Re: [PATCH V12 0/14] Paravirtualized ticket spinlocks

2013-08-07 Thread Raghavendra K T
On 08/07/2013 12:15 PM, Raghavendra K T wrote: On 08/07/2013 10:18 AM, H. Peter Anvin wrote: tip:master is not a stable branch; it is more like linux-next. We need to figure out which topic branches are dependencies for this set. Okay. I 'll start looking at the branches that would get affect

Re: [PATCH V12 0/14] Paravirtualized ticket spinlocks

2013-08-07 Thread Gleb Natapov
On Wed, Aug 07, 2013 at 08:50:12PM -0400, Konrad Rzeszutek Wilk wrote: > On Wed, Aug 07, 2013 at 12:15:21PM +0530, Raghavendra K T wrote: > > On 08/07/2013 10:18 AM, H. Peter Anvin wrote: > > >>Please let me know, if I should rebase again. > > >> > > > > > >tip:master is not a stable branch; it is

Re: [PATCH V12 0/14] Paravirtualized ticket spinlocks

2013-08-07 Thread Konrad Rzeszutek Wilk
On Wed, Aug 07, 2013 at 12:15:21PM +0530, Raghavendra K T wrote: > On 08/07/2013 10:18 AM, H. Peter Anvin wrote: > >>Please let me know, if I should rebase again. > >> > > > >tip:master is not a stable branch; it is more like linux-next. We need > >to figure out which topic branches are dependenci

KVM performance with Firefox?

2013-08-07 Thread Roland Koebler
Hi, I'm using KVM on Debian, and run a VM with Debian and Firefox. Unfortunately, Firefox in the VM is *extremely* slow (and maybe it got slower with newer Firefox-versions, but I'm not sure): Nearly every time I open a new Firefox-tab or click on link, CPU load goes to 100% ("system time" accordi

Re: [PATCH] arm64: KVM: fix 2-level page tables unmapping

2013-08-07 Thread Christoffer Dall
On Wed, Aug 07, 2013 at 11:34:04AM +0100, Marc Zyngier wrote: > On 06/08/13 21:49, Christoffer Dall wrote: > > On Tue, Aug 06, 2013 at 01:05:48PM +0100, Marc Zyngier wrote: > >> When using 64kB pages, we only have two levels of page tables, > >> meaning that PGD, PUD and PMD are fused. In this case

Mail Back If Interested!

2013-08-07 Thread WilliT
Good Day, RE:INVESTMENT / BUSINESS PARTNERSHIP PROPOSAL. I represent a group of company based in the Gulf Region with access to over 270 Million Euros and we are seeking means of expanding and relocating our business interest abroad in the following sectors: oil/Gas, banking, real estate, stock s

Re: [PATCH] kvm-unit-tests: VMX: Separate host and guest rflags

2013-08-07 Thread Paolo Bonzini
On 08/05/2013 02:43 PM, Arthur Chunqi Li wrote: Separate host_rflags and guest_rflags (regs.rflags used for guest). Fix bug of set/get guest rflags when vmenter/vmexit. Signed-off-by: Arthur Chunqi Li Applied, thanks. Not putting it on the stack is fine, but please do a followup patch to de

Re: [PATCH v3] kvm-unit-tests: VMX: Split VMX test suites to separate file

2013-08-07 Thread Paolo Bonzini
On 08/05/2013 05:32 AM, Arthur Chunqi Li wrote: Reconstruct VMX codes and put all VMX test suites in x86/vmx_tests.c. Signed-off-by: Arthur Chunqi Li --- ChangeLog to v2: Remove some unused extern definitions in vmx.h. config-x86-common.mak |2 +- x86/vmx.c | 115 +

Re: [PATCH] kvm: Make kvm_rebooting visible

2013-08-07 Thread Andi Kleen
> > Should this go into 3.11 too? Or it never worked? It's ok to keep it for .12. It was broken since it was merged, but normal builds don't trigger the problem. -andi -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord...@vger.kernel.org More ma

Re: [PATCH v7 00/15] Nested EPT

2013-08-07 Thread Paolo Bonzini
On 08/05/2013 10:07 AM, Gleb Natapov wrote: Xiao comment about checking ept pointer before flushing individual ept context is addressed here. Gleb Natapov (3): nEPT: make guest's A/D bits depends on guest's paging mode nEPT: Support shadow paging for guest paging without A/D bits nEPT:

Re: [PATCH] KVM: nVMX: correctly set tr base on nested vmexit emulation

2013-08-07 Thread Paolo Bonzini
On 08/04/2013 02:08 PM, Gleb Natapov wrote: After commit 21feb4eb64e21f8dc91136b91ee886b978ce6421 tr base is zeroed during vmexit. Set it to L1's HOST_TR_BASE. This should fix https://bugzilla.kernel.org/show_bug.cgi?id=60679 Signed-off-by: Gleb Natapov diff --git a/arch/x86/kvm/vmx.c b/arch/x8

Re: [PATCH] KVM: MMU: fix check the reserved bits on the gpte of L2

2013-08-07 Thread Paolo Bonzini
On 08/05/2013 06:59 AM, Xiao Guangrong wrote: Current code always uses arch.mmu to check the reserved bits on guest gpte which is valid only for L1 guest, we should use arch.nested_mmu instead when we translate gva to gpa for the L2 guest Fix it by using @mmu instead since it is adapted to the c

Re: [PATCH v2 0/8] KVM: nVMX: Enable unrestricted guest mode and fix some nEPT issues

2013-08-07 Thread Paolo Bonzini
On 08/06/2013 10:39 AM, Jan Kiszka wrote: These patches apply on top of nEPT v7. Changes in v2: - rebased over v7 - added patch to fix VM_ENTRY_IA32E_MODE reporting Jan Kiszka (8): KVM: nEPT: Advertise WB type EPTP KVM: nVMX: Fix up VM_ENTRY_IA32E_MODE control feature reporting KVM

Re: [PATCH v2 5/8] KVM: nVMX: Fix guest CR3 read-back on VM-exit

2013-08-07 Thread Jan Kiszka
On 2013-08-07 15:54, Paolo Bonzini wrote: > On 08/07/2013 03:38 PM, Gleb Natapov wrote: >> On Wed, Aug 07, 2013 at 03:32:37PM +0200, Paolo Bonzini wrote: diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index 44494ed..60a3644 100644 --- a/arch/x86/kvm/vmx.c +

Re: [PATCH v2 5/8] KVM: nVMX: Fix guest CR3 read-back on VM-exit

2013-08-07 Thread Paolo Bonzini
On 08/07/2013 03:38 PM, Gleb Natapov wrote: On Wed, Aug 07, 2013 at 03:32:37PM +0200, Paolo Bonzini wrote: diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index 44494ed..60a3644 100644 --- a/arch/x86/kvm/vmx.c +++ b/arch/x86/kvm/vmx.c @@ -3375,8 +3375,10 @@ static void vmx_set_cr3(struct kv

Re: [PATCH v2 5/8] KVM: nVMX: Fix guest CR3 read-back on VM-exit

2013-08-07 Thread Gleb Natapov
On Wed, Aug 07, 2013 at 03:32:37PM +0200, Paolo Bonzini wrote: > >diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c > >index 44494ed..60a3644 100644 > >--- a/arch/x86/kvm/vmx.c > >+++ b/arch/x86/kvm/vmx.c > >@@ -3375,8 +3375,10 @@ static void vmx_set_cr3(struct kvm_vcpu *vcpu

Re: [PATCH v2 5/8] KVM: nVMX: Fix guest CR3 read-back on VM-exit

2013-08-07 Thread Paolo Bonzini
On 08/07/2013 02:46 PM, Jan Kiszka wrote: On 2013-08-07 14:39, Gleb Natapov wrote: On Tue, Aug 06, 2013 at 05:57:02PM +0200, Jan Kiszka wrote: On 2013-08-06 17:53, Gleb Natapov wrote: On Tue, Aug 06, 2013 at 05:48:54PM +0200, Jan Kiszka wrote: On 2013-08-06 17:04, Zhang, Yang Z wrote: Gleb N

Re: [PATCH 10/12] KVM: MMU: allow locklessly access shadow page table out of vcpu thread

2013-08-07 Thread Xiao Guangrong
On 08/07/2013 09:09 PM, Takuya Yoshikawa wrote: > On Tue, 30 Jul 2013 21:02:08 +0800 > Xiao Guangrong wrote: > >> @@ -2342,6 +2358,13 @@ static void kvm_mmu_commit_zap_page(struct kvm *kvm, >> */ >> kvm_flush_remote_tlbs(kvm); >> >> +if (kvm->arch.rcu_free_shadow_page) { >> +

Re: [PATCH] kvm: Make kvm_rebooting visible

2013-08-07 Thread Paolo Bonzini
On 08/06/2013 12:12 AM, Andi Kleen wrote: From: Andi Kleen kvm_rebooting is referenced from assembler code, thus needs to be visible. Signed-off-by: Andi Kleen --- virt/kvm/kvm_main.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_mai

Re: [PATCH 10/12] KVM: MMU: allow locklessly access shadow page table out of vcpu thread

2013-08-07 Thread Takuya Yoshikawa
On Tue, 30 Jul 2013 21:02:08 +0800 Xiao Guangrong wrote: > @@ -2342,6 +2358,13 @@ static void kvm_mmu_commit_zap_page(struct kvm *kvm, >*/ > kvm_flush_remote_tlbs(kvm); > > + if (kvm->arch.rcu_free_shadow_page) { > + sp = list_first_entry(invalid_list, struct kvm_m

Re: [PATCH v2 5/8] KVM: nVMX: Fix guest CR3 read-back on VM-exit

2013-08-07 Thread Jan Kiszka
On 2013-08-07 14:39, Gleb Natapov wrote: > On Tue, Aug 06, 2013 at 05:57:02PM +0200, Jan Kiszka wrote: >> On 2013-08-06 17:53, Gleb Natapov wrote: >>> On Tue, Aug 06, 2013 at 05:48:54PM +0200, Jan Kiszka wrote: On 2013-08-06 17:04, Zhang, Yang Z wrote: > Gleb Natapov wrote on 2013-08-06: >

Re: [PATCH v2 5/8] KVM: nVMX: Fix guest CR3 read-back on VM-exit

2013-08-07 Thread Gleb Natapov
On Tue, Aug 06, 2013 at 05:57:02PM +0200, Jan Kiszka wrote: > On 2013-08-06 17:53, Gleb Natapov wrote: > > On Tue, Aug 06, 2013 at 05:48:54PM +0200, Jan Kiszka wrote: > >> On 2013-08-06 17:04, Zhang, Yang Z wrote: > >>> Gleb Natapov wrote on 2013-08-06: > On Tue, Aug 06, 2013 at 02:12:51PM +00

[Bug 60518] Heavy network traffic between guest and host triggers kernel oops

2013-08-07 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=60518 --- Comment #4 from Tim Käck --- The problem is gone in 3.10.5. -- You are receiving this mail because: You are watching the assignee of the bug.-- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord

Re: [PATCH] arm64: KVM: fix 2-level page tables unmapping

2013-08-07 Thread Marc Zyngier
On 06/08/13 21:49, Christoffer Dall wrote: > On Tue, Aug 06, 2013 at 01:05:48PM +0100, Marc Zyngier wrote: >> When using 64kB pages, we only have two levels of page tables, >> meaning that PGD, PUD and PMD are fused. In this case, trying >> to refcount PUDs and PMDs independantly is a a complete di

[PATCH 1/2] kvm: powerpc: mark page accessed when mapping a guest page

2013-08-07 Thread Bharat Bhushan
Mark the guest page as accessed so that there is likely less chances of this page getting swap-out. Signed-off-by: Bharat Bhushan --- arch/powerpc/kvm/e500_mmu_host.c |3 +++ 1 files changed, 3 insertions(+), 0 deletions(-) diff --git a/arch/powerpc/kvm/e500_mmu_host.c b/arch/powerpc/kvm/e5

[PATCH 2/2] kvm: ppc: booke: check range page invalidation progress on page setup

2013-08-07 Thread Bharat Bhushan
When the MM code is invalidating a range of pages, it calls the KVM kvm_mmu_notifier_invalidate_range_start() notifier function, which calls kvm_unmap_hva_range(), which arranges to flush all the TLBs for guest pages. However, the Linux PTEs for the range being flushed are still valid at that point

[PATCH 0/2] KVM: PPC: BOOKE: MMU Fixes

2013-08-07 Thread Bharat Bhushan
From: Bharat Bhushan First Patch set missing _PAGE_ACCESSED when a guest page is accessed Second Patch check for MMU notifier range invalidation progress when setting a reference for a guest page. This is based on "KVM: PPC: Book3S PR: Use mmu_notifier_retry() in kvmppc_mmu_map_page()" patch sen

[PATCH] kvm tools: Fix build of guest init with biarch powerpc compilers

2013-08-07 Thread Michael Ellerman
On powerpc we build kvmtool as a 64bit binary. We do that by setting -m64 in our CFLAGS. For most things we just call $(CC) and it passes that info onto the linker. However there is one place where we explicitly call the linker, in the build of guest/init - and in that case we need to tell the lin

RE: [PATCH RFC 0/5] Eliminate double-copying of FP/VMX/VSX state

2013-08-07 Thread Caraman Mihai Claudiu-B02008
> -Original Message- > From: kvm-ow...@vger.kernel.org [mailto:kvm-ow...@vger.kernel.org] On > Behalf Of Paul Mackerras > Sent: Wednesday, August 07, 2013 9:52 AM > To: Alexander Graf; Benjamin Herrenschmidt > Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.org > Subject: [PATCH RFC 0/5] Elimi

RE: [PATCH 21/23] KVM: PPC: Book3S PR: Use mmu_notifier_retry() in kvmppc_mmu_map_page()

2013-08-07 Thread Bhushan Bharat-R65777
> -Original Message- > From: Paul Mackerras [mailto:pau...@samba.org] > Sent: Wednesday, August 07, 2013 1:58 PM > To: Bhushan Bharat-R65777 > Cc: Alexander Graf; Benjamin Herrenschmidt; kvm-...@vger.kernel.org; > kvm@vger.kernel.org > Subject: Re: [PATCH 21/23] KVM: PPC: Book3S PR: Use m

Re: [PATCH 21/23] KVM: PPC: Book3S PR: Use mmu_notifier_retry() in kvmppc_mmu_map_page()

2013-08-07 Thread Paul Mackerras
On Wed, Aug 07, 2013 at 05:17:29AM +, Bhushan Bharat-R65777 wrote: > > Pauls, I am trying to understand the flow; does retry mean that we do not > create the mapping and return to guest, which will fault again and then we > will retry? Yes, and you do put_page or kvm_release_pfn_clean for