>The irqfd/ioeventfd patches are part of Avi's kvm.git tree:
>git://git.kernel.org/pub/scm/linux/kernel/git/avi/kvm.git
>
>I expect them to be merged by 2.6.32-rc1 - right, Avi?
Michael,
I think I have the kernel patch for kvm_irqfd and kvm_ioeventfd, but missed the
qemu side patch for irqfd and
On Wed, Sep 09, 2009 at 09:12:05PM +0300, Michael Goldish wrote:
> This module is meant to reduce code size by performing common test procedures.
> Generally, code here should look like test code.
> More specifically:
> - Functions in this module should raise exceptions if things go wrong
>
On 09/10/2009 07:38 PM, Izik Eidus wrote:
this flag notify that the host physical page we are pointing to from
the spte is write protected, and therefore we cant change its access
to be write unless we run get_user_pages(write = 1).
(this is needed for change_pte support in kvm)
diff --git a/
On 09/14/2009 04:38 AM, shawn du wrote:
Are these commands right?
./kvmctl -s 1 -m 256 test/x86/smptest.flat
or ./kvmctl -s 1 -m 128 text/x86/bootstrap test/x86/smptest.flat
That is the correct way. However I haven't tested the smp tests in a
while (probably since kvm gained smp support
On 09/14/2009 05:55 AM, Huang Ying wrote:
Hi, Avi,
On Thu, 2009-09-10 at 17:35 +0800, Andi Kleen wrote:
(also, I if we can't handle guest-mode SIGBUS I think it would be nice
to raise it again so the process terminates due to the SIGBUS).
For SIGBUS we can not relay to guest as M
On 09/10/2009 12:35 PM, Andi Kleen wrote:
(also, I if we can't handle guest-mode SIGBUS I think it would be nice
to raise it again so the process terminates due to the SIGBUS).
For SIGBUS we can not relay to guest as MCE, we can either abort or
reset SIGBUS to SIGDFL and re-raise it. Bot
On 09/09/2009 05:18 PM, Alexander Graf wrote:
X86 CPUs need to have some magic happening to enable the virtualization
extensions on them. This magic can result in unpleasant results for
users, like blocking other VMMs from working (vmx) or using invalid TLB
entries (svm).
Currently KVM activates
On 09/14/2009 01:49 AM, Marcelo Tosatti wrote:
I think synchronize_srcu() will be deferred until the fault path is
complete (and srcu_read_unlock() runs). Copying someone who knows for
sure.
Yes, synchronize_srcu() will block until srcu_read_unlock() in this
scenario, assuming that th
Hi John, do you think the code looks good enough for inclusion?
On Tue, Sep 8, 2009 at 10:53 AM, Lucas Meneghel Rodrigues
wrote:
> This patch adds a system to watch user space segmentation
> faults, writing core dumps and some degree of core dump
> analysis report. We believe that such a system w
Hi All,
This Weekly KVM Testing Report against lastest kvm.git
8f54df0733e2b592151a38c44cf0f8b2ba1ecce8 and qemu-kvm.git
33ed13e101bc18a4b98dc3385b0037295557710a. There is no new bug found in this two
weeks. There are 7 old bugs open in bug tracking.
Seven Old Issues:
==
Hi, Avi,
On Thu, 2009-09-10 at 17:35 +0800, Andi Kleen wrote:
> > > (also, I if we can't handle guest-mode SIGBUS I think it would be nice
> > > to raise it again so the process terminates due to the SIGBUS).
> >
> > For SIGBUS we can not relay to guest as MCE, we can either abort or
> > reset
Are these commands right?
./kvmctl -s 1 -m 256 test/x86/smptest.flat
or ./kvmctl -s 1 -m 128 text/x86/bootstrap test/x86/smptest.flat
And I am using Linux kernel 2.6.27.18 downloaded from Ubuntu
repository, my qemu-kvm is qemu-kvm-0.11.0-rc1 downloaded from kvm
website.
Before that, I just make
On Sun, Sep 13, 2009 at 09:26:52AM -0700, Paul E. McKenney wrote:
> On Sun, Sep 13, 2009 at 06:42:49PM +0300, Avi Kivity wrote:
> > On 09/11/2009 01:30 AM, Marcelo Tosatti wrote:
> >>
> >>> We don't need to stop vcpus, just kick them out of guest mode to let
> >>> them notice the new data. SRCU do
On Sun, Sep 13, 2009 at 06:42:49PM +0300, Avi Kivity wrote:
> On 09/11/2009 01:30 AM, Marcelo Tosatti wrote:
>>
>>> We don't need to stop vcpus, just kick them out of guest mode to let
>>> them notice the new data. SRCU does that well.
>>>
>> Two problems:
>>
>> 1. The removal of memslots/al
Signed-off-by: Avi Kivity
---
kvm/user/test/x86/vmexit.c |8
1 files changed, 8 insertions(+), 0 deletions(-)
diff --git a/kvm/user/test/x86/vmexit.c b/kvm/user/test/x86/vmexit.c
index 364837f..bd1895f 100644
--- a/kvm/user/test/x86/vmexit.c
+++ b/kvm/user/test/x86/vmexit.c
@@ -30,1
This patchset adds a vmcall latency test to the test suite.
Avi Kivity (2):
test: Allow adding mode vmexit latency tests
test: Add vmcall latency test
kvm/user/test/x86/vmexit.c | 40
1 files changed, 36 insertions(+), 4 deletions(-)
--
To unsubscr
Make the latency test run on an array of function pointers, which
can be expanded with more tests.
Signed-off-by: Avi Kivity
---
kvm/user/test/x86/vmexit.c | 32
1 files changed, 28 insertions(+), 4 deletions(-)
diff --git a/kvm/user/test/x86/vmexit.c b/kvm/us
On 09/11/2009 01:30 AM, Marcelo Tosatti wrote:
We don't need to stop vcpus, just kick them out of guest mode to let
them notice the new data. SRCU does that well.
Two problems:
1. The removal of memslots/aliases and zapping of mmu (to remove any
shadow pages with stale sp->gfn) must be
Clear the direction flag to get the correct output.
Signed-off-by: Avi Kivity
---
kvm/user/test/x86/realmode.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/kvm/user/test/x86/realmode.c b/kvm/user/test/x86/realmode.c
index 0db09b8..f9e303f 100644
--- a/kvm/user/test/x
This can be loaded by multiboot (qemu -kernel ...)
Signed-off-by: Avi Kivity
---
kvm/user/flat.lds |2 --
1 files changed, 0 insertions(+), 2 deletions(-)
diff --git a/kvm/user/flat.lds b/kvm/user/flat.lds
index d61bec3..4120595 100644
--- a/kvm/user/flat.lds
+++ b/kvm/user/flat.lds
@@ -1,5
smp temporarily disabled
Signed-off-by: Avi Kivity
---
kvm/user/test/x86/cstart64.S |9 ++---
1 files changed, 6 insertions(+), 3 deletions(-)
diff --git a/kvm/user/test/x86/cstart64.S b/kvm/user/test/x86/cstart64.S
index 3f193a3..912bcf8 100644
--- a/kvm/user/test/x86/cstart64.S
+++ b/
Signed-off-by: Avi Kivity
---
kvm/user/test/x86/realmode.c | 52 ---
kvm/user/test/x86/realmode.lds |6 +
2 files changed, 43 insertions(+), 15 deletions(-)
diff --git a/kvm/user/test/x86/realmode.c b/kvm/user/test/x86/realmode.c
index f9e303f..9bf
Doesn't do anthing anyway.
Signed-off-by: Avi Kivity
---
kvm/user/test/x86/access.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/kvm/user/test/x86/access.c b/kvm/user/test/x86/access.c
index 272a4ef..5eadff8 100644
--- a/kvm/user/test/x86/access.c
+++ b/kvm/user/te
Needed so the APIC can be accessed at address 0xfee0.
Signed-off-by: Avi Kivity
---
kvm/user/test/x86/cstart64.S |7 +--
1 files changed, 5 insertions(+), 2 deletions(-)
diff --git a/kvm/user/test/x86/cstart64.S b/kvm/user/test/x86/cstart64.S
index 805938b..3f193a3 100644
--- a/kvm/
With these headers, multiboot can launch us directly in protected mode.
Signed-off-by: Avi Kivity
---
kvm/user/test/x86/cstart.S |9 +
kvm/user/test/x86/cstart64.S |9 +
2 files changed, 18 insertions(+), 0 deletions(-)
diff --git a/kvm/user/test/x86/cstart.S b/kvm/use
multiboot doesn't give us any stack, so we need to set one up.
Signed-off-by: Avi Kivity
---
kvm/user/test/x86/cstart64.S |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/kvm/user/test/x86/cstart64.S b/kvm/user/test/x86/cstart64.S
index 432a3dc..4f116f9 100644
--- a/kvm/u
Currently the test suite uses a custom control program and BIOS as a loader.
This is clumsy and annoying to work with.
This patch series ports the test suite to load with the multiboot support
provided by qemu -kernel. Test binaries are now ordinary elf objects
(though still with the extension .f
The test device implements:
- a serial port (0xf1)
- an exit port (0xf4)
- a memory size port (0xd1)
It is planned to replace these with the standard serial and firmware
configuration ports.
Signed-off-by: Avi Kivity
---
hw/pc.c | 28
qemu-options.hx |
Otherwise, ld places the image somewhere where multiboot can't find the
multiboot headers.
Signed-off-by: Avi Kivity
---
kvm/user/flat.lds |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/kvm/user/flat.lds b/kvm/user/flat.lds
index 61f1057..d61bec3 100644
--- a/kvm/user/
On Sun, Sep 13, 2009 at 03:05:21PM +0300, Avi Kivity wrote:
> On 09/13/2009 11:30 AM, Gleb Natapov wrote:
> >Signed-off-by: Gleb Natapov
> >---
> > hw/apic.c |3 +++
> > 1 files changed, 3 insertions(+), 0 deletions(-)
> >
> >diff --git a/hw/apic.c b/hw/apic.c
> >index 11d4759..ac5e7ba 100644
On 09/13/2009 11:30 AM, Gleb Natapov wrote:
Signed-off-by: Gleb Natapov
---
hw/apic.c |3 +++
1 files changed, 3 insertions(+), 0 deletions(-)
diff --git a/hw/apic.c b/hw/apic.c
index 11d4759..ac5e7ba 100644
--- a/hw/apic.c
+++ b/hw/apic.c
@@ -534,6 +534,9 @@ void apic_sipi(CPUState *env)
On Fri, Sep 11, 2009 at 12:00:21PM -0400, Gregory Haskins wrote:
> FWIW: VBUS handles this situation via the "memctx" abstraction. IOW,
> the memory is not assumed to be a userspace address. Rather, it is a
> memctx-specific address, which can be userspace, or any other type
> (including hardware
On 09/13/2009 11:38 AM, shawn du wrote:
Hi,
No matter what flatfile in the test/x86 directory I provide, it just
"Segmentation fault".
Does these tests still work?
The tests do work. How are you launching them?
--
error compiling committee.c: too many arguments to function
--
To unsubs
Hi,
No matter what flatfile in the test/x86 directory I provide, it just
"Segmentation fault".
Does these tests still work?
Regards,
Shawn
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.ke
This one was sent to qemu upstream. Include it here because next patch
needs it.
Signed-off-by: Gleb Natapov
---
hw/apic.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/hw/apic.c b/hw/apic.c
index 68e5de3..11d4759 100644
--- a/hw/apic.c
+++ b/hw/apic.c
@@ -531,7 +531,
Signed-off-by: Gleb Natapov
---
qemu-kvm-x86.c |3 +--
1 files changed, 1 insertions(+), 2 deletions(-)
diff --git a/qemu-kvm-x86.c b/qemu-kvm-x86.c
index ee678df..6e5bcc5 100644
--- a/qemu-kvm-x86.c
+++ b/qemu-kvm-x86.c
@@ -1671,10 +1671,9 @@ uint32_t kvm_arch_get_supported_cpuid(CPUState
kvm_arch_update_regs_for_sipi() is not used anymore.
Signed-off-by: Gleb Natapov
---
qemu-kvm-ia64.c |4
qemu-kvm-x86.c | 10 --
qemu-kvm.h |1 -
3 files changed, 0 insertions(+), 15 deletions(-)
diff --git a/qemu-kvm-ia64.c b/qemu-kvm-ia64.c
index 062fbd4..d26c2a9
Signed-off-by: Gleb Natapov
---
hw/apic.c |3 +++
1 files changed, 3 insertions(+), 0 deletions(-)
diff --git a/hw/apic.c b/hw/apic.c
index 11d4759..ac5e7ba 100644
--- a/hw/apic.c
+++ b/hw/apic.c
@@ -534,6 +534,9 @@ void apic_sipi(CPUState *env)
env->segs[R_CS].l
38 matches
Mail list logo