On Mon, Nov 18, 2013 at 01:13:13PM -0800, Christoffer Dall wrote:
Hi Gleb and Paolo,
Pulled, thanks.
Please pull this into kvm/master:
The following changes since commit 5e01dc7b26d9f24f39abace5da98ccbd6a5ceb52:
Linux 3.12 (2013-11-03 15:41:51 -0800)
are available in the git
Am 19.11.2013 um 00:49 schrieb Scott Wood scottw...@freescale.com:
On Mon, 2013-11-18 at 16:09 -0500, Alexander Graf wrote:
On 18.11.2013, at 03:34, “tiejun.chen” tiejun.c...@windriver.com wrote:
On 10/23/2013 09:26 AM, Tiejun Chen wrote:
We enter with interrupts disabled in hardware, but
On 19.11.2013, at 02:02, Paul Mackerras pau...@samba.org wrote:
On Mon, Nov 18, 2013 at 04:31:39PM -0500, Alexander Graf wrote:
On 16.11.2013, at 03:59, Paul Mackerras pau...@samba.org wrote:
I have been thinking about adding an interface to PPC KVM's PAPR
emulation to allow userspace to
On 19.11.2013, at 07:12, Liu Ping Fan kernelf...@gmail.com wrote:
Since kvmppc_hv_find_lock_hpte() is called from both virtmode and
realmode, so it can trigger the deadlock.
Suppose the following scene:
Two physical cpuM, cpuN, two VM instances A, B, each VM has a group of
vcpus.
If
On 19.11.2013, at 07:12, Liu Ping Fan kernelf...@gmail.com wrote:
In some scene, e.g openstack CI, PR guest can trigger sc 1 frequently,
this patch optimizes the path by directly delivering BOOK3S_INTERRUPT_SYSCALL
to HV guest, so powernv can return to HV guest without heavy exit, i.e,
no
On Sun, 17 Nov 2013 13:45:08 +0200
Gleb Natapov g...@redhat.com wrote:
On Sun, Nov 17, 2013 at 05:31:32AM +0100, k...@buildbot.b1-systems.de wrote:
The Buildbot has detected a new failure on builder s390 while building kvm.
Full details are available at:
On 19.11.2013 12:46, Cornelia Huck wrote:
Looks like this is caused by a2c0844965534e2276e5b0c0dc8a0952658412a4,
which updated the s390 defconfig to optimize for z196. IIRC, support
for z196 was added with gcc 4.6, so either the buildbot's gcc needs to
be updated, or the config modified to build
On Tue, 19 Nov 2013 12:57:10 +0100
Christian Berendt bere...@b1-systems.de wrote:
On 19.11.2013 12:46, Cornelia Huck wrote:
Looks like this is caused by a2c0844965534e2276e5b0c0dc8a0952658412a4,
which updated the s390 defconfig to optimize for z196. IIRC, support
for z196 was added with
There are some users that would like the ability of a temporary
per-cpu deactivation of the debugger trap.
More specifically, we have seen that when kvm-unit-tests runs with
kgdb enabled, the kernel halts on the debugger during the KVM x86
instruction emulation that performs a test of a division
Hello,
The following two patches address an integration issue between KVM and
KGDB. The issue described in the patches can be triggered with vanilla
kernels that enable KGDB and KVM together on x86 (more specifically,
we bump into this with Fedora's 3.11 kernel from FC19).
On a kernel enabled
We have seen that when kvm-unit-tests runs with kgdb enabled, the
kernel halts on the debugger during the KVM x86 instruction emulation
that performs a test of a division by zero, and also during fwait.
This patch adds calls that temporarily disable the debugger trap.
Signed-off-by: Dan Aloni
Il 19/11/2013 15:53, Dan Aloni ha scritto:
We have seen that when kvm-unit-tests runs with kgdb enabled, the
kernel halts on the debugger during the KVM x86 instruction emulation
that performs a test of a division by zero, and also during fwait.
This patch adds calls that temporarily disable
Hi
Please, send any topic that you are interested in covering.
Thanks, Juan.
Call details:
10:00 AM to 11:00 AM EDT
Every two weeks
If you need phone number details, contact me privately.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
On Tue, 2013-11-19 at 10:51 +0100, Alexander Graf wrote:
Am 19.11.2013 um 00:49 schrieb Scott Wood scottw...@freescale.com:
On Mon, 2013-11-18 at 16:09 -0500, Alexander Graf wrote:
On 18.11.2013, at 03:34, “tiejun.chen” tiejun.c...@windriver.com wrote:
On 10/23/2013 09:26 AM, Tiejun
We should not be using jump labels before they were initialized. Push back
the callback to until after jump label initialization.
Signed-off-by: Sasha Levin sasha.le...@oracle.com
---
arch/x86/kvm/mmu_audit.c |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git
I'm new to KVM and as a learning exercise I'd like to start a VM and
run a few instructions by using ioctls on /dev/kvm. This might be a
terrible idea, please say so if it is.
I haven't been able to find much information on it, but by reading the
API document and stracing qemu I've put together a
On Wed, Aug 07, 2013 at 12:06:49PM +0800, Xiao Guangrong wrote:
On 08/07/2013 09:48 AM, Marcelo Tosatti wrote:
On Tue, Jul 30, 2013 at 09:02:02PM +0800, Xiao Guangrong wrote:
Make sure we can see the writable spte before the dirt bitmap is visible
We do this is for
On Tue, Nov 19, 2013 at 10:29:20PM -0200, Marcelo Tosatti wrote:
A call to GET_DIRTY_LOG guarantees to return correct information about
dirty pages before invocation of the previous GET_DIRTY_LOG call.
Can you explain why it is OK to relax this rule?
That is, this might be OK, but better
On Tue, Nov 19, 2013 at 6:39 PM, Alexander Graf ag...@suse.de wrote:
On 19.11.2013, at 07:12, Liu Ping Fan kernelf...@gmail.com wrote:
Since kvmppc_hv_find_lock_hpte() is called from both virtmode and
realmode, so it can trigger the deadlock.
Suppose the following scene:
Two physical
In addition to the external VFIO user API, a VFIO KVM device
has been introduced recently.
sPAPR TCE IOMMU is para-virtualized and the guest does map/unmap
via hypercalls which take a logical bus id (LIOBN) as a target IOMMU
identifier. LIOBNs are made up and linked to IOMMU groups by the user
Hi Paolo,
Currently I can trap every first write/read to a memory page from
guest VM (add codes in tdp_page_fault). If I want to trace every
memory access to a page, how can I achieve such goal in KVM?
Thanks,
Arthur
--
Arthur Chunqi Li
Department of Computer Science
School of EECS
Peking
Am 19.11.2013 um 00:49 schrieb Scott Wood scottw...@freescale.com:
On Mon, 2013-11-18 at 16:09 -0500, Alexander Graf wrote:
On 18.11.2013, at 03:34, “tiejun.chen” tiejun.c...@windriver.com wrote:
On 10/23/2013 09:26 AM, Tiejun Chen wrote:
We enter with interrupts disabled in hardware, but
On 19.11.2013, at 02:02, Paul Mackerras pau...@samba.org wrote:
On Mon, Nov 18, 2013 at 04:31:39PM -0500, Alexander Graf wrote:
On 16.11.2013, at 03:59, Paul Mackerras pau...@samba.org wrote:
I have been thinking about adding an interface to PPC KVM's PAPR
emulation to allow userspace to
On 19.11.2013, at 07:12, Liu Ping Fan kernelf...@gmail.com wrote:
Since kvmppc_hv_find_lock_hpte() is called from both virtmode and
realmode, so it can trigger the deadlock.
Suppose the following scene:
Two physical cpuM, cpuN, two VM instances A, B, each VM has a group of
vcpus.
If
On 19.11.2013, at 07:12, Liu Ping Fan kernelf...@gmail.com wrote:
In some scene, e.g openstack CI, PR guest can trigger sc 1 frequently,
this patch optimizes the path by directly delivering BOOK3S_INTERRUPT_SYSCALL
to HV guest, so powernv can return to HV guest without heavy exit, i.e,
no
On Tue, 2013-11-19 at 10:51 +0100, Alexander Graf wrote:
Am 19.11.2013 um 00:49 schrieb Scott Wood scottw...@freescale.com:
On Mon, 2013-11-18 at 16:09 -0500, Alexander Graf wrote:
On 18.11.2013, at 03:34, “tiejun.chen” tiejun.c...@windriver.com wrote:
On 10/23/2013 09:26 AM, Tiejun
On Tue, Nov 19, 2013 at 6:39 PM, Alexander Graf ag...@suse.de wrote:
On 19.11.2013, at 07:12, Liu Ping Fan kernelf...@gmail.com wrote:
Since kvmppc_hv_find_lock_hpte() is called from both virtmode and
realmode, so it can trigger the deadlock.
Suppose the following scene:
Two physical
In addition to the external VFIO user API, a VFIO KVM device
has been introduced recently.
sPAPR TCE IOMMU is para-virtualized and the guest does map/unmap
via hypercalls which take a logical bus id (LIOBN) as a target IOMMU
identifier. LIOBNs are made up and linked to IOMMU groups by the user
28 matches
Mail list logo