On Sun, Oct 31, 2010 at 06:25:53PM -0400, Kevin O'Connor wrote:
On Sun, Oct 31, 2010 at 01:40:01PM +0200, Gleb Natapov wrote:
This is current sate of the patch series for people to comment on.
I tried to use open firmware naming scheme to specify device path names.
The patch series
On Tue, Oct 26, 2010 at 03:19:38PM -0700, Sridhar Samudrala wrote:
With the current default macvtap mode, a KVM guest using virtio with
macvtap backend has the following limitations.
- cannot change/add a mac address on the guest virtio-net
- cannot create a vlan device on the guest
Tracing 'async' and *pfn is useless, since 'async' is always true,
and '*pfn' is always fault_pfn'
We can trace 'gva' and 'gfn' instead, it can help us to see the
life-cycle of an async_pf
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
---
arch/x86/kvm/mmu.c |2 +-
Use 'DECLARE_EVENT_CLASS' to cleanup async_pf tracepoints
Acked-by: Gleb Natapov g...@redhat.com
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
---
include/trace/events/kvm.h | 76 ---
1 files changed, 35 insertions(+), 41 deletions(-)
diff
Don't search later slots if the slot is empty
Acked-by: Gleb Natapov g...@redhat.com
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
---
arch/x86/kvm/x86.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index
In current code, it checks async pf completion out of the wait context,
like this:
if (vcpu-arch.mp_state == KVM_MP_STATE_RUNNABLE
!vcpu-arch.apf.halted)
r = vcpu_enter_guest(vcpu);
else {
..
If it's no need to inject async #PF to PV guest we can handle
more completed apfs at one time, so we can retry guest #PF
as early as possible
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
---
arch/x86/include/asm/kvm_host.h |3 ++-
arch/x86/kvm/x86.c |8 ++--
In kvm_async_pf_wakeup_all(), we add a dummy apf to vcpu-async_pf.done
without holding vcpu-async_pf.lock, it will break if we are handling apfs
at this time.
Also use 'list_empty_careful()' instead of 'list_empty()'
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
---
Don't make a KVM_REQ_UNHALT request after async pf is completed since it
can break guest's 'HLT' instruction.
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
---
arch/x86/kvm/x86.c | 13 ++---
include/linux/kvm_host.h |6 ++
virt/kvm/kvm_main.c |9
On Mon, Nov 01, 2010 at 05:02:35PM +0800, Xiao Guangrong wrote:
If it's no need to inject async #PF to PV guest we can handle
more completed apfs at one time, so we can retry guest #PF
as early as possible
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
---
On Mon, Nov 01, 2010 at 05:01:28PM +0800, Xiao Guangrong wrote:
In current code, it checks async pf completion out of the wait context,
like this:
if (vcpu-arch.mp_state == KVM_MP_STATE_RUNNABLE
!vcpu-arch.apf.halted)
r = vcpu_enter_guest(vcpu);
On 11/01/2010 05:24 PM, Gleb Natapov wrote:
-put_page(work-page);
-kmem_cache_free(async_pf_cache, work);
+list_del(work-queue);
+vcpu-async_pf.queued--;
+if (work-page)
+put_page(work-page);
+
1. add a secondary mac (or third, etc) address to the guest virtio-net
interface.
Maybe I misunderstood this. Is it just setting another mac on the
guest virtio-net interface?
4. the above stuff must be controllable by host admin
- Well, for this there are a few options:
admin switch
Am 31.10.2010 16:05, Jan Kiszka wrote:
Still not working here are ehci, ath9k and e1000e when passed through.
They receive IRQs, but somehow the Linux guest drivers are unhappy about
the device states (the e1000e detects Hardware Unit Hang e.g.). This
is independent of my patches. Anyone any
On Mon, Nov 01, 2010 at 11:48:23AM +0100, Dragos Tatulea wrote:
1. add a secondary mac (or third, etc) address to the guest virtio-net
interface.
Maybe I misunderstood this. Is it just setting another mac on the
guest virtio-net interface?
Well, yes, that's also not possible at the moment.
Hi Sheng,
I'm not claiming to understand the details, but this looks like use
(dereference of pte via dma_pte_addr) after release (free_pgtable_page
of dmar_domain-pgd aka pte) to me:
static int intel_iommu_attach_device(struct iommu_domain *domain,
struct
I am having a problem with a Fedora 14 x86_64 host booting SMP 2.6.35.x guests.
The boot proceeds halfway but does not reach a shell or desktop.
Oddly the console echoes characters.
I am using a AMD SVM system and found this:
https://patchwork.kernel.org/patch/226981/
Has this been resolved?
Richard Chan wrote:
I am having a problem with a Fedora 14 x86_64 host booting SMP 2.6.35.x
guests.
The boot proceeds halfway but does not reach a shell or desktop.
Oddly the console echoes characters.
I am using a AMD SVM system and found this:
https://patchwork.kernel.org/patch/226981/
Michael Tokarev wrote:
Richard Chan wrote:
I am having a problem with a Fedora 14 x86_64 host booting SMP 2.6.35.x
guests.
The boot proceeds halfway but does not reach a shell or desktop.
Oddly the console echoes characters.
I am using a AMD SVM system and found this:
Hi again,
OK, I swapped those two lines in intel_iommu_attach_device [1], fixed
another warning in the wbinvd emulation, but now I'm about to give up.
This is freaky MMU stuff:
general protection fault: [#1] PREEMPT SMP DEBUG_PAGEALLOC
last sysfs file:
On Mon, Nov 01, 2010 at 05:05:00PM +0800, Xiao Guangrong wrote:
Don't make a KVM_REQ_UNHALT request after async pf is completed since it
can break guest's 'HLT' instruction.
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
---
arch/x86/kvm/x86.c | 13 ++---
[ Forgot to CC LKML - maybe it's not KVM-specific.
BTW, is anyone actually using current KVM device assigment on
Intel? I'm starting to believe that can only very few lucky people...
]
Am 01.11.2010 13:51, Jan Kiszka wrote:
Hi again,
OK, I swapped those two lines in
On Mon, Nov 01, 2010 at 05:03:44PM +0800, Xiao Guangrong wrote:
In kvm_async_pf_wakeup_all(), we add a dummy apf to vcpu-async_pf.done
without holding vcpu-async_pf.lock, it will break if we are handling apfs
at this time.
This should never happen to well behaved guest, but malicious guest
From: Jan Kiszka jan.kis...@siemens.com
smp_call_function_many is specified to be called only with preemption
disabled. Fulfill this requirement.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
arch/x86/kvm/x86.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git
From: Jan Kiszka jan.kis...@siemens.com
Micro optimization to avoid calling wbinvd twice on the CPU that has to
emulate it. As we might be preempted between smp_call_function_many and
the local wbinvd, the cache might be filled again so that real work
could be done uselessly.
Signed-off-by: Jan
On Mon, Nov 01, 2010 at 04:58:43PM +0800, Xiao Guangrong wrote:
Tracing 'async' and *pfn is useless, since 'async' is always true,
and '*pfn' is always fault_pfn'
We can trace 'gva' and 'gfn' instead, it can help us to see the
life-cycle of an async_pf
Signed-off-by: Xiao Guangrong
The registers rax and rbx contain non-canonical addresses (if
interpreted as pointers). The instruction where this happens is a mov so
I guess that the #GP is because of an non-canonical address.
Can you find out the code-line where this happens and the exact
assembler instruction? (haven't
Am 01.11.2010 14:21, Roedel, Joerg wrote:
The registers rax and rbx contain non-canonical addresses (if
interpreted as pointers). The instruction where this happens is a mov so
I guess that the #GP is because of an non-canonical address.
Can you find out the code-line where this happens and
Currently the exit is unhandled, so guest halts with error if it tries
to execute INVD instruction. Call into emulator when INVD instruction
is executed by a guest instead. This instruction is not needed by ordinary
guests, but firmware (like OpenBIOS) use it and fail.
Signed-off-by: Gleb Natapov
On Mon, Nov 01, 2010 at 09:25:00AM -0400, Jan Kiszka wrote:
Am 01.11.2010 14:21, Roedel, Joerg wrote:
The registers rax and rbx contain non-canonical addresses (if
interpreted as pointers). The instruction where this happens is a mov so
I guess that the #GP is because of an non-canonical
From: Jan Kiszka jan.kis...@siemens.com
When we deassign a guest IRQ, clear the potentially asserted guest line.
There might be no chance for the guest to do this, specifically if we
switch from INTx to MSI mode.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
virt/kvm/assigned-dev.c |
Three patches to improve classic device assigment /wrt IRQs. Highlight
is the last one that resolves the host IRQ sharing issue for all PCI 2.3
devices. Quite essential when passing non-MSI-ready devices like many
USB host controllers.
Jan Kiszka (3):
KVM: Fold assigned interrupt work into IRQ
From: Jan Kiszka jan.kis...@siemens.com
PCI 2.3 allows to generically disable IRQ sources at device level. This
enables us to share IRQs of such devices between on the host side when
passing them to a guest.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
include/linux/kvm_host.h |1 +
From: Jan Kiszka jan.kis...@siemens.com
The complete work handler runs with assigned_dev_lock acquired and
interrupts disabled, so there is nothing to gain pushing this work out
of the actually IRQ handler. Fold them together.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
Is this the complete patch set? Or maybe it assumes a pre-patch kernel
tree. If so where can I get it?
thanks,
-Etienne
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
Am 01.11.2010 14:53, Roedel, Joerg wrote:
On Mon, Nov 01, 2010 at 09:25:00AM -0400, Jan Kiszka wrote:
Am 01.11.2010 14:21, Roedel, Joerg wrote:
The registers rax and rbx contain non-canonical addresses (if
interpreted as pointers). The instruction where this happens is a mov so
I guess that
On Mon, Nov 01, 2010 at 03:22:15PM +0100, Jan Kiszka wrote:
Am 01.11.2010 14:53, Roedel, Joerg wrote:
On Mon, Nov 01, 2010 at 09:25:00AM -0400, Jan Kiszka wrote:
Am 01.11.2010 14:21, Roedel, Joerg wrote:
The registers rax and rbx contain non-canonical addresses (if
interpreted as
v2:
- Move to Makefile.objs
- Move structures to memory.c and create a callback function
- Fix memory leak
I haven't moved to the state parameter because there should only
be a single instance of this per VM. The state parameter seems
like it would add complications in setup and function
This adds a minimum chunk of Anthony's RAM API support so that we
can identify actual VM RAM versus all the other things that make
use of qemu_ram_alloc.
Signed-off-by: Alex Williamson alex.william...@redhat.com
---
Makefile.objs |1 +
cpu-common.h |2 +
memory.c | 109
Register the actual VM RAM using the new API
Signed-off-by: Alex Williamson alex.william...@redhat.com
---
hw/pc.c | 12 ++--
1 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/hw/pc.c b/hw/pc.c
index 69b13bf..0ea6d10 100644
--- a/hw/pc.c
+++ b/hw/pc.c
@@ -912,14 +912,14
On Mon, Nov 01, 2010 at 03:08:37PM +0100, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
PCI 2.3 allows to generically disable IRQ sources at device level. This
enables us to share IRQs of such devices between on the host side when
passing them to a guest.
Signed-off-by: Jan
Am 01.11.2010 15:35, Joerg Roedel wrote:
On Mon, Nov 01, 2010 at 03:22:15PM +0100, Jan Kiszka wrote:
Am 01.11.2010 14:53, Roedel, Joerg wrote:
On Mon, Nov 01, 2010 at 09:25:00AM -0400, Jan Kiszka wrote:
Am 01.11.2010 14:21, Roedel, Joerg wrote:
The registers rax and rbx contain non-canonical
Am 01.11.2010 16:24, Michael S. Tsirkin wrote:
On Mon, Nov 01, 2010 at 03:08:37PM +0100, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
PCI 2.3 allows to generically disable IRQ sources at device level. This
enables us to share IRQs of such devices between on the host side when
On 09/25/2010 11:36 AM, Jason Wang wrote:
We could give a further test of migration by launch test during migartion. So
the following series implements:
- A simple class to run a specified test in the background which could be used
to launch other test during migartion. Its design is rather
On Sun, Oct 24, 2010 at 02:27:55PM +0200, Gleb Natapov wrote:
Add save/restore of MSR for migration and cpuid bit.
Signed-off-by: Gleb Natapov g...@redhat.com
--
v1-v2
- use vmstate subsection to migrate new msr.
v2-v3
- rebase onto uq/master
- protect use of MSR_KVM_ASYNC_PF_EN
On Mon, Nov 01, 2010 at 04:41:08PM +0100, Jan Kiszka wrote:
Am 01.11.2010 16:24, Michael S. Tsirkin wrote:
On Mon, Nov 01, 2010 at 03:08:37PM +0100, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
PCI 2.3 allows to generically disable IRQ sources at device level. This
enables
On Thu, 2010-10-28 at 17:00 +0200, Avi Kivity wrote:
On 10/23/2010 06:55 PM, Alex Williamson wrote:
On Sat, 2010-10-23 at 18:18 +0200, Michael S. Tsirkin wrote:
On Fri, Oct 22, 2010 at 02:40:31PM -0600, Alex Williamson wrote:
To enable common msix support to be used with pass through
On 09/25/2010 11:36 AM, Jason Wang wrote:
This test just do the file transfer from host to guest during migartion in
order
to check whether the nic/block state could be saved and loaded correctly.
Signed-off-by: Jason Wang jasow...@redhat.com
---
Am 01.11.2010 16:52, Michael S. Tsirkin wrote:
On Mon, Nov 01, 2010 at 04:41:08PM +0100, Jan Kiszka wrote:
Am 01.11.2010 16:24, Michael S. Tsirkin wrote:
On Mon, Nov 01, 2010 at 03:08:37PM +0100, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
PCI 2.3 allows to generically disable
Am 01.11.2010 15:08, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
The complete work handler runs with assigned_dev_lock acquired and
interrupts disabled, so there is nothing to gain pushing this work out
of the actually IRQ handler. Fold them together.
Err, forget it.
Am 01.11.2010 16:29, Jan Kiszka wrote:
Nope. But I just noticed a fatal thinko in my fix to
intel_iommu_attach_device - probably that was the key. Need to boot the
test kernel...
That was indeed the reason for this GPF: I blindly swapped the
problematic lines, releasing the wrong page. Sorry,
On Mon, Nov 01, 2010 at 05:30:20PM +0100, Jan Kiszka wrote:
Am 01.11.2010 16:52, Michael S. Tsirkin wrote:
On Mon, Nov 01, 2010 at 04:41:08PM +0100, Jan Kiszka wrote:
Am 01.11.2010 16:24, Michael S. Tsirkin wrote:
On Mon, Nov 01, 2010 at 03:08:37PM +0100, Jan Kiszka wrote:
From: Jan
I have created a wiki page for this [1], also added to the networking
todo list [2]. No meaty information yet. But it's enough to start
working on it.
[1] - http://www.linux-kvm.org/page/GuestProgrammableMacVlanFiltering
[2] - http://www.linux-kvm.org/page/NetworkingTodo
-- Dragos
--
To
On Wed, Oct 27, 2010 at 06:21:02PM +0900, Takuya Yoshikawa wrote:
This patch series just change the way we allocate dirty bitmaps but don't
change timing related issues.
- Changelog
I have not changed anything about patch 1 and 2 since I got
looks good comment from Marcelo. Just
On Sun, Oct 24, 2010 at 03:38:46PM +0200, Avi Kivity wrote:
This allows Linux to mask cpuid bits if, for example, nx is enabled on only
some cpus.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/x86.c |9 +
1 files changed, 9 insertions(+), 0 deletions(-)
diff
On Sun, Oct 24, 2010 at 04:49:08PM +0200, Gleb Natapov wrote:
Add tracepoint for userspace exit.
Signed-off-by: Gleb Natapov g...@redhat.com
---
ChangeLog:
v1-v2
log error case too.
Applied, thanks.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a
On Wed, Oct 27, 2010 at 05:21:21PM +0200, Heiko Carstens wrote:
From: Heiko Carstens heiko.carst...@de.ibm.com
Fixes this:
CC arch/s390/kvm/../../../virt/kvm/kvm_main.o
arch/s390/kvm/../../../virt/kvm/kvm_main.c: In function
'kvm_clear_guest_page':
On Sat, Oct 30, 2010 at 01:04:24PM +0400, Vasiliy Kulikov wrote:
Structure kvm_ppc_pvinfo is copied to userland with flags and
pad fields unitialized. It leads to leaking of contents of
kernel stack memory.
Signed-off-by: Vasiliy Kulikov sego...@gmail.com
---
I cannot compile this
On Sat, Oct 30, 2010 at 10:54:47PM +0400, Vasiliy Kulikov wrote:
Structures kvm_vcpu_events, kvm_debugregs, kvm_pit_state2 and
kvm_clock_data are copied to userland with some padding and reserved
fields unitialized. It leads to leaking of contents of kernel stack
memory. We have to
On Mon, 1 Nov 2010, Takuya Yoshikawa wrote:
(2010/10/31 3:28), Jesper Juhl wrote:
Hi,
We can improve kvm_vm_ioctl_get_dirty_log() slightly by using vzalloc()
rather than first allocating and then manually zero the memory with
memset(). Also, while I was looking at this I noticed that
hi,
the rcu_dereference_check is defined as
#define rcu_dereference_check(p, c) \
__rcu_dereference_check((p), rcu_read_lock_held() || (c), __rcu)
so the caller does not need to specify rcu_read_lock_held() condition.
wbr,
jirka
Signed-off-by: Jiri Olsa jo...@redhat.com
---
hi,
the rcu_dereference_check is defined as
#define rcu_dereference_check(p, c) \
__rcu_dereference_check((p), rcu_read_lock_held() || (c), __rcu)
so the caller does not need to specify rcu_read_lock_held() condition.
wbr,
jirka
Signed-off-by: Jiri Olsa jo...@redhat.com
---
hi,
the rcu_dereference_check is defined as
#define rcu_dereference_check(p, c) \
__rcu_dereference_check((p), rcu_read_lock_held() || (c), __rcu)
so the caller does not need to specify rcu_read_lock_held() condition.
wbr,
jirka
Signed-off-by: Jiri Olsa jo...@redhat.com
---
hi,
the rcu_dereference_check is defined as
#define rcu_dereference_check(p, c) \
__rcu_dereference_check((p), rcu_read_lock_held() || (c), __rcu)
so the caller does not need to specify rcu_read_lock_held()
condition.
Several places in kernel are spcifying rcu_read_lock_held as
On Mon, 2010-11-01 at 11:49 -0700, Anthony Liguori wrote:
On 11/01/2010 11:09 AM, Marcelo Tosatti wrote:
On Tue, Oct 26, 2010 at 10:39:48AM +0800, Huang Ying wrote:
Author: Max Asbockmasb...@linux.vnet.ibm.com
Add command pfa2hva to translate guest physical address to host
virtual
On 11/01/2010 02:20 PM, Huang Ying wrote:
Yes. As general interface, it may not work so well, but as test
interface, it works quite well and useful.
Do we have any mechanism to add a test only interface?
I'd like to see what Luiz/Markus think but definitely only a human
monitor interface
On 11/01/2010 12:06 PM, Marcelo Tosatti wrote:
On Sun, Oct 24, 2010 at 04:49:08PM +0200, Gleb Natapov wrote:
Add tracepoint for userspace exit.
Signed-off-by: Gleb Natapovg...@redhat.com
---
ChangeLog:
v1-v2
log error case too.
Applied, thanks.
errno sign is still
I built from qemu-kvm-0.13.0.tar.gz on a Debian system with kernel
linux-image-2.6.32-5-amd642.6.32-26
(but otherwise basically the stable/lenny version) and now see
Oct 26 16:57:38 markov kernel: [ 5757.672426] kvm: 23063: cpu0 unhandled wrmsr:
0x198 data 0
Oct 26 16:57:38 markov
On Mon, Nov 01, 2010 at 03:33:20PM -0400, Avi Kivity wrote:
On 11/01/2010 12:06 PM, Marcelo Tosatti wrote:
On Sun, Oct 24, 2010 at 04:49:08PM +0200, Gleb Natapov wrote:
Add tracepoint for userspace exit.
Signed-off-by: Gleb Natapovg...@redhat.com
---
ChangeLog:
v1-v2
On Sat, 2010-10-30 at 22:06 +0200, Michael S. Tsirkin wrote:
On Fri, Oct 29, 2010 at 08:43:08AM -0700, Shirley Ma wrote:
On Fri, 2010-10-29 at 10:10 +0200, Michael S. Tsirkin wrote:
Hmm. I don't yet understand. We are still doing copies into the
per-vq
buffer, and the data copied is
From: Jiri Olsa jo...@redhat.com
Date: Mon, 1 Nov 2010 20:15:09 +0100
the rcu_dereference_check is defined as
#define rcu_dereference_check(p, c) \
__rcu_dereference_check((p), rcu_read_lock_held() || (c), __rcu)
so the caller does not need to specify rcu_read_lock_held()
Add a unit test for NMI immediately after an IF-enabling STI.
Avi Kivity (2):
apic: use boot idt instead of a locally allocated idt
apic: test nmi-after-sti
x86/apic.c | 83 +---
1 files changed, 68 insertions(+), 15 deletions(-)
--
While not required by the spec, some guests (Linux)
rely on nmi being blocked by an IF-enabling sti. Add
a unit test for this condition.
Signed-off-by: Avi Kivity a...@redhat.com
---
x86/apic.c | 67
1 files changed, 67
This allows the smp support, which uses the boot idt, to work.
Signed-off-by: Avi Kivity a...@redhat.com
---
x86/apic.c | 16 +---
1 files changed, 1 insertions(+), 15 deletions(-)
diff --git a/x86/apic.c b/x86/apic.c
index 48fa0f7..165f820 100644
--- a/x86/apic.c
+++ b/x86/apic.c
On 11/01/2010 03:43 PM, Marcelo Tosatti wrote:
On Mon, Nov 01, 2010 at 03:33:20PM -0400, Avi Kivity wrote:
On 11/01/2010 12:06 PM, Marcelo Tosatti wrote:
On Sun, Oct 24, 2010 at 04:49:08PM +0200, Gleb Natapov wrote:
Add tracepoint for userspace exit.
Signed-off-by: Gleb
While not mandated by the spec, Linux relies on NMI being blocked by an
IF-enabling STI. VMX also refuses to enter a guest in this state, at
least on some implementations.
Disallow NMI while blocked by STI by checking for the condition, and
requesting an interrupt window exit if it occurs.
I've applied all your patches. Thanks!
On Saturday, October 30, 2010 09:58:55 am Alex Williamson wrote:
Hi Tom,
I've updated some patches I've been working on to v5 and wanted to
see what you think. I also found a couple minor bugs, fixed in this
series.
The main idea is that since the
Hi,
Are there any lingering issues or concerns with the latest rbd patch, or
other roadblocks that would prevent this from being merged?
Thanks-
sage
On Fri, 15 Oct 2010, Christian Brunner wrote:
Hi,
once again, Yehuda committed fixes for all the suggestions made on the
list (and more).
On Mon, 2010-11-01 at 20:15 +0100, Jiri Olsa wrote:
hi,
the rcu_dereference_check is defined as
#define rcu_dereference_check(p, c) \
__rcu_dereference_check((p), rcu_read_lock_held() || (c), __rcu)
so the caller does not need to specify rcu_read_lock_held() condition.
On 11/01/2010 08:15 PM, Jiri Olsa wrote:
diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h
index a055742..a90a7e3 100644
--- a/include/linux/kvm_host.h
+++ b/include/linux/kvm_host.h
@@ -256,7 +256,6 @@ void kvm_put_kvm(struct kvm *kvm);
static inline struct kvm_memslots
Hi Jesper, (dropped some addresses from Cc)
Jesper Juhl wrote:
There's definately a positive size impact for the generated object code
and we save having to do the call to memset() and the cost of a vzalloc()
call looks more or less the same as a call to vmalloc() to me.
This patch is
The Buildbot has detected a new failure of default_i386_debian_5_0 on qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/default_i386_debian_5_0/builds/628
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build: b1_qemu_kvm_2
The Buildbot has detected a new failure of default_i386_out_of_tree on qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/default_i386_out_of_tree/builds/565
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build: b1_qemu_kvm_2
On 11/01/2010 08:55 PM, Gleb Natapov wrote:
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 2cfdf2d..f7aed95 100644
--- a/arch/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@ -5295,8 +5295,9 @@ static int __vcpu_run(struct kvm_vcpu *vcpu)
{
On Tue, 2 Nov 2010, Takuya Yoshikawa wrote:
Hi Jesper, (dropped some addresses from Cc)
Jesper Juhl wrote:
There's definately a positive size impact for the generated object code
and we save having to do the call to memset() and the cost of a vzalloc()
call looks more or less the
- Virtual channel position gets truncated as a u8
- Print the ecap that's unknown, not the last cap we saw
- Print actual config offset, which provides enough info to make
some sense of the error.
Signed-off-by: Alex Williamson alex.william...@redhat.com
---
drivers/vfio/vfio_pci_config.c
Michael Goldish writes:
On 09/25/2010 11:36 AM, Jason Wang wrote:
This test just do the file transfer from host to guest during migartion in
order
to check whether the nic/block state could be saved and loaded correctly.
Signed-off-by: Jason Wang jasow...@redhat.com
---
Michael Goldish writes:
On 09/25/2010 11:36 AM, Jason Wang wrote:
We could give a further test of migration by launch test during migartion.
So
the following series implements:
- A simple class to run a specified test in the background which could be
used
to launch other
On Sat, Oct 30, 2010 at 01:04:24PM +0400, Vasiliy Kulikov wrote:
Structure kvm_ppc_pvinfo is copied to userland with flags and
pad fields unitialized. It leads to leaking of contents of
kernel stack memory.
Signed-off-by: Vasiliy Kulikov sego...@gmail.com
---
I cannot compile this
89 matches
Mail list logo