* Re: [Qemu-devel] [PATCH 05/10] hyperv: add synic message delivery [not found] ` <20180921082217.29481-6-rkagan@virtuozzo.com> @ 2018-10-03 11:06 ` Paolo Bonzini 2018-10-03 13:01 ` Roman Kagan 0 siblings, 1 reply; 8+ messages in thread From: Paolo Bonzini @ 2018-10-03 11:06 UTC (permalink / raw) To: Roman Kagan, qemu-devel Cc: Vijayabhaskar Balakrishna, Eduardo Habkost, Michael S. Tsirkin, Konrad Rzeszutek Wilk, Venu Busireddy, Liran Alon, Igor Mammedov, Si-Wei Liu, Boris Ostrovsky, Karl Heubaum On 21/09/2018 10:22, Roman Kagan wrote: > +typedef struct HvSintStagedMesage { > + /* message content staged by hyperv_post_msg */ > + struct hyperv_message msg; > + /* callback + data (r/o) to complete the processing in a BH */ > + HvSintMsgCb cb; > + void *cb_data; > + /* message posting status filled by cpu_post_msg */ > + int status; > + /* passing the buck: */ > + enum { > + /* initial state */ > + HV_STAGED_MSG_FREE, > + /* > + * hyperv_post_msg (e.g. in main loop) grabs the staged area (FREE -> > + * BUSY), copies msg, and schedules cpu_post_msg on the assigned cpu > + */ > + HV_STAGED_MSG_BUSY, > + /* > + * cpu_post_msg (vcpu thread) tries to copy staged msg to msg slot, > + * notify the guest, records the status, marks the posting done (BUSY > + * -> POSTED), and schedules sint_msg_bh BH > + */ > + HV_STAGED_MSG_POSTED, > + /* > + * sint_msg_bh (BH) verifies that the posting is done, runs the > + * callback, and starts over (POSTED -> FREE) > + */ > + } state; > +} HvSintStagedMesage; s/Mesage/Message/ > + if (atomic_read(&staged_msg->state) != HV_STAGED_MSG_POSTED) { > + /* status nor ready yet (spurious ack from guest?), ignore */ > + return; > + } > + Can this actually happen? It seems scary... Paolo ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [Qemu-devel] [PATCH 05/10] hyperv: add synic message delivery 2018-10-03 11:06 ` [Qemu-devel] [PATCH 05/10] hyperv: add synic message delivery Paolo Bonzini @ 2018-10-03 13:01 ` Roman Kagan 0 siblings, 0 replies; 8+ messages in thread From: Roman Kagan @ 2018-10-03 13:01 UTC (permalink / raw) To: Paolo Bonzini Cc: qemu-devel@nongnu.org, Vijayabhaskar Balakrishna, Eduardo Habkost, Michael S. Tsirkin, Konrad Rzeszutek Wilk, Venu Busireddy, Liran Alon, Igor Mammedov, Si-Wei Liu, Boris Ostrovsky, Karl Heubaum On Wed, Oct 03, 2018 at 01:06:58PM +0200, Paolo Bonzini wrote: > On 21/09/2018 10:22, Roman Kagan wrote: > > +typedef struct HvSintStagedMesage { > > + /* message content staged by hyperv_post_msg */ > > + struct hyperv_message msg; > > + /* callback + data (r/o) to complete the processing in a BH */ > > + HvSintMsgCb cb; > > + void *cb_data; > > + /* message posting status filled by cpu_post_msg */ > > + int status; > > + /* passing the buck: */ > > + enum { > > + /* initial state */ > > + HV_STAGED_MSG_FREE, > > + /* > > + * hyperv_post_msg (e.g. in main loop) grabs the staged area (FREE -> > > + * BUSY), copies msg, and schedules cpu_post_msg on the assigned cpu > > + */ > > + HV_STAGED_MSG_BUSY, > > + /* > > + * cpu_post_msg (vcpu thread) tries to copy staged msg to msg slot, > > + * notify the guest, records the status, marks the posting done (BUSY > > + * -> POSTED), and schedules sint_msg_bh BH > > + */ > > + HV_STAGED_MSG_POSTED, > > + /* > > + * sint_msg_bh (BH) verifies that the posting is done, runs the > > + * callback, and starts over (POSTED -> FREE) > > + */ > > + } state; > > +} HvSintStagedMesage; > > s/Mesage/Message/ :facepalm: > > + if (atomic_read(&staged_msg->state) != HV_STAGED_MSG_POSTED) { > > + /* status nor ready yet (spurious ack from guest?), ignore */ > > + return; > > + } > > + > > Can this actually happen? It seems scary... I don't see off-hand what can stop the guest from wrmsr HV_X64_MSR_EOM at an arbitrary moment, which AFAICS will result in this eventfd being signaled. I haven't seen this codepath being taken in real life but I think it provides enough protection for the internal state from being screwed up by such an unexpected signal. Thanks, Roman. ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [Qemu-devel] [PATCH 00/10] hyperv: add connection infrastructure [not found] <20180921082217.29481-1-rkagan@virtuozzo.com> [not found] ` <20180921082217.29481-6-rkagan@virtuozzo.com> @ 2018-10-03 11:12 ` Paolo Bonzini 2018-10-03 14:25 ` Roman Kagan [not found] ` <20180921082217.29481-4-rkagan@virtuozzo.com> 2 siblings, 1 reply; 8+ messages in thread From: Paolo Bonzini @ 2018-10-03 11:12 UTC (permalink / raw) To: Roman Kagan, qemu-devel Cc: Vijayabhaskar Balakrishna, Eduardo Habkost, Michael S. Tsirkin, Konrad Rzeszutek Wilk, Venu Busireddy, Liran Alon, Igor Mammedov, Si-Wei Liu, Boris Ostrovsky, Karl Heubaum On 21/09/2018 10:22, Roman Kagan wrote: > This series introduces the infrastructure to send and receive Hyper-V > messages and events. > > More specifically, > > - SynIC is turned into a full-fledged device managing the memory regions > used for QEMU->guest communication > - machinery is introduced to post messages and signal events to the > guest > - infrastructure is added to subscribe to messages and events from the > guest, and to dispatch the received messages and events to the > subscribers > > Based-on: 20180921082041.29380-1-rkagan@virtuozzo.com > > Roman Kagan (10): > hyperv:synic: split capability testing and setting > hyperv: qom-ify SynIC > hyperv: only add SynIC in compatible configurations > hyperv: make overlay pages for SynIC > hyperv: add synic message delivery > hyperv: add synic event flag signaling > hyperv: process SIGNAL_EVENT hypercall > hyperv: add support for KVM_HYPERV_EVENTFD > hyperv: process POST_MESSAGE hypercall > hyperv_testdev: add SynIC message and event testmodes > > include/hw/hyperv/hyperv-proto.h | 1 + > include/hw/hyperv/hyperv.h | 58 +++- > include/hw/i386/pc.h | 8 + > target/i386/cpu.h | 1 + > target/i386/hyperv.h | 4 + > hw/hyperv/hyperv.c | 542 ++++++++++++++++++++++++++++++- > hw/misc/hyperv_testdev.c | 165 +++++++++- > target/i386/cpu.c | 2 + > target/i386/hyperv-stub.c | 13 + > target/i386/hyperv.c | 54 ++- > target/i386/kvm.c | 45 ++- > target/i386/machine.c | 9 + > 12 files changed, 872 insertions(+), 30 deletions(-) > I queued all three series, though if I were to post a pull request now I'd stop before "hyperv: add synic message delivery". Paolo ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [Qemu-devel] [PATCH 00/10] hyperv: add connection infrastructure 2018-10-03 11:12 ` [Qemu-devel] [PATCH 00/10] hyperv: add connection infrastructure Paolo Bonzini @ 2018-10-03 14:25 ` Roman Kagan 2018-10-03 14:35 ` Paolo Bonzini 0 siblings, 1 reply; 8+ messages in thread From: Roman Kagan @ 2018-10-03 14:25 UTC (permalink / raw) To: Paolo Bonzini Cc: qemu-devel@nongnu.org, Vijayabhaskar Balakrishna, Eduardo Habkost, Michael S. Tsirkin, Konrad Rzeszutek Wilk, Venu Busireddy, Liran Alon, Igor Mammedov, Si-Wei Liu, Boris Ostrovsky, Karl Heubaum On Wed, Oct 03, 2018 at 01:12:10PM +0200, Paolo Bonzini wrote: > On 21/09/2018 10:22, Roman Kagan wrote: > > This series introduces the infrastructure to send and receive Hyper-V > > messages and events. > > > > More specifically, > > > > - SynIC is turned into a full-fledged device managing the memory regions > > used for QEMU->guest communication > > - machinery is introduced to post messages and signal events to the > > guest > > - infrastructure is added to subscribe to messages and events from the > > guest, and to dispatch the received messages and events to the > > subscribers > > > > Based-on: 20180921082041.29380-1-rkagan@virtuozzo.com > > > > Roman Kagan (10): > > hyperv:synic: split capability testing and setting > > hyperv: qom-ify SynIC > > hyperv: only add SynIC in compatible configurations > > hyperv: make overlay pages for SynIC > > hyperv: add synic message delivery > > hyperv: add synic event flag signaling > > hyperv: process SIGNAL_EVENT hypercall > > hyperv: add support for KVM_HYPERV_EVENTFD > > hyperv: process POST_MESSAGE hypercall > > hyperv_testdev: add SynIC message and event testmodes > > > > include/hw/hyperv/hyperv-proto.h | 1 + > > include/hw/hyperv/hyperv.h | 58 +++- > > include/hw/i386/pc.h | 8 + > > target/i386/cpu.h | 1 + > > target/i386/hyperv.h | 4 + > > hw/hyperv/hyperv.c | 542 ++++++++++++++++++++++++++++++- > > hw/misc/hyperv_testdev.c | 165 +++++++++- > > target/i386/cpu.c | 2 + > > target/i386/hyperv-stub.c | 13 + > > target/i386/hyperv.c | 54 ++- > > target/i386/kvm.c | 45 ++- > > target/i386/machine.c | 9 + > > 12 files changed, 872 insertions(+), 30 deletions(-) > > > > I queued all three series, though if I were to post a pull request now > I'd stop before "hyperv: add synic message delivery". To make sure I interpret this correctly: do the remaining patches need more work beside the things you've commented on? Also do you want me to post the corrected stuff as incremental fixups or as a full-fledged respin? In the latter case should I assume your r-b on all patches before that one? Thanks, Roman. ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [Qemu-devel] [PATCH 00/10] hyperv: add connection infrastructure 2018-10-03 14:25 ` Roman Kagan @ 2018-10-03 14:35 ` Paolo Bonzini 0 siblings, 0 replies; 8+ messages in thread From: Paolo Bonzini @ 2018-10-03 14:35 UTC (permalink / raw) To: Roman Kagan, qemu-devel, Vijayabhaskar Balakrishna, Eduardo Habkost, Michael S. Tsirkin, Konrad Rzeszutek Wilk, Venu Busireddy, Liran Alon, Igor Mammedov, Si-Wei Liu, Boris Ostrovsky, Karl Heubaum On 03/10/2018 16:25, Roman Kagan wrote: >> I queued all three series, though if I were to post a pull request now >> I'd stop before "hyperv: add synic message delivery". > To make sure I interpret this correctly: do the remaining patches need > more work beside the things you've commented on? > > Also do you want me to post the corrected stuff as incremental fixups or > as a full-fledged respin? In the latter case should I assume your r-b > on all patches before that one? No need to do anything, I just wanted an explanation of patch 5 (I can fix the "Mesage" thing myself). Paolo ^ permalink raw reply [flat|nested] 8+ messages in thread
[parent not found: <20180921082217.29481-4-rkagan@virtuozzo.com>]
* Re: [Qemu-devel] [PATCH 03/10] hyperv: only add SynIC in compatible configurations [not found] ` <20180921082217.29481-4-rkagan@virtuozzo.com> @ 2018-11-20 13:41 ` Eduardo Habkost 2018-11-26 14:45 ` Igor Mammedov 1 sibling, 0 replies; 8+ messages in thread From: Eduardo Habkost @ 2018-11-20 13:41 UTC (permalink / raw) To: Roman Kagan Cc: qemu-devel, Vijayabhaskar Balakrishna, Konrad Rzeszutek Wilk, Michael S. Tsirkin, Venu Busireddy, Liran Alon, Paolo Bonzini, Si-Wei Liu, Igor Mammedov, Boris Ostrovsky, Karl Heubaum On Fri, Sep 21, 2018 at 11:22:10AM +0300, Roman Kagan wrote: > Certain configurations do not allow SynIC to be used in QEMU. In > particular, > > - when hyperv_vpindex is off, SINT routes can't be used as they refer to > the destination vCPU by vp_index > > - older KVM (which doesn't expose KVM_CAP_HYPERV_SYNIC2) zeroes out > SynIC message and event pages on every msr load, breaking migration > > OTOH in-KVM users of SynIC -- SynIC timers -- do work in those > configurations, and we shouldn't stop the guest from using them. > > To cover both scenarios, introduce an X86CPU property that makes CPU > init code to skip creation of the SynIC object (and thus disables any > SynIC use in QEMU) but keeps the KVM part of the SynIC working. > The property is clear by default but is set via compat logic for older > machine types. > > As a result, when hv_synic and a modern machine type are specified, QEMU > will refuse to run unless vp_index is on and the kernel is recent > enough. OTOH with an older machine type QEMU will run fine with > hv_synic=on against an older kernel and/or without vp_index enabled but > will disallow the in-QEMU uses of SynIC (in e.g. VMBus). > > Signed-off-by: Roman Kagan <rkagan@virtuozzo.com> > --- > include/hw/i386/pc.h | 8 ++++++++ > target/i386/cpu.h | 1 + > target/i386/cpu.c | 2 ++ > target/i386/kvm.c | 30 ++++++++++++++++++++++-------- > 4 files changed, 33 insertions(+), 8 deletions(-) > > diff --git a/include/hw/i386/pc.h b/include/hw/i386/pc.h > index 6894f37df1..dfe6746692 100644 > --- a/include/hw/i386/pc.h > +++ b/include/hw/i386/pc.h > @@ -294,6 +294,14 @@ int e820_add_entry(uint64_t, uint64_t, uint32_t); > int e820_get_num_entries(void); > bool e820_get_entry(int, uint32_t, uint64_t *, uint64_t *); > > +#define PC_COMPAT_3_0 \ > + HW_COMPAT_3_0 \ > + {\ > + .driver = TYPE_X86_CPU,\ > + .property = "x-hv-synic-kvm-only",\ > + .value = "on",\ > + } Oops. This macro does nothing if the 3.1 machine-types aren't updated to use it. This patch breaks compatibility on pc-*-3.1. > [...] -- Eduardo ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [Qemu-devel] [PATCH 03/10] hyperv: only add SynIC in compatible configurations [not found] ` <20180921082217.29481-4-rkagan@virtuozzo.com> 2018-11-20 13:41 ` [Qemu-devel] [PATCH 03/10] hyperv: only add SynIC in compatible configurations Eduardo Habkost @ 2018-11-26 14:45 ` Igor Mammedov 2018-11-26 15:17 ` Roman Kagan 1 sibling, 1 reply; 8+ messages in thread From: Igor Mammedov @ 2018-11-26 14:45 UTC (permalink / raw) To: Roman Kagan Cc: qemu-devel, Vijayabhaskar Balakrishna, Eduardo Habkost, Konrad Rzeszutek Wilk, Michael S. Tsirkin, Venu Busireddy, Liran Alon, Paolo Bonzini, Si-Wei Liu, Boris Ostrovsky, Karl Heubaum, Vitaly Kuznetsov On Fri, 21 Sep 2018 11:22:10 +0300 Roman Kagan <rkagan@virtuozzo.com> wrote: > Certain configurations do not allow SynIC to be used in QEMU. In > particular, > > - when hyperv_vpindex is off, SINT routes can't be used as they refer to > the destination vCPU by vp_index > > - older KVM (which doesn't expose KVM_CAP_HYPERV_SYNIC2) zeroes out > SynIC message and event pages on every msr load, breaking migration > > OTOH in-KVM users of SynIC -- SynIC timers -- do work in those > configurations, and we shouldn't stop the guest from using them. > > To cover both scenarios, introduce an X86CPU property that makes CPU > init code to skip creation of the SynIC object (and thus disables any > SynIC use in QEMU) but keeps the KVM part of the SynIC working. > The property is clear by default but is set via compat logic for older > machine types. > > As a result, when hv_synic and a modern machine type are specified, QEMU > will refuse to run unless vp_index is on and the kernel is recent > enough. OTOH with an older machine type QEMU will run fine with > hv_synic=on against an older kernel and/or without vp_index enabled but > will disallow the in-QEMU uses of SynIC (in e.g. VMBus). > > Signed-off-by: Roman Kagan <rkagan@virtuozzo.com> With current upstream and x-hv-synic-kvm-only=on QEMU will SIGSEGV. Problem was unnoticed since added compat property wasn't actually used until much later commit 4a93722f9c hw/i386: add pc-i440fx-3.1 & pc-q35-3.1 which put compat property in use. qemu-system-x86_64 -machine pc-i440fx-2.10,accel=kvm \ -cpu host,-vmx,hv-relaxed,hv_spinlocks=0x1fff,hv-vpindex,hv-synic simpler reproducer: qemu-system-x86_64 -enable-kvm -cpu host,hv-synic,x-hv-synic-kvm-only=on Reported-by: Vitaly Kuznetsov <vkuznets@redhat.com> > --- > include/hw/i386/pc.h | 8 ++++++++ > target/i386/cpu.h | 1 + > target/i386/cpu.c | 2 ++ > target/i386/kvm.c | 30 ++++++++++++++++++++++-------- > 4 files changed, 33 insertions(+), 8 deletions(-) > > diff --git a/include/hw/i386/pc.h b/include/hw/i386/pc.h > index 6894f37df1..dfe6746692 100644 > --- a/include/hw/i386/pc.h > +++ b/include/hw/i386/pc.h > @@ -294,6 +294,14 @@ int e820_add_entry(uint64_t, uint64_t, uint32_t); > int e820_get_num_entries(void); > bool e820_get_entry(int, uint32_t, uint64_t *, uint64_t *); > > +#define PC_COMPAT_3_0 \ > + HW_COMPAT_3_0 \ > + {\ > + .driver = TYPE_X86_CPU,\ > + .property = "x-hv-synic-kvm-only",\ > + .value = "on",\ > + } > + > #define PC_COMPAT_2_12 \ > HW_COMPAT_2_12 \ > {\ > diff --git a/target/i386/cpu.h b/target/i386/cpu.h > index b572a8e4aa..e2e87dc13f 100644 > --- a/target/i386/cpu.h > +++ b/target/i386/cpu.h > @@ -1376,6 +1376,7 @@ struct X86CPU { > bool hyperv_vpindex; > bool hyperv_runtime; > bool hyperv_synic; > + bool hyperv_synic_kvm_only; > bool hyperv_stimer; > bool hyperv_frequencies; > bool hyperv_reenlightenment; > diff --git a/target/i386/cpu.c b/target/i386/cpu.c > index f24295e6e4..9c29c5db81 100644 > --- a/target/i386/cpu.c > +++ b/target/i386/cpu.c > @@ -5575,6 +5575,8 @@ static Property x86_cpu_properties[] = { > * to the specific Windows version being used." > */ > DEFINE_PROP_INT32("x-hv-max-vps", X86CPU, hv_max_vps, -1), > + DEFINE_PROP_BOOL("x-hv-synic-kvm-only", X86CPU, hyperv_synic_kvm_only, > + false), > DEFINE_PROP_END_OF_LIST() > }; > > diff --git a/target/i386/kvm.c b/target/i386/kvm.c > index 47427d98f8..056a482d3a 100644 > --- a/target/i386/kvm.c > +++ b/target/i386/kvm.c > @@ -733,8 +733,18 @@ static int hyperv_handle_properties(CPUState *cs) > env->features[FEAT_HYPERV_EAX] |= HV_VP_RUNTIME_AVAILABLE; > } > if (cpu->hyperv_synic) { > - if (!has_msr_hv_synic || > - !kvm_check_extension(cs->kvm_state, KVM_CAP_HYPERV_SYNIC)) { > + unsigned int cap = KVM_CAP_HYPERV_SYNIC; > + if (!cpu->hyperv_synic_kvm_only) { > + if (!cpu->hyperv_vpindex) { > + fprintf(stderr, "Hyper-V SynIC " > + "(requested by 'hv-synic' cpu flag) " > + "requires Hyper-V VP_INDEX ('hv-vpindex')\n"); > + return -ENOSYS; > + } > + cap = KVM_CAP_HYPERV_SYNIC2; > + } > + > + if (!has_msr_hv_synic || !kvm_check_extension(cs->kvm_state, cap)) { > fprintf(stderr, "Hyper-V SynIC (requested by 'hv-synic' cpu flag) " > "is not supported by kernel\n"); > return -ENOSYS; > @@ -783,18 +793,22 @@ static int hyperv_init_vcpu(X86CPU *cpu) > } > > if (cpu->hyperv_synic) { > - ret = kvm_vcpu_enable_cap(cs, KVM_CAP_HYPERV_SYNIC, 0); > + uint32_t synic_cap = cpu->hyperv_synic_kvm_only ? > + KVM_CAP_HYPERV_SYNIC : KVM_CAP_HYPERV_SYNIC2; > + ret = kvm_vcpu_enable_cap(cs, synic_cap, 0); > if (ret < 0) { > error_report("failed to turn on HyperV SynIC in KVM: %s", > strerror(-ret)); > return ret; > } > > - ret = hyperv_x86_synic_add(cpu); > - if (ret < 0) { > - error_report("failed to create HyperV SynIC: %s", > - strerror(-ret)); > - return ret; > + if (!cpu->hyperv_synic_kvm_only) { > + ret = hyperv_x86_synic_add(cpu); > + if (ret < 0) { > + error_report("failed to create HyperV SynIC: %s", > + strerror(-ret)); > + return ret; > + } > } > } > ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [Qemu-devel] [PATCH 03/10] hyperv: only add SynIC in compatible configurations 2018-11-26 14:45 ` Igor Mammedov @ 2018-11-26 15:17 ` Roman Kagan 0 siblings, 0 replies; 8+ messages in thread From: Roman Kagan @ 2018-11-26 15:17 UTC (permalink / raw) To: Igor Mammedov Cc: qemu-devel@nongnu.org, Vijayabhaskar Balakrishna, Eduardo Habkost, Konrad Rzeszutek Wilk, Michael S. Tsirkin, Venu Busireddy, Liran Alon, Paolo Bonzini, Si-Wei Liu, Boris Ostrovsky, Karl Heubaum, Vitaly Kuznetsov On Mon, Nov 26, 2018 at 03:45:03PM +0100, Igor Mammedov wrote: > On Fri, 21 Sep 2018 11:22:10 +0300 > Roman Kagan <rkagan@virtuozzo.com> wrote: > > > Certain configurations do not allow SynIC to be used in QEMU. In > > particular, > > > > - when hyperv_vpindex is off, SINT routes can't be used as they refer to > > the destination vCPU by vp_index > > > > - older KVM (which doesn't expose KVM_CAP_HYPERV_SYNIC2) zeroes out > > SynIC message and event pages on every msr load, breaking migration > > > > OTOH in-KVM users of SynIC -- SynIC timers -- do work in those > > configurations, and we shouldn't stop the guest from using them. > > > > To cover both scenarios, introduce an X86CPU property that makes CPU > > init code to skip creation of the SynIC object (and thus disables any > > SynIC use in QEMU) but keeps the KVM part of the SynIC working. > > The property is clear by default but is set via compat logic for older > > machine types. > > > > As a result, when hv_synic and a modern machine type are specified, QEMU > > will refuse to run unless vp_index is on and the kernel is recent > > enough. OTOH with an older machine type QEMU will run fine with > > hv_synic=on against an older kernel and/or without vp_index enabled but > > will disallow the in-QEMU uses of SynIC (in e.g. VMBus). > > > > Signed-off-by: Roman Kagan <rkagan@virtuozzo.com> > > With current upstream and x-hv-synic-kvm-only=on QEMU will SIGSEGV. > Problem was unnoticed since added compat property wasn't actually used > until much later commit > 4a93722f9c hw/i386: add pc-i440fx-3.1 & pc-q35-3.1 > which put compat property in use. > > qemu-system-x86_64 -machine pc-i440fx-2.10,accel=kvm \ > -cpu host,-vmx,hv-relaxed,hv_spinlocks=0x1fff,hv-vpindex,hv-synic > > simpler reproducer: > qemu-system-x86_64 -enable-kvm -cpu host,hv-synic,x-hv-synic-kvm-only=on > > Reported-by: Vitaly Kuznetsov <vkuznets@redhat.com> Thanks for the report, fix is on the way to ML. Roman. ^ permalink raw reply [flat|nested] 8+ messages in thread
end of thread, other threads:[~2018-11-26 15:17 UTC | newest] Thread overview: 8+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- [not found] <20180921082217.29481-1-rkagan@virtuozzo.com> [not found] ` <20180921082217.29481-6-rkagan@virtuozzo.com> 2018-10-03 11:06 ` [Qemu-devel] [PATCH 05/10] hyperv: add synic message delivery Paolo Bonzini 2018-10-03 13:01 ` Roman Kagan 2018-10-03 11:12 ` [Qemu-devel] [PATCH 00/10] hyperv: add connection infrastructure Paolo Bonzini 2018-10-03 14:25 ` Roman Kagan 2018-10-03 14:35 ` Paolo Bonzini [not found] ` <20180921082217.29481-4-rkagan@virtuozzo.com> 2018-11-20 13:41 ` [Qemu-devel] [PATCH 03/10] hyperv: only add SynIC in compatible configurations Eduardo Habkost 2018-11-26 14:45 ` Igor Mammedov 2018-11-26 15:17 ` Roman Kagan
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).