When building as a module on Ubuntu Edgy, I get a compile error due to
load_TR_desc being undefined in vmx.o. This patch adds the appropriate
include.
Regards,
Anthony Liguori
# HG changeset patch
# User [EMAIL PROTECTED]
# Date 1165600531 21600
# Node ID
. It boots quite happily though.
Regards,
Anthony Liguori
Signed-off-by: Anthony Liguori [EMAIL PROTECTED]
diff -r c70bb2219917 kernel/Kbuild
--- a/kernel/Kbuild Fri Dec 08 11:55:31 2006 -0600
+++ b/kernel/Kbuild Fri Dec 08 14:02:33 2006 -0600
@@ -1,6 +1,5 @@ EXTRA_CFLAGS := -I$(src)/include
Howdy,
Macros are pretty gnarly especially when they aren't needed. This patch
replaces a few macros with static functions for synchronizing segment
register state in qemu-kvm.c within QEMU.
I tested save/restore with a Win2k guest and all seems well.
Regards,
Anthony Liguori
diff -r
Avi Kivity wrote:
Anthony Liguori wrote:
Any thoughts?
SMM continues the tradition of making each x86 generation hackier than
before.
What happens (probably) is that the virtual hardware unmaps the vga
memory when SMM is entered, and uses the physical memory at these
addresses (which
changes still need to be made for CVS inclusion but I
think it's at least appropriate to send to qemu-devel and begin the
review process.
Regards,
Anthony Liguori
diff -r 2eac80033ea0 Makefile.target
--- a/Makefile.target Tue Dec 19 09:31:34 2006 +
+++ b/Makefile.target Wed Dec 20 23:01:25 2006
with SMM. It merely
enables or disables ACPI.
Regards,
Anthony Liguori
Is anyone else working on this?
I intended to merge qemu once a release is made. However, if you
get this working and it is stable, it may make sense to merge sooner
as I very much like qemu cvs.
I would rather
a
problem with it.
kqemu is bound to have the same issue FWIW.
Regards,
Anthony Liguori
-
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get the chance to share your
opinions
vmxassist, KVM just sets up the VMCS so that the guest runs in vm86 mode.
We're looking at extending x86_emulate.c to handle 16 bit code to
address this problem (for both Xen and KVM).
Regards,
Anthony Liguori
Thanks Regards,
Nitin
Open Source Technology Center, Intel Corporation
Avi Kivity wrote:
The long promised kvm wiki has arrived: please stroll to
http://kvm.qumranet.com to see it.
I appear to be getting a redirect page to www.qumranet.com
Regards,
Anthony Liguori
I will update the sourceforge site to redirect to the wiki later.
Thanks to Yaniv Ferszt
/resume triggers something
equivalent to a reboot which resets VT?
Regards,
Anthony Liguori
SMP
last sysfs file: /class/net/lo/ifindex
Modules linked in: ipw3945 ieee80211 ieee80211_crypt rfcomm hidp l2cap
ohci1394 ieee1394 button kvm_intel tun kvm i915 drm autofs4 sunrpc
bridge dummy
it directly in the host,
it's possible this problem may go away.
This is all just speculation though.
regards,
Anthony Liguori
It seems disabling the local apic was the fundamental part (iirc), as
without host support the guest would always start the dummy apic; so
running the guest with any
FYI, the follow patch is a work-around for this particular problem.
It'll only work for this particular changeset but just in case anyone
else is interested in using tailor with KVM I thought I'd post it.
Regards,
Anthony Liguori
Anthony Liguori wrote:
Howdy,
I have a bit of an odd request
(sol-10-u3-ga-x86-v1.iso). This happens with and without kvm. Do I
need some other image?
It boots fine with QEMU CVS.
Regards,
Anthony Liguori
'file' says:
/data/images/solaris/sol-10-u3-ga-x86-v1.iso: ISO 9660 CD-ROM filesystem
data 'SOL_10_1106_X86' (bootable
though once I started launching multiple guests and haven't gotten
around to debugging those yet.
Regards,
Anthony Liguori
- after modifying a pte, kvm doesn't preload the modified pte into
shadow, but instead lets the guest fault it in
lguest doesn't either, but don't you still
,
Anthony Liguori
Rami
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Anthony
Liguori
Sent: Thursday, February 01, 2007 10:32 PM
To: kvm-devel
Subject: [kvm-devel] Subversion issues?
Hi,
Did something change recently with the SVN server? I
Regards,
Anthony Liguori
Fix 32bit build for SVM.
Signed-off-by: Anthony Liguori [EMAIL PROTECTED]
diff -r a14fbb59de99 kernel/kvm_main.c
--- a/kernel/kvm_main.c Thu Feb 01 15:44:11 2007 +
+++ b/kernel/kvm_main.c Fri Feb 02 16:52:23 2007 -0600
@@ -1148,6 +1148,7 @@ int kvm_hypercall(struct
support (the hardware is
not widely available at the moment).
Xen supports passing PCI devices to *paravirtual* domains. Windows
won't run paravirtualized.
Regards,
Anthony Liguori
Is there any chance KVM will do this too?
Greetings
.
In the very least, you should probably expect to see EINTRs.
Regards,
Anthony Liguori
+ }
}
delta = run-io.string_down ? -run-io.size : run-io.size;
while (more_io(run, first_time)) {
void *value_addr;
- int r
Muli Ben-Yehuda wrote:
On Tue, Feb 06, 2007 at 01:26:56PM -0600, Anthony Liguori wrote:
Please don't add exit()'s to a library, these are the sort of things
we should be trying to remove.
I agree on general principles, but do we envision libkvm.a being used
in anything outside
Muli Ben-Yehuda wrote:
On Tue, Feb 06, 2007 at 02:59:48PM -0600, Anthony Liguori wrote:
Propagate it up and let QEMU decide what to do.
There is at least one other user of libkvmctl that I know of.
Ok, I'll rework it this way (and fix the rest of exit()'s in libkvm
while I'm
activity will generate
traps, we don't have to worry about the guest modifying the host FPU state.
My microbenchmark of choice uses FPU operations so I think the results
are currently tainted. I've only tested on a 32bit SVM system.
Signed-off-by: Anthony Liguori [EMAIL PROTECTED]
Regards,
Anthony
a bit
confused though, I thought CR0.TS even covers SIMD instructions?
I'll take a look at Xen and see if it's doing something else.
Regards,
Anthony Liguori
I'm attaching an updated test program which makes it easier to spot
the failures. You only need to run it on the guest, although
a
few versions of gcc-4 have trouble with compiling dyngen.
I also suspect this may prove useful down the road. What do other
people think? I'm not terribly tied to the i386-kvm name for what it's
worth.
Regards,
Anthony Liguori
diff -r 64fb395dc8f1 configure
--- a/configure Thu Feb 15 14:36:40
,
Anthony Liguori
If so, we do not need to depend on gcc3 tricks anymore. Removing the
dependent on gcc3 is really an important achievement.
Thanks,
Jun
-
Take Surveys. Earn Cash. Influence the Future of IT
Join
Avi Kivity wrote:
Anthony Liguori wrote:
Howdy,
Here's a tiny patch that adds a i386-kvm target. The main difference
between the i386-kvm and i386-softmmu target is that the -kvm target
does not have any of the dyngen infrastructure. This means that it
will build with gcc-4. I know
Avi Kivity wrote:
Avi Kivity wrote:
Anthony Liguori wrote:
Howdy,
Here's a tiny patch that adds a i386-kvm target. The main
difference between the i386-kvm and i386-softmmu target is that the
-kvm target does not have any of the dyngen infrastructure. This
means that it will build
Avi Kivity wrote:
Anthony Liguori wrote:
That kills the -no-kvm switch, which allows a single binary to be
used both with and without kvm. Or do you think both
target-i386+kvm and target-kvm ought to be kept?
I meant here: target-i386 (with kvm support) and target-i386-kvm.
target
patch this code though to use the DMA address
directly instead of the temporary buffer in the non PIO case. We still
have to define a raw_pread() that is capable of emulating sector
alignment though since Linux will use PIO at first.
Regards,
Anthony Liguori
Avi Kivity wrote:
Anthony Liguori wrote:
Avi Kivity wrote:
Laurent Vivier wrote:
There are remaining issues : libposix-aio uses kernel AIO, so files
must be
opened using O_DIRECT and buffers must be aligned. libposix-aio is
able to
manage other cases but this has a performance cost
to the kvm ops function table?
Regards,
Anthony Liguori
Index: linux-2.6/drivers/kvm/svm.c
===
--- linux-2.6.orig/drivers/kvm/svm.c 2007-03-02 17:29
that will measure PIO time. That
is going to be a fair bit higher than vmcall but definitely within the
right ballpark.
I've got a patch that should appear in virtbench soon that actually
measures vmcall latency.
http://ozlabs.org/~rusty/virtbench
Regards,
Anthony Liguori
Thanks
Omar
Omar Khan wrote:
Anthony Liguori [EMAIL PROTECTED] writes:
I've got a patch that should appear in virtbench soon that actually
measures vmcall latency.
http://ozlabs.org/~rusty/virtbench
Thanks Anthony. I have a newbie question though. In the vmcall function in the
patch
question is: do you still plan to switch to a syscall
interface?
What benefit would a syscall interface have?
Regards,
Anthony Liguori
-
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's
sure it's the right thing to do. The proper solution
is qops.
I also don't think it's a good idea to merge things into KVM that
wouldn't be reasonable to integrate into upstream QEMU. I think this is
probably the case with this one.
Regards,
Anthony Liguori
I'm just a user but I can't
Dâniel Fraga wrote:
On Sun, 18 Mar 2007 11:44:36 -0500
Anthony Liguori [EMAIL PROTECTED] wrote:
I'm not entirely sure it's the right thing to do. The proper
solution is qops.
I also don't think it's a good idea to merge things into KVM that
wouldn't be reasonable to integrate
the correct solution to this?
Regards,
Anthony Liguori
-
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get the chance to share your
opinions on IT business topics through
developed outside of the main tree.
I understand that it's frustrating to depend on gcc3. Please realize
though that if it was simple to fix than it would be fixed and more
importantly, that the work is being done to fix the situation.
Regards,
Anthony Liguori
Basically, gcc changed in a way
with a patch queue than
by directly committing.
Regards,
Anthony Liguori
-
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get the chance to share your
opinions on IT business
such that they can be treated more or less as
two separate projects.
If KVM ever does something like a sparse tree, I think I'm going to go
live in a cave somewhere.
Regards,
Anthony Liguori
-- Randy
-
Take Surveys. Earn Cash
Avi Kivity wrote:
Anthony Liguori wrote:
Then again, are we really positive that we have to move the APIC into
the kernel? A lot of things will get much more complicated.
The following arguments are in favor:
- allow in-kernel paravirt drivers to interrupt the guest without
going
version on chip is this feature supported?
This pushes towards in kernel apic too. Can't see how we avoid it.
Does it really? IIUC, we would avoid TPR traps entirely and would just
need to synchronize the TPR whenever we go down to userspace.
Regards,
Anthony Liguori
Avi Kivity wrote:
Anthony Liguori wrote:
Maybe some brave soul can hack kvm to patch the new instruction in
place of the mmio instruction Windows uses to bang on the tpr.
It seems like that shouldn't be too hard assuming that the MMIO
instructions are = the new CR8 instruction. It would
, an oprofile run would be pretty useful. I've
found that the VGA drawing routines can be pretty expensive.
Regards,
Anthony Liguori
Jun
---
Intel Open Source Technology Center
-
Take Surveys. Earn Cash
can probably provide a better answer.
Regards,
Anthony Liguori
Regards,
Anthony Liguori
-
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get
framework.
It may be worth modifying the qemu_aio_init() function in block-raw.c to
increase the AIO thread count, and trying with a SCSI disk. The SCSI
disk with 1 AIO thread is pretty good.
Regards,
Anthony Liguori
I
remember we had similar problems in Xen before, but those were fixed
Gregory Haskins wrote:
On Wed, Apr 4, 2007 at 10:20 AM, in message [EMAIL PROTECTED],
Anthony Liguori [EMAIL PROTECTED] wrote:
The devices are already written to take a set_irq function. Instead of
hijacking the emulated PIC device, I think it would be better if in
pc.c, we
since it relies on the rdtsc.
Regards,
Anthony Liguori
Ingo
-
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get the chance to share your
opinions
think you should post the patch on qemu-devel if for nothing else to
begin the discussion.
Regards,
Anthony Liguori
for PV/accel drivers we dont need any extra ACPI enumeration - the
hypercall API is good enough to connect to the hypervisor, and i suspect
all guest OSs we care about
but to move
the APIC into the kernel (not for PV drivers, but for TPR performance
and SMP support).
Regards,
Anthony Liguori
this question is still mainly
dominated by the basic question of code quality. I'd rather move
something into the Linux kernel, enforce its code quality that way
a factor of 3).
However, what really kills Xen is that occasionally an undesirable
scheduling decision is made and the PIO latency jumps to an enormous
value. This ends making the mean PIO latency considerably worse than
the median latency.
Regards,
Anthony Liguori
for virtualized environments.
http://ozlabs.org/~rusty/virtbench
I use local for measuring KVM/Xen.
Regards,
Anthony Liguori
Thanks, eddie
-
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's
installed now; is that something I ought to
do every time anyway?
Nope, you're fine.
Regards,
Anthony Liguori
-
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get
been able to reproduce myself.
An strace or core dump (via kill -SEGV) would be terribly useful in
seeing what's going on.
Regards,
Anthony Liguori
-
Take Surveys. Earn Cash. Influence the Future of IT
Join
.
The SCSI emulation is a lot like what one would design in a PV driver.
It supports multiple outstanding requests and doesn't require a whole
lot of exits to submit a request (it uses scripts).
Regards,
Anthony Liguori
What is the state of these PV drivers now? Is it usable on Linux now
request: 0x363
Serial number of failed request: 29599
Current serial number in output stream: 29601
This is an SDL bug.
Regards,
Anthony Liguori
This is when running fglrx in big destop mode with two side-by-side
monitors. When I go into fullscreen, one monitor mirrors
not drive the backend from userspace? Are you using a ring queue to
transmit bio's from the guest to the host? What are you using for
discovery (I assume PCI)?
Could you post a copy of your driver on the list? I think it would be
good to discuss.
Regards,
Anthony Liguori
Once I've figured
David Abrahams wrote:
on Thu Apr 12 2007, Anthony Liguori
anthony-rdkfGonbjUSkNkDKm+mE6A-AT-public.gmane.org wrote:
David Abrahams wrote:
No, this doesn't happen with -no-kvm
X Error of failed request: BadValue (integer parameter out of range for
operation)
Major opcode
Arjan van de Ven wrote:
On Thu, 2007-04-12 at 10:05 -0500, Anthony Liguori wrote:
Why not drive the backend from userspace?
(nothing in the concept requires it to be in the kernel, it just makes
things a lot easier)
Because I think the trend forward is to reduce the userspace
Tomasz Chmielewski wrote:
Whenever I start a guest, I get kernel log filled with rtc: lost some
interrupts at 1024Hz.
Does rebooting the host machine with nolapic on the kernel command line
help?
What sort of system are you using?
Regards,
Anthony Liguori
What's the reason
Using #if results in a GCC warning when CONFIG_X86_64 is not defined.
Attached patch switches to #ifdef which behaves appropriately.
This is against the master branch of Avi's kernel tree.
Regards,
Anthony Liguori
Signed-off-by: Anthony Liguori [EMAIL PROTECTED]
diff --git a/drivers/kvm
Chris Stromblad wrote:
Hi there,
When attempting to compile KVM-19 I get the following error, anyone feel
like shedding some light on this? :)
apt-get install gcc-3.4
Regards,
Anthony Liguori
/ Chris
[EMAIL PROTECTED]:~/download/kvm-19$ ./configure
Install prefix/usr/local
anyone is sufficiently compelled to do such a thing when any machine
that you buy today is VT/SVM capable (and kqemu-user is never going to
be even remotely as fast at VT/SVM).
Regards,
Anthony Liguori
-
This SF.net email
get moved to kvm_resched() since both VT/SVM would benefit
from this.
Regards,
Anthony Liguori
-
This SF.net email is sponsored by DB2 Express
Dong, Eddie wrote:
Anthony Liguori wrote:
This should get moved to kvm_resched() since both VT/SVM would benefit
from this.
I would suggest we just add similar code in SVM side. After we
optimize the MSR/VMCS register save/restore to skip for
those lightweight VM EXIT (handled
will get
checked is the next timer interrupt but I may be wrong.
Regards,
Anthony Liguori
Maybe I miss something.
thx,eddie
-
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version
Dong, Eddie wrote:
Anthony Liguori wrote:
Dong, Eddie wrote:
In this case, IOCTL return to Qemu will trigger scheduling at least.
I think a scheduling change won't happen until the next timer tick.
AFAICT, there's nothing explicit in the ioctl return path that will
result
Avi Kivity wrote:
Anthony Liguori wrote:
Dong, Eddie wrote:
In this case, IOCTL return to Qemu will trigger scheduling at least.
I think a scheduling change won't happen until the next timer tick.
AFAICT, there's nothing explicit in the ioctl return path
Avi Kivity wrote:
Anthony Liguori wrote:
Howdy,
Attached patch implements lazy-fpu save/restore for VT. VMEXIT time
improves by about 10% (~550 cycles). I had to do a couple more things
to get it working than I had to do with SVM. I changed the CR0 host
mask to be all 1's so
improperly blocking :-)
Regards,
Anthony Liguori
From: Anthony Liguori [EMAIL PROTECTED]
Subject: [PATCH][SVM] Only save fast syscall MSRS when leaving VCPU
We only need to restore the host fast syscall related MSRS when leaving the
VCPU. This should only occur when we {get,put}_cpu().
Signed-off
Avi Kivity wrote:
Anthony Liguori wrote:
Howdy,
The attached patch only reloads the host fast syscall MSRs when we
leave KVM (when we put_cpu()). Since we'll never execute a
sys{enter,call,ret,exit} until we put_cpu() in the host, this should
be safe.
This has a huge impact
;/* 0x0030 */
+ __u64 epoch; /* 0x0038 */
+ __u8svcnn :1, /* 0x0040 */
+ svc1c :1,
+ svc2c :1,
+ svc3c :1,
+ :4;
I think bitfields can have weird padding issues.
Regards,
Anthony Liguori
to be possible to use a snapshot multiple times over.
With QEMU 0.9.0 (and by extension, KVM), snapshots are actually stored
as part of the disk image with qcow2. This allows you to have a
consistent snapshot that includes CPU state and disk state.
Regards,
Anthony Liguori
Dan
Anthony Liguori wrote:
I've tested this with 32-bit and 64-bit guests on a 64-bit host and
with 32-bit guests on a 32-bit host.
I *think* it's doing the right thing wrt to DEBUGCTL but an extra set
of eyes would be helpful.
I think the follow patch preserves the current behavior but I'm
Avi Kivity wrote:
Anthony Liguori wrote:
Anthony Liguori wrote:
I've tested this with 32-bit and 64-bit guests on a 64-bit host and
with 32-bit guests on a 32-bit host.
I *think* it's doing the right thing wrt to DEBUGCTL but an extra set
of eyes would be helpful.
I think
My 32bit FC-6 guest stopped booting on a 64-bit SVM host after this
commit (9bf671a47ed6af3164524a31dbef9360f1b66fb5)
Regards,
Anthony Liguori
-
This SF.net email is sponsored by DB2 Express
Download DB2 Express C
This was inspired by Qing He's similar patch for VT.
Regards,
Anthony Liguori
Subject: [PATCH][SVM] Allow direct guest access to PC debug port
From: Anthony Liguori [EMAIL PROTECTED]
The PC debug port is used for IO delay and does not require emulation.
Signed-off-by: Anthony Liguori [EMAIL
tree (actually I doubt it).
What makes you think this won't work? Have you tried it?
This has worked for me in the past.
Regards,
Anthony Liguori
Paul
-
This SF.net email is sponsored by DB2 Express
and user repo and didn't have a problem.
The ABI changed twice in the last couple of days so make sure you've got
an up-to-date userspace and kernel tree.
Regards,
Anthony Liguori
Thomas
-
This SF.net email
: Avi Kivity [EMAIL PROTECTED]
Date: Mon Apr 30 17:05:38 2007 +0300
Regards,
Anthony Liguori
(thinkpad) [/scratch/tg/linux-2.6] git pull kvm master
Already up-to-date.
(thinkpad) [/scratch/tg/linux-2.6] cd ../kvm-userspace
(thinkpad) [/scratch/tg/kvm-userspace] git pull
Already up-to-date
Thomas Glanzmann wrote:
Hello,
when I try to start a SLES 10 Guest, I get a OPPS:
This is probably the infamous big real mode VT issue. You should be
able to find instructions for starting SLES without the graphical splash
screen either on the KVM wiki or the Xen wiki.
Regards,
Anthony
21 and core2duo E6600
processor. Just no video corruption (or it was so small that I didn't
notice). But the mouse issue is identical.
I've seen this behavior without KVM. I believe it's an issue with the
USB subsystem.
Regards,
Anthony Liguori
of what checkin was the cause? At least, which release was the
last to work?
Regards,
Anthony Liguori
time ~/sandbox/git/kvm-userspace/qemu/x86_64-softmmu/qemu-system-x86_64 .
-hda /home/ghaskins/kvm/sled.img -cdrom
/home/ghaskins/Desktop/SLED-10-DVD-x86_64-GMC-DVD1.iso -boot d -m 512 -L
@@ static void save_regs(CPUState *env)
env-cr[3] = sregs.cr3;
env-cr[4] = sregs.cr4;
-cpu_set_apic_base(env, sregs.apic_base);
+//cpu_set_apic_base(env, sregs.apic_base);
I take it this code cannot support an in-QEMU APIC? So it breaks -no-kvm?
Regards,
Anthony Liguori
interrupts does s390 support (the x86 only supports 256)? Can you
afford to burn interrupts like this? Is there not a better way to
assign interrupts such that conflict isn't an issue?
Regards,
Anthony Liguori
-
This SF.net
be unfortunate.
At least the posted s390 console driver behaves roughly like a uart so
it's pretty obvious that it will be easy to implement in any OS that
supports uarts already.
Regards,
Anthony Liguori
To get network stats, or do I/O, one simply gains access to the
appropriate ring buffer
addressed...
Regards,
Anthony Liguori
Signed-off-by: Christian Borntraeger [EMAIL PROTECTED]
Signed-off-by: Carsten Otte [EMAIL PROTECTED]
---
drivers/s390/guest/Makefile |3
drivers/s390/guest/vnet_port_guest.c | 302
drivers/s390/guest/vnet_port_guest.h
Eric Van Hensbergen wrote:
On 5/11/07, Anthony Liguori [EMAIL PROTECTED] wrote:
cpu% ls /net/ether0
/net/ether0/0
/net/ether0/1
/net/ether0/2
/net/ether0/addr
/net/ether0/clone
/net/ether0/ifstats
/net/ether0/stats
This smells a bit like XenStore which I think most
this is necessary.
Regards,
Anthony Liguori
It is optimized, and support tso.
By adding a generic ops calls we can make enjoy all the above.
Using Xen's core PV code doesn't imply that we will have their interface
{xenstore} the interface creation and tear-down would be kvm specific.
They could even
happens to be human readable.
It would be real nice to have a client library for that protocol for
many different languages but, of course, that's what libvirt is :-)
Regards,
Anthony Liguori
/Jd
Thanks
/Jd
it be
better to just try and generalize netback/netfront or build something
from scratch? Could the lguest driver be generalized more easily?
Regards,
Anthony LIguori
Regards,
Anthony Liguori
It is optimized, and support tso.
By adding a generic ops calls we can make enjoy all the above
Christian Borntraeger wrote:
On Monday 14 May 2007 18:23, Christian Bornträger wrote:
On Friday 11 May 2007 21:00, Anthony Liguori wrote:
I think it would be better to use hvc_console as Xen now uses it too.
I just had a look at hvc_console, and indeed this driver looks
will
continue to work with in-kernel APIC disabled.
Regards,
Anthony Liguori
Gregory Haskins wrote:
Signed-off-by: Gregory Haskins [EMAIL PROTECTED]
---
drivers/kvm/kvm.h |1 +
drivers/kvm/kvm_main.c | 55
+++-
include/linux/kvm.h
requires in-kernel APIC, then
provided that UP kernels still work, if someone is sufficiently
motivated to get SMP working on older kernels, they can implement the
eventfd emulation.
Regards,
Anthony Liguori
Regards,
-Greg
Gregory Haskins wrote:
On Wed, May 16, 2007 at 1:28 PM, in message [EMAIL PROTECTED],
Anthony Liguori [EMAIL PROTECTED] wrote:
What do you think about a socket interface? I'm not sure how discovery
would work yet, but there are a few PV socket implementations for Xen
Eric Van Hensbergen wrote:
On 5/16/07, Anthony Liguori [EMAIL PROTECTED] wrote:
What do you think about a socket interface? I'm not sure how discovery
would work yet, but there are a few PV socket implementations for Xen at
the moment.
From a functional standpoint I don't have a huge
Gregory Haskins wrote:
On Wed, May 16, 2007 at 2:39 PM, in message [EMAIL PROTECTED],
Anthony Liguori [EMAIL PROTECTED] wrote:
Gregory Haskins wrote:
On Wed, May 16, 2007 at 1:28 PM, in message [EMAIL PROTECTED],
Anthony Liguori [EMAIL PROTECTED
Carsten Otte wrote:
Daniel P. Berrange wrote:
As a userspace apps service, I'd very much like to see a common sockets
interface for inter-VM communication that is portable across virt systems
like Xen KVM. I'd see it as similar to UNIX domain sockets in style. So
basically any app
Rusty Russell wrote:
On Wed, 2007-05-16 at 14:10 -0500, Anthony Liguori wrote:
For the host, you can probably stay entirely within QEMU. Interguest
communication would be a bit tricky but guest-host communication is
real simple.
guest-host is always simple. But it'd be great
The cc-option is originally from Linux.
Regards,
Anthony Liguori
Subject: [PATCH] Disable stack protector in test suite
Some distros (like Ubuntu) enable GCC's stack protector by default. The
stack protector requires symbols in libgcc so since we're not linking against
libgcc, we need
attempts to expose the world as a virtual filesystem :-)
Regards,
Anthony Liguori
This is, I think, the kind of thing Eric would also like to see, but
he can correct me.
Thanks
ron
-
This SF.net email is sponsored by DB2
1 - 100 of 847 matches
Mail list logo