https://bugzilla.kernel.org/show_bug.cgi?id=42779
--- Comment #10 from Gleb g...@redhat.com 2012-02-16 08:04:22 ---
(In reply to comment #8)
Not sure what you mean by installing trace-cmd before capturing the trace--I
did do that, otherwise I wouldn't have had a trace-cmd to run. The
https://bugzilla.kernel.org/show_bug.cgi?id=42779
Jan Kiszka jan.kis...@web.de changed:
What|Removed |Added
CC||jan.kis...@web.de
---
https://bugzilla.kernel.org/show_bug.cgi?id=42779
--- Comment #12 from Gleb g...@redhat.com 2012-02-16 08:40:37 ---
Can you try disabling CONFIG_FB in your guest kernel?
--
Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email
--- You are receiving this mail because:
hello,
Le Tue, Feb 14, 2012 at 03:40:30PM +0200, Gleb Natapov ecrivait :
Try to add -no-hpet to qemu command line and see if it helps.
I add this line in my xml definition for libvirt :
timer name='hpet' present='no'/ in the clock block. And I see
the -no-hpet
On Wed, Feb 15, 2012 at 03:59:33PM -0600, Anthony Liguori wrote:
On 02/15/2012 07:39 AM, Avi Kivity wrote:
On 02/07/2012 08:12 PM, Rusty Russell wrote:
I would really love to have this, but the problem is that we'd need a
general purpose bytecode VM with binding to some kernel APIs. The
On Thu, Feb 16, 2012 at 09:55:53AM +0100, David Cure wrote:
hello,
Le Tue, Feb 14, 2012 at 03:40:30PM +0200, Gleb Natapov ecrivait :
Try to add -no-hpet to qemu command line and see if it helps.
I add this line in my xml definition for libvirt :
timer
Le Tue, Feb 14, 2012 at 03:32:16PM +0200, Avi Kivity ecrivait :
It's reading the HPET like crazy. There are also tons of interrupts.
Please use the windows performance tools to see which devices trigger
these interrupts.
The HPET issue will be fixed by the hyper-V enlightenments, but
Call to kvm_cpu_synchronize_state() is missing.
kvm_arch_stop_on_emulation_error may
look at outdated registers here.
Signed-off-by: Gleb Natapov g...@redhat.com
diff --git a/target-i386/kvm.c b/target-i386/kvm.c
index 7079e87..51d0ae7 100644
--- a/target-i386/kvm.c
+++ b/target-i386/kvm.c
@@
If the guest hypervisor node contains has-idle property.
Signed-off-by: Liu Yu yu@freescale.com
---
v4:
1. discard the CONFIG_E500 to make code for all powerpc platform
2. code cleanup
arch/powerpc/kernel/epapr.S | 29 +
arch/powerpc/kernel/epapr_para.c |
from the kvm guest paravirt init code.
Signed-off-by: Liu Yu yu@freescale.com
---
v4:
1. code cleanup
2. move kvm_hypercall_start() to epapr_hypercall_start()
arch/powerpc/Kconfig|4 ++
arch/powerpc/include/asm/epapr_hcalls.h |2 +
arch/powerpc/kernel/Makefile
And add a new flag definition in kvm_ppc_pvinfo to indicate
whether host support EV_IDLE hcall.
Signed-off-by: Liu Yu yu@freescale.com
---
v4:
no change
arch/powerpc/include/asm/kvm_para.h | 14 --
arch/powerpc/kvm/powerpc.c |8
include/linux/kvm.h
On 16.02.2012, at 10:26, Liu Yu yu@freescale.com wrote:
from the kvm guest paravirt init code.
Signed-off-by: Liu Yu yu@freescale.com
---
v4:
1. code cleanup
2. move kvm_hypercall_start() to epapr_hypercall_start()
arch/powerpc/Kconfig|4 ++
On 16.02.2012, at 10:26, Liu Yu yu@freescale.com wrote:
And add a new flag definition in kvm_ppc_pvinfo to indicate
whether host support EV_IDLE hcall.
Signed-off-by: Liu Yu yu@freescale.com
---
v4:
no change
arch/powerpc/include/asm/kvm_para.h | 14 --
On 16.02.2012, at 10:26, Liu Yu yu@freescale.com wrote:
If the guest hypervisor node contains has-idle property.
Signed-off-by: Liu Yu yu@freescale.com
---
v4:
1. discard the CONFIG_E500 to make code for all powerpc platform
2. code cleanup
arch/powerpc/kernel/epapr.S |
On 02/16/2012 12:21 AM, Arnd Bergmann wrote:
ioctl is good for hardware devices and stuff that you want to enumerate
and/or control permissions on. For something like KVM that is really a
core kernel service, a syscall makes much more sense.
I would certainly never mix the two concepts: If
https://bugzilla.kernel.org/show_bug.cgi?id=42779
Avi Kivity a...@redhat.com changed:
What|Removed |Added
CC||a...@redhat.com
---
https://bugzilla.kernel.org/show_bug.cgi?id=42779
--- Comment #14 from Jan Kiszka jan.kis...@web.de 2012-02-16 11:51:05 ---
Because the selected CPU type doesn't support SSE? Didn't check the config yet,
but I bet that's the reason.
--
Configure bugmail:
Hi,
I got this error while doing startx with 3.2.6 kernel and I can't start xorg:
[ 54.683907] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0
domain=0x0018 address=0x000220583200 flags=0x0010]
I saw the same error in this mailing list
(http://www.spinics.net/lists/kvm/msg48472.html)
On 02/16/2012 06:50 AM, Xiao Guangrong wrote:
I think we do not need handle all tlb-flushed request here since all of these
request can be delayed to the point where mmu-lock is released , we can simply
do it:
void kvm_mmu_defer_remote_flush(kvm, need_flush)
{
if (need_flush)
Hello,
I am trying to backup a KVM VM by creating a snapshot of the running VM
and extracting that snapshot from the running VM using qemu-img convert.
Sources on the net suggest that I would get an image that contains
all the machine state of the snapshot. So when I run the VM it would
continue
https://bugzilla.kernel.org/show_bug.cgi?id=42782
Summary: IO_PAGE_FAULT while starting xorg
Product: Virtualization
Version: unspecified
Kernel Version: 3.2.6
Platform: All
OS/Version: Linux
Tree: Mainline
Status:
https://bugzilla.kernel.org/show_bug.cgi?id=42782
--- Comment #1 from edm fuffi.il.fu...@gmail.com 2012-02-16 12:14:28 ---
Created an attachment (id=72398)
-- (https://bugzilla.kernel.org/attachment.cgi?id=72398)
dmesg output
--
Configure bugmail:
https://bugzilla.kernel.org/show_bug.cgi?id=42782
--- Comment #2 from edm fuffi.il.fu...@gmail.com 2012-02-16 12:17:11 ---
Created an attachment (id=72399)
-- (https://bugzilla.kernel.org/attachment.cgi?id=72399)
dmidecode output
--
Configure bugmail:
https://bugzilla.kernel.org/show_bug.cgi?id=42782
--- Comment #3 from edm fuffi.il.fu...@gmail.com 2012-02-16 12:17:43 ---
Created an attachment (id=72400)
-- (https://bugzilla.kernel.org/attachment.cgi?id=72400)
lspci -vv output
--
Configure bugmail:
Signed-off-by: Gleb Natapov g...@redhat.com
diff --git a/arch/x86/kvm/pmu.c b/arch/x86/kvm/pmu.c
index 7aad544..3e48c1d 100644
--- a/arch/x86/kvm/pmu.c
+++ b/arch/x86/kvm/pmu.c
@@ -413,7 +413,7 @@ int kvm_pmu_read_pmc(struct kvm_vcpu *vcpu, unsigned pmc,
u64 *data)
struct kvm_pmc
On 2012-02-16 10:12, Gleb Natapov wrote:
Call to kvm_cpu_synchronize_state() is missing.
kvm_arch_stop_on_emulation_error may
look at outdated registers here.
Signed-off-by: Gleb Natapov g...@redhat.com
diff --git a/target-i386/kvm.c b/target-i386/kvm.c
index 7079e87..51d0ae7 100644
---
The code fixed by the second patch looks suspect though:
nsdiff = data - kvm-arch.last_tsc_write;
nsdiff = (nsdiff * 1000) / vcpu-arch.virtual_tsc_khz;
before the division, nsdiff is in tsc units. Dividing it by
tsc_khz/1000 is equivalent to multiplying it by 100 and dividing it by
Breaks i386 build.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/x86.c | 11 +--
1 files changed, 9 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 1312f13..1d71b13 100644
--- a/arch/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@ -978,6
Breaks i386 build.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/x86.c |7 +++
1 files changed, 7 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 1d71b13..c9d99e5 100644
--- a/arch/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@ -1034,7
On 02/16/2012 03:48 PM, Avi Kivity wrote:
The code fixed by the second patch looks suspect though:
nsdiff = data - kvm-arch.last_tsc_write;
nsdiff = (nsdiff * 1000) / vcpu-arch.virtual_tsc_khz;
before the division, nsdiff is in tsc units. Dividing it by
tsc_khz/1000 is equivalent to
arch/powerpc/kvm/book3s_hv.c: included 'linux/sched.h' twice,
remove the duplicate.
Signed-off-by: Danny Kukawka danny.kuka...@bisect.de
---
arch/powerpc/kvm/book3s_hv.c |1 -
1 files changed, 0 insertions(+), 1 deletions(-)
diff --git a/arch/powerpc/kvm/book3s_hv.c
On 02/16/2012 11:12 AM, Gleb Natapov wrote:
Call to kvm_cpu_synchronize_state() is missing.
kvm_arch_stop_on_emulation_error may
look at outdated registers here.
Thanks, applied to uq/master.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list:
https://bugzilla.kernel.org/show_bug.cgi?id=42782
Joerg Roedel j...@8bytes.org changed:
What|Removed |Added
CC||j...@8bytes.org
---
On 02/15/2012 07:18 PM, Igor Mammedov wrote:
On 02/15/2012 01:23 PM, Igor Mammedov wrote:
static u64 pvclock_get_nsec_offset(struct pvclock_shadow_time
*shadow)
{
-u64 delta = native_read_tsc() - shadow-tsc_timestamp;
+u64 delta;
+u64 tsc = native_read_tsc();
On 02/08/2012 05:07 PM, Eric B Munson wrote:
Now that we have a flag that will tell the guest it was suspended, create an
interface for that communication using a KVM ioctl.
+
+Capability: KVM_CAP_KVMCLOCK_CTRL
+Architectures: Any that implement pvclocks (currently x86 only)
+Type: vcpu
On 02/16/2012 02:57 AM, Gleb Natapov wrote:
On Wed, Feb 15, 2012 at 03:59:33PM -0600, Anthony Liguori wrote:
On 02/15/2012 07:39 AM, Avi Kivity wrote:
On 02/07/2012 08:12 PM, Rusty Russell wrote:
I would really love to have this, but the problem is that we'd need a
general purpose bytecode VM
On 2012-02-16 16:21, Avi Kivity wrote:
On 02/14/2012 05:13 PM, Jan Kiszka wrote:
Note that KVM without in-kernel irqchip will report the address after
the instruction that triggered a write access. In contrast, read
accesses will return the precise information.
Well this is wierd. We
On 02/14/2012 05:13 PM, Jan Kiszka wrote:
This enables acceleration for MMIO-based TPR registers accesses of
32-bit Windows guest systems. It is mostly useful with KVM enabled,
either on older Intel CPUs (without flexpriority feature, can also be
manually disabled for testing) or any current
On 02/14/2012 05:13 PM, Jan Kiszka wrote:
Note that KVM without in-kernel irqchip will report the address after
the instruction that triggered a write access. In contrast, read
accesses will return the precise information.
Well this is wierd. We could retro-doc one or the other behaviour,
On 02/16/2012 03:55 PM, Danny Kukawka wrote:
arch/powerpc/kvm/book3s_hv.c: included 'linux/sched.h' twice,
remove the duplicate.
Thanks, applied.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a
On 02/16/2012 02:44 PM, Gleb Natapov wrote:
Signed-off-by: Gleb Natapov g...@redhat.com
Thanks, applied and queued for 3.3
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
On 02/15/2012 09:36 PM, Andy Lutomirski wrote:
Hi, kvm people-
Here's a strange failure. It could be a bug in something
RHEL6-specific, but it could be a generic issue that only triggers
with a paravirt guest with old userspace on a non-ept host. There was
a bug like this on Xen, and I'm
Em Wed, Feb 15, 2012 at 10:05:08PM -0700, David Ahern escreveu:
On 2/15/12 9:59 PM, Xiao Guangrong wrote:
Okay, i will post the next version after collecting your new comments!
Thanks for your time, David! :)
I had more comments, but got sidetracked and forgot to come back to
this.
On Thu, Feb 16, 2012 at 8:17 AM, Avi Kivity a...@redhat.com wrote:
On 02/15/2012 09:36 PM, Andy Lutomirski wrote:
Hi, kvm people-
Here's a strange failure. It could be a bug in something
RHEL6-specific, but it could be a generic issue that only triggers
with a paravirt guest with old
https://bugzilla.kernel.org/show_bug.cgi?id=42779
--- Comment #15 from madenginee...@gmail.com 2012-02-16 16:48:56 ---
I set the kernel up for an AMD Geode LX800 (CONFIG_MGEODE_LX), which does
supposedly support SSE. No idea why it would have built using MMX if that is
now deprecated in
https://bugzilla.kernel.org/show_bug.cgi?id=42779
--- Comment #16 from madenginee...@gmail.com 2012-02-16 16:51:10 ---
Background: I'm using KVM as a test platform for code destined for a panel PC
using a Geode LX800.
--
Configure bugmail:
On 02/16/2012 04:24 AM, Alexander Graf wrote:
On 16.02.2012, at 10:26, Liu Yu yu@freescale.com wrote:
+_GLOBAL(epapr_ev_idle)
+epapr_ev_idle:
+rlwinmr3,r1,0,0,31-THREAD_SHIFT/* current thread_info */
+lwzr4,TI_LOCAL_FLAGS(r3)/* set napping bit */
+ori
On 02/16/2012 03:26 AM, Liu Yu wrote:
from the kvm guest paravirt init code.
Signed-off-by: Liu Yu yu@freescale.com
---
v4:
1. code cleanup
2. move kvm_hypercall_start() to epapr_hypercall_start()
arch/powerpc/Kconfig|4 ++
On 02/16/2012 06:45 PM, Andy Lutomirski wrote:
So I could have messed up, or there could be a subtle
bug somewhere. Any ideas?
What's the code trying to do? Execute an instruction from an
non-executable page, trap the #PF, and emulate? And what are the
symptoms? wrong error code
On 02/16/2012 03:26 AM, Liu Yu wrote:
If the guest hypervisor node contains has-idle property.
Signed-off-by: Liu Yu yu@freescale.com
---
v4:
1. discard the CONFIG_E500 to make code for all powerpc platform
2. code cleanup
Is the TLF_NAPPING stuff supported on all powerpc platforms?
On 16.02.2012, at 17:58, Scott Wood wrote:
On 02/16/2012 04:24 AM, Alexander Graf wrote:
On 16.02.2012, at 10:26, Liu Yu yu@freescale.com wrote:
+_GLOBAL(epapr_ev_idle)
+epapr_ev_idle:
+rlwinmr3,r1,0,0,31-THREAD_SHIFT/* current thread_info */
+lwz
https://bugzilla.kernel.org/show_bug.cgi?id=42779
--- Comment #17 from Jan Kiszka jan.kis...@web.de 2012-02-16 17:24:34 ---
(In reply to comment #15)
I set the kernel up for an AMD Geode LX800 (CONFIG_MGEODE_LX), which does
supposedly support SSE. No idea why it would have built using MMX
On 02/16/2012 11:18 AM, Alexander Graf wrote:
On 16.02.2012, at 17:58, Scott Wood wrote:
On 02/16/2012 04:24 AM, Alexander Graf wrote:
On 16.02.2012, at 10:26, Liu Yu yu@freescale.com wrote:
+_GLOBAL(epapr_ev_idle)
+epapr_ev_idle:
+rlwinmr3,r1,0,0,31-THREAD_SHIFT/*
On 16.02.2012, at 18:28, Scott Wood wrote:
On 02/16/2012 11:18 AM, Alexander Graf wrote:
On 16.02.2012, at 17:58, Scott Wood wrote:
On 02/16/2012 04:24 AM, Alexander Graf wrote:
On 16.02.2012, at 10:26, Liu Yu yu@freescale.com wrote:
+_GLOBAL(epapr_ev_idle)
+epapr_ev_idle:
+
https://bugzilla.kernel.org/show_bug.cgi?id=42779
--- Comment #18 from Avi Kivity a...@redhat.com 2012-02-16 17:30:47 ---
As a workaround you can use -cpu blah,-3dnow. But we'll have to implement mmx
movq.
--
Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email
---
On Thu, Feb 16, 2012 at 9:14 AM, Avi Kivity a...@redhat.com wrote:
On 02/16/2012 06:45 PM, Andy Lutomirski wrote:
So I could have messed up, or there could be a subtle
bug somewhere. Any ideas?
What's the code trying to do? Execute an instruction from an
non-executable page, trap
On 02/16/2012 11:30 AM, Alexander Graf wrote:
On 16.02.2012, at 18:28, Scott Wood wrote:
On 02/16/2012 11:18 AM, Alexander Graf wrote:
Hrm. But we can clobber ctr, right? So how about we make the generic
version do a bctr and then just do a small C wrapper that takes lr, moves
it to ctr
On 16.02.2012, at 18:36, Scott Wood wrote:
On 02/16/2012 11:30 AM, Alexander Graf wrote:
On 16.02.2012, at 18:28, Scott Wood wrote:
On 02/16/2012 11:18 AM, Alexander Graf wrote:
Hrm. But we can clobber ctr, right? So how about we make the generic
version do a bctr and then just do a
I'll be on vacation again, from Sunday (the 19th) until the following
Sunday. Unfortunately, Marcelo is on vacation as well, so there won't
be anyone to tend to patches. This is doubly unfortunate since there
are still unreviewed patches on the list. I'll do my best to catch up a
little
On 02/16/2012 07:35 PM, Andy Lutomirski wrote:
so it seems like kvm doesn't set PF_INSTR?
Yes, this is on purpose, and you're almost certainly right (and I feel
dumb for not figuring this out immediately). The error message is:
segfault at ff600400 ip ff600400 sp
Hello,
Please find my comments inline.
Regards,
Shradha Shah
On 02/16/2012 03:58 AM, Ben Hutchings wrote:
[I'm just catching up with this after getting my own driver changes into
shape.]
On Fri, 2012-02-10 at 10:18 -0500, jamal wrote:
Hi John,
I went backwards to summarize at the top
On 02/15/2012 04:08 PM, Alexander Graf wrote:
Well, the scatter/gather registers I proposed will give you just one
register or all of them.
One register is hardly any use. We either need all ways of a respective
address to do a full fledged lookup or all of them.
I should have said,
On 02/16/2012 03:04 AM, Michael Ellerman wrote:
ioctl is good for hardware devices and stuff that you want to enumerate
and/or control permissions on. For something like KVM that is really a
core kernel service, a syscall makes much more sense.
Yeah maybe. That distinction is at least
On 16.02.2012, at 20:24, Avi Kivity wrote:
On 02/15/2012 04:08 PM, Alexander Graf wrote:
Well, the scatter/gather registers I proposed will give you just one
register or all of them.
One register is hardly any use. We either need all ways of a respective
address to do a full fledged
On 02/16/2012 04:46 PM, Anthony Liguori wrote:
What will it buy us? Surely not speed. Entering a guest is not much
(if at all) faster than exiting to userspace and any non trivial
operation will require exit to userspace anyway,
You can emulate the PIT/RTC entirely within the guest using
On 02/16/2012 09:34 PM, Alexander Graf wrote:
On 16.02.2012, at 20:24, Avi Kivity wrote:
On 02/15/2012 04:08 PM, Alexander Graf wrote:
Well, the scatter/gather registers I proposed will give you just one
register or all of them.
One register is hardly any use. We either need all
This flag will be used to check if the vm was stopped by the host when a soft
lockup was detected. The host will set the flag when it stops the guest. On
resume, the guest will check this flag if a soft lockup is detected and skip
issuing the warning.
Signed-off-by: Eric B Munson
Changes from V13:
Expand on KVM_KVMCLOCK_CTRL ioctl documentation
Changes from V12:
Re-add missing kvm.c code after rebase
Rename CAP to KVM_CAP_KVMCLOCK_CTRL
Rename ioctl to KVM_KVMCLOCK_CTRL
Changes from V11:
Re-add asm-generic stub
Correct api.txt typo
add kvm_make_request() call after
Now that we have a flag that will tell the guest it was suspended, create an
interface for that communication using a KVM ioctl.
Signed-off-by: Eric B Munson emun...@mgebm.net
Cc: mi...@redhat.com
Cc: h...@zytor.com
Cc: ry...@linux.vnet.ibm.com
Cc: aligu...@us.ibm.com
Cc: mtosa...@redhat.com
Cc:
A suspended VM can cause spurious soft lockup warnings. To avoid these, the
watchdog now checks if the kernel knows it was stopped by the host and skips
the warning if so. When the watchdog is reset successfully, clear the guest
paused flag.
Signed-off-by: Eric B Munson emun...@mgebm.net
Cc:
When a host stops or suspends a VM it will set a flag to show this. The
watchdog will use these functions to determine if a softlockup is real, or the
result of a suspended VM.
Signed-off-by: Eric B Munson emun...@mgebm.net
asm-generic changes Acked-by: Arnd Bergmann a...@arndb.de
Cc:
On Thu, 16 Feb 2012, Eric B Munson wrote:
Now that we have a flag that will tell the guest it was suspended, create an
interface for that communication using a KVM ioctl.
Signed-off-by: Eric B Munson emun...@mgebm.net
Sorry, this is actually V14.
signature.asc
Description: Digital
On 02/16/2012 01:38 PM, Avi Kivity wrote:
On 02/16/2012 09:34 PM, Alexander Graf wrote:
On 16.02.2012, at 20:24, Avi Kivity wrote:
On 02/15/2012 04:08 PM, Alexander Graf wrote:
Well, the scatter/gather registers I proposed will give you just one
register or all of them.
One register is
https://bugzilla.kernel.org/show_bug.cgi?id=42779
--- Comment #19 from madenginee...@gmail.com 2012-02-16 22:01:38 ---
Doesn't seem to help. I used -cpu core2duo,-3dnow (since core2duo is the name
that libvirt, my usual launcher for qemu, has been using), failed on the same
movq. Also tried
On Thu, 2012-02-16 at 21:28 +0200, Avi Kivity wrote:
On 02/16/2012 03:04 AM, Michael Ellerman wrote:
ioctl is good for hardware devices and stuff that you want to enumerate
and/or control permissions on. For something like KVM that is really a
core kernel service, a syscall makes
On 16.02.2012, at 20:38, Avi Kivity wrote:
On 02/16/2012 09:34 PM, Alexander Graf wrote:
On 16.02.2012, at 20:24, Avi Kivity wrote:
On 02/15/2012 04:08 PM, Alexander Graf wrote:
Well, the scatter/gather registers I proposed will give you just one
register or all of them.
One register
On 16.02.2012, at 21:41, Scott Wood wrote:
On 02/16/2012 01:38 PM, Avi Kivity wrote:
On 02/16/2012 09:34 PM, Alexander Graf wrote:
On 16.02.2012, at 20:24, Avi Kivity wrote:
On 02/15/2012 04:08 PM, Alexander Graf wrote:
Well, the scatter/gather registers I proposed will give you just
-Original Message-
From: Alexander Graf [mailto:ag...@suse.de]
Sent: Thursday, February 16, 2012 6:20 PM
To: Liu Yu-B13201
Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.org; linuxppc-
d...@ozlabs.org; Wood Scott-B07421; Liu Yu-B13201
Subject: Re: [PATCH v4 2/3] KVM: PPC: epapr: Add
On 17.02.2012, at 03:13, Liu Yu-B13201 wrote:
-Original Message-
From: Alexander Graf [mailto:ag...@suse.de]
Sent: Thursday, February 16, 2012 6:20 PM
To: Liu Yu-B13201
Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.org; linuxppc-
d...@ozlabs.org; Wood Scott-B07421; Liu Yu-B13201
On 02/16/2012 07:57 PM, Avi Kivity wrote:
Suppose at point A another thread executes defer_remote_flush(),
commit_remote_flush(), and defer_remote_flush() again. This brings the
balue of tlbs_dirty back to 1 again, with the tlbs dirty. The cmpxchg()
then resets tlbs_dirty, leaving the
I've been waiting for some response from the Ubuntu team regarding a bug on
launchpad, but it appears that it isn't being taken seriously:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/745785
We are running Ubuntu Natty 11.04 with KVM with our storage on RAID10 + drbd.
While we were
The Buildbot has detected a new failure on builder next-s390 while building kvm.
Full details are available at:
http://buildbot.b1-systems.de/kvm/builders/next-s390/builds/447
Buildbot URL: http://buildbot.b1-systems.de/kvm/
Buildslave for this Build: b1_kvm_1
Build Reason: The Nightly
The Buildbot has detected a new failure on builder next-ppc64 while building
kvm.
Full details are available at:
http://buildbot.b1-systems.de/kvm/builders/next-ppc64/builds/446
Buildbot URL: http://buildbot.b1-systems.de/kvm/
Buildslave for this Build: b1_kvm_1
Build Reason: The Nightly
The Buildbot has detected a new failure on builder next-x86_64 while building
kvm.
Full details are available at:
http://buildbot.b1-systems.de/kvm/builders/next-x86_64/builds/445
Buildbot URL: http://buildbot.b1-systems.de/kvm/
Buildslave for this Build: b1_kvm_1
Build Reason: The Nightly
We do not need to zap all shadow pages of the guest when we create or
destroy a slot in this function.
To change this, we make kvm_mmu_zap_all()/kvm_arch_flush_shadow()
zap only those which have mappings into a given slot.
Furthermore, the condition to see if we have any mmio sptes to clear is
If the guest hypervisor node contains has-idle property.
Signed-off-by: Liu Yu yu@freescale.com
---
v4:
1. discard the CONFIG_E500 to make code for all powerpc platform
2. code cleanup
arch/powerpc/kernel/epapr.S | 29 +
arch/powerpc/kernel/epapr_para.c |
On 02/16/2012 03:55 PM, Danny Kukawka wrote:
arch/powerpc/kvm/book3s_hv.c: included 'linux/sched.h' twice,
remove the duplicate.
Thanks, applied.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm-ppc in
the body of
On 02/16/2012 04:24 AM, Alexander Graf wrote:
On 16.02.2012, at 10:26, Liu Yu yu@freescale.com wrote:
+_GLOBAL(epapr_ev_idle)
+epapr_ev_idle:
+rlwinmr3,r1,0,0,31-THREAD_SHIFT/* current thread_info */
+lwzr4,TI_LOCAL_FLAGS(r3)/* set napping bit */
+ori
On 16.02.2012, at 17:58, Scott Wood wrote:
On 02/16/2012 04:24 AM, Alexander Graf wrote:
On 16.02.2012, at 10:26, Liu Yu yu@freescale.com wrote:
+_GLOBAL(epapr_ev_idle)
+epapr_ev_idle:
+rlwinmr3,r1,0,0,31-THREAD_SHIFT/* current thread_info */
+lwz
On 02/16/2012 11:18 AM, Alexander Graf wrote:
On 16.02.2012, at 17:58, Scott Wood wrote:
On 02/16/2012 04:24 AM, Alexander Graf wrote:
On 16.02.2012, at 10:26, Liu Yu yu@freescale.com wrote:
+_GLOBAL(epapr_ev_idle)
+epapr_ev_idle:
+rlwinmr3,r1,0,0,31-THREAD_SHIFT/*
On 02/16/2012 11:30 AM, Alexander Graf wrote:
On 16.02.2012, at 18:28, Scott Wood wrote:
On 02/16/2012 11:18 AM, Alexander Graf wrote:
Hrm. But we can clobber ctr, right? So how about we make the generic
version do a bctr and then just do a small C wrapper that takes lr, moves
it to ctr
On 02/16/2012 09:34 PM, Alexander Graf wrote:
On 16.02.2012, at 20:24, Avi Kivity wrote:
On 02/15/2012 04:08 PM, Alexander Graf wrote:
Well, the scatter/gather registers I proposed will give you just one
register or all of them.
One register is hardly any use. We either need all
On 02/16/2012 01:38 PM, Avi Kivity wrote:
On 02/16/2012 09:34 PM, Alexander Graf wrote:
On 16.02.2012, at 20:24, Avi Kivity wrote:
On 02/15/2012 04:08 PM, Alexander Graf wrote:
Well, the scatter/gather registers I proposed will give you just one
register or all of them.
One register is
On 16.02.2012, at 21:41, Scott Wood wrote:
On 02/16/2012 01:38 PM, Avi Kivity wrote:
On 02/16/2012 09:34 PM, Alexander Graf wrote:
On 16.02.2012, at 20:24, Avi Kivity wrote:
On 02/15/2012 04:08 PM, Alexander Graf wrote:
Well, the scatter/gather registers I proposed will give you just
-Original Message-
From: Alexander Graf [mailto:ag...@suse.de]
Sent: Thursday, February 16, 2012 6:20 PM
To: Liu Yu-B13201
Cc: kvm-ppc@vger.kernel.org; k...@vger.kernel.org; linuxppc-
d...@ozlabs.org; Wood Scott-B07421; Liu Yu-B13201
Subject: Re: [PATCH v4 2/3] KVM: PPC: epapr:
95 matches
Mail list logo