On Tue, Feb 10, 2015 at 09:41:45AM -0500, r...@redhat.com wrote:
From: Rik van Riel r...@redhat.com
These wrapper functions allow architecture code (eg. ARM) to keep
calling context_tracking_user_enter context_tracking_user_exit
the same way it always has, without error prone tricks like
From: Rik van Riel r...@redhat.com
With code elsewhere doing something conditional on whether or not
context tracking is enabled, we want a stub function that tells us
context tracking is not enabled, when CONFIG_CONTEXT_TRACKING is
not set.
Signed-off-by: Rik van Riel r...@redhat.com
---
From: Rik van Riel r...@redhat.com
The host kernel is not doing anything while the CPU is executing
a KVM guest VCPU, so it can be marked as being in an extended
quiescent state, identical to that used when running user space
code.
The only exception to that rule is when the host handles an
From: Rik van Riel r...@redhat.com
Add the expected ctx_state as a parameter to context_tracking_enter and
context_tracking_exit, allowing the same functions to not just track
kernel user space switching, but also kernel guest transitions.
Signed-off-by: Rik van Riel r...@redhat.com
---
From: Rik van Riel r...@redhat.com
Only run vtime_user_enter, vtime_user_exit, and the user enter exit
trace points when we are entering or exiting user state, respectively.
The KVM code in guest_enter and guest_exit already take care of calling
vtime_guest_enter and vtime_guest_exit,
When running a KVM guest on a system with NOHZ_FULL enabled, and the
KVM guest running with idle=poll mode, we still get wakeups of the
rcuos/N threads.
This problem has already been solved for user space by telling the
RCU subsystem that the CPU is in an extended quiescent state while
running
From: Rik van Riel r...@redhat.com
These wrapper functions allow architecture code (eg. ARM) to keep
calling context_tracking_user_enter context_tracking_user_exit
the same way it always has, without error prone tricks like duplicate
defines of argument values in assembly code.
Signed-off-by:
On 02/10, Denys Vlasenko wrote:
# define HEAD_MASK (TICKET_SLOWPATH_FLAG-1)
...
unlock_again:
val = xadd((lock-ticket.head_tail, TICKET_LOCK_INC);
if (unlikely(!(val HEAD_MASK))) {
/* overflow. we inadvertently incremented the tail word.
* tail's lsb is TICKET_SLOWPATH_FLAG.
Dear Email Account User,
We recently detected an unusual activity from your email account,
hence your mailbox has been temporally suspended by the system administrator,
please recover your account by clicking on the following link OR copy to your
browser:
On 02/10/2015 05:26 AM, Oleg Nesterov wrote:
On 02/10, Raghavendra K T wrote:
On 02/10/2015 06:23 AM, Linus Torvalds wrote:
add_smp(lock-tickets.head, TICKET_LOCK_INC);
if (READ_ONCE(lock-tickets.tail) TICKET_SLOWPATH_FLAG) ..
into something like
val =
On Tue, 10 Feb 2015, Luis R. Rodriguez wrote:
From: Luis R. Rodriguez mcg...@suse.com
This lets you build a kernel which can support xen dom0
or xen guests by just using:
make xenconfig
on both x86 and arm64 kernels. This also splits out the
options which are available currently to
On 2015-02-10 17:18, Paolo Bonzini wrote:
On 10/02/2015 17:15, Jan Kiszka wrote:
#define CR3_L_MODE_RESERVED_BITS 0xFF00ULL
+#define CR3_PCID_INVD (1UL 63)
1ULL (for i386)
Already fixed:
commit cfaa790a3fb8a7efa98f4a6457e19dc3a0db35d3
Author: Borislav Petkov
https://bugzilla.kernel.org/show_bug.cgi?id=92291
Alan a...@lxorguk.ukuu.org.uk changed:
What|Removed |Added
Status|NEW |NEEDINFO
On Tue, Feb 10, 2015 at 09:25:26AM -0800, Paul E. McKenney wrote:
On Tue, Feb 10, 2015 at 11:48:37AM -0500, Rik van Riel wrote:
On 02/10/2015 10:28 AM, Frederic Weisbecker wrote:
On Tue, Feb 10, 2015 at 09:41:45AM -0500, r...@redhat.com wrote:
From: Rik van Riel r...@redhat.com
On 2014-11-02 10:54, Nadav Amit wrote:
Although Intel SDM mentions bit 63 is reserved, MOV to CR3 can have bit 63
set.
As Intel SDM states in section 4.10.4 Invalidation of TLBs and
Paging-Structure Caches: MOV to CR3. ... If CR4.PCIDE = 1 and bit 63 of the
instruction’s source operand is 0
On 10/02/2015 17:15, Jan Kiszka wrote:
#define CR3_L_MODE_RESERVED_BITS 0xFF00ULL
+#define CR3_PCID_INVD (1UL 63)
1ULL (for i386)
Already fixed:
commit cfaa790a3fb8a7efa98f4a6457e19dc3a0db35d3
Author: Borislav Petkov b...@suse.de
Date: Thu Jan 15 09:44:56 2015
On 10/02/2015 17:34, Jan Kiszka wrote:
commit cfaa790a3fb8a7efa98f4a6457e19dc3a0db35d3
Author: Borislav Petkov b...@suse.de
Date: Thu Jan 15 09:44:56 2015 +0100
kvm: Fix CR3_PCID_INVD type on 32-bit
arch/x86/kvm/emulate.c: In function ‘check_cr_write’:
E-mail ®account needs to be updated with the F-Secure R-HTK4S new (2015)
version of the anti-spam/anti-virus/anti-spyware. Please click on the
link
below for updates
==http://goo.gl/O5XNZs
Sorry for the inconvenience.
Regards,
WEBMAIL ADMINISTRATOR Copyright © 2015
All rights reserved ®. ABN
On 2015-02-10 14:14, Paolo Bonzini wrote:
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
external-module-compat-comm.h | 4
external-module-compat.c | 8
2 files changed, 12 insertions(+)
diff --git a/external-module-compat-comm.h b/external-module-compat-comm.h
On Tue, Feb 10, 2015 at 11:48:37AM -0500, Rik van Riel wrote:
On 02/10/2015 10:28 AM, Frederic Weisbecker wrote:
On Tue, Feb 10, 2015 at 09:41:45AM -0500, r...@redhat.com wrote:
From: Rik van Riel r...@redhat.com
These wrapper functions allow architecture code (eg. ARM) to keep
calling
On Tue, Feb 10, 2015 at 06:36:47PM +0100, Frederic Weisbecker wrote:
On Tue, Feb 10, 2015 at 09:25:26AM -0800, Paul E. McKenney wrote:
On Tue, Feb 10, 2015 at 11:48:37AM -0500, Rik van Riel wrote:
On 02/10/2015 10:28 AM, Frederic Weisbecker wrote:
On Tue, Feb 10, 2015 at 09:41:45AM
On 02/10/2015 10:28 AM, Frederic Weisbecker wrote:
On Tue, Feb 10, 2015 at 09:41:45AM -0500, r...@redhat.com wrote:
From: Rik van Riel r...@redhat.com
These wrapper functions allow architecture code (eg. ARM) to keep
calling context_tracking_user_enter context_tracking_user_exit
the same
On 10/02/2015 17:46, Jan Kiszka wrote:
+#if LINUX_VERSION_CODE KERNEL_VERSION(3,18,0)
+bool single_task_running(void)
+{
+ /* Not exactly the same... */
+ return !need_resched();
+}
+#endif
3.15 and earlier lacks ktime_before in addition, see e.g.
https://bugzilla.kernel.org/show_bug.cgi?id=92291
Paolo Bonzini bonz...@gnu.org changed:
What|Removed |Added
CC||bonz...@gnu.org
---
Hi
Please, send any topic that you are interested in covering.
Call details:
By popular demand, a google calendar public entry with it
https://www.google.com/calendar/embed?src=dG9iMXRqcXAzN3Y4ZXZwNzRoMHE4a3BqcXNAZ3JvdXAuY2FsZW5kYXIuZ29vZ2xlLmNvbQ
(Let me know if you have any problems
On 09/02/2015 23:44, David Matlack wrote:
+static inline int __vcpu_run(struct kvm *kvm, struct kvm_vcpu *vcpu)
Kind of confusing function body given the name. Maybe put
if (vcpu-arch.mp_state == KVM_MP_STATE_RUNNABLE
!vcpu-arch.apf.halted)
return
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 09/02/2015 23:58, James Hogan wrote:
First lets save and disable the FPU (and MSA) state with
lose_fpu(1)
Please don't apply this patch yet. lose_fpu() uses function
symbols which aren't exported for modules to use yet, so that'll
need
On Tue, Feb 10, 2015 at 09:01:07AM +0100, Paolo Bonzini wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 09/02/2015 23:58, James Hogan wrote:
First lets save and disable the FPU (and MSA) state with
lose_fpu(1)
Please don't apply this patch yet. lose_fpu() uses function
On 02/10/2015 06:23 AM, Linus Torvalds wrote:
On Mon, Feb 9, 2015 at 4:02 AM, Peter Zijlstra pet...@infradead.org wrote:
On Mon, Feb 09, 2015 at 03:04:22PM +0530, Raghavendra K T wrote:
So we have 3 choices,
1. xadd
2. continue with current approach.
3. a read before unlock and also after
Export the _save_fp asm function used by the lose_fpu(1) macro to GPL
modules so that KVM can make use of it when it is built as a module.
This fixes the following build error when CONFIG_KVM=m due to commit
f798217dfd03 (KVM: MIPS: Don't leak FPU/DSP to guest):
ERROR: _save_fp
These two patches export the _save_fp and _save_msa asm function used by
the lose_fpu(1) macro to GPL modules so that KVM can make use of it when
it is built as a module.
This fixes the following build errors when CONFIG_KVM=m [and
CONFIG_CPU_HAS_MSA=y] due to commit f798217dfd03 (KVM: MIPS:
Export the _save_msa asm function used by the lose_fpu(1) macro to GPL
modules so that KVM can make use of it when it is built as a module.
This fixes the following build error when CONFIG_KVM=m and
CONFIG_CPU_HAS_MSA=y due to commit f798217dfd03 (KVM: MIPS: Don't leak
FPU/DSP to guest):
ERROR:
On 02/10, Raghavendra K T wrote:
On 02/10/2015 06:23 AM, Linus Torvalds wrote:
add_smp(lock-tickets.head, TICKET_LOCK_INC);
if (READ_ONCE(lock-tickets.tail) TICKET_SLOWPATH_FLAG) ..
into something like
val = xadd((lock-ticket.head_tail, TICKET_LOCK_INC
On Sat, Feb 07, 2015 at 09:33:09PM +0100, Paolo Bonzini wrote:
Can remove another 300 cycles from do_div when programming LAPIC
tscdeadline timer.
Do you mean using something like lib/reciprocal_div.c?
Yes.
Good idea,
though that's not latency, it's just being slow. :)
It adds to
On Tue, Feb 10, 2015 at 01:00:35PM -0800, Andy Lutomirski wrote:
On Tue, Feb 10, 2015 at 12:42 PM, Paul E. McKenney
paul...@linux.vnet.ibm.com wrote:
On Tue, Feb 10, 2015 at 12:19:28PM -0800, Andy Lutomirski wrote:
On Tue, Feb 10, 2015 at 12:14 PM, Paul E. McKenney
On Tue, Feb 10, 2015 at 03:27:50PM -0500, r...@redhat.com wrote:
From: Rik van Riel r...@redhat.com
Split out the mechanism from context_tracking_user_enter and
context_tracking_user_exit into context_tracking_enter and
context_tracking_exit. Leave the old functions in order to avoid
On Tue, Feb 10, 2015 at 03:27:53PM -0500, r...@redhat.com wrote:
From: Rik van Riel r...@redhat.com
Export context_tracking_user_enter/exit so it can be used by KVM.
Signed-off-by: Rik van Riel r...@redhat.com
Reviewed-by: Paul E. McKenney paul...@linux.vnet.ibm.com
---
On Tue, Feb 10, 2015 at 12:42 PM, Paul E. McKenney
paul...@linux.vnet.ibm.com wrote:
On Tue, Feb 10, 2015 at 12:19:28PM -0800, Andy Lutomirski wrote:
On Tue, Feb 10, 2015 at 12:14 PM, Paul E. McKenney
paul...@linux.vnet.ibm.com wrote:
On Tue, Feb 10, 2015 at 11:59:09AM -0800, Andy Lutomirski
On Tue, Feb 10, 2015 at 03:27:52PM -0500, r...@redhat.com wrote:
From: Rik van Riel r...@redhat.com
Only run vtime_user_enter, vtime_user_exit, and the user enter exit
trace points when we are entering or exiting user state, respectively.
The KVM code in guest_enter and guest_exit already
On Tue, Feb 10, 2015 at 03:27:54PM -0500, r...@redhat.com wrote:
From: Rik van Riel r...@redhat.com
The host kernel is not doing anything while the CPU is executing
a KVM guest VCPU, so it can be marked as being in an extended
quiescent state, identical to that used when running user space
On Tue, Feb 10, 2015 at 03:27:51PM -0500, r...@redhat.com wrote:
From: Rik van Riel r...@redhat.com
With code elsewhere doing something conditional on whether or not
context tracking is enabled, we want a stub function that tells us
context tracking is not enabled, when
On 02/10/2015 06:41 AM, r...@redhat.com wrote:
From: Rik van Riel r...@redhat.com
The host kernel is not doing anything while the CPU is executing
a KVM guest VCPU, so it can be marked as being in an extended
quiescent state, identical to that used when running user space
code.
The only
On Tue, Feb 10, 2015 at 12:14 PM, Paul E. McKenney
paul...@linux.vnet.ibm.com wrote:
On Tue, Feb 10, 2015 at 11:59:09AM -0800, Andy Lutomirski wrote:
On 02/10/2015 06:41 AM, r...@redhat.com wrote:
From: Rik van Riel r...@redhat.com
The host kernel is not doing anything while the CPU is
When running a KVM guest on a system with NOHZ_FULL enabled, and the
KVM guest running with idle=poll mode, we still get wakeups of the
rcuos/N threads.
This problem has already been solved for user space by telling the
RCU subsystem that the CPU is in an extended quiescent state while
running
From: Rik van Riel r...@redhat.com
With code elsewhere doing something conditional on whether or not
context tracking is enabled, we want a stub function that tells us
context tracking is not enabled, when CONFIG_CONTEXT_TRACKING is
not set.
Signed-off-by: Rik van Riel r...@redhat.com
---
From: Rik van Riel r...@redhat.com
Export context_tracking_user_enter/exit so it can be used by KVM.
Signed-off-by: Rik van Riel r...@redhat.com
---
kernel/context_tracking.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/kernel/context_tracking.c b/kernel/context_tracking.c
index
From: Rik van Riel r...@redhat.com
The host kernel is not doing anything while the CPU is executing
a KVM guest VCPU, so it can be marked as being in an extended
quiescent state, identical to that used when running user space
code.
The only exception to that rule is when the host handles an
On Tue, Feb 10, 2015 at 12:19:28PM -0800, Andy Lutomirski wrote:
On Tue, Feb 10, 2015 at 12:14 PM, Paul E. McKenney
paul...@linux.vnet.ibm.com wrote:
On Tue, Feb 10, 2015 at 11:59:09AM -0800, Andy Lutomirski wrote:
On 02/10/2015 06:41 AM, r...@redhat.com wrote:
From: Rik van Riel
On Tue, Feb 10, 2015 at 11:59:09AM -0800, Andy Lutomirski wrote:
On 02/10/2015 06:41 AM, r...@redhat.com wrote:
From: Rik van Riel r...@redhat.com
The host kernel is not doing anything while the CPU is executing
a KVM guest VCPU, so it can be marked as being in an extended
quiescent state,
From: Rik van Riel r...@redhat.com
Split out the mechanism from context_tracking_user_enter and
context_tracking_user_exit into context_tracking_enter and
context_tracking_exit. Leave the old functions in order to avoid
breaking ARM, which calls these functions from assembler code,
and cannot
On 02/10/2015 02:59 PM, Andy Lutomirski wrote:
On 02/10/2015 06:41 AM, r...@redhat.com wrote:
From: Rik van Riel r...@redhat.com
The host kernel is not doing anything while the CPU is executing
a KVM guest VCPU, so it can be marked as being in an extended
quiescent state, identical to that
From: Rik van Riel r...@redhat.com
Only run vtime_user_enter, vtime_user_exit, and the user enter exit
trace points when we are entering or exiting user state, respectively.
The KVM code in guest_enter and guest_exit already take care of calling
vtime_guest_enter and vtime_guest_exit,
On Fri, 6 Feb 2015, Luis R. Rodriguez wrote:
David should this go through your tree? Can anyone provide pointers?
I think it should probably go through Michal's tree?
It would help to have an ack from at least one of the x86 maintainers, so
maybe add Ingo Molnar mi...@redhat.com and Thomas
On Tue, 2015-02-10 at 14:21 -0800, David Rientjes wrote:
We need an update to the MAINTAINERS file if Yann E. MORIN
yann.morin.1...@free.fr isn't the active Kconfig maintainer anymore.
Yes, we do. Michal, what update would you suggest?
Thanks,
Paul Bolle
--
To unsubscribe from this list:
From: Rik van Riel r...@redhat.com
Export context_tracking_user_enter/exit so it can be used by KVM.
Signed-off-by: Rik van Riel r...@redhat.com
---
kernel/context_tracking.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/kernel/context_tracking.c b/kernel/context_tracking.c
index
From: Luis R. Rodriguez mcg...@suse.com
Resending to the maintainers that it was recommended to try.
Ingo, Thomas, Andrew, who should this go through? Please note
that the Kconfig maintainer is not available anymore and it
was recommended this go through that person first, meanwhile
while that is
From: Luis R. Rodriguez mcg...@suse.com
We'll be adding options for xen as well.
Cc: Josh Triplett j...@joshtriplett.org
Cc: Borislav Petkov b...@suse.de
Cc: Pekka Enberg penb...@kernel.org
Cc: David Rientjes rient...@google.com
Cc: Michal Marek mma...@suse.cz
Cc: Randy Dunlap
From: Luis R. Rodriguez mcg...@suse.com
This lets you build a kernel which can support xen dom0
or xen guests by just using:
make xenconfig
on both x86 and arm64 kernels. This also splits out the
options which are available currently to be built with x86
and 'make ARCH=arm64' under a shared
From: Luis R. Rodriguez mcg...@suse.com
The general documentation we have for pv_ops is currenty present
on the IA64 docs, but since this documentation covers IA64 xen
enablement and IA64 Xen support got ripped out a while ago
through commit d52eefb47 present since v3.14-rc1 lets just
simplify,
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
x86/external-module-compat.h | 4
1 file changed, 4 insertions(+)
diff --git a/x86/external-module-compat.h b/x86/external-module-compat.h
index 475643a..79f2b76 100644
--- a/x86/external-module-compat.h
+++ b/x86/external-module-compat.h
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
Not tested with APICv!
---
sync | 13 +
1 file changed, 9 insertions(+), 4 deletions(-)
diff --git a/sync b/sync
index 3086b70..36bed39 100755
--- a/sync
+++ b/sync
@@ -341,13 +341,18 @@ def hack_content(fname, data):
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
external-module-compat-comm.h | 4
external-module-compat.c | 8
2 files changed, 12 insertions(+)
diff --git a/external-module-compat-comm.h b/external-module-compat-comm.h
index d683c30..456ebf8 100644
---
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
x86/external-module-compat.h | 16
1 file changed, 16 insertions(+)
diff --git a/x86/external-module-compat.h b/x86/external-module-compat.h
index 94cdb45..475643a 100644
--- a/x86/external-module-compat.h
+++
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
external-module-compat-comm.h | 2 +-
external-module-compat.c | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/external-module-compat-comm.h b/external-module-compat-comm.h
index 66cfde2..d683c30 100644
---
The last patch is still mostly untested.
Paolo Bonzini (5):
add AVX512 features
fix missing get_xsave_addr in kernels 3.17-3.18.2
add CONFIG_KVM_GENERIC_DIRTYLOG_READ_PROTECT
add single_task_running
tweak replacement for POSTED_INTR_VECTOR
external-module-compat-comm.h | 6 +-
On Tue, Feb 10, 2015 at 10:30 AM, Raghavendra K T
raghavendra...@linux.vnet.ibm.com wrote:
On 02/10/2015 06:23 AM, Linus Torvalds wrote:
add_smp(lock-tickets.head, TICKET_LOCK_INC);
if (READ_ONCE(lock-tickets.tail) TICKET_SLOWPATH_FLAG) ..
into something like
val
On Tue, Feb 10, 2015 at 2:18 PM, Denys Vlasenko
vda.li...@googlemail.com wrote:
while (1) {
if (READ_ONCE(lock-tickets.head) != TICKET_TAIL(val))
cpu_relax();
}
Doh should be
while (READ_ONCE(lock-tickets.head) != TICKET_TAIL(val)
On 02/10/2015 04:30 AM, Raghavendra K T wrote:
So I think Raghavendra's last version (which hopefully fixes the
lockup problem that Sasha reported) together with changing that
V2 did pass the stress, but getting confirmation Sasha would help.
I've been running it for the last two days, and
On Tue, 10 Feb 2015, Luis R. Rodriguez wrote:
From: Luis R. Rodriguez mcg...@suse.com
This lets you build a kernel which can support xen dom0
or xen guests by just using:
make xenconfig
on both x86 and arm64 kernels. This also splits out the
options which are available currently to
Sorry for that. I’ll try to run some few more tests next week.
Nadav
Paolo Bonzini pbonz...@redhat.com wrote:
NoWrite instructions (e.g. cmp or test) never set the write access
bit in the error code, even if one of the operands is treated as a
destination.
Fixes:
On Tue, Feb 10, 2015 at 04:49:13PM -0800, David Rientjes wrote:
On Tue, 10 Feb 2015, Luis R. Rodriguez wrote:
From: Luis R. Rodriguez mcg...@suse.com
This lets you build a kernel which can support xen dom0
or xen guests by just using:
make xenconfig
on both x86 and arm64
From: Luis R. Rodriguez mcg...@suse.com
This v4 addresses the missing CONFIG_HYPERVISOR_GUEST and
CONFIG_PARAVIRT as noted by David.
Luis R. Rodriguez (2):
x86, platform, xen, kconfig: clarify kvmconfig is for kvm
x86, arm, platform, xen, kconfig: add xen defconfig helper
From: Luis R. Rodriguez mcg...@suse.com
We'll be adding options for xen as well.
Cc: Josh Triplett j...@joshtriplett.org
Cc: Borislav Petkov b...@suse.de
Cc: Pekka Enberg penb...@kernel.org
Cc: David Rientjes rient...@google.com
Cc: Michal Marek mma...@suse.cz
Cc: Randy Dunlap
From: Luis R. Rodriguez mcg...@suse.com
This lets you build a kernel which can support xen dom0
or xen guests by just using:
make xenconfig
on both x86 and arm64 kernels. This also splits out the
options which are available currently to be built with x86
and 'make ARCH=arm64' under a shared
74 matches
Mail list logo