Well the bits for the sysenter msrs (0x174 - 0x176) are definitely set -- but I
still only see exits for 0x200 - 0x2ff. And I definitely
wrmsr(l)(MSR_IA32_SYSENTER_*) at vmx_vcpu_setup() time. Ive been going over Ch.
20, and still cant figure out what could be going on here.
Steven
>Right, but
On Tuesday 03 February 2009 08:04:07 Alex Williamson wrote:
> Hi Rusty,
>
> On Mon, 2009-02-02 at 20:22 +1030, Rusty Russell wrote:
> > static bool virtnet_send_command(struct virtnet_info *vi, u8 class, u8
> > cmd,
> > struct scatterlist *out, struct scatterli
On Tue, Feb 3, 2009 at 2:09 AM, Bill Rieske wrote:
>
On 1/30/2009 at 8:18 PM, Sheng Yang wrote:
>> On Fri, Jan 30, 2009 at 12:10:18PM -0700, Bill Rieske wrote:
>>> I get the following extracted from dmesg when essentially modprobing
>> kvm_intel. Note: distro using kvm 78
>>
>> Hi Bill
>>
Michael Tokarev wrote:
> David S. Ahern wrote:
>> I don't recall seeing a followup to this post.
>>
>> To put Michael's second suggestion into patch form, the following fixes
>> the problem for me:
>>
>> --- kvm-81.orig/qemu/qemu-char.c2008-12-14 06:16:27.0 -0700
>> +++ kvm-81/qem
Hi Rusty,
On Mon, 2009-02-02 at 20:22 +1030, Rusty Russell wrote:
> On Monday 02 February 2009 06:35:15 Alex Williamson wrote:
> > + sg_set_buf(&sg, &promisc, sizeof(promisc));
> > +
> > + if (!virtnet_send_command(vi, VIRTIO_NET_CTRL_RX,
> > + VIRTIO_NET_CTRL_RX_PR
David S. Ahern wrote:
> I don't recall seeing a followup to this post.
>
> To put Michael's second suggestion into patch form, the following fixes
> the problem for me:
>
> --- kvm-81.orig/qemu/qemu-char.c2008-12-14 06:16:27.0 -0700
> +++ kvm-81/qemu/qemu-char.c 2009-02-02 14:
I don't recall seeing a followup to this post.
To put Michael's second suggestion into patch form, the following fixes
the problem for me:
--- kvm-81.orig/qemu/qemu-char.c2008-12-14 06:16:27.0 -0700
+++ kvm-81/qemu/qemu-char.c 2009-02-02 14:12:20.0 -0700
@@ -1078,20 +1
Bugs item #2502147, was opened at 2009-01-12 14:55
Message generated for change (Comment added) made by mtosatti
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=2502147&group_id=180599
Please note that this message will contain a full copy of the comment
Right, but I've tried commenting those calls out, even disabling
CPU_BASED_USE_MSR_BITMAPS, allocation of vmx_msr_bitmap and so on -- without
effect. Ive started trying to interrogate the (now-reinstituted) vmx_msr_bitmap
from vmx_vcpu_setup, since the controls can be rewritten there...
Steven
>>> On 1/30/2009 at 8:18 PM, Sheng Yang wrote:
> On Fri, Jan 30, 2009 at 12:10:18PM -0700, Bill Rieske wrote:
>> I get the following extracted from dmesg when essentially modprobing
> kvm_intel. Note: distro using kvm 78
>
> Hi Bill
>
> Are you using Core i7 processor? Only it support EPT.
I would like,
with security in mind (see lkcd.sourceforge.net),
to be able to access guest -kernel- memory content from the host
(x86_64 Intel VT).
As far as I know on x86 you can only r/w access memory if you can map
it with the pagetables
(i.e. no direct physical addressing is possible).
If I a
Steven Stovall wrote:
When looking at the EXIT_REASON_MSR_WRITE events that trigger handle_wrmsr()
invocations, why do I only seem to see indices for MSR_MTRRfix* (0x250 -
0x2ff)? This behavior seems to have changed since kvm-60, where I would see for
example SYSENTER MSR writes.
In vmx_i
Yann Dupont wrote:
Hello,
we are using kvm for wifidog, a wifi portal. In our case, we have lots
of VLANS, and those vlans are connected on separate bridges on the
host. So, for the kvm machine running wifidog, we're having lots of
virtual nics (more than 10). Launching kvm, we had this erro
AMD k10 includes support for the FFXSR feature, which leaves out
XMM registers on FXSAVE/FXSAVE when the EFER_FFXSR bit is set in
EFER.
The CPUID feature bit exists already, but the EFER bit is missing
currently, so this patch adds it to the list of known EFER bits.
Signed-off-by: Alexander Graf
AMD K10 CPUs implement the FFXSR feature that gets enabled using
EFER. Let's check if the virtual CPU description includes that
CPUID feature bit and allow enabling it then.
This is required for Windows Server 2008 in Hyper-V mode.
v2 adds CPUID capability exposure
Signed-off-by: Alexander Graf
AMD k10 includes support for the FFXSR feature, which leaves out
XMM registers on FXSAVE/FXSAVE when the EFER_FFXSR bit is set in
EFER.
This patchset enables support for the FFXSR feature in KVM, allowing
the VM to set the bit in EFER when the physical CPU and the guest's
CPUID allow it.
v2 adds
Gleb Natapov wrote:
On Mon, Feb 02, 2009 at 04:04:55PM +0200, Avi Kivity wrote:
Gleb Natapov wrote:
Right, I was thinking about
if (irq >= 0 && irq < IOAPIC_NUM_PINS) {
Should return MASKED if irq is outside the acceptable range?
Is this ever can be false? Shou
Alexander Graf wrote:
AMD K10 CPUs implement the FFXSR feature that gets enabled using
EFER. Let's check if the virtual CPU description includes that
CPUID feature bit and allow enabling it then.
This is required for Windows Server 2008 in Hyper-V mode.
Need to advertise this in KVM_GET_SU
Hi Alex,
Can you post the userspace side of this to qemu-devel (against QEMU SVN)
and I'll review/apply. I've already looked through the series a couple
times and I don't think there are any major issues.
Regards,
Anthony Liguori
Rusty Russell wrote:
On Monday 02 February 2009 06:35:10 Al
On Mon, Feb 02, 2009 at 04:04:55PM +0200, Avi Kivity wrote:
> Gleb Natapov wrote:
>>> Right, I was thinking about
>>>
>>> if (irq >= 0 && irq < IOAPIC_NUM_PINS) {
>>>
>>> Should return MASKED if irq is outside the acceptable range?
>>>
>>>
>> Is this ever can be false? Should we BUG() if i
Gleb Natapov wrote:
Right, I was thinking about
if (irq >= 0 && irq < IOAPIC_NUM_PINS) {
Should return MASKED if irq is outside the acceptable range?
Is this ever can be false? Should we BUG() if irq is out of range?
Yes, the number ultimately comes from userspace.
--
erro
Gioacchino Mendola wrote:
hello everyone,
I'm trying to access guest memory from the host machine (x86_64).
In particular I would like to be able to find
the "physical" memory addresses the host machine allocates for the guest vm.
Is there any function in KVM that allows me to do that?
Could any
Bugs item #2556746, was opened at 2009-02-02 12:19
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=2556746&group_id=180599
Please note that this message will contain a full copy
Hey
What i do for my work machine, i have a dual boot with windows so.
$ fdisk -l
Disk /dev/sda: 250.0 GB, 250059350016 bytes
255 heads, 63 sectors/track, 30401 cylinders
Units = cylinders of 16065 * 512 = 8225280 bytes
Disk identifier: 0x57c207a1
Device Boot Start End Block
Ciao Stefan,
> KVM constantly gives me headaches when it comes to networking
> configuration.
I have found very interesting this document:
http://tjworld.net/wiki/Linux/Ubuntu/VirtualMachinesWithVDENetworking
it's only one possibility, but/and it works :-)
--
Paolo Pedaletti
--
To unsubscrib
On Mon, Feb 02, 2009 at 11:06:34AM +0100, Stefan Kr?mmel wrote:
> Hi,
>
> I'm trying to convert some of our virtual machines from VMWare Server 2 to
> KVM on CentOS 5.2 X64.
>
> KVM constantly gives me headaches when it comes to networking
> configuration.
>
> Being used to VMWare, there are s
Hi,
I'm trying to convert some of our virtual machines from VMWare Server 2 to
KVM on CentOS 5.2 X64.
KVM constantly gives me headaches when it comes to networking
configuration.
Being used to VMWare, there are some things that don't work as expected.
1. kvm/libvirt manipulate iptables, eff
On Monday 02 February 2009 06:35:20 Alex Williamson wrote:
> + * In addition to the class/cmd header, the TABLE_SET command requires
> + * two out scatterlists. Each contains a 4 byte count of entries followed
> + * by a concatenated byte stream of the ETH_ALEN MAC addresses. The
> + * first sg l
On Monday 02 February 2009 06:35:15 Alex Williamson wrote:
> + sg_set_buf(&sg, &promisc, sizeof(promisc));
> +
> + if (!virtnet_send_command(vi, VIRTIO_NET_CTRL_RX,
> + VIRTIO_NET_CTRL_RX_PROMISC,
> + &sg, 1, 0))
Hmm, can we use s
On Monday 02 February 2009 06:35:10 Alex Williamson wrote:
> +static bool virtnet_send_command(struct virtnet_info *vi, u8 class, u8 cmd,
> + struct scatterlist data[], int out, int in)
> +{
> + struct scatterlist sg[VIRTIO_NET_MAX_CTRL_ARGS];
...
> diff --git a/in
Hi,
I prefer using the free vmware converter to migrate physical hosts
(using the vmware converter boot CD) to virtual. (Citrix Xenserver also
offer something, but I did not test it yet). Now, test the xp on a
vmware host. Check if everything is running, if necessary adapt the
registry to use IDE
31 matches
Mail list logo