If we stgi() too soon, nmis can reach the processor even though interrupts
are disabled, catching it in a half-switched state. Delay the stgi() until
we're done switching.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/svm.c |8
1 files changed, 4 insertions(+), 4 del
Caleb Moore wrote:
> Is such a merge likely in the near future or should we proceed in
> creating our own port?
Hi, Caleb
We have completed kvm IA64 port until the end of Aug, and showed a
demo in kvm forum of Aug. Then, we could successfully boot windows, and
Linux guest on open guest fir
Hi,
We are interested in an IA64 port of KVM, either experimenting with
someone else's or writing our own. I've tried getting in contact with Yu
Fenghua of Intel but it seems that we will be unable to get hold of
their source code until it is in the main tree.
Is such a merge likely in the near f
Acked-by: Carsten Otte <[EMAIL PROTECTED]>
Zhang, Xiantao wrote:
> From fc56bda0f599ccd00d992bf196654101e82d1413 Mon Sep 17 00:00:00 2001
> From: Zhang Xiantao <[EMAIL PROTECTED]>
> Date: Wed, 7 Nov 2007 11:39:23 +0800
> Subject: [PATCH] move some header files form kvm_main.c to x86.c, since
> the
Hi Avi
Seems my mailer has something wrong, and it always reference an
old version. This should be a correct one. Sorry for inconvenience!
Xiantao
>From 959bc19b0e2ca7edcb3389aabdecf99ba9f1794e Mon Sep 17 00:00:00 2001
From: Zhang Xiantao <[EMAIL PROTECTED]>
Date: Thu, 8 Nov 2007 13:19:0
AP processor needs to reset to the SIPI vector, not normal INIT.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/svm.c |6 ++
1 files changed, 6 insertions(+), 0 deletions(-)
diff --git a/drivers/kvm/svm.c b/drivers/kvm/svm.c
index 729f1cd..3910358 100644
--- a/drivers/kvm/
Zhang, Xiantao wrote:
> This series of patches are intended to further split x86 specific code
> from kvm_main.c, and make kvm_main.c arch-independent.
> For easy review, I splitted them into small patches. With these patches,
> we almost finish the first stage work for code split.
These patche
'push imm8' found itself in the wrong switch somehow, so it is never executed.
This fixes Windows 2003 installation.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/x86_emulate.c | 22 +++---
1 files changed, 11 insertions(+), 11 deletions(-)
diff --git a/drivers
Hi,
Some remarks:
- rename the option to -pcidevice.
- Remove the directory passthrough and put the file directly in hw/.
Rename the file to something more explicit such as pci_passthrough*
- Suppress the files passthrough.h and neo_pci_tree.h
- pt_init should be called only if there are real
Acked-by: Carsten Otte <[EMAIL PROTECTED]>
Zhang, Xiantao wrote:
> From 7473192cc0c529b8ce35c13d0e83a9b663072831 Mon Sep 17 00:00:00 2001
> From: Zhang Xiantao <[EMAIL PROTECTED]>
> Date: Wed, 7 Nov 2007 11:41:50 +0800
> Subject: [PATCH] mov kvm_x86_ops to x86.c for next step's work
> Signed-off-by
> 2007/11/8, Avi Kivity <[EMAIL PROTECTED]>:
> > Lynn Kerby wrote:
[snip]
> > I'd assumed (there's *that* word) that core developer types were
> > using KVM on all kinds of hardware and that basics like this would
> > have been shaken out.
>
> Well, it is a reasonable assumption, but the sad fact i
Carlo Marcelo Arenas Belon wrote:
> This patch partially reverts 9105435f46ca4e110237eae57272e4f5deaf8dd6 so that
> kvm_msr_list, kvm_get_msrs and kvm_set_msrs are again public and visible in
> userspace for x86 as they are used by qemu-kvm
>
Applied, thanks.
--
error compiling committee.c: t
Hi Avi
Please drop it, and use this one, due to version issue.
thanks
Xiantao
>From 959bc19b0e2ca7edcb3389aabdecf99ba9f1794e Mon Sep 17 00:00:00 2001
From: Zhang Xiantao <[EMAIL PROTECTED]>
Date: Thu, 8 Nov 2007 13:19:06 +0800
Subject: [PATCH] Combine kvm_init and kvm_init_x86 into one function,
Avi Kivity a écrit :
> Aurelien Jarno wrote:
>> Well the IDE code hasn't changed a lot recently, so I checked the CVS
>> history and easily (first test) found the commit that causes the problem:
>>
>> Last AIO patch, by Vladimir N. Oleynik.
>>
>> http://cvs.savannah.nongnu.org/viewvc/qemu/hw/ide.c?
Fabrice Bellard wrote:
Hi,
Some remarks:
- rename the option to -pcidevice.
- Remove the directory passthrough and put the file directly in hw/.
Rename the file to something more explicit such as pci_passthrough*
- Suppress the files passthrough.h and neo_pci_tree.h
- pt_init should be call
Emulate the 'invd' instruction (opcode 0f 08).
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/x86_emulate.c |4 +++-
1 files changed, 3 insertions(+), 1 deletions(-)
diff --git a/drivers/kvm/x86_emulate.c b/drivers/kvm/x86_emulate.c
index da0cdd5..33b1814 100644
--- a/drivers/
I intend to submit the following patchset shortly for mainline. All fixes are
for fairly serious issues, including host crashes. Several will go into
-stable as well.
Please review.
drivers/kvm/svm.c | 18 ++
drivers/kvm/x86_emulate.c | 26 ++
'invd' can destroy host data, and 'wbinvd' allows the guest to induce
long (milliseconds) latencies.
Noted by Ben Serebrin.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/svm.c |4
1 files changed, 4 insertions(+), 0 deletions(-)
diff --git a/drivers/kvm/svm.c b/drivers/
Trying to run the latest OLPC XO guest image with kvm-intel on 2.6.22
x86_64 (Ubuntu Gutsy) on a T7200 there are critical problems which don't
occur if kvm-intel is not loaded/used.
The same issue affects kvm-48, kvm-50 and kvm-51.
I don't see these problems with Gutsy or Windows guests. The issu
Hi,Carste
Maybe some new commits block it. I will rebase them to latest commit,
and resend :)
Thanks for you try.
Xiantao
-Original Message-
From: Carsten Otte [mailto:[EMAIL PROTECTED]
Sent: 2007年11月8日 20:06
To: Zhang, Xiantao
Cc: Avi Kivity; kvm-devel@lists.sourceforge.net;
TJ wrote:
Trying to run the latest OLPC XO guest image with kvm-intel on 2.6.22
x86_64 (Ubuntu Gutsy) on a T7200 there are critical problems which don't
occur if kvm-intel is not loaded/used.
The same issue affects kvm-48, kvm-50 and kvm-51.
I don't see these problems with Gutsy or Windows gues
On Nov 8, 2007 12:51 AM, Avi Kivity <[EMAIL PROTECTED]> wrote:
> Haydn Solomon wrote:
> > First , thank you for new release of kvm. I have a few problems to
> > report with kvm-51.
> >
> > 1. When running an exisiting winxp ACPI multiprocessor HAL with -smp
> > 2, sometimes it will hang on boot.
>
Gildas wrote:
> 2007/11/8, Avi Kivity <[EMAIL PROTECTED]>:
> > Lynn Kerby wrote:
[snip]
> > I'd assumed (there's *that* word) that core developer types were
> > using KVM on all kinds of hardware and that basics like this would
> > have been shaken out.
>
> Well, it is a reasonable assumption, b
Rebased to latest commits.
Thanks
Xiantao
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Zhang, Xiantao
Sent: 2007年11月8日 21:00
To: [EMAIL PROTECTED]
Cc: kvm-devel@lists.sourceforge.net; Hollis Blanchard; Avi Kivity
Subject: Re: [kvm-devel] [PATCH]0/5 Pa
Anthony Liguori wrote:
> Avi Kivity wrote:
>> Anthony Liguori wrote:
>>
>>> This is a PCI device that implements a transport for virtio. It
>>> allows virtio
>>> devices to be used by QEMU based VMMs like KVM or Xen.
>>>
>>>
>>
>> Didn't see support for dma.
>
> Not sure what you're expe
Anthony Liguori wrote:
> Avi Kivity wrote:
>> Anthony Liguori wrote:
>>
>>> +case VIRTIO_PCI_QUEUE_NOTIFY:
>>> +if (val < VIRTIO_PCI_QUEUE_MAX)
>>> +virtio_ring_kick(vdev, &vdev->vq[val]);
>>> +break;
>>>
>>
>> I see you're not using hypercalls for this, presumably for
I agree with the gernal idea of this patch. Just a few minor things to
pick on:
Zhang, Xiantao wrote:
> diff --git a/drivers/kvm/kvm.h b/drivers/kvm/kvm.h
> index 4b2421a..33b4629 100644
> --- a/drivers/kvm/kvm.h
> +++ b/drivers/kvm/kvm.h
> @@ -494,9 +494,9 @@ void vcpu_load(struct kvm_vcpu *vcpu
Zhang, Xiantao wrote:
> +void kvm_arch_vcpu_free(struct kvm_vcpu *vcpu);
> +void kvm_arch_vcpu_decache(struct kvm_vcpu *vcpu);
> +void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu);
> +void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu);
> +struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm, unsi
Avi Kivity wrote:
> Anthony Liguori wrote:
>> Avi Kivity wrote:
>>> Anthony Liguori wrote:
>>>
+case VIRTIO_PCI_QUEUE_NOTIFY:
+if (val < VIRTIO_PCI_QUEUE_MAX)
+virtio_ring_kick(vdev, &vdev->vq[val]);
+break;
>>>
>>> I see you're not using hyperc
Avi Kivity wrote:
> Anthony Liguori wrote:
>
>> This is a PCI device that implements a transport for virtio. It allows
>> virtio
>> devices to be used by QEMU based VMMs like KVM or Xen.
>>
>>
>>
>
> Didn't see support for dma.
Not sure what you're expecting there. Using dma_ops in v
Acked-by: Carsten Otte <[EMAIL PROTECTED]>
Zhang, Xiantao wrote:
>>From 2d6ee07b96f1a91cef9327f241077af3698ed4dc Mon Sep 17 00:00:00 2001
> From: Zhang Xiantao <[EMAIL PROTECTED]>
> Date: Thu, 8 Nov 2007 13:37:38 +0800
> Subject: [PATCH] Make kvm_init as arch-indepenent, through defining a
> void
>
Avi Kivity wrote:
> Anthony Liguori wrote:
>
>> +case VIRTIO_PCI_QUEUE_NOTIFY:
>> +if (val < VIRTIO_PCI_QUEUE_MAX)
>> +virtio_ring_kick(vdev, &vdev->vq[val]);
>> +break;
>>
>>
>
> I see you're not using hypercalls for this, presumably for compatibility
> with -no-kvm.
On Thursday 08 November 2007, Anthony Liguori wrote:
> +/* A PCI device has it's own struct device and so does a virtio device so
> + * we create a place for the virtio devices to show up in sysfs. I think it
> + * would make more sense for virtio to not insist on having it's own device.
> */
> +
On Thu, 2007-11-08 at 18:21 +0800, Zhang, Xiantao wrote:
> Caleb Moore wrote:
>
> > Is such a merge likely in the near future or should we proceed in
> > creating our own port?
>
> Hi, Caleb
> We have completed kvm IA64 port until the end of Aug, and showed a
> demo in kvm forum of Aug. T
Carsten Otte wrote:
> Zhang, Xiantao wrote:
>> +void kvm_arch_vcpu_free(struct kvm_vcpu *vcpu);
>> +void kvm_arch_vcpu_decache(struct kvm_vcpu *vcpu);
>> +void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu);
>> +void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu);
>> +struct kvm_vcpu *kvm_arch_vcpu_c
Anthony Liguori wrote:
> +case VIRTIO_PCI_QUEUE_NOTIFY:
> +if (val < VIRTIO_PCI_QUEUE_MAX)
> +virtio_ring_kick(vdev, &vdev->vq[val]);
> +break;
>
I see you're not using hypercalls for this, presumably for
compatibility
with
Anthony Liguori wrote:
> Avi Kivity wrote:
>> If a pci device is capable of dma (or issuing interrupts), it will be
>> useless with pv pci.
>
> Hrm, I think we may be talking about different things. Are you
> thinking that the driver I posted allows you to do PCI pass-through
> over virtio? Th
Carsten Otte wrote:
>
>> +bad_page = alloc_page(GFP_KERNEL | __GFP_ZERO);
>> +
>> +if (bad_page == NULL) {
>> +r = -ENOMEM;
>> +goto out;
>> +}
> I don't think we need bad_page on s390, maybe I missed something. It's
> only useful for mmu code as far as I can
Anthony Liguori wrote:
> Avi Kivity wrote:
>
>> Anthony Liguori wrote:
>>
>>> Avi Kivity wrote:
>>>
Anthony Liguori wrote:
> +case VIRTIO_PCI_QUEUE_NOTIFY:
> +if (val < VIRTIO_PCI_QUEUE_MAX)
> +virtio_ring_kick(vdev, &vdev->vq[val
Avi Kivity wrote:
> If a pci device is capable of dma (or issuing interrupts), it will be
> useless with pv pci.
Hrm, I think we may be talking about different things. Are you thinking
that the driver I posted allows you to do PCI pass-through over virtio?
That's not what it is.
The driver I
Avi Kivity wrote:
>> There's no reason that the PIO operations couldn't be handled in the
>> kernel. You'll already need some level of cooperation in userspace
>> unless you plan on implementing the PCI bus in kernel space too.
>> It's easy enough in the pci_map function in QEMU to just notify
This would be my bad. Things kept changing and I didn't put these back
into libkvm.h.
On Thu, 2007-11-08 at 00:34 -0600, Carlo Marcelo Arenas Belon wrote:
> This patch partially reverts 9105435f46ca4e110237eae57272e4f5deaf8dd6 so that
> kvm_msr_list, kvm_get_msrs and kvm_set_msrs are again public
Your mailer, which I'm guessing is Microsoft Outlook, is wrapping lines
and so this patch does not apply.
You might try using git-send-email or equivalent to avoid this issue.
--
Hollis Blanchard
IBM Linux Technology Center
On Thu, 2007-11-08 at 16:17 +0800, Zhang, Xiantao wrote:
> Hi Avi
>
On Thursday 08 November 2007, Anthony Liguori wrote:
> +/* A PCI device has it's own struct device and so does a virtio device so
> + * we create a place for the virtio devices to show up in sysfs. I think it
> + * would make more sense for virtio to not insist on having it's own device.
> */
> +
# HG changeset patch
# User Jerone Young <[EMAIL PROTECTED]>
# Date 1194543880 21600
# Node ID f87e6f60ddd69cb0ee4e0bbcaed657d2f12311ce
# Parent d6fa0d16fa60ee5083877fec698b69cea840d0b0
Fix declerations that should be in kvm-common.h & not in kvm-x86.h
During the first phase of the refactoring th
On Thu, 2007-11-08 at 07:54 +0200, Avi Kivity wrote:
> Carlo Marcelo Arenas Belon wrote:
> > On Tue, Nov 06, 2007 at 10:48:52AM -0600, Jerone Young wrote:
> >
> >> Move msrs functions to libkvm-x86.c
> >>
> >> This patch moves functions:
> >>kvm_msr_list
> >>move kvm_get_msrs
> >>mov
Arnd Bergmann wrote:
> On Thursday 08 November 2007, Anthony Liguori wrote:
>
>> +/* A PCI device has it's own struct device and so does a virtio device so
>> + * we create a place for the virtio devices to show up in sysfs. I think it
>> + * would make more sense for virtio to not insist on ha
I have been testing KVM for eventual use in a production server
environment and am running into some trouble when I attempt to rsync my
data from the current production system to the test system.
Specifically, whenever I hit a large file, the guest freezes and I get
the following in the host's
Anthony Liguori wrote:
> Avi Kivity wrote:
>
>> Anthony Liguori wrote:
>>
>>
>>> This is a PCI device that implements a transport for virtio. It allows
>>> virtio
>>> devices to be used by QEMU based VMMs like KVM or Xen.
>>>
>>>
>>>
>>>
>> Didn't see support for dma.
>>
Clive Stewell wrote:
> I have been testing KVM for eventual use in a production server
> environment and am running into some trouble when I attempt to rsync my
> data from the current production system to the test system.
> Specifically, whenever I hit a large file, the guest freezes and I get
Anthony Liguori wrote:
> This still needs quite a lot of work but I wanted to post it for reference.
>
> Regards,
>
> Anthony Liguori
>
> diff --git a/qemu/Makefile.target b/qemu/Makefile.target
>
...
Why change Rusty's codding standard? It will be harder to track changes.
> +typedef struct VRin
Hi folks,
Here's a new spin of the clocksource implementation.
In this new version:
* followed avi's suggestion of:
- letting the cpu itself register its memory area.
- using a gfn instead of a phys addr as a parameter, to be sure we can
cover the whole memory area
- write guest time at
drivers/kvm/kvm_main.c: In function `kvm_flush_remote_tlbs':
drivers/kvm/kvm_main.c:220: error: implicit declaration of function
`smp_call_function_mask'
make[2]: *** [drivers/kvm/kvm_main.o] Error 1
make[1]: *** [drivers/kvm] Error 2
http://sr71.net/~dave/linux/config-kvm-up
Looks like that fun
Akio Takebe wrote:
> Hi, Alex and Xiantao
>
>> Perhaps more people would be able to help restructure the tree to
>> support more architectures if a snapshot of the kvm/ia64 code was
>> made available. We might want to think about a kvm-ia64-devel
>> mailing list too (such as ppc has already).
Dor Laor wrote:
> Anthony Liguori wrote:
>> This still needs quite a lot of work but I wanted to post it for
>> reference.
>>
>> Regards,
>>
>> Anthony Liguori
>>
>> diff --git a/qemu/Makefile.target b/qemu/Makefile.target
>>
> ...
> Why change Rusty's codding standard? It will be harder to tra
# HG changeset patch
# User Jerone Young <[EMAIL PROTECTED]>
# Date 1194560092 21600
# Node ID 10991ad11487e51d327430a1a61e0d63021caf7b
# Parent 026c26ab068482aaf17deaf8cd73c1ff1db3806b
[v2] Fix declerations that should be in kvm-common.h & not in kvm-x86.h
The last version of this patch was base
This is the host part of kvm clocksource implementation. As it does
not include clockevents, it is a fairly simple implementation. We
only have to register a per-vcpu area, and start writting to it periodically.
Signed-off-by: Glauber de Oliveira Costa <[EMAIL PROTECTED]>
---
drivers/kvm/kvm_main
This patch introduces the include files for kvm clock.
They'll be needed for both guest and host part.
Signed-off-by: Glauber de Oliveira Costa <[EMAIL PROTECTED]>
---
include/asm-x86/kvm_para.h | 25 +
include/linux/kvm.h|1 +
include/linux/kvm_para.h |
On Thu, 2007-11-08 at 14:49 +0100, Carsten Otte wrote:
> Zhang, Xiantao wrote:
> > +void kvm_arch_vcpu_free(struct kvm_vcpu *vcpu);
> > +void kvm_arch_vcpu_decache(struct kvm_vcpu *vcpu);
> > +void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu);
> > +void kvm_arch_vcpu_put(struct kvm_vcpu *vcp
Le jeudi 08 novembre 2007 à 11:55 -0800, Dave Hansen a écrit :
> drivers/kvm/kvm_main.c: In function `kvm_flush_remote_tlbs':
> drivers/kvm/kvm_main.c:220: error: implicit declaration of function
> `smp_call_function_mask'
> make[2]: *** [drivers/kvm/kvm_main.o] Error 1
> make[1]: *** [drivers/kvm
# HG changeset patch
# User Jerone Young <[EMAIL PROTECTED]>
# Date 1194551969 21600
# Node ID c08b2667a95ecd85effb1d5f5d84e235f9e8d6cc
# Parent d6fa0d16fa60ee5083877fec698b69cea840d0b0
Fix building of kvmctl
This patch creates the make rule needed to for the linker
to link libkvm archive and mai
Avi Kivity wrote:
> Anthony Liguori wrote:
>
>> +case VIRTIO_PCI_QUEUE_NOTIFY:
>> +if (val < VIRTIO_PCI_QUEUE_MAX)
>> +virtio_ring_kick(vdev, &vdev->vq[val]);
>> +break;
>>
>
> I see you're not using hypercalls for this, presumably for
>
On Thu, 2007-11-08 at 15:21 +0800, Zhang, Xiantao wrote:
> @@ -890,7 +890,7 @@ static int kvm_vm_ioctl_create_vcpu(struct kvm
> *kvm,
> int n)
> if (!valid_vcpu(n))
> return -EINVAL;
>
> - vcpu = kvm_x86_ops->vcpu_create(kvm, n);
> + vcpu = kvm_arch_vcpu_create
This is the guest part of kvm clock implementation
It does not do tsc-only timing, as tsc can have deltas
between cpus, and it did not seem worthy to me to keep
adjusting them.
We do use it, however, for fine-grained adjustment.
Other than that, time comes from the host.
Signed-off-by: Glauber d
Hi everybody,
I'm trying to clone the repository:
git-clone http://www.kernel.org/pub/scm/linux/kernel/git/avi/kvm.git kvm
Fail on this:
error: Couldn't get
http://www.kernel.org/pub/scm/linux/kernel/git/avi/kvm.git/refs/heads/kvm-updates
for heads/kvm-updates
The requested URL returned error:
Anthony Liguori wrote:
> This is a PCI device that implements a transport for virtio. It allows virtio
> devices to be used by QEMU based VMMs like KVM or Xen.
>
>
>
While it's a little premature, we can start thinking of irq path
improvements.
The current patch acks a private isr and aft
Hi, Alex and Xiantao
> Perhaps more people would be able to help restructure the tree to
>support more architectures if a snapshot of the kvm/ia64 code was made
>available. We might want to think about a kvm-ia64-devel mailing list
>too (such as ppc has already). Thanks,
>
I also think so. :)
Anthony Liguori wrote:
Avi Kivity wrote:
There's no reason that the PIO operations couldn't be handled in the
kernel. You'll already need some level of cooperation in userspace
unless you plan on implementing the PCI bus in kernel space too.
It's easy enough in the pci_map function in QEM
On Thu, 2007-11-08 at 09:00 -0700, Alex Williamson wrote:
> Hi Xiantao,
>
>Perhaps more people would be able to help restructure the tree to
> support more architectures if a snapshot of the kvm/ia64 code was made
> available. We might want to think about a kvm-ia64-devel mailing list
> too (
Chen Xi wrote:
> Hi everybody,
>
> I'm trying to clone the repository:
>
> git-clone http://www.kernel.org/pub/scm/linux/kernel/git/avi/kvm.git kvm
>
You should clone with the git URL.
Regards,
Anthony Liguori
> Fail on this:
> error: Couldn't get
> http://www.kernel.org/pub/scm/linux/kerne
Dor Laor wrote:
> Anthony Liguori wrote:
>> This is a PCI device that implements a transport for virtio. It
>> allows virtio
>> devices to be used by QEMU based VMMs like KVM or Xen.
>>
>>
>>
> While it's a little premature, we can start thinking of irq path
> improvements.
> The current
I tried. It seems that git can not pass through http proxy.
Any other hints?
Thanks.
On Thu, 8 Nov 2007, Anthony Liguori wrote:
> Chen Xi wrote:
> > Hi everybody,
> >
> > I'm trying to clone the repository:
> >
> > git-clone http://www.kernel.org/pub/scm/linux/kernel/git/avi/kvm.git kvm
> >
On Fri, 2007-11-09 at 09:29 +0800, Zhang, Xiantao wrote:
> H, Alex/Akio
>Thanks for your suggestions. It is a surely good idea to create a
> IA64 mailing list to talk about the IA64-KVM. But now we have to rebase
> them to latest commits before sending out, since the kvm source layout
> chan
hi,
>I tried. It seems that git can not pass through http proxy.
>Any other hints?
>
Did you use "export http_proxy=" ?
Best Regards,
Akio Takebe
-
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log
Yes. It gives this error:
git clone git://git.kernel.org/pub/scm/linux/kernel/git/avi/kvm.git
Initialized empty Git repository in /home/xichen/ex/kvm/.git/
fatal: exec failed
fetch-pack from
'git://git.kernel.org/pub/scm/linux/kernel/git/avi/kvm.git' failed.
On Fri, 9 Nov 2007, Akio Takebe wrot
Add wbinvd VM Exit support to prepare for pass-through
device cache emulation and also enhance real time
responsibility.
Signed-off-by: Yaozu (Eddie) Dong <[EMAIL PROTECTED]>
diff --git a/drivers/kvm/vmx.c b/drivers/kvm/vmx.c
index 6fc981d..6d80a41 100644
--- a/drivers/kvm/vmx.c
>
> I agree.
>
> My branch of the Gelato Federation (http://www.gelato.unsw.edu.au/)
> wants to invest time and effort into IA64 KVM which could mean helping
> with a merge, streamlining code, benchmarking, bug hunting or
> something else along those lines. We've already got an open source
> Ita
Bugs item #1828760, was opened at 2007-11-09 12:53
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1828760&group_id=180599
Please note that this message will contain a full copy
Here is the package deal we're running for this week
Board Certified Medical Doctors in the United States
788,976 in total * 17,413 emails
Featuring coverage for more than 30 specialties like Internal Medicine, Family
Practice, Opthalmology, Anesthesiologists, Cardiologists and more
Can ea
Hollis Blanchard wrote:
>> - kvm_x86_ops->vcpu_free(vcpu);
>> + kvm_arch_vcpu_free(vcpu);
>> return r;
>> }
>
> Have a look at the patch I posted on Wednesday: "[PATCH 2 of 2] RFC:
> Create kvm_arch_vcpu_create()". kvm_arch_vcpu_create() will actually
> encompass more logic f
80 matches
Mail list logo