On Mon, Aug 02, 2010 at 10:41:39AM +0800, Liu, Jinsong wrote:
> Kevin,
>
> This patch still has issue, It can boot Windows 2008 DataCenter,
> however, when run "cpu_set cpu online" command, windows 2008
> Datacenter system shutdown at once.
Thanks for testing.
I've inspected the generated DSDT a
On 08/01/2010 04:27 PM, Gleb Natapov wrote:
When we are going to enable e_i_g_s by default?
Optimistically, 2.6.37, so six months.
May be we have enough
time to fix userspace?
Sure we do, but will users update?
0.12 is mature enough that some users will forget about it and not
update it
Signed-off-by: Avi Kivity
---
qemu-kvm-x86.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/qemu-kvm-x86.c b/qemu-kvm-x86.c
index fd426b7..4c32771 100644
--- a/qemu-kvm-x86.c
+++ b/qemu-kvm-x86.c
@@ -848,6 +848,7 @@ void kvm_arch_load_regs(CPUState *env, int level)
On Mon, 02 Aug 2010 10:46:13 +0900 (JST)
Kuniyasu Suzaki wrote:
>
> Hello,
>
> Please tell me how to disable EPT of KVM.
> Can I disable EPT in BIOS menu? I did not find the option in BIOS menu
> of Intel DX58 (+i7) mother board.
>
unload kvm_intel.ko module and load it back with with ept=0
LMSW is documented not to be able to set cr0.pe; make it so.
Signed-off-by: Avi Kivity
---
arch/x86/kvm/emulate.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index dc1ecff..05f80f7 100644
--- a/arch/x86/kvm/emulate.c
+
On 08/02/2010 04:17 AM, Jan Kiszka wrote:
So we need an rflags_guest_owned_bits, usually set to -1ULL, but
sometimes (NMI, host debugging) clearing EFLAGS_TF. When we do that, we
need to intercept instructions that influence RFLAGS.TF (POPF, IRET,
INTn) and emulate them. Otherwise, the gues
Kevin,
This patch still has issue,
It can boot Windows 2008 DataCenter, however,
when run "cpu_set cpu online" command, windows 2008 Datacenter system shutdown
at once.
Thanks,
Jinsong
>
> Sorry about that. It looks like I messed up the SSDT ScopeOp length.
> New patch attached below. I've
The Buildbot has detected a new failure of disable_kvm_i386_out_of_tree on
qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/disable_kvm_i386_out_of_tree/builds/438
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build: b1_qemu_k
The Buildbot has detected a new failure of disable_kvm_x86_64_out_of_tree on
qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/disable_kvm_x86_64_out_of_tree/builds/438
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build: b1_qe
Hello,
Please tell me how to disable EPT of KVM.
Can I disable EPT in BIOS menu? I did not find the option in BIOS menu
of Intel DX58 (+i7) mother board.
Thank you.
--
suzaki
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.
The Buildbot has detected a new failure of disable_kvm_i386_debian_5_0 on
qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/disable_kvm_i386_debian_5_0/builds/490
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build: b1_qemu_kvm
The Buildbot has detected a new failure of disable_kvm_x86_64_debian_5_0 on
qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/disable_kvm_x86_64_debian_5_0/builds/489
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build: b1_qemu
Am 29.07.2010 10:37, Avi Kivity wrote:
> static int db_interception(struct vcpu_svm *svm)
> {
> struct kvm_run *kvm_run = svm->vcpu.run;
>
> if (!(svm->vcpu.guest_debug &
> (KVM_GUESTDBG_SINGLESTEP | KVM_GUESTDBG_USE_HW_BP)) &&
> !svm->nmi_singlestep) {
> kvm_que
Alex Williamson wrote:
> On Sat, 2010-07-31 at 16:33 +0800, Hao, Xudong wrote:
>> Alex Williamson wrote:
>>> On Thu, 2010-07-22 at 16:03 +0300, Gleb Natapov wrote:
On Thu, Jul 22, 2010 at 08:32:31PM +0800, Hao, Xudong wrote:
> Well, this patch works fine for me.
>
Looks like user
On 01.08.2010, at 16:02, Avi Kivity wrote:
> On 07/29/2010 03:47 PM, Alexander Graf wrote:
>> On PPC we run PR=0 (kernel mode) code in PR=1 (user mode) and don't use the
>> hypervisor extensions.
>>
>> While that is all great to show that virtualization is possible, there are
>> quite some cases
On 01.08.2010, at 16:08, Avi Kivity wrote:
> On 07/29/2010 04:04 PM, Alexander Graf wrote:
>> On Book3s_32 the tlbie instruction flushed effective addresses by the mask
>> 0x0000. This is pretty hard to reflect with a hash that hashes ~0xfff, so
>> to speed up that target we should also keep
On 07/30/2010 12:13 PM, Vasiliy G Tolstov wrote:
Good night or morning
If i need to some kvm module, that runs in virtualized environment and
reports some statistics to qemu (disk free space, memory usage, cpu
utilization) what i need to write?
I need kernel module, because userspace utilit
LMSW is documented not to be able to set cr0.pe; make it so.
Signed-off-by: Avi Kivity
---
arch/x86/kvm/emulate.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index dc1ecff..05f80f7 100644
--- a/arch/x86/kvm/emulate.c
+
On Sun, Aug 01, 2010 at 06:16:59PM +0300, Nadav Har'El wrote:
> On Tue, Jun 15, 2010, Gleb Natapov wrote about "Re: [PATCH 7/24]
> Understanding guest pointers to vmcs12 structures":
> > > +/*
> > > + * Decode the memory-address operand of a vmx instruction, according to
> > > the
> > > + * Intel
On Tue, Jun 15, 2010, Gleb Natapov wrote about "Re: [PATCH 7/24] Understanding
guest pointers to vmcs12 structures":
> > +/*
> > + * Decode the memory-address operand of a vmx instruction, according to the
> > + * Intel spec.
> > + */
>...
> > +static gva_t get_vmx_mem_address(struct kvm_vcpu *vcp
Currently we use a void pointer for memory addresses. That's wrong since
these are guest virtual addresses which are not directly dereferencable by
the host.
Use the correct type, unsigned long.
Signed-off-by: Avi Kivity
---
arch/x86/include/asm/kvm_emulate.h |6 ++-
arch/x86/kvm/emulate.c
(x && (x & y)) == (x & y)
Signed-off-by: Avi Kivity
---
arch/x86/kvm/emulate.c |5 ++---
1 files changed, 2 insertions(+), 3 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index 2ae2e54..a114fa9 100644
--- a/arch/x86/kvm/emulate.c
+++ b/arch/x86/kvm/emulate.c
@@ -
Let it compute modrm_seg instead, and have the caller apply it.
Signed-off-by: Avi Kivity
---
arch/x86/include/asm/kvm_emulate.h |1 +
arch/x86/kvm/emulate.c | 10 ++
2 files changed, 7 insertions(+), 4 deletions(-)
diff --git a/arch/x86/include/asm/kvm_emulate.h
b/ar
Unused (and has never been).
Signed-off-by: Avi Kivity
---
arch/x86/include/asm/kvm_emulate.h |1 -
arch/x86/kvm/emulate.c |1 -
2 files changed, 0 insertions(+), 2 deletions(-)
diff --git a/arch/x86/include/asm/kvm_emulate.h
b/arch/x86/include/asm/kvm_emulate.h
index bbf0e
Signed-off-by: Avi Kivity
---
arch/x86/kvm/emulate.c |3 ++-
1 files changed, 2 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index a114fa9..d7d95de 100644
--- a/arch/x86/kvm/emulate.c
+++ b/arch/x86/kvm/emulate.c
@@ -83,6 +83,7 @@
#define Group
This is an ordinary modrm source or destination; use the standard structure
representing it.
Signed-off-by: Avi Kivity
---
arch/x86/kvm/emulate.c |9 -
1 files changed, 4 insertions(+), 5 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index 53e5c60..5bc62f
Signed-off-by: Avi Kivity
---
arch/x86/kvm/emulate.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index d7d95de..d1a6cd7 100644
--- a/arch/x86/kvm/emulate.c
+++ b/arch/x86/kvm/emulate.c
@@ -2205,8 +2205,8 @@ static str
The NoAccess flag will prevent memory from being accessed.
Signed-off-by: Avi Kivity
---
arch/x86/kvm/emulate.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index 29312a0..46a5d75 100644
--- a/arch/x86/kvm/emulate.c
+
Since modrm operand can be either register or memory, decoding it into
a 'struct operand', which can represent both, is simpler.
Signed-off-by: Avi Kivity
---
arch/x86/include/asm/kvm_emulate.h |3 -
arch/x86/kvm/emulate.c | 125 ---
2 files chang
This is an ordinary modrm source or destination; use the standard structure
representing it.
Signed-off-by: Avi Kivity
---
arch/x86/kvm/emulate.c |9 -
1 files changed, 4 insertions(+), 5 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index d1a6cd7..53e5c6
Instead of using modrm_ea, which will soon be gone.
Signed-off-by: Avi Kivity
---
arch/x86/kvm/emulate.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index 46a5d75..de1ed94 100644
--- a/arch/x86/kvm/emulate.c
+++ b/arch
Use for INVLPG, which accesses the tlb, not memory.
Signed-off-by: Avi Kivity
---
arch/x86/kvm/emulate.c |6 --
1 files changed, 4 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index 5bc62f2..29312a0 100644
--- a/arch/x86/kvm/emulate.c
+++ b/
The code is repeated three times, put it into fetch_register_operand()
Signed-off-by: Avi Kivity
---
arch/x86/kvm/emulate.c | 61 ---
1 files changed, 21 insertions(+), 40 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
ind
Signed-off-by: Avi Kivity
---
arch/x86/kvm/emulate.c | 15 ---
1 files changed, 4 insertions(+), 11 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index 745353e..4d510c3 100644
--- a/arch/x86/kvm/emulate.c
+++ b/arch/x86/kvm/emulate.c
@@ -2142,7 +2142,7 @
Use X8() to avoid repetition.
Signed-off-by: Avi Kivity
---
arch/x86/kvm/emulate.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index 61d728d..745353e 100644
--- a/arch/x86/kvm/emulate.c
+++ b/arch/x86/kvm/emulate.c
@@
This patchset further cleans up the emulator. The goal is to push
segment decoding into 'struct operand', but a few things stood in
the way.
Avi Kivity (15):
KVM: x86 emulator: push segment override out of decode_modrm()
KVM: x86 emulator: use correct type for memory address in operands
KVM
On 07/29/2010 04:04 PM, Alexander Graf wrote:
During the past few weeks a couple of fixes have gathered in my queue. This
is a dump of everything that is not related to the PV framework.
Please apply on top of the PV stuff.
Looks reasonable as well. I'll apply as soon as I get a review on t
On 07/29/2010 04:04 PM, Alexander Graf wrote:
On Book3s_32 the tlbie instruction flushed effective addresses by the mask
0x0000. This is pretty hard to reflect with a hash that hashes ~0xfff, so
to speed up that target we should also keep a special hash around for it.
static inline u64 k
On 07/29/2010 03:47 PM, Alexander Graf wrote:
On PPC we run PR=0 (kernel mode) code in PR=1 (user mode) and don't use the
hypervisor extensions.
While that is all great to show that virtualization is possible, there are
quite some cases where the emulation overhead of privileged instructions is
On Sun, Aug 01, 2010 at 03:35:41PM +0300, Avi Kivity wrote:
> On 08/01/2010 03:23 PM, Gleb Natapov wrote:
> >On Sun, Aug 01, 2010 at 03:17:10PM +0300, Avi Kivity wrote:
> >> On 08/01/2010 01:53 PM, Gleb Natapov wrote:
> That requires everyone to update, or suffer major breakage.
>
> >>>T
On 08/01/2010 03:23 PM, Gleb Natapov wrote:
On Sun, Aug 01, 2010 at 03:17:10PM +0300, Avi Kivity wrote:
On 08/01/2010 01:53 PM, Gleb Natapov wrote:
That requires everyone to update, or suffer major breakage.
They will suffer major breakage when they update to a kvm that calls to
kvm-tpr-op
On Sun, Aug 01, 2010 at 03:17:10PM +0300, Avi Kivity wrote:
> On 08/01/2010 01:53 PM, Gleb Natapov wrote:
> >
> >>That requires everyone to update, or suffer major breakage.
> >>
> >They will suffer major breakage when they update to a kvm that calls to
> >kvm-tpr-opt.c from emulator anyway.
>
>
On 08/01/2010 01:53 PM, Gleb Natapov wrote:
That requires everyone to update, or suffer major breakage.
They will suffer major breakage when they update to a kvm that calls to
kvm-tpr-opt.c from emulator anyway.
Why?
IIRC it was always this way in emulator. I'd rather fix userspace than
On Sun, Aug 01, 2010 at 01:00:11PM +0300, Avi Kivity wrote:
> On 08/01/2010 12:24 PM, Gleb Natapov wrote:
> >On Sun, Aug 01, 2010 at 12:14:40PM +0300, Avi Kivity wrote:
> >> On 08/01/2010 12:01 PM, Gleb Natapov wrote:
> >It uses rip _during_ pio. And pio emulation changes rip
> >only at t
On 08/01/2010 12:24 PM, Gleb Natapov wrote:
On Sun, Aug 01, 2010 at 12:14:40PM +0300, Avi Kivity wrote:
On 08/01/2010 12:01 PM, Gleb Natapov wrote:
It uses rip _during_ pio. And pio emulation changes rip
only at the end of emulation.
But non-emulated pio does a skip_emulated_instruction() i
On Sun, Aug 01, 2010 at 12:14:40PM +0300, Avi Kivity wrote:
> On 08/01/2010 12:01 PM, Gleb Natapov wrote:
> >>>
> >>>It uses rip _during_ pio. And pio emulation changes rip
> >>>only at the end of emulation.
> >>But non-emulated pio does a skip_emulated_instruction() immediately
> >>(or so the cod
On 08/01/2010 12:01 PM, Gleb Natapov wrote:
It uses rip _during_ pio. And pio emulation changes rip
only at the end of emulation.
But non-emulated pio does a skip_emulated_instruction() immediately
(or so the code in kvm-tpr-opt.c assumes:
Indeed, this is bug in non-emulated pio.
But users
On Sun, Aug 01, 2010 at 11:54:38AM +0300, Avi Kivity wrote:
> On 08/01/2010 11:28 AM, Gleb Natapov wrote:
> >On Sat, Jul 31, 2010 at 08:25:13PM +0300, Avi Kivity wrote:
> >> On 07/29/2010 03:11 PM, Gleb Natapov wrote:
> >>>No need to update vcpu state since instruction is in the middle of the
> >
On Fri, Jul 30, 2010 at 04:19:01PM +0200, Oleg Nesterov wrote:
> Sorry for the delay, I can't be responsive these days...
>
> On 07/27, Michael S. Tsirkin wrote:
> >
> > On Mon, Jul 26, 2010 at 08:08:34PM +0200, Oleg Nesterov wrote:
> > > On 07/26, Sridhar Samudrala wrote:
> > > >
> > > > I have b
On 08/01/2010 11:28 AM, Gleb Natapov wrote:
On Sat, Jul 31, 2010 at 08:25:13PM +0300, Avi Kivity wrote:
On 07/29/2010 03:11 PM, Gleb Natapov wrote:
No need to update vcpu state since instruction is in the middle of the
emulation.
Signed-off-by: Gleb Natapov
---
arch/x86/kvm/x86.c | 31 +
On Fri, Jul 30, 2010 at 04:49:54PM +0200, Tejun Heo wrote:
> Hello,
>
> On 07/29/2010 02:23 PM, Michael S. Tsirkin wrote:
> > I saw WARN_ON(!list_empty(&dev->work_list)) trigger
> > so our custom flush is not as airtight as need be.
>
> Could be but it's also possible that something has queued so
On Thu, Jul 29, 2010 at 03:31:22PM -0700, Shirley Ma wrote:
> I did some vhost performance measurement over 10Gb ixgbe, and found that
> in order to get consistent BW results, netperf/netserver, qemu, vhost
> threads smp affinities are required.
Could you provide an example of a good setup?
Specif
On Sat, Jul 31, 2010 at 08:25:13PM +0300, Avi Kivity wrote:
> On 07/29/2010 03:11 PM, Gleb Natapov wrote:
> >No need to update vcpu state since instruction is in the middle of the
> >emulation.
> >
> >Signed-off-by: Gleb Natapov
> >---
> > arch/x86/kvm/x86.c | 31 +--
On 07/30/2010 06:46 PM, Shirley Ma wrote:
Hello Avi,
On Fri, 2010-07-30 at 08:02 +0300, Avi Kivity wrote:
get_user_pages() is indeed slow. But what about
get_user_pages_fast()?
Note that when the page is first touched, get_user_pages_fast() falls
back to get_user_pages(), so the latency need
On 07/30/2010 08:02 PM, David S. Ahern wrote:
How do I get X86_FEATURE_ARCH_PERFMON enabled for a guest?
I've tried "-cpu host,+perfmon" and "-cpu host,+arch_perfmon", but both
get rejected with an error: CPU feature perfmon not found
qemu doesn't know about the perfmon feature bits. Even i
55 matches
Mail list logo