The idea works, you just have to make the /dev/kvm device
visible in the lxc with something like:

lxc.cgroup.devices.allow = c 10:* rwm"

The kvm device has a minor that could be detected before lxc configuration
to avoid the * giving the lxc visibility to all the miscellaneous devices.

Of course the kvm module must be inserted by host or lxc guest and
the /dev/kvm node must exist in the lxc guest file-system.

Mixing of virtualizations is good fun, I prefer making lxc containers in
a qemu-kvm virtualization...

Also qemu in qemu can be done thanks to the nested function of the kvm
module.


What is the difference between
    "windows in qemu in lxc"
and
    "windows in qemu"

Why would you want a windows, anyway ?


> We where reading about OS level virtualization and came across that
> non of such Open Source implementation have feature of providing
> virtualization for propitiatory OS like windows.
>
> Proposing idea:
> We can run QEMU in one of the container which will create a
> virtualization environment for Windows.
>
> Proposal:
> We need to integrate the QEMU inside the OpenVZ so that whenever any
> windows OS need a virtualization environment, we will run a copy of
> QEMU working with single Windows OS.
>
> Please give your suggestions over this.
>
> --
> Be Happy Always
> +919579650250
>
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and
> threat landscape has changed and how IT managers can respond. Discussions
> will include endpoint security, mobile security and the latest in malware
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> Lxc-devel mailing list
> Lxc-devel@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/lxc-devel
>


------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Lxc-devel mailing list
Lxc-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/lxc-devel

Reply via email to