From: Glauber Costa glom...@redhat.com
For a while now, we are issuing a rdmsr instruction to find out which
msrs in our save list are really supported by the underlying machine.
However, it fails to account for kvm-specific msrs, such as the pvclock
ones.
This patch moves then to the beginning
From: Frederik Deweerdt frederik.dewee...@xprog.eu
On a 32 bits compile, commit 3da0dd433dc399a8c0124d0614d82a09b6a49bce
introduced the following warnings:
arch/x86/kvm/mmu.c: In function ‘kvm_set_pte_rmapp’:
arch/x86/kvm/mmu.c:770: warning: cast to pointer from integer of different size
From: Joerg Roedel joerg.roe...@amd.com
The nested SVM code emulates a #vmexit caused by a request
to open the irq window right in the request function. This
is a bug because the request function runs with preemption
and interrupts disabled but the #vmexit emulation might
sleep. This can cause a
From: Alexander Graf ag...@suse.de
If event_inj is valid on a #vmexit the host CPU would write
the contents to exit_int_info, so the hypervisor knows that
the event wasn't injected.
We don't do this in nested SVM by now which is a bug and
fixed by this patch.
Signed-off-by: Alexander Graf
From: Joerg Roedel joerg.roe...@amd.com
This patch adds a tracepoint for the event that the guest
executed the SKINIT instruction. This information is
important because SKINIT is an SVM extenstion not yet
implemented by nested SVM and we may need this information
for debugging hypervisors that do
From: Joerg Roedel joerg.roe...@amd.com
With all important informations now delivered through
tracepoints we can savely remove the nsvm_printk debugging
code for nested svm.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git
From: Joerg Roedel joerg.roe...@amd.com
This patch adds a special tracepoint for the event that a
nested #vmexit is injected because kvm wants to inject an
interrupt into the guest.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git
From: Joerg Roedel joerg.roe...@amd.com
This patch adds a tracepoint for every #vmexit we get from a
nested guest.
Signed-off-by: Joerg Roedel joerg.roe...@amd.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index 907af3f..edf6e8b
From: Mark Langsdorf mark.langsd...@amd.com
New AMD processors (Family 0x10 models 8+) support the Pause
Filter Feature. This feature creates a new field in the VMCB
called Pause Filter Count. If Pause Filter Count is greater
than 0 and intercepting PAUSEs is enabled, the processor will
From: Marcelo Tosatti mtosa...@redhat.com
There's no kvm_run argument anymore.
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index a4580d6..364263a 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@ -3387,7 +3387,7 @@ out:
*
From: Zhai, Edwin edwin.z...@intel.com
New NHM processors will support Pause-Loop Exiting by adding 2 VM-execution
control fields:
PLE_Gap- upper bound on the amount of time between two successive
executions of PAUSE in a loop.
PLE_Window - upper bound on the amount of time a
From: Darrick J. Wong djw...@us.ibm.com
I'm seeing an oops condition when kvm-intel and kvm-amd are modprobe'd
during boot (say on an Intel system) and then rmmod'd:
# modprobe kvm-intel
kvm_init()
kvm_init_debug()
kvm_arch_init() -- stores debugfs dentries internally
From: Jan Kiszka jan.kis...@web.de
Push the NMI-related singlestep variable into vcpu_svm. It's dealing
with an AMD-specific deficit, nothing generic for x86.
Acked-by: Gleb Natapov g...@redhat.com
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
arch/x86/include/asm/kvm_host.h |1 -
From: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/Documentation/kvm/api.txt b/Documentation/kvm/api.txt
index 126419f..f504e0b 100644
--- a/Documentation/kvm/api.txt
+++ b/Documentation/kvm/api.txt
@@ -631,7 +631,8 @@ such as migration.
From: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
--
To unsubscribe from this list: send the line unsubscribe kvm-commits in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
From: Arnd Bergmann a...@arndb.de
With big endian userspace, we can't quite figure out if a pointer
is 32 bit (shifted 32) or 64 bit when we read a 64 bit pointer.
This is what happens with dirty logging. To get the pointer interpreted
correctly, we thus need Arnd's patch to implement a compat
From: Ed Swierk eswi...@aristanetworks.com
Support for Xen PV-on-HVM guests can be implemented almost entirely in
userspace, except for handling one annoying MSR that maps a Xen
hypercall blob into guest address space.
A generic mechanism to delegate MSR writes to userspace seems overkill
and
From: Glauber Costa glom...@redhat.com
When we migrate a kvm guest that uses pvclock between two hosts, we may
suffer a large skew. This is because there can be significant differences
between the monotonic clock of the hosts involved. When a new host with
a much larger monotonic time starts
From: Sridhar Samudrala s...@us.ibm.com
Enable UFO on the host tap device if supported and allow setting UFO
on virtio-net in the guest.
Acked-by: Mark McLoughlin mar...@redhat.com
Signed-off-by: Sridhar Samudrala s...@us.ibm.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git
From: Glauber Costa glom...@redhat.com
abort() needs it. Build with kvm disabled breaks without it.
Signed-off-by: Glauber Costa glom...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/qemu-kvm.h b/qemu-kvm.h
index d6748c7..0bb2516 100644
--- a/qemu-kvm.h
+++
From: Glauber Costa glom...@redhat.com
they are just a tiny wrapper around qemu memory functions. Drop' em
Signed-off-by: Glauber Costa glom...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/qemu-kvm-x86.c b/qemu-kvm-x86.c
index a44ae67..e8ec59d 100644
---
From: Glauber Costa glom...@redhat.com
Upstream now has tests for irqchip_in_kernel. It differs from our
signature, as it does not take any parameter. For consistency, convert
our usage. Also, use a field in KVMState to store it, so we can have the
exact same function as qemu upstream does.
From: Glauber Costa glom...@redhat.com
kvm_arch_run() takes a vcpu context parameter, but CPUState should
do. Convert it, as well as the functions that it end up calling
Signed-off-by: Glauber Costa glom...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git
From: Glauber Costa glom...@redhat.com
There are no more users of kvm_run inside vcpu context. Remove it, and
leave the one inside CPUState for the job.
Signed-off-by: Glauber Costa glom...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/qemu-kvm.c b/qemu-kvm.c
index
From: Jan Kiszka jan.kis...@web.de
This simplifies working with new features without having to update the
locally mirrored headers. It also reduces the diff to upstream.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/configure
From: Glauber Costa glom...@redhat.com
It is not used anywhere, so just blow it away.
Signed-off-by: Glauber Costa glom...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/qemu-kvm.c b/qemu-kvm.c
index 35a3be4..199e620 100644
--- a/qemu-kvm.c
+++ b/qemu-kvm.c
@@ -441,9
From: Glauber Costa glom...@redhat.com
qemu already stores id information in a couple of places.
No need to do it here too.
Signed-off-by: Glauber Costa glom...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/qemu-kvm.c b/qemu-kvm.c
index 8647dc9..15b9129 100644
---
From: Gerd Hoffmann kra...@redhat.com
Signed-off-by: Gerd Hoffmann kra...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/configure b/configure
index fdefcf6..ff7e8b2 100755
--- a/configure
+++ b/configure
@@ -1424,7 +1424,7 @@ if test $kvm_cap_pit != no ; then
#endif
From: Gerd Hoffmann kra...@redhat.com
Use new rom loading infrastructure.
Devices can simply register option roms now.
Signed-off-by: Gerd Hoffmann kra...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/hw/device-assignment.c b/hw/device-assignment.c
index
From: Gleb Natapov g...@redhat.com
Otherwise some cpus may start executing code before others
are fully initialized.
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/qemu-kvm.c b/qemu-kvm.c
index 15b9129..b6c36e0 100644
--- a/qemu-kvm.c
From: Marcelo Tosatti mtosa...@redhat.com
* upstream-merge: (103 commits)
scsi disk block descriptor v2
Add some chipset doc links
user: fix libuser build messages
sparc64: fix done instruction pc
qemu: allow pulseaudio to be the default
Fixed wacom emulation
rom loader: also try
From: Gleb Natapov g...@redhat.com
Use qemu_send_packet_raw to send gracious arp. This will ensure that
vnet header is handled properly.
Acked-by: Mark McLoughlin mar...@redhat.com
Signed-off-by: Gleb Natapov g...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git
From: Gleb Natapov g...@redhat.com
mp_state, unlike other cpu state, can be changed not only from vcpu
context it belongs to, but by other vcpus too. That makes its loading
from kernel/saving back not safe if mp_state value is changed inside
kernel between load and save. For example vcpu 1 loads
From: Avi Kivity a...@redhat.com
Signed-off-by: Avi Kivity a...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/roms/pcbios b/roms/pcbios
index da5ff65..e5c3144 16
--- a/roms/pcbios
+++ b/roms/pcbios
@@ -1 +1 @@
-Subproject commit
From: Marcelo Tosatti mtosa...@redhat.com
* upstream-merge:
Only IDE needs limits for CHS configuration
MIPS jazz: create isa bus
ksm support
multiboot: Limit number of multiboot modules
pcnet: Extend hardware reset
multiboot: Fix cmdline of modules
qcow2: Bring synchronous
From: Eduardo Habkost ehabk...@redhat.com
A new register was added to the load/save list on commit
d283d5a65a2bdcc570065267be21848bd6fe3d78, but MSR_COUNT was not updated, leading
to potential stack corruption on kvm_arch_save_regs().
The following registers are saved by kvm_arch_save_regs():
From: Glauber Costa glom...@redhat.com
This is a patch actually written by Juan, which, according to him,
he plans on posting to qemu.git. Problem is that linux defines
u64 in a way that is type-uncompatible with uint64_t.
I am including it here, because it is a dependency to my patch series
From: Glauber Costa glom...@redhat.com
We have no use for it anymore. Only trace of it was in vcpu_create.
Make it disappear.
Signed-off-by: Glauber Costa glom...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/qemu-kvm.c b/qemu-kvm.c
index 2ddd08e..b58a457 100644
---
From: Glauber Costa glom...@redhat.com
Currently, the msrs involved in setting up pvclock are not saved over
migration and/or save/restore. This patch puts their value in special
fields in our CPUState, and deal with them using vmstate.
kvm also has to account for it, by including them in the
From: Kamalesh Babulal kamal...@linux.vnet.ibm.com
qemu-0.11.50 build breaks with
CCx86_64-softmmu/monitor.o
cc1: warnings being treated as errors
/other/srcs/qemu-kvm/monitor.c: In function 'print_cpu_iter':
/other/srcs/qemu-kvm/monitor.c:450: error: format '%ld' expects type 'long
int',
From: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/monitor.c b/monitor.c
index b73225c..b4c4878 100644
--- a/monitor.c
+++ b/monitor.c
@@ -447,6 +447,8 @@ static void print_cpu_iter(QObject *obj, void *opaque)
if
From: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/net.c b/net.c
index a9f5ced..a23b75c 100644
--- a/net.c
+++ b/net.c
@@ -1603,7 +1603,9 @@ static TAPState *net_tap_fd_init(VLANState *vlan,
int vnet_hdr)
{
From: Glauber Costa glom...@redhat.com
Intention is to merge with upstream version in the following patch.
Doing as a separate step to help identify any further issues.
Signed-off-by: Glauber Costa glom...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/qemu-kvm-x86.c
From: Glauber Costa glom...@redhat.com
this whole tpr thing does not belong in common code. Move it to i386 specific
files.
Signed-off-by: Glauber Costa glom...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/qemu-kvm-x86.c b/qemu-kvm-x86.c
index eb9d13a..0dcbd44
From: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/kvm/user/config-x86-common.mak b/kvm/user/config-x86-common.mak
index 3f279ed..63cca42 100644
--- a/kvm/user/config-x86-common.mak
+++ b/kvm/user/config-x86-common.mak
@@ -2,9 +2,8 @@
From: Glauber Costa glom...@redhat.com
Register a vmstate handler for kvmclock. The goal here is to pass
information about current time to migration, so we avoid going backwards
or jumping too much. We use our plain new ioctls for that.
Signed-off-by: Glauber Costa glom...@redhat.com
From: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/qemu-kvm.c b/qemu-kvm.c
index bfee8bd..4c13628 100644
--- a/qemu-kvm.c
+++ b/qemu-kvm.c
@@ -853,6 +853,7 @@ void post_kvm_run(kvm_context_t kvm, CPUState *env)
{
From: Glauber Costa glom...@redhat.com
qemu.git uses an array of 100 entries for the msr list, which is arguably large
enough (tm).
I propose we follow the same path, for two reasons:
1) ease future merge.
2) avoid stack overflow problems that had already began to appear
Signed-off-by:
From: Glauber Costa glom...@redhat.com
Replace ours with qemu.git version. A couple of functions go
unused, and are deleted.
Signed-off-by: Glauber Costa glom...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/qemu-kvm-x86.c b/qemu-kvm-x86.c
index f4d9e7a..eb9d13a
From: Michael S. Tsirkin m...@redhat.com
KVM does not virtualize low address bits for memory accesses, so we must
require that PCI BAR size is a multiple of 4K for passthrough to work
(this also guarantees that address is 4K aligned).
Users of recent linux kernels can force resource size up to
From: Glauber Costa glom...@redhat.com
Signed-off-by: Glauber Costa glom...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/kvm-all.c b/kvm-all.c
index 5e03cd9..d02e94b 100644
--- a/kvm-all.c
+++ b/kvm-all.c
@@ -865,7 +865,6 @@ int kvm_vm_ioctl(KVMState *s, int type,
From: Glauber Costa glom...@redhat.com
We can use upstream version of handle_io, there called kvm_handle_io()
Signed-off-by: Glauber Costa glom...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/kvm-all.c b/kvm-all.c
index 0a8aa4c..5e03cd9 100644
--- a/kvm-all.c
+++
From: Glauber Costa glom...@redhat.com
At this point, vcpu arguments are passed only for the fd field.
We already provide that in env, as kvm_fd. Replace it.
Signed-off-by: Glauber Costa glom...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/cpu-defs.h b/cpu-defs.h
From: Jan Kiszka jan.kis...@siemens.com
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
diff --git a/sync b/sync
index 0bbd488..4821b84 100755
--- a/sync
+++ b/sync
@@ -119,6 +119,8 @@ def __hack(data):
line = sub(r'flags', r'kvm_pt_regs_flags', line)
mce = False
From: Jan Kiszka jan.kis...@siemens.com
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
diff --git a/external-module-compat-comm.h b/external-module-compat-comm.h
index 47fdc86..de8ab23 100644
--- a/external-module-compat-comm.h
+++ b/external-module-compat-comm.h
@@ -993,3 +993,10 @@ unsigned
From: Jan Kiszka jan.kis...@siemens.com
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
diff --git a/external-module-compat-comm.h b/external-module-compat-comm.h
index de8ab23..8f56f11 100644
--- a/external-module-compat-comm.h
+++ b/external-module-compat-comm.h
@@ -1000,3 +1000,7 @@ static
From: Jan Kiszka jan.kis...@siemens.com
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
diff --git a/linux-2.6 b/linux-2.6
index abb015a..8fdcaf6 16
--- a/linux-2.6
+++ b/linux-2.6
@@ -1 +1 @@
-Subproject commit abb015ac65852287c7a7c243c8cdee966a38854d
+Subproject commit
From: Jan Kiszka jan.kis...@siemens.com
kmap_atomic_to_page was not exported before 2.6.32, and adding a compat
wrapper for it is impossible due to further missing exports. This breaks
x86-32 modules under CONFIG_HIGHMEM.
So avoid its use via a crude hack: nested_svm_map callers receive the
From: Jan Kiszka jan.kis...@siemens.com
Apply DESTDIR also on old module renaming and depmod.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
diff --git a/Makefile b/Makefile
index 37a14e1..8314833 100644
--- a/Makefile
+++ b/Makefile
@@ -49,11 +49,11 @@ sync:
install:
mkdir -p
From: Jan Kiszka jan.kis...@siemens.com
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
diff --git a/external-module-compat-comm.h b/external-module-compat-comm.h
index 8f56f11..fd3aab7 100644
--- a/external-module-compat-comm.h
+++ b/external-module-compat-comm.h
@@ -1004,3 +1004,9 @@ static
From: Jan Kiszka jan.kis...@siemens.com
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
diff --git a/external-module-compat-comm.h b/external-module-compat-comm.h
index fd3aab7..2892ace 100644
--- a/external-module-compat-comm.h
+++ b/external-module-compat-comm.h
@@ -957,7 +957,7 @@ static
From: Jan Kiszka jan.kis...@siemens.com
Ported from OpenSUSE: Provide an udev rule that not only sets the group
of /dev/kvm but also triggers automatic loading of the kernel modules
during boot.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
diff --git a/Makefile b/Makefile
index
From: Jan Kiszka jan.kis...@siemens.com
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
diff --git a/external-module-compat-comm.h b/external-module-compat-comm.h
index a8f8a2f..cec117b 100644
--- a/external-module-compat-comm.h
+++ b/external-module-compat-comm.h
@@ -1003,3 +1003,13 @@ int
From: Jan Kiszka jan.kis...@siemens.com
This was used to carry CONFIG_KVM_TRACE into the build. We no longer
have such switches, so drop the infrastructure. We can easily
reintroduce it once required.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
diff --git a/.gitignore b/.gitignore
index
repository: /home/vadimr/shares/kvm-guest-drivers-windows
branch: master
commit 8d7431f1080345c06abdb2ec334fb654da2a59fa
Author: Vadim Rozenfeld vroze...@redhat.com
Date: Sun Oct 25 13:04:09 2009 +0200
[PATCH] Add MSI-X support
Signed-off-by: Vadim Rozenfeld vroze...@redhat.com
repository: C:/dev/kvm-guest-drivers-windows
branch: master
commit 1d364940b008413e3ceb5adc06e6c5677e732c83
Author: Yan Vugenfirer yvuge...@redhat.com
Date: Sun Oct 25 14:20:37 2009 +0200
[WIN-GUEST-DRIVERS] viostor driver. Code cleanup. Getting rid of the
Registry stuff.
repository: /home/vadimr/shares/kvm-guest-drivers-windows
branch: master
commit eca6d92722fc669d5b3fdb99182a0a8e3db6a38b
Author: Vadim Rozenfeld vroze...@redhat.com
Date: Sun Oct 25 15:45:17 2009 +0200
[PATCH] viostor driver. fix broken xp build
Signed-off-by: Vadim Rozenfeld
repository: C:/dev/kvm-guest-drivers-windows
branch: master
commit c7561ecd1c1d6fd7c119cd45f43579f7cae0bd48
Author: Yan Vugenfirer yvuge...@redhat.com
Date: Sun Oct 25 15:59:53 2009 +0200
[WIN-GUEST-DRIVERS]viostor driver. Complete SRBs at DPC level
Signed-off-by: Vadim
repository: C:/dev/kvm-guest-drivers-windows
branch: master
commit c8a200effa3a9082319ae0130073186ede86cdd4
Author: Yan Vugenfirer yvuge...@redhat.com
Date: Sun Oct 25 16:02:24 2009 +0200
[WIN-GUEST-DRIVERS] viostor driver. Complete SRBs at DPC level. Fixing
previous commit.
repository: C:/dev/kvm-guest-drivers-windows
branch: master
commit 05200e17936d50e4a203b23ac3870c9ffa30396c
Author: Yan Vugenfirer yvuge...@redhat.com
Date: Sun Oct 25 16:04:27 2009 +0200
[WIN-GUEST-DRIVERS] viostor driver. Add support for serial number feature.
Signed-off-by:
repository: C:/dev/kvm-guest-drivers-windows
branch: master
commit 597c5be5ab7fd44aa4e127c5cec028964588e9a7
Author: Yan Vugenfirer yvuge...@redhat.com
Date: Sun Oct 25 16:06:30 2009 +0200
[WIN-GUEST-DRIVERS] Add MSI-X support for viostor driver
Signed-off-by: Vadim
repository: C:/dev/kvm-guest-drivers-windows
branch: master
commit 4ab13fe7d8375604846bbc8a01f3a4ea44fafee2
Author: Yan Vugenfirer yvuge...@redhat.com
Date: Sun Oct 25 17:08:24 2009 +0200
[WIN-GUEST_DRIVERS] User Windows 7 DDK (build 7600.16385.0) as a default
build environment.
repository: C:/dev/kvm-guest-drivers-windows
branch: master
commit f3cde3d0e011c64bae6f6b95d7eb34c87d141487
Author: Yan Vugenfirer yvuge...@redhat.com
Date: Sun Oct 25 17:08:24 2009 +0200
[WIN-GUEST_DRIVERS] Use Windows 7 DDK (build 7600.16385.0) as a default
build environment.
73 matches
Mail list logo