https://bugzilla.kernel.org/show_bug.cgi?id=30042
Avi Kivity a...@redhat.com changed:
What|Removed |Added
CC||a...@redhat.com
---
Le 27/02/2011 18:00, Michael S. Tsirkin a écrit :
On Fri, Feb 25, 2011 at 10:07:22AM +0100, Jean-Philippe Menil wrote:
Hi,
Each time i try tou use vhost_net, i'm facing a kernel bug.
I do a modprobe vhost_net, and start guest whith vhost=on.
Following is a trace with a kernel 2.6.37, but i
After gathering the comments about the two series I sent separately,
here is the full series for Win32 iothread support. It is based on
master, but as it touches (mostly, indeed) OS-independent parts it
is safer to get it in through uq/master.
Patches 1 to 5 are generic Win32 improvements,
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
qemu-timer.c |7 ++-
1 files changed, 6 insertions(+), 1 deletions(-)
diff --git a/qemu-timer.c b/qemu-timer.c
index 88c7b28..122e7ed 100644
--- a/qemu-timer.c
+++ b/qemu-timer.c
@@ -1004,6 +1004,7 @@ static void
Multimedia timers are only useful for compatibility with Windows NT 4.0
and earlier. Plus, the implementation in Wine is extremely heavyweight.
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
qemu-timer.c | 86 +++--
1 files changed, 35
From: Jan Kiszka jan.kis...@siemens.com
We have qemu_cpu_self and qemu_thread_self. The latter is retrieving the
current thread, the former is checking for equality (using CPUState). We
also have qemu_thread_equal which is only used like qemu_cpu_self.
This refactors the interfaces, creating
For now, qemu_cond_timedwait and qemu_mutex_timedlock are left as
POSIX-only functions. They can be removed later, once the patches
that remove their uses are in.
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
Makefile.objs|4 +-
qemu-thread.c =
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
cpus.c |3 +--
1 files changed, 1 insertions(+), 2 deletions(-)
diff --git a/cpus.c b/cpus.c
index 09ce6fe..c5743c4 100644
--- a/cpus.c
+++ b/cpus.c
@@ -32,6 +32,7 @@
#include kvm.h
#include exec-all.h
+#include qemu-thread.h
#include
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
configure |2 --
1 files changed, 0 insertions(+), 2 deletions(-)
diff --git a/configure b/configure
index 3036faf..4de26d2 100755
--- a/configure
+++ b/configure
@@ -2662,7 +2662,6 @@ if test $vnc_png != no ; then
fi
if test $vnc_thread
These are already present in the Win32 implementation, add them to
the pthread wrappers as well. Use PTHREAD_MUTEX_ERRORCHECK for mutex
operations. Later we'll add tracking of the owner for cond_signal/broadcast.
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
qemu-thread-posix.c | 23
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
os-win32.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/os-win32.c b/os-win32.c
index b214e6a..c971d92 100644
--- a/os-win32.c
+++ b/os-win32.c
@@ -140,7 +140,9 @@ void os_host_main_loop_wait(int *timeout)
All implementations are now the same, and there is only one caller,
so inline the function there.
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
cpu-exec.c |9 +++--
target-alpha/exec.h | 11 ---
target-arm/exec.h| 13 -
Sometimes vcpus are stopped directly without going through -stop = 1.
Exit the VCPU execution loop in this case as well.
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
cpus.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/cpus.c b/cpus.c
index c5743c4..785a104
This ensures env-halt_cond is broadcast, and the loop in
qemu_tcg_wait_io_event and qemu_kvm_wait_io_event is exited
naturally rather than through a timeout.
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
hw/ppc.c |2 ++
hw/sun4m.c | 10 --
hw/sun4u.c
qemu_main_loop_start is the only place where qemu_system_ready is set
to 1.
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
cpus.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/cpus.c b/cpus.c
index 4c3837f..e367b3b 100644
--- a/cpus.c
+++ b/cpus.c
@@ -823,7
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
cpus.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/cpus.c b/cpus.c
index 4305184..32e9352 100644
--- a/cpus.c
+++ b/cpus.c
@@ -1086,9 +1086,11 @@ bool cpu_exec_all(void)
qemu_clock_enable(vm_clock,
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
cpus.c | 87 ++-
1 files changed, 36 insertions(+), 51 deletions(-)
diff --git a/cpus.c b/cpus.c
index 32e9352..2b491a9 100644
--- a/cpus.c
+++ b/cpus.c
@@ -346,11 +346,37 @@ static
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
cpus.c | 143 ---
1 files changed, 73 insertions(+), 70 deletions(-)
diff --git a/cpus.c b/cpus.c
index 2b491a9..e0bcb5c 100644
--- a/cpus.c
+++ b/cpus.c
@@ -196,6 +196,16 @@ static
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
cpus.c |4
1 files changed, 4 insertions(+), 0 deletions(-)
diff --git a/cpus.c b/cpus.c
index e0bcb5c..7559a02 100644
--- a/cpus.c
+++ b/cpus.c
@@ -867,12 +867,16 @@ void qemu_cpu_kick(void *_env)
void qemu_cpu_kick_self(void)
{
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
cpus.c | 25 ++---
qemu-thread-posix.c |9 -
qemu-thread-posix.h |1 -
3 files changed, 22 insertions(+), 13 deletions(-)
diff --git a/cpus.c b/cpus.c
index 7559a02..077729c 100644
---
all_vcpus_paused can start returning true after penv-stopped changes
from 0 to 1. When this is done, qemu_pause_cond is always signaled.
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
cpus.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/cpus.c b/cpus.c
index
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
cpus.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/cpus.c b/cpus.c
index 785a104..6cfb45b 100644
--- a/cpus.c
+++ b/cpus.c
@@ -1012,8 +1012,10 @@ void qemu_notify_event(void)
void cpu_stop_current(void)
{
if
Whenever env-created becomes true, qemu_cpu_cond is signaled by
{kvm,tcg}_cpu_thread_fn.
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
cpus.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/cpus.c b/cpus.c
index 8f169ad..4305184 100644
--- a/cpus.c
+++ b/cpus.c
The following conditions can cause cpu_has_work(env) to become true:
- env-queued_work_first: run_on_cpu is already kicking the VCPU
- env-stop = 1: pause_all_vcpus is already kicking the VCPU
- env-stopped = 0: resume_all_vcpus is already kicking the VCPU
- vm_running = 1: vm_start is calling
From: Aurelien Jarno aurel...@aurel32.net
All targets except SH4 have the same cpu_halted() routine, and it has
only one caller. It is therefore a good candidate for inlining.
The difference is the handling of the intr_at_halt, which is necessary
to ignore SR.BL when sleeping. Move intr_at_halt
On 02/28/2011 11:10 AM, Paolo Bonzini wrote:
After gathering the comments about the two series I sent separately,
here is the full series for Win32 iothread support. It is based on
master, but as it touches (mostly, indeed) OS-independent parts it
is safer to get it in through uq/master.
Why
On 02/21/2011 01:28 PM, Jan Kiszka wrote:
This avoids that early cpu_synchronize_state calls try to retrieve an
uninitialized state from the kernel,
Thanks, applied.
which even causes a deadlock.
How?
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from
On 02/21/2011 05:51 AM, Lai Jiangshan wrote:
use EFER_SCE, EFER_LME and EFER_LMA instead of magic numbers.
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
On Mon, Feb 28, 2011 at 9:10 AM, Paolo Bonzini pbonz...@redhat.com wrote:
+static unsigned __stdcall win32_start_routine(void *arg)
+{
+ struct QemuThreadData data = *(struct QemuThreadData *) arg;
+ QemuThread *thread = data.thread;
+
+ free(arg);
qemu_free(arg);
Stefan
--
To
On Mon, Feb 28, 2011 at 12:04:37PM +0530, Krishna Kumar wrote:
Implement mq virtio-net driver.
Though struct virtio_net_config changes, it works with the old
qemu since the last element is not accessed unless qemu sets
VIRTIO_NET_F_NUMTXQS. Patch also adds a macro for the maximum
number
On 02/28/2011 10:16 AM, Avi Kivity wrote:
Why is that? uq/master is for kvm code, and this touches two or three
lines?
iothread code is also going in via uq/master often. I started with
uq/master because I depended on Jan's changes which are now upstream, I
have no problems with this going
On Mon, Feb 28, 2011 at 09:56:46AM +0100, Jean-Philippe Menil wrote:
Le 27/02/2011 18:00, Michael S. Tsirkin a écrit :
On Fri, Feb 25, 2011 at 10:07:22AM +0100, Jean-Philippe Menil wrote:
Hi,
Each time i try tou use vhost_net, i'm facing a kernel bug.
I do a modprobe vhost_net, and start
For now, qemu_cond_timedwait and qemu_mutex_timedlock are left as
POSIX-only functions. They can be removed later, once the patches
that remove their uses are in.
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
Makefile.objs|4 +-
qemu-thread.c =
On 2011-02-28 10:20, Avi Kivity wrote:
On 02/21/2011 01:28 PM, Jan Kiszka wrote:
This avoids that early cpu_synchronize_state calls try to retrieve an
uninitialized state from the kernel,
Thanks, applied.
which even causes a deadlock.
How?
Early hw_error. It collects the CPU states,
Le 28/02/2011 11:11, Michael S. Tsirkin a écrit :
On Mon, Feb 28, 2011 at 09:56:46AM +0100, Jean-Philippe Menil wrote:
Le 27/02/2011 18:00, Michael S. Tsirkin a écrit :
On Fri, Feb 25, 2011 at 10:07:22AM +0100, Jean-Philippe Menil wrote:
Hi,
Each time i try tou use vhost_net, i'm facing a
Communicate between two vms, and try to capture packages from another vm in
the same lan.
This test used tcpdump, so we need limit it with Linux guests.
Signed-off-by: Amos Kong ak...@redhat.com
---
client/tests/kvm/tests/privacy.py | 44
Hi all,
I get this error when I run new kvm 0.14.0 on kernel 2.6.35 (vhost=on):
# kvm -netdev type=tap,id=n0,vhost=on -device virtio-net-pci,netdev=n0 -cdrom
ubuntu-10.10-desktop-amd64.iso
kvm: /home/code/qemu-kvm/hw/msix.c:639: msix_unset_mask_notifier: Assertion
`dev-msix_mask_notifier'
On Mon, Feb 28, 2011 at 03:20:04PM +0800, Sheng Yang wrote:
Then we can support mask bit operation of assigned devices now.
Signed-off-by: Sheng Yang sh...@linux.intel.com
A general question: we implement mmio read and write
operation here, but seem to do nothing
about ordering. In
On Mon, Feb 28, 2011 at 07:20:38PM +0800, Amos Kong wrote:
Communicate between two vms, and try to capture packages from another vm in
the same lan.
This test used tcpdump, so we need limit it with Linux guests.
Signed-off-by: Amos Kong ak...@redhat.com
I don't think there's any such
Please send in any agenda items you are interested in covering.
Thanks, Juan.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
On Mon, Feb 28, 2011 at 11:40:43AM +0100, Jean-Philippe Menil wrote:
Le 28/02/2011 11:11, Michael S. Tsirkin a écrit :
On Mon, Feb 28, 2011 at 09:56:46AM +0100, Jean-Philippe Menil wrote:
Le 27/02/2011 18:00, Michael S. Tsirkin a écrit :
On Fri, Feb 25, 2011 at 10:07:22AM +0100, Jean-Philippe
https://bugzilla.kernel.org/show_bug.cgi?id=30042
--- Comment #2 from Peter Merhaut kernelbug_...@russenmafia.at 2011-02-28
11:47:51 ---
uh i should add that the file rtorrent hashes is on a nfs filesystem. so this
generates a lot of network traffic. between the host (which also serves as
On 2011-02-28 11:10, Paolo Bonzini wrote:
On 02/28/2011 10:16 AM, Avi Kivity wrote:
Why is that? uq/master is for kvm code, and this touches two or three
lines?
iothread code is also going in via uq/master often. I started with
uq/master because I depended on Jan's changes which are now
On 02/28/2011 01:57 PM, Jan Kiszka wrote:
On 2011-02-28 11:10, Paolo Bonzini wrote:
On 02/28/2011 10:16 AM, Avi Kivity wrote:
Why is that? uq/master is for kvm code, and this touches two or three
lines?
iothread code is also going in via uq/master often. I started with
uq/master
Please send in any agenda items you are interested in covering.
Thanks, Juan.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
On Sun, Feb 27, 2011 at 8:03 PM, Alon Levy al...@redhat.com wrote:
On Sat, Feb 26, 2011 at 01:29:01PM +0100, Jan Kiszka wrote:
On 2011-02-26 12:43, xming wrote:
When trying to start X (and it loads qxl driver) the kvm process just
crashes.
This is fixed by Gerd's attached patch (taken
On Sun, 2011-02-27 at 14:16 +0200, Avi Kivity wrote:
On 02/23/2011 07:44 PM, Glauber Costa wrote:
We've been supporting kvmclock MSRs in the 0x4b564d00-0x4b564dff range
for a while now, but we're not exposing it yet, meaning nobody is using it.
This simple patch takes care of that.
We're
On 02/28/2011 03:24 PM, Glauber Costa wrote:
On Sun, 2011-02-27 at 14:16 +0200, Avi Kivity wrote:
On 02/23/2011 07:44 PM, Glauber Costa wrote:
We've been supporting kvmclock MSRs in the 0x4b564d00-0x4b564dff range
for a while now, but we're not exposing it yet, meaning nobody is using
On 02/28/2011 03:30 PM, Avi Kivity wrote:
On 02/28/2011 03:24 PM, Glauber Costa wrote:
On Sun, 2011-02-27 at 14:16 +0200, Avi Kivity wrote:
On 02/23/2011 07:44 PM, Glauber Costa wrote:
We've been supporting kvmclock MSRs in the 0x4b564d00-0x4b564dff
range
for a while now, but we're not
On Fri, Feb 25, 2011 at 11:31 PM, Chris Wright chr...@sous-sol.org wrote:
* James Neave (robo...@gmail.com) wrote:
On Fri, Feb 25, 2011 at 11:02 PM, James Neave robo...@gmail.com wrote:
On Fri, Feb 25, 2011 at 10:47 PM, James Neave robo...@gmail.com wrote:
On Fri, Feb 25, 2011 at 12:06 AM,
On 02/27/2011 12:20 PM, Nikola Ciprich wrote:
I was not aware of the thread. Please cc me directly, or add a keyword
I track - timekeeping, TSC..
Hello Zachary, thanks for Your time looking at this!
That change alone may not bisect well; without further fixes on top of
it, you may
hi:
kvm start with disk image on nfs server, when nfs server can not be
reached, monitor will be blocked. I change io_thread to SCHED_RR
policy, it will work unfluently waiting for disk read/write timeout.
I think one solution to this is to change kvm_handle_io in a
seperate thread, I will
On 02/28/2011 01:13 PM, Avi Kivity wrote:
If there's a git tree of this I'll be happy to do an autotest run.
Sure, it's branch iothread-win32 of git://github.com/bonzini/qemu.git
Paolo
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to
Does the bug you are hitting manifest on both Intel and AMD platforms?
I don't have any AMD box here, I'll try this out at my home box.
Further, do the systems you are hitting this on have stable or unstable
TSCs?
how do I find this out? I don't see any warning about TSC in guest, but I've
My working partner in relationship with
HSBC London has concluded that our working
partner has helped us to send you first payment of US$5,000 to you as
instructed by Malaysia government and will
keep sending you $5000 twice a week until
the payment of (US$820,000 ) is completed
within six
Le 28/02/2011 12:39, Michael S. Tsirkin a écrit :
On Mon, Feb 28, 2011 at 11:40:43AM +0100, Jean-Philippe Menil wrote:
Le 28/02/2011 11:11, Michael S. Tsirkin a écrit :
On Mon, Feb 28, 2011 at 09:56:46AM +0100, Jean-Philippe Menil wrote:
Le 27/02/2011 18:00, Michael S. Tsirkin a écrit :
On
On 02/28/2011 09:32 AM, Nikola Ciprich wrote:
Does the bug you are hitting manifest on both Intel and AMD platforms?
I don't have any AMD box here, I'll try this out at my home box.
Further, do the systems you are hitting this on have stable or unstable
TSCs?
how do I find
On Mon, Feb 28, 2011 at 10:17:24AM -0500, Zachary Amsden wrote:
On 02/28/2011 09:32 AM, Nikola Ciprich wrote:
Does the bug you are hitting manifest on both Intel and AMD platforms?
I don't have any AMD box here, I'll try this out at my home box.
Further, do the systems you are
* James Neave (robo...@gmail.com) wrote:
HOLY CRAP IT WORKS 8@
Hey, great! ;)
...almost...
OK, clear_emulator_capabilities=0 solved the IRQ problem (which was,
as it turns out, the rawio problem)
My VM came up, both the tuners were there and after the firmware
install I was able to
Michael S. Tsirkin m...@redhat.com wrote on 02/28/2011 01:05:15 PM:
This patch series is a continuation of an earlier one that
implemented guest MQ TX functionality. This new patchset
implements both RX and TX MQ. Qemu changes are not being
included at this time solely to aid in easier
On 02/01/2011 11:15 PM, Jan Kiszka wrote:
From: Jan Kiszkajan.kis...@siemens.com
Block SIG_IPI, unblock it during KVM_RUN, just like in io-thread mode.
It's unused so far, but this infrastructure will be required for
self-IPIs and to process SIGBUS plus, in KVM mode, SIGIO and SIGALRM. As
On Mon, Feb 28, 2011 at 10:17:24AM -0500, Zachary Amsden wrote:
On 02/28/2011 09:32 AM, Nikola Ciprich wrote:
Does the bug you are hitting manifest on both Intel and AMD platforms?
I don't have any AMD box here, I'll try this out at my home box.
Further, do the
On 2011-02-28 16:55, Avi Kivity wrote:
On 02/01/2011 11:15 PM, Jan Kiszka wrote:
From: Jan Kiszkajan.kis...@siemens.com
Block SIG_IPI, unblock it during KVM_RUN, just like in io-thread mode.
It's unused so far, but this infrastructure will be required for
self-IPIs and to process SIGBUS
On 2011-02-28 17:02, Jan Kiszka wrote:
On 2011-02-28 16:55, Avi Kivity wrote:
On 02/01/2011 11:15 PM, Jan Kiszka wrote:
From: Jan Kiszkajan.kis...@siemens.com
Block SIG_IPI, unblock it during KVM_RUN, just like in io-thread mode.
It's unused so far, but this infrastructure will be required
On 2011-02-28 16:55, Avi Kivity wrote:
On 02/01/2011 11:15 PM, Jan Kiszka wrote:
From: Jan Kiszkajan.kis...@siemens.com
Block SIG_IPI, unblock it during KVM_RUN, just like in io-thread mode.
It's unused so far, but this infrastructure will be required for
self-IPIs and to process SIGBUS
On 02/28/2011 06:16 PM, Jan Kiszka wrote:
On 2011-02-28 16:55, Avi Kivity wrote:
On 02/01/2011 11:15 PM, Jan Kiszka wrote:
From: Jan Kiszkajan.kis...@siemens.com
Block SIG_IPI, unblock it during KVM_RUN, just like in io-thread mode.
It's unused so far, but this infrastructure will be
On 02/28/2011 06:45 PM, Avi Kivity wrote:
That's what I tried, and it didn't work?! Maybe I forgot to compile
or something.
I misspelled #ifdef.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of
On 2011-02-28 17:45, Avi Kivity wrote:
On 02/28/2011 06:16 PM, Jan Kiszka wrote:
On 2011-02-28 16:55, Avi Kivity wrote:
On 02/01/2011 11:15 PM, Jan Kiszka wrote:
From: Jan Kiszkajan.kis...@siemens.com
Block SIG_IPI, unblock it during KVM_RUN, just like in io-thread mode.
It's unused so
On 02/28/2011 06:49 PM, Jan Kiszka wrote:
That's what I tried, and it didn't work?! Maybe I forgot to compile or
something.
Well, it maybe failed to build as qemu_kvm_init_cpu_signals became
unused and the compiler should have bailed out? Probably it's better to
disable it directly in the
(resend, sorry for the mess)
cat /proc/cpuinfo
processor : 0
vendor_id : GenuineIntel
cpu family : 6
model : 30
model name: Intel(R) Xeon(R) CPU X3440 @ 2.53GHz
stepping : 5
cpu MHz : 2533.185
cache size : 8192 KB
cat /proc/cpuinfo
processor : 0
vendor_id : GenuineIntel
cpu family : 6
model : 30
model name: Intel(R) Xeon(R) CPU X3440 @ 2.53GHz
stepping : 5
cpu MHz : 2533.185
cache size : 8192 KB
physical id : 0
siblings :
On Mon, Feb 28, 2011 at 3:31 PM, Chris Wright chr...@sous-sol.org wrote:
* James Neave (robo...@gmail.com) wrote:
HOLY CRAP IT WORKS 8@
Hey, great! ;)
...almost...
OK, clear_emulator_capabilities=0 solved the IRQ problem (which was,
as it turns out, the rawio problem)
My VM came up,
Hi,
here is another trace with kvm.ko compiled with debug flags.
the bug:
[12099.503414] BUG: unable to handle kernel paging request at
0b6635e9
[12099.503462] IP: [a03ee877] kvm_set_irq+0x37/0x140 [kvm]
[12099.503521] PGD 45d8d2067 PUD 45d58e067 PMD 0
[12099.503560] Oops:
On Sun, 2011-02-27 at 11:54 +0200, Avi Kivity wrote:
On 02/24/2011 07:35 PM, Alex Williamson wrote:
On Thu, 2011-02-24 at 12:06 +0200, Avi Kivity wrote:
On 02/23/2011 09:28 PM, Alex Williamson wrote:
I had forgotten about1M mem, so actually the slot configuration was:
0:1M
I have tested a standalone thread to process kvm_handle_io, it can not
start up correctly, this function may need qemu_mutux protection.
as io_thread process different io tasks, is it possible to transfer
kvm_handle_io and handle_mmio function into this thread? but the
problem will still stay,
On Sunday 27 February 2011 13:03:14 Alon Levy wrote:
On Sat, Feb 26, 2011 at 01:29:01PM +0100, Jan Kiszka wrote:
On 2011-02-26 12:43, xming wrote:
When trying to start X (and it loads qxl driver) the kvm process just
crashes.
This is fixed by Gerd's attached patch (taken from rhel
hi all:
kvm start with disk image on nfs server, when nfs server can not be
reached, monitor will be blocked. I change io_thread to SCHED_RR
policy, it will work unfluently waiting for disk read/write timeout.
I have tested a standalone thread to process kvm_handle_io, it can not
start up
On Monday 28 February 2011 19:27:29 Michael S. Tsirkin wrote:
On Mon, Feb 28, 2011 at 03:20:04PM +0800, Sheng Yang wrote:
Then we can support mask bit operation of assigned devices now.
Signed-off-by: Sheng Yang sh...@linux.intel.com
A general question: we implement mmio read and write
On Mon, Feb 28, 2011 at 11:34:16PM +0100, Jean-Philippe Menil wrote:
Hi,
here is another trace with kvm.ko compiled with debug flags.
the bug:
[12099.503414] BUG: unable to handle kernel paging request at
0b6635e9
[12099.503462] IP: [a03ee877] kvm_set_irq+0x37/0x140 [kvm]
Hi Dushyant,
Please refer to the magic page section of the following document:
linux/Documentation/kvm/ppc-pv.txt
Regards
Varun
From: kvm-ppc-ow...@vger.kernel.org [kvm-ppc-ow...@vger.kernel.org] on behalf
of Dushyant Bansal [cs5070...@cse.iitd.ac.in]
80 matches
Mail list logo