On Thu, 2012-08-16 at 19:30 +0200, Jan Kiszka wrote:
On 2012-08-16 18:30, Jan Kiszka wrote:
On 2012-08-16 18:21, Alex Williamson wrote:
On Thu, 2012-08-16 at 15:54 +0200, Jan Kiszka wrote:
The refactored version cleanly hides the KVM IOCTL structure from the
users and also zeros out the
On Thu, Aug 16, 2012 at 07:39:35PM +0300, Avi Kivity wrote:
On 08/16/2012 07:36 PM, Michael S. Tsirkin wrote:
What if a level irqfd shares a line with a KVM_IRQ_LINE ioctl? Then an
EOI can de-assert the irqfd source, but the line is kept high by the
last KVM_IRQ_LINE invocation.
On Thu, Aug 16, 2012 at 07:54:04PM +0300, Avi Kivity wrote:
On 08/16/2012 07:54 PM, Michael S. Tsirkin wrote:
On Thu, Aug 16, 2012 at 07:39:35PM +0300, Avi Kivity wrote:
On 08/16/2012 07:36 PM, Michael S. Tsirkin wrote:
What if a level irqfd shares a line with a KVM_IRQ_LINE ioctl?
On 16.08.2012, at 17:29, Christoffer Dall wrote:
This commit introduces the framework for guest memory management
through the use of 2nd stage translation. Each VM has a pointer
to a level-1 table (the pgd field in struct kvm_arch) which is
used for the 2nd stage translations. Entries are
I want to assign my own character device to guest. I tried going
through code and found -chardev option.-chardev defines several
backend options but I could not understand how they interact with
guest. I also tried to search online but I got information mostly
regarding pci device assignment.
Binarus lists at binarus.de writes:
Perhaps there is such a thing like a USB ISDN adapter. We then could pass the
USB port which this adapter is
attached to to the virtual machine. But even if I am able to find such a
device, I doubt that our fax system
supports it. Nevertheless, there are
On Wed, Aug 15, 2012 at 11:05:57PM +0900, OGAWA Hirofumi wrote:
If !CONFIG_KVM_GUEST, kvm_smp_prepare_boot_cpu() is not defined. So,
kvm_register_clock(primary cpu clock) in kvm_smp_prepare_boot_cpu()
is not called.
The detail of problem is hv_clock percpu usage. hv_clock is percpu
The distinction between CONFIG_KVM_CLOCK and CONFIG_KVM_GUEST is
not so clear anymore, as demonstrated by recent bugs caused by poor
handling of on/off combinations of these options.
Merge CONFIG_KVM_CLOCK into CONFIG_KVM_GUEST.
Reported-By: OGAWA Hirofumi hirof...@mail.parknet.co.jp
Alan Cox a...@lxorguk.ukuu.org.uk writes:
On Thu, 16 Aug 2012 14:45:15 -0400 (EDT)
Tomas Racek tra...@redhat.com wrote:
- Original Message -
On Thu, Aug 16, 2012 at 09:35:12AM -0400, Tomas Racek wrote:
Hi,
I am writing a file system test which I execute in qemu with kernel
Marcelo Tosatti mtosa...@redhat.com writes:
On Wed, Aug 15, 2012 at 11:05:57PM +0900, OGAWA Hirofumi wrote:
If !CONFIG_KVM_GUEST, kvm_smp_prepare_boot_cpu() is not defined. So,
kvm_register_clock(primary cpu clock) in kvm_smp_prepare_boot_cpu()
is not called.
The detail of problem is
On 08/16/2012 07:25 PM, Avi Kivity wrote:
On 08/16/2012 02:17 PM, Peter Zijlstra wrote:
On Thu, 2012-08-16 at 14:06 +0300, Avi Kivity wrote:
Another option is to deal with them on the host side. That has the
benefit of working with non-Linux guests too.
Right, its an insane amount of MSRs
Hi Andrew,
I can't confirm a root reason based on your information, perhaps you may
try to find a reason by yourself via the following docs:
http://wiki.libvirt.org/page/PXE_boot_%28or_dhcp%29_on_guest_failed
(Troubleshooting)
diff --git a/arch/powerpc/include/asm/kvm.h
b/arch/powerpc/include/asm/kvm.h index 3c14202..da71c84 100644
--- a/arch/powerpc/include/asm/kvm.h
+++ b/arch/powerpc/include/asm/kvm.h
@@ -25,6 +25,7 @@
/* Select powerpc specific features in linux/kvm.h */ #define
__KVM_HAVE_SPAPR_TCE
When running on HV aware hosts, we can not trap when the guest sets the FP
bit, so we just let it do so when it wants to, because it has full access to
MSR.
For non-HV aware hosts with an FPU (like 440), we need to also adjust the
shadow MSR though. Otherwise the guest gets an FP unavailable trap
From: Paul Mackerras pau...@samba.org
In handling the H_CEDE hypercall, if this vcpu has already been
prodded (with the H_PROD hypercall, which Linux guests don't in fact
use), we branch to a numeric label '1f'. Unfortunately there is
another '1:' label before the one that we want to jump to.
When we map a page that wasn't icache cleared before, do so when first
mapping it in KVM using the same information bits as the Linux mapping
logic. That way we are 100% sure that any page we map does not have stale
entries in the icache.
Signed-off-by: Alexander Graf ag...@suse.de
---
Hi Avi,
This is my patch queue for ppc patches that should go into 3.6. Please pull.
* Fix memset in e500_tlb
* Fix icache flush when mapping executable pages
* Fix wrong branch in book3s hv code
Alex
The following changes since commit 439793d4b3c99e550daebd868bbd58967c93d0b3:
Gleb
101 - 117 of 117 matches
Mail list logo