[PATCH v2 0/2] KVM: VMX: Add Posted Interrupt supporting

2013-02-04 Thread Yang Zhang
From: Yang Zhang yang.z.zh...@intel.com The two patches is adding the Posted Interrupt supporting to KVM: The first patch enabls the feature 'acknowledge interrupt on vmexit'.Since it is required by Posted interrupt, we need to enable it firstly. And the second patch is adding the posted

[PATCH v2 1/2] KVM: VMX: enable acknowledge interupt on vmexit

2013-02-04 Thread Yang Zhang
From: Yang Zhang yang.z.zh...@intel.com The acknowledge interrupt on exit feature controls processor behavior for external interrupt acknowledgement. When this control is set, the processor acknowledges the interrupt controller to acquire the interrupt vector on VM exit. After enabling this

[PATCH v2 2/2] KVM: VMX: Add Posted Interrupt supporting

2013-02-04 Thread Yang Zhang
From: Yang Zhang yang.z.zh...@intel.com Posted Interrupt allows APIC interrupts to inject into guest directly without any vmexit. - When delivering a interrupt to guest, if target vcpu is running, update Posted-interrupt requests bitmap and send a notification event to the vcpu. Then the

RE: [PATCH 2/2] x86, apicv: Add Posted Interrupt supporting

2013-02-04 Thread Zhang, Yang Z
Sorry for the late response. Marcelo Tosatti wrote on 2013-02-04: On Thu, Jan 31, 2013 at 03:55:56PM +0200, Gleb Natapov wrote: On Thu, Jan 31, 2013 at 11:44:43AM -0200, Marcelo Tosatti wrote: On Thu, Jan 31, 2013 at 03:38:37PM +0200, Gleb Natapov wrote: On Thu, Jan 31, 2013 at 11:32:45AM

RE: [PATCH 2/2] x86, apicv: Add Posted Interrupt supporting

2013-02-04 Thread Zhang, Yang Z
This patch is too old. Some issues you point out already fixed in v2 patch. Please review v2 patch and give some comments. Gleb Natapov wrote on 2013-01-31: On Thu, Dec 13, 2012 at 03:29:40PM +0800, Yang Zhang wrote: From: Yang Zhang yang.z.zh...@intel.com Posted Interrupt allows APIC

Re: [PATCH 2/2] x86, apicv: Add Posted Interrupt supporting

2013-02-04 Thread Gleb Natapov
On Sun, Feb 03, 2013 at 10:57:00PM -0200, Marcelo Tosatti wrote: On Thu, Jan 31, 2013 at 03:55:56PM +0200, Gleb Natapov wrote: On Thu, Jan 31, 2013 at 11:44:43AM -0200, Marcelo Tosatti wrote: On Thu, Jan 31, 2013 at 03:38:37PM +0200, Gleb Natapov wrote: On Thu, Jan 31, 2013 at 11:32:45AM

Re: [Qemu-devel] [PATCH qom-cpu-next v3 3/4] target-i386: Slim conversion to X86CPU subclasses

2013-02-04 Thread Igor Mammedov
On Sat, 2 Feb 2013 01:37:07 +0100 Andreas Färber afaer...@suse.de wrote: Move x86_def_t definition to header and embed into X86CPUClass. Register types per built-in model definition. Move version initialization from x86_cpudef_setup() to class_init. Inline cpu_x86_register() into the

DMAR faults from unrelated device when vfio is used

2013-02-04 Thread David Gstir
Hi! I get the following error messages over and over again when using vfio in qemu-kvm: [ 1692.021403] dmar: DMAR:[DMA Read] Request device [00:02.0] fault addr 1a45aa9000 [ 1692.021403] DMAR:[fault reason 12] non-zero reserved fields in PTE [ 1692.021416] dmar: DRHD: handling fault status

[PATCH] kvm tools: Fix powerpc build after kvm__dump_mem() change

2013-02-04 Thread Michael Ellerman
Commit 21692d1 (Beautify debug output) broke the powerpc build because it changed the signature for kvm__dump_mem() but didn't update all callers. Signed-off-by: Michael Ellerman mich...@ellerman.id.au --- tools/kvm/powerpc/kvm-cpu.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff

Re: [PATCH v2 2/2] KVM: VMX: Add Posted Interrupt supporting

2013-02-04 Thread Gleb Natapov
On Mon, Feb 04, 2013 at 05:05:14PM +0800, Yang Zhang wrote: From: Yang Zhang yang.z.zh...@intel.com Posted Interrupt allows APIC interrupts to inject into guest directly without any vmexit. - When delivering a interrupt to guest, if target vcpu is running, update Posted-interrupt

Re: [PATCH] kvm tools: Fix powerpc build after kvm__dump_mem() change

2013-02-04 Thread Pekka Enberg
On Mon, Feb 4, 2013 at 2:17 PM, Michael Ellerman mich...@ellerman.id.au wrote: Commit 21692d1 (Beautify debug output) broke the powerpc build because it changed the signature for kvm__dump_mem() but didn't update all callers. Signed-off-by: Michael Ellerman mich...@ellerman.id.au Applied,

Re: [Qemu-devel] [PATCH qom-cpu-next v3 3/4] target-i386: Slim conversion to X86CPU subclasses

2013-02-04 Thread Andreas Färber
Am 04.02.2013 12:08, schrieb Igor Mammedov: On Sat, 2 Feb 2013 01:37:07 +0100 Andreas Färber afaer...@suse.de wrote: Move x86_def_t definition to header and embed into X86CPUClass. Register types per built-in model definition. Move version initialization from x86_cpudef_setup() to

KVH call agenda for 2013-02-05

2013-02-04 Thread Juan Quintela
Hi Please send in any agenda topics you are interested in. Later, Juan. -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [PATCH] kvm tools: Fix powerpc build after kvm__dump_mem() change

2013-02-04 Thread Will Deacon
On Mon, Feb 04, 2013 at 12:45:53PM +, Pekka Enberg wrote: On Mon, Feb 4, 2013 at 2:17 PM, Michael Ellerman mich...@ellerman.id.au wrote: Commit 21692d1 (Beautify debug output) broke the powerpc build because it changed the signature for kvm__dump_mem() but didn't update all callers.

Re: [PATCH 0/8] KVM: Reduce mmu_lock hold time when zapping mmu pages

2013-02-04 Thread Marcelo Tosatti
On Wed, Jan 23, 2013 at 07:12:31PM +0900, Takuya Yoshikawa wrote: This patch set mitigates another mmu_lock hold time issue. Although this is not enough and I'm thinking of additional work already, this alone can reduce the lock hold time to some extent. Takuya Yoshikawa (8): KVM: MMU:

Re: [PATCH 0/8] KVM: Reduce mmu_lock hold time when zapping mmu pages

2013-02-04 Thread Marcelo Tosatti
On Wed, Jan 23, 2013 at 06:44:52PM +0800, Xiao Guangrong wrote: On 01/23/2013 06:12 PM, Takuya Yoshikawa wrote: This patch set mitigates another mmu_lock hold time issue. Although this is not enough and I'm thinking of additional work already, this alone can reduce the lock hold time to

[PATCH] KVM: VMX: cleanup vmx_set_cr0().

2013-02-04 Thread Gleb Natapov
When calculating hw_cr0 teh current code masks bits that should be always on and re-adds them back immediately after. Cleanup the code by masking only those bits that should be dropped from hw_cr0. This allow us to get rid of some defines. Signed-off-by: Gleb Natapov g...@redhat.com diff --git

Re: [PATCH 8/8] KVM: MMU: Move free_zapped_mmu_pages() out of the protection of mmu_lock

2013-02-04 Thread Marcelo Tosatti
On Wed, Jan 23, 2013 at 07:18:11PM +0900, Takuya Yoshikawa wrote: We noticed that kvm_mmu_zap_all() could take hundreds of milliseconds for zapping mmu pages with mmu_lock held. Although we need to do conditional rescheduling for completely fixing this issue, we can reduce the hold time to

Re: [PATCH] kvm tools: Fix powerpc build after kvm__dump_mem() change

2013-02-04 Thread Pekka Enberg
On Mon, Feb 4, 2013 at 3:37 PM, Will Deacon will.dea...@arm.com wrote: D'oh! I was about to post a patch to fix this (arm is also broken)... I've dropped the powerpc hunk from my patch (see below). Applied, thanks Will! -- To unsubscribe from this list: send the line unsubscribe kvm in the body

Re: [PATCH 2/2] x86, apicv: Add Posted Interrupt supporting

2013-02-04 Thread Marcelo Tosatti
On Mon, Feb 04, 2013 at 11:55:53AM +0200, Gleb Natapov wrote: On Sun, Feb 03, 2013 at 10:57:00PM -0200, Marcelo Tosatti wrote: On Thu, Jan 31, 2013 at 03:55:56PM +0200, Gleb Natapov wrote: On Thu, Jan 31, 2013 at 11:44:43AM -0200, Marcelo Tosatti wrote: On Thu, Jan 31, 2013 at 03:38:37PM

Re: DMAR faults from unrelated device when vfio is used

2013-02-04 Thread Alex Williamson
On Mon, 2013-02-04 at 11:10 +0100, David Gstir wrote: Hi! I get the following error messages over and over again when using vfio in qemu-kvm: [ 1692.021403] dmar: DMAR:[DMA Read] Request device [00:02.0] fault addr 1a45aa9000 [ 1692.021403] DMAR:[fault reason 12] non-zero reserved

Re: [Qemu-devel] [PATCH qom-cpu-next v3 3/4] target-i386: Slim conversion to X86CPU subclasses

2013-02-04 Thread Igor Mammedov
On Mon, 04 Feb 2013 13:52:32 +0100 Andreas Färber afaer...@suse.de wrote: Am 04.02.2013 12:08, schrieb Igor Mammedov: On Sat, 2 Feb 2013 01:37:07 +0100 Andreas Färber afaer...@suse.de wrote: Move x86_def_t definition to header and embed into X86CPUClass. Register types per built-in

Re: [PATCH 50/62] vfio: convert to idr_alloc()

2013-02-04 Thread Alex Williamson
On Sat, 2013-02-02 at 17:20 -0800, Tejun Heo wrote: Convert to the much saner new idr interface. Only compile tested. Signed-off-by: Tejun Heo t...@kernel.org Cc: Alex Williamson alex.william...@redhat.com Cc: kvm@vger.kernel.org --- This patch depends on an earlier idr changes and I

[PATCH v2 50/62] vfio: convert to idr_alloc()

2013-02-04 Thread Tejun Heo
Convert to the much saner new idr interface. Only compile tested. v2: Restore accidentally dropped index 0 comment as suggested by Alex. Signed-off-by: Tejun Heo t...@kernel.org Acked-by: Alex Williamson alex.william...@redhat.com Cc: kvm@vger.kernel.org --- drivers/vfio/vfio.c | 17

Re: [PATCH v3 1/3] VFIO: Wrapper for getting reference to vfio_device from device

2013-02-04 Thread Alex Williamson
On Sun, 2013-02-03 at 14:10 +, Pandarathil, Vijaymohan R wrote: - Added vfio_device_get_from_dev() as wrapper to get reference to vfio_device from struct device. - Added vfio_device_data() as a wrapper to get device_data from vfio_device. Signed-off-by:

Re: [PATCH v3 2/3] VFIO-AER: Vfio-pci driver changes for supporting AER

2013-02-04 Thread Alex Williamson
On Sun, 2013-02-03 at 14:10 +, Pandarathil, Vijaymohan R wrote: - New VFIO_SET_IRQ ioctl option to pass the eventfd that is signaled when an error occurs in the vfio_pci_device - Register pci_error_handler for the vfio_pci driver - When the device

Re: [PATCH v3 3/3] QEMU-AER: Qemu changes to support AER for VFIO-PCI devices

2013-02-04 Thread Alex Williamson
On Sun, 2013-02-03 at 14:10 +, Pandarathil, Vijaymohan R wrote: - Create eventfd per vfio device assigned to a guest and register an event handler - This fd is passed to the vfio_pci driver through the SET_IRQ ioctl - When the device encounters an error, the

Re: [PATCH v3 0/3] AER-KVM: Error containment of VFIO devices assigned to KVM guests

2013-02-04 Thread Alex Williamson
On Sun, 2013-02-03 at 14:10 +, Pandarathil, Vijaymohan R wrote: Add support for error containment when a VFIO device assigned to a KVM guest encounters an error. This is for PCIe devices/drivers that support AER functionality. When the host OS is notified of an error in a device either

Re: [PATCH 2/2] x86, apicv: Add Posted Interrupt supporting

2013-02-04 Thread Gleb Natapov
On Mon, Feb 04, 2013 at 12:43:45PM -0200, Marcelo Tosatti wrote: Any example how software relies on such two-interrupts-queued-in-IRR/ISR behaviour? Don't know about guests, but KVM relies on it to detect interrupt coalescing. So if interrupt is set in IRR but not in PIR interrupt will

Re: [PATCH 8/8] KVM:PPC:booke: Allow debug interrupt injection to guest

2013-02-04 Thread Scott Wood
On 02/03/2013 10:48:29 PM, Bhushan Bharat-R65777 wrote: -Original Message- From: Wood Scott-B07421 Sent: Saturday, February 02, 2013 4:09 AM To: Alexander Graf Cc: Bhushan Bharat-R65777; kvm-...@vger.kernel.org; kvm@vger.kernel.org Subject: Re: [PATCH 8/8] KVM:PPC:booke: Allow

Re: [Qemu-devel] [PATCH qom-cpu-next v3 3/4] target-i386: Slim conversion to X86CPU subclasses

2013-02-04 Thread Igor Mammedov
On Mon, 4 Feb 2013 17:05:01 +0100 Igor Mammedov imamm...@redhat.com wrote: On Mon, 04 Feb 2013 13:52:32 +0100 Andreas Färber afaer...@suse.de wrote: Am 04.02.2013 12:08, schrieb Igor Mammedov: On Sat, 2 Feb 2013 01:37:07 +0100 Andreas Färber afaer...@suse.de wrote: [...] @@

Re: [PATCH v2] tcm_vhost: Multi-target support

2013-02-04 Thread Nicholas A. Bellinger
Hi Asias, On Fri, 2013-02-01 at 16:16 +0800, Asias He wrote: In order to take advantages of Paolo's multi-queue virito-scsi, we need multi-target support in tcm_vhost first. Otherwise all the requests go to one queue and other queues are idle. This patch makes: 1. All the targets under

Re: [PATCH 2/2] x86, apicv: Add Posted Interrupt supporting

2013-02-04 Thread Marcelo Tosatti
On Mon, Feb 04, 2013 at 07:13:01PM +0200, Gleb Natapov wrote: On Mon, Feb 04, 2013 at 12:43:45PM -0200, Marcelo Tosatti wrote: Any example how software relies on such two-interrupts-queued-in-IRR/ISR behaviour? Don't know about guests, but KVM relies on it to detect interrupt

Re: [PATCH 2/2] x86, apicv: Add Posted Interrupt supporting

2013-02-04 Thread Marcelo Tosatti
On Mon, Feb 04, 2013 at 05:59:52PM -0200, Marcelo Tosatti wrote: On Mon, Feb 04, 2013 at 07:13:01PM +0200, Gleb Natapov wrote: On Mon, Feb 04, 2013 at 12:43:45PM -0200, Marcelo Tosatti wrote: Any example how software relies on such two-interrupts-queued-in-IRR/ISR behaviour?

Re: [PATCH V4 RESEND 00/22] Multiqueue virtio-net

2013-02-04 Thread Anthony Liguori
Applied. Thanks. Regards, Anthony Liguori -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [PATCH V4 00/22] Multiqueue virtio-net

2013-02-04 Thread Anthony Liguori
Applied. Thanks. Regards, Anthony Liguori -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

KVM with Windows7 guests - USB pass throug and shutdown not working

2013-02-04 Thread Christoph Anton Mitterer
Hi. I'm seeing two issues with Windows7 running as a guest, maybe you can point me to the right direction :) 1) Shutdown (selected from Windows itself) doesn't work, the system reboots afterwards. 2) USB passthrough dosesn't work; I connect a camera to it (in order to upgrade it's AGPS data

Re: [PATCH v3] KVM: set_memory_region: Identify the requested change explicitly

2013-02-04 Thread Marcelo Tosatti
On Tue, Jan 29, 2013 at 11:00:07AM +0900, Takuya Yoshikawa wrote: KVM_SET_USER_MEMORY_REGION forces __kvm_set_memory_region() to identify what kind of change is being requested by checking the arguments. The current code does this checking at various points in code and each condition being

Re: Investigating abnormal stealtimes

2013-02-04 Thread Marcelo Tosatti
Nice! - 'Steal time' is the amount of time taken while vcpu is able to run but not runnable. Maybe 'vmexit latency' is a better name. - Perhaps it would be good to subtract the time the thread was involuntarily scheduled out due 'timeslice' expiration. Otherwise, running a CPU

Re: [PATCH 6/6] Revert KVM: MMU: split kvm_mmu_free_page

2013-02-04 Thread Marcelo Tosatti
On Wed, Jan 30, 2013 at 04:45:05PM +0200, Gleb Natapov wrote: This reverts commit bd4c86eaa6ff10abc4e00d0f45d2a28b10b09df4. There is not user for kvm_mmu_isolate_page() any more. Signed-off-by: Gleb Natapov g...@redhat.com --- arch/x86/kvm/mmu.c | 21 +++-- Applied all

Re: [PATCH 0/2] KVM: set_memory_region: Cleanup and new restriction

2013-02-04 Thread Marcelo Tosatti
On Thu, Jan 31, 2013 at 12:15:01PM +0200, Gleb Natapov wrote: On Wed, Jan 30, 2013 at 07:38:37PM +0900, Takuya Yoshikawa wrote: Patch 1: just rebased for this series. Patch 2: an API change, so please let me know if you notice any problems. Takuya Yoshikawa (2): KVM:

Re: [PATCH v3] KVM: set_memory_region: Identify the requested change explicitly

2013-02-04 Thread Takuya Yoshikawa
On Mon, 4 Feb 2013 22:01:33 -0200 Marcelo Tosatti mtosa...@redhat.com wrote: Applied, thanks. It would be good to propagate the enum into kvm_arch_prepare/commit memory region. Yes, that's what I want to do after ARM-KVM gets merged. Takuya -- To unsubscribe from this list: send the

Re: [PATCH 6/6] Revert KVM: MMU: split kvm_mmu_free_page

2013-02-04 Thread Takuya Yoshikawa
On Mon, 4 Feb 2013 23:24:01 -0200 Marcelo Tosatti mtosa...@redhat.com wrote: On Wed, Jan 30, 2013 at 04:45:05PM +0200, Gleb Natapov wrote: This reverts commit bd4c86eaa6ff10abc4e00d0f45d2a28b10b09df4. There is not user for kvm_mmu_isolate_page() any more. Signed-off-by: Gleb Natapov

Re: [PATCH 8/8] KVM: MMU: Move free_zapped_mmu_pages() out of the protection of mmu_lock

2013-02-04 Thread Takuya Yoshikawa
On Mon, 4 Feb 2013 11:50:00 -0200 Marcelo Tosatti mtosa...@redhat.com wrote: On Wed, Jan 23, 2013 at 07:18:11PM +0900, Takuya Yoshikawa wrote: We noticed that kvm_mmu_zap_all() could take hundreds of milliseconds for zapping mmu pages with mmu_lock held. Although we need to do

RE: [PATCH v2 2/2] KVM: VMX: Add Posted Interrupt supporting

2013-02-04 Thread Zhang, Yang Z
Gleb Natapov wrote on 2013-02-04: On Mon, Feb 04, 2013 at 05:05:14PM +0800, Yang Zhang wrote: From: Yang Zhang yang.z.zh...@intel.com Posted Interrupt allows APIC interrupts to inject into guest directly without any vmexit. - When delivering a interrupt to guest, if target vcpu is

Re: [PATCH v2] tcm_vhost: Multi-target support

2013-02-04 Thread Asias He
On 02/05/2013 04:48 AM, Nicholas A. Bellinger wrote: Hi Asias, On Fri, 2013-02-01 at 16:16 +0800, Asias He wrote: In order to take advantages of Paolo's multi-queue virito-scsi, we need multi-target support in tcm_vhost first. Otherwise all the requests go to one queue and other queues are

[PATCH v3] tcm_vhost: Multi-target support

2013-02-04 Thread Asias He
In order to take advantages of Paolo's multi-queue virito-scsi, we need multi-target support in tcm_vhost first. Otherwise all the requests go to one queue and other queues are idle. This patch makes: 1. All the targets under the wwpn is seen and can be used by guest. 2. No need to pass the tpgt

Re: [PATCH 0/8] KVM: Reduce mmu_lock hold time when zapping mmu pages

2013-02-04 Thread Xiao Guangrong
On 02/04/2013 09:42 PM, Marcelo Tosatti wrote: On Wed, Jan 23, 2013 at 06:44:52PM +0800, Xiao Guangrong wrote: On 01/23/2013 06:12 PM, Takuya Yoshikawa wrote: This patch set mitigates another mmu_lock hold time issue. Although this is not enough and I'm thinking of additional work already,

RE: [PATCH 2/2] x86, apicv: Add Posted Interrupt supporting

2013-02-04 Thread Zhang, Yang Z
Marcelo Tosatti wrote on 2013-02-05: On Mon, Feb 04, 2013 at 05:59:52PM -0200, Marcelo Tosatti wrote: On Mon, Feb 04, 2013 at 07:13:01PM +0200, Gleb Natapov wrote: On Mon, Feb 04, 2013 at 12:43:45PM -0200, Marcelo Tosatti wrote: Any example how software relies on such

win8 installation iso can not boot on rhel6.2 kernel?

2013-02-04 Thread ya su
I use the following cmd on rhel6.2 kernel 2.6.32-220.17.1: x86_64-softmmu/qemu-system-x86_64 -hda win8.img -cdrom window_8_pro.iso -m 2048 -L pc-bios -cpu host, it will display the following error: Your PC needs to restart. Please hold down the power button. Error Code: 0x005D Parameters:

[PATCH v3] KVM: MMU: lazily drop large spte

2013-02-04 Thread Xiao Guangrong
Currently, kvm zaps the large spte if write-protected is needed, the later read can fault on that spte. Actually, we can make the large spte readonly instead of making them un-present, the page fault caused by read access can be avoid The idea is from Avi: | As I mentioned before,

[PATCH v3 0/3] KVM: MMU: simple cleanups

2013-02-04 Thread Xiao Guangrong
There are the simple cleanups for MMU, no function / logic changed. Marcelo, Gleb, please apply them after applying [PATCH v3] KVM: MMU: lazily drop large spte Changelog: no change, just split them from the previous patchset for good review. Thanks! -- To unsubscribe from this list: send the

[PATCH v3 1/3] KVM: MMU: cleanup mapping-level

2013-02-04 Thread Xiao Guangrong
Use min() to cleanup mapping_level Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com --- arch/x86/kvm/mmu.c |3 +-- 1 files changed, 1 insertions(+), 2 deletions(-) diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c index ff2fc80..fe877da 100644 --- a/arch/x86/kvm/mmu.c +++

[PATCH v3 2/3] KVM: MMU: remove pt_access in mmu_set_spte

2013-02-04 Thread Xiao Guangrong
It is only used in debug code, so drop it Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com --- arch/x86/kvm/mmu.c | 17 +++-- arch/x86/kvm/paging_tmpl.h |9 - 2 files changed, 11 insertions(+), 15 deletions(-) diff --git a/arch/x86/kvm/mmu.c

[PATCH v3 3/3] KVM: MMU: cleanup __direct_map

2013-02-04 Thread Xiao Guangrong
Use link_shadow_page to link the sp to the spte in __direct_map Signed-off-by: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com --- arch/x86/kvm/mmu.c | 12 1 files changed, 4 insertions(+), 8 deletions(-) diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c index 2112c1b..8041454

Re: [PATCH 2/2] x86, apicv: Add Posted Interrupt supporting

2013-02-04 Thread Gleb Natapov
On Mon, Feb 04, 2013 at 06:47:30PM -0200, Marcelo Tosatti wrote: On Mon, Feb 04, 2013 at 05:59:52PM -0200, Marcelo Tosatti wrote: On Mon, Feb 04, 2013 at 07:13:01PM +0200, Gleb Natapov wrote: On Mon, Feb 04, 2013 at 12:43:45PM -0200, Marcelo Tosatti wrote: Any example how software

Re: [PATCH v2 2/2] KVM: VMX: Add Posted Interrupt supporting

2013-02-04 Thread Gleb Natapov
On Tue, Feb 05, 2013 at 03:13:52AM +, Zhang, Yang Z wrote: Gleb Natapov wrote on 2013-02-04: On Mon, Feb 04, 2013 at 05:05:14PM +0800, Yang Zhang wrote: From: Yang Zhang yang.z.zh...@intel.com Posted Interrupt allows APIC interrupts to inject into guest directly without any vmexit.

Re: [PATCH v2 2/2] KVM: VMX: Add Posted Interrupt supporting

2013-02-04 Thread Gleb Natapov
On Tue, Feb 05, 2013 at 08:45:01AM +0200, Gleb Natapov wrote: +/* Posted interrupt descriptor */ +struct pi_desc *pi; + You haven't answered on my previous review why are you trying save 46 bytes here. Sorry. I cannot get your point. It's just a pointer and only

Re: [PATCH 8/8] KVM:PPC:booke: Allow debug interrupt injection to guest

2013-02-04 Thread Scott Wood
On 02/03/2013 10:48:29 PM, Bhushan Bharat-R65777 wrote: -Original Message- From: Wood Scott-B07421 Sent: Saturday, February 02, 2013 4:09 AM To: Alexander Graf Cc: Bhushan Bharat-R65777; kvm-ppc@vger.kernel.org; k...@vger.kernel.org Subject: Re: [PATCH 8/8] KVM:PPC:booke: Allow

[PATCH 1/4] powerpc: Remove Cell-specific relocation-on interrupt vector code

2013-02-04 Thread Paul Mackerras
The Cell processor doesn't support relocation-on interrupts, so we don't need relocation-on versions of the interrupt vectors that are purely Cell-specific. This removes them. Signed-off-by: Paul Mackerras pau...@samba.org --- arch/powerpc/kernel/exceptions-64s.S | 10 -- 1 file

[PATCH 0/4] Improve CFAR handling

2013-02-04 Thread Paul Mackerras
The CFAR (Come From Address Register) is useful for debugging; it records the address of the most recent taken branch or rfid instructions. At present, KVM doesn't even try to context switch it, and the first-level interrupt handlers for some interrupts have a branch before it gets saved, which

[PATCH 3/4] KVM: PPC: Book3S HV: Preserve guest CFAR register value

2013-02-04 Thread Paul Mackerras
The CFAR (Come-From Address Register) is a useful debugging aid that exists on POWER7 processors. Currently HV KVM doesn't save or restore the CFAR register for guest vcpus, making the CFAR of limited use in guests. This adds the necessary code to capture the CFAR value saved in the early

[PATCH 2/4] powerpc: Save CFAR before branching in interrupt entry paths

2013-02-04 Thread Paul Mackerras
Some of the interrupt vectors on 64-bit POWER server processors are only 32 bytes long, which is not enough for the full first-level interrupt handler. For these we currently just have a branch to an out-of-line handler. However, this means that we corrupt the CFAR (come-from address register)