On (Wed) Jul 01 2009 [22:03:17], Zhang Qian wrote:
> Hi,
>
> I'd like to know if there is a way to communicate the VM's guest OS
> from the hypervisor node which hosts the VM.
> As you know, Xen provide xenstore command to do it, I can use it to
> pass some parameters into guest OS, is there a sim
On 07/02/2009 12:41 AM, Erik Jacobson wrote:
I wanted to post in to the thread the lastest test run.
Avi Kivity provided some ideas to try. I had mixed luck. I'd like to try
this again if we have any thoughts on the vpid/ept issue, or any other
ideas for drilling down on this. Avi Kivity ment
Problem: It is impossible to feed filenames with the character colon because
qemu interprets such names as a protocol. For example filename scsi:0, is
interpreted as a protocol by name "scsi".
This patch allows user to escape colon characters. For example the above
filename can now be expressed ei
On 07/02/2009 12:24 PM, sudhir kumar wrote:
Please send the tarball as a separate attachment. Your email is scary.
OK, I will resend the patch. Sorry for this scary email. :)
--
Yolkfull
Regards,
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to maj
On 07/02/2009 11:49 AM, Martin Bligh wrote:
From: root
Signed-off-by: root
---
;-)
Can we get these signed off by a person please? Preferably with a real email
address (see the DCO, in top level directory)
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a mess
From: root
Signed-off-by: root
---
;-)
Can we get these signed off by a person please? Preferably with a real email
address (see the DCO, in top level directory)
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majord
This fix is already accepted in kvm.git
> -Original Message-
> From: Yang Shi [mailto:yang@windriver.com]
> Sent: Thursday, July 02, 2009 10:55 AM
> To: Liu Yu-B13201; holl...@us.ibm.com; a...@redhat.com
> Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.org;
> linuxppc-...@ozlabs.org
With the latest kernel building KVM for PPC, got integer overflow
error in kvm_main.c file. The root cause is that compiler consider
KVM_PAGES_PER_HPAGE as signed long type, however it should be
unsigned long type.
So, change it to unsigned long type in include/asm/kvm_host.h
Signed-off-by: Yang
Since include/asm/mmu-fsl-booke.h was replaced by include/asm/mmu-book3e.h,
fix e500_tlb.h to reflect the change and fix e500_tlb.c to align with the
new page size macro definition in include/asm/mmu-book3e.h.
Signed-off-by: Yang Shi
---
arch/powerpc/kvm/e500_tlb.c |8
arch/powerpc/
Suresh Siddha writes:
> On Tue, 2009-06-30 at 12:36 -0700, Eric W. Biederman wrote:
>> Dropped irqs.. Driver hangs because it is waiting for an irq. Hardware
>> hangs because it is waiting for the cpu to process the irq.
>>
>> Potentially we get a level triggered irq that is never acked by
>>
On Wed, Jul 1, 2009 at 12:49 AM, Avi Kivity wrote:
> On 07/01/2009 07:18 AM, Yinghai Lu wrote:
>>
>> [ 1966.343286]
>> [ 1966.343288] ===
>> [ 1966.356756] [ INFO: possible circular locking dependency detected ]
>> [ 1966.356759] 2.6.31-rc1-tip-00
On Wed, Jul 1, 2009 at 4:27 AM, Michael S. Tsirkin wrote:
> Kill extra \). Also escape ! for clarity and bourne shell
> compatibility.
Agreed. Looks like this one was introduced during the last merge from
qemu. It bit me too.
:-Dustin
> Signed-off-by: Michael S. Tsirkin
> ---
>
> This patch f
On Tue, 2009-06-30 at 12:36 -0700, Eric W. Biederman wrote:
> Dropped irqs.. Driver hangs because it is waiting for an irq. Hardware
> hangs because it is waiting for the cpu to process the irq.
>
> Potentially we get a level triggered irq that is never acked by
> the cpu that won't arm until th
I wanted to post in to the thread the lastest test run.
Avi Kivity provided some ideas to try. I had mixed luck. I'd like to try
this again if we have any thoughts on the vpid/ept issue, or any other
ideas for drilling down on this. Avi Kivity mentioned LVM in the thread.
I continued to just ex
On Wed, 2009-07-01 at 06:30 -0700, Gleb Natapov wrote:
> KVM would like to provide x2APIC interface to a guest without emulating
> interrupt remapping device. The reason KVM prefers guest to use x2APIC
> is that x2APIC interface is better virtualizable and provides better
> performance than mmio xA
On Wed, 2009-07-01 at 10:16 -0700, Martin Bligh wrote:
> LMR: me too, hate putting binaries in source tree, but the alternative
> option is to provide separate *.tar.bz2 for all the binary utils, and
> I don't sure which way is better.
>
> >>>
> >>> Yes, I don't have a clear ide
Gregory Haskins wrote:
>
> + eventfd = eventfd_ctx_fileget(file);
> + if (IS_ERR(file)) {
> + ret = PTR_ERR(file);
> + goto fail;
> + }
> +
> + irqfd->eventfd = eventfd;
> +
>
Just noticed the typo (return "eventfd" but error-check "file"). Looks
lik
This reverts commit 6c20e1442bb1c62914bb85b7f4a38973d2a423ba.
To my understanding, it became obsolete with the advent of the more
robust check in mmu_alloc_roots (89da4ff17f). Moreover, it prevents
the conceptually safe pattern
1. set sregs
2. register mem-slots
3. run vcpu
by setting a stick
Finally got it to work on a 32 bit OS (Ubuntu 9.04), both on the
phenom 9950 and another machine. I haven't tried running any guests
yet.
I suppose the TSC patch doesn't work on 64 bit hosts.
Thanks for all your help,
Ben
On Fri, Jun 26, 2009 at 1:38 AM, Alexander Graf wrote:
>
> Well, your ma
Am 30.06.2009 um 15:32 schrieb Anthony Liguori:
Kevin Wolf wrote:
Avi Kivity schrieb:
The qcow block driver format is no longer maintained and likely
contains
serious data corruptors. Urge users to stay away for it, and
advertise
the new and improved replacement.
Signed-off-by: Avi Kiv
LMR: me too, hate putting binaries in source tree, but the alternative
option is to provide separate *.tar.bz2 for all the binary utils, and
I don't sure which way is better.
>>>
>>> Yes, I don't have a clear idea as well. It's currently under
>>> discussion...
>>>
>>
>> Is KVM
On 07/01/2009 07:18 PM, Martin Bligh wrote:
On Wed, Jul 1, 2009 at 8:57 AM, Lucas Meneghel Rodrigues
wrote:
On Wed, 2009-07-01 at 14:43 +0300, Alexey Eremenko wrote:
LMR: me too, hate putting binaries in source tree, but the alternative
option is to provide separate *.tar.bz2 for al
This patch implements MSR interface to local apic as defines by x2apic
Intel specification.
Signed-off-by: Gleb Natapov
---
arch/x86/kvm/lapic.c | 193 ++
arch/x86/kvm/lapic.h |2 +
arch/x86/kvm/x86.c |7 ++-
3 files changed, 154 inserti
Directed EOI is specified by x2APIC, but is available even when lapic is
in xAPIC mode.
Signed-off-by: Gleb Natapov
---
arch/x86/include/asm/apicdef.h |2 ++
arch/x86/kvm/lapic.c | 38 ++
arch/x86/kvm/lapic.h |1 +
arch/x86/kvm/x8
This patch series implements x2APIC emulation for kvm. x2APIC is an MSR
interface to a local apic with performance/scalability enhancements. It
brings 32 bit apic ids (ids > 255 cannot be used without interrupt
remapping since MSR/IOAPIC still support 8 bit destination IDs), 64bit
ICR access, readi
Add "x2apic" string to extended features name array to be recognizable
by -cpu cputype,+x2apic command line option. If kvm kernel module does
not support x2apic the option will be trimmed from cpuid.
Signed-off-by: Gleb Natapov
---
target-i386/helper.c |2 +-
1 files changed, 1 insertions(+)
Commit 42f0a928 merged support for addr=... in option argument of -net
nic, but failed to update ipf_init1().
Commit 7a8f3ed9 merged support for addr=... in option argument of
-drive if=virtio, but failed to update ipf_init1().
Untested.
Signed-off-by: Markus Armbruster
---
hw/ipf.c |7 +++
Zhang Qian wrote:
I'd like to know if there is a configuration file for each KVM virtual
machine? I can define a domain by "virsh define" command, but where
the configuraiton parameters are persisted for the VM?
virsh is not a part of kvm, but rather libvirt; you should ask for
support for it
Disabled in merge commit a3b371477e3.
Signed-off-by: Markus Armbruster
---
hw/device-assignment.c | 11 +--
hw/pci.c |2 +-
hw/pci.h |1 +
3 files changed, 7 insertions(+), 7 deletions(-)
diff --git a/hw/device-assignment.c b/hw/device-assignment.c
On Wed, Jul 1, 2009 at 8:57 AM, Lucas Meneghel Rodrigues wrote:
> On Wed, 2009-07-01 at 14:43 +0300, Alexey Eremenko wrote:
>> LMR: me too, hate putting binaries in source tree, but the alternative
>> option is to provide separate *.tar.bz2 for all the binary utils, and
>> I don't sure which way is
We currently create this wq on module_init, which may be wasteful if the
host never creates a guest that uses irqfd. This patch changes the
algorithm so that the workqueue is only created when at least one guest
is using irqfd. The queue is cleaned up when the last guest using irqfd
is shutdown.
DEASSIGN allows us to optionally disassociate an IRQFD from its underlying
eventfd without destroying the eventfd in the process. This is useful
for conditions like live-migration which may have an eventfd associated
with a device and an IRQFD. We need to be able to decouple the guest
from the ev
eventfd currently emits a POLLHUP wakeup on f_ops->release() to generate a
"release" callback. This lets eventfd clients know if the eventfd is about
to go away and is very useful particularly for in-kernel clients. However,
until recently it is not possible to use this feature of eventfd in a
ra
(Applies to kvm.git/master:beeaacd1)
The following is the latest attempt to fix the races in irqfd/eventfd, as
well as restore DEASSIGN support. For more details, please read the patch
headers.
As always, this series has been tested against the kvm-eventfd unit test
and everything appears to be
On Wed, 2009-07-01 at 14:43 +0300, Alexey Eremenko wrote:
> LMR: me too, hate putting binaries in source tree, but the alternative
> option is to provide separate *.tar.bz2 for all the binary utils, and
> I don't sure which way is better.
Yes, I don't have a clear idea as well. It's currently unde
On 07/01/2009 06:48 PM, Gleb Natapov wrote:
Load updated register into kernel after INIT/SIPI. Otherwise
vcpu starts at the wrong address after SIPI.
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line "unsubscrib
Load updated register into kernel after INIT/SIPI. Otherwise
vcpu starts at the wrong address after SIPI.
Signed-off-by: Gleb Natapov
diff --git a/qemu-kvm-x86.c b/qemu-kvm-x86.c
index 1eb147e..5d3025a 100644
--- a/qemu-kvm-x86.c
+++ b/qemu-kvm-x86.c
@@ -1578,8 +1578,10 @@ uint32_t kvm_arch_get_s
Sheng Yang writes:
> On Tuesday 30 June 2009 20:28:08 Markus Armbruster wrote:
>> Sheng Yang writes:
>> > On Friday 26 June 2009 01:24:03 Avi Kivity wrote:
>> >> The impact of the hotplug changes on device assignment were too
>> >> difficult for me to fix up during the merge, so I disabled it
>>
On 07/01/2009 02:38 PM, Alexander Graf wrote:
kvm is supported on 32-bit hosts. Unfortunately since moving to
kvm-autotest I no longer test on 32-bit, I'll try to improve the
situation there.
If someone has spare cycles and can run kvm-autotest on their
hardware, that would improve kvm quali
On 07/01/2009 04:59 PM, Christoffer Dall wrote:
OK, my question is this:
If I want to tell QEMU to quit from within the KVM_RUN ioctl in a way
that causes QEMU to exit gracefully (e.g. free any allocated memory
etc.) what is the way to do that?
Have KVM_RUN return -ESOMETHING, qemu should
On 07/01/2009 04:56 PM, Michael Jinks wrote:
(Thanks Avi, and all. Sorry if my questions are basic. More of them below.)
On Wed, Jul 1, 2009 at 3:43 AM, Avi Kivity wrote:
On 06/30/2009 09:33 PM, Michael Jinks wrote:
I've looked but haven't found any way to attach a monitor process
Hi,
I'd like to know if there is a configuration file for each KVM virtual
machine? I can define a domain by "virsh define" command, but where
the configuraiton parameters are persisted for the VM?
Thanks in advance!
Regards,
Qian
--
To unsubscribe from this list: send the line "unsubscribe kv
Hi,
I'd like to know if there is a way to communicate the VM's guest OS
from the hypervisor node which hosts the VM.
As you know, Xen provide xenstore command to do it, I can use it to
pass some parameters into guest OS, is there a similar way in KVM?
Thanks in advance!
Regards,
Qian
--
To unsu
Hi Michael,
On Thu, 2009-06-18 at 11:27 -0400, Michael Goldish wrote:
> kvm_subprocess is a little weird in that it does two different things --
> handling of both non-interactive subprocesses and SSH sessions.
> With this approach I don't think we need to write an SSH subclass of
> kvm_spawn beca
OK, my question is this:
If I want to tell QEMU to quit from within the KVM_RUN ioctl in a way
that causes QEMU to exit gracefully (e.g. free any allocated memory
etc.) what is the way to do that?
I have tried setting EXIT_REASON to both KVM_EXIT_EXCEPTION and
KVM_EXIT_SHUTDOWN, but QEMU stays in
(Thanks Avi, and all. Sorry if my questions are basic. More of them below.)
On Wed, Jul 1, 2009 at 3:43 AM, Avi Kivity wrote:
> On 06/30/2009 09:33 PM, Michael Jinks wrote:
>>
>> I've looked but haven't found any way to attach a monitor process to
>> an already-running guest. Is this possible?
Avi Kivity writes:
> On 06/30/2009 10:36 PM, Eric W. Biederman wrote:
The short version is I don't know what work arounds we will ultimately
decide to deploy to work with real hardware.
I have been seriously contemplating causing a cpu hot-unplug request
to fail if we are
KVM would like to provide x2APIC interface to a guest without emulating
interrupt remapping device. The reason KVM prefers guest to use x2APIC
is that x2APIC interface is better virtualizable and provides better
performance than mmio xAPIC interface:
- msr exits are faster than mmio (no page t
Good day,
Alright, my bad. After closer studying I realized I had misread where the
defines were delimiting each function. :/ Sorry for the invalid report (and
yes, I had other issues setting up and running the modules, but I was pretty
sure the missing symbols were caused because of the define
This fixes segfault reported by Kevin Wolf,
and simplifies the code in msix_save.
Reported-by: Kevin Wolf
Signed-off-by: Michael S. Tsirkin
---
hw/msix.c | 12 +++-
1 files changed, 7 insertions(+), 5 deletions(-)
diff --git a/hw/msix.c b/hw/msix.c
index 4ab6da6..98c62a5 100644
--- a
control vector is saved/restored by virtio-pci,
it does not belong in virtio.
Signed-off-by: Michael S. Tsirkin
---
hw/virtio.c |3 ---
1 files changed, 0 insertions(+), 3 deletions(-)
diff --git a/hw/virtio.c b/hw/virtio.c
index 843be86..41e7ca2 100644
--- a/hw/virtio.c
+++ b/hw/virtio.c
@
Fixes a couple of save/load issues with qemu.git
Changes since v2:
Includes a better fix for virtio.
Michael S. Tsirkin (2):
fix segfault in msix_save
qemu: remove control vector save
hw/msix.c | 12 +++-
hw/virtio.c |3 ---
2 files changed, 7 insertions(+), 8 deletions(-)
Michael S. Tsirkin schrieb:
> This fixes segfault reported by Kevin Wolf,
> and simplifies the code in msix_save.
>
> Reported-by: Kevin Wolf
> Signed-off-by: Michael S. Tsirkin
I can confirm that this fixes the segfault for me.
Kevin
--
To unsubscribe from this list: send the line "unsubscrib
On Wed, Jul 01, 2009 at 02:50:14PM +0300, Michael S. Tsirkin wrote:
> This fixes segfault reported by Kevin Wolf,
> and simplifies the code in msix_save.
>
> Reported-by: Kevin Wolf
> Signed-off-by: Michael S. Tsirkin
For qemu-kvm, this supercedes e347f89a3d4773dfc22d8874c9906453d54768c7.
--
Avi Kivity wrote:
> On 06/29/2009 10:23 PM, Michael S. Tsirkin wrote:
>> This series switches kvm_io_device to slots_lock from kvm->lock mutex,
>> and uses that to rework io bus API. This takes less locks on data path,
>> and uses less lines of code. These changes will also be useful to serve
>> as
Fixes a couple of save/load issues with qemu.git
Michael S. Tsirkin (2):
fix segfault in msix_save
qemu: fix up load for msi-x
hw/msix.c | 12 +++-
hw/virtio.c |3 +++
2 files changed, 10 insertions(+), 5 deletions(-)
--
To unsubscribe from this list: send the line "unsubscri
This fixes segfault reported by Kevin Wolf,
and simplifies the code in msix_save.
Reported-by: Kevin Wolf
Signed-off-by: Michael S. Tsirkin
---
hw/msix.c | 12 +++-
1 files changed, 7 insertions(+), 5 deletions(-)
diff --git a/hw/msix.c b/hw/msix.c
index 4ab6da6..98c62a5 100644
--- a
Add missing load of control vector in virtio
Signed-off-by: Michael S. Tsirkin
---
hw/virtio.c |3 +++
1 files changed, 3 insertions(+), 0 deletions(-)
diff --git a/hw/virtio.c b/hw/virtio.c
index 843be86..e9dd7a0 100644
--- a/hw/virtio.c
+++ b/hw/virtio.c
@@ -665,6 +665,9 @@ int virtio_loa
On Tue, Jun 30, 2009 at 11:52 AM, sudhir kumar wrote:
> On Wed, Jun 17, 2009 at 2:59 AM, Lucas Meneghel Rodrigues
> wrote:
>> Adding iperf network performance test. Basically it tests
>> networking functionality, stability and performance of guest OSes.
>> This test is cross-platform -- i.e. it wo
On 01.07.2009, at 11:05, Avi Kivity wrote:
On 07/01/2009 08:57 AM, Duck wrote:
I'm on 32-bit Linux, kernel 2.6.27.7-smp. When I moved from kvm-83
to kvm-87 plus kvm-kmod-devel-87, my Linux host VMs ran fine. But
my XP0 host simply ran too slowly to be useable at all, and my
Windows 7
Kill extra \). Also escape ! for clarity and bourne shell
compatibility.
Signed-off-by: Michael S. Tsirkin
---
This patch fixes configure on next for me
configure |6 +++---
1 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/configure b/configure
index f76f511..b62e3d7 100755
-
On 06/24/2009 04:37 PM, Andre Przywara wrote:
Linux guests will try to enable access to the extended PCI config space
via the I/O ports 0xCF8/0xCFC on AMD Fam10h CPU. Since we (currently?)
don't use ECS, simply ignore write and read attempts.
Applied, thanks.
--
error compiling committee.c
On 06/25/2009 04:12 PM, Andre Przywara wrote:
If we want to trim the user provided CPUID bits for KVM to be not greater
than that of the host, we should
a) not remove the bits _after_ we sent them to the kernel and
b) not do the bitmangling on the original values while sending a copy
This fixes
On 06/29/2009 07:52 PM, Gregory Haskins wrote:
One idea I had to make it even clearer was to have a shutdown list
of irqfds per-kvm, together with the items list, and make work_struct for
shutdown global, not per-irqfd. We can then unconditionally do
list_move + schedule_work to shut down a
On 06/29/2009 06:18 PM, Walther Maldonado wrote:
Good day,
Today when attempting to compile and install the KVM module (kernel 2.6.30),
inserting the module would error with a number of unresolved symbols such as
preempt_notifier_register() not found.
Some code-browsing revealed that, even th
On Wed, Jul 01, 2009 at 11:53:26AM +0300, Avi Kivity wrote:
> On 06/29/2009 09:28 PM, Gregory Haskins wrote:
>> (Applies to kvm.git/master:4631e094)
>>
>> The following is the latest attempt to fix the races in irqfd/eventfd, as
>> well as restore DEASSIGN support. For more details, please read th
On 07/01/2009 08:57 AM, Duck wrote:
I'm on 32-bit Linux, kernel 2.6.27.7-smp. When I moved from kvm-83 to
kvm-87 plus kvm-kmod-devel-87, my Linux host VMs ran fine. But my XP0
host simply ran too slowly to be useable at all, and my Windows 7 host
wouldn't boot -- just crashed and restarted earl
On 07/01/2009 06:28 AM, Christoffer Dall wrote:
Hi all.
We are still working on our ARM port of KVM and we are managing to let
the guest decompress the kernel image and run from relocated address
and we can support enabling MMU before this.
Howver, to debug relocated micro-hypervisor for except
On 06/29/2009 09:28 PM, Gregory Haskins wrote:
(Applies to kvm.git/master:4631e094)
The following is the latest attempt to fix the races in irqfd/eventfd, as
well as restore DEASSIGN support. For more details, please read the patch
headers. I've restored the slow-work variant of the logic as a
On 06/30/2009 09:33 PM, Michael Jinks wrote:
In an attempt to get past unrelated interference I just set up an X
session with only an xterm, used that to launch VNC connecting to my
KVM test host, and tried to launch my test guest again. Same
behavior: Ctl-Alt patterns are ignored, as are any ot
On 06/30/2009 10:36 PM, Eric W. Biederman wrote:
The short version is I don't know what work arounds we will ultimately
decide to deploy to work with real hardware.
I have been seriously contemplating causing a cpu hot-unplug request
to fail if we are in ioapic mode and we have irqs routed to th
On Wednesday 01 July 2009 16:21:13 Avi Kivity wrote:
> On 07/01/2009 11:07 AM, Sheng Yang wrote:
> > One typo in commit: "KVM: convert custom marker based tracing to
> > event traces" caused:
> >
> > set_cr8: #GP, reserved bits 0x7f
> >
> > when try to boot up IA32e Windows guest.
> >
> > One value
On 07/01/2009 11:07 AM, Sheng Yang wrote:
One typo in commit: "KVM: convert custom marker based tracing to
event traces" caused:
set_cr8: #GP, reserved bits 0x7f
when try to boot up IA32e Windows guest.
One value has been written to R8 instead of specific register, then the
value of specific r
On 06/29/2009 07:05 PM, Jiri Slaby wrote:
There is a missing unlock on one fail path in ioapic_mmio_write,
fix that.
Applied, thanks.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message t
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Michael Tokarev wrote:
> Antoine Martin wrote:
> []
>> LINK x86_64-softmmu/qemu-system-x86_64
>> /usr/lib/gcc/x86_64-pc-linux-gnu/4.3.2/../../../../x86_64-pc-linux-gnu/bin/ld:
>>
>> cannot find -lpci
>>
>> What gives?
>
> Is it your system or who
On 06/29/2009 10:23 PM, Michael S. Tsirkin wrote:
This series switches kvm_io_device to slots_lock from kvm->lock mutex,
and uses that to rework io bus API. This takes less locks on data path,
and uses less lines of code. These changes will also be useful to serve
as basis for Greg's iosignalfd w
One typo in commit: "KVM: convert custom marker based tracing to
event traces" caused:
set_cr8: #GP, reserved bits 0x7f
when try to boot up IA32e Windows guest.
One value has been written to R8 instead of specific register, then the
value of specific register can be invalid as CR8. Guest RMW it,
On 07/01/2009 07:18 AM, Yinghai Lu wrote:
[ 1966.343286]
[ 1966.343288] ===
[ 1966.356756] [ INFO: possible circular locking dependency detected ]
[ 1966.356759] 2.6.31-rc1-tip-00978-g99123e5-dirty #438
[ 1966.356761] ---
On 01.07.2009, at 09:22, Andre Przywara wrote:
KVM provides an in-kernel feature to disable CPUID bits that are not
present in the current host. So there is no need here to duplicate
this
work. Additionally allows 3DNow! on capable processors, since the
restriction seems to apply to QEMU/TCG
KVM provides an in-kernel feature to disable CPUID bits that are not
present in the current host. So there is no need here to duplicate this
work. Additionally allows 3DNow! on capable processors, since the
restriction seems to apply to QEMU/TCG only.
Signed-off-by: Andre Przywara
---
target-i38
80 matches
Mail list logo