Re: pci passthrough error about insufficient iommu width

2014-08-07 Thread Nishank Trivedi
On 8/6/14, 2:49 PM, William Tu wrote: Try vfio-pci instead of pci-assign Thanks Alex, William. Using vfio worked. So does that mean pci-assign is being deprecated? -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More

Re: [PATCH] KVM: x86: always exit on EOIs for interrupts listed in the IOAPIC redir table

2014-08-07 Thread Paolo Bonzini
Il 07/08/2014 03:31, Zhang, Yang Z ha scritto: Let me give an example to see whether my concern is a real problem: Guest allocates a vector and set it in IOAPIC entry to deliver interrupt. Later it masks the IOAPIC entry(means stop the corresponding device) and assign this vector to a MSI

RE: [PATCH] KVM: x86: always exit on EOIs for interrupts listed in the IOAPIC redir table

2014-08-07 Thread Zhang, Yang Z
Paolo Bonzini wrote on 2014-08-07: Il 07/08/2014 03:31, Zhang, Yang Z ha scritto: Let me give an example to see whether my concern is a real problem: Guest allocates a vector and set it in IOAPIC entry to deliver interrupt. Later it masks the IOAPIC entry(means stop the corresponding device)

Re: [PATCH v3] KVM: nVMX: nested TPR shadow/threshold emulation

2014-08-07 Thread Wanpeng Li
Hi Paolo, On Wed, Aug 06, 2014 at 06:38:06AM +, Zhang, Yang Z wrote: [...] + + if (exec_control CPU_BASED_TPR_SHADOW) { + if (vmx-nested.virtual_apic_page) + nested_release_page(vmx-nested.virtual_apic_page); + vmx-nested.virtual_apic_page = +

Re: [PATCH/RFC] KVM: track pid for VCPU only on KVM_RUN ioctl

2014-08-07 Thread Raghavendra K T
On 08/05/2014 08:14 PM, Christian Borntraeger wrote: We currently track the pid of the task that runs the VCPU in vcpu_load. Since we call vcpu_load for all kind of ioctls on a CPU, this causes hickups due to synchronize_rcu if one CPU is modified by another CPU or the main thread (e.g.

Re: [PATCH 1/5] kvmtool: ARM: Use KVM_ARM_PREFERRED_TARGET vm ioctl to determine target cpu

2014-08-07 Thread Anup Patel
On 6 August 2014 18:18, Will Deacon will.dea...@arm.com wrote: On Tue, Aug 05, 2014 at 09:49:55AM +0100, Anup Patel wrote: Instead, of trying out each and every target type we should use KVM_ARM_PREFERRED_TARGET vm ioctl to determine target type for KVM ARM/ARM64. We bail-out target type

Re: [PATCH 2/5] kvmtool: ARM64: Fix compile error for aarch64

2014-08-07 Thread Anup Patel
On 6 August 2014 18:20, Will Deacon will.dea...@arm.com wrote: On Tue, Aug 05, 2014 at 09:49:56AM +0100, Anup Patel wrote: The __ARM64_SYS_REG() macro is already defined in uapi/asm/kvm.h of Linux-3.16-rcX hence remove it from arm/aarch64/kvm-cpu.c I've been carrying a similar patch in my

Re: [PATCH 1/5] kvmtool: ARM: Use KVM_ARM_PREFERRED_TARGET vm ioctl to determine target cpu

2014-08-07 Thread Peter Maydell
On 7 August 2014 09:44, Anup Patel anup.pa...@linaro.org wrote: The KVM_ARM_PREFERRED_TARGET ioctl is available from 3.13 onwards. I think we should first try KVM_ARM_PREFERRED_TARGET. If it fails then we should fallback to old method of trying each and every target type. You don't need to

Re: [PATCH 3/5] kvmtool: ARM64: Add target type potenza for aarch64

2014-08-07 Thread Anup Patel
On 6 August 2014 18:22, Will Deacon will.dea...@arm.com wrote: On Tue, Aug 05, 2014 at 09:49:57AM +0100, Anup Patel wrote: The VCPU target type KVM_ARM_TARGET_XGENE_POTENZA is available in latest Linux-3.16-rcX or higher hence register aarch64 target type for it. This patch enables us to run

Re: [PATCH 4/5] kvmtool: Handle exit reason KVM_EXIT_SYSTEM_EVENT

2014-08-07 Thread Anup Patel
On 6 August 2014 18:23, Will Deacon will.dea...@arm.com wrote: On Tue, Aug 05, 2014 at 09:49:58AM +0100, Anup Patel wrote: The KVM_EXIT_SYSTEM_EVENT exit reason was added to define architecture independent system-wide events for a Guest. Currently, it is used by in-kernel PSCI-0.2 emulation

Re: [PATCH 5/5] kvmtool: ARM/ARM64: Provide PSCI-0.2 guest when in-kernel KVM supports it

2014-08-07 Thread Anup Patel
On 6 August 2014 18:26, Will Deacon will.dea...@arm.com wrote: On Tue, Aug 05, 2014 at 09:49:59AM +0100, Anup Patel wrote: If in-kernel KVM support PSCI-0.2 emulation then we should set KVM_ARM_VCPU_PSCI_0_2 feature for each guest VCPU and also provide arm,psci-0.2,arm,psci as PSCI compatible

Re: [PATCH 3/5] kvmtool: ARM64: Add target type potenza for aarch64

2014-08-07 Thread Will Deacon
On Thu, Aug 07, 2014 at 09:56:28AM +0100, Anup Patel wrote: On 6 August 2014 18:22, Will Deacon will.dea...@arm.com wrote: On Tue, Aug 05, 2014 at 09:49:57AM +0100, Anup Patel wrote: The VCPU target type KVM_ARM_TARGET_XGENE_POTENZA is available in latest Linux-3.16-rcX or higher hence

Re: [RFC PATCH 2/6] ARM64: perf: Re-enable overflow interrupt from interrupt handler

2014-08-07 Thread Anup Patel
On 6 August 2014 19:54, Will Deacon will.dea...@arm.com wrote: On Tue, Aug 05, 2014 at 10:24:11AM +0100, Anup Patel wrote: A hypervisor will typically mask the overflow interrupt before forwarding it to Guest Linux hence we need to re-enable the overflow interrupt after clearing it in Guest

Re: [RFC PATCH 2/6] ARM64: perf: Re-enable overflow interrupt from interrupt handler

2014-08-07 Thread Will Deacon
On Thu, Aug 07, 2014 at 10:03:58AM +0100, Anup Patel wrote: On 6 August 2014 19:54, Will Deacon will.dea...@arm.com wrote: On Tue, Aug 05, 2014 at 10:24:11AM +0100, Anup Patel wrote: A hypervisor will typically mask the overflow interrupt before forwarding it to Guest Linux hence we need to

Re: [PATCH 5/5] kvmtool: ARM/ARM64: Provide PSCI-0.2 guest when in-kernel KVM supports it

2014-08-07 Thread Will Deacon
On Thu, Aug 07, 2014 at 10:00:13AM +0100, Anup Patel wrote: On 6 August 2014 18:26, Will Deacon will.dea...@arm.com wrote: On Tue, Aug 05, 2014 at 09:49:59AM +0100, Anup Patel wrote: If in-kernel KVM support PSCI-0.2 emulation then we should set KVM_ARM_VCPU_PSCI_0_2 feature for each guest

Re: [PATCH 2/5] kvmtool: ARM64: Fix compile error for aarch64

2014-08-07 Thread Will Deacon
On Thu, Aug 07, 2014 at 09:50:52AM +0100, Anup Patel wrote: On 6 August 2014 18:20, Will Deacon will.dea...@arm.com wrote: On Tue, Aug 05, 2014 at 09:49:56AM +0100, Anup Patel wrote: The __ARM64_SYS_REG() macro is already defined in uapi/asm/kvm.h of Linux-3.16-rcX hence remove it from

Re: [PATCH 0/6] IRQFD without IRQ routing, enabled for XICS

2014-08-07 Thread Paul Mackerras
On Wed, Aug 06, 2014 at 02:35:29PM +0200, Paolo Bonzini wrote: This doesn't build without CONFIG_KVM_XICS, so I had to apply a fixup patch to move some code from being under CONFIG_HAVE_KVM_IRQCHIP or unconditional, to being conditional on CONFIG_HAVE_KVM_IRQFD. I'll send the patch shortly.

Re: [PATCH/RFC] KVM: track pid for VCPU only on KVM_RUN ioctl

2014-08-07 Thread Christian Borntraeger
On 07/08/14 10:21, Raghavendra K T wrote: On 08/05/2014 08:14 PM, Christian Borntraeger wrote: We currently track the pid of the task that runs the VCPU in vcpu_load. Since we call vcpu_load for all kind of ioctls on a CPU, this causes hickups due to synchronize_rcu if one CPU is modified by

[GIT PULL] Second round of KVM changes for 3.17

2014-08-07 Thread Paolo Bonzini
Linus, The following changes since commit 5167d09ffad5b16b574d35ce3047ed34caf1e837: Merge tag 'arm64-upstream' of git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux (2014-08-04 12:31:53 -0700) are available in the git repository at: git://git.kernel.org/pub/scm/virt/kvm/kvm.git

Re: Query: Is it possible to lose interrupts between vhost and virtio_net during migration?

2014-08-07 Thread Zhangjie (HZ)
On 2014/8/5 20:14, Zhangjie (HZ) wrote: On 2014/8/5 17:49, Michael S. Tsirkin wrote: On Tue, Aug 05, 2014 at 02:29:28PM +0800, Zhangjie (HZ) wrote: Jason is right, the new order is not the cause of network unreachable. Changing order seems not work. After about 40 times, the problem occurs

Re: [PATCH/RFC] KVM: track pid for VCPU only on KVM_RUN ioctl

2014-08-07 Thread Paolo Bonzini
Il 05/08/2014 16:44, Christian Borntraeger ha scritto: We currently track the pid of the task that runs the VCPU in vcpu_load. Since we call vcpu_load for all kind of ioctls on a CPU, this causes hickups due to synchronize_rcu if one CPU is modified by another CPU or the main thread (e.g.

Re: [PATCH/RFC] KVM: track pid for VCPU only on KVM_RUN ioctl

2014-08-07 Thread Paolo Bonzini
Il 07/08/2014 11:59, Christian Borntraeger ha scritto: Paolo, are you willing to apply to kvm/queue? I asked a question, but anyway... not until the end of the merge window and my small vacation. :) Paolo -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a

Re: [PATCH v3] KVM: nVMX: nested TPR shadow/threshold emulation

2014-08-07 Thread Paolo Bonzini
Il 06/08/2014 08:38, Zhang, Yang Z ha scritto: Paolo Bonzini wrote on 2014-08-05: Il 05/08/2014 09:56, Zhang, Yang Z ha scritto: Wanpeng Li wrote on 2014-08-04: This patch fix bug https://bugzilla.kernel.org/show_bug.cgi?id=61411 TPR shadow/threshold feature is important to speed up the

[Bug 81841] amd-iommu: kernel BUG lockup after shutting down KVM guest using PCI passthrough/PCIe bridge

2014-08-07 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=81841 --- Comment #1 from Marti Raudsepp ma...@juffo.org --- Created attachment 145421 -- https://bugzilla.kernel.org/attachment.cgi?id=145421action=edit crash_netconsole.txt -- You are receiving this mail because: You are watching the assignee of

[Bug 81841] New: amd-iommu: kernel BUG lockup after shutting down KVM guest using PCI passthrough/PCIe bridge

2014-08-07 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=81841 Bug ID: 81841 Summary: amd-iommu: kernel BUG lockup after shutting down KVM guest using PCI passthrough/PCIe bridge Product: Virtualization Version: unspecified Kernel Version:

[Bug 81841] amd-iommu: kernel BUG lockup after shutting down KVM guest using PCI passthrough/PCIe bridge

2014-08-07 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=81841 --- Comment #2 from Marti Raudsepp ma...@juffo.org --- Created attachment 145431 -- https://bugzilla.kernel.org/attachment.cgi?id=145431action=edit startup_dmesg.txt -- You are receiving this mail because: You are watching the assignee of the

[Bug 81841] amd-iommu: kernel BUG lockup after shutting down KVM guest using PCI passthrough/PCIe bridge

2014-08-07 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=81841 --- Comment #3 from Marti Raudsepp ma...@juffo.org --- Created attachment 145441 -- https://bugzilla.kernel.org/attachment.cgi?id=145441action=edit dmidecode.txt -- You are receiving this mail because: You are watching the assignee of the bug.

Re: pci passthrough error about insufficient iommu width

2014-08-07 Thread Alex Williamson
On Wed, 2014-08-06 at 23:12 -0700, Nishank Trivedi wrote: On 8/6/14, 2:49 PM, William Tu wrote: Try vfio-pci instead of pci-assign Thanks Alex, William. Using vfio worked. So does that mean pci-assign is being deprecated? Yes, vfio is meant to replace pci-assign with a better device

[Bug 81841] amd-iommu: kernel BUG lockup after shutting down KVM guest using PCI passthrough/PCIe bridge

2014-08-07 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=81841 Marti Raudsepp ma...@juffo.org changed: What|Removed |Added Kernel Version|3.13 (Ubuntu: |3.16.0 (originally Ubuntu

[Bug 81841] amd-iommu: kernel BUG lockup after shutting down KVM guest using PCI passthrough/PCIe bridge

2014-08-07 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=81841 Alex Williamson alex.william...@redhat.com changed: What|Removed |Added CC|

Re: KVM on ARM64

2014-08-07 Thread Mathew Li
Great. VirtIO works for me. Thanks for your help folks! Is there is any other way to add virtual disk, more like a traditional disk to qemu-system-aarch64? For example IDE disk or SATA disk or maybe as a SCSI disk? On Wed, Aug 6, 2014 at 9:48 AM, Joel Schopp joel.sch...@amd.com wrote: It turns

Re: KVM on ARM64

2014-08-07 Thread Joel Schopp
virtio will get you the best performance so why would you want to use something slower? -Joel On 08/07/2014 11:51 AM, Mathew Li wrote: Great. VirtIO works for me. Thanks for your help folks! Is there is any other way to add virtual disk, more like a traditional disk to qemu-system-aarch64?

Re: KVM on ARM64

2014-08-07 Thread Christoffer Dall
That's probably because you updated your guest kernel to one that supports PSCI v0.2 and therefore ignores the incorrect function IDs in the DT (as it should). I've sent a fix to qemu-devel@ today: http://lists.gnu.org/archive/html/qemu-devel/2014-08/msg01179.html On Wed, Aug 6, 2014 at 6:48 PM,

Re: KVM on ARM64

2014-08-07 Thread Christoffer Dall
Currently we only model a virtual machine board (the -machine type=virt parameter) which has a UART, a flash, an RTC, and a bunch of virtio-mmio channelse. Once we either emulate a real aarch64 board (with whatever peripherals it may have) or add a PCI controller to the virt board, then you can

[Bug 81841] amd-iommu: kernel BUG lockup after shutting down KVM guest using PCI passthrough/PCIe bridge

2014-08-07 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=81841 --- Comment #6 from Marti Raudsepp ma...@juffo.org --- (In reply to Alex Williamson from comment #5) What if you use vfio-pci instead of pci-assign? I run into the dreaded error: vfio: error, group 9 is not viable, please ensure all devices

Re: KVM on ARM64

2014-08-07 Thread Wei Huang
On 08/07/2014 12:53 PM, Christoffer Dall wrote: Currently we only model a virtual machine board (the -machine type=virt parameter) which has a UART, a flash, an RTC, and a bunch of virtio-mmio channelse. Once we either emulate a real aarch64 board (with whatever peripherals it may have) or

[Bug 81841] amd-iommu: kernel BUG lockup after shutting down KVM guest using PCI passthrough/PCIe bridge

2014-08-07 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=81841 --- Comment #7 from Alex Williamson alex.william...@redhat.com --- (In reply to Marti Raudsepp from comment #6) (In reply to Alex Williamson from comment #5) What if you use vfio-pci instead of pci-assign? I run into the dreaded error:

Re: KVM on ARM64

2014-08-07 Thread Joel Schopp
On 08/07/2014 12:53 PM, Christoffer Dall wrote: Currently we only model a virtual machine board (the -machine type=virt parameter) which has a UART, a flash, an RTC, and a bunch of virtio-mmio channelse. Once we either emulate a real aarch64 board (with whatever peripherals it may have) or add

looking for info on TSC virtualization with kvm

2014-08-07 Thread Chris Friesen
I'm trying to find out some hard data on TSC virtualization when using qemu-kvm to run linux guests on Intel-based linux 3.4 hosts. I've read https://www.kernel.org/doc/Documentation/virtual/kvm/timekeeping.txt; and looked at the code somewhat, but it's a bit tricky to figure out exactly

[PATCH v3] kvm: x86: fix stale mmio cache bug

2014-08-07 Thread David Matlack
The following events can lead to an incorrect KVM_EXIT_MMIO bubbling up to userspace: (1) Guest accesses gpa X without a memory slot. The gfn is cached in struct kvm_vcpu_arch (mmio_gfn). On Intel EPT-enabled hosts, KVM sets the SPTE write-execute-noread so that future accesses cause

[Bug 81841] amd-iommu: kernel BUG lockup after shutting down KVM guest using PCI passthrough/PCIe bridge

2014-08-07 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=81841 --- Comment #8 from Marti Raudsepp ma...@juffo.org --- (In reply to Alex Williamson from comment #7) There are some proposed workarounds on the web None of these remotely address the issue. I see. This page claims so:

[Bug 81841] amd-iommu: kernel BUG lockup after shutting down KVM guest using PCI passthrough/PCIe bridge

2014-08-07 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=81841 --- Comment #9 from Alex Williamson alex.william...@redhat.com --- (In reply to Marti Raudsepp from comment #8) (In reply to Alex Williamson from comment #7) There are some proposed workarounds on the web None of these remotely address the

Re: KVM on ARM64

2014-08-07 Thread Christoffer Dall
On Thu, Aug 07, 2014 at 01:06:09PM -0500, Wei Huang wrote: On 08/07/2014 12:53 PM, Christoffer Dall wrote: Currently we only model a virtual machine board (the -machine type=virt parameter) which has a UART, a flash, an RTC, and a bunch of virtio-mmio channelse. Once we either emulate a

Re: [PATCH v3] kvm: x86: fix stale mmio cache bug

2014-08-07 Thread Xiao Guangrong
On 08/08/2014 02:32 AM, David Matlack wrote: The following events can lead to an incorrect KVM_EXIT_MMIO bubbling up to userspace: (1) Guest accesses gpa X without a memory slot. The gfn is cached in struct kvm_vcpu_arch (mmio_gfn). On Intel EPT-enabled hosts, KVM sets the SPTE

[Bug 81841] amd-iommu: kernel BUG lockup after shutting down KVM guest using PCI passthrough/PCIe bridge

2014-08-07 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=81841 Joel Schopp joel.sch...@amd.com changed: What|Removed |Added CC||joel.sch...@amd.com ---

Re: [PATCH v4 1/5] powerpc/eeh: Export eeh_iommu_group_to_pe()

2014-08-07 Thread Benjamin Herrenschmidt
On Thu, 2014-08-07 at 12:47 +1000, Gavin Shan wrote: The function is used by VFIO driver, which might be built as a dynamic module. So it should be exported. Signed-off-by: Gavin Shan gws...@linux.vnet.ibm.com Acked-by: Benjamin Herrenschmidt b...@kernel.crashing.org Alex, are you taking

Re: [Qemu-devel] [questions] about KVMasaMicrosoft-compatiblehypervisor

2014-08-07 Thread Zhang Haoyu
Hi Zhang, No I haven't seen such problem Which kernel version are you running? Host kernel: RHEL7-RC1(linux-3.10.0). Does it include the latest lazy eli changes? lazy eli or lazy eoi? EOI How to confirm whether lazy eli has been included? not in linux-3.10.0 So, do you mean hv_vapic

Re: [PATCH v4 2/5] powerpc/eeh: Add warning message in eeh_dev_open()

2014-08-07 Thread Benjamin Herrenschmidt
On Thu, 2014-08-07 at 12:47 +1000, Gavin Shan wrote: The patch adds one warning message in eeh_dev_open() in case the PCI device can't be marked as passed through. Suggested-by: Alexey Kardashevskiy a...@ozlabs.ru Signed-off-by: Gavin Shan gws...@linux.vnet.ibm.com --- Acked-by: Benjamin

Re: [PATCH v4 2/5] powerpc/eeh: Add warning message in eeh_dev_open()

2014-08-07 Thread Alex Williamson
On Fri, 2014-08-08 at 13:50 +1000, Benjamin Herrenschmidt wrote: On Thu, 2014-08-07 at 12:47 +1000, Gavin Shan wrote: The patch adds one warning message in eeh_dev_open() in case the PCI device can't be marked as passed through. Suggested-by: Alexey Kardashevskiy a...@ozlabs.ru

Re: [PATCH v3] kvm: x86: fix stale mmio cache bug

2014-08-07 Thread David Matlack
On Thu, Aug 7, 2014 at 6:36 PM, Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com wrote: On 08/08/2014 02:32 AM, David Matlack wrote: The following events can lead to an incorrect KVM_EXIT_MMIO bubbling up to userspace: (1) Guest accesses gpa X without a memory slot. The gfn is cached in

[Bug 72381] [Nested] L1 call trace when create windows 7 guest as L2 guest.

2014-08-07 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=72381 Zhou, Chao chao.z...@intel.com changed: What|Removed |Added CC||chao.z...@intel.com ---

[Bug 72381] [Nested] L1 call trace when create windows 7 guest as L2 guest.

2014-08-07 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=72381 --- Comment #4 from Zhou, Chao chao.z...@intel.com --- this commit fixed the bug: commit 9242b5b60df8b13b469bc6b7be08ff6ebb551ad3 Author: Bandan Das b...@redhat.com Date: Tue Jul 8 00:30:23 2014 -0400 KVM: x86: Check for nested events if

[PATCH 4/4] PCI: use device flag operation helper function in iov.c

2014-08-07 Thread Ethan Zhao
Use device flag operation helper functions when check device assignment status. Signed-off-by: Ethan Zhao ethan.z...@oracle.com --- drivers/pci/iov.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/drivers/pci/iov.c b/drivers/pci/iov.c index cb6f247..4d109c0 100644 ---

[PATCH 3/4] xen-pciback: use pci device flag operation helper function

2014-08-07 Thread Ethan Zhao
Use pci device flag operation helper functions when set device to assigned or deassigned state. Acked-by: David Vrabel david.vra...@citrix.com Reviewed-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com Signed-off-by: Ethan Zhao ethan.z...@oracle.com --- drivers/xen/xen-pciback/pci_stub.c |4

[PATCH 1/4] PCI: introduce helper functions for device flag operation

2014-08-07 Thread Ethan Zhao
This patch introduced three helper functions to hide direct device flag operation. void pci_set_dev_assigned(struct pci_dev *pdev); void pci_clear_dev_assigned(struct pci_dev *pdev); bool pci_is_dev_assigned(struct pci_dev *pdev); Signed-off-by: Ethan Zhao ethan.z...@oracle.com --- v2: simplify

[PATCH 2/4] KVM: use pci device flag operation helper functions

2014-08-07 Thread Ethan Zhao
Use helper function instead of direct operation to pci device flag when set device to assigned or deassigned. Acked-by: Paolo Bonzini pbonz...@redhat.com Signed-off-by: Ethan Zhao ethan.z...@oracle.com --- virt/kvm/assigned-dev.c |2 +- virt/kvm/iommu.c|4 ++-- 2 files changed, 3

[Bug 72381] [Nested] L1 call trace when create windows 7 guest as L2 guest.

2014-08-07 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=72381 robert...@intel.com changed: What|Removed |Added Status|NEW |RESOLVED Resolution|---

[PATCH v3 0/4 resend] Introduce device assignment flag operation helper function

2014-08-07 Thread Ethan Zhao
This patch set introduces three PCI device flag operation helper functions when set pci device PF/VF to assigned or deassigned status also check it. and patch 2,3,4 apply these helper functions to KVM,XEN and PCI. v2: simplify unnecessory ternary operation in function pci_is_dev_assigned(). v3:

[Bug 72381] [Nested] L1 call trace when create windows 7 guest as L2 guest.

2014-08-07 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=72381 robert...@intel.com changed: What|Removed |Added Status|RESOLVED|VERIFIED -- You are receiving this

Re: [PATCH 0/6] IRQFD without IRQ routing, enabled for XICS

2014-08-07 Thread Paul Mackerras
On Wed, Aug 06, 2014 at 02:35:29PM +0200, Paolo Bonzini wrote: This doesn't build without CONFIG_KVM_XICS, so I had to apply a fixup patch to move some code from being under CONFIG_HAVE_KVM_IRQCHIP or unconditional, to being conditional on CONFIG_HAVE_KVM_IRQFD. I'll send the patch shortly.