From: Heiko Carstens [EMAIL PROTECTED]
Add changes to s390 memory management which are necessary to use the s390
hardware assisted virtualization facility. For this the upper halve of each
page table needs to be reserved so the hardware can save extended page status
bits for the guest and the
From: Heiko Carstens [EMAIL PROTECTED]
Add interface which allows a process to start a virtual machine.
To keep things easy each thread group is allowed to have only one
virtual machine and each thread of the thread group can only control
one virtual cpu of the virtual machine. All the
From: Christian Borntraeger [EMAIL PROTECTED]
This patch adds functionality to detect if the kernel runs under an s390host
hypervisor. A macro MACHINE_IS_GUEST is exported for device drivers. This
allows drivers to skip device detection if the systems runs non-virtualized.
Signed-off-by:
From: Carsten Otte [EMAIL PROTECTED]
This driver provides a simple virtualized console. Userspace can
use read/write to its console to pass the data to the host.
Signed-off-by: Carsten Otte [EMAIL PROTECTED]
---
drivers/s390/Kconfig |5 +
drivers/s390/guest/Makefile|
From: Christian Borntraeger [EMAIL PROTECTED]
This patches fixes the accouting of guest cpu time. As sie is executed via a
system call, all guest operations were accounted as system time. To fix this
we define a per thread sie context. Before issuing the sie instruction we
enter this context and
I think it would be better to use hvc_console as Xen now uses it too.
Carsten Otte wrote:
+ if (!MACHINE_IS_GUEST)
+ return 0;
+ register_external_interrupt(0x1234, guest_tty_ext_handler);
This is an interesting way to get input data from the console :-) How
many
On Friday 11 May 2007 21:00, Anthony Liguori wrote:
I think it would be better to use hvc_console as Xen now uses it too.
I dont know hvc_console, but I will have a look at it.
Carsten Otte wrote:
+ if (!MACHINE_IS_GUEST)
+ return 0;
+ register_external_interrupt(0x1234,
Let me ask what may seem to be a naive question to the linux world. I
see you are doing a lot off solid work on adding block and network
devices. The code for block and network devices
is implemented in different ways. I've also seen this difference of
inerface/implementation on Xen.
Hence my
On Friday 11 May 2007, Carsten Otte wrote:
This patch adds support for a new bus type that manages paravirtualized
devices. The bus uses the s390 diagnose instruction to query devices, and
match them with the corresponding drivers.
It seems that the diagnose instruction is really the only
ron minnich wrote:
Avoiding too much detail, in the plan 9 world, read and write of data
to a disk is via file read and write system calls.
For low speed devices, I think paravirtualization doesn't make a lot of
sense unless it's absolutely required. I don't know enough about s390
to know if
Carsten Otte wrote:
From: Christian Borntraeger [EMAIL PROTECTED]
This is the host counterpart for the virtual network device driver. This
driver
has an char device node where the hypervisor can attach. It also
has a kind of dumb switch that passes packets between guests. Last but not
I re-worked the QEMU patches based on feedback from Dor and Anthony. Here is
the changelog:
1) Got rid of the extern kvm_context from qemu/pc/apic.c. This function is
now wrapped by qemu-kvm which assigns proper kvm_context on behalf of the
caller.
2) Added support for a command line
Signed-off-by: Gregory Haskins [EMAIL PROTECTED]
---
kernel/Kbuild |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/kernel/Kbuild b/kernel/Kbuild
index e9bcda7..103a179 100644
--- a/kernel/Kbuild
+++ b/kernel/Kbuild
@@ -1,5 +1,5 @@
EXTRA_CFLAGS := -I$(src)/include
Non-performance critical code is made more awkward by having to always define
both #ifdef KVM and if (kvm_allowed). Define kvm_allowed = 0 by
default. Anthony Ligouri is credited with the idea.
Signed-off-by: Gregory Haskins [EMAIL PROTECTED]
---
qemu/qemu-kvm.c |9 -
1 files
Signed-off-by: Gregory Haskins [EMAIL PROTECTED]
---
qemu/qemu-kvm.c |1 +
qemu/vl.c |5 +
qemu/vl.h |1 +
3 files changed, 7 insertions(+), 0 deletions(-)
diff --git a/qemu/qemu-kvm.c b/qemu/qemu-kvm.c
index d4419a3..faa4684 100644
--- a/qemu/qemu-kvm.c
+++
Signed-off-by: Gregory Haskins [EMAIL PROTECTED]
---
qemu/hw/apic.c | 20 +++-
qemu/hw/pc.c| 30 +-
qemu/qemu-kvm.c | 49 +++--
qemu/qemu-kvm.h |2 ++
qemu/vl.c |2 +-
qemu/vl.h
On Friday 11 May 2007 22:21, Anthony Liguori wrote:
Any feel for the performance relative to the bridging code? The
bridging code is a pretty big bottle neck in guest=guest communications
in Xen at least.
Last time I checked it we had a quite decent guest to guest performance in the
This has the latest feedback from Anthony incorporated
Signed-off-by: Gregory Haskins [EMAIL PROTECTED]
---
qemu/hw/apic.c | 20 +++-
qemu/hw/pc.c| 29 -
qemu/qemu-kvm.c | 49 +++--
Eric Van Hensbergen wrote:
On 5/11/07, Anthony Liguori [EMAIL PROTECTED] wrote:
cpu% ls /net/ether0
/net/ether0/0
/net/ether0/1
/net/ether0/2
/net/ether0/addr
/net/ether0/clone
/net/ether0/ifstats
/net/ether0/stats
This smells a bit like XenStore which I think most will
19 matches
Mail list logo