HOST: cpu: AMD Opteron(TM) Processor 6234 kvm --version: QEMU emulator version 1.4.1, Copyright (c) 2003-2008 Fabrice Bellard uname -a: Linux bear 2.6.32-19-pve #1 SMP Wed May 15 07:32:52 CEST 2013 x86_64 GNU/Linux ----------------------- GUEST: OS: Solaris 10 uname -a: SunOS solaris10 5.10 Generic_147148-26 i86pc i386 i86pc isainfo -v: 64-bit amd64 applications amd_lzcnt amd_sse4a sse2 sse fxsr mmx cmov amd_sysc cx8 tsc fpu 32-bit i386 applications amd_lzcnt amd_sse4a sse2 sse fxsr mmx cmov amd_sysc cx8 tsc fpu comand: /usr/bin/kvm -id 108 -chardev socket,id=qmp,path=/var/run/qemu-server/108.qmp,server,nowait -mon chardev=qmp,mode=control -vnc unix:/var/run/qemu-server/108.vnc,x509,password -pidfile /var/run/qemu-server/108.pid -daemonize -name Templ-SOLARIS10 -smp sockets=1,cores=1 -cpu qemu64 -nodefaults -boot menu=on -vga std -k en-us -m 2048 -cpuunits 1000 -device piix3-usb-uhci,id=uhci,bus=pci.0,addr=0x1.0x2 -device virtio-balloon-pci,id=balloon0,bus=pci.0,addr=0x3 -drive file=/var/lib/vz/images/108/root.qcow2,if=none,id=drive-ide0,aio=native,cache=none -device ide-hd,bus=ide.0,unit=0,drive=drive-ide0,id=ide0,bootindex=100 -drive file=/var/lib/vz/template/iso/sol-10-u11-ga-x86-dvd.iso,if=none,id=drive-ide2,media=cdrom,aio=native -device ide-cd,bus=ide.1,unit=0,drive=drive-ide2,id=ide2,bootindex=200 -netdev type=tap,id=net0,ifname=tap108i0,script=/var/lib/qemu-server/pve-bridge -device e1000,romfile=,mac=6A:CC:9C:A5:0D:EC,netdev=net0,bus=pci.0,addr=0x12,id=net0 -rtc base=localtime -machine accel=tcg I have error at boot time: "trap: Unknown trap type 8 in user mode panic[cpu0]/thread=fffffffffbc29a40: BAD TRAP: type=9 (#9 Coprocessor segment overrun) rp=fffffffffbs32b28 addr=0" http://hostingkartinok.com/show-image.php?id=6d55cc901d7ce00efc82ef61e00771e3 This error occurs only if I use hardware virtualization, but if I don't use hardware virtualization guest os boot without errors and works very slowly. -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html