[kvm-devel] extboot usage?

2008-04-03 Thread Jun Koi
Hi, Could someone please post some concret examples on how to use extboot? I looked around, but saw nothing. Thanks, Jun - Check out the new SourceForge.net Marketplace. It's the best place to buy or sell services for just

[kvm-devel] Бухгалтерский учет в обособлен ных подразделений

2008-04-03 Thread Антонин
Филиалы и oбoсoбленные пoдpазделения oднoдневный семинаp / 4 апpеля 2008 г. / Мoсква Пpoгpамма семинаpа: 1. Пpизнаки oбoсoбленнoгo пoдpазделения пo Налoгoвoму кoдексу poссийскoй Федеpации. 2. Пpoцедуpа pегистpации opганизации в налoгoвыx opганаx пo месту наxoждения oбoсoбленнoгo

Re: [kvm-devel] virtual machines network goes 100Mbit when interface is Gbit

2008-04-03 Thread Miguel Araujo
Hello all, Thanks for your answer Haydn, but I did not understand the issue too. Victor has explained my problem clearly, is kvm uncapable of running the bridge at 1GBit if it is not a e1000 network card? Thanks a lot in advanced, Miguel Hello, I'm not sure if I understand you. Do you

Re: [kvm-devel] [PATCH RFC 1/5]Add some trace enties and define interface for tracing

2008-04-03 Thread Avi Kivity
Liu, Eric E wrote: From d56731ffc6d5742a88a157dfe0e4344d35f7db58 Mon Sep 17 00:00:00 2001 From: Feng(Eric) Liu [EMAIL PROTECTED] Date: Mon, 31 Mar 2008 10:08:55 -0400 Subject: [PATCH] KVM: Add some trace entries in current code and define some interfaces for userspace app to contrl and use

Re: [kvm-devel] EMM: disable other notifiers before register and unregister

2008-04-03 Thread Peter Zijlstra
On Wed, 2008-04-02 at 18:24 -0700, Christoph Lameter wrote: Ok lets forget about the single theaded thing to solve the registration races. As Andrea pointed out this still has ssues with other subscribed subsystems (and also try_to_unmap). We could do something like what stop_machine_run

Re: [kvm-devel] [PATCH RFC 2/5] Create relay channels and add trace data

2008-04-03 Thread Avi Kivity
Liu, Eric E wrote: From 41d65b55580d3f07f9f1c50e89e3d64c5d10fbaf Mon Sep 17 00:00:00 2001 From: Feng (Eric) Liu [EMAIL PROTECTED] Date: Tue, 1 Apr 2008 07:26:14 -0400 Subject: [PATCH] KVM: Add kvm trace support. when config KVM_TRACE, it allows userspace app to read the trace of kvm_related

Re: [kvm-devel] [patch 0/3] separate thread for IO handling V3

2008-04-03 Thread Avi Kivity
Marcelo Tosatti wrote: This version fixes the vmdk problems found by the regression testing. Dor, regarding the option to disable the IO thread, it would require duplicating most of the changed code. For now I believe its better to get the patch into a state where its considered stable

Re: [kvm-devel] EMM: Fixup return value handling of emm_notify()

2008-04-03 Thread Peter Zijlstra
On Wed, 2008-04-02 at 14:33 -0700, Christoph Lameter wrote: On Wed, 2 Apr 2008, Andrea Arcangeli wrote: but anyway it's silly to be hardwired to such an interface that worst of all requires switch statements instead of proper pointer to functions and a fixed set of parameters and retval

Re: [kvm-devel] [PATCH 1/1] direct mmio for passthrough - kernel part

2008-04-03 Thread Avi Kivity
Andrea Arcangeli wrote: On Wed, Apr 02, 2008 at 02:16:41PM +0300, Avi Kivity wrote: Ugh, there's still mark_page_accessed() and SetPageDirty(). btw, like PG_dirty is only set if the spte is writeable, mark_page_accessed should only run if the accessed bit is set in the spte. It

Re: [kvm-devel] [patch 0/3] separate thread for IO handling V3

2008-04-03 Thread Avi Kivity
Avi Kivity wrote: There's still something wrong. When I start Windows with these patches applied, Windows startup consumes ~50 sec of cpu time, compared to ~12 sec without. Pinning qemu into cpu 0 seems to fix this. I'll investigate some more. Changing GUI_REFRESH_INTERVAL to 1000

Re: [kvm-devel] extboot usage?

2008-04-03 Thread Anthony Liguori
Jun Koi wrote: Hi, Could someone please post some concret examples on how to use extboot? I looked around, but saw nothing. Just append boot=on to your -drive parameter. Regards, Anthony Liguori Thanks, Jun -

Re: [kvm-devel] How guest virtual address is translated to physical address?

2008-04-03 Thread Guillaume Thouvenin
On Wed, 02 Apr 2008 10:22:45 -0500 Anthony Liguori [EMAIL PROTECTED] wrote: We can then obtain the faulting virtual address from CR2 in the host and walk the guest's page table to determine what guest physical address should be mapped at that guest virtual address (if any at all). [...]

Re: [kvm-devel] EMM: Fixup return value handling of emm_notify()

2008-04-03 Thread Andrea Arcangeli
On Thu, Apr 03, 2008 at 12:40:46PM +0200, Peter Zijlstra wrote: It seems to me that common code can be shared using functions? No need FWIW I prefer separate methods. kvm patch using mmu notifiers shares 99% of the code too between the two different methods implemented indeed. Code sharing is

Re: [kvm-devel] [patch 0/3] separate thread for IO handling V3

2008-04-03 Thread Avi Kivity
Avi Kivity wrote: Avi Kivity wrote: There's still something wrong. When I start Windows with these patches applied, Windows startup consumes ~50 sec of cpu time, compared to ~12 sec without. Pinning qemu into cpu 0 seems to fix this. I'll investigate some more. Changing

Re: [kvm-devel] EMM: disable other notifiers before register and unregister

2008-04-03 Thread Andrea Arcangeli
On Wed, Apr 02, 2008 at 06:24:15PM -0700, Christoph Lameter wrote: Ok lets forget about the single theaded thing to solve the registration races. As Andrea pointed out this still has ssues with other subscribed subsystems (and also try_to_unmap). We could do something like what

[kvm-devel] [ kvm-Bugs-1933508 ] KVM cannot migrate with command -monitor

2008-04-03 Thread SourceForge.net
Bugs item #1933508, was opened at 2008-04-03 22:53 Message generated for change (Tracker Item Submitted) made by Item Submitter You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=1933508group_id=180599 Please note that this message will contain a full copy of

Re: [kvm-devel] virtual machines network goes 100Mbit when interface is Gbit

2008-04-03 Thread Felix Leimbach
Thanks for your answer Haydn, but I did not understand the issue too. Victor has explained my problem clearly, is kvm uncapable of running the bridge at 1GBit if it is not a e1000 network card? Hey Miguel, what Haydn meant was to force qemu to *emulate* a e1000 NIC instead of the default

Re: [kvm-devel] virtual machines network goes 100Mbit when interface is Gbit

2008-04-03 Thread Haydn Solomon
See also http://www.linux-kvm.com/content/tip-how-setup-windows-guest-paravirtual-network-drivers On Thu, Apr 3, 2008 at 10:54 AM, Felix Leimbach [EMAIL PROTECTED] wrote: Thanks for your answer Haydn, but I did not understand the issue too. Victor has explained my problem clearly, is kvm

Re: [kvm-devel] EMM: Fixup return value handling of emm_notify()

2008-04-03 Thread Christoph Lameter
On Thu, 3 Apr 2008, Peter Zijlstra wrote: It seems to me that common code can be shared using functions? No need to stuff everything into a single function. We have method vectors all over the kernel, we could do a_ops as a single callback too, but we dont. FWIW I prefer separate methods.

Re: [kvm-devel] EMM: disable other notifiers before register and unregister

2008-04-03 Thread Christoph Lameter
On Thu, 3 Apr 2008, Andrea Arcangeli wrote: My attempt to fix this once and for all is to walk all vmas of the mm inside mmu_notifier_register and take all anon_vma locks and i_mmap_locks in virtual address order in a row. It's ok to take those inside the mmap_sem. Supposedly if anybody will

[kvm-devel] [PATCH 17/35] KVM: Add reset support for in kernel PIT

2008-04-03 Thread Avi Kivity
From: Sheng Yang [EMAIL PROTECTED] Separate the reset part and prepare for reset support. Signed-off-by: Sheng Yang [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] --- arch/x86/kvm/i8254.c | 30 +++--- arch/x86/kvm/i8254.h |1 + 2 files changed, 20

[kvm-devel] [PATCH 11/35] KVM: detect if VCPU triple faults

2008-04-03 Thread Avi Kivity
From: Joerg Roedel [EMAIL PROTECTED] In the current inject_page_fault path KVM only checks if there is another PF pending and injects a DF then. But it has to check for a pending DF too to detect a shutdown condition in the VCPU. If this is not detected the VCPU goes to a PF - DF - PF loop when

[kvm-devel] [PATCH 20/35] KVM: Provide unlocked version of emulator_write_phys()

2008-04-03 Thread Avi Kivity
Signed-off-by: Avi Kivity [EMAIL PROTECTED] --- arch/x86/kvm/x86.c | 21 ++--- include/asm-x86/kvm_host.h |3 +++ 2 files changed, 17 insertions(+), 7 deletions(-) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 1b9e695..03ba402 100644 ---

[kvm-devel] [PATCH 19/35] x86: KVM guest: add basic paravirt support

2008-04-03 Thread Avi Kivity
From: Marcelo Tosatti [EMAIL PROTECTED] Add basic KVM paravirt support. Avoid vm-exits on IO delays. Signed-off-by: Marcelo Tosatti [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] --- arch/x86/Kconfig |8 ++ arch/x86/kernel/Makefile |1 +

[kvm-devel] [PATCH 12/35] KVM: replace remaining __FUNCTION__ occurances

2008-04-03 Thread Avi Kivity
From: Harvey Harrison [EMAIL PROTECTED] __FUNCTION__ is gcc-specific, use __func__ Signed-off-by: Harvey Harrison [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] --- arch/x86/kvm/lapic.c |8 arch/x86/kvm/mmu.c | 35 +--

[kvm-devel] [PATCH 18/35] KVM: add basic paravirt support

2008-04-03 Thread Avi Kivity
From: Marcelo Tosatti [EMAIL PROTECTED] Add basic KVM paravirt support. Avoid vm-exits on IO delays. Signed-off-by: Marcelo Tosatti [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] --- arch/x86/kvm/x86.c |1 + include/asm-x86/kvm_para.h |3 ++- include/linux/kvm.h

[kvm-devel] [PATCH 25/35] x86: make native_machine_shutdown non-static

2008-04-03 Thread Avi Kivity
From: Glauber Costa [EMAIL PROTECTED] it will allow external users to call it. It is mainly useful for routines that will override its machine_ops field for its own special purposes, but want to call the normal shutdown routine after they're done Signed-off-by: Glauber Costa [EMAIL PROTECTED]

[kvm-devel] [PATCH 15/35] KVM: In kernel PIT model

2008-04-03 Thread Avi Kivity
From: Sheng Yang [EMAIL PROTECTED] The patch moved PIT from userspace to kernel, and increase the timer accuracy greatly. Signed-off-by: Sheng Yang [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] --- arch/x86/kvm/Makefile |3 +- arch/x86/kvm/i8254.c | 585

[kvm-devel] [PATCH 22/35] x86: KVM guest: hypercall based pte updates and TLB flushes

2008-04-03 Thread Avi Kivity
From: Marcelo Tosatti [EMAIL PROTECTED] Hypercall based pte updates are faster than faults, and also allow use of the lazy MMU mode to batch operations. Don't report the feature if two dimensional paging is enabled. [avi: - guest/host split - fix 32-bit truncation issues - adjust to mmu_op]

[kvm-devel] [PATCH 21/35] KVM: MMU: hypercall based pte updates and TLB flushes

2008-04-03 Thread Avi Kivity
From: Marcelo Tosatti [EMAIL PROTECTED] Hypercall based pte updates are faster than faults, and also allow use of the lazy MMU mode to batch operations. Don't report the feature if two dimensional paging is enabled. [avi: - one mmu_op hypercall instead of one per op - allow 64-bit gpa on

[kvm-devel] [PATCH 33/35] KVM: VMX: Add module option to disable flexpriority

2008-04-03 Thread Avi Kivity
Useful for debugging. Signed-off-by: Avi Kivity [EMAIL PROTECTED] --- arch/x86/kvm/vmx.c |8 ++-- 1 files changed, 6 insertions(+), 2 deletions(-) diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index fb0389d..0155931 100644 --- a/arch/x86/kvm/vmx.c +++ b/arch/x86/kvm/vmx.c @@

[kvm-devel] [PATCH 29/35] KVM: Move some x86 specific constants and structures to include/asm-x86

2008-04-03 Thread Avi Kivity
Signed-off-by: Avi Kivity [EMAIL PROTECTED] --- include/asm-x86/kvm_host.h | 13 + include/linux/kvm_host.h | 13 - 2 files changed, 13 insertions(+), 13 deletions(-) diff --git a/include/asm-x86/kvm_host.h b/include/asm-x86/kvm_host.h index 52e276c..2773f91 100644

[kvm-devel] [PATCH 31/35] KVM: MMU: Introduce and use spte_to_page()

2008-04-03 Thread Avi Kivity
Encapsulate the pte mask'n'shift in a function. Signed-off-by: Avi Kivity [EMAIL PROTECTED] --- arch/x86/kvm/mmu.c | 17 - 1 files changed, 12 insertions(+), 5 deletions(-) diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c index dd4b95b..6fc3421 100644 ---

[kvm-devel] [PATCH 32/35] KVM: no longer EXPERIMENTAL

2008-04-03 Thread Avi Kivity
Long overdue. Signed-off-by: Avi Kivity [EMAIL PROTECTED] --- arch/x86/kvm/Kconfig |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/arch/x86/kvm/Kconfig b/arch/x86/kvm/Kconfig index 41962e7..76c70ab 100644 --- a/arch/x86/kvm/Kconfig +++ b/arch/x86/kvm/Kconfig @@ -19,7

[kvm-devel] [PATCH 28/35] KVM: MMU: Set the accessed bit on non-speculative shadow ptes

2008-04-03 Thread Avi Kivity
If we populate a shadow pte due to a fault (and not speculatively due to a pte write) then we can set the accessed bit on it, as we know it will be set immediately on the next guest instruction. This saves a read-modify-write operation. Signed-off-by: Avi Kivity [EMAIL PROTECTED] ---

[kvm-devel] [PATCH 30/35] KVM: MMU: fix dirty bit setting when removing write permissions

2008-04-03 Thread Avi Kivity
From: Izik Eidus [EMAIL PROTECTED] When mmu_set_spte() checks if a page related to spte should be release as dirty or clean, it check if the shadow pte was writeble, but in case rmap_write_protect() is called called it is possible for shadow ptes that were writeble to become readonly and therefor

[kvm-devel] [PATCH 26/35] x86: KVM guest: disable clock before rebooting.

2008-04-03 Thread Avi Kivity
From: Glauber Costa [EMAIL PROTECTED] This patch writes 0 (actually, what really matters is that the LSB is cleared) to the system time msr before shutting down the machine for kexec. Without it, we can have a random memory location being written when the guest comes back It overrides the

[kvm-devel] [PATCH 08/35] KVM: MMU: large page support

2008-04-03 Thread Avi Kivity
From: Marcelo Tosatti [EMAIL PROTECTED] Create large pages mappings if the guest PTE's are marked as such and the underlying memory is hugetlbfs backed. If the largepage contains write-protected pages, a large pte is not used. Gives a consistent 2% improvement for data copies on ram mounted

[kvm-devel] [PATCH 34/35] KVM: x86: add functions to get the cpl of vcpu

2008-04-03 Thread Avi Kivity
From: Izik Eidus [EMAIL PROTECTED] Signed-off-by: Izik Eidus [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] --- arch/x86/kvm/svm.c |8 arch/x86/kvm/vmx.c | 15 +++ include/asm-x86/kvm_host.h |1 + 3 files changed, 24 insertions(+), 0

[kvm-devel] [PATCH 35/35] KVM: x86: hardware task switching support

2008-04-03 Thread Avi Kivity
From: Izik Eidus [EMAIL PROTECTED] This emulates the x86 hardware task switch mechanism in software, as it is unsupported by either vmx or svm. It allows operating systems which use it, like freedos, to run as kvm guests. Signed-off-by: Izik Eidus [EMAIL PROTECTED] Signed-off-by: Avi Kivity

[kvm-devel] [PATCH 24/35] x86: allow machine_crash_shutdown to be replaced

2008-04-03 Thread Avi Kivity
From: Glauber Costa [EMAIL PROTECTED] This patch a llows machine_crash_shutdown to be replaced, just like any of the other functions in machine_ops Signed-off-by: Glauber Costa [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] --- arch/x86/kernel/crash.c |3 ++-

[kvm-devel] [PATCH 09/35] KVM: Prefix control register accessors with kvm_ to avoid namespace pollution

2008-04-03 Thread Avi Kivity
Names like 'set_cr3()' look dangerously close to affecting the host. Signed-off-by: Avi Kivity [EMAIL PROTECTED] --- arch/x86/kvm/vmx.c | 14 ++-- arch/x86/kvm/x86.c | 46 ++-- include/asm-x86/kvm_host.h | 12 +- 3

[kvm-devel] [PATCH 27/35] KVM: kvm.h: __user requires compiler.h

2008-04-03 Thread Avi Kivity
From: Christian Borntraeger [EMAIL PROTECTED] include/linux/kvm.h defines struct kvm_dirty_log to [...] union { void __user *dirty_bitmap; /* one bit per page */ __u64 padding; }; __user requires compiler.h to compile. Currently, this works

[kvm-devel] [PATCH 07/35] KVM: MMU: ignore zapped root pagetables

2008-04-03 Thread Avi Kivity
From: Marcelo Tosatti [EMAIL PROTECTED] Mark zapped root pagetables as invalid and ignore such pages during lookup. This is a problem with the cr3-target feature, where a zapped root table fools the faulting code into creating a read-only mapping. The result is a lockup if the instruction can't

[kvm-devel] [PATCH 02/35] KVM: Add stat counter for hypercalls

2008-04-03 Thread Avi Kivity
From: Amit Shah [EMAIL PROTECTED] Signed-off-by: Amit Shah [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] --- arch/x86/kvm/x86.c |2 ++ include/asm-x86/kvm_host.h |1 + 2 files changed, 3 insertions(+), 0 deletions(-) diff --git a/arch/x86/kvm/x86.c

[kvm-devel] [PATCH 00/35] KVM updates for the 2.6.26 merge window (part II)

2008-04-03 Thread Avi Kivity
These thirty-five patches comprise the second batch of the updates I have queued for 2.6.26. Please review. arch/x86/Kconfig |8 + arch/x86/kernel/Makefile |1 + arch/x86/kernel/crash.c |3 +- arch/x86/kernel/kvm.c | 247

[kvm-devel] [PATCH 03/35] KVM: x86 emulator: fix sparse warnings in x86_emulate.c

2008-04-03 Thread Avi Kivity
From: Harvey Harrison [EMAIL PROTECTED] Nesting __emulate_2op_nobyte inside__emulate_2op produces many shadowed variable warnings on the internal variable _tmp used by both macros. Change the outer macro to use __tmp. Avoids a sparse warning like the following at every call site of

[kvm-devel] [PATCH 10/35] KVM: Use kzalloc to avoid allocating kvm_regs from kernel stack

2008-04-03 Thread Avi Kivity
From: Xiantao Zhang [EMAIL PROTECTED] Since the size of kvm_regs is too big to allocate from kernel stack on ia64, use kzalloc to allocate it. Signed-off-by: Xiantao Zhang [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] --- virt/kvm/kvm_main.c | 33

[kvm-devel] [PATCH 01/35] KVM: Use x86's segment descriptor struct instead of private definition

2008-04-03 Thread Avi Kivity
The x86 desc_struct unification allows us to remove segment_descriptor.h. Signed-off-by: Avi Kivity [EMAIL PROTECTED] --- arch/x86/kvm/segment_descriptor.h | 29 - arch/x86/kvm/vmx.c|3 +-- arch/x86/kvm/x86.c| 15 +++

[kvm-devel] [PATCH 14/35] KVM: Remove pointless desc_ptr #ifdef

2008-04-03 Thread Avi Kivity
The desc_struct changes left an unnecessary #ifdef; remove it. Signed-off-by: Avi Kivity [EMAIL PROTECTED] --- arch/x86/kvm/svm.c |4 1 files changed, 0 insertions(+), 4 deletions(-) diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index b2c667f..51741f9 100644 ---

[kvm-devel] [PATCH 06/35] KVM: Implement dummy values for MSR_PERF_STATUS

2008-04-03 Thread Avi Kivity
From: Alexander Graf [EMAIL PROTECTED] Darwin relies on this and ceases to work without. Signed-off-by: Alexander Graf [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] --- arch/x86/kvm/x86.c |8 +++- 1 files changed, 7 insertions(+), 1 deletions(-) diff --git

[kvm-devel] [PATCH 04/35] KVM: SVM: make iopm_base static

2008-04-03 Thread Avi Kivity
From: Harvey Harrison [EMAIL PROTECTED] Fixes sparse warning as well. arch/x86/kvm/svm.c:69:15: warning: symbol 'iopm_base' was not declared. Should it be static? Signed-off-by: Harvey Harrison [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] --- arch/x86/kvm/svm.c |2 +- 1

[kvm-devel] [PATCH 05/35] KVM: sparse fixes for kvm/x86.c

2008-04-03 Thread Avi Kivity
From: Harvey Harrison [EMAIL PROTECTED] In two case statements, use the ever popular 'i' instead of index: arch/x86/kvm/x86.c:1063:7: warning: symbol 'index' shadows an earlier one arch/x86/kvm/x86.c:1000:9: originally declared here arch/x86/kvm/x86.c:1079:7: warning: symbol 'index' shadows an

[kvm-devel] [PATCH 23/35] x86: KVM guest: hypercall batching

2008-04-03 Thread Avi Kivity
From: Marcelo Tosatti [EMAIL PROTECTED] Batch pte updates and tlb flushes in lazy MMU mode. [avi: - adjust to mmu_op - helper for getting para_state without debug warnings] Signed-off-by: Marcelo Tosatti [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] --- arch/x86/kernel/kvm.c

[kvm-devel] QEMU/KVM: make kvm_arch_load_regs() aware of in kernel APIC

2008-04-03 Thread Marcelo Tosatti
kvm_arch_load_regs() might load APIC base and APIC TPR from the uninitialized userspace APIC emulation. This happened when running X11 on SMP guest in my case, disabling the APIC for vcpu3: vcpu not ready for apic_round_robin vcpu not ready for apic_round_robin vcpu not ready for

[kvm-devel] [PATCH] Fix vmmouse with -smp

2008-04-03 Thread Anthony Liguori
The vmport code is very broken for SMP guests. It uses a global CPUState that's initialized multiple times? At any rate, since it needs to know CPU registers for the current CPU in a PIO handler, it needs to use cpu_single_env. This patch makes vmmouse when using -smp 1 Signed-off-by: Anthony

[kvm-devel] direct access to hard-disk devices

2008-04-03 Thread Andrés Moré
Hi, I've been trying to use kvm (+ PXE + root-over-NFS) to remotely boot live images on client servers started using wakeonlan. However, I'm still trying to find out how to attach a kvm guest directly to a 'real' harddisk device file. Is this possible on the current implementation? Thanks in

Re: [kvm-devel] direct access to hard-disk devices

2008-04-03 Thread Brian Jackson
kvm -drive file=/dev/sdX Where sdX is some drive you want to hook up to the virtual machine. Be very careful, you can really mess things up if you use the wrong device. --Brian Jackson On Thursday 03 April 2008 8:50:49 pm Andrés Moré wrote: Hi, I've been trying to use kvm (+ PXE +