https://bugzilla.kernel.org/show_bug.cgi?id=60830
Bug ID: 60830
Summary: L2 rhel6u4(32bit) guest reboot continuously
Product: Virtualization
Version: unspecified
Kernel Version: 3.11.0-rc1
Hardware: All
OS: Linux
On 09/02/2013 01:50 PM, Michael S. Tsirkin wrote:
On Fri, Aug 30, 2013 at 12:29:18PM +0800, Jason Wang wrote:
We tend to batch the used adding and signaling in vhost_zerocopy_callback()
which may result more than 100 used buffers to be updated in
vhost_zerocopy_signal_used() in some cases.
On 09/02/2013 01:51 PM, Michael S. Tsirkin wrote:
tweak subj s/returns/return/
On Fri, Aug 30, 2013 at 12:29:17PM +0800, Jason Wang wrote:
None of its caller use its return value, so let it return void.
Signed-off-by: Jason Wang jasow...@redhat.com
---
Will correct it in v3.
--
To
On 09/02/2013 01:56 PM, Michael S. Tsirkin wrote:
On Fri, Aug 30, 2013 at 12:29:22PM +0800, Jason Wang wrote:
As Michael point out, We used to limit the max pending DMAs to get better
cache
utilization. But it was not done correctly since it was one done when
there's no
new buffers
On 08/30/2013 07:38 PM, Gleb Natapov wrote:
On Thu, Aug 29, 2013 at 07:26:40PM +0800, Xiao Guangrong wrote:
On 08/29/2013 05:51 PM, Gleb Natapov wrote:
On Thu, Aug 29, 2013 at 05:31:42PM +0800, Xiao Guangrong wrote:
As Documentation/RCU/whatisRCU.txt says:
As with
On Sat, Aug 31, 2013 at 12:45:11PM +0800, Qin Chuanyu wrote:
On 2013/8/30 0:08, Anthony Liguori wrote:
Hi Qin,
By change the memory copy and notify mechanism ,currently virtio-net with
vhost_net could run on Xen with good performance。
I think the key in doing this would be to implement a
On Mon, Sep 02, 2013 at 08:57:22AM +0100, Wei Liu wrote:
On Sat, Aug 31, 2013 at 12:45:11PM +0800, Qin Chuanyu wrote:
On 2013/8/30 0:08, Anthony Liguori wrote:
Hi Qin,
By change the memory copy and notify mechanism ,currently virtio-net with
vhost_net could run on Xen with good
On Thu, Aug 08, 2013 at 04:26:28PM +0200, Jan Kiszka wrote:
Likely a typo, but a fatal one as kvm_set_cr0 performs checks on the
Not a typo :) That what Avi asked for do during initial nested VMX
review: http://markmail.org/message/hhidqyhbo2mrgxxc
But there is at least one transition check that
On 09/02/2013 02:30 PM, Jason Wang wrote:
On 09/02/2013 01:56 PM, Michael S. Tsirkin wrote:
On Fri, Aug 30, 2013 at 12:29:22PM +0800, Jason Wang wrote:
As Michael point out, We used to limit the max pending DMAs to get
better cache
utilization. But it was not done correctly since it was
On 08/30/2013 07:44 PM, Gleb Natapov wrote:
On Thu, Aug 29, 2013 at 08:02:30PM +0800, Xiao Guangrong wrote:
On 08/29/2013 07:33 PM, Xiao Guangrong wrote:
On 08/29/2013 05:31 PM, Gleb Natapov wrote:
On Thu, Aug 29, 2013 at 02:50:51PM +0800, Xiao Guangrong wrote:
After more thinking, I still
We used to poll vhost queue before making DMA is done, this is racy if vhost
thread were waked up before marking DMA is done which can result the signal to
be missed. Fix this by always polling the vhost thread before DMA is done.
Signed-off-by: Jason Wang jasow...@redhat.com
---
- The patch is
Let vhost_add_used() to use vhost_add_used_n() to reduce the code
duplication. To avoid the overhead brought by __copy_to_user(). We will use
put_user() when one used need to be added.
Signed-off-by: Jason Wang jasow...@redhat.com
---
drivers/vhost/vhost.c | 54
Currently, even if the packet length is smaller than VHOST_GOODCOPY_LEN, if
upend_idx != done_idx we still set zcopy_used to true and rollback this choice
later. This could be avoided by determining zerocopy once by checking all
conditions at one time before.
Signed-off-by: Jason Wang
As Michael point out, We used to limit the max pending DMAs to get better cache
utilization. But it was not done correctly since it was one done when there's no
new buffers submitted from guest. Guest can easily exceeds the limitation by
keeping sending packets.
So this patch moves the check into
Hi Gleb, Paolo and Jan,
Would you please review this series of codes when you can spare time?
Jan has review it and, of course, further suggestions are welcomed.
Arthur
On Thu, Aug 15, 2013 at 7:45 PM, Arthur Chunqi Li yzt...@gmail.com wrote:
Add a series of test cases for nested VMX in
On 2013-09-02 10:21, Gleb Natapov wrote:
On Thu, Aug 08, 2013 at 04:26:28PM +0200, Jan Kiszka wrote:
Likely a typo, but a fatal one as kvm_set_cr0 performs checks on the
Not a typo :) That what Avi asked for do during initial nested VMX
review: http://markmail.org/message/hhidqyhbo2mrgxxc
We tend to batch the used adding and signaling in vhost_zerocopy_callback()
which may result more than 100 used buffers to be updated in
vhost_zerocopy_signal_used() in some cases. So switch to use
vhost_add_used_and_signal_n() to avoid multiple calls to
vhost_add_used_and_signal(). Which means
None of its caller use its return value, so let it return void.
Signed-off-by: Jason Wang jasow...@redhat.com
---
drivers/vhost/net.c |5 ++---
1 files changed, 2 insertions(+), 3 deletions(-)
diff --git a/drivers/vhost/net.c b/drivers/vhost/net.c
index 969a859..280ee66 100644
---
https://bugzilla.kernel.org/show_bug.cgi?id=60833
Bug ID: 60833
Summary: Window guest time passed very quickly, when restore vm
that saved 10 minutes ago.
Product: Virtualization
Version: unspecified
Kernel Version:
This series tries to unify and simplify vhost codes especially for
zerocopy. With this series, 5% - 10% improvement for per cpu throughput were
seen during netperf guest sending test.
Plase review.
Changes from V2:
- Typo fixes and code style fix
- Add performance gain in the commit log of patch
On 08/30/2013 08:41 PM, Paolo Bonzini wrote:
Page tables in a read-only memory slot will currently cause a triple
fault because the page walker uses gfn_to_hva and it fails on such a slot.
OVMF uses such a page table; however, real hardware seems to be fine with
that as long as the
https://bugzilla.kernel.org/show_bug.cgi?id=60833
Gleb g...@redhat.com changed:
What|Removed |Added
CC||g...@redhat.com
--- Comment #1
On Mon, Sep 02, 2013 at 05:20:15PM +0800, Xiao Guangrong wrote:
On 08/30/2013 08:41 PM, Paolo Bonzini wrote:
Page tables in a read-only memory slot will currently cause a triple
fault because the page walker uses gfn_to_hva and it fails on such a slot.
OVMF uses such a page table;
Add a framework of EPT in nested VMX testing, including a set of
functions to construct and read EPT paging structures and a simple
read/write test of EPT remapping from guest to host.
Signed-off-by: Arthur Chunqi Li yzt...@gmail.com
---
x86/vmx.c | 132
On Mon, Sep 02, 2013 at 11:06:53AM +0200, Jan Kiszka wrote:
On 2013-09-02 10:21, Gleb Natapov wrote:
On Thu, Aug 08, 2013 at 04:26:28PM +0200, Jan Kiszka wrote:
Likely a typo, but a fatal one as kvm_set_cr0 performs checks on the
Not a typo :) That what Avi asked for do during initial
There must have some minor revisions to be done in this patch, so this
is mainly a RFC mail.
Besides, I'm not quite clear what we should test in nested EPT
modules, and I bet writers of nested EPT must have ideas to continue
and refine this testing part. Any suggestions of which part and how to
On 09/01/2013 05:17 PM, Gleb Natapov wrote:
On Fri, Aug 30, 2013 at 02:41:37PM +0200, Paolo Bonzini wrote:
Page tables in a read-only memory slot will currently cause a triple
fault because the page walker uses gfn_to_hva and it fails on such a slot.
OVMF uses such a page table; however, real
On Mon, Sep 02, 2013 at 05:42:25PM +0800, Xiao Guangrong wrote:
On 09/01/2013 05:17 PM, Gleb Natapov wrote:
On Fri, Aug 30, 2013 at 02:41:37PM +0200, Paolo Bonzini wrote:
Page tables in a read-only memory slot will currently cause a triple
fault because the page walker uses gfn_to_hva and
On 09/02/2013 05:25 PM, Gleb Natapov wrote:
On Mon, Sep 02, 2013 at 05:20:15PM +0800, Xiao Guangrong wrote:
On 08/30/2013 08:41 PM, Paolo Bonzini wrote:
Page tables in a read-only memory slot will currently cause a triple
fault because the page walker uses gfn_to_hva and it fails on such a
On 09/02/2013 05:49 PM, Gleb Natapov wrote:
On Mon, Sep 02, 2013 at 05:42:25PM +0800, Xiao Guangrong wrote:
On 09/01/2013 05:17 PM, Gleb Natapov wrote:
On Fri, Aug 30, 2013 at 02:41:37PM +0200, Paolo Bonzini wrote:
Page tables in a read-only memory slot will currently cause a triple
fault
On Mon, Sep 02, 2013 at 06:00:39PM +0800, Xiao Guangrong wrote:
On 09/02/2013 05:25 PM, Gleb Natapov wrote:
On Mon, Sep 02, 2013 at 05:20:15PM +0800, Xiao Guangrong wrote:
On 08/30/2013 08:41 PM, Paolo Bonzini wrote:
Page tables in a read-only memory slot will currently cause a triple
On Mon, Sep 02, 2013 at 06:05:10PM +0800, Xiao Guangrong wrote:
On 09/02/2013 05:49 PM, Gleb Natapov wrote:
On Mon, Sep 02, 2013 at 05:42:25PM +0800, Xiao Guangrong wrote:
On 09/01/2013 05:17 PM, Gleb Natapov wrote:
On Fri, Aug 30, 2013 at 02:41:37PM +0200, Paolo Bonzini wrote:
Page
After nested vmentry stale cache can be used to reload L2 PDPTR pointers
which will cause L2 guest to fail. Fix it by invalidating cache on nested
vmentry emulation.
https://bugzilla.kernel.org/show_bug.cgi?id=60830
Signed-off-by: Gleb Natapov g...@redhat.com
diff --git a/arch/x86/kvm/vmx.c
Hi,
target-i386: please.
Am 27.08.2013 22:38, schrieb Benoît Canet:
Some users running cpu intensive tasks checking the cache CPUID leaves at
startup and making decisions based on the result reported that the guest was
not reflecting the host CPUID leaves when -cpu host is used.
This patch
On Mon, Sep 02, 2013 at 02:55:36PM +0200, Andreas Färber wrote:
[...]
diff --git a/target-i386/cpu.h b/target-i386/cpu.h
index 8a3d0fd..1ec32fa 100644
--- a/target-i386/cpu.h
+++ b/target-i386/cpu.h
@@ -865,6 +865,7 @@ typedef struct CPUX86State {
bool tsc_valid;
int
On Thu, Aug 08, 2013 at 04:26:30PM +0200, Jan Kiszka wrote:
We need to update EFER.NX before building the nEPT state via
nested_ept_init_mmu_context. Otherwise, we risk to create an MMU context
that claims to have NX disabled while the guest EPT used NX. This will
cause spurious faults for L2.
This patch uses directly cpuid_host to forward the informations instead of
storing a variable number of leaves in the cpu states.
v3:
s/i386/target-i386/ [Andrea]
move forward field to X86CPU structure and document it [Andrea]
rename forward field [Eduardo]
Rebase on top of eduardo
Some users running cpu intensive tasks checking the cache CPUID leaves at
startup and making decisions based on the result reported that the guest was
not reflecting the host CPUID leaves when -cpu host is used.
This patch fix this.
Signed-off-by: Benoit Canet ben...@irqsave.net
---
Hello,How are you,I hope you're well,my name is Mutoni,I'm medium height and
fair in complexion,i love,caring and I decided to contact you.I really want to
have a good relationship with you.Next I have a special something I want to
discuss with you,and tell you more about my self.Hope hear
Il 02/09/2013 12:07, Gleb Natapov ha scritto:
On Mon, Sep 02, 2013 at 06:00:39PM +0800, Xiao Guangrong wrote:
On 09/02/2013 05:25 PM, Gleb Natapov wrote:
On Mon, Sep 02, 2013 at 05:20:15PM +0800, Xiao Guangrong wrote:
On 08/30/2013 08:41 PM, Paolo Bonzini wrote:
Page tables in a read-only
Il 02/09/2013 12:11, Gleb Natapov ha scritto:
Got it, thanks for your explanation.
BTW, if you and Paolo are busy on other things, i am happy to fix these
issues. :)
I am busy with reviews mostly :). If you are not to busy with lockless
write protection then fine with me. Lest wait
Il 02/09/2013 11:25, Gleb Natapov ha scritto:
On Mon, Sep 02, 2013 at 05:20:15PM +0800, Xiao Guangrong wrote:
On 08/30/2013 08:41 PM, Paolo Bonzini wrote:
Page tables in a read-only memory slot will currently cause a triple
fault because the page walker uses gfn_to_hva and it fails on such a
On Mon, Sep 02, 2013 at 06:00:08PM +0200, Paolo Bonzini wrote:
Il 02/09/2013 11:25, Gleb Natapov ha scritto:
On Mon, Sep 02, 2013 at 05:20:15PM +0800, Xiao Guangrong wrote:
On 08/30/2013 08:41 PM, Paolo Bonzini wrote:
Page tables in a read-only memory slot will currently cause a triple
On Mon, Sep 02, 2013 at 05:06:37PM +0200, Benoît Canet wrote:
Some users running cpu intensive tasks checking the cache CPUID leaves at
startup and making decisions based on the result reported that the guest was
not reflecting the host CPUID leaves when -cpu host is used.
This patch fix
On Mon, Sep 02, 2013 at 05:56:07PM +0200, Paolo Bonzini wrote:
Il 02/09/2013 12:07, Gleb Natapov ha scritto:
On Mon, Sep 02, 2013 at 06:00:39PM +0800, Xiao Guangrong wrote:
On 09/02/2013 05:25 PM, Gleb Natapov wrote:
On Mon, Sep 02, 2013 at 05:20:15PM +0800, Xiao Guangrong wrote:
On
On Mon, Sep 02, 2013 at 05:58:41PM +0200, Paolo Bonzini wrote:
Il 02/09/2013 12:11, Gleb Natapov ha scritto:
Got it, thanks for your explanation.
BTW, if you and Paolo are busy on other things, i am happy to fix these
issues. :)
I am busy with reviews mostly :). If you are not
Signed-off-by: Benoit Canet ben...@irqsave.net
Reviewed-by: Eduardo Habkost ehabk...@redhat.com
Thanks.
Do you have an idea on how QEMU could reflect the real host clock frequency
to the guest when the host cpu scaling governor kicks in ?
Giving a false value to cloud customers is mildly
On 2013-09-02 15:16, Gleb Natapov wrote:
On Thu, Aug 08, 2013 at 04:26:30PM +0200, Jan Kiszka wrote:
We need to update EFER.NX before building the nEPT state via
nested_ept_init_mmu_context. Otherwise, we risk to create an MMU context
that claims to have NX disabled while the guest EPT used
On Mon, Sep 02, 2013 at 07:58:30PM +0200, Jan Kiszka wrote:
On 2013-09-02 15:16, Gleb Natapov wrote:
On Thu, Aug 08, 2013 at 04:26:30PM +0200, Jan Kiszka wrote:
We need to update EFER.NX before building the nEPT state via
nested_ept_init_mmu_context. Otherwise, we risk to create an MMU
On 2013-09-02 20:09, Gleb Natapov wrote:
On Mon, Sep 02, 2013 at 07:58:30PM +0200, Jan Kiszka wrote:
On 2013-09-02 15:16, Gleb Natapov wrote:
On Thu, Aug 08, 2013 at 04:26:30PM +0200, Jan Kiszka wrote:
We need to update EFER.NX before building the nEPT state via
nested_ept_init_mmu_context.
On 2013-09-02 20:20, Jan Kiszka wrote:
On 2013-09-02 20:09, Gleb Natapov wrote:
On Mon, Sep 02, 2013 at 07:58:30PM +0200, Jan Kiszka wrote:
On 2013-09-02 15:16, Gleb Natapov wrote:
On Thu, Aug 08, 2013 at 04:26:30PM +0200, Jan Kiszka wrote:
We need to update EFER.NX before building the nEPT
This reserves space in get/set_one_reg ioctl for the extra guest state
needed for POWER8. It doesn't implement these at all, it just reserves
them so that the ABI is defined now.
A few things to note here:
- This add *a lot* state for transactional memory. TM suspend mode,
this is
On 2013/9/2 15:57, Wei Liu wrote:
On Sat, Aug 31, 2013 at 12:45:11PM +0800, Qin Chuanyu wrote:
On 2013/8/30 0:08, Anthony Liguori wrote:
Hi Qin,
By change the memory copy and notify mechanism ,currently virtio-net with
vhost_net could run on Xen with good performance。
I think the key in
On Wed, Aug 28, 2013 at 02:37:20PM +0200, Paolo Bonzini wrote:
Il 28/08/2013 04:52, Marcelo Tosatti ha scritto:
On Thu, Aug 22, 2013 at 07:05:20PM +0200, Paolo Bonzini wrote:
Il 20/08/2013 20:20, Marcelo Tosatti ha scritto:
The offset to add to the hosts monotonic time, kvmclock_offset,
This reserves space in get/set_one_reg ioctl for the extra guest state
needed for POWER8. It doesn't implement these at all, it just reserves
them so that the ABI is defined now.
A few things to note here:
- This add *a lot* state for transactional memory. TM suspend mode,
this is
This reserves space in get/set_one_reg ioctl for the extra guest state
needed for POWER8. It doesn't implement these at all, it just reserves
them so that the ABI is defined now.
A few things to note here:
- This add *a lot* state for transactional memory. TM suspend mode,
this is
This reserves space in get/set_one_reg ioctl for the extra guest state
needed for POWER8. It doesn't implement these at all, it just reserves
them so that the ABI is defined now.
A few things to note here:
- This add *a lot* state for transactional memory. TM suspend mode,
this is
57 matches
Mail list logo