86 emulator: Allow PM/VM86 switch during task switch

2012-01-30 Thread Kevin Wolf
Am 30.01.2012 15:32, schrieb Avi Kivity: On 01/30/2012 04:01 PM, Kevin Wolf wrote: Am 30.01.2012 14:23, schrieb Avi Kivity: On 01/30/2012 01:05 PM, Kevin Wolf wrote: Am 30.01.2012 11:24, schrieb Avi Kivity: On 01/27/2012 09:23 PM, Kevin Wolf wrote: Task switches can switch between Protected

Re: [PATCH 3/4 V10] Add ioctl for KVMCLOCK_GUEST_STOPPED

2012-01-30 Thread Eric B Munson
On Mon, 30 Jan 2012, Avi Kivity wrote: On 01/17/2012 08:40 PM, Eric B Munson wrote: Now that we have a flag that will tell the guest it was suspended, create an interface for that communication using a KVM ioctl. diff --git a/Documentation/virtual/kvm/api.txt

Re: [PATCH 3/4 V10] Add ioctl for KVMCLOCK_GUEST_STOPPED

2012-01-30 Thread Eric B Munson
On Mon, 30 Jan 2012, Avi Kivity wrote: On 01/30/2012 05:07 PM, Avi Kivity wrote: +Parameters: None +Returns: 0 on success, -1 on error + +This signals to the host kernel that the specified guest is being paused by +userspace. The host will set a flag in the pvclock structure

Re: performance trouble

2012-01-30 Thread David Cure
Le Mon, Jan 23, 2012 at 09:28:37AM +0100, David Cure ecrivait : I use several kvm box, and no problem at all except for 1 application that have bad response time. The VM runs Windows 2008R2 and the application is an client-server app develop with progress software and talk to

Re: [PATCH v2 3/3] KVM: x86 emulator: Allow PM/VM86 switch during task switch

2012-01-30 Thread Avi Kivity
On 01/30/2012 05:26 PM, Kevin Wolf wrote: My bet is that it will be 3 if eflags.vm=1 and unchanged otherwise -- the cpl update happens when the segment cache is updated. But that's just a guess. Does even anyone see the new CPL in error cases? An exception is thrown immediately, so cs

Re: [PATCH 3/4 V10] Add ioctl for KVMCLOCK_GUEST_STOPPED

2012-01-30 Thread Avi Kivity
On 01/30/2012 05:32 PM, Eric B Munson wrote: Can you point me to the discussion that moved this to be a vm ioctl? In general vm ioctls that do things for all vcpus are racy, like here. You're accessing variables that are protected by the vcpu mutex, and not taking the mutex (nor can

Re: [PATCH v2 3/3] KVM: x86 emulator: Allow PM/VM86 switch during task switch

2012-01-30 Thread Takuya Yoshikawa
On Mon, 30 Jan 2012 16:26:06 +0100 Kevin Wolf kw...@redhat.com wrote: The other case is what we're looking at, task switch. To actually update cpl, set_segment() needs to look at cr0.pe and eflags, but these might not have been committed yet. It's all solvable but the solution involves

Re: [PATCH 3/4 V10] Add ioctl for KVMCLOCK_GUEST_STOPPED

2012-01-30 Thread Jan Kiszka
On 2012-01-30 16:07, Avi Kivity wrote: On 01/17/2012 08:40 PM, Eric B Munson wrote: Now that we have a flag that will tell the guest it was suspended, create an interface for that communication using a KVM ioctl. diff --git a/Documentation/virtual/kvm/api.txt

Re: performance trouble

2012-01-30 Thread Brian Jackson
On Monday, January 30, 2012 09:36:55 AM David Cure wrote: Le Mon, Jan 23, 2012 at 09:28:37AM +0100, David Cure ecrivait : I use several kvm box, and no problem at all except for 1 application that have bad response time. The VM runs Windows 2008R2 and the application is an

Re: performance trouble

2012-01-30 Thread David Cure
Le Mon, Jan 30, 2012 at 10:20:34AM -0600, Brian Jackson ecrivait : Without more info or some way to reproduce the problem, it would be pointless for one of the devs to spend much time on it. yes for sure. But I mean there is some way to trace at the KVM level what happens

Re: [PATCH 3/4 V10] Add ioctl for KVMCLOCK_GUEST_STOPPED

2012-01-30 Thread Avi Kivity
On 01/30/2012 06:18 PM, Jan Kiszka wrote: This looks racy. The vcpu can remove its kvmclock concurrently with this access, and src will be NULL. There is no race here (src is member of the vcpu), but arch.time might have become invalid. KVM_REQ_CLOCK_UPDATE instead of mark_page_dirty

Re: [PATCH] Fix i8259 for target-arches not supporting KVM

2012-01-30 Thread Sergei Trofimovich
On Mon, 30 Jan 2012 11:08:37 +0100 Jan Kiszka jan.kis...@siemens.com wrote: On 2012-01-29 14:18, Sergei Trofimovich wrote: From: Sergei Trofimovich sly...@gentoo.org $ ./configure --target-list=alpha-softmmu make CCalpha-softmmu/i8259.o cc1: warnings being treated

Re: performance trouble

2012-01-30 Thread Avi Kivity
On 01/30/2012 06:51 PM, David Cure wrote: Le Mon, Jan 30, 2012 at 10:20:34AM -0600, Brian Jackson ecrivait : Without more info or some way to reproduce the problem, it would be pointless for one of the devs to spend much time on it. yes for sure. But I mean there is

Re: Unable to pass multiple cores / CPUs to guests

2012-01-30 Thread Jim Paris
Binarus wrote: Dear all, it seems that I am unable to pass multiple cores / CPUs to KVM guests. Whatever I do, the guests only report one CPU / core. ... /usr/bin/qemu-system-x86_64 -M pc -cpu host -smp cores=2,threads=1,sockets=1 -drive file=/dev/sda6,if=virtio,cache=none,index=0 -drive

[PATCH] KVM: Fix assigned device MSI-X entry setting leak

2012-01-30 Thread Alex Williamson
We need to prioritize our matching when setting MSI-X vector entries. Unused entries should only be used if we don't find an exact match or else we risk duplicating entries. This was causing an ENOSPC return when trying to mask and unmask MSI-X vectors based on guest MSI-X table updates.

Re: [PATCH] KVM: Fix assigned device MSI-X entry setting leak

2012-01-30 Thread Jan Kiszka
On 2012-01-30 19:06, Alex Williamson wrote: We need to prioritize our matching when setting MSI-X vector entries. Unused entries should only be used if we don't find an exact match or else we risk duplicating entries. This was causing an ENOSPC return when trying to mask and unmask MSI-X

Re: [PATCH] KVM: Fix assigned device MSI-X entry setting leak

2012-01-30 Thread Alex Williamson
On Mon, 2012-01-30 at 19:24 +0100, Jan Kiszka wrote: On 2012-01-30 19:06, Alex Williamson wrote: We need to prioritize our matching when setting MSI-X vector entries. Unused entries should only be used if we don't find an exact match or else we risk duplicating entries. This was causing

KVM call agenda for tuesday 31

2012-01-30 Thread Juan Quintela
hi Please send in any agenda items you are interested in covering. Cheers, Juan. -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

[PATCH v2] KVM: Fix assigned device MSI-X entry setting leak

2012-01-30 Thread Alex Williamson
We need to prioritize our matching when setting MSI-X vector entries. Unused entries should only be used if we don't find an exact match or else we risk duplicating entries. This was causing an ENOSPC return when trying to mask and unmask MSI-X vectors based on guest MSI-X table updates. The

Re: [PATCH] Fix i8259 for target-arches not supporting KVM

2012-01-30 Thread Jan Kiszka
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 2012-01-30 18:15, Sergei Trofimovich wrote: On Mon, 30 Jan 2012 11:08:37 +0100 Jan Kiszka jan.kis...@siemens.com wrote: On 2012-01-29 14:18, Sergei Trofimovich wrote: From: Sergei Trofimovich sly...@gentoo.org $ ./configure

Re: [Android-virt] [PATCH v5 00/13] KVM/ARM Implementation

2012-01-30 Thread Peter Maydell
On 20 January 2012 02:59, Christoffer Dall c.d...@virtualopensystems.com wrote: There's a new list of issues available at: https://github.com/virtualopensystems/linux-kvm-arm/issues Thanks for putting this up. Here's a couple more for you :-) * Support guest kernels configured for LPAE At

Re: [Android-virt] [PATCH v5 00/13] KVM/ARM Implementation

2012-01-30 Thread Alexander Graf
On 30.01.2012, at 23:46, Peter Maydell wrote: On 20 January 2012 02:59, Christoffer Dall c.d...@virtualopensystems.com wrote: There's a new list of issues available at: https://github.com/virtualopensystems/linux-kvm-arm/issues Thanks for putting this up. Here's a couple more for you

Re: [Qemu-devel] KVM call agenda for tuesday 31

2012-01-30 Thread Andreas Färber
Am 30.01.2012 19:55, schrieb Juan Quintela: Please send in any agenda items you are interested in covering. QOM roadmap update: * Series 3/4 is on the list. - Please officially designate a merge date (Friday?). - To make review sensible, I ask for a hard device freeze until merged. I.e., no

Re: [Qemu-devel] KVM call agenda for tuesday 31

2012-01-30 Thread Anthony Liguori
On 01/30/2012 05:41 PM, Andreas Färber wrote: Am 30.01.2012 19:55, schrieb Juan Quintela: Please send in any agenda items you are interested in covering. QOM roadmap update: * Series 3/4 is on the list. - Please officially designate a merge date (Friday?). - To make review sensible, I ask

Re: [Qemu-devel] KVM call agenda for tuesday 31

2012-01-30 Thread Alexander Graf
On 31.01.2012, at 00:53, Anthony Liguori wrote: On 01/30/2012 05:41 PM, Andreas Färber wrote: Am 30.01.2012 19:55, schrieb Juan Quintela: Please send in any agenda items you are interested in covering. QOM roadmap update: * Series 3/4 is on the list. - Please officially designate a

Re: [PATCH 4/4 v3] KVM: Introduce kvm_memory_slot::arch and move lpage_info into it

2012-01-30 Thread Takuya Yoshikawa
Added s390 and ppc developers to Cc, (2012/01/30 14:35), Takuya Yoshikawa wrote: Some members of kvm_memory_slot are not used by every architecture. This patch is the first step to make this difference clear by introducing kvm_memory_slot::arch; lpage_info is moved into it. I am planning to

[Bug 42563] rhel5u5 guest panic when booting up

2012-01-30 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=42563 --- Comment #7 from Jay Ren yongjie@intel.com 2012-01-31 01:37:57 --- (In reply to comment #6) (In reply to comment #5) (In reply to comment #4) Yes. With 'ignore_msrs=y' added when loading kvm module, rhel5.x guest can boot

VMXON region vs VMCS region?

2012-01-30 Thread Zhi Yong Wu
HI, Can anyone let me know know the difference between VMXON region and VMCS region? relationship? It will be appreciated if you can make some comments. -- Regards, Zhi Yong Wu -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to

[PATCH] kvm tools: Repair running on non ioeventfd-capable platforms

2012-01-30 Thread Matt Evans
Commit d3923126a24212f1e746a84a575dadbd9f259418 added a bunch of nice error checking around ioevent__init() but the init may gracefully fail if ioevents simply aren't supported (PPC64 KVM). This commit adds a new return code for the init -- positive, but identifiable as 'not success 0'.

[PATCH V4 0/7] Add initial SPAPR PPC64 architecture support

2012-01-30 Thread Matt Evans
This series adds support for a PPC64 platform, SPAPR, on top of the previous more general PPC64 CPU support. This platform is paravirtualised, with most of the MMU hypercalls being dealt with in the kernel. Userland needs to describe the environment to the machine with a device tree, cope with

[PATCH V4 1/7] kvm tools: PPC64, add HPT/SDR1 for -PR KVM

2012-01-30 Thread Matt Evans
Allocate a page table and point SDR1 to it in order to support the -PR PPC64 KVM mode. (The alternative, -HV mode, is available only on a small set of machines.) This patch also removes the previous dependency on mapping guest RAM with huge pages; PR KVM doesn't require them so the user isn't

[PATCH V4 2/7] kvm tools: Generate SPAPR PPC64 guest device tree

2012-01-30 Thread Matt Evans
The generated DT is the bare minimum structure required for SPAPR (on which subsequent patches for VIO, XICS, PCI etc. will build); root node, cpus, memory. The DT contains CPU-specific configuration; a very simple 'cpu info' mechanism is added to recognise/differentiate DT entries for POWER7 and

[PATCH V4 4/7] kvm tools: Add SPAPR PPC64 HV console

2012-01-30 Thread Matt Evans
This adds the console code, plus VIO HV terminal nodes are added to the device tree so the guest kernel will pick it up. Signed-off-by: Matt Evans m...@ozlabs.org --- tools/kvm/Makefile |1 + tools/kvm/powerpc/kvm.c | 33 tools/kvm/powerpc/spapr_hvcons.c

[PATCH V4 7/7] kvm tools: Add PPC64 kvm_cpu__emulate_io()

2012-01-30 Thread Matt Evans
This is the final piece of the puzzle for PPC SPAPR PCI; this function splits MMIO accesses into the two PHB windows directs things to MMIO/IO emulation as appropriate. Signed-off-by: Matt Evans m...@ozlabs.org --- tools/kvm/Makefile |1 +

[PATCH V4 3/7] kvm tools: Add SPAPR PPC64 hcall rtascall structure

2012-01-30 Thread Matt Evans
This patch adds the basic structure for HV calls, their registration and some of the simpler calls. A similar layout for RTAS calls is also added, again with some of the simpler RTAS calls used by the guest. The SPAPR RTAS stub is generated inline. Also, nodes for RTAS are added to the device

[PATCH V4 6/7] kvm tools: Add PPC64 PCI Host Bridge

2012-01-30 Thread Matt Evans
This provides the PCI bridge, definitions for the address layout of the windows and wires in IRQs. Once PCI devices are all registered, they are enumerated and DT nodes generated for each. Signed-off-by: Matt Evans m...@ozlabs.org --- tools/kvm/powerpc/include/kvm/kvm-arch.h |3 +

[PATCH V4 5/7] kvm tools: Add PPC64 XICS interrupt controller support

2012-01-30 Thread Matt Evans
This patch adds XICS emulation code (heavily borrowed from QEMU), and wires this into kvm_cpu__irq() to fire a CPU IRQ via KVM. A device tree entry is also added. IPIs work, xics_alloc_irqnum() is added to allocate an external IRQ (which will later be used by the PHB PCI code) and finally,

Re: [PATCH 4/4 v3] KVM: Introduce kvm_memory_slot::arch and move lpage_info into it

2012-01-30 Thread Christian Borntraeger
On 31/01/12 02:17, Takuya Yoshikawa wrote: Added s390 and ppc developers to Cc, (2012/01/30 14:35), Takuya Yoshikawa wrote: Some members of kvm_memory_slot are not used by every architecture. This patch is the first step to make this difference clear by introducing kvm_memory_slot::arch;

Re: [PATCH V4 2/7] kvm tools: Generate SPAPR PPC64 guest device tree

2012-01-30 Thread Pekka Enberg
On Tue, Jan 31, 2012 at 8:34 AM, Matt Evans m...@ozlabs.org wrote: +static struct cpu_info cpu_power7_info = { +       POWER7, +       power7_page_sizes_prop, sizeof(power7_page_sizes_prop), +       power7_segment_sizes_prop, sizeof(power7_segment_sizes_prop), +       32,             /* SLB

[PATCH] KVM: PPC: Book3s: PR: Add SPAPR H_BULK_REMOVE support

2012-01-30 Thread Matt Evans
SPAPR support includes various in-kernel hypercalls, improving performance by cutting out the exit to userspace. H_BULK_REMOVE is implemented in this patch. Signed-off-by: Matt Evans m...@ozlabs.org --- Alex, my zomg, ls SIGILLs! on IRC was due to a former broken version of this patch

[PATCH V4 0/7] Add initial SPAPR PPC64 architecture support

2012-01-30 Thread Matt Evans
This series adds support for a PPC64 platform, SPAPR, on top of the previous more general PPC64 CPU support. This platform is paravirtualised, with most of the MMU hypercalls being dealt with in the kernel. Userland needs to describe the environment to the machine with a device tree, cope with

[PATCH V4 1/7] kvm tools: PPC64, add HPT/SDR1 for -PR KVM

2012-01-30 Thread Matt Evans
Allocate a page table and point SDR1 to it in order to support the -PR PPC64 KVM mode. (The alternative, -HV mode, is available only on a small set of machines.) This patch also removes the previous dependency on mapping guest RAM with huge pages; PR KVM doesn't require them so the user isn't

[PATCH V4 2/7] kvm tools: Generate SPAPR PPC64 guest device tree

2012-01-30 Thread Matt Evans
The generated DT is the bare minimum structure required for SPAPR (on which subsequent patches for VIO, XICS, PCI etc. will build); root node, cpus, memory. The DT contains CPU-specific configuration; a very simple 'cpu info' mechanism is added to recognise/differentiate DT entries for POWER7 and

[PATCH V4 4/7] kvm tools: Add SPAPR PPC64 HV console

2012-01-30 Thread Matt Evans
This adds the console code, plus VIO HV terminal nodes are added to the device tree so the guest kernel will pick it up. Signed-off-by: Matt Evans m...@ozlabs.org --- tools/kvm/Makefile |1 + tools/kvm/powerpc/kvm.c | 33 tools/kvm/powerpc/spapr_hvcons.c

[PATCH V4 7/7] kvm tools: Add PPC64 kvm_cpu__emulate_io()

2012-01-30 Thread Matt Evans
This is the final piece of the puzzle for PPC SPAPR PCI; this function splits MMIO accesses into the two PHB windows directs things to MMIO/IO emulation as appropriate. Signed-off-by: Matt Evans m...@ozlabs.org --- tools/kvm/Makefile |1 +

[PATCH V4 6/7] kvm tools: Add PPC64 PCI Host Bridge

2012-01-30 Thread Matt Evans
This provides the PCI bridge, definitions for the address layout of the windows and wires in IRQs. Once PCI devices are all registered, they are enumerated and DT nodes generated for each. Signed-off-by: Matt Evans m...@ozlabs.org --- tools/kvm/powerpc/include/kvm/kvm-arch.h |3 +

Re: [PATCH V4 2/7] kvm tools: Generate SPAPR PPC64 guest device tree

2012-01-30 Thread Pekka Enberg
On Tue, Jan 31, 2012 at 8:34 AM, Matt Evans m...@ozlabs.org wrote: +static struct cpu_info cpu_power7_info = { +       POWER7, +       power7_page_sizes_prop, sizeof(power7_page_sizes_prop), +       power7_segment_sizes_prop, sizeof(power7_segment_sizes_prop), +       32,             /* SLB