[PATCH 3/3] KVM: nVMX: check for null vmcs12 when L1 does invept

2014-03-19 Thread Bandan Das
Some L1 hypervisors such as Xen seem to be calling invept after vmclear or before vmptrld on L2. In this case, proceed with falling through and syncing roots as a case where context wide invalidation can't be supported Signed-off-by: Bandan Das --- arch/x86/kvm/vmx.c | 5 +++-- 1 file changed, 3

[PATCH 1/3] KVM: nVMX: Advertise support for interrupt acknowledgement

2014-03-19 Thread Bandan Das
Some Type 1 hypervisors such as XEN won't enable VMX without it present Signed-off-by: Bandan Das --- arch/x86/kvm/vmx.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index 3927528..26c1d38 100644 --- a/arch/x86/kvm/vmx.c +++ b/arch

[PATCH 2/3] KVM: nVMX: Ack and write vector info to intr_info if L1 asks us to

2014-03-19 Thread Bandan Das
Signed-off-by: Bandan Das --- arch/x86/kvm/irq.c | 1 + arch/x86/kvm/vmx.c | 17 + 2 files changed, 18 insertions(+) diff --git a/arch/x86/kvm/irq.c b/arch/x86/kvm/irq.c index 484bc87..bd0da43 100644 --- a/arch/x86/kvm/irq.c +++ b/arch/x86/kvm/irq.c @@ -113,6 +113,7 @@ int kvm_c

[PATCH 0/3] nVMX: Fixes to run Xen as L1

2014-03-19 Thread Bandan Das
Minor changes to enable Xen as a L1 hypervisor. Tested with a Haswell host, Xen-4.3 L1 and debian6 L2 Bandan Das (3): KVM: nVMX: Advertise support for interrupt acknowledgement KVM: nVMX: Ack and write vector info to intr_info if L1 asks us to KVM: nVMX: check for null vmcs12 when L1 does i

Isolating the Guest clock from Host

2014-03-19 Thread bancfc
Hi, let me introduce what I do in order to give context to my questions. I am currently working on porting the Whonix project to KVM (Whonix.org). We use virtualization for its isolation properties to guarantee that all traffic from the workstation vm is forced through TOR that runs in the seco

Re: [PATCH 1/3] bridge: preserve random init MAC address

2014-03-19 Thread Luis R. Rodriguez
On Tue, Mar 18, 2014 at 08:10:56PM -0700, Stephen Hemminger wrote: > On Wed, 12 Mar 2014 20:15:25 -0700 > "Luis R. Rodriguez" wrote: > > > As it is now if you add create a bridge it gets started > > with a random MAC address and if you then add a net_device > > as a slave but later kick it out yo

Re: [PATCH] core, nfqueue, openvswitch: Orphan frags in skb_zerocopy and handle errors

2014-03-19 Thread Zoltan Kiss
On 19/03/14 20:47, Thomas Graf wrote: On 03/19/2014 09:38 PM, Zoltan Kiss wrote: skb_zerocopy can copy elements of the frags array between skbs, but it doesn't orphan them. Also, it doesn't handle errors, so this patch takes care of that as well. Signed-off-by: Zoltan Kiss --- +if (unli

[PATCH v2] core, nfqueue, openvswitch: Orphan frags in skb_zerocopy and handle errors

2014-03-19 Thread Zoltan Kiss
skb_zerocopy can copy elements of the frags array between skbs, but it doesn't orphan them. Also, it doesn't handle errors, so this patch takes care of that as well. Signed-off-by: Zoltan Kiss --- v2: orphan the frags right before touching the frags diff --git a/include/linux/skbuff.h b/include/

Re: [PATCH] core, nfqueue, openvswitch: Orphan frags in skb_zerocopy and handle errors

2014-03-19 Thread Thomas Graf
On 03/19/2014 09:38 PM, Zoltan Kiss wrote: skb_zerocopy can copy elements of the frags array between skbs, but it doesn't orphan them. Also, it doesn't handle errors, so this patch takes care of that as well. Signed-off-by: Zoltan Kiss --- + if (unlikely(skb_orphan_frags(to, GFP_ATOMIC

Re: [PATCH] core, nfqueue, openvswitch: Orphan frags in skb_zerocopy and handle errors

2014-03-19 Thread Zoltan Kiss
On 19/03/14 20:24, David Miller wrote: From: Zoltan Kiss Date: Tue, 18 Mar 2014 21:17:35 + skb_zerocopy can copy elements of the frags array between skbs, but it doesn't orphan them. Also, it doesn't handle errors, so this patch takes care of that as well. Signed-off-by: Zoltan Kiss ---

[PATCH] core, nfqueue, openvswitch: Orphan frags in skb_zerocopy and handle errors

2014-03-19 Thread Zoltan Kiss
skb_zerocopy can copy elements of the frags array between skbs, but it doesn't orphan them. Also, it doesn't handle errors, so this patch takes care of that as well. Signed-off-by: Zoltan Kiss --- diff --git a/include/linux/skbuff.h b/include/linux/skbuff.h index 03db95a..35c4e85 100644 --- a/inc

Re: [PATCH] core, nfqueue, openvswitch: Orphan frags in skb_zerocopy and handle errors

2014-03-19 Thread David Miller
From: Zoltan Kiss Date: Tue, 18 Mar 2014 21:17:35 + > skb_zerocopy can copy elements of the frags array between skbs, but it doesn't > orphan them. Also, it doesn't handle errors, so this patch takes care of that > as well. > > Signed-off-by: Zoltan Kiss > --- > net/openvswitch/datapath.c

[Bug 72381] New: [Nested] L1 call trace when create windows 7 guest as L2 guest.

2014-03-19 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=72381 Bug ID: 72381 Summary: [Nested] L1 call trace when create windows 7 guest as L2 guest. Product: Virtualization Version: unspecified Kernel Version: 3.14.0-rc3 Hardware:

Re: [PATCH 0/4] MIPS: KVM: RI + RDHWR handling fixes

2014-03-19 Thread Paolo Bonzini
Il 14/03/2014 14:06, James Hogan ha scritto: Some misc KVM RI/RDHWR handling fixes. Patch 1 prevents a reserved instruction (RI) exception from taking out the entire guest (e.g. crashme inevitably causes lots of these). If the hypervisor can't handle the RI, it can just emulate a guest RI except

Re: [PATCH v6 05/11] pvqspinlock, x86: Allow unfair spinlock in a PV guest

2014-03-19 Thread Paolo Bonzini
Il 19/03/2014 17:58, Waiman Long ha scritto: Exactly. What you want is boot_cpu_has(X86_FEATURE_HYPERVISOR). The unfair lock is to be enabled by boot time check, not just by the presence of a configuration macro during the build process in order to avoid using unfair lock on bare metal. Of cou

Re: [PATCH v6 05/11] pvqspinlock, x86: Allow unfair spinlock in a PV guest

2014-03-19 Thread Waiman Long
On 03/19/2014 06:07 AM, Paolo Bonzini wrote: Il 19/03/2014 04:15, Waiman Long ha scritto: You should see the same values with the PV ticketlock. It is not clear to me if this testing did include that variant of locks? Yes, PV is fine. But up to this point of the series, we are concerned about

[PATCH] kvm tools: treat uids and gids in stat structure properly

2014-03-19 Thread Sasha Levin
Upstream commit "9p: Modify the stat structures to use kuid_t and kgid_t" has modified the type of uid and gid in the stat structure, which breaks build for us. This is a rather trivial conversion from u32 to kuid_t and kgid_t. Reported-by: Ingo Molnar Signed-off-by: Sasha Levin --- tools/kvm/

Re: [PATCH v4 04/10] target-mips: get_physical_address: Add KVM awareness

2014-03-19 Thread Paolo Bonzini
Il 14/03/2014 13:47, James Hogan ha scritto: +if (kvm_enabled()) { +/* KVM T&E adds guest kernel segments in useg */ +if (real_address >= KVM_KSEG0_BASE) { +if (real_address < KVM_KSEG2_BASE) { +/* kseg0 */ +address += KSEG0_BASE - K

Re: [PATCH v4 08/10] hw/mips: malta: Add KVM support

2014-03-19 Thread Paolo Bonzini
Il 14/03/2014 13:47, James Hogan ha scritto: int prom_index = 0; +uint64_t (*xlate_to_phys) (void *opaque, uint64_t addr); +uint64_t (*xlate_to_kseg0) (void *opaque, uint64_t addr); + #ifdef TARGET_WORDS_BIGENDIAN big_endian = 1; @@ -781,7 +787,15 @@ static int64_t load_kernel

Re: [PATCH v4 00/10] KVM Support for MIPS32 Processors

2014-03-19 Thread Paolo Bonzini
Il 14/03/2014 13:47, James Hogan ha scritto: This patchset is based on Sanjay Lal's V1 patchset from 2nd March 2013: https://patchwork.kernel.org/project/kvm/list/?submitter=51991&state=*&q=qemu-devel I think I've addressed all the V1 feedback. The other main change is the removal of the boot-CP

Re: [PATCH v4 03/10] target-mips: get_physical_address: Add defines for segment bases

2014-03-19 Thread Paolo Bonzini
Il 14/03/2014 13:47, James Hogan ha scritto: Add preprocessor definitions for 32bit segment bases for use in get_physical_address(). These will also be taken advantage of in the next patch which adds KVM awareness. Signed-off-by: James Hogan Reviewed-by: Aurelien Jarno --- target-mips/helper.

Re: [Bridge] [PATCH 1/3] bridge: preserve random init MAC address

2014-03-19 Thread Toshiaki Makita
On Tue, 2014-03-18 at 18:10 -0700, Luis R. Rodriguez wrote: > On Tue, Mar 18, 2014 at 6:04 PM, Toshiaki Makita > wrote: > > (2014/03/19 9:50), Luis R. Rodriguez wrote: > >> On Tue, Mar 18, 2014 at 5:42 PM, Toshiaki Makita > >> wrote: > >>> nit, > >>> If the last detached port happens to have the

About Disk I/O and DMA emulation in qemu-kvm

2014-03-19 Thread Le Tan
Hi, I am now diving into the disk I/O in kvm. But I find that things are a little messy about this and I am stuck here. I configure the virtual machine with a virtual IDE disk and DMA support. I need to get every disk I/O issued by the virtual machine. I know that there are struct IDEDevie, struct

Re: [PATCH v2 2/5] kvm: add kvm_enable_cap_{vm,vcpu}

2014-03-19 Thread Paolo Bonzini
Il 17/03/2014 19:11, Cornelia Huck ha scritto: Provide helper functions for enabling capabilities (on a vcpu and on a vm). Reviewed-by: Thomas Huth Signed-off-by: Cornelia Huck --- include/sysemu/kvm.h |4 kvm-all.c| 19 ++- 2 files changed, 22 insertion

Mrs. Caroline Anderson

2014-03-19 Thread Andrea Bell
I am bequeathing 4.5million GBP to you for charity work in your country due to my ill health. Contact me asap for more information. Reply to: mrscarolinegregoryanders...@outlook.com Regards, Mrs. Caroline Anderson ---

Re: [PATCH v6 05/11] pvqspinlock, x86: Allow unfair spinlock in a PV guest

2014-03-19 Thread Paolo Bonzini
Il 19/03/2014 04:15, Waiman Long ha scritto: You should see the same values with the PV ticketlock. It is not clear to me if this testing did include that variant of locks? Yes, PV is fine. But up to this point of the series, we are concerned about spinlock performance when running on an overc