-Original Message-
From: kvm-ppc-ow...@vger.kernel.org [mailto:kvm-ppc-ow...@vger.kernel.org] On
Behalf Of Alexander Graf
Sent: Thursday, March 07, 2013 4:17 PM
To: Wood Scott-B07421
Cc: Bhushan Bharat-R65777; kvm-...@vger.kernel.org; kvm@vger.kernel.org;
Bhushan
Bharat-R65777
On Wed, Mar 13, 2013 at 04:06:41PM +0100, Jan Kiszka wrote:
We will need EFER.LMA saving to provide unrestricted guest mode. All
what is missing for this is picking up EFER.LMA from VM_ENTRY_CONTROLS
on L2-L1 switches. If the host does not support EFER.LMA saving,
no change is performed,
On Wed, Mar 13, 2013 at 11:31:24AM +0100, Jan Kiszka wrote:
Provided the host has this feature, it's straightforward to offer it to
the guest as well. We just need to load to timer value on L2 entry if
the feature was enabled by L1 and watch out for the corresponding exit
reason.
On Tue, Mar 12, 2013 at 05:43:33PM +0900, Takuya Yoshikawa wrote:
This is only for mmio spte zapping, not for all zap_all() cases.
Takuya Yoshikawa (2):
KVM: MMU: Mark sp mmio cached when creating mmio spte
KVM: x86: Optimize mmio spte zapping when creating/moving memslot
Il 14/03/2013 03:07, Asias He ha scritto:
On Wed, Mar 13, 2013 at 09:56:41AM +0100, Paolo Bonzini wrote:
Il 13/03/2013 08:34, Asias He ha scritto:
Currently, vs-vs_endpoint is used indicate if the endpoint is setup or
not. It is set or cleared in vhost_scsi_set_endpoint() or
On 13 March 2013 20:34, Christopher Covington c...@codeaurora.org wrote:
My guess at the goal of the code cited above in this email is that it's trying
to sanity check that virtualization will work. Rather than taking a default
deny approach with a hand-maintained white list of
On Thu, Mar 14, 2013 at 09:37:23AM +0100, Paolo Bonzini wrote:
Il 14/03/2013 03:07, Asias He ha scritto:
On Wed, Mar 13, 2013 at 09:56:41AM +0100, Paolo Bonzini wrote:
Il 13/03/2013 08:34, Asias He ha scritto:
Currently, vs-vs_endpoint is used indicate if the endpoint is setup or
not. It
On Thu, Mar 14, 2013 at 12:25:14PM +0800, Asias He wrote:
On Tue, Mar 12, 2013 at 02:29:40PM +0800, Asias He wrote:
This is on top of Paolo and Nick's work.
Current status:
Works now (guest boots fine, no hang any more) with seabios's virtio-scsi
disabled.
Rebased to latest
On Thu, Mar 14, 2013 at 05:25:42PM +0800, Asias He wrote:
On Thu, Mar 14, 2013 at 12:25:14PM +0800, Asias He wrote:
On Tue, Mar 12, 2013 at 02:29:40PM +0800, Asias He wrote:
This is on top of Paolo and Nick's work.
Current status:
Works now (guest boots fine, no hang any more) with
--- 8 --- seabios patch:
diff --git a/src/virtio-scsi.c b/src/virtio-scsi.c
index 879ddfb..4de1255 100644
--- a/src/virtio-scsi.c
+++ b/src/virtio-scsi.c
@@ -147,6 +147,9 @@ init_virtio_scsi(struct pci_device *pci)
goto fail;
}
+
On 2013-03-14 01:08, Marcelo Tosatti wrote:
On Wed, Mar 13, 2013 at 12:42:34PM +0100, Jan Kiszka wrote:
A VCPU sending INIT or SIPI to some other VCPU races for setting the
remote VCPU's mp_state. When we were unlucky, KVM_MP_STATE_INIT_RECEIVED
was overwritten by kvm_emulate_halt and, thus,
On Thu, Mar 14, 2013 at 11:00:24AM +0100, Paolo Bonzini wrote:
--- 8 --- seabios patch:
diff --git a/src/virtio-scsi.c b/src/virtio-scsi.c
index 879ddfb..4de1255 100644
--- a/src/virtio-scsi.c
+++ b/src/virtio-scsi.c
@@ -147,6 +147,9 @@ init_virtio_scsi(struct
On 13/03/13 18:30, Christopher Covington wrote:
Hi Christopher,
I wonder if two of these registers could be handled in a generic fashion.
[...]
What's A57-specific about this MPIDR behavior?
[...]
What's A57-specific about this CPACR behavior?
In both cases, nothing I can think of. They
https://bugzilla.kernel.org/show_bug.cgi?id=55201
Gleb g...@redhat.com changed:
What|Removed |Added
CC||g...@redhat.com
--- Comment #3
On Thu, Mar 14, 2013 at 11:15:02AM +0100, Jan Kiszka wrote:
On 2013-03-14 01:08, Marcelo Tosatti wrote:
On Wed, Mar 13, 2013 at 12:42:34PM +0100, Jan Kiszka wrote:
A VCPU sending INIT or SIPI to some other VCPU races for setting the
remote VCPU's mp_state. When we were unlucky,
On 2013-03-14 11:15, Jan Kiszka wrote:
- if (unlikely(vcpu-arch.mp_state == KVM_MP_STATE_SIPI_RECEIVED)) {
- pr_debug(vcpu %d received sipi with vector # %x\n,
-vcpu-vcpu_id, vcpu-arch.sipi_vector);
- kvm_lapic_reset(vcpu);
-
On 14.03.2013, at 06:18, Bhushan Bharat-R65777 wrote:
-Original Message-
From: Alexander Graf [mailto:ag...@suse.de]
Sent: Thursday, March 07, 2013 7:09 PM
To: Bhushan Bharat-R65777
Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.org; Wood Scott-B07421; Bhushan
Bharat-R65777
On 14.03.2013, at 05:50, Bhushan Bharat-R65777 wrote:
-Original Message-
From: Alexander Graf [mailto:ag...@suse.de]
Sent: Thursday, March 07, 2013 6:56 PM
To: Bhushan Bharat-R65777
Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.org; Wood Scott-B07421; Bhushan
Bharat-R65777
On 14.03.2013, at 05:42, Bhushan Bharat-R65777 wrote:
-Original Message-
From: Alexander Graf [mailto:ag...@suse.de]
Sent: Thursday, March 07, 2013 6:51 PM
To: Bhushan Bharat-R65777
Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.org; Wood Scott-B07421; Bhushan
Bharat-R65777
On 14.03.2013, at 05:30, Bhushan Bharat-R65777 wrote:
-Original Message-
From: Alexander Graf [mailto:ag...@suse.de]
Sent: Thursday, March 07, 2013 6:38 PM
To: Bhushan Bharat-R65777
Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.org; Wood Scott-B07421; Bhushan
Bharat-R65777
On 2013-03-14 12:54, Alexander Graf wrote:
On 14.03.2013, at 05:42, Bhushan Bharat-R65777 wrote:
-Original Message-
From: Alexander Graf [mailto:ag...@suse.de]
Sent: Thursday, March 07, 2013 6:51 PM
To: Bhushan Bharat-R65777
Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.org;
On 14.03.2013, at 12:57, Jan Kiszka wrote:
On 2013-03-14 12:54, Alexander Graf wrote:
On 14.03.2013, at 05:42, Bhushan Bharat-R65777 wrote:
-Original Message-
From: Alexander Graf [mailto:ag...@suse.de]
Sent: Thursday, March 07, 2013 6:51 PM
To: Bhushan Bharat-R65777
Cc:
On Thu, Mar 14, 2013 at 12:29:48PM +0100, Jan Kiszka wrote:
On 2013-03-14 11:15, Jan Kiszka wrote:
- if (unlikely(vcpu-arch.mp_state == KVM_MP_STATE_SIPI_RECEIVED)) {
- pr_debug(vcpu %d received sipi with vector # %x\n,
- vcpu-vcpu_id, vcpu-arch.sipi_vector);
On 2013-03-14 13:09, Alexander Graf wrote:
On 14.03.2013, at 12:57, Jan Kiszka wrote:
On 2013-03-14 12:54, Alexander Graf wrote:
On 14.03.2013, at 05:42, Bhushan Bharat-R65777 wrote:
-Original Message-
From: Alexander Graf [mailto:ag...@suse.de]
Sent: Thursday, March 07, 2013
On 2013-03-14 13:12, Gleb Natapov wrote:
On Thu, Mar 14, 2013 at 12:29:48PM +0100, Jan Kiszka wrote:
On 2013-03-14 11:15, Jan Kiszka wrote:
- if (unlikely(vcpu-arch.mp_state == KVM_MP_STATE_SIPI_RECEIVED)) {
- pr_debug(vcpu %d received sipi with vector # %x\n,
-
On Thu, Mar 14, 2013 at 01:16:41PM +0100, Jan Kiszka wrote:
On 2013-03-14 13:12, Gleb Natapov wrote:
On Thu, Mar 14, 2013 at 12:29:48PM +0100, Jan Kiszka wrote:
On 2013-03-14 11:15, Jan Kiszka wrote:
- if (unlikely(vcpu-arch.mp_state ==
KVM_MP_STATE_SIPI_RECEIVED)) {
-
On 14.03.2013, at 13:13, Jan Kiszka wrote:
On 2013-03-14 13:09, Alexander Graf wrote:
On 14.03.2013, at 12:57, Jan Kiszka wrote:
On 2013-03-14 12:54, Alexander Graf wrote:
On 14.03.2013, at 05:42, Bhushan Bharat-R65777 wrote:
-Original Message-
From: Alexander Graf
On 2013-03-14 13:19, Alexander Graf wrote:
On 14.03.2013, at 13:13, Jan Kiszka wrote:
On 2013-03-14 13:09, Alexander Graf wrote:
On 14.03.2013, at 12:57, Jan Kiszka wrote:
On 2013-03-14 12:54, Alexander Graf wrote:
On 14.03.2013, at 05:42, Bhushan Bharat-R65777 wrote:
-Original
On 2013-03-14 13:18, Gleb Natapov wrote:
On Thu, Mar 14, 2013 at 01:16:41PM +0100, Jan Kiszka wrote:
On 2013-03-14 13:12, Gleb Natapov wrote:
On Thu, Mar 14, 2013 at 12:29:48PM +0100, Jan Kiszka wrote:
On 2013-03-14 11:15, Jan Kiszka wrote:
- if (unlikely(vcpu-arch.mp_state ==
On 14.03.2013, at 13:22, Jan Kiszka wrote:
On 2013-03-14 13:19, Alexander Graf wrote:
On 14.03.2013, at 13:13, Jan Kiszka wrote:
On 2013-03-14 13:09, Alexander Graf wrote:
On 14.03.2013, at 12:57, Jan Kiszka wrote:
On 2013-03-14 12:54, Alexander Graf wrote:
On 14.03.2013, at
On Thu, Mar 14, 2013 at 01:25:04PM +0100, Jan Kiszka wrote:
On 2013-03-14 13:18, Gleb Natapov wrote:
On Thu, Mar 14, 2013 at 01:16:41PM +0100, Jan Kiszka wrote:
On 2013-03-14 13:12, Gleb Natapov wrote:
On Thu, Mar 14, 2013 at 12:29:48PM +0100, Jan Kiszka wrote:
On 2013-03-14 11:15, Jan
Windows-host with disabled TX-checksum offloading may send
packets with tcp-checksum=0x. Most likely it is caused
by by Windows algorithm for computing incremental checksum
- see RFC 1624.
RFC1624 (sec.5) states that 0x and 0x are equal, because
for example
0xCD7A + 0x3285 + 0x =
Dmitry Skorodumov sdmitry at parallels.com writes:
Windows-host with disabled TX-checksum offloading may send
packets with tcp-checksum=0x. Most likely it is caused
by by Windows algorithm for computing incremental checksum
- see RFC 1624.
Forgot to mention that packets with checksum
-Original Message-
From: kvm-ppc-ow...@vger.kernel.org [mailto:kvm-ppc-ow...@vger.kernel.org] On
Behalf Of Alexander Graf
Sent: Thursday, March 14, 2013 5:20 PM
To: Bhushan Bharat-R65777
Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.org; Wood Scott-B07421
Subject: Re: [PATCH 7/7]
On Wed, Mar 13, 2013 at 05:53:45PM +0100, Jan Kiszka wrote:
If we are in guest mode, L0 can only inject events into L2 if L1 has
nothing pending. Otherwise, L0 would overwrite L1's events and they
would get lost. This check is conceptually independent of
nested_exit_on_intr.
If L1 traps
On Thu, Mar 14, 2013 at 11:15:02AM +0100, Jan Kiszka wrote:
On 2013-03-14 01:08, Marcelo Tosatti wrote:
On Wed, Mar 13, 2013 at 12:42:34PM +0100, Jan Kiszka wrote:
A VCPU sending INIT or SIPI to some other VCPU races for setting the
remote VCPU's mp_state. When we were unlucky,
-Original Message-
From: Alexander Graf [mailto:ag...@suse.de]
Sent: Thursday, March 07, 2013 6:56 PM
To: Bhushan Bharat-R65777
Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.org; Wood Scott-B07421;
Bhushan
Bharat-R65777
Subject: Re: [PATCH 4/7] booke: Save and restore debug
vmx_vcpu_reset may now be called while already holding the srcu lock, so
we may overwrite what was already saved there. Also, we lock and unlock
in the same context, thus there was no need to save to the vcpu anyway.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
Marcelo just suggested
On Thu, Mar 14, 2013 at 11:32:59AM -0300, Marcelo Tosatti wrote:
Also the fact kvm_apic_accept_events() is called from sites is annoying,
why is that necessary again?
- to avoid having pending events in the APIC when delivering mp_state
to user space
- to keep mp_state correct
On Thu, Mar 14, 2013 at 03:52:11PM +0100, Jan Kiszka wrote:
vmx_vcpu_reset may now be called while already holding the srcu lock, so
we may overwrite what was already saved there. Also, we lock and unlock
in the same context, thus there was no need to save to the vcpu anyway.
Signed-off-by:
Hello,
have been trying to build a virtual firewall as a POC but having some
difficulty with the networking aspect. On the physical server I have a single
NIC that is connected to the Internet with the IP XXX.XXX.XXX.10 and is bound
to bridge0. I created the first guest, as the firewall, and
On 2013-03-14 16:00, Gleb Natapov wrote:
On Thu, Mar 14, 2013 at 03:52:11PM +0100, Jan Kiszka wrote:
vmx_vcpu_reset may now be called while already holding the srcu lock, so
we may overwrite what was already saved there. Also, we lock and unlock
in the same context, thus there was no need to
Il 14/03/2013 16:03, Jan Kiszka ha scritto:
vcpu-srcu_idx = srcu_read_lock()
idx = srcu_read_lock(vcpu-kvm-srcu);
srcu_read_unlock(vcpu-kvm-srcu, vcpu-srcu_idx);
vcpu-srcu_idx = srcu_read_lock(vcpu-kvm-srcu);
srcu_read_unlock(vcpu-kvm-srcu, idx);
Hello everybody,
I get read timeout from smart card read by USB passthrough on Centos 6.4
VM with KVM virtualization.
I am using KVM 1.2.0 and kernel 3.2.28 on Centos 5 host machine.
On VM i have installed:
kernel-2.6.32-358.el6.x86_64
libusb-0.1.12-23.el6.x86_64
On Thu, Mar 14, 2013 at 04:08:42PM +0100, Paolo Bonzini wrote:
Il 14/03/2013 16:03, Jan Kiszka ha scritto:
vcpu-srcu_idx = srcu_read_lock()
idx = srcu_read_lock(vcpu-kvm-srcu);
srcu_read_unlock(vcpu-kvm-srcu, vcpu-srcu_idx);
vcpu-srcu_idx = srcu_read_lock(vcpu-kvm-srcu);
On 2013-03-14 16:08, Paolo Bonzini wrote:
Il 14/03/2013 16:03, Jan Kiszka ha scritto:
vcpu-srcu_idx = srcu_read_lock()
idx = srcu_read_lock(vcpu-kvm-srcu);
srcu_read_unlock(vcpu-kvm-srcu, vcpu-srcu_idx);
vcpu-srcu_idx = srcu_read_lock(vcpu-kvm-srcu);
On Wed, Mar 13, 2013 at 05:53:45PM +0100, Jan Kiszka wrote:
If we are in guest mode, L0 can only inject events into L2 if L1 has
nothing pending. Otherwise, L0 would overwrite L1's events and they
would get lost. This check is conceptually independent of
nested_exit_on_intr.
If L1 traps
On 2013-03-14 16:12, Gleb Natapov wrote:
On Wed, Mar 13, 2013 at 05:53:45PM +0100, Jan Kiszka wrote:
If we are in guest mode, L0 can only inject events into L2 if L1 has
nothing pending. Otherwise, L0 would overwrite L1's events and they
would get lost. This check is conceptually independent
- Original Message -
From: Phil Daws ux...@splatnix.net
To: kvm@vger.kernel.org
Sent: Thursday, March 14, 2013 10:53:43 AM
Subject: Virtual Firewall
Hello,
have been trying to build a virtual firewall as a POC but having some
difficulty with the networking aspect. On the
On 2013-03-14 13:28, Gleb Natapov wrote:
On Thu, Mar 14, 2013 at 01:25:04PM +0100, Jan Kiszka wrote:
On 2013-03-14 13:18, Gleb Natapov wrote:
On Thu, Mar 14, 2013 at 01:16:41PM +0100, Jan Kiszka wrote:
On 2013-03-14 13:12, Gleb Natapov wrote:
On Thu, Mar 14, 2013 at 12:29:48PM +0100, Jan
On 2013-03-14 14:59, Gleb Natapov wrote:
On Wed, Mar 13, 2013 at 05:53:45PM +0100, Jan Kiszka wrote:
If we are in guest mode, L0 can only inject events into L2 if L1 has
nothing pending. Otherwise, L0 would overwrite L1's events and they
would get lost. This check is conceptually independent
On Thu, Mar 14, 2013 at 04:24:18PM +0100, Jan Kiszka wrote:
On 2013-03-14 16:12, Gleb Natapov wrote:
On Wed, Mar 13, 2013 at 05:53:45PM +0100, Jan Kiszka wrote:
If we are in guest mode, L0 can only inject events into L2 if L1 has
nothing pending. Otherwise, L0 would overwrite L1's events
On 2013-03-14 16:37, Gleb Natapov wrote:
On Thu, Mar 14, 2013 at 04:24:18PM +0100, Jan Kiszka wrote:
On 2013-03-14 16:12, Gleb Natapov wrote:
On Wed, Mar 13, 2013 at 05:53:45PM +0100, Jan Kiszka wrote:
If we are in guest mode, L0 can only inject events into L2 if L1 has
nothing pending.
Il 14/03/2013 16:11, Gleb Natapov ha scritto:
On Thu, Mar 14, 2013 at 04:08:42PM +0100, Paolo Bonzini wrote:
Il 14/03/2013 16:03, Jan Kiszka ha scritto:
vcpu-srcu_idx = srcu_read_lock()
idx = srcu_read_lock(vcpu-kvm-srcu);
srcu_read_unlock(vcpu-kvm-srcu, vcpu-srcu_idx);
On Thu, Mar 14, 2013 at 04:32:16PM +0100, Jan Kiszka wrote:
On 2013-03-14 13:28, Gleb Natapov wrote:
On Thu, Mar 14, 2013 at 01:25:04PM +0100, Jan Kiszka wrote:
On 2013-03-14 13:18, Gleb Natapov wrote:
On Thu, Mar 14, 2013 at 01:16:41PM +0100, Jan Kiszka wrote:
On 2013-03-14 13:12, Gleb
- Original Message -
From: Andrew Cathrow acath...@redhat.com
To: Phil Daws ux...@splatnix.net
Cc: kvm@vger.kernel.org
Sent: Thursday, 14 March, 2013 3:30:50 PM
Subject: Re: Virtual Firewall
- Original Message -
This is well supported in libvirt [1]
If you don't want to use
On 03/14/2013 08:57:53 AM, Bhushan Bharat-R65777 wrote:
diff --git a/arch/powerpc/kvm/e500mc.c
b/arch/powerpc/kvm/e500mc.c
index 1f89d26..f5fc6f5 100644
--- a/arch/powerpc/kvm/e500mc.c
+++ b/arch/powerpc/kvm/e500mc.c
@@ -182,8 +182,7 @@ int kvmppc_core_vcpu_setup(struct kvm_vcpu
-Original Message-
From: Wood Scott-B07421
Sent: Thursday, March 14, 2013 9:36 PM
To: Bhushan Bharat-R65777
Cc: Alexander Graf; kvm-...@vger.kernel.org; kvm@vger.kernel.org; Wood Scott-
B07421
Subject: Re: [PATCH 7/7] KVM: PPC: Add userspace debug stub support
On 03/14/2013
On 03/13/2013 08:26:20 PM, Paul Mackerras wrote:
On Wed, Mar 13, 2013 at 07:14:48PM -0500, Scott Wood wrote:
On 03/08/2013 05:04:30 AM, Alexander Graf wrote:
Am 08.03.2013 um 11:37 schrieb Paul Mackerras pau...@samba.org:
On Thu, Mar 07, 2013 at 03:00:52PM +0100, Alexander Graf wrote:
On 03/13/2013 08:20:44 PM, Paul Mackerras wrote:
Setting this capability on a vcpu connects that vcpu to an interrupt
controller device. The args[0] field of the argument kvm_enable_cap
struct specifies the overall architecture of the interrupt
controller. The args[1] field specifies the CPU
On 14.03.2013, at 19:20, Scott Wood wrote:
On 03/13/2013 08:20:44 PM, Paul Mackerras wrote:
Setting this capability on a vcpu connects that vcpu to an interrupt
controller device. The args[0] field of the argument kvm_enable_cap
struct specifies the overall architecture of the interrupt
On 03/14/2013 01:33:30 PM, Alexander Graf wrote:
On 14.03.2013, at 19:20, Scott Wood wrote:
On 03/13/2013 08:20:44 PM, Paul Mackerras wrote:
Setting this capability on a vcpu connects that vcpu to an
interrupt
controller device. The args[0] field of the argument
kvm_enable_cap
struct
On 14.03.2013, at 19:35, Scott Wood wrote:
On 03/14/2013 01:33:30 PM, Alexander Graf wrote:
On 14.03.2013, at 19:20, Scott Wood wrote:
On 03/13/2013 08:20:44 PM, Paul Mackerras wrote:
Setting this capability on a vcpu connects that vcpu to an interrupt
controller device. The args[0]
Hello.
On 14-03-2013 4:59, Alexander Graf wrote:
When running on an exynos 5250 SoC, we don't initialize the architected
timers. The chip however supports architected timers.
When we don't initialize them, KVM will try to access them and run into
NULL pointer dereferences attempting to do
On 03/14/2013 02:03:30 PM, Alexander Graf wrote:
On 14.03.2013, at 19:35, Scott Wood wrote:
On 03/14/2013 01:33:30 PM, Alexander Graf wrote:
On 14.03.2013, at 19:20, Scott Wood wrote:
On 03/13/2013 08:20:44 PM, Paul Mackerras wrote:
Setting this capability on a vcpu connects that vcpu to
On Thu, Mar 14, 2013 at 05:00:04PM +0200, Gleb Natapov wrote:
On Thu, Mar 14, 2013 at 03:52:11PM +0100, Jan Kiszka wrote:
vmx_vcpu_reset may now be called while already holding the srcu lock, so
we may overwrite what was already saved there. Also, we lock and unlock
in the same context,
On 2013-03-14 20:14, Marcelo Tosatti wrote:
On Thu, Mar 14, 2013 at 05:00:04PM +0200, Gleb Natapov wrote:
On Thu, Mar 14, 2013 at 03:52:11PM +0100, Jan Kiszka wrote:
vmx_vcpu_reset may now be called while already holding the srcu lock, so
we may overwrite what was already saved there. Also, we
vmx_vcpu_reset may now be called while already holding the srcu lock, so
we may overwrite what was already saved there. Save and restore it.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
Even if this should be unneeded, it looks more consistent. In any case,
all versions on the table,
On Thu, Mar 14, 2013 at 08:20:26PM +0100, Jan Kiszka wrote:
Not sure this is valid.
The lock/unlocks must be paired.
Did you find out more than what Paolo reported?
/**
* srcu_read_unlock - unregister a old reader from an SRCU-protected
* structure.
* @sp: srcu_struct in which to
On 14.03.2013, at 20:10, Scott Wood wrote:
On 03/14/2013 02:03:30 PM, Alexander Graf wrote:
On 14.03.2013, at 19:35, Scott Wood wrote:
On 03/14/2013 01:33:30 PM, Alexander Graf wrote:
On 14.03.2013, at 19:20, Scott Wood wrote:
On 03/13/2013 08:20:44 PM, Paul Mackerras wrote:
Setting
The vfio drivers call kmalloc or kzalloc, but do not
include linux/slab.h, which causes build errors on
ARM.
Signed-off-by: Arnd Bergmann a...@arndb.de
Cc: Alex Williamson alex.william...@redhat.com
Cc: kvm@vger.kernel.org
---
Please apply for 3.9
drivers/vfio/pci/vfio_pci_config.c | 1 +
On Thu, Mar 14, 2013 at 01:15:35PM -0500, Scott Wood wrote:
On 03/13/2013 08:26:20 PM, Paul Mackerras wrote:
I arbitrarily
assigned 0x58494353 for KVM_CAP_IRQ_XICS as the args[0] value to
indicate XICS.
Why is it called KVM_CAP_whatever if it's not a capability?
Because it's associated
On Thu, Mar 14, 2013 at 01:20:38PM -0500, Scott Wood wrote:
On 03/13/2013 08:20:44 PM, Paul Mackerras wrote:
--- a/arch/powerpc/include/asm/kvm_host.h
+++ b/arch/powerpc/include/asm/kvm_host.h
@@ -373,6 +373,9 @@ struct kvmppc_booke_debug_reg {
struct kvm_vcpu_arch {
ulong host_stack;
On Thu, Mar 14, 2013 at 08:03:30PM +0100, Alexander Graf wrote:
On 14.03.2013, at 19:35, Scott Wood wrote:
On 03/14/2013 01:33:30 PM, Alexander Graf wrote:
We also want int pic_fd, no?
Not sure we really need that on the vcpu. We'll need it on the vm unless
we add it as an arg to
On 03/14/2013 05:28:03 PM, Paul Mackerras wrote:
On Thu, Mar 14, 2013 at 08:03:30PM +0100, Alexander Graf wrote:
On 14.03.2013, at 19:35, Scott Wood wrote:
On 03/14/2013 01:33:30 PM, Alexander Graf wrote:
We also want int pic_fd, no?
Not sure we really need that on the vcpu. We'll
On 03/14/2013 05:19:17 PM, Paul Mackerras wrote:
On Thu, Mar 14, 2013 at 01:20:38PM -0500, Scott Wood wrote:
On 03/13/2013 08:20:44 PM, Paul Mackerras wrote:
--- a/arch/powerpc/include/asm/kvm_host.h
+++ b/arch/powerpc/include/asm/kvm_host.h
@@ -373,6 +373,9 @@ struct kvmppc_booke_debug_reg
On 14.03.2013, at 23:02, Paul Mackerras wrote:
On Thu, Mar 14, 2013 at 01:15:35PM -0500, Scott Wood wrote:
On 03/13/2013 08:26:20 PM, Paul Mackerras wrote:
I arbitrarily
assigned 0x58494353 for KVM_CAP_IRQ_XICS as the args[0] value to
indicate XICS.
Why is it called KVM_CAP_whatever if
On 03/14/2013 05:44:39 PM, Alexander Graf wrote:
On 14.03.2013, at 23:02, Paul Mackerras wrote:
On Thu, Mar 14, 2013 at 01:15:35PM -0500, Scott Wood wrote:
On 03/13/2013 08:26:20 PM, Paul Mackerras wrote:
I arbitrarily
assigned 0x58494353 for KVM_CAP_IRQ_XICS as the args[0] value to
The new context tracking subsystem unconditionally includes kvm_host.h
headers for the guest enter/exit macros. This causes a compile
failure when KVM is not enabled.
Fix by adding an IS_ENABLED(CONFIG_KVM) check to kvm_host so it can
be included/compiled even when KVM is not enabled.
Cc:
On Thu, Mar 14, 2013 at 11:46:43AM +0200, Michael S. Tsirkin wrote:
On Thu, Mar 14, 2013 at 05:25:42PM +0800, Asias He wrote:
On Thu, Mar 14, 2013 at 12:25:14PM +0800, Asias He wrote:
On Tue, Mar 12, 2013 at 02:29:40PM +0800, Asias He wrote:
This is on top of Paolo and Nick's work.
On Thu, Mar 14, 2013 at 11:00:24AM +0100, Paolo Bonzini wrote:
--- 8 --- seabios patch:
diff --git a/src/virtio-scsi.c b/src/virtio-scsi.c
index 879ddfb..4de1255 100644
--- a/src/virtio-scsi.c
+++ b/src/virtio-scsi.c
@@ -147,6 +147,9 @@ init_virtio_scsi(struct
Hello Nicholas Michael,
Could any of you pick this series up?
Changes in v3
- Add more comments
Changes in v2
- Use vq-private_data insteadof vs-vs_endpoint
- Add label in vhost_scsi_clear_endpoint to simply unlock code.
Asias He (3):
tcm_vhost: Add missed lock in
tv_tpg-tv_tpg_vhost_count should be protected by tv_tpg-tv_tpg_mutex.
Signed-off-by: Asias He as...@redhat.com
Reviewed-by: Stefan Hajnoczi stefa...@redhat.com
Reviewed-by: Paolo Bonzini pbonz...@redhat.com
---
drivers/vhost/tcm_vhost.c | 12
1 file changed, 8 insertions(+), 4
We also need to flush the vhost_works. It is the completion vhost_work
currently.
Signed-off-by: Asias He as...@redhat.com
Reviewed-by: Stefan Hajnoczi stefa...@redhat.com
Reviewed-by: Paolo Bonzini pbonz...@redhat.com
---
drivers/vhost/tcm_vhost.c | 1 +
1 file changed, 1 insertion(+)
diff
Currently, vs-vs_endpoint is used indicate if the endpoint is setup or
not. It is set or cleared in vhost_scsi_set_endpoint() or
vhost_scsi_clear_endpoint() under the vs-dev.mutex lock. However, when
we check it in vhost_scsi_handle_vq(), we ignored the lock, this is
wrong.
Instead of using the
Asias He (2):
virtio-scsi: Set _DRIVER_OK flag before scsi target scanning
virtio-scsi: Pack struct virtio_scsi_{req_cmd,resp_cmd}
src/virtio-scsi.c | 5 +++--
src/virtio-scsi.h | 4 ++--
2 files changed, 5 insertions(+), 4 deletions(-)
--
1.8.1.4
--
To unsubscribe from this list: send
Before we start scsi target scanning, we need to set the
VIRTIO_CONFIG_S_DRIVER_OK flag so the device can do setup properly.
This fix a bug when booting tcm_vhost with seabios.
Signed-off-by: Asias He as...@redhat.com
Acked-by: Paolo Bonzini pbonz...@redhat.com
---
src/virtio-scsi.c | 5 +++--
Device needs the exact size of these data structure. Prevent padding.
This fixes guest hang when booting seabios + tcm_vhost.
Signed-off-by: Asias He as...@redhat.com
---
src/virtio-scsi.h | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/src/virtio-scsi.h
ARCH=mips, config=fuloong2e_defconfig:
akpm3:/usr/src/25 make arch/mips/kernel/early_printk.o
...
CC arch/mips/kernel/asm-offsets.s
In file included from arch/mips/kernel/asm-offsets.c:20:
include/linux/kvm_host.h:334: error: `KVM_USER_MEM_SLOTS' undeclared here (not
in a function)
- Rename KVM_MEMORY_SLOTS - KVM_USER_MEM_SLOTS
- Fix kvm_arch_{prepare,commit}_memory_region()
- Also remove kvm_arch_set_memory_region which was unused.
Signed-off-by: Sanjay Lal sanj...@kymasys.com
---
arch/mips/include/asm/kvm_host.h | 2 +-
arch/mips/kvm/kvm_mips.c | 12 ++--
https://bugzilla.kernel.org/show_bug.cgi?id=55201
--- Comment #4 from Marcelo Tosatti mtosa...@redhat.com 2013-03-15 02:26:12
---
Created an attachment (id=95451)
-- (https://bugzilla.kernel.org/attachment.cgi?id=95451)
kvm-fix-inprogress-clock-update-deadlock.patch
--
Configure bugmail:
https://bugzilla.kernel.org/show_bug.cgi?id=55201
Marcelo Tosatti mtosa...@redhat.com changed:
What|Removed |Added
CC||mtosa...@redhat.com
Ingo Molnar wrote on 2013-03-08:
* Gleb Natapov g...@redhat.com wrote:
On Fri, Mar 08, 2013 at 03:05:45PM +0100, Ingo Molnar wrote:
* Gleb Natapov g...@redhat.com wrote:
On Fri, Mar 08, 2013 at 02:26:25PM +0100, Ingo Molnar wrote:
* Yang Zhang yang.z.zh...@intel.com wrote:
diff
https://bugzilla.kernel.org/show_bug.cgi?id=55201
--- Comment #6 from Jay Ren yongjie@intel.com 2013-03-15 02:45:02 ---
(In reply to comment #5)
Jay Ren, would you please confirm whether the attached patch fixes the
problem.
Sure, I'll give the feedback when I get the testing result.
-Original Message-
From: kvm-ppc-ow...@vger.kernel.org [mailto:kvm-ppc-ow...@vger.kernel.org] On
Behalf Of Alexander Graf
Sent: Thursday, March 07, 2013 4:17 PM
To: Wood Scott-B07421
Cc: Bhushan Bharat-R65777; kvm-ppc@vger.kernel.org; k...@vger.kernel.org;
Bhushan
Bharat-R65777
On 14.03.2013, at 05:50, Bhushan Bharat-R65777 wrote:
-Original Message-
From: Alexander Graf [mailto:ag...@suse.de]
Sent: Thursday, March 07, 2013 6:56 PM
To: Bhushan Bharat-R65777
Cc: kvm-ppc@vger.kernel.org; k...@vger.kernel.org; Wood Scott-B07421; Bhushan
Bharat-R65777
On 14.03.2013, at 05:42, Bhushan Bharat-R65777 wrote:
-Original Message-
From: Alexander Graf [mailto:ag...@suse.de]
Sent: Thursday, March 07, 2013 6:51 PM
To: Bhushan Bharat-R65777
Cc: kvm-ppc@vger.kernel.org; k...@vger.kernel.org; Wood Scott-B07421; Bhushan
Bharat-R65777
On 14.03.2013, at 05:30, Bhushan Bharat-R65777 wrote:
-Original Message-
From: Alexander Graf [mailto:ag...@suse.de]
Sent: Thursday, March 07, 2013 6:38 PM
To: Bhushan Bharat-R65777
Cc: kvm-ppc@vger.kernel.org; k...@vger.kernel.org; Wood Scott-B07421; Bhushan
Bharat-R65777
On 2013-03-14 13:09, Alexander Graf wrote:
On 14.03.2013, at 12:57, Jan Kiszka wrote:
On 2013-03-14 12:54, Alexander Graf wrote:
On 14.03.2013, at 05:42, Bhushan Bharat-R65777 wrote:
-Original Message-
From: Alexander Graf [mailto:ag...@suse.de]
Sent: Thursday, March 07, 2013
On 14.03.2013, at 13:13, Jan Kiszka wrote:
On 2013-03-14 13:09, Alexander Graf wrote:
On 14.03.2013, at 12:57, Jan Kiszka wrote:
On 2013-03-14 12:54, Alexander Graf wrote:
On 14.03.2013, at 05:42, Bhushan Bharat-R65777 wrote:
-Original Message-
From: Alexander Graf
1 - 100 of 119 matches
Mail list logo