Re: GET_RNG_SEED hypercall ABI? (Re: [PATCH v5 0/5] random,x86,kvm: Rework arch RNG seeds and get some from kvm)

2014-08-27 Thread Paolo Bonzini
Il 27/08/2014 01:58, Andy Lutomirski ha scritto: > hpa pointed out that the ABI that I chose (an MSR from the KVM range > and a KVM cpuid bit) is unnecessarily KVM-specific. It would be nice > to allocate an MSR that everyone involved can agree on and, rather > than relying on a cpuid bit, just ha

Re: GET_RNG_SEED hypercall ABI? (Re: [PATCH v5 0/5] random,x86,kvm: Rework arch RNG seeds and get some from kvm)

2014-08-27 Thread H. Peter Anvin
On 08/27/2014 12:00 AM, Paolo Bonzini wrote: > Il 27/08/2014 01:58, Andy Lutomirski ha scritto: >> hpa pointed out that the ABI that I chose (an MSR from the KVM range >> and a KVM cpuid bit) is unnecessarily KVM-specific. It would be nice >> to allocate an MSR that everyone involved can agree on

Re: [GIT PULL 2/2] KVM: s390/mm: try a cow on read only pages for key ops

2014-08-27 Thread Christian Borntraeger
On 27/08/14 05:06, Ben Hutchings wrote: > On Mon, 2014-08-25 at 15:10 +0200, Christian Borntraeger wrote: >> The PFMF instruction handler blindly wrote the storage key even if >> the page was mapped R/O in the host. Lets try a COW before continuing >> and bail out in case of errors. >> >> Signed-o

Re: [Qemu-devel] [question] e1000 interrupt storm happened becauseofits correspondingioapic->irr bit always set

2014-08-27 Thread Zhang Haoyu
>> Hi, all >> >> I use a qemu-1.4.1/qemu-2.0.0 to run win7 guest, and encounter e1000 NIC >> interrupt storm, >> because "if (!ent->fields.mask && (ioapic->irr & (1 << i)))" is always >> true in __kvm_ioapic_update_eoi(). >> >> Any ideas? > We meet this severa

Re: [PATCH v2] KVM: x86: sync old tmr with ioapic to update

2014-08-27 Thread Chen, Tiejun
On 2014/8/27 22:05, Wei Wang wrote: kvm_ioapic_scan_entry() needs to update tmr. The previous lapic tmr value (old_tmr) needs to sync with ioapic to get an accurate updated tmr value before the updating work. Tested-by: Rongrong Liu Signed-off-by: Yang Zhang Signed-off-by: Wei Wang --- arch

Re: [GIT PULL 2/2] KVM: s390/mm: try a cow on read only pages for key ops

2014-08-27 Thread Paolo Bonzini
Il 27/08/2014 09:13, Christian Borntraeger ha scritto: > On 27/08/14 05:06, Ben Hutchings wrote: >> On Mon, 2014-08-25 at 15:10 +0200, Christian Borntraeger wrote: >>> The PFMF instruction handler blindly wrote the storage key even if >>> the page was mapped R/O in the host. Lets try a COW before

[PATCH v4 1/6] kvm: Use APIC_DEFAULT_PHYS_BASE macro as the apic access page address.

2014-08-27 Thread Tang Chen
We have APIC_DEFAULT_PHYS_BASE defined as 0xfee0, which is also the address of apic access page. So use this macro. Signed-off-by: Tang Chen --- arch/x86/kvm/svm.c | 3 ++- arch/x86/kvm/vmx.c | 6 +++--- 2 files changed, 5 insertions(+), 4 deletions(-) diff --git a/arch/x86/kvm/svm.c b/arc

[PATCH] KVM: s390/mm: fix up indentation of set_guest_storage_key

2014-08-27 Thread Christian Borntraeger
commit ab3f285f227f ("KVM: s390/mm: try a cow on read only pages for key ops")' misaligned a code block. Let's fixup the indentation. Reported-by: Ben Hutchings Signed-off-by: Christian Borntraeger --- arch/s390/mm/pgtable.c | 12 ++-- 1 file changed, 6 insertions(+), 6 deletions(-) di

[PATCH v4 4/6] kvm, mem-hotplug: Reload L1' apic access page on migration in vcpu_enter_guest().

2014-08-27 Thread Tang Chen
apic access page is pinned in memory. As a result, it cannot be migrated/hot-removed. Actually, it is not necessary to be pinned. The hpa of apic access page is stored in VMCS APIC_ACCESS_ADDR pointer. When the page is migrated, kvm_mmu_notifier_invalidate_page() will invalidate the corresponding

[PATCH v4 6/6] kvm, mem-hotplug: Do not pin apic access page in memory.

2014-08-27 Thread Tang Chen
gfn_to_page() will finally call hva_to_pfn() to get the pfn, and pin the page in memory by calling GUP functions. This function unpins the page. After this patch, acpi access page is able to be migrated. Signed-off-by: Tang Chen --- arch/x86/kvm/vmx.c | 2 +- arch/x86/kvm/x86.c |

[PATCH v4 0/6] kvm, mem-hotplug: Do not pin ept identity pagetable and apic access page.

2014-08-27 Thread Tang Chen
ept identity pagetable and apic access page in kvm are pinned in memory. As a result, they cannot be migrated/hot-removed. But actually they don't need to be pinned in memory. [For ept identity page] Just do not pin it. When it is migrated, guest will be able to find the new page in the next ept

[PATCH v4 2/6] kvm: Remove ept_identity_pagetable from struct kvm_arch.

2014-08-27 Thread Tang Chen
kvm_arch->ept_identity_pagetable holds the ept identity pagetable page. But it is never used to refer to the page at all. In vcpu initialization, it indicates two things: 1. indicates if ept page is allocated 2. indicates if a memory slot for identity page is initialized Actually, kvm_arch->ept_i

[PATCH v4 5/6] kvm, mem-hotplug: Reload L1's apic access page on migration when L2 is running.

2014-08-27 Thread Tang Chen
This patch only handle "L1 and L2 vm share one apic access page" situation. When L1 vm is running, if the shared apic access page is migrated, mmu_notifier will request all vcpus to exit to L0, and reload apic access page physical address for all the vcpus' vmcs (which is done by patch 5/6). And

[PATCH v4 3/6] kvm: Make init_rmode_identity_map() return 0 on success.

2014-08-27 Thread Tang Chen
In init_rmode_identity_map(), there two variables indicating the return value, r and ret, and it return 0 on error, 1 on success. The function is only called by vmx_create_vcpu(), and r is redundant. This patch removes the redundant variable r, and make init_rmode_identity_map() return 0 on succes

Re: [PATCH 2/2] KVM: PPC: Book3S HV: Add register name when loading toc

2014-08-27 Thread Alexander Graf
On 19.08.14 06:59, Michael Neuling wrote: > Add 'r' to register name r2 in kvmppc_hv_enter. > > Also update comment at the top of kvmppc_hv_enter to indicate that R2/TOC is > non-volatile. > > Signed-off-by: Michael Neuling > Signed-off-by: Paul Mackerras Thanks, applied to kvm-ppc-queue.

Re: [PATCH v4] KVM: PPC: BOOKE: Emulate debug registers and exception

2014-08-27 Thread Alexander Graf
On 13.08.14 11:09, Bharat Bhushan wrote: > This patch emulates debug registers and debug exception > to support guest using debug resource. This enables running > gdb/kgdb etc in guest. > > On BOOKE architecture we cannot share debug resources between QEMU and > guest because: > When QEMU is

Re: [PATCH v4 0/6] KVM: PPC: Book3e: AltiVec support

2014-08-27 Thread Alexander Graf
On 20.08.14 15:36, Mihai Caraman wrote: > Add KVM Book3e AltiVec support. > > Changes: > > v4: > - use CONFIG_SPE_POSSIBLE and a new ifdef for CONFIG_ALTIVEC > - remove SPE handlers from bookehv > - split ONE_REG powerpc generic and ONE_REG AltiVec > - add setters for IVPR, IVOR2 and IVOR8

Re: [PATCH v4 5/6] KVM: PPC: Booke: Add setter functions for IVPR, IVOR2 and IVOR8 emulation

2014-08-27 Thread Alexander Graf
On 20.08.14 15:36, Mihai Caraman wrote: > Add setter functions for IVPR, IVOR2 and IVOR8 emulation in preparation > for ONE_REG support. > > Signed-off-by: Mihai Caraman What about the other GIVORs? Also, I would prefer to have a common helper for IVOR setting that simply covers SPRN_GIVOR se

RE: pert stat in KVM guest can not get LLC-loads hardware cache event

2014-08-27 Thread Liang, Kan
> > Dear KVM developers: > I am trying use perf stat inside a VM to obtain some hardware cache > performance counter values. > The perf stat can report some numbers for L1 and TLB related counters. But > for the LLC-loads and LLC-load-misses, the numbers are always 0. It seems > that the these o

Re: [PATCH 1/2] add check parameter to run_tests configuration

2014-08-27 Thread Paolo Bonzini
Il 26/08/2014 20:29, Chris J Arges ha scritto: > +path=${check_param%%=*} > +value=${check_param#*=} > +if [ $path ] && [[ $(cat $path) != $value ]]; then [[ ]] is a bashism, please use [ ]. Also, please include all operands of [ ] within double quotes. Paolo > +

Re: [PATCH 2/2] x86/unittests.cfg: the pmu testcase requires that nmi_watchdog is disabled

2014-08-27 Thread Paolo Bonzini
Il 26/08/2014 20:29, Chris J Arges ha scritto: > If nmi_watchdog is enabled, it will take up a PMU counter causing the > all_counters testcase to fail. This additional check will error out if > nmi_watchdog is enabled and provide feedback for the user to configure the > host machine correctly. > >

Re: [PATCH v2 0/6] target-i386: Make most CPU models work with "enforce" out of the box

2014-08-27 Thread Paolo Bonzini
Il 26/08/2014 20:01, Eduardo Habkost ha scritto: > On Tue, Aug 26, 2014 at 02:56:21PM +0200, Paolo Bonzini wrote: >> Il 25/08/2014 22:45, Eduardo Habkost ha scritto: >>> >>> TCG users expect the default CPU model to contain most TCG-supported >>> features >>> (and it makes sense). See, for example

Re: [PATCH v2 0/6] target-i386: Make most CPU models work with "enforce" out of the box

2014-08-27 Thread Eduardo Habkost
On Wed, Aug 27, 2014 at 03:36:51PM +0200, Paolo Bonzini wrote: > Il 26/08/2014 20:01, Eduardo Habkost ha scritto: > > On Tue, Aug 26, 2014 at 02:56:21PM +0200, Paolo Bonzini wrote: > >> Il 25/08/2014 22:45, Eduardo Habkost ha scritto: > >>> > >>> TCG users expect the default CPU model to contain mo

Re: [PATCH v2] KVM: x86: sync old tmr with ioapic to update

2014-08-27 Thread Paolo Bonzini
Il 27/08/2014 16:05, Wei Wang ha scritto: > kvm_ioapic_scan_entry() needs to update tmr. The previous lapic tmr value > (old_tmr) needs to sync with ioapic to get an accurate updated tmr > value before the updating work. > > Tested-by: Rongrong Liu > Signed-off-by: Yang Zhang > Signed-off-by: We

Re: [PATCH v2] KVM: x86: keep eoi exit bitmap accurate before loading it.

2014-08-27 Thread Paolo Bonzini
Il 27/08/2014 16:05, Wei Wang ha scritto: > Guest may mask the IOAPIC entry before issue EOI. In such case, > EOI will not be intercepted by the hypervisor, since the corresponding > bit in eoi_exit_bitmap is not set after the masking of IOAPIC entry. > > The solution here is to OR eoi_exit_bitmap

Re: [PATCH v2 0/6] target-i386: Make most CPU models work with "enforce" out of the box

2014-08-27 Thread Paolo Bonzini
Il 27/08/2014 16:05, Eduardo Habkost ha scritto: > On Wed, Aug 27, 2014 at 03:36:51PM +0200, Paolo Bonzini wrote: >> Il 26/08/2014 20:01, Eduardo Habkost ha scritto: >>> So maybe that's good news, as things can be simpler if we make both TCG >>> and KVM have similar behavior: >>> >>> * qemu64: a co

Re: [PATCH] KVM: s390/mm: fix up indentation of set_guest_storage_key

2014-08-27 Thread Paolo Bonzini
Il 27/08/2014 12:20, Christian Borntraeger ha scritto: > commit ab3f285f227f ("KVM: s390/mm: try a cow on read only pages for > key ops")' misaligned a code block. Let's fixup the indentation. > > Reported-by: Ben Hutchings > Signed-off-by: Christian Borntraeger > --- > arch/s390/mm/pgtable.c |

[PATCH 1/2 v2] add check parameter to run_tests configuration

2014-08-27 Thread Chris J Arges
In unittests.cfg one can add a line like the following: check = /proc/sys/kernel/nmi_watchdog=0 /proc/sys/kernel/ostype=Linux run_tests.sh will now check for those values (if defined) and only run the test if all conditions are true. Signed-off-by: Chris J Arges --- run_tests.sh | 21 ++

Re: pert stat in KVM guest can not get LLC-loads hardware cache event

2014-08-27 Thread Steven
Hi, Kan, Thanks for your reply. 1. If the guest is non-paravirt, can I get the LLC-loads number? 2. Do you know any method that can capture the LLC-loads for the guest? Thanks. - Hui On Wed, Aug 27, 2014 at 9:05 AM, Liang, Kan wrote: > > > > > > > Dear KVM developers: > > I am trying use perf

[PATCH 1/2 v3] add check parameter to run_tests configuration

2014-08-27 Thread Chris J Arges
In unittests.cfg one can add a line like the following: check = /proc/sys/kernel/nmi_watchdog=0 /proc/sys/kernel/ostype=Linux run_tests.sh will now check for those values (if defined) and only run the test if all conditions are true. Signed-off-by: Chris J Arges --- run_tests.sh | 21 ++

Re: [PATCH 1/2 v3] add check parameter to run_tests configuration

2014-08-27 Thread Paolo Bonzini
Il 27/08/2014 16:45, Chris J Arges ha scritto: > In unittests.cfg one can add a line like the following: > check = /proc/sys/kernel/nmi_watchdog=0 /proc/sys/kernel/ostype=Linux > > run_tests.sh will now check for those values (if defined) and only run > the test if all conditions are true. > > Si

Re: pert stat in KVM guest can not get LLC-loads hardware cache event

2014-08-27 Thread Steven
Hi, Kan, The dTLB-load-misses is 0, but it shows 80.00%hit, does that mean the TLB-load miss is 0.8 * (dTLB-loads). Thanks. Performance counter stats for './parsecmgmt -a run -i native -c gcc-hooks -n 1 -p freqmine': 0 dTLB-load-misses #0.00% of all dTLB cache hit

Re: [RFC 0/9] KVM-VFIO IRQ forward control

2014-08-27 Thread Eric Auger
On 08/26/2014 07:49 PM, Alex Williamson wrote: > On Mon, 2014-08-25 at 15:27 +0200, Eric Auger wrote: >> This RFC proposes an integration of "ARM: Forwarding physical >> interrupts to a guest VM" (http://lwn.net/Articles/603514/) in >> KVM. >> >> It enables to transform a VFIO platform driver IRQ i

Re: [RFC 9/9] KVM: KVM_VFIO: ARM: implement irq forwarding control

2014-08-27 Thread Eric Auger
On 08/26/2014 09:02 PM, Alex Williamson wrote: > On Mon, 2014-08-25 at 15:27 +0200, Eric Auger wrote: >> Implements ARM specific KVM-VFIO device group commands: >> - KVM_DEV_VFIO_DEVICE_ASSIGN_IRQ >> - KVM_DEV_VFIO_DEVICE_DEASSIGN_IRQ >> capability can be queried using KVM_HAS_DEVICE_ATTR. >> >> Th

Re: [RFC 4/9] KVM: KVM-VFIO: update user API to program forwarded IRQ

2014-08-27 Thread Eric Auger
On 08/26/2014 09:01 PM, Alex Williamson wrote: > On Mon, 2014-08-25 at 15:27 +0200, Eric Auger wrote: >> add new device group commands: >> - KVM_DEV_VFIO_DEVICE_ASSIGN_IRQ and >> KVM_DEV_VFIO_DEVICE_DEASSIGN_IRQ >> >> which enable to turn forwarded IRQ mode on/off. >> >> Signed-off-by: Eric Auger

Re: [RFC 8/9] KVM: KVM-VFIO: add kvm_vfio_arch_data and accessors

2014-08-27 Thread Eric Auger
On 08/26/2014 09:02 PM, Alex Williamson wrote: > On Mon, 2014-08-25 at 15:27 +0200, Eric Auger wrote: >> add a pointer to architecture specific data in kvm_vfio struct >> add accessors to keep kvm_vfio private >> >> Signed-off-by: Eric Auger >> --- >> arch/arm/include/asm/kvm_host.h | 8

Re: [RFC 8/9] KVM: KVM-VFIO: add kvm_vfio_arch_data and accessors

2014-08-27 Thread Alex Williamson
On Wed, 2014-08-27 at 17:22 +0200, Eric Auger wrote: > On 08/26/2014 09:02 PM, Alex Williamson wrote: > > On Mon, 2014-08-25 at 15:27 +0200, Eric Auger wrote: > >> add a pointer to architecture specific data in kvm_vfio struct > >> add accessors to keep kvm_vfio private > >> > >> Signed-off-by: Eri

Re: [PATCH v2 0/6] target-i386: Make most CPU models work with "enforce" out of the box

2014-08-27 Thread Eduardo Habkost
On Wed, Aug 27, 2014 at 04:33:54PM +0200, Paolo Bonzini wrote: > Il 27/08/2014 16:05, Eduardo Habkost ha scritto: > > On Wed, Aug 27, 2014 at 03:36:51PM +0200, Paolo Bonzini wrote: > >> Il 26/08/2014 20:01, Eduardo Habkost ha scritto: > >>> So maybe that's good news, as things can be simpler if we

Re: [RFC 5/9] VFIO: Extend external user API

2014-08-27 Thread Eric Auger
On 08/26/2014 09:02 PM, Alex Williamson wrote: > On Mon, 2014-08-25 at 15:27 +0200, Eric Auger wrote: >> New functions are added to be called from ARM KVM-VFIO device. >> >> - vfio_device_get_external_user enables to get a vfio device from >> its fd >> - vfio_device_put_external_user puts the vfi

Re: [RFC 8/9] KVM: KVM-VFIO: add kvm_vfio_arch_data and accessors

2014-08-27 Thread Eric Auger
On 08/27/2014 05:37 PM, Alex Williamson wrote: > On Wed, 2014-08-27 at 17:22 +0200, Eric Auger wrote: >> On 08/26/2014 09:02 PM, Alex Williamson wrote: >>> On Mon, 2014-08-25 at 15:27 +0200, Eric Auger wrote: add a pointer to architecture specific data in kvm_vfio struct add accessors to

Re: [PATCH v2 0/6] target-i386: Make most CPU models work with "enforce" out of the box

2014-08-27 Thread Andreas Färber
Am 27.08.2014 17:42, schrieb Eduardo Habkost: > On Wed, Aug 27, 2014 at 04:33:54PM +0200, Paolo Bonzini wrote: >> Il 27/08/2014 16:05, Eduardo Habkost ha scritto: >>> On Wed, Aug 27, 2014 at 03:36:51PM +0200, Paolo Bonzini wrote: Il 26/08/2014 20:01, Eduardo Habkost ha scritto: > So maybe

Re: [PATCH v2 0/6] target-i386: Make most CPU models work with "enforce" out of the box

2014-08-27 Thread Andreas Färber
Am 27.08.2014 18:08, schrieb Eduardo Habkost: > On Wed, Aug 27, 2014 at 05:58:49PM +0200, Andreas Färber wrote: >> Am 27.08.2014 17:42, schrieb Eduardo Habkost: >>> On Wed, Aug 27, 2014 at 04:33:54PM +0200, Paolo Bonzini wrote: Il 27/08/2014 16:05, Eduardo Habkost ha scritto: > On Wed, Aug

Re: [PATCH v2 0/6] target-i386: Make most CPU models work with "enforce" out of the box

2014-08-27 Thread Eduardo Habkost
On Wed, Aug 27, 2014 at 05:58:49PM +0200, Andreas Färber wrote: > Am 27.08.2014 17:42, schrieb Eduardo Habkost: > > On Wed, Aug 27, 2014 at 04:33:54PM +0200, Paolo Bonzini wrote: > >> Il 27/08/2014 16:05, Eduardo Habkost ha scritto: > >>> On Wed, Aug 27, 2014 at 03:36:51PM +0200, Paolo Bonzini wrot

Re: [PATCH v2 0/6] target-i386: Make most CPU models work with "enforce" out of the box

2014-08-27 Thread Paolo Bonzini
Il 27/08/2014 18:08, Eduardo Habkost ha scritto: > > Might that be an opportunity to reconsider a -cpu best or so, > > independent of its implementation, to avoid "host"? Nowadays we have CPU models added way before silicon is available, and "-cpu host" in practice should be migratable (the big ex

RE: pert stat in KVM guest can not get LLC-loads hardware cache event

2014-08-27 Thread Liang, Kan
> > 1. If the guest is non-paravirt, can I get the LLC-loads number? No, the guest will crash. > 2. Do you know any method that can capture the LLC-loads for the guest? I don't know. > Thanks. >

RE: pert stat in KVM guest can not get LLC-loads hardware cache event

2014-08-27 Thread Liang, Kan
> > Hi, Kan, > > > > The dTLB-load-misses is 0, but it shows 80.00%hit, does that mean the > > TLB- load miss is 0.8 * (dTLB-loads). Thanks. > > > > Performance counter stats for './parsecmgmt -a run -i native -c > > gcc-hooks -n > > 1 -p freqmine': I'm not familiar with parsecmgmt. What’s

Re: [PATCH v2 0/6] target-i386: Make most CPU models work with "enforce" out of the box

2014-08-27 Thread Eduardo Habkost
On Wed, Aug 27, 2014 at 06:18:13PM +0200, Paolo Bonzini wrote: > Il 27/08/2014 18:08, Eduardo Habkost ha scritto: > > > Might that be an opportunity to reconsider a -cpu best or so, > > > independent of its implementation, to avoid "host"? > > Nowadays we have CPU models added way before silicon i

Re: pert stat in KVM guest can not get LLC-loads hardware cache event

2014-08-27 Thread Steven
Inside the guest, I am using "perf stat -e dTLB-load-misses -e dTLB-loads -e L1-dcache-loads -e L1-dcache-load-misses -e L1-dcache-prefetch-misses ", followed by the parsec command. Thanks. - Hui On Wed, Aug 27, 2014 at 12:28 PM, Liang, Kan wrote: > >> > Hi, Kan, >> > >> > The dTLB-load-misses

RE: pert stat in KVM guest can not get LLC-loads hardware cache event

2014-08-27 Thread Liang, Kan
> > Inside the guest, I am using "perf stat -e dTLB-load-misses -e > > dTLB-loads -e L1-dcache-loads -e L1-dcache-load-misses -e > > L1-dcache-prefetch-misses ", followed by the parsec command. > > The misses/hit radio is the first number after "#". For your case, 0.00% is the misses/hit radi

kvm-unit-test failures (was: [PATCH 1/2 v3] add check parameter to run_tests configuration)

2014-08-27 Thread Chris J Arges
> Thanks, looks good. Are there more failures? > > Paolo > Paolo, Thanks for applying those patches! I now only see the two failures on my machine: model name : Intel(R) Xeon(R) CPU E5-2697 v3 @ 2.60GHz I'm running with the tip of kvm master: 0ac625df43ce9d085d4ff54c1f739611f4308b13 (Me

Re: kvm-unit-test failures (was: [PATCH 1/2 v3] add check parameter to run_tests configuration)

2014-08-27 Thread Paolo Bonzini
- Messaggio originale - > Da: "Chris J Arges" > A: "Paolo Bonzini" , kvm@vger.kernel.org > Inviato: Mercoledì, 27 agosto 2014 23:24:14 > Oggetto: kvm-unit-test failures (was: [PATCH 1/2 v3] add check parameter to > run_tests configuration) > > > > Thanks, looks good. Are there more f

[Bug 83381] New: 4-ports 82576 detect 2 ports when add "intel_iommu=on pci=assign-busses".

2014-08-27 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=83381 Bug ID: 83381 Summary: 4-ports 82576 detect 2 ports when add "intel_iommu=on pci=assign-busses". Product: Virtualization Version: unspecified Kernel Version: 3.17.0-rc1

[Bug 83381] 4-ports 82576 detect 2 ports when add "intel_iommu=on pci=assign-busses".

2014-08-27 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=83381 --- Comment #2 from Zhou, Chao --- Created attachment 148571 --> https://bugzilla.kernel.org/attachment.cgi?id=148571&action=edit lspci good -- You are receiving this mail because: You are watching the assignee of the bug. -- To unsubscribe fr

[Bug 83381] 4-ports 82576 detect 2 ports when add "intel_iommu=on pci=assign-busses".

2014-08-27 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=83381 --- Comment #1 from Zhou, Chao --- Created attachment 148561 --> https://bugzilla.kernel.org/attachment.cgi?id=148561&action=edit dmesg-good -- You are receiving this mail because: You are watching the assignee of the bug. -- To unsubscribe fr

[Bug 83381] 4-ports 82576 detect 2 ports when add "intel_iommu=on pci=assign-busses".

2014-08-27 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=83381 --- Comment #4 from Zhou, Chao --- Created attachment 148591 --> https://bugzilla.kernel.org/attachment.cgi?id=148591&action=edit dmesg-bad -- You are receiving this mail because: You are watching the assignee of the bug. -- To unsubscribe fro

[Bug 83381] 4-ports 82576 detect 2 ports when add "intel_iommu=on pci=assign-busses".

2014-08-27 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=83381 --- Comment #3 from Zhou, Chao --- Created attachment 148581 --> https://bugzilla.kernel.org/attachment.cgi?id=148581&action=edit lspci-t-good -- You are receiving this mail because: You are watching the assignee of the bug. -- To unsubscribe

[Bug 83381] 4-ports 82576 detect 2 ports when add "intel_iommu=on pci=assign-busses".

2014-08-27 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=83381 --- Comment #5 from Zhou, Chao --- Created attachment 148601 --> https://bugzilla.kernel.org/attachment.cgi?id=148601&action=edit lspci-bad -- You are receiving this mail because: You are watching the assignee of the bug. -- To unsubscribe fro

[Bug 83381] 4-ports 82576 detect 2 ports when add "intel_iommu=on pci=assign-busses".

2014-08-27 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=83381 --- Comment #6 from Zhou, Chao --- Created attachment 148611 --> https://bugzilla.kernel.org/attachment.cgi?id=148611&action=edit lspci-t-bad -- You are receiving this mail because: You are watching the assignee of the bug. -- To unsubscribe f

Re: [PATCH v4] KVM: PPC: BOOKE: Emulate debug registers and exception

2014-08-27 Thread Scott Wood
On Wed, 2014-08-27 at 13:23 +0200, Alexander Graf wrote: > > On 13.08.14 11:09, Bharat Bhushan wrote: > > This patch emulates debug registers and debug exception > > to support guest using debug resource. This enables running > > gdb/kgdb etc in guest. > > > > On BOOKE architecture we cannot shar

RE: [PATCH v2] KVM: x86: keep eoi exit bitmap accurate before loading it.

2014-08-27 Thread Zhang, Yang Z
Paolo Bonzini wrote on 2014-08-27: > Il 27/08/2014 16:05, Wei Wang ha scritto: > > Guest may mask the IOAPIC entry before issue EOI. In such case, EOI > > will not be intercepted by the hypervisor, since the corresponding bit > > in eoi_exit_bitmap is not set after the masking of IOAPIC entry. > >