On Fri, May 03, 2013 at 10:21:09AM -0700, David Daney wrote:
On 05/03/2013 03:51 AM, Gleb Natapov wrote:
Hi David,
On Thu, May 02, 2013 at 10:48:36PM -0300, Marcelo Tosatti wrote:
On Thu, May 02, 2013 at 11:22:52AM -0700, David Daney wrote:
Hi,
I am working on the MIPS KVM port, and am
On 2013-04-30 14:42, Jan Kiszka wrote:
On 2013-04-30 13:46, Gleb Natapov wrote:
On Sun, Apr 28, 2013 at 12:20:38PM +0200, Jan Kiszka wrote:
On 2013-02-23 22:35, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
Likely a typo, but a fatal one as kvm_set_cr0 performs checks on the
On Tue, Apr 30, 2013 at 08:00:45PM -0500, Scott Wood wrote:
This API shouldn't have 32/64-bit issues, but VFS assumes it does
unless told otherwise.
Signed-off-by: Scott Wood scottw...@freescale.com
Applied, thanks.
---
virt/kvm/kvm_main.c |3 +++
1 file changed, 3 insertions(+)
On Fri, May 3, 2013 at 5:19 PM, Pekka Enberg penb...@kernel.org wrote:
On Wed, May 1, 2013 at 6:50 PM, Will Deacon will.dea...@arm.com wrote:
From: Marc Zyngier marc.zyng...@arm.com
Kvmtool suppresses any output to a console that has not been elected
as *the* console.
While this makes sense
Linus,
Please pull from
git://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/kvm-3.10-1
to receive the KVM updates for the 3.10 merge window.
Highlights of the updates are:
general:
- new emulated device API
- legacy device assignment is now optional
- irqfd interface is more generic and
From: Wei Yongjun yongjun_...@trendmicro.com.cn
Add the missing misc_deregister() before return from kvm_init()
in the debugfs init error handling case.
Signed-off-by: Wei Yongjun yongjun_...@trendmicro.com.cn
---
virt/kvm/kvm_main.c | 1 +
1 file changed, 1 insertion(+)
diff --git
On Fri, May 03, 2013 at 02:25:17PM +0800, Asias He wrote:
Free ubuf when vhost_dev_ioctl for VHOST_SET_OWNER fails.
Signed-off-by: Asias He as...@redhat.com
---
drivers/vhost/net.c | 20 ++--
1 file changed, 18 insertions(+), 2 deletions(-)
diff --git
Please, any help?
I'm currently in such a state I won't be able to sleep well before I
make some progress on this.
I've already described my situation quite precisly, if one needs even
more information, just ask.
I've now also tried with a separate img containing DUET, so I can use
the default
Necessary since memory region accessor assumes read and write
methods are registered. Otherwise reading I/O port 0x7e segfaults.
https://bugzilla.redhat.com/show_bug.cgi?id=954306
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/hw/i386/kvmvapic.c b/hw/i386/kvmvapic.c
index
On Fri, 2013-05-03 at 18:45 -0500, Scott Wood wrote:
kvmppc_lazy_ee_enable() was causing interrupts to be soft-enabled
(albeit hard-disabled) in kvmppc_restart_interrupt(). This led to
warnings, and possibly breakage if the interrupt state was later saved
and then restored (leading to
Actually E500MC also support doorbell exception, and CONFIG_PPC_E500MC
can cover BOOK3E/BOOK3E_64 as well.
Signed-off-by: Tiejun Chen tiejun.c...@windriver.com
---
arch/powerpc/kvm/booke.c |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/arch/powerpc/kvm/booke.c
For the external interrupt, the decrementer exception and the doorbell
excpetion, we also need to soft-disable interrupts while doing as host
interrupt handlers since the DO_KVM hook is always performed to skip
EXCEPTION_COMMON then miss this original chance with the 'ints' (INTS_DISABLE).
On 05/06/2013 11:10 AM, Tiejun Chen wrote:
For the external interrupt, the decrementer exception and the doorbell
excpetion, we also need to soft-disable interrupts while doing as host
interrupt handlers since the DO_KVM hook is always performed to skip
EXCEPTION_COMMON then miss this original
Asias He (2):
vhost: Export vhost_dev_set_owner
vhost-net: Free ubuf when vhost_dev_set_owner fails
drivers/vhost/net.c | 38 --
drivers/vhost/vhost.c | 2 +-
drivers/vhost/vhost.h | 1 +
3 files changed, 34 insertions(+), 7 deletions(-)
--
1.8.1.4
Signed-off-by: Asias He as...@redhat.com
---
drivers/vhost/vhost.c | 2 +-
drivers/vhost/vhost.h | 1 +
2 files changed, 2 insertions(+), 1 deletion(-)
diff --git a/drivers/vhost/vhost.c b/drivers/vhost/vhost.c
index 749b5ab..de9441a 100644
--- a/drivers/vhost/vhost.c
+++ b/drivers/vhost/vhost.c
Signed-off-by: Asias He as...@redhat.com
---
drivers/vhost/net.c | 38 --
1 file changed, 32 insertions(+), 6 deletions(-)
diff --git a/drivers/vhost/net.c b/drivers/vhost/net.c
index a3645bd..354665a 100644
--- a/drivers/vhost/net.c
+++ b/drivers/vhost/net.c
On Sun, May 05, 2013 at 04:50:07PM +0300, Michael S. Tsirkin wrote:
On Fri, May 03, 2013 at 02:25:17PM +0800, Asias He wrote:
Free ubuf when vhost_dev_ioctl for VHOST_SET_OWNER fails.
Signed-off-by: Asias He as...@redhat.com
---
drivers/vhost/net.c | 20 ++--
1 file
On Fri, May 03, 2013 at 06:59:18PM -0300, Marcelo Tosatti wrote:
On Fri, May 03, 2013 at 10:47:10AM +0800, Hu Tao wrote:
pvpanic device is a qemu simulated device through which guest panic
event is sent to host.
Signed-off-by: Hu Tao hu...@cn.fujitsu.com
---
On 05/04/2013 08:52 AM, Marcelo Tosatti wrote:
On Sat, May 04, 2013 at 12:51:06AM +0800, Xiao Guangrong wrote:
On 05/03/2013 11:53 PM, Marcelo Tosatti wrote:
On Fri, May 03, 2013 at 01:52:07PM +0800, Xiao Guangrong wrote:
On 05/03/2013 09:05 AM, Marcelo Tosatti wrote:
+
+/*
+ * Fast
-Original Message-
From: kvm-ow...@vger.kernel.org [mailto:kvm-ow...@vger.kernel.org] On Behalf
Of
Alexander Graf
Sent: Friday, May 03, 2013 6:48 PM
To: Bhushan Bharat-R65777
Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.org; Wood Scott-B07421
Subject: Re: [PATCH 7/7 v3] KVM:
On Fri, 2013-05-03 at 18:45 -0500, Scott Wood wrote:
kvmppc_lazy_ee_enable() was causing interrupts to be soft-enabled
(albeit hard-disabled) in kvmppc_restart_interrupt(). This led to
warnings, and possibly breakage if the interrupt state was later saved
and then restored (leading to
Actually E500MC also support doorbell exception, and CONFIG_PPC_E500MC
can cover BOOK3E/BOOK3E_64 as well.
Signed-off-by: Tiejun Chen tiejun.c...@windriver.com
---
arch/powerpc/kvm/booke.c |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/arch/powerpc/kvm/booke.c
For the external interrupt, the decrementer exception and the doorbell
excpetion, we also need to soft-disable interrupts while doing as host
interrupt handlers since the DO_KVM hook is always performed to skip
EXCEPTION_COMMON then miss this original chance with the 'ints' (INTS_DISABLE).
On 05/06/2013 11:10 AM, Tiejun Chen wrote:
For the external interrupt, the decrementer exception and the doorbell
excpetion, we also need to soft-disable interrupts while doing as host
interrupt handlers since the DO_KVM hook is always performed to skip
EXCEPTION_COMMON then miss this original
24 matches
Mail list logo