Hi!
KVM segfaults for me when emulating a NIC using the TCP listen option.
The host is a AMD Athlon running 64 bit Ubuntu 8.10 (with stock kernel
release 2.6.27-7-generic #1 SMP Tue Nov 4 19:33:06 UTC 2008 x86_64
GNU/Linux). I recently downloaded kvm-84 because the same nuissance
happened to me
HI,
i'm using KVM-84 on a fc9 linux system running winxp inside
and it works great !
My devicemanager shows me a unknown device with the following ID:
PCI\VEN_1AF4DEV_1003SUBSYS_00031AF4REV_00\313C0B0C5028
The vendor ID (1af4) is qemu ;-)
So, what this for a device ? Where can I find
Avi, could you apply this patch to kvm.git and linux-2.6.29-rcx? It
fixes cross vendor migration with multithreaded guest applications.
Also the two cross-vendor migration patches (in this very place) from Amit from
October are not in upstream Linux, could you push (or pull-request) them?
On Fri, 2009-02-20 at 10:42 +0530, Jaswinder Singh Rajput wrote:
On Thu, 2009-02-19 at 15:50 -0600, Hollis Blanchard wrote:
A recent kernel merge breaks kvm-userspace build:
make[1]: Entering directory `/root/hollisb/kvm-userspace.git/libkvm'
gcc -m64 -D__x86_64__ -MMD -MF
Daniel Schwager wrote:
My devicemanager shows me a unknown device with the following ID:
PCI\VEN_1AF4DEV_1003SUBSYS_00031AF4REV_00\313C0B0C5028
This would be the virtio replacement for the serial console. Windows
doesn't really have a serial console at all, so don't worry about it.
On Fri, Feb 20, 2009 at 05:26:22PM +0100, Daniel Schwager wrote:
Hi,
are there some known issues using kvm-84
- to break in into the Dom0
- to corrupt the Dom0
- to ... Dom0
Are there some thinks I have to configure in Dom0
to safe Dom0 against DomU's ?
This is
This patch correctly sets the host vmx state to shadow guest state when
it enters long mode.
With this fix, we can have is_long_mode() test for EFER.LMA instead of EFER.LME
which was done in commit 3a001629eea909b2aa97f001a9db4700f15d986b but reverted
in commit
setup_msrs() should be called when entering long mode to save the
shadow state for the 64-bit guest state.
Using vmx_set_efer() in enter_lmode() removes some duplicated code
and also ensures we call setup_msrs(). We can safely pass the value
of shadow_efer to vmx_set_efer() as no other bits in
Joerg Roedel schrieb:
On Fri, Feb 20, 2009 at 05:26:22PM +0100, Daniel Schwager wrote:
Hi,
are there some known issues using kvm-84
- to break in into the Dom0
- to corrupt the Dom0
- to ... Dom0
Are there some thinks I have to configure in Dom0
to safe Dom0 against DomU's
This is absolutly no risk in KVM just because there is no Dom0. I
guess
you mean if there is any way to break out of a guest and hack the
host.
As far as I know there are no known security issue.
He may also want to prevent guest from accessing the host via network.
Place the guest in
On Fri, 2009-02-20 at 09:44 -0600, Hollis Blanchard wrote:
Avi, would you pull kvm-userspace
05acb1ae99a8b55c9745f2e566010213cf52a819 into maint/2.6.29 branch
please?
Also needed in maint/2.6.29:
commit 3f7cba35281a5b2dba008179a4979d737105574d
Author: Avi Kivity a...@redhat.com
Date: Thu
Hi Joerg,
On Thu, Feb 19, 2009 at 04:29:36PM +0100, Joerg Roedel wrote:
The current method of finding out the size of huge pages does not work
reliable anymore. Current Linux supports more than one huge page size
but /proc/meminfo only show one of the supported sizes.
To find out the real
Running an XP0 guest under kvm-84 with Cirrus VGA, screen updates (notably
when copying regions of windows around during scrolling) are delayed or
lost, so that indivudual window contents are occasionally illegible. After
waiting a while, or moving the mouse around over the window, the updates
On 2/20/09, Aurelien Jarno aurel...@aurel32.net wrote:
On Tue, Feb 17, 2009 at 04:55:51PM +0200, Blue Swirl wrote:
On 2/17/09, Liu Yu yu@freescale.com wrote:
MPIC and OpenPIC have very similar design.
So a lot of code can be reused.
Modification mainly include:
1.
14 matches
Mail list logo