[PATCH A or B] KVM: kvm-tlbs_dirty handling

2014-02-18 Thread Takuya Yoshikawa
Please take patch A or B. Takuya -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

[PATCH A] KVM: Simplify kvm-tlbs_dirty handling

2014-02-18 Thread Takuya Yoshikawa
When this was introduced, kvm_flush_remote_tlbs() could be called without holding mmu_lock. It is now acknowledged that the function must be called before releasing mmu_lock, and all callers have already been changed to do so. There is no need to use smp_mb() and cmpxchg() any more.

[PATCH B] KVM: Explain tlbs_dirty trick in kvm_flush_remote_tlbs()

2014-02-18 Thread Takuya Yoshikawa
When this was introduced, kvm_flush_remote_tlbs() could be called without holding mmu_lock. It is now acknowledged that the function must be called before releasing mmu_lock, and all callers have already been changed to do so. This patch adds a comment explaining this. Signed-off-by: Takuya

Re: [PATCH A] KVM: Simplify kvm-tlbs_dirty handling

2014-02-18 Thread Paolo Bonzini
Il 18/02/2014 09:22, Takuya Yoshikawa ha scritto: When this was introduced, kvm_flush_remote_tlbs() could be called without holding mmu_lock. It is now acknowledged that the function must be called before releasing mmu_lock, and all callers have already been changed to do so. There is no

Re: [PATCH] kvm: remove redundant registration of BSP's hv_clock area

2014-02-18 Thread Paolo Bonzini
Il 14/02/2014 08:37, Fernando Luis Vázquez Cao ha scritto: These days hv_clock allocation is memblock based (i.e. the percpu allocator is not involved), which means that the physical address of each of the per-cpu hv_clock areas is guaranteed to remain unchanged through all its lifetime and we

[Bug 69361] Host call trace and guest hang after create guest.

2014-02-18 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=69361 Paolo Bonzini bonz...@gnu.org changed: What|Removed |Added CC||bonz...@gnu.org ---

Re: [PATCH] KVM: SVM: fix NMI window after iret

2014-02-18 Thread Paolo Bonzini
Il 17/01/2014 20:52, Radim Krčmář ha scritto: We should open NMI window right after an iret, but SVM exits before it. We wanted to single step using the trap flag and then open it. (or we could emulate the iret instead) We don't do it since commit 3842d135ff2 (likely), because the iret exit

[Bug 69361] Host call trace and guest hang after create guest.

2014-02-18 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=69361 --- Comment #10 from robert...@intel.com --- (In reply to Paolo Bonzini from comment #9) Yes, commit 215393bc1fab3d61a5a296838bdffce22f27ffda. May I know which branch it is committed? -- You are receiving this mail because: You are watching

Re: [PATCH v3 0/4] X86/KVM: enable Intel MPX for KVM

2014-02-18 Thread Paolo Bonzini
Il 22/01/2014 13:03, Paolo Bonzini ha scritto: Il 22/01/2014 06:29, Liu, Jinsong ha scritto: These patches are version 3 to enalbe Intel MPX for KVM. Version 1: * Add some Intel MPX definiation * Fix a cpuid(0x0d, 0) exposing bug, dynamic per XCR0 features enable/disable * vmx and msr

RE: [PATCH v3 0/4] X86/KVM: enable Intel MPX for KVM

2014-02-18 Thread Liu, Jinsong
Paolo Bonzini wrote: Il 22/01/2014 13:03, Paolo Bonzini ha scritto: Il 22/01/2014 06:29, Liu, Jinsong ha scritto: These patches are version 3 to enalbe Intel MPX for KVM. Version 1: * Add some Intel MPX definiation * Fix a cpuid(0x0d, 0) exposing bug, dynamic per XCR0 features

[Bug 69361] Host call trace and guest hang after create guest.

2014-02-18 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=69361 --- Comment #11 from Paolo Bonzini bonz...@gnu.org --- It is in v3.14-rc1 -- You are receiving this mail because: You are watching the assignee of the bug. -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message

Re: [PATCH A] KVM: Simplify kvm-tlbs_dirty handling

2014-02-18 Thread Xiao Guangrong
On 02/18/2014 04:22 PM, Takuya Yoshikawa wrote: When this was introduced, kvm_flush_remote_tlbs() could be called without holding mmu_lock. It is now acknowledged that the function must be called before releasing mmu_lock, and all callers have already been changed to do so. I have already

[PATCH v2] kvm: remove redundant registration of BSP's hv_clock area

2014-02-18 Thread Fernando Luis Vázquez Cao
These days hv_clock allocation is memblock based (i.e. the percpu allocator is not involved), which means that the physical address of each of the per-cpu hv_clock areas is guaranteed to remain unchanged through all its lifetime and we do not need to update its location after CPU bring-up.

Re: hotplug: VM got stuck when attaching a pass-through device to the non-pass-through VM for the first time

2014-02-18 Thread Michael S. Tsirkin
On Tue, Feb 18, 2014 at 02:38:40AM +, Zhanghaoyu (A) wrote: Hi, all The VM will get stuck for a while(about 6s for a VM with 20GB memory) when attaching a pass-through PCI card to the non-pass-through VM for the first time. The reason is that the host will build the whole VT-d

Re: [PATCH 4/4] kvm/vfio: Support for DMA coherent IOMMUs

2014-02-18 Thread Paolo Bonzini
Il 17/02/2014 21:24, Alex Williamson ha scritto: VFIO now has support for using the IOMMU_CACHE flag and a mechanism for an external user to test the current operating mode of the IOMMU. Add support for this to the kvm-vfio pseudo device so that we only register noncoherent DMA when necessary.

Re: hotplug: VM got stuck when attaching a pass-through device to the non-pass-through VM for the first time

2014-02-18 Thread Paolo Bonzini
Il 18/02/2014 11:38, Michael S. Tsirkin ha scritto: What if you detach and re-attach? Is it fast then? If yes this means the issue is COW breaking that occurs with get_user_pages, not translation as such. Try hugepages with prealloc - does it help? I agree it's either COW breaking or

Re: hotplug: VM got stuck when attaching a pass-through device to the non-pass-through VM for the first time

2014-02-18 Thread Michael S. Tsirkin
On Tue, Feb 18, 2014 at 11:42:19AM +0100, Paolo Bonzini wrote: Il 18/02/2014 11:38, Michael S. Tsirkin ha scritto: What if you detach and re-attach? Is it fast then? If yes this means the issue is COW breaking that occurs with get_user_pages, not translation as such. Try hugepages with

RE: hotplug: VM got stuck when attaching a pass-through device to the non-pass-through VM for the first time

2014-02-18 Thread Zhanghaoyu (A)
Hi, all The VM will get stuck for a while(about 6s for a VM with 20GB memory) when attaching a pass-through PCI card to the non-pass-through VM for the first time. The reason is that the host will build the whole VT-d GPA-HPA DMAR page-table, which needs a lot of time, and during this

Re: hotplug: VM got stuck when attaching a pass-through device to the non-pass-through VM for the first time

2014-02-18 Thread Paolo Bonzini
Il 18/02/2014 11:51, Michael S. Tsirkin ha scritto: I agree it's either COW breaking or (similarly) locking pages that the guest hasn't touched yet. You can use prealloc or -rt mlock=on to avoid this problem. Paolo Or the new shared flag - IIRC shared VMAs don't do COW either. Only if

Re: hotplug: VM got stuck when attaching a pass-through device to the non-pass-through VM for the first time

2014-02-18 Thread Michael S. Tsirkin
On Tue, Feb 18, 2014 at 12:05:19PM +0100, Paolo Bonzini wrote: Il 18/02/2014 11:51, Michael S. Tsirkin ha scritto: I agree it's either COW breaking or (similarly) locking pages that the guest hasn't touched yet. You can use prealloc or -rt mlock=on to avoid this problem. Paolo Or the

Re: [PATCH v2] kvm: remove redundant registration of BSP's hv_clock area

2014-02-18 Thread Paolo Bonzini
Il 18/02/2014 11:09, Fernando Luis Vázquez Cao ha scritto: These days hv_clock allocation is memblock based (i.e. the percpu allocator is not involved), which means that the physical address of each of the per-cpu hv_clock areas is guaranteed to remain unchanged through all its lifetime and we

RE: hotplug: VM got stuck when attaching a pass-through device to the non-pass-through VM for the first time

2014-02-18 Thread Zhanghaoyu (A)
What if you detach and re-attach? Is it fast then? If yes this means the issue is COW breaking that occurs with get_user_pages, not translation as such. Try hugepages with prealloc - does it help? I agree it's either COW breaking or (similarly) locking pages that the guest hasn't touched

Re: [Xen-devel] [RFC v2 3/4] xen-netback: use a random MAC address

2014-02-18 Thread Ian Campbell
On Mon, 2014-02-17 at 10:29 +, David Vrabel wrote: On 15/02/14 02:59, Luis R. Rodriguez wrote: From: Luis R. Rodriguez mcg...@suse.com The purpose of using a static MAC address of FE:FF:FF:FF:FF:FF was to prevent our backend interfaces from being used by the bridge and nominating

KVM call minutes for 2014-02-18

2014-02-18 Thread Juan Quintela
2014-02-18 -- * [Qemu-devel] [PATCH V17 00/11] Add support for binding guest numa nodes Any news about this? (Vinod) * Should we change anything to get more people to sign for the call? There hasn't been a call in quite a long time. Ideas? (me) * x2apic? - Pending patch for

KVM call minutes for 2014-02-18

2014-02-18 Thread Juan Quintela
2014-02-18 -- * x2apic? - Pending patch for cpu feature flag. - Should this be the default. - It is not for 32bits, but should it be for 64bit? - libvirt always use x2apic, unconditionally? - What happens if one side of migration uses -m cpu_something and the other -m

[PATCH v4 00/12] arm/arm64: KVM: host cache maintenance when guest caches are off

2014-02-18 Thread Marc Zyngier
When we run a guest with cache disabled, we don't flush the cache to the Point of Coherency, hence possibly missing bits of data that have been written in the cache, but have not yet reached memory. We also have the opposite issue: when a guest enables its cache, whatever sits in the cache is

[PATCH v4 04/12] ARM: KVM: introduce kvm_p*d_addr_end

2014-02-18 Thread Marc Zyngier
The use of p*d_addr_end with stage-2 translation is slightly dodgy, as the IPA is 40bits, while all the p*d_addr_end helpers are taking an unsigned long (arm64 is fine with that as unligned long is 64bit). The fix is to introduce 64bit clean versions of the same helpers, and use them in the

[PATCH v4 09/12] ARM: KVM: introduce per-vcpu HYP Configuration Register

2014-02-18 Thread Marc Zyngier
So far, KVM/ARM used a fixed HCR configuration per guest, except for the VI/VF/VA bits to control the interrupt in absence of VGIC. With the upcoming need to dynamically reconfigure trapping, it becomes necessary to allow the HCR to be changed on a per-vcpu basis. The fix here is to mimic what

[PATCH v4 10/12] ARM: KVM: add world-switch for AMAIR{0,1}

2014-02-18 Thread Marc Zyngier
HCR.TVM traps (among other things) accesses to AMAIR0 and AMAIR1. In order to minimise the amount of surprise a guest could generate by trying to access these registers with caches off, add them to the list of registers we switch/handle. Signed-off-by: Marc Zyngier marc.zyng...@arm.com

[PATCH v4 03/12] arm64: KVM: trap VM system registers until MMU and caches are ON

2014-02-18 Thread Marc Zyngier
In order to be able to detect the point where the guest enables its MMU and caches, trap all the VM related system registers. Once we see the guest enabling both the MMU and the caches, we can go back to a saner mode of operation, which is to leave these registers in complete control of the

[PATCH v4 06/12] ARM: KVM: force cache clean on page fault when caches are off

2014-02-18 Thread Marc Zyngier
In order for a guest with caches disabled to observe data written contained in a given page, we need to make sure that page is committed to memory, and not just hanging in the cache (as guest accesses are completely bypassing the cache until it decides to enable it). For this purpose, hook into

[PATCH v4 07/12] ARM: KVM: fix handling of trapped 64bit coprocessor accesses

2014-02-18 Thread Marc Zyngier
Commit 240e99cbd00a (ARM: KVM: Fix 64-bit coprocessor handling) changed the way we match the 64bit coprocessor access from user space, but didn't update the trap handler for the same set of registers. The effect is that a trapped 64bit access is never matched, leading to a fault being injected

[PATCH v4 05/12] arm64: KVM: flush VM pages before letting the guest enable caches

2014-02-18 Thread Marc Zyngier
When the guest runs with caches disabled (like in an early boot sequence, for example), all the writes are diectly going to RAM, bypassing the caches altogether. Once the MMU and caches are enabled, whatever sits in the cache becomes suddenly visible, which isn't what the guest expects. A way to

[PATCH v4 12/12] ARM: KVM: fix warning in mmu.c

2014-02-18 Thread Marc Zyngier
Compiling with THP enabled leads to the following warning: arch/arm/kvm/mmu.c: In function ‘unmap_range’: arch/arm/kvm/mmu.c:177:39: warning: ‘pte’ may be used uninitialized in this function [-Wmaybe-uninitialized] if (kvm_pmd_huge(*pmd) || page_empty(pte)) {

[PATCH v4 02/12] arm64: KVM: allows discrimination of AArch32 sysreg access

2014-02-18 Thread Marc Zyngier
The current handling of AArch32 trapping is slightly less than perfect, as it is not possible (from a handler point of view) to distinguish it from an AArch64 access, nor to tell a 32bit from a 64bit access either. Fix this by introducing two additional flags: - is_aarch32: true if the access was

[PATCH v4 01/12] arm64: KVM: force cache clean on page fault when caches are off

2014-02-18 Thread Marc Zyngier
In order for the guest with caches off to observe data written contained in a given page, we need to make sure that page is committed to memory, and not just hanging in the cache (as guest accesses are completely bypassing the cache until it decides to enable it). For this purpose, hook into the

[PATCH v4 11/12] ARM: KVM: trap VM system registers until MMU and caches are ON

2014-02-18 Thread Marc Zyngier
In order to be able to detect the point where the guest enables its MMU and caches, trap all the VM related system registers. Once we see the guest enabling both the MMU and the caches, we can go back to a saner mode of operation, which is to leave these registers in complete control of the

[PATCH v4 08/12] ARM: KVM: fix ordering of 64bit coprocessor accesses

2014-02-18 Thread Marc Zyngier
Commit 240e99cbd00a (ARM: KVM: Fix 64-bit coprocessor handling) added an ordering dependency for the 64bit registers. The order described is: CRn, CRm, Op1, Op2, 64bit-first. Unfortunately, the implementation is: CRn, 64bit-first, CRm... Move the 64bit test to be last in order to match the

Re: [PATCH v4 04/12] ARM: KVM: introduce kvm_p*d_addr_end

2014-02-18 Thread Catalin Marinas
On Tue, Feb 18, 2014 at 03:27:25PM +, Marc Zyngier wrote: The use of p*d_addr_end with stage-2 translation is slightly dodgy, as the IPA is 40bits, while all the p*d_addr_end helpers are taking an unsigned long (arm64 is fine with that as unligned long is 64bit). The fix is to introduce

Business Proposal

2014-02-18 Thread frederique.berrucas
I am Mr. Mr. Leung Wing Lok and I work with Hang Seng Bank, Hong Kong. I have a Business Proposal of $19,500,000.00 of mutual benefits. Contact me via leungwlok...@yahoo.com.vn for more info.-- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to

Re: [PATCH v4 04/12] ARM: KVM: introduce kvm_p*d_addr_end

2014-02-18 Thread Christoffer Dall
On Tue, Feb 18, 2014 at 03:27:25PM +, Marc Zyngier wrote: The use of p*d_addr_end with stage-2 translation is slightly dodgy, as the IPA is 40bits, while all the p*d_addr_end helpers are taking an unsigned long (arm64 is fine with that as unligned long is 64bit). The fix is to introduce

Re: [PATCH v4 12/12] ARM: KVM: fix warning in mmu.c

2014-02-18 Thread Christoffer Dall
On Tue, Feb 18, 2014 at 03:27:33PM +, Marc Zyngier wrote: Compiling with THP enabled leads to the following warning: arch/arm/kvm/mmu.c: In function ‘unmap_range’: arch/arm/kvm/mmu.c:177:39: warning: ‘pte’ may be used uninitialized in this function [-Wmaybe-uninitialized] if

Re: [Xen-devel] [RFC v2 0/4] net: bridge / ip optimizations for virtual net backends

2014-02-18 Thread Luis R. Rodriguez
On Mon, Feb 17, 2014 at 2:27 AM, David Vrabel david.vra...@citrix.com wrote: On 15/02/14 02:59, Luis R. Rodriguez wrote: From: Luis R. Rodriguez mcg...@suse.com This v2 series changes the approach from my original virtualization multicast patch series [0] by abandoning completely the

Re: [Xen-devel] [RFC v2 4/4] xen-netback: skip IPv4 and IPv6 interfaces

2014-02-18 Thread Luis R. Rodriguez
On Mon, Feb 17, 2014 at 6:36 AM, Zoltan Kiss zoltan.k...@citrix.com wrote: There is a valid scenario to put IP addresses on the backend VIFs: http://wiki.xen.org/wiki/Xen_Networking#Routing This is useful thanks! Also, the backend is not necessarily Dom0, you can connect two guests with

Re: MSI interrupt support with vioscsi.c miniport driver

2014-02-18 Thread Nicholas A. Bellinger
On Mon, 2014-02-10 at 11:05 -0800, Nicholas A. Bellinger wrote: SNIP Hi Yan, So recently I've been doing some KVM guest performance comparisons between the scsi-mq prototype using virtio-scsi + vhost-scsi, and Windows Server 2012 with vioscsi.sys (virtio-win-0.1-74.iso) +

Re: [PATCH v4 00/12] arm/arm64: KVM: host cache maintenance when guest caches are off

2014-02-18 Thread Eric Northup
On Tue, Feb 18, 2014 at 7:27 AM, Marc Zyngier marc.zyng...@arm.com wrote: When we run a guest with cache disabled, we don't flush the cache to the Point of Coherency, hence possibly missing bits of data that have been written in the cache, but have not yet reached memory. We also have the

Re: [RFC v2 1/4] bridge: enable interfaces to opt out from becoming the root bridge

2014-02-18 Thread Luis R. Rodriguez
On Sun, Feb 16, 2014 at 10:57 AM, Stephen Hemminger step...@networkplumber.org wrote: On Fri, 14 Feb 2014 18:59:37 -0800 Luis R. Rodriguez mcg...@do-not-panic.com wrote: From: Luis R. Rodriguez mcg...@suse.com It doesn't make sense for some interfaces to become a root bridge at any point in

Re: MSI interrupt support with vioscsi.c miniport driver

2014-02-18 Thread Nicholas A. Bellinger
On Tue, 2014-02-18 at 13:00 -0800, Nicholas A. Bellinger wrote: On Mon, 2014-02-10 at 11:05 -0800, Nicholas A. Bellinger wrote: SNIP Hi Yan, So recently I've been doing some KVM guest performance comparisons between the scsi-mq prototype using virtio-scsi + vhost-scsi,

Re: [RFC v2 2/4] net: enables interface option to skip IP

2014-02-18 Thread Luis R. Rodriguez
On Mon, Feb 17, 2014 at 12:23 PM, Dan Williams d...@redhat.com wrote: On Fri, 2014-02-14 at 18:59 -0800, Luis R. Rodriguez wrote: From: Luis R. Rodriguez mcg...@suse.com Some interfaces do not need to have any IPv4 or IPv6 addresses, so enable an option to specify this. One example where

Re: [Xen-devel] [RFC v2 3/4] xen-netback: use a random MAC address

2014-02-18 Thread Luis R. Rodriguez
On Tue, Feb 18, 2014 at 3:22 AM, Ian Campbell ian.campb...@citrix.com wrote: On Mon, 2014-02-17 at 10:29 +, David Vrabel wrote: On 15/02/14 02:59, Luis R. Rodriguez wrote: From: Luis R. Rodriguez mcg...@suse.com The purpose of using a static MAC address of FE:FF:FF:FF:FF:FF was to

Re: [RFC v2 2/4] net: enables interface option to skip IP

2014-02-18 Thread Stephen Hemminger
On Tue, 18 Feb 2014 13:19:15 -0800 Luis R. Rodriguez mcg...@do-not-panic.com wrote: Sure, but note that the both disable_ipv6 and accept_dada sysctl parameters are global. ipv4 and ipv6 interfaces are created upon NETDEVICE_REGISTER, which will get triggered when a driver calls

[PATCH -mm 1/3] sched,numa: add cond_resched to task_numa_work

2014-02-18 Thread riel
From: Rik van Riel r...@redhat.com Normally task_numa_work scans over a fairly small amount of memory, but it is possible to run into a large unpopulated part of virtual memory, with no pages mapped. In that case, task_numa_work can run for a while, and it may make sense to reschedule as

[PATCH -mm 0/3] fix numa vs kvm scalability issue

2014-02-18 Thread riel
The NUMA scanning code can end up iterating over many gigabytes of unpopulated memory, especially in the case of a freshly started KVM guest with lots of memory. This results in the mmu notifier code being called even when there are no mapped pages in a virtual address range. The amount of time

[PATCH -mm 3/3] move mmu notifier call from change_protection to change_pmd_range

2014-02-18 Thread riel
From: Rik van Riel r...@redhat.com The NUMA scanning code can end up iterating over many gigabytes of unpopulated memory, especially in the case of a freshly started KVM guest with lots of memory. This results in the mmu notifier code being called even when there are no mapped pages in a virtual

[PATCH -mm 2/3] mm,numa: reorganize change_pmd_range

2014-02-18 Thread riel
From: Rik van Riel r...@redhat.com Reorganize the order of ifs in change_pmd_range a little, in preparation for the next patch. Signed-off-by: Rik van Riel r...@redhat.com Cc: Peter Zijlstra pet...@infradead.org Cc: Andrea Arcangeli aarca...@redhat.com Reported-by: Xing Gang gang.x...@hp.com

[PATCH 3.4 22/24] virtio-blk: Use block layer provided spinlock

2014-02-18 Thread Greg Kroah-Hartman
3.4-stable review patch. If anyone has any objections, please let me know. -- From: Asias He as...@redhat.com commit 2c95a3290919541b846bee3e0fbaa75860929f53 upstream. Block layer will allocate a spinlock for the queue if the driver does not provide one in blk_init_queue().

Re: [Qemu-devel] KVM call minutes for 2014-02-18

2014-02-18 Thread Peter Maydell
On 18 February 2014 15:05, Juan Quintela quint...@redhat.com wrote: * Maintenance? - How is being handling patches for the stable release? CC: stable@ for stable maintance. - add documentation about what/how to send patches for stable release - Regressions deserve a backport almost always?

Re: [PATCH A] KVM: Simplify kvm-tlbs_dirty handling

2014-02-18 Thread Takuya Yoshikawa
(2014/02/18 18:43), Xiao Guangrong wrote: On 02/18/2014 04:22 PM, Takuya Yoshikawa wrote: When this was introduced, kvm_flush_remote_tlbs() could be called without holding mmu_lock. It is now acknowledged that the function must be called before releasing mmu_lock, and all callers have already

Re: [PATCH A] KVM: Simplify kvm-tlbs_dirty handling

2014-02-18 Thread Takuya Yoshikawa
(2014/02/18 18:07), Paolo Bonzini wrote: Il 18/02/2014 09:22, Takuya Yoshikawa ha scritto: When this was introduced, kvm_flush_remote_tlbs() could be called without holding mmu_lock. It is now acknowledged that the function must be called before releasing mmu_lock, and all callers have already

Re: [PATCH -mm 2/3] mm,numa: reorganize change_pmd_range

2014-02-18 Thread David Rientjes
On Tue, 18 Feb 2014, r...@redhat.com wrote: From: Rik van Riel r...@redhat.com Reorganize the order of ifs in change_pmd_range a little, in preparation for the next patch. Signed-off-by: Rik van Riel r...@redhat.com Cc: Peter Zijlstra pet...@infradead.org Cc: Andrea Arcangeli

Re: [PATCH -mm 3/3] move mmu notifier call from change_protection to change_pmd_range

2014-02-18 Thread David Rientjes
On Tue, 18 Feb 2014, r...@redhat.com wrote: From: Rik van Riel r...@redhat.com The NUMA scanning code can end up iterating over many gigabytes of unpopulated memory, especially in the case of a freshly started KVM guest with lots of memory. This results in the mmu notifier code being

Re: [PATCH -mm 3/3] move mmu notifier call from change_protection to change_pmd_range

2014-02-18 Thread Rik van Riel
On 02/18/2014 09:24 PM, David Rientjes wrote: On Tue, 18 Feb 2014, r...@redhat.com wrote: From: Rik van Riel r...@redhat.com The NUMA scanning code can end up iterating over many gigabytes of unpopulated memory, especially in the case of a freshly started KVM guest with lots of memory.

[PATCH -mm v2 3/3] move mmu notifier call from change_protection to change_pmd_range

2014-02-18 Thread Rik van Riel
On Tue, 18 Feb 2014 18:24:36 -0800 (PST) David Rientjes rient...@google.com wrote: Acked-by: David Rientjes rient...@google.com Might have been cleaner to move the mmu_notifier_invalidate_range_{start,end}() to hugetlb_change_protection() as well, though. Way cleaner! Second version

Re: [Qemu-devel] MSI interrupt support with vioscsi.c miniport driver

2014-02-18 Thread Vadim Rozenfeld
On Tue, 2014-02-18 at 13:11 -0800, Nicholas A. Bellinger wrote: On Tue, 2014-02-18 at 13:00 -0800, Nicholas A. Bellinger wrote: On Mon, 2014-02-10 at 11:05 -0800, Nicholas A. Bellinger wrote: SNIP Hi Yan, So recently I've been doing some KVM guest performance