Il 09/06/2014 23:04, Bandan Das ha scritto:
A couple more updates to test_vmxon, test_vmptrld
and test_vmclear based on kvm commits -
3573e22cfecaac83f82ef4f6847d90e466fc8e10
KVM: nVMX: additional checks on vmxon region
96ec146330d18a938b4773be8d6dd1f93399507c
KVM: nVMX: fail on invalid
On Mon, Jun 09, 2014 at 06:47:12PM -0700, Mario Smarduch wrote:
On 06/08/2014 05:05 AM, Christoffer Dall wrote:
On Fri, Jun 06, 2014 at 10:33:41AM -0700, Mario Smarduch wrote:
kvm_vm_ioctl_get_dirty_log() is generic used by x86, ARM. x86 recent patch
changed this function, this patch picks
On Tue, Jun 03, 2014 at 10:21:58AM -0400, Gabriel L. Somlo wrote:
On Tue, Jun 03, 2014 at 11:17:48AM +0200, Paolo Bonzini wrote:
I think it's fine as it is now. :)
On Mon, Jun 02, 2014 at 09:55:18PM -0400, Gabriel L. Somlo wrote:
W.r.t. monitor/mwait, a guest can do one of the
On 28 March 2014 18:45, Christoffer Dall christoffer.d...@linaro.org wrote:
ARM VM System Specification
===
The virtual hardware platform must provide a number of mandatory
peripherals:
Serial console: The platform should provide a console,
based on an
On Tue, 2014-06-10 at 15:42 +0100, Peter Maydell wrote:
On 28 March 2014 18:45, Christoffer Dall christoffer.d...@linaro.org wrote:
ARM VM System Specification
===
The virtual hardware platform must provide a number of mandatory
peripherals:
Serial
Hi All,
I found this interesting project from KVM TODO website:
allow handling short packets from softirq or VCPU context
Plan:
We are going through the scheduler 3 times
(could be up to 5 if softirqd is involved)
Consider RX: host irq - io thread - VCPU thread -
guest irq - guest
Hello all,
I just wanted to share with you guys how we are using virtualization on ARM64
over here for the OSv project.
I don't know if that's something that could be useful for your specification
effort.
In OSv, creating and starting a VM to some level means starting an application.
That is,
Il 10/06/2014 16:42, Peter Maydell ha scritto:
The guest OS must include support for pl031 and mc146818 RTC.
(QEMU is going to provide a PL031, because that's the standard
ARM primecell device for this and it's what's in the vexpress.
kvmtool looks like it's going to provide mc146818, because
Hi Peter,
On 06/10/2014 10:42 AM, Peter Maydell wrote:
On 28 March 2014 18:45, Christoffer Dall christoffer.d...@linaro.org wrote:
ARM VM System Specification
===
The virtual hardware platform must provide a number of mandatory
peripherals:
Serial console: The
Hi,
i am working on the jailhouse[1] project and am currently looking at
inter-VM communication. We want to connect guests directly with virtual
consoles based on shared memory. The code complexity in the hypervisor
should be minimal, it should just make the shared memory discoverable
and provide
When we're using PR KVM we must not allow the CPU to take interrupts
in virtual mode, as the SLB does not contain host kernel mappings
when running inside the guest context.
To make sure we get good performance for non-KVM tasks but still
properly functioning PR KVM, let's just disable AIL
Hi,
According to this:
https://github.com/torvalds/linux/commit/0d1de2d901f4ba0972a3886496a44fb1d3300dbd
It looks like kvm have been supporting x2apic since kernel 2.6.32, or
even earlier.
However, this following patch:
On Thu, May 29, 2014 at 06:12:07PM -0700, Andi Kleen wrote:
{
struct kvm_pmu *pmu = vcpu-arch.pmu;
@@ -407,6 +551,20 @@ int kvm_pmu_set_msr(struct kvm_vcpu *vcpu, struct
msr_data *msr_info)
return 0;
}
break;
+ case
On 06/10/2014 02:22 AM, Christoffer Dall wrote:
On Mon, Jun 09, 2014 at 06:47:12PM -0700, Mario Smarduch wrote:
On 06/08/2014 05:05 AM, Christoffer Dall wrote:
On Fri, Jun 06, 2014 at 10:33:41AM -0700, Mario Smarduch wrote:
kvm_vm_ioctl_get_dirty_log() is generic used by x86, ARM. x86 recent
On 10 June 2014 18:04, Christopher Covington c...@codeaurora.org wrote:
On 06/10/2014 10:42 AM, Peter Maydell wrote:
I just noticed that this doesn't mandate that the platform
provides an RTC. As I understand it, the UEFI spec mandates
that there's an RTC (could somebody more familiar with
On 06/08/2014 05:05 AM, Christoffer Dall wrote:
On Tue, Jun 03, 2014 at 04:19:27PM -0700, Mario Smarduch wrote:
This patch adds support for handling 2nd stage page faults during migration,
it disables faulting in huge pages, and disolves huge pages to page tables.
s/disolves/dissolves/g
Will
Il 10/06/2014 20:08, Peter Maydell ha scritto:
On 10 June 2014 18:04, Christopher Covington c...@codeaurora.org wrote:
On 06/10/2014 10:42 AM, Peter Maydell wrote:
I just noticed that this doesn't mandate that the platform
provides an RTC. As I understand it, the UEFI spec mandates
that
Il 10/06/2014 20:56, Paolo Bonzini ha scritto:
Il 10/06/2014 20:08, Peter Maydell ha scritto:
On 10 June 2014 18:04, Christopher Covington c...@codeaurora.org wrote:
On 06/10/2014 10:42 AM, Peter Maydell wrote:
I just noticed that this doesn't mandate that the platform
provides an RTC. As I
Il 10/06/2014 20:56, Paolo Bonzini ha scritto:
Il 10/06/2014 20:08, Peter Maydell ha scritto:
On 10 June 2014 18:04, Christopher Covington c...@codeaurora.org wrote:
On 06/10/2014 10:42 AM, Peter Maydell wrote:
I just noticed that this doesn't mandate that the platform
provides an RTC. As I
On Tuesday 10 June 2014 18:44:59 Claudio Fontana wrote:
I just wanted to share with you guys how we are using virtualization
on ARM64 over here for the OSv project.
By skipping steps like UEFI, grub, firmware load, etc we strive to
keep our application launch time low.
Is this going to create
On Tue, Jun 10, 2014 at 03:04:48PM -0300, Marcelo Tosatti wrote:
On Thu, May 29, 2014 at 06:12:07PM -0700, Andi Kleen wrote:
{
struct kvm_pmu *pmu = vcpu-arch.pmu;
@@ -407,6 +551,20 @@ int kvm_pmu_set_msr(struct kvm_vcpu *vcpu, struct
msr_data *msr_info)
return
On Tue, Jun 10, 2014 at 12:22:07PM -0700, Andi Kleen wrote:
On Tue, Jun 10, 2014 at 03:04:48PM -0300, Marcelo Tosatti wrote:
On Thu, May 29, 2014 at 06:12:07PM -0700, Andi Kleen wrote:
{
struct kvm_pmu *pmu = vcpu-arch.pmu;
@@ -407,6 +551,20 @@ int kvm_pmu_set_msr(struct kvm_vcpu
On 10/06/2014 18:48, Henning Schild wrote: Hi,
In a first prototype i implemented a ivshmem[2] device for the
hypervisor. That way we can share memory between virtual machines.
Ivshmem is nice and simple but does not seem to be used anymore.
And it
does not define higher level devices, like
Hi,
According to this:
https://github.com/torvalds/linux/commit/0d1de2d901f4ba0972a3886496a44fb1d3300dbd
It looks like kvm have been supporting x2apic since kernel 2.6.32, or
even earlier.
This patch is to emulate x2apic for guest, then guest can benefit from some
advantages of x2apic,
On Tue, Jun 10, 2014 at 9:33 PM, Zhang Haoyu zhan...@sangfor.com wrote:
Hi,
According to this:
https://github.com/torvalds/linux/commit/0d1de2d901f4ba0972a3886496a44fb1d3300dbd
It looks like kvm have been supporting x2apic since kernel 2.6.32, or
even earlier.
This patch is to emulate
On Tue, Jun 10, 2014 at 11:54 PM, Jidong Xiao jidong.x...@gmail.com wrote:
On Tue, Jun 10, 2014 at 9:33 PM, Zhang Haoyu zhan...@sangfor.com wrote:
Hi,
According to this:
https://github.com/torvalds/linux/commit/0d1de2d901f4ba0972a3886496a44fb1d3300dbd
It looks like kvm have been supporting
Hi,
According to this:
https://github.com/torvalds/linux/commit/0d1de2d901f4ba0972a3886496a44fb1d3300dbd
It looks like kvm have been supporting x2apic since kernel 2.6.32, or
even earlier.
This patch is to emulate x2apic for guest, then guest can benefit from some
advantages of x2apic,
On Wed, Jun 11, 2014 at 12:53 AM, Zhang Haoyu zhan...@sangfor.com wrote:
Hi,
According to this:
https://github.com/torvalds/linux/commit/0d1de2d901f4ba0972a3886496a44fb1d3300dbd
It looks like kvm have been supporting x2apic since kernel 2.6.32, or
even earlier.
This patch is to emulate
On Wed, Jun 11, 2014 at 1:08 AM, Jidong Xiao jidong.x...@gmail.com wrote:
On Wed, Jun 11, 2014 at 12:53 AM, Zhang Haoyu zhan...@sangfor.com wrote:
Hi,
According to this:
https://github.com/torvalds/linux/commit/0d1de2d901f4ba0972a3886496a44fb1d3300dbd
It looks like kvm have been supporting
Am 30.05.14 19:38, schrieb Christian Zigotzky:
Dmesg logs:
watch -n 0 dmesg dmesg_mol_mac_os_x_tiger.txt
watch -n 0 dmesg dmesg_mol_mac_os_x_jaguar.txt
http://forum.hyperion-entertainment.biz/download/file.php?id=1215
http://forum.hyperion-entertainment.biz/download/file.php?id=1216
more
On 06/10/2014 12:39 PM, Christian Zigotzky wrote:
Am 30.05.14 19:38, schrieb Christian Zigotzky:
Dmesg logs:
watch -n 0 dmesg dmesg_mol_mac_os_x_tiger.txt
watch -n 0 dmesg dmesg_mol_mac_os_x_jaguar.txt
http://forum.hyperion-entertainment.biz/download/file.php?id=1215
When we're using PR KVM we must not allow the CPU to take interrupts
in virtual mode, as the SLB does not contain host kernel mappings
when running inside the guest context.
To make sure we get good performance for non-KVM tasks but still
properly functioning PR KVM, let's just disable AIL
32 matches
Mail list logo