* Alexandre Oliva <[EMAIL PROTECTED]> wrote:
> > if the manufacturer believes that it cannot legally allow software
> > modification, all the restriction does is force them either to make
> > the software unmodifiable (which advances freedom not at all) or to
> > use software under a different
Jens Axboe wrote:
>> I'd much much prefer having a description of the problem in the actual
>> comment then a hyperlink. There's just too much chance of the latter
>> breaking over time, and it's impossible to update it when things change
>> that should be reflected in the comment.
>
> The actual
On Sat, Jun 16, 2007 at 05:58:11PM -0700, Linus Torvalds wrote:
> On Sun, 17 Jun 2007, Bron Gondwana wrote:
> >
> > No, I'm arguing that it's not "mere aggregation" - the kernel is useless
> > on that machine unless the BIOS is present or replaced with something
> > else with equivalent functional
On Jun 17, 2007, Daniel Hazelton <[EMAIL PROTECTED]> wrote:
> The intent of the GPL, as seen by the FSF, *DOESN'T* *MATTER* *AT* *ALL* when
> the software isn't licensed by the FSF. Or did you forget that part of the
> discussion?
You're mixing up spirit of license with intent of licensing (or
On Sun, Jun 17, 2007 at 02:38:43AM -0300, Alexandre Oliva wrote:
> On Jun 17, 2007, Daniel Hazelton <[EMAIL PROTECTED]> wrote:
>
> > Ah, but giving the user half the key doesn't mean they still don't have
> > access
> > to the entire key. QED: Giving people half the key won't cut it under the
>
* Alexandre Oliva <[EMAIL PROTECTED]> wrote:
> On Jun 15, 2007, Ingo Molnar <[EMAIL PROTECTED]> wrote:
>
> > * Alexandre Oliva <[EMAIL PROTECTED]> wrote:
> >
> > > On Jun 15, 2007, Daniel Hazelton <[EMAIL PROTECTED]> wrote:
> >> >> >> It is also clear, thanks to language directly in the GPLv2
On Jun 17, 2007, Ingo Molnar <[EMAIL PROTECTED]> wrote:
> * Alexandre Oliva <[EMAIL PROTECTED]> wrote:
>> On Jun 15, 2007, Ingo Molnar <[EMAIL PROTECTED]> wrote:
>>
>> >>> it irreversibly cuts off certain people from being to distribute
>> >>> GPLv3-ed software alongside with certain types of ha
On Jun 17, 2007, Ingo Molnar <[EMAIL PROTECTED]> wrote:
> * Alexandre Oliva <[EMAIL PROTECTED]> wrote:
>> > if the manufacturer believes that it cannot legally allow software
>> > modification, all the restriction does is force them either to make
>> > the software unmodifiable (which advances
On Sat, Jun 16, 2007 at 05:58:11PM -0700, Linus Torvalds wrote:
>
>
> On Sun, 17 Jun 2007, Bron Gondwana wrote:
> >
> > No, I'm arguing that it's not "mere aggregation" - the kernel is useless
> > on that machine unless the BIOS is present or replaced with something
> > else with equivalent func
This patch modifies the ncurses configuration tool ('make menuconfig') in a way
that the user can enter the search string (/) both with or without the leading
'CONFIG_'.
This simplifies using copy & paste from .config files because you can select
the whole word.
Signed-off-by: Bernhard Walle <[EM
This patch in the blink driver changes the module to only blink when
the parameter 'blink' is set to true. This is to allow the module to
be compiled in the kernel and not as module.
As the blink module was initially written for kdump, and as the kernel
is relocatable on lots of architectures, the
On Jun 17, 2007, Ingo Molnar <[EMAIL PROTECTED]> wrote:
> Again, as a reminder, this point was presented to you (see the
> quotes above), in the discussion about whether the Tivo is fine by
> the GPLv2 or not:
That's false. I've explicitly avoided discussions on whether the
legal terms of GPLv2
* Alexandre Oliva <[EMAIL PROTECTED]> wrote:
> On Jun 15, 2007, Ingo Molnar <[EMAIL PROTECTED]> wrote:
>
> > it is a false statement on your part that the executable "does not
> > function properly" if it lacks that part. Try it: take out the harddisk
> > from the Tivo (it's a bog standard IDE
Signed-off-by: Stefan Richter <[EMAIL PROTECTED]>
---
drivers/base/dd.c |3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
Index: linux-2.6.22-rc3/drivers/base/dd.c
===
--- linux-2.6.22-rc3.orig/drivers/base/dd.c
+++ linux-2.
Signed-off-by: Stefan Richter <[EMAIL PROTECTED]>
---
drivers/base/dd.c | 18 +-
1 file changed, 9 insertions(+), 9 deletions(-)
Index: linux-2.6.22-rc3/drivers/base/dd.c
===
--- linux-2.6.22-rc3.orig/drivers/base/d
On Sat, 2007-06-16 at 23:17 +0200, Jean Delvare wrote:
> Hi Soeren,
Hi Jean,
[...]
> Thanks for reporting. Indeed this patch is broken, sorry for
> overlooking it. I tested it but my hardware is such that the faulty
> error path was never taken. Please test the following patch (on top of
> git-c
Hi Adrian,
Adrian McMenamin pisze:
This is a patched 2.6.21.5 - which might be an issue. But this is what I
get:
You should apply 2.6.22-rc4 patch on top 2.6.21.
Regards,
Michal
--
LOG
http://www.stardust.webpages.pl/log/
-
To unsubscribe from this list: send the line "unsubscribe linux-ker
On 2007.06.15 15:46:32 +0200, Johannes Weiner wrote:
> Hi,
>
> Andrew, I promised it [1], here goes. Patched against Linus' git-tree.
>
> [1] http://lkml.org/lkml/2007/3/22/226
>
> This patch replaces some obscure code-paths in fs/block_dev.c with more
> readable versions.
>
> Signed-off-by: Jo
Hi all,
Adrian Bunk pisze:
On Sat, Jun 16, 2007 at 02:23:25PM +0200, Stefan Richter wrote:
...
[Adrian, I'm not saying "too few users run -rc kernels", I'm saying "too
few FireWire driver users run -rc kernels".]
Getting more people testing -rc kernels might be possible, and I don't
think it
On Sunday, 17 June 2007 03:36, Matt Mullins wrote:
> I just received a Dell Latitude D630, with the new Intel Santa Rosa
> platform. Currently, the only major driver issue I have is sound. It
> worked fine in Ubuntu Feisty's 2.6.20 kernel, but now I am using Gutsy
> so I can have graphics drivers
From: Anthony Liguori <[EMAIL PROTECTED]>
The PC debug port is used for IO delay and does not require emulation.
Signed-off-by: Anthony Liguori <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/svm.c |8 +---
1 files changed, 5 insertions(+), 3 deletions(-
This allows us to remove write protection earlier than otherwise. Should
some mad OS choose to use byte writes to update pagetables, it will suffer
a performance hit, but still work correctly.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/mmu.c |1 +
1 files changed, 1 insert
From: He, Qing <[EMAIL PROTECTED]>
This patch enables IO bitmaps control on vmx and unmask the 0x80 port to
avoid VMEXITs caused by accessing port 0x80. 0x80 is used as delays (see
include/asm/io.h), and handling VMEXITs on its access is unnecessary but
slows things down. This patch improves kerne
Following is my patchqueue for the 2.6.23 merge window, not including
the cpu hotplug fixes posted earlier. The changes include performance
improvements, guest smp, random fixes, and cleanups. Comments welcome.
Anthony Liguori (1):
KVM: SVM: Allow direct guest access to PC debug port
Avi
Many msrs and the like will only be used by the host if we schedule() or
return to userspace. Therefore, we avoid saving them if we handle the
exit within the kernel, and if a reschedule is not requested.
Based on a patch from Eddie Dong <[EMAIL PROTECTED]> with a couple of
fixes by me.
Signed-o
The kvm mmu tries to detects forks by looking for repeated writes to a
page table. If it sees a fork, it unshadows the page table so the page
table copying can proceed at native speed instead of being emulated.
However, the detector also triggered on simple demand paging access patterns:
a linear
When a guest writes to a page that has an mmu shadow, we have to clear
the shadow pte corresponding to the memory location touched by the guest.
Now, in nonpae mode, a single guest page may have two or four shadow
pages (because a nonpae page maps 4MB or 4GB, whereas the pae shadow maps
2MB or 1GB
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/vmx.c | 58 ++--
1 files changed, 29 insertions(+), 29 deletions(-)
diff --git a/drivers/kvm/vmx.c b/drivers/kvm/vmx.c
index 84ce0c0..9ebb18d 100644
--- a/drivers/kvm/vmx.c
+++ b/driver
A typical demand page/copy on write pattern is:
- page fault on vaddr
- kvm propagates fault to guest
- guest handles fault, updates pte
- kvm traps write, clears shadow pte, resumes guest
- guest returns to userspace, re-faults on same vaddr
- kvm installs shadow pte, resumes guest
- guest contin
This improves kbuild times by about 10%, bringing it within a respectable
25% of native.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm.h |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/drivers/kvm/kvm.h b/drivers/kvm/kvm.h
index 11c519e..f6ee189 10064
i386 wants fs for accessing the pda even on a lightweight exit, so ensure
we can always restore it. This fixes a regression on i386 introduced by
the lightweight vmexit patch.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/vmx.c | 22 +++---
1 files changed, 11 i
From: Matthew Gregan <[EMAIL PROTECTED]>
Attempting to boot the default 'bsd' kernel of OpenBSD 4.1 i386 in a guest
fails early in the kernel init inside p3_get_bus_clock while trying to read
the IA32_EBL_CR_POWERON MSR. KVM logs an 'unhandled MSR' message and the
guest kernel faults.
This patch
The lightweight vmexit path avoids saving and reloading certain host
state. However in certain cases lightweight vmexit handling can schedule()
which requires reloading the host state.
So we store the host state in the vcpu structure, and reloaded it if we
relinquish the vcpu.
Signed-off-by: Avi
Easier to keep track of where the fpu is this way.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm.h |2 +-
drivers/kvm/vmx.c | 50 +++---
2 files changed, 32 insertions(+), 20 deletions(-)
diff --git a/drivers/kvm/kvm.h b/drive
Instead of calling two functions and repeating expensive checks, call one
function and provide it with before/after information.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm.h |4 ++--
drivers/kvm/kvm_main.c |4 ++--
drivers/kvm/mmu.c | 11 ---
3 f
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/vmx.c | 14 +++---
1 files changed, 7 insertions(+), 7 deletions(-)
diff --git a/drivers/kvm/vmx.c b/drivers/kvm/vmx.c
index 677b38c..93c3abf 100644
--- a/drivers/kvm/vmx.c
+++ b/drivers/kvm/vmx.c
@@ -290,6 +290,13 @@ static
Simpifies things a bit.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm.h |2 +-
drivers/kvm/mmu.c | 32 +++-
drivers/kvm/paging_tmpl.h |2 +-
3 files changed, 17 insertions(+), 19 deletions(-)
diff --git a/drivers/kvm/kvm.h
This allows fwait instructions to be trapped when the guest fpu is not
loaded.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm.h |4 +++-
1 files changed, 3 insertions(+), 1 deletions(-)
diff --git a/drivers/kvm/kvm.h b/drivers/kvm/kvm.h
index 4724087..5e6dac5 100644
--- a/
Everyone owns a piece of the exception bitmap, but they happily write to
the entire thing like there's no tomorrow. Centralize handling in
update_exception_bitmap() and have everyone call that.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/vmx.c | 42 +--
The real mode tr needs to be set to a specific tss so that I/O
instructions can function. Divert the new tr values to the real
mode save area from where they will be restored on transition to
protected mode.
This fixes some crashes on reboot when the bios accesses an I/O
instruction.
Signed-off-
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/mmu.c | 10 --
1 files changed, 4 insertions(+), 6 deletions(-)
diff --git a/drivers/kvm/mmu.c b/drivers/kvm/mmu.c
index 9ec3df9..a96c9ae 100644
--- a/drivers/kvm/mmu.c
+++ b/drivers/kvm/mmu.c
@@ -455,12 +455,10 @@ static int
kunmap() expects a struct page, not a virtual address. Fixes an oops loading
kvm-intel.ko on i386 with CONFIG_HIGHMEM.
Thanks to Michael Ivanov <[EMAIL PROTECTED]> for reporting.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/vmx.c |4 ++--
1 files changed, 2 insertions(+), 2
If we set an msr via an ioctl() instead of by handling a guest exit, we
have the host state loaded, so reloading the msrs would clobber host
state instead of guest state.
This fixes a host oops (and loss of a cpu) on a guest reboot.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/v
This makes oprofile dumps and disassebly easier to read.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/vmx.c | 15 +++
1 files changed, 7 insertions(+), 8 deletions(-)
diff --git a/drivers/kvm/vmx.c b/drivers/kvm/vmx.c
index 34171d9..c4c5535 100644
--- a/drivers/kvm
Vista seems to trigger it.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/x86_emulate.c |4 +++-
1 files changed, 3 insertions(+), 1 deletions(-)
diff --git a/drivers/kvm/x86_emulate.c b/drivers/kvm/x86_emulate.c
index 7ade090..6123c02 100644
--- a/drivers/kvm/x86_emulate.c
++
From: Markus Rechberger <[EMAIL PROTECTED]>
KVM compilation fails for some .configs. This fixes it.
Signed-off-by: Markus Rechberger <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm.h |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/
We will need the accessed bit (in addition to the dirty bit) and
also write access (for setting the dirty bit) in a future patch.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/paging_tmpl.h | 29 +++--
1 files changed, 15 insertions(+), 14 deletions(-)
d
Use slab caches instead of a simple custom list.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm.h |4 +-
drivers/kvm/kvm_main.c |1 -
drivers/kvm/mmu.c | 64 +--
3 files changed, 41 insertions(+), 28 deletions(-)
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/mmu.c | 17 -
drivers/kvm/paging_tmpl.h | 34 +++---
2 files changed, 23 insertions(+), 28 deletions(-)
diff --git a/drivers/kvm/mmu.c b/drivers/kvm/mmu.c
index a763150..2079d69 1
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/paging_tmpl.h | 34 +-
1 files changed, 17 insertions(+), 17 deletions(-)
diff --git a/drivers/kvm/paging_tmpl.h b/drivers/kvm/paging_tmpl.h
index 183d4ca..e094a8b 100644
--- a/drivers/kvm/paging_tmpl.
We want all shadow pte modifications in one place.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/paging_tmpl.h |3 +--
1 files changed, 1 insertions(+), 2 deletions(-)
diff --git a/drivers/kvm/paging_tmpl.h b/drivers/kvm/paging_tmpl.h
index c067203..35f264f 100644
--- a/drive
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/Kconfig |1 +
drivers/kvm/mmu.c | 14 --
drivers/kvm/paging_tmpl.h |4 ++--
3 files changed, 15 insertions(+), 4 deletions(-)
diff --git a/drivers/kvm/Kconfig b/drivers/kvm/Kconfig
index 2f661e5..33f
Always set the accessed and dirty bit (since having them cleared causes
a read-modify-write cycle), always set the present bit, and copy the
nx bit from the guest.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/mmu.c |5 -
drivers/kvm/paging_tmpl.h |7 ++-
2
This has not been used for some time, as the same information is available
in the page header.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/mmu.c |1 -
drivers/kvm/paging_tmpl.h |2 --
2 files changed, 0 insertions(+), 3 deletions(-)
diff --git a/drivers/kvm/mmu.
This was once used to avoid accessing the guest pte when upgrading
the shadow pte from read-only to read-write. But usually we need
to set the guest pte dirty or accessed bits anyway, so this wasn't
really exploited.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/mmu.c |
Switch guest paging context may require us to allocate memory, which
might fail. Instead of wiring up error paths everywhere, make context
switching lazy and actually do the switch before the next guest entry,
where we can return an error if allocation fails.
Signed-off-by: Avi Kivity <[EMAIL PRO
A vcpu can pin up to four mmu shadow pages, which means the freeing
loop will never terminate. Fix by first unpinning shadow pages on
all vcpus, then freeing shadow pages.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm_main.c | 15 +++
drivers/kvm/mmu.c |
If we add the vm once per vcpu, we corrupt the list if the guest has
multiple vcpus.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm_main.c |6 +++---
1 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/drivers/kvm/kvm_main.c b/drivers/kvm/kvm_main.c
index 3ff8ee5
As we don't support guest tlb shootdown yet, this is only reliable
for real-mode guests.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm.h |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/drivers/kvm/kvm.h b/drivers/kvm/kvm.h
index 3ec4e26..e665f55 10064
That way, we don't need to loop for KVM_MAX_VCPUS for a single vcpu
vm.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm.h |1 +
drivers/kvm/kvm_main.c |5 +
2 files changed, 6 insertions(+), 0 deletions(-)
diff --git a/drivers/kvm/kvm.h b/drivers/kvm/kvm.h
inde
Will soon have a thid user.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm.h |1 +
drivers/kvm/kvm_main.c | 11 +++
drivers/kvm/svm.c |7 +--
drivers/kvm/vmx.c |7 +--
4 files changed, 14 insertions(+), 12 deletions(-)
diff --git a/
From: Shani Moideen <[EMAIL PROTECTED]>
Signed-off-by: Shani Moideen <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/vmx.c |6 +++---
1 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/drivers/kvm/vmx.c b/drivers/kvm/vmx.c
index b969db1..b909b54 1
From: Shani Moideen <[EMAIL PROTECTED]>
Signed-off-by: Shani Moideen <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/svm.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/kvm/svm.c b/drivers/kvm/svm.c
index eb175c5..68841ef 100
If the time stamp counter goes backwards, a guest delay loop can become
infinite. This can happen if a vcpu is migrated to another cpu, where
the counter has a lower value than the first cpu.
Since we're doing an IPI to the first cpu anyway, we can use that to pick
up the old tsc, and use that to
This has two use cases: the bios can't boot from disk, and guest smp
bootstrap.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm.h |1 +
drivers/kvm/vmx.c |7 ++-
drivers/kvm/x86_emulate.c |6 +-
3 files changed, 12 insertions(+), 2 deletions(-
Needs to be set on vcpu 0 only.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/svm.c |6 +++---
drivers/kvm/vmx.c |6 +++---
2 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/drivers/kvm/svm.c b/drivers/kvm/svm.c
index 68841ef..62ec38c 100644
--- a/drivers/kvm/
When a vcpu causes a shadow tlb entry to have reduced permissions, it
must also clear the tlb on remote vcpus. We do that by:
- setting a bit on the vcpu that requests a tlb flush before the next entry
- if the vcpu is currently executing, we send an ipi to make sure it
exits before we continue
From: Nguyen Anh Quynh <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm_main.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/kvm/kvm_main.c b/drivers/kvm/kvm_main.c
index bf35457..3c3231d 100644
--- a/drivers/kvm/kvm_main.
No longer needed as we do everything in one place.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/paging_tmpl.h | 11 ---
1 files changed, 0 insertions(+), 11 deletions(-)
diff --git a/drivers/kvm/paging_tmpl.h b/drivers/kvm/paging_tmpl.h
index fabc2c9..59b4cb2 100644
--
With guest smp, a second vcpu might see partial updates when the first
vcpu services a page fault. So delay all updates until we have figured
out what the pte should look like.
Note that on i386, this is still not completely atomic as a 64-bit write
will be split into two on a 32-bit machine.
Si
In preparation of some modifications.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/mmu.c | 48 --
drivers/kvm/paging_tmpl.h | 56 +---
2 files changed, 52 insertions(+), 52 deletions(-)
diff
This prevents some work from being performed twice, and, more importantly,
reduces the number of places where we modify shadow ptes.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/mmu.c | 11 +++
drivers/kvm/paging_tmpl.h | 168 +++
From: Jan Engelhardt <[EMAIL PROTECTED]>
Make a "menuconfig" out of the Kconfig objects "menu, ..., endmenu",
so that the user can disable all the options in that menu at once
instead of having to disable each option separately.
Signed-off-by: Jan Engelhardt <[EMAIL PROTECTED]>
Signed-off-by: And
From: Eddie Dong <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/paging_tmpl.h |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/drivers/kvm/paging_tmpl.h b/drivers/kvm/paging_tmpl.h
index 6dd0da9..183d4ca 100644
--- a/drivers/kvm/paging_t
From: Eddie Dong <[EMAIL PROTECTED]>
In a lightweight exit (where we exit and reenter the guest without
scheduling or exiting to userspace in between), we don't need various
msrs on the host, and avoiding shuffling them around reduces raw exit
time by 8%.
i386 compile fix by Daniel Hecken <[EMAIL
From: Eddie Dong <[EMAIL PROTECTED]>
Signed-off-by: Yaozu (Eddie) Dong <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/vmx.c |2 --
1 files changed, 0 insertions(+), 2 deletions(-)
diff --git a/drivers/kvm/vmx.c b/drivers/kvm/vmx.c
index 872ca03..dc99191 100
From: Eddie Dong <[EMAIL PROTECTED]>
MSR_EFER.LME/LMA bits are automatically save/restored by VMX
hardware, KVM only needs to save NX/SCE bits at time of heavy
weight VM Exit. But clearing NX bits in host envirnment may
cause system hang if the host page table is using EXB bits,
thus we leave NX b
From: Nitin A Kamble <[EMAIL PROTECTED]>
Instructions with address size override prefix opcode 0x67
Cause the #SS fault with 0 error code in VM86 mode. Forward
them to the emulator.
Signed-Off-By: Nitin A Kamble <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/v
OK,
I've found the second root for my
'2.6.22-rc regression: s2ram fails to suspend + fails to resume w/ Xorg':
The first one was just the wrong coretemp patch (already fixed by Jean).
The second one happens only with Xorg/fglrx loaded and slub enabled, as
I've found after a useless git bisect
On Sun, 17 Jun 2007 11:41:36 +0200 Michal Piotrowski <[EMAIL PROTECTED]> wrote:
> +If the patch introduces a new regression and this regression was not fixed
> +in seven days, then the patch will be reverted.
Those regressions where we know which patch caused them are the easy ones.
Often we don'
On 17/06/07, Andrew Morton <[EMAIL PROTECTED]> wrote:
On Sun, 17 Jun 2007 11:41:36 +0200 Michal Piotrowski <[EMAIL PROTECTED]> wrote:
> +If the patch introduces a new regression and this regression was not fixed
> +in seven days, then the patch will be reverted.
Those regressions where we know
I am ccing this to kernel mailing list, cause in my point of view this at
least partly points at a failure of proper kernel management.
Am Sonntag 17 Juni 2007 schrieb Con Kolivas:
> Yes it's true, -ck is over after the next stable release. I was going
> to announce this with the actual releas
On Wed, 2007-05-23 at 20:11 +0200, Sam Ravnborg wrote:
> David - I assume you will take it in your tree?
Actually I don't keep a tree for header stuff (except for the automatic
export-to-userspace one at linux/kernel/git/dwmw2/kernel-headers.git
which just tracks Linus' tree.
I figure that keepi
Carlo Wood, Sat, Jun 16, 2007 16:03:40 +0200:
> $ git merge origin
> fatal: Needed a single revision
> Usage: /usr/bin/git-merge [-n] [--no-commit] [--squash] [-s ]...
> +
>
> For some reason I don't think I should be needing commands that need
> ""; I don't want to change the (local) tree in a
On Fri, 2007-06-15 at 12:51 +0200, Jiri Kosina wrote:
> On Fri, 15 Jun 2007, Jiri Kosina wrote:
>
> > please try the patch below (against 2.6.22-rc4) and send me the result.
>
> Now I see in the logs that there are also messages about the
> report initialization failing, so we should also specif
On Sunday, 17 June 2007 11:49, Soeren Sonnenburg wrote:
> OK,
>
> I've found the second root for my
>
> '2.6.22-rc regression: s2ram fails to suspend + fails to resume w/ Xorg':
>
> The first one was just the wrong coretemp patch (already fixed by Jean).
>
> The second one happens only with Xo
On Saturday 16 June 2007 23:27:43 Maximilian Engelhardt wrote:
> [...]
> ACPI: PCI Interrupt Link [LNKD] enabled at IRQ 10
> ACPI: PCI Interrupt :02:02.0[A] -> Link [LNKD] -> GSI 10 (level, low) ->
> IRQ 10
> ssb: Sonics Silicon Backplane found on PCI device :02:02.0
> b44.c:v2.0
> eth0: B
On Sunday 17 June 2007 12:55:39 Michael Buesch wrote:
> On Saturday 16 June 2007 23:27:43 Maximilian Engelhardt wrote:
> > [...]
> > ACPI: PCI Interrupt Link [LNKD] enabled at IRQ 10
> > ACPI: PCI Interrupt :02:02.0[A] -> Link [LNKD] -> GSI 10 (level, low)
> > ->
> > IRQ 10
> > ssb: Sonics Si
Dear Kernel Developers,
I had some trouble with my usb devices, often showing a disconnect problem. I
did some googleing and saw, that it is a less or more common problem.
This problem is discussed in various internet sites.
log from my machine:
#
usb 4-6: new high
> I don't know any law that requires tivoization.
In the USSA it is arguable that wireless might need it (if done in
software) for certain properties. (The argument being it must be
tamperproof to random end consumers). Obviously an electronics graduate
can tamper with hardware ones just as well
Sound recording doesn't work for this card because ACNI and ACPF
are not set before snd_card_saa7134_capture_prepare(). As a result
timeout occurs. These registers aren't poked because thread
never gets wake up signal. ACNI initialization is done in the
thread.
Sound is muted when capture stops. S
On Wed, 2007-06-13 at 00:21 +0200, Jesper Juhl wrote:
> Any idea when you'll be merging with Linus?
> I just checked mainline git and the bug is still there :-(
This bug is in debugging code and is nearly impossible to hit,
so it will be merged during the next merge window.
--
Best regards,
Arte
On Sun, Jun 17, 2007 at 12:22:26PM +0200, Michal Piotrowski wrote:
> On 17/06/07, Andrew Morton <[EMAIL PROTECTED]> wrote:
> >On Sun, 17 Jun 2007 11:41:36 +0200 Michal Piotrowski
> ><[EMAIL PROTECTED]> wrote:
> >
> >> +If the patch introduces a new regression and this regression was not
> >fixed
Hi all,
I have been investigating the random invalid instruction occourances on
sparc32 (sun4c) and identified that the problem was introduced
pre-v2.6.22-rc1. v2.6.21 is OK. The first time I have observed the issue
so far is after commit b46b8f19c9cd435ecac4d9d12b39d78c137ecd66:
Increase sla
Rafael J. Wysocki wrote:
On Saturday, 16 June 2007 21:56, David Greaves wrote:
This isn't a regression.
I was seeing these problems on 2.6.21 (but 22 was in -rc so I waited to try it).
I tried 2.6.22-rc4 (with Tejun's patches) to see if it had improved - no.
Note this is a different (desktop)
David Robinson wrote:
David Greaves wrote:
This isn't a regression.
I was seeing these problems on 2.6.21 (but 22 was in -rc so I waited
to try it).
I tried 2.6.22-rc4 (with Tejun's patches) to see if it had improved - no.
Note this is a different (desktop) machine to that involved my recent
On Sunday, 17 June 2007 12:22, Michal Piotrowski wrote:
> On 17/06/07, Andrew Morton <[EMAIL PROTECTED]> wrote:
> > On Sun, 17 Jun 2007 11:41:36 +0200 Michal Piotrowski <[EMAIL PROTECTED]>
> > wrote:
> >
> > > +If the patch introduces a new regression and this regression was not
> > > fixed
> > >
nfsctl.c:write_getfs() open-codes offsetof, but does it poorly
resulting in the following warning on 64-bit machines:
fs/nfsd/nfsctl.c: In function 'write_getfs':
fs/nfsd/nfsctl.c:248: warning: cast from pointer to integer of different size
Fix: use offsetof().
Signed-off-by: Mikael Pettersson <
On Sunday 17 June 2007, Michael Buesch wrote:
> On Saturday 16 June 2007 23:27:43 Maximilian Engelhardt wrote:
> > [...]
> > ACPI: PCI Interrupt Link [LNKD] enabled at IRQ 10
> > ACPI: PCI Interrupt :02:02.0[A] -> Link [LNKD] -> GSI 10 (level, low)
> > -> IRQ 10
> > ssb: Sonics Silicon Backplan
Neil Brown <[EMAIL PROTECTED]> writes:
>
> Having the filesystem duplicate data, store checksums, and be able to
> find a different copy if the first one it chose was bad is very
> sensible and cannot be done by just putting the filesystem on RAID.
Apropos checksums: since RAID5 copies/xors anywa
101 - 200 of 391 matches
Mail list logo