Signed-off-by: Wei Yongjun yj...@cn.fujitsu.com
---
arch/x86/kvm/emulate.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index 26f69c2..e5f7f5c 100644
--- a/arch/x86/kvm/emulate.c
+++ b/arch/x86/kvm/emulate.c
@@ -2487,7
Signed-off-by: Wei Yongjun yj...@cn.fujitsu.com
---
x86/realmode.c |6 ++
1 files changed, 6 insertions(+), 0 deletions(-)
diff --git a/x86/realmode.c b/x86/realmode.c
index a833829..2e12680 100644
--- a/x86/realmode.c
+++ b/x86/realmode.c
@@ -437,6 +437,9 @@ void test_call(void)
On 08/25/2010 09:16 AM, Wei Yongjun wrote:
Signed-off-by: Wei Yongjun yj...@cn.fujitsu.com
---
x86/realmode.c |6 ++
1 files changed, 6 insertions(+), 0 deletions(-)
diff --git a/x86/realmode.c b/x86/realmode.c
index a833829..2e12680 100644
--- a/x86/realmode.c
+++
On 08/25/2010 09:16 AM, Wei Yongjun wrote:
Signed-off-by: Wei Yongjun yj...@cn.fujitsu.com
---
x86/realmode.c |6 ++
1 files changed, 6 insertions(+), 0 deletions(-)
diff --git a/x86/realmode.c b/x86/realmode.c
index a833829..2e12680 100644
--- a/x86/realmode.c
+++
Signed-off-by: Wei Yongjun yj...@cn.fujitsu.com
---
x86/realmode.c |4
1 files changed, 4 insertions(+), 0 deletions(-)
diff --git a/x86/realmode.c b/x86/realmode.c
index a833829..d171a56 100644
--- a/x86/realmode.c
+++ b/x86/realmode.c
@@ -437,6 +437,7 @@ void test_call(void)
On Tue, Aug 24, 2010 at 03:48:51PM +0200, Alexander Graf wrote:
+static void hotplug_devices(struct work_struct *dummy)
+{
+ unsigned int i;
+ struct kvm_device_desc *d;
+ struct device *dev;
+
+ for (i = 0; i PAGE_SIZE; i += desc_size(d)) {
This should be
for (i
On 25.08.2010, at 10:16, Heiko Carstens wrote:
On Tue, Aug 24, 2010 at 03:48:51PM +0200, Alexander Graf wrote:
+static void hotplug_devices(struct work_struct *dummy)
+{
+unsigned int i;
+struct kvm_device_desc *d;
+struct device *dev;
+
+for (i = 0; i PAGE_SIZE; i +=
Hey guys,
not sure if this is a bug or a feature request. It's just something
we've noticed and are having problems with.
We're using the qemu-kvm lenny-backports package on Debian 5.0.5.
When doing a live migration from the virsh shell, the server in question
becomes unreachable because
On Wed, Aug 25, 2010 at 10:20:03AM +0200, Alexander Graf wrote:
On 25.08.2010, at 10:16, Heiko Carstens wrote:
On Tue, Aug 24, 2010 at 03:48:51PM +0200, Alexander Graf wrote:
+static void hotplug_devices(struct work_struct *dummy)
+{
+ unsigned int i;
+ struct kvm_device_desc *d;
+
On 25.08.2010, at 10:35, Heiko Carstens wrote:
On Wed, Aug 25, 2010 at 10:20:03AM +0200, Alexander Graf wrote:
On 25.08.2010, at 10:16, Heiko Carstens wrote:
On Tue, Aug 24, 2010 at 03:48:51PM +0200, Alexander Graf wrote:
+static void hotplug_devices(struct work_struct *dummy)
+{
+
25.08.2010 11:52, Nils Cant wrote:
Hey guys,
not sure if this is a bug or a feature request. It's just something
we've noticed and are having problems with.
We're using the qemu-kvm lenny-backports package on Debian 5.0.5.
When doing a live migration from the virsh shell, the server in
On Wed, Aug 25, 2010 at 09:52:16AM +0200, Nils Cant wrote:
Hey guys,
not sure if this is a bug or a feature request. It's just something
we've noticed and are having problems with.
We're using the qemu-kvm lenny-backports package on Debian 5.0.5.
When doing a live migration from the
On Wed, Aug 25, 2010 at 12:37:21PM +0400, Michael Tokarev wrote:
25.08.2010 11:52, Nils Cant wrote:
Hey guys,
not sure if this is a bug or a feature request. It's just something
we've noticed and are having problems with.
We're using the qemu-kvm lenny-backports package on Debian
On Wed, Aug 25, 2010 at 10:34:29AM +0200, Alexander Graf wrote:
On 25.08.2010, at 10:35, Heiko Carstens wrote:
On Wed, Aug 25, 2010 at 10:20:03AM +0200, Alexander Graf wrote:
On 25.08.2010, at 10:16, Heiko Carstens wrote:
On Tue, Aug 24, 2010 at 03:48:51PM +0200, Alexander Graf wrote:
On 25.08.2010, at 10:48, Heiko Carstens wrote:
On Wed, Aug 25, 2010 at 10:34:29AM +0200, Alexander Graf wrote:
On 25.08.2010, at 10:35, Heiko Carstens wrote:
On Wed, Aug 25, 2010 at 10:20:03AM +0200, Alexander Graf wrote:
On 25.08.2010, at 10:16, Heiko Carstens wrote:
On Tue, Aug 24, 2010
On 08/25/2010 10:38 AM, Gleb Natapov wrote:
qemu sends gratuitous ARP after migration. Check forward delay setting on your
bridge interface. It should be set to zero.
Aha! That fixed it. Turns out that debian bridge-utils sets the default
to 15 for bridges.
Manually setting it to 0 with
- Avi Kivity a...@redhat.com wrote:
On 08/24/2010 04:47 PM, Jason Wang wrote:
TSS size should be 104 byte.
Signed-off-by: Jason Wangjasow...@redhat.com
---
x86/cstart64.S |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/x86/cstart64.S
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/emulate.c | 37 -
1 files changed, 24 insertions(+), 13 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index 8a77c99..922f874 100644
--- a/arch/x86/kvm/emulate.c
+++
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/kvm/emulate.c |6 +++---
1 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index 4a89348..8a77c99 100644
--- a/arch/x86/kvm/emulate.c
+++ b/arch/x86/kvm/emulate.c
@@ -3424,7
x86_emulate_insn() will return 1 if instruction can be restarted
without re-entering a guest.
Signed-off-by: Gleb Natapov g...@redhat.com
---
arch/x86/include/asm/kvm_emulate.h |4 ++-
arch/x86/kvm/emulate.c | 43
arch/x86/kvm/x86.c
On 08/25/2010 12:40 PM, Jason Wang wrote:
- Avi Kivitya...@redhat.com wrote:
On 08/24/2010 04:47 PM, Jason Wang wrote:
TSS size should be 104 byte.
Signed-off-by: Jason Wangjasow...@redhat.com
---
x86/cstart64.S |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff
On 08/20/2010 08:48 PM, Robert Rebstock wrote:
Hello.
Thank you for your answer.
- Original Message -
From: Avi Kivitya...@redhat.com
To: Robert Rebstockrebst...@scienceworks.com
Cc: kvm@vger.kernel.org
Sent: Tuesday, August 17, 2010 11:36:41 AM
Subject: Re: guest MAC-address
On 08/25/2010 12:47 PM, Gleb Natapov wrote:
x86_emulate_insn() will return 1 if instruction can be restarted
without re-entering a guest.
Looks good.
--
I have a truly marvellous patch that fixes the bug which this
signature is too narrow to contain.
--
To unsubscribe from this list: send
On 08/25/2010 12:21 PM, Nils Cant wrote:
On 08/25/2010 10:38 AM, Gleb Natapov wrote:
qemu sends gratuitous ARP after migration. Check forward delay
setting on your
bridge interface. It should be set to zero.
Aha! That fixed it. Turns out that debian bridge-utils sets the
default to 15 for
Gleb Natapov wrote:
On Wed, Aug 25, 2010 at 12:37:21PM +0400, Michael Tokarev wrote:
[]
Jokes aside, the thing is that kvm does not know what is
an ARP and what is an IP address. It emulates a hardware
network card, which never sends any ARP out by its own,
it is the operating system IP
On Wed, Aug 25, 2010 at 01:40:19PM +0300, Avi Kivity wrote:
On 08/25/2010 12:21 PM, Nils Cant wrote:
On 08/25/2010 10:38 AM, Gleb Natapov wrote:
qemu sends gratuitous ARP after migration. Check forward delay
setting on your
bridge interface. It should be set to zero.
Aha! That fixed
On Wed, Aug 25, 2010 at 02:51:31PM +0400, Michael Tokarev wrote:
Gleb Natapov wrote:
On Wed, Aug 25, 2010 at 12:37:21PM +0400, Michael Tokarev wrote:
[]
Jokes aside, the thing is that kvm does not know what is
an ARP and what is an IP address. It emulates a hardware
network card, which
On 08/25/2010 01:52 PM, Daniel P. Berrange wrote:
I think libvirt is doing something about this, copying list for further
info.
libvirt doesn't set a policy for this. It provides an API for
configuring host networking, but we don't override the kernel's
forward delay policy, since we don't
On Wed, Aug 25, 2010 at 01:59:02PM +0300, Gleb Natapov wrote:
Kvm is the most natural place to do that, I think, and it's
easy to implement there too (it has the tun device which can
inject packets on behalf of the guest) Yes, the configuration
will be duplicated somehow, but that's not
On Wed, Aug 25, 2010 at 02:05:45PM +0300, Avi Kivity wrote:
On 08/25/2010 01:52 PM, Daniel P. Berrange wrote:
I think libvirt is doing something about this, copying list for further
info.
libvirt doesn't set a policy for this. It provides an API for
configuring host networking, but we
On 08/25/2010 02:15 PM, Daniel P. Berrange wrote:
So it looks like the default config uses the kernel default? If libvirt
uses an existing bridge I agree it shouldn't hack it, but if it creates
its own can't it use a sensible default?
That is the NAT virtual network. That one *does* default
On Wed, Aug 25, 2010 at 02:30:01PM +0300, Avi Kivity wrote:
On 08/25/2010 02:15 PM, Daniel P. Berrange wrote:
So it looks like the default config uses the kernel default? If libvirt
uses an existing bridge I agree it shouldn't hack it, but if it creates
its own can't it use a sensible
Gleb Natapov wrote:
On Wed, Aug 25, 2010 at 02:51:31PM +0400, Michael Tokarev wrote:
[]
For example, we may teach libvirt or kvm about IP addresses
the guest is using, so that kvm will send these ARPs automatically
after migration has completed.
[]
Kvm is the most natural place to do that, I
On 08/25/2010 02:36 PM, Daniel P. Berrange wrote:
Can't libvirt also create a non-NAT bridge? Looks like it would prevent
a lot of manual work and opportunity for misconfiguration.
Yes, it can on latest Fedora/RHEL6, using the netcf library. This is the
new 'virsh iface-XXX' command set
On Wed, Aug 25, 2010 at 02:38:25PM +0300, Avi Kivity wrote:
On 08/25/2010 02:36 PM, Daniel P. Berrange wrote:
Can't libvirt also create a non-NAT bridge? Looks like it would prevent
a lot of manual work and opportunity for misconfiguration.
Yes, it can on latest Fedora/RHEL6, using the
On 08/25/2010 02:42 PM, Daniel P. Berrange wrote:
Is virt-manager able to drive this? it would be great if you could
drive everything from there.
Yes, it does now, under the menu Edit - Host Details - Network Interfaces
NetworkManager has also finally learnt to ignore ifcfg-XXX files
On Wed, Aug 25, 2010 at 03:36:29PM +0400, Michael Tokarev wrote:
Gleb Natapov wrote:
On Wed, Aug 25, 2010 at 02:51:31PM +0400, Michael Tokarev wrote:
[]
For example, we may teach libvirt or kvm about IP addresses
the guest is using, so that kvm will send these ARPs automatically
after
- Avi Kivity a...@redhat.com wrote:
On 08/25/2010 12:40 PM, Jason Wang wrote:
- Avi Kivitya...@redhat.com wrote:
On 08/24/2010 04:47 PM, Jason Wang wrote:
TSS size should be 104 byte.
Signed-off-by: Jason Wangjasow...@redhat.com
---
x86/cstart64.S |2 +-
1
On 08/25/2010 03:27 PM, Jason Wang wrote:
- Avi Kivitya...@redhat.com wrote:
On 08/25/2010 12:40 PM, Jason Wang wrote:
- Avi Kivitya...@redhat.com wrote:
On 08/24/2010 04:47 PM, Jason Wang wrote:
TSS size should be 104 byte.
Signed-off-by: Jason Wangjasow...@redhat.com
---
- Avi Kivity a...@redhat.com wrote:
On 08/25/2010 03:27 PM, Jason Wang wrote:
- Avi Kivitya...@redhat.com wrote:
On 08/25/2010 12:40 PM, Jason Wang wrote:
- Avi Kivitya...@redhat.com wrote:
On 08/24/2010 04:47 PM, Jason Wang wrote:
TSS size should be 104 byte.
Hello!
I try to use KVM on slackware host and centos5 guest with SMP.
When the server is idle, I get following errors in /var/log/messages:
http://pastebin.com/4RrMVuXq
Guest:
[r...@centos-5-x64 ~]# uname -a
Linux centos-5-x64.slave 2.6.18-194.11.1.el5 #1 SMP Tue Aug 10
19:05:06 EDT 2010 x86_64
On Wed, Aug 25, 2010 at 5:19 PM, Avi Kivity a...@redhat.com wrote:
Looks like a bug in our USB emulation. Copying qemu-devel to see if anyone
has a clue.
I have disabled USB support, but the bug have not disappeared.
Please, pay attention that CPU#1 was stuck too.
--
Boris Dolgov.
--
To
Hello.
I'm seeing instant host kernel crash triggered by _any_
network activity to/from a kvm guest that's using virtio-net.
My setup is maybe a bit unusual, but here we go.
I've a host machine that has one bridge configured,
and is running a few kvm virtual machines and a few
linux containers
On Wed, Aug 25, 2010 at 5:15 PM, Boris Dolgov bo...@dolgov.name wrote:
Hello!
I try to use KVM on slackware host and centos5 guest with SMP.
When the server is idle, I get following errors in /var/log/messages:
http://pastebin.com/4RrMVuXq
Guest:
[r...@centos-5-x64 ~]# uname -a
Linux
On 08/25/2010 11:14 AM, Boris Dolgov wrote:
On Wed, Aug 25, 2010 at 5:15 PM, Boris Dolgovbo...@dolgov.name wrote:
Hello!
I try to use KVM on slackware host and centos5 guest with SMP.
When the server is idle, I get following errors in /var/log/messages:
http://pastebin.com/4RrMVuXq
On Wed, Aug 25, 2010 at 8:19 PM, Anthony Liguori anth...@codemonkey.ws wrote:
Or post it to the CentOS bugzilla since you're not using Red Hat.
I'am using redhat, but not on this VM.
There's been various time related issues in RHEL5.x so my inclination would
be that it's not an upstream issue
On Tue, Aug 24, 2010 at 01:01:38PM -1000, Zachary Amsden wrote:
With this patchset, KVM now has a much stronger guarantee: If you have
old guest software running on broken hardware, using SMP virtual
machines, you do not get hardware performance and error-free time
virtualization.However,
On Thu, Aug 19, 2010 at 10:07:39PM -1000, Zachary Amsden wrote:
Make the clock update handler handle generic clock synchronization,
not just KVM clock. We add a catchup mode which keeps passthrough
TSC in line with absolute guest TSC.
Signed-off-by: Zachary Amsden zams...@redhat.com
---
Thanks for your help, it seems enabling ip forwarding on the host and
setting a default gateway on the vm pointing to the host fixed it!
On Wed, Aug 25, 2010 at 3:08 AM, haishan haishan@gmail.com wrote:
Rus Hughes wrote:
Hi guys,
I'm trying to sort out networking for a VM I've created on
On Wed, Aug 25, 2010 at 8:19 PM, Anthony Liguori anth...@codemonkey.ws wrote:
Or post it to the CentOS bugzilla since you're not using Red Hat.
There's been various time related issues in RHEL5.x so my inclination would
be that it's not an upstream issue until you verify it with the latest
On Mon, Aug 23, 2010 at 02:06:11PM +0300, Avi Kivity wrote:
Use the new byte/word dual opcode decode.
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/emulate.c | 40
1 files changed, 16 insertions(+), 24 deletions(-)
diff --git
On Sun, Aug 22, 2010 at 07:13:33PM +0800, Xiao Guangrong wrote:
Combine guest pte read between guest pte check in the fetch path and pte
prefetch
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
---
arch/x86/kvm/paging_tmpl.h | 40 +---
1
On 08/25/2010 06:55 AM, Marcelo Tosatti wrote:
On Tue, Aug 24, 2010 at 01:01:38PM -1000, Zachary Amsden wrote:
With this patchset, KVM now has a much stronger guarantee: If you have
old guest software running on broken hardware, using SMP virtual
machines, you do not get hardware
On 08/25/2010 07:27 AM, Marcelo Tosatti wrote:
On Thu, Aug 19, 2010 at 10:07:39PM -1000, Zachary Amsden wrote:
Make the clock update handler handle generic clock synchronization,
not just KVM clock. We add a catchup mode which keeps passthrough
TSC in line with absolute guest TSC.
On Tue, Aug 24, 2010 at 02:01:08PM +0300, Avi Kivity wrote:
DIV may raise an exception if dividing by zero or causing an overflow. Test
it.
Avi Kivity (3):
Support #DE (divide error) exception handlers
Allow emulation tests to trap exceptions
Add DIV tests
config-x86-common.mak
On Tue, Aug 24, 2010 at 02:10:29PM +0300, Avi Kivity wrote:
Signed-off-by: Avi Kivity a...@redhat.com
---
arch/x86/kvm/emulate.c | 17 ++---
1 files changed, 14 insertions(+), 3 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index f82e43a..a7e26d0
On Tue, Aug 24, 2010 at 03:48:50PM +0200, Alexander Graf wrote:
Currenty the ext_param field only distinguishes between config change and
vring interrupt. We can do a lot more with it though, so let's enable a
full byte of possible values and constants to #defines while at it.
Signed-off-by:
On Fri, 06 Aug 2010 10:38:24 -0600
Alex Williamson alex.william...@redhat.com wrote:
On Fri, 2010-08-06 at 09:34 -0700, Sridhar Samudrala wrote:
On 8/5/2010 3:59 PM, Michael S. Tsirkin wrote:
cgroup_attach_task_current_cg API that have upstream is backwards: we
really need an API to
Hi,
In this series, I am proposing an steal time implementation
for KVM. It is an RFC, so don't be too harsh =]
There are two parts of it: the guest and host part.
The proposal for the guest part, is to just change the
common time accounting, and try to identify at that spot,
wether or not we
From: Zachary Amsden zams...@redhat.com
Add a kernel call to get the number of nanoseconds since boot. This
is generally useful enough to make it a generic call.
Signed-off-by: Zachary Amsden zams...@redhat.com
---
include/linux/time.h |1 +
kernel/time/timekeeping.c | 27
This guest/host common patch prepares infrastructure for
the steal time implementation. Some constants are added,
and a name change happens in pvclock vcpu structure.
Signed-off-by: Glauber Costa glom...@redhat.com
---
arch/x86/include/asm/kvm_para.h|1 +
By measuring time between a vcpu_put and a vcpu_load, we can
estimate how much time did the guest stay out of the cpu.
This is exported to the guest at every clock update.
Signed-off-by: Glauber Costa glom...@redhat.com
---
arch/x86/include/asm/kvm_host.h |2 ++
arch/x86/kvm/x86.c
This patch proposes a common steal time implementation. When no
steal time is accounted, we just add a branch to the current
accounting code, that shouldn't add much overhead.
When we do want to register steal time, we proceed as following:
- if we would account user or system time in this tick,
This is the proposed kvm-side steal time implementation.
It is migration safe, as it checks flags at every read.
Signed-off-by: Glauber Costa glom...@redhat.com
---
arch/x86/kernel/kvmclock.c | 35 +++
1 files changed, 35 insertions(+), 0 deletions(-)
diff
Guest kernel will only activate steal time if the host exports it.
Warn the guest about it.
Signed-off-by: Glauber Costa glom...@redhat.com
---
arch/x86/kvm/x86.c |3 ++-
1 files changed, 2 insertions(+), 1 deletions(-)
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index
With a reliable steal time mechanism, we can tell if we're
out of the cpu for very long, differentiating from the case
that we simply got a real softlockup.
In the case we were out of cpu, the watchdog is fed, making
bogus softlockups disappear.
Signed-off-by: Glauber Costa glom...@redhat.com
On Wed, Aug 25, 2010 at 10:48:20AM -1000, Zachary Amsden wrote:
On 08/25/2010 07:27 AM, Marcelo Tosatti wrote:
On Thu, Aug 19, 2010 at 10:07:39PM -1000, Zachary Amsden wrote:
Make the clock update handler handle generic clock synchronization,
not just KVM clock. We add a catchup mode which
Hello,
After looking all over the net and trying some KVM stuff I just want to
get some clarification on which QEMU I should be using. I am trying to
use virtio with hardware acceleration.
Platform Fedora x86_64-kernel 2.6.32.16-150 KVM kernel modules
2.6.32.16-150
Question:
Does the
On Wed, Aug 25, 2010 at 02:10:53PM +0800, Wei Yongjun wrote:
Signed-off-by: Wei Yongjun yj...@cn.fujitsu.com
---
arch/x86/kvm/emulate.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
Applied (and v2 testcase), thanks.
--
To unsubscribe from this list: send the line unsubscribe
On Wed, Aug 25, 2010 at 07:01:34PM -0300, Marcelo Tosatti wrote:
On Wed, Aug 25, 2010 at 10:48:20AM -1000, Zachary Amsden wrote:
On 08/25/2010 07:27 AM, Marcelo Tosatti wrote:
On Thu, Aug 19, 2010 at 10:07:39PM -1000, Zachary Amsden wrote:
Make the clock update handler handle generic clock
On 08/25/2010 12:01 PM, Marcelo Tosatti wrote:
On Wed, Aug 25, 2010 at 10:48:20AM -1000, Zachary Amsden wrote:
On 08/25/2010 07:27 AM, Marcelo Tosatti wrote:
On Thu, Aug 19, 2010 at 10:07:39PM -1000, Zachary Amsden wrote:
Make the clock update handler handle generic clock
On Wednesday 28 July 2010 20:42:22 jes.soren...@redhat.com wrote:
From: Jes Sorensen jes.soren...@redhat.com
This set of patches adds default CPU types to the PC compat
definitions, and patch #2 sets the CPU type to kvm64/kvm32 when
running under KVM.
Long term we might want to qdev'ify
On Wed, Aug 25, 2010 at 2:35 PM, Andrew Morton
a...@linux-foundation.org wrote:
So am I correct to assume that this change is now needed in 2.6.36, and
unneeded in 2.6.35?
Can it affect the userspace-kernel API in amy manner? If so, it
should be backported into earlier kernels to reduce the
Hi Avi,
There may be a missing wakeup in the networking path. You can try adding
printf()s in RTL8139's receive function, and in kvm_set_irq_level() to see
if there's a problem in interrupt flow.
Thanks for your insights. I debugged the RTL8139's receive function
rtl8139_do_receive() and the
Hi,
Every time I try to rsync something to my 9p fs mounted I get the following
message on guest kernel:
8
[ 45.866789] 9pnet_virtio virtio2: requests:id 0 is not a head!
8
I'm sending the FS with the following argument via qemu-kvm (commit head
Hi, did anyone see latest kvm build fail on 32bit system?
kvm commit: 152d921348ee2ac7bb73d599c5796a027f0a660c
gcc version 4.1.2
...
LD arch/x86/boot/setup.elf
OBJCOPY arch/x86/boot/setup.bin
OBJCOPY arch/x86/boot/vmlinux.bin
BUILD
76 matches
Mail list logo