Hi, Xiantao
diff --git a/qemu/target-ia64/cpu.h b/qemu/target-ia64/cpu.h
index be409c7..2d91cb9 100644
--- a/qemu/target-ia64/cpu.h
+++ b/qemu/target-ia64/cpu.h
@@ -30,11 +30,11 @@
#define TARGET_LONG_BITS 64
-
-#define TARGET_PAGE_BITS 14
+#define TARGET_PAGE_BITS 16
Do we need to use
Hi, Xiantao
Akio Takebe wrote:
Hi,
Run guests with the command :
/usr/local/bin/qemu-system-ia64 -hda your.img -m 512
If you have any question, please feel free to contact me!
Can I use the guest image of Xen?
Or do I need to clean-install Linux or Windows on KVM guest?
Hi, Akio
Thank
Akio Takebe wrote:
Hi, Xiantao
Akio Takebe wrote:
Hi,
Run guests with the command :
/usr/local/bin/qemu-system-ia64 -hda your.img -m 512
If you have any question, please feel free to contact me!
Can I use the guest image of Xen?
Or do I need to clean-install Linux or Windows on KVM
Akio Takebe wrote:
Hi, Xiantao
diff --git a/qemu/target-ia64/cpu.h b/qemu/target-ia64/cpu.h index
be409c7..2d91cb9 100644 --- a/qemu/target-ia64/cpu.h
+++ b/qemu/target-ia64/cpu.h
@@ -30,11 +30,11 @@
#define TARGET_LONG_BITS 64
-
-#define TARGET_PAGE_BITS 14
+#define
From: Izik Eidus [EMAIL PROTECTED]
This changes kvm_write_guest_page/kvm_read_guest_page to use
copy_to_user/read_from_user, as a result we get better speed
and better dirty bit tracking.
Signed-off-by: Izik Eidus [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
From: Hollis Blanchard [EMAIL PROTECTED]
Signed-off-by: Hollis Blanchard [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/kvm.h | 10 +
drivers/kvm/kvm_main.c | 442 +---
drivers/kvm/x86.c | 427
From: Zhang Xiantao [EMAIL PROTECTED]
Move kvm_vcpu_ioctl_translate to arch, since mmu would be put under arch.
Signed-off-by: Zhang Xiantao [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/kvm.h |3 +++
drivers/kvm/kvm_main.c | 24
From: Carsten Otte [EMAIL PROTECTED]
This patch moves the implementation of get_apic_base and set_apic_base
from kvm_main.c to x86.c
Signed-off-by: Carsten Otte [EMAIL PROTECTED]
Reviewed-by: Christian Borntraeger [EMAIL PROTECTED]
Acked-by: Hollis Blanchard [EMAIL PROTECTED]
Signed-off-by: Avi
From: Carsten Otte [EMAIL PROTECTED]
This patch moves the implementation of the functions of kvm_get/set_msr,
kvm_get/set_msr_common, and set_efer from kvm_main.c to x86.c. The
definition of EFER_RESERVED_BITS is moved too.
Signed-off-by: Carsten Otte [EMAIL PROTECTED]
Acked-by: Hollis Blanchard
From: Hollis Blanchard [EMAIL PROTECTED]
Signed-off-by: Hollis Blanchard [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/kvm.h |7 +++
drivers/kvm/kvm_main.c | 25 -
drivers/kvm/x86.c | 22 ++
3 files
From: Zhang Xiantao [EMAIL PROTECTED]
First step to split kvm_vcpu. Currently, we just use an macro to define
the common fields in kvm_vcpu for all archs, and all archs need to define
its own kvm_vcpu struct.
Signed-off-by: Zhang Xiantao [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL
From: Eddie Dong [EMAIL PROTECTED]
Signed-off-by: Yaozu (Eddie) Dong [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/i8259.c |6 ++
drivers/kvm/irq.h |1 +
2 files changed, 3 insertions(+), 4 deletions(-)
diff --git a/drivers/kvm/i8259.c
Split guest reset code out of vmx_vcpu_setup(). Besides being cleaner, this
moves the realmode tss setup (which can sleep) outside vmx_vcpu_setup()
(which is executed with preemption enabled).
[izik: remove unused variable]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/kvm.h
From: Christian Borntraeger [EMAIL PROTECTED]
Currently kvm provides hypercalls only for x86* architectures. To
provide hypercall infrastructure for other kvm architectures I split
kvm_para.h into a generic header file and architecture specific
definitions.
Signed-off-by: Christian Borntraeger
The second 2.6.25 kvm patch series, for your review. Three more to go.
-
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2005.
From: Laurent Vivier [EMAIL PROTECTED]
This patch lets GCC to determine which registers to save when we
switch to/from a VCPU in the case of AMD i386
* Original code saves following registers:
ebx, ecx, edx, esi, edi, ebp
* Patched code:
- informs GCC that we modify following registers
From: Laurent Vivier [EMAIL PROTECTED]
This patch lets GCC to determine which registers to save when we
switch to/from a VCPU in the case of intel x86_64.
* Original code saves following registers:
rax, rbx, rcx, rdx, rsi, rdi, rbp,
r8, r9, r10, r11, r12, r13, r14, r15
* Patched code:
From: Laurent Vivier [EMAIL PROTECTED]
This patch lets GCC to determine which registers to save when we
switch to/from a VCPU in the case of AMD x86_64.
* Original code saves following registers:
rbx, rcx, rdx, rsi, rdi, rbp,
r8, r9, r10, r11, r12, r13, r14, r15
* Patched code:
-
From: Izik Eidus [EMAIL PROTECTED]
Reserve a few memory slots for kernel internal use. This is good for case
you have to register memory region and you want to be sure it was not
registered from userspace, and for case you want to register a memory region
that won't be seen from userspace.
This will help trap accesses to guest memory in atomic context.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/kvm_main.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/drivers/kvm/kvm_main.c b/drivers/kvm/kvm_main.c
index ff77175..005f2d5 100644
---
From: Izik Eidus [EMAIL PROTECTED]
Currently kvm has a wart in that it requires three extra pages for use
as a tss when emulating real mode on Intel. This patch moves the allocation
internally, only requiring userspace to tell us where in the physical address
space we can place the tss.
From: Laurent Vivier [EMAIL PROTECTED]
This patch lets GCC to determine which registers to save when we
switch to/from a VCPU in the case of intel i386.
* Original code saves following registers:
eax, ebx, ecx, edx, edi, esi, ebp (using popa)
* Patched code:
- informs GCC that we modify
The code that dispatches the page fault and emulates if we failed to map
is duplicated across vmx and svm. Merge it to simplify further bugfixing.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/mmu.c | 36
drivers/kvm/svm.c | 33
Share the common parts of SrcReg and DstReg decoding.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/x86_emulate.c | 80 +---
1 files changed, 31 insertions(+), 49 deletions(-)
diff --git a/drivers/kvm/x86_emulate.c
From: Anthony Liguori [EMAIL PROTECTED]
KVM's nopage handler calls gfn_to_page() which acquires the mmap_sem when
calling out to get_user_pages(). nopage handlers are already invoked with the
mmap_sem held though. Introduce a __gfn_to_page() for use by the nopage
handler which requires the lock
Now that rex_prefix is part of the decode cache, there is no need to pass
it along.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/x86_emulate.c |6 +++---
1 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/drivers/kvm/x86_emulate.c b/drivers/kvm/x86_emulate.c
index
From: Carsten Otte [EMAIL PROTECTED]
This patch moves the definition of segment_descriptor_64 for AMD64 and
EM64T from kvm_main.c to segment_descriptor.h. It also adds a proper
#ifndef...#define...#endif around that header file.
The implementation of segment_base is moved from kvm_main.c to
Emulation may cause a shadow pte to be instantiated, which requires
memory resources. Make sure the caches are filled to avoid an oops.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/mmu.c |4
1 files changed, 4 insertions(+), 0 deletions(-)
diff --git a/drivers/kvm/mmu.c
From: Uri Lublin [EMAIL PROTECTED]
Recommended by Izik Eidus.
Signed-off-by: Uri Lublin [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/kvm_main.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/drivers/kvm/kvm_main.c
We'll want to write to it in order to fix real-mode irq injection problems,
but it is a read-only field. Storing it in a variable solves that issue.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/vmx.c | 17 -
1 files changed, 12 insertions(+), 5 deletions(-)
Instructions like 'inc reg' that have the register operand encoded
in the opcode are currently specially decoded. Extend
decode_register_operand() to handle that case, indicated by having
DstReg or SrcReg without ModRM.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/x86_emulate.c |
Instead of injecting real-mode interrupts by writing the interrupt frame into
guest memory, abuse vmx by injecting a software interrupt. We need to
pretend the software interrupt instruction had a length 0, so we have to
adjust rip backward.
This lets us not to mess with writing guest memory,
From: Hollis Blanchard [EMAIL PROTECTED]
Signed-off-by: Hollis Blanchard [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/kvm.h |1 +
drivers/kvm/kvm_main.c | 177 +---
drivers/kvm/x86.c | 175
From: Eddie Dong [EMAIL PROTECTED]
Add wbinvd VM Exit support to prepare for pass-through
device cache emulation and also enhance real time
responsiveness.
Signed-off-by: Yaozu (Eddie) Dong [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/vmx.c | 11 ++-
From: Izik Eidus [EMAIL PROTECTED]
Convert a guest frame number to the corresponding host virtual address.
Signed-off-by: Izik Eidus [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/kvm_main.c | 25 +
1 files changed, 17 insertions(+), 8
From: Eddie Dong [EMAIL PROTECTED]
Add comments for secondary/primary Processor-Based VM-execution controls.
Signed-off-by: Yaozu (Eddie) Dong [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/vmx.h | 10 --
1 files changed, 8 insertions(+), 2 deletions(-)
If vmx fails to inject a real-mode interrupt while fetching the interrupt
redirection table, it fails to record this in the vectoring information
field. So we detect this condition and do it ourselves.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/vmx.c | 51
From: Izik Eidus [EMAIL PROTECTED]
it is removed beacuse it isnt supported on a real host
Signed-off-by: Izik Eidus [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/x86_emulate.c |3 ---
1 files changed, 0 insertions(+), 3 deletions(-)
diff --git
From: Carsten Otte [EMAIL PROTECTED]
This patch splits kvm_vm_ioctl into archtecture independent parts, and
x86 specific parts which go to kvm_arch_vcpu_ioctl in x86.c.
The patch is unchanged since last submission.
Common ioctls for all architectures are:
KVM_CREATE_VCPU, KVM_GET_DIRTY_LOG,
The 'mov abs' instruction family (opcodes 0xa0 - 0xa3) still depends on cr2
provided by the page fault handler. This is wrong for several reasons:
- if an instruction accessed misaligned data that crosses a page boundary,
and if the fault happened on the second page, cr2 will point at the
From: Carsten Otte [EMAIL PROTECTED]
This patch moves the definitions of CR0_RESERVED_BITS,
CR4_RESERVED_BITS, and CR8_RESERVED_BITS along with the following
functions from kvm_main.c to x86.c:
set_cr0(), set_cr3(), set_cr4(), set_cr8(), get_cr8(), lmsw(),
load_pdptrs()
The static function
From: Dor Laor [EMAIL PROTECTED]
Every write access to guest pages should be tracked.
Signed-off-by: Dor Laor [EMAIL PROTECTED]
Signed-off-by: Izik Eidus [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/kvm_main.c |1 +
1 files changed, 1 insertions(+), 0
From: Carsten Otte [EMAIL PROTECTED]
This patch moves implementation of the following functions from
kvm_main.c to x86.c:
free_pio_guest_pages, vcpu_find_pio_dev, pio_copy_data, complete_pio,
kernel_pio, pio_string_write, kvm_emulate_pio, kvm_emulate_pio_string
The function inject_gp, which was
From: Izik Eidus [EMAIL PROTECTED]
Check for the error hva, an address outside the user address space that
signals a bad gfn.
Signed-off-by: Izik Eidus [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/kvm.h |1 +
drivers/kvm/kvm_main.c | 11 +++
2
From: Zhang Xiantao [EMAIL PROTECTED]
Will be called once arch module registers itself.
Signed-off-by: Zhang Xiantao [EMAIL PROTECTED]
Acked-by: Carsten Otte [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/kvm.h |4 +-
drivers/kvm/kvm_main.c | 61
From: Zhang Xiantao [EMAIL PROTECTED]
Signed-off-by: Zhang Xiantao [EMAIL PROTECTED]
Acked-by: Carsten Otte [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/kvm.h |5 +++--
drivers/kvm/kvm_main.c | 26 ++
drivers/kvm/x86.c |
From: Carsten Otte [EMAIL PROTECTED]
This patch moves the following functions to from kvm_main.c to x86.c:
emulator_read/write_std, vcpu_find_pervcpu_dev, vcpu_find_mmio_dev,
emulator_read/write_emulated, emulator_write_phys,
emulator_write_emulated_onepage, emulator_cmpxchg_emulated,
From: Zhang Xiantao [EMAIL PROTECTED]
Add the following hooks:
void decache_vcpus_on_cpu(int cpu);
int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu);
void kvm_arch_vcpu_uninit(struct kvm_vcpu *vcpu);
void kvm_arch_vcpu_free(struct kvm_vcpu *vcpu);
void kvm_arch_vcpu_load(struct kvm_vcpu
From: Eddie Dong [EMAIL PROTECTED]
Signed-off-by: Yaozu (Eddie) Dong [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/ioapic.c | 17 +
drivers/kvm/irq.h|1 +
2 files changed, 14 insertions(+), 4 deletions(-)
diff --git
Hi, Xiantao
Akio Takebe wrote:
Hi, Xiantao
Akio Takebe wrote:
Hi,
Run guests with the command :
/usr/local/bin/qemu-system-ia64 -hda your.img -m 512
If you have any question, please feel free to contact me!
Can I use the guest image of Xen?
Or do I need to clean-install Linux or
From: Hollis Blanchard [EMAIL PROTECTED]
Signed-off-by: Hollis Blanchard [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/kvm.h |3 +
drivers/kvm/kvm_main.c | 107 +---
drivers/kvm/x86.c | 103
From: Zhang Xiantao [EMAIL PROTECTED]
Move some includes to x86.c from kvm_main.c, since the related functions
have been moved to x86.c
Signed-off-by: Zhang Xiantao [EMAIL PROTECTED]
Acked-by: Carsten Otte [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/kvm_main.c
From: Zhang Xiantao [EMAIL PROTECTED]
Make KVM_CHECK_EXTENSION code into a function, all archs can define its
capability independently.
Signed-off-by: Zhang Xiantao [EMAIL PROTECTED]
Acked-by: Carsten Otte [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/kvm.h
We pass vcpu, vmx-fail, and vmx-launched to assembly code, but all three
are fields within vmx. Consolidate by only passing in vmx and offsets for
the rest.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
---
drivers/kvm/vmx.c | 146 ++--
1 files
Akio Takebe wrote:
Hi, Xiantao
Akio Takebe wrote:
Hi, Xiantao
Akio Takebe wrote:
Hi,
Run guests with the command :
/usr/local/bin/qemu-system-ia64 -hda your.img -m 512
If you have any question, please feel free to contact me!
Can I use the guest image of Xen?
Or do I need to
What is the recommended way to keep the time correct on a UNIX KVM machine ?
I am using Linux x86_64 (gentoo) both as a host and as a guest, and can't
keep the time straight on the guest. Ntpd eventually gives up because the
clock is too wanky.
I run into this problem both with versions 28
I built my virtual machines on KVM version 28 back in july. One of them
runs gentoo x86_64 (as guest) and a small web server with apache 2,
serving pages from an NFS directory. Never had a problem with it.
This week I upgraded KVM to version 57. Everything looked like it worked,
but I run
Yves Dorfsman wrote:
What is the recommended way to keep the time correct on a UNIX KVM machine ?
what happen when you try:
-no-kvm-irqchip -tdf ?
(you arent runing it with -no-kvm-irqchip right now right?, if you dont
it is probably bug)
I am using Linux x86_64 (gentoo) both as a host and
Yves Dorfsman wrote:
I built my virtual machines on KVM version 28 back in july. One of them
runs gentoo x86_64 (as guest) and a small web server with apache 2,
serving pages from an NFS directory. Never had a problem with it.
This week I upgraded KVM to version 57. Everything looked like
Yves Dorfsman wrote:
What is the recommended way to keep the time correct on a UNIX KVM machine ?
I am using Linux x86_64 (gentoo) both as a host and as a guest, and can't
keep the time straight on the guest. Ntpd eventually gives up because the
clock is too wanky.
ntp is too clever
On Wednesday 19 December 2007 17:52:01 Zhang, Xiantao wrote:
KVM/IA64 HOWTO
This is the notes about how to enalbe kvm on Itanium series of
processors
suppoting VT. Since fully userspace built is not supported yet, so we
have to
build qemu, and kernel module separately.
The
On Wed, 26 Dec 2007, Avi Kivity wrote:
ntp is too clever for virtual machines. What happens if you don't enable it?
Same thing.
Please provide the guest's /proc/interrupts.
more /proc/interrupts
CPU0
0: 27066XT-PIC-XTtimer
1: 9XT-PIC-XT
Yves Dorfsman wrote:
On Wed, 26 Dec 2007, Avi Kivity wrote:
ntp is too clever for virtual machines. What happens if you don't enable it?
Same thing.
Please provide the guest's /proc/interrupts.
more /proc/interrupts
CPU0
0: 27066XT-PIC-XT
On Wed, 26 Dec 2007, Avi Kivity wrote:
Yves Dorfsman wrote:
This week I upgraded KVM to version 57. Everything looked like it worked,
but I run into the following problem: after serving a few pages ( 20) the
machine gets into 0% user, 0% idle 100% wait and apache stop serving any
page.
On Wed, 26 Dec 2007, Izik Eidus wrote:
ohhh i forgat to mention to boot the linux without apic when you run the -tdf
(if i remember it is noapic)
Yes I verified, noapic. Now that's weird the clock is a little bit
fast (as opposed to very slow previously). It got 7 second too fast, in
Hi!
Currently kvm provides hypercalls only for x86* architectures. To
provide hypercall infrastructure for other kvm architectures I split
kvm_para.h into a generic header file and architecture specific
definitions.
Signed-off-by: Christian Borntraeger [EMAIL PROTECTED]
Signed-off-by: Avi
On Wed, Dec 26, 2007 at 01:05:05PM +0200, Avi Kivity wrote:
The second 2.6.25 kvm patch series, for your review. Three more to go.
Hi Avi.
A diffstat in your introduction mail would be nice so one does not
have to check 50+ patches to see if it touches any file I can give
feedback on.
On Wed, 26 Dec 2007, Yves Dorfsman wrote:
I was usign rtl8020 (I think), anyway, not ne2k. I am now using rtl8139 and
have the same problem. I am using the linux 8139too though, which I
understand is old, I am trying to replace it with the newer one 8139cp, but
have shoot myself in the
On Wednesday 26 December 2007 22:35:29 Yves Dorfsman wrote:
What is the recommended way to keep the time correct on a UNIX KVM machine
?
I am using Linux x86_64 (gentoo) both as a host and as a guest, and can't
keep the time straight on the guest. Ntpd eventually gives up because the
clock
4. Insert kvm.ko kvm-intel.ko to kernel.
kvm-intel is the name of the module fox x86-intel. Do we have a
collision here? Or is this supposed to load the x86 one on x86 and
ia64 one on ia64?
OK, I just saw your patches for Kconfig and Makefiles and we use
CONFIG_KVM_INTEL for ia64 as
On Thursday 27 December 2007 08:00:49 Zhang, Xiantao wrote:
4. Insert kvm.ko kvm-intel.ko to kernel.
kvm-intel is the name of the module fox x86-intel. Do we have a
collision here? Or is this supposed to load the x86 one on x86 and
ia64 one on ia64?
OK, I just saw your patches for
Sam Ravnborg wrote:
On Wed, Dec 26, 2007 at 01:05:05PM +0200, Avi Kivity wrote:
The second 2.6.25 kvm patch series, for your review. Three more to go.
Hi Avi.
A diffstat in your introduction mail would be nice so one does not
have to check 50+ patches to see if it touches any
On Thu, 27 Dec 2007, Yang, Sheng wrote:
What's your guest kernel version?
2.6.22
When I debug my in kernel PIT(not sent yet, though kept for months), I found
the kernel version have something to do with the timer accuracy. On my
limited test, the kernel 2.6.18, 2.6.20, 2.6.22 with default
On Thursday 27 December 2007 14:51:06 Yves Dorfsman wrote:
On Thu, 27 Dec 2007, Yang, Sheng wrote:
What's your guest kernel version?
2.6.22
When I debug my in kernel PIT(not sent yet, though kept for months), I
found the kernel version have something to do with the timer accuracy. On
[copying Anthony, the original author]
Pavel Machek wrote:
Hi!
Currently kvm provides hypercalls only for x86* architectures. To
provide hypercall infrastructure for other kvm architectures I split
kvm_para.h into a generic header file and architecture specific
definitions.
diff
Using PIT to get guest timer faster is a known issue for unmodified Linux of
early version such as 2.6.9.
that is why we introduced some extra complicated logic in Xen to try to fix it
but not perfect.
pv timer should fix this in future, and ntpd is also a good way.
BTW, Yves's case, can u
It shouldn't have any confilicts, since they belong to different
archs. Currently, you know source code is placed at
arch/{$arch}/kvm, and Makefile and Kconfig aslo there.
So, it doesn't impact any issues, since ia64 and x86_64 are totally
different archs. For example, you can define
77 matches
Mail list logo