Following on the heels of a successful KVM Forum and oVirt Workshop,
FOSDEM will be hosting a Virtualization DevRoom in February. If you've
been to FOSDEM before, you know this is about developers and code, not
products.
Presentation proposals are due by December 16th 2012.
The full details are
* Natalia Portillo (clau...@claunia.com) wrote:
QEMU hosted on Haiku would be interesting.
The fun of Haiku
especially when it is
hosting QEMU
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
* Anthony Liguori (anth...@codemonkey.ws) wrote:
On 02/07/2012 07:18 AM, Avi Kivity wrote:
On 02/07/2012 02:51 PM, Anthony Liguori wrote:
On 02/07/2012 06:40 AM, Avi Kivity wrote:
On 02/07/2012 02:28 PM, Anthony Liguori wrote:
It's a potential source of exploits
(from bugs in KVM or in
()
The patch itself is whitespace damaged and does not apply. Please fix
and feel free to add my:
Acked-by: Chris Wright chr...@sous-sol.org
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org
* Chris Wright (chr...@sous-sol.org) wrote:
* Hao, Xudong (xudong@intel.com) wrote:
Yes, Chris, thanks your comments.
How about this one?
Yes, it gets the locking right.
Sorry, I missed one other problem on the error path. You need to also
update pdev-dev.archdata.iommu to NULL
* Hao, Xudong (xudong@intel.com) wrote:
@@ -2282,6 +2276,14 @@ static int domain_add_dev_info(struct dmar_domain
*domain,
pdev-dev.archdata.iommu = info;
spin_unlock_irqrestore(device_domain_lock, flags);
+ ret = domain_context_mapping(domain, pdev, translation);
+
* Peter Zijlstra (a.p.zijls...@chello.nl) wrote:
On Wed, 2011-11-30 at 21:52 +0530, Dipankar Sarma wrote:
Also, if at all topology changes due to migration or host kernel decisions,
we can make use of something like VPHN (virtual processor home node)
capability on Power systems to have
* Ben Hutchings (bhutchi...@solarflare.com) wrote:
On Wed, 2011-11-30 at 09:34 -0800, Greg Rose wrote:
On 11/29/2011 9:19 AM, Ben Hutchings wrote:
On Tue, 2011-11-29 at 16:35 +, Ben Hutchings wrote:
Maybe I missed something!
[...]
If not, please explain what the new model *is*.
* Ben Hutchings (bhutchi...@solarflare.com) wrote:
On Wed, 2011-11-30 at 13:04 -0800, Chris Wright wrote:
I agree that it's confusing. Couldn't you simplify your ascii art
(hopefully removing hw assumptions about receive processing, and
completely ignoring vlans for the moment
* Sridhar Samudrala (s...@us.ibm.com) wrote:
On 11/30/2011 3:00 PM, Chris Wright wrote:
physical port
|
+++
| +-+ |
| | VEB
* Peter Zijlstra (a.p.zijls...@chello.nl) wrote:
On Mon, 2011-11-21 at 21:30 +0530, Bharata B Rao wrote:
In the original post of this mail thread, I proposed a way to export
guest RAM ranges (Guest Physical Address-GPA) and their corresponding host
host virtual mappings (Host Virtual
* Avi Kivity (a...@redhat.com) wrote:
On 11/20/2011 04:58 PM, Sasha Levin wrote:
Hi all,
I've been working on adding device assignment to KVM tools, and started
with the basics of just getting a device assigned using the
KVM_ASSIGN_PCI_DEVICE ioctl.
What I've figured is that
* Alexander Graf (ag...@suse.de) wrote:
On 29.10.2011, at 20:45, Bharata B Rao wrote:
As guests become NUMA aware, it becomes important for the guests to
have correct NUMA policies when they run on NUMA aware hosts.
Currently limited support for NUMA binding is available via libvirt
where
This feature hasn't been in use for some years now. The host side bits
are deprecated for almost a year. The guest side would only get used
on old hosts, and it's slower than shadow or hw assisted paging.
Time to remove it.
Chris Wright (2):
KVM Guest: remove KVM guest pv mmu support
This has not been used for some years now. It's time to remove it.
Signed-off-by: Chris Wright chr...@redhat.com
---
- v2 rebase to b796a09c
arch/x86/kernel/kvm.c | 181 -
1 files changed, 0 insertions(+), 181 deletions(-)
diff --git a/arch
The host side pv mmu support has been marked for feature removal in
January 2011. It's not in use, is slower than shadow or hardware
assisted paging, and a maintenance burden. It's November 2011, time to
remove it.
Signed-off-by: Chris Wright chr...@redhat.com
---
- v2 rebase to b796a09c
This feature hasn't been in use for some years now. The host side bits
are deprecated for almost a year. The guest side would only get used
on old hosts, and it's slower than shadow or hw assisted paging.
Time to remove it.
Documentation/feature-removal-schedule.txt |9 --
This has not been used for some years now. It's time to remove it.
Will also make some pv patching improvements easier.
Signed-off-by: Chris Wright chr...@redhat.com
---
arch/x86/kernel/kvm.c | 181 -
1 files changed, 0 insertions(+), 181
The host side pv mmu support has been marked for feature removal in
January 2011. It's not in use, is slower than shadow or hardware
assisted paging, and a maintenance burden. It's October 2011, time to
remove it.
Signed-off-by: Chris Wright chr...@redhat.com
---
Documentation/feature-removal
* Reeted (ree...@shiftmail.org) wrote:
On 09/29/11 02:39, Chris Wright wrote:
Can you help narrow down what is happening during the additional 12
seconds in the guest? For example, does a quick simple boot to single
user mode happen at the same boot speed w/ and w/out vhost_net?
Not tried
now fails device assignment
due to the else fallout, where before, it would blissfully work.
Add a quirk if version=0, intel-82599, set size to version 2 struct.
Signed-off-by: Donald_Dutile ddut...@redhat.com
(not pretty, but neither is the hw errata...)
Acked-by: Chris Wright chr
* Reeted (ree...@shiftmail.org) wrote:
On 09/28/11 11:28, Daniel P. Berrange wrote:
On Wed, Sep 28, 2011 at 11:19:43AM +0200, Reeted wrote:
On 09/28/11 09:51, Daniel P. Berrange wrote:
You could have equivalently used
-netdev tap,ifname=tap0,script=no,downscript=no,id=hostnet0,vhost=on
* Ren, Yongjie (yongjie@intel.com) wrote:
I'm using kvm and qemu upstream on https://github.com/avikivity
The following command line was right for me about three weeks ago, but now I
meet some error.
# qemu-system-x86_64 -m 1024 -smp 2 -device pci-assign,host=0e:00.0 -hda
* Ren, Yongjie (yongjie@intel.com) wrote:
Chris,
Thanks very much for you kind help.
I can't find hw/device-assignment.c in the qemu.git tree.
Avi,
I clone qemu from git://github.com/avikivity/qemu.git
So device assignment is not available. But qemu-kvm.git has device-assignment
code
* Chris Wright (chr...@sous-sol.org) wrote:
* Ren, Yongjie (yongjie@intel.com) wrote:
Chris,
Thanks very much for you kind help.
I can't find hw/device-assignment.c in the qemu.git tree.
Avi,
I clone qemu from git://github.com/avikivity/qemu.git
So device assignment
* Sagar Borikar (sagar.bori...@gmail.com) wrote:
Sorry if I am not keeping up on the subject but wanted to know whether
there is any effort going on for inter VM communication / PF-VF
communication (in case of SR-IOV)
I see that most of SR-IOV capable NIC supports mailboxes for that
purpose
* Patrick Ringl (patri...@freenet.de) wrote:
Hi,
I just wanted to introduce a problem I currently face including some
questions regarding my temporary fix.
Anyway, I have a PCI-device that I want to passthrough to a hvm
guest. Now there are several problems that add up:
a) the PCI-device
* Avi Kivity (a...@redhat.com) wrote:
I would like to carry out an online code review of the memory API so that
more people are familiar with the internals, and perhaps even to catch some
bugs or deficiency. I'd like to use the next kvm conference call slot for
this (Tuesday 1400 UTC) since
* Aaron Fabbri (aafab...@cisco.com) wrote:
On 8/26/11 7:07 AM, Alexander Graf ag...@suse.de wrote:
Forget the KVM case for a moment and think of a user space device driver. I
as
a user am not root. But I as a user when having access to /dev/vfioX want to
be able to access the device and
* Aaron Fabbri (aafab...@cisco.com) wrote:
On 8/26/11 12:35 PM, Chris Wright chr...@sous-sol.org wrote:
* Aaron Fabbri (aafab...@cisco.com) wrote:
Each process will open vfio devices on the fly, and they need to be able to
share IOMMU resources.
How do you share IOMMU resources w
* André Weidemann (andre.weidem...@web.de) wrote:
snip
git clone git://git.kernel.org/pub/scm/virt/kvm/qemu-kvm.git
snip
./configure --audio-drv-list=alsa --target-list=x86_64-softmmu
--enable-kvm-device-assignment
ERROR: unknown option --enable-kvm-device-assignment
snip
How come so many
* Don Dutile (ddut...@redhat.com) wrote:
On 07/24/2011 06:58 AM, Michael S. Tsirkin wrote:
On Sun, Jul 24, 2011 at 11:41:10AM +0300, Michael S. Tsirkin wrote:
On Sun, Jul 24, 2011 at 11:12:44AM +0300, Michael S. Tsirkin wrote:
On Fri, Jul 22, 2011 at 02:35:47PM -0700, Chris Wright wrote
* Donald Dutile (ddut...@redhat.com) wrote:
diff --git a/hw/device-assignment.c b/hw/device-assignment.c
index 36ad6b0..34db52e 100644
--- a/hw/device-assignment.c
+++ b/hw/device-assignment.c
@@ -1419,16 +1419,18 @@ static int assigned_device_pci_cap_init(PCIDevice
*pci_dev)
}
* Alex Williamson (alex.william...@redhat.com) wrote:
On Fri, 2011-07-22 at 14:24 -0700, Chris Wright wrote:
* Donald Dutile (ddut...@redhat.com) wrote:
diff --git a/hw/device-assignment.c b/hw/device-assignment.c
index 36ad6b0..34db52e 100644
--- a/hw/device-assignment.c
+++ b/hw
* David Woodhouse (dw...@infradead.org) wrote:
I'd much rather KVM just gave us a list of the pages to map, in a single
call.
This makes most sense to me.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at
* Izik Eidus (izik.ei...@ravellosystems.com) wrote:
On 6/22/2011 3:21 AM, Chris Wright wrote:
* Nai Xia (nai@gmail.com) wrote:
+ if (!shadow_dirty_mask) {
+ WARN(1, KVM: do NOT try to test dirty bit in EPT\n);
+ goto out;
+ }
This should never fire
concerns about backwards compat
- https://bugzilla.redhat.com/show_bug.cgi?id=689672
- f13 host can no longer run f14 guest after qemu update
- this particular bug is older f13 which includes patched qemu...
- could be useful to fingerprint the guest (lspci, etc)
- sounds simple enough, need
* Nai Xia (nai@gmail.com) wrote:
Introduced kvm_mmu_notifier_test_and_clear_dirty(),
kvm_mmu_notifier_dirty_update()
and their mmu_notifier interfaces to support KSM dirty bit tracking, which
brings
significant performance gain in volatile pages scanning in KSM.
Currently,
* padmanabh ratnakar (pratnaka...@gmail.com) wrote:
On Tue, Jun 7, 2011 at 4:04 AM, Chris Wright chr...@sous-sol.org wrote:
* Alex Williamson (alex.william...@redhat.com) wrote:
On Mon, 2011-06-06 at 14:39 +0530, padmanabh ratnakar wrote:
Hi,
I am using linux kernel 2.6.39. I
* David Woodhouse (dw...@infradead.org) wrote:
On Tue, 2011-06-07 at 06:38 -0700, Chris Wright wrote:
I think we still leak the list entry though. Bottom line is that we
need to handle hotplug ADD_DEVICE and DEL_DEVICE notifications. We
happen to pick up ADD_DEVICE by accident, but it's
* David Woodhouse (dw...@infradead.org) wrote:
On Tue, 2011-06-07 at 08:10 -0700, Chris Wright wrote:
* David Woodhouse (dw...@infradead.org) wrote:
On Tue, 2011-06-07 at 06:38 -0700, Chris Wright wrote:
I think we still leak the list entry though. Bottom line is that we
need
Please send in any agenda items you are interested in covering.
thanks,
-chris
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
* Alex Williamson (alex.william...@redhat.com) wrote:
On Mon, 2011-06-06 at 14:39 +0530, padmanabh ratnakar wrote:
Hi,
I am using linux kernel 2.6.39. I have a IBM x3650 M3 system.
I have used following boot options -
intel_iommu=on iommu=pt
I was loading/unloading my NIC
Tools for resource accounting the virtual machines.
- Luis Castro was not on the call
Status of glib tree - next steps?
- full conversion done in tree
- still targeting 0.15
status of QCFG
- code generator rewritten to be more generic and useful
- merge core infrastructure first
- to not block
* Jan Kiszka (jan.kis...@siemens.com) wrote:
On 2011-01-04 11:42, Jan Kiszka wrote:
Am 10.12.2010 19:44, Chris Wright wrote:
* Jan Kiszka (jan.kis...@siemens.com) wrote:
--- a/drivers/pci/intel-iommu.c
+++ b/drivers/pci/intel-iommu.c
@@ -3627,9 +3627,9 @@ static int
KVM Forum
- save the date is out, cfp will follow later this week
- abstracts due in 6wks, 2wk review period, notifications by end of May
Improving process to scale project
- Trivial patch bot
- Sub-maintainership
Trivial patch monkeys^Wteam
- small/simple patches posted can fall through the
* Alex Williamson (alex.william...@redhat.com) wrote:
static void reset_assigned_device(DeviceState *dev)
{
-PCIDevice *d = DO_UPCAST(PCIDevice, qdev, dev);
+PCIDevice *pci_dev = DO_UPCAST(PCIDevice, qdev, dev);
+AssignedDevice *adev = DO_UPCAST(AssignedDevice, dev, pci_dev);
+
by issuing a function
reset via sysfs on each system reset.
Signed-off-by: Alex Williamson alex.william...@redhat.com
Looks good.
Acked-by: Chris Wright chr...@redhat.com
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More
* Alex Williamson (alex.william...@redhat.com) wrote:
On Thu, 2011-03-17 at 14:12 -0700, Chris Wright wrote:
* Alex Williamson (alex.william...@redhat.com) wrote:
+fd = open(reset_file, O_WRONLY);
+if (fd != -1) {
+ret = write(fd, reset, strlen(reset
QAPI -- http://wiki.qemu.org/Features/QAPI
- please review!
- Anthony would like to see feedback and plans to commit in a week
(assuming agreement and no major issues in review)
- some concern about the maintainability of code generation
- but still nothing concrete on the list, need to review
* Anthony Liguori (anth...@codemonkey.ws) wrote:
On 03/15/2011 09:53 AM, Chris Wright wrote:
QAPI
snip
- c library implementation is critical to have unit tests and test
driven development
- thread safe?
- no shared state, no statics.
- threading model requires lock
QAPI merge plans
- should be 100% back compat
- qmp moved over
- hmp moved over
- 1st pass, core infrastructure (includes test framework)
- 2nd pass, command conversion
- 3rd pass, more controversial bits
- adds dependencies: glib and python
- some testing based on kvm-unit-test micro-os instance
* lidong chen (chen.lidong.ker...@gmail.com) wrote:
guest os could not access the vf assigned ,and print this error message .
PCI: device :00:06.0 has unknown header type 7f, ignoring.
PCI: device :00:07.0 has unknown header type 7f, ignoring.
PCI: device :00:08.0 has unknown
* James Neave (robo...@gmail.com) wrote:
HOLY CRAP IT WORKS 8@
Hey, great! ;)
...almost...
OK, clear_emulator_capabilities=0 solved the IRQ problem (which was,
as it turns out, the rawio problem)
My VM came up, both the tuners were there and after the firmware
install I was able to
* James Neave (robo...@gmail.com) wrote:
On Fri, Feb 25, 2011 at 12:06 AM, Chris Wright chr...@sous-sol.org wrote:
* James Neave (robo...@gmail.com) wrote:
OK, here's my latest dmesg with amd_iommu_dump and debug with no quiet
http://pastebin.com/JxEwvqRA
Yeah, that's what I expected
* James Neave (robo...@gmail.com) wrote:
On Fri, Feb 25, 2011 at 11:02 PM, James Neave robo...@gmail.com wrote:
On Fri, Feb 25, 2011 at 10:47 PM, James Neave robo...@gmail.com wrote:
On Fri, Feb 25, 2011 at 12:06 AM, Chris Wright chr...@sous-sol.org wrote:
* James Neave (robo...@gmail.com
* James Neave (robo...@gmail.com) wrote:
libvirtError: this function is not supported by the connection driver:
Unable to reset PCI device :00:14.4: no FLR, PM reset or bus reset
available
Right, libvirt is more restrictive than qemu-kvm (forgot you were using
libvirt here).
There is
* James Neave (robo...@gmail.com) wrote:
OK, here's my latest dmesg with amd_iommu_dump and debug with no quiet
http://pastebin.com/JxEwvqRA
Yeah, that's what I expected:
[0.724403] AMD-Vi: DEV_ALIAS_RANGE devid: 08:00.0 flags:
00 devid_to: 00:14.4
[0.724439] AMD-Vi:
* James Neave (robo...@gmail.com) wrote:
Just out of interest, what kind of mileage would I expect out of
buying a shiny new PCIe tuner?
Hard to say. One advantage would be if it's using MSI or MSI-X
interrupts.
Can I pass through PCIe?
Often, yes (still some caveats w.r.t. extended config
* Chigurupati, Chaks (ch...@wichorus.com) wrote:
If my hardware is VT-d capable and the host is latest linux+kvm with all
the needed VT-d support but the guest is an older linux (say 2.6.27), will
I be able to use PCI pass-through to hot-plug a PCI device from one guest
to another guest? Any
0.14 recap
- keeping schedule on wiki was helpful
- changelog was helpful
- testing (could even more emphasis could be improved)
- -rc cycles
- -rc2 and final release just hours
0.15
- tentative date July 1st
- qapi
- qed features
- virtagent?
- depends on whether to terminate in qemu vs
* James Neave (robo...@gmail.com) wrote:
On Tue, Feb 22, 2011 at 1:51 AM, Chris Wright chr...@sous-sol.org wrote:
* James Neave (robo...@gmail.com) wrote:
Does anybody know the debug kernel switches for iommu?
Two helpful kernel commandline options are:
amd_iommu_dump debug (and drop
* Alex Williamson (alex.william...@redhat.com) wrote:
I don't know why you're getting -EBUSY for this device, but maybe we can
start from a clean slate and see if it helps. Here's what I would
suggest:
I bet this is an AMD IOMMU box. Can we get full dmesg?
--
To unsubscribe from this list:
* James Neave (robo...@gmail.com) wrote:
Finally, here is the very latest dmesg:
http://pastebin.com/9HE61K62
OK, this is an AMD IOMMU box.
[0.00] ACPI: IVRS cfcf9830 000E0 (v01 AMD RD890S 00202031
AMD )
It's discovered and enalbed properly:
[0.698992]
://bugzilla.kernel.org/show_bug.cgi?id=29232
Extremely reproducible. Looks like it's a result of this kernel change:
commit 47970b1b2aa64464bc0a9543e86361a622ae7c03
Author: Chris Wright chr...@sous-sol.org
Date: Thu Feb 10 15:58:56 2011 -0800
pci: use security_capable() when
QAPI and QMP
- Anthony adding a new wiki page to describe all of this
- specified in formal schema using JSON
- includes documenation in javadoc-like syntax
- can generate api (possibly protocol) docs
- documenting each command and expected errors
- creates marshalling functions and C
Please send in any agenda items you are interested in covering.
thanks,
-chris
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Automated builds and testing
- found broken 32-bit
- luiz suggested running against maintainer trees
- daniel gollub offered to take on maintenance
- integration with kvm-autotest?
- lucas, daniel, stefan...
- testing each git commit is probably overkill and too expensive
- current autotest
Please send in any agenda items you are interested in covering.
thanks,
-chris
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
KVM upstream merge: status, plans, coordination
- Jan has a git tree, consolidating
- qemu-kvm io threading is still an issue
- Anthony wants to just merge
- concerns with non-x86 arch and merge
- concerns with big-bang patch merge and following stability
- post 0.14 conversion to glib
Please send in any agenda items you are interested in covering.
thanks,
-chris
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
* Chris Wright (chr...@redhat.com) wrote:
Please send in any agenda items you are interested in covering.
No agenda, this week's call is cancelled.
thanks,
-chris
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo
Please send in any agenda items you are interested in covering.
thanks,
-chris
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
KVM Forum 2011
- expand the scope? yes, continue up the stack
- how long? 2 days (maybe 2 1/2 - 3 space permitting)
- where? Vancouver with LinuxCon
Spice guest agent:
- virt agent, matahari, spice agent...what is in spice agent?
- spice char device
- mouse, copy 'n paste, screen resolution
+) will fail if the file
doesn't have owner write permissions. libvirt already gives us
ownership of the file, so we can toggle this around the short
usage window ourselves.
Signed-off-by: Alex Williamson alex.william...@redhat.com
Acked-by: Chris Wright chr...@redhat.com
---
hw/device
* Prasad Joshi (p.g.jo...@student.reading.ac.uk) wrote:
I have few (may be stupid) questions on this
From: Chris Wright [chr...@sous-sol.org]
That's the issue. The IOMMU has a set of page tables for each DeviceID.
For most devices, the DeviceID is the same as the Bus:Dev.Func (the PCI
* Prasad Joshi (p.g.jo...@student.reading.ac.uk) wrote:
Is the answer
All PCI buses located behind a PCI-PCI bridge must reside between the
seondary bus number and the subordinate bus number (inclusive).
00:14.4 PCI bridge: ATI Technologies Inc SBx00 PCI to PCI Bridge
* Prasad Joshi (p.g.jo...@student.reading.ac.uk) wrote:
From: Chris Wright [chr...@sous-sol.org]
I would like to know the same thing
for the PCIe GPU card connected to my machine. If GPU card is also sitting
behind the bridge then the hardware may be useless for the project. :(
The GPU
* Chris Wright (chr...@redhat.com) wrote:
Please send in any agenda items you are interested in covering.
No agenda, today's call is cancelled.
Also, given people's holiday and vacation schedules, next week's call is
cancelled. Talk again after the New Year.
thanks,
-chris
--
To unsubscribe
* Prasad Joshi (p.g.jo...@student.reading.ac.uk) wrote:
I am facing a problem with enabling the IOMMU.
Dec 21 15:50:57 prasad-kvm kernel: [0.00] Aperture pointing to e820
RAM. Ignoring.
Dec 21 15:50:57 prasad-kvm kernel: [0.00] Your BIOS doesn't leave a
aperture memory
* Prasad Joshi (p.g.jo...@student.reading.ac.uk) wrote:
From: Chris Wright [chr...@sous-sol.org]
I have enabled IOMMU in the BIOS, but I am not sure why it is still asking
to enabled IOMMU in BIOS. Do I need to worry about this?
It's unfortunate wording. It's telling you
* Prasad Joshi (p.g.jo...@student.reading.ac.uk) wrote:
From: kvm-ow...@vger.kernel.org [kvm-ow...@vger.kernel.org] on behalf of
Chris Wright [chr...@sous-sol.org]
Yes I am using AMD processor and ASUS motherboard. Both of them have the
IOMMU support, atleast it is mentioned on the Xen
* Prasad Joshi (p.g.jo...@student.reading.ac.uk) wrote:
Besides when I insert the pci_stub module, it emits a messages
[ 49.197112] pci-stub: invalid id string
I don't know why?
It's just broken error message. The commit b439b1d (PCI: pci-stub: add
pci_stub.ids parameter) created that. I
* Prasad Joshi (p.g.jo...@student.reading.ac.uk) wrote:
From: Chris Wright [chr...@sous-sol.org]
Sent: 21 December 2010 19:29
To: Prasad Joshi
Cc: Chris Wright; kvm@vger.kernel.org; Tejun Heo
Subject: Re: Query on IOMMU
* Prasad Joshi (p.g.jo...@student.reading.ac.uk) wrote
* Prasad Joshi (p.g.jo...@student.reading.ac.uk) wrote:
The following condition from __attach_device() returns the error.
static int __attach_device(struct device *dev,
struct protection_domain *domain)
{
...
if (alias_data-domain != NULL
alias_data-domain !=
Please send in any agenda items you are interested in covering.
thanks,
-chris
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
* Chris Wright (chr...@redhat.com) wrote:
Please send in any agenda items you are interested in covering.
No agenda, today's call is cancelled.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http
* Jes Sorensen (jes.soren...@redhat.com) wrote:
Any chance you could fix your cronjob to send out the CFA a day earlier?
15 hrs before is a bit short notice.
Sure.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More
Please send in any agenda items you are interested in covering.
thanks,
-chris
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
-agaw--;
}
Reviewed-by: Sheng Yang sh...@linux.intel.com
Acked-by: Chris Wright chr...@sous-sol.org
CC iommu mailing list and David.
Ping...
I think this fix also qualifies for stable (.35 and .36).
Still not merged?
David, do you plan to pick this one up?
thanks,
-chris
* Jes Sorensen (jes.soren...@redhat.com) wrote:
On 12/07/10 00:51, Chris Wright wrote:
Please send in any agenda items you are interested in covering.
thanks,
-chris
No agenda, no replies
Call canceled I presume?
Indeed, next week, then pick up next year
Please send in any agenda items you are interested in covering.
thanks,
-chris
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
* Rik van Riel (r...@redhat.com) wrote:
On 12/02/2010 08:18 PM, Chris Wright wrote:
* Rik van Riel (r...@redhat.com) wrote:
Keep track of which task is running a KVM vcpu. This helps us
figure out later what task to wake up if we want to boost a
vcpu that got preempted.
Unfortunately
* Srivatsa Vaddagiri (va...@linux.vnet.ibm.com) wrote:
On Thu, Dec 02, 2010 at 11:14:16AM -0800, Chris Wright wrote:
Perhaps it should be a VM level option. And then invert the notion.
Create one idle domain w/out hlt trap. Give that VM a vcpu per pcpu
(pin in place probably). And have
* Srivatsa Vaddagiri (va...@linux.vnet.ibm.com) wrote:
On Fri, Dec 03, 2010 at 05:27:52PM +0530, Srivatsa Vaddagiri wrote:
On Thu, Dec 02, 2010 at 11:14:16AM -0800, Chris Wright wrote:
Perhaps it should be a VM level option. And then invert the notion.
Create one idle domain w/out hlt
* Srivatsa Vaddagiri (va...@linux.vnet.ibm.com) wrote:
On Fri, Dec 03, 2010 at 09:28:25AM -0800, Chris Wright wrote:
* Srivatsa Vaddagiri (va...@linux.vnet.ibm.com) wrote:
On Thu, Dec 02, 2010 at 11:14:16AM -0800, Chris Wright wrote:
Perhaps it should be a VM level option
* Srivatsa Vaddagiri (va...@linux.vnet.ibm.com) wrote:
On Fri, Dec 03, 2010 at 09:29:06AM -0800, Chris Wright wrote:
That's what Marcelo's suggestion does w/out a fill thread.
There's one complication though even with that. How do we compute the
real utilization of VM (given
* Anthony Liguori (anth...@codemonkey.ws) wrote:
On 12/03/2010 11:58 AM, Chris Wright wrote:
* Srivatsa Vaddagiri (va...@linux.vnet.ibm.com) wrote:
On Fri, Dec 03, 2010 at 09:29:06AM -0800, Chris Wright wrote:
That's what Marcelo's suggestion does w/out a fill thread.
There's one complication
* Rik van Riel (r...@redhat.com) wrote:
On 12/02/2010 07:50 PM, Chris Wright wrote:
+/*
+ * Yield the CPU, giving the remainder of our time slice to task p.
+ * Typically used to hand CPU time to another thread inside the same
+ * process, eg. when p holds a resource other threads are waiting
* Alex Williamson (alex.william...@redhat.com) wrote:
Signed-off-by: Alex Williamson alex.william...@redhat.com
---
hw/pci.h |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/hw/pci.h b/hw/pci.h
index 34955d8..7c52637 100644
--- a/hw/pci.h
+++ b/hw/pci.h
@@
1 - 100 of 394 matches
Mail list logo