On 2011-06-10 05:08, Amos Kong wrote:
host kernel: 2.6.39-rc2+
qemu-kvm : 05f1737582ab6c075476bde931c5eafbc62a9349
(gdb) r -monitor stdio -m 800 ~/RHEL-Server-6.0-64-virtio.qcow2 -snapshot
-device virtio-net-pci,netdev=he -netdev tap,vhost=on,id=he
(qemu) [New Thread 0x7fffbe7dd700 (LWP
Hi,
I've two scenarios at hand now: one involves a Windows 7 guest with
-soundhw hda, the other is my Musicpal (do you still have a firmware
image at hand?). Some Linux guest here with identical configuration like
Win7 does not show any problems in polling mode.
Noteworthy difference
Moving virtio-pci into the hwlib in upstream broke qemu-kvm due to some
unneeded build dependency on CONFIG_KVM. Stub out kvm_set_irqfd so that
we can build against it unconditionally.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
hw/virtio-pci.c |4
kvm-all.c |6 --
On Sun, Jun 5, 2011 at 6:27 PM, Alexander Graf ag...@suse.de wrote:
On 05.06.2011, at 18:03, Christoffer Dall wrote:
On Sun, Jun 5, 2011 at 2:36 PM, Avi Kivity a...@redhat.com wrote:
On 06/03/2011 06:03 PM, Christoffer Dall wrote:
[...]
+if VIRTUALIZATION
+
+config KVM
+
On Fri, Jun 10, 2011 at 09:40:34AM +0100, Christoffer Dall wrote:
OK, so I looked into compiling KVM/ARM as a module and there are a few
obstacles:
I need to export several symbols (identitiy_mapping_add,
pgd_clear_bad, __irq_svc). __irq_svc is tricky because it's in the
entry-armv.S
commit 123108f1c1aafd51d6a5c79cc04d7999dd88a930 tried to fix KVMs
XSAVE valid feature scanning, but it was wrong. It was not considering
the sparse nature of this bitfield, instead reading values from
uninitialized members of the entries array.
This patch now separates subleaf indicies from KVM's
Am 10.06.2011 um 11:23 schrieb Catalin Marinas catalin.mari...@arm.com:
On Fri, Jun 10, 2011 at 09:40:34AM +0100, Christoffer Dall wrote:
OK, so I looked into compiling KVM/ARM as a module and there are a few
obstacles:
I need to export several symbols (identitiy_mapping_add,
On Fri, Jun 10, 2011 at 10:53:06AM +0100, Alexander Graf wrote:
Am 10.06.2011 um 11:23 schrieb Catalin Marinas catalin.mari...@arm.com:
On Fri, Jun 10, 2011 at 09:40:34AM +0100, Christoffer Dall wrote:
OK, so I looked into compiling KVM/ARM as a module and there are a few
obstacles:
I
There's no need for the guest to validate the checksum if it have been
validated by host nics. So this patch introduces a new flag -
VIRTIO_NET_HDR_F_DATA_VALID which is used to bypass the checksum
examing in guest. The backend (tap/macvtap) may set this flag when
met skbs with
On Fri, Jun 10, 2011 at 06:56:17PM +0800, Jason Wang wrote:
There's no need for the guest to validate the checksum if it have been
validated by host nics. So this patch introduces a new flag -
VIRTIO_NET_HDR_F_DATA_VALID which is used to bypass the checksum
examing in guest. The backend
On Thu, 09 Jun 2011 08:59:27 +0200, Paolo Bonzini pbonz...@redhat.com wrote:
On 06/09/2011 01:28 AM, Rusty Russell wrote:
after some preliminary discussion on the QEMU mailing list, I present a
draft specification for a virtio-based SCSI host (controller, HBA, you
name it).
OK,
On Fri, Jun 10, 2011 at 11:58 AM, Catalin Marinas
catalin.mari...@arm.com wrote:
On Fri, Jun 10, 2011 at 10:53:06AM +0100, Alexander Graf wrote:
Am 10.06.2011 um 11:23 schrieb Catalin Marinas catalin.mari...@arm.com:
On Fri, Jun 10, 2011 at 09:40:34AM +0100, Christoffer Dall wrote:
OK, so I
When iterating through the XSAVE feature enumeration CPUID leaf (0xD)
we should not stop at the first zero EAX, but instead keep scanning
since there are gaps in the enumeration (ECX=1 for instance).
This fixes the proper usage of AVX in KVM guests.
Signed-off-by: Andre Przywara
On Fri, Jun 10, 2011 at 12:33 PM, Rusty Russell ru...@rustcorp.com.au wrote:
On Thu, 09 Jun 2011 08:59:27 +0200, Paolo Bonzini pbonz...@redhat.com wrote:
On 06/09/2011 01:28 AM, Rusty Russell wrote:
after some preliminary discussion on the QEMU mailing list, I present a
draft
On 06/10/2011 02:14 PM, Stefan Hajnoczi wrote:
Paolo, I'll switch the Linux guest LLD and QEMU virtio-scsi skeleton
that I have to comply with the spec. Does this sound good or did you
want to write these from scratch?
Why should I want to write things from scratch? :) Just send me again a
On 11-06-09 10:52 PM, Simon Horman wrote:
On Thu, Jun 09, 2011 at 01:02:13AM +0800, Brad Campbell wrote:
On 08/06/11 11:59, Eric Dumazet wrote:
Well, a bisection definitely should help, but needs a lot of time in
your case.
Yes. compile, test, crash, walk out to the other building to press
On 06/07/2011 03:43 PM, Paolo Bonzini wrote:
Hi all,
after some preliminary discussion on the QEMU mailing list, I present a
draft specification for a virtio-based SCSI host (controller, HBA, you
name it).
The virtio SCSI host is the basis of an alternative storage stack for
KVM. This stack
On 2011-06-10 14:08, Andre Przywara wrote:
When iterating through the XSAVE feature enumeration CPUID leaf (0xD)
we should not stop at the first zero EAX, but instead keep scanning
since there are gaps in the enumeration (ECX=1 for instance).
This fixes the proper usage of AVX in KVM guests.
When iterating through the XSAVE feature enumeration CPUID leaf (0xD)
we should not stop at the first zero EAX, but instead keep scanning
since there are gaps in the enumeration (ECX=1 for instance).
This fixes the proper usage of AVX in KVM guests.
Signed-off-by: Andre Przywara
If requests are placed on arbitrary queues you'll inevitably run on
locking issues to ensure strict request ordering.
I would add here:
If a device uses more than one queue it is the responsibility of the
device to ensure strict request ordering.
Applied with s/device/guest/g.
Please do
https://bugzilla.kernel.org/show_bug.cgi?id=37152
Summary: file system become read only after live migration
Product: Virtualization
Version: unspecified
Kernel Version: 2.6.32-5-amd64
Platform: All
OS/Version: Linux
Tree:
https://bugzilla.kernel.org/show_bug.cgi?id=37152
--- Comment #1 from Martin Chamberland martin.chamberl...@fadq.qc.ca
2011-06-10 15:38:04 ---
after 10 minutes...
Jun 10 11:36:45 debian kernel: [ 1833.817530] end_request: I/O error, dev vda,
sector 4176552
Jun 10 11:36:45 debian kernel: [
https://bugzilla.kernel.org/show_bug.cgi?id=37152
Martin Chamberland martin.chamberl...@fadq.qc.ca changed:
What|Removed |Added
Platform|All |x86-64
https://bugzilla.kernel.org/show_bug.cgi?id=37152
--- Comment #2 from Martin Chamberland martin.chamberl...@fadq.qc.ca
2011-06-10 15:42:22 ---
i forgot to tell that those log where grab from the guest machine.
server01$ sudo mount
mount: warning: /etc/mtab is not writable (e.g. read-only
On Fri, 10 Jun 2011, Mark Lord wrote:
Something many of us don't realize is that nearly all Intel chipsets
have a built-in hardware watchdog timer. This includes chipset for
consumer desktop boards as well as the big iron server stuff.
It's the i8xx_tco driver in the kernel enables use of
On Wed, Jun 08, 2011 at 04:11:03PM +0200, Jan Kiszka wrote:
snip
@@ -217,7 +209,6 @@ int kvm_arch_get_registers(CPUState *env)
return ret;
}
-#ifdef KVM_CAP_PPC_BOOKE_SREGS
if (sregs.u.e.features KVM_SREGS_E_BASE) {
env-spr[SPR_BOOKE_CSRR0] =
Hi,
While checking the cpu model code, I don't think I understand fully what
is supposed to be the right semantics for '-cpu host' on qemu-kvm, and
what exactly we are aiming to.
Maybe this was already discussed before, but I failed to find any
additional information except for the original
I am building kvm as an external module against 2.6.38-8 (Ubuntu 11.04
kernel). The kvm.ko and kvm-intel.ko build and insmod without any
issues. However I am able to unload the kvm-intel module. Here is the
lsmod listing:
kvm_intel 135653 0 [permanent]
kvm 381130 1
28 matches
Mail list logo