From: Alex Williamson alex.william...@redhat.com
close() the resource fd when we're done with it. Unregister and munmap the
anonymous memory for the MSIX table.
Signed-off-by: Alex Williamson alex.william...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git
From: Sheng Yang sh...@linux.intel.com
Based on IDT test framework.
Signed-off-by: Sheng Yang sh...@linux.intel.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/kvm/test/config-x86-common.mak b/kvm/test/config-x86-common.mak
index 800b635..0e1ccce 100644
---
From: Sheng Yang sh...@linux.intel.com
Signed-off-by: Sheng Yang sh...@linux.intel.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/qemu-kvm-x86.c b/qemu-kvm-x86.c
index 3c33e64..4f0b1d0 100644
--- a/qemu-kvm-x86.c
+++ b/qemu-kvm-x86.c
@@ -772,10 +772,20 @@ static void
From: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/qemu-kvm-x86.c b/qemu-kvm-x86.c
index 4f0b1d0..1232049 100644
--- a/qemu-kvm-x86.c
+++ b/qemu-kvm-x86.c
@@ -784,8 +784,6 @@ void kvm_arch_load_regs(CPUState *env, int level)
{
struct
From: Wei Yongjun yj...@cn.fujitsu.com
This patch add test for pusha and popa instructions.
Signed-off-by: Wei Yongjun yj...@cn.fujitsu.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/kvm/test/x86/realmode.c b/kvm/test/x86/realmode.c
index 70a1e05..bd79348 100644
---
From: Sheng Yang sh...@linux.intel.com
Would use it later for XSAVE related CPUID.
Signed-off-by: Sheng Yang sh...@linux.intel.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/kvm.h b/kvm.h
index aab5118..16b06a4 100644
--- a/kvm.h
+++ b/kvm.h
@@ -152,7 +152,7 @@ bool
From: Sheng Yang sh...@linux.intel.com
We can support it in KVM now. The 0xd leaf is queried from KVM.
Signed-off-by: Sheng Yang sh...@linux.intel.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/target-i386/cpuid.c b/target-i386/cpuid.c
index fb78061..26e4054 100644
---
From: Hidetoshi Seto seto.hideto...@jp.fujitsu.com
Accidentally a pci_read_long() was replaced with assigned_dev_pci_read_byte()
by the commit:
commit a81a1f0a7410976be7dbc9a81524a8640f446ab5
Author: Alex Williamson alex.william...@redhat.com
device-assignment: Don't use libpci
From: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/kvm/include/linux/kvm.h b/kvm/include/linux/kvm.h
index 6485981..e46729e 100644
--- a/kvm/include/linux/kvm.h
+++ b/kvm/include/linux/kvm.h
@@ -103,7 +103,7 @@ struct
From: Avi Kivity a...@redhat.com
On Intel, we call skip_emulated_instruction() even if we injected a #GP,
resulting in the #GP pointing at the wrong address.
Fix by injecting the exception and skipping the instruction at the same place,
so we can do just one or the other.
Signed-off-by: Avi
From: Avi Kivity a...@redhat.com
On Intel, we call skip_emulated_instruction() even if we injected a #GP,
resulting in the #GP pointing at the wrong address.
Fix by injecting the exception and skipping the instruction at the same place,
so we can do just one or the other.
Signed-off-by: Avi
From: Sheng Yang sh...@linux.intel.com
This patch enable save/restore of xsave state.
Signed-off-by: Sheng Yang sh...@linux.intel.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/Documentation/kvm/api.txt b/Documentation/kvm/api.txt
index 159b4ef..ffba03f 100644
---
From: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
Rename 'page' and 'shadow_page' to 'sp' to better fit the context
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/arch/x86/kvm/paging_tmpl.h b/arch/x86/kvm/paging_tmpl.h
From: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
In current code, some page's unsync_child_bitmap is not cleared completely
in mmu_sync_children(), for example, if two PDPEs shard one PDT, one of
PDPE's unsync_child_bitmap is not cleared.
Currently, it not harm anything just little overload,
From: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
The sync page is already write protected in mmu_sync_children(), don't
write protected it again
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/arch/x86/kvm/mmu.c
From: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
Using wrap function to cleanup page dirty judgment
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/arch/x86/kvm/paging_tmpl.h b/arch/x86/kvm/paging_tmpl.h
index
From: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
Decrease sp-unsync_children after clear unsync_child_bitmap bit
Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index
From: Marcelo Tosatti mtosa...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
--
To unsubscribe from this list: send the line unsubscribe kvm-commits in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
From: Jason Wang jasow...@redhat.com
Signed-off-by: Jason Wang jasow...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/Documentation/kvm/mmu.txt b/Documentation/kvm/mmu.txt
index 8cb42b9..142cc51 100644
--- a/Documentation/kvm/mmu.txt
+++ b/Documentation/kvm/mmu.txt
From: Wei Yongjun yj...@cn.fujitsu.com
emulate pusha instruction only writeback the last
EDI register, but the other registers which need
to be writeback is ignored. This patch fixed it.
Signed-off-by: Wei Yongjun yj...@cn.fujitsu.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff
From: Wei Yongjun yj...@cn.fujitsu.com
Group 3 instruction with ModRM reg field as 001 is
defined as test instruction under AMD arch, and
emulate_grp3() is ready for emulate it, so fix the
decoding.
static inline int emulate_grp3(...)
{
...
switch (c-modrm_reg) {
case 0
From: Chris Lalancette clala...@redhat.com
If the guest wants to accept timer interrupts on a CPU other
than the BSP, we need to remove this gate.
Signed-off-by: Chris Lalancette clala...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/arch/x86/kvm/lapic.c
From: John Fastabend john.r.fastab...@intel.com
deliver_no_wcard is not being set in skb_copy_header.
In the skb_cloned case it is not being cleared and
may cause the skb to be dropped when the loopback device
pushes it back up the stack.
Signed-off-by: John Fastabend john.r.fastab...@intel.com
From: Avi Kivity a...@redhat.com
We allocate temporary kernel buffers for these structures, but never free them.
Signed-off-by: Avi Kivity a...@redhat.com
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index d3d008e..d513e57 100644
--- a/arch/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@
From: Chris Lalancette clala...@redhat.com
Otherwise we might try to deliver a timer interrupt to a cpu that
can't possibly handle it.
Signed-off-by: Chris Lalancette clala...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/virt/kvm/irq_comm.c b/virt/kvm/irq_comm.c
From: Alex Williamson alex.william...@redhat.com
The last thing assign_device() does is call into KVM_ASSIGN_PCI_DEVICE.
If that fails, the device is not assigned, so we shouldn't then try to
deassign it. If you try to assign the same device multiple times, you
can get into a nasty
From: Avi Kivity a...@redhat.com
Signed-off-by: Sheng Yang sh...@linux.intel.com
Signed-off-by: Avi Kivity a...@redhat.com
Signed-off-by: Marcelo Tosatti mtosa...@redhat.com
diff --git a/kvm/test/config-x86-common.mak b/kvm/test/config-x86-common.mak
index c97de52..800b635 100644
---
Rusty Russell wrote:
On Sat, 19 Jun 2010 04:08:02 am Ryan Harper wrote:
Create a new attribute for virtio-blk devices that will fetch the serial
number
of the block device. This attribute can be used by udev to create disk/by-id
symlinks for devices that don't have a UUID (filesystem)
May be used for distinguishing between internal and user slots, or for sorting
slots in size order.
Signed-off-by: Avi Kivity a...@redhat.com
---
include/linux/kvm_host.h |1 +
virt/kvm/kvm_main.c |1 +
2 files changed, 2 insertions(+), 0 deletions(-)
diff --git
If a process with a memory slot is COWed, the page will change its address
(despite having an elevated reference count). This breaks internal memory
slots which have their physical addresses loaded into vmcs registers (see
the APIC access memory slot).
Signed-off-by: Avi Kivity a...@redhat.com
fork() has a WONTFIX bug where a page with an elevated reference count will
be COWed such that the page address changes even in the process which has
taken the reference. This interacts badly with internal memory slots
that install pages in vmcs registers, such as the APIC access page.
This
On 06/21/2010 08:24 AM, Hidetoshi Seto wrote:
I think some people have noticed that:
$ ./configure
$ make
$ git status
# On branch master
# Untracked files:
# (use git add file... to include in what will be committed)
#
# QMP/qmp-commands.txt
# libdis-user/
#
On 06/18/2010 12:16 AM, Christian Borntraeger wrote:
Avi, Marcello,
Newer (guest) kernels use sigp sense running in their spinlock
implementation to check if the other cpu is running before yielding
the processor. This revealed some wrong guest settings, causing
unnecessary exits for every sigp
As advertised, two features are scheduled for removal now: aliases and
kernel-allocated memory regions. Remove them.
Avi Kivity (2):
KVM: Remove memory alias support
KVM: Remove kernel-allocated memory regions
Documentation/feature-removal-schedule.txt | 21
Equivalent (and better) functionality is provided by user-allocated memory
regions.
Signed-off-by: Avi Kivity a...@redhat.com
---
Documentation/feature-removal-schedule.txt | 10 --
Documentation/kvm/api.txt | 24 +---
arch/x86/kvm/x86.c
As advertised in feature-removal-schedule.txt. Equivalent support is provided
by overlapping memory regions.
Signed-off-by: Avi Kivity a...@redhat.com
---
Documentation/feature-removal-schedule.txt | 11 ---
Documentation/kvm/api.txt | 12 +---
arch/ia64/kvm/kvm-ia64.c
To prevent reentering vcpu after IO completion it is not enough
to set env-stopped since it is checked only in main loop but control
will not get there until next non-IO exit since kvm_run() will reenter
vcpu to complete IO instruction. Solve this by sending self-signal to
request exit after IO
(2010/06/21 17:19), Avi Kivity wrote:
On 06/21/2010 08:24 AM, Hidetoshi Seto wrote:
I think some people have noticed that:
$ ./configure
$ make
$ git status
# On branch master
# Untracked files:
# (use git add file... to include in what will be committed)
#
#
Here is the version 2.
ChangeLog since V1: Mostly changes based on Avi's suggestions.
1) Use a id to identify the perf_event between host and guest;
2) Changes lots of codes to deal with malicious guest os;
3) Add a perf_event number limitation per gust os instance;
The 2nd patch is to change the definition of perf_event to facilitate
perf attr copy when a hypercall happens.
Signed-off-by: Zhang Yanmin yanmin_zh...@linux.intel.com
---
--- linux-2.6_tip0620/include/linux/perf_event.h2010-06-21
15:19:52.821999849 +0800
+++
The 3rd patch is to implement para virt perf at host kernel.
Signed-off-by: Zhang Yanmin yanmin_zh...@linux.intel.com
---
--- linux-2.6_tip0620/arch/x86/include/asm/kvm_para.h 2010-06-21
15:19:38.992999849 +0800
+++ linux-2.6_tip0620perfkvm/arch/x86/include/asm/kvm_para.h2010-06-21
The 5th patch is applied to the latest qemu-kvm tree.
Signed-off-by: Zhang Yanmin yanmin_zh...@linux.intel.com
---
diff -Nraup qemu-kvm_0621/kvm/include/linux/kvm.h
qemu-kvm_0621_perf/kvm/include/linux/kvm.h
--- qemu-kvm_0621/kvm/include/linux/kvm.h 2010-06-21 11:00:28.0
+0800
The 4th patch is to implement para virt perf at guest side.
Signed-off-by: Zhang Yanmin yanmin_zh...@linux.intel.com
---
--- linux-2.6_tip0620/arch/x86/Kconfig 2010-06-21 15:19:39.180999849 +0800
+++ linux-2.6_tip0620perfkvm/arch/x86/Kconfig 2010-06-21 15:21:39.30849
+0800
@@ -552,6
Sometime check_cmd could not finish in setting time.
Then o=, so int(o) will cause ValueError:
invalid literal for int() with base 10: ''
So change to check return status.
Signed-off-by: Feng Yang fy...@redhat.com
---
client/tests/kvm/tests/ioquit.py |6 +++---
Am Montag 21 Juni 2010, 10:27:50 schrieb Avi Kivity:
[...]
VCPU_EVENT(vcpu, 3, %s, free cpu);
+ clear_bit(63 - vcpu-vcpu_id, (unsigned long
*)vcpu-kvm-arch.sca-mcn);
if (vcpu-kvm-arch.sca-cpu[vcpu-vcpu_id].sda ==
(__u64) vcpu-arch.sie_block)
On Monday 21 June 2010, Christian Borntraeger wrote:
Hmm, dont know. Currently this calls into a s390 debug tracing facility
(arch/s390/kernel/debug.c) which is heavily used by our service folks.
There are commands for crash and lcrash to show these s390 debug traces
from a dump.
Maybe its
On 06/21/2010 01:07 PM, Feng Yang wrote:
Sometime check_cmd could not finish in setting time.
Then o=, so int(o) will cause ValueError:
invalid literal for int() with base 10: ''
So change to check return status.
Signed-off-by: Feng Yang fy...@redhat.com
---
Bugs item #1858940, was opened at 2007-12-27 15:08
Message generated for change (Comment added) made by jessorensen
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=1858940group_id=180599
Please note that this message will contain a full copy of the comment
On 06/21/2010 12:31 PM, Zhang, Yanmin wrote:
Here is the version 2.
ChangeLog since V1: Mostly changes based on Avi's suggestions.
1) Use a id to identify the perf_event between host and guest;
2) Changes lots of codes to deal with malicious guest os;
3) Add a perf_event
On 06/21/2010 12:31 PM, Zhang, Yanmin wrote:
The 2nd patch is to change the definition of perf_event to facilitate
perf attr copy when a hypercall happens.
Signed-off-by: Zhang Yanminyanmin_zh...@linux.intel.com
---
--- linux-2.6_tip0620/include/linux/perf_event.h2010-06-21
On 06/21/2010 12:31 PM, Zhang, Yanmin wrote:
The 3rd patch is to implement para virt perf at host kernel.
@@ -64,6 +73,85 @@ struct kvm_mmu_op_release_pt {
#ifdef __KERNEL__
#includeasm/processor.h
+/*
+ * In host kernel, perf_event-host_perf_shadow points to
+ * host_perf_shadow which
On 06/21/2010 12:31 PM, Zhang, Yanmin wrote:
The 5th patch is applied to the latest qemu-kvm tree.
--- qemu-kvm_0621/target-i386/kvm.c 2010-06-21 11:00:29.0 +0800
+++ qemu-kvm_0621_perf/target-i386/kvm.c2010-06-21 13:00:14.136999850
+0800
@@ -150,6 +150,9 @@ struct
On Fri, Jun 18, 2010 at 01:38:02PM -0500, Ryan Harper wrote:
Create a new attribute for virtio-blk devices that will fetch the serial
number
of the block device. This attribute can be used by udev to create disk/by-id
symlinks for devices that don't have a UUID (filesystem) associated with
Bugs item #1841658, was opened at 2007-11-30 13:11
Message generated for change (Comment added) made by jessorensen
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=1841658group_id=180599
Please note that this message will contain a full copy of the comment
When a guest sets its SR entry to invalid, we may still find a
corresponding entry in a BAT. So we need to make sure we're not
faulting on invalid SR entries, but instead just claim them to be
BAT resolved.
This resolves breakage experienced when using libogc based guests.
Signed-off-by:
The linux kernel already provides a hash function. Let's reuse that
instead of reinventing the wheel!
Signed-off-by: Alexander Graf ag...@suse.de
---
arch/powerpc/kvm/book3s_32_mmu_host.c | 10 ++
arch/powerpc/kvm/book3s_64_mmu_host.c | 11 ++-
2 files changed, 4
Initially we had to search for pte entries to invalidate them. Since
the logic has improved since then, we can just get rid of the search
function.
Signed-off-by: Alexander Graf ag...@suse.de
---
arch/powerpc/include/asm/kvm_book3s.h |1 -
arch/powerpc/kvm/book3s_32_mmu_host.c | 20
Currently the shadow paging code keeps an array of entries it knows about.
Whenever the guest invalidates an entry, we loop through that entry,
trying to invalidate matching parts.
While this is a really simple implementation, it is probably the most
ineffective one possible. So instead, let's
We just introduced generic functions to handle shadow pages on PPC.
This patch makes the respective backends make use of them, getting
rid of a lot of duplicate code along the way.
Signed-off-by: Alexander Graf ag...@suse.de
---
arch/powerpc/include/asm/kvm_book3s.h |7 ++
Hi,
I'm working on implementing AMD IOMMU emulation in QEMU/KVM and I'm also
creating an API for address translation and access checking. Ideally,
this API should work with different kinds of devices and IOMMUs. These
operations would typically require specific device information to figure
out
On Mon, Jun 21, 2010 at 05:31:43PM +0800, Zhang, Yanmin wrote:
The 3rd patch is to implement para virt perf at host kernel.
Signed-off-by: Zhang Yanmin yanmin_zh...@linux.intel.com
---
--- linux-2.6_tip0620/arch/x86/include/asm/kvm_para.h 2010-06-21
15:19:38.992999849 +0800
+++
So I've been looking for a way to obtain things like a PCIDevice from a
more generic structure (say from hw/qdev.h),
If you're having to figure out what kind of a device you have then I think
you're already doing something else wrong. I'd expect the bits of code that
needs to identify devices
On Thu, 17 Jun 2010 12:15:20 +0900
Fernando Luis Vazquez Cao ferna...@oss.ntt.co.jp wrote:
* qemu-kvm
Currently KVM is only notified about memory errors detected by the
MCE subsystem. When running on newer x86 hardware, if MCE detects an
error on user-space it signals the
This is the libvirt default network configuration. Please see the
libvirt documentation and mailing list for support.
As an aside -- you'll probably want to use a bridged configuration
rather than the NATted one. If you really do want to stick with the NAT
configuration, you'll need to make
On Mon, Jun 21, 2010 at 03:07:13PM +0100, Paul Brook wrote:
So I've been looking for a way to obtain things like a PCIDevice from a
more generic structure (say from hw/qdev.h),
If you're having to figure out what kind of a device you have then I think
you're already doing something else
hi, all
I have a question regarding KVM's networking stack implementation.
Does KVM hook into NetFilter to intercept packets destined for the guest, or
PF_PACKET?
Thanks for your help, in advance
Regard, Kangkook--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of
Thanks for your reply. This isn't about a specific IOMMU. Let me
describe the situation better:
1. I'm implementing the AMD IOMMU, which is a PCI IOMMU (not in the CPU).
2. Devices need address translation and checking through this IOMMU.
3. But in the future there might be other IOMMU
On 06/21/2010 09:51 AM, Kangkook Jee wrote:
Does KVM hook into NetFilter to intercept packets destined for the guest, or
PF_PACKET?
None of the above.
With -net user, KVM uses techniques derived from SLiRP to simulate a
network stack with only traditional userspace UNIX socket calls. With
Older versions of 32-bit linux have a Checking 'hlt' instruction
test where they repeatedly call the 'hlt' instruction, and then
expect a timer interrupt to kick the CPU out of halt. This happens
before any LAPIC or IOAPIC setup happens, which means that all of
the APIC's are in virtual wire mode
Bugs item #1899961, was opened at 2008-02-22 22:19
Message generated for change (Comment added) made by jessorensen
You can respond by visiting:
https://sourceforge.net/tracker/?func=detailatid=893831aid=1899961group_id=180599
Please note that this message will contain a full copy of the comment
* john cooper john.coo...@redhat.com [2010-06-21 01:11]:
Rusty Russell wrote:
On Sat, 19 Jun 2010 04:08:02 am Ryan Harper wrote:
Create a new attribute for virtio-blk devices that will fetch the serial
number
of the block device. This attribute can be used by udev to create
* Christoph Hellwig h...@lst.de [2010-06-21 07:46]:
On Fri, Jun 18, 2010 at 01:38:02PM -0500, Ryan Harper wrote:
Create a new attribute for virtio-blk devices that will fetch the serial
number
of the block device. This attribute can be used by udev to create
disk/by-id
symlinks for
Ryan Harper wrote:
* john cooper john.coo...@redhat.com [2010-06-21 01:11]:
Rusty Russell wrote:
On Sat, 19 Jun 2010 04:08:02 am Ryan Harper wrote:
Create a new attribute for virtio-blk devices that will fetch the serial
number
of the block device. This attribute can be used by udev to
Looks good.
On Sun, Jun 20, 2010 at 07:21:54PM +0300, Avi Kivity wrote:
These four patches were part of an optimization patchset I've been neglecting,
but are equally useful as preparation for fixing the PIC-APIC wiring issues.
Avi Kivity (4):
KVM: i8259: reduce excessive abstraction for
On Mon, Jun 21, 2010 at 11:18:13AM +0300, Avi Kivity wrote:
If a process with a memory slot is COWed, the page will change its address
(despite having an elevated reference count). This breaks internal memory
slots which have their physical addresses loaded into vmcs registers (see
the APIC
On Mon, Jun 21, 2010 at 11:51:58AM +0300, Avi Kivity wrote:
As advertised in feature-removal-schedule.txt. Equivalent support is provided
by overlapping memory regions.
Signed-off-by: Avi Kivity a...@redhat.com
---
Documentation/feature-removal-schedule.txt | 11 ---
On Mon, Jun 21, 2010 at 12:01:52PM +0300, Gleb Natapov wrote:
To prevent reentering vcpu after IO completion it is not enough
to set env-stopped since it is checked only in main loop but control
will not get there until next non-IO exit since kvm_run() will reenter
vcpu to complete IO
On Tue, 22 Jun 2010 02:13:21 am Ryan Harper wrote:
* john cooper john.coo...@redhat.com [2010-06-21 01:11]:
Rusty Russell wrote:
On Sat, 19 Jun 2010 04:08:02 am Ryan Harper wrote:
Create a new attribute for virtio-blk devices that will fetch the serial
number
of the block device.
From: Amos Kong ak...@redhat.com
In the following situation, assign zero to 'r' is redundant, just remove them.
r = foo();
if (r)
goto out;
r = 0;
...
Signed-off-by: Amos Kong ak...@redhat.com
---
arch/x86/kvm/x86.c |7 ---
1 files changed, 0 insertions(+), 7 deletions(-)
diff
vm.is_alive() verifies that the monitor is responsive, which is required for
taking screendumps.
Signed-off-by: Michael Goldish mgold...@redhat.com
---
client/tests/kvm/kvm_preprocessing.py |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git
Don't prefix image_name and cdrom at the end of tests_base.cfg.sample.
Instead, do it all in tests.cfg.sample, to make it clearer to users editing
the file.
Signed-off-by: Michael Goldish mgold...@redhat.com
---
client/tests/kvm/tests.cfg.sample | 10 --
If there are no test results, max() tries to operate on an empty sequence
and throws an exception.
Signed-off-by: Michael Goldish mgold...@redhat.com
---
client/tests/kvm/scan_results.py |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/client/tests/kvm/scan_results.py
(2010/06/21 23:19), Luiz Capitulino wrote:
On a different note, in a HA environment the qemu policy described
above is not adequate; when a notification of a hardware error that
our policy determines to be serious arrives the first thing we want
to do is to put the virtual machine in
On Mon, 2010-06-21 at 14:45 +0300, Avi Kivity wrote:
On 06/21/2010 12:31 PM, Zhang, Yanmin wrote:
Here is the version 2.
ChangeLog since V1: Mostly changes based on Avi's suggestions.
1) Use a id to identify the perf_event between host and guest;
2) Changes lots of codes to deal
From: Michael Goldish mgold...@redhat.com
Add log_line() which logs a single line to a given file. The file's path is
given relative to a certain base dir.
Add set_log_dir() which sets the base dir.
This is useful for logging the output of kvm_subprocess. kvm_subprocess can
take a callback
From: Michael Goldish mgold...@redhat.com
Allow all kvm_subprocess classes (kvm_spawn, kvm_tail, kvm_expect,
kvm_shell_session) to close automatically if auto_close is given and True.
By default auto_close if False for all classes except kvm_shell_session,
for which it is True by default.
- Add _remote_login() and _remote_scp() which, instead
of taking a command line, take an existing session
and operate on it. This is useful for logging into
existing always-open sessions, such as serial console
sessions.
- Merge ssh/telnet/netcat into remote_login().
Signed-off-by:
In order to let the serial console work, we must let the
remote_login() send the username when met the username prompt. This
patch fails the progress if if it met the username prompt twice.
Signed-off-by: Jason Wang jasow...@redhat.com
Signed-off-by: Michael Goldish mgold...@redhat.com
---
From: Michael Goldish mgold...@redhat.com
Current matching re ^\s*[Ll]ogin:\s*$ is not suitable for the serial
console, so change it to [Ll]ogin:\s*$.
Signed-off-by: Jason Wang jasow...@redhat.com
Signed-off-by: Michael Goldish mgold...@redhat.com
---
client/tests/kvm/kvm_utils.py |2 +-
1
From: Michael Goldish mgold...@redhat.com
Based on Jason Wang's patch.
Signed-off-by: Jason Wang jasow...@redhat.com
Signed-off-by: Michael Goldish mgold...@redhat.com
---
client/tests/kvm/kvm_vm.py | 13 +
1 files changed, 13 insertions(+), 0 deletions(-)
diff --git
From: Michael Goldish mgold...@redhat.com
Log serial console output to files in the debug dir.
Also, add VM.serial_login() which attempts to log in via the serial console.
Note:
- Tests must NOT close() a serial console session, because it needs to remain
open for the following tests to use.
From: Michael Goldish mgold...@redhat.com
Signed-off-by: Michael Goldish mgold...@redhat.com
---
client/tests/kvm/kvm.py |4
1 files changed, 4 insertions(+), 0 deletions(-)
diff --git a/client/tests/kvm/kvm.py b/client/tests/kvm/kvm.py
index bab1e6f..0799cff 100644
---
From: Michael Goldish mgold...@redhat.com
Converting the text to utf-8 seems to cause trouble when converting back (e.g.
when writing to files). The logging system seems to be fine with unsanitized
text, so let's not sanitize it.
Signed-off-by: Michael Goldish mgold...@redhat.com
---
From: Michael Goldish mgold...@redhat.com
Use kvm_utils.log_line() to log the output of all shell sessions and SCP
transfers.
Signed-off-by: Michael Goldish mgold...@redhat.com
---
client/tests/kvm/kvm_utils.py | 33 ++---
client/tests/kvm/kvm_vm.py| 15
This patch enable the serial console during unattended installation
for all linux guests.
Signed-off-by: Jason Wang jasow...@redhat.com
---
client/tests/kvm/tests_base.cfg.sample |8
1 files changed, 4 insertions(+), 4 deletions(-)
diff --git
From: Jason Wang jasow...@redhat.com
As we have the ability to dump the content from serial console or use
a session through it, we need to redirect the console to serial
through unattended files to make use of it. The patch also keep the
tty0 accroding to the suggestion of Michael Goldish.
On timedrift.py, a prefix is added to indicate the
kvm subprocess instances of the guest load processes.
With the fact the ssh sessions are being logged, that
implies in changing the the kvm subprocess callback
function. When this happens, the wrong parameters
will be passed to the logging system
On Mon, 2010-06-21 at 15:00 +0300, Avi Kivity wrote:
On 06/21/2010 12:31 PM, Zhang, Yanmin wrote:
The 2nd patch is to change the definition of perf_event to facilitate
perf attr copy when a hypercall happens.
Signed-off-by: Zhang Yanminyanmin_zh...@linux.intel.com
---
---
- Michael Goldish mgold...@redhat.com wrote:
From: Michael Goldish mgold...@redhat.com
To: Feng Yang fy...@redhat.com
Cc: autot...@test.kernel.org, kvm@vger.kernel.org
Sent: Monday, June 21, 2010 7:19:58 PM GMT +08:00 Beijing / Chongqing / Hong
Kong / Urumqi
Subject: Re: [PATCH] KVM
On Mon, 2010-06-21 at 15:33 +0300, Avi Kivity wrote:
On 06/21/2010 12:31 PM, Zhang, Yanmin wrote:
The 3rd patch is to implement para virt perf at host kernel.
@@ -64,6 +73,85 @@ struct kvm_mmu_op_release_pt {
#ifdef __KERNEL__
#includeasm/processor.h
+/*
+ * In host
1 - 100 of 108 matches
Mail list logo