On Fri, Feb 18, 2011 at 05:14:09PM -0200, Lucas Meneghel Rodrigues wrote:
> As the original patch set don't define supported_features
> for it.
>
> Signed-off-by: Lucas Meneghel Rodrigues
Acked-by: Amos Kong
> ---
> client/tests/kvm/tests/ethtool.py |6 +-
> client/tests/kvm/test
On Fri, 2011-02-18 at 17:34 -0200, Lucas Meneghel Rodrigues wrote:
> So the VM can be restarted to include the new NICs required
> for the test.
Ignore this patch, please :)
> Signed-off-by: Lucas Meneghel Rodrigues
> ---
> client/tests/kvm/tests_base.cfg.sample |1 +
> 1 files changed, 1 i
> From: Avi Kivity [mailto:a...@redhat.com]
> Sent: Thursday, February 10, 2011 2:02 AM
>
> On 02/08/2011 09:45 PM, Joseph Cihula wrote:
> > This patch fixes the logic used to detect whether BIOS has disabled VMX.
> >
>
> Applied, thanks.
Will you request this be taken by the -stable kernel?
Jo
get_mac_address() should first check if 'nic_mac' is defined and then check
the address pool. This way, if 'nic_mac' is changed between tests,
make_qemu_command(), which calls get_mac_address(), will reveal the change and
trigger a VM restart.
Signed-off-by: Michael Goldish
---
client/tests/kvm
If VM params define a new NIC that didn't previously exist, then when
make_qemu_command() is called in order to see if the VM should be restarted,
it attempts to get the MAC address of the new (nonexistent) NIC, and an
exception is raised. This exception is expected and should be caught.
Signed-o
So the VM can be restarted to include the new NICs required
for the test.
Signed-off-by: Lucas Meneghel Rodrigues
---
client/tests/kvm/tests_base.cfg.sample |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/client/tests/kvm/tests_base.cfg.sample
b/client/tests/kvm/tests_b
Le vendredi 18 février 2011 à 19:37 +0100, Patrick McHardy a écrit :
> Am 14.02.2011 17:52, schrieb Patrick McHardy:
> > Am 14.02.2011 17:48, schrieb Eric Dumazet:
> >> I am not sure, but I guess nf_reinject() needs a fix too ;)
> >
> > I agree. That one looks uglier though, I guess we'll have to
As the original patch set don't define supported_features
for it.
Signed-off-by: Lucas Meneghel Rodrigues
---
client/tests/kvm/tests/ethtool.py |6 +-
client/tests/kvm/tests_base.cfg.sample |1 +
2 files changed, 6 insertions(+), 1 deletions(-)
diff --git a/client/tests/kvm/tes
Signed-off-by: Lucas Meneghel Rodrigues
---
client/tests/kvm/tests/nic_hotplug.py |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/client/tests/kvm/tests/nic_hotplug.py
b/client/tests/kvm/tests/nic_hotplug.py
index 50a3ce9..5a757e7 100644
--- a/client/tests/kvm/tests/nic
Turns out hotplug for PCI devices is built in
on RHEL 6.0 kernel.
Signed-off-by: Lucas Meneghel Rodrigues
---
client/tests/kvm/tests_base.cfg.sample |8
1 files changed, 8 insertions(+), 0 deletions(-)
diff --git a/client/tests/kvm/tests_base.cfg.sample
b/client/tests/kvm/tests_ba
Am 14.02.2011 17:52, schrieb Patrick McHardy:
> Am 14.02.2011 17:48, schrieb Eric Dumazet:
>> I am not sure, but I guess nf_reinject() needs a fix too ;)
>
> I agree. That one looks uglier though, I guess we'll have to
> iterate through all hooks to note the previous one.
How about this? Unfortun
https://bugzilla.kernel.org/show_bug.cgi?id=29382
--- Comment #3 from Seb Lu 2011-02-18 15:00:46 ---
Created an attachment (id=48332)
--> (https://bugzilla.kernel.org/attachment.cgi?id=48332)
screen dump
--
Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email
--- You
https://bugzilla.kernel.org/show_bug.cgi?id=29382
--- Comment #2 from Seb Lu 2011-02-18 15:00:10 ---
Created an attachment (id=48322)
--> (https://bugzilla.kernel.org/attachment.cgi?id=48322)
screen dump
--
Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email
--- You
https://bugzilla.kernel.org/show_bug.cgi?id=29382
--- Comment #1 from Seb Lu 2011-02-18 14:59:41 ---
Created an attachment (id=48312)
--> (https://bugzilla.kernel.org/attachment.cgi?id=48312)
screeb dump
--
Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email
--- You
https://bugzilla.kernel.org/show_bug.cgi?id=29382
Summary: Panic: Unable to handle kernel paging request
Product: Virtualization
Version: unspecified
Platform: All
OS/Version: Linux
Tree: Mainline
Status: NEW
Se
This switches KVM's MCE injection path to cpu_x86_inject_mce, both for
SIGBUS and monitor initiated events. This means we prepare the MCA MSRs
in the VCPUState also for KVM.
We have to drop the MSRs writeback restrictions for this purpose which
is now safe as every uncoordinated MSR injection is r
Pure function suffling to avoid multiple #ifdef KVM_CAP_MCE sections,
no functional changes. While at it, annotate some #ifdef sections.
Signed-off-by: Jan Kiszka
CC: Huang Ying
CC: Hidetoshi Seto
CC: Jin Dongming
---
target-i386/kvm.c | 346 ++
Fix some code style issues, use proper headers, and align to cpu_x86
naming scheme. No functional changes.
Signed-off-by: Jan Kiszka
CC: Huang Ying
CC: Hidetoshi Seto
CC: Jin Dongming
---
cpu-all.h|4
monitor.c|2 +-
target-i386/cpu.h|5 +
targ
As this service is used by the human monitor, make sure that errors get
reported to the right channel, and also raise the verbosity.
This requires to move Monitor typedef in qemu-common.h to resolve the
include dependency.
Signed-off-by: Jan Kiszka
CC: Huang Ying
CC: Hidetoshi Seto
CC: Jin Don
Reorder mcg_status in CPUState to achieve automatic clearing on reset.
Signed-off-by: Jan Kiszka
CC: Huang Ying
CC: Hidetoshi Seto
CC: Jin Dongming
---
target-i386/cpu.h|3 ++-
target-i386/helper.c |2 --
2 files changed, 2 insertions(+), 3 deletions(-)
diff --git a/target-i386/c
Round 2 of this part, primarily addressing review comments:
- Reworked CPU_INTERRUPT_MCE -> exection translation
(now done in kvm_arch_process_async_events, indeed much cleaner)
- Add missing cpu_synchronize_state on pending MCE events for
!kvm_irqchip_in_kernel
- Split up KVM MCE code swi
MCEs can be injected asynchronously, so they can also terminate the halt
state.
Signed-off-by: Jan Kiszka
CC: Huang Ying
CC: Hidetoshi Seto
CC: Jin Dongming
---
target-i386/exec.h | 15 ++-
1 files changed, 6 insertions(+), 9 deletions(-)
diff --git a/target-i386/exec.h b/targe
Allow to tell cpu_x86_inject_mce that it should ignore Action Optional
MCE events when the target VCPU is still processing another one. This
will be used by KVM soon.
Signed-off-by: Jan Kiszka
CC: Huang Ying
CC: Hidetoshi Seto
CC: Jin Dongming
---
monitor.c|7 +--
target-i
There is nothing to abstract here. Fold kvm_setup_mce into its caller
and fix up the error reporting (return code of kvm_vcpu_ioctl holds the
error value).
Signed-off-by: Jan Kiszka
CC: Huang Ying
CC: Hidetoshi Seto
CC: Jin Dongming
---
target-i386/kvm.c | 11 ---
1 files changed, 4
The current way of injecting MCE events without updating of and
synchronizing with the CPUState is broken and causes spurious
corruptions of the MCE-related parts of the CPUState.
As a first step towards a fix, enhance the state writeback code with
support for injecting events that are pending in
There is no reason to continue if the kernel claims to support MCE but
then fails to process our request.
Signed-off-by: Jan Kiszka
CC: Huang Ying
CC: Hidetoshi Seto
CC: Jin Dongming
---
target-i386/kvm.c | 30 +-
1 files changed, 17 insertions(+), 13 deletions(-
From: Huang Ying
In Linux kernel HWPoison processing implementation, the virtual
address in processes mapping the error physical memory page is marked
as HWPoison. So that, the further accessing to the virtual
address will kill corresponding processes with SIGBUS.
If the error physical memory p
We will use the current TCG-only MCE injection path for KVM as well, and
then this read-modify-write of the target VCPU state has to be performed
synchronously in the corresponding thread.
Signed-off-by: Jan Kiszka
---
target-i386/helper.c | 87 +
From: Huang Ying
qemu_ram_remap() unmaps the specified RAM pages, then re-maps these
pages again. This is used by KVM HWPoison support to clear HWPoisoned
page tables across guest rebooting, so that a new page may be
allocated later to recover the memory error.
[ Jan: style fixlets, WIN32 fix ]
We will broaden the scope of this function on x86 beyond irqchip events.
Signed-off-by: Jan Kiszka
---
kvm-all.c |2 +-
kvm.h |2 +-
target-i386/kvm.c |2 +-
target-ppc/kvm.c |2 +-
target-s390x/kvm.c |2 +-
5 files changed, 5 insertions(+), 5 deletio
This is required to support keeping VCPU states across a system reset.
If we do not read the current state before the reset,
cpu_synchronize_all_post_reset may write back incorrect state
information.
The first user of this will be MCE MSR synchronization which currently
works around the missing cp
The old MSI-X enabling method assume the entries are written before MSI-X
enabled, but some OS didn't obey this, e.g. FreeBSD. This patch would fix
this.
Also, according to the PCI spec, mask bit of MSI-X table should be set
after reset.
Signed-off-by: Sheng Yang
---
hw/device-assignment.c | 1
Signed-off-by: Sheng Yang
---
kvm/include/linux/kvm.h | 28
1 files changed, 28 insertions(+), 0 deletions(-)
diff --git a/kvm/include/linux/kvm.h b/kvm/include/linux/kvm.h
index e46729e..dcb8f54 100644
--- a/kvm/include/linux/kvm.h
+++ b/kvm/include/linux/kvm.h
@
Signed-off-by: Sheng Yang
---
qemu-kvm.c | 14 ++
qemu-kvm.h |7 +++
2 files changed, 21 insertions(+), 0 deletions(-)
diff --git a/qemu-kvm.c b/qemu-kvm.c
index 49cd683..d282c95 100644
--- a/qemu-kvm.c
+++ b/qemu-kvm.c
@@ -1050,6 +1050,20 @@ int kvm_assign_set_msix_entry(
Signed-off-by: Sheng Yang
---
hw/device-assignment.c | 106 +--
hw/device-assignment.h |3 +
qemu-kvm.c | 46 +
qemu-kvm.h | 19 +
4 files changed, 160 insertions(+), 14 deletions(-)
diff --
Update with kernel patches v9.
Sheng Yang (4):
qemu-kvm: device assignment: Enabling MSI-X according to the entries'
mask bit
qemu-kvm: Ioctl for MSIX MMIO support
qemu-kvm: Header file update for MSI-X MMIO support
qemu-kvm: MSI-X MMIO support for assigned device
hw/device-assignmen
Signed-off-by: Sheng Yang
---
Documentation/kvm/api.txt | 58 +
1 files changed, 58 insertions(+), 0 deletions(-)
diff --git a/Documentation/kvm/api.txt b/Documentation/kvm/api.txt
index e1a9297..dd10c3b 100644
--- a/Documentation/kvm/api.txt
+++ b/
Then we can support mask bit operation of assigned devices now.
Signed-off-by: Sheng Yang
---
arch/x86/kvm/Makefile|2 +-
arch/x86/kvm/x86.c | 29 -
include/linux/kvm.h | 28 +
include/linux/kvm_host.h | 32 +
virt/kvm/assigned-dev.c | 44 +++
virt/kvm
Add a new parameter to IO writing handler, so that we can transfer information
from IO handler to caller.
Signed-off-by: Sheng Yang
---
arch/x86/kvm/i8254.c |6 --
arch/x86/kvm/i8259.c |3 ++-
arch/x86/kvm/lapic.c |3 ++-
arch/x86/kvm/x86.c| 13 --
Sorry for the long delay, just come back from vacation...
Change from v8:
1. Update struct kvm_run to contain MSI-X routing update exit specific
information.
2. Fix a mmio_nr counting bug.
Notice this patchset still based on 2.6.37 due to a block bug on assigned
device in the upstream now.
Sheng
Then it can be used by other struct in kvm_host.h
Signed-off-by: Sheng Yang
---
include/linux/kvm_host.h | 23 +++
virt/kvm/iodev.h | 25 +
2 files changed, 24 insertions(+), 24 deletions(-)
diff --git a/include/linux/kvm_host.h b/include/
On Thursday 03 February 2011 09:05:55 Marcelo Tosatti wrote:
> On Sun, Jan 30, 2011 at 01:11:15PM +0800, Sheng Yang wrote:
> > Then we can support mask bit operation of assigned devices now.
> >
> > Signed-off-by: Sheng Yang
> >
> > +int kvm_vm_ioctl_register_msix_mmio(struct kvm *kvm,
> > +
42 matches
Mail list logo