https://bugzilla.kernel.org/show_bug.cgi?id=42779
--- Comment #10 from Gleb 2012-02-16 08:04:22 ---
(In reply to comment #8)
> Not sure what you mean by installing trace-cmd before capturing the trace--I
> did do that, otherwise I wouldn't have had a trace-cmd to run. The package
I meant tha
https://bugzilla.kernel.org/show_bug.cgi?id=42779
Jan Kiszka changed:
What|Removed |Added
CC||jan.kis...@web.de
--- Comment #11 from J
https://bugzilla.kernel.org/show_bug.cgi?id=42779
--- Comment #12 from Gleb 2012-02-16 08:40:37 ---
Can you try disabling CONFIG_FB in your guest kernel?
--
Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are w
hello,
Le Tue, Feb 14, 2012 at 03:40:30PM +0200, Gleb Natapov ecrivait :
>
> Try to add -no-hpet to qemu command line and see if it helps.
I add this line in my xml definition for libvirt :
in the clock block. And I see
the -no-hpet in the command line :
/usr/b
On Wed, Feb 15, 2012 at 03:59:33PM -0600, Anthony Liguori wrote:
> On 02/15/2012 07:39 AM, Avi Kivity wrote:
> >On 02/07/2012 08:12 PM, Rusty Russell wrote:
> >>>I would really love to have this, but the problem is that we'd need a
> >>>general purpose bytecode VM with binding to some kernel APIs.
On Thu, Feb 16, 2012 at 09:55:53AM +0100, David Cure wrote:
> hello,
>
> Le Tue, Feb 14, 2012 at 03:40:30PM +0200, Gleb Natapov ecrivait :
> >
> > Try to add -no-hpet to qemu command line and see if it helps.
>
> I add this line in my xml definition for libvirt :
>
>
Le Tue, Feb 14, 2012 at 03:32:16PM +0200, Avi Kivity ecrivait :
>
> It's reading the HPET like crazy. There are also tons of interrupts.
> Please use the windows performance tools to see which devices trigger
> these interrupts.
>
> The HPET issue will be fixed by the hyper-V enlightenments, bu
Call to kvm_cpu_synchronize_state() is missing.
kvm_arch_stop_on_emulation_error may
look at outdated registers here.
Signed-off-by: Gleb Natapov
diff --git a/target-i386/kvm.c b/target-i386/kvm.c
index 7079e87..51d0ae7 100644
--- a/target-i386/kvm.c
+++ b/target-i386/kvm.c
@@ -2020,6 +2020,7 @@
If the guest hypervisor node contains "has-idle" property.
Signed-off-by: Liu Yu
---
v4:
1. discard the CONFIG_E500 to make code for all powerpc platform
2. code cleanup
arch/powerpc/kernel/epapr.S | 29 +
arch/powerpc/kernel/epapr_para.c | 13 -
from the kvm guest paravirt init code.
Signed-off-by: Liu Yu
---
v4:
1. code cleanup
2. move kvm_hypercall_start() to epapr_hypercall_start()
arch/powerpc/Kconfig|4 ++
arch/powerpc/include/asm/epapr_hcalls.h |2 +
arch/powerpc/kernel/Makefile|1 +
ar
And add a new flag definition in kvm_ppc_pvinfo to indicate
whether host support EV_IDLE hcall.
Signed-off-by: Liu Yu
---
v4:
no change
arch/powerpc/include/asm/kvm_para.h | 14 --
arch/powerpc/kvm/powerpc.c |8
include/linux/kvm.h |2 ++
On 16.02.2012, at 10:26, Liu Yu wrote:
> from the kvm guest paravirt init code.
>
> Signed-off-by: Liu Yu
> ---
> v4:
> 1. code cleanup
> 2. move kvm_hypercall_start() to epapr_hypercall_start()
>
> arch/powerpc/Kconfig|4 ++
> arch/powerpc/include/asm/epapr_hcalls.h |
On 16.02.2012, at 10:26, Liu Yu wrote:
> And add a new flag definition in kvm_ppc_pvinfo to indicate
> whether host support EV_IDLE hcall.
>
> Signed-off-by: Liu Yu
> ---
> v4:
> no change
>
> arch/powerpc/include/asm/kvm_para.h | 14 --
> arch/powerpc/kvm/powerpc.c |
On 16.02.2012, at 10:26, Liu Yu wrote:
> If the guest hypervisor node contains "has-idle" property.
>
> Signed-off-by: Liu Yu
> ---
> v4:
> 1. discard the CONFIG_E500 to make code for all powerpc platform
> 2. code cleanup
>
> arch/powerpc/kernel/epapr.S | 29 +
On 02/16/2012 12:21 AM, Arnd Bergmann wrote:
> ioctl is good for hardware devices and stuff that you want to enumerate
> and/or control permissions on. For something like KVM that is really a
> core kernel service, a syscall makes much more sense.
>
> I would certainly never mix the two concepts: I
https://bugzilla.kernel.org/show_bug.cgi?id=42779
Avi Kivity changed:
What|Removed |Added
CC||a...@redhat.com
--- Comment #13 from Avi
https://bugzilla.kernel.org/show_bug.cgi?id=42779
--- Comment #14 from Jan Kiszka 2012-02-16 11:51:05 ---
Because the selected CPU type doesn't support SSE? Didn't check the config yet,
but I bet that's the reason.
--
Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email
-
Hi,
I got this error while doing startx with 3.2.6 kernel and I can't start xorg:
[ 54.683907] AMD-Vi: Event logged [IO_PAGE_FAULT device=01:00.0
domain=0x0018 address=0x000220583200 flags=0x0010]
I saw the same error in this mailing list
(http://www.spinics.net/lists/kvm/msg48472.html) so
On 02/16/2012 06:50 AM, Xiao Guangrong wrote:
> I think we do not need handle all tlb-flushed request here since all of these
> request can be delayed to the point where mmu-lock is released , we can simply
> do it:
>
> void kvm_mmu_defer_remote_flush(kvm, need_flush)
> {
> if (need_flush)
>
Hello,
I am trying to backup a KVM VM by creating a snapshot of the running VM
and extracting that snapshot from the running VM using qemu-img convert.
Sources on the net suggest that I would get an image that contains
all the machine state of the snapshot. So when I run the VM it would
continue t
https://bugzilla.kernel.org/show_bug.cgi?id=42782
Summary: IO_PAGE_FAULT while starting xorg
Product: Virtualization
Version: unspecified
Kernel Version: 3.2.6
Platform: All
OS/Version: Linux
Tree: Mainline
Status: NE
https://bugzilla.kernel.org/show_bug.cgi?id=42782
--- Comment #1 from edm 2012-02-16 12:14:28 ---
Created an attachment (id=72398)
--> (https://bugzilla.kernel.org/attachment.cgi?id=72398)
dmesg output
--
Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email
--- You a
https://bugzilla.kernel.org/show_bug.cgi?id=42782
--- Comment #2 from edm 2012-02-16 12:17:11 ---
Created an attachment (id=72399)
--> (https://bugzilla.kernel.org/attachment.cgi?id=72399)
dmidecode output
--
Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email
--- Y
https://bugzilla.kernel.org/show_bug.cgi?id=42782
--- Comment #3 from edm 2012-02-16 12:17:43 ---
Created an attachment (id=72400)
--> (https://bugzilla.kernel.org/attachment.cgi?id=72400)
lspci -vv output
--
Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email
--- Y
Signed-off-by: Gleb Natapov
diff --git a/arch/x86/kvm/pmu.c b/arch/x86/kvm/pmu.c
index 7aad544..3e48c1d 100644
--- a/arch/x86/kvm/pmu.c
+++ b/arch/x86/kvm/pmu.c
@@ -413,7 +413,7 @@ int kvm_pmu_read_pmc(struct kvm_vcpu *vcpu, unsigned pmc,
u64 *data)
struct kvm_pmc *counters;
u64
On 2012-02-16 10:12, Gleb Natapov wrote:
> Call to kvm_cpu_synchronize_state() is missing.
> kvm_arch_stop_on_emulation_error may
> look at outdated registers here.
>
> Signed-off-by: Gleb Natapov
> diff --git a/target-i386/kvm.c b/target-i386/kvm.c
> index 7079e87..51d0ae7 100644
> --- a/target
The code fixed by the second patch looks suspect though:
nsdiff = data - kvm->arch.last_tsc_write;
nsdiff = (nsdiff * 1000) / vcpu->arch.virtual_tsc_khz;
before the division, nsdiff is in tsc units. Dividing it by
tsc_khz/1000 is equivalent to multiplying it by 100 and dividing it by
tsc
Breaks i386 build.
Signed-off-by: Avi Kivity
---
arch/x86/kvm/x86.c | 11 +--
1 files changed, 9 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 1312f13..1d71b13 100644
--- a/arch/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@ -978,6 +978,13 @@ stat
Breaks i386 build.
Signed-off-by: Avi Kivity
---
arch/x86/kvm/x86.c |7 +++
1 files changed, 7 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 1d71b13..c9d99e5 100644
--- a/arch/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@ -1034,7 +1034,14 @@ void k
On 02/16/2012 03:48 PM, Avi Kivity wrote:
> The code fixed by the second patch looks suspect though:
>
> nsdiff = data - kvm->arch.last_tsc_write;
> nsdiff = (nsdiff * 1000) / vcpu->arch.virtual_tsc_khz;
>
> before the division, nsdiff is in tsc units. Dividing it by
> tsc_khz/1000 is equivale
arch/powerpc/kvm/book3s_hv.c: included 'linux/sched.h' twice,
remove the duplicate.
Signed-off-by: Danny Kukawka
---
arch/powerpc/kvm/book3s_hv.c |1 -
1 files changed, 0 insertions(+), 1 deletions(-)
diff --git a/arch/powerpc/kvm/book3s_hv.c b/arch/powerpc/kvm/book3s_hv.c
index 336983d..a7
On 02/16/2012 11:12 AM, Gleb Natapov wrote:
> Call to kvm_cpu_synchronize_state() is missing.
> kvm_arch_stop_on_emulation_error may
> look at outdated registers here.
>
>
Thanks, applied to uq/master.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this l
https://bugzilla.kernel.org/show_bug.cgi?id=42782
Joerg Roedel changed:
What|Removed |Added
CC||j...@8bytes.org
--- Comment #4 from Jo
On 02/15/2012 07:18 PM, Igor Mammedov wrote:
> > On 02/15/2012 01:23 PM, Igor Mammedov wrote:
> > >>> static u64 pvclock_get_nsec_offset(struct pvclock_shadow_time
> > >>> *shadow)
> > >>> {
> > >>> -u64 delta = native_read_tsc() - shadow->tsc_timestamp;
> > >>> +u64 delta;
> > >>> +
On 02/08/2012 05:07 PM, Eric B Munson wrote:
> Now that we have a flag that will tell the guest it was suspended, create an
> interface for that communication using a KVM ioctl.
>
> +
> +Capability: KVM_CAP_KVMCLOCK_CTRL
> +Architectures: Any that implement pvclocks (currently x86 only)
> +Type: vc
On 02/16/2012 02:57 AM, Gleb Natapov wrote:
On Wed, Feb 15, 2012 at 03:59:33PM -0600, Anthony Liguori wrote:
On 02/15/2012 07:39 AM, Avi Kivity wrote:
On 02/07/2012 08:12 PM, Rusty Russell wrote:
I would really love to have this, but the problem is that we'd need a
general purpose bytecode VM
On 2012-02-16 16:21, Avi Kivity wrote:
> On 02/14/2012 05:13 PM, Jan Kiszka wrote:
>> Note that KVM without in-kernel irqchip will report the address after
>> the instruction that triggered a write access. In contrast, read
>> accesses will return the precise information.
>>
>
> Well this is wierd
On 02/14/2012 05:13 PM, Jan Kiszka wrote:
> This enables acceleration for MMIO-based TPR registers accesses of
> 32-bit Windows guest systems. It is mostly useful with KVM enabled,
> either on older Intel CPUs (without flexpriority feature, can also be
> manually disabled for testing) or any curren
On 02/14/2012 05:13 PM, Jan Kiszka wrote:
> Note that KVM without in-kernel irqchip will report the address after
> the instruction that triggered a write access. In contrast, read
> accesses will return the precise information.
>
Well this is wierd. We could retro-doc one or the other behaviour,
On 02/16/2012 03:55 PM, Danny Kukawka wrote:
> arch/powerpc/kvm/book3s_hv.c: included 'linux/sched.h' twice,
> remove the duplicate.
>
Thanks, applied.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of
On 02/16/2012 02:44 PM, Gleb Natapov wrote:
> Signed-off-by: Gleb Natapov
>
Thanks, applied and queued for 3.3
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
On 02/15/2012 09:36 PM, Andy Lutomirski wrote:
> Hi, kvm people-
>
> Here's a strange failure. It could be a bug in something
> RHEL6-specific, but it could be a generic issue that only triggers
> with a paravirt guest with old userspace on a non-ept host. There was
> a bug like this on Xen, and
Em Wed, Feb 15, 2012 at 10:05:08PM -0700, David Ahern escreveu:
> On 2/15/12 9:59 PM, Xiao Guangrong wrote:
> >
> >
> >Okay, i will post the next version after collecting your new comments!
> >
> >Thanks for your time, David! :)
> >
>
> I had more comments, but got sidetracked and forgot to come b
On Thu, Feb 16, 2012 at 8:17 AM, Avi Kivity wrote:
> On 02/15/2012 09:36 PM, Andy Lutomirski wrote:
>> Hi, kvm people-
>>
>> Here's a strange failure. It could be a bug in something
>> RHEL6-specific, but it could be a generic issue that only triggers
>> with a paravirt guest with old userspace o
https://bugzilla.kernel.org/show_bug.cgi?id=42779
--- Comment #15 from madenginee...@gmail.com 2012-02-16 16:48:56 ---
I set the kernel up for an AMD Geode LX800 (CONFIG_MGEODE_LX), which does
supposedly support SSE. No idea why it would have built using MMX if that is
now deprecated in favor
https://bugzilla.kernel.org/show_bug.cgi?id=42779
--- Comment #16 from madenginee...@gmail.com 2012-02-16 16:51:10 ---
Background: I'm using KVM as a test platform for code destined for a panel PC
using a Geode LX800.
--
Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email
On 02/16/2012 04:24 AM, Alexander Graf wrote:
> On 16.02.2012, at 10:26, Liu Yu wrote:
>> +_GLOBAL(epapr_ev_idle)
>> +epapr_ev_idle:
>> +rlwinmr3,r1,0,0,31-THREAD_SHIFT/* current thread_info */
>> +lwzr4,TI_LOCAL_FLAGS(r3)/* set napping bit */
>> +orir4,r4,_TLF_NAPP
On 02/16/2012 03:26 AM, Liu Yu wrote:
> from the kvm guest paravirt init code.
>
> Signed-off-by: Liu Yu
> ---
> v4:
> 1. code cleanup
> 2. move kvm_hypercall_start() to epapr_hypercall_start()
>
> arch/powerpc/Kconfig|4 ++
> arch/powerpc/include/asm/epapr_hcalls.h |
On 02/16/2012 06:45 PM, Andy Lutomirski wrote:
> >
> >> So I could have messed up, or there could be a subtle
> >> bug somewhere. Any ideas?
> >
> > What's the code trying to do? Execute an instruction from an
> > non-executable page, trap the #PF, and emulate? And what are the
> > symptoms? wro
On 02/16/2012 03:26 AM, Liu Yu wrote:
> If the guest hypervisor node contains "has-idle" property.
>
> Signed-off-by: Liu Yu
> ---
> v4:
> 1. discard the CONFIG_E500 to make code for all powerpc platform
> 2. code cleanup
Is the TLF_NAPPING stuff supported on all powerpc platforms?
-Scott
--
T
On 16.02.2012, at 17:58, Scott Wood wrote:
> On 02/16/2012 04:24 AM, Alexander Graf wrote:
>> On 16.02.2012, at 10:26, Liu Yu wrote:
>>> +_GLOBAL(epapr_ev_idle)
>>> +epapr_ev_idle:
>>> +rlwinmr3,r1,0,0,31-THREAD_SHIFT/* current thread_info */
>>> +lwzr4,TI_LOCAL_FLAGS(r3)
https://bugzilla.kernel.org/show_bug.cgi?id=42779
--- Comment #17 from Jan Kiszka 2012-02-16 17:24:34 ---
(In reply to comment #15)
> I set the kernel up for an AMD Geode LX800 (CONFIG_MGEODE_LX), which does
> supposedly support SSE. No idea why it would have built using MMX if that is
> now
On 02/16/2012 11:18 AM, Alexander Graf wrote:
>
> On 16.02.2012, at 17:58, Scott Wood wrote:
>
>> On 02/16/2012 04:24 AM, Alexander Graf wrote:
>>> On 16.02.2012, at 10:26, Liu Yu wrote:
+_GLOBAL(epapr_ev_idle)
+epapr_ev_idle:
+rlwinmr3,r1,0,0,31-THREAD_SHIFT/* current
On 16.02.2012, at 18:28, Scott Wood wrote:
> On 02/16/2012 11:18 AM, Alexander Graf wrote:
>>
>> On 16.02.2012, at 17:58, Scott Wood wrote:
>>
>>> On 02/16/2012 04:24 AM, Alexander Graf wrote:
On 16.02.2012, at 10:26, Liu Yu wrote:
> +_GLOBAL(epapr_ev_idle)
> +epapr_ev_idle:
>
https://bugzilla.kernel.org/show_bug.cgi?id=42779
--- Comment #18 from Avi Kivity 2012-02-16 17:30:47 ---
As a workaround you can use -cpu blah,-3dnow. But we'll have to implement mmx
movq.
--
Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email
--- You are receiving
On Thu, Feb 16, 2012 at 9:14 AM, Avi Kivity wrote:
> On 02/16/2012 06:45 PM, Andy Lutomirski wrote:
>> >
>> >> So I could have messed up, or there could be a subtle
>> >> bug somewhere. Any ideas?
>> >
>> > What's the code trying to do? Execute an instruction from an
>> > non-executable page, tr
On 02/16/2012 11:30 AM, Alexander Graf wrote:
>
> On 16.02.2012, at 18:28, Scott Wood wrote:
>
>> On 02/16/2012 11:18 AM, Alexander Graf wrote:
>>> Hrm. But we can clobber ctr, right? So how about we make the generic
>>> version do a bctr and then just do a small C wrapper that takes lr, moves
On 16.02.2012, at 18:36, Scott Wood wrote:
> On 02/16/2012 11:30 AM, Alexander Graf wrote:
>>
>> On 16.02.2012, at 18:28, Scott Wood wrote:
>>
>>> On 02/16/2012 11:18 AM, Alexander Graf wrote:
Hrm. But we can clobber ctr, right? So how about we make the generic
version do a bctr and
I'll be on vacation again, from Sunday (the 19th) until the following
Sunday. Unfortunately, Marcelo is on vacation as well, so there won't
be anyone to tend to patches. This is doubly unfortunate since there
are still unreviewed patches on the list. I'll do my best to catch up a
little tomorrow
On 02/16/2012 07:35 PM, Andy Lutomirski wrote:
> >
> > so it seems like kvm doesn't set PF_INSTR?
>
> Yes, this is on purpose, and you're almost certainly right (and I feel
> dumb for not figuring this out immediately). The error message is:
>
> segfault at ff600400 ip ff600400 sp
Hello,
Please find my comments inline.
Regards,
Shradha Shah
On 02/16/2012 03:58 AM, Ben Hutchings wrote:
> [I'm just catching up with this after getting my own driver changes into
> shape.]
>
> On Fri, 2012-02-10 at 10:18 -0500, jamal wrote:
>> Hi John,
>>
>> I went backwards to summarize at t
On 02/15/2012 04:08 PM, Alexander Graf wrote:
> >
> > Well, the scatter/gather registers I proposed will give you just one
> > register or all of them.
>
> One register is hardly any use. We either need all ways of a respective
> address to do a full fledged lookup or all of them.
I should have
On 02/16/2012 03:04 AM, Michael Ellerman wrote:
> >
> > ioctl is good for hardware devices and stuff that you want to enumerate
> > and/or control permissions on. For something like KVM that is really a
> > core kernel service, a syscall makes much more sense.
>
> Yeah maybe. That distinction is a
On 16.02.2012, at 20:24, Avi Kivity wrote:
> On 02/15/2012 04:08 PM, Alexander Graf wrote:
>>>
>>> Well, the scatter/gather registers I proposed will give you just one
>>> register or all of them.
>>
>> One register is hardly any use. We either need all ways of a respective
>> address to do a
On 02/16/2012 04:46 PM, Anthony Liguori wrote:
>> What will it buy us? Surely not speed. Entering a guest is not much
>> (if at all) faster than exiting to userspace and any non trivial
>> operation will require exit to userspace anyway,
>
>
> You can emulate the PIT/RTC entirely within the guest u
On 02/16/2012 09:34 PM, Alexander Graf wrote:
> On 16.02.2012, at 20:24, Avi Kivity wrote:
>
> > On 02/15/2012 04:08 PM, Alexander Graf wrote:
> >>>
> >>> Well, the scatter/gather registers I proposed will give you just one
> >>> register or all of them.
> >>
> >> One register is hardly any use.
This flag will be used to check if the vm was stopped by the host when a soft
lockup was detected. The host will set the flag when it stops the guest. On
resume, the guest will check this flag if a soft lockup is detected and skip
issuing the warning.
Signed-off-by: Eric B Munson
Cc: mi...@redh
Changes from V13:
Expand on KVM_KVMCLOCK_CTRL ioctl documentation
Changes from V12:
Re-add missing kvm.c code after rebase
Rename CAP to KVM_CAP_KVMCLOCK_CTRL
Rename ioctl to KVM_KVMCLOCK_CTRL
Changes from V11:
Re-add asm-generic stub
Correct api.txt typo
add kvm_make_request() call after setting
Now that we have a flag that will tell the guest it was suspended, create an
interface for that communication using a KVM ioctl.
Signed-off-by: Eric B Munson
Cc: mi...@redhat.com
Cc: h...@zytor.com
Cc: ry...@linux.vnet.ibm.com
Cc: aligu...@us.ibm.com
Cc: mtosa...@redhat.com
Cc: kvm@vger.kernel.o
A suspended VM can cause spurious soft lockup warnings. To avoid these, the
watchdog now checks if the kernel knows it was stopped by the host and skips
the warning if so. When the watchdog is reset successfully, clear the guest
paused flag.
Signed-off-by: Eric B Munson
Cc: mi...@redhat.com
Cc:
When a host stops or suspends a VM it will set a flag to show this. The
watchdog will use these functions to determine if a softlockup is real, or the
result of a suspended VM.
Signed-off-by: Eric B Munson
asm-generic changes Acked-by: Arnd Bergmann
Cc: mi...@redhat.com
Cc: h...@zytor.com
Cc: r
On Thu, 16 Feb 2012, Eric B Munson wrote:
> Now that we have a flag that will tell the guest it was suspended, create an
> interface for that communication using a KVM ioctl.
>
> Signed-off-by: Eric B Munson
Sorry, this is actually V14.
signature.asc
Description: Digital signature
On 02/16/2012 01:38 PM, Avi Kivity wrote:
> On 02/16/2012 09:34 PM, Alexander Graf wrote:
>> On 16.02.2012, at 20:24, Avi Kivity wrote:
>>
>>> On 02/15/2012 04:08 PM, Alexander Graf wrote:
>
> Well, the scatter/gather registers I proposed will give you just one
> register or all of them
https://bugzilla.kernel.org/show_bug.cgi?id=42779
--- Comment #19 from madenginee...@gmail.com 2012-02-16 22:01:38 ---
Doesn't seem to help. I used -cpu core2duo,-3dnow (since core2duo is the name
that libvirt, my usual launcher for qemu, has been using), failed on the same
movq. Also tried -
On Thu, 2012-02-16 at 21:28 +0200, Avi Kivity wrote:
> On 02/16/2012 03:04 AM, Michael Ellerman wrote:
> > >
> > > ioctl is good for hardware devices and stuff that you want to enumerate
> > > and/or control permissions on. For something like KVM that is really a
> > > core kernel service, a sysca
On 16.02.2012, at 20:38, Avi Kivity wrote:
> On 02/16/2012 09:34 PM, Alexander Graf wrote:
>> On 16.02.2012, at 20:24, Avi Kivity wrote:
>>
>>> On 02/15/2012 04:08 PM, Alexander Graf wrote:
>
> Well, the scatter/gather registers I proposed will give you just one
> register or all of
On 16.02.2012, at 21:41, Scott Wood wrote:
> On 02/16/2012 01:38 PM, Avi Kivity wrote:
>> On 02/16/2012 09:34 PM, Alexander Graf wrote:
>>> On 16.02.2012, at 20:24, Avi Kivity wrote:
>>>
On 02/15/2012 04:08 PM, Alexander Graf wrote:
>>
>> Well, the scatter/gather registers I propos
> -Original Message-
> From: Alexander Graf [mailto:ag...@suse.de]
> Sent: Thursday, February 16, 2012 6:20 PM
> To: Liu Yu-B13201
> Cc: ; ; d...@ozlabs.org>; Wood Scott-B07421; Liu Yu-B13201
> Subject: Re: [PATCH v4 2/3] KVM: PPC: epapr: Add idle hcall support for
> host
>
>
>
> On 1
On 17.02.2012, at 03:13, Liu Yu-B13201 wrote:
>
>
>> -Original Message-
>> From: Alexander Graf [mailto:ag...@suse.de]
>> Sent: Thursday, February 16, 2012 6:20 PM
>> To: Liu Yu-B13201
>> Cc: ; ; > d...@ozlabs.org>; Wood Scott-B07421; Liu Yu-B13201
>> Subject: Re: [PATCH v4 2/3] KVM: PP
On 02/16/2012 11:52 PM, Pradeep Kumar wrote:
> Xiao,
>
> i tried your perf events patch set on RHEL 6.1 host and failed to trace
> kvm-events with below error message.
>
> [root@kvm perf]# ./perf kvm-events report
> Warning: unknown op '{'
> Warning: Error: expected type 5 but read 1
>
On 02/16/2012 07:57 PM, Avi Kivity wrote:
> Suppose at point A another thread executes defer_remote_flush(),
> commit_remote_flush(), and defer_remote_flush() again. This brings the
> balue of tlbs_dirty back to 1 again, with the tlbs dirty. The cmpxchg()
> then resets tlbs_dirty, leaving the a
I've been waiting for some response from the Ubuntu team regarding a bug on
launchpad, but it appears that it isn't being taken seriously:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/745785
We are running Ubuntu Natty 11.04 with KVM with our storage on RAID10 + drbd.
While we were runnin
The Buildbot has detected a new failure on builder next-s390 while building kvm.
Full details are available at:
http://buildbot.b1-systems.de/kvm/builders/next-s390/builds/447
Buildbot URL: http://buildbot.b1-systems.de/kvm/
Buildslave for this Build: b1_kvm_1
Build Reason: The Nightly schedule
The Buildbot has detected a new failure on builder next-ppc64 while building
kvm.
Full details are available at:
http://buildbot.b1-systems.de/kvm/builders/next-ppc64/builds/446
Buildbot URL: http://buildbot.b1-systems.de/kvm/
Buildslave for this Build: b1_kvm_1
Build Reason: The Nightly sched
The Buildbot has detected a new failure on builder next-ppc44x while building
kvm.
Full details are available at:
http://buildbot.b1-systems.de/kvm/builders/next-ppc44x/builds/445
Buildbot URL: http://buildbot.b1-systems.de/kvm/
Buildslave for this Build: b1_kvm_1
Build Reason: The Nightly sch
The Buildbot has detected a new failure on builder next-x86_64 while building
kvm.
Full details are available at:
http://buildbot.b1-systems.de/kvm/builders/next-x86_64/builds/445
Buildbot URL: http://buildbot.b1-systems.de/kvm/
Buildslave for this Build: b1_kvm_1
Build Reason: The Nightly sch
We do not need to zap all shadow pages of the guest when we create or
destroy a slot in this function.
To change this, we make kvm_mmu_zap_all()/kvm_arch_flush_shadow()
zap only those which have mappings into a given slot.
Furthermore, the condition to see if we have any mmio sptes to clear is
ch
87 matches
Mail list logo