Re: [[RFC] KVM-S390: Provide guest TOD Clock Get/Set Controls

2014-10-09 Thread Christian Borntraeger
Am 08.10.2014 16:55, schrieb Alexander Graf: > > > On 08.10.14 16:09, Jason Herne wrote: >> Christian Borntraeger wrote on 09/22/2014 >> 05:08:34 AM: >> ... >>> Actually, I would expect something different (more or less something >>> like standby/resume). >>> >>> In fact Jasons code that we have

[PATCH] vfio/pci: make MSI handling optional

2014-10-09 Thread Arnd Bergmann
A recent bug fix to the MSIx handling in vfio added references to functions that may not be defined if MSI is disabled in the kernel, resulting in this link error: drivers/built-in.o: In function `vfio_msi_set_vector_signal': :(.text+0x450808): undefined reference to `get_cached_msi_msg' :(.text+0

Re: [PATCH] vhost-scsi: Take configfs group dependency during VHOST_SCSI_SET_ENDPOINT

2014-10-09 Thread Paolo Bonzini
Il 09/10/2014 06:14, Nicholas A. Bellinger ha scritto: > AFAICT from qemu code, the ioctl VHOST_SCSI_CLEAR_ENDPOINT is always > called during shutdown in order to release the endpoint and drop this > new configfs dependency. As far as I can see, the only path leading to the ioctl is vhost_scsi_set

[PATCH] kvm: vfio: fix unregister kvm_device_ops of vfio

2014-10-09 Thread Wanpeng Li
WARNING: CPU: 1 PID: 10358 at /root/cathy/kvm/arch/x86/kvm/../../../virt/kvm/kvm_main.c:3289 kvm_init+0x234/0x282 [kvm]() Modules linked in: kvm_intel(O+) kvm(O) nfsv3 nfs_acl auth_rpcgss oid_registry nfsv4 dns_resolver nfs fscache lockd sunrpc pci_stub bridge stp llc autofs4 8021q cpufreq_onde

Re: [PATCH 1/4] mm: gup: add FOLL_TRIED

2014-10-09 Thread Peter Zijlstra
On Wed, Oct 01, 2014 at 10:56:34AM +0200, Andrea Arcangeli wrote: > From: Andres Lagar-Cavilla This needs a changelog > Reviewed-by: Radim Krčmář > Signed-off-by: Andres Lagar-Cavilla > Signed-off-by: Andrea Arcangeli > --- > include/linux/mm.h | 1 + > mm/gup.c | 4 > 2 f

Re: [PATCH] kvm: vfio: fix unregister kvm_device_ops of vfio

2014-10-09 Thread Paolo Bonzini
Il 09/10/2014 12:30, Wanpeng Li ha scritto: > WARNING: CPU: 1 PID: 10358 at > /root/cathy/kvm/arch/x86/kvm/../../../virt/kvm/kvm_main.c:3289 > kvm_init+0x234/0x282 [kvm]() > Modules linked in: kvm_intel(O+) kvm(O) nfsv3 nfs_acl auth_rpcgss > oid_registry nfsv4 dns_resolver nfs fscache lockd sunr

Re: [PATCH 2/4] mm: gup: add get_user_pages_locked and get_user_pages_unlocked

2014-10-09 Thread Peter Zijlstra
On Wed, Oct 01, 2014 at 10:56:35AM +0200, Andrea Arcangeli wrote: > +static inline long __get_user_pages_locked(struct task_struct *tsk, > +struct mm_struct *mm, > +unsigned long start, > +

Re: [PATCH] vhost-scsi: Take configfs group dependency during VHOST_SCSI_SET_ENDPOINT

2014-10-09 Thread Paolo Bonzini
Il 09/10/2014 10:49, Paolo Bonzini ha scritto: > > It does not happen if you close QEMU with SIGTERM, ctrl-c, or with the > "quit" command, because no attempt is done to bring down the VM data > structures (or free memory, or close file descriptors) in case of a > fatal exit. The kernel should do

Re: [PATCH 2/4] mm: gup: add get_user_pages_locked and get_user_pages_unlocked

2014-10-09 Thread Peter Zijlstra
On Wed, Oct 01, 2014 at 10:56:35AM +0200, Andrea Arcangeli wrote: > +static inline long __get_user_pages_locked(struct task_struct *tsk, > +struct mm_struct *mm, > +unsigned long start, > +

Re: [PATCH 3/4] mm: gup: use get_user_pages_fast and get_user_pages_unlocked

2014-10-09 Thread Peter Zijlstra
On Wed, Oct 01, 2014 at 10:56:36AM +0200, Andrea Arcangeli wrote: > Just an optimization. Does it make sense to split the thing in two? One where you apply _unlocked and then one where you apply _fast? -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to ma

Re: [PATCH v2 1/3] arm64: KVM: Implement 48 VA support for KVM EL2 and Stage-2

2014-10-09 Thread Christoffer Dall
On Wed, Oct 08, 2014 at 10:47:04AM +0100, Catalin Marinas wrote: > On Tue, Oct 07, 2014 at 08:39:54PM +0100, Christoffer Dall wrote: > > I came up with the following based on your feedback, but I personally > > don't find it a lot easier to read than what I had already. Suggestions > > are welcome

[PATCH kvm-kmod 1/3] FOLL_TRIED is not available before 3.18

2014-10-09 Thread Paolo Bonzini
Just do not pass it, which is roughly the same behavior that KVM had until 3.17. Passing a non-existing flag could have unanticipated effects. Signed-off-by: Paolo Bonzini --- external-module-compat-comm.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/external-module-compa

[PATCH kvm-kmod 0/3] First round of kvm-kmod fixes for 3.18 merge window

2014-10-09 Thread Paolo Bonzini
Patches are relative to next branch of kvm-kmod.git. Paolo Paolo Bonzini (3): FOLL_TRIED is not available before 3.18 the MMU notifier clear_flush_young callback changed in 3.18 redefine is_zero_pfn to not rely on zero_pfn external-module-compat-comm.h | 5 - sync

[PATCH kvm-kmod 2/3] the MMU notifier clear_flush_young callback changed in 3.18

2014-10-09 Thread Paolo Bonzini
Passing end=start+1 is the easiest way to call the new callback from the old API. That is how kvm_handle_hva is implemented on top of kvm_handle_hva_range. So, now that kvm_age_hva calls kvm_handle_hva_range instead of kvm_handle_hva, you can apply the same trick to the caller of kvm_age_hva. Si

[PATCH kvm-kmod 3/3] redefine is_zero_pfn to not rely on zero_pfn

2014-10-09 Thread Paolo Bonzini
zero_pfn is not exported before 3.17. Signed-off-by: Paolo Bonzini --- external-module-compat-comm.h | 3 +++ 1 file changed, 3 insertions(+) diff --git a/external-module-compat-comm.h b/external-module-compat-comm.h index dff603f..c20b1ed 100644 --- a/external-module-compat-comm.h +++ b/extern

Re: [PATCH v2 1/3] arm64: KVM: Implement 48 VA support for KVM EL2 and Stage-2

2014-10-09 Thread Catalin Marinas
On Thu, Oct 09, 2014 at 12:01:37PM +0100, Christoffer Dall wrote: > On Wed, Oct 08, 2014 at 10:47:04AM +0100, Catalin Marinas wrote: > > On Tue, Oct 07, 2014 at 08:39:54PM +0100, Christoffer Dall wrote: > > > +static inline int kvm_prealloc_hwpgd(struct kvm *kvm, pgd_t *pgd) > > > +{ > > > +

Re: [PATCH 5/5] KVM: x86: Using TSC deadline may cause multiple interrupts by user writes

2014-10-09 Thread Nadav Amit
On Oct 8, 2014, at 1:06 PM, Radim Krčmář wrote: > > And it would get one from the currently pending timer. > > What about the following patch? > (The introduced else branch could use some abstractions.) > > --8<--- > KVM: x86: fix deadline tsc interrupt injection > > The check in kvm_set_lap

[PATCH v2 2/5] KVM: x86: Emulator performs code segment checks on read access

2014-10-09 Thread Nadav Amit
When read access is performed using a readable code segment, the "conforming" and "non-conforming" checks should not be done. As a result, read using non-conforming readable code segment fails. This is according to Intel SDM 5.6.1 ("Accessing Data in Code Segments"). One exception is the case of

[PATCH 0/3] arm/arm64: Add dirty page logging for ARMv8

2014-10-09 Thread Mario Smarduch
This patch series adds support for ARMv8 dirty page logging. It applies on top of ARMv7 patch series. Similar ARMv8 to dirty page log read is moved to generic layer and tlb flush has architecture specific flush. Testing: - ARMv8 - Tested on Foundation Model. - ARMv7 - retested on Exynos 5

[PATCH 1/3] arm64: ARMv8 headers changes for dirty page logging

2014-10-09 Thread Mario Smarduch
This patch introduces header updates for ARMv8 dirty page logging. Signed-off-by: Mario Smarduch --- arch/arm64/include/asm/kvm_asm.h | 1 + arch/arm64/include/asm/kvm_host.h | 1 + arch/arm64/include/asm/kvm_mmu.h | 20 arch/arm64/include/asm/pgtable-hwde

[PATCH 3/3] arm/arm64: Enable Dirty Page logging for ARMv8 move log read, tlb flush to generic code

2014-10-09 Thread Mario Smarduch
This patch enables ARMv8 dirty page logging and unifies ARMv7/ARMv8 code. Signed-off-by: Mario Smarduch --- arch/arm/include/asm/kvm_host.h | 12 arch/arm/kvm/arm.c | 9 - arch/arm/kvm/mmu.c | 17 +++-- arch/arm64/kvm/Kconfig |

[PATCH 2/3] arm64: Add HYP interface to flush VM Stage 1/2 TLB entires

2014-10-09 Thread Mario Smarduch
This patch adds HYP VM TLB FLush function. Signed-off-by: Mario Smarduch --- arch/arm64/kvm/hyp.S | 22 ++ 1 file changed, 22 insertions(+) diff --git a/arch/arm64/kvm/hyp.S b/arch/arm64/kvm/hyp.S index b0d1512..117a91c 100644 --- a/arch/arm64/kvm/hyp.S +++ b/arch/arm64/kvm/