On 12/16/2009 9:36 PM, Avi Kivity wrote:
On 12/17/2009 12:06 AM, Raindog wrote:
Are there any advantages over stock qemu if using kvm w/out the
kernel module?
No. qemu-kvm is not tested without kvm, so there may be disadvantages.
Does that then imply that svm emulation (--enable-nesting)
On 12/17/2009 12:06 AM, Raindog wrote:
Are there any advantages over stock qemu if using kvm w/out the kernel
module?
No. qemu-kvm is not tested without kvm, so there may be disadvantages.
--
I have a truly marvellous patch that fixes the bug which this
signature is too narrow to contain.
On 12/17/2009 02:52 AM, Kenni Lund wrote:
Hi
Sorry if this is a stupid question, but is it expected behaviour that
a qcow2 image will/can get damaged by killing the qemu-kvm process
with a SIGTERM signal?
If it does, that's a serious bug. qcow2 should survive SIGTERM,
SIGKILL, and host
Bugs item #2907597, was opened at 2009-12-02 16:57
Message generated for change (Comment added) made by mcsoccer
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=2907597&group_id=180599
Please note that this message will contain a full copy of the comment
Hi
Sorry if this is a stupid question, but is it expected behaviour that
a qcow2 image will/can get damaged by killing the qemu-kvm process
with a SIGTERM signal?
I would expect data on filesystems within the virtual machine to
potentially get damaged if it's in use, but I though that the qemu-kv
kvm,
Art Kupr has added you as a friend on the website VK.com
You can log in and view your friends` pages using your email and automatically
created password: 06EuNln3
VK.com is a website that helps dozens of millions of people find their old
friends, share photos and events and always stay in
On 12/15/2009 3:39 PM, Jan Kiszka wrote:
Raindog wrote:
> Hello,
>
> I am researching KVM as a malware analysis platform and had some
> questions about debugging the guest OS. In my case I intend to use
> windows guests. So my questsions are as follows:
>
> Questions:
>
> 1. What instrument
On 12/15/2009 09:04 PM, Lucas Meneghel Rodrigues wrote:
On Fri, Dec 11, 2009 at 2:34 PM, Jiri Zupka wrote:
Hello,
we write KSM_overcommit test. If we calculate memory for guest we need to know
which architecture is Guest. If it is a 32b or 32b with PAE or 64b system.
Because with a 32b guest
On Tue, Dec 15, 2009 at 07:24:47PM +0100, Alexander Graf wrote:
> Michael S. Tsirkin wrote:
>
> > I guess this means you'll have to find a device with a sub-page
> > BAR to test this on, instead of hacking driver for a device with
> > full page BAR. Did anyone ever try doing passthrough on an
> > e
On 12/10/2009 08:38 PM, or...@il.ibm.com wrote:
From: Orit Wasserman
---
arch/x86/kvm/vmx.c | 670 +++-
1 files changed, 660 insertions(+), 10 deletions(-)
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 46a4f3a..8745d44 100644
---
On Tue, Dec 15, 2009 at 11:26:59AM -1000, Zachary Amsden wrote:
> On 12/15/2009 08:21 AM, Marcelo Tosatti wrote:
>> On Mon, Dec 14, 2009 at 06:08:42PM -1000, Zachary Amsden wrote:
>>
>>
>>
>> + atomic_set(&per_cpu(cpu_tsc_synchronized, freq->cpu),
>> 0);
>> + spin_lock(
On 12/10/2009 08:38 PM, or...@il.ibm.com wrote:
+
+
struct __attribute__ ((__packed__)) level_state {
/* Has the level1 guest done vmclear? */
bool vmclear;
+
+ u64 io_bitmap_a;
+ u64 io_bitmap_b;
+ u64 msr_bitmap;
+
+ bool first_launch;
};
Pleas
On Tue, Dec 15, 2009 at 02:33:27PM +0200, Gleb Natapov wrote:
> On Tue, Dec 15, 2009 at 10:24:15AM -0200, Marcelo Tosatti wrote:
> > On Tue, Dec 15, 2009 at 01:20:38PM +0200, Gleb Natapov wrote:
> > > On Mon, Dec 14, 2009 at 06:36:37PM -0200, Marcelo Tosatti wrote:
> > > >
> > > > So that the vcpu
On 12/10/2009 08:38 PM, or...@il.ibm.com wrote:
From: Orit Wasserman
---
arch/x86/kvm/vmx.c | 235 +++-
arch/x86/kvm/x86.c |5 +-
arch/x86/kvm/x86.h |3 +
3 files changed, 240 insertions(+), 3 deletions(-)
diff --git a/arch/x86/kvm/v
On 12/10/2009 08:38 PM, or...@il.ibm.com wrote:
From: Orit Wasserman
Missing changelog entry. Please use the format common to all kvm patches.
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index 3de0b37..3f63cdd 100644
--- a/arch/x86/kvm/svm.c
+++ b/arch/x86/kvm/svm.c
@@ -121,9
On Wed, Dec 16, 2009 at 02:17:04PM +0200, Avi Kivity wrote:
> On 12/14/2009 05:49 PM, rek2 wrote:
>> Hello, we notice that when we stress any of our guests, in this case
>> they are all fedora, the KVM network will shutdown.. anyone experience
>> this?
>
> Herbert?
What's the exact guest kerne
On 12/14/2009 05:49 PM, rek2 wrote:
Hello, we notice that when we stress any of our guests, in this case
they are all fedora, the KVM network will shutdown.. anyone experience
this?
Herbert?
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: se
On 12/15/2009 07:43 PM, Brian Jackson wrote:
With qemu-kvm.git from this morning (about an hour ago), I see the following
message. Qemu continues to run after this, but the guest is unresponsive and
the qemu process is chewing up 100% cpu.
rom: out of memory (rom pxe-virtio.bin, addr 0x
Gleb Natapov wrote:
> On Wed, Dec 16, 2009 at 06:55:47PM +0800, Liu, Jinsong wrote:
>> Hi, Avi
>>
>> Recently I want to update hvm vcpu add/remove feature of KVM.
>> I go through qemu-kvm, find that original boch vbios code (i.e,
>> qemu-kvm/kvm/bios/acpi-dsdt.asl, ...) has been removed.
>>
>> N
Avi Kivity wrote:
> On 12/16/2009 12:55 PM, Liu, Jinsong wrote:
>> Hi, Avi
>>
>> Recently I want to update hvm vcpu add/remove feature of KVM.
>> I go through qemu-kvm, find that original boch vbios code (i.e,
>> qemu-kvm/kvm/bios/acpi-dsdt.asl, ...) has been removed.
>>
>> Now qemu-kvm use seab
On Wed, Dec 16, 2009 at 06:55:47PM +0800, Liu, Jinsong wrote:
> Hi, Avi
>
> Recently I want to update hvm vcpu add/remove feature of KVM.
> I go through qemu-kvm, find that original boch vbios code (i.e,
> qemu-kvm/kvm/bios/acpi-dsdt.asl, ...) has been removed.
>
> Now qemu-kvm use seabios git r
On 12/16/2009 12:55 PM, Liu, Jinsong wrote:
Hi, Avi
Recently I want to update hvm vcpu add/remove feature of KVM.
I go through qemu-kvm, find that original boch vbios code (i.e,
qemu-kvm/kvm/bios/acpi-dsdt.asl, ...) has been removed.
Now qemu-kvm use seabios git repo
http://git.kernel.org/?p=
Hi, Avi
Recently I want to update hvm vcpu add/remove feature of KVM.
I go through qemu-kvm, find that original boch vbios code (i.e,
qemu-kvm/kvm/bios/acpi-dsdt.asl, ...) has been removed.
Now qemu-kvm use seabios git repo
http://git.kernel.org/?p=virt/kvm/seabios.git;a=summary as its vbios, r
On Tue, Dec 15, 2009 at 09:47:09PM -0800, Chris Wright wrote:
> * Alexander Graf (ag...@suse.de) wrote:
> > Michael S. Tsirkin wrote:
> > > Existing code first page aligned address, passes this to mmap,
>
> Did you mean page aligned size?
Yes, of course.
> > > then adds page offset. I do not kno
On Wed December 16 2009, Avi Kivity wrote:
> On 12/16/2009 11:58 AM, Thomas Fjellstrom wrote:
> >> It depends on what your expectations are. If you have a lot of memory
> >> you might be surprised when you access an idle guest and have to wait
> >> for it to page itself back from disk.
> >
> > Why
On 12/16/2009 11:58 AM, Thomas Fjellstrom wrote:
It depends on what your expectations are. If you have a lot of memory
you might be surprised when you access an idle guest and have to wait
for it to page itself back from disk.
Why would it be swaping in that case? Only unused/free/cach
On 12/16/2009 12:57 AM, Jan Kiszka wrote:
They are also used on KVM_GET_VCPU_EVENTS, so 'VALID' is a better name
element than 'SET'.
Thanks - applied and queued.
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line "unsubscribe kv
On Wed December 16 2009, Avi Kivity wrote:
> On 12/16/2009 01:21 AM, Thomas Fjellstrom wrote:
> >>> The problem is it should be automatic. The balloon driver itself or
> >>> some other mechanism should be capable of noticing when it can free
> >>> up a bunch of guest memory. I can't be bothered to
On 12/16/2009 01:21 AM, Thomas Fjellstrom wrote:
The problem is it should be automatic. The balloon driver itself or
some other mechanism should be capable of noticing when it can free up
a bunch of guest memory. I can't be bothered to manually sit around and
monitor memory usage on my host so
On 12/16/2009 07:48 AM, Sheng Yang wrote:
Before enabling, execution of "rdtscp" in guest would result in #UD.
diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h
index 4f865e8..3a84acf 100644
--- a/arch/x86/include/asm/kvm_host.h
+++ b/arch/x86/include/asm/kvm_host.h
Am 16.12.2009 um 09:14 schrieb Vadim Rozenfeld :
On Wed, 2009-12-16 at 00:39 +0100, Jan Kiszka wrote:
Raindog wrote:
Hello,
I am researching KVM as a malware analysis platform and had some
questions about debugging the guest OS. In my case I intend to use
windows guests. So my questsions are
On 12/16/2009 07:48 AM, Sheng Yang wrote:
shared_msr_global saved host value of relevant MSRs, but it have an
assumption that all MSRs it tracked shared the value across the different
CPUs. It's not true with some MSRs, e.g. MSR_TSC_AUX.
Extend it to per CPU to provide the support of MSR_TSC_AUX
On Wed, 2009-12-16 at 00:39 +0100, Jan Kiszka wrote:
> Raindog wrote:
> > Hello,
> >
> > I am researching KVM as a malware analysis platform and had some
> > questions about debugging the guest OS. In my case I intend to use
> > windows guests. So my questsions are as follows:
> >
> > Questions:
Raindog wrote:
> On 12/15/2009 3:39 PM, Jan Kiszka wrote:
>> Raindog wrote:
>> > Hello,
>> >
>> > I am researching KVM as a malware analysis platform and had some
>> > questions about debugging the guest OS. In my case I intend to use
>> > windows guests. So my questsions are as follows:
>> >
>
34 matches
Mail list logo