Re: debugging windows guests

2009-12-16 Thread Jan Kiszka
Raindog wrote: On 12/15/2009 3:39 PM, Jan Kiszka wrote: Raindog wrote: Hello, I am researching KVM as a malware analysis platform and had some questions about debugging the guest OS. In my case I intend to use windows guests. So my questsions are as follows: Questions: 1.

Re: debugging windows guests

2009-12-16 Thread Vadim Rozenfeld
On Wed, 2009-12-16 at 00:39 +0100, Jan Kiszka wrote: Raindog wrote: Hello, I am researching KVM as a malware analysis platform and had some questions about debugging the guest OS. In my case I intend to use windows guests. So my questsions are as follows: Questions: 1. What

Re: [PATCH 2/4] KVM: Extended shared_msr_global to per CPU

2009-12-16 Thread Avi Kivity
On 12/16/2009 07:48 AM, Sheng Yang wrote: shared_msr_global saved host value of relevant MSRs, but it have an assumption that all MSRs it tracked shared the value across the different CPUs. It's not true with some MSRs, e.g. MSR_TSC_AUX. Extend it to per CPU to provide the support of

Re: debugging windows guests

2009-12-16 Thread Alexander Graf
Am 16.12.2009 um 09:14 schrieb Vadim Rozenfeld vroze...@redhat.com: On Wed, 2009-12-16 at 00:39 +0100, Jan Kiszka wrote: Raindog wrote: Hello, I am researching KVM as a malware analysis platform and had some questions about debugging the guest OS. In my case I intend to use windows guests.

Re: [PATCH 4/4] KVM: VMX: Add instruction rdtscp support for guest

2009-12-16 Thread Avi Kivity
On 12/16/2009 07:48 AM, Sheng Yang wrote: Before enabling, execution of rdtscp in guest would result in #UD. diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h index 4f865e8..3a84acf 100644 --- a/arch/x86/include/asm/kvm_host.h +++ b/arch/x86/include/asm/kvm_host.h

Re: Memory under KVM?

2009-12-16 Thread Avi Kivity
On 12/16/2009 01:21 AM, Thomas Fjellstrom wrote: The problem is it should be automatic. The balloon driver itself or some other mechanism should be capable of noticing when it can free up a bunch of guest memory. I can't be bothered to manually sit around and monitor memory usage on my host so

Re: Memory under KVM?

2009-12-16 Thread Thomas Fjellstrom
On Wed December 16 2009, Avi Kivity wrote: On 12/16/2009 01:21 AM, Thomas Fjellstrom wrote: The problem is it should be automatic. The balloon driver itself or some other mechanism should be capable of noticing when it can free up a bunch of guest memory. I can't be bothered to manually sit

Re: [PATCH] KVM: x86: Adjust KVM_VCPUEVENT flag names

2009-12-16 Thread Avi Kivity
On 12/16/2009 12:57 AM, Jan Kiszka wrote: They are also used on KVM_GET_VCPU_EVENTS, so 'VALID' is a better name element than 'SET'. Thanks - applied and queued. -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line unsubscribe

Re: Memory under KVM?

2009-12-16 Thread Avi Kivity
On 12/16/2009 11:58 AM, Thomas Fjellstrom wrote: It depends on what your expectations are. If you have a lot of memory you might be surprised when you access an idle guest and have to wait for it to page itself back from disk. Why would it be swaping in that case? Only

Re: Memory under KVM?

2009-12-16 Thread Thomas Fjellstrom
On Wed December 16 2009, Avi Kivity wrote: On 12/16/2009 11:58 AM, Thomas Fjellstrom wrote: It depends on what your expectations are. If you have a lot of memory you might be surprised when you access an idle guest and have to wait for it to page itself back from disk. Why would it be

seabios question

2009-12-16 Thread Liu, Jinsong
Hi, Avi Recently I want to update hvm vcpu add/remove feature of KVM. I go through qemu-kvm, find that original boch vbios code (i.e, qemu-kvm/kvm/bios/acpi-dsdt.asl, ...) has been removed. Now qemu-kvm use seabios git repo http://git.kernel.org/?p=virt/kvm/seabios.git;a=summary as its vbios,

Re: seabios question

2009-12-16 Thread Avi Kivity
On 12/16/2009 12:55 PM, Liu, Jinsong wrote: Hi, Avi Recently I want to update hvm vcpu add/remove feature of KVM. I go through qemu-kvm, find that original boch vbios code (i.e, qemu-kvm/kvm/bios/acpi-dsdt.asl, ...) has been removed. Now qemu-kvm use seabios git repo

Re: seabios question

2009-12-16 Thread Gleb Natapov
On Wed, Dec 16, 2009 at 06:55:47PM +0800, Liu, Jinsong wrote: Hi, Avi Recently I want to update hvm vcpu add/remove feature of KVM. I go through qemu-kvm, find that original boch vbios code (i.e, qemu-kvm/kvm/bios/acpi-dsdt.asl, ...) has been removed. Now qemu-kvm use seabios git repo

RE: seabios question

2009-12-16 Thread Liu, Jinsong
Avi Kivity wrote: On 12/16/2009 12:55 PM, Liu, Jinsong wrote: Hi, Avi Recently I want to update hvm vcpu add/remove feature of KVM. I go through qemu-kvm, find that original boch vbios code (i.e, qemu-kvm/kvm/bios/acpi-dsdt.asl, ...) has been removed. Now qemu-kvm use seabios git repo

RE: seabios question

2009-12-16 Thread Liu, Jinsong
Gleb Natapov wrote: On Wed, Dec 16, 2009 at 06:55:47PM +0800, Liu, Jinsong wrote: Hi, Avi Recently I want to update hvm vcpu add/remove feature of KVM. I go through qemu-kvm, find that original boch vbios code (i.e, qemu-kvm/kvm/bios/acpi-dsdt.asl, ...) has been removed. Now qemu-kvm

Re: Issues with qemu-kvm.git from today

2009-12-16 Thread Avi Kivity
On 12/15/2009 07:43 PM, Brian Jackson wrote: With qemu-kvm.git from this morning (about an hour ago), I see the following message. Qemu continues to run after this, but the guest is unresponsive and the qemu process is chewing up 100% cpu. rom: out of memory (rom pxe-virtio.bin, addr

Re: network shutdown under heavy load

2009-12-16 Thread Avi Kivity
On 12/14/2009 05:49 PM, rek2 wrote: Hello, we notice that when we stress any of our guests, in this case they are all fedora, the KVM network will shutdown.. anyone experience this? Herbert? -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list:

Re: network shutdown under heavy load

2009-12-16 Thread Herbert Xu
On Wed, Dec 16, 2009 at 02:17:04PM +0200, Avi Kivity wrote: On 12/14/2009 05:49 PM, rek2 wrote: Hello, we notice that when we stress any of our guests, in this case they are all fedora, the KVM network will shutdown.. anyone experience this? Herbert? What's the exact guest kernel

Re: [PATCH 1/7] Nested VMX patch 1 implements vmon and vmoff

2009-12-16 Thread Avi Kivity
On 12/10/2009 08:38 PM, or...@il.ibm.com wrote: From: Orit Wassermanor...@il.ibm.com Missing changelog entry. Please use the format common to all kvm patches. diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index 3de0b37..3f63cdd 100644 --- a/arch/x86/kvm/svm.c +++

Re: [PATCH 2/7] Nested VMX patch 2 implements vmclear

2009-12-16 Thread Avi Kivity
On 12/10/2009 08:38 PM, or...@il.ibm.com wrote: From: Orit Wassermanor...@il.ibm.com --- arch/x86/kvm/vmx.c | 235 +++- arch/x86/kvm/x86.c |5 +- arch/x86/kvm/x86.h |3 + 3 files changed, 240 insertions(+), 3 deletions(-) diff --git

Re: [PATCH] qemu-kvm initialize vcpu state after machine initialization

2009-12-16 Thread Marcelo Tosatti
On Tue, Dec 15, 2009 at 02:33:27PM +0200, Gleb Natapov wrote: On Tue, Dec 15, 2009 at 10:24:15AM -0200, Marcelo Tosatti wrote: On Tue, Dec 15, 2009 at 01:20:38PM +0200, Gleb Natapov wrote: On Mon, Dec 14, 2009 at 06:36:37PM -0200, Marcelo Tosatti wrote: So that the vcpu state is

Re: [PATCH 3/7] Nested VMX patch 3 implements vmptrld and vmptrst

2009-12-16 Thread Avi Kivity
On 12/10/2009 08:38 PM, or...@il.ibm.com wrote: + + struct __attribute__ ((__packed__)) level_state { /* Has the level1 guest done vmclear? */ bool vmclear; + + u64 io_bitmap_a; + u64 io_bitmap_b; + u64 msr_bitmap; + + bool first_launch; };

Re: [PATCH RFC: kvm tsc virtualization 15/20] Fix longstanding races

2009-12-16 Thread Marcelo Tosatti
On Tue, Dec 15, 2009 at 11:26:59AM -1000, Zachary Amsden wrote: On 12/15/2009 08:21 AM, Marcelo Tosatti wrote: On Mon, Dec 14, 2009 at 06:08:42PM -1000, Zachary Amsden wrote: snip + atomic_set(per_cpu(cpu_tsc_synchronized, freq-cpu), 0); + spin_lock(kvm_lock);

Re: [PATCH 4/7] Nested VMX patch 4 implements vmread and vmwrite

2009-12-16 Thread Avi Kivity
On 12/10/2009 08:38 PM, or...@il.ibm.com wrote: From: Orit Wassermanor...@il.ibm.com --- arch/x86/kvm/vmx.c | 670 +++- 1 files changed, 660 insertions(+), 10 deletions(-) diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index

Re: [PATCH] Enable non page boundary BAR device assignment

2009-12-16 Thread Muli Ben-Yehuda
On Tue, Dec 15, 2009 at 07:24:47PM +0100, Alexander Graf wrote: Michael S. Tsirkin wrote: I guess this means you'll have to find a device with a sub-page BAR to test this on, instead of hacking driver for a device with full page BAR. Did anyone ever try doing passthrough on an emulated

Re: [Autotest] [KVM-autotest][RFC] 32/32 PAE bit guest system definition

2009-12-16 Thread Dor Laor
On 12/15/2009 09:04 PM, Lucas Meneghel Rodrigues wrote: On Fri, Dec 11, 2009 at 2:34 PM, Jiri Zupkajzu...@redhat.com wrote: Hello, we write KSM_overcommit test. If we calculate memory for guest we need to know which architecture is Guest. If it is a 32b or 32b with PAE or 64b system. Because

Re: debugging windows guests

2009-12-16 Thread Raindog
On 12/15/2009 3:39 PM, Jan Kiszka wrote: Raindog wrote: Hello, I am researching KVM as a malware analysis platform and had some questions about debugging the guest OS. In my case I intend to use windows guests. So my questsions are as follows: Questions: 1. What instrumentation

Art Kupr has added you as a friend on the website VK.com

2009-12-16 Thread VK
kvm, Art Kupr has added you as a friend on the website VK.com You can log in and view your friends` pages using your email and automatically created password: 06EuNln3 VK.com is a website that helps dozens of millions of people find their old friends, share photos and events and always stay

SIGTERM to qemu-kvm process destroys qcow2 image?

2009-12-16 Thread Kenni Lund
Hi Sorry if this is a stupid question, but is it expected behaviour that a qcow2 image will/can get damaged by killing the qemu-kvm process with a SIGTERM signal? I would expect data on filesystems within the virtual machine to potentially get damaged if it's in use, but I though that the

[ kvm-Bugs-2907597 ] qemu vnc server clips at 2560x1600

2009-12-16 Thread SourceForge.net
Bugs item #2907597, was opened at 2009-12-02 16:57 Message generated for change (Comment added) made by mcsoccer You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2907597group_id=180599 Please note that this message will contain a full copy of the comment

Re: SIGTERM to qemu-kvm process destroys qcow2 image?

2009-12-16 Thread Avi Kivity
On 12/17/2009 02:52 AM, Kenni Lund wrote: Hi Sorry if this is a stupid question, but is it expected behaviour that a qcow2 image will/can get damaged by killing the qemu-kvm process with a SIGTERM signal? If it does, that's a serious bug. qcow2 should survive SIGTERM, SIGKILL, and host

Re: debugging windows guests

2009-12-16 Thread Avi Kivity
On 12/17/2009 12:06 AM, Raindog wrote: Are there any advantages over stock qemu if using kvm w/out the kernel module? No. qemu-kvm is not tested without kvm, so there may be disadvantages. -- I have a truly marvellous patch that fixes the bug which this signature is too narrow to contain.

Re: debugging windows guests

2009-12-16 Thread Raindog
On 12/16/2009 9:36 PM, Avi Kivity wrote: On 12/17/2009 12:06 AM, Raindog wrote: Are there any advantages over stock qemu if using kvm w/out the kernel module? No. qemu-kvm is not tested without kvm, so there may be disadvantages. Does that then imply that svm emulation