kvm defines memory in slots, more or less corresponding to the DIMM slots.
this allows us to:
- avoid the VGA hole at 640K
- add a pci framebuffer at runtime
- hotplug memory
Signed-off-by: Yaniv Kamay [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm
-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/kvm_main.c
===
--- linux-2.6.orig/drivers/kvm/kvm_main.c
+++ linux-2.6/drivers/kvm/kvm_main.c
@@ -1740,6 +1740,387 @@ static void set_efer(struct kvm_vcpu *vc
#endif
Add a config entry and a Makefile for KVM.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/Kconfig
===
--- linux-2.6.orig/drivers/Kconfig
+++ linux-2.6/drivers/Kconfig
@@ -78,4 +78,6 @@ source drivers/rtc
Different cpus have different msrs available. The Core (not Core 2)
cpu lacks the STAR msr, so kvm faults when accessing it.
Fix by determining which msrs are available dynamically, and only loading
and saving available msrs.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers
Arjan van de Ven wrote:
Hi,
some nitpicks about the ioctl interfaces while it still can be done ;)
There are some changes still planned (to streamline smp support).
Signed-off-by: Yaniv Kamay [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
--- /dev/null2006
+ * machines without emulation or binary translation.
+ *
+ * Debug support
+ *
+ * Copyright (C) 2006 Qumranet, Inc.
+ *
+ * Authors:
+ * Yaniv Kamay [EMAIL PROTECTED]
+ * Avi Kivity [EMAIL PROTECTED]
+ *
+ */
+
+#include linux/highmem.h
+
+#include kvm.h
+#include debug.h
+
+#ifdef KVM_DEBUG
Upon entry to protected mode, we set cr4 to a value derived from cr0
accidentally. Fix.
This could cause a guest to crash (though I never observed it).
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/kvm_main.c
Yinghai Lu wrote:
On 11/5/06, Avi Kivity [EMAIL PROTECTED] wrote:
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
Windows 64bit could work as guest with qemu latest cvs version.
That's good to know. Once the next qemu version
Hesse, Christian wrote:
On Wednesday 08 November 2006 09:28, Avi Kivity wrote:
Okay. Please try to apply the two patches I posted yesterday. I don't
see how they can help, but it's worth trying.
Ok, here is the log. This time the system did not freeze completely, I could
still move
Arnd Bergmann wrote:
On Thursday 09 November 2006 12:08, Avi Kivity wrote:
Index: linux-2.6/drivers/kvm/kvm_main.c
===
--- linux-2.6.orig/drivers/kvm/kvm_main.c
+++ linux-2.6/drivers/kvm/kvm_main.c
@@ -369,8 +369,8 @@ static
Hesse, Christian wrote:
HOST_CR4 0x2690
***
*** pre launch
vmcs_dump
HOST_CR4 0x2690
GUEST_CR4 0x2021
This doesn't look like pae mode. Bit 5 of cr4 should be set. This is
true
Arnd Bergmann wrote:
On Thursday 09 November 2006 14:36, Avi Kivity wrote:
I'm not an expert on inline assembly, but don't you need an extra
'm (phys_addr)' to make sure that gcc actually puts the variable
on the stack instead of passing a NULL pointer as 'a(phys_addr)'?
Taking
Avi Kivity wrote:
0e75 660fb7ec movzx ebp, sp
0e79 6601c5 add ebp,
eax 0e7c 660f01975200 lgdt
single ptr [bx+0x52]
0e82 0f20c0 mov eax
Instead of using pasting macros, put the vmx segment field indices into
an array and use the array to access the fields indirectly. Cleaner code
as well as ~200 bytes saved.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/kvm.h
Gildas wrote:
Here they are
The core dump may be provided out of list as well if of any use.
Looks like the guest is using some instruction which we don't emulate well.
This is a live cd, right? Can you post a link? I'll try to reproduce
it here.
--
error compiling committee.c: too many
Andrew Morton wrote:
On Fri, 17 Nov 2006 09:20:49 +0200
Avi Kivity [EMAIL PROTECTED] wrote:
+out_vcpu:
+ vcpu_put(vcpu);
+
+ return rc;
+}
This function returns no indication of how many msrs it actually did set.
Should it?
It can't hurt. Is returning
Hesse, Christian wrote:
On Thursday 16 November 2006 14:03, Hesse, Christian wrote:
It did crash again. The log is attached.
I don't know if I already mentioned it, but I think it could be interesting:
When I reboot the notebook after a crash it starts up normally until X server
The subversion repository hosting kvm is now open for public access.
Instructions have been posted at http://kvm.sourceforge.net/code.html
(assumes basic knowledge of the subversion client).
[I decided to avoid sourceforge as I didn't like the amount of
configurability provided]
--
error
This patch lays the foundation for arch-independent kvm: it creates the
kvm-intel.ko module and prepares an arch function vector for the arch-specific
implementation.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/kvm.h
This avoids exposing the driver capabilities before they are loaded.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/kvm.h
===
--- linux-2.6.orig/drivers/kvm/kvm.h
+++ linux-2.6/drivers/kvm/kvm.h
@@ -244,7
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/kvm.h
===
--- linux-2.6.orig/drivers/kvm/kvm.h
+++ linux-2.6/drivers/kvm/kvm.h
@@ -238,6 +238,8 @@ struct kvm_stat {
struct kvm_arch_ops {
int
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/kvm.h
===
--- linux-2.6.orig/drivers/kvm/kvm.h
+++ linux-2.6/drivers/kvm/kvm.h
@@ -236,6 +236,11 @@ struct kvm_stat {
u32 irq_exits;
};
+struct
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/kvm.h
===
--- linux-2.6.orig/drivers/kvm/kvm.h
+++ linux-2.6/drivers/kvm/kvm.h
@@ -264,6 +264,9 @@ struct kvm_arch_ops {
void (*set_gdt)(struct kvm_vcpu
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/kvm.h
===
--- linux-2.6.orig/drivers/kvm/kvm.h
+++ linux-2.6/drivers/kvm/kvm.h
@@ -269,6 +269,7 @@ struct kvm_arch_ops {
struct
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/kvm.h
===
--- linux-2.6.orig/drivers/kvm/kvm.h
+++ linux-2.6/drivers/kvm/kvm.h
@@ -281,6 +281,8 @@ struct kvm_arch_ops {
void (*decache_regs)(struct
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/kvm_main.c
===
--- linux-2.6.orig/drivers/kvm/kvm_main.c
+++ linux-2.6/drivers/kvm/kvm_main.c
@@ -1225,14 +1225,16 @@ static u64 mk_cr_64(u64 curr_cr, u32 new
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/kvm_main.c
===
--- linux-2.6.orig/drivers/kvm/kvm_main.c
+++ linux-2.6/drivers/kvm/kvm_main.c
@@ -1130,7 +1130,7 @@ static void report_emulation_failure(str
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/kvm_main.c
===
--- linux-2.6.orig/drivers/kvm/kvm_main.c
+++ linux-2.6/drivers/kvm/kvm_main.c
@@ -490,33 +490,6 @@ static void inject_gp(struct kvm_vcpu *v
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/kvm.h
===
--- linux-2.6.orig/drivers/kvm/kvm.h
+++ linux-2.6/drivers/kvm/kvm.h
@@ -279,6 +279,8 @@ struct kvm_arch_ops {
void (*set_gdt)(struct kvm_vcpu
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/kvm_main.c
===
--- linux-2.6.orig/drivers/kvm/kvm_main.c
+++ linux-2.6/drivers/kvm/kvm_main.c
@@ -65,31 +65,6 @@ static struct kvm_stats_debugfs_item
A side effect of using vm86 mode to simulate real mode is that we mangle
the segment registers on mode switching. The new set_cr0_no_modeswitch()
accessor avoids the mangling when the restore is due to loading the virtual
machine from a file.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/kvm.h
===
--- linux-2.6.orig/drivers/kvm/kvm.h
+++ linux-2.6/drivers/kvm/kvm.h
@@ -260,6 +260,9 @@ struct kvm_arch_ops {
int (*hardware_setup)(void
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/kvm.h
===
--- linux-2.6.orig/drivers/kvm/kvm.h
+++ linux-2.6/drivers/kvm/kvm.h
@@ -445,11 +445,6 @@ static inline int is_external_interrupt
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/kvm.h
===
--- linux-2.6.orig/drivers/kvm/kvm.h
+++ linux-2.6/drivers/kvm/kvm.h
@@ -377,9 +377,6 @@ int kvm_write_guest(struct kvm_vcpu *vcp
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/kvm.h
===
--- linux-2.6.orig/drivers/kvm/kvm.h
+++ linux-2.6/drivers/kvm/kvm.h
@@ -400,19 +400,6 @@ static inline int is_paging(struct kvm_v
return vcpu
This patchset adds support for AMD processors with SVM (or AMD-V)
technology.
KVM on AMD is fairly fast despite the naive mmu implementation. It
should also support many more guests, since the real mode implementation
on AMD is complete.
The bulk of the work was performed by Yaniv; I ported
This patch adds definitions for the structures and constants defined by
the AMD SVM extensions.
It also adds definitions for the three SVM instructions, so that we do not
depend on newer assemblers.
Signed-off-by: Yaniv Kamay [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index
Jun Koi wrote:
Hi,
Could anybody tell me how to map memory of VMs in KVM (mapping done
from hypervisor)?
I am reading the source, but still cannot figure it out.
In the kernel, see struct kvm-memslots[x].phys_mem[y]. You need to
kmap()/kunmap() it before use.
In userspace, just
The clgi, stgi, and invlpga instructions are all too new to unleash on
the world's assemblers. Replace them with the opcode sequences.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
diff -X /home/avi/kvm/linux-2.6/Documentation/dontdiff --exclude=Makefile -ru
/home/avi/kvm/linux-2.6/drivers/kvm
Dmitry Melekhov wrote:
Hello!
I use ubuntu 6.06/amd64 but with kermel from kernel.org 2.6.17.8.
Processor is intel 920.
modprobe kvm_intel
then
qemu-system_x86_64 -hda vdisk.img -cdrom 1.iso -boot d -m 386
I get
[ 98.951991| msrs: 6
[ 98.952860] qemy-system_x86[4811]: segfault at
Roland Dreier wrote:
Here's a trivial patch that adds log levels to all printks. This
avoids ugly things like
Message from [EMAIL PROTECTED] at Wed Nov 29 14:01:01 2006 ...
roland-xeon-2 kernel: [81842.565619] msrs: 6
popping up in a console on my system when starting a guest.
From: Ingo Molnar [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
diff -X /home/avi/kvm/linux-2.6/Documentation/dontdiff --exclude=Makefile -ru
/home/avi/kvm/linux-2.6/drivers/kvm/kvm.h /home/avi/kvm-release/kernel/kvm.h
--- linux-2.6/drivers/kvm/kvm.h 2006-11-29 17:50
This allows FreeBSD 6.2rc1 to boot.
Also, don't pretend to support lmsw (mem).
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/x86_emulate.c
===
--- linux-2.6.orig/drivers/kvm/x86_emulate.c
+++ linux-2.6
Avi Kivity wrote:
Whats wrong? :-(
This patch is for kvm, which lives in the -mm kernel. Apply the
latest -mm patch first.
Oh, and visit http://kvm.sourceforge.net first :)
--
error compiling committee.c: too many arguments to function
This makes the SET_SREGS ioctl behave symmetrically to the GET_SREGS
ioctl wrt the segment access rights flag.
From: Uri Lublin [EMAIL PROTECTED]
Signed-off-by: Uri Lublin [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/vmx.c
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/kvm_main.c
===
--- linux-2.6.orig/drivers/kvm/kvm_main.c
+++ linux-2.6/drivers/kvm/kvm_main.c
@@ -72,17 +72,6 @@ static struct dentry *debugfs_dir;
#define
The arch splitting patchset left an extra put_cpu() in core code, where
it can cause trouble for CONFIG_PREEMPT kernels.
Reported by: Huihong Luo [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/kvm_main.c
at all times.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/mmu.c
===
--- linux-2.6.orig/drivers/kvm/mmu.c
+++ linux-2.6/drivers/kvm/mmu.c
@@ -61,22 +61,9 @@
#define PT32_PTE_COPY_MASK
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/MAINTAINERS
===
--- linux-2.6.orig/MAINTAINERS
+++ linux-2.6/MAINTAINERS
@@ -1745,6 +1745,13 @@ W: http://nfs.sourceforge.net/
W: http://www.cse.unsw.edu.au
http://kvm.sourceforge.net
Changes:
- AMD 32-bit host support (Anthony Liguori)
- more migration work
- stabilization
- improved performance
- improved guest support on AMD
--
error compiling committee.c: too many arguments to function
Dor Laor wrote:
Windows XP Professional works, but only if I turn off ACPI (-no-acpi).
The only thing that fails is poweroff/reboot (well, no ACPI, no way to
turn off the power, right?) but you can do that manually. If I turn
ACPI
on, I get a bluescreen complaining about
Michael Riepe wrote:
Did I mention that kvm dies a horrible death (Aiee, killing interrupt
handler!) when I configure the kernel with CONFIG_PREEMPT=y? Currently
I use CONFIG_PREEMPT_NONE.
I'll investigate this. I thought we had this fixed.
--
error compiling committee.c: too many
Randy Dunlap wrote:
From: Randy Dunlap [EMAIL PROTECTED]
KVM config items need to be inside a menu structure instead of
dangling off of Device Drivers.
A similar patch (kvm-put-kvm-in-a-new-virtualization-menu.patch) is
already queued in -mm.
Andrew, Randy's patch shouldn't be applied,
Michael Riepe wrote:
Avi Kivity wrote:
Michael Riepe wrote:
Did I mention that kvm dies a horrible death (Aiee, killing interrupt
handler!) when I configure the kernel with CONFIG_PREEMPT=y? Currently
I use CONFIG_PREEMPT_NONE.
I'll investigate this. I thought we had
Michael Riepe wrote:
By the way: I get myriads of kvm: unhandled rdmsr: c081 messages
in my syslog, but they don't seem to cause any further harm.
Which guest does this happen with? AFAICT this should be handled well
(vmx.c:vmx_get_msr() - find_msr_entry())
If you'd like to debug
They're not on speaking terms.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/svm.c
===
--- linux-2.6.orig/drivers/kvm/svm.c
+++ linux-2.6/drivers/kvm/svm.c
@@ -377,6 +377,7 @@ static __init int
From: Michael Riepe [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/vmx.c
===
--- linux-2.6.orig/drivers/kvm/vmx.c
+++ linux-2.6/drivers/kvm/vmx.c
@@ -1175,8 +1175,10 @@ static int
It seems macbooks set bit 2 but not bit 0, which is an enabled but vmxon
will fault setting.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/vmx.c
===
--- linux-2.6.orig/drivers/kvm/vmx.c
+++ linux-2.6
This incremental patch fixes the macbook issue for real.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Tested-by: Alex Larsson (sometimes testing helps)
Index: linux-2.6/drivers/kvm/vmx.c
No serious changes from the last release, but a couple of
shoot-self-in-foot bugs have been fixed. After the recent increase in
exposure, it's best to have a stable release out there.
- prevent loading arch module on wrong hardware
- fix for macbooks
- other minor fixes
--
error compiling
Michael Riepe wrote:
vmx_get_msr() actually works fine. The problem is in vmx_vcpu_setup(),
in the loop starting at line 1142. It tries to read all the MSRs listed
in vmx_msr_index, but it fails for MSR_K6_STAR. With earlier releases, I
also used to see the kernel message kvm: msrs: 1 - that
Franco Spinelli wrote:
I am testing kvm on my new PC
MB is Asus M2NPV-VM with AMD CPU X2.
Installed OS is Ubuntu Edgy
I get kvm tarball and compiled it.
After installing gcc 3.4 I begin compile step
On Ubuntu Edgy there is no uuid/uuid.h file so I have grab it from tar
file at Ubuntu
Franco Spinelli wrote:
Using dmesg command I geta lot of this error:
[17192500.496000] kvm: unhandled rdmsr: 0xc081
The attached patch should fix it (we didn't handle MSR_STAR on 32-bit
AMD hosts)
--
error compiling committee.c: too many arguments to function
Index: kernel/svm.c
If you've experienced this problem, please test the attached patch (to
qemu, not the kernel module) and report back. The patch basically tells
the guest that the msr doesn't exist.
--
error compiling committee.c: too many arguments to function
Index: qemu/qemu-kvm.c
From: James Morris [EMAIL PROTECTED]
Consolidate the logic for checking whether a vcpu index is valid. Also,
use likely(), as a valid value should be the overwhelmingly common case.
Signed-off-by: James Morris [EMAIL PROTECTED]
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6
They're not on speaking terms.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/svm.c
===
--- linux-2.6.orig/drivers/kvm/svm.c
+++ linux-2.6/drivers/kvm/svm.c
@@ -377,6 +377,7 @@ static __init int
Avi Kivity wrote:
They're not on speaking terms.
Please disregard - this patch was already sent. Slippery fingers.
--
error compiling committee.c: too many arguments to function
-
Take Surveys. Earn Cash. Influence
This is necessary for linux guests.
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/svm.c
===
--- linux-2.6.orig/drivers/kvm/svm.c
+++ linux-2.6/drivers/kvm/svm.c
@@ -402,11 +402,11 @@ static __init int
Fixes sf bug 1614113 (segfaults in nbench).
Signed-off-by: Avi Kivity [EMAIL PROTECTED]
Index: linux-2.6/drivers/kvm/svm.c
===
--- linux-2.6.orig/drivers/kvm/svm.c
+++ linux-2.6/drivers/kvm/svm.c
@@ -575,6 +575,8 @@ static int
Michael Riepe wrote:
Oh well...
I was wondering which stupid piece of sh^H^Hcode generated so many wrong
rdmsr instructions without looking at the CPU feature flags. So I
grepped through the linux kernel and glibc sources as well as some other
likely suspects and found - nothing.
Guess
[EMAIL PROTECTED] wrote:
Good moorning, I changed the -boot option in 'c' but when my Windows Xp boot
to complete the installation I got the following errors:
unhandled vm exit: 0x8022
rax 0800 rbx ffdff120 rcx c080 rdx
rsi
Avi Kivity wrote:
Michael Riepe wrote:
Oh well...
I was wondering which stupid piece of sh^H^Hcode generated so many wrong
rdmsr instructions without looking at the CPU feature flags. So I
grepped through the linux kernel and glibc sources as well as some other
likely suspects and found
[EMAIL PROTECTED] wrote:
My cpu model is :
Intel(R) Pentium(R) D CPU 3.60GHz
I have a Intel(R) Pentium(R) D CPU 3.00GHz on one of my boxes. Strange.
--
error compiling committee.c: too many arguments to function
-
[EMAIL PROTECTED] wrote:
I applyed the patch.
Attacched here there is the dmesg output.
Please run the attached program and report output.
Before you run it, run 'modprobe msr' and check you have a /dev/cpu/0/msr.
--
error compiling committee.c: too many arguments to function
#define
[EMAIL PROTECTED] wrote:
I did not understand ... sorry.
Let me to explain what I am doing...
modprobe -r kvm-intel
cd kvm-7
patch kernel/vmx.c your_first_patch_file
pacth kernel/vmx.c your_second_patch_file
make
make install
modprobe -r kvm-intel
Then I lauch the winxp boot.
Is it
[EMAIL PROTECTED] wrote:
OK
I restored the original vmx.c file and I applyed the second patch but
wueh I boot winxp no lines are addes in /var/log/messages and dmesg
produces the following :
kvm: msrs: 6
How does it crash now?
--
Do not meddle in the internals of kernels, for they are
[EMAIL PROTECTED] wrote:
Now I execute:
/usr/local/bin/qemu-system-x86_64 -no-acpi -hda
/root/winXP/windows_kvm.disk -boot c -m 512
On the terminal where I execute the command the following appears:
unhandled vm exit: 0x8022
rax 0800 rbx ffdff120 rcx
Michael Riepe wrote:
Hi!
I found this footnote in my Intel docs (22.4):
Processing of an entry fails in any of the following cases:
[...]
• An attempt to write bits 127:64 to the MSR indexed by bits 31:0 of the
entry
would cause a general-protection exception if executed
Dmitry Melekhov wrote:
Hello!
v7 with 2.6.19.1 works OK.
Excellent! Thanks for the feedback.
--
Do not meddle in the internals of kernels, for they are subtle and quick to
panic.
-
Take Surveys. Earn Cash.
Stuart Johnson wrote:
I have two Windows boxes for my day job (Win2K and WinXP). I will be
working from home soon, and I don't want more computers in my house. I
really want to run everything on Linux if possible.
I plan to get a Core 2 Duo, with Gentoo Linux 64, and at least 2Gb of RAM.
Michael Riepe wrote:
Hi!
Avi Kivity wrote:
The way to fix is to add handling to {svm,vmx}_get_msr() for msr 1 (and
any other pointless msrs the guest reads or writes). From a cursory
reading of the machine check docs, returning 0 should be fine for msr 1.
Yep
Michael Riepe wrote:
OpenSolaris runs on Intel with a simple modification: force the CS limit
to 0x in real mode (I wonder why that didn't happen already).
Plan9, on the other hand, seems to execute code outside the 64K range.
With cs-limit.patch, it dies at RIP 0x100212. I'm afraid we
Mark Clarkson wrote:
Hi,
When using WinXP I get a completely white screen whenever I change the
resolution and just before the Windows GUI comes up, which lasts for
around 20 seconds.
That is a known issue. Windows is clearing the screen using mmio
writes. We have hacks to convert the
[EMAIL PROTECTED] wrote:
Hi, modifing the patch and launching windows boot it reports the
following:
kvm: msrs: 6
VMentry guest msr[0] index=c084 data=3700
VMentry guest msr[1] index=c082 data=8025be90
VMentry guest msr[2] index=c083 data=8025efa0
VMentry
Dmitry Melekhov wrote:
Avi Kivity пишет:
Dmitry Melekhov wrote:
Hello!
I tested linux x86 and windows xp with v7.
Linux can't get ip address from dhcp server, but if I set it
manually all works OK.
Windows can't get address from dhcp server too and even manual
assignment doesn't help
James Jacobsson wrote:
Is KVM supposed to be a generic VT-x/SVM abstraction layer, or is it
supposed to be yet-another Qemu backend?
kvm is intended to be a generic hardware virtualization abstraction
layer (not limited to VT-x/SVM -- if the ppc folk want in, they're welcome).
That said,
[EMAIL PROTECTED] wrote:
Hi, I reverted all patched and applied last one.
How when windows XP start the qemu windows remains frozen . No
warnings o messages are displayed.
The host cannot be reachable from network.
Please send the host .config.
--
error compiling committee.c: too many
[EMAIL PROTECTED] wrote:
Hu,
where is .config file ?
I did not find it in kvm directory .
The .config file used to compile the kernel. If you didn't compile it
yourself, it can probably be found in /boot/config-2.6.18.x.y.z for
something similar.
What distribution are you using?
--
Mark Clarkson wrote:
Unfortunately the slow network performance and the fact that, on my
setup at least, network io takes 100% of a single core means that kvm is
not currently useful for server use.
Certainly, kvm is slow right now for server use. This will improve
quickly though.
I
[EMAIL PROTECTED] wrote:
Dec 19 12:10:10 timb194083 kernel: Process qemu-system-x86 (pid: 2947,
threadinfo 81005ccd8000, task Dec 19 12:10:10 timb194083 kernel:
Dec 19 12:10:10 timb194083 kernel: Dec 19 12:10:10 timb194083 kernel:
Code: 0f 30 41 ff c0 48 83 c7 10 41 39 f0 7c e4 c3 45 31 c0
rongeens7 wrote:
All,
I am experimenting somewhat with kvm on an
ubuntu edgy system, and am now trying to install
a plain ubuntu dapper from CD into a VM.
The problem is that I cannot get past the lilo prompt,
in fact the Qemu process craches immediately after doing
starting up its bios.
[EMAIL PROTECTED] wrote:
I tried with the -vnc option.
My host frozen.
Ok. I sure don't know what's wrong on that machine then.
I'll try to come up with a better patch.
--
error compiling committee.c: too many arguments to function
Commits to the kvm subversion repository are now sent to a mailing list,
[EMAIL PROTECTED] If you wish to track development
closely, you can subscribe to the mailing list.
Please note that development occurs on several branches; not every
commit will be available in the next release.
Anthony Liguori wrote:
Avi Kivity wrote:
Anthony Liguori wrote:
Any thoughts?
SMM continues the tradition of making each x86 generation hackier
than before.
What happens (probably) is that the virtual hardware unmaps the vga
memory when SMM is entered, and uses the physical memory
Anthony Liguori wrote:
Howdy,
The attached patch forward ports the KVM patch to QEMU's CVS. The
only significant change needed was hacking the Bochs BIOS to
dynamically disable SMM support if KVM is enabled. This was done by
using one of the Bochs DEBUG ports. Probably not the best
James Jacobsson wrote:
I've revised the documentation patch,
Applied; thanks.
and I've also created a new
version of the building KVM without gcc 3.x patch.
I'll take a closer look at this later.
--
error compiling committee.c: too many arguments to function
Anthony Liguori wrote:
Avi Kivity wrote:
There are four issues I can see:
- if there are multiple sources of kvm userspace, there are bound to
be problems with incompatible kernel API and userspace, especially as
I have plans for extensive changes to the API. I'll go and implement
Xu Nakajima wrote:
Hello,
I have an AMD machine with 3800+ Dual Core Processor
Athlon(tm) processor (x86_64).
FC6 (x86_64) is installed on this machine.
This processor DOES support SVM
(cat /proc/cpuinfo | grep flags shows a line which
includes svm).
I had built kvm-7 on that machine.
Haw-Yuan Yang wrote:
I have installed two WinXP pro guests on kvm8+FC5+VT
machine and experienced serious task scheduling problem (guest stop
and go) when two guests are running at the same time. Is it known
issue or I did some thing wrong during the installation?
It is not a known
Haw-Yuan Yang wrote:
Host PC configuration:
CPU: Intel Pentium D 925 Dual Core.
RAM: 2GByte
Kernel version: 2.6.15 smp
Problem: After two WinXP pro guest start, mouse response in guest
window is kind of up and down sometimes good and sometimes have no
response at all .
Can you
1 - 100 of 3824 matches
Mail list logo