* [PATCH kvm-unit-tests v2] pmu: fixes for Sandy Bridge hosts
@ 2013-05-30 17:47 Paolo Bonzini
2013-06-02 15:33 ` Gleb Natapov
2013-06-03 8:36 ` Gleb Natapov
0 siblings, 2 replies; 5+ messages in thread
From: Paolo Bonzini @ 2013-05-30 17:47 UTC (permalink / raw)
To: kvm
This patch includes two fixes for SB:
* the 3rd fixed counter ("ref cpu cycles") can sometimes report
less than the number of iterations
* there is an 8th counter which causes out of bounds accesses
to gp_event or check_counters_many's cnt array
There is still a bug in KVM, because the "pmu all counters-0"
test fails. (It passes if you use any 6 of the 8 gp counters,
fails if you use 7 or 8).
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
---
x86/pmu.c | 21 +++++++++++++++------
1 file changed, 15 insertions(+), 6 deletions(-)
diff --git a/x86/pmu.c b/x86/pmu.c
index 2c46f31..dca753a 100644
--- a/x86/pmu.c
+++ b/x86/pmu.c
@@ -88,9 +88,10 @@ struct pmu_event {
}, fixed_events[] = {
{"fixed 1", MSR_CORE_PERF_FIXED_CTR0, 10*N, 10.2*N},
{"fixed 2", MSR_CORE_PERF_FIXED_CTR0 + 1, 1*N, 30*N},
- {"fixed 3", MSR_CORE_PERF_FIXED_CTR0 + 2, 1*N, 30*N}
+ {"fixed 3", MSR_CORE_PERF_FIXED_CTR0 + 2, 0.1*N, 30*N}
};
+static int num_counters;
static int tests, failures;
char *buf;
@@ -237,7 +238,7 @@ static void check_gp_counter(struct pmu_event *evt)
};
int i;
- for (i = 0; i < eax.split.num_counters; i++, cnt.ctr++) {
+ for (i = 0; i < num_counters; i++, cnt.ctr++) {
cnt.count = 0;
measure(&cnt, 1);
report(evt->name, i, verify_event(cnt.count, evt));
@@ -276,7 +277,7 @@ static void check_counters_many(void)
pmu_counter_t cnt[10];
int i, n;
- for (i = 0, n = 0; n < eax.split.num_counters; i++) {
+ for (i = 0, n = 0; n < num_counters; i++) {
if (ebx.full & (1 << i))
continue;
@@ -316,10 +317,10 @@ static void check_counter_overflow(void)
/* clear status before test */
wrmsr(MSR_CORE_PERF_GLOBAL_OVF_CTRL, rdmsr(MSR_CORE_PERF_GLOBAL_STATUS));
- for (i = 0; i < eax.split.num_counters + 1; i++, cnt.ctr++) {
+ for (i = 0; i < num_counters + 1; i++, cnt.ctr++) {
uint64_t status;
int idx;
- if (i == eax.split.num_counters)
+ if (i == num_counters)
cnt.ctr = fixed_events[0].unit_sel;
if (i % 2)
cnt.config |= EVNTSEL_INT;
@@ -355,7 +356,7 @@ static void check_rdpmc(void)
uint64_t val = 0x1f3456789ull;
int i;
- for (i = 0; i < eax.split.num_counters; i++) {
+ for (i = 0; i < num_counters; i++) {
uint64_t x = (val & 0xffffffff) |
((1ull << (eax.split.bit_width - 32)) - 1) << 32;
wrmsr(MSR_IA32_PERFCTR0 + i, val);
@@ -395,6 +396,10 @@ int main(int ac, char **av)
printf("Fixed counters: %d\n", edx.split.num_counters_fixed);
printf("Fixed counter width: %d\n", edx.split.bit_width_fixed);
+ num_counters = eax.split.num_counters;
+ if (num_counters > ARRAY_SIZE(gp_events))
+ num_counters = ARRAY_SIZE(gp_events);
+
apic_write(APIC_LVTPC, PC_VECTOR);
check_gp_counters();
--
1.8.2.1
^ permalink raw reply related [flat|nested] 5+ messages in thread
* Re: [PATCH kvm-unit-tests v2] pmu: fixes for Sandy Bridge hosts
2013-05-30 17:47 [PATCH kvm-unit-tests v2] pmu: fixes for Sandy Bridge hosts Paolo Bonzini
@ 2013-06-02 15:33 ` Gleb Natapov
2013-06-03 6:35 ` Paolo Bonzini
2013-06-03 8:36 ` Gleb Natapov
1 sibling, 1 reply; 5+ messages in thread
From: Gleb Natapov @ 2013-06-02 15:33 UTC (permalink / raw)
To: Paolo Bonzini; +Cc: kvm
On Thu, May 30, 2013 at 07:47:18PM +0200, Paolo Bonzini wrote:
> This patch includes two fixes for SB:
>
> * the 3rd fixed counter ("ref cpu cycles") can sometimes report
> less than the number of iterations
>
> * there is an 8th counter which causes out of bounds accesses
> to gp_event or check_counters_many's cnt array
>
> There is still a bug in KVM, because the "pmu all counters-0"
> test fails. (It passes if you use any 6 of the 8 gp counters,
> fails if you use 7 or 8).
>
Changelog?
> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
> ---
> x86/pmu.c | 21 +++++++++++++++------
> 1 file changed, 15 insertions(+), 6 deletions(-)
>
> diff --git a/x86/pmu.c b/x86/pmu.c
> index 2c46f31..dca753a 100644
> --- a/x86/pmu.c
> +++ b/x86/pmu.c
> @@ -88,9 +88,10 @@ struct pmu_event {
> }, fixed_events[] = {
> {"fixed 1", MSR_CORE_PERF_FIXED_CTR0, 10*N, 10.2*N},
> {"fixed 2", MSR_CORE_PERF_FIXED_CTR0 + 1, 1*N, 30*N},
> - {"fixed 3", MSR_CORE_PERF_FIXED_CTR0 + 2, 1*N, 30*N}
> + {"fixed 3", MSR_CORE_PERF_FIXED_CTR0 + 2, 0.1*N, 30*N}
> };
>
> +static int num_counters;
> static int tests, failures;
>
> char *buf;
> @@ -237,7 +238,7 @@ static void check_gp_counter(struct pmu_event *evt)
> };
> int i;
>
> - for (i = 0; i < eax.split.num_counters; i++, cnt.ctr++) {
> + for (i = 0; i < num_counters; i++, cnt.ctr++) {
> cnt.count = 0;
> measure(&cnt, 1);
> report(evt->name, i, verify_event(cnt.count, evt));
> @@ -276,7 +277,7 @@ static void check_counters_many(void)
> pmu_counter_t cnt[10];
> int i, n;
>
> - for (i = 0, n = 0; n < eax.split.num_counters; i++) {
> + for (i = 0, n = 0; n < num_counters; i++) {
> if (ebx.full & (1 << i))
> continue;
>
> @@ -316,10 +317,10 @@ static void check_counter_overflow(void)
> /* clear status before test */
> wrmsr(MSR_CORE_PERF_GLOBAL_OVF_CTRL, rdmsr(MSR_CORE_PERF_GLOBAL_STATUS));
>
> - for (i = 0; i < eax.split.num_counters + 1; i++, cnt.ctr++) {
> + for (i = 0; i < num_counters + 1; i++, cnt.ctr++) {
> uint64_t status;
> int idx;
> - if (i == eax.split.num_counters)
> + if (i == num_counters)
> cnt.ctr = fixed_events[0].unit_sel;
> if (i % 2)
> cnt.config |= EVNTSEL_INT;
> @@ -355,7 +356,7 @@ static void check_rdpmc(void)
> uint64_t val = 0x1f3456789ull;
> int i;
>
> - for (i = 0; i < eax.split.num_counters; i++) {
> + for (i = 0; i < num_counters; i++) {
> uint64_t x = (val & 0xffffffff) |
> ((1ull << (eax.split.bit_width - 32)) - 1) << 32;
> wrmsr(MSR_IA32_PERFCTR0 + i, val);
> @@ -395,6 +396,10 @@ int main(int ac, char **av)
> printf("Fixed counters: %d\n", edx.split.num_counters_fixed);
> printf("Fixed counter width: %d\n", edx.split.bit_width_fixed);
>
> + num_counters = eax.split.num_counters;
> + if (num_counters > ARRAY_SIZE(gp_events))
> + num_counters = ARRAY_SIZE(gp_events);
> +
> apic_write(APIC_LVTPC, PC_VECTOR);
>
> check_gp_counters();
> --
> 1.8.2.1
>
> --
> To unsubscribe from this list: send the line "unsubscribe kvm" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
--
Gleb.
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH kvm-unit-tests v2] pmu: fixes for Sandy Bridge hosts
2013-06-02 15:33 ` Gleb Natapov
@ 2013-06-03 6:35 ` Paolo Bonzini
2013-06-03 6:41 ` Gleb Natapov
0 siblings, 1 reply; 5+ messages in thread
From: Paolo Bonzini @ 2013-06-03 6:35 UTC (permalink / raw)
To: Gleb Natapov; +Cc: kvm
Il 02/06/2013 17:33, Gleb Natapov ha scritto:
> On Thu, May 30, 2013 at 07:47:18PM +0200, Paolo Bonzini wrote:
>> This patch includes two fixes for SB:
>>
>> * the 3rd fixed counter ("ref cpu cycles") can sometimes report
>> less than the number of iterations
>>
>> * there is an 8th counter which causes out of bounds accesses
>> to gp_event or check_counters_many's cnt array
>>
>> There is still a bug in KVM, because the "pmu all counters-0"
>> test fails. (It passes if you use any 6 of the 8 gp counters,
>> fails if you use 7 or 8).
>>
> Changelog?
Changelog is simply that the patch applies. :(
v1 was hand-edited and I did not regenerate it after testing the edit:
-@@ -395,6 +396,14 @@ int main(int ac, char **av)
+@@ -395,6 +396,10 @@ int main(int ac, char **av)
Paolo
>> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
>> ---
>> x86/pmu.c | 21 +++++++++++++++------
>> 1 file changed, 15 insertions(+), 6 deletions(-)
>>
>> diff --git a/x86/pmu.c b/x86/pmu.c
>> index 2c46f31..dca753a 100644
>> --- a/x86/pmu.c
>> +++ b/x86/pmu.c
>> @@ -88,9 +88,10 @@ struct pmu_event {
>> }, fixed_events[] = {
>> {"fixed 1", MSR_CORE_PERF_FIXED_CTR0, 10*N, 10.2*N},
>> {"fixed 2", MSR_CORE_PERF_FIXED_CTR0 + 1, 1*N, 30*N},
>> - {"fixed 3", MSR_CORE_PERF_FIXED_CTR0 + 2, 1*N, 30*N}
>> + {"fixed 3", MSR_CORE_PERF_FIXED_CTR0 + 2, 0.1*N, 30*N}
>> };
>>
>> +static int num_counters;
>> static int tests, failures;
>>
>> char *buf;
>> @@ -237,7 +238,7 @@ static void check_gp_counter(struct pmu_event *evt)
>> };
>> int i;
>>
>> - for (i = 0; i < eax.split.num_counters; i++, cnt.ctr++) {
>> + for (i = 0; i < num_counters; i++, cnt.ctr++) {
>> cnt.count = 0;
>> measure(&cnt, 1);
>> report(evt->name, i, verify_event(cnt.count, evt));
>> @@ -276,7 +277,7 @@ static void check_counters_many(void)
>> pmu_counter_t cnt[10];
>> int i, n;
>>
>> - for (i = 0, n = 0; n < eax.split.num_counters; i++) {
>> + for (i = 0, n = 0; n < num_counters; i++) {
>> if (ebx.full & (1 << i))
>> continue;
>>
>> @@ -316,10 +317,10 @@ static void check_counter_overflow(void)
>> /* clear status before test */
>> wrmsr(MSR_CORE_PERF_GLOBAL_OVF_CTRL, rdmsr(MSR_CORE_PERF_GLOBAL_STATUS));
>>
>> - for (i = 0; i < eax.split.num_counters + 1; i++, cnt.ctr++) {
>> + for (i = 0; i < num_counters + 1; i++, cnt.ctr++) {
>> uint64_t status;
>> int idx;
>> - if (i == eax.split.num_counters)
>> + if (i == num_counters)
>> cnt.ctr = fixed_events[0].unit_sel;
>> if (i % 2)
>> cnt.config |= EVNTSEL_INT;
>> @@ -355,7 +356,7 @@ static void check_rdpmc(void)
>> uint64_t val = 0x1f3456789ull;
>> int i;
>>
>> - for (i = 0; i < eax.split.num_counters; i++) {
>> + for (i = 0; i < num_counters; i++) {
>> uint64_t x = (val & 0xffffffff) |
>> ((1ull << (eax.split.bit_width - 32)) - 1) << 32;
>> wrmsr(MSR_IA32_PERFCTR0 + i, val);
>> @@ -395,6 +396,10 @@ int main(int ac, char **av)
>> printf("Fixed counters: %d\n", edx.split.num_counters_fixed);
>> printf("Fixed counter width: %d\n", edx.split.bit_width_fixed);
>>
>> + num_counters = eax.split.num_counters;
>> + if (num_counters > ARRAY_SIZE(gp_events))
>> + num_counters = ARRAY_SIZE(gp_events);
>> +
>> apic_write(APIC_LVTPC, PC_VECTOR);
>>
>> check_gp_counters();
>> --
>> 1.8.2.1
>>
>> --
>> To unsubscribe from this list: send the line "unsubscribe kvm" in
>> the body of a message to majordomo@vger.kernel.org
>> More majordomo info at http://vger.kernel.org/majordomo-info.html
>
> --
> Gleb.
> --
> To unsubscribe from this list: send the line "unsubscribe kvm" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
>
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH kvm-unit-tests v2] pmu: fixes for Sandy Bridge hosts
2013-06-03 6:35 ` Paolo Bonzini
@ 2013-06-03 6:41 ` Gleb Natapov
0 siblings, 0 replies; 5+ messages in thread
From: Gleb Natapov @ 2013-06-03 6:41 UTC (permalink / raw)
To: Paolo Bonzini; +Cc: kvm
On Mon, Jun 03, 2013 at 08:35:21AM +0200, Paolo Bonzini wrote:
> Il 02/06/2013 17:33, Gleb Natapov ha scritto:
> > On Thu, May 30, 2013 at 07:47:18PM +0200, Paolo Bonzini wrote:
> >> This patch includes two fixes for SB:
> >>
> >> * the 3rd fixed counter ("ref cpu cycles") can sometimes report
> >> less than the number of iterations
> >>
> >> * there is an 8th counter which causes out of bounds accesses
> >> to gp_event or check_counters_many's cnt array
> >>
> >> There is still a bug in KVM, because the "pmu all counters-0"
> >> test fails. (It passes if you use any 6 of the 8 gp counters,
> >> fails if you use 7 or 8).
> >>
> > Changelog?
>
> Changelog is simply that the patch applies. :(
>
Just say so, I tried to see how they are different and failed.
> v1 was hand-edited and I did not regenerate it after testing the edit:
>
> -@@ -395,6 +396,14 @@ int main(int ac, char **av)
> +@@ -395,6 +396,10 @@ int main(int ac, char **av)
>
Yeah, hard to spot :)
> Paolo
>
> >> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
> >> ---
> >> x86/pmu.c | 21 +++++++++++++++------
> >> 1 file changed, 15 insertions(+), 6 deletions(-)
> >>
> >> diff --git a/x86/pmu.c b/x86/pmu.c
> >> index 2c46f31..dca753a 100644
> >> --- a/x86/pmu.c
> >> +++ b/x86/pmu.c
> >> @@ -88,9 +88,10 @@ struct pmu_event {
> >> }, fixed_events[] = {
> >> {"fixed 1", MSR_CORE_PERF_FIXED_CTR0, 10*N, 10.2*N},
> >> {"fixed 2", MSR_CORE_PERF_FIXED_CTR0 + 1, 1*N, 30*N},
> >> - {"fixed 3", MSR_CORE_PERF_FIXED_CTR0 + 2, 1*N, 30*N}
> >> + {"fixed 3", MSR_CORE_PERF_FIXED_CTR0 + 2, 0.1*N, 30*N}
> >> };
> >>
> >> +static int num_counters;
> >> static int tests, failures;
> >>
> >> char *buf;
> >> @@ -237,7 +238,7 @@ static void check_gp_counter(struct pmu_event *evt)
> >> };
> >> int i;
> >>
> >> - for (i = 0; i < eax.split.num_counters; i++, cnt.ctr++) {
> >> + for (i = 0; i < num_counters; i++, cnt.ctr++) {
> >> cnt.count = 0;
> >> measure(&cnt, 1);
> >> report(evt->name, i, verify_event(cnt.count, evt));
> >> @@ -276,7 +277,7 @@ static void check_counters_many(void)
> >> pmu_counter_t cnt[10];
> >> int i, n;
> >>
> >> - for (i = 0, n = 0; n < eax.split.num_counters; i++) {
> >> + for (i = 0, n = 0; n < num_counters; i++) {
> >> if (ebx.full & (1 << i))
> >> continue;
> >>
> >> @@ -316,10 +317,10 @@ static void check_counter_overflow(void)
> >> /* clear status before test */
> >> wrmsr(MSR_CORE_PERF_GLOBAL_OVF_CTRL, rdmsr(MSR_CORE_PERF_GLOBAL_STATUS));
> >>
> >> - for (i = 0; i < eax.split.num_counters + 1; i++, cnt.ctr++) {
> >> + for (i = 0; i < num_counters + 1; i++, cnt.ctr++) {
> >> uint64_t status;
> >> int idx;
> >> - if (i == eax.split.num_counters)
> >> + if (i == num_counters)
> >> cnt.ctr = fixed_events[0].unit_sel;
> >> if (i % 2)
> >> cnt.config |= EVNTSEL_INT;
> >> @@ -355,7 +356,7 @@ static void check_rdpmc(void)
> >> uint64_t val = 0x1f3456789ull;
> >> int i;
> >>
> >> - for (i = 0; i < eax.split.num_counters; i++) {
> >> + for (i = 0; i < num_counters; i++) {
> >> uint64_t x = (val & 0xffffffff) |
> >> ((1ull << (eax.split.bit_width - 32)) - 1) << 32;
> >> wrmsr(MSR_IA32_PERFCTR0 + i, val);
> >> @@ -395,6 +396,10 @@ int main(int ac, char **av)
> >> printf("Fixed counters: %d\n", edx.split.num_counters_fixed);
> >> printf("Fixed counter width: %d\n", edx.split.bit_width_fixed);
> >>
> >> + num_counters = eax.split.num_counters;
> >> + if (num_counters > ARRAY_SIZE(gp_events))
> >> + num_counters = ARRAY_SIZE(gp_events);
> >> +
> >> apic_write(APIC_LVTPC, PC_VECTOR);
> >>
> >> check_gp_counters();
> >> --
> >> 1.8.2.1
> >>
> >> --
> >> To unsubscribe from this list: send the line "unsubscribe kvm" in
> >> the body of a message to majordomo@vger.kernel.org
> >> More majordomo info at http://vger.kernel.org/majordomo-info.html
> >
> > --
> > Gleb.
> > --
> > To unsubscribe from this list: send the line "unsubscribe kvm" in
> > the body of a message to majordomo@vger.kernel.org
> > More majordomo info at http://vger.kernel.org/majordomo-info.html
> >
--
Gleb.
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH kvm-unit-tests v2] pmu: fixes for Sandy Bridge hosts
2013-05-30 17:47 [PATCH kvm-unit-tests v2] pmu: fixes for Sandy Bridge hosts Paolo Bonzini
2013-06-02 15:33 ` Gleb Natapov
@ 2013-06-03 8:36 ` Gleb Natapov
1 sibling, 0 replies; 5+ messages in thread
From: Gleb Natapov @ 2013-06-03 8:36 UTC (permalink / raw)
To: Paolo Bonzini; +Cc: kvm
On Thu, May 30, 2013 at 07:47:18PM +0200, Paolo Bonzini wrote:
> This patch includes two fixes for SB:
>
> * the 3rd fixed counter ("ref cpu cycles") can sometimes report
> less than the number of iterations
>
> * there is an 8th counter which causes out of bounds accesses
> to gp_event or check_counters_many's cnt array
>
> There is still a bug in KVM, because the "pmu all counters-0"
> test fails. (It passes if you use any 6 of the 8 gp counters,
> fails if you use 7 or 8).
>
> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Applied, thanks.
> ---
> x86/pmu.c | 21 +++++++++++++++------
> 1 file changed, 15 insertions(+), 6 deletions(-)
>
> diff --git a/x86/pmu.c b/x86/pmu.c
> index 2c46f31..dca753a 100644
> --- a/x86/pmu.c
> +++ b/x86/pmu.c
> @@ -88,9 +88,10 @@ struct pmu_event {
> }, fixed_events[] = {
> {"fixed 1", MSR_CORE_PERF_FIXED_CTR0, 10*N, 10.2*N},
> {"fixed 2", MSR_CORE_PERF_FIXED_CTR0 + 1, 1*N, 30*N},
> - {"fixed 3", MSR_CORE_PERF_FIXED_CTR0 + 2, 1*N, 30*N}
> + {"fixed 3", MSR_CORE_PERF_FIXED_CTR0 + 2, 0.1*N, 30*N}
> };
>
> +static int num_counters;
> static int tests, failures;
>
> char *buf;
> @@ -237,7 +238,7 @@ static void check_gp_counter(struct pmu_event *evt)
> };
> int i;
>
> - for (i = 0; i < eax.split.num_counters; i++, cnt.ctr++) {
> + for (i = 0; i < num_counters; i++, cnt.ctr++) {
> cnt.count = 0;
> measure(&cnt, 1);
> report(evt->name, i, verify_event(cnt.count, evt));
> @@ -276,7 +277,7 @@ static void check_counters_many(void)
> pmu_counter_t cnt[10];
> int i, n;
>
> - for (i = 0, n = 0; n < eax.split.num_counters; i++) {
> + for (i = 0, n = 0; n < num_counters; i++) {
> if (ebx.full & (1 << i))
> continue;
>
> @@ -316,10 +317,10 @@ static void check_counter_overflow(void)
> /* clear status before test */
> wrmsr(MSR_CORE_PERF_GLOBAL_OVF_CTRL, rdmsr(MSR_CORE_PERF_GLOBAL_STATUS));
>
> - for (i = 0; i < eax.split.num_counters + 1; i++, cnt.ctr++) {
> + for (i = 0; i < num_counters + 1; i++, cnt.ctr++) {
> uint64_t status;
> int idx;
> - if (i == eax.split.num_counters)
> + if (i == num_counters)
> cnt.ctr = fixed_events[0].unit_sel;
> if (i % 2)
> cnt.config |= EVNTSEL_INT;
> @@ -355,7 +356,7 @@ static void check_rdpmc(void)
> uint64_t val = 0x1f3456789ull;
> int i;
>
> - for (i = 0; i < eax.split.num_counters; i++) {
> + for (i = 0; i < num_counters; i++) {
> uint64_t x = (val & 0xffffffff) |
> ((1ull << (eax.split.bit_width - 32)) - 1) << 32;
> wrmsr(MSR_IA32_PERFCTR0 + i, val);
> @@ -395,6 +396,10 @@ int main(int ac, char **av)
> printf("Fixed counters: %d\n", edx.split.num_counters_fixed);
> printf("Fixed counter width: %d\n", edx.split.bit_width_fixed);
>
> + num_counters = eax.split.num_counters;
> + if (num_counters > ARRAY_SIZE(gp_events))
> + num_counters = ARRAY_SIZE(gp_events);
> +
> apic_write(APIC_LVTPC, PC_VECTOR);
>
> check_gp_counters();
> --
> 1.8.2.1
>
> --
> To unsubscribe from this list: send the line "unsubscribe kvm" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
--
Gleb.
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2013-06-03 8:36 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2013-05-30 17:47 [PATCH kvm-unit-tests v2] pmu: fixes for Sandy Bridge hosts Paolo Bonzini
2013-06-02 15:33 ` Gleb Natapov
2013-06-03 6:35 ` Paolo Bonzini
2013-06-03 6:41 ` Gleb Natapov
2013-06-03 8:36 ` Gleb Natapov
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox