On Tue, Jun 12, 2012 at 11:44:07AM -0700, Chegu Vinod wrote:
> On 6/12/2012 8:39 AM, Gleb Natapov wrote:
> >On Tue, Jun 12, 2012 at 08:33:59AM -0700, Chegu Vinod wrote:
> >>I rebuilt the 3.4.1 kernel in the guest from scratch and retried my
> >>experiments and measured
> >>the boot times...
> >>
>
On 6/12/12, Stefan Hajnoczi wrote:
Further tests done on the following set only
>> qemu-kvm-0.12.1.2-2.209.el6_2.4.x86_64
>> on SLES 6, 2.6.32-220.7.1.el.x86_64 (Intel 82801JI ICH10)
>> 1. VMM add physical host usb device -> select storage to guest
>> 2. VMM remove hardware
>> 3. Physically rem
At 06/12/2012 09:29 PM, Paolo Bonzini Wrote:
> Il 21/05/2012 08:50, Wen Congyang ha scritto:
>> +DEF("onpanic", HAS_ARG, QEMU_OPTION_onpanic, \
>> +"-onpanic report|pause|quit\n" \
>> +"action when the guest is panicked [default=report]",
>> +QEMU_ARCH_ALL)
>> +STEXI
>>
This patchset implements bio-based IO path for virito-blk to improve
performance.
Fio test shows it gives, 28%, 24%, 21%, 16% IOPS boost and 32%, 17%, 21%, 16%
latency improvement for sequential read/write, random read/write respectively.
Asias He (2):
block: Add blk_bio_map_sg() helper
virti
Add a helper to map a bio to a scatterlist, modelled after
blk_rq_map_sg.
This helper is useful for any driver that wants to create
a scatterlist from its ->make_request_fn method.
Cc: Jens Axboe
Cc: Tejun Heo
Cc: Shaohua Li
Cc: linux-ker...@vger.kernel.org
Signed-off-by: Christoph Hellwig
Si
This patch introduces bio-based IO path for virtio-blk.
Compared to request-based IO path, bio-based IO path uses driver
provided ->make_request_fn() method to bypasses the IO scheduler. It
handles the bio to device directly without allocating a request in block
layer. This reduces the IO path in
Il 13/06/2012 09:02, Wen Congyang ha scritto:
>>> >> +Other possible actions are:
>>> >> +@code{pause} (emit QEVENT_GUEST_PANICKED and pause VM),
>>> >> +@code{quit} (emit QEVENT_GUEST_PANICKED and quit VM).
>> >
>> > Rather than just "quit", there should be choices for "shutdown",
>> > "poweroff"
At 06/13/2012 03:53 PM, Paolo Bonzini Wrote:
> Il 13/06/2012 09:02, Wen Congyang ha scritto:
>> +Other possible actions are:
>> +@code{pause} (emit QEVENT_GUEST_PANICKED and pause VM),
>> +@code{quit} (emit QEVENT_GUEST_PANICKED and quit VM).
Rather than just "quit", there sho
On 06/13/2012 10:12 AM, Gleb Natapov wrote:
>>
>> I tried that and didn't make any difference...i.e. the RHEL6.3 RC1
>> guest booted in about ~1 min.
>>
> Thank you. So this means that ticket spinlock is not to blame for the
> slow down compared ti RHEL kernel.
>
> Where 3.4.1 spends most of the
On Wed, Jun 13, 2012 at 8:23 AM, Emmanuel Noobadmin
wrote:
> On 6/12/12, Stefan Hajnoczi wrote:
>
> Further tests done on the following set only
>>> qemu-kvm-0.12.1.2-2.209.el6_2.4.x86_64
>>> on SLES 6, 2.6.32-220.7.1.el.x86_64 (Intel 82801JI ICH10)
>
>>> 1. VMM add physical host usb device -> s
On Tue, Jun 12, 2012 at 07:27:48PM -0300, Marcelo Tosatti wrote:
> On Sun, Jun 03, 2012 at 10:28:29AM +0300, Michael S. Tsirkin wrote:
> > Commit eb0dc6d0368072236dcd086d7fdc17fd3c4574d4 introduced apic
> > attention bitmask but kvm still syncs lapic unconditionally.
> > As that commit suggested an
On Wed, Jun 13, 2012 at 11:19:24AM +0300, Michael S. Tsirkin wrote:
> On Tue, Jun 12, 2012 at 07:27:48PM -0300, Marcelo Tosatti wrote:
> > On Sun, Jun 03, 2012 at 10:28:29AM +0300, Michael S. Tsirkin wrote:
> > > Commit eb0dc6d0368072236dcd086d7fdc17fd3c4574d4 introduced apic
> > > attention bitmas
On Tue, Jun 12, 2012 at 08:07:03PM -0300, Marcelo Tosatti wrote:
> On Mon, Jun 11, 2012 at 02:19:17PM +0300, Michael S. Tsirkin wrote:
> > We can deliver certain interrupts, notably MSIX,
> > from atomic context.
> > Here's an untested patch to do this (compiled only).
> >
> > Changes from v2:
> >
On Tue, Jun 12, 2012 at 06:08:33PM -0300, Marcelo Tosatti wrote:
> On Sun, Jun 03, 2012 at 10:27:59AM +0300, Michael S. Tsirkin wrote:
> > We perform ISR lookups twice: during interrupt
> > injection and on EOI. Typical workloads only have
> > a single bit set there. So we can avoid ISR scans by
>
On Wed, Jun 13, 2012 at 12:02:42PM +0300, Michael S. Tsirkin wrote:
> > Instead of isr_cache what about a highest_isr field?
>
> >
> > When setting ISR:
> >
> > if (apic->highest_isr < me)
> > apic->highest_isr = me;
> >
> > To be invalidated on TPR updates properly.
> >
> > Its more meani
2012/6/13 Takuya Yoshikawa :
> From: Takuya Yoshikawa
>
> To introduce generic set_bit_le() later, we remove our own definition
> and use a proper non-atomic bitops function: __set_bit_le().
>
> Signed-off-by: Takuya Yoshikawa
> Acked-by: Grant Grundler
> ---
> drivers/net/ethernet/dec/tulip/de
> -Original Message-
> From: Marcelo Tosatti [mailto:mtosa...@redhat.com]
> Sent: Wednesday, June 13, 2012 7:25 AM
> To: Kevin Wolf
> Cc: Stefan Hajnoczi; Ren, Yongjie; Avi Kivity; kvm@vger.kernel.org; Liu,
> RongrongX; Anthony Liguori
> Subject: Re: Biweekly KVM Test report, kernel 51bfd29
Am 13.06.2012 12:28, schrieb Ren, Yongjie:
>> -Original Message-
>> From: Marcelo Tosatti [mailto:mtosa...@redhat.com]
>> Sent: Wednesday, June 13, 2012 7:25 AM
>> To: Kevin Wolf
>> Cc: Stefan Hajnoczi; Ren, Yongjie; Avi Kivity; kvm@vger.kernel.org; Liu,
>> RongrongX; Anthony Liguori
>> Sub
All,
I've been looking at http://www.kb.cert.org/vuls/id/649219
Xen appears to be vulnerable as do a number of other products. KVM isn't
listed. Some discussion on IRC indicates that KVM isn't likely to be vulnerable.
Can anyone confirm please?
-Rob
--
To unsubscribe from this list: send the l
On Wed, 13 Jun 2012 18:43:40 +0900
Akinobu Mita wrote:
> Should this hash_table be converted from u16 hash_table[32] to
> DECLARE_BITMAP(hash_table, 16 * 32) to ensure that it is aligned
> on long-word boundary?
I think hash_table is already long-word aligned because it is placed
right after a p
On 06/13/2012 03:26 PM, Clark, Robert Graham wrote:
> All,
>
> I've been looking at http://www.kb.cert.org/vuls/id/649219
>
> Xen appears to be vulnerable as do a number of other products. KVM isn't
> listed. Some discussion on IRC indicates that KVM isn't likely to be
> vulnerable.
>
> Can an
On Tue, Jun 12, 2012 at 11:07 PM, Geert Uytterhoeven
wrote:
> On Wed, May 30, 2012 at 10:52 AM, Geert Uytterhoeven
> wrote:
>> On Mon, May 28, 2012 at 5:04 PM, Geert Uytterhoeven
>> wrote:
>>> On Mon, May 28, 2012 at 4:37 PM, Avi Kivity wrote:
On 05/25/2012 11:59 PM, Geert Uytterhoeven wro
On Wed, Jun 13, 2012 at 2:46 PM, Geert Uytterhoeven
wrote:
> "make headers_check" is also broken on m32r since Avi's fix, as m32r
> doesn't even
> have :
BTW, you don't need to install any cross-compilers for headers_check, just do
make ARCH=xxx headers_check
if you want to give it a try...
Gr
Hi,
we seem to have solved this, or at least realised that the issue is
specific to an OS build and doesn't affect other FreeBSD servers.
Basically we had 4 servers all cloned from the same virtual server, all
of these are affected by the packet loss issue I described. Additionally
our netw
On Mon, Jun 11, 2012 at 02:19:22PM +0300, Michael S. Tsirkin wrote:
> We do not want a potential broadcast to all VCPUs to run in
> a host IRQ handler. Implement an API that sends an MSI
> interrupt but only if it's safe from interrupt context,
> that is if it is a unicast.
>
We will still iterate
2012/6/13 Takuya Yoshikawa :
> On Wed, 13 Jun 2012 18:43:40 +0900
> Akinobu Mita wrote:
>
>> Should this hash_table be converted from u16 hash_table[32] to
>> DECLARE_BITMAP(hash_table, 16 * 32) to ensure that it is aligned
>> on long-word boundary?
>
> I think hash_table is already long-word alig
On Wed, 13 Jun 2012 22:31:13 +0900
Akinobu Mita wrote:
> >> Should this hash_table be converted from u16 hash_table[32] to
> >> DECLARE_BITMAP(hash_table, 16 * 32) to ensure that it is aligned
> >> on long-word boundary?
> >
> > I think hash_table is already long-word aligned because it is placed
On 06/13/2012 02:07 AM, Marcelo Tosatti wrote:
> On Mon, Jun 11, 2012 at 02:19:17PM +0300, Michael S. Tsirkin wrote:
>> We can deliver certain interrupts, notably MSIX,
>> from atomic context.
>> Here's an untested patch to do this (compiled only).
>>
>> Changes from v2:
>> Don't inject broadcast
https://bugzilla.kernel.org/show_bug.cgi?id=13855
Alan changed:
What|Removed |Added
Status|NEW |RESOLVED
CC|
https://bugzilla.kernel.org/show_bug.cgi?id=13855
Alan changed:
What|Removed |Added
Status|RESOLVED|CLOSED
--
Configure bugmail: https://bugzilla
Some testing unconvered a few more missing instructions; here they are.
Avi Kivity (5):
KVM: x86 emulator: emulate BSWAP
KVM: x86 emulator: emulate LLDT
KVM: x86 emulator: make read_segment_descriptor() return the address
KVM: x86 emulator: make loading TR set the busy bit
KVM: x86 emula
Opcode 0F 00 /2. Used by isolinux durign the protected mode transition.
Signed-off-by: Avi Kivity
---
arch/x86/kvm/emulate.c | 11 ++-
1 file changed, 10 insertions(+), 1 deletion(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index 4eea1e4..85f7a5f 100644
--- a/arch/
Opcodes 0F C8 - 0F CF.
Used by the SeaBIOS cdrom code (though not in big real mode).
Signed-off-by: Avi Kivity
---
arch/x86/kvm/emulate.c | 20 ++--
1 file changed, 18 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index c804db2..4e
Guest software doesn't actually depend on it, but vmx will refuse us
entry if we don't. Set the bit in both the cached segment and memory,
just to be nice.
Signed-off-by: Avi Kivity
---
arch/x86/kvm/emulate.c |8 +++-
1 file changed, 7 insertions(+), 1 deletion(-)
diff --git a/arch/x86
Some operations want to modify the descriptor later on, so save the
address for future use.
Signed-off-by: Avi Kivity
---
arch/x86/kvm/emulate.c | 13 -
1 file changed, 8 insertions(+), 5 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index 85f7a5f..d304
Opcode 0F 00 /3. Encountered during Windows XP secondary processor bringup.
Signed-off-by: Avi Kivity
---
arch/x86/kvm/emulate.c | 11 ++-
1 file changed, 10 insertions(+), 1 deletion(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index dff416f..218e731 100644
--- a/
This series reorganizes the locking in virtio-scsi, introducing separate
scatterlists for each target and "pipelining" the locks so that one
command can be queued while the other is prepared. This improves
performance when there are multiple in-flight operations.
For example, a simple "if=/dev/sd
Separate virtqueue_kick_prepare from virtqueue_notify, so that the
expensive vmexit is done without holding the lock.
Signed-off-by: Paolo Bonzini
---
drivers/scsi/virtio_scsi.c |4 +++-
1 files changed, 3 insertions(+), 1 deletions(-)
diff --git a/drivers/scsi/virtio_scsi.c b/drivers/scsi/
We do not need the sglist after calling virtqueue_add_buf. Hence we
can "pipeline" the locked operations and start preparing the sglist
for the next request while we kick the virtqueue.
Together with the previous two patches, this improves performance as
follows. For a simple "if=/dev/sda of=/de
To improve performance for I/O to different targets, add a separate
scatterlist for each of them.
Signed-off-by: Paolo Bonzini
---
drivers/scsi/virtio_scsi.c | 141 +---
1 files changed, 94 insertions(+), 47 deletions(-)
diff --git a/drivers/scsi/virtio_
Keep a separate lock for each virtqueue. While not particularly
important now, it prepares the code for when we will add support
for multiple request queues. It is also more tidy as soon as
we introduce a separate lock for the sglist.
Signed-off-by: Paolo Bonzini
---
drivers/scsi/virtio_scsi.c
Il 13/06/2012 14:26, Clark, Robert Graham ha scritto:
> All,
>
> I've been looking at http://www.kb.cert.org/vuls/id/649219
>
> Xen appears to be vulnerable as do a number of other products. KVM
> isn't listed. Some discussion on IRC indicates that KVM isn't likely to
> be vulnerable.
>
> Can an
https://bugzilla.kernel.org/show_bug.cgi?id=36222
Alan changed:
What|Removed |Added
Status|NEW |RESOLVED
CC|
https://bugzilla.kernel.org/show_bug.cgi?id=36222
Alan changed:
What|Removed |Added
Status|RESOLVED|CLOSED
--
Configure bugmail: https://bugzilla
On Wed, 2012-06-13 at 23:00 +0900, Takuya Yoshikawa wrote:
> On Wed, 13 Jun 2012 22:31:13 +0900
> Akinobu Mita wrote:
>
> > >> Should this hash_table be converted from u16 hash_table[32] to
> > >> DECLARE_BITMAP(hash_table, 16 * 32) to ensure that it is aligned
> > >> on long-word boundary?
> > >
On Wed, Jun 13, 2012 at 7:00 AM, Takuya Yoshikawa
wrote:
> On Wed, 13 Jun 2012 22:31:13 +0900
> Akinobu Mita wrote:
>
>> >> Should this hash_table be converted from u16 hash_table[32] to
>> >> DECLARE_BITMAP(hash_table, 16 * 32) to ensure that it is aligned
>> >> on long-word boundary?
>> >
>> >
On Wed, Jun 13, 2012 at 04:01:24PM +0300, Gleb Natapov wrote:
> On Mon, Jun 11, 2012 at 02:19:22PM +0300, Michael S. Tsirkin wrote:
> > We do not want a potential broadcast to all VCPUs to run in
> > a host IRQ handler. Implement an API that sends an MSI
> > interrupt but only if it's safe from int
On Wed, Jun 13, 2012 at 06:59:50PM +0300, Michael S. Tsirkin wrote:
> On Wed, Jun 13, 2012 at 04:01:24PM +0300, Gleb Natapov wrote:
> > On Mon, Jun 11, 2012 at 02:19:22PM +0300, Michael S. Tsirkin wrote:
> > > We do not want a potential broadcast to all VCPUs to run in
> > > a host IRQ handler. Imp
On Wed, Jun 13, 2012 at 07:01:01PM +0300, Gleb Natapov wrote:
> On Wed, Jun 13, 2012 at 06:59:50PM +0300, Michael S. Tsirkin wrote:
> > On Wed, Jun 13, 2012 at 04:01:24PM +0300, Gleb Natapov wrote:
> > > On Mon, Jun 11, 2012 at 02:19:22PM +0300, Michael S. Tsirkin wrote:
> > > > We do not want a po
https://bugzilla.kernel.org/show_bug.cgi?id=14224
Alan changed:
What|Removed |Added
Status|NEW |RESOLVED
CC|
https://bugzilla.kernel.org/show_bug.cgi?id=14224
Alan changed:
What|Removed |Added
Status|RESOLVED|CLOSED
--
Configure bugmail: https://bugzilla
https://bugzilla.kernel.org/show_bug.cgi?id=14250
Alan changed:
What|Removed |Added
CC||a...@lxorguk.ukuu.org.uk
Component|kvm
Dear KVM list,
I was wondering where I might be able to access the inputs to KVM
within the code. For example, we can change the amount of memory with
the -m flag, and we can specify a different image when we call KVM,
sudo /usr/local/kvm/bin/qemu-system-x86_64 ubuntu.img -m 1024 (just 2
inputs,
https://bugzilla.kernel.org/show_bug.cgi?id=14435
Alan changed:
What|Removed |Added
Status|NEW |RESOLVED
CC|
https://bugzilla.kernel.org/show_bug.cgi?id=14435
Alan changed:
What|Removed |Added
Status|RESOLVED|CLOSED
--
Configure bugmail: https://bugzilla
https://bugzilla.kernel.org/show_bug.cgi?id=14401
Alan changed:
What|Removed |Added
Status|NEW |RESOLVED
CC|
https://bugzilla.kernel.org/show_bug.cgi?id=14401
Alan changed:
What|Removed |Added
Status|RESOLVED|CLOSED
--
Configure bugmail: https://bugzilla
On Wed, Jun 13, 2012 at 12:02:43PM +0300, Michael S. Tsirkin wrote:
> On Tue, Jun 12, 2012 at 06:08:33PM -0300, Marcelo Tosatti wrote:
> > On Sun, Jun 03, 2012 at 10:27:59AM +0300, Michael S. Tsirkin wrote:
> > > We perform ISR lookups twice: during interrupt
> > > injection and on EOI. Typical wor
On Wed, Jun 13, 2012 at 11:35:07AM +0300, Michael S. Tsirkin wrote:
> On Wed, Jun 13, 2012 at 11:19:24AM +0300, Michael S. Tsirkin wrote:
> > On Tue, Jun 12, 2012 at 07:27:48PM -0300, Marcelo Tosatti wrote:
> > > On Sun, Jun 03, 2012 at 10:28:29AM +0300, Michael S. Tsirkin wrote:
> > > > Commit eb0
On Wed, Jun 13, 2012 at 05:53:36PM -0300, Marcelo Tosatti wrote:
> On Wed, Jun 13, 2012 at 11:35:07AM +0300, Michael S. Tsirkin wrote:
> > On Wed, Jun 13, 2012 at 11:19:24AM +0300, Michael S. Tsirkin wrote:
> > > On Tue, Jun 12, 2012 at 07:27:48PM -0300, Marcelo Tosatti wrote:
> > > > On Sun, Jun 0
On Wed, 13 Jun 2012 08:21:18 -0700
Grant Grundler wrote:
> >> >> Should this hash_table be converted from u16 hash_table[32] to
> >> >> DECLARE_BITMAP(hash_table, 16 * 32) to ensure that it is aligned
> >> >> on long-word boundary?
> >> >
> >> > I think hash_table is already long-word aligned bec
On Tue, May 29, 2012 at 02:49:14PM +0800, Xiao Guangrong wrote:
> This bit indicates whether the spte can be writable on MMU, that means
> the corresponding gpte is writable and the corresponding gfn is not
> protected by shadow page protection
>
> Signed-off-by: Xiao Guangrong
> ---
> arch/x86/
On Thu, Jun 07, 2012 at 11:10:01AM +0400, Michael Tokarev wrote:
> Are there any issues with 1.1 release of qemu-kvm?
>
> The RCs were followed qemu RCs quite closely, but
> the final 1.1 is still not released, anything wrong
> with it?
>
> Thanks!
>
> /mjt
WinXP.32 install is still failing due
On Sun, Jun 03, 2012 at 10:28:43AM +0300, Michael S. Tsirkin wrote:
> Implementation of PV EOI using shared memory.
> This reduces the number of exits an interrupt
> causes as much as by half.
>
> The idea is simple: there's a bit, per APIC, in guest memory,
> that tells the guest that it does not
On Tue, May 29, 2012 at 02:50:32PM +0800, Xiao Guangrong wrote:
> If the the present bit of page fault error code is set, it indicates
> the shadow page is populated on all levels, it means what we do is
> only modify the access bit which can be done out of mmu-lock
>
> Currently, in order to simp
On Thu, Jun 07, 2012 at 06:26:07PM +0800, Xudong Hao wrote:
> EPT Dirty bit use bit 9 as Intel SDM definition, to avoid conflict, change
> PT_FIRST_AVAIL_BITS_SHIFT to 10.
>
> Signed-off-by: Xudong Hao
> Signed-off-by: Xiantao Zhang
Applied, thanks.
--
To unsubscribe from this list: send the l
On Thu, Jun 14, 2012 at 12:04:23AM +0300, Michael S. Tsirkin wrote:
> On Wed, Jun 13, 2012 at 05:53:36PM -0300, Marcelo Tosatti wrote:
> > On Wed, Jun 13, 2012 at 11:35:07AM +0300, Michael S. Tsirkin wrote:
> > > On Wed, Jun 13, 2012 at 11:19:24AM +0300, Michael S. Tsirkin wrote:
> > > > On Tue, Ju
On Mon, Jun 11, 2012 at 04:06:56PM +0200, Cornelia Huck wrote:
> Avi, Marcelo,
>
> here are some s390 patches for the next release. A bugfix, a tracing
> related update (real tracing support for s390 will follow once we
> have sorted out the architectural vs. internal tracepoint split),
> and a pa
Linus,
Please pull from
git://git.kernel.org/pub/scm/virt/kvm/kvm.git master
To receive a spurious warning fix on CPU offline path.
Marcelo Tosatti (1):
x86: kvmclock: remove check_and_clear_guest_paused warning
arch/x86/kernel/kvmclock.c |5 -
1 file changed, 5 deletions(-)
On Wed, 13 Jun 2012 18:39:05 -0300
Marcelo Tosatti wrote:
> > /* Return true if the spte is dropped. */
> > -static bool spte_write_protect(struct kvm *kvm, u64 *sptep, bool *flush)
> > +static bool
> > +spte_write_protect(struct kvm *kvm, u64 *sptep, bool *flush, bool
> > pt_protect)
> > {
>
On Wed, 13 Jun 2012 19:40:02 -0300
Marcelo Tosatti wrote:
> mmu_spte_update is handling several different cases. Please rewrite
> it, add a comment on top of it (or spread comments on top of each
> significant code line) with all cases it is handling (also recheck it
> regarding new EPT accessed/
Terribly sorry for the late reply. I'm out of work for some unexpected issues
the last few weeks.
> >> > So i think that checking whether EPT _and_ VPID are supported
> >> > should be a precondition to enable PCID support for guests.
> >> >
> >>
> >> Should this check be carried out on L0 too? If
This patch handles PCID/INVPCID for guests.
Process-context identifiers (PCIDs) are a facility by which a logical processor
may cache information for multiple linear-address spaces so that the processor
may retain cached information when software switches to a different linear
address space. Refer
On Wed, Jun 13, 2012 at 03:41:46PM +0800, Asias He wrote:
> Add a helper to map a bio to a scatterlist, modelled after
> blk_rq_map_sg.
>
> This helper is useful for any driver that wants to create
> a scatterlist from its ->make_request_fn method.
This may not be possible but I really wanna avoi
On 06/14/2012 05:39 AM, Marcelo Tosatti wrote:
>> +if (pt_protect)
>> +spte &= ~SPTE_MMU_WRITEABLE;
>> spte = spte & ~PT_WRITABLE_MASK;
>> -mmu_spte_update(sptep, spte);
>> +
>> +*flush = mmu_spte_update(sptep, spte);
>
> This clears previous flush value when looping
On 06/14/2012 09:13 AM, Takuya Yoshikawa wrote:
> On Wed, 13 Jun 2012 18:39:05 -0300
> Marcelo Tosatti wrote:
>
>>> /* Return true if the spte is dropped. */
>>> -static bool spte_write_protect(struct kvm *kvm, u64 *sptep, bool *flush)
>>> +static bool
>>> +spte_write_protect(struct kvm *kvm, u
On 06/14/2012 10:31 AM, Tejun Heo wrote:
On Wed, Jun 13, 2012 at 03:41:46PM +0800, Asias He wrote:
Add a helper to map a bio to a scatterlist, modelled after
blk_rq_map_sg.
This helper is useful for any driver that wants to create
a scatterlist from its ->make_request_fn method.
This may not
On 06/14/2012 06:40 AM, Marcelo Tosatti wrote:
> On Tue, May 29, 2012 at 02:50:32PM +0800, Xiao Guangrong wrote:
>> If the the present bit of page fault error code is set, it indicates
>> the shadow page is populated on all levels, it means what we do is
>> only modify the access bit which can be
Use a more current logging style.
Convert printks to pr_.
Add pr_fmt.
All logging messages are now prefixed with
"kvm: ", "kvm_intel: " or "kvm_amd: "
Coalesce formats, align arguments.
Add a few missing newlines.
Signed-off-by: Joe Perches
---
arch/x86/kvm/cpuid.c |4 +-
arch/x86/k
On Wed, Jun 13, 2012 at 02:46:32PM +0200, Geert Uytterhoeven wrote:
> There's a similar rule for kvm_para.h:
>
> ifneq ($(wildcard $(srctree)/arch/$(SRCARCH)/include/asm/kvm_para.h \
> $(srctree)/include/asm-$(SRCARCH)/kvm_para.h),)
> header-y += kvm_para.h
> endif
>
> It's thi
80 matches
Mail list logo