Re: [Qemu-devel] [PATCH/RFC 4/5] s390x/kvm: test whether a cpu is STOPPED when checking "has_work"

2014-07-31 Thread David Hildenbrand
> > We have > > - wait (wait bit in PSW) > > - disabled wait (wait bit and interrupt fencing in PSW) > > - STOPPED (not related to PSW, state change usually handled via service > > processor or hypervisor) > > > > I think we have to differentiate between KVM/TCG. On KVM we always do in > > kernel

[GIT PULL 2/2] KVM: s390: rework broken SIGP STOP interrupt handling

2014-07-31 Thread Christian Borntraeger
From: David Hildenbrand A VCPU might never stop if it intercepts (for whatever reason) between "fake interrupt delivery" and execution of the stop function. Heart of the problem is that SIGP STOP is an interrupt that has to be processed on every SIE entry until the VCPU finally executes the stop

[GIT PULL 1/2] KVM: s390: Fix memory leak on busy SIGP stop

2014-07-31 Thread Christian Borntraeger
commit 7dfc63cf977447e09b1072911c22564f900fc578 (KVM: s390: allow only one SIGP STOP (AND STORE STATUS) at a time) introduced a memory leak if a sigp stop is already pending. Free the allocated inti structure. Signed-off-by: Christian Borntraeger Reviewed-by: David Hildenbrand --- arch/s390/kvm

Re: [PATCH] KVM: nVMX: nested TPR shadow/threshold emulation

2014-07-31 Thread Wanpeng Li
Hi Paolo, On Wed, Jul 30, 2014 at 05:20:58PM +0200, Paolo Bonzini wrote: >Il 30/07/2014 14:04, Wanpeng Li ha scritto: >> @@ -7962,14 +7965,14 @@ static void prepare_vmcs02(struct kvm_vcpu *vcpu, >> struct vmcs12 *vmcs12) >> if (!vmx->rdtscp_enabled) >> exec_contro

[GIT PULL 0/2] KVM: s390: Fixes for kvm/next (3.17)

2014-07-31 Thread Christian Borntraeger
Paolo, The following changes since commit b55a8144d1807f9e74c51cb584f0dd198483d86c: x86/kvm: Resolve shadow warning from min macro (2014-07-25 16:05:54 +0200) are available in the git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux.git tags/kvm-s390-20140730 fo

[PATCH] KVM: PPC: PR: Handle FSCR feature deselects

2014-07-31 Thread Alexander Graf
We handle FSCR feature bits (well, TAR only really today) lazily when the guest starts using them. So when a guest activates the bit and later uses that feature we enable it for real in hardware. However, when the guest stops using that bit we don't stop setting it in hardware. That means we can p

Re: [PATCH] KVM: nVMX: nested TPR shadow/threshold emulation

2014-07-31 Thread Paolo Bonzini
Il 31/07/2014 10:03, Wanpeng Li ha scritto: >> One thing: >> >>> + if (nested_cpu_has(vmcs12, CPU_BASED_TPR_SHADOW)) >>> + vmcs_write32(TPR_THRESHOLD, vmcs12->tpr_threshold); >> >> I think you can just do this write unconditionally, since most >> hypervisors will enable this. Also, you

[PATCH 0/2] Avoid using TSC clocksource on AMD APUs affected by erratum 778

2014-07-31 Thread Igor Mammedov
Fixes pvclock backwards jumps caused by TSC drifting despite host believing that TSC is invariant/synchronized. TSC drift maybe caused by erratum 778 described in "Revision Guide for AMD Family 15h Models 10h-1Fh Processors, Publication # 48931, Issue Date: May 2013, Revision: 3.10" Igor Mammed

[PATCH 2/2] x86: kvm: do not advertise stable clocksource if CPU has TSC drift BUG

2014-07-31 Thread Igor Mammedov
Signed-off-by: Igor Mammedov --- arch/x86/kvm/cpuid.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c index 38a0afe..f519823 100644 --- a/arch/x86/kvm/cpuid.c +++ b/arch/x86/kvm/cpuid.c @@ -478,8 +478,9 @@ static inline int __do_cp

[PATCH 1/2] x86: AMD: mark TSC unstable on APU family 15h models 10h-1fh

2014-07-31 Thread Igor Mammedov
Due to erratum #778 from "Revision Guide for AMD Family 15h Models 10h-1Fh Processors, Publication # 48931, Issue Date: May 2013, Revision: 3.10" TSC on affected processor, a core may drift under certain conditions, which makes initially synchronized TSCs to become unsynchronized. As result TSC

[PATCH/RFC] KVM: perf/stat: Properly show submicrosecond times

2014-07-31 Thread Christian Borntraeger
For lots of exits the min time (and sometimes max) is 0 or 1. Lets increase the accurancy similar to what the average field alread does. Cc: Paolo Bonzini Cc: Jiri Olsa Cc: David Ahern Cc: Arnaldo Carvalho de Melo Signed-off-by: Christian Borntraeger --- tools/perf/builtin-kvm.c | 8 ---

[RFC] increase perf kvm stat accuracy

2014-07-31 Thread Christian Borntraeger
On my s390 kvm system most of the kvm exits are in the range of 0 or 1 microseconds. Can we increase the accuracy by 2 additional digits? Opinions? Christian Borntraeger (1): KVM: perf/stat: Properly show submicrosecond times tools/perf/builtin-kvm.c | 8 1 file changed, 4 insertio

Re: hang after seabios

2014-07-31 Thread Richard W.M. Jones
On Wed, Jul 30, 2014 at 03:58:43PM -0700, Zetan Drableg wrote: >[00183ms] /usr/libexec/qemu-kvm \ >-global virtio-blk-pci.scsi=off \ >-nodefconfig \ >-nodefaults \ >-nographic \ >-machine accel=kvm:tcg \ >-cpu host,+kvmclock \ >-m 500 \ >

[PATCH v2] vhost: Add polling mode

2014-07-31 Thread Razya Ladelsky
Resubmitting the patch in: http://marc.info/?l=kvm&m=140594903520308&w=2 after fixing the whitespaces issues. Thank you, Razya >From f293e470b36ff9eb4910540c620315c418e4a8fc Mon Sep 17 00:00:00 2001 From: Razya Ladelsky Date: Thu, 31 Jul 2014 09:47:20 +0300 Subject: [PATCH] vhost: Add pol

Re: [PATCH V2 3/4] x86/kvm: Resolve shadow warnings in macro expansion

2014-07-31 Thread Paolo Bonzini
Il 30/07/2014 23:19, Mark D Rustad ha scritto: > Resolve shadow warnings that appear in W=2 builds. Instead of > using ret to hold the return pointer, save the length in a new > variable saved_len and compute the pointer on exit. This also > resolves a very technical error, in that ret was declared

Re: [PATCH V2 1/4] x86/kvm: Resolve some missing-initializers warnings

2014-07-31 Thread Paolo Bonzini
Il 30/07/2014 23:18, Mark D Rustad ha scritto: > Resolve some missing-initializers warnings that appear in W=2 > builds. They are resolved by adding the name as a parameter to > the macros and having the macro generate all four fields of the > structure. > > Signed-off-by: Mark Rustad > Signed-of

Re: [PATCH v5 1/5] x86,kvm: Add MSR_KVM_GET_RNG_SEED and a matching feature bit

2014-07-31 Thread Paolo Bonzini
Il 24/07/2014 06:57, Andy Lutomirski ha scritto: > This adds a simple interface to allow a guest to request 64 bits of > host nonblocking entropy. This is independent of virtio-rng for a > couple of reasons: > > - It's intended to be usable during early boot, when a trivial >synchronous inte

Re: [PATCH v5 4/5] x86,random,kvm: Use KVM_GET_RNG_SEED in arch_get_rng_seed

2014-07-31 Thread Paolo Bonzini
Il 24/07/2014 06:57, Andy Lutomirski ha scritto: > This is a straightforward implementation: for each bit of internal > RNG state, request one bit from KVM_GET_RNG_SEED. This is done even > if RDSEED/RDRAND worked, since KVM_GET_RNG_SEED is likely to provide > cryptographically secure output even

Re: [PATCH v5 5/5] x86,kaslr: Use MSR_KVM_GET_RNG_SEED for KASLR if available

2014-07-31 Thread Paolo Bonzini
Il 24/07/2014 06:57, Andy Lutomirski ha scritto: > It's considerably better than any of the alternatives on KVM. > > Rather than reinventing all of the cpu feature query code, this fixes > native_cpuid to work in PIC objects. > > I haven't combined it with boot/cpuflags.c's cpuid implementation:

Re: [PATCH v2 1/4] KVM: device: add simple registration mechanism for kvm_device_ops

2014-07-31 Thread Christoffer Dall
On Tue, Jul 01, 2014 at 03:45:15PM +0100, Will Deacon wrote: > kvm_ioctl_create_device currently has knowledge of all the device types > and their associated ops. This is fairly inflexible when adding support > for new in-kernel device emulations, so move what we currently have out > into a table,

Re: [PATCH v2 2/4] KVM: ARM: vgic: register kvm_device_ops dynamically

2014-07-31 Thread Christoffer Dall
On Tue, Jul 01, 2014 at 03:45:16PM +0100, Will Deacon wrote: > Now that we have a dynamic means to register kvm_device_ops, use that > for the ARM VGIC, instead of relying on the static table. > > Cc: Gleb Natapov > Cc: Paolo Bonzini > Cc: Marc Zyngier > Cc: Christoffer Dall > Signed-off-by: W

[PATCH][next] arm64: KVM: GICv3: move system register access to msr_s/mrs_s

2014-07-31 Thread Marc Zyngier
Commit 72c583951526 (arm64: gicv3: Allow GICv3 compilation with older binutils) changed the way we express the GICv3 system registers, but couldn't change the occurences used by KVM as the code wasn't merged yet. Just fix the accessors. Cc: Will Deacon Cc: Catalin Marinas Cc: Christoffer Dall

Re: [PATCH][next] arm64: KVM: GICv3: move system register access to msr_s/mrs_s

2014-07-31 Thread Will Deacon
On Thu, Jul 31, 2014 at 02:16:39PM +0100, Marc Zyngier wrote: > Commit 72c583951526 (arm64: gicv3: Allow GICv3 compilation with > older binutils) changed the way we express the GICv3 system registers, > but couldn't change the occurences used by KVM as the code wasn't > merged yet. > > Just fix th

Re: [PATCH v2 2/4] KVM: ARM: vgic: register kvm_device_ops dynamically

2014-07-31 Thread Will Deacon
Hi Christoffer, On Thu, Jul 31, 2014 at 01:10:15PM +0100, Christoffer Dall wrote: > On Tue, Jul 01, 2014 at 03:45:16PM +0100, Will Deacon wrote: > > Now that we have a dynamic means to register kvm_device_ops, use that > > for the ARM VGIC, instead of relying on the static table. > > > > Cc: Gleb

Re: [PATCH][next] arm64: KVM: GICv3: move system register access to msr_s/mrs_s

2014-07-31 Thread Christoffer Dall
On Thu, Jul 31, 2014 at 02:19:47PM +0100, Will Deacon wrote: > On Thu, Jul 31, 2014 at 02:16:39PM +0100, Marc Zyngier wrote: > > Commit 72c583951526 (arm64: gicv3: Allow GICv3 compilation with > > older binutils) changed the way we express the GICv3 system registers, > > but couldn't change the occ

Re: [PATCH/RFC] KVM: perf/stat: Properly show submicrosecond times

2014-07-31 Thread David Ahern
On 7/31/14, 5:13 AM, Christian Borntraeger wrote: For lots of exits the min time (and sometimes max) is 0 or 1. Lets increase the accurancy similar to what the average field alread does. Seems reasonable to me. Acked-by: David Ahern Cc: Paolo Bonzini Cc: Jiri Olsa Cc: David Ahern Cc: A

Re: [GIT PULL 0/2] KVM: s390: Fixes for kvm/next (3.17)

2014-07-31 Thread Paolo Bonzini
Il 31/07/2014 09:59, Christian Borntraeger ha scritto: > git://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux.git > tags/kvm-s390-20140730 Thanks, applying. Paolo -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord...@vger.kernel.org Mor

Re: [PATCH] arm64: KVM: export current vcpu->pause state via pseudo regs

2014-07-31 Thread Christoffer Dall
On Wed, Jul 09, 2014 at 02:55:12PM +0100, Alex Bennée wrote: > To cleanly restore an SMP VM we need to ensure that the current pause > state of each vcpu is correctly recorded. Things could get confused if > the CPU starts running after migration restore completes when it was > paused before it sta

Re: [PATCH 2/2] x86: kvm: do not advertise stable clocksource if CPU has TSC drift BUG

2014-07-31 Thread Paolo Bonzini
Il 31/07/2014 11:47, Igor Mammedov ha scritto: > Signed-off-by: Igor Mammedov > --- > arch/x86/kvm/cpuid.c | 3 ++- > 1 file changed, 2 insertions(+), 1 deletion(-) > > diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c > index 38a0afe..f519823 100644 > --- a/arch/x86/kvm/cpuid.c > +++ b/a

Re: [PATCH/RFC] KVM: perf/stat: Properly show submicrosecond times

2014-07-31 Thread Arnaldo Carvalho de Melo
Em Thu, Jul 31, 2014 at 08:24:03AM -0600, David Ahern escreveu: > On 7/31/14, 5:13 AM, Christian Borntraeger wrote: > >For lots of exits the min time (and sometimes max) is 0 or 1. Lets > >increase the accurancy similar to what the average field alread does. > > Seems reasonable to me. > > Acked-

Re: [PATCH] arm64: KVM: export current vcpu->pause state via pseudo regs

2014-07-31 Thread Alex Bennée
Christoffer Dall writes: > On Wed, Jul 09, 2014 at 02:55:12PM +0100, Alex Bennée wrote: >> To cleanly restore an SMP VM we need to ensure that the current pause >> state of each vcpu is correctly recorded. Things could get confused if >> the CPU starts running after migration restore completes wh

Re: [PATCH 1/2] x86: AMD: mark TSC unstable on APU family 15h models 10h-1fh

2014-07-31 Thread Borislav Petkov
On Thu, Jul 31, 2014 at 09:47:12AM +, Igor Mammedov wrote: > Due to erratum #778 from > "Revision Guide for AMD Family 15h Models 10h-1Fh Processors, > Publication # 48931, Issue Date: May 2013, Revision: 3.10" > > TSC on affected processor, a core may drift under certain conditions, > which

Re: [PATCH][next] arm64: KVM: GICv3: move system register access to msr_s/mrs_s

2014-07-31 Thread Will Deacon
On Thu, Jul 31, 2014 at 02:32:27PM +0100, Christoffer Dall wrote: > On Thu, Jul 31, 2014 at 02:19:47PM +0100, Will Deacon wrote: > > On Thu, Jul 31, 2014 at 02:16:39PM +0100, Marc Zyngier wrote: > > > Commit 72c583951526 (arm64: gicv3: Allow GICv3 compilation with > > > older binutils) changed the

Re: [PATCH][next] arm64: KVM: GICv3: move system register access to msr_s/mrs_s

2014-07-31 Thread Christoffer Dall
On Thu, Jul 31, 2014 at 05:05:58PM +0100, Will Deacon wrote: > On Thu, Jul 31, 2014 at 02:32:27PM +0100, Christoffer Dall wrote: > > On Thu, Jul 31, 2014 at 02:19:47PM +0100, Will Deacon wrote: > > > On Thu, Jul 31, 2014 at 02:16:39PM +0100, Marc Zyngier wrote: > > > > Commit 72c583951526 (arm64: g

Re: [PATCH 1/2] x86: AMD: mark TSC unstable on APU family 15h models 10h-1fh

2014-07-31 Thread Paolo Bonzini
Il 31/07/2014 17:47, Borislav Petkov ha scritto: > On Thu, Jul 31, 2014 at 09:47:12AM +, Igor Mammedov wrote: >> Due to erratum #778 from >> "Revision Guide for AMD Family 15h Models 10h-1Fh Processors, >> Publication # 48931, Issue Date: May 2013, Revision: 3.10" >> >> TSC on affected process

Re: [PATCH V2 1/4] x86/kvm: Resolve some missing-initializers warnings

2014-07-31 Thread Rustad, Mark D
On Jul 31, 2014, at 4:50 AM, Paolo Bonzini wrote: > Il 30/07/2014 23:18, Mark D Rustad ha scritto: >> Resolve some missing-initializers warnings that appear in W=2 >> builds. They are resolved by adding the name as a parameter to >> the macros and having the macro generate all four fields of the

Re: [PATCH] arm64: KVM: export current vcpu->pause state via pseudo regs

2014-07-31 Thread Christoffer Dall
On Thu, Jul 31, 2014 at 04:14:51PM +0100, Alex Bennée wrote: > > Christoffer Dall writes: > > > On Wed, Jul 09, 2014 at 02:55:12PM +0100, Alex Bennée wrote: > >> To cleanly restore an SMP VM we need to ensure that the current pause > >> state of each vcpu is correctly recorded. Things could get c

Re: [PATCH] arm64: KVM: export current vcpu->pause state via pseudo regs

2014-07-31 Thread Peter Maydell
On 31 July 2014 17:38, Christoffer Dall wrote: >> > If we are not complaining when setting the pause value to false if it >> > was true before, then we probably also need to wake up the thread in >> > case this is called from another thread, right? >> > >> > or perhaps we should just return an err

Re: [PATCH] arm64: KVM: export current vcpu->pause state via pseudo regs

2014-07-31 Thread Christoffer Dall
On Thu, Jul 31, 2014 at 05:45:28PM +0100, Peter Maydell wrote: > On 31 July 2014 17:38, Christoffer Dall wrote: > >> > If we are not complaining when setting the pause value to false if it > >> > was true before, then we probably also need to wake up the thread in > >> > case this is called from a

Re: [PATCH] arm64: KVM: export current vcpu->pause state via pseudo regs

2014-07-31 Thread Peter Maydell
On 31 July 2014 17:50, Christoffer Dall wrote: > On Thu, Jul 31, 2014 at 05:45:28PM +0100, Peter Maydell wrote: >> Consider the case where the reset state of the system is >> "CPU 0 running, CPUs 1..N stopped", and we're doing an >> incoming migration to a state where all CPUs are running. >> In t

Re: [PATCH V2 1/4] x86/kvm: Resolve some missing-initializers warnings

2014-07-31 Thread Paolo Bonzini
Il 31/07/2014 18:35, Rustad, Mark D ha scritto: > I agree it is ugly. .name = NULL would be enough to silence it. Would > that be better? At the moment I am thinking of this as a test case > for the other 1000 { } and {0} initializers in the kernel that are > throwing warnings. I know we both agree

Re: [PATCH] arm64: KVM: export current vcpu->pause state via pseudo regs

2014-07-31 Thread Paolo Bonzini
Il 09/07/2014 15:55, Alex Bennée ha scritto: > To cleanly restore an SMP VM we need to ensure that the current pause > state of each vcpu is correctly recorded. Things could get confused if > the CPU starts running after migration restore completes when it was > paused before it state was captured.

Re: [PATCH] arm64: KVM: export current vcpu->pause state via pseudo regs

2014-07-31 Thread Peter Maydell
On 31 July 2014 17:57, Paolo Bonzini wrote: > Il 09/07/2014 15:55, Alex Bennée ha scritto: >> To cleanly restore an SMP VM we need to ensure that the current pause >> state of each vcpu is correctly recorded. Things could get confused if >> the CPU starts running after migration restore completes

[PATCH V3 3/4] x86/kvm: Resolve shadow warnings in macro expansion

2014-07-31 Thread Mark D Rustad
Resolve shadow warnings that appear in W=2 builds. Instead of using ret to hold the return pointer, save the length in a new variable saved_len and compute the pointer on exit. This also resolves a very technical error, in that ret was declared as a const char *, when it really was a char * const,

Re: [PATCH] arm64: KVM: export current vcpu->pause state via pseudo regs

2014-07-31 Thread Paolo Bonzini
Il 31/07/2014 19:04, Peter Maydell ha scritto: > On 31 July 2014 17:57, Paolo Bonzini wrote: >> Il 09/07/2014 15:55, Alex Bennée ha scritto: >>> To cleanly restore an SMP VM we need to ensure that the current pause >>> state of each vcpu is correctly recorded. Things could get confused if >>> the

Re: [PATCH] arm64: KVM: export current vcpu->pause state via pseudo regs

2014-07-31 Thread Peter Maydell
On 31 July 2014 18:21, Paolo Bonzini wrote: > What does ARM do if you have a WFI while interrupts are disabled? On > x86 after "cli;hlt" only an NMI will wake you up. With spurious > wakeups, it's pretty much guaranteed that you will break such "cli;hlt" > sequences. The architecture mandates s

Re: [PATCH] arm64: KVM: export current vcpu->pause state via pseudo regs

2014-07-31 Thread Will Deacon
On Thu, Jul 31, 2014 at 06:36:35PM +0100, Peter Maydell wrote: > On 31 July 2014 18:21, Paolo Bonzini wrote: > > What does ARM do if you have a WFI while interrupts are disabled? On > > x86 after "cli;hlt" only an NMI will wake you up. With spurious > > wakeups, it's pretty much guaranteed that

Re: [PATCH] KVM: x86: Remove redundant and incorrect cpl check on task-switch

2014-07-31 Thread Nadav Amit
cc'ing the kvm mailing list that was mistakenly omitted. On 7/30/14 9:57 AM, Nadav Amit wrote: > Task-switch emulation checks the privilage level prior to performing the > task-switch. This check is incorrect in the case of task-gates, in which the > tss.dpl is ignored, and can cause superfluous

Re: [PATCH] KVM: x86: cluster mode broadcast does not work

2014-07-31 Thread Nadav Amit
cc'ing the kvm mailing list that was mistakenly omitted. On 7/30/14 10:03 AM, Nadav Amit wrote: > Local-apic enables cluster mode broadcast. As Intel SDM 10.6.2.2 says: > "Broadcast to all local APICs is achieved by setting all destination bits to > one." This patch enables cluster mode broadcast.

Re: Verifying Execution Integrity in Untrusted hypervisors

2014-07-31 Thread Shiva V
Jan Kiszka siemens.com> writes: > > On 2014-07-28 23:17, Nakajima, Jun wrote: > > On Mon, Jul 28, 2014 at 1:27 PM, Paolo Bonzini redhat.com> wrote: > >> Il 28/07/2014 20:31, Jan Kiszka ha scritto: > >>> The hypervisor has full control of and insight into the guest vCPU > >>> state. Only protec

Re: hang after seabios

2014-07-31 Thread Zetan Drableg
Hi Richard thanks for the info. I took the strace approach and ran into this looping over and over again. Is it failing to get time? timer_gettime(0x8, {it_interval={0, 0}, it_value={0, 0}}) = 0 timer_settime(0x8, 0, {it_interval={0, 0}, it_value={0, 25}}, NULL) = 0 timer_gettime(0x8, {it_inte

Re: hang after seabios

2014-07-31 Thread Richard W.M. Jones
On Thu, Jul 31, 2014 at 12:12:26PM -0700, Zetan Drableg wrote: > Hi Richard thanks for the info. > I took the strace approach and ran into this looping over and over again. > Is it failing to get time? > > timer_gettime(0x8, {it_interval={0, 0}, it_value={0, 0}}) = 0 > timer_settime(0x8, 0, {it_in

[PATCH] arm64: bump MAX_MASTER_STREAMIDS from 16 to 32

2014-07-31 Thread Joel Schopp
I recently ran into a situation where I needed more than 16 stream ids for an smmu on an AMD SOC, but we are currently limited to 16 by: #define MAX_MASTER_STREAMIDSMAX_PHANDLE_ARGS #define MAX_PHANDLE_ARGS 16 I expect others will run into this in the future as more advanced SOCs start to

Re: [PATCH 6/6] KVM: PPC: BOOKE: Emulate debug registers and exception

2014-07-31 Thread Scott Wood
On Thu, 2014-07-31 at 01:15 -0500, Bhushan Bharat-R65777 wrote: > > > -Original Message- > > From: Wood Scott-B07421 > > Sent: Thursday, July 31, 2014 8:18 AM > > To: Bhushan Bharat-R65777 > > Cc: ag...@suse.de; kvm-...@vger.kernel.org; kvm@vger.kernel.org; Yoder > > Stuart- > > B08248 >

Integrity in untrusted environments

2014-07-31 Thread Shiva V
Hello, I am exploring ideas to implement a service inside a virtual machine on untrusted hypervisors under current cloud infrastructures. Particularly, I am interested how one can verify the integrity of the service in an environment where hypervisor is not trusted. This is my setup. 1. I have

Re: Integrity in untrusted environments

2014-07-31 Thread Nakajima, Jun
On Thu, Jul 31, 2014 at 2:25 PM, Shiva V wrote: > Hello, > I am exploring ideas to implement a service inside a virtual machine on > untrusted hypervisors under current cloud infrastructures. > Particularly, I am interested how one can verify the integrity of the > service in an environment wher

Re: Integrity in untrusted environments

2014-07-31 Thread Shiva V
Nakajima, Jun intel.com> writes: > On Thu, Jul 31, 2014 at 2:25 PM, Shiva V gmail.com> wrote: Hello, I am exploring ideas to implement a service inside a virtual machine on untrusted hypervisors under current cloud infrastructures. Particularly, I am interested how one can verify the integr

RE: [PATCH] KVM: nVMX: nested TPR shadow/threshold emulation

2014-07-31 Thread Zhang, Yang Z
Paolo Bonzini wrote on 2014-07-31: > Il 31/07/2014 10:03, Wanpeng Li ha scritto: >>> One thing: >>> + if (nested_cpu_has(vmcs12, CPU_BASED_TPR_SHADOW)) + vmcs_write32(TPR_THRESHOLD, vmcs12->tpr_threshold); >>> >>> I think you can just do this write unconditionally, since most

Query: Is it possible to lose interrupts between vhost and virtio_net during migration?

2014-07-31 Thread Zhangjie (HZ)
Thanks,MST! :-) I will change the order back and have a test again. On 2014/7/31 22:37, Michael S. Tsirkin wrote: > On Thu, Jul 31, 2014 at 04:31:00PM +0200, Michael S. Tsirkin wrote: >> On Thu, Jul 31, 2014 at 07:47:24PM +0800, Zhangjie (HZ) wrote: >>> [The test scenario]: >>> >>> Doing migration

[PATCH v3] powerpc/kvm: support to handle sw breakpoint

2014-07-31 Thread Madhavan Srinivasan
This patch adds kernel side support for software breakpoint. Design is that, by using an illegal instruction, we trap to hypervisor via Emulation Assistance interrupt, where we check for the illegal instruction and accordingly we return to Host or Guest. Patch also adds support for software breakpo

Re: [PATCH] KVM: nVMX: nested TPR shadow/threshold emulation

2014-07-31 Thread Paolo Bonzini
Il 01/08/2014 02:57, Zhang, Yang Z ha scritto: > > TPR_THRESHOLD will be likely written as zero, but the processor will > > never use it anyway. It's just a small optimization because > > nested_cpu_has(vmcs12, CPU_BASED_TPR_SHADOW) will almost always be true. > > Theoretically, you are right. Bu

RE: [PATCH] KVM: nVMX: nested TPR shadow/threshold emulation

2014-07-31 Thread Zhang, Yang Z
Paolo Bonzini wrote on 2014-08-01: > Il 01/08/2014 02:57, Zhang, Yang Z ha scritto: >>> TPR_THRESHOLD will be likely written as zero, but the processor >>> will never use it anyway. It's just a small optimization because >>> nested_cpu_has(vmcs12, CPU_BASED_TPR_SHADOW) will almost always > be true

Re: Integrity in untrusted environments

2014-07-31 Thread Paolo Bonzini
Il 31/07/2014 23:25, Shiva V ha scritto: > Hello, > I am exploring ideas to implement a service inside a virtual machine on > untrusted hypervisors under current cloud infrastructures. > Particularly, I am interested how one can verify the integrity of the > service in an environment where hype