From: Avi Kivity a...@redhat.com
* qemu-cvs:
Fix cpu_physical_memory_rw() for 64-bit I/O accesses
Avoid running audio ctl's when vm is not running
--
To unsubscribe from this list: send the line unsubscribe kvm-commits in
the body of a message to majord...@vger.kernel.org
More majordomo info
From: Avi Kivity a...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/kernel/external-module-compat-comm.h
b/kernel/external-module-compat-comm.h
index 6e9a90a..527ab58 100644
--- a/kernel/external-module-compat-comm.h
+++ b/kernel/external-module-compat-comm.h
@@ -734,3
From: Joerg Roedel joerg.roe...@amd.com
The following code flow is unnecessary:
if (largepage)
was_rmapped = is_large_pte(*shadow_pte);
else
was_rmapped = 1;
The is_large_pte() function will always evaluate to one here because the
(largepage
On Wed, Feb 18, 2009 at 11:38 PM, Tomasz Chmielewski man...@wpkg.org wrote:
Neo Jia schrieb:
hi,
I am trying kvm-84 and with -vnc option I can't use ctrl + alt + n
key to get the qemu system console. Is there anyway to make this work?
Use Qemu/KVM monitor and it's sendkey function.
Sorry,
On 19.02.2009, at 09:11, Neo Jia neo...@gmail.com wrote:
On Wed, Feb 18, 2009 at 11:38 PM, Tomasz Chmielewski
man...@wpkg.org wrote:
Neo Jia schrieb:
hi,
I am trying kvm-84 and with -vnc option I can't use ctrl + alt + n
key to get the qemu system console. Is there anyway to make this
2009/2/19 Alexander Graf ag...@suse.de:
You could pass -monitor stdio to qemu. That gives you the monitor on the
shell you started qemu from.
So if I run kvm as daemon:
kvm -name Linux-x64 -smp 2 -m 2048M -hda hda.img \
-cdrom ../../var/iso/debian-500-amd64-DVD-1.iso \
-net
On Thu, Feb 19, 2009 at 12:22 AM, Alexander Graf ag...@suse.de wrote:
On 19.02.2009, at 09:11, Neo Jia neo...@gmail.com wrote:
On Wed, Feb 18, 2009 at 11:38 PM, Tomasz Chmielewski man...@wpkg.org
wrote:
Neo Jia schrieb:
hi,
I am trying kvm-84 and with -vnc option I can't use ctrl + alt
hi,
I am seeing something different between info registers from qemu
monitor window vs. kgdb. This is a 32-bit Linux guest running on
KVM-84.
When I just break into the guest kernel with kgdb, I tried the
follwoing commands:
(qemu) info registers
EAX=00010060 EBX=c0471e3c ECX=
Anthony Liguori wrote:
Are you suggesting that one should use cpufreq on a CPU without a
constant tsc? Isn't this just asking for trouble?
Depends on the (guest) clock source ;)
tsc isn't going to do well obviously.
kvmclock is designed to handle tsc frequency changes just fine.
And with the
Gerd Hoffmann schrieb:
Anthony Liguori wrote:
Are you suggesting that one should use cpufreq on a CPU without a
constant tsc? Isn't this just asking for trouble?
Depends on the (guest) clock source ;)
tsc isn't going to do well obviously.
kvmclock is designed to handle tsc frequency
MMIO of some devices are not page aligned, such as some EHCI
controllers and virtual Realtek NIC in guest. Current guest
bios doesn't guarantee the start address of MMIO page aligned.
This may result in failure of device assignment, because KVM
only allow to register page aligned memory slots. For
Neo Jia wrote:
hi,
I am seeing something different between info registers from qemu
monitor window vs. kgdb. This is a 32-bit Linux guest running on
KVM-84.
When I just break into the guest kernel with kgdb, I tried the
follwoing commands:
(qemu) info registers
EAX=00010060
Tomasz Chmielewski wrote:
So with Linux virtio guests I may have luck, but not so with Windows,
which can't (yet?) use kvm-clock. Correct?
tsc isn't the only clocksource, there are also hpet and acpi (pm timer),
they shouldn't have trouble with tsc freq changes. Dunno what windows
uses by
On Thursday 19 February 2009 02:54:06 Arnd Bergmann wrote:
On Wednesday 18 February 2009, Rusty Russell wrote:
2) Direct NIC attachment
This is particularly interesting with SR-IOV or other multiqueue nics,
but for boutique cases or benchmarks, could be for normal NICs. So
far I have
In the paging_fetch function rmap_remove is called after setting a large
pte to non-present. This causes rmap_remove to not drop the reference to
the large page. The result is a memory leak of that page.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
---
arch/x86/kvm/paging_tmpl.h |2 +-
1
On Thursday 19 February 2009 10:01:42 Simon Horman wrote:
On Wed, Feb 18, 2009 at 10:08:00PM +1030, Rusty Russell wrote:
2) Direct NIC attachment This is particularly interesting with SR-IOV or
other multiqueue nics, but for boutique cases or benchmarks, could be for
normal NICs. So far
* Simon Horman (ho...@verge.net.au) wrote:
On Wed, Feb 18, 2009 at 10:08:00PM +1030, Rusty Russell wrote:
2) Direct NIC attachment This is particularly interesting with SR-IOV or
other multiqueue nics, but for boutique cases or benchmarks, could be for
normal NICs. So far I have some very
On Thu, Feb 19, 2009 at 12:18:56PM +0100, Joerg Roedel wrote:
In the paging_fetch function rmap_remove is called after setting a large
pte to non-present. This causes rmap_remove to not drop the reference to
the large page. The result is a memory leak of that page.
Signed-off-by: Joerg
Marcelo Tosatti schrieb:
On Wed, Feb 18, 2009 at 09:02:31PM +0100, Tomasz Chmielewski wrote:
Marcelo Tosatti schrieb:
On Wed, Feb 18, 2009 at 08:18:50PM +0100, Tomasz Chmielewski wrote:
Marcelo Tosatti schrieb:
- what CPU frequency will the guests show? Current host
frequency? Host
On Thursday 19 February 2009, Rusty Russell wrote:
Not quite: I think PCI passthrough IMHO is the *wrong* way to do it:
it makes migrate complicated (if not impossible), and requires
emulation or the same NIC on the destination host.
This would be the *host* seeing the virtual functions
The current method of finding out the size of huge pages does not work
reliable anymore. Current Linux supports more than one huge page size
but /proc/meminfo only show one of the supported sizes.
To find out the real page size used can be found by calling statfs. This
patch changes kvm/qemu to
Gleb Natapov wrote:
IRQ injection status is either -1 (if there was no CPU found
that should except the interrupt because IRQ was masked or
ioapic was misconfigured or ...) or = 0 in that case the
number indicates to how many CPUs interrupt was injected.
If the value is 0 it means that the
Martin Maurer wrote:
I suppose no-one has any?
VMware includes in its EULA (End User License Agreement) a prohibition for any
licensee to publish benchmark results without VMware's approval.
(see https://www.vmware.com/tryvmware/eula.php)
Maybe this is a reason why all published VMWare
Bugs item #2617499, was opened at 2009-02-19 12:33
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2617499group_id=180599
Please note that this message will contain a full copy of
Bugs item #2617499, was opened at 2009-02-19 12:33
Message generated for change (Comment added) made by toxxic
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2617499group_id=180599
Please note that this message will contain a full copy of the comment
Bugs item #2556746, was opened at 2009-02-02 04:19
Message generated for change (Comment added) made by toxxic
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2556746group_id=180599
Please note that this message will contain a full copy of the comment
A recent kernel merge breaks kvm-userspace build:
make[1]: Entering directory `/root/hollisb/kvm-userspace.git/libkvm'
gcc -m64 -D__x86_64__ -MMD -MF ./.libkvm.d -g -fomit-frame-pointer
-Wall -fno-stack-protector -I /root/hollisb/kvm-userspace.git/kernel/include
-c -o
On Thu, Feb 19, 2009 at 03:50:14PM -0600, Hollis Blanchard wrote:
A recent kernel merge breaks kvm-userspace build:
make[1]: Entering directory `/root/hollisb/kvm-userspace.git/libkvm'
gcc -m64 -D__x86_64__ -MMD -MF ./.libkvm.d -g -fomit-frame-pointer
-Wall
On Thu, Feb 19, 2009 at 10:06:17PM +1030, Rusty Russell wrote:
On Thursday 19 February 2009 10:01:42 Simon Horman wrote:
On Wed, Feb 18, 2009 at 10:08:00PM +1030, Rusty Russell wrote:
2) Direct NIC attachment This is particularly interesting with SR-IOV or
other multiqueue nics, but
Why wouldn't SEP be recognized by kvm-83 running a centos 5.x guest on a ppro?
Steven
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
For x86 and ia64, linux/types.h will be hacked to asm/types.h when syncing the
source.
You may consult kernel/x86/hack-module.awk to get the answer.
Xiantao
Joerg Roedel wrote:
On Thu, Feb 19, 2009 at 03:50:14PM -0600, Hollis Blanchard wrote:
A recent kernel merge breaks kvm-userspace
On Thursday 19 February 2009, Hans de Bruin wrote:
Martin Maurer wrote:
I suppose no-one has any?
VMware includes in its EULA (End User License Agreement) a prohibition
for any licensee to publish benchmark results without VMware's approval.
(see
Signed-off-by: Yu Zhao yu.z...@intel.com
---
drivers/pci/iov.c | 34 ++
drivers/pci/pci.h |5 +
drivers/pci/probe.c |3 +++
3 files changed, 42 insertions(+), 0 deletions(-)
diff --git a/drivers/pci/iov.c b/drivers/pci/iov.c
index
Greetings,
Following patches are intended to support SR-IOV capability in the
Linux kernel. With these patches, people can turn a PCI device with
the capability into multiple ones from software perspective, which
will benefit KVM and achieve other purposes such as QoS, security,
and etc.
SR-IOV
Signed-off-by: Yu Zhao yu.z...@intel.com
---
drivers/pci/iov.c | 29 +
drivers/pci/pci.c |1 +
drivers/pci/pci.h |4
3 files changed, 34 insertions(+), 0 deletions(-)
diff --git a/drivers/pci/iov.c b/drivers/pci/iov.c
index e6736d4..3bca8f8 100644
---
Signed-off-by: Yu Zhao yu.z...@intel.com
---
drivers/pci/Kconfig | 13
drivers/pci/Makefile |3 +
drivers/pci/iov.c| 181 ++
drivers/pci/pci.c|7 ++
drivers/pci/pci.h| 37 ++
drivers/pci/probe.c
Signed-off-by: Yu Zhao yu.z...@intel.com
---
drivers/pci/iov.c | 348 +++
drivers/pci/pci.h |3 +
include/linux/pci.h | 14 ++
3 files changed, 365 insertions(+), 0 deletions(-)
diff --git a/drivers/pci/iov.c b/drivers/pci/iov.c
index
Signed-off-by: Yu Zhao yu.z...@intel.com
---
drivers/pci/iov.c | 119 +++
drivers/pci/pci.h |4 ++
include/linux/pci.h |6 +++
3 files changed, 129 insertions(+), 0 deletions(-)
diff --git a/drivers/pci/iov.c b/drivers/pci/iov.c
index
Signed-off-by: Yu Zhao yu.z...@intel.com
---
Documentation/ABI/testing/sysfs-bus-pci | 27 +++
1 files changed, 27 insertions(+), 0 deletions(-)
diff --git a/Documentation/ABI/testing/sysfs-bus-pci
b/Documentation/ABI/testing/sysfs-bus-pci
index ceddcff..84dc100 100644
Signed-off-by: Yu Zhao yu.z...@intel.com
---
Documentation/DocBook/kernel-api.tmpl |1 +
Documentation/PCI/pci-iov-howto.txt | 99 +
2 files changed, 100 insertions(+), 0 deletions(-)
create mode 100644 Documentation/PCI/pci-iov-howto.txt
diff --git
Bugs item #2609423, was opened at 2009-02-17 07:30
Message generated for change (Comment added) made by jiajun
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2609423group_id=180599
Please note that this message will contain a full copy of the comment
On Tue, Feb 17, 2009 at 04:55:51PM +0200, Blue Swirl wrote:
On 2/17/09, Liu Yu yu@freescale.com wrote:
MPIC and OpenPIC have very similar design.
So a lot of code can be reused.
Modification mainly include:
1. keep struct openpic_t to the maximum size of both MPIC and OpenPIC.
42 matches
Mail list logo