On 05/03/2013 10:27 AM, Takuya Yoshikawa wrote:
On Sat, 27 Apr 2013 11:13:20 +0800
Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com wrote:
+/*
+ * Fast invalid all shadow pages belong to @slot.
+ *
+ * @slot != NULL means the invalidation is caused the memslot specified
+ * by @slot is
On 05/01/2013 01:38 PM, Jordan Justen wrote:
Don't use #ifdef __KVM_HAVE_READONLY_MEM when defining
KVM_CAP_READONLY_MEM.
Signed-off-by: Jordan Justen jordan.l.jus...@intel.com
Cc: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com
Cc: Jan Kiszka jan.kis...@siemens.com
---
Asias He (4):
vhost: Remove comments for hdr in vhost.h
vhost: Simplify dev-vqs[i] access
vhost-net: Free ubuf when vhost_dev_ioctl fails
vhost-net: Cleanup vhost_ubuf adn vhost_zcopy
drivers/vhost/net.c | 76 +++
drivers/vhost/vhost.c |
It is supposed to be removed when hdr is moved into vhost_net_virtqueue.
Signed-off-by: Asias He as...@redhat.com
---
drivers/vhost/vhost.h | 3 ---
1 file changed, 3 deletions(-)
diff --git a/drivers/vhost/vhost.h b/drivers/vhost/vhost.h
index 6fefebf..f9045b4 100644
---
Signed-off-by: Asias He as...@redhat.com
---
drivers/vhost/vhost.c | 35 ++-
1 file changed, 18 insertions(+), 17 deletions(-)
diff --git a/drivers/vhost/vhost.c b/drivers/vhost/vhost.c
index 73100fe..0003bab 100644
--- a/drivers/vhost/vhost.c
+++
Free ubuf when vhost_dev_ioctl for VHOST_SET_OWNER fails.
Signed-off-by: Asias He as...@redhat.com
---
drivers/vhost/net.c | 20 ++--
1 file changed, 18 insertions(+), 2 deletions(-)
diff --git a/drivers/vhost/net.c b/drivers/vhost/net.c
index b2f6b41..eb73217 100644
---
- Rename vhost_ubuf to vhost_net_ubuf
- Rename vhost_zcopy_mask to vhost_net_zcopy_mask
- Make funcs static
Signed-off-by: Asias He as...@redhat.com
---
drivers/vhost/net.c | 58 +++--
1 file changed, 30 insertions(+), 28 deletions(-)
diff --git
On 2013-05-03 08:19, Xiao Guangrong wrote:
On 05/01/2013 01:38 PM, Jordan Justen wrote:
Don't use #ifdef __KVM_HAVE_READONLY_MEM when defining
KVM_CAP_READONLY_MEM.
Signed-off-by: Jordan Justen jordan.l.jus...@intel.com
Cc: Xiao Guangrong xiaoguangr...@linux.vnet.ibm.com
Cc: Jan Kiszka
On Wed, 2013-05-01 at 16:50 +0100, Will Deacon wrote:
Hi guys,
This RFC series does a number of things, but the main goal is to allow
re-use of the emulation code under hw/ on architectures other than x86.
It also comes about after discussions concerning virtio-console for
earlyprintk:
Asias He (5):
vhost-scsi: Remove unnecessary forward struct vhost_scsi declaration
vhost-scsi: Rename struct vhost_scsi *s to *vs
vhost-scsi: Make func indention more consistent
vhost-scsi: Rename struct tcm_vhost_tpg *tv_tpg to *tpg
vhost-scsi: Rename struct tcm_vhost_cmd *tv_cmd to
vs is used everywhere, make the naming more consistent.
Signed-off-by: Asias He as...@redhat.com
---
drivers/vhost/scsi.c | 56 ++--
1 file changed, 28 insertions(+), 28 deletions(-)
diff --git a/drivers/vhost/scsi.c b/drivers/vhost/scsi.c
index
Signed-off-by: Asias He as...@redhat.com
---
drivers/vhost/scsi.c | 154 +--
1 file changed, 88 insertions(+), 66 deletions(-)
diff --git a/drivers/vhost/scsi.c b/drivers/vhost/scsi.c
index d4798e1..d9781ed 100644
--- a/drivers/vhost/scsi.c
+++
It was needed when struct tcm_vhost_tpg is in tcm_vhost.h
Signed-off-by: Asias He as...@redhat.com
---
drivers/vhost/scsi.c | 1 -
1 file changed, 1 deletion(-)
diff --git a/drivers/vhost/scsi.c b/drivers/vhost/scsi.c
index 2dcb94a..02ddedd 100644
--- a/drivers/vhost/scsi.c
+++
Signed-off-by: Asias He as...@redhat.com
---
drivers/vhost/scsi.c | 122 +--
1 file changed, 61 insertions(+), 61 deletions(-)
diff --git a/drivers/vhost/scsi.c b/drivers/vhost/scsi.c
index d9781ed..353145f 100644
--- a/drivers/vhost/scsi.c
+++
This way, we use cmd for struct tcm_vhost_cmd and evt for struct
tcm_vhost_cmd.
Signed-off-by: Asias He as...@redhat.com
---
drivers/vhost/scsi.c | 142 +--
1 file changed, 71 insertions(+), 71 deletions(-)
diff --git a/drivers/vhost/scsi.c
Hi all,
a while ago, I have set up a KVM virtual machine with PCI passthrough. The
device which is passed through is an AVM Fritz!card PCI v2.1.
This works, but there is a drawback: At that time, KVM was not able to do PCI
passthrough for PCI devices with shared interrupt. So I had to find
On 2013-05-03 09:33, Binarus wrote:
Hi all,
a while ago, I have set up a KVM virtual machine with PCI passthrough.
The device which is passed through is an AVM Fritz!card PCI v2.1.
This works, but there is a drawback: At that time, KVM was not able to
do PCI passthrough for PCI devices
Il 03/05/2013 04:47, Hu Tao ha scritto:
pvpanic device is a qemu simulated device through which guest panic
event is sent to host.
Signed-off-by: Hu Tao hu...@cn.fujitsu.com
Reviewed-by: Paolo Bonzini pbonz...@redhat.com
but you may reword the help message as hinted below.
Paolo
---
On Wed, May 1, 2013 at 6:50 PM, Will Deacon will.dea...@arm.com wrote:
From: Marc Zyngier marc.zyng...@arm.com
Kvmtool suppresses any output to a console that has not been elected
as *the* console.
While this makes sense on the input side (we want the input to be sent
to one console driver
On 05/03/2013 02:26 PM, Jan Kiszka wrote:
On 2013-05-03 08:19, Xiao Guangrong wrote:
On 05/01/2013 01:38 PM, Jordan Justen wrote:
Don't use #ifdef __KVM_HAVE_READONLY_MEM when defining
KVM_CAP_READONLY_MEM.
Signed-off-by: Jordan Justen jordan.l.jus...@intel.com
Cc: Xiao Guangrong
+static void kvmppc_booke_vcpu_load_debug_regs(struct kvm_vcpu
+*vcpu) {
+ if (!vcpu-arch.debug_active)
+ return;
+
+ /* Disable all debug events and clead pending debug events */
+ mtspr(SPRN_DBCR0, 0x0);
+ kvmppc_clear_dbsr();
+
+ /*
+ * Check whether guest still
Hi David,
On Thu, May 02, 2013 at 10:48:36PM -0300, Marcelo Tosatti wrote:
On Thu, May 02, 2013 at 11:22:52AM -0700, David Daney wrote:
Hi,
I am working on the MIPS KVM port, and am trying to figure out under
which circumstances do I need to srcu_read_lock()/srcu_read_unlock()
the
Am 03.05.2013 um 12:48 schrieb Bhushan Bharat-R65777 r65...@freescale.com:
+static void kvmppc_booke_vcpu_load_debug_regs(struct kvm_vcpu
+*vcpu) {
+if (!vcpu-arch.debug_active)
+return;
+
+/* Disable all debug events and clead pending debug events */
+
On Thu, 2 May 2013, Marcelo Tosatti wrote:
On Tue, Apr 30, 2013 at 12:06:27PM -0400, Robert P. J. Day wrote:
poking around in the KVM code and ran across this in kvm_main.c:
... snip ...
out_dir:
debugfs_remove_recursive(kvm_debugfs_dir);
out:
return r;
}
On 03.05.2013, at 13:08, Alexander Graf wrote:
Am 03.05.2013 um 12:48 schrieb Bhushan Bharat-R65777 r65...@freescale.com:
+static void kvmppc_booke_vcpu_load_debug_regs(struct kvm_vcpu
+*vcpu) {
+if (!vcpu-arch.debug_active)
+return;
+
+/* Disable all debug events
-Original Message-
From: Alexander Graf [mailto:ag...@suse.de]
Sent: Friday, May 03, 2013 6:00 PM
To: Bhushan Bharat-R65777
Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.org; Wood Scott-B07421
Subject: Re: [PATCH 7/7 v3] KVM: PPC: Add userspace debug stub support
On 03.05.2013,
On 03.05.2013, at 15:11, Bhushan Bharat-R65777 wrote:
-Original Message-
From: Alexander Graf [mailto:ag...@suse.de]
Sent: Friday, May 03, 2013 6:00 PM
To: Bhushan Bharat-R65777
Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.org; Wood Scott-B07421
Subject: Re: [PATCH 7/7 v3] KVM:
On Mon, Apr 08, 2013 at 05:17:02PM +0100, Marc Zyngier wrote:
This series contains the third version of KVM for arm64.
It depends on the following branches/series:
- git://git.kernel.org/pub/scm/linux/kernel/git/cmarinas/linux-aarch64.git
soc-armv8-model
Catalin's platform support branch
As KVM/arm64 is looming on the horizon, it makes sense to move some
of the common code to a single location in order to reduce duplication.
The code could live anywhere. Actually, most of KVM is already built
with a bunch of ugly ../../.. hacks in the various Makefiles, so we're
not exactly
As KVM/arm64 is looming on the horizon, it makes sense to move some
of the common code to a single location in order to reduce duplication.
The code could live anywhere. Actually, most of KVM is already built
with a bunch of ugly ../../.. hacks in the various Makefiles, so we're
not exactly
On the road to turn KVM/arm64 into something more sensible, change
the way we compile the VGIC and arch_timer code by using local
Makefiles instead of the very backward method we used before.
Signed-off-by: Marc Zyngier marc.zyng...@arm.com
---
Makefile | 2 +-
arch/arm/kvm/Makefile
On Fri, 2013-05-03 at 10:35 +0200, Jan Kiszka wrote:
On 2013-05-03 09:33, Binarus wrote:
Hi all,
a while ago, I have set up a KVM virtual machine with PCI passthrough.
The device which is passed through is an AVM Fritz!card PCI v2.1.
This works, but there is a drawback: At that
On 2013-05-03 16:37, Alex Williamson wrote:
On Fri, 2013-05-03 at 10:35 +0200, Jan Kiszka wrote:
On 2013-05-03 09:33, Binarus wrote:
Hi all,
a while ago, I have set up a KVM virtual machine with PCI passthrough.
The device which is passed through is an AVM Fritz!card PCI v2.1.
This works,
On Fri, May 3, 2013 at 7:32 PM, Marc Zyngier marc.zyng...@arm.com wrote:
As KVM/arm64 is looming on the horizon, it makes sense to move some
of the common code to a single location in order to reduce duplication.
The code could live anywhere. Actually, most of KVM is already built
with a
On Fri, May 03, 2013 at 01:52:07PM +0800, Xiao Guangrong wrote:
On 05/03/2013 09:05 AM, Marcelo Tosatti wrote:
+
+/*
+ * Fast invalid all shadow pages belong to @slot.
+ *
+ * @slot != NULL means the invalidation is caused the memslot specified
+ * by @slot is being deleted, in this
Hi,
the new version of cart config is on github
https://github.com/autotest/virt-test/pull/335
Please send me your comment and I'll try to change code to good shape if there
is a problem.
I'll choose one big patch because there is almost no possibility split parser
to parts.
Unittest is in
On 03/05/13 16:31, Anup Patel wrote:
On Fri, May 3, 2013 at 7:32 PM, Marc Zyngier marc.zyng...@arm.com wrote:
As KVM/arm64 is looming on the horizon, it makes sense to move some
of the common code to a single location in order to reduce duplication.
The code could live anywhere. Actually,
On 05/03/2013 05:19 AM, Pekka Enberg wrote:
On Wed, May 1, 2013 at 6:50 PM, Will Deacon will.dea...@arm.com wrote:
From: Marc Zyngier marc.zyng...@arm.com
Kvmtool suppresses any output to a console that has not been elected
as *the* console.
While this makes sense on the input side (we want
On Fri, May 03, 2013 at 05:02:14PM +0100, Sasha Levin wrote:
On 05/03/2013 05:19 AM, Pekka Enberg wrote:
On Wed, May 1, 2013 at 6:50 PM, Will Deacon will.dea...@arm.com wrote:
From: Marc Zyngier marc.zyng...@arm.com
Kvmtool suppresses any output to a console that has not been elected
as
A change in the generic code highlighted that we were running with IRQs
(soft) enabled on Book3E 64-bit when trying to restart interrupts from
handle_exit(). This is a lesson to configure lockdep often :)
There is no reason to exit guest with soft_enabled == 1, a local_irq_enable()
call will do
On 03.05.2013, at 18:11, Mihai Caraman wrote:
A change in the generic code highlighted that we were running with IRQs
(soft) enabled on Book3E 64-bit when trying to restart interrupts from
handle_exit(). This is a lesson to configure lockdep often :)
There is no reason to exit guest with
On 05/03/2013 11:53 PM, Marcelo Tosatti wrote:
On Fri, May 03, 2013 at 01:52:07PM +0800, Xiao Guangrong wrote:
On 05/03/2013 09:05 AM, Marcelo Tosatti wrote:
+
+/*
+ * Fast invalid all shadow pages belong to @slot.
+ *
+ * @slot != NULL means the invalidation is caused the memslot
On 05/03/2013 03:51 AM, Gleb Natapov wrote:
Hi David,
On Thu, May 02, 2013 at 10:48:36PM -0300, Marcelo Tosatti wrote:
On Thu, May 02, 2013 at 11:22:52AM -0700, David Daney wrote:
Hi,
I am working on the MIPS KVM port, and am trying to figure out under
which circumstances do I need to
Thanks for the comments.
This patch was mostly just mechanical rebase of the original patch,
and I'm going to clean it up.
On Thu, May 2, 2013 at 4:54 PM, Marcelo Tosatti mtosa...@redhat.com wrote:
On Thu, Apr 25, 2013 at 11:43:22PM -0700, Jun Nakajima wrote:
This is the first patch in a
On 05/03/2013 11:11:10 AM, Mihai Caraman wrote:
A change in the generic code highlighted that we were running with
IRQs
(soft) enabled on Book3E 64-bit when trying to restart interrupts from
handle_exit(). This is a lesson to configure lockdep often :)
There is no reason to exit guest with
-Original Message-
From: Wood Scott-B07421
Sent: Friday, May 03, 2013 9:05 PM
To: Caraman Mihai Claudiu-B02008
Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.org; linuxppc-
d...@lists.ozlabs.org; Caraman Mihai Claudiu-B02008
Subject: Re: [PATCH] KVM: PPC: Book3E 64: Fix IRQs warnings
On 05/03/2013 03:01:26 PM, Caraman Mihai Claudiu-B02008 wrote:
-Original Message-
From: Wood Scott-B07421
Sent: Friday, May 03, 2013 9:05 PM
To: Caraman Mihai Claudiu-B02008
Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.org; linuxppc-
d...@lists.ozlabs.org; Caraman Mihai
We broke networking using vhost with the introduction of a ctrl vq,
make sure that that queue get treated like a special case.
Signed-off-by: Sasha Levin sasha.le...@oracle.com
---
tools/kvm/virtio/net.c | 17 -
1 file changed, 12 insertions(+), 5 deletions(-)
diff --git
We want to make the size of the virtio net header opaque to
uip.
Signed-off-by: Sasha Levin sasha.le...@oracle.com
---
tools/kvm/include/kvm/uip.h | 1 +
tools/kvm/net/uip/core.c| 8
tools/kvm/net/uip/tcp.c | 2 +-
tools/kvm/net/uip/udp.c | 2 +-
tools/kvm/virtio/net.c
Some devices want to know their status, use this hook to allow them to
get that notification.
Signed-off-by: Sasha Levin sasha.le...@oracle.com
---
tools/kvm/include/kvm/virtio.h | 1 +
tools/kvm/virtio/pci.c | 2 ++
2 files changed, 3 insertions(+)
diff --git
Simplifies the code a lot.
Signed-off-by: Sasha Levin sasha.le...@oracle.com
---
tools/kvm/include/kvm/uip.h | 4 ++--
tools/kvm/net/uip/core.c| 47 +++--
2 files changed, 5 insertions(+), 46 deletions(-)
diff --git a/tools/kvm/include/kvm/uip.h
vnet header size depends on whether we use mergable rx buffers.
Signed-off-by: Sasha Levin sasha.le...@oracle.com
---
tools/kvm/virtio/net.c | 8 ++--
1 file changed, 6 insertions(+), 2 deletions(-)
diff --git a/tools/kvm/virtio/net.c b/tools/kvm/virtio/net.c
index 2dbca09..15dbde3 100644
Support mergable rx buffers for virtio-net. This helps reduce the amount
of memory the guest kernel has to allocate per rx vq.
Signed-off-by: Sasha Levin sasha.le...@oracle.com
---
tools/kvm/include/kvm/uip.h | 2 +-
tools/kvm/net/uip/core.c| 2 +-
tools/kvm/virtio/net.c | 42
They're hidden inside net/core/iovec.c. It'd be nice to just link to that
but they're not too generic and come with tons of net/ specific code we
don't want. So we just copy over the relevant parts.
Signed-off-by: Sasha Levin sasha.le...@oracle.com
---
tools/kvm/Makefile | 1 +
We may need to know what features are supported before we can init the
network on the host side.
Signed-off-by: Sasha Levin sasha.le...@oracle.com
---
tools/kvm/virtio/net.c | 30 --
1 file changed, 24 insertions(+), 6 deletions(-)
diff --git a/tools/kvm/virtio/net.c
-Original Message-
From: Wood Scott-B07421
Sent: Friday, May 03, 2013 11:15 PM
To: Caraman Mihai Claudiu-B02008
Cc: Wood Scott-B07421; kvm-...@vger.kernel.org; kvm@vger.kernel.org;
linuxppc-...@lists.ozlabs.org
Subject: Re: [PATCH] KVM: PPC: Book3E 64: Fix IRQs warnings and hangs
On Fri, May 03, 2013 at 10:47:10AM +0800, Hu Tao wrote:
pvpanic device is a qemu simulated device through which guest panic
event is sent to host.
Signed-off-by: Hu Tao hu...@cn.fujitsu.com
---
drivers/platform/x86/Kconfig | 7 +++
drivers/platform/x86/Makefile | 2 +
On Fri, 2013-05-03 at 18:24 +0200, Alexander Graf wrote:
There is no reason to exit guest with soft_enabled == 1, a
local_irq_enable()
call will do this for us so get rid of kvmppc_layz_ee() calls. With this fix
we eliminate irqs_disabled() warnings and some guest and host hangs revealed
On 05/03/2013 03:56:47 PM, Caraman Mihai Claudiu-B02008 wrote:
-Original Message-
From: Wood Scott-B07421
Sent: Friday, May 03, 2013 11:15 PM
To: Caraman Mihai Claudiu-B02008
Cc: Wood Scott-B07421; kvm-...@vger.kernel.org; kvm@vger.kernel.org;
linuxppc-...@lists.ozlabs.org
Hi folks,
A number of people have been trying VFIO's VGA support, a few have even
been successful. Resetting devices has been a problem and makes it
very, very difficult to really use VGA assignment effectively. The code
in the branches below attempts to address this. Discrete graphics
devices
-Original Message-
From: Wood Scott-B07421
Sent: Saturday, May 04, 2013 1:07 AM
To: Caraman Mihai Claudiu-B02008
Cc: Wood Scott-B07421; kvm-...@vger.kernel.org; kvm@vger.kernel.org;
linuxppc-...@lists.ozlabs.org
Subject: Re: [PATCH] KVM: PPC: Book3E 64: Fix IRQs warnings and hangs
On 05/03/2013 05:59:32 PM, Caraman Mihai Claudiu-B02008 wrote:
-Original Message-
From: Wood Scott-B07421
Sent: Saturday, May 04, 2013 1:07 AM
To: Caraman Mihai Claudiu-B02008
Cc: Wood Scott-B07421; kvm-...@vger.kernel.org; kvm@vger.kernel.org;
linuxppc-...@lists.ozlabs.org
kvmppc_lazy_ee_enable() was causing interrupts to be soft-enabled
(albeit hard-disabled) in kvmppc_restart_interrupt(). This led to
warnings, and possibly breakage if the interrupt state was later saved
and then restored (leading to interrupts being hard-and-soft enabled
when they should be at
On 05/03/2013 06:45:23 PM, Scott Wood wrote:
While we could just set PACA_IRQ_HARD_DIS after an exit to compensate,
instead hard-disable interrupts before entering the guest. This way,
we won't have to worry about interactions if we take an interrupt
during the guest entry code. While I don't
On Sat, May 04, 2013 at 12:51:06AM +0800, Xiao Guangrong wrote:
On 05/03/2013 11:53 PM, Marcelo Tosatti wrote:
On Fri, May 03, 2013 at 01:52:07PM +0800, Xiao Guangrong wrote:
On 05/03/2013 09:05 AM, Marcelo Tosatti wrote:
+
+/*
+ * Fast invalid all shadow pages belong to @slot.
+ *
On Fri, May 03, 2013 at 09:52:01PM -0300, Marcelo Tosatti wrote:
On Sat, May 04, 2013 at 12:51:06AM +0800, Xiao Guangrong wrote:
On 05/03/2013 11:53 PM, Marcelo Tosatti wrote:
On Fri, May 03, 2013 at 01:52:07PM +0800, Xiao Guangrong wrote:
On 05/03/2013 09:05 AM, Marcelo Tosatti wrote:
Remove myself as KVM co-maintainer: Paolo Bonzini is taking the job.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
I running a VM(RHEL-5.5) on KVM hypervisor(linux-3.8 + QEMU-1.4.1), and
direct-assign intel 82576 VF to the VM. When TX/RX packets on VM to the other
host via iperf tool, top tool result on VM shown that the %si is too high,
approximately 95% ~ 100%, but from the view of host, the VM's
+static void kvmppc_booke_vcpu_load_debug_regs(struct kvm_vcpu
+*vcpu) {
+ if (!vcpu-arch.debug_active)
+ return;
+
+ /* Disable all debug events and clead pending debug events */
+ mtspr(SPRN_DBCR0, 0x0);
+ kvmppc_clear_dbsr();
+
+ /*
+ * Check whether guest still
Am 03.05.2013 um 12:48 schrieb Bhushan Bharat-R65777 r65...@freescale.com:
+static void kvmppc_booke_vcpu_load_debug_regs(struct kvm_vcpu
+*vcpu) {
+if (!vcpu-arch.debug_active)
+return;
+
+/* Disable all debug events and clead pending debug events */
+
On 03.05.2013, at 13:08, Alexander Graf wrote:
Am 03.05.2013 um 12:48 schrieb Bhushan Bharat-R65777 r65...@freescale.com:
+static void kvmppc_booke_vcpu_load_debug_regs(struct kvm_vcpu
+*vcpu) {
+if (!vcpu-arch.debug_active)
+return;
+
+/* Disable all debug events
-Original Message-
From: Alexander Graf [mailto:ag...@suse.de]
Sent: Friday, May 03, 2013 6:00 PM
To: Bhushan Bharat-R65777
Cc: kvm-ppc@vger.kernel.org; k...@vger.kernel.org; Wood Scott-B07421
Subject: Re: [PATCH 7/7 v3] KVM: PPC: Add userspace debug stub support
On
On 03.05.2013, at 15:11, Bhushan Bharat-R65777 wrote:
-Original Message-
From: Alexander Graf [mailto:ag...@suse.de]
Sent: Friday, May 03, 2013 6:00 PM
To: Bhushan Bharat-R65777
Cc: kvm-ppc@vger.kernel.org; k...@vger.kernel.org; Wood Scott-B07421
Subject: Re: [PATCH 7/7 v3]
A change in the generic code highlighted that we were running with IRQs
(soft) enabled on Book3E 64-bit when trying to restart interrupts from
handle_exit(). This is a lesson to configure lockdep often :)
There is no reason to exit guest with soft_enabled == 1, a local_irq_enable()
call will do
On 03.05.2013, at 18:11, Mihai Caraman wrote:
A change in the generic code highlighted that we were running with IRQs
(soft) enabled on Book3E 64-bit when trying to restart interrupts from
handle_exit(). This is a lesson to configure lockdep often :)
There is no reason to exit guest with
On 05/03/2013 11:11:10 AM, Mihai Caraman wrote:
A change in the generic code highlighted that we were running with
IRQs
(soft) enabled on Book3E 64-bit when trying to restart interrupts from
handle_exit(). This is a lesson to configure lockdep often :)
There is no reason to exit guest with
-Original Message-
From: Wood Scott-B07421
Sent: Friday, May 03, 2013 9:05 PM
To: Caraman Mihai Claudiu-B02008
Cc: kvm-ppc@vger.kernel.org; k...@vger.kernel.org; linuxppc-
d...@lists.ozlabs.org; Caraman Mihai Claudiu-B02008
Subject: Re: [PATCH] KVM: PPC: Book3E 64: Fix IRQs warnings
On 05/03/2013 03:01:26 PM, Caraman Mihai Claudiu-B02008 wrote:
-Original Message-
From: Wood Scott-B07421
Sent: Friday, May 03, 2013 9:05 PM
To: Caraman Mihai Claudiu-B02008
Cc: kvm-ppc@vger.kernel.org; k...@vger.kernel.org; linuxppc-
d...@lists.ozlabs.org; Caraman Mihai
-Original Message-
From: Wood Scott-B07421
Sent: Friday, May 03, 2013 11:15 PM
To: Caraman Mihai Claudiu-B02008
Cc: Wood Scott-B07421; kvm-ppc@vger.kernel.org; k...@vger.kernel.org;
linuxppc-...@lists.ozlabs.org
Subject: Re: [PATCH] KVM: PPC: Book3E 64: Fix IRQs warnings and hangs
On Fri, 2013-05-03 at 18:24 +0200, Alexander Graf wrote:
There is no reason to exit guest with soft_enabled == 1, a
local_irq_enable()
call will do this for us so get rid of kvmppc_layz_ee() calls. With this fix
we eliminate irqs_disabled() warnings and some guest and host hangs revealed
On 05/03/2013 03:56:47 PM, Caraman Mihai Claudiu-B02008 wrote:
-Original Message-
From: Wood Scott-B07421
Sent: Friday, May 03, 2013 11:15 PM
To: Caraman Mihai Claudiu-B02008
Cc: Wood Scott-B07421; kvm-ppc@vger.kernel.org; k...@vger.kernel.org;
linuxppc-...@lists.ozlabs.org
-Original Message-
From: Wood Scott-B07421
Sent: Saturday, May 04, 2013 1:07 AM
To: Caraman Mihai Claudiu-B02008
Cc: Wood Scott-B07421; kvm-ppc@vger.kernel.org; k...@vger.kernel.org;
linuxppc-...@lists.ozlabs.org
Subject: Re: [PATCH] KVM: PPC: Book3E 64: Fix IRQs warnings and hangs
On 05/03/2013 05:59:32 PM, Caraman Mihai Claudiu-B02008 wrote:
-Original Message-
From: Wood Scott-B07421
Sent: Saturday, May 04, 2013 1:07 AM
To: Caraman Mihai Claudiu-B02008
Cc: Wood Scott-B07421; kvm-ppc@vger.kernel.org; k...@vger.kernel.org;
linuxppc-...@lists.ozlabs.org
kvmppc_lazy_ee_enable() was causing interrupts to be soft-enabled
(albeit hard-disabled) in kvmppc_restart_interrupt(). This led to
warnings, and possibly breakage if the interrupt state was later saved
and then restored (leading to interrupts being hard-and-soft enabled
when they should be at
On 05/03/2013 06:45:23 PM, Scott Wood wrote:
While we could just set PACA_IRQ_HARD_DIS after an exit to compensate,
instead hard-disable interrupts before entering the guest. This way,
we won't have to worry about interactions if we take an interrupt
during the guest entry code. While I don't
85 matches
Mail list logo