Re: Alt SeaBIOS SSDT cpu hotplug

2010-08-01 Thread Kevin O'Connor
On Mon, Aug 02, 2010 at 10:41:39AM +0800, Liu, Jinsong wrote: > Kevin, > > This patch still has issue, It can boot Windows 2008 DataCenter, > however, when run "cpu_set cpu online" command, windows 2008 > Datacenter system shutdown at once. Thanks for testing. I've inspected the generated DSDT a

Re: [PATCH 1/2] KVM: x86 emulator: don't update vcpu state if instruction is restarted.

2010-08-01 Thread Avi Kivity
On 08/01/2010 04:27 PM, Gleb Natapov wrote: When we are going to enable e_i_g_s by default? Optimistically, 2.6.37, so six months. May be we have enough time to fix userspace? Sure we do, but will users update? 0.12 is mature enough that some users will forget about it and not update it

[PATCH] Fix memory leak in register save load due to xsave support

2010-08-01 Thread Avi Kivity
Signed-off-by: Avi Kivity --- qemu-kvm-x86.c |2 ++ 1 files changed, 2 insertions(+), 0 deletions(-) diff --git a/qemu-kvm-x86.c b/qemu-kvm-x86.c index fd426b7..4c32771 100644 --- a/qemu-kvm-x86.c +++ b/qemu-kvm-x86.c @@ -848,6 +848,7 @@ void kvm_arch_load_regs(CPUState *env, int level)

Re: Disable EPT

2010-08-01 Thread pradeepkumar
On Mon, 02 Aug 2010 10:46:13 +0900 (JST) Kuniyasu Suzaki wrote: > > Hello, > > Please tell me how to disable EPT of KVM. > Can I disable EPT in BIOS menu? I did not find the option in BIOS menu > of Intel DX58 (+i7) mother board. > unload kvm_intel.ko module and load it back with with ept=0

[PATCH] KVM: x86 emulator: fix LMSW able to clear cr0.pe

2010-08-01 Thread Avi Kivity
LMSW is documented not to be able to set cr0.pe; make it so. Signed-off-by: Avi Kivity --- arch/x86/kvm/emulate.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index dc1ecff..05f80f7 100644 --- a/arch/x86/kvm/emulate.c +

Re: Multiplexing RFLAGS.TF

2010-08-01 Thread Avi Kivity
On 08/02/2010 04:17 AM, Jan Kiszka wrote: So we need an rflags_guest_owned_bits, usually set to -1ULL, but sometimes (NMI, host debugging) clearing EFLAGS_TF. When we do that, we need to intercept instructions that influence RFLAGS.TF (POPF, IRET, INTn) and emulate them. Otherwise, the gues

RE: Alt SeaBIOS SSDT cpu hotplug

2010-08-01 Thread Liu, Jinsong
Kevin, This patch still has issue, It can boot Windows 2008 DataCenter, however, when run "cpu_set cpu online" command, windows 2008 Datacenter system shutdown at once. Thanks, Jinsong > > Sorry about that. It looks like I messed up the SSDT ScopeOp length. > New patch attached below. I've

buildbot failure in qemu-kvm on disable_kvm_i386_out_of_tree

2010-08-01 Thread qemu-kvm
The Buildbot has detected a new failure of disable_kvm_i386_out_of_tree on qemu-kvm. Full details are available at: http://buildbot.b1-systems.de/qemu-kvm/builders/disable_kvm_i386_out_of_tree/builds/438 Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/ Buildslave for this Build: b1_qemu_k

buildbot failure in qemu-kvm on disable_kvm_x86_64_out_of_tree

2010-08-01 Thread qemu-kvm
The Buildbot has detected a new failure of disable_kvm_x86_64_out_of_tree on qemu-kvm. Full details are available at: http://buildbot.b1-systems.de/qemu-kvm/builders/disable_kvm_x86_64_out_of_tree/builds/438 Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/ Buildslave for this Build: b1_qe

Disable EPT

2010-08-01 Thread Kuniyasu Suzaki
Hello, Please tell me how to disable EPT of KVM. Can I disable EPT in BIOS menu? I did not find the option in BIOS menu of Intel DX58 (+i7) mother board. Thank you. -- suzaki -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord...@vger.kernel.

buildbot failure in qemu-kvm on disable_kvm_i386_debian_5_0

2010-08-01 Thread qemu-kvm
The Buildbot has detected a new failure of disable_kvm_i386_debian_5_0 on qemu-kvm. Full details are available at: http://buildbot.b1-systems.de/qemu-kvm/builders/disable_kvm_i386_debian_5_0/builds/490 Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/ Buildslave for this Build: b1_qemu_kvm

buildbot failure in qemu-kvm on disable_kvm_x86_64_debian_5_0

2010-08-01 Thread qemu-kvm
The Buildbot has detected a new failure of disable_kvm_x86_64_debian_5_0 on qemu-kvm. Full details are available at: http://buildbot.b1-systems.de/qemu-kvm/builders/disable_kvm_x86_64_debian_5_0/builds/489 Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/ Buildslave for this Build: b1_qemu

Re: Multiplexing RFLAGS.TF

2010-08-01 Thread Jan Kiszka
Am 29.07.2010 10:37, Avi Kivity wrote: > static int db_interception(struct vcpu_svm *svm) > { > struct kvm_run *kvm_run = svm->vcpu.run; > > if (!(svm->vcpu.guest_debug & > (KVM_GUESTDBG_SINGLESTEP | KVM_GUESTDBG_USE_HW_BP)) && > !svm->nmi_singlestep) { > kvm_que

RE: VT-d regression issue

2010-08-01 Thread Hao, Xudong
Alex Williamson wrote: > On Sat, 2010-07-31 at 16:33 +0800, Hao, Xudong wrote: >> Alex Williamson wrote: >>> On Thu, 2010-07-22 at 16:03 +0300, Gleb Natapov wrote: On Thu, Jul 22, 2010 at 08:32:31PM +0800, Hao, Xudong wrote: > Well, this patch works fine for me. > Looks like user

Re: [PATCH 00/27] KVM PPC PV framework v3

2010-08-01 Thread Alexander Graf
On 01.08.2010, at 16:02, Avi Kivity wrote: > On 07/29/2010 03:47 PM, Alexander Graf wrote: >> On PPC we run PR=0 (kernel mode) code in PR=1 (user mode) and don't use the >> hypervisor extensions. >> >> While that is all great to show that virtualization is possible, there are >> quite some cases

Re: [PATCH 4/7] KVM: PPC: Add book3s_32 tlbie flush acceleration

2010-08-01 Thread Alexander Graf
On 01.08.2010, at 16:08, Avi Kivity wrote: > On 07/29/2010 04:04 PM, Alexander Graf wrote: >> On Book3s_32 the tlbie instruction flushed effective addresses by the mask >> 0x0000. This is pretty hard to reflect with a hash that hashes ~0xfff, so >> to speed up that target we should also keep

Re: virtio module question...

2010-08-01 Thread Avi Kivity
On 07/30/2010 12:13 PM, Vasiliy G Tolstov wrote: Good night or morning If i need to some kvm module, that runs in virtualized environment and reports some statistics to qemu (disk free space, memory usage, cpu utilization) what i need to write? I need kernel module, because userspace utilit

[PATCH] KVM: x86 emulator: fix LMSW able to clear cr0.pe

2010-08-01 Thread Avi Kivity
LMSW is documented not to be able to set cr0.pe; make it so. Signed-off-by: Avi Kivity --- arch/x86/kvm/emulate.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index dc1ecff..05f80f7 100644 --- a/arch/x86/kvm/emulate.c +

Re: [PATCH 7/24] Understanding guest pointers to vmcs12 structures

2010-08-01 Thread Gleb Natapov
On Sun, Aug 01, 2010 at 06:16:59PM +0300, Nadav Har'El wrote: > On Tue, Jun 15, 2010, Gleb Natapov wrote about "Re: [PATCH 7/24] > Understanding guest pointers to vmcs12 structures": > > > +/* > > > + * Decode the memory-address operand of a vmx instruction, according to > > > the > > > + * Intel

Re: [PATCH 7/24] Understanding guest pointers to vmcs12 structures

2010-08-01 Thread Nadav Har'El
On Tue, Jun 15, 2010, Gleb Natapov wrote about "Re: [PATCH 7/24] Understanding guest pointers to vmcs12 structures": > > +/* > > + * Decode the memory-address operand of a vmx instruction, according to the > > + * Intel spec. > > + */ >... > > +static gva_t get_vmx_mem_address(struct kvm_vcpu *vcp

[PATCH 02/15] KVM: x86 emulator: use correct type for memory address in operands

2010-08-01 Thread Avi Kivity
Currently we use a void pointer for memory addresses. That's wrong since these are guest virtual addresses which are not directly dereferencable by the host. Use the correct type, unsigned long. Signed-off-by: Avi Kivity --- arch/x86/include/asm/kvm_emulate.h |6 ++- arch/x86/kvm/emulate.c

[PATCH 07/15] KVM: x86 emulator: simplify REX.W check

2010-08-01 Thread Avi Kivity
(x && (x & y)) == (x & y) Signed-off-by: Avi Kivity --- arch/x86/kvm/emulate.c |5 ++--- 1 files changed, 2 insertions(+), 3 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index 2ae2e54..a114fa9 100644 --- a/arch/x86/kvm/emulate.c +++ b/arch/x86/kvm/emulate.c @@ -

[PATCH 01/15] KVM: x86 emulator: push segment override out of decode_modrm()

2010-08-01 Thread Avi Kivity
Let it compute modrm_seg instead, and have the caller apply it. Signed-off-by: Avi Kivity --- arch/x86/include/asm/kvm_emulate.h |1 + arch/x86/kvm/emulate.c | 10 ++ 2 files changed, 7 insertions(+), 4 deletions(-) diff --git a/arch/x86/include/asm/kvm_emulate.h b/ar

[PATCH 06/15] KVM: x86 emulator: drop use_modrm_ea

2010-08-01 Thread Avi Kivity
Unused (and has never been). Signed-off-by: Avi Kivity --- arch/x86/include/asm/kvm_emulate.h |1 - arch/x86/kvm/emulate.c |1 - 2 files changed, 0 insertions(+), 2 deletions(-) diff --git a/arch/x86/include/asm/kvm_emulate.h b/arch/x86/include/asm/kvm_emulate.h index bbf0e

[PATCH 08/15] KVM: x86 emulator: introduce Force64 for forcing operand size to 64 bits

2010-08-01 Thread Avi Kivity
Signed-off-by: Avi Kivity --- arch/x86/kvm/emulate.c |3 ++- 1 files changed, 2 insertions(+), 1 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index a114fa9..d7d95de 100644 --- a/arch/x86/kvm/emulate.c +++ b/arch/x86/kvm/emulate.c @@ -83,6 +83,7 @@ #define Group

[PATCH 11/15] KVM: x86 emulator: use struct operand for mov reg,dr and mov dr,reg for reg op

2010-08-01 Thread Avi Kivity
This is an ordinary modrm source or destination; use the standard structure representing it. Signed-off-by: Avi Kivity --- arch/x86/kvm/emulate.c |9 - 1 files changed, 4 insertions(+), 5 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index 53e5c60..5bc62f

[PATCH 09/15] KVM: x86 emulator: mark mov cr and mov dr as 64-bit instructions in long mode

2010-08-01 Thread Avi Kivity
Signed-off-by: Avi Kivity --- arch/x86/kvm/emulate.c |4 ++-- 1 files changed, 2 insertions(+), 2 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index d7d95de..d1a6cd7 100644 --- a/arch/x86/kvm/emulate.c +++ b/arch/x86/kvm/emulate.c @@ -2205,8 +2205,8 @@ static str

[PATCH 13/15] KVM: x86 emulator: switch LEA to use SrcMem decoding

2010-08-01 Thread Avi Kivity
The NoAccess flag will prevent memory from being accessed. Signed-off-by: Avi Kivity --- arch/x86/kvm/emulate.c |4 ++-- 1 files changed, 2 insertions(+), 2 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index 29312a0..46a5d75 100644 --- a/arch/x86/kvm/emulate.c +

[PATCH 15/15] KVM: x86 emulator: Decode memory operands directly into a 'struct operand'

2010-08-01 Thread Avi Kivity
Since modrm operand can be either register or memory, decoding it into a 'struct operand', which can represent both, is simpler. Signed-off-by: Avi Kivity --- arch/x86/include/asm/kvm_emulate.h |3 - arch/x86/kvm/emulate.c | 125 --- 2 files chang

[PATCH 10/15] KVM: x86 emulator: use struct operand for mov reg,cr and mov cr,reg for reg op

2010-08-01 Thread Avi Kivity
This is an ordinary modrm source or destination; use the standard structure representing it. Signed-off-by: Avi Kivity --- arch/x86/kvm/emulate.c |9 - 1 files changed, 4 insertions(+), 5 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index d1a6cd7..53e5c6

[PATCH 14/15] KVM: x86 emulator: change invlpg emulation to use src.mem.addr

2010-08-01 Thread Avi Kivity
Instead of using modrm_ea, which will soon be gone. Signed-off-by: Avi Kivity --- arch/x86/kvm/emulate.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index 46a5d75..de1ed94 100644 --- a/arch/x86/kvm/emulate.c +++ b/arch

[PATCH 12/15] KVM: x86 emulator: add NoAccess flag for memory instructions that skip access

2010-08-01 Thread Avi Kivity
Use for INVLPG, which accesses the tlb, not memory. Signed-off-by: Avi Kivity --- arch/x86/kvm/emulate.c |6 -- 1 files changed, 4 insertions(+), 2 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index 5bc62f2..29312a0 100644 --- a/arch/x86/kvm/emulate.c +++ b/

[PATCH 05/15] KVM: x86 emulator: put register operand fetch into a function

2010-08-01 Thread Avi Kivity
The code is repeated three times, put it into fetch_register_operand() Signed-off-by: Avi Kivity --- arch/x86/kvm/emulate.c | 61 --- 1 files changed, 21 insertions(+), 40 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c ind

[PATCH 04/15] KVM: x86 emulator: use SrcAcc to simplify xchg decoding

2010-08-01 Thread Avi Kivity
Signed-off-by: Avi Kivity --- arch/x86/kvm/emulate.c | 15 --- 1 files changed, 4 insertions(+), 11 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index 745353e..4d510c3 100644 --- a/arch/x86/kvm/emulate.c +++ b/arch/x86/kvm/emulate.c @@ -2142,7 +2142,7 @

[PATCH 03/15] KVM: x86 emulator: simplify xchg decode tables

2010-08-01 Thread Avi Kivity
Use X8() to avoid repetition. Signed-off-by: Avi Kivity --- arch/x86/kvm/emulate.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index 61d728d..745353e 100644 --- a/arch/x86/kvm/emulate.c +++ b/arch/x86/kvm/emulate.c @@

[PATCH 00/15] More emulator cleanups

2010-08-01 Thread Avi Kivity
This patchset further cleans up the emulator. The goal is to push segment decoding into 'struct operand', but a few things stood in the way. Avi Kivity (15): KVM: x86 emulator: push segment override out of decode_modrm() KVM: x86 emulator: use correct type for memory address in operands KVM

Re: [PATCH 0/7] Rest of my KVM-PPC patch queue

2010-08-01 Thread Avi Kivity
On 07/29/2010 04:04 PM, Alexander Graf wrote: During the past few weeks a couple of fixes have gathered in my queue. This is a dump of everything that is not related to the PV framework. Please apply on top of the PV stuff. Looks reasonable as well. I'll apply as soon as I get a review on t

Re: [PATCH 4/7] KVM: PPC: Add book3s_32 tlbie flush acceleration

2010-08-01 Thread Avi Kivity
On 07/29/2010 04:04 PM, Alexander Graf wrote: On Book3s_32 the tlbie instruction flushed effective addresses by the mask 0x0000. This is pretty hard to reflect with a hash that hashes ~0xfff, so to speed up that target we should also keep a special hash around for it. static inline u64 k

Re: [PATCH 00/27] KVM PPC PV framework v3

2010-08-01 Thread Avi Kivity
On 07/29/2010 03:47 PM, Alexander Graf wrote: On PPC we run PR=0 (kernel mode) code in PR=1 (user mode) and don't use the hypervisor extensions. While that is all great to show that virtualization is possible, there are quite some cases where the emulation overhead of privileged instructions is

Re: [PATCH 1/2] KVM: x86 emulator: don't update vcpu state if instruction is restarted.

2010-08-01 Thread Gleb Natapov
On Sun, Aug 01, 2010 at 03:35:41PM +0300, Avi Kivity wrote: > On 08/01/2010 03:23 PM, Gleb Natapov wrote: > >On Sun, Aug 01, 2010 at 03:17:10PM +0300, Avi Kivity wrote: > >> On 08/01/2010 01:53 PM, Gleb Natapov wrote: > That requires everyone to update, or suffer major breakage. > > >>>T

Re: [PATCH 1/2] KVM: x86 emulator: don't update vcpu state if instruction is restarted.

2010-08-01 Thread Avi Kivity
On 08/01/2010 03:23 PM, Gleb Natapov wrote: On Sun, Aug 01, 2010 at 03:17:10PM +0300, Avi Kivity wrote: On 08/01/2010 01:53 PM, Gleb Natapov wrote: That requires everyone to update, or suffer major breakage. They will suffer major breakage when they update to a kvm that calls to kvm-tpr-op

Re: [PATCH 1/2] KVM: x86 emulator: don't update vcpu state if instruction is restarted.

2010-08-01 Thread Gleb Natapov
On Sun, Aug 01, 2010 at 03:17:10PM +0300, Avi Kivity wrote: > On 08/01/2010 01:53 PM, Gleb Natapov wrote: > > > >>That requires everyone to update, or suffer major breakage. > >> > >They will suffer major breakage when they update to a kvm that calls to > >kvm-tpr-opt.c from emulator anyway. > >

Re: [PATCH 1/2] KVM: x86 emulator: don't update vcpu state if instruction is restarted.

2010-08-01 Thread Avi Kivity
On 08/01/2010 01:53 PM, Gleb Natapov wrote: That requires everyone to update, or suffer major breakage. They will suffer major breakage when they update to a kvm that calls to kvm-tpr-opt.c from emulator anyway. Why? IIRC it was always this way in emulator. I'd rather fix userspace than

Re: [PATCH 1/2] KVM: x86 emulator: don't update vcpu state if instruction is restarted.

2010-08-01 Thread Gleb Natapov
On Sun, Aug 01, 2010 at 01:00:11PM +0300, Avi Kivity wrote: > On 08/01/2010 12:24 PM, Gleb Natapov wrote: > >On Sun, Aug 01, 2010 at 12:14:40PM +0300, Avi Kivity wrote: > >> On 08/01/2010 12:01 PM, Gleb Natapov wrote: > >It uses rip _during_ pio. And pio emulation changes rip > >only at t

Re: [PATCH 1/2] KVM: x86 emulator: don't update vcpu state if instruction is restarted.

2010-08-01 Thread Avi Kivity
On 08/01/2010 12:24 PM, Gleb Natapov wrote: On Sun, Aug 01, 2010 at 12:14:40PM +0300, Avi Kivity wrote: On 08/01/2010 12:01 PM, Gleb Natapov wrote: It uses rip _during_ pio. And pio emulation changes rip only at the end of emulation. But non-emulated pio does a skip_emulated_instruction() i

Re: [PATCH 1/2] KVM: x86 emulator: don't update vcpu state if instruction is restarted.

2010-08-01 Thread Gleb Natapov
On Sun, Aug 01, 2010 at 12:14:40PM +0300, Avi Kivity wrote: > On 08/01/2010 12:01 PM, Gleb Natapov wrote: > >>> > >>>It uses rip _during_ pio. And pio emulation changes rip > >>>only at the end of emulation. > >>But non-emulated pio does a skip_emulated_instruction() immediately > >>(or so the cod

Re: [PATCH 1/2] KVM: x86 emulator: don't update vcpu state if instruction is restarted.

2010-08-01 Thread Avi Kivity
On 08/01/2010 12:01 PM, Gleb Natapov wrote: It uses rip _during_ pio. And pio emulation changes rip only at the end of emulation. But non-emulated pio does a skip_emulated_instruction() immediately (or so the code in kvm-tpr-opt.c assumes: Indeed, this is bug in non-emulated pio. But users

Re: [PATCH 1/2] KVM: x86 emulator: don't update vcpu state if instruction is restarted.

2010-08-01 Thread Gleb Natapov
On Sun, Aug 01, 2010 at 11:54:38AM +0300, Avi Kivity wrote: > On 08/01/2010 11:28 AM, Gleb Natapov wrote: > >On Sat, Jul 31, 2010 at 08:25:13PM +0300, Avi Kivity wrote: > >> On 07/29/2010 03:11 PM, Gleb Natapov wrote: > >>>No need to update vcpu state since instruction is in the middle of the > >

Re: [PATCH repost] sched: export sched_set/getaffinity to modules

2010-08-01 Thread Michael S. Tsirkin
On Fri, Jul 30, 2010 at 04:19:01PM +0200, Oleg Nesterov wrote: > Sorry for the delay, I can't be responsive these days... > > On 07/27, Michael S. Tsirkin wrote: > > > > On Mon, Jul 26, 2010 at 08:08:34PM +0200, Oleg Nesterov wrote: > > > On 07/26, Sridhar Samudrala wrote: > > > > > > > > I have b

Re: [PATCH 1/2] KVM: x86 emulator: don't update vcpu state if instruction is restarted.

2010-08-01 Thread Avi Kivity
On 08/01/2010 11:28 AM, Gleb Natapov wrote: On Sat, Jul 31, 2010 at 08:25:13PM +0300, Avi Kivity wrote: On 07/29/2010 03:11 PM, Gleb Natapov wrote: No need to update vcpu state since instruction is in the middle of the emulation. Signed-off-by: Gleb Natapov --- arch/x86/kvm/x86.c | 31 +

Re: [PATCH] vhost: locking/rcu cleanup

2010-08-01 Thread Michael S. Tsirkin
On Fri, Jul 30, 2010 at 04:49:54PM +0200, Tejun Heo wrote: > Hello, > > On 07/29/2010 02:23 PM, Michael S. Tsirkin wrote: > > I saw WARN_ON(!list_empty(&dev->work_list)) trigger > > so our custom flush is not as airtight as need be. > > Could be but it's also possible that something has queued so

Re: [RFC PATCH v8 00/16] Provide a zero-copy method on KVM virtio-net.

2010-08-01 Thread Michael S. Tsirkin
On Thu, Jul 29, 2010 at 03:31:22PM -0700, Shirley Ma wrote: > I did some vhost performance measurement over 10Gb ixgbe, and found that > in order to get consistent BW results, netperf/netserver, qemu, vhost > threads smp affinities are required. Could you provide an example of a good setup? Specif

Re: [PATCH 1/2] KVM: x86 emulator: don't update vcpu state if instruction is restarted.

2010-08-01 Thread Gleb Natapov
On Sat, Jul 31, 2010 at 08:25:13PM +0300, Avi Kivity wrote: > On 07/29/2010 03:11 PM, Gleb Natapov wrote: > >No need to update vcpu state since instruction is in the middle of the > >emulation. > > > >Signed-off-by: Gleb Natapov > >--- > > arch/x86/kvm/x86.c | 31 +--

Re: [RFC PATCH v8 00/16] Provide a zero-copy method on KVM virtio-net.

2010-08-01 Thread Avi Kivity
On 07/30/2010 06:46 PM, Shirley Ma wrote: Hello Avi, On Fri, 2010-07-30 at 08:02 +0300, Avi Kivity wrote: get_user_pages() is indeed slow. But what about get_user_pages_fast()? Note that when the page is first touched, get_user_pages_fast() falls back to get_user_pages(), so the latency need

Re: enabling X86_FEATURE_ARCH_PERFMON in guest

2010-08-01 Thread Avi Kivity
On 07/30/2010 08:02 PM, David S. Ahern wrote: How do I get X86_FEATURE_ARCH_PERFMON enabled for a guest? I've tried "-cpu host,+perfmon" and "-cpu host,+arch_perfmon", but both get rejected with an error: CPU feature perfmon not found qemu doesn't know about the perfmon feature bits. Even i