[PATCH v1] ARM/ARM64: support KVM_IOEVENTFD

2014-11-18 Thread Ming Lei
>From Documentation/virtual/kvm/api.txt, all ARCHs should support ioeventfd. Also ARM VM has supported PCI bus already, and ARM64 will do too, ioeventfd is required for some popular devices, like virtio-blk and virtio-scsi dataplane in QEMU. Without this patch, virtio-blk-pci dataplane can't work

Re: [PATCH] ARM/ARM64: support KVM_IOEVENTFD

2014-11-18 Thread Ming Lei
On Tue, Nov 18, 2014 at 11:24 PM, Ming Lei wrote: > From Documentation/virtual/kvm/api.txt, all ARCHs should support > ioeventfd. > > Also ARM VM has supported PCI bus already, and ARM64 will do too, > ioeventfd is required for some popular devices, like virtio-blk > and virtio-scsi dataplane in Q

Re: vhost + multiqueue + RSS question.

2014-11-18 Thread Jason Wang
On 11/18/2014 07:05 PM, Michael S. Tsirkin wrote: > On Tue, Nov 18, 2014 at 11:37:03AM +0800, Jason Wang wrote: >> > On 11/17/2014 07:58 PM, Michael S. Tsirkin wrote: >>> > > On Mon, Nov 17, 2014 at 01:22:07PM +0200, Gleb Natapov wrote: > > >> > On Mon, Nov 17, 2014 at 12:38:16PM +0200, Michael

Re: [question] kvm fully support vga adapter pass-through ?

2014-11-18 Thread Alex Williamson
On Wed, 2014-11-19 at 09:56 +0800, Zhang Haoyu wrote: > Hi all, > > Does the combination of qemu-2.0.1 and linux-3.10 fully support > direct-assign vga adapters to vm? No, at best I'd call it experimental -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message

[question] kvm fully support vga adapter pass-through ?

2014-11-18 Thread Zhang Haoyu
Hi all, Does the combination of qemu-2.0.1 and linux-3.10 fully support direct-assign vga adapters to vm? Thanks, Zhang Haoyu -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/ma

[v2][PATCH] kvm: x86: vmx: remove MMIO_MAX_GEN

2014-11-18 Thread Tiejun Chen
Actually MMIO_MAX_GEN is same as MMIO_GEN_MASK. Signed-off-by: Tiejun Chen --- v2: * Instead, we'd like to keep MMIO_GEN_MASK. arch/x86/kvm/mmu.c | 7 +++ 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c index ac1c4de..4ea0dcb 100644 ---

Re: [PATCH] KVM: x86: Fix lost interrupt on irr_pending race

2014-11-18 Thread Radim Krčmář
2014-11-18 20:51+0100, Paolo Bonzini: > On 16/11/2014 22:49, Nadav Amit wrote: > > @@ -374,13 +378,15 @@ static inline void apic_clear_irr(int vec, struct > > kvm_lapic *apic) > > + apic->irr_pending = false; > > + apic_clear_vector(vec, apic->regs + APIC_IRR); > > +

Re: [PATCH] KVM: x86: Fix lost interrupt on irr_pending race

2014-11-18 Thread Paolo Bonzini
On 16/11/2014 22:49, Nadav Amit wrote: > @@ -374,13 +378,15 @@ static inline void apic_clear_irr(int vec, struct > kvm_lapic *apic) > > vcpu = apic->vcpu; > > - apic_clear_vector(vec, apic->regs + APIC_IRR); > - if (unlikely(kvm_apic_vid_enabled(vcpu->kvm))) > + if (unlikel

[PATCH] ARM/ARM64: support KVM_IOEVENTFD

2014-11-18 Thread Ming Lei
>From Documentation/virtual/kvm/api.txt, all ARCHs should support ioeventfd. Also ARM VM has supported PCI bus already, and ARM64 will do too, ioeventfd is required for some popular devices, like virtio-blk and virtio-scsi dataplane in QEMU. Without this patch, virtio-blk-pci dataplane can't work

Re: [PATCH] KVM: x86: Fix lost interrupt on irr_pending race

2014-11-18 Thread Radim Krčmář
2014-11-16 23:49+0200, Nadav Amit: > apic_find_highest_irr assumes irr_pending is set if any vector in APIC_IRR is > set. If this assumption is broken and apicv is disabled, the injection of > interrupts may be deferred until another interrupt is delivered to the guest. > Ultimately, if no other i

Re: can I make this work… (Foundation for accessibility project)

2014-11-18 Thread Eric S. Johansson
On 11/18/2014 8:53 AM, Hans de Goede wrote: kvm's usb pass-through should be able to handle this without any issues (other then some latency), it uses special buffering for isochronous usb packets, which should take care of usb audio working. I've never tested audio recording, but audio playbac

Re: can I make this work… (Foundation for accessibility project)

2014-11-18 Thread Eric S. Johansson
On 11/18/2014 8:50 AM, Paolo Bonzini wrote: I'm adding two people who might know. Do you have any idea what the "magic to pipe data back to the Linux host" should look like? Does a normal serial port (COM1 for Windows, /dev/ttyS0 for Linux) work? The fine magic comes in three forms. Keystr

Re: can I make this work… (Foundation for accessibility project)

2014-11-18 Thread Hans de Goede
Hi, On 11/18/2014 02:50 PM, Paolo Bonzini wrote: > > > On 18/11/2014 07:48, Eric S. Johansson wrote: >> I'm trying to figure out ways of making it possible to drive Linux from >> Windows speech recognition (NaturallySpeaking). The goal is a system >> where Windows runs in a virtual machine (Lin

Re: can I make this work… (Foundation for accessibility project)

2014-11-18 Thread Paolo Bonzini
On 18/11/2014 07:48, Eric S. Johansson wrote: > I'm trying to figure out ways of making it possible to drive Linux from > Windows speech recognition (NaturallySpeaking). The goal is a system > where Windows runs in a virtual machine (Linux host), audio is passed > through from a USB headset to t

Re: vhost + multiqueue + RSS question.

2014-11-18 Thread Michael S. Tsirkin
On Tue, Nov 18, 2014 at 11:37:03AM +0800, Jason Wang wrote: > On 11/17/2014 07:58 PM, Michael S. Tsirkin wrote: > > On Mon, Nov 17, 2014 at 01:22:07PM +0200, Gleb Natapov wrote: > >> > On Mon, Nov 17, 2014 at 12:38:16PM +0200, Michael S. Tsirkin wrote: > >>> > > On Mon, Nov 17, 2014 at 09:44:23AM +

Re: [PATCH] kvm: x86: vmx: remove MMIO_GEN_MASK

2014-11-18 Thread Paolo Bonzini
On 18/11/2014 10:14, Tiejun Chen wrote: > Actually MMIO_MAX_GEN is same as MMIO_GEN_MASK, and > especially in all cases we already AND this so its > also unnecessary to generate such a WARN_ON(). > > Signed-off-by: Tiejun Chen Good idea, but I actually prefer keeping MMIO_GEN_MASK since it is

Re: [PATCH] kvm: x86: vmx: cleanup handle_ept_violation

2014-11-18 Thread Paolo Bonzini
On 18/11/2014 10:12, Tiejun Chen wrote: > Instead, just use PFERR_{FETCH, PRESENT, WRITE}_MASK > inside handle_ept_violation() for slightly better code. > > Signed-off-by: Tiejun Chen > --- > arch/x86/kvm/vmx.c | 6 +++--- > 1 file changed, 3 insertions(+), 3 deletions(-) > > diff --git a/arc

Re: [v2][PATCH] kvm: x86: mmio: fix setting the present bit of mmio spte

2014-11-18 Thread Paolo Bonzini
On 18/11/2014 10:23, Chen, Tiejun wrote: >> On 32-bit PAE hosts, PTEs have bit 62 reserved, as in your patch: > > Do you mean just one reserved bit is fine enough in this case? Yes. Paolo -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord...@vg

Re: [v2][PATCH] kvm: x86: mmio: fix setting the present bit of mmio spte

2014-11-18 Thread Chen, Tiejun
On 2014/11/17 19:40, Paolo Bonzini wrote: On 17/11/2014 12:31, Tiejun Chen wrote: In non-ept 64-bit of PAE case maxphyaddr may be 52bit as well, There is no such thing as 64-bit PAE. Definitely. On 32-bit PAE hosts, PTEs have bit 62 reserved, as in your patch: Do you mean just one re

[PATCH] kvm: x86: vmx: remove MMIO_GEN_MASK

2014-11-18 Thread Tiejun Chen
Actually MMIO_MAX_GEN is same as MMIO_GEN_MASK, and especially in all cases we already AND this so its also unnecessary to generate such a WARN_ON(). Signed-off-by: Tiejun Chen --- arch/x86/kvm/mmu.c | 5 + 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/arch/x86/kvm/mmu.c b/arc

[PATCH] kvm: x86: vmx: cleanup handle_ept_violation

2014-11-18 Thread Tiejun Chen
Instead, just use PFERR_{FETCH, PRESENT, WRITE}_MASK inside handle_ept_violation() for slightly better code. Signed-off-by: Tiejun Chen --- arch/x86/kvm/vmx.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index 284f5c2..22dc60d