Add documentation about using qemu-system for unit tests.
Add runner script to select the correct binary and flags.
Signed-off-by: Michael S. Tsirkin
---
Changes from v1:
fix typo for qemu-system flags
add lmr's comment about exit status
README | 15 ++-
x86-run |
Ignoring return value of setfsgid(gid) and setfsuid(uid) causes
warnings on F18. Check the return value: man page says
glibc returns -1 on error.
Signed-off-by: Michael S. Tsirkin
---
fsdev/virtfs-proxy-helper.c | 7 +--
1 file changed, 5 insertions(+), 2 deletions(-)
diff --git a/fsdev/vir
On Tue, Feb 19, 2013 at 11:27:20PM -0300, Marcelo Tosatti wrote:
>
> Read and write steal time MSR, so that reporting is functional across
> migration.
>
> Signed-off-by: Marcelo Tosatti
>
Applied, thanks.
> diff --git a/target-i386/cpu.h b/target-i386/cpu.h
> index 7577e4f..17c7293 100644
> -
On 2/27/13 9:39 AM, David Ahern wrote:
I have been playing with the live mode a bit lately. I'll add a debug to
note 2 consecutive entry events without an exit -- see if it sheds some
light on it.
If you feel game take this for a spin:
https://github.com/dsahern/linux/commits/perf-kvm-live-3.
The Buildbot has detected a new failure on builder x86_64 while building kvm.
Full details are available at:
http://buildbot.b1-systems.de/kvm/builders/x86_64/builds/835
Buildbot URL: http://buildbot.b1-systems.de/kvm/
Buildslave for this Build: b1_kvm_1
Build Reason: The Nightly scheduler name
The Buildbot has detected a new failure on builder ppc64 while building kvm.
Full details are available at:
http://buildbot.b1-systems.de/kvm/builders/ppc64/builds/828
Buildbot URL: http://buildbot.b1-systems.de/kvm/
Buildslave for this Build: b1_kvm_1
Build Reason: The Nightly scheduler named
The Buildbot has detected a new failure on builder ppc44x while building kvm.
Full details are available at:
http://buildbot.b1-systems.de/kvm/builders/ppc44x/builds/831
Buildbot URL: http://buildbot.b1-systems.de/kvm/
Buildslave for this Build: b1_kvm_1
Build Reason: The Nightly scheduler name
The Buildbot has detected a new failure on builder ia64 while building kvm.
Full details are available at:
http://buildbot.b1-systems.de/kvm/builders/ia64/builds/829
Buildbot URL: http://buildbot.b1-systems.de/kvm/
Buildslave for this Build: b1_kvm_1
Build Reason: The Nightly scheduler named 'n
The Buildbot has detected a new failure on builder i386 while building kvm.
Full details are available at:
http://buildbot.b1-systems.de/kvm/builders/i386/builds/824
Buildbot URL: http://buildbot.b1-systems.de/kvm/
Buildslave for this Build: b1_kvm_1
Build Reason: The Nightly scheduler named 'n
On Guest entry: if guest is wants to use the debug register then
save h/w debug register in host_dbg_reg and load the debug registers
with shadow_dbg_reg. Otherwise leave h/w debug registers as is.
On guest exit: If guest/user-space is using the debug resource then
restore the h/w debug register w
Instruction emulation return EMULATE_DO_PAPR when it requires
exit to userspace on book3s. Similar return is required
for booke. EMULATE_DO_PAPR reads out to be confusing so it is
renamed to EMULATE_EXIT_USER.
Signed-off-by: Bharat Bhushan
---
arch/powerpc/include/asm/kvm_ppc.h |2 +-
arch/p
This patch adds the debug stub support on booke/bookehv.
Now QEMU debug stub can use hw breakpoint, watchpoint and
software breakpoint to debug guest.
Signed-off-by: Bharat Bhushan
---
arch/powerpc/include/uapi/asm/kvm.h | 22 +-
arch/powerpc/kvm/booke.c| 143 +
Installed debug handler will be used for guest debug support
and debug facility emulation features (patches for these
features will follow this patch).
Signed-off-by: Liu Yu
[bharat.bhus...@freescale.com: Substantial changes]
Signed-off-by: Bharat Bhushan
---
arch/powerpc/include/asm/kvm_host.h
This patch adds the one_reg interface to get the special instruction
to be used for setting software breakpoint from userspace.
Signed-off-by: Bharat Bhushan
---
Documentation/virtual/kvm/api.txt |1 +
arch/powerpc/include/asm/kvm_book3s.h |1 +
arch/powerpc/include/asm/kvm_booke.h
This patch defines the interface parameter for KVM_SET_GUEST_DEBUG
ioctl support. Follow up patches will use this for setting up
hardware breakpoints, watchpoints and software breakpoints.
Also kvm_arch_vcpu_ioctl_set_guest_debug() is brought one level below.
This is because I am not sure what is
On Guest entry: if guest is wants to use the debug register then
save h/w debug register in host_dbg_reg and load the debug registers
with shadow_dbg_reg. Otherwise leave h/w debug registers as is.
On guest exit: If guest/user-space is using the debug resource then
restore the h/w debug register w
This patchset adds the userspace debug support for booke/bookehv.
this is tested on powerpc e500v2/e500mc devices.
Bharat Bhushan (7):
KVM: PPC: booke: Added debug handler
Added ONE_REG interface for debug instruction
KVM: PPC: debug stub interface parameter defined
booke: Save and restore
Aurelien Jarno writes:
> On Wed, Feb 27, 2013 at 11:56:55AM +1030, Rusty Russell wrote:
>> Aurelien Jarno writes:
>> > Hi,
>> >
>> > I have noticed that virtio-rng only returns zero for kernels >= 2.6.33
>> > built with CONFIG_HW_RANDOM=m. This is a bit much too predictable for a
>> > random gene
Jens Axboe writes:
> On Wed, Feb 27 2013, Rusty Russell wrote:
>> Subject: scatterlist: sg_set_buf() argument must be in linear mapping.
>>
>> Signed-off-by: Rusty Russell
>>
>> diff --git a/include/linux/scatterlist.h b/include/linux/scatterlist.h
>> index 4bd6c06..9365375 100644
>> --- a/incl
On Wed, Feb 27, 2013 at 07:41:03PM +0900, Takuya Yoshikawa wrote:
> Note: this is based on the latest master branch.
>
> I'm sending this before 3.9-rc1 is released since this can cause extra
> conflicts unless we make this available to all arch before we start
> adding new stuff.
>
> Please revi
[ Resending since my email client seemed to fail. ]
On Wed, 27 Feb 2013 18:23:45 +0200
Gleb Natapov wrote:
> On Wed, Feb 27, 2013 at 07:41:03PM +0900, Takuya Yoshikawa wrote:
> > Note: this is based on the latest master branch.
> >
> > I'm sending this before 3.9-rc1 is released since this can
On Wed, 27 Feb 2013 18:23:45 +0200
Gleb Natapov wrote:
> On Wed, Feb 27, 2013 at 07:41:03PM +0900, Takuya Yoshikawa wrote:
> > Note: this is based on the latest master branch.
> >
> > I'm sending this before 3.9-rc1 is released since this can cause extra
> > conflicts unless we make this availab
I have a program which I need to run against a pile of drives. The program needs
to boot to a dedicated machine and will only do one drive at a time, and I only
have one machine I can tie up to use dedicated, making it a very slow process
and requiring a manual drive change when the program is d
On Wed, Feb 27, 2013 at 06:03:41PM -0300, Lucas Meneghel Rodrigues wrote:
> On 02/27/2013 05:44 PM, Michael S. Tsirkin wrote:
> >>>+Using qemu (supported since qemu 1.3):
> >>>+qemu-system-x86_64 -enable-kvm -device pc-testdev -serial stdio -device
> >>>isa-debug-exit,iobase=0xf4,iosize=0x4 -kerne
On 02/27/2013 05:44 PM, Michael S. Tsirkin wrote:
+Using qemu (supported since qemu 1.3):
+qemu-system-x86_64 -enable-kvm -device pc-testdev -serial stdio -device
isa-debug-exit,iobase=0xf4,iosize=0x4 -kernel ./x86/msr.flat
I think it is worth here to point out that with new qemu, after the
un
On Wed, Feb 27, 2013 at 03:10:01PM -0300, Lucas Meneghel Rodrigues wrote:
> On 02/27/2013 12:55 PM, Michael S. Tsirkin wrote:
> >Add documentation about using qemu-system for unit tests.
> >Add runner script to select the correct binary and flags.
> >
> >Signed-off-by: Michael S. Tsirkin
> >---
>
The physical memory fixmapped for the pvclock clock_gettime vsyscall
was allocated, and thus is not a kernel symbol. __pa() is the proper
method to use in this case.
Fixes the crash below when booting a next-20130204+ smp guest on a
3.8-rc5+ KVM host.
[0.666410] udevd[97]: starting version 17
On Sun, Feb 24, 2013 at 04:23:44PM -0500, Peter Hurley wrote:
> On Tue, 2013-02-19 at 10:26 +0200, Gleb Natapov wrote:
> > On Mon, Feb 18, 2013 at 08:12:21PM -0500, Peter Hurley wrote:
> > > On Mon, 2013-02-18 at 19:59 -0300, Marcelo Tosatti wrote:
> > > > On Wed, Feb 13, 2013 at 06:57:09AM -0500,
On 26/02/13 12:18, Michael S. Tsirkin wrote:
> virtio_ccw: pass a cookie value to kvm hypercall
>
> Lookups by channel/vq pair on host during virtio notifications might be
> expensive. Interpret hypercall return value as a cookie which host can
> use to do device lookups for the next notificatio
On 02/27/2013 12:55 PM, Michael S. Tsirkin wrote:
Add documentation about using qemu-system for unit tests.
Add runner script to select the correct binary and flags.
Signed-off-by: Michael S. Tsirkin
---
README | 10 +-
x86-run | 27 +++
2 files changed, 36
Il 26/02/2013 16:13, Stefan Hajnoczi ha scritto:
>> > Is there any solution in KVM that works like VAAI does in EXSI, I
>> > found a PPT that posted in Sep. 2012, which said that storage offload
>> > will be consider in future.
>> > I am wondering anybody knows about this, or provide some informati
On 2/25/13 3:18 AM, Stefan Hajnoczi wrote:
On Fri, Feb 22, 2013 at 11:34:27AM -0500, Mohamad Gebai wrote:
I am tracing kvm using perf and I am analyzing the sequences of kvm_entry and
kvm_exit tracepoints.
I noticed that during the boot process of a VM, there are a lot more (2 to 3 as
many times
On Wed, Feb 27, 2013 at 11:56:55AM +1030, Rusty Russell wrote:
> Aurelien Jarno writes:
> > Hi,
> >
> > I have noticed that virtio-rng only returns zero for kernels >= 2.6.33
> > built with CONFIG_HW_RANDOM=m. This is a bit much too predictable for a
> > random generator ;-).
> >
> > The reason fo
On Wed, Feb 27, 2013 at 07:41:03PM +0900, Takuya Yoshikawa wrote:
> Note: this is based on the latest master branch.
>
> I'm sending this before 3.9-rc1 is released since this can cause extra
> conflicts unless we make this available to all arch before we start
> adding new stuff.
>
I do not quit
Add documentation about using qemu-system for unit tests.
Add runner script to select the correct binary and flags.
Signed-off-by: Michael S. Tsirkin
---
README | 10 +-
x86-run | 27 +++
2 files changed, 36 insertions(+), 1 deletion(-)
create mode 100755 x86-ru
On Wed, Feb 27, 2013 at 11:33:25AM +0800, Chen Gang wrote:
>
> irp->irq is __u32 which is never < 0.
>
> Signed-off-by: Chen Gang
Applied, thanks.
> ---
> arch/x86/kvm/x86.c |2 +-
> 1 files changed, 1 insertions(+), 1 deletions(-)
>
> diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.
On Sun, Feb 24, 2013 at 02:11:34PM +0100, Jan Kiszka wrote:
> From: Jan Kiszka
>
> No need to re-read what vmx_vcpu_run already picked up for us.
>
> Signed-off-by: Jan Kiszka
Applied, thanks.
> ---
> arch/x86/kvm/vmx.c |4 ++--
> 1 files changed, 2 insertions(+), 2 deletions(-)
>
> diff
On Sat, Feb 23, 2013 at 10:35:37PM +0100, Jan Kiszka wrote:
> From: Jan Kiszka
>
> Switching the VMCS obviously invalidates what may have been cached about
> the guest segments.
>
> Signed-off-by: Jan Kiszka
Applied, thanks.
> ---
>
> Probably, the missing invalidations are harmless ATM, but
On Sat, Feb 23, 2013 at 10:34:39PM +0100, Jan Kiszka wrote:
> From: Jan Kiszka
>
> These exits have no preconditions, and we already process the
> corresponding reasons in nested_vmx_exit_handled correctly.
>
> Signed-off-by: Jan Kiszka
Applied, thanks.
> ---
> arch/x86/kvm/vmx.c |4 +++-
On Sat, Feb 23, 2013 at 03:07:47PM +0100, Jan Kiszka wrote:
> From: Jan Kiszka
>
> Both are only used locally.
>
> Signed-off-by: Jan Kiszka
Applied, thanks.
> ---
> arch/x86/kvm/vmx.c |5 +++--
> 1 files changed, 3 insertions(+), 2 deletions(-)
>
> diff --git a/arch/x86/kvm/vmx.c b/arch
On Wed, Feb 27 2013, Rusty Russell wrote:
> Aurelien Jarno writes:
> > Hi,
> >
> > I have noticed that virtio-rng only returns zero for kernels >= 2.6.33
> > built with CONFIG_HW_RANDOM=m. This is a bit much too predictable for a
> > random generator ;-).
>
> Wow. Fortunately, all of SLES, RHEL,
On Wed, Feb 27, 2013 at 01:25:49PM +0200, Michael S. Tsirkin wrote:
> Fix this error on 32 bit systems:
> x86/msr.c:122:5: error: unknown register name ‘r11’ in ‘asm’
>
> Signed-off-by: Michael S. Tsirkin
Applied, thanks.
> ---
> x86/msr.c | 2 ++
> 1 file changed, 2 insertions(+)
>
> diff --g
Fix this error on 32 bit systems:
x86/msr.c:122:5: error: unknown register name ‘r11’ in ‘asm’
Signed-off-by: Michael S. Tsirkin
---
x86/msr.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/x86/msr.c b/x86/msr.c
index 307835d..de7573d 100644
--- a/x86/msr.c
+++ b/x86/msr.c
@@ -112,6 +112,
On 2013-02-27 12:20, Joerg Roedel wrote:
> On Mon, Feb 25, 2013 at 10:04:50AM +0100, Jan Kiszka wrote:
>> Is the nested-related state already saved on AMD, Jörg? If not, adding
>> this one would not make things worse at least. Still, missing user space
>> save/restore already breaks reset, not only
On 2013-02-27 12:17, Joerg Roedel wrote:
> On Sun, Feb 24, 2013 at 03:08:53PM +0100, Jan Kiszka wrote:
>> From: Jan Kiszka
>
>> @@ -2390,6 +2390,21 @@ static int nested_svm_vmexit(struct vcpu_svm *svm)
>> return 0;
>> }
>> +static bool nested_svm_handle_init_received(struct kvm_vcpu *vcpu)
On Mon, Feb 25, 2013 at 10:04:50AM +0100, Jan Kiszka wrote:
> Is the nested-related state already saved on AMD, Jörg? If not, adding
> this one would not make things worse at least. Still, missing user space
> save/restore already breaks reset, not only migration (dunno if this is
> better on AMD).
On Sat, Feb 23, 2013 at 05:05:29PM +0100, Jan Kiszka wrote:
> From: Jan Kiszka
>
> This fixes boot lockups with "no-kvmclock", when the host is not
> exposing this particular feature (QEMU: -cpu ...,-kvmclock) or when
> the kvmclock initialization failed for whatever reason.
>
> Signed-off-by: J
On Sun, Feb 24, 2013 at 03:08:53PM +0100, Jan Kiszka wrote:
> From: Jan Kiszka
> @@ -2390,6 +2390,21 @@ static int nested_svm_vmexit(struct vcpu_svm *svm)
> return 0;
> }
> +static bool nested_svm_handle_init_received(struct kvm_vcpu *vcpu)
> +{
> + struct vcpu_svm *svm = to_svm(vcpu)
This was replaced with prepare/commit long before:
commit f7784b8ec9b6a041fa828cfbe9012fe51933f5ac
KVM: split kvm_arch_set_memory_region into prepare and commit
Signed-off-by: Takuya Yoshikawa
---
arch/arm/kvm/arm.c |8
1 files changed, 0 insertions(+), 8 deletions(-)
diff --g
This patch makes the parameter old a const pointer to the old memory
slot and adds a new parameter named change to know the change being
requested: the former is for removing extra copying and the latter is
for cleaning up the code.
Signed-off-by: Takuya Yoshikawa
---
arch/arm/kvm/arm.c
This patch drops the parameter old, a copy of the old memory slot, and
adds a new parameter named change to know the change being requested.
This not only cleans up the code but also removes extra copying of the
memory slot structure.
Signed-off-by: Takuya Yoshikawa
---
arch/arm/kvm/arm.c
This will be used for cleaning up prepare/commit_memory_region() later.
Signed-off-by: Takuya Yoshikawa
---
include/linux/kvm_host.h | 18 ++
virt/kvm/kvm_main.c | 18 --
2 files changed, 18 insertions(+), 18 deletions(-)
diff --git a/include/linux/kvm_h
Except ia64's stale code, KVM_SET_MEMORY_REGION support, this is only
used for sanity checks in __kvm_set_memory_region() which can easily
be changed to use slot id instead.
Signed-off-by: Takuya Yoshikawa
---
arch/ia64/kvm/kvm-ia64.c | 18 --
arch/x86/kvm/vmx.c |6 ++
X86 does not use this any more. The remaining user, s390's !user_alloc
check, can be simply removed since KVM_SET_MEMORY_REGION ioctl is no
longer supported.
Note: fixed powerpc's indentations with spaces to suppress checkpatch
errors.
Signed-off-by: Takuya Yoshikawa
---
arch/arm/kvm/arm.c
Note: this is based on the latest master branch.
I'm sending this before 3.9-rc1 is released since this can cause extra
conflicts unless we make this available to all arch before we start
adding new stuff.
Please review: every change is trivial and should not change anything.
Takuya Yoshikawa (6
On Wed, Feb 27, 2013 at 10:43:37AM +1030, Rusty Russell wrote:
> Aurelien Jarno writes:
> > Hi,
> >
> > I have noticed that virtio-rng only returns zero for kernels >= 2.6.33
> > built with CONFIG_HW_RANDOM=m. This is a bit much too predictable for a
> > random generator ;-).
>
> Wow. Fortunatel
On 2013-02-27 10:33, Andreas Färber wrote:
> Am 27.02.2013 10:15, schrieb Jan Kiszka:
>> Several issues fixed:
>> - We were missing a bunch of feature lists. Fix this by simply dumping
>>the meta list feature_word_info.
>> - kvm_enabled() cannot be true at this point because accelerators are
Am 27.02.2013 10:15, schrieb Jan Kiszka:
> Several issues fixed:
> - We were missing a bunch of feature lists. Fix this by simply dumping
>the meta list feature_word_info.
> - kvm_enabled() cannot be true at this point because accelerators are
>initialized much later during init. Also, hi
On Wed, 27 Feb 2013 10:15:51 +0100
Jan Kiszka wrote:
> Several issues fixed:
> - We were missing a bunch of feature lists. Fix this by simply dumping
>the meta list feature_word_info.
> - kvm_enabled() cannot be true at this point because accelerators are
>initialized much later during
Several issues fixed:
- We were missing a bunch of feature lists. Fix this by simply dumping
the meta list feature_word_info.
- kvm_enabled() cannot be true at this point because accelerators are
initialized much later during init. Also, hiding this makes it very
hard to discover for use
On Wed, 27 Feb 2013 08:52:50 +0100
Jan Kiszka wrote:
> On 2013-02-27 08:37, Igor Mammedov wrote:
> > On Wed, 27 Feb 2013 00:26:38 -0300
> > Eduardo Habkost wrote:
> >
> >> On Tue, Feb 26, 2013 at 10:57:56PM +0100, Igor Mammedov wrote:
> >>> On Sat, 23 Feb 2013 16:45:00 +0100
> >>> Jan Kiszka w
https://bugzilla.kernel.org/show_bug.cgi?id=53611
--- Comment #1 from Nadav Har'El 2013-02-27
08:14:13 ---
In addition to the known issues list in the "announce" file attached above, I
thought of several more issues that should be considered:
1. When switching back and forth between L1 and
62 matches
Mail list logo