RE: KVM Test report, kernel bf640876... qemu 0779caeb...

2013-08-08 Thread Ren, Yongjie
-Original Message- From: Arthur Chunqi Li [mailto:yzt...@gmail.com] Sent: Monday, August 05, 2013 12:21 PM To: Gleb Natapov Cc: Ren, Yongjie; kvm@vger.kernel.org; pbonz...@redhat.com Subject: Re: KVM Test report, kernel bf640876... qemu 0779caeb... On Fri, Aug 2, 2013 at 7:50 PM,

Re: Oracle RAC in libvirt+KVM environment

2013-08-08 Thread Timon Wang
Anybody have idea on it? I tried to set the disk as raw format, and retried the setup process, but still can't get through. On Fri, Aug 2, 2013 at 1:58 PM, Timon Wang timon...@gmail.com wrote: We wan't to setup two Oracle instance and make RAC work on them. Both VM are setup based on libvirt +

Re: [PATCH v2] ARM: KVM: Fix 64-bit coprocessor handling

2013-08-08 Thread Marc Zyngier
On 06/08/13 19:40, Christoffer Dall wrote: The PAR was exported as CRn == 7 and CRm == 0, but in fact the primary coprocessor register number was determined by CRm for 64-bit coprocessor registers as the user space API was modeled after the coprocessor access instructions (see the ARM ARM rev.

Re: [PATCH 21/23] KVM: PPC: Book3S PR: Use mmu_notifier_retry() in kvmppc_mmu_map_page()

2013-08-08 Thread Paul Mackerras
On Wed, Aug 07, 2013 at 08:31:04AM +, Bhushan Bharat-R65777 wrote: -Original Message- From: Paul Mackerras [mailto:pau...@samba.org] Sent: Wednesday, August 07, 2013 1:58 PM To: Bhushan Bharat-R65777 Cc: Alexander Graf; Benjamin Herrenschmidt; kvm-...@vger.kernel.org;

Re: [PATCH RFC 0/5] Eliminate double-copying of FP/VMX/VSX state

2013-08-08 Thread Paul Mackerras
On Wed, Aug 07, 2013 at 08:37:24AM +, Caraman Mihai Claudiu-B02008 wrote: Nice work Paul! What do you suggest for KVM BookE AltiVec v2 patchset, should I wait for this RFC or should I go ahead with the version based on the existing infrastructure? It's really up to you and whether you

Re: KVM Test report, kernel bf640876... qemu 0779caeb...

2013-08-08 Thread Paolo Bonzini
I can't trace the bug, either. kvm: branch next: bf640876e21fe603f7f52b0c27d66b7716da0384 (some patches ahead of the bug report version) qemu-kvm: branch uq/master: 0779caeb1a17f4d3ed14e2925b36ba09b084fb7b guest: rhel 6.4, kernel 2.6.32-358.el6.x86_64 I can still reproduce the

Re: vm performance degradation after kvm live migration or save-restore with EPT enabled

2013-08-08 Thread Paolo Bonzini
On 08/08/2013 01:31 PM, Zhanghaoyu (A) wrote: And, rebuild the kvm-kmod, then re-insmod kvm-intel.ko with ept=0, I virsh-save the VM, and then virsh-restore the VM, the performance degradation disappeared, and no GFN printed. But, I also made a test on the first bad

RE: [PATCH RFC 0/5] Eliminate double-copying of FP/VMX/VSX state

2013-08-08 Thread Caraman Mihai Claudiu-B02008
-Original Message- From: Paul Mackerras [mailto:pau...@samba.org] Sent: Thursday, August 08, 2013 3:08 PM To: Caraman Mihai Claudiu-B02008 Cc: Alexander Graf; Benjamin Herrenschmidt; kvm-...@vger.kernel.org; kvm@vger.kernel.org Subject: Re: [PATCH RFC 0/5] Eliminate double-copying

-cpu host (was Re: [Qemu-devel] KVM call minutes for 2013-08-06)

2013-08-08 Thread Peter Maydell
[I missed this KVM call but the stuff about -cpu host ties into an issue we've been grappling with for ARM KVM, so it seems a reasonable jumping-off-point.] On 6 August 2013 16:15, Juan Quintela quint...@redhat.com wrote: 2013-08-06 -- What libvirt needs/miss Today? - how to handle

[PATCH v2] powerpc/booke64: Add LRAT error exception handler

2013-08-08 Thread Mihai Caraman
LRAT (Logical to Real Address Translation) present in MMU v2 provides hardware translation from a logical page number (LPN) to a real page number (RPN) when tlbwe is executed by a guest or when a page table translation occurs from a guest virtual address. Add LRAT error exception handler to

Re: Oracle RAC in libvirt+KVM environment

2013-08-08 Thread Don Koch
On 08/08/2013 03:54 AM, Timon Wang wrote: Anybody have idea on it? I tried to set the disk as raw format, and retried the setup process, but still can't get through. Caveat: I know nothing in particular about Oracle RAC, but... Assuming that RAC uses something like SCSI reservations in

[PATCH v3 4/6] KVM: nVMX: Implement support for EFER saving on VM-exit

2013-08-08 Thread Jan Kiszka
Implement and advertise VM_EXIT_SAVE_IA32_EFER. L0 traps EFER writes unconditionally, so we always find the current L2 value in the architectural state. Signed-off-by: Jan Kiszka jan.kis...@siemens.com --- arch/x86/kvm/vmx.c |4 +++- 1 files changed, 3 insertions(+), 1 deletions(-) diff

[PATCH v3 6/6] KVM: nVMX: Enable unrestricted guest mode support

2013-08-08 Thread Jan Kiszka
Now that we provide EPT support, there is no reason to torture our guests by hiding the relieving unrestricted guest mode feature. We just need to relax CR0 checks for always-on bits as PE and PG can now be switched off. Signed-off-by: Jan Kiszka jan.kis...@siemens.com --- arch/x86/kvm/vmx.c |

[PATCH v3 0/6] KVM: nVMX: Enable unrestricted guest mode and fix some nEPT issues

2013-08-08 Thread Jan Kiszka
These patches apply on top of kvm.git queue. Changes in v3: - rebased over queue - added Do not set identity page map for L2 - dropped Fix guest CR3 read-back on VM-exit Jan Kiszka (6): KVM: nVMX: Replace kvm_set_cr0 with vmx_set_cr0 in load_vmcs12_host_state KVM: nVMX: Do not set

[PATCH v3 2/6] KVM: nVMX: Do not set identity page map for L2

2013-08-08 Thread Jan Kiszka
Fiddling with CR3 for L2 is L1's job. It may set its own, different identity map or simple leave it alone if unrestricted guest mode is enabled. This also fixes reading back the current CR3 on L2 exits for reporting it to L1. Signed-off-by: Jan Kiszka jan.kis...@siemens.com ---

[PATCH v3 1/6] KVM: nVMX: Replace kvm_set_cr0 with vmx_set_cr0 in load_vmcs12_host_state

2013-08-08 Thread Jan Kiszka
Likely a typo, but a fatal one as kvm_set_cr0 performs checks on the state transition that may prevent loading L1's cr0. Signed-off-by: Jan Kiszka jan.kis...@siemens.com --- arch/x86/kvm/vmx.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/arch/x86/kvm/vmx.c

[PATCH v3 3/6] KVM: nVMX: Load nEPT state after EFER

2013-08-08 Thread Jan Kiszka
We need to update EFER.NX before building the nEPT state via nested_ept_init_mmu_context. Otherwise, we risk to create an MMU context that claims to have NX disabled while the guest EPT used NX. This will cause spurious faults for L2. Signed-off-by: Jan Kiszka jan.kis...@siemens.com ---

[PATCH v3 5/6] KVM: nVMX: Update mmu.base_role.nxe after EFER loading on VM-entry/exit

2013-08-08 Thread Jan Kiszka
This job is normally performed by the architectural EFER set service which we cannot use as it prevents transitions that are valid when switching between L1 and L2. So open-code the update of base_role.nxe after changing EFER on VM-entry and exit. Signed-off-by: Jan Kiszka jan.kis...@siemens.com

Re: [PATCH 04/12] KVM: MMU: log dirty page after marking spte writable

2013-08-08 Thread Marcelo Tosatti
On Wed, Aug 07, 2013 at 12:06:49PM +0800, Xiao Guangrong wrote: On 08/07/2013 09:48 AM, Marcelo Tosatti wrote: On Tue, Jul 30, 2013 at 09:02:02PM +0800, Xiao Guangrong wrote: Make sure we can see the writable spte before the dirt bitmap is visible We do this is for

Re: [PATCH 02/23] KVM: PPC: Book3S PR: Don't corrupt guest state when kernel uses VMX

2013-08-08 Thread Aneesh Kumar K.V
Paul Mackerras pau...@samba.org writes: @@ -575,8 +577,6 @@ static int kvmppc_handle_ext(struct kvm_vcpu *vcpu, unsigned int exit_nr, printk(KERN_INFO Loading up ext 0x%lx\n, msr); #endif - current-thread.regs-msr |= msr; - if (msr MSR_FP) { for (i = 0;

Re: [Qemu-devel] -cpu host (was Re: KVM call minutes for 2013-08-06)

2013-08-08 Thread Andreas Färber
Hi Peter, Am 08.08.2013 14:51, schrieb Peter Maydell: [I missed this KVM call but the stuff about -cpu host ties into an issue we've been grappling with for ARM KVM, so it seems a reasonable jumping-off-point.] On 6 August 2013 16:15, Juan Quintela quint...@redhat.com wrote: 2013-08-06

Re: [PATCH 04/12] KVM: MMU: log dirty page after marking spte writable

2013-08-08 Thread Xiao Guangrong
[ Post again after adjusting the format since the mail list rejected to deliver my previous one. ] On Aug 8, 2013, at 11:06 PM, Marcelo Tosatti mtosa...@redhat.com wrote: On Wed, Aug 07, 2013 at 12:06:49PM +0800, Xiao Guangrong wrote: On 08/07/2013 09:48 AM, Marcelo Tosatti wrote: On Tue,

Re: [RFC PATCH 00/12] KVM: MMU: locklessly wirte-protect

2013-08-08 Thread Paolo Bonzini
Il 06/08/2013 15:16, Xiao Guangrong ha scritto: Hi Gleb, Paolo, Marcelo, Takuya, Any comments or further comments? :) It's not the easiest patch to review. I've looked at it (beyond the small comments I have already posted), but it will take some time to digest it... By the way, both I and

Re: [Qemu-devel] -cpu host (was Re: KVM call minutes for 2013-08-06)

2013-08-08 Thread Peter Maydell
On 8 August 2013 16:55, Andreas Färber afaer...@suse.de wrote: Am 08.08.2013 14:51, schrieb Peter Maydell: So, coming at this from an ARM perspective: Should any target arch that supports KVM also support -cpu host? If so, what should it do? I think that depends on the target and

Re: [Qemu-devel] -cpu host (was Re: KVM call minutes for 2013-08-06)

2013-08-08 Thread Christoffer Dall
On Thu, Aug 08, 2013 at 07:20:41PM +0100, Peter Maydell wrote: On 8 August 2013 16:55, Andreas Färber afaer...@suse.de wrote: Am 08.08.2013 14:51, schrieb Peter Maydell: So, coming at this from an ARM perspective: Should any target arch that supports KVM also support -cpu host? If so,

Re: [Qemu-devel] -cpu host (was Re: KVM call minutes for 2013-08-06)

2013-08-08 Thread Peter Maydell
On 8 August 2013 19:39, Christoffer Dall christoffer.d...@linaro.org wrote: FWIW, from the kernel point of view I'd much prefer to return this is the type of VCPU that I prefer to emulate to user space on this current host than having QEMU come up with its own suggestion for CPU and asking the

Re: [Qemu-devel] -cpu host (was Re: KVM call minutes for 2013-08-06)

2013-08-08 Thread Christoffer Dall
On Thu, Aug 08, 2013 at 08:05:11PM +0100, Peter Maydell wrote: On 8 August 2013 19:39, Christoffer Dall christoffer.d...@linaro.org wrote: FWIW, from the kernel point of view I'd much prefer to return this is the type of VCPU that I prefer to emulate to user space on this current host than

Re: [Qemu-devel] -cpu host (was Re: KVM call minutes for 2013-08-06)

2013-08-08 Thread Peter Maydell
On 8 August 2013 20:29, Christoffer Dall christoffer.d...@linaro.org wrote: On Thu, Aug 08, 2013 at 08:05:11PM +0100, Peter Maydell wrote: On 8 August 2013 19:39, Christoffer Dall christoffer.d...@linaro.org wrote: FWIW, from the kernel point of view I'd much prefer to return this is the

Re: [Qemu-devel] -cpu host (was Re: KVM call minutes for 2013-08-06)

2013-08-08 Thread Christoffer Dall
On Thu, Aug 08, 2013 at 09:48:23PM +0100, Peter Maydell wrote: On 8 August 2013 20:29, Christoffer Dall christoffer.d...@linaro.org wrote: On Thu, Aug 08, 2013 at 08:05:11PM +0100, Peter Maydell wrote: On 8 August 2013 19:39, Christoffer Dall christoffer.d...@linaro.org wrote: FWIW,

Re: [Qemu-devel] -cpu host (was Re: KVM call minutes for 2013-08-06)

2013-08-08 Thread Peter Maydell
On 8 August 2013 21:57, Christoffer Dall christoffer.d...@linaro.org wrote: I'm fine with having a discovery mechanism for the GIC and not for the CPU, if there's an implicit discovery mechanism for the CPU. But are we sure there will not be cases where we want to know the list of available

Re: [PATCH V12 0/14] Paravirtualized ticket spinlocks

2013-08-08 Thread H. Peter Anvin
On 08/07/2013 06:02 PM, Gleb Natapov wrote: On Wed, Aug 07, 2013 at 08:50:12PM -0400, Konrad Rzeszutek Wilk wrote: On Wed, Aug 07, 2013 at 12:15:21PM +0530, Raghavendra K T wrote: On 08/07/2013 10:18 AM, H. Peter Anvin wrote: Please let me know, if I should rebase again. tip:master is not a

Casusa po?tala este în criza de spa?iu din cauza spam-ul nedorit când primiti rog de zi cu zi trebuie sa varify contul dvs. pentru a ne opri cutia po?tala de la primirea de spam sau mesaje de în?elato

2013-08-08 Thread WEBMASTER
Completati informatiile de mai jos pentru a Variety contul dvs.: (1) E-mail: (2) Nume: (3) Parola: (4) Confirmati parola: multumesc administrator de sistem -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at

Re: [PATCH V12 0/14] Paravirtualized ticket spinlocks

2013-08-08 Thread H. Peter Anvin
On 08/08/2013 02:13 PM, H. Peter Anvin wrote: On 08/07/2013 06:02 PM, Gleb Natapov wrote: On Wed, Aug 07, 2013 at 08:50:12PM -0400, Konrad Rzeszutek Wilk wrote: On Wed, Aug 07, 2013 at 12:15:21PM +0530, Raghavendra K T wrote: On 08/07/2013 10:18 AM, H. Peter Anvin wrote: Please let me know,

Re: [PATCH V12 0/14] Paravirtualized ticket spinlocks

2013-08-08 Thread H. Peter Anvin
The kbuild test bot is reporting some pretty serious errors for this patchset. I think these are serious enough that the patchset will need to be respun. -hpa -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More

[PATCH] ARM: KVM: Simplify tracepoint text

2013-08-08 Thread Christoffer Dall
The tracepoint for kvm_guest_fault was extremely long, make it a slightly bit shorter. Signed-off-by: Christoffer Dall christoffer.d...@linaro.org --- arch/arm/kvm/trace.h |7 +++ 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/arch/arm/kvm/trace.h b/arch/arm/kvm/trace.h

[PATCH] ARM: KVM: Fix kvm_set_pte assignment

2013-08-08 Thread Christoffer Dall
THe kvm_set_pte function was actually assigning the entire struct to the structure member, which should work because the structure only has that one member, but it is still not very nice. Signed-off-by: Christoffer Dall christoffer.d...@linaro.org --- arch/arm/include/asm/kvm_mmu.h |2 +- 1

[PATCH] ARM: KVM: Fix unaligned unmap_range leak

2013-08-08 Thread Christoffer Dall
The unmap_range function did not properly cover the case when the start address was not aligned to PMD_SIZE or PUD_SIZE and an entire pte table or pmd table was cleared, causing us to leak memory when incrementing the addr. The fix is to always move onto the next page table entry boundary instead

[PATCH 1/3] KVM: Move gfn_to_index to x86 specific code

2013-08-08 Thread Christoffer Dall
The gfn_to_index function relies on huge page defines which either may not make sense on systems that don't support huge pages or are defined in an unconvenient way for other architectures. Since this is x86-specific, move the function to arch/x86/include/asm/kvm_host.h. Signed-off-by:

[PATCH 0/3] KVM/ARM Huge pages support

2013-08-08 Thread Christoffer Dall
This small series adds support for Transparent Huge Pages and hugetlbfs pages for KVM on the arm and arm64 architectures. Measurements have shown that using huge pages in for stage-2 mappings provides up to more than 15% performance increase for some workloads. The patch series applies to

[PATCH 3/3] KVM: ARM: Transparent huge pages and hugetlbfs support

2013-08-08 Thread Christoffer Dall
From: Christoffer Dall cd...@cs.columbia.edu Support transparent huge pages in KVM/ARM 32-bit and 64-bit. The whole transparent_hugepage_adjust stuff is far from pretty, but this is how it's solved on x86 so we duplicate their logic. This should be shared across architectures if possible (like

Re: [PATCH V12 0/14] Paravirtualized ticket spinlocks

2013-08-08 Thread Raghavendra K T
On 08/09/2013 06:34 AM, H. Peter Anvin wrote: The kbuild test bot is reporting some pretty serious errors for this patchset. I think these are serious enough that the patchset will need to be respun. I am working on that. -- To unsubscribe from this list: send the line unsubscribe kvm in

Re: [RFC PATCH 00/12] KVM: MMU: locklessly wirte-protect

2013-08-08 Thread Xiao Guangrong
On 08/09/2013 01:38 AM, Paolo Bonzini wrote: Il 06/08/2013 15:16, Xiao Guangrong ha scritto: Hi Gleb, Paolo, Marcelo, Takuya, Any comments or further comments? :) It's not the easiest patch to review. I've looked at it (beyond the small comments I have already posted), but it will take

Re: [PATCH 21/23] KVM: PPC: Book3S PR: Use mmu_notifier_retry() in kvmppc_mmu_map_page()

2013-08-08 Thread Paul Mackerras
On Wed, Aug 07, 2013 at 08:31:04AM +, Bhushan Bharat-R65777 wrote: -Original Message- From: Paul Mackerras [mailto:pau...@samba.org] Sent: Wednesday, August 07, 2013 1:58 PM To: Bhushan Bharat-R65777 Cc: Alexander Graf; Benjamin Herrenschmidt; kvm-ppc@vger.kernel.org;

Re: [PATCH RFC 0/5] Eliminate double-copying of FP/VMX/VSX state

2013-08-08 Thread Paul Mackerras
On Wed, Aug 07, 2013 at 08:37:24AM +, Caraman Mihai Claudiu-B02008 wrote: Nice work Paul! What do you suggest for KVM BookE AltiVec v2 patchset, should I wait for this RFC or should I go ahead with the version based on the existing infrastructure? It's really up to you and whether you

RE: [PATCH RFC 0/5] Eliminate double-copying of FP/VMX/VSX state

2013-08-08 Thread Caraman Mihai Claudiu-B02008
-Original Message- From: Paul Mackerras [mailto:pau...@samba.org] Sent: Thursday, August 08, 2013 3:08 PM To: Caraman Mihai Claudiu-B02008 Cc: Alexander Graf; Benjamin Herrenschmidt; kvm-ppc@vger.kernel.org; k...@vger.kernel.org Subject: Re: [PATCH RFC 0/5] Eliminate double-copying

[PATCH v2] powerpc/booke64: Add LRAT error exception handler

2013-08-08 Thread Mihai Caraman
LRAT (Logical to Real Address Translation) present in MMU v2 provides hardware translation from a logical page number (LPN) to a real page number (RPN) when tlbwe is executed by a guest or when a page table translation occurs from a guest virtual address. Add LRAT error exception handler to

Re: [PATCH 02/23] KVM: PPC: Book3S PR: Don't corrupt guest state when kernel uses VMX

2013-08-08 Thread Aneesh Kumar K.V
Paul Mackerras pau...@samba.org writes: @@ -575,8 +577,6 @@ static int kvmppc_handle_ext(struct kvm_vcpu *vcpu, unsigned int exit_nr, printk(KERN_INFO Loading up ext 0x%lx\n, msr); #endif - current-thread.regs-msr |= msr; - if (msr MSR_FP) { for (i = 0;