Luca Tettamanti wrote:
With GOOD_APIC apic_read_around is a nop, while apic_write_around is a
normal write. With !GOOD_APIC apic_write_around writes to the APIC reg
using xchg. With !GOOD_APIC and this patch:
--- include/asm-i386/apic.h~ 2007-04-26 05:08:32.0 +0200
+++
Li, Xin B wrote:
- set up a kvm main loop outside vl.c and cpu-exec.c.
- disable signals on ap threads, so that timer and network signals are
only handled on vcpu 0
I prefer to have a separate thread in qemu to execute asynchronous
logic, like the PIC/IOAPIC code.
A separate
Hello list,
My laptop is a Toshiba Tecra S4 (ntel(R) Core(TM)2 CPU T7200 @
2.00GHz), and I have a similar problem:
I trying with KVM-28 and a vanilla kernel, 2.6.22-rc4.
After upgrade my BIOS to the latest version available in Toshiba (3.20),
now I can insert the KVM-INTEL.KO module without
On Thu, 2007-06-14 at 16:10 +0200, Magicboiz wrote:
Hello list,
My laptop is a Toshiba Tecra S4 (ntel(R) Core(TM)2 CPU T7200 @
2.00GHz), and I have a similar problem:
I trying with KVM-28 and a vanilla kernel, 2.6.22-rc4.
After upgrade my BIOS to the latest version available in Toshiba
On Thu, 2007-06-14 at 17:06 +0200, Magicboiz wrote:
When I say hags, I mean: my whole computer hangs. Nothing works.
Crtl-Alt-F doesn't work. Magic-SyS Keys doesn't work. Hit my keyboard
desperately, doesn't work ;)
I dont get a SDL windows fullscreen. I can see an small black window
On 6/14/07, Magicboiz [EMAIL PROTECTED] wrote:
When I say hags, I mean: my whole computer hangs. Nothing works.
Crtl-Alt-F doesn't work. Magic-SyS Keys doesn't work. Hit my keyboard
desperately, doesn't work ;)
Since you have a APIC-capable system you can try with nmi_watchdog.
Append
with VNC option, we had better luck: we got an Oops!!:
Jun 14 17:37:35 linux kernel: [ 575.212000] BUG: unable to handle
kernel NULL pointer dereference at virtual address 0024
Jun 14 17:37:35 linux kernel: [ 575.212000] printing eip:
Jun 14 17:37:35 linux kernel: [ 575.212000] f92fc0b4
I've not reviewed the virtio patches but think I've gathered the gist of what
they're doing (puppies would probably help here)...
On Sunday 10 June 2007, Avi Kivity wrote:
There are probably more. Any ideas?
* watchdog timer
I recently knocked up a watchdog timer for Xen. The Linux-side
[EMAIL PROTECTED] wrote:
On Wednesday 13 June 2007, Caitlin Bestler wrote:
It can be done, but you'd also need a passthrough for the IOMMU in
that case, and you get a potential security hole: if a malicious
guest is smart enough to figure out IOMMU mappings from the device
to memory owned
Il Thu, Jun 14, 2007 at 11:26:29AM +0300, Avi Kivity ha scritto:
Luca Tettamanti wrote:
With GOOD_APIC apic_read_around is a nop, while apic_write_around is a
normal write. With !GOOD_APIC apic_write_around writes to the APIC reg
using xchg. With !GOOD_APIC and this patch:
---
Il Fri, Jun 15, 2007 at 12:53:24AM +0200, Luca Tettamanti ha scritto:
Il Thu, Jun 14, 2007 at 11:26:29AM +0300, Avi Kivity ha scritto:
Luca Tettamanti wrote:
With GOOD_APIC apic_read_around is a nop, while apic_write_around is a
normal write. With !GOOD_APIC apic_write_around writes to
On 6/15/07, Luca Tettamanti [EMAIL PROTECTED] wrote:
Il Fri, Jun 15, 2007 at 12:53:24AM +0200, Luca Tettamanti ha scritto:
Il Thu, Jun 14, 2007 at 11:26:29AM +0300, Avi Kivity ha scritto:
Luca Tettamanti wrote:
With GOOD_APIC apic_read_around is a nop, while apic_write_around is a
On Thursday 14 June 2007, Caitlin Bestler wrote:
Why not simply adopt the policy that if the IOMMU does not meet
the security requirements of the Hypervisor then it is not an
IOMMU as far as the Hypervisor is concerned?
More specificially, the Hypervisor should enable direct access
by a
Bugs item #1737598, was opened at 2007-06-15 10:13
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=1737598group_id=180599
Please note that this message will contain a full copy of
14 matches
Mail list logo