[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[PULL 09/24] kvm: require KVM_CAP_INTERNAL_ERROR_DATA
|
From: |
Paolo Bonzini |
|
Subject: |
[PULL 09/24] kvm: require KVM_CAP_INTERNAL_ERROR_DATA |
|
Date: |
Thu, 26 Oct 2023 01:27:02 +0200 |
This was introduced in KVM in Linux 2.6.33, we can require it unconditionally.
Reviewed-by: Manos Pitsidianakis <manos.pitsidianakis@linaro.org>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
---
accel/kvm/kvm-all.c | 13 ++++++-------
1 file changed, 6 insertions(+), 7 deletions(-)
diff --git a/accel/kvm/kvm-all.c b/accel/kvm/kvm-all.c
index 3f7eafe08cb..8eee5042252 100644
--- a/accel/kvm/kvm-all.c
+++ b/accel/kvm/kvm-all.c
@@ -111,6 +111,7 @@ static const KVMCapabilityInfo kvm_required_capabilites[] =
{
KVM_CAP_INFO(USER_MEMORY),
KVM_CAP_INFO(DESTROY_MEMORY_REGION_WORKS),
KVM_CAP_INFO(JOIN_MEMORY_REGIONS_WORKS),
+ KVM_CAP_INFO(INTERNAL_ERROR_DATA),
KVM_CAP_LAST_INFO
};
@@ -2794,16 +2795,14 @@ static void kvm_handle_io(uint16_t port, MemTxAttrs
attrs, void *data, int direc
static int kvm_handle_internal_error(CPUState *cpu, struct kvm_run *run)
{
+ int i;
+
fprintf(stderr, "KVM internal error. Suberror: %d\n",
run->internal.suberror);
- if (kvm_check_extension(kvm_state, KVM_CAP_INTERNAL_ERROR_DATA)) {
- int i;
-
- for (i = 0; i < run->internal.ndata; ++i) {
- fprintf(stderr, "extra data[%d]: 0x%016"PRIx64"\n",
- i, (uint64_t)run->internal.data[i]);
- }
+ for (i = 0; i < run->internal.ndata; ++i) {
+ fprintf(stderr, "extra data[%d]: 0x%016"PRIx64"\n",
+ i, (uint64_t)run->internal.data[i]);
}
if (run->internal.suberror == KVM_INTERNAL_ERROR_EMULATION) {
fprintf(stderr, "emulation failure\n");
--
2.41.0
- [PULL 02/24] target/i386: implement SHA instructions, (continued)
- [PULL 02/24] target/i386: implement SHA instructions, Paolo Bonzini, 2023/10/25
- [PULL 04/24] tests/tcg/i386: test-avx: add test cases for SHA new instructions, Paolo Bonzini, 2023/10/25
- [PULL 05/24] target/i386: group common checks in the decoding phase, Paolo Bonzini, 2023/10/25
- [PULL 06/24] target/i386: validate VEX.W for AVX instructions, Paolo Bonzini, 2023/10/25
- [PULL 08/24] kvm: remove unnecessary stub, Paolo Bonzini, 2023/10/25
- [PULL 03/24] tests/tcg/i386: initialize more registers in test-avx, Paolo Bonzini, 2023/10/25
- [PULL 10/24] kvm: require KVM_CAP_SIGNAL_MSI, Paolo Bonzini, 2023/10/25
- [PULL 07/24] target/i386: check CPUID_PAE to determine 36 bit processor address space, Paolo Bonzini, 2023/10/25
- [PULL 12/24] kvm: require KVM_IRQFD for kernel irqchip, Paolo Bonzini, 2023/10/25
- [PULL 13/24] kvm: drop reference to KVM_CAP_PCI_2_3, Paolo Bonzini, 2023/10/25
- [PULL 09/24] kvm: require KVM_CAP_INTERNAL_ERROR_DATA,
Paolo Bonzini <=
- [PULL 14/24] kvm: assume that many ioeventfds can be created, Paolo Bonzini, 2023/10/25
- [PULL 11/24] kvm: require KVM_IRQFD for kernel irqchip, Paolo Bonzini, 2023/10/25
- [PULL 15/24] kvm: require KVM_CAP_IOEVENTFD and KVM_CAP_IOEVENTFD_ANY_LENGTH, Paolo Bonzini, 2023/10/25
- [PULL 17/24] kvm: i386: move KVM_CAP_IRQ_ROUTING detection to kvm_arch_required_capabilities, Paolo Bonzini, 2023/10/25
- [PULL 18/24] kvm: i386: require KVM_CAP_DEBUGREGS, Paolo Bonzini, 2023/10/25
- [PULL 20/24] kvm: i386: require KVM_CAP_SET_VCPU_EVENTS and KVM_CAP_X86_ROBUST_SINGLESTEP, Paolo Bonzini, 2023/10/25
- [PULL 19/24] kvm: i386: require KVM_CAP_XSAVE, Paolo Bonzini, 2023/10/25
- [PULL 22/24] kvm: i386: require KVM_CAP_ADJUST_CLOCK, Paolo Bonzini, 2023/10/25
- [PULL 23/24] kvm: i386: require KVM_CAP_SET_IDENTITY_MAP_ADDR, Paolo Bonzini, 2023/10/25
- [PULL 21/24] kvm: i386: require KVM_CAP_MCE, Paolo Bonzini, 2023/10/25