The action of Accessed and Dirty bit for EPT

2014-03-06 Thread Arthur Chunqi Li
Hi there, I write a piece of code to test the action of Accessed and Dirty bit of EPT in Intel(R) Core(TM) i3-4130 CPU @ 3.40GHz. Firstly I build a totally new EPT paging structure with A/D logging on, then run some operating system codes and log all the EPT violation (say trap log). At some point

Re: [RFC] ARM VM System Sepcification

2014-03-06 Thread Robie Basak
On Sat, Mar 01, 2014 at 03:27:56PM +, Grant Likely wrote: > I would also reference section 3.3 (Boot Option Variables Default Boot > Behavior) and 3.4.1.1 (Removable Media Boot Behavior) here. It's fine to > restate the meaning of the requirement in this spec, but the UEFI spec > is the authori

Re: [Qemu-devel] [RFC]VM live snapshot proposal

2014-03-06 Thread Dr. David Alan Gilbert
* Huangpeng (Peter) (peter.huangp...@huawei.com) wrote: > Hi David > > Where can I get your post-copy git tree? > I wish to take a look into it first before start live-snapshot design. It's not yet published, as soon as it shows signs of life and I tidy it up I'll get it out there. Dave -- Dr. D

[PULL 0/1] KVM: s390: virtio-ccw bugfix

2014-03-06 Thread Cornelia Huck
The following changes since commit 96b14536d935848cffd904f583f67c66169002d8: virtio-ccw: virtio-ccw adapter interrupt support. (2014-03-04 10:41:04 +0100) are available in the git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux.git tags/kvm-s390-20140306 for you

[PULL 1/1] virtio_ccw: fix hang in set offline processing

2014-03-06 Thread Cornelia Huck
From: Heinz Graalfs During set offline processing virtio_grab_drvdata() incorrectly calls dev_set_drvdata() to remove the virtio_ccw_device from the parent ccw_device's driver data. This is wrong and ends up in a hang during virtio_ccw_reset(), as the interrupt handler still has need of the virti

[PATCH] virtio-scsi: Change sense buffer size to 252

2014-03-06 Thread Fam Zheng
According to SPC-4, section 4.5.2.1, 252 is the limit of sense data. So increase the value. Signed-off-by: Fam Zheng --- include/linux/virtio_scsi.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/include/linux/virtio_scsi.h b/include/linux/virtio_scsi.h index 4195b97..a437f7

Re: [RFC] ARM VM System Sepcification

2014-03-06 Thread Paolo Bonzini
Il 06/03/2014 09:52, Robie Basak ha scritto: On Sat, Mar 01, 2014 at 03:27:56PM +, Grant Likely wrote: I would also reference section 3.3 (Boot Option Variables Default Boot Behavior) and 3.4.1.1 (Removable Media Boot Behavior) here. It's fine to restate the meaning of the requirement in thi

Re: [PATCH] virtio-scsi: Change sense buffer size to 252

2014-03-06 Thread Paolo Bonzini
Il 06/03/2014 09:47, Fam Zheng ha scritto: According to SPC-4, section 4.5.2.1, 252 is the limit of sense data. So increase the value. Signed-off-by: Fam Zheng --- include/linux/virtio_scsi.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/include/linux/virtio_scsi.h b/incl

[PATCH 2/2] KVM: PPC: Book3S HV: Fix register usage when loading/saving VRSAVE

2014-03-06 Thread Aneesh Kumar K.V
From: Paul Mackerras Commit 595e4f7e697e ("KVM: PPC: Book3S HV: Use load/store_fp_state functions in HV guest entry/exit") changed the register usage in kvmppc_save_fp() and kvmppc_load_fp() but omitted changing the instructions that load and save VRSAVE. The result is that the VRSAVE value was

[PATCH 1/2] Revert "KVM: PPC: Book3S HV: Add new state for transactional memory"

2014-03-06 Thread Aneesh Kumar K.V
From: "Aneesh Kumar K.V" This reverts commit 7b490411c37f7ab7965cbdfe5e3ec28eadb6db5b which cause the below crash in the host. Unable to handle kernel paging request for data at address 0xf0001223f278 Faulting instruction address: 0xc0202a00 cpu 0x30: Vector: 300 (Data Access) at [c0

Re: [PATCH 1/2] Revert "KVM: PPC: Book3S HV: Add new state for transactional memory"

2014-03-06 Thread Paul Mackerras
On Thu, Mar 06, 2014 at 04:06:09PM +0530, Aneesh Kumar K.V wrote: > From: "Aneesh Kumar K.V" > > This reverts commit 7b490411c37f7ab7965cbdfe5e3ec28eadb6db5b which cause > the below crash in the host. > > Unable to handle kernel paging request for data at address 0xf0001223f278 > Faulting in

Re: [PATCH] virtio-scsi: Change sense buffer size to 252

2014-03-06 Thread Hannes Reinecke
On 03/06/2014 11:09 AM, Paolo Bonzini wrote: > Il 06/03/2014 09:47, Fam Zheng ha scritto: >> According to SPC-4, section 4.5.2.1, 252 is the limit of sense >> data. So >> increase the value. >> >> Signed-off-by: Fam Zheng >> --- >> include/linux/virtio_scsi.h | 2 +- >> 1 file changed, 1 insertio

Re: [RFC] ARM VM System Sepcification

2014-03-06 Thread Laszlo Ersek
On 03/06/14 10:46, Paolo Bonzini wrote: > Il 06/03/2014 09:52, Robie Basak ha scritto: >> On Sat, Mar 01, 2014 at 03:27:56PM +, Grant Likely wrote: >>> I would also reference section 3.3 (Boot Option Variables Default Boot >>> Behavior) and 3.4.1.1 (Removable Media Boot Behavior) here. It's fin

Re: [PATCH] virtio-scsi: Change sense buffer size to 252

2014-03-06 Thread Paolo Bonzini
Il 06/03/2014 12:22, Hannes Reinecke ha scritto: On 03/06/2014 11:09 AM, Paolo Bonzini wrote: Il 06/03/2014 09:47, Fam Zheng ha scritto: According to SPC-4, section 4.5.2.1, 252 is the limit of sense data. So increase the value. Signed-off-by: Fam Zheng --- include/linux/virtio_scsi.h | 2 +-

Re: [RFC] ARM VM System Sepcification

2014-03-06 Thread Robie Basak
On Thu, Mar 06, 2014 at 12:44:57PM +0100, Laszlo Ersek wrote: > If I understand correctly, the question is this: > > Given a hypervisor that doesn't support non-volatile UEFI variables > (including BootOrder and Boot), is it possible to automatically > boot a carefully prepared VM image,

Re: [RFC] ARM VM System Sepcification

2014-03-06 Thread Paolo Bonzini
Il 06/03/2014 13:04, Robie Basak ha scritto: So, for example, the guest OS might, on bootloader or kernel upgrade, completely replace the boot mechanism, dropping the removable path and replacing it with a fixed disk arrangement, setting boot variables appropriately, and assume that it can reboot

Re: [PATCH 1/2] Revert "KVM: PPC: Book3S HV: Add new state for transactional memory"

2014-03-06 Thread Aneesh Kumar K.V
Paul Mackerras writes: > On Thu, Mar 06, 2014 at 04:06:09PM +0530, Aneesh Kumar K.V wrote: >> From: "Aneesh Kumar K.V" >> >> This reverts commit 7b490411c37f7ab7965cbdfe5e3ec28eadb6db5b which cause >> the below crash in the host. >> >> Unable to handle kernel paging request for data at address

Re: [PATCH] openvswitch: Orphan frags before sending to userspace via Netlink to avoid guest stall

2014-03-06 Thread Zoltan Kiss
Do you have any feedback on this? I'm also adding KVM list as they might be interested in this. Zoli On 28/02/14 19:16, Zoltan Kiss wrote: The kernel datapath now switched to zerocopy Netlink messages, but that also means that the pages on frags array are sent straight to userspace. If those p

[PATCH v3 3/9] target-mips: get_physical_address: Add defines for segment bases

2014-03-06 Thread James Hogan
Add preprocessor definitions for 32bit segment bases for use in get_physical_address(). These will also be taken advantage of in the next patch which adds KVM awareness. Signed-off-by: James Hogan Reviewed-by: Aurelien Jarno --- target-mips/helper.c | 18 -- 1 file changed, 12 i

[PATCH v3 7/9] hw/mips: In KVM mode, inject IRQ2 (I/O) interupts via ioctls

2014-03-06 Thread James Hogan
From: Sanjay Lal COP0 emulation is in-kernel for KVM, so inject IRQ2 (I/O) interrupts via ioctls. Signed-off-by: Sanjay Lal Signed-off-by: James Hogan Reviewed-by: Aurelien Jarno Cc: Andreas Färber --- Changes in v3: - Pass MIPSCPU to kvm_mips_set_[ipi_]interrupt (Andreas Färber). Changes

[PATCH v3 1/9] hw/mips/cputimer: Don't start periodic timer in KVM mode

2014-03-06 Thread James Hogan
From: Sanjay Lal Compare/Count timer interrupts are handled in-kernel for KVM, so don't bother starting it in QEMU. Signed-off-by: Sanjay Lal Signed-off-by: James Hogan Reviewed-by: Aurelien Jarno --- Changes in v2: - Expand commit message - Rebase on v1.7.0 - Wrap comment --- hw/mips/cpu

[PATCH v3 5/9] kvm: Allow arch to set sigmask length

2014-03-06 Thread James Hogan
MIPS/Linux is unusual in having 128 signals rather than just 64 like most other architectures. This means its sigmask is 16 bytes instead of 8, so allow arches to override the sigmask->len value passed to the KVM_SET_SIGNAL_MASK ioctl in kvm_set_signal_mask() by calling kvm_set_sigmask_len() from k

[PATCH v3 9/9] target-mips: Enable KVM support in build system

2014-03-06 Thread James Hogan
From: Sanjay Lal Enable KVM support for MIPS in the build system. Signed-off-by: Sanjay Lal Signed-off-by: James Hogan Reviewed-by: Aurelien Jarno --- Changes in v2: - Expand commit message - Remove GIC code - Create asm-mips symlink using generic code and move above default case (Peter

[PATCH v3 4/9] target-mips: get_physical_address: Add KVM awareness

2014-03-06 Thread James Hogan
MIPS KVM trap & emulate mode (which is currently the only supported mode) has to add an extra kseg0/kseg1 at 0x4000 and an extra kseg2/kseg3 at 0x6000. Take this into account in get_physical_address() so that debug memory access works. This is done by translating the address to a standard

[PATCH v3 0/9] KVM Support for MIPS32 Processors

2014-03-06 Thread James Hogan
This patchset implements KVM support for MIPS32 processors, using Trap & Emulation. In KVM mode, CPU virtualization is handled via the kvm kernel module, while system and I/O virtualization leverage the Malta model already present in QEMU. Both Guest kernel and Guest Userspace execute in UM. The

[PATCH v3 2/9] hw/mips: Add API to convert KVM guest KSEG0 <-> GPA

2014-03-06 Thread James Hogan
From: Sanjay Lal Add APIs for converting between KVM guest KSEG0 addresses and guest physical addresses. These will be used for translating addresses when loading a kernel ELF in KVM mode. In KVM trap and emulate mode both the guest kernel and guest userspace execute in useg: Guest User addr

[PATCH v3 8/9] hw/mips: malta: Add KVM support

2014-03-06 Thread James Hogan
In KVM mode the bootrom is loaded and executed from the last 1MB of DRAM. Based on "[PATCH 12/12] KVM/MIPS: General KVM support and support for SMP Guests" by Sanjay Lal . Signed-off-by: James Hogan Reviewed-by: Aurelien Jarno Cc: Peter Maydell Cc: Sanjay Lal --- Changes in v3: - Remove unne

[PATCH v3 6/9] target-mips: kvm: Add main KVM support for MIPS

2014-03-06 Thread James Hogan
From: Sanjay Lal Implement the main KVM arch API for MIPS. Signed-off-by: Sanjay Lal Signed-off-by: James Hogan Cc: Aurelien Jarno Cc: Gleb Natapov Cc: Paolo Bonzini Cc: Andreas Färber Cc: Peter Maydell --- Changes in v3: - s/dprintf/DPRINTF/ (Andreas Färber). - Use "cs" rather than "cp

[PATCH v3 3/3] KVM: nVMX: Do not inject NMI vmexits when L2 has a pending interrupt

2014-03-06 Thread Jan Kiszka
According to SDM 27.2.3, IDT vectoring information will not be valid on vmexits caused by external NMIs. So we have to avoid creating such scenarios by delaying EXIT_REASON_EXCEPTION_NMI injection as long as we have a pending interrupt because that one would be migrated to L1's IDT vectoring info o

[PATCH v3 2/3] KVM: nVMX: Fully emulate preemption timer

2014-03-06 Thread Jan Kiszka
We cannot rely on the hardware-provided preemption timer support because we are holding L2 in HLT outside non-root mode. Furthermore, emulating the preemption will resolve tick rate errata on older Intel CPUs. The emulation is based on hrtimer which is started on L2 entry, stopped on L2 exit and e

[PATCH v3 1/3] KVM: nVMX: Rework interception of IRQs and NMIs

2014-03-06 Thread Jan Kiszka
Move the check for leaving L2 on pending and intercepted IRQs or NMIs from the *_allowed handler into a dedicated callback. Invoke this callback at the relevant points before KVM checks if IRQs/NMIs can be injected. The callback has the task to switch from L2 to L1 if needed and inject the proper v

[PATCH v3 0/3] KVM: x86: Pending nVMX fixes

2014-03-06 Thread Jan Kiszka
As I noticed a rebase conflict of these pending patches and I wanted to remind the fact that their are still pending ;), a quick update round. No functional changes since v2. Jan Jan Kiszka (3): KVM: nVMX: Rework interception of IRQs and NMIs KVM: nVMX: Fully emulate preemption timer KVM: n

Re: [PATCH v3 0/3] KVM: x86: Pending nVMX fixes

2014-03-06 Thread Paolo Bonzini
Il 06/03/2014 18:33, Jan Kiszka ha scritto: As I noticed a rebase conflict of these pending patches and I wanted to remind the fact that their are still pending ;), a quick update round. No functional changes since v2. I wanted to look at these next week indeed. Paolo Jan Jan Kiszka (3):

Re: [fedora-virt] 3.13 - Nested KVM (vmx) totally broken?

2014-03-06 Thread Richard W.M. Jones
On Tue, Mar 04, 2014 at 09:13:40AM +0100, Paolo Bonzini wrote: > Il 04/03/2014 03:40, Ian Pilcher ha scritto: > >Is this a known problem? I just tried using nested vmx for the first > >time since upgrading my system from F19 (3.12.?? at the time) to F20, > >and I cannot start any L2 guests. The L

RE: [libvirt] Looking for project ideas and mentors for Google Summer of Code 2014

2014-03-06 Thread Christian Benvenuti (benve)
> -Original Message- > From: kvm-ow...@vger.kernel.org [mailto:kvm-ow...@vger.kernel.org] > On Behalf Of Stefan Hajnoczi > Sent: Friday, February 14, 2014 7:58 AM > To: Cedric Bosdonnat > Cc: Jan Kiszka; qemu-devel; kvm; libvir-l...@redhat.com; Kevin Wolf; Peter > Maydell; Peter Crosthwaite

Re: Enhancement for PLE handler in KVM

2014-03-06 Thread Marcelo Tosatti
On Wed, Mar 05, 2014 at 09:16:45PM +, Li, Bin (Bin) wrote: > Did you also find out here why this is the case? > > Binl: > Yes. The application running in our customized embedded OS is also real time > application which is timing sensitive. > The timing sensitive level varies among the applic

Re: [PATCH] openvswitch: Orphan frags before sending to userspace via Netlink to avoid guest stall

2014-03-06 Thread Pravin Shelar
On Thu, Mar 6, 2014 at 9:09 AM, Zoltan Kiss wrote: > Do you have any feedback on this? I'm also adding KVM list as they might be > interested in this. > > Zoli > > > On 28/02/14 19:16, Zoltan Kiss wrote: >> >> The kernel datapath now switched to zerocopy Netlink messages, but that >> also >> means

[PATCH net V2] vhost: net: switch to use data copy if pending DMAs exceed the limit

2014-03-06 Thread Jason Wang
We used to stop the handling of tx when the number of pending DMAs exceeds VHOST_MAX_PEND. This is used to reduce the memory occupation of both host and guest. But it was too aggressive in some cases, since any delay or blocking of a single packet may delay or block the guest transmission. Consider

Re: [PATCH] virtio-scsi: Change sense buffer size to 252

2014-03-06 Thread Fam Zheng
On Thu, 03/06 11:09, Paolo Bonzini wrote: > Il 06/03/2014 09:47, Fam Zheng ha scritto: > >According to SPC-4, section 4.5.2.1, 252 is the limit of sense data. So > >increase the value. > > > >Signed-off-by: Fam Zheng > >--- > > include/linux/virtio_scsi.h | 2 +- > > 1 file changed, 1 insertion(+),

Re: [PATCH] virtio-scsi: Change sense buffer size to 252

2014-03-06 Thread Fam Zheng
On Thu, 03/06 12:55, Paolo Bonzini wrote: > Il 06/03/2014 12:22, Hannes Reinecke ha scritto: > >On 03/06/2014 11:09 AM, Paolo Bonzini wrote: > >>Il 06/03/2014 09:47, Fam Zheng ha scritto: > >>>According to SPC-4, section 4.5.2.1, 252 is the limit of sense > >>>data. So > >>>increase the value. > >>