Re: [PATCH 1/4] KVM: PPC: Add support for multiple-TCE hcalls

2013-06-17 Thread Alexey Kardashevskiy
On 06/17/2013 08:06 AM, Alexander Graf wrote: > > On 05.06.2013, at 08:11, Alexey Kardashevskiy wrote: > >> This adds real mode handlers for the H_PUT_TCE_INDIRECT and >> H_STUFF_TCE hypercalls for QEMU emulated devices such as IBMVIO >> devices or emulated PCI. These calls allow adding multiple

Re: [PATCH 1/4] KVM: PPC: Add support for multiple-TCE hcalls

2013-06-17 Thread Alexander Graf
On 17.06.2013, at 09:55, Alexey Kardashevskiy wrote: > On 06/17/2013 08:06 AM, Alexander Graf wrote: >> >> On 05.06.2013, at 08:11, Alexey Kardashevskiy wrote: >> >>> This adds real mode handlers for the H_PUT_TCE_INDIRECT and >>> H_STUFF_TCE hypercalls for QEMU emulated devices such as IBMVIO

Re: [PATCH 1/4] KVM: PPC: Add support for multiple-TCE hcalls

2013-06-17 Thread Alexey Kardashevskiy
On 06/17/2013 06:02 PM, Alexander Graf wrote: > > On 17.06.2013, at 09:55, Alexey Kardashevskiy wrote: > >> On 06/17/2013 08:06 AM, Alexander Graf wrote: >>> >>> On 05.06.2013, at 08:11, Alexey Kardashevskiy wrote: >>> This adds real mode handlers for the H_PUT_TCE_INDIRECT and H_STUFF_

Re: [PATCH 1/4] KVM: PPC: Add support for multiple-TCE hcalls

2013-06-17 Thread Benjamin Herrenschmidt
On Mon, 2013-06-17 at 17:55 +1000, Alexey Kardashevskiy wrote: > David: > === > So, in the case of MULTITCE, that's not quite right. PR KVM can > emulate a PAPR system on a BookE machine, and there's no reason not to > allow TCE acceleration as well. We can't make it dependent on PAPR > mode bein

Re: [PATCH 1/4] KVM: PPC: Add support for multiple-TCE hcalls

2013-06-17 Thread Alexander Graf
On 17.06.2013, at 10:34, Alexey Kardashevskiy wrote: > On 06/17/2013 06:02 PM, Alexander Graf wrote: >> >> On 17.06.2013, at 09:55, Alexey Kardashevskiy wrote: >> >>> On 06/17/2013 08:06 AM, Alexander Graf wrote: On 05.06.2013, at 08:11, Alexey Kardashevskiy wrote: > This a

Re: [PATCH 1/4] KVM: PPC: Add support for multiple-TCE hcalls

2013-06-17 Thread Alexander Graf
On 17.06.2013, at 10:37, Benjamin Herrenschmidt wrote: > On Mon, 2013-06-17 at 17:55 +1000, Alexey Kardashevskiy wrote: >> David: >> === >> So, in the case of MULTITCE, that's not quite right. PR KVM can >> emulate a PAPR system on a BookE machine, and there's no reason not to >> allow TCE accel

Re: [PATCH 1/4] KVM: PPC: Add support for multiple-TCE hcalls

2013-06-17 Thread Alexey Kardashevskiy
On 06/17/2013 06:40 PM, Alexander Graf wrote: > > On 17.06.2013, at 10:34, Alexey Kardashevskiy wrote: > >> On 06/17/2013 06:02 PM, Alexander Graf wrote: >>> >>> On 17.06.2013, at 09:55, Alexey Kardashevskiy wrote: >>> On 06/17/2013 08:06 AM, Alexander Graf wrote: > > On 05.06.201

Re: [PATCH 2/4] powerpc: Prepare to support kernel handling of IOMMU map/unmap

2013-06-17 Thread Alexey Kardashevskiy
On 06/16/2013 02:26 PM, Benjamin Herrenschmidt wrote: >> +#if defined(CONFIG_SPARSEMEM_VMEMMAP) || defined(CONFIG_FLATMEM) >> +int realmode_get_page(struct page *page) >> +{ >> +if (PageCompound(page)) >> +return -EAGAIN; >> + >> +get_page(page); >> + >> +return 0; >> +} >>

access PCI card trouble from VM guest

2013-06-17 Thread David Cure
Hello, I want to access this PCI card from one VM : 10:00.0 Serial controller: Moxa Technologies Co Ltd CP-132EL (2-port RS-422/485 Smart PCI Express Serial Board) This card is not handle by driver on the host kernel. When I start the VM with this command

Re: [PATCH 1/4] KVM: PPC: Add support for multiple-TCE hcalls

2013-06-17 Thread Alexander Graf
On 06/17/2013 10:51 AM, Alexey Kardashevskiy wrote: On 06/17/2013 06:40 PM, Alexander Graf wrote: On 17.06.2013, at 10:34, Alexey Kardashevskiy wrote: On 06/17/2013 06:02 PM, Alexander Graf wrote: On 17.06.2013, at 09:55, Alexey Kardashevskiy wrote: On 06/17/2013 08:06 AM, Alexander Graf wr

Re: [PATCH 1/4] KVM: PPC: Add support for multiple-TCE hcalls

2013-06-17 Thread Alexander Graf
On 06/17/2013 12:46 PM, Alexander Graf wrote: On 06/17/2013 10:51 AM, Alexey Kardashevskiy wrote: On 06/17/2013 06:40 PM, Alexander Graf wrote: On 17.06.2013, at 10:34, Alexey Kardashevskiy wrote: On 06/17/2013 06:02 PM, Alexander Graf wrote: On 17.06.2013, at 09:55, Alexey Kardashevskiy wro

Re: [PATCH v3 0/6] KVM: MMU: fast invalidate all mmio sptes

2013-06-17 Thread Xiao Guangrong
Sorry for the delay reply since i was on vacation. On 06/15/2013 10:22 AM, Takuya Yoshikawa wrote: > On Thu, 13 Jun 2013 21:08:21 -0300 > Marcelo Tosatti wrote: > >> On Fri, Jun 07, 2013 at 04:51:22PM +0800, Xiao Guangrong wrote: > >> - Where is the generation number increased? > > Looks like

Re: [PATCH v3 03/13] nEPT: Add EPT tables support to paging_tmpl.h

2013-06-17 Thread Xiao Guangrong
On 06/11/2013 07:32 PM, Gleb Natapov wrote: > On Tue, May 21, 2013 at 03:52:12PM +0800, Xiao Guangrong wrote: >> On 05/19/2013 12:52 PM, Jun Nakajima wrote: >>> From: Nadav Har'El >>> >>> This is the first patch in a series which adds nested EPT support to KVM's >>> nested VMX. Nested EPT means em

Re: access PCI card trouble from VM guest

2013-06-17 Thread Alex Williamson
On Mon, 2013-06-17 at 12:00 +0200, David Cure wrote: > Hello, > > I want to access this PCI card from one VM : > > 10:00.0 Serial controller: Moxa Technologies Co Ltd CP-132EL (2-port > RS-422/485 Smart PCI Express Serial Board) > > This card is not handle by driver on

Re: access PCI card trouble from VM guest

2013-06-17 Thread David Cure
Le Mon, Jun 17, 2013 at 12:00:10PM +0200, David Cure ecrivait : > > 10:00.0 Serial controller: Moxa Technologies Co Ltd CP-132EL (2-port > RS-422/485 Smart PCI Express Serial Board) > > pci-assign,configfd=24,host=2a:00.3,id=hostdev0,bus=pci.0,addr=0x6 > -device virtio-balloon-pci,id=balloon0,bus

Re: access PCI card trouble from VM guest

2013-06-17 Thread David Cure
Hello Alex, Le Mon, Jun 17, 2013 at 07:24:54AM -0600, Alex Williamson ecrivait : > > Boot the host with intel_iommu=on, I add it, and now I can start the VM, thanks a lot. (will look now if I can access it in the VM ;)) > but if you want 10:00.0, why are you > assigning

Re: [PATCH] pci: Enable overrides for missing ACS capabilities

2013-06-17 Thread Don Dutile
On 05/30/2013 02:40 PM, Alex Williamson wrote: PCIe ACS (Access Control Services) is the PCIe 2.0+ feature that allows us to control whether transactions are allowed to be redirected in various subnodes of a PCIe topology. For instance, if two endpoints are below a root port or downsteam switch

Re: [PATCH 0/6] KVM: s390: Patches for kvm-next.

2013-06-17 Thread Paolo Bonzini
Il 12/06/2013 13:54, Cornelia Huck ha scritto: > Hi, > > here are some patches that have accumulated in our kvm/s390 patch queue. > > There's now support for large pages in the guest, and perf samples can > be sorted between kvm host or guest. Other than that, some cleanup and > a bugfix. > > Pl

Re: [PATCH 0/2] kvm/mips: ABI fix for 3.10

2013-06-17 Thread Paolo Bonzini
Il 10/06/2013 21:33, David Daney ha scritto: > From: David Daney > > As requested by Gleb Natapov, we need to define and use KVM_REG_MIPS > when using the GET_ONE_REG/SET_ONE_REG ioctl. Since this is part of > the MIPS kvm support that is new in 3.10, it should be merged before a > bad ABI leaks

Re: [PATCH 0/8] kvm/ppc: fixes for 3.10

2013-06-17 Thread Paolo Bonzini
Il 10/06/2013 21:52, Scott Wood ha scritto: > On 06/09/2013 03:09:21 AM, Gleb Natapov wrote: >> On Thu, Jun 06, 2013 at 07:16:28PM -0500, Scott Wood wrote: >> > Most of these have been posted before, but I grouped them together as >> > there are some contextual dependencies between them. >> > >> >

Re: [PATCH] KVM: x86: remove vcpu's CPL check in host invoked vcpu's xcr set process

2013-06-17 Thread Paolo Bonzini
Il 14/06/2013 09:36, Zhanghaoyu (A) ha scritto: > __kvm_set_xcr function does the CPL check when set xcr. __kvm_set_xcr is > called in two flows, > one is invoked by guest, call stack shown as below, > handle_xsetbv(or xsetbv_interception) > kvm_set_xcr > __kvm_set_xcr > the other one is inv

Re: [kvm-unit-test PATCH] kvmclock: serialize RDTSC

2013-06-17 Thread Paolo Bonzini
Il 14/06/2013 23:30, Marcelo Tosatti ha scritto: > > Serialize RDTSC so its executed inside kvmclock_read > section. > > Fixes https://bugzilla.redhat.com/show_bug.cgi?id=922285 > > Signed-off-by: Marcelo Tosatti > > diff --git a/x86/kvmclock.c b/x86/kvmclock.c > index 0624da3..5b831c5 100644

[Bug 59521] KVM linux guest reads uninitialized pvclock values before executing rdmsr MSR_KVM_WALL_CLOCK

2013-06-17 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=59521 --- Comment #3 from Anonymous Emailer 2013-06-17 15:50:27 --- Reply-To: pbonz...@redhat.com Il 15/06/2013 19:17, bugzilla-dae...@bugzilla.kernel.org ha scritto: > The problem is in cpu_init() which is called earlier. > cpu_init() calls prin

Re: [Bug 59521] KVM linux guest reads uninitialized pvclock values before executing rdmsr MSR_KVM_WALL_CLOCK

2013-06-17 Thread Paolo Bonzini
Il 15/06/2013 19:17, bugzilla-dae...@bugzilla.kernel.org ha scritto: > The problem is in cpu_init() which is called earlier. > cpu_init() calls printk and possibly other stuff which can use timestamps. > printk calls local_clock() to obtain a timestamp of a log message. On KVM > guests call sequenc

Re: Bug#707257: linux-image-3.8-1-686-pae: KVM crashes with "entry failed, hardware error 0x80000021"

2013-06-17 Thread Paolo Bonzini
Il 16/06/2013 02:25, Stefan Pietsch ha scritto: > Bisecting leads to > > git bisect bad 378a8b099fc207ddcb91b19a8c1457667e0af398 > git bisect good 007a3b547512d69f67ceb9641796d64552bd337e > git bisect good 1f3141e80b149e7215313dff29e9a0c47811b1d1 > git bisect good 286da4156dc65c8a054580fdd96b77091

Re: [PATCH 4/4] KVM: PPC: Add hugepage support for IOMMU in-kernel handling

2013-06-17 Thread Paolo Bonzini
Il 05/06/2013 08:11, Alexey Kardashevskiy ha scritto: > +/* > + * The KVM guest can be backed with 16MB pages (qemu switch > + * -mem-path /var/lib/hugetlbfs/global/pagesize-16MB/). Nitpick: we try to avoid references to QEMU, so perhaps s/qemu switch/for example, with QEMU you can use the comman

Re: [PATCH v2] virtio_balloon: leak_balloon(): only tell host if we got pages deflated

2013-06-17 Thread Luiz Capitulino
On Wed, 5 Jun 2013 21:18:37 -0400 Luiz Capitulino wrote: > The balloon_page_dequeue() function can return NULL. If it does for > the first page being freed, then leak_balloon() will create a > scatter list with len=0. Which in turn seems to generate an invalid > virtio request. > > I didn't get

[Bug 59521] KVM linux guest reads uninitialized pvclock values before executing rdmsr MSR_KVM_WALL_CLOCK

2013-06-17 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=59521 --- Comment #4 from Eugene Batalov 2013-06-17 21:29:08 --- (In reply to comment #3) > Reply-To: pbonz...@redhat.com > > Il 15/06/2013 19:17, bugzilla-dae...@bugzilla.kernel.org ha scritto: > > The problem is in cpu_init() which is called ea

[no subject]

2013-06-17 Thread AFG GTBANK LOAN
Loan Syndicacion Am AFG Guaranty Trust Bank, zu strukturieren wir Kreditlinien treffen Sie unsere Kunden spezifischen geschäftlichen Anforderungen und einen deutlichen Mehrwert für unsere Kunden Unternehmen. eine Division der AFG Finance und Private Bank plc. Wenn Sie erwägen, eine große Akqui

Re: [PATCH] KVM: x86: remove vcpu's CPL check in host invoked vcpu's xcr set process

2013-06-17 Thread Zhanghaoyu (A)
>> __kvm_set_xcr function does the CPL check when set xcr. __kvm_set_xcr >> is called in two flows, one is invoked by guest, call stack shown as >> below, handle_xsetbv(or xsetbv_interception) >> kvm_set_xcr >> __kvm_set_xcr >> the other one is invoked by host(QEMU), call stack shown as bel

Re: [PATCH 3/4] KVM: PPC: Add support for IOMMU in-kernel handling

2013-06-17 Thread Alex Williamson
On Mon, 2013-06-17 at 13:56 +1000, Benjamin Herrenschmidt wrote: > On Sun, 2013-06-16 at 21:13 -0600, Alex Williamson wrote: > > > IOMMU groups themselves don't provide security, they're accessed by > > interfaces like VFIO, which provide the security. Given a brief look, I > > agree, this looks

Re: [PATCH 3/4] KVM: PPC: Add support for IOMMU in-kernel handling

2013-06-17 Thread Benjamin Herrenschmidt
On Mon, 2013-06-17 at 20:32 -0600, Alex Williamson wrote: > Right, we don't want to create dependencies across modules. I don't > have a vision for how this should work. This is effectively a complete > side-band to vfio, so we're really just dealing in the iommu group > space. Maybe there need