From: Christian Ehrhardt ehrha...@linux.vnet.ibm.com
Some parts of the changes made were arch specific e..g vga mem.
This is a quick, but ugly workaround until a real arch split is found.
Signed-off-by: Christian Ehrhardt ehrha...@linux.vnet.ibm.com
Signed-off-by: Avi Kivity a...@redhat.com
From: Xiantao Zhang xiantao.zh...@intel.com
Signed-off-by: Xiantao Zhang xiantao.zh...@intel.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/qemu/qemu-kvm.c b/qemu/qemu-kvm.c
index 92ad5ef..56bdedd 100644
--- a/qemu/qemu-kvm.c
+++ b/qemu/qemu-kvm.c
@@ -602,11 +602,13 @@ int
From: Alexander Graf ag...@suse.de
In order to use the new nested SVM support in KVM, we need to
expose the SVM capability to the virtual machine.
The current code masks this bit out.
In order to expose the SVM capability to the guest, I added
a -enable-nesting command line option, that makes
From: Avi Kivity a...@redhat.com
Instead of calculating it on every shadow page allocation, set it once
when switching modes, and copy it when allocating pages.
This doesn't buy us much, but sets up the stage for inheriting more
information related to the mmu setup.
Signed-off-by: Avi Kivity
From: Xiantao Zhang xiantao.zh...@intel.com
Remove some unnecessary blank lines to accord with Kernel's coding style.
Also remove vcpu_get_itir_on_fault due to no reference to it.
Signed-off-by: Xiantao Zhang xiantao.zh...@intel.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git
From: Jes Sorensen j...@sgi.com
Implement KVM_IA64_VCPU_[GS]ET_STACK ioctl calls. This is required
for live migrations.
Patch is based on previous implementation that was part of old
GET/SET_REGS ioctl calls.
Signed-off-by: Jes Sorensen j...@sgi.com
Signed-off-by: Avi Kivity a...@redhat.com
From: Jan Kiszka jan.kis...@siemens.com
Remove the remaining arch fragments of the old guest debug interface
that now break non-x86 builds.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/ia64/include/asm/kvm_host.h
From: Avi Kivity a...@redhat.com
If cr4.pge is cleared, we ought to treat any ptes in the page as non-global.
This allows us to remove the check from set_spte().
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index 03dc21f..9871d9d 100644
---
From: Avi Kivity a...@redhat.com
Don't allow a vcpu with cr4.pge cleared to use a shadow page created with
cr4.pge set; this might cause a cr3 switch not to sync ptes that have the
global bit set (the global bit has no effect if !cr4.pge).
This can only occur on smp with different cr4.pge
On Saturday 20 December 2008 03:33:26 Linus Torvalds wrote:
Christmas at Rusty's house:
Dreary.
Far from! Sure, it's Arabella's first Xmas, but a Very Kernel Christmas can
be lots of fun. Why just this morning, we did this together! See if you
can tell which bits are hers...
Subject:
Hi All,
This is our Weekly KVM Testing Report against lastest kvm.git
8863dbd3652ba2f97b157c21c41650de6fbc4d12 and kvm-userspace.git
8a7c802e52110d6e72169fa76669e5c83f91a590.
PAE Vista guest display broken issue is fixed. But We found SMP PAE Vista crash
issue with inject_page_fault on latest
On Fri, Dec 19, 2008 at 06:44:01PM +0100, Max Kellermann wrote:
By starting kvm with -s, I was able to attach gdb to KVM. The
following backtrace is with default options:
#0 0x8023f3e0 in update_wall_time () at
kernel/time/timekeeping.c:515
[...]
The next one is with noapic
Guillaume Thouvenin wrote:
This patch emulates CPUID instruction. It should work but when I'm
testing it in kvm-userspace, the cpuid instruction seems to have no
effect (I mean eax == ebx == ecx == edx == 0x0). Should
kvm_cpuid_emulate() be modified? Is cpuid instruction correctly
implemented?
Bugs item #2443886, was opened at 2008-12-18 04:04
Message generated for change (Comment added) made by avik
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2443886group_id=180599
Please note that this message will contain a full copy of the comment
Xu, Jiajun wrote:
Two New issues:
1. SMP PAE Vista guest crash with inject_page_fault
https://sourceforge.net/tracker/index.php?func=detailaid=2443886group_id=180599atid=893831
Caused by global pte handling when cr4.pge is disabled; fixed for
On Fri, Dec 5, 2008 at 11:14 AM, Beth Kon e...@us.ibm.com wrote:
I pulled the latest:
kvm (commit 3c260758b41000986c3c064b17a9771286e98d1e)
kvm-userspace (commit 6892f63c18a526c7b54bbde2f59287787eabe1f8)
and built and installed the 2.6.28-rc7 x86_64 kernel from kvm pull, then
tried to
16 matches
Mail list logo