On Mon, Aug 26, 2013 at 02:18:32PM +0530, Raghavendra K T wrote:
This series forms the kvm host part of paravirtual spinlock
based against kvm tree.
Please refer to https://lkml.org/lkml/2013/8/9/265 for
kvm guest and Xen, x86 part merged to -tip spinlocks.
Please note that:
kvm
On Sat, Aug 24, 2013 at 10:14:06PM +0200, Yann Droneaud wrote:
Hi,
Following a patchset asking to change calls to get_unused_flag() [1]
to use O_CLOEXEC, Alex Williamson [2][3] decided to change VFIO
to use the flag.
Since it's a related subsystem to KVM, using O_CLOEXEC for
file
On Sun, Aug 25, 2013 at 04:27:14PM +0100, Alexander Graf wrote:
On 25.08.2013, at 16:18, Peter Maydell wrote:
On 25 August 2013 15:48, Gleb Natapov g...@redhat.com wrote:
On Sun, Aug 25, 2013 at 03:29:17PM +0100, Peter Maydell wrote:
Smiley noted, but this is pretty unlikely since it's
On Sun, Aug 25, 2013 at 09:26:47PM -0400, Chris Metcalf wrote:
On 8/25/2013 7:39 AM, Gleb Natapov wrote:
On Mon, Aug 12, 2013 at 04:24:11PM -0400, Chris Metcalf wrote:
This change provides the initial framework support for KVM on tilegx.
Basic virtual disk and networking is supported
On Wed, Aug 14, 2013 at 10:51:14AM +1000, Benjamin Herrenschmidt wrote:
On Thu, 2013-08-01 at 14:44 +1000, Alexey Kardashevskiy wrote:
This is to reserve a capablity number for upcoming support
of H_PUT_TCE_INDIRECT and H_STUFF_TCE pseries hypercalls
which support mulptiple DMA map/unmap
On Sat, Aug 24, 2013 at 10:14:06PM +0200, Yann Droneaud wrote:
Hi,
Following a patchset asking to change calls to get_unused_flag() [1]
to use O_CLOEXEC, Alex Williamson [2][3] decided to change VFIO
to use the flag.
Since it's a related subsystem to KVM, using O_CLOEXEC for
file
On Wed, Aug 14, 2013 at 10:51:14AM +1000, Benjamin Herrenschmidt wrote:
On Thu, 2013-08-01 at 14:44 +1000, Alexey Kardashevskiy wrote:
This is to reserve a capablity number for upcoming support
of H_PUT_TCE_INDIRECT and H_STUFF_TCE pseries hypercalls
which support mulptiple DMA map/unmap
On Sat, Aug 24, 2013 at 12:32:07AM +, Chris Leduc wrote:
Hi - In a KVM/qemu environment is it possible for the host to back only a
portion of the guests memory with huge pages? In some situations it may not
be desirable to back the entirety of a guest's memory with huge pages (as can
On Fri, Aug 09, 2013 at 09:14:13PM +0200, Stefan Pietsch wrote:
On 04.08.2013 14:44, Gleb Natapov wrote:
On Fri, Aug 02, 2013 at 08:24:38AM +0200, Stefan Pietsch wrote:
On 31.07.2013 11:20, Gleb Natapov wrote:
On Wed, Jul 31, 2013 at 11:10:01AM +0200, Stefan Pietsch wrote:
On 30.07.2013
On Wed, Aug 07, 2013 at 12:40:36AM +0530, Raghavendra K T wrote:
On 08/07/2013 12:02 AM, Eric Northup wrote:
If this is about migration correctness, could it get folded into the
previous patch 2/5, so that there's not a broken commit which could
hurt bisection?
Yes. It could be. Only
On Thu, Aug 08, 2013 at 05:55:09PM +0200, Andreas Färber wrote:
Hi Peter,
Am 08.08.2013 14:51, schrieb Peter Maydell:
[I missed this KVM call but the stuff about -cpu host ties into
an issue we've been grappling with for ARM KVM, so it seems
a reasonable jumping-off-point.]
On 6
On Fri, Aug 09, 2013 at 02:53:30PM -0300, Eduardo Habkost wrote:
On Thu, Aug 08, 2013 at 12:29:07PM -0700, Christoffer Dall wrote:
On Thu, Aug 08, 2013 at 08:05:11PM +0100, Peter Maydell wrote:
On 8 August 2013 19:39, Christoffer Dall christoffer.d...@linaro.org
wrote:
FWIW, from the
On Thu, Aug 08, 2013 at 07:20:41PM +0100, Peter Maydell wrote:
For ARM you can't get at feature info of the host from userspace
(unless you want to get into parsing /proc/cpuinfo), so my current
idea is to have KVM_ARM_VCPU_INIT support a target-cpu-type
which means whatever host CPU is.
On Fri, Aug 09, 2013 at 07:30:13AM -0700, Christoffer Dall wrote:
The KVM_HPAGE_DEFINES are a little artificial on ARM, since the huge
page size is statically defined at compile time and there is only a
single huge page size.
Now when the main kvm code relying on these defines has been moved
On Sun, Aug 25, 2013 at 03:29:17PM +0100, Peter Maydell wrote:
On 25 August 2013 15:05, Gleb Natapov g...@redhat.com wrote:
(you will probably need them when you will implement
nested HYP mode :)).
Smiley noted, but this is pretty unlikely since it's not possible
to lie to the guest about
On Fri, Aug 23, 2013 at 02:41:13PM +0100, James Hogan wrote:
On 23/08/13 13:58, Gleb Natapov wrote:
On Fri, Aug 23, 2013 at 01:26:00PM +0100, James Hogan wrote:
When a KVM internal error occurs QEMU dumps the CPU state, however it
doesn't synchronise the state from KVM first so the dumped
depends on whether the arch says to stop or not).
x86_cpu_dump_state() calls cpu_synchronize_state() already.
Note that x86 does a sync in its kvm_arch_stop_on_emulation_error()
function so at least for emulation errors is unaffected.
Signed-off-by: James Hogan james.ho...@imgtec.com
Cc: Gleb
On Tue, Aug 06, 2013 at 05:57:02PM +0200, Jan Kiszka wrote:
On 2013-08-06 17:53, Gleb Natapov wrote:
On Tue, Aug 06, 2013 at 05:48:54PM +0200, Jan Kiszka wrote:
On 2013-08-06 17:04, Zhang, Yang Z wrote:
Gleb Natapov wrote on 2013-08-06:
On Tue, Aug 06, 2013 at 02:12:51PM +, Zhang
On Wed, Aug 07, 2013 at 03:32:37PM +0200, Paolo Bonzini wrote:
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 44494ed..60a3644 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@ -3375,8 +3375,10 @@ static void vmx_set_cr3(struct kvm_vcpu *vcpu,
unsigned long cr3)
On Wed, Aug 07, 2013 at 08:50:12PM -0400, Konrad Rzeszutek Wilk wrote:
On Wed, Aug 07, 2013 at 12:15:21PM +0530, Raghavendra K T wrote:
On 08/07/2013 10:18 AM, H. Peter Anvin wrote:
Please let me know, if I should rebase again.
tip:master is not a stable branch; it is more like
On Tue, Aug 06, 2013 at 09:47:23AM +0200, Jan Kiszka wrote:
On 2013-08-05 13:40, Gleb Natapov wrote:
On Mon, Aug 05, 2013 at 07:27:33PM +0800, Arthur Chunqi Li wrote:
On Mon, Aug 5, 2013 at 4:07 PM, Gleb Natapov g...@redhat.com wrote:
From: Nadav Har'El n...@il.ibm.com
Recent KVM, since
On Tue, Aug 06, 2013 at 09:55:09AM +0200, Jan Kiszka wrote:
On 2013-08-06 09:51, Gleb Natapov wrote:
On Tue, Aug 06, 2013 at 09:47:23AM +0200, Jan Kiszka wrote:
On 2013-08-05 13:40, Gleb Natapov wrote:
On Mon, Aug 05, 2013 at 07:27:33PM +0800, Arthur Chunqi Li wrote:
On Mon, Aug 5, 2013
On Tue, Aug 06, 2013 at 10:18:17AM +0200, Jan Kiszka wrote:
On 2013-08-06 10:00, Gleb Natapov wrote:
On Tue, Aug 06, 2013 at 09:55:09AM +0200, Jan Kiszka wrote:
On 2013-08-06 09:51, Gleb Natapov wrote:
On Tue, Aug 06, 2013 at 09:47:23AM +0200, Jan Kiszka wrote:
On 2013-08-05 13:40, Gleb
yang.z.zh...@intel.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
fix white space
arch/x86/include/asm/kvm_host.h |4 +++
arch/x86/kvm/mmu.c | 61 ---
arch/x86/kvm/paging_tmpl.h | 25 ++--
arch/x86/kvm/vmx.c
-by: Gleb Natapov g...@redhat.com
---
Fix white space error.
arch/x86/kvm/vmx.c | 20 ++--
1 file changed, 18 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 51c06c2..e23fdf2 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@ -2250,6
On Tue, Aug 06, 2013 at 10:39:56AM +0200, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
Do not report that we can enter the guest in 64-bit mode if the host is
32-bit only. This is not supported by KVM.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
Reviewed-by: Gleb Natapov
On Tue, Aug 06, 2013 at 10:39:59AM +0200, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
If nested EPT is enabled, the L2 guest may change CR3 without any exits.
We therefore have to read the current value from the VMCS when switching
to L1. However, if paging wasn't enabled, L0
On Tue, Aug 06, 2013 at 12:25:55PM +0200, Jan Kiszka wrote:
On 2013-08-06 12:12, Gleb Natapov wrote:
On Tue, Aug 06, 2013 at 10:39:59AM +0200, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
If nested EPT is enabled, the L2 guest may change CR3 without any exits.
We therefore
On Tue, Aug 06, 2013 at 01:31:03PM +0300, Gleb Natapov wrote:
On Tue, Aug 06, 2013 at 12:25:55PM +0200, Jan Kiszka wrote:
On 2013-08-06 12:12, Gleb Natapov wrote:
On Tue, Aug 06, 2013 at 10:39:59AM +0200, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
If nested EPT
On Tue, Aug 06, 2013 at 11:44:41AM +, Zhang, Yang Z wrote:
Gleb Natapov wrote on 2013-08-06:
On Tue, Aug 06, 2013 at 10:39:59AM +0200, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
If nested EPT is enabled, the L2 guest may change CR3 without any exits.
We therefore
On Tue, Aug 06, 2013 at 02:12:51PM +, Zhang, Yang Z wrote:
Gleb Natapov wrote on 2013-08-06:
On Tue, Aug 06, 2013 at 11:44:41AM +, Zhang, Yang Z wrote:
Gleb Natapov wrote on 2013-08-06:
On Tue, Aug 06, 2013 at 10:39:59AM +0200, Jan Kiszka wrote:
From: Jan Kiszka jan.kis
On Tue, Aug 06, 2013 at 05:48:54PM +0200, Jan Kiszka wrote:
On 2013-08-06 17:04, Zhang, Yang Z wrote:
Gleb Natapov wrote on 2013-08-06:
On Tue, Aug 06, 2013 at 02:12:51PM +, Zhang, Yang Z wrote:
Gleb Natapov wrote on 2013-08-06:
On Tue, Aug 06, 2013 at 11:44:41AM +, Zhang, Yang Z
On Tue, Aug 06, 2013 at 05:47:36PM +0200, Paolo Bonzini wrote:
On 08/06/2013 05:15 PM, Juan Quintela wrote:
* pvpanic
- was added by default in 1.5, this might have been too rash:
- might change guest behaviour if guest is set to reboot on panic
Interesting, but it looks like either a
On Wed, Aug 07, 2013 at 01:34:41AM +, Zhanghaoyu (A) wrote:
The QEMU command line (/var/log/libvirt/qemu/[domain name].log),
LC_ALL=C PATH=/bin:/sbin:/usr/bin:/usr/sbin HOME=/
QEMU_AUDIO_DRV=none
/usr/local/bin/qemu-system-x86_64 -name ATS1 -S -M pc-0.12 -cpu
qemu32 -enable-kvm -m
it is adapted to the current mmu mode
automatically
The bug can be triggered when nested npt is used and L1 guest and L2 guest
use different mmu mode
Reported-by: Jan Kiszka jan.kis...@siemens.com
Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com
Reviewed-by: Gleb Natapov g
-by: Xinhao Xu xinhao...@intel.com
Signed-off-by: Yang Zhang yang.z.zh...@intel.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/vmx.c | 23 ---
1 file changed, 16 insertions(+), 7 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index e999dc7..27efa6a
...@il.ibm.com
Signed-off-by: Jun Nakajima jun.nakaj...@intel.com
Signed-off-by: Xinhao Xu xinhao...@intel.com
Signed-off-by: Yang Zhang yang.z.zh...@intel.com
Signed-off-by: Jun Nakajima jun.nakaj...@intel.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/mmu.c | 55
...@il.ibm.com
Signed-off-by: Jun Nakajima jun.nakaj...@intel.com
Signed-off-by: Xinhao Xu xinhao...@intel.com
Signed-off-by: Yang Zhang yang.z.zh...@intel.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/vmx.h |2 ++
arch/x86/include/uapi/asm/vmx.h |1 +
arch/x86
Nakajima jun.nakaj...@intel.com
Signed-off-by: Xinhao Xu xinhao...@intel.com
Signed-off-by: Yang Zhang yang.z.zh...@intel.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/x86.c | 11 ---
1 file changed, 11 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index
...@linux.vnet.ibm.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/mmu.c |8
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index 9e0f467..a512ecf 100644
--- a/arch/x86/kvm/mmu.c
+++ b/arch/x86/kvm/mmu.c
@@ -132,8 +132,8
-off-by: Jun Nakajima jun.nakaj...@intel.com
Signed-off-by: Xinhao Xu xinhao...@intel.com
Signed-off-by: Yang Zhang yang.z.zh...@intel.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/mmu.c | 27 +++
arch/x86/kvm/mmu.h |2 ++
arch/x86/kvm/vmx.c | 41
Guangrong xiaoguangr...@linux.vnet.ibm.com
Reviewed-by: Orit Wasserman owass...@redhat.com
Signed-off-by: Nadav Har'El n...@il.ibm.com
Signed-off-by: Jun Nakajima jun.nakaj...@intel.com
Signed-off-by: Xinhao Xu xinhao...@intel.com
Signed-off-by: Yang Zhang yang.z.zh...@intel.com
Signed-off-by: Gleb
yang.z.zh...@intel.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/kvm_host.h |4 +++
arch/x86/kvm/mmu.c | 61 ---
arch/x86/kvm/paging_tmpl.h | 25 ++--
arch/x86/kvm/vmx.c | 19
Reviewed-by: Paolo Bonzini pbonz...@redhat.com
Signed-off-by: Yang Zhang yang.z.zh...@intel.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/vmx.c |6 ++
1 file changed, 2 insertions(+), 4 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index ed224bd
-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/paging_tmpl.h | 16 +---
1 file changed, 13 insertions(+), 3 deletions(-)
diff --git a/arch/x86/kvm/paging_tmpl.h b/arch/x86/kvm/paging_tmpl.h
index 7581395..2c2f635 100644
--- a/arch/x86/kvm/paging_tmpl.h
+++ b/arch/x86/kvm
-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/vmx.c | 20 ++--
1 file changed, 18 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 51c06c2..c65a08a 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@ -2250,6 +2250,22 @@ static
Xiao comment about checking ept pointer before flushing individual ept context
is addressed here.
Gleb Natapov (3):
nEPT: make guest's A/D bits depends on guest's paging mode
nEPT: Support shadow paging for guest paging without A/D bits
nEPT: correctly check if remote tlb flush is needed
This patch makes guest A/D bits definition to be dependable on paging
mode, so when EPT support will be added it will be able to define them
differently.
Reviewed-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/paging_tmpl.h | 30
From: Yang Zhang yang.z.zh...@intel.com
Since nEPT doesn't support A/D bit, so we should not set those bit
when build shadow page table.
Reviewed-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com
Signed-off-by: Yang Zhang yang.z.zh...@intel.com
Signed-off-by: Gleb Natapov g...@redhat.com
-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/mmu.c |5 +
arch/x86/kvm/paging_tmpl.h | 37 -
2 files changed, 41 insertions(+), 1 deletion(-)
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index 4c4274d..b5273c3 100644
--- a/arch/x86/kvm
-by: Nadav Har'El n...@il.ibm.com
Signed-off-by: Jun Nakajima jun.nakaj...@intel.com
Signed-off-by: Xinhao Xu xinhao...@intel.com
Signed-off-by: Yang Zhang yang.z.zh...@intel.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/vmx.c | 13 +
1 file changed, 13 insertions
On Tue, Jul 30, 2013 at 11:41:00PM +0800, Arthur Chunqi Li wrote:
Change rflags in struct regs to host_rflags. Remove settings
to GUEST_RFLAGS since GUEST_RFLAGS can be set by vmwrite. Treat
host_rflags as host rflags before and after vmenter.
I am not sure the change is for the better.
.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
Reviewed-by: Gleb Natapov g...@redhat.com
---
Arthur, please add your tested-by also officially.
arch/x86/kvm/vmx.c |9 ++---
1 files changed, 6 insertions(+), 3 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
On Mon, Aug 05, 2013 at 08:35:09AM +, Zhanghaoyu (A) wrote:
hi all,
I met similar problem to these, while performing live migration or
save-restore test on the kvm platform (qemu:1.4.0, host:suse11sp2,
guest:suse11sp2), running tele-communication software suite in
On Mon, Aug 05, 2013 at 04:48:47PM +0800, Arthur Chunqi Li wrote:
On Mon, Aug 5, 2013 at 4:29 PM, Gleb Natapov g...@redhat.com wrote:
On Tue, Jul 30, 2013 at 11:41:00PM +0800, Arthur Chunqi Li wrote:
Change rflags in struct regs to host_rflags. Remove settings
to GUEST_RFLAGS since
On Mon, Aug 05, 2013 at 05:10:35PM +0800, Arthur Chunqi Li wrote:
Advertise VM_EXIT_SAVE_IA32_PAT and VM_EXIT_LOAD_IA32_PAT.
Signed-off-by: Arthur Chunqi Li yzt...@gmail.com
---
arch/x86/kvm/vmx.c |3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/arch/x86/kvm/vmx.c
On Mon, Aug 05, 2013 at 09:09:56AM +, Zhanghaoyu (A) wrote:
The QEMU command line (/var/log/libvirt/qemu/[domain name].log),
LC_ALL=C PATH=/bin:/sbin:/usr/bin:/usr/sbin HOME=/ QEMU_AUDIO_DRV=none
/usr/local/bin/qemu-system-x86_64 -name ATS1 -S -M pc-0.12 -cpu qemu32
-enable-kvm -m 12288
On Mon, Aug 05, 2013 at 12:38:32PM +0200, Jan Kiszka wrote:
On 2013-08-05 11:36, Gmail wrote:
On Mon, Aug 05, 2013 at 05:10:35PM +0800, Arthur Chunqi Li wrote:
Advertise VM_EXIT_SAVE_IA32_PAT and VM_EXIT_LOAD_IA32_PAT.
Signed-off-by: Arthur Chunqi Li yzt...@gmail.com
---
On Mon, Aug 05, 2013 at 01:04:25PM +0200, Jan Kiszka wrote:
On 2013-08-05 13:00, Arthur Chunqi Li wrote:
On Mon, Aug 5, 2013 at 6:55 PM, Gleb Natapov g...@redhat.com wrote:
On Mon, Aug 05, 2013 at 12:38:32PM +0200, Jan Kiszka wrote:
On 2013-08-05 11:36, Gmail wrote:
On Mon, Aug 05
On Mon, Aug 05, 2013 at 07:27:33PM +0800, Arthur Chunqi Li wrote:
On Mon, Aug 5, 2013 at 4:07 PM, Gleb Natapov g...@redhat.com wrote:
From: Nadav Har'El n...@il.ibm.com
Recent KVM, since
http://kerneltrap.org/mailarchive/linux-kvm/2010/5/2/6261577
switch the EFER MSR when EPT is used
On Mon, Aug 05, 2013 at 07:48:54AM -0400, Paolo Bonzini wrote:
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index e999dc7..27efa6a 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@ -2198,7 +2198,8 @@ static __init void nested_vmx_setup_ctls_msrs(void)
#else
On Mon, Aug 05, 2013 at 08:03:31AM -0400, Paolo Bonzini wrote:
- Original Message -
From: Arthur Chunqi Li yzt...@gmail.com
To: kvm@vger.kernel.org
Cc: jan kiszka jan.kis...@web.de, g...@redhat.com, pbonz...@redhat.com,
Arthur Chunqi Li yzt...@gmail.com
Sent: Monday, August
On Sun, Aug 04, 2013 at 07:49:00PM +0200, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
At least WB must be possible.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
Reviewed-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/vmx.c |4 ++--
1 files changed, 2 insertions
On Mon, Aug 05, 2013 at 08:43:25PM +0800, Arthur Chunqi Li wrote:
Separate host_rflags and guest_rflags (regs.rflags used for guest).
Fix bug of set/get guest rflags when vmenter/vmexit.
Signed-off-by: Arthur Chunqi Li yzt...@gmail.com
---
x86/vmx.c | 11 +++
x86/vmx.h |4
On Mon, Aug 05, 2013 at 03:21:57PM +0200, Ralf Baechle wrote:
On Mon, Aug 05, 2013 at 02:17:01PM +0100, James Hogan wrote:
On 01/08/13 21:22, David Daney wrote:
From: David Daney david.da...@cavium.com
No code changes, just reflowing some comments and consistently using
tabs
On Mon, Aug 05, 2013 at 07:06:10PM +0200, Ralf Baechle wrote:
On Mon, Aug 05, 2013 at 04:43:27PM +0300, Gleb Natapov wrote:
Date: Mon, 5 Aug 2013 16:43:27 +0300
From: Gleb Natapov g...@redhat.com
To: Ralf Baechle r...@linux-mips.org
Cc: James Hogan james.ho...@imgtec.com, David Daney
On Sun, Aug 04, 2013 at 11:24:41AM +0200, Jan Kiszka wrote:
On 2013-08-01 16:08, Gleb Natapov wrote:
Another day -- another version of the nested EPT patches. In this version
included fix for need_remote_flush() with shadowed ept, set bits 6:8
of exit_qualification during ept_violation
On Sun, Aug 04, 2013 at 12:32:06PM +0300, Gleb Natapov wrote:
On Sun, Aug 04, 2013 at 11:24:41AM +0200, Jan Kiszka wrote:
On 2013-08-01 16:08, Gleb Natapov wrote:
Another day -- another version of the nested EPT patches. In this version
included fix for need_remote_flush() with shadowed
After commit 21feb4eb64e21f8dc91136b91ee886b978ce6421 tr base is zeroed
during vmexit. Set it to L1's HOST_TR_BASE. This should fix
https://bugzilla.kernel.org/show_bug.cgi?id=60679
Signed-off-by: Gleb Natapov g...@redhat.com
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index b533cf8
On Fri, Aug 02, 2013 at 08:24:38AM +0200, Stefan Pietsch wrote:
On 31.07.2013 11:20, Gleb Natapov wrote:
On Wed, Jul 31, 2013 at 11:10:01AM +0200, Stefan Pietsch wrote:
On 30.07.2013 07:31, Gleb Natapov wrote:
What happen if you run perf on your host (perf record -a)?
Do you see same
On Sun, Aug 04, 2013 at 08:21:00PM +0800, Arthur Chunqi Li wrote:
Yes, I have just retraced and found the bug. This is my negligence.
Reviewers could have done a better job too :)
Reviewed-by: Arthur Chunqi Li yzt...@gmail.com
On Sun, Aug 4, 2013 at 8:08 PM, Gleb Natapov g...@redhat.com
On Sun, Aug 04, 2013 at 12:53:56PM +0300, Gleb Natapov wrote:
On Sun, Aug 04, 2013 at 12:32:06PM +0300, Gleb Natapov wrote:
On Sun, Aug 04, 2013 at 11:24:41AM +0200, Jan Kiszka wrote:
On 2013-08-01 16:08, Gleb Natapov wrote:
Another day -- another version of the nested EPT patches
On Sun, Aug 04, 2013 at 06:42:09PM +0200, Jan Kiszka wrote:
On 2013-08-04 18:15, Xiao Guangrong wrote:
On Aug 4, 2013, at 11:14 PM, Jan Kiszka jan.kis...@web.de wrote:
On 2013-08-04 15:44, Gleb Natapov wrote:
On Sun, Aug 04, 2013 at 12:53:56PM +0300, Gleb Natapov wrote:
On Sun, Aug
On Mon, Aug 05, 2013 at 01:19:26AM +0800, Xiao Guangrong wrote:
On Aug 5, 2013, at 12:58 AM, Gleb Natapov g...@redhat.com wrote:
On Sun, Aug 04, 2013 at 06:42:09PM +0200, Jan Kiszka wrote:
On 2013-08-04 18:15, Xiao Guangrong wrote:
On Aug 4, 2013, at 11:14 PM, Jan Kiszka jan.kis
On Fri, Aug 02, 2013 at 11:25:39AM +0200, Ingo Molnar wrote:
Ingo,
Do you have any concerns reg this series? please let me know if this
looks good now to you.
I'm inclined to NAK it for excessive quotation - who knows how many people
left the discussion in disgust? Was it done to
On Fri, Aug 02, 2013 at 04:06:00PM +0800, Xiao Guangrong wrote:
On 08/01/2013 10:08 PM, Gleb Natapov wrote:
+/* Emulate the INVEPT instruction */
+static int handle_invept(struct kvm_vcpu *vcpu)
+{
+ u32 vmx_instruction_info;
+ bool ok;
+ unsigned long type;
+ gva_t gva
On Fri, Aug 02, 2013 at 07:19:28AM +, Ren, Yongjie wrote:
Hi All,
This is KVM upstream test result against kvm.git next branch and qemu-kvm.git
uq/master branch.
kvm.git next branch: bf640876e21fe603f7f52b0c27d66b7716da0384 based
on kernel 3.11.0-rc1
qemu-kvm.git
On Tue, Jul 30, 2013 at 09:04:56AM +, Zhanghaoyu (A) wrote:
hi all,
I met similar problem to these, while performing live migration or
save-restore test on the kvm platform (qemu:1.4.0, host:suse11sp2,
guest:suse11sp2), running tele-communication software suite in
On Thu, Aug 01, 2013 at 03:00:12PM +0800, Xiao Guangrong wrote:
On 07/31/2013 10:48 PM, Gleb Natapov wrote:
From: Nadav Har'El n...@il.ibm.com
This is the first patch in a series which adds nested EPT support to KVM's
nested VMX. Nested EPT means emulating EPT for an L1 guest so that L1
On Thu, Aug 01, 2013 at 03:24:06PM +0800, Xiao Guangrong wrote:
On 07/31/2013 10:48 PM, Gleb Natapov wrote:
From: Yang Zhang yang.z.zh...@intel.com
}
}
return emulate;
diff --git a/arch/x86/kvm/paging_tmpl.h b/arch/x86/kvm/paging_tmpl.h
index 762c904..0d25351
On Thu, Aug 01, 2013 at 03:31:01PM +0800, Xiao Guangrong wrote:
On 08/01/2013 03:18 PM, Xiao Guangrong wrote:
+#endif
Hmm, why not use shadow_x_mask, shadow_user_mask instead? PT_WRITABLE_MASK
is also suitable for ept, i guess we can remove the #if/#else/#endif
after
that.
On Thu, Aug 01, 2013 at 01:08:47PM +0530, Raghavendra K T wrote:
On 07/31/2013 11:54 AM, Gleb Natapov wrote:
On Tue, Jul 30, 2013 at 10:13:12PM +0530, Raghavendra K T wrote:
On 07/25/2013 03:08 PM, Raghavendra K T wrote:
On 07/25/2013 02:45 PM, Gleb Natapov wrote:
On Thu, Jul 25, 2013 at 02
On Thu, Aug 01, 2013 at 03:51:35PM +0800, Xiao Guangrong wrote:
On 08/01/2013 03:42 PM, Gleb Natapov wrote:
On Thu, Aug 01, 2013 at 03:31:01PM +0800, Xiao Guangrong wrote:
On 08/01/2013 03:18 PM, Xiao Guangrong wrote:
+#endif
Hmm, why not use shadow_x_mask, shadow_user_mask instead
On Thu, Aug 01, 2013 at 04:31:31PM +0800, Xiao Guangrong wrote:
On 07/31/2013 10:48 PM, Gleb Natapov wrote:
From: Yang Zhang yang.z.zh...@intel.com
Inject nEPT fault to L1 guest. This patch is original from Xinhao.
Signed-off-by: Jun Nakajima jun.nakaj...@intel.com
Signed-off
On Thu, Aug 01, 2013 at 05:16:07PM +0800, Xiao Guangrong wrote:
On 07/31/2013 10:48 PM, Gleb Natapov wrote:
From: Nadav Har'El n...@il.ibm.com
KVM's existing shadow MMU code already supports nested TDP. To use it, we
need to set up a new MMU context for nested EPT, and create a few
On Thu, Aug 01, 2013 at 01:05:47PM +0200, Paolo Bonzini wrote:
On Aug 01 2013, Xiao Guangrong wrote:
On 08/01/2013 03:42 PM, Gleb Natapov wrote:
On Thu, Aug 01, 2013 at 03:31:01PM +0800, Xiao Guangrong wrote:
On 08/01/2013 03:18 PM, Xiao Guangrong wrote:
+#endif
Hmm, why
On Thu, Aug 01, 2013 at 01:19:11PM +0200, Paolo Bonzini wrote:
On Aug 01 2013, Gleb Natapov wrote:
On Thu, Aug 01, 2013 at 04:31:31PM +0800, Xiao Guangrong wrote:
On 07/31/2013 10:48 PM, Gleb Natapov wrote:
From: Yang Zhang yang.z.zh...@intel.com
Inject nEPT fault to L1 guest
On Thu, Aug 01, 2013 at 02:03:01PM +0200, Paolo Bonzini wrote:
On Aug 01 2013, Gleb Natapov wrote:
On Thu, Aug 01, 2013 at 01:19:11PM +0200, Paolo Bonzini wrote:
On Aug 01 2013, Gleb Natapov wrote:
On Thu, Aug 01, 2013 at 04:31:31PM +0800, Xiao Guangrong wrote:
On 07/31/2013 10:48
On Thu, Aug 01, 2013 at 03:13:02PM +0200, Paolo Bonzini wrote:
Not sure this explicit inline is needed... Gcc always inlines
the small and
static functions.
Paolo asked for it, but now I see that I did in in a wrong patch. I
do
not care much
...@il.ibm.com
Signed-off-by: Jun Nakajima jun.nakaj...@intel.com
Signed-off-by: Xinhao Xu xinhao...@intel.com
Signed-off-by: Yang Zhang yang.z.zh...@intel.com
Signed-off-by: Jun Nakajima jun.nakaj...@intel.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/mmu.c | 55
to use the half-applied feature.
Signed-off-by: Nadav Har'El n...@il.ibm.com
Signed-off-by: Jun Nakajima jun.nakaj...@intel.com
Signed-off-by: Xinhao Xu xinhao...@intel.com
Signed-off-by: Yang Zhang yang.z.zh...@intel.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/vmx.c | 20
From: Yang Zhang yang.z.zh...@intel.com
Since nEPT doesn't support A/D bit, so we should not set those bit
when build shadow page table.
Reviewed-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com
Signed-off-by: Yang Zhang yang.z.zh...@intel.com
Signed-off-by: Gleb Natapov g...@redhat.com
Nakajima jun.nakaj...@intel.com
Signed-off-by: Xinhao Xu xinhao...@intel.com
Signed-off-by: Yang Zhang yang.z.zh...@intel.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/x86.c | 11 ---
1 file changed, 11 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index
-by: Xinhao Xu xinhao...@intel.com
Signed-off-by: Yang Zhang yang.z.zh...@intel.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/vmx.c | 23 ---
1 file changed, 16 insertions(+), 7 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index e999dc7..27efa6a
This patch makes guest A/D bits definition to be dependable on paging
mode, so when EPT support will be added it will be able to define them
differently.
Reviewed-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/paging_tmpl.h | 30
-by: Xinhao Xu xinhao...@intel.com
Signed-off-by: Yang Zhang yang.z.zh...@intel.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/mmu.c | 27 +++
arch/x86/kvm/mmu.h |2 ++
arch/x86/kvm/vmx.c | 41 -
3 files changed, 69
jun.nakaj...@intel.com
Signed-off-by: Xinhao Xu xinhao...@intel.com
Signed-off-by: Yang Zhang yang.z.zh...@intel.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/vmx.c | 13 +
1 file changed, 13 insertions(+)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index
-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/mmu.c |5 +
arch/x86/kvm/paging_tmpl.h | 37 -
2 files changed, 41 insertions(+), 1 deletion(-)
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index 4c4274d..b5273c3 100644
--- a/arch/x86/kvm
comments.
Gleb Natapov (3):
nEPT: make guest's A/D bits depends on guest's paging mode
nEPT: Support shadow paging for guest paging without A/D bits
nEPT: correctly check if remote tlb flush is needed for shadowed EPT
tables
Nadav Har'El (10):
nEPT: Support LOAD_IA32_EFER entry/exit
...@il.ibm.com
Signed-off-by: Jun Nakajima jun.nakaj...@intel.com
Signed-off-by: Xinhao Xu xinhao...@intel.com
Signed-off-by: Yang Zhang yang.z.zh...@intel.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/vmx.h |2 ++
arch/x86/include/uapi/asm/vmx.h |1 +
arch/x86
501 - 600 of 4884 matches
Mail list logo