vmx_load_host_state() does not handle msrs switching (except
MSR_KERNEL_GS_BASE) since commit 26bb0981b3f. Remove call to it
where it is no longer make sense.
Signed-off-by: Gleb Natapov g...@redhat.com
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index a6535ba..e5f73f3 100644
---
On 11/16/2011 10:45 PM, Alex Williamson wrote:
These patches are all independent. Patch 1 2 fix serious
usability bugs. Patches 3-6 are more subtle things that
Markus was able to find with Coverity.
Patch 1 fixes https://bugs.launchpad.net/qemu/+bug/875723
I also tested
On 11/14/2011 11:20 AM, Takuya Yoshikawa wrote:
This is a revised version of my previous work. I hope that
the patches are more self explanatory than before.
Thanks, applied.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line
On Thu, 2011-11-10 at 14:57 +0200, Gleb Natapov wrote:
+
+ /* disable event that reported as not presend by cpuid */
+ for_each_set_bit(bit, x86_pmu.events_mask,
+ min(x86_pmu.events_mask_len, x86_pmu.max_events))
+
On Thu, 2011-11-10 at 14:57 +0200, Gleb Natapov wrote:
This patchset exposes an emulated version 2 architectural performance
monitoring unit to KVM guests. The PMU is emulated using perf_events,
so the host kernel can multiplex host-wide, host-user, and the
guest on available resources.
On 11/17/2011 10:56 AM, Gleb Natapov wrote:
vmx_load_host_state() does not handle msrs switching (except
MSR_KERNEL_GS_BASE) since commit 26bb0981b3f. Remove call to it
where it is no longer make sense.
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To
From: Cornelia Huck cornelia.h...@de.ibm.com
SIGP sense running may cause an intercept on higher level
virtualization, so handle it by checking the CPUSTAT_RUNNING flag.
Signed-off-by: Cornelia Huck cornelia.h...@de.ibm.com
Signed-off-by: Carsten Otte co...@de.ibm.com
---
From: Christian Borntraeger borntrae...@de.ibm.com
KVM on s390 always had a sync mmu. Any mapping change in userspace
mapping was always reflected immediately in the guest mapping.
- In older code the guest mapping was just an offset
- In newer code the last level page table is shared
Hi Avi,
these patches are bugfixes for kvm on s390. Could you please apply
them?
thanks,
Carsten
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
From: Cornelia Huck cornelia.h...@de.ibm.com
CPUSTAT_RUNNING was implemented signifying that a vcpu is not stopped.
This is not, however, what the architecture says: RUNNING should be
set when the host is acting on the behalf of the guest operating
system.
CPUSTAT_RUNNING has been changed to be
From: Christian Borntraeger borntrae...@de.ibm.com
There is a potential host deadlock in the tprot intercept handling.
We must not hold the mmap semaphore while resolving the guest
address. If userspace is remapping, then the memory detection in
the guest is broken anyway so we can safely
On Thu, 2011-11-17 at 11:04 +0200, Avi Kivity wrote:
On 11/17/2011 08:56 AM, Sasha Levin wrote:
On Thu, 2011-11-17 at 08:53 +0200, Pekka Enberg wrote:
On Thu, Nov 17, 2011 at 8:07 AM, Sasha Levin levinsasha...@gmail.com
wrote:
Also, when I start the guest I sometimes get the
On 11/17/2011 12:00 PM, Carsten Otte wrote:
From: Cornelia Huck cornelia.h...@de.ibm.com
SIGP sense running may cause an intercept on higher level
virtualization, so handle it by checking the CPUSTAT_RUNNING flag.
What does higher level virtualization mean?
--
error compiling committee.c:
On 17/11/11 11:15, Avi Kivity wrote:
On 11/17/2011 12:00 PM, Carsten Otte wrote:
From: Cornelia Huck cornelia.h...@de.ibm.com
SIGP sense running may cause an intercept on higher level
virtualization, so handle it by checking the CPUSTAT_RUNNING flag.
What does higher level virtualization
If the amount of entries available passed to KVM_GET_SUPPORTED_CPUID is
too big we don't fail, we just adjust it to the amount actually needed
and fill the entries.
Cc: Avi Kivity a...@redhat.com
Cc: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
If we pass just enough entries to KVM_GET_SUPPORTED_CPUID, we would still
fail with -E2BIG due to wrong comparisons.
Cc: Avi Kivity a...@redhat.com
Cc: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
arch/x86/kvm/x86.c | 12 ++--
1 files
On 11/17/2011 12:00 PM, Carsten Otte wrote:
From: Christian Borntraeger borntrae...@de.ibm.com
There is a potential host deadlock in the tprot intercept handling.
We must not hold the mmap semaphore while resolving the guest
address. If userspace is remapping, then the memory detection in
On 11/17/2011 12:00 PM, Carsten Otte wrote:
Hi Avi,
these patches are bugfixes for kvm on s390. Could you please apply
them?
All applied, thanks. Patch 2 had rejects (you didn't have the diagnose
0x10 patch in your tree), it should be good, but please double check
kvm.git next.
Should all
On Thu, 17 Nov 2011 12:27:41 +0200
Avi Kivity a...@redhat.com wrote:
On 11/17/2011 12:00 PM, Carsten Otte wrote:
From: Christian Borntraeger borntrae...@de.ibm.com
There is a potential host deadlock in the tprot intercept handling.
We must not hold the mmap semaphore while resolving the
From: Martin Schwidefsky schwidef...@de.ibm.com
Add FAULT_FLAG_RETRY_NOWAIT to the fault flags if the host is processing
a guest fault. In case of a fault retry exit sie64a() with the gmap_fault
indication set. This makes it possible to handle asynchronous page faults
without the need for mm
Hi Avi,
these patches implement asynchronous page faults for kvm on s390.
Sorry for being slower on sending patches than you're reviewing,
I guess these will answer your question on __gmap_fault ;-).
I think we should push both of these via Martin, his patch alone
would break kvm on s390, mine
From: Carsten Otte co...@de.ibm.com
This patch adds support for pseudo page faults. The corresponding
interface is implemented according to the documentation in CP
programming services.
Diagnose 258 allows to register compare and check masks for pseudo
page faults, and the guest can cancel these
On Thu, 17 Nov 2011 12:15:52 +0100
Martin Schwidefsky schwidef...@de.ibm.com wrote:
On Thu, 17 Nov 2011 12:27:41 +0200
Avi Kivity a...@redhat.com wrote:
On 11/17/2011 12:00 PM, Carsten Otte wrote:
From: Christian Borntraeger borntrae...@de.ibm.com
There is a potential host
于 2011/11/16,星期三 2:43, Cam Macdonell 写道:
On Sun, Nov 13, 2011 at 8:56 PM,zanghongy...@huawei.com wrote:
From: Hongyong Zangzanghongy...@huawei.com
Ivshmem(nahanni) is a mechanism for sharing host memory with VMs running on the
same host. Currently, guest notifies qemu by reading or writing
The TSC is unstable on guests, hence there's no guarantee
that this test will pass, it may pass or fail. Therefore,
let's just remove it from the config.
CC: Avi Kivity a...@redhat.com
Signed-off-by: Lucas Meneghel Rodrigues l...@redhat.com
---
.../virt/autotest_control/monotonic_time.control
Support the event index feature in the virtio spec.
The results are less notifications between the guest and host, and in
result faster operation of the virt queues.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/include/kvm/virtio.h |7 +++
1 files changed, 7
This new option disables the kernel DHCP which runs when starting
a custom rootfs.
This is useful when we want to start a rootfs but are using a network
other than the usermode IP proxy (a network which doesn't provide DHCP).
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/virtio/blk.c |7 +--
1 files changed, 5 insertions(+), 2 deletions(-)
diff --git a/tools/kvm/virtio/blk.c b/tools/kvm/virtio/blk.c
index ed4e099..9495f28 100644
--- a/tools/kvm/virtio/blk.c
+++ b/tools/kvm/virtio/blk.c
@@
Support event idx both when using vhost and when using simple TAP mode.
I did simple TCP stream performance test with vhost, and it showed another 9%
increase over regular vhost mode.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/virtio/net.c | 12
1 files
On 11/17/2011 01:19 PM, Carsten Otte wrote:
From: Carsten Otte co...@de.ibm.com
This patch adds support for pseudo page faults. The corresponding
interface is implemented according to the documentation in CP
programming services.
Diagnose 258 allows to register compare and check masks for
On Thu, Nov 17, 2011 at 3:04 PM, Sasha Levin levinsasha...@gmail.com wrote:
Support the event index feature in the virtio spec.
The results are less notifications between the guest and host, and in
result faster operation of the virt queues.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
On Thu, 2011-11-17 at 15:24 +0200, Pekka Enberg wrote:
On Thu, Nov 17, 2011 at 3:04 PM, Sasha Levin levinsasha...@gmail.com wrote:
Support the event index feature in the virtio spec.
The results are less notifications between the guest and host, and in
result faster operation of the virt
On 17.11.2011 14:18, Avi Kivity wrote:
+ copy_from_guest(vcpu,pfault_token, vcpu-arch.pfault_token,
+ 8);
Missing error check?
Good catch, will fix.
+ init = kzalloc(sizeof(*init), GFP_ATOMIC);
+ if (!init)
+ return;
+
+ done =
On Thu, 2011-11-17 at 15:24 +0200, Pekka Enberg wrote:
On Thu, Nov 17, 2011 at 3:04 PM, Sasha Levin levinsasha...@gmail.com wrote:
Support the event index feature in the virtio spec.
The results are less notifications between the guest and host, and in
result faster operation of the virt
This new option disables the kernel DHCP which runs when starting
a custom rootfs.
This is useful when we want to start a rootfs but are using a network
other than the usermode IP proxy (a network which doesn't provide DHCP).
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
Support event idx both when using vhost and when using simple TAP mode.
I did simple TCP stream performance test with vhost, and it showed another 9%
increase over regular vhost mode.
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/virtio/net.c | 12
1 files
Signed-off-by: Sasha Levin levinsasha...@gmail.com
---
tools/kvm/virtio/blk.c |7 +--
1 files changed, 5 insertions(+), 2 deletions(-)
diff --git a/tools/kvm/virtio/blk.c b/tools/kvm/virtio/blk.c
index ed4e099..9495f28 100644
--- a/tools/kvm/virtio/blk.c
+++ b/tools/kvm/virtio/blk.c
@@
This patch is the base for enabling support for event index feature in the
virtio spec.
We do so by updating and evaluating the used/avail event idx in the virtio ring
functions.
Actual usage of this flag is in the following patches.
The results are less notifications between the guest and
On 11/17/2011 03:38 PM, Carsten Otte wrote:
+init = kzalloc(sizeof(*init), GFP_ATOMIC);
+if (!init)
+return;
+
+done = kzalloc(sizeof(*done), GFP_ATOMIC);
+if (!done)
+goto out_init;
+
+event = kzalloc(sizeof(*event), GFP_ATOMIC);
+if (!event)
+
This reverts commit a15bd354f083f20f257db450488db52ac27df439.
It exceeded the padding on the SREGS struct, rendering the ABI
backwards-incompatible.
Conflicts:
arch/powerpc/kvm/powerpc.c
include/linux/kvm.h
---
arch/powerpc/include/asm/kvm.h|8
On 11/17/2011 04:26 PM, Alexander Graf wrote:
This reverts commit a15bd354f083f20f257db450488db52ac27df439.
It exceeded the padding on the SREGS struct, rendering the ABI
backwards-incompatible.
Thanks, applied and queued for 3.2.
--
error compiling committee.c: too many arguments to
On 11/14/2011 05:56 AM, zanghongy...@huawei.com wrote:
From: Hongyong Zang zanghongy...@huawei.com
Ivshmem(nahanni) is a mechanism for sharing host memory with VMs running on
the same host. Currently, guest notifies qemu by reading or writing ivshmem
device's PCI MMIO BAR0(Doorbell).
This
On Thu, 2011-11-17 at 16:36 +0200, Avi Kivity wrote:
On 11/14/2011 05:56 AM, zanghongy...@huawei.com wrote:
From: Hongyong Zang zanghongy...@huawei.com
Ivshmem(nahanni) is a mechanism for sharing host memory with VMs running on
the same host. Currently, guest notifies qemu by reading or
On 17.11.2011 15:18, Avi Kivity wrote:
Backports to distros, even if you happened to name my favourite, do not
override upstream considerations. as soon as we find time doesn't
inspire confidence either. If async_pf.c is better, let's do that (btw
async_pf.c did not find itself in generic code
On 11/17/2011 04:48 PM, Sasha Levin wrote:
On Thu, 2011-11-17 at 16:36 +0200, Avi Kivity wrote:
On 11/14/2011 05:56 AM, zanghongy...@huawei.com wrote:
From: Hongyong Zang zanghongy...@huawei.com
Ivshmem(nahanni) is a mechanism for sharing host memory with VMs running
on the same
+VCPU_EVENT(vcpu, 5, synchronous page fault at guest %lx user %lx,
+ current-thread.gmap_addr, uaddr);
+
+fault_in_pages_readable((char __user *)uaddr, PAGE_SIZE);
+}
These may make sense as tracepoints (this is what x86 does). The
kvm_stat script knows how to pick
On Thu, Nov 17, 2011 at 08:56:38AM +0200, Sasha Levin wrote:
On Thu, 2011-11-17 at 08:53 +0200, Pekka Enberg wrote:
On Thu, Nov 17, 2011 at 8:07 AM, Sasha Levin levinsasha...@gmail.com
wrote:
Also, when I start the guest I sometimes get the following error message:
David, which
On Thu, 2011-11-17 at 07:38 -0800, David Evensky wrote:
On Thu, Nov 17, 2011 at 08:56:38AM +0200, Sasha Levin wrote:
On Thu, 2011-11-17 at 08:53 +0200, Pekka Enberg wrote:
On Thu, Nov 17, 2011 at 8:07 AM, Sasha Levin levinsasha...@gmail.com
wrote:
Also, when I start the guest I
It prints 'Returned entries: 31'
\dae
On Thu, Nov 17, 2011 at 05:43:49PM +0200, Sasha Levin wrote:
On Thu, 2011-11-17 at 07:38 -0800, David Evensky wrote:
On Thu, Nov 17, 2011 at 08:56:38AM +0200, Sasha Levin wrote:
On Thu, 2011-11-17 at 08:53 +0200, Pekka Enberg wrote:
On Thu, Nov 17,
On Thu, 2011-11-17 at 07:50 -0800, David Evensky wrote:
It prints 'Returned entries: 31'
\dae
Thats the OK scenario, could you run it several times to see if you can
trigger it to print something else?
--
Sasha.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of
On 11/17/2011 05:52 PM, Sasha Levin wrote:
On Thu, 2011-11-17 at 07:50 -0800, David Evensky wrote:
It prints 'Returned entries: 31'
\dae
Thats the OK scenario, could you run it several times to see if you can
trigger it to print something else?
Maybe with 'taskset' to get it to run on
On Thu, Nov 17, 2011 at 08:07:35AM +0200, Sasha Levin wrote:
On Wed, 2011-11-16 at 16:42 -0800, David Evensky wrote:
...
This should be '-n mode=tap,guest_mac=00:11:11:11:11:11'
...
Thanks!
Also, when I start the guest I sometimes get the following error message:
# kvm run -k
evensky@waltz:~/megatux/vmatic$ perl -e 'for $cnt (1..10){ $o=`./4sasha`;
chomp($o); $histogram{$o}++}; for $o (keys %histogram){print $o:
$histogram{$o}\n}'
Returned entries: 31: 99987
Returned entries: 56: 1
KVM_GET_SUPPORTED_CPUID returned -1 with errno 7: 8
Returned entries: 37: 4
On Thu, 2011-11-17 at 08:12 -0800, David Evensky wrote:
evensky@waltz:~/megatux/vmatic$ perl -e 'for $cnt (1..10){ $o=`./4sasha`;
chomp($o); $histogram{$o}++}; for $o (keys %histogram){print $o:
$histogram{$o}\n}'
Returned entries: 31: 99987
Returned entries: 56: 1
On 11/17/2011 06:12 PM, David Evensky wrote:
evensky@waltz:~/megatux/vmatic$ perl -e 'for $cnt (1..10){ $o=`./4sasha`;
chomp($o); $histogram{$o}++}; for $o (keys %histogram){print $o:
$histogram{$o}\n}'
Returned entries: 31: 99987
Returned entries: 56: 1
KVM_GET_SUPPORTED_CPUID
Avi,
evensky@waltz:~/megatux/vmatic$ perl -e 'for $cnt (1..1){ $o=`taskset 0x01
./4sasha`; chomp($o); $histogram{$o}++}; for $o (sort keys %histogram){print
$o: $histogram{$o}\n}'
KVM_GET_SUPPORTED_CPUID returned -1 with errno 7: 3
Returned entries: 31: 9995
Returned entries: 32: 1
On 11/17/2011 06:29 PM, David Evensky wrote:
Avi,
evensky@waltz:~/megatux/vmatic$ perl -e 'for $cnt (1..1){ $o=`taskset
0x01 ./4sasha`; chomp($o); $histogram{$o}++}; for $o (sort keys
%histogram){print $o: $histogram{$o}\n}'
KVM_GET_SUPPORTED_CPUID returned -1 with errno 7: 3
Returned
Avi, sure:
evensky@waltz:~$ gcc supported-cpuid.c -o supported-cpuid
evensky@waltz:~$ ./supported-cpuid
Returned entries: 37
func ind flags - 000d 756e6547 6c65746e 49656e69
func 0001 ind flags - 000206a7 01100800 16b82203
On 11/17/2011 07:13 PM, David Evensky wrote:
func 000d ind 0001 flags 0001 - 0001
func 8001 ind flags - 0001
28100800
func 000d ind 0003 flags 0001 -
On Wed, 2011-11-16 at 11:52 -0500, Konrad Rzeszutek Wilk wrote:
On Fri, Nov 11, 2011 at 03:10:56PM -0700, Alex Williamson wrote:
snip
+
+Regions are described by a struct vfio_region_info, which is retrieved
by
+using the GET_REGION_INFO ioctl with vfio_region_info.index field
On Wed, 2011-11-16 at 11:47 -0600, Scott Wood wrote:
On 11/11/2011 04:10 PM, Alex Williamson wrote:
Thanks Konrad! Comments inline.
On Fri, 2011-11-11 at 12:51 -0500, Konrad Rzeszutek Wilk wrote:
On Thu, Nov 03, 2011 at 02:12:24PM -0600, Alex Williamson wrote:
+When supported, as
On Thu, Nov 17, 2011 at 01:22:17PM -0700, Alex Williamson wrote:
On Wed, 2011-11-16 at 11:52 -0500, Konrad Rzeszutek Wilk wrote:
On Fri, Nov 11, 2011 at 03:10:56PM -0700, Alex Williamson wrote:
What would be the return value if somebody tried to unmask an edge one?
Should that be documented
Decrementers are now properly driven by TCR/TSR, and the guest
has full read/write access to these registers.
The decrementer keeps ticking (and setting the TSR bit) regardless of
whether the interrupts are enabled with TCR.
The decrementer stops at zero, rather than going negative.
On Thu, 2011-10-20 at 13:43 -0700, Rose, Gregory V wrote:
-Original Message-
From: Roopa Prabhu [mailto:ropra...@cisco.com]
[...]
Moving the ops to netdev should be trivial. You probably want the ops to
work on the VF via the PF, like the existing ndo_set_vf_mac etc.
That is
On Tue, 2011-10-25 at 08:59 -0700, Rose, Gregory V wrote:
-Original Message-
From: Michael S. Tsirkin [mailto:m...@redhat.com]
Sent: Tuesday, October 25, 2011 8:46 AM
To: Roopa Prabhu
Cc: net...@vger.kernel.org; s...@us.ibm.com; dragos.tatu...@gmail.com;
a...@arndb.de;
Miscelaneous code cleanups and better logging for the operations
executed during THP test setup.
Lucas Meneghel Rodrigues (4):
client.virt.tests: trans_hugepage.swapping: cleanups + move common
area
client.virt.tests: trans_hugepage.defrag - cleanups + move common
area
1) Remove unused imports
2) Change mistaken raise statement
3) Move it to the common test area
Signed-off-by: Lucas Meneghel Rodrigues l...@redhat.com
---
client/tests/kvm/tests/trans_hugepage_swapping.py | 115 -
client/virt/tests/trans_hugepage_swapping.py | 113
1) Removed unused imports
2) Removed unused variables
3) Moved to the common area
Signed-off-by: Lucas Meneghel Rodrigues l...@redhat.com
---
client/tests/kvm/tests/trans_hugepage.py | 127 --
client/virt/tests/trans_hugepage.py | 127
Make the utils.run(pgrep khugepaged) silent, also, print
info on what are the config values for THP and what are the
tests executed with khugepaged. This gives a much better
idea of what is going on with the test.
Signed-off-by: Lucas Meneghel Rodrigues l...@redhat.com
---
1) Removed unused imports
2) Trimmed down error message
3) Moved to the common area
Signed-off-by: Lucas Meneghel Rodrigues l...@redhat.com
---
client/tests/kvm/tests/trans_hugepage_defrag.py | 86 ---
client/virt/tests/trans_hugepage_defrag.py | 86
Sorry to come to this rather late.
On Tue, 2011-11-08 at 23:55 -0800, Roopa Prabhu wrote:
[...]
v2 - v3
- Moved set and get filter ops from rtnl_link_ops to netdev_ops
- Support for SRIOV VFs.
[Note: The get filters msg (in the way current get rtnetlink handles
it) might get
On Tue, 2011-11-08 at 23:55 -0800, Roopa Prabhu wrote:
From: Roopa Prabhu ropra...@cisco.com
This patch introduces the following netlink interface to set
MAC and VLAN filters on an network interface. It can be used to
set RX filter on any network interface (if supported by the driver) and
On 11/17/2011 4:15 PM, Ben Hutchings wrote:
Sorry to come to this rather late.
On Tue, 2011-11-08 at 23:55 -0800, Roopa Prabhu wrote:
[...]
v2 - v3
- Moved set and get filter ops from rtnl_link_ops to netdev_ops
- Support for SRIOV VFs.
[Note: The get filters msg (in the way current
On Thu, 2011-11-17 at 16:32 -0800, Greg Rose wrote:
On 11/17/2011 4:15 PM, Ben Hutchings wrote:
Sorry to come to this rather late.
On Tue, 2011-11-08 at 23:55 -0800, Roopa Prabhu wrote:
[...]
v2 - v3
- Moved set and get filter ops from rtnl_link_ops to netdev_ops
- Support for
On Fri, 2011-11-11 at 18:34 +0530, Krishna Kumar wrote:
Changes for multiqueue virtio_net driver.
[...]
@@ -677,25 +730,35 @@ static struct rtnl_link_stats64 *virtnet
{
struct virtnet_info *vi = netdev_priv(dev);
int cpu;
- unsigned int start;
On Fri, 2011-11-18 at 01:08 +, Ben Hutchings wrote:
On Fri, 2011-11-11 at 18:34 +0530, Krishna Kumar wrote:
Changes for multiqueue virtio_net driver.
[...]
@@ -677,25 +730,35 @@ static struct rtnl_link_stats64 *virtnet
{
struct virtnet_info *vi = netdev_priv(dev);
int cpu;
From: Hongyong Zang zanghongy...@huawei.com
This patch, adds a PIO BAR3 for guest notifying qemu. And we find the new
notification way of PIO BAR3 reduces 30% time in comparison with the original
MMIO BAR0 way.
Signed-off-by: Hongyong Zang zanghongy...@huawei.com
---
hw/ivshmem.c | 24
This reverts commit a15bd354f083f20f257db450488db52ac27df439.
It exceeded the padding on the SREGS struct, rendering the ABI
backwards-incompatible.
Conflicts:
arch/powerpc/kvm/powerpc.c
include/linux/kvm.h
---
arch/powerpc/include/asm/kvm.h|8
On 11/17/2011 04:26 PM, Alexander Graf wrote:
This reverts commit a15bd354f083f20f257db450488db52ac27df439.
It exceeded the padding on the SREGS struct, rendering the ABI
backwards-incompatible.
Thanks, applied and queued for 3.2.
--
error compiling committee.c: too many arguments to
Decrementers are now properly driven by TCR/TSR, and the guest
has full read/write access to these registers.
The decrementer keeps ticking (and setting the TSR bit) regardless of
whether the interrupts are enabled with TCR.
The decrementer stops at zero, rather than going negative.
80 matches
Mail list logo