On Thu, 2011-09-15 at 08:44 +0300, Pekka Enberg wrote:
On 9/15/11 8:36 AM, Sasha Levin wrote:
On Thu, 2011-09-15 at 08:29 +0300, Pekka Enberg wrote:
On Wed, Sep 14, 2011 at 7:28 PM, Sasha Levinlevinsasha...@gmail.com
wrote:
Since kernel IP autoconfiguration doesn't set up
On Thu, Sep 15, 2011 at 9:00 AM, Sasha Levin levinsasha...@gmail.com wrote:
Hm? If you it to the host's resolv.conf, a guest can edit host's file,
no?
Might even be not on purpose... For example, simply running dhcpcd on
the guest.
How is that going to happen if you're not running kvmtool as
On Thu, 2011-09-15 at 09:04 +0300, Pekka Enberg wrote:
On Thu, Sep 15, 2011 at 9:00 AM, Sasha Levin levinsasha...@gmail.com wrote:
Hm? If you it to the host's resolv.conf, a guest can edit host's file,
no?
Might even be not on purpose... For example, simply running dhcpcd on
the guest.
Jagane,
we are testing and reviewing the livebackup workspace from
git://github.com/jagane/qemu-livebackup.git
Several questions are coming from us.
1) It seems that the workspace has not been updated for a while. Is
there any new update for this project?
2) It looks like that the
On 9/15/11 9:04 AM, Sasha Levin wrote:
On Thu, 2011-09-15 at 09:04 +0300, Pekka Enberg wrote:
On Thu, Sep 15, 2011 at 9:00 AM, Sasha Levinlevinsasha...@gmail.com wrote:
Hm? If you it to the host's resolv.conf, a guest can edit host's file,
no?
Might even be not on purpose... For example,
Marcelo Tosatti wrote:
diff --git a/arch/x86/include/asm/apicdef.h
b/arch/x86/include/asm/apicdef.h
index 34595d5..3925d80 100644
--- a/arch/x86/include/asm/apicdef.h
+++ b/arch/x86/include/asm/apicdef.h
@@ -100,7 +100,9 @@
#define APIC_TIMER_BASE_CLKIN 0x0
#define
Thanks!
\dae
On Thu, Sep 15, 2011 at 08:39:03AM +0300, Sasha Levin wrote:
On Thu, 2011-09-15 at 08:32 +0300, Pekka Enberg wrote:
On Thu, Sep 15, 2011 at 2:17 AM, David Evensky
even...@dancer.ca.sandia.gov wrote:
Hi. Is it possible to use kvm-tool with a kernel compiled with kgdb?
I've
On Thu, 2011-09-15 at 09:22 +0300, Pekka Enberg wrote:
On 9/15/11 9:04 AM, Sasha Levin wrote:
On Thu, 2011-09-15 at 09:04 +0300, Pekka Enberg wrote:
On Thu, Sep 15, 2011 at 9:00 AM, Sasha Levinlevinsasha...@gmail.com
wrote:
Hm? If you it to the host's resolv.conf, a guest can edit
Avi Kivity a...@redhat.com wrote:
I would like to carry out an online code review of the memory API so
that more people are familiar with the internals, and perhaps even to
catch some bugs or deficiency. I'd like to use the next kvm
conference call slot for this (Tuesday 1400 UTC) since many
Marcelo Tosatti wrote:
+} else if (apic_lvtt_tscdeadline(apic)) {
+/* lapic timer in tsc deadline mode */
+u64 guest_tsc, guest_tsc_delta, ns = 0;
+struct kvm_vcpu *vcpu = apic-vcpu;
+unsigned long this_tsc_khz = vcpu_tsc_khz(vcpu); +
This patch adds the '-tty' option to 'kvm run' which allows the user to
remap a guest TTY into a PTS on the host.
Usage:
'kvm run --tty [id] [other options]'
The tty will be mapped to a pts and will be printed on the screen:
' Info: Assigned terminal 1 to pty /dev/pts/X'
At
hi,
i run kvm with -cpu core2duo option, but /proc/cpuinfo only shows
SSE and SSE2.
my host is Core i7, so i suppose that i should have SSE4 with this
option, but it seems not?
is there any way to get SSE4?
(i am on kvm-0.12.3 on Ubuntu 10.04)
thanks,
Jun
--
To unsubscribe from this list: send
On Thu, 2011-09-15 at 17:04 +0800, Jun Koi wrote:
hi,
i run kvm with -cpu core2duo option, but /proc/cpuinfo only shows
SSE and SSE2.
my host is Core i7, so i suppose that i should have SSE4 with this
option, but it seems not?
is there any way to get SSE4?
How about just running it with
On Thu, Sep 15, 2011 at 5:05 PM, Sasha Levin levinsasha...@gmail.com wrote:
On Thu, 2011-09-15 at 17:04 +0800, Jun Koi wrote:
hi,
i run kvm with -cpu core2duo option, but /proc/cpuinfo only shows
SSE and SSE2.
my host is Core i7, so i suppose that i should have SSE4 with this
option, but it
On 09/15/2011 12:14 PM, Jun Koi wrote:
On Thu, Sep 15, 2011 at 5:05 PM, Sasha Levinlevinsasha...@gmail.com wrote:
On Thu, 2011-09-15 at 17:04 +0800, Jun Koi wrote:
hi,
i run kvm with -cpu core2duo option, but /proc/cpuinfo only shows
SSE and SSE2.
my host is Core i7, so i suppose that i
On Thu, 2011-09-15 at 17:14 +0800, Jun Koi wrote:
On Thu, Sep 15, 2011 at 5:05 PM, Sasha Levin levinsasha...@gmail.com wrote:
On Thu, 2011-09-15 at 17:04 +0800, Jun Koi wrote:
hi,
i run kvm with -cpu core2duo option, but /proc/cpuinfo only shows
SSE and SSE2.
my host is Core i7, so i
On Thu, Sep 15, 2011 at 11:53 AM, Sasha Levin levinsasha...@gmail.com wrote:
This patch adds the '-tty' option to 'kvm run' which allows the user to
remap a guest TTY into a PTS on the host.
Usage:
'kvm run --tty [id] [other options]'
The tty will be mapped to a pts and will be
Congratulations! Your email address has won £250,000.00 Pounds in this Year
Nokia UK Mobile Promo.To claim E-mail your name, tel and add. Regards Susan
Oxford 15/09/2011
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More
On Thu, Sep 15, 2011 at 04:17:20PM +0800, Liu, Jinsong wrote:
Marcelo Tosatti wrote:
+ } else if (apic_lvtt_tscdeadline(apic)) {
+ /* lapic timer in tsc deadline mode */
+ u64 guest_tsc, guest_tsc_delta, ns = 0;
+ struct kvm_vcpu *vcpu = apic-vcpu;
+
On Thu, 2011-09-15 at 12:32 +0300, Pekka Enberg wrote:
On Thu, Sep 15, 2011 at 11:53 AM, Sasha Levin levinsasha...@gmail.com wrote:
This patch adds the '-tty' option to 'kvm run' which allows the user to
remap a guest TTY into a PTS on the host.
Usage:
'kvm run --tty [id] [other
-Original Message-
From: Roedel, Joerg [mailto:joerg.roe...@amd.com]
Sent: Monday, September 12, 2011 6:06 PM
To: Sethi Varun-B16395
Cc: Joerg Roedel; Greg KH; io...@lists.linux-foundation.org; Alex
Williamson; Ohad Ben-Cohen; David Woodhouse; David Brown;
kvm@vger.kernel.org;
On Thu, Sep 15, 2011 at 02:22:58PM +0800, Liu, Jinsong wrote:
Marcelo Tosatti wrote:
diff --git a/arch/x86/include/asm/apicdef.h
b/arch/x86/include/asm/apicdef.h
index 34595d5..3925d80 100644
--- a/arch/x86/include/asm/apicdef.h
+++ b/arch/x86/include/asm/apicdef.h
@@ -100,7 +100,9
RFC2131.txt:
xid 4 Transaction ID, a random number chosen by the
client, used by the client and server to associate
messages and responses between a client and a
server.
The 'xid' field is used by the client to match incoming DHCP messages
with pending requests. A DHCP
On Wed, Sep 14, 2011 at 12:55:09PM +0300, Avi Kivity wrote:
On 09/13/2011 09:29 PM, Xiao Guangrong wrote:
On 09/13/2011 06:53 PM, Avi Kivity wrote:
On 08/30/2011 05:35 AM, Xiao Guangrong wrote:
In current code, the accessed bit is always set when page fault occurred,
do not need to set
On Thu, Sep 15, 2011 at 08:45:35AM -0400, Sethi Varun-B16395 wrote:
From: Roedel, Joerg [mailto:joerg.roe...@amd.com]
The details are up to Alex Williamson. One option is to register a
notifier for the bus in the iommu_bus_init() function and react to its
notifications.
I think in the
On Tue, Sep 13, 2011 at 04:49:55PM -0400, Eric B Munson wrote:
On Fri, 09 Sep 2011, Marcelo Tosatti wrote:
On Thu, Sep 01, 2011 at 02:27:49PM -0600, emun...@mgebm.net wrote:
On Thu, 01 Sep 2011 14:24:12 -0500, Anthony Liguori wrote:
On 08/30/2011 07:26 AM, Marcelo Tosatti wrote:
On
On Thu, 15 Sep 2011 21:00:38 +0800, Amos Kong ak...@redhat.com wrote:
+ netdev-xid = random();
This will not work for reboots. The decision that the hardware address is
choosen was not accidental. Not sure if some DHCP server will count on the
ID. (RFC 2131 Retain DHCP client
The netlink patch is still in the works. I will post the patches after I
clean it up a bit and also accommodate or find answers to most questions
discussed for non-passthru case. Thought I will post the netlink interface
here to see if anyone has any early comments. I have a
- Original Message -
On Thu, 15 Sep 2011 21:00:38 +0800, Amos Kong ak...@redhat.com
wrote:
+ netdev-xid = random();
This will not work for reboots. The decision that the hardware address
is
choosen was not accidental. Not sure if some DHCP server will count on
the
ID. (RFC
On Thu, 2011-09-15 at 10:13 -0400, Yaniv Kaul wrote:
- Original Message -
On Thu, 15 Sep 2011 21:00:38 +0800, Amos Kong ak...@redhat.com
wrote:
+ netdev-xid = random();
This will not work for reboots. The decision that the hardware address
is
choosen was not accidental.
If multiple NMIs occur simultaneously, the first is handled while
the others are collapsed and queued. But the current implementation
may collapse all NMIs into the first if timing is bad.
Signed-off-by: Avi Kivity a...@redhat.com
---
x86/apic.c | 75
- Original Message -
- Original Message -
On Thu, 15 Sep 2011 21:00:38 +0800, Amos Kong ak...@redhat.com
wrote:
+ netdev-xid = random();
This will not work for reboots. The decision that the hardware
address
is
choosen was not accidental. Not sure if some DHCP
If simultaneous NMIs happen, we're supposed to queue the second
and next (collapsing them), but currently we sometimes collapse
the second into the first.
Fix by using a counter for pending NMIs instead of a bool; collapsing
happens when the NMI window reopens.
Signed-off-by: Avi Kivity
On Thu, 2011-09-15 at 10:43 -0400, Amos Kong wrote:
- Original Message -
- Original Message -
On Thu, 15 Sep 2011 21:00:38 +0800, Amos Kong ak...@redhat.com
wrote:
+ netdev-xid = random();
This will not work for reboots. The decision that the hardware
Whole Archive: http://marc.info/?l=kvmm=131609166918121w=2
- Original Message -
On Thu, 2011-09-15 at 10:43 -0400, Amos Kong wrote:
- Original Message -
- Original Message -
On Thu, 15 Sep 2011 21:00:38 +0800, Amos Kong ak...@redhat.com
wrote:
+
On 2011-09-15 16:45, Avi Kivity wrote:
If simultaneous NMIs happen, we're supposed to queue the second
and next (collapsing them), but currently we sometimes collapse
the second into the first.
Can you describe the race in a few more details here (sometimes sounds
like I don't know when :) )?
Sasha,
So far so good! I applied your patch to an older version of kvm-tool
that I had hacked on and it works for a simple test. So I think that I
can do some kernel hacking with kvm tool! Very cool.
I'm tested with the older version of kvm-tool because I am seeing a
bug with an old kernel
On 09/15/2011 07:01 PM, Jan Kiszka wrote:
On 2011-09-15 16:45, Avi Kivity wrote:
If simultaneous NMIs happen, we're supposed to queue the second
and next (collapsing them), but currently we sometimes collapse
the second into the first.
Can you describe the race in a few more details here
On Thu, 2011-09-15 at 09:52 -0700, David Evensky wrote:
Sasha,
So far so good! I applied your patch to an older version of kvm-tool
that I had hacked on and it works for a simple test. So I think that I
can do some kernel hacking with kvm tool! Very cool.
Awesome!
I'm tested with the
On 2011-09-15 19:02, Avi Kivity wrote:
On 09/15/2011 07:01 PM, Jan Kiszka wrote:
On 2011-09-15 16:45, Avi Kivity wrote:
If simultaneous NMIs happen, we're supposed to queue the second
and next (collapsing them), but currently we sometimes collapse
the second into the first.
Can you
On 09/15/2011 08:25 PM, Jan Kiszka wrote:
I think so. Suppose the vcpu enters just after kvm_make_request(); it
sees KVM_REQ_EVENT and clears it, but doesn't see nmi_pending because it
wasn't set set. Then comes a kick, the guest is reentered with
nmi_pending set but KVM_REQ_EVENT
On Thu, Sep 15, 2011 at 05:53:02PM +0300, Sasha Levin wrote:
[...]
The 'random xid' suggestion is listed merely as an example.
The way I see it using a xid based on MAC instead of a random number is
safer since the odds for same MAC on the same network are pretty slim
since it would cause
On Tue, Sep 13, 2011 at 10:55 PM, Amos Kong ak...@redhat.com wrote:
'slot-funcs' is initialized in acpiphp_glue.c:register_slot() before
hotpluging device, and only one entry(func 0) is added to it,
no new entry will be added to the list when hotpluging devices to the slot.
When we release the
(2011/09/16 4:03), Bjorn Helgaas wrote:
On Tue, Sep 13, 2011 at 10:55 PM, Amos Kongak...@redhat.com wrote:
'slot-funcs' is initialized in acpiphp_glue.c:register_slot() before
hotpluging device, and only one entry(func 0) is added to it,
no new entry will be added to the list when hotpluging
On 09/15/2011 04:53 PM, Sasha Levin wrote:
This patch adds the '-tty' option to 'kvm run' which allows the user to
remap a guest TTY into a PTS on the host.
Usage:
'kvm run --tty [id] [other options]'
The tty will be mapped to a pts and will be printed on the screen:
' Info:
On 09/05/2011 05:30 PM, Alexander Graf wrote:
On 27.08.2011, at 01:31, Scott Wood wrote:
+#ifdef CONFIG_E500
+/*
+ * Skip the overhead of HID0 accesses that KVM ignores --
+ * just write MSR[WE].
+ *
+ * We don't need _TLF_NAPPING, because under KVM we know
+ *
46 matches
Mail list logo