https://bugzilla.kernel.org/show_bug.cgi?id=103131
Bug ID: 103131
Summary: Forgotten stack pushes with KVM_MEM_READONLY
Product: Virtualization
Version: unspecified
Kernel Version: 4.1.5
Hardware: x86-64
OS: Linux
https://bugzilla.kernel.org/show_bug.cgi?id=103141
Bug ID: 103141
Summary: Host-triggerable NULL pointer oops
Product: Virtualization
Version: unspecified
Kernel Version: 4.1.5
Hardware: x86-64
OS: Linux
Hi Mario,
On Wed, Aug 05, 2015 at 05:11:37PM +0100, Marc Zyngier wrote:
On 16/07/15 22:29, Mario Smarduch wrote:
This patch only saves and restores FP/SIMD registers on Guest access. To do
this cptr_el2 FP/SIMD trap is set on Guest entry and later checked on exit.
lmbench, hackbench show
Hi Pavel,
It's only been a week and we're approaching the merge window.
Both Marc and I are well aware that you sent this patch.
Please be more patient. For example, if a month or more passes without
you hearing anything, then it's ok to ask what the plans are.
-Christoffer
On Wed, Aug 19,
On Wed, 19 Aug 2015 14:52:08 -0700
Mario Smarduch m.smard...@samsung.com wrote:
Hi Christoffer,
I'll test it and work with it.
FWIW, I've added these patches to both -queue and -next, and from the
tests Christoffer has run, it looks pretty good.
Thanks,
M.
--
Jazz is not dead. It
https://bugzilla.kernel.org/show_bug.cgi?id=103141
Wanpeng Li wanpeng...@hotmail.com changed:
What|Removed |Added
CC|
Great that's even better.
On 8/19/2015 3:28 PM, Marc Zyngier wrote:
On Wed, 19 Aug 2015 14:52:08 -0700
Mario Smarduch m.smard...@samsung.com wrote:
Hi Christoffer,
I'll test it and work with it.
FWIW, I've added these patches to both -queue and -next, and from the
tests Christoffer
Hello-
Your site states that one off questions might could be answered via email so
here I am.
I have limited knowledge of KVM, but it is my understanding that in order to
vertically scale RAM for a KVM the guest needs to be shut down, resized, and
rebooted, resulting in a 5-10 minute
Hi Christoffer,
I'll test it and work with it.
Thanks,
Mario
On 8/19/2015 10:49 AM, Christoffer Dall wrote:
Hi Mario,
On Wed, Aug 05, 2015 at 05:11:37PM +0100, Marc Zyngier wrote:
On 16/07/15 22:29, Mario Smarduch wrote:
This patch only saves and restores FP/SIMD registers on Guest
Peter Hornyack peterhorny...@google.com writes:
There are numerous MSRs that kvm does not currently handle. On Intel
platforms we have observed guest VMs accessing some of these MSRs (for
example, MSR_PLATFORM_INFO) and behaving poorly (to the point of guest OS
crashes) when they receive a GP
ROZUMNY, VICTOR vr9...@att.com writes:
Hello-
Your site states that one off questions might could be answered via
email so here I am.
I have limited knowledge of KVM, but it is my understanding that in
order to vertically scale RAM for a KVM the guest needs to be shut
down, resized, and
PING
Kind regards,
Pavel Fedin
Expert Engineer
Samsung Electronics Research center Russia
-Original Message-
From: kvm-ow...@vger.kernel.org [mailto:kvm-ow...@vger.kernel.org] On Behalf
Of Pavel Fedin
Sent: Tuesday, August 11, 2015 10:34 AM
To: kvm...@lists.cs.columbia.edu;
On 08/18/2015 10:57 PM, Paolo Bonzini wrote:
On 18/08/2015 11:30, Avi Kivity wrote:
KVM_USER_EXIT in practice should be so rare (at least with in-kernel
LAPIC) that I don't think this matters. KVM_USER_EXIT is relatively
uninteresting, it only exists to provide an alternative to signals that
On 8/14/15 6:08 PM, Radim Krčmář wrote:
When userspace wants KVM to exit to userspace, it sends a signal.
This has a disadvantage of requiring a change to the signal mask because
the signal needs to be blocked in userspace to stay pending when sending
to self.
Using a request flag allows us to
14 matches
Mail list logo