On Wed, May 21, 2014 at 11:02:12PM +0200, Andreas Herrmann wrote:
On Wed, May 21, 2014 at 02:40:41PM +0200, Ralf Baechle wrote:
On Tue, May 20, 2014 at 04:47:07PM +0200, Andreas Herrmann wrote:
+static inline void r4k_blast_dcache_page_dc128(unsigned long addr)
+{
+
Il 22/05/2014 10:23, Michael Mueller ha scritto:
On Wed, 21 May 2014 15:22:35 +0200
Alexander Graf ag...@suse.de wrote:
I have seen the slides from Eduardo which he presented during this years
DevConf in Brno and made my comments according the s390x implementation
on that. Is you will see, this
Hi All,
This is KVM upstream test result against kvm.git next branch and qemu.git
master branch.
kvm.git next branch: d9f89b88f5102ce235b75a5907838e3c7ed84b97 based on
kernel 3.15.0-rc1
qemu.git master branch: e5bfd64050e81774b6bf71ab5dd064f7bcef0c4c
We found one new bug and
https://bugzilla.kernel.org/show_bug.cgi?id=76621
--- Comment #2 from Henrik hne.jwe...@eit.se ---
It works with kernel version 3.11.10-301.fc20.x86_64.
It does not work with kernel version 3.14.4-200.fc20
--
You are receiving this mail because:
You are watching the assignee of the bug.
--
To
https://bugzilla.kernel.org/show_bug.cgi?id=76621
Henrik hne.jwe...@eit.se changed:
What|Removed |Added
Kernel Version|Very latest with Fedora 20 |3.14.4-200.fc20 (Very
https://bugzilla.kernel.org/show_bug.cgi?id=76621
--- Comment #3 from Henrik hne.jwe...@eit.se ---
I have updated header with kernel version. Will see if I can report it to
Fedora then.
--
You are receiving this mail because:
You are watching the assignee of the bug.
--
To unsubscribe from this
https://bugzilla.kernel.org/show_bug.cgi?id=76621
Henrik hne.jwe...@eit.se changed:
What|Removed |Added
Kernel Version|3.14.4-200.fc20 (Very |3.14.4-200.fc20
https://bugzilla.kernel.org/show_bug.cgi?id=76621
Henrik hne.jwe...@eit.se changed:
What|Removed |Added
Regression|No |Yes
--
You are receiving this
https://bugzilla.kernel.org/show_bug.cgi?id=76621
--- Comment #4 from Henrik hne.jwe...@eit.se ---
I have nw reported this at fedora insted.
https://bugzilla.redhat.com/show_bug.cgi?id=1100228
--
You are receiving this mail because:
You are watching the assignee of the bug.
--
To unsubscribe
https://bugzilla.kernel.org/show_bug.cgi?id=76621
--- Comment #5 from Henrik hne.jwe...@eit.se ---
It still works with 3.14.3-200.fc20.x86_64 if that was of any interest.
Will now close this report.
--
You are receiving this mail because:
You are watching the assignee of the bug.
--
To
https://bugzilla.kernel.org/show_bug.cgi?id=76621
Henrik hne.jwe...@eit.se changed:
What|Removed |Added
Status|NEW |RESOLVED
Il 22/05/2014 05:55, Jidong Xiao ha scritto:
Hi,
I noticed that there is a file call emulate.c, under the directory of
arch/x86/kvm/, in its header part, it says:
Generic x86 (32-bit and 64-bit) instruction decoder and emulator.
I am confused about this, since qemu will be the emulator, why
On Thu, 22 May 2014 10:53:38 +0200
Paolo Bonzini pbonz...@redhat.com wrote:
Il 22/05/2014 10:23, Michael Mueller ha scritto:
On Wed, 21 May 2014 15:22:35 +0200
Alexander Graf ag...@suse.de wrote:
I have seen the slides from Eduardo which he presented during this years
DevConf in Brno
On 05/20/2014 05:53 PM, Alex Williamson wrote:
The driver_override field allows us to specify the driver for a device
rather than relying on the driver to provide a positive match of the
device. This shortcuts the existing process of looking up the vendor
and device ID, adding them to the
When we reset the in-kernel MPIC controller, we forget to reset some hidden
state such as destmask and output. This state is usually set when the guest
writes to the IDR register for a specific IRQ line.
To make sure we stay in sync and don't forget hidden state, treat reset of
the IDR register
We worked around some nasty KVM magic page hcall breakages:
1) NX bit not honored, so ignore NX when we detect it
2) LE guests swizzle hypercall instruction
Without these fixes in place, there's no way it would make sense to expose kvm
hypercalls to a guest. Chances are immensely high it
On Wed, May 21, 2014 at 12:10:45PM +0100, James Hogan wrote:
On 20/05/14 15:47, Andreas Herrmann wrote:
From: David Daney david.da...@cavium.com
This returns the CPUNum from the low order Ebase bits.
Signed-off-by: David Daney david.da...@cavium.com
Signed-off-by: Andreas Herrmann
On 22/05/14 17:13, Andreas Herrmann wrote:
On Wed, May 21, 2014 at 12:10:45PM +0100, James Hogan wrote:
On 20/05/14 15:47, Andreas Herrmann wrote:
+static inline unsigned int mips_cpunum(void)
+{
+ return read_c0_ebase() 0x3ff; /* Low 10 bits of ebase. */
+}
If this is going to go in
On Wed, May 21, 2014 at 02:39:00PM +0100, James Hogan wrote:
On 20/05/14 15:47, Andreas Herrmann wrote:
-- 8 --
diff --git a/arch/mips/paravirt/paravirt-irq.c
b/arch/mips/paravirt/paravirt-irq.c
new file mode 100644
index 000..e1603dd
--- /dev/null
+++
On Wed, May 21, 2014 at 12:42:52PM +0100, James Hogan wrote:
On 20/05/14 15:47, Andreas Herrmann wrote:
From: David Daney david.da...@cavium.com
Signed-off-by: David Daney david.da...@cavium.com
Signed-off-by: Andreas Herrmann andreas.herrm...@caviumnetworks.com
---
On 22/05/14 10:53, Paolo Bonzini wrote:
Il 22/05/2014 10:23, Michael Mueller ha scritto:
On Wed, 21 May 2014 15:22:35 +0200
Alexander Graf ag...@suse.de wrote:
I have seen the slides from Eduardo which he presented during this years
DevConf in Brno and made my comments according the s390x
On 22.05.14 22:36, Christian Borntraeger wrote:
On 22/05/14 10:53, Paolo Bonzini wrote:
Il 22/05/2014 10:23, Michael Mueller ha scritto:
On Wed, 21 May 2014 15:22:35 +0200
Alexander Graf ag...@suse.de wrote:
I have seen the slides from Eduardo which he presented during this years
DevConf in
Thanks Paolo, it's very clear.
-Jidong
On Thu, May 22, 2014 at 7:42 AM, Paolo Bonzini pbonz...@redhat.com wrote:
Il 22/05/2014 05:55, Jidong Xiao ha scritto:
Hi,
I noticed that there is a file call emulate.c, under the directory of
arch/x86/kvm/, in its header part, it says:
Generic x86
Hi All,
I want to learn KVM code. Apologies for asking really simple
questions. I have Ubuntu 12.04 32bit installed on my laptop. As I
understand there are two modules of the KVM. One is called kvm.ko and
other arch specific e.g. in my case it is kvm-intel.ko. These modules
are already present in
On Fri, May 23, 2014 at 12:57 AM, Mathew Li mathew.li...@gmail.com wrote:
Hi All,
I want to learn KVM code. Apologies for asking really simple
questions. I have Ubuntu 12.04 32bit installed on my laptop. As I
understand there are two modules of the KVM. One is called kvm.ko and
other arch
Thanks a lot Jidong. I will give it a run.
Thanks!
Matt
On Thu, May 22, 2014 at 10:12 PM, Jidong Xiao jidong.x...@gmail.com wrote:
On Fri, May 23, 2014 at 12:57 AM, Mathew Li mathew.li...@gmail.com wrote:
Hi All,
I want to learn KVM code. Apologies for asking really simple
questions. I have
On 05/23/2014 12:57 PM, Mathew Li wrote:
Hi All,
I want to learn KVM code. Apologies for asking really simple
questions. I have Ubuntu 12.04 32bit installed on my laptop. As I
understand there are two modules of the KVM. One is called kvm.ko and
other arch specific e.g. in my case it is
https://bugzilla.kernel.org/show_bug.cgi?id=76331
--- Comment #3 from Matt mspe...@users.sourceforge.net ---
Hi Alex,
Any news ?
Do you need additional info ?
I keep receiving the bug each time I power off the VM (VM is working perfectly
fine before the shutdown with both sound and gpu
The patch adds new IOCTL commands for VFIO PCI device to support
EEH functionality for PCI devices, which have been passed through
from host to somebody else via VFIO.
Signed-off-by: Gavin Shan gws...@linux.vnet.ibm.com
---
Documentation/vfio.txt | 88 ++-
The patch introduces new flags for EEH device and PE to indicate
that the device or PE has been passed through to somebody else.
In turn, we will deliver EEH errors to the device's owner for
further handling, which will be done in subsequent patches.
Signed-off-by: Gavin Shan
On 22.05.14 10:23, Gavin Shan wrote:
The patch adds new IOCTL commands for VFIO PCI device to support
EEH functionality for PCI devices, which have been passed through
from host to somebody else via VFIO.
Signed-off-by: Gavin Shan gws...@linux.vnet.ibm.com
This already looks a *lot* more
On 22.05.14 10:23, Gavin Shan wrote:
If we detects frozen state on PE that has been passed through to somebody
else. we needn't handle it. Instead, we rely on the device's owner to
detect and recover it. The patch avoid EEH event on the frozen passed PE so
that the device's owner can have
On 21.05.14 21:47, Alexander Graf wrote:
Am 21.05.2014 um 18:33 schrieb Paul Janzen p...@pauljanzen.org:
On Wed, May 21, 2014 at 12:45 AM, Alexander Graf ag...@suse.de wrote:
Or maybe it's safer overall to just call write_IRQreg_idr() instead of
setting idr directly? That would update
When we trigger a system reset, the in-kernel openpic controller should also
get reset. This happens through a write to the GCR.RESET register which is
the same mechanism a guest would use to manually reset the device.
Signed-off-by: Alexander Graf ag...@suse.de
---
hw/intc/openpic_kvm.c | 15
When we reset the in-kernel MPIC controller, we forget to reset some hidden
state such as destmask and output. This state is usually set when the guest
writes to the IDR register for a specific IRQ line.
To make sure we stay in sync and don't forget hidden state, treat reset of
the IDR register
We worked around some nasty KVM magic page hcall breakages:
1) NX bit not honored, so ignore NX when we detect it
2) LE guests swizzle hypercall instruction
Without these fixes in place, there's no way it would make sense to expose kvm
hypercalls to a guest. Chances are immensely high it
On Thu, May 22, 2014 at 11:55:57AM +0200, Alexander Graf wrote:
On 22.05.14 10:23, Gavin Shan wrote:
If we detects frozen state on PE that has been passed through to somebody
else. we needn't handle it. Instead, we rely on the device's owner to
detect and recover it. The patch avoid EEH event on
On Thu, May 22, 2014 at 11:55:29AM +0200, Alexander Graf wrote:
On 22.05.14 10:23, Gavin Shan wrote:
The patch adds new IOCTL commands for VFIO PCI device to support
EEH functionality for PCI devices, which have been passed through
from host to somebody else via VFIO.
Signed-off-by: Gavin Shan
On Fri, May 23, 2014 at 10:17:30AM +1000, Gavin Shan wrote:
On Thu, May 22, 2014 at 11:55:29AM +0200, Alexander Graf wrote:
On 22.05.14 10:23, Gavin Shan wrote:
.../...
diff --git a/include/uapi/linux/vfio.h b/include/uapi/linux/vfio.h
index cb9023d..ef55682 100644
---
On Thu, 2014-05-22 at 18:23 +1000, Gavin Shan wrote:
The patch adds new IOCTL commands for VFIO PCI device to support
EEH functionality for PCI devices, which have been passed through
from host to somebody else via VFIO.
Signed-off-by: Gavin Shan gws...@linux.vnet.ibm.com
---
On Thu, May 22, 2014 at 09:10:53PM -0600, Alex Williamson wrote:
On Thu, 2014-05-22 at 18:23 +1000, Gavin Shan wrote:
The patch adds new IOCTL commands for VFIO PCI device to support
EEH functionality for PCI devices, which have been passed through
from host to somebody else via VFIO.
On Fri, 2014-05-23 at 14:37 +1000, Gavin Shan wrote:
There's no notification, the user needs to observe the return value an
poll? Should we be enabling an eventfd to notify the user of the state
change?
Yes. The user needs to monitor the return value. we should have one
notification,
42 matches
Mail list logo