https://bugzilla.kernel.org/show_bug.cgi?id=53611
--- Comment #1 from Nadav Har'El n...@math.technion.ac.il 2013-02-27
08:14:13 ---
In addition to the known issues list in the announce file attached above, I
thought of several more issues that should be considered:
1. When switching back
On Wed, 27 Feb 2013 08:52:50 +0100
Jan Kiszka jan.kis...@web.de wrote:
On 2013-02-27 08:37, Igor Mammedov wrote:
On Wed, 27 Feb 2013 00:26:38 -0300
Eduardo Habkost ehabk...@redhat.com wrote:
On Tue, Feb 26, 2013 at 10:57:56PM +0100, Igor Mammedov wrote:
On Sat, 23 Feb 2013 16:45:00
Several issues fixed:
- We were missing a bunch of feature lists. Fix this by simply dumping
the meta list feature_word_info.
- kvm_enabled() cannot be true at this point because accelerators are
initialized much later during init. Also, hiding this makes it very
hard to discover for
On Wed, 27 Feb 2013 10:15:51 +0100
Jan Kiszka jan.kis...@siemens.com wrote:
Several issues fixed:
- We were missing a bunch of feature lists. Fix this by simply dumping
the meta list feature_word_info.
- kvm_enabled() cannot be true at this point because accelerators are
initialized
Am 27.02.2013 10:15, schrieb Jan Kiszka:
Several issues fixed:
- We were missing a bunch of feature lists. Fix this by simply dumping
the meta list feature_word_info.
- kvm_enabled() cannot be true at this point because accelerators are
initialized much later during init. Also, hiding
On 2013-02-27 10:33, Andreas Färber wrote:
Am 27.02.2013 10:15, schrieb Jan Kiszka:
Several issues fixed:
- We were missing a bunch of feature lists. Fix this by simply dumping
the meta list feature_word_info.
- kvm_enabled() cannot be true at this point because accelerators are
On Wed, Feb 27, 2013 at 10:43:37AM +1030, Rusty Russell wrote:
Aurelien Jarno aurel...@aurel32.net writes:
Hi,
I have noticed that virtio-rng only returns zero for kernels = 2.6.33
built with CONFIG_HW_RANDOM=m. This is a bit much too predictable for a
random generator ;-).
Wow.
Note: this is based on the latest master branch.
I'm sending this before 3.9-rc1 is released since this can cause extra
conflicts unless we make this available to all arch before we start
adding new stuff.
Please review: every change is trivial and should not change anything.
Takuya Yoshikawa
X86 does not use this any more. The remaining user, s390's !user_alloc
check, can be simply removed since KVM_SET_MEMORY_REGION ioctl is no
longer supported.
Note: fixed powerpc's indentations with spaces to suppress checkpatch
errors.
Signed-off-by: Takuya Yoshikawa
Except ia64's stale code, KVM_SET_MEMORY_REGION support, this is only
used for sanity checks in __kvm_set_memory_region() which can easily
be changed to use slot id instead.
Signed-off-by: Takuya Yoshikawa yoshikawa_takuya...@lab.ntt.co.jp
---
arch/ia64/kvm/kvm-ia64.c | 18 --
This will be used for cleaning up prepare/commit_memory_region() later.
Signed-off-by: Takuya Yoshikawa yoshikawa_takuya...@lab.ntt.co.jp
---
include/linux/kvm_host.h | 18 ++
virt/kvm/kvm_main.c | 18 --
2 files changed, 18 insertions(+), 18 deletions(-)
This patch drops the parameter old, a copy of the old memory slot, and
adds a new parameter named change to know the change being requested.
This not only cleans up the code but also removes extra copying of the
memory slot structure.
Signed-off-by: Takuya Yoshikawa
This patch makes the parameter old a const pointer to the old memory
slot and adds a new parameter named change to know the change being
requested: the former is for removing extra copying and the latter is
for cleaning up the code.
Signed-off-by: Takuya Yoshikawa
This was replaced with prepare/commit long before:
commit f7784b8ec9b6a041fa828cfbe9012fe51933f5ac
KVM: split kvm_arch_set_memory_region into prepare and commit
Signed-off-by: Takuya Yoshikawa yoshikawa_takuya...@lab.ntt.co.jp
---
arch/arm/kvm/arm.c |8
1 files changed, 0
On Sun, Feb 24, 2013 at 03:08:53PM +0100, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
@@ -2390,6 +2390,21 @@ static int nested_svm_vmexit(struct vcpu_svm *svm)
return 0;
}
+static bool nested_svm_handle_init_received(struct kvm_vcpu *vcpu)
+{
+ struct vcpu_svm
On Sat, Feb 23, 2013 at 05:05:29PM +0100, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
This fixes boot lockups with no-kvmclock, when the host is not
exposing this particular feature (QEMU: -cpu ...,-kvmclock) or when
the kvmclock initialization failed for whatever reason.
On Mon, Feb 25, 2013 at 10:04:50AM +0100, Jan Kiszka wrote:
Is the nested-related state already saved on AMD, Jörg? If not, adding
this one would not make things worse at least. Still, missing user space
save/restore already breaks reset, not only migration (dunno if this is
better on AMD).
On 2013-02-27 12:17, Joerg Roedel wrote:
On Sun, Feb 24, 2013 at 03:08:53PM +0100, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
@@ -2390,6 +2390,21 @@ static int nested_svm_vmexit(struct vcpu_svm *svm)
return 0;
}
+static bool nested_svm_handle_init_received(struct
On 2013-02-27 12:20, Joerg Roedel wrote:
On Mon, Feb 25, 2013 at 10:04:50AM +0100, Jan Kiszka wrote:
Is the nested-related state already saved on AMD, Jörg? If not, adding
this one would not make things worse at least. Still, missing user space
save/restore already breaks reset, not only
Fix this error on 32 bit systems:
x86/msr.c:122:5: error: unknown register name ‘r11’ in ‘asm’
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
x86/msr.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/x86/msr.c b/x86/msr.c
index 307835d..de7573d 100644
--- a/x86/msr.c
+++ b/x86/msr.c
On Wed, Feb 27, 2013 at 01:25:49PM +0200, Michael S. Tsirkin wrote:
Fix this error on 32 bit systems:
x86/msr.c:122:5: error: unknown register name ‘r11’ in ‘asm’
Signed-off-by: Michael S. Tsirkin m...@redhat.com
Applied, thanks.
---
x86/msr.c | 2 ++
1 file changed, 2 insertions(+)
On Wed, Feb 27 2013, Rusty Russell wrote:
Aurelien Jarno aurel...@aurel32.net writes:
Hi,
I have noticed that virtio-rng only returns zero for kernels = 2.6.33
built with CONFIG_HW_RANDOM=m. This is a bit much too predictable for a
random generator ;-).
Wow. Fortunately, all of
On Sat, Feb 23, 2013 at 03:07:47PM +0100, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
Both are only used locally.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
Applied, thanks.
---
arch/x86/kvm/vmx.c |5 +++--
1 files changed, 3 insertions(+), 2 deletions(-)
On Sat, Feb 23, 2013 at 10:34:39PM +0100, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
These exits have no preconditions, and we already process the
corresponding reasons in nested_vmx_exit_handled correctly.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
Applied, thanks.
On Sat, Feb 23, 2013 at 10:35:37PM +0100, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
Switching the VMCS obviously invalidates what may have been cached about
the guest segments.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
Applied, thanks.
---
Probably, the missing
On Sun, Feb 24, 2013 at 02:11:34PM +0100, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
No need to re-read what vmx_vcpu_run already picked up for us.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
Applied, thanks.
---
arch/x86/kvm/vmx.c |4 ++--
1 files changed, 2
On Wed, Feb 27, 2013 at 11:33:25AM +0800, Chen Gang wrote:
irp-irq is __u32 which is never 0.
Signed-off-by: Chen Gang gang.c...@asianux.com
Applied, thanks.
---
arch/x86/kvm/x86.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/x86.c
Add documentation about using qemu-system for unit tests.
Add runner script to select the correct binary and flags.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
README | 10 +-
x86-run | 27 +++
2 files changed, 36 insertions(+), 1 deletion(-)
create
On Wed, Feb 27, 2013 at 07:41:03PM +0900, Takuya Yoshikawa wrote:
Note: this is based on the latest master branch.
I'm sending this before 3.9-rc1 is released since this can cause extra
conflicts unless we make this available to all arch before we start
adding new stuff.
I do not quite
On Wed, Feb 27, 2013 at 11:56:55AM +1030, Rusty Russell wrote:
Aurelien Jarno aurel...@aurel32.net writes:
Hi,
I have noticed that virtio-rng only returns zero for kernels = 2.6.33
built with CONFIG_HW_RANDOM=m. This is a bit much too predictable for a
random generator ;-).
The
Il 26/02/2013 16:13, Stefan Hajnoczi ha scritto:
Is there any solution in KVM that works like VAAI does in EXSI, I
found a PPT that posted in Sep. 2012, which said that storage offload
will be consider in future.
I am wondering anybody knows about this, or provide some information about
On 02/27/2013 12:55 PM, Michael S. Tsirkin wrote:
Add documentation about using qemu-system for unit tests.
Add runner script to select the correct binary and flags.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
README | 10 +-
x86-run | 27 +++
2
On 26/02/13 12:18, Michael S. Tsirkin wrote:
virtio_ccw: pass a cookie value to kvm hypercall
Lookups by channel/vq pair on host during virtio notifications might be
expensive. Interpret hypercall return value as a cookie which host can
use to do device lookups for the next notification
On Sun, Feb 24, 2013 at 04:23:44PM -0500, Peter Hurley wrote:
On Tue, 2013-02-19 at 10:26 +0200, Gleb Natapov wrote:
On Mon, Feb 18, 2013 at 08:12:21PM -0500, Peter Hurley wrote:
On Mon, 2013-02-18 at 19:59 -0300, Marcelo Tosatti wrote:
On Wed, Feb 13, 2013 at 06:57:09AM -0500, Peter
The physical memory fixmapped for the pvclock clock_gettime vsyscall
was allocated, and thus is not a kernel symbol. __pa() is the proper
method to use in this case.
Fixes the crash below when booting a next-20130204+ smp guest on a
3.8-rc5+ KVM host.
[0.666410] udevd[97]: starting version
On Wed, Feb 27, 2013 at 03:10:01PM -0300, Lucas Meneghel Rodrigues wrote:
On 02/27/2013 12:55 PM, Michael S. Tsirkin wrote:
Add documentation about using qemu-system for unit tests.
Add runner script to select the correct binary and flags.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
On 02/27/2013 05:44 PM, Michael S. Tsirkin wrote:
+Using qemu (supported since qemu 1.3):
+qemu-system-x86_64 -enable-kvm -device pc-testdev -serial stdio -device
isa-debug-exit,iobase=0xf4,iosize=0x4 -kernel ./x86/msr.flat
I think it is worth here to point out that with new qemu, after the
On Wed, Feb 27, 2013 at 06:03:41PM -0300, Lucas Meneghel Rodrigues wrote:
On 02/27/2013 05:44 PM, Michael S. Tsirkin wrote:
+Using qemu (supported since qemu 1.3):
+qemu-system-x86_64 -enable-kvm -device pc-testdev -serial stdio -device
isa-debug-exit,iobase=0xf4,iosize=0x4 -kernel
I have a program which I need to run against a pile of drives. The program needs
to boot to a dedicated machine and will only do one drive at a time, and I only
have one machine I can tie up to use dedicated, making it a very slow process
and requiring a manual drive change when the program is
On Wed, 27 Feb 2013 18:23:45 +0200
Gleb Natapov g...@redhat.com wrote:
On Wed, Feb 27, 2013 at 07:41:03PM +0900, Takuya Yoshikawa wrote:
Note: this is based on the latest master branch.
I'm sending this before 3.9-rc1 is released since this can cause extra
conflicts unless we make this
[ Resending since my email client seemed to fail. ]
On Wed, 27 Feb 2013 18:23:45 +0200
Gleb Natapov g...@redhat.com wrote:
On Wed, Feb 27, 2013 at 07:41:03PM +0900, Takuya Yoshikawa wrote:
Note: this is based on the latest master branch.
I'm sending this before 3.9-rc1 is released since
On Wed, Feb 27, 2013 at 07:41:03PM +0900, Takuya Yoshikawa wrote:
Note: this is based on the latest master branch.
I'm sending this before 3.9-rc1 is released since this can cause extra
conflicts unless we make this available to all arch before we start
adding new stuff.
Please review:
Jens Axboe ax...@kernel.dk writes:
On Wed, Feb 27 2013, Rusty Russell wrote:
Subject: scatterlist: sg_set_buf() argument must be in linear mapping.
Signed-off-by: Rusty Russell ru...@rustcorp.com.au
diff --git a/include/linux/scatterlist.h b/include/linux/scatterlist.h
index
Aurelien Jarno aurel...@aurel32.net writes:
On Wed, Feb 27, 2013 at 11:56:55AM +1030, Rusty Russell wrote:
Aurelien Jarno aurel...@aurel32.net writes:
Hi,
I have noticed that virtio-rng only returns zero for kernels = 2.6.33
built with CONFIG_HW_RANDOM=m. This is a bit much too
This patchset adds the userspace debug support for booke/bookehv.
this is tested on powerpc e500v2/e500mc devices.
Bharat Bhushan (7):
KVM: PPC: booke: Added debug handler
Added ONE_REG interface for debug instruction
KVM: PPC: debug stub interface parameter defined
booke: Save and
On Guest entry: if guest is wants to use the debug register then
save h/w debug register in host_dbg_reg and load the debug registers
with shadow_dbg_reg. Otherwise leave h/w debug registers as is.
On guest exit: If guest/user-space is using the debug resource then
restore the h/w debug register
This patch defines the interface parameter for KVM_SET_GUEST_DEBUG
ioctl support. Follow up patches will use this for setting up
hardware breakpoints, watchpoints and software breakpoints.
Also kvm_arch_vcpu_ioctl_set_guest_debug() is brought one level below.
This is because I am not sure what is
This patch adds the one_reg interface to get the special instruction
to be used for setting software breakpoint from userspace.
Signed-off-by: Bharat Bhushan bharat.bhus...@freescale.com
---
Documentation/virtual/kvm/api.txt |1 +
arch/powerpc/include/asm/kvm_book3s.h |1 +
Installed debug handler will be used for guest debug support
and debug facility emulation features (patches for these
features will follow this patch).
Signed-off-by: Liu Yu yu@freescale.com
[bharat.bhus...@freescale.com: Substantial changes]
Signed-off-by: Bharat Bhushan
This patch adds the debug stub support on booke/bookehv.
Now QEMU debug stub can use hw breakpoint, watchpoint and
software breakpoint to debug guest.
Signed-off-by: Bharat Bhushan bharat.bhus...@freescale.com
---
arch/powerpc/include/uapi/asm/kvm.h | 22 +-
arch/powerpc/kvm/booke.c
Instruction emulation return EMULATE_DO_PAPR when it requires
exit to userspace on book3s. Similar return is required
for booke. EMULATE_DO_PAPR reads out to be confusing so it is
renamed to EMULATE_EXIT_USER.
Signed-off-by: Bharat Bhushan bharat.bhus...@freescale.com
---
On Guest entry: if guest is wants to use the debug register then
save h/w debug register in host_dbg_reg and load the debug registers
with shadow_dbg_reg. Otherwise leave h/w debug registers as is.
On guest exit: If guest/user-space is using the debug resource then
restore the h/w debug register
The Buildbot has detected a new failure on builder i386 while building kvm.
Full details are available at:
http://buildbot.b1-systems.de/kvm/builders/i386/builds/824
Buildbot URL: http://buildbot.b1-systems.de/kvm/
Buildslave for this Build: b1_kvm_1
Build Reason: The Nightly scheduler named
The Buildbot has detected a new failure on builder ia64 while building kvm.
Full details are available at:
http://buildbot.b1-systems.de/kvm/builders/ia64/builds/829
Buildbot URL: http://buildbot.b1-systems.de/kvm/
Buildslave for this Build: b1_kvm_1
Build Reason: The Nightly scheduler named
The Buildbot has detected a new failure on builder ppc44x while building kvm.
Full details are available at:
http://buildbot.b1-systems.de/kvm/builders/ppc44x/builds/831
Buildbot URL: http://buildbot.b1-systems.de/kvm/
Buildslave for this Build: b1_kvm_1
Build Reason: The Nightly scheduler
The Buildbot has detected a new failure on builder ppc64 while building kvm.
Full details are available at:
http://buildbot.b1-systems.de/kvm/builders/ppc64/builds/828
Buildbot URL: http://buildbot.b1-systems.de/kvm/
Buildslave for this Build: b1_kvm_1
Build Reason: The Nightly scheduler named
The Buildbot has detected a new failure on builder x86_64 while building kvm.
Full details are available at:
http://buildbot.b1-systems.de/kvm/builders/x86_64/builds/835
Buildbot URL: http://buildbot.b1-systems.de/kvm/
Buildslave for this Build: b1_kvm_1
Build Reason: The Nightly scheduler
On 2/27/13 9:39 AM, David Ahern wrote:
I have been playing with the live mode a bit lately. I'll add a debug to
note 2 consecutive entry events without an exit -- see if it sheds some
light on it.
If you feel game take this for a spin:
On Tue, Feb 19, 2013 at 11:27:20PM -0300, Marcelo Tosatti wrote:
Read and write steal time MSR, so that reporting is functional across
migration.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
Applied, thanks.
diff --git a/target-i386/cpu.h b/target-i386/cpu.h
index
Ignoring return value of setfsgid(gid) and setfsuid(uid) causes
warnings on F18. Check the return value: man page says
glibc returns -1 on error.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
fsdev/virtfs-proxy-helper.c | 7 +--
1 file changed, 5 insertions(+), 2 deletions(-)
diff
Add documentation about using qemu-system for unit tests.
Add runner script to select the correct binary and flags.
Signed-off-by: Michael S. Tsirkin m...@redhat.com
---
Changes from v1:
fix typo for qemu-system flags
add lmr's comment about exit status
README | 15
This patchset adds the userspace debug support for booke/bookehv.
this is tested on powerpc e500v2/e500mc devices.
Bharat Bhushan (7):
KVM: PPC: booke: Added debug handler
Added ONE_REG interface for debug instruction
KVM: PPC: debug stub interface parameter defined
booke: Save and
This patch defines the interface parameter for KVM_SET_GUEST_DEBUG
ioctl support. Follow up patches will use this for setting up
hardware breakpoints, watchpoints and software breakpoints.
Also kvm_arch_vcpu_ioctl_set_guest_debug() is brought one level below.
This is because I am not sure what is
This patch adds the one_reg interface to get the special instruction
to be used for setting software breakpoint from userspace.
Signed-off-by: Bharat Bhushan bharat.bhus...@freescale.com
---
Documentation/virtual/kvm/api.txt |1 +
arch/powerpc/include/asm/kvm_book3s.h |1 +
Installed debug handler will be used for guest debug support
and debug facility emulation features (patches for these
features will follow this patch).
Signed-off-by: Liu Yu yu@freescale.com
[bharat.bhus...@freescale.com: Substantial changes]
Signed-off-by: Bharat Bhushan
This patch adds the debug stub support on booke/bookehv.
Now QEMU debug stub can use hw breakpoint, watchpoint and
software breakpoint to debug guest.
Signed-off-by: Bharat Bhushan bharat.bhus...@freescale.com
---
arch/powerpc/include/uapi/asm/kvm.h | 22 +-
arch/powerpc/kvm/booke.c
Instruction emulation return EMULATE_DO_PAPR when it requires
exit to userspace on book3s. Similar return is required
for booke. EMULATE_DO_PAPR reads out to be confusing so it is
renamed to EMULATE_EXIT_USER.
Signed-off-by: Bharat Bhushan bharat.bhus...@freescale.com
---
On Guest entry: if guest is wants to use the debug register then
save h/w debug register in host_dbg_reg and load the debug registers
with shadow_dbg_reg. Otherwise leave h/w debug registers as is.
On guest exit: If guest/user-space is using the debug resource then
restore the h/w debug register
68 matches
Mail list logo