On 09/23/2011 12:29 AM, Lukas Doktor wrote:
basic structure:
* similar to general client/tests/cgroup/ test (imports from the
cgroup_common.py)
* uses classes for better handling
* improved logging and error handling
* checks/repair the guests after each subtest
* subtest mapping
Clear, thanks!
-- Forwarded message --
From: Alex Williamson alex.william...@redhat.com
Date: Wed, Nov 2, 2011 at 11:31 PM
Subject: Re: What's the usage model (purpose) of interrupt remapping in IOMMU?
To: Kai Huang mail.kai.hu...@gmail.com
Cc: kvm@vger.kernel.org,
On Thu, 03 Nov 2011 14:31:48 +1030, Rusty Russell ru...@rustcorp.com.au wrote:
So let's change the API for everyone, into:
bool virtqueue_should_kick(struct virtqueue *vq);
void virtqueue_kick(struct virtqueue *vq);
Patch series coming...
Nope, that sucked.
Hi Christoph,
On Wed, Oct 05, 2011 at 03:54:05PM -0400, Christoph Hellwig wrote:
Split virtqueue_kick to be able to do the actual notification outside the
lock protecting the virtqueue. This patch was originally done by
Nitpick:
Until now, virtqueue_kick is called under lock, still so
Dne 3.11.2011 07:04, Suqin napsal(a):
On 09/23/2011 12:29 AM, Lukas Doktor wrote:
basic structure:
* similar to general client/tests/cgroup/ test (imports from the
cgroup_common.py)
* uses classes for better handling
* improved logging and error handling
* checks/repair the guests
Based on patch by Christoph for virtio_blk speedup:
Split virtqueue_kick to be able to do the actual notification
outside the lock protecting the virtqueue. This patch was
originally done by Stefan Hajnoczi, but I can't find the
original one anymore and had to
Since we know vq-vring.num is a power of 2, modulus is lazy (it's asserted
in vring_new_virtqueue()).
Signed-off-by: Rusty Russell ru...@rustcorp.com.au
---
drivers/virtio/virtio_ring.c | 10 ++
1 file changed, 6 insertions(+), 4 deletions(-)
diff --git a/arch/x86/lguest/boot.c
A virtio driver does virtqueue_add_buf() multiple times before finally
calling virtqueue_kick(); previously we only exposed the added buffers
in the virtqueue_kick() call. This means we don't need a memory
barrier in virtqueue_add_buf(), but it reduces concurrency as the
device (ie. host) can't
The old documentation is left over from when we used a structure with
strategy pointers.
Signed-off-by: Rusty Russell ru...@rustcorp.com.au
---
include/linux/virtio.h | 130 -
1 file changed, 87 insertions(+), 43 deletions(-)
diff --git
Remove wrapper functions. This makes the allocation type explicit in
all callers; I used GPF_KERNEL where it seemed obvious, left it at
GFP_ATOMIC otherwise.
Signed-off-by: Rusty Russell ru...@rustcorp.com.au
diff --git a/drivers/block/virtio_blk.c b/drivers/block/virtio_blk.c
---
On Thu, Nov 03, 2011 at 06:12:49PM +1030, Rusty Russell wrote:
The old documentation is left over from when we used a structure with
strategy pointers.
Looks good,
Reviewed-by: Christoph Hellwig h...@lst.de
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a
On Thu, Nov 03, 2011 at 06:12:50PM +1030, Rusty Russell wrote:
Remove wrapper functions. This makes the allocation type explicit in
all callers; I used GPF_KERNEL where it seemed obvious, left it at
GFP_ATOMIC otherwise.
Looks good,
Reviewed-by: Christoph Hellwig h...@lst.de
--
To unsubscribe
On Thu, Nov 3, 2011 at 9:42 AM, Rusty Russell ru...@rustcorp.com.au wrote:
Since we know vq-vring.num is a power of 2, modulus is lazy (it's asserted
in vring_new_virtqueue()).
Signed-off-by: Rusty Russell ru...@rustcorp.com.au
---
drivers/virtio/virtio_ring.c | 10 ++
1 file
On Thu, Nov 03, 2011 at 06:12:51PM +1030, Rusty Russell wrote:
Based on patch by Christoph for virtio_blk speedup:
Please credit it to Stefan - he also sent a pointer to his original
version in reply to the previous thread.
Also shouldn't virtqueue_kick have kerneldoc comments?
I also notices
On Wed, Nov 02, 2011 at 01:09:46PM +0200, Gleb Natapov wrote:
The user can cause this to be very small (even zero). Can this cause an
NMI storm?
If user will set it to zero then attr.sample_period will always be 0 and
perf will think that the event is non sampling and will use
On Thu, 2011-11-03 at 12:28 +1030, Rusty Russell wrote:
On Wed, 02 Nov 2011 20:49:27 +0200, Sasha Levin levinsasha...@gmail.com
wrote:
This is a proposal for a new layout of the virtio-pci config space.
We will separate the current configuration into two: A virtio-pci common
On Thu, Nov 03, 2011 at 02:19:03AM +0200, Sasha Levin wrote:
Hi Michael,
On Thu, 2011-11-03 at 01:31 +0200, Michael S. Tsirkin wrote:
Add a flexible mechanism to specify virtio configuration layout, using
pci vendor-specific capability. A separate capability is used for each
of common,
On 11/03/2011 01:31 AM, Michael S. Tsirkin wrote:
Add a flexible mechanism to specify virtio configuration layout, using
pci vendor-specific capability. A separate capability is used for each
of common, device specific and data-path accesses.
How about posting the spec change instead of
On Thu, 3 Nov 2011 09:51:15 +0200, Pekka Enberg penb...@kernel.org wrote:
On Thu, Nov 3, 2011 at 9:42 AM, Rusty Russell ru...@rustcorp.com.au wrote:
Since we know vq-vring.num is a power of 2, modulus is lazy (it's asserted
in vring_new_virtqueue()).
Signed-off-by: Rusty Russell
On Thu, Nov 03, 2011 at 12:28:46PM +1030, Rusty Russell wrote:
3) If we're changing the queue layout, it's a chance to fix a
longstanding bug: let the guest notify the host of preferred
queue size and alignment.
With device config split from the common one, we can
just tuck new fields at
On Thu, 2011-11-03 at 12:33 +0200, Michael S. Tsirkin wrote:
On Thu, Nov 03, 2011 at 02:19:03AM +0200, Sasha Levin wrote:
Hi Michael,
On Thu, 2011-11-03 at 01:31 +0200, Michael S. Tsirkin wrote:
Add a flexible mechanism to specify virtio configuration layout, using
pci
On Thu, Nov 03, 2011 at 01:09:51PM +0200, Sasha Levin wrote:
On Thu, 2011-11-03 at 12:33 +0200, Michael S. Tsirkin wrote:
On Thu, Nov 03, 2011 at 02:19:03AM +0200, Sasha Levin wrote:
Hi Michael,
On Thu, 2011-11-03 at 01:31 +0200, Michael S. Tsirkin wrote:
Add a flexible mechanism
On Thu, Nov 03, 2011 at 12:37:04PM +0200, Avi Kivity wrote:
On 11/03/2011 01:31 AM, Michael S. Tsirkin wrote:
Add a flexible mechanism to specify virtio configuration layout, using
pci vendor-specific capability. A separate capability is used for each
of common, device specific and
On Wed, Nov 02, 2011 at 08:30:28PM -0400, Kevin O'Connor wrote:
On Wed, Nov 02, 2011 at 10:54:42AM +0200, Michael S. Tsirkin wrote:
On Tue, Nov 01, 2011 at 06:59:01PM -0400, Kevin O'Connor wrote:
Can we leave these parts in the DSDT and only move the bulk generated
stuff to the SSDT?
From: Avi Kivity a...@redhat.com
Intercept RDPMC and forward it to the PMU emulation code.
Signed-off-by: Avi Kivity a...@redhat.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/vmx.c | 15 ++-
1 files changed, 14 insertions(+), 1 deletions(-)
diff --git
From: Avi Kivity a...@redhat.com
Intercept RDPMC and forward it to the PMU emulation code.
Signed-off-by: Avi Kivity a...@redhat.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/svm.c | 15 +++
1 files changed, 15 insertions(+), 0 deletions(-)
diff --git
From: Avi Kivity a...@redhat.com
Needed to deliver performance monitoring interrupts.
Signed-off-by: Avi Kivity a...@redhat.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/lapic.c |2 +-
arch/x86/kvm/lapic.h |1 +
2 files changed, 2 insertions(+), 1 deletions(-)
diff
From: Avi Kivity a...@redhat.com
RDPMC is only privileged if CR4.PCE=0. check_rdpmc() already implements this,
so all we need to do is drop the Priv flag.
Signed-off-by: Avi Kivity a...@redhat.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/emulate.c |2 +-
1 files
From: Avi Kivity a...@redhat.com
Add a helper function that emulates the RDPMC instruction operation.
Signed-off-by: Avi Kivity a...@redhat.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/kvm_host.h |1 +
arch/x86/kvm/x86.c | 15 +++
2
From: Avi Kivity a...@redhat.com
Provide a CPUID leaf that describes the emulated PMU.
Signed-off-by: Avi Kivity a...@redhat.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/x86.c | 23 ++-
1 files changed, 22 insertions(+), 1 deletions(-)
diff --git
On Wed, Nov 02, 2011 at 09:36:58PM -0400, Kevin O'Connor wrote:
On Thu, Nov 03, 2011 at 09:04:57AM +0800, Wen Congyang wrote:
At 11/03/2011 08:30 AM, Kevin O'Connor Write:
I think it's reasonable to require that a user supplied DSDT still
fill certain requirements. Keep in mind that the
From: Avi Kivity a...@redhat.com
Use perf_events to emulate an architectural PMU, version 2.
Signed-off-by: Avi Kivity a...@redhat.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/kvm_host.h | 43
arch/x86/kvm/Makefile |2 +-
arch/x86/kvm/pmu.c
This patchset exposes an emulated version 2 architectural performance
monitoring unit to KVM guests. The PMU is emulated using perf_events,
so the host kernel can multiplex host-wide, host-user, and the
guest on available resources.
The patches are against next branch on kvm.git.
If you want to
From: Avi Kivity a...@redhat.com
Add a helper function that emulates the RDPMC instruction operation.
Signed-off-by: Avi Kivity a...@redhat.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/kvm_host.h |1 +
arch/x86/kvm/x86.c | 15 +++
2
From: Avi Kivity a...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/kvm_emulate.h |1 +
arch/x86/kvm/emulate.c | 13 -
arch/x86/kvm/x86.c |7 +++
3 files changed, 20
Provide a CPUID leaf that describes the emulated PMU.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/x86.c | 23 ++-
1 files changed, 22 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index b88426c..3c9c8c9 100644
---
KVM needs to know perf capability to decide which PMU it can expose to a
guest.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/perf_event.h | 11 +++
arch/x86/kernel/cpu/perf_event.c | 11 +++
arch/x86/kernel/cpu/perf_event.h |2 ++
Use perf_events to emulate an architectural PMU, version 2.
Based on PMU version 1 emulation by Avi Kivity.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/kvm_host.h | 48
arch/x86/kvm/Kconfig|1 +
arch/x86/kvm/Makefile |2 +-
From: Avi Kivity a...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/kvm_emulate.h |1 +
arch/x86/kvm/emulate.c | 13 -
arch/x86/kvm/x86.c |7 +++
3 files changed, 20
From: Avi Kivity a...@redhat.com
RDPMC is only privileged if CR4.PCE=0. check_rdpmc() already implements this,
so all we need to do is drop the Priv flag.
Signed-off-by: Avi Kivity a...@redhat.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/emulate.c |2 +-
1 files
From: Avi Kivity a...@redhat.com
Intercept RDPMC and forward it to the PMU emulation code.
Signed-off-by: Avi Kivity a...@redhat.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/svm.c | 15 +++
1 files changed, 15 insertions(+), 0 deletions(-)
diff --git
From: Avi Kivity a...@redhat.com
Intercept RDPMC and forward it to the PMU emulation code.
Signed-off-by: Avi Kivity a...@redhat.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/vmx.c | 15 ++-
1 files changed, 14 insertions(+), 1 deletions(-)
diff --git
KVM needs to know perf capability to decide which PMU it can expose to a
guest.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/perf_event.h | 15 +++
arch/x86/kernel/cpu/perf_event.c | 11 +++
arch/x86/kernel/cpu/perf_event.h |2
From: Avi Kivity a...@redhat.com
Needed to deliver performance monitoring interrupts.
Signed-off-by: Avi Kivity a...@redhat.com
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/lapic.c |2 +-
arch/x86/kvm/lapic.h |1 +
2 files changed, 2 insertions(+), 1 deletions(-)
diff
This patchset exposes an emulated version 2 architectural performance
monitoring unit to KVM guests. The PMU is emulated using perf_events,
so the host kernel can multiplex host-wide, host-user, and the
guest on available resources.
The patches should be applied on top of KVM patches from the
Disregard this one please. I've sent old version of the patch series
along with new one by mistake. Please look at PATCHv2 version of the
patch series. Sorry about that :(
On Thu, Nov 03, 2011 at 02:31:29PM +0200, Gleb Natapov wrote:
This patchset exposes an emulated version 2 architectural
On Thu, Nov 03, 2011 at 10:33:23AM +0200, Sasha Levin wrote:
On Thu, 2011-11-03 at 12:28 +1030, Rusty Russell wrote:
On Wed, 02 Nov 2011 20:49:27 +0200, Sasha Levin levinsasha...@gmail.com
wrote:
This is a proposal for a new layout of the virtio-pci config space.
We will separate
On Thu, 2011-11-03 at 14:46 +0200, Michael S. Tsirkin wrote:
On Thu, Nov 03, 2011 at 10:33:23AM +0200, Sasha Levin wrote:
On Thu, 2011-11-03 at 12:28 +1030, Rusty Russell wrote:
On Wed, 02 Nov 2011 20:49:27 +0200, Sasha Levin levinsasha...@gmail.com
wrote:
This is a proposal for a
2. Move device specific features into the device specific region.
Currently the features field is a mix between virtio-pci and device
specific features.
A single feature field with bits partitioned to transport
specific and device specific fields is a generic virtio
thing. So there's
On 11/03/2011 02:11 PM, Michael S. Tsirkin wrote:
On Thu, Nov 03, 2011 at 12:37:04PM +0200, Avi Kivity wrote:
On 11/03/2011 01:31 AM, Michael S. Tsirkin wrote:
Add a flexible mechanism to specify virtio configuration layout, using
pci vendor-specific capability. A separate capability is
On Thu, Nov 03, 2011 at 03:19:01PM +0200, Sasha Levin wrote:
On Thu, 2011-11-03 at 14:46 +0200, Michael S. Tsirkin wrote:
On Thu, Nov 03, 2011 at 10:33:23AM +0200, Sasha Levin wrote:
On Thu, 2011-11-03 at 12:28 +1030, Rusty Russell wrote:
On Wed, 02 Nov 2011 20:49:27 +0200, Sasha Levin
On Thu, Nov 03, 2011 at 03:37:42PM +0200, Avi Kivity wrote:
On 11/03/2011 02:11 PM, Michael S. Tsirkin wrote:
On Thu, Nov 03, 2011 at 12:37:04PM +0200, Avi Kivity wrote:
On 11/03/2011 01:31 AM, Michael S. Tsirkin wrote:
Add a flexible mechanism to specify virtio configuration layout,
On Thu, Nov 03, 2011 at 08:49:31AM -0500, Anthony Liguori wrote:
On 11/03/2011 08:45 AM, Avi Kivity wrote:
On 11/03/2011 03:38 PM, Anthony Liguori wrote:
We could use a better agreement on the processor for making virtio
changes. Should it go (1) virtio spec (2) kernel (3) qemu, or should
On 11/03/2011 09:31 AM, Michael S. Tsirkin wrote:
On Thu, Nov 03, 2011 at 08:49:31AM -0500, Anthony Liguori wrote:
On 11/03/2011 08:45 AM, Avi Kivity wrote:
On 11/03/2011 03:38 PM, Anthony Liguori wrote:
We could use a better agreement on the processor for making virtio
changes. Should it
On 11/03/2011 04:37 PM, Anthony Liguori wrote:
2. Proposed spec patch, kernel change, qemu change
3. Buy-ins from spec maintainer, kernel driver maintainer, qemu
device
maintainer (only regarding the ABI, not the code)
I don't think this is how it's working today. I would be happy
with a
On Thu, 3 Nov 2011 01:31:11 +0200
Michael S. Tsirkin m...@redhat.com wrote:
Add a flexible mechanism to specify virtio configuration layout, using
pci vendor-specific capability. A separate capability is used for each
of common, device specific and data-path accesses.
Warning: compiled
On Tue, Nov 1, 2011 at 9:22 AM, Jan Kiszka jan.kis...@web.de wrote:
Hi there,
I'm generating some slides on guest debugging via kvm. What's the
current state for Book-E and Book-S? Works out of box, mostly usable, or
to be implemented? Is anyone using it?
Are you talking about guest debug
On 03.11.2011, at 11:59, Stuart Yoder b08...@gmail.com wrote:
On Tue, Nov 1, 2011 at 9:22 AM, Jan Kiszka jan.kis...@web.de wrote:
Hi there,
I'm generating some slides on guest debugging via kvm. What's the
current state for Book-E and Book-S? Works out of box, mostly usable, or
to be
On 2011-11-03 19:59, Stuart Yoder wrote:
On Tue, Nov 1, 2011 at 9:22 AM, Jan Kiszka jan.kis...@web.de wrote:
Hi there,
I'm generating some slides on guest debugging via kvm. What's the
current state for Book-E and Book-S? Works out of box, mostly usable, or
to be implemented? Is anyone using
So, here it is. The last version of the libvirt test before
upstream inclusion. After quite a bit of tests and corrections,
this is the version that is going to be committed upstream, if
nobody else has strong feelings against it.
I've posted it here for folks who wish to take a look at it,
and
During the process of implementing the libvirt test,
we've noticed that the whole mechanism implemented
by the KVM test (subtest loader, use of env file, params)
could be turned into common infrastructure. So move
all implementation to a class called virt_test.
We believe most virt test classes
This patch adds support to unattended installs via libvirt+XEN and
serving installation content via the auto url feature (using a
builtin http server).
A sample configuration is provided to run a Fedora 15 64 bits PV
based test (libvirt_xenpv_f15_quick).
Signed-off-by: Cleber Rosa
This patch adds a simple formatting chance (to stay withing the 79 cols),
and two small fixes to parameter parsing when using auto url feature.
Signed-off-by: Cleber Rosa cr...@redhat.com
---
client/virt/libvirt_vm.py |9 ++---
client/virt/tests/unattended_install.py |8
From: Cleber Rosa cr...@redhat.com
This explicitly sets the former XEN PV example with a --paravirt option,
adds an example configuration for running XEN HVM domains, and moves the
prefix setting for kernel, images, iso files to the end of the file, so
that cdrom_cd1 parameters will receive those
From: Cleber Rosa cr...@redhat.com
There's a race condition when picking free ports and starting the
http server thread, so both servers get the same port.
Change to non-overlapping ranges to avoid that.
Signed-off-by: Cleber Rosa cr...@redhat.com
---
client/virt/tests/unattended_install.py |
With this patch, we make libvirt vm handling integrating
to pre/postprocessing code, making it possible the
execution of a libvirt test. The idea was to try
to abstract some concepts and intrude the least
possible in the pre/postprocessing code.
Signed-off-by: Martin Jenner mjen...@redhat.com
From: Cleber Rosa cr...@redhat.com
When using options that affect whether we want to run a paravirt (pv)
or fully virtualized domain (hvm), do not assume that the options will
always start with a double dash ('--').
This is useful/needed when using multiple options such as --hvm and
This is a first attempt at providing a libvirt VM class,
in order to implement the needed methods for virt testing.
With this class, we will be able to implement a libvirt
test, that behaves similarly to the KVM test.
As of implementation details, libvirt_vm uses virsh
(a userspace program
As most of the get_started.py code could be very well
shared among virt tests, moved the bulk of the code
to virt_utils.py. Now we have the function
virt_test_assistant(), that is generic enough so other
tests can implement their variation of the assistant
script.
Signed-off-by: Lucas Meneghel
Only move vmlinuz and initrd.img in case the file names are
actually different from the ones virt-install is expecting.
Signed-off-by: Lucas Meneghel Rodrigues l...@redhat.com
---
client/virt/tests/unattended_install.py |6 --
1 files changed, 4 insertions(+), 2 deletions(-)
diff --git
Signed-off-by: Lucas Meneghel Rodrigues l...@redhat.com
---
client/tests/kvm/tests/unattended_install.py | 663 --
client/virt/tests/unattended_install.py | 663 ++
2 files changed, 663 insertions(+), 663 deletions(-)
delete mode 100644
This patchs adds proper detection of active (alive) XEN domains via
libvirt; a quick way to determine whether the current connected
hypervisor is XEN or QEMU/KVM and also deals with virt-install
options and syntax supported on RHEL 5 libvirt+XEN.
Signed-off-by: Cleber Rosa cr...@redhat.com
---
From: Cleber Rosa cr...@redhat.com
This adds a simple HTTP server that is good enough to support unattended
installs. Tested serving kickstart files and RHEL/Fedora content to
anaconda.
Signed-off-by: Cleber Rosa cr...@redhat.com
---
client/virt/virt_http_server.py | 124
This is an initial implementation for a libvirt monitor.
With it, we plan on making the libvirt test use all the
monitor features, making most of the tests available for
kvm available for libvirt.
As of implementation details, it uses aexpect to get a
virsh shell, and then the monitor methods are
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
I don't know if this is a right place to ask, but is there a book for
kvm's internal in english. In kvm site I am able to find these two in
german.
On Fri, Nov 4, 2011 at 8:58 AM, Stefanos Gerangelos
sge...@cslab.ece.ntua.gr wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
I don't know if this is a right place to ask, but is there a book for
kvm's internal in english. In kvm site I am able to find these two in
german.
Hi All,
This is KVM test result against kvm.git
b796a09c5d808f4013f27ad45953db604dac18fd based on 3.1.0, and qemu.git
7879db7e9c09b92d9af1c143fbe2cc212ec89e4b.
We filed 3 new bugs during our test.
One of them is that kvm is not enabled by default when qemu starting a
guest. This bug has
When we are debugging issues (notably during unattended
installs), having to look individual screenshots is less
than optimal. So introduce in virt tests the ability to
get a webm file that can be played quite nicely and out
of the box in recent versions of firefox and chromium.
In order to do
On Tue, Nov 1, 2011 at 9:22 AM, Jan Kiszka jan.kis...@web.de wrote:
Hi there,
I'm generating some slides on guest debugging via kvm. What's the
current state for Book-E and Book-S? Works out of box, mostly usable, or
to be implemented? Is anyone using it?
Are you talking about guest debug
On 2011-11-03 19:59, Stuart Yoder wrote:
On Tue, Nov 1, 2011 at 9:22 AM, Jan Kiszka jan.kis...@web.de wrote:
Hi there,
I'm generating some slides on guest debugging via kvm. What's the
current state for Book-E and Book-S? Works out of box, mostly usable, or
to be implemented? Is anyone using
80 matches
Mail list logo