Re: [QEMU PATCH v5 0/3] virtio-net: fix of ctrl commands

2013-01-23 Thread Stefan Hajnoczi
On Tue, Jan 22, 2013 at 11:44:43PM +0800, Amos Kong wrote: Currently virtio-net code relys on the layout of descriptor, this patchset removed the assumptions and introduced a control command to set mac address. Last patch is a trivial renaming. V2: check guest's iov_len V3: fix of migration

Re: [PATCH v2 8/8] KVM: x86 emulator: convert a few freestanding emulations to fastop

2013-01-23 Thread Avi Kivity
On Wed, Jan 23, 2013 at 2:21 AM, Marcelo Tosatti mtosa...@redhat.com wrote: Missing signed off by. Signed-off-by: Avi Kivity avi.kiv...@gmail.com -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at

[PATCH v2 01/12] KVM: MMU: lazily drop large spte

2013-01-23 Thread Xiao Guangrong
Do not drop large spte until it can be insteaded by small pages so that the guest can happliy read memory through it The idea is from Avi: | As I mentioned before, write-protecting a large spte is a good idea, | since it moves some work from protect-time to fault-time, so it reduces | jitter.

[PATCH v2 02/12] KVM: MMU: cleanup mapping-level

2013-01-23 Thread Xiao Guangrong
Use min() to cleanup mapping_level Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com --- arch/x86/kvm/mmu.c |3 +-- 1 files changed, 1 insertions(+), 2 deletions(-) diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c index 0f90269..8dca8af 100644 --- a/arch/x86/kvm/mmu.c +++

[PATCH v2 03/12] KVM: MMU: simplify mmu_set_spte

2013-01-23 Thread Xiao Guangrong
In order to detecting spte remapping, we can simply check whether the spte has already been pointing to the pfn even if the spte is not the last spte, for middle spte is pointing to the kernel pfn which can not be mapped to userspace Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com

[PATCH v2 04/12] KVM: MMU: simplify set_spte

2013-01-23 Thread Xiao Guangrong
For the logic, the function can be divided into two parts: one is adjusting pte_access, the rest one is setting spte according the pte_access. It makes the code more readable Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com --- arch/x86/kvm/mmu.c | 51

[PATCH v2 05/12] KVM: MMU: introduce vcpu_adjust_access

2013-01-23 Thread Xiao Guangrong
Introduce it to split the code of adjusting pte_access from the large function of set_spte Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com --- arch/x86/kvm/mmu.c | 63 +--- 1 files changed, 40 insertions(+), 23 deletions(-) diff

[PATCH v2 06/12] KVM: MMU: introduce a static table to map guest access to spte access

2013-01-23 Thread Xiao Guangrong
It makes set_spte more clean and reduces branch prediction Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com --- arch/x86/kvm/mmu.c | 37 ++--- 1 files changed, 26 insertions(+), 11 deletions(-) diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c

[PATCH v2 07/12] KVM: MMU: remove pt_access in mmu_set_spte

2013-01-23 Thread Xiao Guangrong
It is only used in debug code, so drop it Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com --- arch/x86/kvm/mmu.c | 15 ++- arch/x86/kvm/paging_tmpl.h |9 - 2 files changed, 10 insertions(+), 14 deletions(-) diff --git a/arch/x86/kvm/mmu.c

[PATCH v2 08/12] KVM: MMU: cleanup __direct_map

2013-01-23 Thread Xiao Guangrong
Use link_shadow_page to link the sp to the spte in __direct_map Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com --- arch/x86/kvm/mmu.c | 12 1 files changed, 4 insertions(+), 8 deletions(-) diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c index c0bb7cf..7d7eb4a

[PATCH v2 09/12] KVM: MMU: introduce mmu_spte_establish

2013-01-23 Thread Xiao Guangrong
It is used to establish the spte if it is not present to cleanup the code, it also marks spte present before linking it to the sp's parent_list, then we can integrate the code between rmap walking and parent_lisk walking in the later patch Signed-off-by: Xiao Guangrong

[PATCH v2 10/12] KVM: MMU: unify the code of walking pte list

2013-01-23 Thread Xiao Guangrong
Walking parent spte and walking ramp have same logic, this patch introduces for_each_spte_in_pte_list to integrate their code Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com --- arch/x86/kvm/mmu.c | 199 ++

[PATCH v2 11/12] KVM: MMU: fix spte assertion

2013-01-23 Thread Xiao Guangrong
PT_PRESENT_MASK bit is not enough to see the spte has already been mapped into pte-list for mmio spte also set this bit. Use is_shadow_present_pte instead to fix it Also, this patch move many assertions to the common place to clean up the code Signed-off-by: Xiao Guangrong

[PATCH v2 12/12] KVM: MMU: fast drop all spte on the pte_list

2013-01-23 Thread Xiao Guangrong
If the pte_list need to be destroyed, no need to delete its spte one by one, we can directly reset it and free the memory its used Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com --- arch/x86/kvm/mmu.c | 36 +++- 1 files changed, 27 insertions(+),

[PATCH 0/8] KVM: Reduce mmu_lock hold time when zapping mmu pages

2013-01-23 Thread Takuya Yoshikawa
This patch set mitigates another mmu_lock hold time issue. Although this is not enough and I'm thinking of additional work already, this alone can reduce the lock hold time to some extent. Takuya Yoshikawa (8): KVM: MMU: Fix and clean up for_each_gfn_* macros KVM: MMU: Use

[PATCH 1/8] KVM: MMU: Fix and clean up for_each_gfn_* macros

2013-01-23 Thread Takuya Yoshikawa
The expression (sp)-gfn should not be expanded using @gfn. Although no user of these macros passes a string other than gfn now, this should be fixed before anyone sees strange errors. Also, the counter-intuitive conditions, which had been used before these macros were introduced to avoid extra

[PATCH 2/8] KVM: MMU: Use list_for_each_entry_safe in kvm_mmu_commit_zap_page()

2013-01-23 Thread Takuya Yoshikawa
We are traversing the linked list, invalid_list, deleting each entry by kvm_mmu_free_page(). _safe version is there for such a case. Signed-off-by: Takuya Yoshikawa yoshikawa_takuya...@lab.ntt.co.jp --- arch/x86/kvm/mmu.c |7 +++ 1 files changed, 3 insertions(+), 4 deletions(-) diff

[PATCH 3/8] KVM: MMU: Add a parameter to kvm_mmu_prepare_zap_page() to update the next position

2013-01-23 Thread Takuya Yoshikawa
Currently we cannot do the isolation of mmu pages, i.e. deleting the current hash_link node by hlist_del(), in this function, because we may call it while traversing the linked list; we cannot solve the problem by hlist_for_each_entry_safe as zapping can happen recursively. Since the isolation

[PATCH 4/8] KVM: MMU: Introduce for_each_gfn_indirect_valid_sp_safe macro

2013-01-23 Thread Takuya Yoshikawa
This is a preparation for moving hlist_del(sp-hash_link) from kvm_mmu_isolate_page() to kvm_mmu_prepare_zap_page(). All for_each_gfn_indirect_valid_sp's whose bodies contain a function call which will reach kvm_mmu_prepare_zap_page(), and not break the loop right after the call, are converted to

[PATCH 5/8] KVM: MMU: Delete hash_link node in kvm_mmu_prepare_zap_page()

2013-01-23 Thread Takuya Yoshikawa
Now that we are using for_each_gfn_indirect_valid_sp_safe, we can safely delete the node by correctly updating the pointer to the next one. The only case we need to care about is when mmu_zap_unsync_children() has zapped anything other than the current one. Signed-off-by: Takuya Yoshikawa

[PATCH 6/8] KVM: MMU: Introduce free_zapped_mmu_pages() for freeing mmu pages in a list

2013-01-23 Thread Takuya Yoshikawa
This will be split out from kvm_mmu_commit_zap_page() and moved out of the protection of the mmu_lock later. Note: kvm_mmu_isolate_page() is folded into kvm_mmu_free_page() since it now does nothing but free sp-gfns. Signed-off-by: Takuya Yoshikawa yoshikawa_takuya...@lab.ntt.co.jp ---

[PATCH 7/8] KVM: MMU: Split out free_zapped_mmu_pages() from kvm_mmu_commit_zap_page()

2013-01-23 Thread Takuya Yoshikawa
Just trivial conversions at this point. Some of these will be moved out of the protection of the mmu_lock in the following patch. Signed-off-by: Takuya Yoshikawa yoshikawa_takuya...@lab.ntt.co.jp --- arch/x86/kvm/mmu.c | 24 +--- 1 files changed, 21 insertions(+), 3

[PATCH 8/8] KVM: MMU: Move free_zapped_mmu_pages() out of the protection of mmu_lock

2013-01-23 Thread Takuya Yoshikawa
We noticed that kvm_mmu_zap_all() could take hundreds of milliseconds for zapping mmu pages with mmu_lock held. Although we need to do conditional rescheduling for completely fixing this issue, we can reduce the hold time to some extent by moving free_zapped_mmu_pages() out of the protection.

Re: [PATCH for-1.4 qom-cpu 1/9] kvm: Create kvm_arch_vcpu_id() function

2013-01-23 Thread Gleb Natapov
On Tue, Jan 22, 2013 at 06:25:01PM -0200, Eduardo Habkost wrote: This will allow each architecture to define how the VCPU ID is set on the KVM_CREATE_VCPU ioctl call. Signed-off-by: Eduardo Habkost ehabk...@redhat.com Acked-by: Gleb Natapov g...@redhat.com --- Cc: kvm@vger.kernel.org Cc:

Re: [PATCH for-1.4 qom-cpu 2/9] target-i386: kvm: Set vcpu_id to APIC ID instead of CPU index

2013-01-23 Thread Gleb Natapov
On Tue, Jan 22, 2013 at 06:25:02PM -0200, Eduardo Habkost wrote: The CPU ID in KVM is supposed to be the APIC ID, so change the KVM_CREATE_VCPU call to match it. The current behavior didn't break anything yet because today the APIC ID is assumed to be equal to the CPU index, but this won't be

Re: [PATCH v11 2/3] x86, apicv: add virtual x2apic support

2013-01-23 Thread Gleb Natapov
On Tue, Jan 22, 2013 at 09:13:06PM -0200, Marcelo Tosatti wrote: On Tue, Jan 22, 2013 at 05:55:53PM +0200, Gleb Natapov wrote: On Tue, Jan 22, 2013 at 12:21:47PM +, Zhang, Yang Z wrote: +static void vmx_set_msr_bitmap(struct kvm_vcpu *vcpu) +{ + unsigned long *msr_bitmap;

Re: [PATCH v11 3/3] x86, apicv: add virtual interrupt delivery support

2013-01-23 Thread Gleb Natapov
On Wed, Jan 23, 2013 at 12:45:39AM +, Zhang, Yang Z wrote: We are getting close so please test with userspace irq chip too. Thanks for your suggestion to test with userspace irqchip. I found some issues and will modify the logic: As we known, APICv deponds on TPR shadow. But TPR shadow

Re: [PATCH 0/8] KVM: Reduce mmu_lock hold time when zapping mmu pages

2013-01-23 Thread Xiao Guangrong
On 01/23/2013 06:12 PM, Takuya Yoshikawa wrote: This patch set mitigates another mmu_lock hold time issue. Although this is not enough and I'm thinking of additional work already, this alone can reduce the lock hold time to some extent. It is not worth doing this kind of complex thing,

RE: [PATCH v11 3/3] x86, apicv: add virtual interrupt delivery support

2013-01-23 Thread Zhang, Yang Z
Gleb Natapov wrote on 2013-01-23: On Wed, Jan 23, 2013 at 12:45:39AM +, Zhang, Yang Z wrote: We are getting close so please test with userspace irq chip too. Thanks for your suggestion to test with userspace irqchip. I found some issues and will modify the logic: As we known, APICv deponds

Re: [PATCH v2] KVM: VMX: enable acknowledge interupt on vmexit

2013-01-23 Thread Gleb Natapov
On Tue, Jan 22, 2013 at 01:49:31PM +0800, Yang Zhang wrote: From: Yang Zhang yang.z.zh...@intel.com The acknowledge interrupt on exit feature controls processor behavior for external interrupt acknowledgement. When this control is set, the processor acknowledges the interrupt controller to

Re: [kvmarm] [RFC] KVM/arm64, take #3

2013-01-23 Thread Marc Zyngier
On 23/01/13 11:24, Pranavkumar Sawargaonkar wrote: Hi Pranav, I have tried kvm-arm64/kvm branch but seems it is not booting on foundation model. Hmmm... root@hot-poop:~# dmesg | head Initializing cgroup subsys cpu Linux version 3.8.0-rc4+ (maz@e102391-lin) (gcc version 4.7.1 (0.11.114) )

Re: [PATCH 0/8] KVM: Reduce mmu_lock hold time when zapping mmu pages

2013-01-23 Thread Takuya Yoshikawa
On Wed, 23 Jan 2013 18:44:52 +0800 Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com wrote: On 01/23/2013 06:12 PM, Takuya Yoshikawa wrote: This patch set mitigates another mmu_lock hold time issue. Although this is not enough and I'm thinking of additional work already, this alone can

Re: [PATCH 0/8] KVM: Reduce mmu_lock hold time when zapping mmu pages

2013-01-23 Thread Xiao Guangrong
On 01/23/2013 09:28 PM, Takuya Yoshikawa wrote: On Wed, 23 Jan 2013 18:44:52 +0800 Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com wrote: On 01/23/2013 06:12 PM, Takuya Yoshikawa wrote: This patch set mitigates another mmu_lock hold time issue. Although this is not enough and I'm thinking

Re: [PATCH V3 RESEND RFC 0/2] kvm: Improving undercommit scenarios

2013-01-23 Thread Andrew Jones
On Tue, Jan 22, 2013 at 01:08:54PM +0530, Raghavendra K T wrote: In some special scenarios like #vcpu = #pcpu, PLE handler may prove very costly, because there is no need to iterate over vcpus and do unsuccessful yield_to burning CPU. The first patch optimizes all the yield_to by bailing

Re: [PATCH 0/8] KVM: Reduce mmu_lock hold time when zapping mmu pages

2013-01-23 Thread Takuya Yoshikawa
On Wed, 23 Jan 2013 21:45:23 +0800 Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com wrote: The current code which deletes the two link nodes in different functions looks unnatural to me: traversing the sp-link nodes forces us to break the loop and sp-hash_link nodes alone is allowed to

[PATCH v12 0/3] x86, apicv: Add APIC virtualization support

2013-01-23 Thread Yang Zhang
From: Yang Zhang yang.z.zh...@intel.com APIC virtualization is a new feature which can eliminate most of VM exit when vcpu handle a interrupt: APIC register virtualization: APIC read access doesn't cause APIC-access VM exits. APIC write becomes trap-like. Virtual interrupt

[PATCH v12 1/3] x86, apicv: add APICv register virtualization support

2013-01-23 Thread Yang Zhang
- APIC read doesn't cause VM-Exit - APIC write becomes trap-like Signed-off-by: Kevin Tian kevin.t...@intel.com Signed-off-by: Yang Zhang yang.z.zh...@intel.com --- arch/x86/include/asm/vmx.h |2 ++ arch/x86/kvm/lapic.c | 15 +++ arch/x86/kvm/lapic.h |2 ++

[PATCH v12 2/3] x86, apicv: add virtual x2apic support

2013-01-23 Thread Yang Zhang
From: Yang Zhang yang.z.zh...@intel.com basically to benefit from apicv, we need to enable virtualized x2apic mode. Currently, we only enable it when guest is really using x2apic. Also, clear MSR bitmap for corresponding x2apic MSRs when guest enabled x2apic: 0x800 - 0x8ff: no read intercept for

[PATCH v12 3/3] x86, apicv: add virtual interrupt delivery support

2013-01-23 Thread Yang Zhang
From: Yang Zhang yang.z.zh...@intel.com Virtual interrupt delivery avoids KVM to inject vAPIC interrupts manually, which is fully taken care of by the hardware. This needs some special awareness into existing interrupr injection path: - for pending interrupt, instead of direct injection, we may

RE: external snapshot-delete questions

2013-01-23 Thread Skardal, Harald
Using RHEL7A2 with newest libvirt etc. Doing some work that uses external snapshot and qcow2. I understand that virsh snapshot-delete domain snap-name is not implemented yet. Neither can you destroy/delete a VM that has external snapshots. Is there another way to delete snapshots? Is there a

Re: [QEMU PATCH v5 1/3] virtio-net: remove layout assumptions for ctrl vq

2013-01-23 Thread Michael S. Tsirkin
On Tue, Jan 22, 2013 at 11:44:44PM +0800, Amos Kong wrote: From: Michael S. Tsirkin m...@redhat.com Virtio-net code makes assumption about virtqueue descriptor layout (e.g. sg[0] is the header, sg[1] is the data buffer). This patch makes code not rely on the layout of descriptors.

Re: [PATCH 0/8] KVM: Reduce mmu_lock hold time when zapping mmu pages

2013-01-23 Thread Xiao Guangrong
On 01/23/2013 10:49 PM, Takuya Yoshikawa wrote: On Wed, 23 Jan 2013 21:45:23 +0800 Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com wrote: The current code which deletes the two link nodes in different functions looks unnatural to me: traversing the sp-link nodes forces us to break the loop

Re: [Qemu-devel] [PATCH for-1.4 qom-cpu 2/9] target-i386: kvm: Set vcpu_id to APIC ID instead of CPU index

2013-01-23 Thread Andreas Färber
Am 23.01.2013 11:26, schrieb Gleb Natapov: On Tue, Jan 22, 2013 at 06:25:02PM -0200, Eduardo Habkost wrote: The CPU ID in KVM is supposed to be the APIC ID, so change the KVM_CREATE_VCPU call to match it. The current behavior didn't break anything yet because today the APIC ID is assumed to be

[GIT PULL] KVM/ARM core implementation

2013-01-23 Thread Christoffer Dall
Hi Will, I've prepared a stable branch for you, for-will/kvm/core, based on your stable perf branch. Since the last patch series, I've addressed the reviewer comments, and rev'ed KVM_CAP_ARM_PSCI to 87, since 86 is already used by PPC in kvm/next. kvmtool should probably be updated acoordingly.

[PATCH] vhost-net: fall back to vmalloc if high-order allocation fails

2013-01-23 Thread Romain Francoise
Creating a vhost-net device allocates an object large enough (34320 bytes on x86-64) to trigger an order-4 allocation, which may fail if memory if fragmented: libvirtd: page allocation failure: order:4, mode:0x2000d0 ... SLAB: Unable to allocate memory on node 0 (gfp=0xd0) cache:

Re: [PATCH] vhost-net: fall back to vmalloc if high-order allocation fails

2013-01-23 Thread Michael S. Tsirkin
On Wed, Jan 23, 2013 at 09:46:47PM +0100, Romain Francoise wrote: Creating a vhost-net device allocates an object large enough (34320 bytes on x86-64) to trigger an order-4 allocation, which may fail if memory if fragmented: libvirtd: page allocation failure: order:4, mode:0x2000d0 ...

Re: [PATCH v12 0/3] x86, apicv: Add APIC virtualization support

2013-01-23 Thread Marcelo Tosatti
On Wed, Jan 23, 2013 at 10:47:23PM +0800, Yang Zhang wrote: From: Yang Zhang yang.z.zh...@intel.com APIC virtualization is a new feature which can eliminate most of VM exit when vcpu handle a interrupt: APIC register virtualization: APIC read access doesn't cause APIC-access VM

Re: [PATCH v12 0/3] x86, apicv: Add APIC virtualization support

2013-01-23 Thread Marcelo Tosatti
On Wed, Jan 23, 2013 at 10:47:23PM +0800, Yang Zhang wrote: From: Yang Zhang yang.z.zh...@intel.com APIC virtualization is a new feature which can eliminate most of VM exit when vcpu handle a interrupt: APIC register virtualization: APIC read access doesn't cause APIC-access VM

[PATCH] vfio-pci: Enable PCIe extended capabilities on v1

2013-01-23 Thread Alex Williamson
Even PCIe 1.x had extended config space. Signed-off-by: Alex Williamson alex.william...@redhat.com --- drivers/vfio/pci/vfio_pci_config.c |6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/drivers/vfio/pci/vfio_pci_config.c b/drivers/vfio/pci/vfio_pci_config.c index

RE: [PATCH v12 0/3] x86, apicv: Add APIC virtualization support

2013-01-23 Thread Zhang, Yang Z
Marcelo Tosatti wrote on 2013-01-24: On Wed, Jan 23, 2013 at 10:47:23PM +0800, Yang Zhang wrote: From: Yang Zhang yang.z.zh...@intel.com APIC virtualization is a new feature which can eliminate most of VM exit when vcpu handle a interrupt: APIC register virtualization: APIC read

Re: [PATCH 0/9] some more vmx real mode emulation fixes and cleanups

2013-01-23 Thread Marcelo Tosatti
On Mon, Jan 21, 2013 at 03:36:40PM +0200, Gleb Natapov wrote: Gleb Natapov (9): KVM: VMX: remove special CPL cache access during transition to real mode. KVM: VMX: reset CPL only on CS register write. KVM: VMX: if unrestricted guest is enabled vcpu state is always valid.

[PATCH] vfio-pci: Enable PCIe extended config space

2013-01-23 Thread Alex Williamson
We don't know pre-init time whether the device we're exposing is PCIe or legacy PCI. We could ask for it to be specified via a device option, but that seems like too much to ask of the user. Instead we can assume everything will be PCIe, which makes PCI-core allocate enough config space.

RE: [PATCH v2] KVM: VMX: enable acknowledge interupt on vmexit

2013-01-23 Thread Zhang, Yang Z
Gleb Natapov wrote on 2013-01-23: On Tue, Jan 22, 2013 at 01:49:31PM +0800, Yang Zhang wrote: From: Yang Zhang yang.z.zh...@intel.com The acknowledge interrupt on exit feature controls processor behavior for external interrupt acknowledgement. When this control is set, the processor

Re: windows 2008 guest causing rcu_shed to emit NMI

2013-01-23 Thread Marcelo Tosatti
On Tue, Jan 22, 2013 at 09:00:25PM +0300, Andrey Korolyov wrote: Hi, problem described in the title happens on heavy I/O pressure on the host, without idle=poll trace almost always is the same, involving mwait, with poll and nohz=off RIP varies from time to time, at the previous hang it was

Re: [PATCH v2] KVM: VMX: enable acknowledge interupt on vmexit

2013-01-23 Thread Gleb Natapov
On Thu, Jan 24, 2013 at 12:47:14AM +, Zhang, Yang Z wrote: Gleb Natapov wrote on 2013-01-23: On Tue, Jan 22, 2013 at 01:49:31PM +0800, Yang Zhang wrote: From: Yang Zhang yang.z.zh...@intel.com The acknowledge interrupt on exit feature controls processor behavior for external

RE: [PATCH v2] KVM: VMX: enable acknowledge interupt on vmexit

2013-01-23 Thread Zhang, Yang Z
Gleb Natapov wrote on 2013-01-24: On Thu, Jan 24, 2013 at 12:47:14AM +, Zhang, Yang Z wrote: Gleb Natapov wrote on 2013-01-23: On Tue, Jan 22, 2013 at 01:49:31PM +0800, Yang Zhang wrote: From: Yang Zhang yang.z.zh...@intel.com The acknowledge interrupt on exit feature controls processor

Re: [PATCH v12 2/3] x86, apicv: add virtual x2apic support

2013-01-23 Thread Gleb Natapov
On Wed, Jan 23, 2013 at 10:47:25PM +0800, Yang Zhang wrote: From: Yang Zhang yang.z.zh...@intel.com basically to benefit from apicv, we need to enable virtualized x2apic mode. Currently, we only enable it when guest is really using x2apic. Also, clear MSR bitmap for corresponding x2apic