From: Hongyong Zang
This patch, adds a PIO BAR3 for guest notifying qemu. And we find the new
notification way of PIO BAR3 reduces 30% time in comparison with the original
MMIO BAR0 way.
Signed-off-by: Hongyong Zang
---
hw/ivshmem.c | 24 ++--
kvm-all.c| 23 ++
On Fri, 2011-11-18 at 01:08 +, Ben Hutchings wrote:
> On Fri, 2011-11-11 at 18:34 +0530, Krishna Kumar wrote:
> > Changes for multiqueue virtio_net driver.
> [...]
> > @@ -677,25 +730,35 @@ static struct rtnl_link_stats64 *virtnet
> > {
> > struct virtnet_info *vi = netdev_priv(dev);
> >
On Fri, 2011-11-11 at 18:34 +0530, Krishna Kumar wrote:
> Changes for multiqueue virtio_net driver.
[...]
> @@ -677,25 +730,35 @@ static struct rtnl_link_stats64 *virtnet
> {
> struct virtnet_info *vi = netdev_priv(dev);
> int cpu;
> - unsigned int start;
>
> for_each_possi
On Thu, 2011-11-17 at 16:32 -0800, Greg Rose wrote:
> On 11/17/2011 4:15 PM, Ben Hutchings wrote:
> > Sorry to come to this rather late.
> >
> > On Tue, 2011-11-08 at 23:55 -0800, Roopa Prabhu wrote:
> > [...]
> >> v2 -> v3
> >> - Moved set and get filter ops from rtnl_link_ops to netdev_ops
> >>
On 11/17/2011 4:15 PM, Ben Hutchings wrote:
Sorry to come to this rather late.
On Tue, 2011-11-08 at 23:55 -0800, Roopa Prabhu wrote:
[...]
v2 -> v3
- Moved set and get filter ops from rtnl_link_ops to netdev_ops
- Support for SRIOV VFs.
[Note: The get filters msg (in the way current
On Tue, 2011-11-08 at 23:55 -0800, Roopa Prabhu wrote:
> From: Roopa Prabhu
>
> This patch introduces the following netlink interface to set
> MAC and VLAN filters on an network interface. It can be used to
> set RX filter on any network interface (if supported by the driver) and
> also on a SRIO
Sorry to come to this rather late.
On Tue, 2011-11-08 at 23:55 -0800, Roopa Prabhu wrote:
[...]
> v2 -> v3
> - Moved set and get filter ops from rtnl_link_ops to netdev_ops
> - Support for SRIOV VFs.
> [Note: The get filters msg (in the way current get rtnetlink handles
> it) might
1) Removed unused imports
2) Trimmed down error message
3) Moved to the common area
Signed-off-by: Lucas Meneghel Rodrigues
---
client/tests/kvm/tests/trans_hugepage_defrag.py | 86 ---
client/virt/tests/trans_hugepage_defrag.py | 86 +++
2 files
Make the utils.run("pgrep khugepaged") silent, also, print
info on what are the config values for THP and what are the
tests executed with khugepaged. This gives a much better
idea of what is going on with the test.
Signed-off-by: Lucas Meneghel Rodrigues
---
client/virt/virt_test_setup.py | 3
1) Removed unused imports
2) Removed unused variables
3) Moved to the common area
Signed-off-by: Lucas Meneghel Rodrigues
---
client/tests/kvm/tests/trans_hugepage.py | 127 --
client/virt/tests/trans_hugepage.py | 127 ++
2 files ch
1) Remove unused imports
2) Change mistaken raise statement
3) Move it to the common test area
Signed-off-by: Lucas Meneghel Rodrigues
---
client/tests/kvm/tests/trans_hugepage_swapping.py | 115 -
client/virt/tests/trans_hugepage_swapping.py | 113
Miscelaneous code cleanups and better logging for the operations
executed during THP test setup.
Lucas Meneghel Rodrigues (4):
client.virt.tests: trans_hugepage.swapping: cleanups + move common
area
client.virt.tests: trans_hugepage.defrag - cleanups + move common
area
client.virt.te
On Tue, 2011-10-25 at 08:59 -0700, Rose, Gregory V wrote:
> > -Original Message-
> > From: Michael S. Tsirkin [mailto:m...@redhat.com]
> > Sent: Tuesday, October 25, 2011 8:46 AM
> > To: Roopa Prabhu
> > Cc: net...@vger.kernel.org; s...@us.ibm.com; dragos.tatu...@gmail.com;
> > a...@arndb.d
On Thu, 2011-10-20 at 13:43 -0700, Rose, Gregory V wrote:
> > -Original Message-
> > From: Roopa Prabhu [mailto:ropra...@cisco.com]
[...]
> > Moving the ops to netdev should be trivial. You probably want the ops to
> > work on the VF via the PF, like the existing ndo_set_vf_mac etc.
>
> Th
Decrementers are now properly driven by TCR/TSR, and the guest
has full read/write access to these registers.
The decrementer keeps ticking (and setting the TSR bit) regardless of
whether the interrupts are enabled with TCR.
The decrementer stops at zero, rather than going negative.
Decrementers
On Thu, Nov 17, 2011 at 01:22:17PM -0700, Alex Williamson wrote:
> On Wed, 2011-11-16 at 11:52 -0500, Konrad Rzeszutek Wilk wrote:
> > On Fri, Nov 11, 2011 at 03:10:56PM -0700, Alex Williamson wrote:
> > What would be the return value if somebody tried to unmask an edge one?
> > Should that be docu
On Wed, 2011-11-16 at 11:47 -0600, Scott Wood wrote:
> On 11/11/2011 04:10 PM, Alex Williamson wrote:
> >
> > Thanks Konrad! Comments inline.
> >
> > On Fri, 2011-11-11 at 12:51 -0500, Konrad Rzeszutek Wilk wrote:
> >> On Thu, Nov 03, 2011 at 02:12:24PM -0600, Alex Williamson wrote:
> >>> +When
On Wed, 2011-11-16 at 11:52 -0500, Konrad Rzeszutek Wilk wrote:
> On Fri, Nov 11, 2011 at 03:10:56PM -0700, Alex Williamson wrote:
> > > > +
> > > > +Regions are described by a struct vfio_region_info, which is retrieved
> > > > by
> > > > +using the GET_REGION_INFO ioctl with vfio_region_info.in
On 11/17/2011 07:13 PM, David Evensky wrote:
> func 000d ind 0001 flags 0001 -> 0001
>
> func 8001 ind flags -> 0001
> 28100800
> func 000d ind 0003 flags 0001 ->
> 0
Avi, sure:
evensky@waltz:~$ gcc supported-cpuid.c -o supported-cpuid
evensky@waltz:~$ ./supported-cpuid
Returned entries: 37
func ind flags -> 000d 756e6547 6c65746e 49656e69
func 0001 ind flags -> 000206a7 01100800 16b82203 0f8bfb
On 11/17/2011 06:29 PM, David Evensky wrote:
> Avi,
>
> evensky@waltz:~/megatux/vmatic$ perl -e 'for $cnt (1..1){ $o=`taskset
> 0x01 ./4sasha`; chomp($o); $histogram{$o}++}; for $o (sort keys
> %histogram){print "$o: $histogram{$o}\n"}'
> KVM_GET_SUPPORTED_CPUID returned -1 with errno 7: 3
>
Avi,
evensky@waltz:~/megatux/vmatic$ perl -e 'for $cnt (1..1){ $o=`taskset 0x01
./4sasha`; chomp($o); $histogram{$o}++}; for $o (sort keys %histogram){print
"$o: $histogram{$o}\n"}'
KVM_GET_SUPPORTED_CPUID returned -1 with errno 7: 3
Returned entries: 31: 9995
Returned entries: 32: 1
Return
On 11/17/2011 06:12 PM, David Evensky wrote:
>
> evensky@waltz:~/megatux/vmatic$ perl -e 'for $cnt (1..10){ $o=`./4sasha`;
> chomp($o); $histogram{$o}++}; for $o (keys %histogram){print "$o:
> $histogram{$o}\n"}'
> Returned entries: 31: 99987
> Returned entries: 56: 1
> KVM_GET_SUPPORTED_CPUI
On Thu, 2011-11-17 at 08:12 -0800, David Evensky wrote:
>
> evensky@waltz:~/megatux/vmatic$ perl -e 'for $cnt (1..10){ $o=`./4sasha`;
> chomp($o); $histogram{$o}++}; for $o (keys %histogram){print "$o:
> $histogram{$o}\n"}'
> Returned entries: 31: 99987
> Returned entries: 56: 1
> KVM_GET_SU
evensky@waltz:~/megatux/vmatic$ perl -e 'for $cnt (1..10){ $o=`./4sasha`;
chomp($o); $histogram{$o}++}; for $o (keys %histogram){print "$o:
$histogram{$o}\n"}'
Returned entries: 31: 99987
Returned entries: 56: 1
KVM_GET_SUPPORTED_CPUID returned -1 with errno 7: 8
Returned entries: 37: 4
\d
On Thu, Nov 17, 2011 at 08:07:35AM +0200, Sasha Levin wrote:
> On Wed, 2011-11-16 at 16:42 -0800, David Evensky wrote:
> >
> > ...
> This should be '-n mode=tap,guest_mac=00:11:11:11:11:11'
> ...
Thanks!
> >
> > Also, when I start the guest I sometimes get the following error message:
> >
> >
On 11/17/2011 05:52 PM, Sasha Levin wrote:
> On Thu, 2011-11-17 at 07:50 -0800, David Evensky wrote:
> > It prints 'Returned entries: 31'
> > \dae
>
> Thats the OK scenario, could you run it several times to see if you can
> trigger it to print something else?
Maybe with 'taskset' to get it to run
On Thu, 2011-11-17 at 07:50 -0800, David Evensky wrote:
> It prints 'Returned entries: 31'
> \dae
Thats the OK scenario, could you run it several times to see if you can
trigger it to print something else?
--
Sasha.
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body
It prints 'Returned entries: 31'
\dae
On Thu, Nov 17, 2011 at 05:43:49PM +0200, Sasha Levin wrote:
> On Thu, 2011-11-17 at 07:38 -0800, David Evensky wrote:
> > On Thu, Nov 17, 2011 at 08:56:38AM +0200, Sasha Levin wrote:
> > > On Thu, 2011-11-17 at 08:53 +0200, Pekka Enberg wrote:
> > > > On Thu
On Thu, 2011-11-17 at 07:38 -0800, David Evensky wrote:
> On Thu, Nov 17, 2011 at 08:56:38AM +0200, Sasha Levin wrote:
> > On Thu, 2011-11-17 at 08:53 +0200, Pekka Enberg wrote:
> > > On Thu, Nov 17, 2011 at 8:07 AM, Sasha Levin
> > > wrote:
> > > >> Also, when I start the guest I sometimes get t
On Thu, Nov 17, 2011 at 08:56:38AM +0200, Sasha Levin wrote:
> On Thu, 2011-11-17 at 08:53 +0200, Pekka Enberg wrote:
> > On Thu, Nov 17, 2011 at 8:07 AM, Sasha Levin
> > wrote:
> > >> Also, when I start the guest I sometimes get the following error message:
>
>
> David, which host kernel d
>> +VCPU_EVENT(vcpu, 5, "synchronous page fault at guest %lx user %lx",
>> + current->thread.gmap_addr, uaddr);
>> +
>> +fault_in_pages_readable((char __user *)uaddr, PAGE_SIZE);
>> +}
>
> These may make sense as tracepoints (this is what x86 does). The
> kvm_stat script kno
On 11/17/2011 04:48 PM, Sasha Levin wrote:
> On Thu, 2011-11-17 at 16:36 +0200, Avi Kivity wrote:
> > On 11/14/2011 05:56 AM, zanghongy...@huawei.com wrote:
> > > From: Hongyong Zang
> > >
> > > Ivshmem(nahanni) is a mechanism for sharing host memory with VMs running
> > > on the same host. Curre
On 17.11.2011 15:18, Avi Kivity wrote:
Backports to distros, even if you happened to name my favourite, do not
override upstream considerations. "as soon as we find time" doesn't
inspire confidence either. If async_pf.c is better, let's do that (btw
async_pf.c did not find itself in generic cod
On Thu, 2011-11-17 at 16:36 +0200, Avi Kivity wrote:
> On 11/14/2011 05:56 AM, zanghongy...@huawei.com wrote:
> > From: Hongyong Zang
> >
> > Ivshmem(nahanni) is a mechanism for sharing host memory with VMs running on
> > the same host. Currently, guest notifies qemu by reading or writing ivshmem
On 11/14/2011 05:56 AM, zanghongy...@huawei.com wrote:
> From: Hongyong Zang
>
> Ivshmem(nahanni) is a mechanism for sharing host memory with VMs running on
> the same host. Currently, guest notifies qemu by reading or writing ivshmem
> device's PCI MMIO BAR0(Doorbell).
>
> This patch, changes t
On 11/17/2011 04:26 PM, Alexander Graf wrote:
> This reverts commit a15bd354f083f20f257db450488db52ac27df439.
>
> It exceeded the padding on the SREGS struct, rendering the ABI
> backwards-incompatible.
>
>
Thanks, applied and queued for 3.2.
--
error compiling committee.c: too many arguments to
This reverts commit a15bd354f083f20f257db450488db52ac27df439.
It exceeded the padding on the SREGS struct, rendering the ABI
backwards-incompatible.
Conflicts:
arch/powerpc/kvm/powerpc.c
include/linux/kvm.h
---
arch/powerpc/include/asm/kvm.h|8
arch/powerpc/
On 11/17/2011 03:38 PM, Carsten Otte wrote:
>
>>> +init = kzalloc(sizeof(*init), GFP_ATOMIC);
>>> +if (!init)
>>> +return;
>>> +
>>> +done = kzalloc(sizeof(*done), GFP_ATOMIC);
>>> +if (!done)
>>> +goto out_init;
>>> +
>>> +event = kzalloc(sizeof(*event), GFP_ATO
Signed-off-by: Sasha Levin
---
tools/kvm/virtio/blk.c |7 +--
1 files changed, 5 insertions(+), 2 deletions(-)
diff --git a/tools/kvm/virtio/blk.c b/tools/kvm/virtio/blk.c
index ed4e099..9495f28 100644
--- a/tools/kvm/virtio/blk.c
+++ b/tools/kvm/virtio/blk.c
@@ -93,7 +93,8 @@ void virti
Support event idx both when using vhost and when using simple TAP mode.
I did simple TCP stream performance test with vhost, and it showed another 9%
increase over regular vhost mode.
Signed-off-by: Sasha Levin
---
tools/kvm/virtio/net.c | 12
1 files changed, 8 insertions(+), 4
This patch is the base for enabling support for event index feature in the
virtio spec.
We do so by updating and evaluating the used/avail event idx in the virtio ring
functions.
Actual usage of this flag is in the following patches.
The results are less notifications between the guest and host
This new option disables the kernel DHCP which runs when starting
a custom rootfs.
This is useful when we want to start a rootfs but are using a network
other than the usermode IP proxy (a network which doesn't provide DHCP).
Signed-off-by: Sasha Levin
---
tools/kvm/builtin-run.c |9 +++
> On Thu, 2011-11-17 at 15:24 +0200, Pekka Enberg wrote:
>> On Thu, Nov 17, 2011 at 3:04 PM, Sasha Levin wrote:
>> > Support the event index feature in the virtio spec.
>> >
>> > The results are less notifications between the guest and host, and in
>> > result faster operation of the virt queues.
On 17.11.2011 14:18, Avi Kivity wrote:
+ copy_from_guest(vcpu,&pfault_token, vcpu->arch.pfault_token,
+ 8);
Missing error check?
Good catch, will fix.
+ init = kzalloc(sizeof(*init), GFP_ATOMIC);
+ if (!init)
+ return;
+
+ done = kz
On Thu, 2011-11-17 at 15:24 +0200, Pekka Enberg wrote:
> On Thu, Nov 17, 2011 at 3:04 PM, Sasha Levin wrote:
> > Support the event index feature in the virtio spec.
> >
> > The results are less notifications between the guest and host, and in
> > result faster operation of the virt queues.
> >
> >
On Thu, Nov 17, 2011 at 3:04 PM, Sasha Levin wrote:
> Support the event index feature in the virtio spec.
>
> The results are less notifications between the guest and host, and in
> result faster operation of the virt queues.
>
> Signed-off-by: Sasha Levin
What's this patch doing? There's no men
On 11/17/2011 01:19 PM, Carsten Otte wrote:
> From: Carsten Otte
>
> This patch adds support for pseudo page faults. The corresponding
> interface is implemented according to the documentation in CP
> programming services.
> Diagnose 258 allows to register compare and check masks for pseudo
> page
Support event idx both when using vhost and when using simple TAP mode.
I did simple TCP stream performance test with vhost, and it showed another 9%
increase over regular vhost mode.
Signed-off-by: Sasha Levin
---
tools/kvm/virtio/net.c | 12
1 files changed, 8 insertions(+), 4
Signed-off-by: Sasha Levin
---
tools/kvm/virtio/blk.c |7 +--
1 files changed, 5 insertions(+), 2 deletions(-)
diff --git a/tools/kvm/virtio/blk.c b/tools/kvm/virtio/blk.c
index ed4e099..9495f28 100644
--- a/tools/kvm/virtio/blk.c
+++ b/tools/kvm/virtio/blk.c
@@ -93,7 +93,8 @@ void virti
This new option disables the kernel DHCP which runs when starting
a custom rootfs.
This is useful when we want to start a rootfs but are using a network
other than the usermode IP proxy (a network which doesn't provide DHCP).
Signed-off-by: Sasha Levin
---
tools/kvm/builtin-run.c |9 +++
Support the event index feature in the virtio spec.
The results are less notifications between the guest and host, and in
result faster operation of the virt queues.
Signed-off-by: Sasha Levin
---
tools/kvm/include/kvm/virtio.h |7 +++
1 files changed, 7 insertions(+), 0 deletions(-)
d
The TSC is unstable on guests, hence there's no guarantee
that this test will pass, it may pass or fail. Therefore,
let's just remove it from the config.
CC: Avi Kivity
Signed-off-by: Lucas Meneghel Rodrigues
---
.../virt/autotest_control/monotonic_time.control |3 ---
1 files changed, 0
Hi,
(I'm Cc'ing Prasad too.)
On Thu, Nov 17, 2011 at 9:50 AM, Lan Tianyu wrote:
> When meeting request to write the cluster without copied flag,
> allocate a new cluster and write original data with modification
> to the new cluster. This also can add support for the writing
> operation of the q
于 2011/11/16,星期三 2:43, Cam Macdonell 写道:
On Sun, Nov 13, 2011 at 8:56 PM, wrote:
From: Hongyong Zang
Ivshmem(nahanni) is a mechanism for sharing host memory with VMs running on the
same host. Currently, guest notifies qemu by reading or writing ivshmem
device's PCI MMIO BAR0(Doorbell).
This
On Thu, 17 Nov 2011 12:15:52 +0100
Martin Schwidefsky wrote:
> On Thu, 17 Nov 2011 12:27:41 +0200
> Avi Kivity wrote:
>
> > On 11/17/2011 12:00 PM, Carsten Otte wrote:
> > > From: Christian Borntraeger
> > >
> > > There is a potential host deadlock in the tprot intercept handling.
> > > We mu
From: Carsten Otte
This patch adds support for pseudo page faults. The corresponding
interface is implemented according to the documentation in CP
programming services.
Diagnose 258 allows to register compare and check masks for pseudo
page faults, and the guest can cancel these masks again. For
Hi Avi,
these patches implement asynchronous page faults for kvm on s390.
Sorry for being slower on sending patches than you're reviewing,
I guess these will answer your question on __gmap_fault ;-).
I think we should push both of these via Martin, his patch alone
would break kvm on s390, mine alo
From: Martin Schwidefsky
Add FAULT_FLAG_RETRY_NOWAIT to the fault flags if the host is processing
a guest fault. In case of a fault retry exit sie64a() with the gmap_fault
indication set. This makes it possible to handle asynchronous page faults
without the need for mm notifiers.
Signed-off-by:
On Thu, 17 Nov 2011 12:27:41 +0200
Avi Kivity wrote:
> On 11/17/2011 12:00 PM, Carsten Otte wrote:
> > From: Christian Borntraeger
> >
> > There is a potential host deadlock in the tprot intercept handling.
> > We must not hold the mmap semaphore while resolving the guest
> > address. If usersp
On 11/17/2011 12:00 PM, Carsten Otte wrote:
> Hi Avi,
>
> these patches are bugfixes for kvm on s390. Could you please apply
> them?
>
All applied, thanks. Patch 2 had rejects (you didn't have the diagnose
0x10 patch in your tree), it should be good, but please double check
kvm.git next.
Should
On 11/17/2011 12:00 PM, Carsten Otte wrote:
> From: Christian Borntraeger
>
> There is a potential host deadlock in the tprot intercept handling.
> We must not hold the mmap semaphore while resolving the guest
> address. If userspace is remapping, then the memory detection in
> the guest is broke
If we pass just enough entries to KVM_GET_SUPPORTED_CPUID, we would still
fail with -E2BIG due to wrong comparisons.
Cc: Avi Kivity
Cc: Marcelo Tosatti
Signed-off-by: Sasha Levin
---
arch/x86/kvm/x86.c | 12 ++--
1 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/arch/x86
If the amount of entries available passed to KVM_GET_SUPPORTED_CPUID is
too big we don't fail, we just adjust it to the amount actually needed
and fill the entries.
Cc: Avi Kivity
Cc: Marcelo Tosatti
Signed-off-by: Sasha Levin
---
Documentation/virtual/kvm/api.txt |7 +++
1 files chang
On 17/11/11 11:15, Avi Kivity wrote:
> On 11/17/2011 12:00 PM, Carsten Otte wrote:
>> From: Cornelia Huck
>>
>> SIGP sense running may cause an intercept on higher level
>> virtualization, so handle it by checking the CPUSTAT_RUNNING flag.
>>
>
> What does "higher level virtualization" mean?
Run
On 11/17/2011 12:00 PM, Carsten Otte wrote:
> From: Cornelia Huck
>
> SIGP sense running may cause an intercept on higher level
> virtualization, so handle it by checking the CPUSTAT_RUNNING flag.
>
What does "higher level virtualization" mean?
--
error compiling committee.c: too many arguments
On Thu, 2011-11-17 at 11:04 +0200, Avi Kivity wrote:
> On 11/17/2011 08:56 AM, Sasha Levin wrote:
> > On Thu, 2011-11-17 at 08:53 +0200, Pekka Enberg wrote:
> > > On Thu, Nov 17, 2011 at 8:07 AM, Sasha Levin
> > > wrote:
> > > >> Also, when I start the guest I sometimes get the following error
>
From: Christian Borntraeger
There is a potential host deadlock in the tprot intercept handling.
We must not hold the mmap semaphore while resolving the guest
address. If userspace is remapping, then the memory detection in
the guest is broken anyway so we can safely separate the
address transla
From: Cornelia Huck
CPUSTAT_RUNNING was implemented signifying that a vcpu is not stopped.
This is not, however, what the architecture says: RUNNING should be
set when the host is acting on the behalf of the guest operating
system.
CPUSTAT_RUNNING has been changed to be set in kvm_arch_vcpu_load
Hi Avi,
these patches are bugfixes for kvm on s390. Could you please apply
them?
thanks,
Carsten
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
From: Christian Borntraeger
KVM on s390 always had a sync mmu. Any mapping change in userspace
mapping was always reflected immediately in the guest mapping.
- In older code the guest mapping was just an offset
- In newer code the last level page table is shared
Signed-off-by: Christian Borntra
From: Cornelia Huck
SIGP sense running may cause an intercept on higher level
virtualization, so handle it by checking the CPUSTAT_RUNNING flag.
Signed-off-by: Cornelia Huck
Signed-off-by: Carsten Otte
---
arch/s390/include/asm/kvm_host.h |1 +
arch/s390/kvm/kvm-s390.c |1 +
On 11/17/2011 10:56 AM, Gleb Natapov wrote:
> vmx_load_host_state() does not handle msrs switching (except
> MSR_KERNEL_GS_BASE) since commit 26bb0981b3f. Remove call to it
> where it is no longer make sense.
>
>
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
On Thu, 2011-11-10 at 14:57 +0200, Gleb Natapov wrote:
> This patchset exposes an emulated version 2 architectural performance
> monitoring unit to KVM guests. The PMU is emulated using perf_events,
> so the host kernel can multiplex host-wide, host-user, and the
> guest on available resources.
>
On Thu, 2011-11-10 at 14:57 +0200, Gleb Natapov wrote:
> +
> + /* disable event that reported as not presend by cpuid */
> + for_each_set_bit(bit, x86_pmu.events_mask,
> + min(x86_pmu.events_mask_len, x86_pmu.max_events))
> + intel_perfmon_event_map[i
On 11/14/2011 11:20 AM, Takuya Yoshikawa wrote:
> This is a revised version of my previous work. I hope that
> the patches are more self explanatory than before.
>
>
Thanks, applied.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line
On 11/16/2011 10:45 PM, Alex Williamson wrote:
> These patches are all independent. Patch 1 & 2 fix serious
> usability bugs. Patches 3-6 are more subtle things that
> Markus was able to find with Coverity.
>
> Patch 1 fixes https://bugs.launchpad.net/qemu/+bug/875723
>
> I also tested https://bu
On 11/17/2011 08:56 AM, Sasha Levin wrote:
> On Thu, 2011-11-17 at 08:53 +0200, Pekka Enberg wrote:
> > On Thu, Nov 17, 2011 at 8:07 AM, Sasha Levin
> > wrote:
> > >> Also, when I start the guest I sometimes get the following error message:
> > >>
> > >> # kvm run -k /path/to/bzImage-3.0.8 -m 2
vmx_load_host_state() does not handle msrs switching (except
MSR_KERNEL_GS_BASE) since commit 26bb0981b3f. Remove call to it
where it is no longer make sense.
Signed-off-by: Gleb Natapov
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index a6535ba..e5f73f3 100644
--- a/arch/x86/kvm/vmx.c
++
79 matches
Mail list logo