[PATCH kvm-unit-tests] x86: fix build (macro R interpreted as raw string)

2015-03-13 Thread Radim Krčmář
:26: error: expected ‘:’ or ‘)’ before string constant "orl $0x200, (%%"R"sp)\n\t" Fix it by putting a space between macro R and a string literal. (We already do that somewhere.) Signed-off-by: Radim Krčmář --- I think it would be better to replace "[...]"

Re: [PATCH RFC 0/9] Implement handling of RH=1 for MSI delivery in KVM

2015-03-16 Thread Radim Krčmář
2015-03-14 18:00-0600, James Sullivan: > * DM=1, RH=0 : Logical destination mode without redirection. Interrupt > is delivered to all LAPICs in the logical group > specified by the IRQ's destination map and delivery > mode. Your previou

Re: [PATCH] kvm: x86: svm: remove SVM_EXIT_READ_CR* intercepts

2015-03-16 Thread Radim Krčmář
2015-03-16 11:16-0500, Joel Schopp: > On 03/12/2015 04:20 PM, Radim Krčmář wrote: > > 2015-03-12 15:17-0500, Joel Schopp: > >> There isn't really a valid reason for kvm to intercept cr* reads > >> on svm hardware. The current kvm code just ends up returning > &

Re: [PATCH v2 0/2] Implement handling of RH=1 for MSI delivery in KVM

2015-03-16 Thread Radim Krčmář
2015-03-16 11:28-0600, James Sullivan: > Changes Since v1: > * Reworked patches into two commits: > 1) [Patch v2 1/2] Extended struct kvm_lapic_irq with bool > msi_redir_hint > * Initialize msi_redir_hint = true in kvm_set_msi_irq when RH=1 > * Initia

[PATCH RESEND] KVM: nVMX: mask unrestricted_guest if disabled on L0

2015-03-17 Thread Radim Krčmář
nested_vmx_vmexit+0x96e/0xb00 [kvm_intel] () Prevent this scenario by masking SECONDARY_EXEC_UNRESTRICTED_GUEST when the host doesn't have it enabled. Fixes: 78051e3b7e35 ("KVM: nVMX: Disable unrestricted mode if ept=0") Cc: sta...@vger.kernel.org Tested-By: Kashyap Chamarthy Sign

Re: [PATCH v3 1/2] kvm: x86: Extended struct kvm_lapic_irq with msi_redir_hint for MSI delivery

2015-03-17 Thread Radim Krčmář
Initialized the value > of msi_redir_hint to true when RH=1 in kvm_set_msi_irq(), and initialized > to false in all other cases. > > Added value of msi_redir_hint to a debug message dump of an IRQ in > apic_send_ipi(). > > Signed-off-by: James Sullivan > --- Reviewed-by: Rad

Re: [PATCH v3 2/2] kvm: x86: Deliver MSI IRQ to only lowest prio cpu if msi_redir_hint is true

2015-03-17 Thread Radim Krčmář
edir_hint. > > Moved kvm_is_dm_lowest_prio() into lapic.h and renamed to > kvm_lowest_prio_delivery(). > > Changed a check in kvm_irq_delivery_to_apic_fast() from > irq->delivery_mode == APIC_DM_LOWPRI to kvm_is_dm_lowest_prio(). > > Signed-off-by: James Sullivan > -

[PATCH] KVM: x86: call irq notifiers with directed EOI

2015-03-18 Thread Radim Krčmář
kvm_ioapic_update_eoi() wasn't called if directed EOI was enabled. We need to do that for irq notifiers. (Like with edge interrupts.) Fix it by skipping EOI broadcast only. Bug: https://bugzilla.kernel.org/show_bug.cgi?id=82211 Signed-off-by: Radim Krčmář --- arch/x86/kvm/ioapic.

Re: [PATCH] KVM: x86: call irq notifiers with directed EOI

2015-03-18 Thread Radim Krčmář
2015-03-18 15:37-0400, Bandan Das: > Radim Krčmář writes: > > kvm_ioapic_update_eoi() wasn't called if directed EOI was enabled. > > We need to do that for irq notifiers. (Like with edge interrupts.) > > Wow! It's interesting that this path is only hit with X

Re: [Patch v5] x86: irq_comm: Add check for RH bit in kvm_set_msi_irq

2015-03-19 Thread Radim Krčmář
2015-03-18 22:09-0300, Marcelo Tosatti: > > > See native_compose_msi_msg: > > > ((apic->irq_dest_mode == 0) ? > > > MSI_ADDR_DEST_MODE_PHYSICAL : > > > MSI_ADDR_DEST_MODE_LOGICAL) | > > > ((apic->irq_delivery_mode != de

Re: [PATCH] KVM: x86: call irq notifiers with directed EOI

2015-03-19 Thread Radim Krčmář
2015-03-19 18:24+0100, Paolo Bonzini: > > diff --git a/arch/x86/kvm/lapic.c b/arch/x86/kvm/lapic.c > > @@ -833,8 +833,7 @@ int kvm_apic_compare_prio(struct kvm_vcpu *vcpu1, > > struct kvm_vcpu *vcpu2) > > - if (!(kvm_apic_get_reg(apic, APIC_SPIV) & APIC_SPIV_DIRECTED_EOI) && > > - kvm_ioap

[PATCH] KVM: x86: inline kvm_ioapic_handles_vector()

2015-03-19 Thread Radim Krčmář
An overhead from function call is not appropriate for its size and frequency of execution. Suggested-by: Paolo Bonzini Signed-off-by: Radim Krčmář --- I'm not very fond of that smp_rmb(): there is no real synchronization against update_handled_vectors(), so the only point I see is to

Re: [PATCH] KVM: x86: call irq notifiers with directed EOI

2015-03-20 Thread Radim Krčmář
2015-03-19 18:44-0300, Marcelo Tosatti: > On Wed, Mar 18, 2015 at 07:38:22PM +0100, Radim Krčmář wrote: > > kvm_ioapic_update_eoi() wasn't called if directed EOI was enabled. > > We need to do that for irq notifiers. (Like with edge interrupts.) > > > > Fix i

Re: [Patch v5] x86: irq_comm: Add check for RH bit in kvm_set_msi_irq

2015-03-20 Thread Radim Krčmář
2015-03-19 16:51-0600, James Sullivan: > I played around with native_compose_msi_msg and discovered the following: > > * dm=0, rh=0 => Physical Destination Mode > * dm=0, rh=1 => Failed delivery > * dm=1, rh=0 => Logical Destination Mode, No Redirection > * dm=1, rh=1 => Logical Destination Mode,

Re: [Patch v5] x86: irq_comm: Add check for RH bit in kvm_set_msi_irq

2015-03-23 Thread Radim Krčmář
2015-03-20 11:50-0600, James Sullivan: > On 03/20/2015 09:22 AM, James Sullivan wrote: > > On 03/20/2015 09:15 AM, Radim Krčmář wrote: > >> 2015-03-19 16:51-0600, James Sullivan: > >>> I played around with native_compose_msi_msg and discovered the following: > &

Re: [Patch v5] x86: irq_comm: Add check for RH bit in kvm_set_msi_irq

2015-03-24 Thread Radim Krčmář
2015-03-23 16:46-0600, James Sullivan: > On 03/23/2015 03:13 PM, Radim Krčmář wrote: > > I meant if the delivery mode from data register isn't ignored with RH=1, > > and the message delivered as if lowest-priority was set there. > > (Decided by having something else tha

Re: x86: kvm: Revert "remove sched notifier for cross-cpu migrations"

2015-03-24 Thread Radim Krčmář
2015-03-23 20:21-0300, Marcelo Tosatti: > The following point: > > 2. per-CPU pvclock time info is updated if the >underlying CPU changes. > > Is not true anymore since "KVM: x86: update pvclock area conditionally, > on cpu migration". I think that the revert doesn't fix point 2.: "

Re: x86: kvm: Revert "remove sched notifier for cross-cpu migrations"

2015-03-25 Thread Radim Krčmář
2015-03-24 15:33-0700, Andy Lutomirski: > On Tue, Mar 24, 2015 at 8:34 AM, Radim Krčmář wrote: > > What is the problem? > > The kvmclock spec says that the host will increment a version field to > an odd number, then update stuff, then increment it to an even number. >

Re: x86: kvm: Revert "remove sched notifier for cross-cpu migrations"

2015-03-25 Thread Radim Krčmář
2015-03-24 19:59-0300, Marcelo Tosatti: > On Tue, Mar 24, 2015 at 04:34:12PM +0100, Radim Krčmář wrote: > > 2015-03-23 20:21-0300, Marcelo Tosatti: > > > The following point: > > > > > > 2. per-CPU pvclock time info is updated if the > > >

Re: x86: kvm: Revert "remove sched notifier for cross-cpu migrations"

2015-03-25 Thread Radim Krčmář
2015-03-25 12:08+0100, Radim Krčmář: > Reverting the patch protects us from any migration, but I don't think we > need to care about changing VCPUs as long as we read a consistent data > from kvmclock. (VCPU can change outside of this loop too, so it doesn't > matter if we

Re: x86: kvm: Revert "remove sched notifier for cross-cpu migrations"

2015-03-25 Thread Radim Krčmář
we are reverting and is completely unrelated to the bug we are fixing now, (reverted patch just was just wrong) Reviewed-by: Radim Krčmář > diff --git a/arch/x86/vdso/vclock_gettime.c b/arch/x86/vdso/vclock_gettime.c > @@ -82,18 +82,15 @@ static notrace cycle_t vread_pvclock(int *mode) >

Re: [Qemu-devel] E5-2620v2 - emulation stop error

2015-03-26 Thread Radim Krčmář
2015-03-25 20:05-0400, Kevin O'Connor: > On Thu, Mar 26, 2015 at 02:35:58AM +0300, Andrey Korolyov wrote: > > Thanks, strangely the reboot is always failing now and always reaching > > seabios greeting. May be prints straightened up a race (e.g. it is not > > int19 problem really). > > > > object

<    1   2   3   4   5   6