Neiger, Gil wrote:
PDPTEs are used only if CR0.PG=CR4.PAE=1.
In that situation, their format depends the value of IA32_EFER.LMA.
If IA32_EFER.LMA=0, bit 63 is reserved and must be 0 in any PDPTE
that is marked present. The execute-disable setting of a page is
determined only by the PDE
Dong, Eddie wrote:
+ case PT64_ROOT_LEVEL:
+ context-rsvd_bits_mask[0][3] = exb_bit_rsvd |
+ rsvd_bits(maxphyaddr, 51) | rsvd_bits(7, 8);
+ context-rsvd_bits_mask[0][2] = exb_bit_rsvd |
+ rsvd_bits(maxphyaddr, 51) |
Felix Leimbach schrieb:
Tomasz Chmielewski wrote:
Felix Leimbach schrieb:
Out of 3 e1000 guests none has ever been hit.
Observed with kvm-83 and kvm-84 with the host running in-kernel KVM
code (linux 2.6.25.7)
Could you add a (unused) e1000 interface to your virtio guests?
As this issue
Wei Yongjun wrote:
Remove pointless conditional before kfree().
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
Dong, Eddie wrote:
Neiger, Gil wrote:
PDPTEs are used only if CR0.PG=CR4.PAE=1.
In that situation, their format depends the value of IA32_EFER.LMA.
If IA32_EFER.LMA=0, bit 63 is reserved and must be 0 in any PDPTE
that is marked present. The execute-disable setting of a page is
determined
On (Mon) Mar 30 2009 [18:02:16], Avi Kivity wrote:
Amit Shah wrote:
/*
* Check whether the Architectural PerfMon supports
* Unhalted Core Cycles Event or not.
* NOTE: Corresponding bit = 0 in ebx indicates event present.
*/
cpuid(10,
Jan Kiszka wrote:
Gleb Natapov wrote:
The patch fixes two problems with task switching.
1. Back link is written to a wrong TSS.
2. Instruction emulation is not needed if the reason for task switch
is a task gate in IDT and access to it is caused by an
external even.
2 is
Javier Guerra schrieb:
On Mon, Mar 30, 2009 at 10:15 AM, Tomasz Chmielewski man...@wpkg.org wrote:
Still, if there is free memory on host, why not use it for cache?
because it's best used on the guest;
It is correct, but not realistic from the administrative point of view.
Let's say you
On Mon, Mar 30, 2009 at 05:12:30PM -0400, Bill Davidsen wrote:
Daniel P. Berrange wrote:
On Fri, Mar 20, 2009 at 10:57:50AM -0700, jd wrote:
Hi
What is the motivation for having different kvm binary names on
various linux distributions.. ?
-- kvm
-- qemu-system-x86_84
-- qemu-kvm
Remove pointless conditional before kfree().
Signed-off-by: Wei Yongjun yj...@cn.fujitsu.com
---
arch/x86/kvm/x86.c |3 +--
1 files changed, 1 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 8ca100a..8fb4c92 100644
--- a/arch/x86/kvm/x86.c
+++
Hi List,
it is interesting, that most people at name kvm first think for
vga-hardware switches. If you type kvm in google, you'll never find
this project at the first place. Maybe (i know thats difficult to
realize) it is better looking for another name? Like kevim? Its only a
suggestion...
On Tue, Mar 31, 2009 at 11:51:03AM +0200, Oliver Rath wrote:
Hi List,
it is interesting, that most people at name kvm first think for
vga-hardware switches. If you type kvm in google, you'll never find
this project at the first place. Maybe (i know thats difficult to
realize) it is
On Sun, Mar 29, 2009 at 10:10:26PM +0300, Avi Kivity wrote:
Avi Kivity wrote:
Kurt Yoder wrote:
slow host cpu information, core 1 of 16:
processor : 0
vendor_id : AuthenticAMD
cpu family : 16
model : 4
model name : Quad-Core AMD Opteron(tm) Processor 8382
Joerg Roedel wrote:
--- a/kernel/x86/kvm/svm.c
+++ b/kernel/x86/kvm/svm.c
@@ -575,7 +575,7 @@ static void init_vmcb(struct vcpu_svm *svm)
INTERCEPT_CR3_MASK);
control-intercept_cr_write = ~(INTERCEPT_CR0_MASK|
Daniel P. Berrange berrange at redhat.com writes:
On Tue, Mar 31, 2009 at 11:51:03AM +0200, Oliver Rath wrote:
Hi List,
it is interesting, that most people at name kvm first think for
vga-hardware switches. If you type kvm in google, you'll never find
this project at the first
KAMEZAWA Hiroyuki wrote:
On Tue, 31 Mar 2009 02:59:20 +0300
Izik Eidus iei...@redhat.com wrote:
Ksm is driver that allow merging identical pages between one or more
applications in way unvisible to the application that use it.
Pages that are merged are marked as readonly and are COWed when
Anthony Liguori wrote:
Izik Eidus wrote:
Ksm is driver that allow merging identical pages between one or more
applications in way unvisible to the application that use it.
Pages that are merged are marked as readonly and are COWed when any
application try to change them.
Ksm is used for cases
hugetlbfs info missing on new wiki. the info is here
http://il.qumranet.com/kvmwiki/UsingLargePages
On Wed, Mar 11, 2009 at 4:38 AM, Dor Laor dl...@redhat.com wrote:
Hollis Blanchard wrote:
On Tue, 2009-03-10 at 22:49 +0200, Dor Laor wrote:
Sorry for that. It took IT only few month to
sudhir kumar wrote:
hugetlbfs info missing on new wiki. the info is here
http://il.qumranet.com/kvmwiki/UsingLargePages
Adding smintz.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message
Anthony Liguori wrote:
Izik Eidus wrote:
I am sending another seires of patchs for kvm kernel and kvm-userspace
that would allow users of kvm to test ksm with it.
The kvm patchs would apply to Avi git tree.
Any reason to not take these through upstream QEMU instead of
kvm-userspace? In
On Tue, 31 Mar 2009 08:54:48 +0300
Gleb Natapov g...@redhat.com wrote:
On Mon, Mar 30, 2009 at 11:26:52PM -0400, Mike Kelly wrote:
I'm on a Intel(R) Core(TM)2 Duo CPU T7500 @ 2.20GHz, using a 2.6.29
vanilla kernel, x86_64. kvm userland version 84.
When I try to boot my x64 Windows XP,
On Tue, Mar 31, 2009 at 08:50:25AM -0400, Mike Kelly wrote:
On Tue, 31 Mar 2009 08:54:48 +0300
Gleb Natapov g...@redhat.com wrote:
On Mon, Mar 30, 2009 at 11:26:52PM -0400, Mike Kelly wrote:
I'm on a Intel(R) Core(TM)2 Duo CPU T7500 @ 2.20GHz, using a 2.6.29
vanilla kernel, x86_64. kvm
On Tue, 31 Mar 2009 15:53:06 +0300
Gleb Natapov g...@redhat.com wrote:
This crash is known and fix is been working on. It happens on IO
cancellation path and usually you get there if you don't have write
permission to you image.
Ok, cool. Thanks for the help w/ my stupidity.
--
Mike Kelly
Izik Eidus wrote:
I belive using ioctl for registering memory of applications make it
easier
Yes, I completely agree.
Ksm doesnt have any complicated API that would benefit from sysfs
(beside adding more complexity)
That is, the KSM_START_STOP_KTHREAD part, not necessarily the rest
Bugs item #2723366, was opened at 2009-03-31 07:00
Message generated for change (Tracker Item Submitted) made by jiajun
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2723366group_id=180599
Please note that this message will contain a full copy of the
On Tue, Mar 31, 2009 at 08:31:31AM -0500, Anthony Liguori wrote:
You could drop KSM_START_STOP_KTHREAD and KSM_GET_INFO_KTHREAD altogether,
and introduce a sysfs hierarchy:
/sysfs/some/path/ksm/{enable,pages_to_scan,sleep_time}
Introducing a sysfs hierarchy sounds a bit of overkill.
the
Added:
http://www.linux-kvm.org/page/UsingLargePages
Many thanks!
Shahar Mintz smi...@redhat.com
IT and Infrastructure
Red Hat Israel, Ra'anana
Phone: +972 9 7754666
Extension: 5106
IRC: smintz
GnuPG: FFEC 6A38 420D 288A 0D16 EEE0 4D5D 287A 5686 23CC
Avi Kivity wrote:
sudhir kumar
Andrea Arcangeli wrote:
the ability to disable KSM. That seems like a security concern to me since
registering a memory region ought to be an unprivileged action whereas
enabling/disabling KSM ought to be a privileged action.
sysfs files would then only be writeable by admin, so if we
Today we upgraded one of our VM's from F9 to F10 and after the first
reboot we see the dreaded GRUB prompt. This it turns out is a known
problem with F10 installs. And the recovery is usually very simple.
You boot into rescue mode from CDROM and reinstall the boot loader. The
problem we're
Gerry Reno schrieb:
Today we upgraded one of our VM's from F9 to F10 and after the first
reboot we see the dreaded GRUB prompt. This it turns out is a known
problem with F10 installs. And the recovery is usually very simple.
You boot into rescue mode from CDROM and reinstall the boot
I cannot get EPT support to work on commit:
21f65ab2c582594a69dcb1484afa9f88b3414b4f
KVM: VMX: Zero ept module parameter if ept is not present
I see tons of pf_guest from kvm_stat, where as the previous commit has none.
I am using ept=1 module option for kvm-intel.
This is on Nehalem
On Tue, Mar 31, 2009 at 09:37:17AM -0500, Anthony Liguori wrote:
In the very least, if you insist on not using sysfs, you should have a
separate character device that's used for control (like /dev/ksmctl).
I'm fine to use sysfs that's not the point, if you've to add a ksmctl
device, then sysfs
Looks good, but doesn't apply; please check if you are working against
the latest version.
Rebased on top of a317a1e496b22d1520218ecf16a02498b99645e2 + previous rsvd bits
violation check patch.
thx, eddie
Use rsvd_bits_mask in load_pdptrs and remove bit 5-6 from rsvd_bits_mask
per
Tomasz Chmielewski wrote:
Gerry Reno schrieb:
Today we upgraded one of our VM's from F9 to F10 and after the first
reboot we see the dreaded GRUB prompt. This it turns out is a known
problem with F10 installs. And the recovery is usually very simple.
You boot into rescue mode from CDROM
Andrea Arcangeli wrote:
On Tue, Mar 31, 2009 at 09:37:17AM -0500, Anthony Liguori wrote:
In the very least, if you insist on not using sysfs, you should have a
separate character device that's used for control (like /dev/ksmctl).
I'm fine to use sysfs that's not the point, if you've
Gerry Reno schrieb:
Tomasz Chmielewski wrote:
Gerry Reno schrieb:
Today we upgraded one of our VM's from F9 to F10 and after the first
reboot we see the dreaded GRUB prompt. This it turns out is a known
problem with F10 installs. And the recovery is usually very simple.
You boot into
On Mar 29, 2009, at 10:29 AM, Avi Kivity wrote:
Kurt Yoder wrote:
snip
Can you loading kvm_amd on this host with 'modprobe kvm-amd npt=0'?
So that's most likely the problem for me:
m...@host:/etc/nagios/nrpe_directives$ sudo modprobe kvm-amd npt=0
FATAL: Error inserting kvm_amd
On Tue, Mar 31, 2009 at 10:09:24AM -0500, Anthony Liguori wrote:
I don't think the registering of ram should be done via sysfs. That would
be a pretty bad interface IMHO. But I do think the functionality that
ksmctl provides along with the security issues I mentioned earlier really
Tomasz Chmielewski wrote:
Gerry Reno schrieb:
Tomasz Chmielewski wrote:
Gerry Reno schrieb:
Today we upgraded one of our VM's from F9 to F10 and after the
first reboot we see the dreaded GRUB prompt. This it turns out is
a known problem with F10 installs. And the recovery is usually
very
Bernhard Kohl wrote:
Jan Kiszka wrote:
Gleb Natapov wrote:
The patch fixes two problems with task switching.
1. Back link is written to a wrong TSS.
2. Instruction emulation is not needed if the reason for
task switch
is a task gate in IDT and access to it is caused by an
On Tue, Mar 31, 2009 at 05:21:16PM +0200, Kohl, Bernhard (NSN - DE/Munich)
wrote:
Bernhard Kohl wrote:
Jan Kiszka wrote:
Gleb Natapov wrote:
The patch fixes two problems with task switching.
1. Back link is written to a wrong TSS.
2. Instruction emulation is not needed if
Gerry Reno wrote:
What is GUI VMM?
virt-manager
The libvirt mailing list is the right place to get support for
virt-manager. To get support for kvm proper here, you'll want to use ps
to see the command line with which libvirtd is invoking kvm and provide
that.
That said, the XML you
Andrea Arcangeli wrote:
On Tue, Mar 31, 2009 at 10:09:24AM -0500, Anthony Liguori wrote:
I don't think the registering of ram should be done via sysfs. That would
be a pretty bad interface IMHO. But I do think the functionality that
ksmctl provides along with the security issues I
Charles Duffy wrote:
Gerry Reno wrote:
What is GUI VMM?
virt-manager
To get support for kvm proper here, you'll want to use ps to see the
command line with which libvirtd is invoking kvm and provide that.
/usr/bin/qemu-kvm -S -M pc -m 512 -smp 2 -name MX_3 -monitor pty -boot c
-drive
Gerry Reno wrote:
Charles Duffy wrote:
Gerry Reno wrote:
What is GUI VMM?
virt-manager
To get support for kvm proper here, you'll want to use ps to see the
command line with which libvirtd is invoking kvm and provide that.
/usr/bin/qemu-kvm -S -M pc -m 512 -smp 2 -name MX_3 -monitor pty
On Sun, Mar 29, 2009 at 03:24:08PM +0300, Avi Kivity wrote:
static int mmu_pages_next(struct kvm_mmu_pages *pvec,
struct mmu_page_path *parents,
int i)
{
int n;
for (n = i+1; n pvec-nr; n++) {
struct
On Tue, Mar 31, 2009 at 10:54:57AM -0500, Anthony Liguori wrote:
You can still disable ksm and simply return ENOSYS for the MADV_ flag. You
-EINVAL if something, -ENOSYS would tell userland that it shall stop
trying to use madvise, including the other MADV_ too.
could even keep it as a
Andrea Arcangeli wrote:
On Tue, Mar 31, 2009 at 10:54:57AM -0500, Anthony Liguori wrote:
You can still disable ksm and simply return ENOSYS for the MADV_ flag. You
-EINVAL if something, -ENOSYS would tell userland that it shall stop
trying to use madvise, including the other MADV_
Charles Duffy wrote:
Gerry Reno wrote:
Charles Duffy wrote:
Gerry Reno wrote:
What is GUI VMM?
virt-manager
To get support for kvm proper here, you'll want to use ps to see the
command line with which libvirtd is invoking kvm and provide that.
/usr/bin/qemu-kvm -S -M pc -m 512 -smp 2
On Tue, Mar 31, 2009 at 12:01 PM, Gerry Reno gr...@verizon.net wrote:
Charles Duffy wrote:
I put the xml stanza in the file and undefine/define domain but it gives an
error about cannot read image file.
source file=/media/Fedora 10 DVD/
And I check this path and I can read all the files from
Gerry Reno wrote:
source file=/media/Fedora 10 DVD/
Well, you're missing a set of opening quotation marks here... and your
file doesn't have a .iso extension? That's rather unusual.
Anyhow, inasmuch as you're unable to run a define successfully, this is
a libvirt usage problem, not a kvm
Gerry Reno schrieb:
disk type='file' device='cdrom'
source file='/path/to/your.iso'/
target dev='hdd' bus='ide'/
readonly/
/disk
I put the xml stanza in the file and undefine/define domain but it gives
an error about cannot read image file.
source file=/media/Fedora
On Tue, Mar 31, 2009 at 11:51:14AM -0500, Anthony Liguori wrote:
You have two things here. CONFIG_MEM_SHARABLE and CONFIG_KSM.
CONFIG_MEM_SHARABLE cannot be a module. If it's set to =n, then
madvise(MADV_SHARABLE) == -ENOSYS.
Where the part that -ENOSYS tell userland madvise syscall table
Javier Guerra wrote:
On Tue, Mar 31, 2009 at 12:01 PM, Gerry Reno gr...@verizon.net wrote:
Charles Duffy wrote:
I put the xml stanza in the file and undefine/define domain but it gives an
error about cannot read image file.
source file=/media/Fedora 10 DVD/
And I check this path and I can
Gerry Reno wrote:
Javier Guerra wrote:
On Tue, Mar 31, 2009 at 12:01 PM, Gerry Reno gr...@verizon.net wrote:
Charles Duffy wrote:
I put the xml stanza in the file and undefine/define domain but it
gives an
error about cannot read image file.
source file=/media/Fedora 10 DVD/
And I check
URL: http://www.linux-kvm.org/page/HowToConfigScript
The kvmctl scripts in the HowTo pages can't be downloaded, as the download
links are actually uploads.
Thanks,
Brent Nelson
Director of Computing
Dept. of Physics
University of Florida
--
To unsubscribe from this list: send the line
Gerry Reno wrote:
Gerry Reno wrote:
Javier Guerra wrote:
On Tue, Mar 31, 2009 at 12:01 PM, Gerry Reno gr...@verizon.net wrote:
Charles Duffy wrote:
I put the xml stanza in the file and undefine/define domain but it
gives an
error about cannot read image file.
source file=/media/Fedora 10
Gerry Reno schrieb:
Gerry Reno wrote:
Gerry Reno wrote:
Javier Guerra wrote:
On Tue, Mar 31, 2009 at 12:01 PM, Gerry Reno gr...@verizon.net wrote:
Charles Duffy wrote:
I put the xml stanza in the file and undefine/define domain but it
gives an
error about cannot read image file.
source
Tomasz Chmielewski wrote:
Gerry Reno schrieb:
Gerry Reno wrote:
Gerry Reno wrote:
Javier Guerra wrote:
On Tue, Mar 31, 2009 at 12:01 PM, Gerry Reno gr...@verizon.net
wrote:
Charles Duffy wrote:
I put the xml stanza in the file and undefine/define domain but
it gives an
error about
Gerry Reno schrieb:
What does:
md5sum /dev/sr0
output?
DVD is Fedora 10 DVD (i386)
Four cases:
# desktop user; DVD unmounted
$ md5sum /dev/sr0
md5sum: /dev/sr0: Input/output error
# desktop user; DVD mounted
$ md5sum /dev/sr0
ff311b322c894aabc4361c4e270f5a3f /dev/sr0
Download the iso
Tomasz Chmielewski wrote:
Gerry Reno schrieb:
What does:
md5sum /dev/sr0
output?
DVD is Fedora 10 DVD (i386)
Four cases:
# desktop user; DVD unmounted
$ md5sum /dev/sr0
md5sum: /dev/sr0: Input/output error
# desktop user; DVD mounted
$ md5sum /dev/sr0
ff311b322c894aabc4361c4e270f5a3f
applies to v2.6.29 (will port to git HEAD soon)
FIRST OFF: Let me state that this is not a KVM or networking specific
technology. Virtual-Bus is a mechanism for defining and deploying
software “devices” directly in a Linux kernel. The example use-case we
have provided supports a
This interface provides a bidirectional shared-memory based signaling
mechanism. It can be used by any entities which desire efficient
communication via shared memory. The implementation details of the
signaling are abstracted so that they may transcend a wide variety
of locale boundaries (e.g.
We expect to have various types of connection-clients (e.g. userspace,
kvm, etc), each of which is likely to have common access patterns and
marshalling duties. Therefore we create a client API to simplify
client development by helping with mundane tasks such as handle-2-pointer
translation, etc.
We can map these over VBUS shared memory (or really any shared-memory
architecture if it supports shm-signals) to allow asynchronous
communication between two end-points. Memory is synchronized using
pure barriers (i.e. lockless), so IOQs are friendly in many contexts,
even if the memory is
This will generally be used for hypervisors to publish any host-side
virtual devices up to a guest. The guest will have the opportunity
to consume any devices present on the vbus-proxy as if they were
platform devices, similar to existing buses like PCI.
Signed-off-by: Gregory Haskins
We need to get hotswap events in environments which cannot use existing
facilities (e.g. inotify). So we add a notifier-chain to allow client
callbacks whenever an interface is {un}registered.
Signed-off-by: Gregory Haskins ghask...@novell.com
---
include/linux/vbus.h | 15 +
Signed-off-by: Gregory Haskins ghask...@novell.com
---
include/linux/venet.h | 47 +++
1 files changed, 47 insertions(+), 0 deletions(-)
create mode 100644 include/linux/venet.h
diff --git a/include/linux/venet.h b/include/linux/venet.h
new file
Signed-off-by: Gregory Haskins ghask...@novell.com
---
drivers/net/vbus-enet.c | 249 +--
include/linux/venet.h | 39 +++
2 files changed, 275 insertions(+), 13 deletions(-)
diff --git a/drivers/net/vbus-enet.c b/drivers/net/vbus-enet.c
index
This module is similar in concept to a tuntap. A tuntap module provides
a netif() interface on one side, and a char-dev interface on the other.
Packets that ingress on one interface, egress on the other (and vice versa).
This module offers a similar concept, except that it substitues the
The ioapic code currently privately manages the mapping between irq
and vector. This results in some layering violations as the support
for certain MSI operations need this info. As a result, the MSI
code itself was moved to the ioapic module. This is not really
optimal.
We now have another
We need a way to detect if a VM is reset later in the series, so lets
add a capability for userspace to signal a VM reset down to the kernel.
Signed-off-by: Gregory Haskins ghask...@novell.com
---
arch/x86/kvm/x86.c |1 +
include/linux/kvm.h |2 ++
include/linux/kvm_host.h |
This patch provides the ability to dynamically declare and map an
interrupt-request handle to an x86 8-bit vector.
Problem Statement: Emulated devices (such as PCI, ISA, etc) have
interrupt routing done via standard PC mechanisms (MP-table, ACPI,
etc). However, we also want to support a new
This patch adds support for guest access to a VBUS assigned to the same
context as the VM. It utilizes a IOQ+IRQ to move events from host-guest,
and provides a hypercall interface to move events guest-host.
Signed-off-by: Gregory Haskins ghask...@novell.com
---
arch/x86/include/asm/kvm_para.h
Signed-off-by: Gregory Haskins ghask...@novell.com
---
drivers/vbus/devices/venet-tap.c | 236 +-
1 files changed, 229 insertions(+), 7 deletions(-)
diff --git a/drivers/vbus/devices/venet-tap.c b/drivers/vbus/devices/venet-tap.c
index ccce58e..0ccb7ed
It will be common to map an IOQ over the VBUS shared-memory interfaces,
so lets generalize their setup so we can reuse the pattern.
Signed-off-by: Gregory Haskins ghask...@novell.com
---
include/linux/vbus_device.h |7 +++
include/linux/vbus_driver.h |7 +++
kernel/vbus/Kconfig
Signed-off-by: Gregory Haskins ghask...@novell.com
---
drivers/net/Kconfig | 13 +
drivers/net/Makefile|1
drivers/net/vbus-enet.c | 706 +++
3 files changed, 720 insertions(+), 0 deletions(-)
create mode 100644 drivers/net/vbus-enet.c
Gerry Reno wrote:
Tomasz Chmielewski wrote:
Gerry Reno schrieb:
What does:
md5sum /dev/sr0
output?
DVD is Fedora 10 DVD (i386)
Four cases:
# desktop user; DVD unmounted
$ md5sum /dev/sr0
md5sum: /dev/sr0: Input/output error
# desktop user; DVD mounted
$ md5sum /dev/sr0
Gerry Reno wrote:
Gerry Reno wrote:
Tomasz Chmielewski wrote:
Gerry Reno schrieb:
What does:
md5sum /dev/sr0
output?
DVD is Fedora 10 DVD (i386)
Four cases:
# desktop user; DVD unmounted
$ md5sum /dev/sr0
md5sum: /dev/sr0: Input/output error
# desktop user; DVD mounted
$ md5sum
On Tue, Mar 31, 2009 at 1:53 PM, Gerry Reno gr...@verizon.net wrote:
Boot Failure Code: 0003
Boot from CDROM failed: cannot read the boot disk.
FATAL: No bootable device.
your underlying problem is that you can't get libvirt to generate the
appropriate command line. you really should take
Javier Guerra wrote:
On Tue, Mar 31, 2009 at 1:53 PM, Gerry Reno gr...@verizon.net wrote:
Boot Failure Code: 0003
Boot from CDROM failed: cannot read the boot disk.
FATAL: No bootable device.
your underlying problem is that you can't get libvirt to generate the
appropriate command
Gregory Haskins wrote:
This patch provides the ability to dynamically declare and map an
interrupt-request handle to an x86 8-bit vector.
Problem Statement: Emulated devices (such as PCI, ISA, etc) have
interrupt routing done via standard PC mechanisms (MP-table, ACPI,
etc). However, we also
On Tue, Mar 31, 2009 at 2:13 PM, Gerry Reno gr...@verizon.net wrote:
Javier Guerra wrote:
your underlying problem is that you can't get libvirt to generate the
appropriate command line. you really should take it to the libvirt
list
Ok, can you give me a command line that will work and
Avi Kivity wrote:
Gregory Haskins wrote:
This patch provides the ability to dynamically declare and map an
interrupt-request handle to an x86 8-bit vector.
Problem Statement: Emulated devices (such as PCI, ISA, etc) have
interrupt routing done via standard PC mechanisms (MP-table, ACPI,
On Tue, 31 Mar 2009 14:43:55 -0400
Gregory Haskins ghask...@novell.com wrote:
The ioapic code currently privately manages the mapping between irq
and vector. This results in some layering violations as the support
for certain MSI operations need this info. As a result, the MSI
code itself
Alan Cox wrote:
On Tue, 31 Mar 2009 14:43:55 -0400
Gregory Haskins ghask...@novell.com wrote:
The ioapic code currently privately manages the mapping between irq
and vector. This results in some layering violations as the support
for certain MSI operations need this info. As a result,
Avi Kivity wrote:
Gregory Haskins wrote:
We need a way to detect if a VM is reset later in the series, so lets
add a capability for userspace to signal a VM reset down to the kernel.
How do you handle the case of a guest calling kexec to load a new
kernel? Or is that not important for
Gregory Haskins wrote:
- works with all guests
- supports hotplug/hotunplug, udev, sysfs, module autoloading, ...
- supported in all OSes
- someone else maintains it
These points are all valid, and I really struggled with this particular
part of the design. The entire vbus design only
Gregory Haskins wrote:
Avi Kivity wrote:
Gregory Haskins wrote:
We need a way to detect if a VM is reset later in the series, so lets
add a capability for userspace to signal a VM reset down to the kernel.
How do you handle the case of a guest calling kexec to load a new
Gregory Haskins ghask...@novell.com writes:
What might be useful is if you could expand a bit more on what the high level
use cases for this.
Questions that come to mind and that would be good to answer:
This seems to be aimed at having multiple VMs talk
to each other, but not talk to the rest
I updated my bugreport at https://bugzilla.redhat.com/show_bug.cgi?id=492688#c8
When migrating with -no-kvm everything works fine without stacktraces.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
Avi Kivity wrote:
Gregory Haskins wrote:
- works with all guests
- supports hotplug/hotunplug, udev, sysfs, module autoloading, ...
- supported in all OSes
- someone else maintains it
These points are all valid, and I really struggled with this particular
part of the design. The
Avi Kivity wrote:
Gregory Haskins wrote:
Avi Kivity wrote:
Gregory Haskins wrote:
We need a way to detect if a VM is reset later in the series, so lets
add a capability for userspace to signal a VM reset down to the
kernel.
How do you handle the case of a guest calling
On Tue, 31 Mar 2009 14:43:34 -0400
Gregory Haskins ghask...@novell.com wrote:
Signed-off-by: Gregory Haskins ghask...@novell.com
---
drivers/net/Kconfig | 13 +
drivers/net/Makefile|1
drivers/net/vbus-enet.c | 706
+++
3
Gregory Haskins wrote:
This interface provides a bidirectional shared-memory based signaling
mechanism. It can be used by any entities which desire efficient
communication via shared memory. The implementation details of the
signaling are abstracted so that they may transcend a wide variety
of
Gerrit Slomma roadrunner_gs at web.de writes:
I updated my bugreport at
https://bugzilla.redhat.com/show_bug.cgi?id=492688#c8
When migrating with -no-kvm everything works fine without stacktraces.
Seems like -no-kvm is emulating a AMD on my Intel-Hosts...
host
rr016# grep vendor_id
Hello,
I attach below some benchmark of the new ksm tree algorithm, showing
ksm performance in best and worst case scenarios.
---
Here a program ksmpages.c that tries to create the worst case scenario
for the ksm tree algorithm.
Avi Kivity wrote:
Gregory Haskins wrote:
This interface provides a bidirectional shared-memory based signaling
mechanism. It can be used by any entities which desire efficient
communication via shared memory. The implementation details of the
signaling are abstracted so that they may
Gregory Haskins wrote:
Won't this have scaling issues? One IRQ means one target vcpu.
Whereas I'd like virtio devices to span multiple queues, each queue
with its own MSI IRQ.
Hmm..you know I hadnt really thought of it that way, but you have a
point. To clarify, my design actually uses
Gregory Haskins wrote:
+struct shm_signal_irq {
+__u8 enabled;
+__u8 pending;
+__u8 dirty;
+};
Some ABIs may choose to pad this, suggest explicit padding.
Yeah, good idea. What is the official way to do this these
1 - 100 of 115 matches
Mail list logo