Hi,
I am going to use KVM on a headless machine with sound never on (even
not compiled in the kernel).
I'm just curious if there is a possibility to build the kvm-qemu
without all this sound/video stuff (or with minimum of it). In
particular, without alsa at all.
Has anybody tried to pass --disa
>
> Hi Wink,
>
> You can pull them from the list archives, or I can just send them directly to
> you. If you pull from the archive, be sure to get both the kernel and
> userspace series with the "v5" in the title.
>
> Note that what I currently would be able to send direct is a little more
> up
GPSI Announces Market Attack Into $1 Trillion Market!
Global Payment Solutions
Symbol: GPSI
Price: $0.03
GPSI announced its plans to address the huge influx of immigrant workers
into the US that need banking solutions that they otherwise would not
qualify for. This market is expected to represent
Newer userspace may run on an older kernel. Therefore we need a way to
check the capabilities of the kernel so that we can downgrade userspace
dynamically if necessary
Signed-off-by: Gregory Haskins <[EMAIL PROTECTED]>
---
qemu/qemu-kvm.c | 27 +++
user/kvmctl.c |
Signed-off-by: Gregory Haskins <[EMAIL PROTECTED]>
---
qemu/qemu-kvm.c | 27 +++
qemu/qemu-kvm.h |5 +
qemu/vl.c | 10 ++
qemu/vl.h |1 +
4 files changed, 43 insertions(+), 0 deletions(-)
diff --git a/qemu/qemu-kvm.c b/qemu/qemu-kvm.c
i
Signed-off-by: Gregory Haskins <[EMAIL PROTECTED]>
---
qemu/hw/apic.c | 20 +++-
qemu/hw/pc.c| 29 -
qemu/qemu-kvm.c | 49 +++--
qemu/qemu-kvm.h |2 ++
qemu/vl.h | 11 ++-
user/k
Signed-off-by: Gregory Haskins <[EMAIL PROTECTED]>
---
kernel/Kbuild |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/kernel/Kbuild b/kernel/Kbuild
index e9bcda7..103a179 100644
--- a/kernel/Kbuild
+++ b/kernel/Kbuild
@@ -1,5 +1,5 @@
EXTRA_CFLAGS := -I$(src)/include -inc
Non-performance critical code is made more awkward by having to always define
both "#ifdef KVM" and "if (kvm_allowed)". Define "kvm_allowed = 0" by
default. Anthony Ligouri is credited with the idea.
Signed-off-by: Gregory Haskins <[EMAIL PROTECTED]>
---
qemu/qemu-kvm.c |9 -
1 fil
Changelog from v5:
1) Moved eventfd patch to the end of the series and dropped from the public
release (for now...see the kernel-side comments for details)
Regards,
-Greg
-
This SF.net email is sponsored by DB2 Express
Do
Signed-off-by: Gregory Haskins <[EMAIL PROTECTED]>
---
drivers/kvm/kvm.h |6 ++
drivers/kvm/kvm_main.c | 23 ---
drivers/kvm/vmx.c |2 ++
3 files changed, 28 insertions(+), 3 deletions(-)
diff --git a/drivers/kvm/kvm.h b/drivers/kvm/kvm.h
index a9ee8bd
Signed-off-by: Gregory Haskins <[EMAIL PROTECTED]>
---
drivers/kvm/irqdevice.h |3 +++
drivers/kvm/kvm.h |1 +
drivers/kvm/lapic.c | 17 +
3 files changed, 21 insertions(+), 0 deletions(-)
diff --git a/drivers/kvm/irqdevice.h b/drivers/kvm/irqdevice.h
index 09
Signed-off-by: Gregory Haskins <[EMAIL PROTECTED]>
---
drivers/kvm/vmx.c | 57 -
drivers/kvm/vmx.h |3 +++
2 files changed, 55 insertions(+), 5 deletions(-)
diff --git a/drivers/kvm/vmx.c b/drivers/kvm/vmx.c
index 3ef5da8..f532c87 100644
Signed-off-by: Gregory Haskins <[EMAIL PROTECTED]>
---
drivers/kvm/Makefile |2
drivers/kvm/kernint.c | 149 +
drivers/kvm/kvm.h | 35 +
drivers/kvm/kvm_main.c | 198 ++-
drivers/kvm/lapic.c| 1418
drivers/kvm/svm.c
KVM would like to use the eventfd facility even as a module
Signed-off-by: Gregory Haskins <[EMAIL PROTECTED]>
---
fs/eventfd.c |3 +++
1 files changed, 3 insertions(+), 0 deletions(-)
diff --git a/fs/eventfd.c b/fs/eventfd.c
index 480e2b3..01414ef 100644
--- a/fs/eventfd.c
+++ b/fs/eventfd
The VCPU executes synchronously w.r.t. userspace today, and therefore
interrupt injection is pretty straight forward. However, we will soon need
to be able to inject interrupts asynchronous to the execution of the VCPU
due to the introduction of SMP, paravirtualized drivers, and asynchronous
hyper
The current code is geared towards using a user-mode (A)PIC. This patch adds
an "irqdevice" abstraction, and implements a "userint" model to handle the
duties of the original code. Later, we can develop other irqdevice models
to handle objects like LAPIC, IOAPIC, i8259, etc, as appropriate
Signe
Signed-off-by: Gregory Haskins <[EMAIL PROTECTED]>
---
drivers/kvm/vmx.c |6 +++---
1 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/drivers/kvm/vmx.c b/drivers/kvm/vmx.c
index 5386461..8ef6193 100644
--- a/drivers/kvm/vmx.c
+++ b/drivers/kvm/vmx.c
@@ -1954,13 +1954,13 @@ static
Signed-off-by: Gregory Haskins <[EMAIL PROTECTED]>
---
drivers/kvm/kvm.h | 60 +++
drivers/kvm/kvm_main.c | 94 ++--
2 files changed, 142 insertions(+), 12 deletions(-)
diff --git a/drivers/kvm/kvm.h b/drivers/kvm/k
Changelog:
1) Minor cleanup
2) Moved eventfd patch to end of series and dropped it from the public release
(for now). We dont technically need to signal userspace if PIT is enabled
since this wakes us up anyway. We can defer the eventfd/in-kernel-halt
conversation for later.
3) Bug fixed: PEND
What to do?
malysh:/var/log# uname -a
Linux malysh 2.6.18-4-xen-amd64 #1 SMP Fri May 4 02:40:51 UTC 2007
x86_64 GNU/Linux
kvm_amd21520 0
kvm68596 1 kvm_amd
kvm -no-acpi -hda /kvm/vdiskXP.qcow -cdrom /dev/cdrom1 -boot d -m 256
malysh kernel: general p
Bugs item #1721434, was opened at 2007-05-18 13:01
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1721434&group_id=180599
Please note that this message will contain a full copy
On 5/18/07, Anthony Liguori <[EMAIL PROTECTED]> wrote:
>
> > I also
> > am not sure the socket system call interface is quite what we want,
> > although it's a neat idea. It's also not that portable outside the
> > "everything is a Linux variant" world.
>
> A filesystem interface certainly isn't v
ron minnich wrote:
> Hi Anthony,
>
> I still feel that "how about a socket interface" is still focused on
> the "how to implement", and not "what the interface should be".
Right. I'm not trying to answer that question ATM. There are a number
of paravirt devices that would be useful in a virtual
I thought I would share this with the list:
If you are seeing double fault OOPS on the host while working with KVM, theres
a good chance you (or someone else) has tried to sleep while the guest-context
is still loaded. Perhaps this is obvious and/or well known to all of you. But
the occurren
>>> On Fri, May 18, 2007 at 1:36 AM, in message
<[EMAIL PROTECTED]>, "Wink Saville"
<[EMAIL PROTECTED]> wrote:
>>
>> This reproduces here. qemu works, so it's likely an interrupt being
>> lost. Can you try out Gregory's apic patchset?
>>
>
> Avi,
>
> I assume you mean the "v4 & v5" acpi patc
Hello,
I have an Intel Core 2 Duo running Ubuntu Feisty 2.6.20-15 in 32 Bit
mode. If I try to compile kvm-trunk ( kvm-24-gfbfe1dc ) and the modules
from git ( v2.6.22-rc1-gf552bf6 ) I get a few compiler errors and the
compiler stops.
Please find attached 2 patches to fix the errors.
Danie Hecken
Hello,
We release the script for OS Circular on QEMU/KQEMU/KVM. OS Circular
is Internet Disk Image Distributor for VM.
OS Circular depended on Xen-HVM and required the CPU which includes
virtualization extension(Intel-VT or AMD-SVM). The script enables to
run OS Circular on normal x86 CPU becaus
27 matches
Mail list logo