On Tue, Jan 30, 2007 at 01:03:20PM +0100, Yellis Services wrote:
Hello,
I have adapted a xen path to kvm-qemu.
This patch enable auth in vnc
qemu ../.. -hda=/home/os.img -vnc -vncpasswd toto
work with vncviewer on linux and Win.
Don't work with vncviewer applet via http, must be fixed.
On Mon, Feb 19, 2007 at 01:01:36PM +0200, Avi Kivity wrote:
The big news here is the update to qemu 0.9.0.
Changes from kvm-13:
- qemu 0.9.0
- too many goodies to list
- kvm can no longer share qemu's bios on Intel hosts due to real mode
trouble. use the supplied bios.
- migration
FYI, as of libvirt 0.2.0 and virt-manager 0.3.1 there is now (experimental!)
support for managing virtual machines running under QEMU or KVM virtualization
platforms, as well as the existing Xen support.
Project sites:
http://libvirt.org/
http://virt-manager.org/
Release announcements
On Sun, Feb 25, 2007 at 07:32:58AM +0200, Avi Kivity wrote:
Daniel P. Berrange wrote:
FYI, as of libvirt 0.2.0 and virt-manager 0.3.1 there is now
(experimental!)
support for managing virtual machines running under QEMU or KVM
virtualization
platforms, as well as the existing Xen support
On Sun, Feb 25, 2007 at 10:34:15AM +0200, Avi Kivity wrote:
Avi Kivity wrote:
Daniel P. Berrange wrote:
FYI, as of libvirt 0.2.0 and virt-manager 0.3.1 there is now
(experimental!)
support for managing virtual machines running under QEMU or KVM
virtualization
platforms, as well
On Fri, Apr 27, 2007 at 02:29:52PM -0700, jd wrote:
Hi
This is a great project with a lots and lots of potential. I have a
bunch of questions related to managing kvm VMs.
I would like to know what kind of options are available for doing
effective management ot KVM/QEMU
On Mon, Apr 30, 2007 at 07:01:55PM -0700, jd wrote:
Does libvirt use ps -ef | grep qemu to find out qemu processes ? Or it
manages only ones that are started using libvirt. Using some naming scheme.
We only manage instances started by libvirt. We (briefly) considered 'ps ef'
but this is not at
On Wed, May 16, 2007 at 12:28:00PM -0500, Anthony Liguori wrote:
Eric Van Hensbergen wrote:
On 5/11/07, Anthony Liguori [EMAIL PROTECTED] wrote:
There's definitely a conversation to have here. There are going to be a
lot of small devices that would benefit from a common transport
On Fri, Jun 29, 2007 at 04:05:22PM +0800, youhongyu wrote:
hi all,
i use: fc7, built in xen, kvm.
i boot my machine into normal kernal and install a guest os by vir-manager,
and i encounter a strange situation the save command from virtual-
manager menu failed! it pop out a small
On Wed, Jul 18, 2007 at 10:32:06PM +0300, Ian Brown wrote:
Hello,
Thanks, Anthony.
I tried both #2 and #3.
It does not say any error, but still I cannot access the USB disk on key.
Maybe I miss something ?
Here are few more details.
When I ran:
/usr/local/kvm/bin/qemu-system-x86_64
On Fri, Jul 20, 2007 at 03:32:16PM -0400, David Windsor wrote:
Hi,
After a bit more discussion about integrating SELinux and KVM, it seems that
there is little interest in adding enforcement hooks to KVM as it stands.
Once KVM gets some type of inter-vm communication mechanism, MAC hooks
On Fri, Jul 20, 2007 at 04:30:22PM -0400, James Morris wrote:
On Fri, 20 Jul 2007, Daniel P. Berrange wrote:
It could be - if your put the policy at the control API layer instead of
in QEMU itself.
Then you can bypass MAC security by invoking qemu directly.
Isn't that upto the policy
On Fri, Jul 20, 2007 at 05:57:29PM -0400, David Windsor wrote:
On 7/20/07, James Morris [EMAIL PROTECTED] wrote:
On Fri, 20 Jul 2007, Daniel P. Berrange wrote:
It could be - if your put the policy at the control API layer instead of
in QEMU itself.
I think that libvirt may be a bit too
On Mon, Jul 23, 2007 at 02:19:41PM +0300, Avi Kivity wrote:
Avi Kivity wrote:
Carsten Otte wrote:
Avi Kivity wrote:
From a Linux point of view, the pid identifies the VM. A
management application can, however, use its own VM identifiers as
it sees fit, and map the (possibly
On Mon, Jul 23, 2007 at 04:39:33PM +0300, Avi Kivity wrote:
Daniel P. Berrange wrote:
When managing QEMU KVM guests, libvirt provides 3 identifiers with
varying levels of uniqueness
- ID - a integer unique amongst all active guests on a host
- Name - a string uninque amongst all active
On Wed, Aug 01, 2007 at 01:52:39AM +1000, Paul J R wrote:
Hi guys, I had a quick question.
I was playing around writing a php-based web interface for KVM.
Basically something that would allow you to use a tiny distro and let
you manage disk/net etc via php (atm its crude to say the least).
On Wed, Aug 01, 2007 at 03:26:57AM +1000, Paul J R wrote:
Wow, those are both pretty informative. Given both those replies, i'm
wondering if i should continue?
The kind of thing I had in mind was relatively simple, it'd be a
miniture OS that would boot up (over pxe/usb/cdrom) into ram (its
On Tue, Jul 31, 2007 at 09:33:30AM -0700, Matthew Kent wrote:
The problem is security,
Authenticating users on the page is simple enough, but i cant see a
method by which i could put a password on the vnc port in qemu?
http://fedoraproject.org/wiki/Releases/FeatureVirtSecurity is a
On Thu, Aug 02, 2007 at 02:25:46AM +1000, Paul J R wrote:
Yeah, i did look at libvirt and it remains an option. Originally this
was all going to be built around xen (I got xen running on two servers
and had it changing the number of cpu's in a pv host on the fly as well
as live-migrate
On Wed, Aug 01, 2007 at 12:48:51PM -0400, Dimitry Golubovsky wrote:
OK, I'll try to summarize that. However I'd also like to make a
feature request: a virtual character device (sort of a virtual serial
line) that the guest OS might use to communicate with the QEMU
monitor. That might solve
On Tue, Aug 14, 2007 at 10:26:24PM -0500, Anthony Liguori wrote:
On Wed, 2007-08-15 at 05:44 +0300, Avi Kivity wrote:
Slohm Gadaburi wrote:
How can I know if the qemu I ran took advantage of the kvm module ?
No one mentioned my favorite: when kvm is in control, the title bar of
On Wed, Aug 15, 2007 at 01:43:58AM -0300, Jorge Luc?ngeli Obes wrote:
On 8/15/07, Daniel P. Berrange [EMAIL PROTECTED] wrote:
On Tue, Aug 14, 2007 at 10:26:24PM -0500, Anthony Liguori wrote:
On Wed, 2007-08-15 at 05:44 +0300, Avi Kivity wrote:
Slohm Gadaburi wrote:
How can I know
On Wed, Sep 05, 2007 at 10:34:45PM +0300, Avi Kivity wrote:
Anthony Liguori wrote:
On Wed, 2007-09-05 at 20:45 +0300, [EMAIL PROTECTED] wrote:
Hi,
It's a pity not to use a host CPU feature if it is available. This patch
exposes host CPU features to guests. It allows fine-tuning the
On Sun, Sep 16, 2007 at 11:52:56AM +0200, Avi Kivity wrote:
Ferry Huberts wrote:
Avi Kivity wrote:
Ferry Huberts wrote:
I really recommend against using the kvm initscript... it is fragile
is broken. On Fedora, you can use the standard initscripts (well,
they are fragile and
On Wed, Sep 26, 2007 at 05:47:20PM +0200, Laurent Vivier wrote:
Hi,
I think there is a bug in qemu RTL8139.
RTL8139 uses:
cpu_register_physical_memory(addr + 0, 0x100, s-rtl8139_mmio_io_addr);
But in the comment of cpu_register_physical_memory() we have:
'size' must be a multiple
On Wed, Oct 10, 2007 at 10:28:24AM +0200, Avi Kivity wrote:
We've now switched to allocating guest memory in userspace rather than
in the kernel. This is important if you have a mainframe, but also if
you want to share memory between guests and implement nice features like
swapping.
Is the
On Tue, Oct 16, 2007 at 04:22:14AM -0500, Carlo Marcelo Arenas Belon wrote:
Greetings,
kvm's configure calls qemu's configure with --enable-alsa, making the
existence and use of alsa a dependency; with the import of the latest CVS
qemu, a similar implicit dependency has been added for gnutls
On Sat, Nov 10, 2007 at 09:20:36PM -0600, Anthony Liguori wrote:
This patch implements a very naive virtio block device backend in QEMU.
There's a lot of room for future optimization. We need to merge a -disk patch
before we can provide a mechanism to expose this to users.
The latest
On Tue, Jan 08, 2008 at 11:13:08AM -0800, Dave Hansen wrote:
On Tue, 2008-01-08 at 12:12 +0530, Amit Shah wrote:
BIOS-provided physical RAM map:
BIOS-e820: - 0009fc00 (usable)
BIOS-e820: 0009fc00 - 000a (reserved)
BIOS-e820:
The announcement below may well be of interest to people involved
in KVM. oVirt is using libvirt as its mnagement API, and the current
builds use Fedora 9 + KVM to get a cutting edge virtualization
platform / technology in combination with cutting edge Linux kernels :-)
If anyone's interested,
On Tue, Mar 04, 2008 at 01:28:24PM -0600, Anthony Liguori wrote:
Glauber Costa wrote:
My main interest is in management tools being able to specify pinning
set ups at VM creation time.
As I said, it can be done through tools like taskset, but then you'd
have to know:
* when are the
On Tue, Mar 04, 2008 at 01:30:42PM -0600, Anthony Liguori wrote:
Daniel P. Berrange wrote:
On Tue, Mar 04, 2008 at 03:34:33PM -0300, Marcelo Tosatti wrote:
Add monitor command to hot-add PCI devices (nic and drive).
[snip]
Index: kvm-userspace.hotplug/qemu/monitor.c
On Tue, Mar 04, 2008 at 05:00:09PM -0300, Marcelo Tosatti wrote:
On Tue, Mar 04, 2008 at 01:32:22PM -0600, Anthony Liguori wrote:
Daniel P. Berrange wrote:
nic_remove [vlan=n][,macaddr=addr][,model=type]
drive_remove [[file=file][,if=type][,bus=n][,unit=m][,media=d][index=i
On Sun, Mar 09, 2008 at 11:26:43AM +0200, Gilad Ben-Yossef wrote:
Glauber Costa wrote:
This patch introduces a thread_id variable to CPUState.
It's duty will be to hold the process, or more generally, thread
id of the current executing cpu
env-nb_watchpoints = 0;
+#ifdef __WIN32
On Tue, Mar 18, 2008 at 05:01:09PM +0200, Avi Kivity wrote:
This is the first release of network drivers for Windows guests running
on a kvm host. The drivers are intended for Windows 2000 and Windows XP
32-bit. kvm-61 or later is needed in the host. At the moment only
binaries are
On Tue, Apr 01, 2008 at 08:03:14PM +0300, Avi Kivity wrote:
Anthony Liguori wrote:
Avi Kivity wrote:
[EMAIL PROTECTED] wrote:
From: Ben-Ami Yassour [EMAIL PROTECTED]
Enable a guest to access a device's memory mapped I/O regions directly.
Userspace sends the mmio regions that the
On Tue, Apr 01, 2008 at 08:10:31PM +0200, Andrea Arcangeli wrote:
On Tue, Apr 01, 2008 at 06:18:07PM +0100, Daniel P. Berrange wrote:
and very few application domains are allowed to access them. THe KVM/QEMU
policy will not allow this for example. Basically on the X server, HAL
On Thu, Apr 17, 2008 at 02:26:50PM -0500, Anthony Liguori wrote:
Posix AIO, especially as used by QEMU, is not very efficient for disk IO.
This patch introduces an AIO abstract to allow multiple AIO implements to be
used. We can't simply replace posix-aio by linux-aio because linux-aio only
On Thu, Apr 17, 2008 at 02:41:32PM -0500, Anthony Liguori wrote:
Daniel P. Berrange wrote:
On Thu, Apr 17, 2008 at 02:26:50PM -0500, Anthony Liguori wrote:
Posix AIO, especially as used by QEMU, is not very efficient for disk IO.
This patch introduces an AIO abstract to allow multiple AIO
On Tue, Apr 22, 2008 at 02:26:45PM -0300, Marcelo Tosatti wrote:
On Tue, Apr 22, 2008 at 11:31:11AM -0500, Anthony Liguori wrote:
Avi Kivity wrote:
Anthony Liguori wrote:
I think we need to decide what we want to target in terms of upper
limits.
With a bridge or two, we can
On Wed, Apr 30, 2008 at 07:39:53AM -0600, David S. Ahern wrote:
Avi Kivity wrote:
David S. Ahern wrote:
Another tidbit for you guys as I make my way through various
permutations:
I installed the RHEL3 hugemem kernel and the guest behavior is *much*
better.
System time still has some
On Fri, May 02, 2008 at 01:52:18PM +0300, Avi Kivity wrote:
nadim khemir wrote:
Hi, great work.
While playing with kvm-qemu I noticed a few points that might be of
interrest:
1/ -loadvm and -snapshot don't work together. It works as if -loadvm wasn't
passed as argument
2/ two
for KVM, but better to keep 100% in sync with QEMU code
for easier future merges
Signed-off-by: Daniel P. Berrange [EMAIL PROTECTED]
Regards
Daniel.
diff --git a/qemu/vl.c b/qemu/vl.c
index 74be059..b6b1c58 100644
--- a/qemu/vl.c
+++ b/qemu/vl.c
@@ -2301,28 +2301,78 @@ static CharDriverState
On Thu, May 08, 2008 at 05:02:28PM +0300, Eren T?rkay wrote:
Hello,
An advisory about $subject was released today by secunia. The security flaw
was fixed in QEmu SVN repository.
Kvm uses some of the old version of qemu that I can't backport patch I
grabbed
from qemu svn repository.
On Tue, May 13, 2008 at 06:07:08PM -0500, Anthony Liguori wrote:
Anthony Liguori wrote:
I think this is pretty useful as-is. I think it also gives us a reasonable
way to move forward that will keep everyone pretty happy.
Here's a short example:
qemu-system-x86_64 -hda
On Wed, May 14, 2008 at 02:26:40PM +0200, Fabrice Bellard wrote:
Avi Kivity wrote:
Fabrice Bellard wrote:
I prefer:
drive.file=foo.img
drive.if=scsi
That doesn't support multiple drives very well.
Right, I realized it afterwards !
I suggested it because my original plan
On Wed, May 14, 2008 at 05:52:56PM +0300, Dor Laor wrote:
On Wed, 2008-05-14 at 17:41 +0300, Avi Kivity wrote:
Daniel P. Berrange wrote:
That's very nearly YAML format[1], which is attractive because parsers
are available in every major programming language, and it is still
pretty
On Wed, May 14, 2008 at 09:45:02AM -0500, Javier Guerra wrote:
What about Lua? (http://www.lua.org)
it started up as a configuration language, and evolved into a full
programming language, while remaining _very_ light (less than 200K
with all libraries), and wonderfully easy to embed into C
On Thu, May 15, 2008 at 11:04:47AM +0300, Avi Kivity wrote:
Daniel P. Berrange wrote:
With this kind of syntax, now tools generating config files need to make
up unique names for each drive. So you'll probably end up with them just
naming things based on the class name + a number appended
49 matches
Mail list logo