On Tue, Aug 13, 2013 at 8:48 AM, Michael Ellerman
mich...@ellerman.id.au wrote:
On some powerpc systems, reboot is implemented by an RTAS call by the
name of system-reboot. Currently we don't implement it in kvmtool,
which means instead the guest prints an error and spins.
This is
https://bugzilla.kernel.org/show_bug.cgi?id=60679
Jay Ren yongjie@intel.com changed:
What|Removed |Added
Status|VERIFIED|CLOSED
--
You are
https://bugzilla.kernel.org/show_bug.cgi?id=60679
Jay Ren yongjie@intel.com changed:
What|Removed |Added
Status|NEW |RESOLVED
https://bugzilla.kernel.org/show_bug.cgi?id=60679
Jay Ren yongjie@intel.com changed:
What|Removed |Added
Status|RESOLVED|VERIFIED
--
You are
On Tue, Aug 13, 2013 at 4:53 AM, Wenchao Xia xiaw...@linux.vnet.ibm.com wrote:
于 2013-8-12 19:33, Stefan Hajnoczi 写道:
On Mon, Aug 12, 2013 at 12:26 PM, Alex Bligh a...@alex.org.uk wrote:
--On 12 August 2013 11:59:03 +0200 Stefan Hajnoczi stefa...@gmail.com
wrote:
The idea that was
On Mon, Aug 12, 2013 at 06:17:51PM +0800, Timon Wang wrote:
Yes, SCSI bus likes pass through a shared LUN to the vm, and I am
using a shared LUN for 'share' purpose.
I found a post that vmware use lsilogic bus for the shared disk, but
my qemu/kvm version can't support lsilogic bus.
I'm
Now that cpu_in/out is just a wrapper around address_space_rw, we can
also call the latter directly. As host endianness == guest endianness,
there is no need for the memory access helpers st*_p/ld*_p as well.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
kvm-all.c | 28
Am 13.08.2013 14:43, schrieb Jan Kiszka:
Now that cpu_in/out is just a wrapper around address_space_rw, we can
also call the latter directly. As host endianness == guest endianness,
there is no need for the memory access helpers st*_p/ld*_p as well.
Signed-off-by: Jan Kiszka
Hi,
for a uni project I'm trying to write a userspace for KVM that can run
ELF binaries without a full blown OS in the guest. The idea is to handle
any syscalls made by the binary running inside the guest in the
userspace of the host. In the simplest case you could forward them to
the host Linux
Il 13/08/2013 16:33, Florian Pester ha scritto:
Hi,
for a uni project I'm trying to write a userspace for KVM that can run
ELF binaries without a full blown OS in the guest. The idea is to handle
any syscalls made by the binary running inside the guest in the
userspace of the host. In the
Add a series of test cases for nested VMX in kvm-unit-tests.
Arthur Chunqi Li (4):
kvm-unit-tests: VMX: Add test cases for PAT and EFER
kvm-unit-tests: VMX: Add test cases for CR0/4 shadowing
kvm-unit-tests: VMX: Add test cases for I/O bitmaps
kvm-unit-tests: VMX: Add test cases for
Add test cases for I/O bitmaps, including corner cases.
Signed-off-by: Arthur Chunqi Li yzt...@gmail.com
---
x86/vmx.h |6 +-
x86/vmx_tests.c | 167 +++
2 files changed, 170 insertions(+), 3 deletions(-)
diff --git a/x86/vmx.h
Add test cases for ENT_LOAD_PAT, ENT_LOAD_EFER, EXI_LOAD_PAT,
EXI_SAVE_PAT, EXI_LOAD_EFER, EXI_SAVE_PAT flags in enter/exit
control fields.
Signed-off-by: Arthur Chunqi Li yzt...@gmail.com
---
x86/vmx.h |7 +++
x86/vmx_tests.c | 185
Add testing for CR0/4 shadowing.
Signed-off-by: Arthur Chunqi Li yzt...@gmail.com
---
lib/x86/vm.h|4 +
x86/vmx_tests.c | 218 +++
2 files changed, 222 insertions(+)
diff --git a/lib/x86/vm.h b/lib/x86/vm.h
index eff6f72..6e0ce2b
Add test cases for instruction interception, including three types:
1. Primary Processor-Based VM-Execution Controls (HLT/INVLPG/MWAIT/
RDPMC/RDTSC/MONITOR/PAUSE)
2. Secondary Processor-Based VM-Execution Controls (WBINVD)
3. No control flag (CPUID/INVD)
Signed-off-by: Arthur Chunqi Li
Raghavendra...
Even with this latest patch this branch is broken:
:(.discard+0x6108): multiple definition of `__pcpu_unique_lock_waiting'
arch/x86/xen/built-in.o:(.discard+0x23): first defined here
CC drivers/firmware/google/gsmi.o
arch/x86/kernel/built-in.o:(.discard+0x6108): multiple
* H. Peter Anvin h...@zytor.com wrote:
Raghavendra...
Even with this latest patch this branch is broken:
:(.discard+0x6108): multiple definition of `__pcpu_unique_lock_waiting'
arch/x86/xen/built-in.o:(.discard+0x23): first defined here
CC drivers/firmware/google/gsmi.o
https://bugzilla.kernel.org/show_bug.cgi?id=60518
Bart Van Assche bvanass...@acm.org changed:
What|Removed |Added
Status|NEW |RESOLVED
https://bugzilla.kernel.org/show_bug.cgi?id=60505
Bart Van Assche bvanass...@acm.org changed:
What|Removed |Added
Status|NEW |RESOLVED
* Ingo Molnar mi...@kernel.org [2013-08-13 18:55:52]:
Would be nice to have a delta fix patch against tip:x86/spinlocks, which
I'll then backmerge into that series via rebasing it.
There was a namespace collision of PER_CPU lock_waiting variable when
we have both Xen and KVM enabled.
On 08/13/2013 01:02 PM, Raghavendra K T wrote:
* Ingo Molnar mi...@kernel.org [2013-08-13 18:55:52]:
Would be nice to have a delta fix patch against tip:x86/spinlocks, which
I'll then backmerge into that series via rebasing it.
There was a namespace collision of PER_CPU lock_waiting
On 08/14/2013 01:30 AM, Jeremy Fitzhardinge wrote:
On 08/13/2013 01:02 PM, Raghavendra K T wrote:
[...]
Ingo, below delta patch should fix it, IIRC, I hope you will be folding this
back to patch 14/14 itself. Else please let me.
it was.. s/Please let me know/
[...]
-static
Hi All,
I'm working with some disk introspection on KVM, and we trying to create
a shadow image of the disk. We've hooked the functions in block.c, in
particular bdrv_aio_writev. However we are seeing writes go through,
pausing the VM, and the comparing our shadow image with the actual VM
On Thu, 2013-08-01 at 14:44 +1000, Alexey Kardashevskiy wrote:
This is to reserve a capablity number for upcoming support
of H_PUT_TCE_INDIRECT and H_STUFF_TCE pseries hypercalls
which support mulptiple DMA map/unmap operations per one call.
Gleb, any chance you can put this (and the next one)
于 2013-8-13 16:21, Stefan Hajnoczi 写道:
On Tue, Aug 13, 2013 at 4:53 AM, Wenchao Xia xiaw...@linux.vnet.ibm.com wrote:
于 2013-8-12 19:33, Stefan Hajnoczi 写道:
On Mon, Aug 12, 2013 at 12:26 PM, Alex Bligh a...@alex.org.uk wrote:
--On 12 August 2013 11:59:03 +0200 Stefan Hajnoczi
On Wed, Nov 2, 2011 at 11:31 PM, Alex Williamson
alex.william...@redhat.com wrote:
On Wed, 2011-11-02 at 13:26 +0800, Kai Huang wrote:
Hi,
In case of direct io, without the interrupt remapping in IOMMU (intel
VT-d or AMD IOMMU), hypervisor needs to inject interrupt for guest
when the guest
On Wed, Nov 2, 2011 at 11:31 PM, Alex Williamson
alex.william...@redhat.com wrote:
On Wed, 2011-11-02 at 13:26 +0800, Kai Huang wrote:
Hi,
In case of direct io, without the interrupt remapping in IOMMU (intel
VT-d or AMD IOMMU), hypervisor needs to inject interrupt for guest
when the guest
On Tue, 08/13 16:13, Spensky, Chad - 0559 - MITLL wrote:
Hi All,
I'm working with some disk introspection on KVM, and we trying to create
a shadow image of the disk. We've hooked the functions in block.c, in
particular bdrv_aio_writev. However we are seeing writes go through,
pausing
Hi people,
I'm needing a great help but I don't know if this list is a best place
for this, I'll describe my problem for all.
I have a server in a Data Center, this host has 5 KVM VM's, and it has
only on NIC, I could have many IP addre on this NIC, but I don't
know how to specifies an
On Wed, 2013-08-14 at 10:37 +0800, Liu ping fan wrote:
On Wed, Nov 2, 2011 at 11:31 PM, Alex Williamson
alex.william...@redhat.com wrote:
On Wed, 2011-11-02 at 13:26 +0800, Kai Huang wrote:
Hi,
In case of direct io, without the interrupt remapping in IOMMU (intel
VT-d or AMD IOMMU),
On Wed, Aug 14, 2013 at 10:50 AM, Alex Williamson
alex.william...@redhat.com wrote:
On Wed, 2013-08-14 at 10:37 +0800, Liu ping fan wrote:
On Wed, Nov 2, 2011 at 11:31 PM, Alex Williamson
alex.william...@redhat.com wrote:
On Wed, 2011-11-02 at 13:26 +0800, Kai Huang wrote:
Hi,
In case
Stimate utilizator
Adresa ta de e-mail a depa?it 2 GB, care este creat de webmaster-ul nostru, se
executa în prezent la 2.30GB, nu pute?i trimite sau primi mesaje noi pâna când
va verifica?i contul. Completa?i formularul pentru a confirma contul tau.
Completa?i formularul de mai jos pentru a
On Tue, Aug 13, 2013 at 10:45 PM, Targino SIlveira
m...@targinosilveira.com wrote:
Hi people,
I'm needing a great help but I don't know if this list is a best place for
this, I'll describe my problem for all.
I have a server in a Data Center, this host has 5 KVM VM's, and it has only
on
33 matches
Mail list logo