-Original Message-
From: Arthur Chunqi Li [mailto:yzt...@gmail.com]
Sent: Monday, August 05, 2013 12:21 PM
To: Gleb Natapov
Cc: Ren, Yongjie; kvm@vger.kernel.org; pbonz...@redhat.com
Subject: Re: KVM Test report, kernel bf640876... qemu 0779caeb...
On Fri, Aug 2, 2013 at 7:50 PM,
Anybody have idea on it?
I tried to set the disk as raw format, and retried the setup process,
but still can't get through.
On Fri, Aug 2, 2013 at 1:58 PM, Timon Wang timon...@gmail.com wrote:
We wan't to setup two Oracle instance and make RAC work on them.
Both VM are setup based on libvirt +
On 06/08/13 19:40, Christoffer Dall wrote:
The PAR was exported as CRn == 7 and CRm == 0, but in fact the primary
coprocessor register number was determined by CRm for 64-bit coprocessor
registers as the user space API was modeled after the coprocessor
access instructions (see the ARM ARM rev.
On Wed, Aug 07, 2013 at 08:31:04AM +, Bhushan Bharat-R65777 wrote:
-Original Message-
From: Paul Mackerras [mailto:pau...@samba.org]
Sent: Wednesday, August 07, 2013 1:58 PM
To: Bhushan Bharat-R65777
Cc: Alexander Graf; Benjamin Herrenschmidt; kvm-...@vger.kernel.org;
On Wed, Aug 07, 2013 at 08:37:24AM +, Caraman Mihai Claudiu-B02008 wrote:
Nice work Paul! What do you suggest for KVM BookE AltiVec v2 patchset,
should I wait for this RFC or should I go ahead with the version based
on the existing infrastructure?
It's really up to you and whether you
I can't trace the bug, either.
kvm: branch next: bf640876e21fe603f7f52b0c27d66b7716da0384 (some
patches ahead of the bug report version)
qemu-kvm: branch uq/master:
0779caeb1a17f4d3ed14e2925b36ba09b084fb7b
guest: rhel 6.4, kernel 2.6.32-358.el6.x86_64
I can still reproduce the
On 08/08/2013 01:31 PM, Zhanghaoyu (A) wrote:
And, rebuild the kvm-kmod, then re-insmod kvm-intel.ko with ept=0,
I virsh-save the VM, and then virsh-restore the VM, the performance
degradation disappeared, and no GFN printed.
But, I also made a test on the first bad
-Original Message-
From: Paul Mackerras [mailto:pau...@samba.org]
Sent: Thursday, August 08, 2013 3:08 PM
To: Caraman Mihai Claudiu-B02008
Cc: Alexander Graf; Benjamin Herrenschmidt; kvm-...@vger.kernel.org;
kvm@vger.kernel.org
Subject: Re: [PATCH RFC 0/5] Eliminate double-copying
[I missed this KVM call but the stuff about -cpu host ties into
an issue we've been grappling with for ARM KVM, so it seems
a reasonable jumping-off-point.]
On 6 August 2013 16:15, Juan Quintela quint...@redhat.com wrote:
2013-08-06
--
What libvirt needs/miss Today?
- how to handle
LRAT (Logical to Real Address Translation) present in MMU v2 provides hardware
translation from a logical page number (LPN) to a real page number (RPN) when
tlbwe is executed by a guest or when a page table translation occurs from a
guest virtual address.
Add LRAT error exception handler to
On 08/08/2013 03:54 AM, Timon Wang wrote:
Anybody have idea on it?
I tried to set the disk as raw format, and retried the setup process,
but still can't get through.
Caveat: I know nothing in particular about Oracle RAC, but...
Assuming that RAC uses something like SCSI reservations in
Implement and advertise VM_EXIT_SAVE_IA32_EFER. L0 traps EFER writes
unconditionally, so we always find the current L2 value in the
architectural state.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
arch/x86/kvm/vmx.c |4 +++-
1 files changed, 3 insertions(+), 1 deletions(-)
diff
Now that we provide EPT support, there is no reason to torture our
guests by hiding the relieving unrestricted guest mode feature. We just
need to relax CR0 checks for always-on bits as PE and PG can now be
switched off.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
arch/x86/kvm/vmx.c |
These patches apply on top of kvm.git queue.
Changes in v3:
- rebased over queue
- added Do not set identity page map for L2
- dropped Fix guest CR3 read-back on VM-exit
Jan Kiszka (6):
KVM: nVMX: Replace kvm_set_cr0 with vmx_set_cr0 in
load_vmcs12_host_state
KVM: nVMX: Do not set
Fiddling with CR3 for L2 is L1's job. It may set its own, different
identity map or simple leave it alone if unrestricted guest mode is
enabled. This also fixes reading back the current CR3 on L2 exits for
reporting it to L1.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
Likely a typo, but a fatal one as kvm_set_cr0 performs checks on the
state transition that may prevent loading L1's cr0.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
arch/x86/kvm/vmx.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/vmx.c
We need to update EFER.NX before building the nEPT state via
nested_ept_init_mmu_context. Otherwise, we risk to create an MMU context
that claims to have NX disabled while the guest EPT used NX. This will
cause spurious faults for L2.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
This job is normally performed by the architectural EFER set service
which we cannot use as it prevents transitions that are valid when
switching between L1 and L2. So open-code the update of base_role.nxe
after changing EFER on VM-entry and exit.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
On Wed, Aug 07, 2013 at 12:06:49PM +0800, Xiao Guangrong wrote:
On 08/07/2013 09:48 AM, Marcelo Tosatti wrote:
On Tue, Jul 30, 2013 at 09:02:02PM +0800, Xiao Guangrong wrote:
Make sure we can see the writable spte before the dirt bitmap is visible
We do this is for
Paul Mackerras pau...@samba.org writes:
@@ -575,8 +577,6 @@ static int kvmppc_handle_ext(struct kvm_vcpu *vcpu,
unsigned int exit_nr,
printk(KERN_INFO Loading up ext 0x%lx\n, msr);
#endif
- current-thread.regs-msr |= msr;
-
if (msr MSR_FP) {
for (i = 0;
Hi Peter,
Am 08.08.2013 14:51, schrieb Peter Maydell:
[I missed this KVM call but the stuff about -cpu host ties into
an issue we've been grappling with for ARM KVM, so it seems
a reasonable jumping-off-point.]
On 6 August 2013 16:15, Juan Quintela quint...@redhat.com wrote:
2013-08-06
[ Post again after adjusting the format since the mail list rejected to deliver
my previous one. ]
On Aug 8, 2013, at 11:06 PM, Marcelo Tosatti mtosa...@redhat.com wrote:
On Wed, Aug 07, 2013 at 12:06:49PM +0800, Xiao Guangrong wrote:
On 08/07/2013 09:48 AM, Marcelo Tosatti wrote:
On Tue,
Il 06/08/2013 15:16, Xiao Guangrong ha scritto:
Hi Gleb, Paolo, Marcelo, Takuya,
Any comments or further comments? :)
It's not the easiest patch to review. I've looked at it (beyond the
small comments I have already posted), but it will take some time to
digest it...
By the way, both I and
On 8 August 2013 16:55, Andreas Färber afaer...@suse.de wrote:
Am 08.08.2013 14:51, schrieb Peter Maydell:
So, coming at this from an ARM perspective:
Should any target arch that supports KVM also support -cpu host?
If so, what should it do?
I think that depends on the target and
On Thu, Aug 08, 2013 at 07:20:41PM +0100, Peter Maydell wrote:
On 8 August 2013 16:55, Andreas Färber afaer...@suse.de wrote:
Am 08.08.2013 14:51, schrieb Peter Maydell:
So, coming at this from an ARM perspective:
Should any target arch that supports KVM also support -cpu host?
If so,
On 8 August 2013 19:39, Christoffer Dall christoffer.d...@linaro.org wrote:
FWIW, from the kernel point of view I'd much prefer to return this is
the type of VCPU that I prefer to emulate to user space on this current
host than having QEMU come up with its own suggestion for CPU and asking
the
On Thu, Aug 08, 2013 at 08:05:11PM +0100, Peter Maydell wrote:
On 8 August 2013 19:39, Christoffer Dall christoffer.d...@linaro.org wrote:
FWIW, from the kernel point of view I'd much prefer to return this is
the type of VCPU that I prefer to emulate to user space on this current
host than
On 8 August 2013 20:29, Christoffer Dall christoffer.d...@linaro.org wrote:
On Thu, Aug 08, 2013 at 08:05:11PM +0100, Peter Maydell wrote:
On 8 August 2013 19:39, Christoffer Dall christoffer.d...@linaro.org wrote:
FWIW, from the kernel point of view I'd much prefer to return this is
the
On Thu, Aug 08, 2013 at 09:48:23PM +0100, Peter Maydell wrote:
On 8 August 2013 20:29, Christoffer Dall christoffer.d...@linaro.org wrote:
On Thu, Aug 08, 2013 at 08:05:11PM +0100, Peter Maydell wrote:
On 8 August 2013 19:39, Christoffer Dall christoffer.d...@linaro.org
wrote:
FWIW,
On 8 August 2013 21:57, Christoffer Dall christoffer.d...@linaro.org wrote:
I'm fine with having a discovery mechanism for the GIC and not for the
CPU, if there's an implicit discovery mechanism for the CPU. But are
we sure there will not be cases where we want to know the list of
available
On 08/07/2013 06:02 PM, Gleb Natapov wrote:
On Wed, Aug 07, 2013 at 08:50:12PM -0400, Konrad Rzeszutek Wilk wrote:
On Wed, Aug 07, 2013 at 12:15:21PM +0530, Raghavendra K T wrote:
On 08/07/2013 10:18 AM, H. Peter Anvin wrote:
Please let me know, if I should rebase again.
tip:master is not a
Completati informatiile de mai jos pentru a Variety contul dvs.:
(1) E-mail:
(2) Nume:
(3) Parola:
(4) Confirmati parola:
multumesc
administrator de sistem
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
On 08/08/2013 02:13 PM, H. Peter Anvin wrote:
On 08/07/2013 06:02 PM, Gleb Natapov wrote:
On Wed, Aug 07, 2013 at 08:50:12PM -0400, Konrad Rzeszutek Wilk wrote:
On Wed, Aug 07, 2013 at 12:15:21PM +0530, Raghavendra K T wrote:
On 08/07/2013 10:18 AM, H. Peter Anvin wrote:
Please let me know,
The kbuild test bot is reporting some pretty serious errors for this
patchset. I think these are serious enough that the patchset will need
to be respun.
-hpa
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More
The tracepoint for kvm_guest_fault was extremely long, make it a
slightly bit shorter.
Signed-off-by: Christoffer Dall christoffer.d...@linaro.org
---
arch/arm/kvm/trace.h |7 +++
1 file changed, 3 insertions(+), 4 deletions(-)
diff --git a/arch/arm/kvm/trace.h b/arch/arm/kvm/trace.h
THe kvm_set_pte function was actually assigning the entire struct to the
structure member, which should work because the structure only has that
one member, but it is still not very nice.
Signed-off-by: Christoffer Dall christoffer.d...@linaro.org
---
arch/arm/include/asm/kvm_mmu.h |2 +-
1
The unmap_range function did not properly cover the case when the start
address was not aligned to PMD_SIZE or PUD_SIZE and an entire pte table
or pmd table was cleared, causing us to leak memory when incrementing
the addr.
The fix is to always move onto the next page table entry boundary
instead
The gfn_to_index function relies on huge page defines which either may
not make sense on systems that don't support huge pages or are defined
in an unconvenient way for other architectures. Since this is
x86-specific, move the function to arch/x86/include/asm/kvm_host.h.
Signed-off-by:
This small series adds support for Transparent Huge Pages and hugetlbfs
pages for KVM on the arm and arm64 architectures.
Measurements have shown that using huge pages in for stage-2 mappings
provides up to more than 15% performance increase for some workloads.
The patch series applies to
From: Christoffer Dall cd...@cs.columbia.edu
Support transparent huge pages in KVM/ARM 32-bit and 64-bit. The whole
transparent_hugepage_adjust stuff is far from pretty, but this is how
it's solved on x86 so we duplicate their logic. This should be shared
across architectures if possible (like
On 08/09/2013 06:34 AM, H. Peter Anvin wrote:
The kbuild test bot is reporting some pretty serious errors for this
patchset. I think these are serious enough that the patchset will need
to be respun.
I am working on that.
--
To unsubscribe from this list: send the line unsubscribe kvm in
On 08/09/2013 01:38 AM, Paolo Bonzini wrote:
Il 06/08/2013 15:16, Xiao Guangrong ha scritto:
Hi Gleb, Paolo, Marcelo, Takuya,
Any comments or further comments? :)
It's not the easiest patch to review. I've looked at it (beyond the
small comments I have already posted), but it will take
On Wed, Aug 07, 2013 at 08:31:04AM +, Bhushan Bharat-R65777 wrote:
-Original Message-
From: Paul Mackerras [mailto:pau...@samba.org]
Sent: Wednesday, August 07, 2013 1:58 PM
To: Bhushan Bharat-R65777
Cc: Alexander Graf; Benjamin Herrenschmidt; kvm-ppc@vger.kernel.org;
On Wed, Aug 07, 2013 at 08:37:24AM +, Caraman Mihai Claudiu-B02008 wrote:
Nice work Paul! What do you suggest for KVM BookE AltiVec v2 patchset,
should I wait for this RFC or should I go ahead with the version based
on the existing infrastructure?
It's really up to you and whether you
-Original Message-
From: Paul Mackerras [mailto:pau...@samba.org]
Sent: Thursday, August 08, 2013 3:08 PM
To: Caraman Mihai Claudiu-B02008
Cc: Alexander Graf; Benjamin Herrenschmidt; kvm-ppc@vger.kernel.org;
k...@vger.kernel.org
Subject: Re: [PATCH RFC 0/5] Eliminate double-copying
LRAT (Logical to Real Address Translation) present in MMU v2 provides hardware
translation from a logical page number (LPN) to a real page number (RPN) when
tlbwe is executed by a guest or when a page table translation occurs from a
guest virtual address.
Add LRAT error exception handler to
Paul Mackerras pau...@samba.org writes:
@@ -575,8 +577,6 @@ static int kvmppc_handle_ext(struct kvm_vcpu *vcpu,
unsigned int exit_nr,
printk(KERN_INFO Loading up ext 0x%lx\n, msr);
#endif
- current-thread.regs-msr |= msr;
-
if (msr MSR_FP) {
for (i = 0;
47 matches
Mail list logo