On Sun, Oct 31, 2010 at 06:25:53PM -0400, Kevin O'Connor wrote:
> On Sun, Oct 31, 2010 at 01:40:01PM +0200, Gleb Natapov wrote:
> > This is current sate of the patch series for people to comment on.
> > I tried to use open firmware naming scheme to specify device path names.
> >
> > The patch seri
On Tue, Oct 26, 2010 at 03:19:38PM -0700, Sridhar Samudrala wrote:
> With the current default macvtap mode, a KVM guest using virtio with
> macvtap backend has the following limitations.
> - cannot change/add a mac address on the guest virtio-net
> - cannot create a vlan device on the guest virtio
Tracing 'async' and *pfn is useless, since 'async' is always true,
and '*pfn' is always "fault_pfn'
We can trace 'gva' and 'gfn' instead, it can help us to see the
life-cycle of an async_pf
Signed-off-by: Xiao Guangrong
---
arch/x86/kvm/mmu.c |2 +-
include/trace/events/kvm.h | 12
Use 'DECLARE_EVENT_CLASS' to cleanup async_pf tracepoints
Acked-by: Gleb Natapov
Signed-off-by: Xiao Guangrong
---
include/trace/events/kvm.h | 76 ---
1 files changed, 35 insertions(+), 41 deletions(-)
diff --git a/include/trace/events/kvm.h b/include
Don't search later slots if the slot is empty
Acked-by: Gleb Natapov
Signed-off-by: Xiao Guangrong
---
arch/x86/kvm/x86.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 2cfdf2d..9b543f4 100644
--- a/arch/x86/kvm/x86.c
++
In current code, it checks async pf completion out of the wait context,
like this:
if (vcpu->arch.mp_state == KVM_MP_STATE_RUNNABLE &&
!vcpu->arch.apf.halted)
r = vcpu_enter_guest(vcpu);
else {
..
If it's no need to inject async #PF to PV guest we can handle
more completed apfs at one time, so we can retry guest #PF
as early as possible
Signed-off-by: Xiao Guangrong
---
arch/x86/include/asm/kvm_host.h |3 ++-
arch/x86/kvm/x86.c |8 ++--
virt/kvm/async_pf.c
In kvm_async_pf_wakeup_all(), we add a dummy apf to vcpu->async_pf.done
without holding vcpu->async_pf.lock, it will break if we are handling apfs
at this time.
Also use 'list_empty_careful()' instead of 'list_empty()'
Signed-off-by: Xiao Guangrong
---
virt/kvm/async_pf.c |5 -
1 files
Don't make a KVM_REQ_UNHALT request after async pf is completed since it
can break guest's 'HLT' instruction.
Signed-off-by: Xiao Guangrong
---
arch/x86/kvm/x86.c | 13 ++---
include/linux/kvm_host.h |6 ++
virt/kvm/kvm_main.c |9 -
3 files changed, 24 in
On Mon, Nov 01, 2010 at 05:02:35PM +0800, Xiao Guangrong wrote:
> If it's no need to inject async #PF to PV guest we can handle
> more completed apfs at one time, so we can retry guest #PF
> as early as possible
>
> Signed-off-by: Xiao Guangrong
> ---
> arch/x86/include/asm/kvm_host.h |3 ++-
On Mon, Nov 01, 2010 at 05:01:28PM +0800, Xiao Guangrong wrote:
> In current code, it checks async pf completion out of the wait context,
> like this:
>
> if (vcpu->arch.mp_state == KVM_MP_STATE_RUNNABLE &&
> !vcpu->arch.apf.halted)
> r = vcpu_enter_guest(vc
On 11/01/2010 05:24 PM, Gleb Natapov wrote:
>> -put_page(work->page);
>> -kmem_cache_free(async_pf_cache, work);
>> +list_del(&work->queue);
>> +vcpu->async_pf.queued--;
>> +if (work->page)
>> +put_page(work->page);
>> +
> 1. add a secondary mac (or third, etc) address to the guest virtio-net
> interface.
Maybe I misunderstood this. Is it just setting another mac on the
guest virtio-net interface?
>
> 4. the above stuff must be controllable by host admin
> - Well, for this there are a few options:
> > admin sw
Am 31.10.2010 16:05, Jan Kiszka wrote:
> Still not working here are ehci, ath9k and e1000e when passed through.
> They receive IRQs, but somehow the Linux guest drivers are unhappy about
> the device states (the e1000e detects "Hardware Unit Hang" e.g.). This
> is independent of my patches. Anyone
On Mon, Nov 01, 2010 at 11:48:23AM +0100, Dragos Tatulea wrote:
> > 1. add a secondary mac (or third, etc) address to the guest virtio-net
> > interface.
> Maybe I misunderstood this. Is it just setting another mac on the
> guest virtio-net interface?
Well, yes, that's also not possible at the mom
Hi Sheng,
I'm not claiming to understand the details, but this looks like use
(dereference of pte via dma_pte_addr) after release (free_pgtable_page
of dmar_domain->pgd aka pte) to me:
static int intel_iommu_attach_device(struct iommu_domain *domain,
struct de
I am having a problem with a Fedora 14 x86_64 host booting SMP 2.6.35.x guests.
The boot proceeds halfway but does not reach a shell or desktop.
Oddly the console echoes characters.
I am using a AMD SVM system and found this:
https://patchwork.kernel.org/patch/226981/
Has this been resolved?
Fe
Richard Chan wrote:
> I am having a problem with a Fedora 14 x86_64 host booting SMP 2.6.35.x
> guests.
> The boot proceeds halfway but does not reach a shell or desktop.
> Oddly the console echoes characters.
>
> I am using a AMD SVM system and found this:
> https://patchwork.kernel.org/patch/22
Michael Tokarev wrote:
> Richard Chan wrote:
>> I am having a problem with a Fedora 14 x86_64 host booting SMP 2.6.35.x
>> guests.
>> The boot proceeds halfway but does not reach a shell or desktop.
>> Oddly the console echoes characters.
>>
>> I am using a AMD SVM system and found this:
>> https:
Hi again,
OK, I swapped those two lines in intel_iommu_attach_device [1], fixed
another warning in the wbinvd emulation, but now I'm about to give up.
This is freaky MMU stuff:
general protection fault: [#1] PREEMPT SMP DEBUG_PAGEALLOC
last sysfs file: /sys/devices/pci:00/:00:1a.0/d
On Mon, Nov 01, 2010 at 05:05:00PM +0800, Xiao Guangrong wrote:
> Don't make a KVM_REQ_UNHALT request after async pf is completed since it
> can break guest's 'HLT' instruction.
>
> Signed-off-by: Xiao Guangrong
> ---
> arch/x86/kvm/x86.c | 13 ++---
> include/linux/kvm_host.h |
[ Forgot to CC LKML - maybe it's not KVM-specific.
BTW, is anyone actually using current KVM device assigment on
Intel? I'm starting to believe that can only very few lucky people...
]
Am 01.11.2010 13:51, Jan Kiszka wrote:
> Hi again,
>
> OK, I swapped those two lines in intel_iommu_attach_d
On Mon, Nov 01, 2010 at 05:03:44PM +0800, Xiao Guangrong wrote:
> In kvm_async_pf_wakeup_all(), we add a dummy apf to vcpu->async_pf.done
> without holding vcpu->async_pf.lock, it will break if we are handling apfs
> at this time.
>
This should never happen to well behaved guest, but malicious gue
From: Jan Kiszka
smp_call_function_many is specified to be called only with preemption
disabled. Fulfill this requirement.
Signed-off-by: Jan Kiszka
---
arch/x86/kvm/x86.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 2c
From: Jan Kiszka
Micro optimization to avoid calling wbinvd twice on the CPU that has to
emulate it. As we might be preempted between smp_call_function_many and
the local wbinvd, the cache might be filled again so that real work
could be done uselessly.
Signed-off-by: Jan Kiszka
---
I can fold
On Mon, Nov 01, 2010 at 04:58:43PM +0800, Xiao Guangrong wrote:
> Tracing 'async' and *pfn is useless, since 'async' is always true,
> and '*pfn' is always "fault_pfn'
>
> We can trace 'gva' and 'gfn' instead, it can help us to see the
> life-cycle of an async_pf
>
> Signed-off-by: Xiao Guangrong
The registers rax and rbx contain non-canonical addresses (if
interpreted as pointers). The instruction where this happens is a mov so
I guess that the #GP is because of an non-canonical address.
Can you find out the code-line where this happens and the exact
assembler instruction? (haven't managed
Am 01.11.2010 14:21, Roedel, Joerg wrote:
> The registers rax and rbx contain non-canonical addresses (if
> interpreted as pointers). The instruction where this happens is a mov so
> I guess that the #GP is because of an non-canonical address.
> Can you find out the code-line where this happens and
Currently the exit is unhandled, so guest halts with error if it tries
to execute INVD instruction. Call into emulator when INVD instruction
is executed by a guest instead. This instruction is not needed by ordinary
guests, but firmware (like OpenBIOS) use it and fail.
Signed-off-by: Gleb Natapov
On Mon, Nov 01, 2010 at 09:25:00AM -0400, Jan Kiszka wrote:
> Am 01.11.2010 14:21, Roedel, Joerg wrote:
> > The registers rax and rbx contain non-canonical addresses (if
> > interpreted as pointers). The instruction where this happens is a mov so
> > I guess that the #GP is because of an non-canoni
From: Jan Kiszka
When we deassign a guest IRQ, clear the potentially asserted guest line.
There might be no chance for the guest to do this, specifically if we
switch from INTx to MSI mode.
Signed-off-by: Jan Kiszka
---
virt/kvm/assigned-dev.c |3 +++
1 files changed, 3 insertions(+), 0 de
Three patches to improve "classic" device assigment /wrt IRQs. Highlight
is the last one that resolves the host IRQ sharing issue for all PCI 2.3
devices. Quite essential when passing non-MSI-ready devices like many
USB host controllers.
Jan Kiszka (3):
KVM: Fold assigned interrupt work into IRQ
From: Jan Kiszka
PCI 2.3 allows to generically disable IRQ sources at device level. This
enables us to share IRQs of such devices between on the host side when
passing them to a guest.
Signed-off-by: Jan Kiszka
---
include/linux/kvm_host.h |1 +
virt/kvm/assigned-dev.c | 153
From: Jan Kiszka
The complete work handler runs with assigned_dev_lock acquired and
interrupts disabled, so there is nothing to gain pushing this work out
of the actually IRQ handler. Fold them together.
Signed-off-by: Jan Kiszka
---
include/linux/kvm_host.h |1 -
virt/kvm/assigned-dev.c
Is this the complete patch set? Or maybe it assumes a pre-patch kernel
tree. If so where can I get it?
thanks,
-Etienne
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordom
Am 01.11.2010 14:53, Roedel, Joerg wrote:
> On Mon, Nov 01, 2010 at 09:25:00AM -0400, Jan Kiszka wrote:
>> Am 01.11.2010 14:21, Roedel, Joerg wrote:
>>> The registers rax and rbx contain non-canonical addresses (if
>>> interpreted as pointers). The instruction where this happens is a mov so
>>> I g
On Mon, Nov 01, 2010 at 03:22:15PM +0100, Jan Kiszka wrote:
> Am 01.11.2010 14:53, Roedel, Joerg wrote:
> > On Mon, Nov 01, 2010 at 09:25:00AM -0400, Jan Kiszka wrote:
> >> Am 01.11.2010 14:21, Roedel, Joerg wrote:
> >>> The registers rax and rbx contain non-canonical addresses (if
> >>> interprete
v2:
- Move to Makefile.objs
- Move structures to memory.c and create a callback function
- Fix memory leak
I haven't moved to the state parameter because there should only
be a single instance of this per VM. The state parameter seems
like it would add complications in setup and function call
This adds a minimum chunk of Anthony's RAM API support so that we
can identify actual VM RAM versus all the other things that make
use of qemu_ram_alloc.
Signed-off-by: Alex Williamson
---
Makefile.objs |1 +
cpu-common.h |2 +
memory.c | 109 +
Register the actual VM RAM using the new API
Signed-off-by: Alex Williamson
---
hw/pc.c | 12 ++--
1 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/hw/pc.c b/hw/pc.c
index 69b13bf..0ea6d10 100644
--- a/hw/pc.c
+++ b/hw/pc.c
@@ -912,14 +912,14 @@ void pc_memory_init(ram_a
On Mon, Nov 01, 2010 at 03:08:37PM +0100, Jan Kiszka wrote:
> From: Jan Kiszka
>
> PCI 2.3 allows to generically disable IRQ sources at device level. This
> enables us to share IRQs of such devices between on the host side when
> passing them to a guest.
>
> Signed-off-by: Jan Kiszka
> ---
> i
Am 01.11.2010 15:35, Joerg Roedel wrote:
> On Mon, Nov 01, 2010 at 03:22:15PM +0100, Jan Kiszka wrote:
>> Am 01.11.2010 14:53, Roedel, Joerg wrote:
>>> On Mon, Nov 01, 2010 at 09:25:00AM -0400, Jan Kiszka wrote:
Am 01.11.2010 14:21, Roedel, Joerg wrote:
> The registers rax and rbx contain
Am 01.11.2010 16:24, Michael S. Tsirkin wrote:
> On Mon, Nov 01, 2010 at 03:08:37PM +0100, Jan Kiszka wrote:
>> From: Jan Kiszka
>>
>> PCI 2.3 allows to generically disable IRQ sources at device level. This
>> enables us to share IRQs of such devices between on the host side when
>> passing them t
On 09/25/2010 11:36 AM, Jason Wang wrote:
> We could give a further test of migration by launch test during migartion. So
> the following series implements:
>
> - A simple class to run a specified test in the background which could be used
> to launch other test during migartion. Its design is rat
On Sun, Oct 24, 2010 at 02:27:55PM +0200, Gleb Natapov wrote:
> Add save/restore of MSR for migration and cpuid bit.
>
> Signed-off-by: Gleb Natapov
> --
> v1->v2
> - use vmstate subsection to migrate new msr.
> v2->v3
> - rebase onto uq/master
> - protect use of MSR_KVM_ASYNC_PF_EN with
On Mon, Nov 01, 2010 at 04:41:08PM +0100, Jan Kiszka wrote:
> Am 01.11.2010 16:24, Michael S. Tsirkin wrote:
> > On Mon, Nov 01, 2010 at 03:08:37PM +0100, Jan Kiszka wrote:
> >> From: Jan Kiszka
> >>
> >> PCI 2.3 allows to generically disable IRQ sources at device level. This
> >> enables us to sh
On Thu, 2010-10-28 at 17:00 +0200, Avi Kivity wrote:
> On 10/23/2010 06:55 PM, Alex Williamson wrote:
> > On Sat, 2010-10-23 at 18:18 +0200, Michael S. Tsirkin wrote:
> > > On Fri, Oct 22, 2010 at 02:40:31PM -0600, Alex Williamson wrote:
> > > > To enable common msix support to be used with pass
On 09/25/2010 11:36 AM, Jason Wang wrote:
> This test just do the file transfer from host to guest during migartion in
> order
> to check whether the nic/block state could be saved and loaded correctly.
>
> Signed-off-by: Jason Wang
> ---
> .../kvm/tests/migration_with_file_transfer.py |
Am 01.11.2010 16:52, Michael S. Tsirkin wrote:
> On Mon, Nov 01, 2010 at 04:41:08PM +0100, Jan Kiszka wrote:
>> Am 01.11.2010 16:24, Michael S. Tsirkin wrote:
>>> On Mon, Nov 01, 2010 at 03:08:37PM +0100, Jan Kiszka wrote:
From: Jan Kiszka
PCI 2.3 allows to generically disable IRQ s
Am 01.11.2010 15:08, Jan Kiszka wrote:
> From: Jan Kiszka
>
> The complete work handler runs with assigned_dev_lock acquired and
> interrupts disabled, so there is nothing to gain pushing this work out
> of the actually IRQ handler. Fold them together.
Err, forget it. kvm_set_irq pulls in the fa
Am 01.11.2010 16:29, Jan Kiszka wrote:
> Nope. But I just noticed a fatal thinko in my fix to
> intel_iommu_attach_device - probably that was the key. Need to boot the
> test kernel...
That was indeed the reason for this GPF: I blindly swapped the
problematic lines, releasing the wrong page. Sorry
On Mon, Nov 01, 2010 at 05:30:20PM +0100, Jan Kiszka wrote:
> Am 01.11.2010 16:52, Michael S. Tsirkin wrote:
> > On Mon, Nov 01, 2010 at 04:41:08PM +0100, Jan Kiszka wrote:
> >> Am 01.11.2010 16:24, Michael S. Tsirkin wrote:
> >>> On Mon, Nov 01, 2010 at 03:08:37PM +0100, Jan Kiszka wrote:
> F
I have created a wiki page for this [1], also added to the networking
todo list [2]. No meaty information yet. But it's enough to start
working on it.
[1] - http://www.linux-kvm.org/page/GuestProgrammableMacVlanFiltering
[2] - http://www.linux-kvm.org/page/NetworkingTodo
-- Dragos
--
To unsubscri
On Wed, Oct 27, 2010 at 06:21:02PM +0900, Takuya Yoshikawa wrote:
> This patch series just change the way we allocate dirty bitmaps but don't
> change timing related issues.
>
> - Changelog
> I have not changed anything about patch 1 and 2 since I got
> "looks good" comment from Marcelo. Just
On Sun, Oct 24, 2010 at 03:38:46PM +0200, Avi Kivity wrote:
> This allows Linux to mask cpuid bits if, for example, nx is enabled on only
> some cpus.
>
> Signed-off-by: Avi Kivity
> ---
> arch/x86/kvm/x86.c |9 +
> 1 files changed, 9 insertions(+), 0 deletions(-)
>
> diff --git a/a
On Sun, Oct 24, 2010 at 04:49:08PM +0200, Gleb Natapov wrote:
> Add tracepoint for userspace exit.
>
> Signed-off-by: Gleb Natapov
> ---
> ChangeLog:
> v1->v2
>log error case too.
Applied, thanks.
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message
On Wed, Oct 27, 2010 at 05:21:21PM +0200, Heiko Carstens wrote:
> From: Heiko Carstens
>
> Fixes this:
>
> CC arch/s390/kvm/../../../virt/kvm/kvm_main.o
> arch/s390/kvm/../../../virt/kvm/kvm_main.c: In function
> 'kvm_clear_guest_page':
> arch/s390/kvm/../../../virt/kvm/kvm_main.c:1224:2
On Sat, Oct 30, 2010 at 01:04:24PM +0400, Vasiliy Kulikov wrote:
> Structure kvm_ppc_pvinfo is copied to userland with flags and
> pad fields unitialized. It leads to leaking of contents of
> kernel stack memory.
>
> Signed-off-by: Vasiliy Kulikov
> ---
> I cannot compile this driver, so it is
On Sat, Oct 30, 2010 at 10:54:47PM +0400, Vasiliy Kulikov wrote:
> Structures kvm_vcpu_events, kvm_debugregs, kvm_pit_state2 and
> kvm_clock_data are copied to userland with some padding and reserved
> fields unitialized. It leads to leaking of contents of kernel stack
> memory. We have to initia
On Tue, Oct 26, 2010 at 10:39:48AM +0800, Huang Ying wrote:
> Author: Max Asbock
>
> Add command pfa2hva to translate guest physical address to host
> virtual address.
>
> The pfa2hva command provides one step in a chain of translations from
> guest virtual to guest physical to host virtual to h
On Mon, Nov 01, 2010 at 03:35:01PM +0200, Gleb Natapov wrote:
> Currently the exit is unhandled, so guest halts with error if it tries
> to execute INVD instruction. Call into emulator when INVD instruction
> is executed by a guest instead. This instruction is not needed by ordinary
> guests, but f
On Mon, Nov 01, 2010 at 02:01:29PM +0100, Jan Kiszka wrote:
> From: Jan Kiszka
>
> Micro optimization to avoid calling wbinvd twice on the CPU that has to
> emulate it. As we might be preempted between smp_call_function_many and
> the local wbinvd, the cache might be filled again so that real wor
On 11/01/2010 11:09 AM, Marcelo Tosatti wrote:
On Tue, Oct 26, 2010 at 10:39:48AM +0800, Huang Ying wrote:
Author: Max Asbock
Add command pfa2hva to translate guest physical address to host
virtual address.
The pfa2hva command provides one step in a chain of translations from
guest virtual
On Mon, 1 Nov 2010, Takuya Yoshikawa wrote:
> (2010/10/31 3:28), Jesper Juhl wrote:
> > Hi,
> >
> > We can improve kvm_vm_ioctl_get_dirty_log() slightly by using vzalloc()
> > rather than first allocating and then manually zero the memory with
> > memset(). Also, while I was looking at this I not
hi,
the rcu_dereference_check is defined as
#define rcu_dereference_check(p, c) \
__rcu_dereference_check((p), rcu_read_lock_held() || (c), __rcu)
so the caller does not need to specify rcu_read_lock_held() condition.
wbr,
jirka
Signed-off-by: Jiri Olsa
---
include/linux/c
hi,
the rcu_dereference_check is defined as
#define rcu_dereference_check(p, c) \
__rcu_dereference_check((p), rcu_read_lock_held() || (c), __rcu)
so the caller does not need to specify rcu_read_lock_held() condition.
wbr,
jirka
Signed-off-by: Jiri Olsa
---
include/linux/r
hi,
the rcu_dereference_check is defined as
#define rcu_dereference_check(p, c) \
__rcu_dereference_check((p), rcu_read_lock_held() || (c), __rcu)
so the caller does not need to specify rcu_read_lock_held() condition.
wbr,
jirka
Signed-off-by: Jiri Olsa
---
include/linux/c
hi,
the rcu_dereference_check is defined as
#define rcu_dereference_check(p, c) \
__rcu_dereference_check((p), rcu_read_lock_held() || (c), __rcu)
so the caller does not need to specify rcu_read_lock_held()
condition.
Several places in kernel are spcifying rcu_read_lock_held as
rcu_deref
On Mon, 2010-11-01 at 11:49 -0700, Anthony Liguori wrote:
> On 11/01/2010 11:09 AM, Marcelo Tosatti wrote:
> > On Tue, Oct 26, 2010 at 10:39:48AM +0800, Huang Ying wrote:
> >
> >> Author: Max Asbock
> >>
> >> Add command pfa2hva to translate guest physical address to host
> >> virtual address.
On 11/01/2010 02:20 PM, Huang Ying wrote:
Yes. As general interface, it may not work so well, but as test
interface, it works quite well and useful.
Do we have any mechanism to add a test only interface?
I'd like to see what Luiz/Markus think but definitely only a human
monitor interface
On 11/01/2010 12:06 PM, Marcelo Tosatti wrote:
On Sun, Oct 24, 2010 at 04:49:08PM +0200, Gleb Natapov wrote:
> Add tracepoint for userspace exit.
>
> Signed-off-by: Gleb Natapov
> ---
>ChangeLog:
>v1->v2
> log error case too.
Applied, thanks.
errno sign is still flipped, no?
I built from qemu-kvm-0.13.0.tar.gz on a Debian system with kernel
linux-image-2.6.32-5-amd642.6.32-26
(but otherwise basically the stable/lenny version) and now see
Oct 26 16:57:38 markov kernel: [ 5757.672426] kvm: 23063: cpu0 unhandled wrmsr:
0x198 data 0
Oct 26 16:57:38 markov
On Mon, Nov 01, 2010 at 03:33:20PM -0400, Avi Kivity wrote:
> On 11/01/2010 12:06 PM, Marcelo Tosatti wrote:
> >On Sun, Oct 24, 2010 at 04:49:08PM +0200, Gleb Natapov wrote:
> >> Add tracepoint for userspace exit.
> >>
> >> Signed-off-by: Gleb Natapov
> >> ---
> >>ChangeLog:
> >>v1->v2
On Sat, 2010-10-30 at 22:06 +0200, Michael S. Tsirkin wrote:
> On Fri, Oct 29, 2010 at 08:43:08AM -0700, Shirley Ma wrote:
> > On Fri, 2010-10-29 at 10:10 +0200, Michael S. Tsirkin wrote:
> > > Hmm. I don't yet understand. We are still doing copies into the
> per-vq
> > > buffer, and the data copie
From: Jiri Olsa
Date: Mon, 1 Nov 2010 20:15:09 +0100
> the rcu_dereference_check is defined as
>
> #define rcu_dereference_check(p, c) \
> __rcu_dereference_check((p), rcu_read_lock_held() || (c), __rcu)
>
> so the caller does not need to specify rcu_read_lock_held() condition.
Add a unit test for NMI immediately after an IF-enabling STI.
Avi Kivity (2):
apic: use boot idt instead of a locally allocated idt
apic: test nmi-after-sti
x86/apic.c | 83 +---
1 files changed, 68 insertions(+), 15 deletions(-)
--
While not required by the spec, some guests (Linux)
rely on nmi being blocked by an IF-enabling sti. Add
a unit test for this condition.
Signed-off-by: Avi Kivity
---
x86/apic.c | 67
1 files changed, 67 insertions(+), 0 deletions(-
This allows the smp support, which uses the boot idt, to work.
Signed-off-by: Avi Kivity
---
x86/apic.c | 16 +---
1 files changed, 1 insertions(+), 15 deletions(-)
diff --git a/x86/apic.c b/x86/apic.c
index 48fa0f7..165f820 100644
--- a/x86/apic.c
+++ b/x86/apic.c
@@ -89,7 +89,7
On 11/01/2010 03:43 PM, Marcelo Tosatti wrote:
On Mon, Nov 01, 2010 at 03:33:20PM -0400, Avi Kivity wrote:
> On 11/01/2010 12:06 PM, Marcelo Tosatti wrote:
> >On Sun, Oct 24, 2010 at 04:49:08PM +0200, Gleb Natapov wrote:
> >> Add tracepoint for userspace exit.
> >>
> >> Signed-off-by:
While not mandated by the spec, Linux relies on NMI being blocked by an
IF-enabling STI. VMX also refuses to enter a guest in this state, at
least on some implementations.
Disallow NMI while blocked by STI by checking for the condition, and
requesting an interrupt window exit if it occurs.
Signe
I've applied all your patches. Thanks!
On Saturday, October 30, 2010 09:58:55 am Alex Williamson wrote:
> Hi Tom,
>
> I've updated some patches I've been working on to v5 and wanted to
> see what you think. I also found a couple minor bugs, fixed in this
> series.
>
> The main idea is that sinc
Hi,
Are there any lingering issues or concerns with the latest rbd patch, or
other roadblocks that would prevent this from being merged?
Thanks-
sage
On Fri, 15 Oct 2010, Christian Brunner wrote:
> Hi,
>
> once again, Yehuda committed fixes for all the suggestions made on the
> list (and mor
On Mon, 2010-11-01 at 20:15 +0100, Jiri Olsa wrote:
> hi,
> the rcu_dereference_check is defined as
>
> #define rcu_dereference_check(p, c) \
> __rcu_dereference_check((p), rcu_read_lock_held() || (c), __rcu)
>
> so the caller does not need to specify rcu_read_lock_held() condition
On 11/01/2010 08:15 PM, Jiri Olsa wrote:
diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h
index a055742..a90a7e3 100644
--- a/include/linux/kvm_host.h
+++ b/include/linux/kvm_host.h
@@ -256,7 +256,6 @@ void kvm_put_kvm(struct kvm *kvm);
static inline struct kvm_memslots *kvm_mem
Hi Jesper, (dropped some addresses from Cc)
> > Jesper Juhl wrote:
> There's definately a positive size impact for the generated object code
> and we save having to do the call to memset() and the cost of a vzalloc()
> call looks more or less the same as a call to vmalloc() to me.
> > This patc
The Buildbot has detected a new failure of default_i386_debian_5_0 on qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/default_i386_debian_5_0/builds/628
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build: b1_qemu_kvm_2
Build
The Buildbot has detected a new failure of default_i386_out_of_tree on qemu-kvm.
Full details are available at:
http://buildbot.b1-systems.de/qemu-kvm/builders/default_i386_out_of_tree/builds/565
Buildbot URL: http://buildbot.b1-systems.de/qemu-kvm/
Buildslave for this Build: b1_qemu_kvm_2
Bui
On 11/01/2010 08:55 PM, Gleb Natapov wrote:
> diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
> index 2cfdf2d..f7aed95 100644
> --- a/arch/x86/kvm/x86.c
> +++ b/arch/x86/kvm/x86.c
> @@ -5295,8 +5295,9 @@ static int __vcpu_run(struct kvm_vcpu *vcpu)
> {
>
On Tue, 2 Nov 2010, Takuya Yoshikawa wrote:
> Hi Jesper, (dropped some addresses from Cc)
>
> > > Jesper Juhl wrote:
> > There's definately a positive size impact for the generated object code
> > and we save having to do the call to memset() and the cost of a vzalloc()
> > call looks more or l
- Virtual channel position gets truncated as a u8
- Print the ecap that's unknown, not the last cap we saw
- Print actual config offset, which provides enough info to make
some sense of the error.
Signed-off-by: Alex Williamson
---
drivers/vfio/vfio_pci_config.c |8
1 files ch
Michael Goldish writes:
> On 09/25/2010 11:36 AM, Jason Wang wrote:
> > This test just do the file transfer from host to guest during migartion in
> > order
> > to check whether the nic/block state could be saved and loaded correctly.
> >
> > Signed-off-by: Jason Wang
> > ---
> > .../kv
Michael Goldish writes:
> On 09/25/2010 11:36 AM, Jason Wang wrote:
> > We could give a further test of migration by launch test during migartion.
> > So
> > the following series implements:
> >
> > - A simple class to run a specified test in the background which could be
> > used
> > to
On Monday 01 November 2010 19:41:21 Jan Kiszka wrote:
> Hi Sheng,
>
> I'm not claiming to understand the details, but this looks like use
> (dereference of pte via dma_pte_addr) after release (free_pgtable_page
> of dmar_domain->pgd aka pte) to me:
>
> static int intel_iommu_attach_device(struct
On Tue, Nov 02, 2010 at 10:30:10AM +0800, Xiao Guangrong wrote:
> On 11/01/2010 08:55 PM, Gleb Natapov wrote:
>
> > diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
> > index 2cfdf2d..f7aed95 100644
> > --- a/arch/x86/kvm/x86.c
> > +++ b/arch/x86/kvm/x86.c
> > @@ -5295,8 +5295,9 @@ static int
94 matches
Mail list logo