similar to: [RFC/PATCH 04/15] preparation: split sysinfo defintions for kvm use

Displaying 20 results from an estimated 200 matches similar to: "[RFC/PATCH 04/15] preparation: split sysinfo defintions for kvm use"

2008 Mar 20
0
[RFC/PATCH 08/15] kvm-s390: intercepts for privileged instructions
From: Carsten Otte <cotte at de.ibm.com> From: Christian Borntraeger <borntraeger at de.ibm.com> This patch introduces in-kernel handling of some intercepts for privileged instructions: handle_set_prefix() sets the prefix register of the local cpu handle_store_prefix() stores the content of the prefix register to memory handle_store_cpu_address() stores the cpu number of
2008 Mar 20
34
[RFC/PATCH 00/15] kvm on big iron
This patch series introduces a backend for kvm to run on IBM System z machines that uses the mainframe's sie virtualization capability. This work runs 64bit guests on z800/z890/z900/z990/z9/z10 class machines with a 64bit linux host. Userspace will follow once we're done brushing it over. The patch queue consists of the following patches, which can be applied in sequence on top of kvm.git
2008 Mar 20
34
[RFC/PATCH 00/15] kvm on big iron
This patch series introduces a backend for kvm to run on IBM System z machines that uses the mainframe's sie virtualization capability. This work runs 64bit guests on z800/z890/z900/z990/z9/z10 class machines with a 64bit linux host. Userspace will follow once we're done brushing it over. The patch queue consists of the following patches, which can be applied in sequence on top of kvm.git
2005 Oct 21
1
Display images
Hi! First of all, sorry for my english. I have one problem. I'm creating a server to install PC's with PXE (dhcpd, tftp, nfs, etc...). And, at the syslinux moment, the image (splash.lss/logo.16/...) is not displayed, but the text into boot.msg works ok (colors and background ok). I copied files from Knoppix, Fedora and others... But it's the same: No image, but text and colors ok.
2020 Feb 11
0
[PATCH 01/62] KVM: SVM: Add GHCB definitions
From: Tom Lendacky <thomas.lendacky at amd.com> Extend the vmcb_safe_area with SEV-ES fields and add a new 'struct ghcb' which will be used for guest-hypervisor communication. Signed-off-by: Tom Lendacky <thomas.lendacky at amd.com> Signed-off-by: Joerg Roedel <jroedel at suse.de> --- arch/x86/include/asm/svm.h | 42 ++++++++++++++++++++++++++++++++++++++ 1 file
2020 Apr 28
0
[PATCH v3 01/75] KVM: SVM: Add GHCB definitions
From: Tom Lendacky <thomas.lendacky at amd.com> Extend the vmcb_safe_area with SEV-ES fields and add a new 'struct ghcb' which will be used for guest-hypervisor communication. Signed-off-by: Tom Lendacky <thomas.lendacky at amd.com> Signed-off-by: Joerg Roedel <jroedel at suse.de> --- arch/x86/include/asm/svm.h | 42 ++++++++++++++++++++++++++++++++++++++ 1 file
2020 Apr 28
0
[PATCH v3 03/75] KVM: SVM: Use __packed shorthand
From: Borislav Petkov <bp at alien8.de> I guess we can do that ontop. Signed-off-by: Joerg Roedel <jroedel at suse.de> --- arch/x86/include/asm/svm.h | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/arch/x86/include/asm/svm.h b/arch/x86/include/asm/svm.h index e4e9f6bacfaa..9adbf69f003c 100644 --- a/arch/x86/include/asm/svm.h +++
2020 Jul 14
0
[PATCH v4 03/75] KVM: SVM: Use __packed shorthand
From: Borislav Petkov <bp at alien8.de> Use the shorthand to make it more readable. No functional changes. Signed-off-by: Joerg Roedel <jroedel at suse.de> --- arch/x86/include/asm/svm.h | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/arch/x86/include/asm/svm.h b/arch/x86/include/asm/svm.h index 0420250b008b..af91ced0f370 100644 ---
2020 Aug 24
0
[PATCH v6 02/76] KVM: SVM: Add GHCB definitions
From: Tom Lendacky <thomas.lendacky at amd.com> Extend the vmcb_safe_area with SEV-ES fields and add a new 'struct ghcb' which will be used for guest-hypervisor communication. Signed-off-by: Tom Lendacky <thomas.lendacky at amd.com> Signed-off-by: Joerg Roedel <jroedel at suse.de> --- arch/x86/include/asm/svm.h | 45 +++++++++++++++++++++++++++++++++++++-
2016 Jul 13
1
[PATCH 1/2] ttm: remove special handling of coherent objects
TTM-allocated coherent objects were populated using the DMA API and accessed using the mapping it returned to workaround coherency issues. These issues seem to have been solved, thus remove this extra case to handle and use the regular kernel mapping functions. Signed-off-by: Alexandre Courbot <acourbot at nvidia.com> --- drm/nouveau/nouveau_bo.c | 61
2016 Oct 12
1
domain schema fails to validate sysinfo element
I'm puzzled why virt-xml-checker rejects minimal config xml if it includes sysinfo element: <domain type='kvm'> <name>example</name> <sysinfo> </sysinfo> </domain> with the following error: Relax-NG validity error : Extra element sysinfo in interleave minimal.xml:3: element sysinfo: Relax-NG validity error : Element domain failed to validate
2010 Jul 07
1
obtaining sysinfo for domU from dom0
I got a strange problem: I need to get sysinfo() data from domU in my application, running in dom0. Right now I using a userspace daemon in every domU, updating information in xenstore, and my application read this information... But I think, it really strange: why we can not get those info directly from PV kernel without going to kernel and back to userspace multiple times? Is any way to get
2012 Apr 07
0
[PATCH 05/14] kvm tools: Add virtio-mmio support
From: Asias He <asias.hejun at gmail.com> This patch is based on Sasha's 'kvm tools: Add support for virtio-mmio' patch. ioeventfds support is added which was missing in the previous one. VQ size/align is still not supported. It adds support for the new virtio-mmio transport layer added in 3.2-rc1. The purpose of this new layer is to allow virtio to work on systems which
2012 Apr 07
0
[PATCH 05/14] kvm tools: Add virtio-mmio support
From: Asias He <asias.hejun at gmail.com> This patch is based on Sasha's 'kvm tools: Add support for virtio-mmio' patch. ioeventfds support is added which was missing in the previous one. VQ size/align is still not supported. It adds support for the new virtio-mmio transport layer added in 3.2-rc1. The purpose of this new layer is to allow virtio to work on systems which
2014 Jul 08
8
[PATCH v4 0/6] drm: nouveau: memory coherency on ARM
Another revision of this patchset critical for GK20A to operate. Previous attempts were exclusively using either TTM's regular page allocator or the DMA API one. Both have their advantages and drawbacks: the page allocator is fast but requires explicit synchronization on non-coherent architectures, whereas the DMA allocator always returns coherent memory, but is also slower, creates a
2016 May 16
0
Wine release 1.9.10
The Wine development release 1.9.10 is now available. What's new in this release (see below for details): - High resolution ("Retina") rendering option on Mac OS X. - More compatible directory enumeration. - A number of C++ runtime fixes. - Video output improvements. - Various bug fixes. The source is available from the following locations:
2012 Dec 03
21
Issue about domU missing interrupt
Hi developers, I met some domU issues and the log suggests missing interrupt. Details from here: http://www.gossamer-threads.com/lists/xen/users/263938#263938 In summary, this is the suspicious log: (XEN) vmsi.c:122:d32767 Unsupported delivery mode 3 I''ve checked the code in question and found that mode 3 is an ''reserved_1'' mode. I want to trace down the source of this
2011 Nov 15
2
[RFC] kvm tools: Add support for virtio-mmio
This patch adds support for the new virtio-mmio transport layer added in 3.2-rc1. The purpose of this new layer is to allow virtio to work on systems which don't necessarily support PCI, such as embedded systems. To apply the patch on top of the KVM tools tree, you must first pull Linus' tree on top. Also, CONFIG_VIRTIO_MMIO=y should be set in the guest kernel. This is an early RFC,
2011 Nov 15
2
[RFC] kvm tools: Add support for virtio-mmio
This patch adds support for the new virtio-mmio transport layer added in 3.2-rc1. The purpose of this new layer is to allow virtio to work on systems which don't necessarily support PCI, such as embedded systems. To apply the patch on top of the KVM tools tree, you must first pull Linus' tree on top. Also, CONFIG_VIRTIO_MMIO=y should be set in the guest kernel. This is an early RFC,
2008 Jul 31
0
Users and multiple group defintion
Hi, I have a virtual user defined in class users Class A inherits users and uses override to add another group to the user with User[''user''} {group +> ''group''} class B inherits users and does the same for another group. in rare cases, class A and class B are on the same machine. I know that if class B inherits class A which inherits users works, but I