[RFC v8 02/25] header file update VFIO/IOMMU vSVA APIs kernel 5.8-rc3

2020-07-12 Thread Liu Yi L
The kernel uapi/linux/iommu.h header file includes the extensions for vSVA support. e.g. bind gpasid, iommu fault report related user structures and etc. This commit updates kernel headers from the below branch: https://github.com/luxis1999/linux-vsva.git: vsva-linux-5.8-rc3-v5 Note: this should

[RFC v8 00/25] intel_iommu: expose Shared Virtual Addressing to VMs

2020-07-12 Thread Liu Yi L
Shared Virtual Addressing (SVA), a.k.a, Shared Virtual Memory (SVM) on Intel platforms allows address space sharing between device DMA and applications. SVA can reduce programming complexity and enhance security. This QEMU series is intended to expose SVA usage to VMs. i.e. Sharing guest

[RFC v8 01/25] scripts/update-linux-headers: Import iommu.h

2020-07-12 Thread Liu Yi L
From: Eric Auger Update the script to import the new iommu.h uapi header. Cc: Kevin Tian Cc: Jacob Pan Cc: Peter Xu Cc: Yi Sun Cc: Michael S. Tsirkin Cc: Cornelia Huck Cc: Paolo Bonzini Acked-by: Cornelia Huck Signed-off-by: Eric Auger --- scripts/update-linux-headers.sh | 2 +- 1

[Bug 1886318] Re: Qemu after v5.0.0 breaks macos guests

2020-07-12 Thread Mark Cave-Ayland
Great work Simon! I'm not an ACPI expert but that certainly seems a plausible solution - I'll have to defer the final review to someone else though. The quickest way to get this reviewed is to follow the procedure at https://wiki.qemu.org/Contribute/SubmitAPatch which is basically send a "git

[Bug 1886318] Re: Qemu after v5.0.0 breaks macos guests

2020-07-12 Thread Simon John
on a hunch, i applied this, and now macos boots (as 2 from acpi-tmr fits in the 1-4 range): diff --git a/hw/acpi/core.c b/hw/acpi/core.c index f6d9ec4f13..05ff29b9d7 100644 --- a/hw/acpi/core.c +++ b/hw/acpi/core.c @@ -527,7 +527,7 @@ static void acpi_pm_tmr_write(void *opaque, hwaddr addr,

[Bug 1886318] Re: Qemu after v5.0.0 breaks macos guests

2020-07-12 Thread Simon John
all i get on stderr with my patch is: invalid accepts: (null) addr fe03601c size: 4 -- You received this bug notification because you are a member of qemu- devel-ml, which is subscribed to QEMU. https://bugs.launchpad.net/bugs/1886318 Title: Qemu after v5.0.0 breaks macos guests Status in

[Bug 1886318] Re: Qemu after v5.0.0 breaks macos guests

2020-07-12 Thread Simon John
i get this over and over (and only this): invalid size: acpi-tmr addr 0 size: 2 which seems to reside in hw/acpi/core.c -- You received this bug notification because you are a member of qemu- devel-ml, which is subscribed to QEMU. https://bugs.launchpad.net/bugs/1886318 Title: Qemu after

migration: broken snapshot saves appear on s390 when small fields in migration stream removed

2020-07-12 Thread Claudio Fontana
Hello all, during unrelated work for splitting QTest from the TCG instruction counting module, I encountered what seems to be a migration stream issue, which is apparent only on s390, and only shows in block test 267. ./check -qcow2 267 when it comes to snapshot save and load using backing

Re: [PATCH v1 04/13] cputlb: ensure we save the IOTLB data in case of reset

2020-07-12 Thread Alex Bennée
Emilio G. Cota writes: > On Fri, Jul 10, 2020 at 14:03:27 -0700, Richard Henderson wrote: >> On 7/9/20 7:13 AM, Alex Bennée wrote: >> > Any write to a device might cause a re-arrangement of memory >> > triggering a TLB flush and potential re-size of the TLB invalidating >> > previous entries.

[Bug 1886318] Re: Qemu after v5.0.0 breaks macos guests

2020-07-12 Thread Mark Cave-Ayland
In that case please disregard those patches. Can you try this diff below which will log any invalid accesses and see if anything appears on stderr? diff --git a/memory.c b/memory.c index 9200b20130..5d1a6d4477 100644 --- a/memory.c +++ b/memory.c @@ -1354,10 +1354,12 @@ bool

Re: [PATCH v1 08/13] plugins: expand the bb plugin to be thread safe and track per-cpu

2020-07-12 Thread Alex Bennée
Emilio G. Cota writes: > On Thu, Jul 09, 2020 at 15:13:22 +0100, Alex Bennée wrote: >> While there isn't any easy way to make the inline counts thread safe > > Why not? At least in 64-bit hosts TCG will emit a single write to > update the 64-bit counter. Well the operation is an add so that

[Bug 1886318] Re: Qemu after v5.0.0 breaks macos guests

2020-07-12 Thread Simon John
No that doesn't make any difference either, nor does combining the two patches :-( -- You received this bug notification because you are a member of qemu- devel-ml, which is subscribed to QEMU. https://bugs.launchpad.net/bugs/1886318 Title: Qemu after v5.0.0 breaks macos guests Status in

[Bug 1886318] Re: Qemu after v5.0.0 breaks macos guests

2020-07-12 Thread Mark Cave-Ayland
No worries - I didn't spot that those memory regions were implemented as single-byte registers which means the access size won't matter anyway. I had a quick look at your command line again and the only other obvious thing I spotted was that a 64-bit access to the q35 "blackhole" region might

<    1   2