mightydre...@gmail.com :
Can kvm boot a guest OS in an LVM on a USB hard disk.
Yes.
--
Architecte Informatique chez Blueline/Gulfsat:
Administration Systeme, Recherche Developpement
+261 34 56 000 19
--
To unsubscribe from this list: send the
On Wed, Oct 06, 2010 at 03:24:59PM -0400, Anthony Liguori wrote:
+qemu_compat_version = machine-compat_version;
+
if (display_type == DT_NOGRAPHIC) {
if (default_parallel)
add_device_config(DEV_PARALLEL, null);
--
1.7.0.4
Looks fine to me,
On 10/04/2010 05:56 PM, Gleb Natapov wrote:
If a guest accesses swapped out memory do not swap it in from vcpu thread
context. Schedule work to do swapping and put vcpu into halted state
instead.
Interrupts will still be delivered to the guest and if interrupt will
cause reschedule guest will
On 10/07/2010 11:50 AM, Avi Kivity wrote:
I missed where you halt the vcpu. Can you point me at the function?
Found it.
Multiplexing a guest state with a host state is a bad idea. Better have
separate state.
--
I have a truly marvellous patch that fixes the bug which this
signature is
On 10/06/2010 12:52 PM, Gleb Natapov wrote:
On Wed, Oct 06, 2010 at 12:50:01PM +0200, Avi Kivity wrote:
On 10/05/2010 04:59 PM, Marcelo Tosatti wrote:
On Mon, Oct 04, 2010 at 05:56:24PM +0200, Gleb Natapov wrote:
If a guest accesses swapped out memory do not swap it in from vcpu
On 10/06/2010 10:08 PM, Gleb Natapov wrote:
Malicious userspace can cause entry to be cached, ioctl
SET_USER_MEMORY_REGION 2^32 times, generation number will match,
mark_page_dirty_in_slot will be called with pointer to freed memory.
Hmm. To zap all cached entires on overflow we need to
On Wed, Oct 06, 2010 at 04:05:38PM -0600, Alex Williamson wrote:
On Wed, 2010-10-06 at 23:44 +0200, Michael S. Tsirkin wrote:
On Wed, Oct 06, 2010 at 11:24:24AM -0600, Alex Williamson wrote:
You could always keep the functions as separate wrapper callers of the
common function so you only
Am 30.09.2010 07:07, schrieb Nicholas A. Bellinger:
From: Nicholas Bellinger n...@linux-iscsi.org
Greetings Paul, Jan, Kevin and co,
This series is against my v0.12.5 qemu-kvm.git that contains QEMU SCSI layer
SGL passthrough from Gerd Hoffman, 8708EM2 MegaSas emulation from Dr. Hannes
Please provide some informations about the release date of qemu-kvm 0.13
Thanks--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
On 10/07/2010 01:30 PM, Nico Prenzel wrote:
Please provide some informations about the release date of qemu-kvm 0.13
qemu-kvm 0.13 will be released shortly after qemu 0.13 is released.
--
I have a truly marvellous patch that fixes the bug which this
signature is too narrow to contain.
--
hmm, and when will qemu 0.13 be released?
Ok, I know. That's the wrong mailing list.--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
On 10/07/2010 02:01 PM, Nico Prenzel wrote:
hmm, and when will qemu 0.13 be released?
I don't know.
Ok, I know. That's the wrong mailing list.
That, too.
--
I have a truly marvellous patch that fixes the bug which this
signature is too narrow to contain.
--
To unsubscribe from this
Am 23.09.2010 04:21, schrieb Yehuda Sadeh Weinraub:
Following up on this one, I'd like to know whether there is any
pending issue preventing rbd from being included upstream.
Basically for me the only problem at the moment is a lack of reviews. If
nobody else picks it up, I'll get to it
On 10/04/2010 05:56 PM, Gleb Natapov wrote:
When page is swapped in it is mapped into guest memory only after guest
tries to access it again and generate another fault. To save this fault
we can map it immediately since we know that guest is going to access
the page. Do it only when tdp is
On Mon, Aug 16, 2010 at 1:53 AM, Teck Choon Giam
giamteckch...@gmail.com wrote:
On Mon, Aug 16, 2010 at 12:19 AM, Avi Kivity a...@redhat.com wrote:
On 08/15/2010 07:15 PM, Teck Choon Giam wrote:
Let me know if I have done anything wrong about the bisecting... ...
All looks fine, but what
On 10/04/2010 05:56 PM, Gleb Natapov wrote:
Keep track of memslots changes by keeping generation number in memslots
structure. Provide kvm_write_guest_cached() function that skips
gfn_to_hva() translation if memslots was not changed since previous
invocation.
btw, this patch (and patch 5, and
On 10/04/2010 05:56 PM, Gleb Natapov wrote:
Guest enables async PF vcpu functionality using this MSR.
return NON_PRESENT;
+
+MSR_KVM_ASYNC_PF_EN: 0x4b564d02
+ data: Bits 63-6 hold 64-byte aligned physical address of a 32bit memory
Given that it must be aligned
On 10/07/2010 03:42 AM, Roedel, Joerg wrote:
On Wed, Oct 06, 2010 at 03:24:59PM -0400, Anthony Liguori wrote:
+qemu_compat_version = machine-compat_version;
+
if (display_type == DT_NOGRAPHIC) {
if (default_parallel)
add_device_config(DEV_PARALLEL,
On 10/04/2010 05:56 PM, Gleb Natapov wrote:
Enable async PF in a guest if async PF capability is discovered.
+void __cpuinit kvm_guest_cpu_init(void)
+{
+ if (!kvm_para_available())
+ return;
+
+ if (kvm_para_has_feature(KVM_FEATURE_ASYNC_PF) kvmapf) {
+
On 10/04/2010 05:56 PM, Gleb Natapov wrote:
+
+ Physical address points to 32 bit memory location that will be written
+ to by the hypervisor at the time of asynchronous page fault injection to
+ indicate type of asynchronous page fault. Value of 1 means that the page
+
On 10/04/2010 05:56 PM, Gleb Natapov wrote:
When async PF capability is detected hook up special page fault handler
that will handle async page fault events and bypass other page faults to
regular page fault handler. Also add async PF handling to nested SVM
emulation. Async PF always generates
On 10/07/2010 05:50 AM, Avi Kivity wrote:
+static bool can_do_async_pf(struct kvm_vcpu *vcpu)
+{
+ if (unlikely(!irqchip_in_kernel(vcpu-kvm) ||
+ kvm_event_needs_reinjection(vcpu)))
+ return false;
+
+ return kvm_x86_ops-interrupt_allowed(vcpu);
+}
Strictly speaking, if the cpu can handle
On 10/07/2010 03:24 PM, Rik van Riel wrote:
On 10/07/2010 05:50 AM, Avi Kivity wrote:
+static bool can_do_async_pf(struct kvm_vcpu *vcpu)
+{
+ if (unlikely(!irqchip_in_kernel(vcpu-kvm) ||
+ kvm_event_needs_reinjection(vcpu)))
+ return false;
+
+ return kvm_x86_ops-interrupt_allowed(vcpu);
+}
On 10/04/2010 05:56 PM, Gleb Natapov wrote:
If guest can detect that it runs in non-preemptable context it can
handle async PFs at any time, so let host know that it can send async
PF even if guest cpu is not in userspace.
MSR_KVM_ASYNC_PF_EN: 0x4b564d02
data: Bits 63-6 hold
On Wed, 06 Oct 2010 23:09:33 -0300
Lucas Meneghel Rodrigues l...@redhat.com wrote:
On Mon, 2010-09-27 at 18:43 -0400, Lucas Meneghel Rodrigues wrote:
We are close to the end of this journey. Several little problems
were fixed and we are down to some little problems:
Ok, all patches
On Thu, 2010-10-07 at 19:15 +0530, pradeep wrote:
On Wed, 06 Oct 2010 23:09:33 -0300
Lucas Meneghel Rodrigues l...@redhat.com wrote:
On Mon, 2010-09-27 at 18:43 -0400, Lucas Meneghel Rodrigues wrote:
We are close to the end of this journey. Several little problems
were fixed and we are
On 08/03/2010 03:14 PM, Christian Brunner wrote:
On Tue, Aug 03, 2010 at 12:37:18AM +0400, malc wrote:
Thare are whitespace issues in this patch.
Thanks for looking at the patch. Here is an updated patch, that
should fix the whitespace issues:
This is a block driver for the
On Thu, 07 Oct 2010 10:54:16 -0300
Lucas Meneghel Rodrigues l...@redhat.com wrote:
I tested macchange quite a lot, so I wonder what the problem is. About
guest_s4, interesting, we've been running this for a while, with no
apparent problems. Please let us know and let's fix it ASAP.
I
On Thu, Oct 07, 2010 at 08:07:04PM +0530, pradeep wrote:
On Thu, 07 Oct 2010 10:54:16 -0300
Lucas Meneghel Rodrigues l...@redhat.com wrote:
I tested macchange quite a lot, so I wonder what the problem is. About
guest_s4, interesting, we've been running this for a while, with no
On Thu, 2010-10-07 at 11:57 +0200, Michael S. Tsirkin wrote:
On Wed, Oct 06, 2010 at 04:05:38PM -0600, Alex Williamson wrote:
On Wed, 2010-10-06 at 23:44 +0200, Michael S. Tsirkin wrote:
On Wed, Oct 06, 2010 at 11:24:24AM -0600, Alex Williamson wrote:
You could always keep the functions
Peter Lieven wrote:
Am 03.10.2010 um 01:48 schrieb Peter Lieven:
Hi,
running 0.12.5 with a Ubuntu LTS 10.04.1 64-bit kernel I see the following
error after a few days with severe load (constant 100-200mbps input).
# uname -a
Linux ubuntu-newsfeed 2.6.32-24-server #43-Ubuntu SMP Thu Sep
On 10/06/2010 10:41 PM, Hidetoshi Seto wrote:
(2010/10/07 3:10), Dean Nelson wrote:
On 10/06/2010 11:05 AM, Marcelo Tosatti wrote:
On Wed, Oct 06, 2010 at 10:58:36AM +0900, Hidetoshi Seto wrote:
I got some more question:
(2010/10/05 3:54), Marcelo Tosatti wrote:
Index:
Looks fine except for the extra white space here and copied below.
Thanks,
Alex
OK, I fixed this up and queued the patch with your ack.
Thanks for the review!
--
MST
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More
hi everybody,
is it a problem to update kvm (the kvm package (qemu-kvm on debian) with
the package manager) while some vms are turned on? or should i shutdown
all vms first?
thanks
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
On Thu, Oct 07, 2010 at 12:00:13PM +0200, Avi Kivity wrote:
On 10/06/2010 10:08 PM, Gleb Natapov wrote:
Malicious userspace can cause entry to be cached, ioctl
SET_USER_MEMORY_REGION 2^32 times, generation number will match,
mark_page_dirty_in_slot will be called with pointer to freed
On Thu, Oct 07, 2010 at 12:42:48PM -0300, Marcelo Tosatti wrote:
On Thu, Oct 07, 2010 at 12:00:13PM +0200, Avi Kivity wrote:
On 10/06/2010 10:08 PM, Gleb Natapov wrote:
Malicious userspace can cause entry to be cached, ioctl
SET_USER_MEMORY_REGION 2^32 times, generation number will
On 10/07/2010 06:03 PM, Gleb Natapov wrote:
Isn't SET_USER_MEMORY_REGION so slow that calling it 2^32 times
isn't really feasible?
Assuming it takes 1ms, it would take 49 days.
We may fail ioctl when max value is reached. The question is how much slot
changes can we expect from
On Tue, Oct 05, 2010 at 03:14:32PM +0200, Gleb Natapov wrote:
Add tracepoint for userspace exit.
Signed-off-by: Gleb Natapov g...@redhat.com
diff --git a/include/trace/events/kvm.h b/include/trace/events/kvm.h
index 6dd3a51..fb44da0 100644
--- a/include/trace/events/kvm.h
+++
Avi, Marcelo,
Assuming this gets merged to qemu.git, you'll need the attached trivial
updates for the qemu-kvm.git merge. Thanks,
Alex
On Wed, 2010-10-06 at 14:58 -0600, Alex Williamson wrote:
Our code paths for saving or migrating a VM are full of functions that
return void, leaving no
On Thu, Oct 07, 2010 at 03:10:27PM +0200, Avi Kivity wrote:
On 10/04/2010 05:56 PM, Gleb Natapov wrote:
When async PF capability is detected hook up special page fault handler
that will handle async page fault events and bypass other page faults to
regular page fault handler. Also add async
On 10/07/2010 07:14 PM, Gleb Natapov wrote:
On Thu, Oct 07, 2010 at 03:10:27PM +0200, Avi Kivity wrote:
On 10/04/2010 05:56 PM, Gleb Natapov wrote:
When async PF capability is detected hook up special page fault handler
that will handle async page fault events and bypass other page
On Thu, Oct 07, 2010 at 02:29:07PM +0200, Avi Kivity wrote:
On 10/04/2010 05:56 PM, Gleb Natapov wrote:
When page is swapped in it is mapped into guest memory only after guest
tries to access it again and generate another fault. To save this fault
we can map it immediately since we know that
The following patches fix qemu-kvm specific crashes
with vhost-net. They need to be applied before
qemu.git including analogous changes is merged,
otherwise bisect is broken.
They are needed on stable as well.
The following changes since commit c2333d898b52a9d64845522f18fd083534dc0a5b:
kvm:
On Thu, Oct 07, 2010 at 06:20:53PM +0200, Avi Kivity wrote:
On 10/07/2010 06:03 PM, Gleb Natapov wrote:
Isn't SET_USER_MEMORY_REGION so slow that calling it 2^32 times
isn't really feasible?
Assuming it takes 1ms, it would take 49 days.
We may fail ioctl when max value is
On Mon, Oct 04, 2010 at 03:26:30PM -0600, Alex Williamson wrote:
We don't need to duplicate PCI code for mapping and managing the
option ROM for an assigned device. We're already using an in-memory
copy of the ROM, so we can simply fill the contents from the physical
device and pass the rest
On Thu, 2010-10-07 at 19:18 +0200, Michael S. Tsirkin wrote:
On Mon, Oct 04, 2010 at 03:26:30PM -0600, Alex Williamson wrote:
--- a/hw/device-assignment.c
+++ b/hw/device-assignment.c
...
@@ -1644,58 +1621,64 @@ void add_assigned_devices(PCIBus *bus, const char
**devices, int n_devices)
On Thu, Oct 07, 2010 at 11:50:08AM +0200, Avi Kivity wrote:
On 10/04/2010 05:56 PM, Gleb Natapov wrote:
If a guest accesses swapped out memory do not swap it in from vcpu thread
context. Schedule work to do swapping and put vcpu into halted state
instead.
Interrupts will still be delivered
On Thu, Oct 07, 2010 at 11:54:22AM +0200, Avi Kivity wrote:
On 10/06/2010 12:52 PM, Gleb Natapov wrote:
On Wed, Oct 06, 2010 at 12:50:01PM +0200, Avi Kivity wrote:
On 10/05/2010 04:59 PM, Marcelo Tosatti wrote:
On Mon, Oct 04, 2010 at 05:56:24PM +0200, Gleb Natapov wrote:
If a
On 10/07/2010 01:18 PM, Avi Kivity wrote:
On 10/07/2010 07:14 PM, Gleb Natapov wrote:
Host side keeps track of outstanding apfs and will not send apf for the
same phys address twice. It will halt vcpu instead.
What about different pages, running the scheduler code?
Oh, and we'll run the
On Thu, Oct 07, 2010 at 02:42:06PM +0200, Avi Kivity wrote:
On 10/04/2010 05:56 PM, Gleb Natapov wrote:
Guest enables async PF vcpu functionality using this MSR.
return NON_PRESENT;
+
+MSR_KVM_ASYNC_PF_EN: 0x4b564d02
+data: Bits 63-6 hold 64-byte aligned physical
On Thu, Oct 07, 2010 at 01:18:39PM -0300, Marcelo Tosatti wrote:
On Tue, Oct 05, 2010 at 03:14:32PM +0200, Gleb Natapov wrote:
Add tracepoint for userspace exit.
Signed-off-by: Gleb Natapov g...@redhat.com
diff --git a/include/trace/events/kvm.h b/include/trace/events/kvm.h
index
On Thu, Oct 07, 2010 at 02:58:26PM +0200, Avi Kivity wrote:
On 10/04/2010 05:56 PM, Gleb Natapov wrote:
+
+Physical address points to 32 bit memory location that will be written
+to by the hypervisor at the time of asynchronous page fault injection to
+indicate type of
The PCI bus has only 32 slots (devices), 3 taken by chipset + vga, and
a 4th if you have, for example, a virtio disk. Are you sure these are
33 PCI devices and not 33 PCI functions?
No, not sure.
Apparently my statement was based on an uninformed assumption.
I tested using a VM that had 30
On Thu, Oct 07, 2010 at 07:18:03PM +0200, Avi Kivity wrote:
On 10/07/2010 07:14 PM, Gleb Natapov wrote:
On Thu, Oct 07, 2010 at 03:10:27PM +0200, Avi Kivity wrote:
On 10/04/2010 05:56 PM, Gleb Natapov wrote:
When async PF capability is detected hook up special page fault handler
that
On Thu, Oct 7, 2010 at 7:12 AM, Anthony Liguori anth...@codemonkey.ws wrote:
On 08/03/2010 03:14 PM, Christian Brunner wrote:
+#include qemu-common.h
+#include qemu-error.h
+#includesys/types.h
+#includestdbool.h
+
+#includeqemu-common.h
This looks to be unnecessary. Generally, system
On 10/07/2010 01:08 PM, Yehuda Sadeh Weinraub wrote:
On Thu, Oct 7, 2010 at 7:12 AM, Anthony Liguorianth...@codemonkey.ws wrote:
On 08/03/2010 03:14 PM, Christian Brunner wrote:
+#include qemu-common.h
+#include qemu-error.h
+#includesys/types.h
+#includestdbool.h
+
On Thu, Oct 7, 2010 at 11:38 AM, Anthony Liguori anth...@codemonkey.ws wrote:
On 10/07/2010 01:08 PM, Yehuda Sadeh Weinraub wrote:
On Thu, Oct 7, 2010 at 7:12 AM, Anthony Liguorianth...@codemonkey.ws
wrote:
On 08/03/2010 03:14 PM, Christian Brunner wrote:
+#include qemu-common.h
On Wed, Oct 06, 2010 at 11:20:50AM -0300, Marcelo Tosatti wrote:
On Wed, Oct 06, 2010 at 01:07:04PM +0200, Gleb Natapov wrote:
Can't you set a bit in vcpu-requests instead, and handle it in out:
at the end of vcpu_enter_guest?
To have a single entry point for pagefaults, after
On 10/07/2010 01:41 PM, Yehuda Sadeh Weinraub wrote:
On Thu, Oct 7, 2010 at 11:38 AM, Anthony Liguorianth...@codemonkey.ws wrote:
On 10/07/2010 01:08 PM, Yehuda Sadeh Weinraub wrote:
On Thu, Oct 7, 2010 at 7:12 AM, Anthony Liguorianth...@codemonkey.ws
wrote:
On
This series is an _initial_ work on having a full QMP test-suite in
kvm-autotest. I think it's very near of being in a mergeable state, but I
figured it would be a good idea to get some feedback before submitting the
final version.
You'll find all important details in the patches, being the last
This method directly sends data to the QMP monitor and returns its
response without any kind of special treatment or sanity checking.
The send_cmd() method is also introduced. It's a simple wrapper
which sends a QMP command to the monitor.
Both methods are going to be used by the QMP test-suite.
On Thu, 7 Oct 2010 16:52:04 -0300
Luiz Capitulino lcapitul...@redhat.com wrote:
This series is an _initial_ work on having a full QMP test-suite in
kvm-autotest. I think it's very near of being in a mergeable state, but I
figured it would be a good idea to get some feedback before submitting
Signed-off-by: Luiz Capitulino lcapitul...@redhat.com
---
Eduardo, can you actually commit to a git mirror? It's hard to work in your
repo w/o this file.
.gitignore |7 +++
1 files changed, 7 insertions(+), 0 deletions(-)
create mode 100644 .gitignore
diff --git a/.gitignore
On Thu, Oct 7, 2010 at 12:51 PM, Anthony Liguori anth...@codemonkey.ws wrote:
On 10/07/2010 01:41 PM, Yehuda Sadeh Weinraub wrote:
On Thu, Oct 7, 2010 at 11:38 AM, Anthony Liguorianth...@codemonkey.ws
wrote:
On 10/07/2010 01:08 PM, Yehuda Sadeh Weinraub wrote:
On Thu, Oct 7, 2010 at 7:12
On 10/07/2010 03:47 PM, Yehuda Sadeh Weinraub wrote:
How is that possible? Are the callbacks delivered in the context of a
different thread? If so, don't you need locking?
Not sure I'm completely following you. The callbacks are delivered in
the context of a different thread, but won't
On Thu, Oct 7, 2010 at 2:04 PM, Anthony Liguori anth...@codemonkey.ws wrote:
On 10/07/2010 03:47 PM, Yehuda Sadeh Weinraub wrote:
How is that possible? Are the callbacks delivered in the context of a
different thread? If so, don't you need locking?
Not sure I'm completely following you.
On 10/07/2010 04:49 PM, Yehuda Sadeh Weinraub wrote:
On Thu, Oct 7, 2010 at 2:04 PM, Anthony Liguorianth...@codemonkey.ws wrote:
On 10/07/2010 03:47 PM, Yehuda Sadeh Weinraub wrote:
How is that possible? Are the callbacks delivered in the context of a
different thread? If so,
The is_responsive() method in QMPMonitor class uses the query-version
command to check if the monitor is alive and the same method in the
HumanMonitor class uses the help command.
This commit changes both classes to use the status command instead,
so that:
o The QEMU's response is shorter when
On Thu, 7 Oct 2010, Anthony Liguori wrote:
On 10/07/2010 04:49 PM, Yehuda Sadeh Weinraub wrote:
On Thu, Oct 7, 2010 at 2:04 PM, Anthony Liguorianth...@codemonkey.ws
wrote:
On 10/07/2010 03:47 PM, Yehuda Sadeh Weinraub wrote:
How is that possible? Are the callbacks
On Thu, Oct 07, 2010 at 11:34:01AM -0600, Alex Williamson wrote:
On Thu, 2010-10-07 at 19:18 +0200, Michael S. Tsirkin wrote:
On Mon, Oct 04, 2010 at 03:26:30PM -0600, Alex Williamson wrote:
--- a/hw/device-assignment.c
+++ b/hw/device-assignment.c
...
@@ -1644,58 +1621,64 @@ void
On 2010-10-03 01:42, Zachary Amsden wrote:
...
Umm... do you guys have this commit? This is supposed to address the
issue where the guest keeps resetting the TSC. A guest which does that
will break kvmclock. It only happens on SMP, and it's much worse on AMD
CPUs...
sound like your
On 10/07/2010 02:12 PM, Arjan Koers wrote:
On 2010-10-03 01:42, Zachary Amsden wrote:
...
Umm... do you guys have this commit? This is supposed to address the
issue where the guest keeps resetting the TSC. A guest which does that
will break kvmclock. It only happens on SMP, and it's
On Thu, 2010-10-07 at 00:05 +0800, Marcelo Tosatti wrote:
On Wed, Oct 06, 2010 at 10:58:36AM +0900, Hidetoshi Seto wrote:
I got some more question:
(2010/10/05 3:54), Marcelo Tosatti wrote:
Index: qemu/target-i386/cpu.h
Hi, Seto,
On Thu, 2010-10-07 at 11:41 +0800, Hidetoshi Seto wrote:
(2010/10/07 3:10), Dean Nelson wrote:
On 10/06/2010 11:05 AM, Marcelo Tosatti wrote:
On Wed, Oct 06, 2010 at 10:58:36AM +0900, Hidetoshi Seto wrote:
I got some more question:
(2010/10/05 3:54), Marcelo Tosatti wrote:
On Fri, 2010-10-08 at 00:45 +0200, Michael S. Tsirkin wrote:
On Thu, Oct 07, 2010 at 11:34:01AM -0600, Alex Williamson wrote:
On Thu, 2010-10-07 at 19:18 +0200, Michael S. Tsirkin wrote:
On Mon, Oct 04, 2010 at 03:26:30PM -0600, Alex Williamson wrote:
--- a/hw/device-assignment.c
+++
On Thu, Oct 7, 2010 at 11:43 PM, sofa5...@lavabit.com wrote:
hi everybody,
is it a problem to update kvm (the kvm package (qemu-kvm on debian) with
the package manager) while some vms are turned on? or should i shutdown
all vms first?
From personal experience (install from source), there
Hi, Huang-san,
(2010/10/08 12:15), Huang Ying wrote:
Hi, Seto,
On Thu, 2010-10-07 at 11:41 +0800, Hidetoshi Seto wrote:
(2010/10/07 3:10), Dean Nelson wrote:
On 10/06/2010 11:05 AM, Marcelo Tosatti wrote:
On Wed, Oct 06, 2010 at 10:58:36AM +0900, Hidetoshi Seto wrote:
I got some more
-Original Message-
From: Alexander Graf [mailto:ag...@suse.de]
Sent: Wednesday, October 06, 2010 3:42 AM
To: Wood Scott-B07421
Cc: kvm-ppc@vger.kernel.org; Liu Yu-B13201
Subject: Re: [PATCH] KVM: PPC: e500: Call kvm_vcpu_uninit()
before kvmppc_e500_tlb_uninit().
On
78 matches
Mail list logo