Gleb,
On 4/20/14, 12:26 PM, Gleb Natapov wrote:
On Fri, Apr 18, 2014 at 07:11:33AM +0300, Nadav Amit wrote:
When using address-size override prefix with string instructions in long-mode,
ESI/EDI/ECX are zero extended if they are affected by the instruction
(incremented/decremented).
On Mon, Apr 21, 2014 at 06:40:17PM -0300, Marcelo Tosatti wrote:
On Sun, Apr 13, 2014 at 04:10:22PM +0300, Michael S. Tsirkin wrote:
It seems that it's easy to implement the EOI assist
on top of the PV EOI feature: simply convert the
page address to the format expected by PV EOI.
While preparing/testing some KVM on s390 patches for the next merge window
(target is kvm/next which is based on 3.15-rc1) I faced a very severe
performance hickup on guest paging (all anonymous memory).
All memory bound guests are in D state now and the system is barely unusable.
Reverting
From: Dominik Dingel din...@linux.vnet.ibm.com
To enable CMMA and to reset its state we use the vm kvm_device ioctls,
encapsulating attributes within the KVM_S390_VM_MEM_CTRL group.
Signed-off-by: Dominik Dingel din...@linux.vnet.ibm.com
Signed-off-by: Christian Borntraeger
From: Dominik Dingel din...@linux.vnet.ibm.com
We sometimes need to get/set attributes specific to a virtual machine
and so need something else than ONE_REG.
Let's copy the KVM_DEVICE approach, and define the respective ioctls
for the vm file descriptor.
Signed-off-by: Dominik Dingel
://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux.git
tags/kvm-s390-20140422
for you to fetch changes up to e325fe69aa37b485635521568651642791d6d140:
KVM: s390: Factor out handle_itdb to handle TX aborts (2014-04-22 13:24:54
+0200
On 22/04/14 12:55, Christian Borntraeger wrote:
While preparing/testing some KVM on s390 patches for the next merge window
(target is kvm/next which is based on 3.15-rc1) I faced a very severe
performance hickup on guest paging (all anonymous memory).
All memory bound guests are in D state
On Sat, Apr 19, 2014 at 11:41:33AM +0200, Ivan Stojcevic (Tronyx) wrote:
I just found a very sensitive bug in KVM and Xen platforms. Easily if you
have VPS hosted on Xen or KVM you can assign yourself a IPv4 address for free
and bypass regular system with billing.
I tried this on many VPS
On Wed, Apr 02, 2014 at 05:40:23PM -0700, Alex Davis wrote:
and where is their gpg key?
Michael Roth mdr...@linux.vnet.ibm.com is doing releases:
http://pgp.mit.edu/pks/lookup?op=vindexsearch=0x3353C9CEF108B584
$ gpg --verify qemu-2.0.0.tar.bz2.sig
gpg: Signature made Thu 17 Apr 2014 03:49:55
On 22 April 2014 14:31, Stefan Hajnoczi stefa...@gmail.com wrote:
On Wed, Apr 02, 2014 at 05:40:23PM -0700, Alex Davis wrote:
and where is their gpg key?
Michael Roth mdr...@linux.vnet.ibm.com is doing releases:
http://pgp.mit.edu/pks/lookup?op=vindexsearch=0x3353C9CEF108B584
$ gpg
Quoting Stefan Hajnoczi (2014-04-22 08:31:08)
On Wed, Apr 02, 2014 at 05:40:23PM -0700, Alex Davis wrote:
and where is their gpg key?
Michael Roth mdr...@linux.vnet.ibm.com is doing releases:
http://pgp.mit.edu/pks/lookup?op=vindexsearch=0x3353C9CEF108B584
$ gpg --verify
Signed-off-by: Gabriel Somlo so...@cmu.edu
---
vfio.c gets copied by sync, and it needs vfio.h. I don't think there's
an easy way to #define ourselves out of this one, copying vfio.h into
kvm-kmod/include/linux/ seems to be the path of least resistance...
Thanks,
Gabriel
P.S. I'm not a
Signed-off-by: Gabriel Somlo so...@cmu.edu
---
Jan,
I upgraded my fedora 20 box to 3.13.10-200.fc20.x86_64 today, and
noticed that in order to build the latest kvm via kvm-kmod, I need
these two patches (second patch to follow shortly).
Thanks,
Gabriel
x86/external-module-compat.h | 10
On Tue, Apr 22, 2014 at 10:40:17AM -0400, Rik van Riel wrote:
On 04/22/2014 07:57 AM, Christian Borntraeger wrote:
On 22/04/14 12:55, Christian Borntraeger wrote:
While preparing/testing some KVM on s390 patches for the next merge window
(target is kvm/next which is based on 3.15-rc1) I
On 2014-04-22 16:52, gso...@gmail.com wrote:
Signed-off-by: Gabriel Somlo so...@cmu.edu
---
vfio.c gets copied by sync, and it needs vfio.h. I don't think there's
an easy way to #define ourselves out of this one, copying vfio.h into
kvm-kmod/include/linux/ seems to be the path of least
Hi Christian,
On Tue, Apr 22, 2014 at 12:55:37PM +0200, Christian Borntraeger wrote:
While preparing/testing some KVM on s390 patches for the next merge window
(target is kvm/next which is based on 3.15-rc1) I faced a very severe
performance hickup on guest paging (all anonymous memory).
On 04/22/2014 07:57 AM, Christian Borntraeger wrote:
On 22/04/14 12:55, Christian Borntraeger wrote:
While preparing/testing some KVM on s390 patches for the next merge window
(target is kvm/next which is based on 3.15-rc1) I faced a very severe
performance hickup on guest paging (all
On Mon, 2014-04-21 at 12:26 +0100, Luis Henriques wrote:
Hi David,
On Thu, Mar 27, 2014 at 03:29:56PM -0400, David Miller wrote:
From: Zoltan Kiss zoltan.k...@citrix.com
Date: Wed, 26 Mar 2014 22:37:45 +
skb_zerocopy can copy elements of the frags array between skbs, but it
Paolo Bonzini pbonz...@redhat.com writes:
Il 21/04/2014 15:20, Bandan Das ha scritto:
+for (i = j = 0; i max_shadow_read_write_fields; i++) {
+
Extra empty line. Not a big deal, but...
+switch (shadow_read_write_fields[i]) {
+case GUEST_BNDCFGS:
+
On 22/04/14 16:38, Ben Hutchings wrote:
On Mon, 2014-04-21 at 12:26 +0100, Luis Henriques wrote:
Hi David,
On Thu, Mar 27, 2014 at 03:29:56PM -0400, David Miller wrote:
From: Zoltan Kiss zoltan.k...@citrix.com
Date: Wed, 26 Mar 2014 22:37:45 +
skb_zerocopy can copy elements of the frags
On 22/04/14 17:06, Johannes Weiner wrote:
Hi Christian,
On Tue, Apr 22, 2014 at 12:55:37PM +0200, Christian Borntraeger wrote:
While preparing/testing some KVM on s390 patches for the next merge window
(target is kvm/next which is based on 3.15-rc1) I faced a very severe
performance
On Tue, Apr 22, 2014 at 04:57:32PM +0200, Jan Kiszka wrote:
On 2014-04-22 16:52, gso...@gmail.com wrote:
Signed-off-by: Gabriel Somlo so...@cmu.edu
---
vfio.c gets copied by sync, and it needs vfio.h. I don't think there's
an easy way to #define ourselves out of this one, copying
On Tue, Apr 22, 2014 at 11:06:56AM -0400, Johannes Weiner wrote:
Hi Christian,
On Tue, Apr 22, 2014 at 12:55:37PM +0200, Christian Borntraeger wrote:
While preparing/testing some KVM on s390 patches for the next merge window
(target is kvm/next which is based on 3.15-rc1) I faced a very
see patches for details.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Il 22/04/2014 12:25, Bandan Das ha scritto:
+ if (j i)
+ shadow_read_write_fields[j] =
+ shadow_read_write_fields[i];
+ j++;
... you need to respin anyway because the j++ is wrong. It should be
inside the if.
Invariant TSC documentation mentions that invariant TSC will run at a
constant rate in all ACPI P-, C-. and T-states.
This is not the case if migration to a host with different TSC frequency
is allowed, or if savevm is performed. So block migration/savevm.
Also do not expose invariant tsc flag
Expose Invariant TSC flag, if KVM is enabled. From Intel documentation:
17.13.1 Invariant TSC The time stamp counter in newer processors may
support an enhancement, referred to as invariant TSC. Processorâs
support for invariant TSC is indicated by CPUID.8007H:EDX[8].
The invariant TSC will
From: Zoltan Kiss zoltan.k...@citrix.com
commit 36d5fe6a000790f56039afe26834265db0a3ad4c upstream.
skb_zerocopy can copy elements of the frags array between skbs, but it doesn't
orphan them. Also, it doesn't handle errors, so this patch takes care of that
as well, and modify the callers
On Tue, Apr 22, 2014 at 12:11:47PM +0300, Michael S. Tsirkin wrote:
On Mon, Apr 21, 2014 at 06:40:17PM -0300, Marcelo Tosatti wrote:
On Sun, Apr 13, 2014 at 04:10:22PM +0300, Michael S. Tsirkin wrote:
It seems that it's easy to implement the EOI assist
on top of the PV EOI feature: simply
On Tue, Apr 22, 2014 at 04:10:44PM -0300, Marcelo Tosatti wrote:
Invariant TSC documentation mentions that invariant TSC will run at a
constant rate in all ACPI P-, C-. and T-states.
This is not the case if migration to a host with different TSC frequency
is allowed, or if savevm is
Paolo Bonzini pbonz...@redhat.com writes:
Il 22/04/2014 12:25, Bandan Das ha scritto:
+ if (j i)
+ shadow_read_write_fields[j] =
+ shadow_read_write_fields[i];
+ j++;
... you need to respin anyway
On Wed, Mar 19, 2014 at 7:05 PM, Luis R. Rodriguez mcg...@suse.com wrote:
On Tue, Mar 18, 2014 at 08:10:56PM -0700, Stephen Hemminger wrote:
On Wed, 12 Mar 2014 20:15:25 -0700
Luis R. Rodriguez mcg...@do-not-panic.com wrote:
As it is now if you add create a bridge it gets started
with a
On Tue, Mar 18, 2014 at 02:22:43PM -0700, Luis R. Rodriguez wrote:
On Tue, Mar 18, 2014 at 01:46:49PM -0700, Cong Wang wrote:
On Fri, Mar 14, 2014 at 6:39 PM, Luis R. Rodriguez mcg...@suse.com wrote:
On Thu, Mar 13, 2014 at 11:26:25AM -0700, Cong Wang wrote:
On Wed, Mar 12, 2014 at 8:15
On 21/04/14 15:25, Oleg Nesterov wrote:
async_pf_execute() has no reasons to adopt apf-mm, gup(current, mm)
should work just fine even if current has another or NULL -mm.
Recently kvm_async_page_present_sync() was added insedie the use_mm
section, but it seems that it doesn't need current-mm
On Tue, Apr 22, 2014 at 04:10:44PM -0300, Marcelo Tosatti wrote:
Invariant TSC documentation mentions that invariant TSC will run at a
constant rate in all ACPI P-, C-. and T-states.
This is not the case if migration to a host with different TSC frequency
is allowed, or if savevm is
On 21/04/14 15:26, Oleg Nesterov wrote:
get_user_pages(mm) is simply wrong if mm-mm_users == 0 and exit_mmap/etc
was already called (or is in progress), mm-mm_count can only pin mm-pgd
and mm_struct itself.
Change kvm_setup_async_pf/async_pf_execute to inc/dec mm-mm_users.
On 22/04/14 22:15, Christian Borntraeger wrote:
On 21/04/14 15:25, Oleg Nesterov wrote:
async_pf_execute() has no reasons to adopt apf-mm, gup(current, mm)
should work just fine even if current has another or NULL -mm.
Recently kvm_async_page_present_sync() was added insedie the use_mm
On Tue, Apr 22, 2014 at 05:38:07PM -0300, Eduardo Habkost wrote:
On Tue, Apr 22, 2014 at 04:10:44PM -0300, Marcelo Tosatti wrote:
Invariant TSC documentation mentions that invariant TSC will run at a
constant rate in all ACPI P-, C-. and T-states.
This is not the case if migration to a
On Sat, Apr 19, 2014 at 06:17:43PM -0400, Bandan Das wrote:
Minor changes to enable Xen as a L1 hypervisor.
Tested with a Haswell host, Xen-4.3 L1 and debian6 L2
Applied, thanks.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
On Tue, Apr 22, 2014 at 04:26:48PM -0300, Marcelo Tosatti wrote:
On Tue, Apr 22, 2014 at 12:11:47PM +0300, Michael S. Tsirkin wrote:
On Mon, Apr 21, 2014 at 06:40:17PM -0300, Marcelo Tosatti wrote:
On Sun, Apr 13, 2014 at 04:10:22PM +0300, Michael S. Tsirkin wrote:
It seems that it's
Hi,
this the third iteration of live migration support for the time being on
ARMv7. The patches depend on Eric Augers patch for memory regions.
Changes since v2:
- move initial VM write protect to memory region architecture prepare function
(needed to make dirty logging function generic)
-
Add HYP interface for global VM TLB invalidation without address
parameter.
- Added ARM version of kvm_flush_remote_tlbs()
Signed-off-by: Mario Smarduch m.smard...@samsung.com
---
arch/arm/include/asm/kvm_asm.h |1 +
arch/arm/include/asm/kvm_host.h |2 ++
arch/arm/kvm/interrupts.S
Support for live migration initial write protect.
- moved write protect to architecture memory region prepare function. This
way you can fail, abort migration without keep track of migration status.
- Above also allows to generalize read dirty log function with x86
- Added stage2_mark_pte_ro()
- added pte_index() to add to pmd pfn
Signed-off-by: Mario Smarduch m.smard...@samsung.com
---
arch/arm/kvm/mmu.c | 31 +--
1 file changed, 29 insertions(+), 2 deletions(-)
diff --git a/arch/arm/kvm/mmu.c b/arch/arm/kvm/mmu.c
index 52d4dd6..61ee812 100644
---
- made kvm_vm_ioctl_get_dirty_log() generic moved to kvm_main.c, deleted
arm,x86 versions
- optimized kvm_mmu_write_protected_pt_masked() to skip upper table lookups
Signed-off-by: Mario Smarduch m.smard...@samsung.com
---
arch/arm/include/asm/kvm_host.h |3 ++
arch/arm/kvm/arm.c
Il 22/04/2014 15:10, Marcelo Tosatti ha scritto:
+case 0x8007:
+*eax = 0;
+*ebx = 0;
+*ecx = 0;
+
+if (kvm_enabled()) {
+*edx = env-features[FEAT_8000_0007_EDX];
+} else {
+*edx = 0;
+}
I think TCG is able to
On Tue, Apr 22, 2014 at 08:26:36PM -0400, Paolo Bonzini wrote:
Il 22/04/2014 15:10, Marcelo Tosatti ha scritto:
+case 0x8007:
+*eax = 0;
+*ebx = 0;
+*ecx = 0;
+
+if (kvm_enabled()) {
+*edx = env-features[FEAT_8000_0007_EDX];
+}
On Tue, Apr 22, 2014 at 06:27:59PM -0300, Marcelo Tosatti wrote:
On Tue, Apr 22, 2014 at 05:38:07PM -0300, Eduardo Habkost wrote:
On Tue, Apr 22, 2014 at 04:10:44PM -0300, Marcelo Tosatti wrote:
Invariant TSC documentation mentions that invariant TSC will run at a
constant rate in all
On Wed, Apr 23, 2014 at 01:12:49AM +0300, Michael S. Tsirkin wrote:
On Tue, Apr 22, 2014 at 04:26:48PM -0300, Marcelo Tosatti wrote:
On Tue, Apr 22, 2014 at 12:11:47PM +0300, Michael S. Tsirkin wrote:
On Mon, Apr 21, 2014 at 06:40:17PM -0300, Marcelo Tosatti wrote:
On Sun, Apr 13, 2014
On Tue, Apr 22, 2014 at 10:57:48PM -0300, Marcelo Tosatti wrote:
On Wed, Apr 23, 2014 at 01:12:49AM +0300, Michael S. Tsirkin wrote:
On Tue, Apr 22, 2014 at 04:26:48PM -0300, Marcelo Tosatti wrote:
On Tue, Apr 22, 2014 at 12:11:47PM +0300, Michael S. Tsirkin wrote:
On Mon, Apr 21, 2014
50 matches
Mail list logo