On 08/07/2013 12:15 PM, Raghavendra K T wrote:
On 08/07/2013 10:18 AM, H. Peter Anvin wrote:
tip:master is not a stable branch; it is more like linux-next. We need
to figure out which topic branches are dependencies for this set.
Okay. I 'll start looking at the branches that would get affect
On Wed, Aug 07, 2013 at 08:50:12PM -0400, Konrad Rzeszutek Wilk wrote:
> On Wed, Aug 07, 2013 at 12:15:21PM +0530, Raghavendra K T wrote:
> > On 08/07/2013 10:18 AM, H. Peter Anvin wrote:
> > >>Please let me know, if I should rebase again.
> > >>
> > >
> > >tip:master is not a stable branch; it is
On Wed, Aug 07, 2013 at 12:15:21PM +0530, Raghavendra K T wrote:
> On 08/07/2013 10:18 AM, H. Peter Anvin wrote:
> >>Please let me know, if I should rebase again.
> >>
> >
> >tip:master is not a stable branch; it is more like linux-next. We need
> >to figure out which topic branches are dependenci
Hi,
I'm using KVM on Debian, and run a VM with Debian and Firefox.
Unfortunately, Firefox in the VM is *extremely* slow (and maybe
it got slower with newer Firefox-versions, but I'm not sure):
Nearly every time I open a new Firefox-tab or click on link,
CPU load goes to 100% ("system time" accordi
On Wed, Aug 07, 2013 at 11:34:04AM +0100, Marc Zyngier wrote:
> On 06/08/13 21:49, Christoffer Dall wrote:
> > On Tue, Aug 06, 2013 at 01:05:48PM +0100, Marc Zyngier wrote:
> >> When using 64kB pages, we only have two levels of page tables,
> >> meaning that PGD, PUD and PMD are fused. In this case
Good Day,
RE:INVESTMENT / BUSINESS PARTNERSHIP PROPOSAL.
I represent a group of company based in the Gulf Region with access to
over 270 Million Euros and we are seeking means of expanding and
relocating our business interest abroad in the following sectors: oil/Gas,
banking, real estate, stock s
On 08/05/2013 02:43 PM, Arthur Chunqi Li wrote:
Separate host_rflags and guest_rflags (regs.rflags used for guest).
Fix bug of set/get guest rflags when vmenter/vmexit.
Signed-off-by: Arthur Chunqi Li
Applied, thanks.
Not putting it on the stack is fine, but please do a followup patch to
de
On 08/05/2013 05:32 AM, Arthur Chunqi Li wrote:
Reconstruct VMX codes and put all VMX test suites in x86/vmx_tests.c.
Signed-off-by: Arthur Chunqi Li
---
ChangeLog to v2:
Remove some unused extern definitions in vmx.h.
config-x86-common.mak |2 +-
x86/vmx.c | 115 +
>
> Should this go into 3.11 too? Or it never worked?
It's ok to keep it for .12. It was broken since it was merged,
but normal builds don't trigger the problem.
-andi
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More ma
On 08/05/2013 10:07 AM, Gleb Natapov wrote:
Xiao comment about checking ept pointer before flushing individual ept context
is addressed here.
Gleb Natapov (3):
nEPT: make guest's A/D bits depends on guest's paging mode
nEPT: Support shadow paging for guest paging without A/D bits
nEPT:
On 08/04/2013 02:08 PM, Gleb Natapov wrote:
After commit 21feb4eb64e21f8dc91136b91ee886b978ce6421 tr base is zeroed
during vmexit. Set it to L1's HOST_TR_BASE. This should fix
https://bugzilla.kernel.org/show_bug.cgi?id=60679
Signed-off-by: Gleb Natapov
diff --git a/arch/x86/kvm/vmx.c b/arch/x8
On 08/05/2013 06:59 AM, Xiao Guangrong wrote:
Current code always uses arch.mmu to check the reserved bits on guest gpte
which is valid only for L1 guest, we should use arch.nested_mmu instead when
we translate gva to gpa for the L2 guest
Fix it by using @mmu instead since it is adapted to the c
On 08/06/2013 10:39 AM, Jan Kiszka wrote:
These patches apply on top of nEPT v7.
Changes in v2:
- rebased over v7
- added patch to fix VM_ENTRY_IA32E_MODE reporting
Jan Kiszka (8):
KVM: nEPT: Advertise WB type EPTP
KVM: nVMX: Fix up VM_ENTRY_IA32E_MODE control feature reporting
KVM
On 2013-08-07 15:54, Paolo Bonzini wrote:
> On 08/07/2013 03:38 PM, Gleb Natapov wrote:
>> On Wed, Aug 07, 2013 at 03:32:37PM +0200, Paolo Bonzini wrote:
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 44494ed..60a3644 100644
--- a/arch/x86/kvm/vmx.c
+
On 08/07/2013 03:38 PM, Gleb Natapov wrote:
On Wed, Aug 07, 2013 at 03:32:37PM +0200, Paolo Bonzini wrote:
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 44494ed..60a3644 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@ -3375,8 +3375,10 @@ static void vmx_set_cr3(struct kv
On Wed, Aug 07, 2013 at 03:32:37PM +0200, Paolo Bonzini wrote:
> >diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
> >index 44494ed..60a3644 100644
> >--- a/arch/x86/kvm/vmx.c
> >+++ b/arch/x86/kvm/vmx.c
> >@@ -3375,8 +3375,10 @@ static void vmx_set_cr3(struct kvm_vcpu *vcpu
On 08/07/2013 02:46 PM, Jan Kiszka wrote:
On 2013-08-07 14:39, Gleb Natapov wrote:
On Tue, Aug 06, 2013 at 05:57:02PM +0200, Jan Kiszka wrote:
On 2013-08-06 17:53, Gleb Natapov wrote:
On Tue, Aug 06, 2013 at 05:48:54PM +0200, Jan Kiszka wrote:
On 2013-08-06 17:04, Zhang, Yang Z wrote:
Gleb N
On 08/07/2013 09:09 PM, Takuya Yoshikawa wrote:
> On Tue, 30 Jul 2013 21:02:08 +0800
> Xiao Guangrong wrote:
>
>> @@ -2342,6 +2358,13 @@ static void kvm_mmu_commit_zap_page(struct kvm *kvm,
>> */
>> kvm_flush_remote_tlbs(kvm);
>>
>> +if (kvm->arch.rcu_free_shadow_page) {
>> +
On 08/06/2013 12:12 AM, Andi Kleen wrote:
From: Andi Kleen
kvm_rebooting is referenced from assembler code, thus
needs to be visible.
Signed-off-by: Andi Kleen
---
virt/kvm/kvm_main.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_mai
On Tue, 30 Jul 2013 21:02:08 +0800
Xiao Guangrong wrote:
> @@ -2342,6 +2358,13 @@ static void kvm_mmu_commit_zap_page(struct kvm *kvm,
>*/
> kvm_flush_remote_tlbs(kvm);
>
> + if (kvm->arch.rcu_free_shadow_page) {
> + sp = list_first_entry(invalid_list, struct kvm_m
On 2013-08-07 14:39, Gleb Natapov wrote:
> On Tue, Aug 06, 2013 at 05:57:02PM +0200, Jan Kiszka wrote:
>> On 2013-08-06 17:53, Gleb Natapov wrote:
>>> On Tue, Aug 06, 2013 at 05:48:54PM +0200, Jan Kiszka wrote:
On 2013-08-06 17:04, Zhang, Yang Z wrote:
> Gleb Natapov wrote on 2013-08-06:
>
On Tue, Aug 06, 2013 at 05:57:02PM +0200, Jan Kiszka wrote:
> On 2013-08-06 17:53, Gleb Natapov wrote:
> > On Tue, Aug 06, 2013 at 05:48:54PM +0200, Jan Kiszka wrote:
> >> On 2013-08-06 17:04, Zhang, Yang Z wrote:
> >>> Gleb Natapov wrote on 2013-08-06:
> On Tue, Aug 06, 2013 at 02:12:51PM +00
https://bugzilla.kernel.org/show_bug.cgi?id=60518
--- Comment #4 from Tim Käck ---
The problem is gone in 3.10.5.
--
You are receiving this mail because:
You are watching the assignee of the bug.--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord
On 06/08/13 21:49, Christoffer Dall wrote:
> On Tue, Aug 06, 2013 at 01:05:48PM +0100, Marc Zyngier wrote:
>> When using 64kB pages, we only have two levels of page tables,
>> meaning that PGD, PUD and PMD are fused. In this case, trying
>> to refcount PUDs and PMDs independantly is a a complete di
Mark the guest page as accessed so that there is likely
less chances of this page getting swap-out.
Signed-off-by: Bharat Bhushan
---
arch/powerpc/kvm/e500_mmu_host.c |3 +++
1 files changed, 3 insertions(+), 0 deletions(-)
diff --git a/arch/powerpc/kvm/e500_mmu_host.c b/arch/powerpc/kvm/e5
When the MM code is invalidating a range of pages, it calls the KVM
kvm_mmu_notifier_invalidate_range_start() notifier function, which calls
kvm_unmap_hva_range(), which arranges to flush all the TLBs for guest pages.
However, the Linux PTEs for the range being flushed are still valid at
that point
From: Bharat Bhushan
First Patch set missing _PAGE_ACCESSED when a guest page is accessed
Second Patch check for MMU notifier range invalidation progress
when setting a reference for a guest page. This is based on
"KVM: PPC: Book3S PR: Use mmu_notifier_retry() in kvmppc_mmu_map_page()"
patch sen
On powerpc we build kvmtool as a 64bit binary. We do that by setting
-m64 in our CFLAGS. For most things we just call $(CC) and it passes
that info onto the linker.
However there is one place where we explicitly call the linker, in the
build of guest/init - and in that case we need to tell the lin
> -Original Message-
> From: kvm-ow...@vger.kernel.org [mailto:kvm-ow...@vger.kernel.org] On
> Behalf Of Paul Mackerras
> Sent: Wednesday, August 07, 2013 9:52 AM
> To: Alexander Graf; Benjamin Herrenschmidt
> Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.org
> Subject: [PATCH RFC 0/5] Elimi
> -Original Message-
> From: Paul Mackerras [mailto:pau...@samba.org]
> Sent: Wednesday, August 07, 2013 1:58 PM
> To: Bhushan Bharat-R65777
> Cc: Alexander Graf; Benjamin Herrenschmidt; kvm-...@vger.kernel.org;
> kvm@vger.kernel.org
> Subject: Re: [PATCH 21/23] KVM: PPC: Book3S PR: Use m
On Wed, Aug 07, 2013 at 05:17:29AM +, Bhushan Bharat-R65777 wrote:
>
> Pauls, I am trying to understand the flow; does retry mean that we do not
> create the mapping and return to guest, which will fault again and then we
> will retry?
Yes, and you do put_page or kvm_release_pfn_clean for
31 matches
Mail list logo