From: Weidong Han weidong@intel.com
Add this to support hot remove assigned device.
Acked-by: Mark McLoughlin mar...@redhat.com
Signed-off-by: Weidong Han weidong@intel.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/libkvm/libkvm.c b/libkvm/libkvm.c
index 92ffe10..a559a0d
From: Weidong Han weidong@intel.com
free_assigned_device just frees device from qemu, it should also
deassign the device from guest when guest exits or hot remove
assigned device.
Acked-by: Mark McLoughlin mar...@redhat.com
Signed-off-by: Weidong Han weidong@intel.com
Signed-off-by: Avi
From: Weidong Han weidong@intel.com
Just wrap assign_device and assign_irq, no functional changes
Acked-by: Mark McLoughlin mar...@redhat.com
Signed-off-by: Weidong Han weidong@intel.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/qemu/hw/device-assignment.c
From: Avi Kivity a...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/qemu/pc-bios/bios.bin b/qemu/pc-bios/bios.bin
index 3a7d7c2..04c1f86 100644
Binary files a/qemu/pc-bios/bios.bin and b/qemu/pc-bios/bios.bin differ
--
To unsubscribe from this list: send the line unsubscribe
From: Yang Zhang Yang Zhang
remove redundant args of pci_vga_init(),isa_vga_init(),
rtc_init() in ia64.
Signed-off-by: Yang Zhang yang.zh...@intel.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/kernel/ia64/hack-module.awk b/kernel/ia64/hack-module.awk
index d0ef130..2e4e05f 100644
From: Weidong Han weidong@intel.com
When hot remove assigned device, should deassign it
from guest and free it from qemu.
assign_dev_update_irqs may not be invoked when hot add a
device, so need to assign irq after device assignment in
init_assigned_device.
Acked-by: Mark McLoughlin
From: Weidong Han weidong@intel.com
MMIO of some devices are not page aligned, such as some EHCI
controllers and virtual Realtek NIC in guest. Current guest
bios doesn't guarantee the start address of MMIO page aligned.
This may result in failure of device assignment, because KVM
only allow
From: Weidong Han weidong@intel.com
only need to set assigned_dev_id for deassignment, use
match-flags to judge and deassign it.
Acked-by: Mark McLoughlin mar...@redhat.com
Signed-off-by: Weidong Han weidong@intel.com
Signed-off-by: Avi Kivity a...@redhat.com
diff --git
From: Avi Kivity a...@redhat.com
Windows 2008 accesses this MSR often on context switch intensive workloads;
since we run in guest context with the guest MSR value loaded (so swapgs can
work correctly), we can simply disable interception of rdmsr/wrmsr for this
MSR.
A complication occurs since
Matthew Wilcox wrote:
On Fri, Feb 13, 2009 at 04:32:47PM +, Mark McLoughlin wrote:
- Secondary Bus Reset (SBR) allows software to trigger a reset on all
devices (and functions) behind a PCI bridge.
- A PCI Power Management D-state transition (D3hot to D0) can be used
to reset a
Han, Weidong wrote:
Last qemu merge broke device assignment hotplug. It didn't call
qemu_pci_hot_assign_device in pci_device_hot_add for device assignment hot add,
and also missed device assignment hotplug command in pci_add command. This
patchset fixes this issue. Note that this patchset
Zhang, Xiantao wrote:
Agree, it should go to Tony's Tree in theory, but we have to push it into Avi's
tree first to fix an build issue. So please help to commit the patch to
kvm.git with Tony's Ack, Thanks!
Applied both patches, thanks.
--
error compiling committee.c: too many arguments
Amit Shah wrote:
setup_msrs() should be called when entering long mode to save the
shadow state for the 64-bit guest state.
Using vmx_set_efer() in enter_lmode() removes some duplicated code
and also ensures we call setup_msrs(). We can safely pass the value
of shadow_efer to vmx_set_efer() as
Han, Weidong wrote:
MMIO of some devices are not page aligned, such as some EHCI
controllers and virtual Realtek NIC in guest. Current guest
bios doesn't guarantee the start address of MMIO page aligned.
This may result in failure of device assignment, because KVM
only allow to register page
Yu Zhao wrote:
Greetings,
Following patches are intended to support SR-IOV capability in the
Linux kernel. With these patches, people can turn a PCI device with
the capability into multiple ones from software perspective, which
will benefit KVM and achieve other purposes such as QoS, security,
I'm trying to use ballooning with kvm-83.
Although I'm able to limit the guest's memory, when I try to increase it right after
that, I get vballoon: page allocation failure. order:0 followed by a kernel
panic.
Is it expected?
The guest is running Debian Lenny with 2.6.26 kernel. It had
Tomasz Chmielewski wrote:
I'm trying to use ballooning with kvm-83.
Although I'm able to limit the guest's memory, when I try to increase
it right after that, I get vballoon: page allocation failure.
order:0 followed by a kernel panic.
Is it expected?
The guest is running Debian Lenny with
Bugs item #2633594, was opened at 2009-02-24 15:37
Message generated for change (Settings changed) made by avik
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2633594group_id=180599
Please note that this message will contain a full copy of the comment
On Tue, Feb 24, 2009 at 09:57:19AM -0500, Mark Bidewell wrote:
-- Forwarded message --
From: Mark McLoughlin mar...@redhat.com
Date: Tue, Feb 24, 2009 at 9:36 AM
Subject: Re: Fedora 11 Alpha on KVM-84
To: Mark Bidewell mark.bidew...@alumni.clemson.edu
On Tue, 2009-02-24
If you use -vnc, then KVM runs and just sits there on the command line. It
doesn't prompt you when it's ready or anything. So you can connect via VNC as
soon as you start KVM. You connect with VNC just like you normally would to a
server running a regular VNC server.
--Brian Jackson
On
Fermín Manzanedo Guzmán schrieb:
Hi.
In order to improve virtualization capabilities to our company we are
trying to use KVM instead other techonolgies.
Our servers haven't X-Window System enabled due to performance and
security criteria.
¿Is it possible to install KVM guests whitout X?
Dustin Kirkland a écrit :
Howdy-
I recently merged kvm-84 into Ubuntu Jaunty.
We're experiencing corruption of the VM's screen. The text becomes
garbled through any one of a number of vectors. Our bug report with
screenshots can be found at:
*
Bugs item #2633594, was opened at 2009-02-24 13:37
Message generated for change (Comment added) made by een4dja
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=2633594group_id=180599
Please note that this message will contain a full copy of the comment
Glauber, Gerd,
See comments on
http://sourceforge.net/tracker2/?func=detailaid=2627272group_id=180599atid=893831
regarding the version variable. Looks fishy.
From: Matt T. Yourst you...@users.sourceforge.net
This issue just appeared in kvm-84 when running on 2.6.28.7 (x86-64)
with PREEMPT
Avi Kivity wrote:
Han, Weidong wrote:
MMIO of some devices are not page aligned, such as some EHCI
controllers and virtual Realtek NIC in guest. Current guest
bios doesn't guarantee the start address of MMIO page aligned.
This may result in failure of device assignment, because KVM
only allow
On Tue, Feb 24, 2009 at 12:01 PM, Aurelien Jarno aurel...@aurel32.net wrote:
This is most probably fixed in git, commit
7def4ba752cf629043e884dac8541fa5114c4c91
Great. Which git?
I checked:
* git://git.kernel.org/pub/scm/linux/kernel/git/avi/kvm.git
And I noticed Debian in your sig, so I
Dustin Kirkland wrote:
On Tue, Feb 24, 2009 at 12:01 PM, Aurelien Jarno aurel...@aurel32.net wrote:
This is most probably fixed in git, commit
7def4ba752cf629043e884dac8541fa5114c4c91
Great. Which git?
kvm-userspace.git. That changeset merged against QEMU SVN which is
where
On Tue, Feb 24, 2009 at 3:29 PM, Anthony Liguori anth...@codemonkey.ws wrote:
kvm-userspace.git. That changeset merged against QEMU SVN which is where
the fix really happened.
Okay, hmm... I've applied this fix (plus another queued one that
Anthony sent my way).
I'm still seeing the screen
subscribe kvm
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
subscribe kvm
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
subscribe kvm
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
You should send to majord...@vger.kernel.org
not kvm@vger.kernel.org
see below
Thanks
Atsushi SAKAI
Josh Borke joshbo...@gmail.com wrote:
subscribe kvm
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info
Hi, Jes
I have fixed it and the patches has been in kvm.git's master branch,
please retry :)
Xiantao
-Original Message-
From: Jes Sorensen [mailto:j...@sgi.com]
Sent: Wednesday, February 25, 2009 12:25 AM
To: Sheng Yang
Cc: Avi Kivity; kvm-i...@vger.kernel.org;
On Tue, Feb 24, 2009 at 06:47:38PM +0800, Avi Kivity wrote:
Yu Zhao wrote:
Greetings,
Following patches are intended to support SR-IOV capability in the
Linux kernel. With these patches, people can turn a PCI device with
the capability into multiple ones from software perspective, which
I can confirm it on ia64 platform with kvm-84 and kvm-userspace upstream
source. Another issue is that the text color is not correct.
Xiantao
Aurelien Jarno wrote:
Dustin Kirkland a écrit :
Howdy-
I recently merged kvm-84 into Ubuntu Jaunty.
We're experiencing corruption of the VM's
35 matches
Mail list logo