2008-01-29 18:15:54 +00:00
|
|
|
#include <config.h>
|
2007-11-26 12:03:34 +00:00
|
|
|
|
|
|
|
#include <unistd.h>
|
2007-07-18 21:34:22 +00:00
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
|
2013-04-16 13:41:44 +00:00
|
|
|
#include "testutils.h"
|
|
|
|
|
2007-11-26 12:03:34 +00:00
|
|
|
#ifdef WITH_QEMU
|
|
|
|
|
2010-03-09 18:22:22 +00:00
|
|
|
# include "internal.h"
|
2016-04-13 06:12:47 +00:00
|
|
|
# include "qemu/qemu_domain_address.h"
|
2011-07-11 17:29:09 +00:00
|
|
|
# include "qemu/qemu_domain.h"
|
2010-03-09 18:22:22 +00:00
|
|
|
# include "testutilsqemu.h"
|
2013-04-03 10:36:23 +00:00
|
|
|
# include "virstring.h"
|
2019-08-12 15:06:22 +00:00
|
|
|
# include "virfilewrapper.h"
|
|
|
|
# include "configmake.h"
|
2007-07-18 21:34:22 +00:00
|
|
|
|
2013-06-07 15:10:28 +00:00
|
|
|
# define VIR_FROM_THIS VIR_FROM_NONE
|
|
|
|
|
2012-11-28 16:43:10 +00:00
|
|
|
static virQEMUDriver driver;
|
2007-07-18 21:34:22 +00:00
|
|
|
|
2015-03-23 16:24:43 +00:00
|
|
|
enum {
|
|
|
|
WHEN_INACTIVE = 1,
|
|
|
|
WHEN_ACTIVE = 2,
|
|
|
|
WHEN_BOTH = 3,
|
|
|
|
};
|
|
|
|
|
2016-01-27 21:03:52 +00:00
|
|
|
|
2015-03-23 16:24:43 +00:00
|
|
|
static int
|
|
|
|
testXML2XMLActive(const void *opaque)
|
|
|
|
{
|
2019-03-31 16:36:27 +00:00
|
|
|
const struct testQemuInfo *info = opaque;
|
2015-03-23 16:24:43 +00:00
|
|
|
|
2016-01-08 20:55:44 +00:00
|
|
|
return testCompareDomXML2XMLFiles(driver.caps, driver.xmlopt,
|
2019-03-31 16:07:16 +00:00
|
|
|
info->infile, info->outfile, true, 0,
|
2016-04-08 16:04:10 +00:00
|
|
|
TEST_COMPARE_DOM_XML2XML_RESULT_SUCCESS);
|
2015-03-23 16:24:43 +00:00
|
|
|
}
|
|
|
|
|
2010-07-24 22:18:18 +00:00
|
|
|
|
2011-04-24 22:25:10 +00:00
|
|
|
static int
|
2015-03-23 16:24:43 +00:00
|
|
|
testXML2XMLInactive(const void *opaque)
|
2011-04-24 22:25:10 +00:00
|
|
|
{
|
2019-03-31 16:36:27 +00:00
|
|
|
const struct testQemuInfo *info = opaque;
|
2015-03-23 16:24:43 +00:00
|
|
|
|
2019-03-31 16:33:52 +00:00
|
|
|
return testCompareDomXML2XMLFiles(driver.caps, driver.xmlopt,
|
|
|
|
info->infile, info->outfile, false, 0,
|
2016-04-08 16:04:10 +00:00
|
|
|
TEST_COMPARE_DOM_XML2XML_RESULT_SUCCESS);
|
2015-03-23 16:24:43 +00:00
|
|
|
}
|
2010-07-24 22:18:18 +00:00
|
|
|
|
2015-03-23 16:24:43 +00:00
|
|
|
|
2018-03-02 15:47:32 +00:00
|
|
|
static int
|
|
|
|
testCompareStatusXMLToXMLFiles(const void *opaque)
|
|
|
|
{
|
2019-03-31 16:36:27 +00:00
|
|
|
const struct testQemuInfo *data = opaque;
|
2018-03-02 15:47:32 +00:00
|
|
|
virDomainObjPtr obj = NULL;
|
2020-07-28 19:57:28 +00:00
|
|
|
g_autofree char *actual = NULL;
|
2018-03-02 15:47:32 +00:00
|
|
|
int ret = -1;
|
|
|
|
|
2019-11-27 12:29:21 +00:00
|
|
|
if (!(obj = virDomainObjParseFile(data->infile, driver.xmlopt,
|
2018-03-02 15:47:32 +00:00
|
|
|
VIR_DOMAIN_DEF_PARSE_STATUS |
|
|
|
|
VIR_DOMAIN_DEF_PARSE_ACTUAL_NET |
|
|
|
|
VIR_DOMAIN_DEF_PARSE_PCI_ORIG_STATES |
|
|
|
|
VIR_DOMAIN_DEF_PARSE_SKIP_VALIDATE |
|
2018-12-03 08:51:25 +00:00
|
|
|
VIR_DOMAIN_DEF_PARSE_ALLOW_POST_PARSE_FAIL))) {
|
2019-05-03 08:31:02 +00:00
|
|
|
VIR_TEST_DEBUG("\nfailed to parse '%s'", data->infile);
|
2018-03-02 15:47:32 +00:00
|
|
|
goto cleanup;
|
2018-12-03 08:51:25 +00:00
|
|
|
}
|
2018-03-02 15:47:32 +00:00
|
|
|
|
2019-11-27 11:57:34 +00:00
|
|
|
if (!(actual = virDomainObjFormat(obj, driver.xmlopt,
|
2018-03-02 15:47:32 +00:00
|
|
|
VIR_DOMAIN_DEF_FORMAT_SECURE |
|
|
|
|
VIR_DOMAIN_DEF_FORMAT_STATUS |
|
|
|
|
VIR_DOMAIN_DEF_FORMAT_ACTUAL_NET |
|
|
|
|
VIR_DOMAIN_DEF_FORMAT_PCI_ORIG_STATES |
|
2018-12-03 08:51:25 +00:00
|
|
|
VIR_DOMAIN_DEF_FORMAT_CLOCK_ADJUST))) {
|
2019-05-03 08:31:02 +00:00
|
|
|
VIR_TEST_DEBUG("\nfailed to format back '%s'", data->infile);
|
2018-03-02 15:47:32 +00:00
|
|
|
goto cleanup;
|
2018-12-03 08:51:25 +00:00
|
|
|
}
|
2018-03-02 15:47:32 +00:00
|
|
|
|
2019-03-31 16:07:16 +00:00
|
|
|
if (virTestCompareToFile(actual, data->outfile) < 0)
|
2018-03-02 15:47:32 +00:00
|
|
|
goto cleanup;
|
|
|
|
|
|
|
|
ret = 0;
|
|
|
|
|
|
|
|
cleanup:
|
2018-03-26 22:21:59 +00:00
|
|
|
virDomainObjEndAPI(&obj);
|
2018-03-02 15:47:32 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
2019-03-31 16:36:27 +00:00
|
|
|
testInfoSetPaths(struct testQemuInfo *info,
|
2019-04-15 22:43:32 +00:00
|
|
|
const char *suffix,
|
2019-03-31 16:21:45 +00:00
|
|
|
int when)
|
2018-03-02 15:47:32 +00:00
|
|
|
{
|
2019-03-31 16:33:52 +00:00
|
|
|
VIR_FREE(info->infile);
|
|
|
|
VIR_FREE(info->outfile);
|
|
|
|
|
2019-10-22 13:26:14 +00:00
|
|
|
info->infile = g_strdup_printf("%s/qemuxml2argvdata/%s.xml", abs_srcdir,
|
|
|
|
info->name);
|
2015-03-23 16:24:43 +00:00
|
|
|
|
2019-10-22 13:26:14 +00:00
|
|
|
info->outfile = g_strdup_printf("%s/qemuxml2xmloutdata/%s-%s%s.xml",
|
|
|
|
abs_srcdir, info->name,
|
|
|
|
when == WHEN_ACTIVE ? "active" : "inactive", suffix);
|
2015-03-23 16:24:43 +00:00
|
|
|
|
2019-03-31 16:33:52 +00:00
|
|
|
if (!virFileExists(info->outfile)) {
|
|
|
|
VIR_FREE(info->outfile);
|
2013-09-25 14:56:05 +00:00
|
|
|
|
2019-10-22 13:26:14 +00:00
|
|
|
info->outfile = g_strdup_printf("%s/qemuxml2xmloutdata/%s%s.xml",
|
|
|
|
abs_srcdir, info->name, suffix);
|
2014-04-17 13:23:21 +00:00
|
|
|
}
|
2013-09-25 14:56:05 +00:00
|
|
|
|
2015-03-23 16:24:43 +00:00
|
|
|
return 0;
|
2007-07-18 21:34:22 +00:00
|
|
|
}
|
|
|
|
|
2018-03-02 15:47:32 +00:00
|
|
|
|
|
|
|
static const char *statusPath = abs_srcdir "/qemustatusxml2xmldata/";
|
|
|
|
|
2019-10-22 13:26:14 +00:00
|
|
|
static void
|
2019-04-15 22:19:19 +00:00
|
|
|
testInfoSetStatusPaths(struct testQemuInfo *info)
|
2018-03-02 15:47:32 +00:00
|
|
|
{
|
2019-10-22 13:26:14 +00:00
|
|
|
info->infile = g_strdup_printf("%s%s-in.xml", statusPath, info->name);
|
|
|
|
info->outfile = g_strdup_printf("%s%s-out.xml", statusPath, info->name);
|
2018-03-02 15:47:32 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-05-07 20:31:04 +00:00
|
|
|
# define FAKEROOTDIRTEMPLATE abs_builddir "/fakerootdir-XXXXXX"
|
|
|
|
|
2008-05-29 15:31:49 +00:00
|
|
|
static int
|
2011-04-29 16:21:20 +00:00
|
|
|
mymain(void)
|
2007-07-18 21:34:22 +00:00
|
|
|
{
|
|
|
|
int ret = 0;
|
2020-07-28 19:57:28 +00:00
|
|
|
g_autofree char *fakerootdir = NULL;
|
2016-04-26 12:27:16 +00:00
|
|
|
virQEMUDriverConfigPtr cfg = NULL;
|
2020-07-28 19:58:18 +00:00
|
|
|
g_autoptr(virHashTable) capslatest = NULL;
|
2020-06-25 14:34:30 +00:00
|
|
|
g_autoptr(virConnect) conn = NULL;
|
2019-03-31 20:44:25 +00:00
|
|
|
|
|
|
|
capslatest = testQemuGetLatestCaps();
|
|
|
|
if (!capslatest)
|
|
|
|
return EXIT_FAILURE;
|
2008-02-27 04:35:08 +00:00
|
|
|
|
2020-05-07 20:31:04 +00:00
|
|
|
fakerootdir = g_strdup(FAKEROOTDIRTEMPLATE);
|
|
|
|
|
|
|
|
if (!g_mkdtemp(fakerootdir)) {
|
|
|
|
fprintf(stderr, "Cannot create fakerootdir");
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
|
|
|
|
g_setenv("LIBVIRT_FAKE_ROOT_DIR", fakerootdir, TRUE);
|
|
|
|
|
2019-08-12 15:06:22 +00:00
|
|
|
/* Required for tpm-emulator tests
|
|
|
|
*/
|
|
|
|
virFileWrapperAddPrefix(SYSCONFDIR "/qemu/firmware",
|
|
|
|
abs_srcdir "/qemufirmwaredata/etc/qemu/firmware");
|
|
|
|
virFileWrapperAddPrefix(PREFIX "/share/qemu/firmware",
|
|
|
|
abs_srcdir "/qemufirmwaredata/usr/share/qemu/firmware");
|
|
|
|
virFileWrapperAddPrefix("/home/user/.config/qemu/firmware",
|
|
|
|
abs_srcdir "/qemufirmwaredata/home/user/.config/qemu/firmware");
|
|
|
|
|
2015-09-15 06:16:02 +00:00
|
|
|
if (qemuTestDriverInit(&driver) < 0)
|
2012-03-22 11:33:35 +00:00
|
|
|
return EXIT_FAILURE;
|
2008-02-27 04:35:08 +00:00
|
|
|
|
2016-05-19 08:53:55 +00:00
|
|
|
cfg = virQEMUDriverGetConfig(&driver);
|
2020-02-26 11:51:44 +00:00
|
|
|
driver.privileged = true;
|
2016-05-19 08:53:55 +00:00
|
|
|
|
2020-06-25 14:34:30 +00:00
|
|
|
if (!(conn = virGetConnect()))
|
|
|
|
goto cleanup;
|
|
|
|
|
|
|
|
virSetConnectInterface(conn);
|
|
|
|
virSetConnectNetwork(conn);
|
|
|
|
virSetConnectNWFilter(conn);
|
|
|
|
virSetConnectNodeDev(conn);
|
|
|
|
virSetConnectSecret(conn);
|
|
|
|
virSetConnectStorage(conn);
|
|
|
|
|
2019-04-15 22:43:32 +00:00
|
|
|
# define DO_TEST_INTERNAL(_name, suffix, when, ...) \
|
2017-11-03 12:09:47 +00:00
|
|
|
do { \
|
2019-04-15 22:19:19 +00:00
|
|
|
static struct testQemuInfo info = { \
|
|
|
|
.name = _name, \
|
|
|
|
}; \
|
2019-03-31 20:44:25 +00:00
|
|
|
if (testQemuInfoSetArgs(&info, capslatest, \
|
2019-03-31 19:28:55 +00:00
|
|
|
__VA_ARGS__, \
|
2019-03-31 20:44:25 +00:00
|
|
|
ARG_END) < 0 || \
|
|
|
|
qemuTestCapsCacheInsert(driver.qemuCapsCache, info.qemuCaps) < 0) { \
|
2019-04-15 22:19:19 +00:00
|
|
|
VIR_TEST_DEBUG("Failed to generate test data for '%s'", _name); \
|
2017-11-03 12:09:47 +00:00
|
|
|
return -1; \
|
|
|
|
} \
|
|
|
|
\
|
2019-03-31 16:33:52 +00:00
|
|
|
if (when & WHEN_INACTIVE) { \
|
2019-04-15 22:43:32 +00:00
|
|
|
if (testInfoSetPaths(&info, suffix, WHEN_INACTIVE) < 0) { \
|
2019-04-15 22:19:19 +00:00
|
|
|
VIR_TEST_DEBUG("Failed to generate inactive paths for '%s'", _name); \
|
2019-03-31 16:33:52 +00:00
|
|
|
return -1; \
|
|
|
|
} \
|
2019-04-15 22:19:19 +00:00
|
|
|
if (virTestRun("QEMU XML-2-XML-inactive " _name, \
|
2017-11-03 12:09:47 +00:00
|
|
|
testXML2XMLInactive, &info) < 0) \
|
|
|
|
ret = -1; \
|
|
|
|
} \
|
|
|
|
\
|
2019-03-31 16:33:52 +00:00
|
|
|
if (when & WHEN_ACTIVE) { \
|
2019-04-15 22:43:32 +00:00
|
|
|
if (testInfoSetPaths(&info, suffix, WHEN_ACTIVE) < 0) { \
|
2019-04-15 22:19:19 +00:00
|
|
|
VIR_TEST_DEBUG("Failed to generate active paths for '%s'", _name); \
|
2019-03-31 16:33:52 +00:00
|
|
|
return -1; \
|
|
|
|
} \
|
2019-04-15 22:19:19 +00:00
|
|
|
if (virTestRun("QEMU XML-2-XML-active " _name, \
|
2017-11-03 12:09:47 +00:00
|
|
|
testXML2XMLActive, &info) < 0) \
|
|
|
|
ret = -1; \
|
|
|
|
} \
|
2019-03-31 16:36:27 +00:00
|
|
|
testQemuInfoClear(&info); \
|
2010-07-24 22:18:18 +00:00
|
|
|
} while (0)
|
|
|
|
|
2019-04-15 22:43:32 +00:00
|
|
|
# define DO_TEST_CAPS_INTERNAL(name, arch, ver, ...) \
|
|
|
|
DO_TEST_INTERNAL(name, "." arch "-" ver, WHEN_BOTH, \
|
|
|
|
ARG_CAPS_ARCH, arch, \
|
|
|
|
ARG_CAPS_VER, ver, \
|
|
|
|
__VA_ARGS__)
|
|
|
|
|
|
|
|
# define DO_TEST_CAPS_ARCH_LATEST_FULL(name, arch, ...) \
|
|
|
|
DO_TEST_CAPS_INTERNAL(name, arch, "latest", __VA_ARGS__)
|
|
|
|
|
2019-07-02 15:35:33 +00:00
|
|
|
# define DO_TEST_CAPS_ARCH_VER_FULL(name, arch, ver, ...) \
|
|
|
|
DO_TEST_CAPS_INTERNAL(name, arch, ver, __VA_ARGS__)
|
|
|
|
|
2019-04-15 22:43:32 +00:00
|
|
|
# define DO_TEST_CAPS_ARCH_LATEST(name, arch) \
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST_FULL(name, arch, ARG_END)
|
|
|
|
|
2019-07-02 15:33:31 +00:00
|
|
|
# define DO_TEST_CAPS_ARCH_VER(name, arch, ver) \
|
2019-07-02 15:35:33 +00:00
|
|
|
DO_TEST_CAPS_ARCH_VER_FULL(name, arch, ver, ARG_END)
|
2019-07-02 15:33:31 +00:00
|
|
|
|
2019-04-15 22:43:32 +00:00
|
|
|
# define DO_TEST_CAPS_LATEST(name) \
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST(name, "x86_64")
|
2016-01-27 21:19:40 +00:00
|
|
|
|
2019-07-02 15:33:31 +00:00
|
|
|
# define DO_TEST_CAPS_VER(name, ver) \
|
|
|
|
DO_TEST_CAPS_ARCH_VER(name, "x86_64", ver)
|
|
|
|
|
|
|
|
# define DO_TEST_FULL(name, when, ...) \
|
|
|
|
DO_TEST_INTERNAL(name, "", when, __VA_ARGS__)
|
|
|
|
|
|
|
|
# define DO_TEST(name, ...) \
|
|
|
|
DO_TEST_FULL(name, WHEN_BOTH, \
|
|
|
|
ARG_QEMU_CAPS, __VA_ARGS__, QEMU_CAPS_LAST)
|
|
|
|
|
|
|
|
# define NONE QEMU_CAPS_LAST
|
2010-07-24 22:18:18 +00:00
|
|
|
|
|
|
|
/* Unset or set all envvars here that are copied in qemudBuildCommandLine
|
|
|
|
* using ADD_ENV_COPY, otherwise these tests may fail due to unexpected
|
|
|
|
* values for these envvars */
|
2019-12-18 17:16:19 +00:00
|
|
|
g_setenv("PATH", "/bin", TRUE);
|
2008-04-25 20:46:13 +00:00
|
|
|
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("minimal", NONE);
|
2019-04-15 23:00:46 +00:00
|
|
|
DO_TEST_CAPS_LATEST("genid");
|
|
|
|
DO_TEST_CAPS_LATEST("genid-auto");
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("machine-core-on", NONE);
|
|
|
|
DO_TEST("machine-core-off", NONE);
|
2017-06-01 16:36:24 +00:00
|
|
|
DO_TEST("machine-loadparm-multiple-disks-nets-s390", NONE);
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("default-kvm-host-arch", NONE);
|
|
|
|
DO_TEST("default-qemu-host-arch", NONE);
|
|
|
|
DO_TEST("boot-cdrom", NONE);
|
|
|
|
DO_TEST("boot-network", NONE);
|
|
|
|
DO_TEST("boot-floppy", NONE);
|
2017-02-23 17:47:36 +00:00
|
|
|
DO_TEST("boot-floppy-q35",
|
|
|
|
QEMU_CAPS_DEVICE_IOH3420,
|
|
|
|
QEMU_CAPS_ICH9_AHCI);
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("boot-multi", NONE);
|
2019-12-09 23:15:23 +00:00
|
|
|
DO_TEST("boot-menu-enable-with-timeout", QEMU_CAPS_SPLASH_TIMEOUT);
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("boot-menu-disable", NONE);
|
|
|
|
DO_TEST("boot-menu-disable-with-timeout", NONE);
|
|
|
|
DO_TEST("boot-order", NONE);
|
|
|
|
|
2019-12-09 23:15:23 +00:00
|
|
|
DO_TEST("reboot-timeout-enabled", QEMU_CAPS_REBOOT_TIMEOUT);
|
|
|
|
DO_TEST("reboot-timeout-disabled", QEMU_CAPS_REBOOT_TIMEOUT);
|
2016-07-29 13:13:56 +00:00
|
|
|
|
|
|
|
DO_TEST("clock-utc", NONE);
|
|
|
|
DO_TEST("clock-localtime", NONE);
|
|
|
|
DO_TEST("cpu-empty", NONE);
|
|
|
|
DO_TEST("cpu-kvmclock", NONE);
|
|
|
|
DO_TEST("cpu-host-kvmclock", NONE);
|
|
|
|
DO_TEST("cpu-host-passthrough-features", NONE);
|
|
|
|
DO_TEST("cpu-host-model-features", NONE);
|
2020-02-19 12:10:27 +00:00
|
|
|
DO_TEST("cpu-host-model-vendor", NONE);
|
2019-12-09 23:15:21 +00:00
|
|
|
DO_TEST("clock-catchup", QEMU_CAPS_KVM_PIT_TICK_POLICY);
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("kvmclock", NONE);
|
|
|
|
DO_TEST("clock-timer-hyperv-rtc", NONE);
|
2020-02-07 12:11:42 +00:00
|
|
|
DO_TEST_CAPS_ARCH_LATEST("clock-timer-armvtimer", "aarch64");
|
2016-07-29 13:13:56 +00:00
|
|
|
|
|
|
|
DO_TEST("cpu-eoi-disabled", NONE);
|
|
|
|
DO_TEST("cpu-eoi-enabled", NONE);
|
|
|
|
DO_TEST("eoi-disabled", NONE);
|
|
|
|
DO_TEST("eoi-enabled", NONE);
|
|
|
|
DO_TEST("pv-spinlock-disabled", NONE);
|
|
|
|
DO_TEST("pv-spinlock-enabled", NONE);
|
|
|
|
|
|
|
|
DO_TEST("hyperv", NONE);
|
|
|
|
DO_TEST("hyperv-off", NONE);
|
|
|
|
DO_TEST("hyperv-panic", NONE);
|
2019-08-09 14:31:40 +00:00
|
|
|
DO_TEST("hyperv-stimer-direct", NONE);
|
2016-07-29 13:13:56 +00:00
|
|
|
|
|
|
|
DO_TEST("kvm-features", NONE);
|
|
|
|
DO_TEST("kvm-features-off", NONE);
|
|
|
|
|
|
|
|
DO_TEST("pmu-feature", NONE);
|
|
|
|
DO_TEST("pmu-feature-off", NONE);
|
|
|
|
|
2018-08-08 10:27:18 +00:00
|
|
|
DO_TEST("pages-discard", NONE);
|
2019-12-09 23:15:12 +00:00
|
|
|
DO_TEST("pages-discard-hugepages", QEMU_CAPS_OBJECT_MEMORY_FILE);
|
2018-08-10 11:14:58 +00:00
|
|
|
DO_TEST("pages-dimm-discard", NONE);
|
2019-12-09 23:15:12 +00:00
|
|
|
DO_TEST("hugepages-default", QEMU_CAPS_OBJECT_MEMORY_FILE);
|
|
|
|
DO_TEST("hugepages-default-2M", QEMU_CAPS_OBJECT_MEMORY_FILE);
|
2020-01-13 08:39:22 +00:00
|
|
|
DO_TEST("hugepages-default-system-size", QEMU_CAPS_OBJECT_MEMORY_FILE);
|
2019-12-09 23:15:12 +00:00
|
|
|
DO_TEST("hugepages-nodeset", QEMU_CAPS_OBJECT_MEMORY_FILE);
|
|
|
|
DO_TEST("hugepages-numa-default-2M", QEMU_CAPS_OBJECT_MEMORY_FILE);
|
|
|
|
DO_TEST("hugepages-numa-default-dimm", QEMU_CAPS_OBJECT_MEMORY_FILE);
|
|
|
|
DO_TEST("hugepages-numa-nodeset", QEMU_CAPS_OBJECT_MEMORY_FILE);
|
|
|
|
DO_TEST("hugepages-numa-nodeset-part", QEMU_CAPS_OBJECT_MEMORY_FILE);
|
|
|
|
DO_TEST("hugepages-shared", QEMU_CAPS_OBJECT_MEMORY_FILE);
|
|
|
|
DO_TEST("hugepages-memaccess", QEMU_CAPS_OBJECT_MEMORY_FILE);
|
|
|
|
DO_TEST("hugepages-memaccess2", QEMU_CAPS_OBJECT_MEMORY_FILE);
|
|
|
|
DO_TEST("hugepages-nvdimm", QEMU_CAPS_DEVICE_NVDIMM,
|
|
|
|
QEMU_CAPS_OBJECT_MEMORY_FILE);
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("nosharepages", NONE);
|
|
|
|
DO_TEST("restore-v2", NONE);
|
|
|
|
DO_TEST("migrate", NONE);
|
|
|
|
DO_TEST("qemu-ns-no-env", NONE);
|
|
|
|
DO_TEST("disk-aio", NONE);
|
2020-04-21 12:19:37 +00:00
|
|
|
DO_TEST_CAPS_LATEST("disk-aio-io_uring");
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("disk-cdrom", NONE);
|
2019-10-15 13:19:58 +00:00
|
|
|
DO_TEST_CAPS_LATEST("disk-cdrom-empty-network-invalid");
|
2019-01-28 14:59:36 +00:00
|
|
|
DO_TEST("disk-cdrom-bus-other", NONE);
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("disk-floppy", NONE);
|
|
|
|
DO_TEST("disk-usb-device", NONE);
|
|
|
|
DO_TEST("disk-virtio", NONE);
|
|
|
|
DO_TEST("floppy-drive-fat", NONE);
|
2018-07-19 08:29:29 +00:00
|
|
|
DO_TEST("disk-virtio-queues", QEMU_CAPS_VIRTIO_BLK_NUM_QUEUES);
|
|
|
|
DO_TEST("disk-boot-disk", NONE);
|
|
|
|
DO_TEST("disk-boot-cdrom", NONE);
|
|
|
|
DO_TEST("disk-error-policy", NONE);
|
|
|
|
DO_TEST("disk-fmt-qcow", NONE);
|
2020-01-22 16:15:35 +00:00
|
|
|
DO_TEST_CAPS_VER("disk-cache", "1.5.3");
|
|
|
|
DO_TEST_CAPS_VER("disk-cache", "2.6.0");
|
|
|
|
DO_TEST_CAPS_VER("disk-cache", "2.7.0");
|
|
|
|
DO_TEST_CAPS_VER("disk-cache", "2.12.0");
|
|
|
|
DO_TEST_CAPS_LATEST("disk-cache");
|
2018-07-19 08:29:29 +00:00
|
|
|
DO_TEST("disk-network-nbd", NONE);
|
2018-07-19 13:39:23 +00:00
|
|
|
DO_TEST("disk-network-iscsi", QEMU_CAPS_VIRTIO_SCSI);
|
2018-07-19 08:29:29 +00:00
|
|
|
DO_TEST("disk-network-gluster", NONE);
|
|
|
|
DO_TEST("disk-network-rbd", NONE);
|
|
|
|
DO_TEST("disk-network-source-auth", NONE);
|
|
|
|
DO_TEST("disk-network-sheepdog", NONE);
|
|
|
|
DO_TEST("disk-network-vxhs", NONE);
|
2020-07-30 15:29:44 +00:00
|
|
|
DO_TEST("disk-network-tlsx509-nbd", NONE);
|
|
|
|
DO_TEST("disk-network-tlsx509-vxhs", NONE);
|
2019-06-03 15:31:13 +00:00
|
|
|
DO_TEST("disk-nvme", QEMU_CAPS_VIRTIO_SCSI, QEMU_CAPS_QCOW2_LUKS);
|
2020-05-13 01:55:47 +00:00
|
|
|
DO_TEST_CAPS_LATEST("disk-scsi");
|
2017-11-27 10:54:33 +00:00
|
|
|
DO_TEST("disk-virtio-scsi-reservations",
|
2018-05-11 12:53:54 +00:00
|
|
|
QEMU_CAPS_VIRTIO_SCSI, QEMU_CAPS_PR_MANAGER_HELPER);
|
2019-01-28 09:47:21 +00:00
|
|
|
DO_TEST("controller-virtio-scsi", QEMU_CAPS_VIRTIO_SCSI);
|
2018-11-08 11:00:26 +00:00
|
|
|
DO_TEST("disk-virtio-s390-zpci",
|
|
|
|
QEMU_CAPS_DEVICE_ZPCI,
|
|
|
|
QEMU_CAPS_CCW);
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("disk-mirror-old", NONE);
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("disk-mirror", NONE);
|
2019-02-28 16:10:17 +00:00
|
|
|
DO_TEST("disk-active-commit", NONE);
|
2019-12-09 23:15:26 +00:00
|
|
|
DO_TEST("graphics-listen-network",
|
|
|
|
QEMU_CAPS_DEVICE_CIRRUS_VGA,
|
|
|
|
QEMU_CAPS_VNC);
|
|
|
|
DO_TEST("graphics-vnc",
|
|
|
|
QEMU_CAPS_DEVICE_CIRRUS_VGA,
|
|
|
|
QEMU_CAPS_VNC);
|
|
|
|
DO_TEST("graphics-vnc-websocket",
|
|
|
|
QEMU_CAPS_DEVICE_CIRRUS_VGA,
|
|
|
|
QEMU_CAPS_VNC);
|
|
|
|
DO_TEST("graphics-vnc-sasl",
|
|
|
|
QEMU_CAPS_DEVICE_CIRRUS_VGA,
|
|
|
|
QEMU_CAPS_VNC);
|
|
|
|
DO_TEST("graphics-vnc-tls",
|
|
|
|
QEMU_CAPS_DEVICE_CIRRUS_VGA,
|
|
|
|
QEMU_CAPS_VNC);
|
|
|
|
DO_TEST("graphics-vnc-no-listen-attr",
|
|
|
|
QEMU_CAPS_DEVICE_CIRRUS_VGA,
|
|
|
|
QEMU_CAPS_VNC);
|
|
|
|
DO_TEST("graphics-vnc-remove-generated-socket",
|
|
|
|
QEMU_CAPS_DEVICE_CIRRUS_VGA,
|
|
|
|
QEMU_CAPS_VNC);
|
2016-05-19 08:53:55 +00:00
|
|
|
cfg->vncAutoUnixSocket = true;
|
2019-12-09 23:15:26 +00:00
|
|
|
DO_TEST("graphics-vnc-auto-socket-cfg",
|
|
|
|
QEMU_CAPS_DEVICE_CIRRUS_VGA,
|
|
|
|
QEMU_CAPS_VNC);
|
2016-05-19 08:53:55 +00:00
|
|
|
cfg->vncAutoUnixSocket = false;
|
2019-12-09 23:15:26 +00:00
|
|
|
DO_TEST("graphics-vnc-socket",
|
|
|
|
QEMU_CAPS_DEVICE_CIRRUS_VGA,
|
|
|
|
QEMU_CAPS_VNC);
|
|
|
|
DO_TEST("graphics-vnc-auto-socket",
|
|
|
|
QEMU_CAPS_DEVICE_CIRRUS_VGA,
|
|
|
|
QEMU_CAPS_VNC);
|
2018-12-07 13:53:46 +00:00
|
|
|
DO_TEST("graphics-vnc-egl-headless",
|
2019-12-09 23:15:26 +00:00
|
|
|
QEMU_CAPS_DEVICE_CIRRUS_VGA,
|
|
|
|
QEMU_CAPS_EGL_HEADLESS,
|
|
|
|
QEMU_CAPS_VNC);
|
2019-10-18 15:30:11 +00:00
|
|
|
|
2019-11-25 10:54:26 +00:00
|
|
|
DO_TEST_CAPS_ARCH_LATEST("default-video-type-aarch64", "aarch64");
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST("default-video-type-ppc64", "ppc64");
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST("default-video-type-riscv64", "riscv64");
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST("default-video-type-s390x", "s390x");
|
2019-12-09 23:15:27 +00:00
|
|
|
DO_TEST("default-video-type-x86_64-caps-test-0",
|
|
|
|
QEMU_CAPS_DEVICE_VGA,
|
|
|
|
QEMU_CAPS_SPICE);
|
|
|
|
DO_TEST("default-video-type-x86_64-caps-test-1",
|
|
|
|
QEMU_CAPS_DEVICE_CIRRUS_VGA,
|
|
|
|
QEMU_CAPS_SPICE);
|
2019-11-25 10:54:26 +00:00
|
|
|
|
2019-10-18 15:30:11 +00:00
|
|
|
DO_TEST("graphics-sdl", QEMU_CAPS_DEVICE_VGA);
|
|
|
|
DO_TEST("graphics-sdl-fullscreen", QEMU_CAPS_DEVICE_CIRRUS_VGA);
|
2019-12-09 23:15:27 +00:00
|
|
|
|
|
|
|
cfg->spiceTLS = true;
|
|
|
|
DO_TEST("graphics-spice",
|
|
|
|
QEMU_CAPS_DEVICE_QXL,
|
|
|
|
QEMU_CAPS_SPICE,
|
|
|
|
QEMU_CAPS_SPICE_FILE_XFER_DISABLE);
|
|
|
|
DO_TEST("graphics-spice-compression",
|
|
|
|
QEMU_CAPS_DEVICE_QXL,
|
|
|
|
QEMU_CAPS_SPICE);
|
|
|
|
DO_TEST("graphics-spice-qxl-vga",
|
|
|
|
QEMU_CAPS_DEVICE_QXL,
|
|
|
|
QEMU_CAPS_SPICE);
|
|
|
|
DO_TEST("graphics-spice-socket",
|
|
|
|
QEMU_CAPS_DEVICE_CIRRUS_VGA,
|
|
|
|
QEMU_CAPS_SPICE,
|
|
|
|
QEMU_CAPS_SPICE_UNIX);
|
|
|
|
DO_TEST("graphics-spice-auto-socket",
|
|
|
|
QEMU_CAPS_DEVICE_CIRRUS_VGA,
|
|
|
|
QEMU_CAPS_SPICE,
|
|
|
|
QEMU_CAPS_SPICE_UNIX);
|
2016-05-18 12:11:20 +00:00
|
|
|
cfg->spiceAutoUnixSocket = true;
|
2019-12-09 23:15:27 +00:00
|
|
|
DO_TEST("graphics-spice-auto-socket-cfg",
|
|
|
|
QEMU_CAPS_DEVICE_CIRRUS_VGA,
|
|
|
|
QEMU_CAPS_SPICE);
|
2016-05-18 12:11:20 +00:00
|
|
|
cfg->spiceAutoUnixSocket = false;
|
2019-12-09 23:15:27 +00:00
|
|
|
cfg->spiceTLS = false;
|
2018-12-07 13:53:46 +00:00
|
|
|
DO_TEST("graphics-spice-egl-headless",
|
2019-10-18 15:30:11 +00:00
|
|
|
QEMU_CAPS_DEVICE_QXL,
|
2019-12-09 23:15:27 +00:00
|
|
|
QEMU_CAPS_EGL_HEADLESS,
|
|
|
|
QEMU_CAPS_SPICE);
|
2016-05-18 12:11:20 +00:00
|
|
|
|
2018-12-07 13:53:46 +00:00
|
|
|
DO_TEST("graphics-egl-headless-rendernode",
|
2019-10-18 15:30:11 +00:00
|
|
|
QEMU_CAPS_DEVICE_CIRRUS_VGA,
|
2018-12-07 13:53:46 +00:00
|
|
|
QEMU_CAPS_EGL_HEADLESS,
|
2019-11-25 10:54:24 +00:00
|
|
|
QEMU_CAPS_EGL_HEADLESS_RENDERNODE,
|
|
|
|
QEMU_CAPS_DEVICE_CIRRUS_VGA);
|
2018-11-27 07:23:13 +00:00
|
|
|
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("input-usbmouse", NONE);
|
|
|
|
DO_TEST("input-usbtablet", NONE);
|
|
|
|
DO_TEST("misc-acpi", NONE);
|
2019-12-09 23:15:22 +00:00
|
|
|
DO_TEST("misc-disable-s3", QEMU_CAPS_PIIX_DISABLE_S3);
|
|
|
|
DO_TEST("misc-disable-suspends",
|
|
|
|
QEMU_CAPS_PIIX_DISABLE_S3,
|
|
|
|
QEMU_CAPS_PIIX_DISABLE_S4);
|
|
|
|
DO_TEST("misc-enable-s4", QEMU_CAPS_PIIX_DISABLE_S4);
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("misc-no-reboot", NONE);
|
|
|
|
DO_TEST("misc-uuid", NONE);
|
|
|
|
DO_TEST("net-vhostuser", NONE);
|
|
|
|
DO_TEST("net-user", NONE);
|
2018-03-28 21:36:13 +00:00
|
|
|
DO_TEST("net-user-addr", NONE);
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("net-virtio", NONE);
|
|
|
|
DO_TEST("net-virtio-device", NONE);
|
|
|
|
DO_TEST("net-virtio-disable-offloads", NONE);
|
|
|
|
DO_TEST("net-eth", NONE);
|
|
|
|
DO_TEST("net-eth-ifname", NONE);
|
|
|
|
DO_TEST("net-eth-hostip", NONE);
|
conf: new "managed" attribute for target dev of <interface type='ethernet'>
Although <interface type='ethernet'> has always been able to use an
existing tap device, this is just a coincidence due to the fact that
the same ioctl is used to create a new tap device or get a handle to
an existing device.
Even then, once we have the handle to the device, we still insist on
doing extra setup to it (setting the MAC address and IFF_UP). That
*might* be okay if libvirtd is running as a privileged process, but if
libvirtd is running as an unprivileged user, those attempted
modifications to the tap device will fail (yes, even if the tap is set
to be owned by the user running libvirtd). We could avoid this if we
knew that the device already existed, but as stated above, an existing
device and new device are both accessed in the same manner, and
anyway, we need to preserve existing behavior for those who are
already using pre-existing devices with privileged libvirtd (and
allowing/expecting libvirt to configure the pre-existing device).
In order to cleanly support the idea of using a pre-existing and
pre-configured tap device, this patch introduces a new optional
attribute "managed" for the interface <target> element. This
attribute is only valid for <interface type='ethernet'> (since all
other interface types have mandatory config that doesn't apply in the
case where we expect the tap device to be setup before we
get it). The syntax would look something like this:
<interface type='ethernet'>
<target dev='mytap0' managed='no'/>
...
</interface>
This patch just adds managed to the grammar and parser for <target>,
but has no functionality behind it.
(NB: when managed='no' (the default when not specified is 'yes'), the
target dev is always a name explicitly provided, so we don't
auto-remove it from the config just because it starts with "vnet"
(VIR_NET_GENERATED_TAP_PREFIX); this makes it possible to use the
same pattern of names that libvirt itself uses when it automatically
creates the tap devices.)
Signed-off-by: Laine Stump <laine@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
2019-08-21 20:42:41 +00:00
|
|
|
DO_TEST("net-eth-unmanaged-tap", NONE);
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("net-virtio-network-portgroup", NONE);
|
2017-07-12 12:19:26 +00:00
|
|
|
DO_TEST("net-virtio-rxtxqueuesize", NONE);
|
2020-01-22 21:24:10 +00:00
|
|
|
DO_TEST("net-virtio-teaming",
|
|
|
|
QEMU_CAPS_VIRTIO_NET_FAILOVER,
|
|
|
|
QEMU_CAPS_DEVICE_VFIO_PCI);
|
|
|
|
DO_TEST("net-virtio-teaming-network",
|
|
|
|
QEMU_CAPS_VIRTIO_NET_FAILOVER,
|
|
|
|
QEMU_CAPS_DEVICE_VFIO_PCI);
|
2020-01-29 15:29:21 +00:00
|
|
|
DO_TEST_CAPS_LATEST("net-isolated-port");
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("net-hostdev", NONE);
|
2018-09-07 01:09:45 +00:00
|
|
|
DO_TEST("net-hostdev-bootorder", NONE);
|
2019-12-09 23:15:18 +00:00
|
|
|
DO_TEST("net-hostdev-vfio", QEMU_CAPS_DEVICE_VFIO_PCI);
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("net-midonet", NONE);
|
|
|
|
DO_TEST("net-openvswitch", NONE);
|
|
|
|
DO_TEST("sound", NONE);
|
2019-12-09 23:15:14 +00:00
|
|
|
DO_TEST("sound-device",
|
|
|
|
QEMU_CAPS_DEVICE_ICH9_INTEL_HDA,
|
2019-12-09 23:15:15 +00:00
|
|
|
QEMU_CAPS_OBJECT_USB_AUDIO,
|
|
|
|
QEMU_CAPS_HDA_MICRO,
|
|
|
|
QEMU_CAPS_HDA_DUPLEX,
|
|
|
|
QEMU_CAPS_HDA_OUTPUT);
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("watchdog", NONE);
|
2019-12-09 23:15:26 +00:00
|
|
|
DO_TEST("net-bandwidth", QEMU_CAPS_DEVICE_VGA, QEMU_CAPS_VNC);
|
|
|
|
DO_TEST("net-bandwidth2", QEMU_CAPS_DEVICE_VGA, QEMU_CAPS_VNC);
|
2017-01-23 13:33:20 +00:00
|
|
|
DO_TEST("net-mtu", NONE);
|
2017-04-07 15:46:32 +00:00
|
|
|
DO_TEST("net-coalesce", NONE);
|
2019-01-18 20:46:56 +00:00
|
|
|
DO_TEST("net-many-models", NONE);
|
2016-07-29 13:13:56 +00:00
|
|
|
|
2016-06-14 19:52:37 +00:00
|
|
|
DO_TEST("serial-tcp-tlsx509-chardev", NONE);
|
2016-10-24 12:05:54 +00:00
|
|
|
DO_TEST("serial-tcp-tlsx509-chardev-notls", NONE);
|
2019-12-09 23:15:27 +00:00
|
|
|
|
|
|
|
cfg->spiceTLS = true;
|
|
|
|
DO_TEST("serial-spiceport",
|
|
|
|
QEMU_CAPS_DEVICE_QXL,
|
|
|
|
QEMU_CAPS_SPICE);
|
|
|
|
cfg->spiceTLS = false;
|
|
|
|
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("serial-spiceport-nospice", NONE);
|
|
|
|
DO_TEST("console-compat", NONE);
|
|
|
|
DO_TEST("console-compat2", NONE);
|
|
|
|
DO_TEST("console-virtio-many", NONE);
|
|
|
|
DO_TEST("channel-guestfwd", NONE);
|
|
|
|
DO_TEST("channel-virtio", NONE);
|
|
|
|
DO_TEST("channel-virtio-state", NONE);
|
|
|
|
|
2019-02-28 16:10:17 +00:00
|
|
|
DO_TEST("channel-unix-source-path", NONE);
|
2017-05-11 12:09:35 +00:00
|
|
|
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("hostdev-usb-address", NONE);
|
|
|
|
DO_TEST("hostdev-pci-address", NONE);
|
2019-12-17 20:35:02 +00:00
|
|
|
DO_TEST("hostdev-pci-address-unassigned", QEMU_CAPS_DEVICE_VFIO_PCI);
|
2019-12-09 23:15:18 +00:00
|
|
|
DO_TEST("hostdev-pci-multifunction", QEMU_CAPS_DEVICE_VFIO_PCI);
|
|
|
|
DO_TEST("hostdev-vfio", QEMU_CAPS_DEVICE_VFIO_PCI);
|
2018-11-08 11:00:26 +00:00
|
|
|
DO_TEST("hostdev-vfio-zpci",
|
2019-12-09 23:15:18 +00:00
|
|
|
QEMU_CAPS_DEVICE_VFIO_PCI,
|
2018-11-08 11:00:26 +00:00
|
|
|
QEMU_CAPS_DEVICE_ZPCI,
|
|
|
|
QEMU_CAPS_CCW);
|
2018-11-08 11:00:29 +00:00
|
|
|
DO_TEST("hostdev-vfio-zpci-multidomain-many",
|
|
|
|
QEMU_CAPS_DEVICE_VFIO_PCI,
|
|
|
|
QEMU_CAPS_DEVICE_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_ZPCI);
|
|
|
|
DO_TEST("hostdev-vfio-zpci-autogenerate",
|
|
|
|
QEMU_CAPS_DEVICE_VFIO_PCI,
|
|
|
|
QEMU_CAPS_DEVICE_ZPCI);
|
2020-06-18 08:25:17 +00:00
|
|
|
DO_TEST("hostdev-vfio-zpci-autogenerate-uids",
|
|
|
|
QEMU_CAPS_DEVICE_VFIO_PCI,
|
|
|
|
QEMU_CAPS_DEVICE_ZPCI);
|
|
|
|
DO_TEST("hostdev-vfio-zpci-autogenerate-fids",
|
|
|
|
QEMU_CAPS_DEVICE_VFIO_PCI,
|
|
|
|
QEMU_CAPS_DEVICE_ZPCI);
|
2018-11-08 11:00:29 +00:00
|
|
|
DO_TEST("hostdev-vfio-zpci-boundaries",
|
|
|
|
QEMU_CAPS_DEVICE_VFIO_PCI,
|
|
|
|
QEMU_CAPS_DEVICE_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_ZPCI);
|
2020-06-18 08:25:18 +00:00
|
|
|
DO_TEST("hostdev-vfio-zpci-ccw-memballoon",
|
|
|
|
QEMU_CAPS_CCW,
|
|
|
|
QEMU_CAPS_DEVICE_VFIO_PCI,
|
|
|
|
QEMU_CAPS_DEVICE_ZPCI);
|
2019-12-09 23:15:18 +00:00
|
|
|
DO_TEST("hostdev-mdev-precreated", QEMU_CAPS_DEVICE_VFIO_PCI);
|
2019-10-18 15:30:11 +00:00
|
|
|
DO_TEST("hostdev-mdev-display",
|
|
|
|
QEMU_CAPS_DEVICE_QXL,
|
2019-12-09 23:15:18 +00:00
|
|
|
QEMU_CAPS_VFIO_PCI_DISPLAY,
|
2019-12-09 23:15:26 +00:00
|
|
|
QEMU_CAPS_DEVICE_VFIO_PCI,
|
|
|
|
QEMU_CAPS_VNC);
|
2020-06-23 18:29:56 +00:00
|
|
|
DO_TEST_CAPS_LATEST("hostdev-mdev-display-ramfb");
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("pci-rom", NONE);
|
2018-04-20 15:17:11 +00:00
|
|
|
DO_TEST("pci-rom-disabled", NONE);
|
2018-04-23 11:45:59 +00:00
|
|
|
DO_TEST("pci-rom-disabled-invalid", NONE);
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("pci-serial-dev-chardev", NONE);
|
|
|
|
|
2020-02-05 17:18:39 +00:00
|
|
|
DO_TEST_CAPS_LATEST("disk-slices");
|
|
|
|
|
2018-05-22 12:53:06 +00:00
|
|
|
DO_TEST("encrypted-disk", QEMU_CAPS_QCOW2_LUKS);
|
|
|
|
DO_TEST("encrypted-disk-usage", QEMU_CAPS_QCOW2_LUKS);
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("luks-disks", NONE);
|
2017-09-14 13:32:57 +00:00
|
|
|
DO_TEST("luks-disks-source", NONE);
|
2020-01-10 16:35:10 +00:00
|
|
|
DO_TEST_CAPS_LATEST("luks-disks-source-qcow2");
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("memtune", NONE);
|
|
|
|
DO_TEST("memtune-unlimited", NONE);
|
|
|
|
DO_TEST("blkiotune", NONE);
|
|
|
|
DO_TEST("blkiotune-device", NONE);
|
|
|
|
DO_TEST("cputune", NONE);
|
|
|
|
DO_TEST("cputune-zero-shares", NONE);
|
|
|
|
DO_TEST("cputune-iothreadsched", NONE);
|
|
|
|
DO_TEST("cputune-iothreadsched-zeropriority", NONE);
|
|
|
|
DO_TEST("cputune-numatune", NONE);
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("vcpu-placement-static",
|
2017-02-23 17:47:36 +00:00
|
|
|
QEMU_CAPS_KVM,
|
|
|
|
QEMU_CAPS_OBJECT_IOTHREAD);
|
2020-06-11 11:57:07 +00:00
|
|
|
DO_TEST_CAPS_LATEST("cputune-cpuset-big-id");
|
2020-06-10 18:35:52 +00:00
|
|
|
DO_TEST_CAPS_LATEST("numavcpus-topology-mismatch");
|
2010-04-27 10:01:32 +00:00
|
|
|
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("smp", NONE);
|
|
|
|
DO_TEST("iothreads", NONE);
|
|
|
|
DO_TEST("iothreads-ids", NONE);
|
|
|
|
DO_TEST("iothreads-ids-partial", NONE);
|
|
|
|
DO_TEST("cputune-iothreads", NONE);
|
|
|
|
DO_TEST("iothreads-disk", NONE);
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("iothreads-disk-virtio-ccw",
|
2018-05-07 14:41:11 +00:00
|
|
|
QEMU_CAPS_CCW, QEMU_CAPS_VIRTIO_S390);
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("iothreads-virtio-scsi-pci",
|
2018-03-29 10:51:55 +00:00
|
|
|
QEMU_CAPS_VIRTIO_SCSI);
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("iothreads-virtio-scsi-ccw",
|
2018-05-07 14:41:11 +00:00
|
|
|
QEMU_CAPS_VIRTIO_SCSI, QEMU_CAPS_CCW,
|
2016-07-29 13:27:03 +00:00
|
|
|
QEMU_CAPS_VIRTIO_S390);
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("lease", NONE);
|
|
|
|
DO_TEST("event_idx", NONE);
|
|
|
|
DO_TEST("vhost_queues", NONE);
|
|
|
|
DO_TEST("interface-driver", NONE);
|
2019-12-09 23:15:12 +00:00
|
|
|
DO_TEST("interface-server", QEMU_CAPS_DEVICE_CIRRUS_VGA,
|
2019-12-09 23:15:22 +00:00
|
|
|
QEMU_CAPS_OBJECT_MEMORY_FILE,
|
|
|
|
QEMU_CAPS_PIIX_DISABLE_S3,
|
2019-12-09 23:15:26 +00:00
|
|
|
QEMU_CAPS_PIIX_DISABLE_S4,
|
|
|
|
QEMU_CAPS_VNC);
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("virtio-lun", NONE);
|
|
|
|
|
2016-07-29 14:09:53 +00:00
|
|
|
DO_TEST("usb-none", NONE);
|
|
|
|
DO_TEST("usb-controller", NONE);
|
|
|
|
DO_TEST("usb-piix3-controller",
|
|
|
|
QEMU_CAPS_PIIX3_USB_UHCI);
|
|
|
|
DO_TEST("usb-controller-default-q35",
|
qemu: initially reserve one open pcie-root-port for hotplug
For machinetypes with a pci-root bus (all legacy PCI), libvirt will
make a "fake" reservation for one extra slot prior to assigning
addresses to unaddressed PCI endpoint devices in the domain. This will
trigger auto-adding of a pci-bridge for the final device to be
assigned an address *if that device would have otherwise instead been
the last device on the last available pci-bridge*; thus it assures
that there will always be at least one slot left open in the domain's
bus topology for expansion (which is important both for hotplug (since
a new pci-bridge can't be added while the guest is running) as well as
for offline additions to the config (since adding a new device might
otherwise in some cases require re-addressing existing devices, which
we want to avoid)).
It's important to note that for the above case (legacy PCI), we must
check for the special case of all slots on all buses being occupied
*prior to assigning any addresses*, and avoid attempting to reserve
the extra address in that case, because there is no free address in
the existing topology, so no place to auto-add a pci-bridge for
expansion (i.e. it would always fail anyway). Since that condition can
only be reached by manual intervention, this is acceptable.
For machinetypes with pcie-root (Q35, aarch64 virt), libvirt's
methodology for automatically expanding the bus topology is different
- pcie-root-ports are plugged into slots (soon to be functions) of
pcie-root as needed, and the new endpoint devices are assigned to the
single slot in each pcie-root-port. This is done so that the devices
are, by default, hotpluggable (the slots of pcie-root don't support
hotplug, but the single slot of the pcie-root-port does). Since
pcie-root-ports can only be plugged into pcie-root, and we don't
auto-assign endpoint devices to the pcie-root slots, this means
topology expansion doesn't compete with endpoint devices for slots, so
we don't need to worry about checking for all "useful" slots being
free *prior* to assigning addresses to new endpoint devices - as a
matter of fact, if we attempt to reserve the open slots before the
used slots, it can lead to errors.
Instead this patch just reserves one slot for a "future potential"
PCIe device after doing the assignment for actual devices, but only
if the only PCI controller defined prior to starting address
assignment was pcie-root, and only if we auto-added at least one PCI
controller during address assignment. This assures two things:
1) that reserving the open slots will only be done when the domain is
initially defined, never at any time after, and
2) that if the user understands enough about PCI controllers that they
are adding them manually, that we don't mess up their plan by
adding extras - if they know enough to add one pcie-root-port, or
to manually assign addresses such that no pcie-root-ports are
needed, they know enough to add extra pcie-root-ports if they want
them (this could be called the "libguestfs clause", since
libguestfs needs to be able to create domains with as few
devices/controllers as possible).
This is set to reserve a single free port for now, but could be
increased in the future if public sentiment goes in that direction
(it's easy to increase later, but essentially impossible to decrease)
2016-09-28 00:37:30 +00:00
|
|
|
QEMU_CAPS_DEVICE_IOH3420,
|
2017-02-23 17:47:36 +00:00
|
|
|
QEMU_CAPS_PCI_OHCI,
|
|
|
|
QEMU_CAPS_PIIX3_USB_UHCI,
|
2016-07-29 14:09:53 +00:00
|
|
|
QEMU_CAPS_NEC_USB_XHCI);
|
|
|
|
DO_TEST("usb-controller-explicit-q35",
|
qemu: initially reserve one open pcie-root-port for hotplug
For machinetypes with a pci-root bus (all legacy PCI), libvirt will
make a "fake" reservation for one extra slot prior to assigning
addresses to unaddressed PCI endpoint devices in the domain. This will
trigger auto-adding of a pci-bridge for the final device to be
assigned an address *if that device would have otherwise instead been
the last device on the last available pci-bridge*; thus it assures
that there will always be at least one slot left open in the domain's
bus topology for expansion (which is important both for hotplug (since
a new pci-bridge can't be added while the guest is running) as well as
for offline additions to the config (since adding a new device might
otherwise in some cases require re-addressing existing devices, which
we want to avoid)).
It's important to note that for the above case (legacy PCI), we must
check for the special case of all slots on all buses being occupied
*prior to assigning any addresses*, and avoid attempting to reserve
the extra address in that case, because there is no free address in
the existing topology, so no place to auto-add a pci-bridge for
expansion (i.e. it would always fail anyway). Since that condition can
only be reached by manual intervention, this is acceptable.
For machinetypes with pcie-root (Q35, aarch64 virt), libvirt's
methodology for automatically expanding the bus topology is different
- pcie-root-ports are plugged into slots (soon to be functions) of
pcie-root as needed, and the new endpoint devices are assigned to the
single slot in each pcie-root-port. This is done so that the devices
are, by default, hotpluggable (the slots of pcie-root don't support
hotplug, but the single slot of the pcie-root-port does). Since
pcie-root-ports can only be plugged into pcie-root, and we don't
auto-assign endpoint devices to the pcie-root slots, this means
topology expansion doesn't compete with endpoint devices for slots, so
we don't need to worry about checking for all "useful" slots being
free *prior* to assigning addresses to new endpoint devices - as a
matter of fact, if we attempt to reserve the open slots before the
used slots, it can lead to errors.
Instead this patch just reserves one slot for a "future potential"
PCIe device after doing the assignment for actual devices, but only
if the only PCI controller defined prior to starting address
assignment was pcie-root, and only if we auto-added at least one PCI
controller during address assignment. This assures two things:
1) that reserving the open slots will only be done when the domain is
initially defined, never at any time after, and
2) that if the user understands enough about PCI controllers that they
are adding them manually, that we don't mess up their plan by
adding extras - if they know enough to add one pcie-root-port, or
to manually assign addresses such that no pcie-root-ports are
needed, they know enough to add extra pcie-root-ports if they want
them (this could be called the "libguestfs clause", since
libguestfs needs to be able to create domains with as few
devices/controllers as possible).
This is set to reserve a single free port for now, but could be
increased in the future if public sentiment goes in that direction
(it's easy to increase later, but essentially impossible to decrease)
2016-09-28 00:37:30 +00:00
|
|
|
QEMU_CAPS_DEVICE_IOH3420,
|
2017-02-23 17:47:36 +00:00
|
|
|
QEMU_CAPS_PCI_OHCI,
|
|
|
|
QEMU_CAPS_PIIX3_USB_UHCI,
|
2016-07-29 14:09:53 +00:00
|
|
|
QEMU_CAPS_NEC_USB_XHCI);
|
|
|
|
DO_TEST("ppc64-usb-controller",
|
2018-02-21 09:18:19 +00:00
|
|
|
QEMU_CAPS_DEVICE_SPAPR_PCI_HOST_BRIDGE,
|
2016-07-29 14:09:53 +00:00
|
|
|
QEMU_CAPS_PCI_OHCI);
|
|
|
|
DO_TEST("ppc64-usb-controller-legacy",
|
2018-02-21 09:18:19 +00:00
|
|
|
QEMU_CAPS_DEVICE_SPAPR_PCI_HOST_BRIDGE,
|
2016-07-29 14:09:53 +00:00
|
|
|
QEMU_CAPS_PIIX3_USB_UHCI);
|
2019-12-09 23:15:16 +00:00
|
|
|
DO_TEST("usb-port-missing", QEMU_CAPS_USB_HUB);
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("usb-redir", NONE);
|
|
|
|
DO_TEST("usb-redir-filter", NONE);
|
|
|
|
DO_TEST("usb-redir-filter-version", NONE);
|
2020-05-04 16:16:26 +00:00
|
|
|
DO_TEST_CAPS_LATEST("blkdeviotune");
|
|
|
|
DO_TEST_CAPS_LATEST("blkdeviotune-max");
|
|
|
|
DO_TEST_CAPS_LATEST("blkdeviotune-group-num");
|
|
|
|
DO_TEST_CAPS_LATEST("blkdeviotune-max-length");
|
2019-12-09 23:15:22 +00:00
|
|
|
DO_TEST("controller-usb-order",
|
|
|
|
QEMU_CAPS_PIIX_DISABLE_S3,
|
|
|
|
QEMU_CAPS_PIIX_DISABLE_S4);
|
2020-06-10 18:11:49 +00:00
|
|
|
DO_TEST_CAPS_ARCH_LATEST("ppc64-tpmproxy-single", "ppc64");
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST("ppc64-tpmproxy-with-tpm", "ppc64");
|
2011-09-02 15:09:14 +00:00
|
|
|
|
2019-03-31 19:28:55 +00:00
|
|
|
DO_TEST_FULL("seclabel-dynamic-baselabel", WHEN_INACTIVE,
|
|
|
|
ARG_QEMU_CAPS, NONE);
|
|
|
|
DO_TEST_FULL("seclabel-dynamic-override", WHEN_INACTIVE,
|
|
|
|
ARG_QEMU_CAPS, NONE);
|
|
|
|
DO_TEST_FULL("seclabel-dynamic-labelskip", WHEN_INACTIVE,
|
|
|
|
ARG_QEMU_CAPS, NONE);
|
|
|
|
DO_TEST_FULL("seclabel-dynamic-relabel", WHEN_INACTIVE,
|
|
|
|
ARG_QEMU_CAPS, NONE);
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("seclabel-static", NONE);
|
2019-02-28 16:10:17 +00:00
|
|
|
DO_TEST("seclabel-static-labelskip", NONE);
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("seclabel-none", NONE);
|
|
|
|
DO_TEST("seclabel-dac-none", NONE);
|
|
|
|
DO_TEST("seclabel-dynamic-none", NONE);
|
|
|
|
DO_TEST("seclabel-device-multiple", NONE);
|
2019-03-31 19:28:55 +00:00
|
|
|
DO_TEST_FULL("seclabel-dynamic-none-relabel", WHEN_INACTIVE,
|
2019-12-09 23:15:12 +00:00
|
|
|
ARG_QEMU_CAPS, QEMU_CAPS_DEVICE_CIRRUS_VGA,
|
2019-12-09 23:15:27 +00:00
|
|
|
QEMU_CAPS_OBJECT_MEMORY_FILE,
|
|
|
|
QEMU_CAPS_SPICE, NONE);
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("numad-static-vcpu-no-numatune", NONE);
|
2011-12-23 00:47:46 +00:00
|
|
|
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("disk-scsi-lun-passthrough-sgio",
|
2019-01-28 13:29:10 +00:00
|
|
|
QEMU_CAPS_SCSI_LSI, QEMU_CAPS_VIRTIO_SCSI, QEMU_CAPS_SCSI_DISK_WWN);
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("disk-scsi-disk-vpd",
|
2019-01-28 13:29:10 +00:00
|
|
|
QEMU_CAPS_SCSI_LSI, QEMU_CAPS_VIRTIO_SCSI, QEMU_CAPS_SCSI_DISK_WWN);
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("disk-source-pool", NONE);
|
|
|
|
DO_TEST("disk-source-pool-mode", NONE);
|
2012-12-06 10:23:02 +00:00
|
|
|
|
2020-05-04 16:53:31 +00:00
|
|
|
DO_TEST_CAPS_LATEST("disk-discard");
|
|
|
|
DO_TEST_CAPS_LATEST("disk-detect-zeroes");
|
2013-05-14 12:44:54 +00:00
|
|
|
|
2017-11-20 11:14:08 +00:00
|
|
|
DO_TEST("disk-serial", NONE);
|
|
|
|
|
2020-05-06 09:40:18 +00:00
|
|
|
DO_TEST_CAPS_ARCH_LATEST("disk-arm-virtio-sd", "aarch64");
|
|
|
|
|
2019-01-22 19:02:27 +00:00
|
|
|
DO_TEST("virtio-rng-random",
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_RNG);
|
|
|
|
DO_TEST("virtio-rng-egd",
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_RNG);
|
2020-01-09 08:00:08 +00:00
|
|
|
DO_TEST_CAPS_LATEST("virtio-rng-builtin");
|
2013-02-12 16:56:00 +00:00
|
|
|
|
2018-02-21 09:18:19 +00:00
|
|
|
DO_TEST("pseries-nvram",
|
2019-12-09 23:15:13 +00:00
|
|
|
QEMU_CAPS_DEVICE_SPAPR_PCI_HOST_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_NVRAM);
|
2018-02-21 09:18:19 +00:00
|
|
|
DO_TEST("pseries-panic-missing",
|
|
|
|
QEMU_CAPS_DEVICE_SPAPR_PCI_HOST_BRIDGE);
|
|
|
|
DO_TEST("pseries-panic-no-address",
|
|
|
|
QEMU_CAPS_DEVICE_SPAPR_PCI_HOST_BRIDGE);
|
2013-04-25 08:46:04 +00:00
|
|
|
|
2017-02-20 17:20:26 +00:00
|
|
|
DO_TEST("pseries-phb-simple",
|
|
|
|
QEMU_CAPS_DEVICE_SPAPR_PCI_HOST_BRIDGE);
|
|
|
|
DO_TEST("pseries-phb-default-missing",
|
|
|
|
QEMU_CAPS_DEVICE_SPAPR_PCI_HOST_BRIDGE);
|
2017-07-21 08:03:15 +00:00
|
|
|
DO_TEST("pseries-phb-numa-node",
|
|
|
|
QEMU_CAPS_NUMA,
|
|
|
|
QEMU_CAPS_DEVICE_SPAPR_PCI_HOST_BRIDGE,
|
2019-12-09 23:15:12 +00:00
|
|
|
QEMU_CAPS_SPAPR_PCI_HOST_BRIDGE_NUMA_NODE,
|
|
|
|
QEMU_CAPS_OBJECT_MEMORY_FILE);
|
2017-02-20 17:20:26 +00:00
|
|
|
|
2017-05-26 16:33:36 +00:00
|
|
|
DO_TEST("pseries-many-devices",
|
|
|
|
QEMU_CAPS_DEVICE_SPAPR_PCI_HOST_BRIDGE,
|
|
|
|
QEMU_CAPS_VIRTIO_SCSI);
|
|
|
|
DO_TEST("pseries-many-buses-1",
|
|
|
|
QEMU_CAPS_DEVICE_SPAPR_PCI_HOST_BRIDGE,
|
|
|
|
QEMU_CAPS_VIRTIO_SCSI);
|
|
|
|
DO_TEST("pseries-many-buses-2",
|
|
|
|
QEMU_CAPS_DEVICE_SPAPR_PCI_HOST_BRIDGE,
|
|
|
|
QEMU_CAPS_VIRTIO_SCSI);
|
|
|
|
DO_TEST("pseries-hostdevs-1",
|
|
|
|
QEMU_CAPS_DEVICE_SPAPR_PCI_HOST_BRIDGE,
|
|
|
|
QEMU_CAPS_VIRTIO_SCSI,
|
|
|
|
QEMU_CAPS_DEVICE_VFIO_PCI);
|
|
|
|
DO_TEST("pseries-hostdevs-2",
|
|
|
|
QEMU_CAPS_DEVICE_SPAPR_PCI_HOST_BRIDGE,
|
|
|
|
QEMU_CAPS_VIRTIO_SCSI,
|
|
|
|
QEMU_CAPS_DEVICE_VFIO_PCI);
|
|
|
|
DO_TEST("pseries-hostdevs-3",
|
|
|
|
QEMU_CAPS_DEVICE_SPAPR_PCI_HOST_BRIDGE,
|
|
|
|
QEMU_CAPS_VIRTIO_SCSI,
|
|
|
|
QEMU_CAPS_DEVICE_VFIO_PCI);
|
|
|
|
|
2018-03-01 17:13:23 +00:00
|
|
|
DO_TEST("pseries-features",
|
2018-02-21 09:18:19 +00:00
|
|
|
QEMU_CAPS_DEVICE_SPAPR_PCI_HOST_BRIDGE,
|
2018-05-23 16:18:01 +00:00
|
|
|
QEMU_CAPS_MACHINE_PSERIES_CAP_HPT_MAX_PAGE_SIZE,
|
2018-07-02 08:35:54 +00:00
|
|
|
QEMU_CAPS_MACHINE_PSERIES_CAP_HTM,
|
2018-11-20 12:56:38 +00:00
|
|
|
QEMU_CAPS_MACHINE_PSERIES_CAP_NESTED_HV,
|
2019-10-08 20:06:24 +00:00
|
|
|
QEMU_CAPS_MACHINE_PSERIES_CAP_CCF_ASSIST,
|
2020-04-27 12:14:27 +00:00
|
|
|
QEMU_CAPS_MACHINE_PSERIES_RESIZE_HPT,
|
2020-04-27 12:14:29 +00:00
|
|
|
QEMU_CAPS_MACHINE_PSERIES_CAP_CFPC,
|
2020-04-27 12:14:31 +00:00
|
|
|
QEMU_CAPS_MACHINE_PSERIES_CAP_SBBC,
|
|
|
|
QEMU_CAPS_MACHINE_PSERIES_CAP_IBS);
|
2017-11-06 15:39:58 +00:00
|
|
|
|
2017-11-08 14:31:21 +00:00
|
|
|
DO_TEST("pseries-serial-native",
|
2018-02-21 09:18:19 +00:00
|
|
|
QEMU_CAPS_DEVICE_SPAPR_PCI_HOST_BRIDGE,
|
2017-11-08 14:31:21 +00:00
|
|
|
QEMU_CAPS_DEVICE_SPAPR_VTY);
|
|
|
|
DO_TEST("pseries-serial+console-native",
|
2018-02-21 09:18:19 +00:00
|
|
|
QEMU_CAPS_DEVICE_SPAPR_PCI_HOST_BRIDGE,
|
2017-11-08 14:31:21 +00:00
|
|
|
QEMU_CAPS_DEVICE_SPAPR_VTY);
|
|
|
|
DO_TEST("pseries-serial-compat",
|
2018-02-21 09:18:19 +00:00
|
|
|
QEMU_CAPS_DEVICE_SPAPR_PCI_HOST_BRIDGE,
|
2017-11-08 14:31:21 +00:00
|
|
|
QEMU_CAPS_DEVICE_SPAPR_VTY);
|
2017-11-10 16:57:53 +00:00
|
|
|
DO_TEST("pseries-serial-pci",
|
2018-02-21 09:18:19 +00:00
|
|
|
QEMU_CAPS_DEVICE_SPAPR_PCI_HOST_BRIDGE,
|
2017-11-10 16:57:53 +00:00
|
|
|
QEMU_CAPS_DEVICE_PCI_SERIAL);
|
|
|
|
DO_TEST("pseries-serial-usb",
|
2018-02-21 09:18:19 +00:00
|
|
|
QEMU_CAPS_DEVICE_SPAPR_PCI_HOST_BRIDGE,
|
2017-11-10 16:57:53 +00:00
|
|
|
QEMU_CAPS_DEVICE_QEMU_XHCI,
|
|
|
|
QEMU_CAPS_DEVICE_USB_SERIAL);
|
2017-11-08 14:31:21 +00:00
|
|
|
DO_TEST("pseries-console-native",
|
2018-02-21 09:18:19 +00:00
|
|
|
QEMU_CAPS_DEVICE_SPAPR_PCI_HOST_BRIDGE,
|
2017-11-08 14:31:21 +00:00
|
|
|
QEMU_CAPS_DEVICE_SPAPR_VTY);
|
|
|
|
DO_TEST("pseries-console-virtio",
|
2018-03-29 10:51:55 +00:00
|
|
|
QEMU_CAPS_DEVICE_SPAPR_PCI_HOST_BRIDGE);
|
|
|
|
|
|
|
|
DO_TEST("mach-virt-serial-native", NONE);
|
|
|
|
DO_TEST("mach-virt-serial+console-native", NONE);
|
|
|
|
DO_TEST("mach-virt-serial-compat", NONE);
|
2017-11-09 16:14:57 +00:00
|
|
|
DO_TEST("mach-virt-serial-pci",
|
|
|
|
QEMU_CAPS_OBJECT_GPEX,
|
|
|
|
QEMU_CAPS_DEVICE_PCIE_ROOT_PORT,
|
|
|
|
QEMU_CAPS_DEVICE_DMI_TO_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_PCI_SERIAL);
|
|
|
|
DO_TEST("mach-virt-serial-usb",
|
|
|
|
QEMU_CAPS_OBJECT_GPEX,
|
|
|
|
QEMU_CAPS_DEVICE_PCIE_ROOT_PORT,
|
|
|
|
QEMU_CAPS_DEVICE_QEMU_XHCI,
|
|
|
|
QEMU_CAPS_DEVICE_USB_SERIAL);
|
2018-08-30 16:03:58 +00:00
|
|
|
DO_TEST("mach-virt-console-native",
|
|
|
|
QEMU_CAPS_DEVICE_PL011);
|
|
|
|
DO_TEST("mach-virt-console-virtio",
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_MMIO);
|
2017-11-09 16:14:57 +00:00
|
|
|
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("balloon-device-auto", NONE);
|
|
|
|
DO_TEST("balloon-device-period", NONE);
|
|
|
|
DO_TEST("channel-virtio-auto", NONE);
|
|
|
|
DO_TEST("console-compat-auto", NONE);
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("disk-scsi-device-auto",
|
2018-03-29 10:51:55 +00:00
|
|
|
QEMU_CAPS_SCSI_LSI);
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("console-virtio", NONE);
|
|
|
|
DO_TEST("serial-target-port-auto", NONE);
|
2019-12-09 23:15:26 +00:00
|
|
|
DO_TEST("graphics-listen-network2",
|
|
|
|
QEMU_CAPS_DEVICE_CIRRUS_VGA,
|
|
|
|
QEMU_CAPS_VNC);
|
2019-12-09 23:15:27 +00:00
|
|
|
DO_TEST("graphics-spice-timeout",
|
|
|
|
QEMU_CAPS_DEVICE_VGA,
|
|
|
|
QEMU_CAPS_SPICE);
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("numad-auto-vcpu-no-numatune", NONE);
|
|
|
|
DO_TEST("numad-auto-memory-vcpu-no-cpuset-and-placement", NONE);
|
|
|
|
DO_TEST("numad-auto-memory-vcpu-cpuset", NONE);
|
|
|
|
DO_TEST("usb-ich9-ehci-addr", NONE);
|
|
|
|
DO_TEST("disk-copy_on_read", NONE);
|
2019-08-20 11:42:03 +00:00
|
|
|
DO_TEST_CAPS_LATEST("tpm-passthrough");
|
|
|
|
DO_TEST_CAPS_LATEST("tpm-passthrough-crb");
|
|
|
|
DO_TEST_CAPS_LATEST("tpm-emulator");
|
|
|
|
DO_TEST_CAPS_LATEST("tpm-emulator-tpm2");
|
|
|
|
DO_TEST_CAPS_LATEST("tpm-emulator-tpm2-enc");
|
2016-07-29 13:13:56 +00:00
|
|
|
|
|
|
|
DO_TEST("metadata", NONE);
|
|
|
|
DO_TEST("metadata-duplicate", NONE);
|
2012-01-24 02:26:18 +00:00
|
|
|
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("pci-bridge",
|
2017-02-23 17:47:36 +00:00
|
|
|
QEMU_CAPS_DEVICE_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_VNC,
|
|
|
|
QEMU_CAPS_DEVICE_CIRRUS_VGA);
|
|
|
|
DO_TEST("pci-many",
|
|
|
|
QEMU_CAPS_DEVICE_CIRRUS_VGA);
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("pci-bridge-many-disks",
|
|
|
|
QEMU_CAPS_DEVICE_PCI_BRIDGE);
|
|
|
|
DO_TEST("pci-autoadd-addr",
|
2017-02-23 17:47:36 +00:00
|
|
|
QEMU_CAPS_DEVICE_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_CIRRUS_VGA);
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("pci-autoadd-idx",
|
2017-02-23 17:47:36 +00:00
|
|
|
QEMU_CAPS_DEVICE_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_CIRRUS_VGA);
|
2019-10-18 15:30:11 +00:00
|
|
|
DO_TEST("pci-autofill-addr", QEMU_CAPS_DEVICE_CIRRUS_VGA);
|
2016-01-27 21:03:52 +00:00
|
|
|
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("q35",
|
2017-02-23 17:47:36 +00:00
|
|
|
QEMU_CAPS_DEVICE_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_DMI_TO_PCI_BRIDGE,
|
qemu: initially reserve one open pcie-root-port for hotplug
For machinetypes with a pci-root bus (all legacy PCI), libvirt will
make a "fake" reservation for one extra slot prior to assigning
addresses to unaddressed PCI endpoint devices in the domain. This will
trigger auto-adding of a pci-bridge for the final device to be
assigned an address *if that device would have otherwise instead been
the last device on the last available pci-bridge*; thus it assures
that there will always be at least one slot left open in the domain's
bus topology for expansion (which is important both for hotplug (since
a new pci-bridge can't be added while the guest is running) as well as
for offline additions to the config (since adding a new device might
otherwise in some cases require re-addressing existing devices, which
we want to avoid)).
It's important to note that for the above case (legacy PCI), we must
check for the special case of all slots on all buses being occupied
*prior to assigning any addresses*, and avoid attempting to reserve
the extra address in that case, because there is no free address in
the existing topology, so no place to auto-add a pci-bridge for
expansion (i.e. it would always fail anyway). Since that condition can
only be reached by manual intervention, this is acceptable.
For machinetypes with pcie-root (Q35, aarch64 virt), libvirt's
methodology for automatically expanding the bus topology is different
- pcie-root-ports are plugged into slots (soon to be functions) of
pcie-root as needed, and the new endpoint devices are assigned to the
single slot in each pcie-root-port. This is done so that the devices
are, by default, hotpluggable (the slots of pcie-root don't support
hotplug, but the single slot of the pcie-root-port does). Since
pcie-root-ports can only be plugged into pcie-root, and we don't
auto-assign endpoint devices to the pcie-root slots, this means
topology expansion doesn't compete with endpoint devices for slots, so
we don't need to worry about checking for all "useful" slots being
free *prior* to assigning addresses to new endpoint devices - as a
matter of fact, if we attempt to reserve the open slots before the
used slots, it can lead to errors.
Instead this patch just reserves one slot for a "future potential"
PCIe device after doing the assignment for actual devices, but only
if the only PCI controller defined prior to starting address
assignment was pcie-root, and only if we auto-added at least one PCI
controller during address assignment. This assures two things:
1) that reserving the open slots will only be done when the domain is
initially defined, never at any time after, and
2) that if the user understands enough about PCI controllers that they
are adding them manually, that we don't mess up their plan by
adding extras - if they know enough to add one pcie-root-port, or
to manually assign addresses such that no pcie-root-ports are
needed, they know enough to add extra pcie-root-ports if they want
them (this could be called the "libguestfs clause", since
libguestfs needs to be able to create domains with as few
devices/controllers as possible).
This is set to reserve a single free port for now, but could be
increased in the future if public sentiment goes in that direction
(it's easy to increase later, but essentially impossible to decrease)
2016-09-28 00:37:30 +00:00
|
|
|
QEMU_CAPS_DEVICE_IOH3420,
|
2017-02-23 17:47:36 +00:00
|
|
|
QEMU_CAPS_ICH9_AHCI,
|
|
|
|
QEMU_CAPS_ICH9_USB_EHCI1,
|
|
|
|
QEMU_CAPS_DEVICE_VIDEO_PRIMARY,
|
2016-10-11 15:42:37 +00:00
|
|
|
QEMU_CAPS_DEVICE_QXL);
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("q35-usb2",
|
|
|
|
QEMU_CAPS_DEVICE_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_DMI_TO_PCI_BRIDGE,
|
qemu: initially reserve one open pcie-root-port for hotplug
For machinetypes with a pci-root bus (all legacy PCI), libvirt will
make a "fake" reservation for one extra slot prior to assigning
addresses to unaddressed PCI endpoint devices in the domain. This will
trigger auto-adding of a pci-bridge for the final device to be
assigned an address *if that device would have otherwise instead been
the last device on the last available pci-bridge*; thus it assures
that there will always be at least one slot left open in the domain's
bus topology for expansion (which is important both for hotplug (since
a new pci-bridge can't be added while the guest is running) as well as
for offline additions to the config (since adding a new device might
otherwise in some cases require re-addressing existing devices, which
we want to avoid)).
It's important to note that for the above case (legacy PCI), we must
check for the special case of all slots on all buses being occupied
*prior to assigning any addresses*, and avoid attempting to reserve
the extra address in that case, because there is no free address in
the existing topology, so no place to auto-add a pci-bridge for
expansion (i.e. it would always fail anyway). Since that condition can
only be reached by manual intervention, this is acceptable.
For machinetypes with pcie-root (Q35, aarch64 virt), libvirt's
methodology for automatically expanding the bus topology is different
- pcie-root-ports are plugged into slots (soon to be functions) of
pcie-root as needed, and the new endpoint devices are assigned to the
single slot in each pcie-root-port. This is done so that the devices
are, by default, hotpluggable (the slots of pcie-root don't support
hotplug, but the single slot of the pcie-root-port does). Since
pcie-root-ports can only be plugged into pcie-root, and we don't
auto-assign endpoint devices to the pcie-root slots, this means
topology expansion doesn't compete with endpoint devices for slots, so
we don't need to worry about checking for all "useful" slots being
free *prior* to assigning addresses to new endpoint devices - as a
matter of fact, if we attempt to reserve the open slots before the
used slots, it can lead to errors.
Instead this patch just reserves one slot for a "future potential"
PCIe device after doing the assignment for actual devices, but only
if the only PCI controller defined prior to starting address
assignment was pcie-root, and only if we auto-added at least one PCI
controller during address assignment. This assures two things:
1) that reserving the open slots will only be done when the domain is
initially defined, never at any time after, and
2) that if the user understands enough about PCI controllers that they
are adding them manually, that we don't mess up their plan by
adding extras - if they know enough to add one pcie-root-port, or
to manually assign addresses such that no pcie-root-ports are
needed, they know enough to add extra pcie-root-ports if they want
them (this could be called the "libguestfs clause", since
libguestfs needs to be able to create domains with as few
devices/controllers as possible).
This is set to reserve a single free port for now, but could be
increased in the future if public sentiment goes in that direction
(it's easy to increase later, but essentially impossible to decrease)
2016-09-28 00:37:30 +00:00
|
|
|
QEMU_CAPS_DEVICE_IOH3420,
|
2016-07-29 13:27:03 +00:00
|
|
|
QEMU_CAPS_ICH9_AHCI,
|
2017-02-23 17:47:36 +00:00
|
|
|
QEMU_CAPS_ICH9_USB_EHCI1,
|
2016-07-29 13:27:03 +00:00
|
|
|
QEMU_CAPS_DEVICE_VIDEO_PRIMARY,
|
2016-10-11 15:42:37 +00:00
|
|
|
QEMU_CAPS_DEVICE_QXL);
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("q35-usb2-multi",
|
2017-02-23 17:47:36 +00:00
|
|
|
QEMU_CAPS_DEVICE_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_DMI_TO_PCI_BRIDGE,
|
qemu: initially reserve one open pcie-root-port for hotplug
For machinetypes with a pci-root bus (all legacy PCI), libvirt will
make a "fake" reservation for one extra slot prior to assigning
addresses to unaddressed PCI endpoint devices in the domain. This will
trigger auto-adding of a pci-bridge for the final device to be
assigned an address *if that device would have otherwise instead been
the last device on the last available pci-bridge*; thus it assures
that there will always be at least one slot left open in the domain's
bus topology for expansion (which is important both for hotplug (since
a new pci-bridge can't be added while the guest is running) as well as
for offline additions to the config (since adding a new device might
otherwise in some cases require re-addressing existing devices, which
we want to avoid)).
It's important to note that for the above case (legacy PCI), we must
check for the special case of all slots on all buses being occupied
*prior to assigning any addresses*, and avoid attempting to reserve
the extra address in that case, because there is no free address in
the existing topology, so no place to auto-add a pci-bridge for
expansion (i.e. it would always fail anyway). Since that condition can
only be reached by manual intervention, this is acceptable.
For machinetypes with pcie-root (Q35, aarch64 virt), libvirt's
methodology for automatically expanding the bus topology is different
- pcie-root-ports are plugged into slots (soon to be functions) of
pcie-root as needed, and the new endpoint devices are assigned to the
single slot in each pcie-root-port. This is done so that the devices
are, by default, hotpluggable (the slots of pcie-root don't support
hotplug, but the single slot of the pcie-root-port does). Since
pcie-root-ports can only be plugged into pcie-root, and we don't
auto-assign endpoint devices to the pcie-root slots, this means
topology expansion doesn't compete with endpoint devices for slots, so
we don't need to worry about checking for all "useful" slots being
free *prior* to assigning addresses to new endpoint devices - as a
matter of fact, if we attempt to reserve the open slots before the
used slots, it can lead to errors.
Instead this patch just reserves one slot for a "future potential"
PCIe device after doing the assignment for actual devices, but only
if the only PCI controller defined prior to starting address
assignment was pcie-root, and only if we auto-added at least one PCI
controller during address assignment. This assures two things:
1) that reserving the open slots will only be done when the domain is
initially defined, never at any time after, and
2) that if the user understands enough about PCI controllers that they
are adding them manually, that we don't mess up their plan by
adding extras - if they know enough to add one pcie-root-port, or
to manually assign addresses such that no pcie-root-ports are
needed, they know enough to add extra pcie-root-ports if they want
them (this could be called the "libguestfs clause", since
libguestfs needs to be able to create domains with as few
devices/controllers as possible).
This is set to reserve a single free port for now, but could be
increased in the future if public sentiment goes in that direction
(it's easy to increase later, but essentially impossible to decrease)
2016-09-28 00:37:30 +00:00
|
|
|
QEMU_CAPS_DEVICE_IOH3420,
|
2017-02-23 17:47:36 +00:00
|
|
|
QEMU_CAPS_ICH9_AHCI,
|
|
|
|
QEMU_CAPS_ICH9_USB_EHCI1,
|
|
|
|
QEMU_CAPS_DEVICE_VIDEO_PRIMARY,
|
2016-10-11 15:42:37 +00:00
|
|
|
QEMU_CAPS_DEVICE_QXL);
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("q35-usb2-reorder",
|
2017-02-23 17:47:36 +00:00
|
|
|
QEMU_CAPS_DEVICE_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_DMI_TO_PCI_BRIDGE,
|
qemu: initially reserve one open pcie-root-port for hotplug
For machinetypes with a pci-root bus (all legacy PCI), libvirt will
make a "fake" reservation for one extra slot prior to assigning
addresses to unaddressed PCI endpoint devices in the domain. This will
trigger auto-adding of a pci-bridge for the final device to be
assigned an address *if that device would have otherwise instead been
the last device on the last available pci-bridge*; thus it assures
that there will always be at least one slot left open in the domain's
bus topology for expansion (which is important both for hotplug (since
a new pci-bridge can't be added while the guest is running) as well as
for offline additions to the config (since adding a new device might
otherwise in some cases require re-addressing existing devices, which
we want to avoid)).
It's important to note that for the above case (legacy PCI), we must
check for the special case of all slots on all buses being occupied
*prior to assigning any addresses*, and avoid attempting to reserve
the extra address in that case, because there is no free address in
the existing topology, so no place to auto-add a pci-bridge for
expansion (i.e. it would always fail anyway). Since that condition can
only be reached by manual intervention, this is acceptable.
For machinetypes with pcie-root (Q35, aarch64 virt), libvirt's
methodology for automatically expanding the bus topology is different
- pcie-root-ports are plugged into slots (soon to be functions) of
pcie-root as needed, and the new endpoint devices are assigned to the
single slot in each pcie-root-port. This is done so that the devices
are, by default, hotpluggable (the slots of pcie-root don't support
hotplug, but the single slot of the pcie-root-port does). Since
pcie-root-ports can only be plugged into pcie-root, and we don't
auto-assign endpoint devices to the pcie-root slots, this means
topology expansion doesn't compete with endpoint devices for slots, so
we don't need to worry about checking for all "useful" slots being
free *prior* to assigning addresses to new endpoint devices - as a
matter of fact, if we attempt to reserve the open slots before the
used slots, it can lead to errors.
Instead this patch just reserves one slot for a "future potential"
PCIe device after doing the assignment for actual devices, but only
if the only PCI controller defined prior to starting address
assignment was pcie-root, and only if we auto-added at least one PCI
controller during address assignment. This assures two things:
1) that reserving the open slots will only be done when the domain is
initially defined, never at any time after, and
2) that if the user understands enough about PCI controllers that they
are adding them manually, that we don't mess up their plan by
adding extras - if they know enough to add one pcie-root-port, or
to manually assign addresses such that no pcie-root-ports are
needed, they know enough to add extra pcie-root-ports if they want
them (this could be called the "libguestfs clause", since
libguestfs needs to be able to create domains with as few
devices/controllers as possible).
This is set to reserve a single free port for now, but could be
increased in the future if public sentiment goes in that direction
(it's easy to increase later, but essentially impossible to decrease)
2016-09-28 00:37:30 +00:00
|
|
|
QEMU_CAPS_DEVICE_IOH3420,
|
2017-02-23 17:47:36 +00:00
|
|
|
QEMU_CAPS_ICH9_AHCI,
|
|
|
|
QEMU_CAPS_ICH9_USB_EHCI1,
|
|
|
|
QEMU_CAPS_DEVICE_VIDEO_PRIMARY,
|
2016-10-11 15:42:37 +00:00
|
|
|
QEMU_CAPS_DEVICE_QXL);
|
qemu: assign virtio devices to PCIe slot when appropriate
libvirt previously assigned nearly all devices to a "hotpluggable"
legacy PCI slot even on machines with a PCIe root bus (and even though
most such machines don't even support hotplug on legacy PCI slots!)
Forcing all devices onto legacy PCI slots means that the domain will
need a dmi-to-pci-bridge (to convert from PCIe to legacy PCI) and a
pci-bridge (to provide hotpluggable legacy PCI slots which, again,
usually aren't hotpluggable anyway).
To help reduce the need for these legacy controllers, this patch tries
to assign virtio-1.0-capable devices to PCIe slots whenever possible,
by setting appropriate connectFlags in
virDomainCalculateDevicePCIConnectFlags(). Happily, when that function
was written (just a few commits ago) it was created with a
"virtioFlags" argument, set by both of its callers, which is the
proper connectFlags to set for any virtio-*-pci device - depending on
the arch/machinetype of the domain, and whether or not the qemu binary
supports virtio-1.0, that flag will have either been set to PCI or
PCIe. This patch merely enables the functionality by setting the flags
for the device to whatever is in virtioFlags if the device is a
virtio-*-pci device.
NB: the first virtio video device will be placed directly on bus 0
slot 1 rather than on a pcie-root-port due to the override for primary
video devices in qemuDomainValidateDevicePCISlotsQ35(). Whether or not
to change that is a topic of discussion, but this patch doesn't change
that particular behavior.
NB2: since the slot must be hotpluggable, and pcie-root (the PCIe root
complex) does *not* support hotplug, this means that suitable
controllers must also be in the config (i.e. either pcie-root-port, or
pcie-downstream-port). For now, libvirt doesn't add those
automatically, so if you put virtio devices in a config for a qemu
that has PCIe-capable virtio devices, you'll need to add extra
pcie-root-ports yourself. That requirement will be eliminated in a
future patch, but for now, it's simple to do this:
<controller type='pci' model='pcie-root-port'/>
<controller type='pci' model='pcie-root-port'/>
<controller type='pci' model='pcie-root-port'/>
...
Partially Resolves: https://bugzilla.redhat.com/show_bug.cgi?id=1330024
2016-08-13 22:10:41 +00:00
|
|
|
DO_TEST("q35-pcie",
|
|
|
|
QEMU_CAPS_VIRTIO_PCI_DISABLE_LEGACY,
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_RNG,
|
|
|
|
QEMU_CAPS_OBJECT_RNG_RANDOM,
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_NET,
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_GPU,
|
|
|
|
QEMU_CAPS_VIRTIO_GPU_VIRGL,
|
|
|
|
QEMU_CAPS_VIRTIO_KEYBOARD,
|
|
|
|
QEMU_CAPS_VIRTIO_MOUSE,
|
|
|
|
QEMU_CAPS_VIRTIO_TABLET,
|
|
|
|
QEMU_CAPS_VIRTIO_INPUT_HOST,
|
|
|
|
QEMU_CAPS_VIRTIO_SCSI,
|
|
|
|
QEMU_CAPS_DEVICE_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_DMI_TO_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_IOH3420,
|
|
|
|
QEMU_CAPS_ICH9_AHCI,
|
|
|
|
QEMU_CAPS_ICH9_USB_EHCI1,
|
2016-08-14 05:58:11 +00:00
|
|
|
QEMU_CAPS_NEC_USB_XHCI,
|
qemu: assign virtio devices to PCIe slot when appropriate
libvirt previously assigned nearly all devices to a "hotpluggable"
legacy PCI slot even on machines with a PCIe root bus (and even though
most such machines don't even support hotplug on legacy PCI slots!)
Forcing all devices onto legacy PCI slots means that the domain will
need a dmi-to-pci-bridge (to convert from PCIe to legacy PCI) and a
pci-bridge (to provide hotpluggable legacy PCI slots which, again,
usually aren't hotpluggable anyway).
To help reduce the need for these legacy controllers, this patch tries
to assign virtio-1.0-capable devices to PCIe slots whenever possible,
by setting appropriate connectFlags in
virDomainCalculateDevicePCIConnectFlags(). Happily, when that function
was written (just a few commits ago) it was created with a
"virtioFlags" argument, set by both of its callers, which is the
proper connectFlags to set for any virtio-*-pci device - depending on
the arch/machinetype of the domain, and whether or not the qemu binary
supports virtio-1.0, that flag will have either been set to PCI or
PCIe. This patch merely enables the functionality by setting the flags
for the device to whatever is in virtioFlags if the device is a
virtio-*-pci device.
NB: the first virtio video device will be placed directly on bus 0
slot 1 rather than on a pcie-root-port due to the override for primary
video devices in qemuDomainValidateDevicePCISlotsQ35(). Whether or not
to change that is a topic of discussion, but this patch doesn't change
that particular behavior.
NB2: since the slot must be hotpluggable, and pcie-root (the PCIe root
complex) does *not* support hotplug, this means that suitable
controllers must also be in the config (i.e. either pcie-root-port, or
pcie-downstream-port). For now, libvirt doesn't add those
automatically, so if you put virtio devices in a config for a qemu
that has PCIe-capable virtio devices, you'll need to add extra
pcie-root-ports yourself. That requirement will be eliminated in a
future patch, but for now, it's simple to do this:
<controller type='pci' model='pcie-root-port'/>
<controller type='pci' model='pcie-root-port'/>
<controller type='pci' model='pcie-root-port'/>
...
Partially Resolves: https://bugzilla.redhat.com/show_bug.cgi?id=1330024
2016-08-13 22:10:41 +00:00
|
|
|
QEMU_CAPS_DEVICE_VIDEO_PRIMARY);
|
|
|
|
/* same XML as q35-pcie, but don't set
|
|
|
|
QEMU_CAPS_VIRTIO_PCI_DISABLE_LEGACY */
|
|
|
|
DO_TEST("q35-virtio-pci",
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_RNG,
|
|
|
|
QEMU_CAPS_OBJECT_RNG_RANDOM,
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_NET,
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_GPU,
|
|
|
|
QEMU_CAPS_VIRTIO_GPU_VIRGL,
|
|
|
|
QEMU_CAPS_VIRTIO_KEYBOARD,
|
|
|
|
QEMU_CAPS_VIRTIO_MOUSE,
|
|
|
|
QEMU_CAPS_VIRTIO_TABLET,
|
|
|
|
QEMU_CAPS_VIRTIO_INPUT_HOST,
|
|
|
|
QEMU_CAPS_VIRTIO_SCSI,
|
|
|
|
QEMU_CAPS_DEVICE_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_DMI_TO_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_IOH3420,
|
|
|
|
QEMU_CAPS_ICH9_AHCI,
|
|
|
|
QEMU_CAPS_ICH9_USB_EHCI1,
|
2016-08-14 05:58:11 +00:00
|
|
|
QEMU_CAPS_NEC_USB_XHCI,
|
qemu: assign virtio devices to PCIe slot when appropriate
libvirt previously assigned nearly all devices to a "hotpluggable"
legacy PCI slot even on machines with a PCIe root bus (and even though
most such machines don't even support hotplug on legacy PCI slots!)
Forcing all devices onto legacy PCI slots means that the domain will
need a dmi-to-pci-bridge (to convert from PCIe to legacy PCI) and a
pci-bridge (to provide hotpluggable legacy PCI slots which, again,
usually aren't hotpluggable anyway).
To help reduce the need for these legacy controllers, this patch tries
to assign virtio-1.0-capable devices to PCIe slots whenever possible,
by setting appropriate connectFlags in
virDomainCalculateDevicePCIConnectFlags(). Happily, when that function
was written (just a few commits ago) it was created with a
"virtioFlags" argument, set by both of its callers, which is the
proper connectFlags to set for any virtio-*-pci device - depending on
the arch/machinetype of the domain, and whether or not the qemu binary
supports virtio-1.0, that flag will have either been set to PCI or
PCIe. This patch merely enables the functionality by setting the flags
for the device to whatever is in virtioFlags if the device is a
virtio-*-pci device.
NB: the first virtio video device will be placed directly on bus 0
slot 1 rather than on a pcie-root-port due to the override for primary
video devices in qemuDomainValidateDevicePCISlotsQ35(). Whether or not
to change that is a topic of discussion, but this patch doesn't change
that particular behavior.
NB2: since the slot must be hotpluggable, and pcie-root (the PCIe root
complex) does *not* support hotplug, this means that suitable
controllers must also be in the config (i.e. either pcie-root-port, or
pcie-downstream-port). For now, libvirt doesn't add those
automatically, so if you put virtio devices in a config for a qemu
that has PCIe-capable virtio devices, you'll need to add extra
pcie-root-ports yourself. That requirement will be eliminated in a
future patch, but for now, it's simple to do this:
<controller type='pci' model='pcie-root-port'/>
<controller type='pci' model='pcie-root-port'/>
<controller type='pci' model='pcie-root-port'/>
...
Partially Resolves: https://bugzilla.redhat.com/show_bug.cgi?id=1330024
2016-08-13 22:10:41 +00:00
|
|
|
QEMU_CAPS_DEVICE_VIDEO_PRIMARY);
|
qemu: auto-add pcie-root-port/dmi-to-pci-bridge controllers as needed
Previously libvirt would only add pci-bridge devices automatically
when an address was requested for a device that required a legacy PCI
slot and none was available. This patch expands that support to
dmi-to-pci-bridge (which is needed in order to add a pci-bridge on a
machine with a pcie-root), and pcie-root-port (which is needed to add
a hotpluggable PCIe device). It does *not* automatically add
pcie-switch-upstream-ports or pcie-switch-downstream-ports (and
currently there are no plans for that).
Given the existing code to auto-add pci-bridge devices, automatically
adding pcie-root-ports is fairly straightforward. The
dmi-to-pci-bridge support is a bit tricky though, for a few reasons:
1) Although the only reason to add a dmi-to-pci-bridge is so that
there is a reasonable place to plug in a pci-bridge controller,
most of the time it's not the presence of a pci-bridge *in the
config* that triggers the requirement to add a dmi-to-pci-bridge.
Rather, it is the presence of a legacy-PCI device in the config,
which triggers auto-add of a pci-bridge, which triggers auto-add of
a dmi-to-pci-bridge (this is handled in
virDomainPCIAddressSetGrow() - if there's a request to add a
pci-bridge we'll check if there is a suitable bus to plug it into;
if not, we first add a dmi-to-pci-bridge).
2) Once there is already a single dmi-to-pci-bridge on the system,
there won't be a need for any more, even if it's full, as long as
there is a pci-bridge with an open slot - you can also plug
pci-bridges into existing pci-bridges. So we have to make sure we
don't add a dmi-to-pci-bridge unless there aren't any
dmi-to-pci-bridges *or* any pci-bridges.
3) Although it is strongly discouraged, it is legal for a pci-bridge
to be directly plugged into pcie-root, and we don't want to
auto-add a dmi-to-pci-bridge if there is already a pci-bridge
that's been forced directly into pcie-root.
Although libvirt will now automatically create a dmi-to-pci-bridge
when it's needed, the code still remains for now that forces a
dmi-to-pci-bridge on all domains with pcie-root (in
qemuDomainDefAddDefaultDevices()). That will be removed in a future
patch.
For now, the pcie-root-ports are added one to a slot, which is a bit
wasteful and means it will fail after 31 total PCIe devices (30 if
there are also some PCI devices), but helps keep the changeset down
for this patch. A future patch will have 8 pcie-root-ports sharing the
functions on a single slot.
2016-09-19 18:38:47 +00:00
|
|
|
/* same as q35-pcie, but all PCI controllers are added automatically */
|
|
|
|
DO_TEST("q35-pcie-autoadd",
|
|
|
|
QEMU_CAPS_VIRTIO_PCI_DISABLE_LEGACY,
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_RNG,
|
|
|
|
QEMU_CAPS_OBJECT_RNG_RANDOM,
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_NET,
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_GPU,
|
|
|
|
QEMU_CAPS_VIRTIO_GPU_VIRGL,
|
|
|
|
QEMU_CAPS_VIRTIO_KEYBOARD,
|
2016-09-19 22:46:41 +00:00
|
|
|
QEMU_CAPS_VIRTIO_MOUSE,
|
|
|
|
QEMU_CAPS_VIRTIO_TABLET,
|
|
|
|
QEMU_CAPS_VIRTIO_INPUT_HOST,
|
|
|
|
QEMU_CAPS_VIRTIO_SCSI,
|
|
|
|
QEMU_CAPS_DEVICE_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_DMI_TO_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_IOH3420,
|
|
|
|
QEMU_CAPS_ICH9_AHCI,
|
|
|
|
QEMU_CAPS_ICH9_USB_EHCI1,
|
|
|
|
QEMU_CAPS_NEC_USB_XHCI,
|
|
|
|
QEMU_CAPS_DEVICE_VIDEO_PRIMARY);
|
|
|
|
DO_TEST("q35-default-devices-only",
|
|
|
|
QEMU_CAPS_VIRTIO_PCI_DISABLE_LEGACY,
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_RNG,
|
|
|
|
QEMU_CAPS_OBJECT_RNG_RANDOM,
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_NET,
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_GPU,
|
|
|
|
QEMU_CAPS_VIRTIO_GPU_VIRGL,
|
|
|
|
QEMU_CAPS_VIRTIO_KEYBOARD,
|
qemu: auto-add pcie-root-port/dmi-to-pci-bridge controllers as needed
Previously libvirt would only add pci-bridge devices automatically
when an address was requested for a device that required a legacy PCI
slot and none was available. This patch expands that support to
dmi-to-pci-bridge (which is needed in order to add a pci-bridge on a
machine with a pcie-root), and pcie-root-port (which is needed to add
a hotpluggable PCIe device). It does *not* automatically add
pcie-switch-upstream-ports or pcie-switch-downstream-ports (and
currently there are no plans for that).
Given the existing code to auto-add pci-bridge devices, automatically
adding pcie-root-ports is fairly straightforward. The
dmi-to-pci-bridge support is a bit tricky though, for a few reasons:
1) Although the only reason to add a dmi-to-pci-bridge is so that
there is a reasonable place to plug in a pci-bridge controller,
most of the time it's not the presence of a pci-bridge *in the
config* that triggers the requirement to add a dmi-to-pci-bridge.
Rather, it is the presence of a legacy-PCI device in the config,
which triggers auto-add of a pci-bridge, which triggers auto-add of
a dmi-to-pci-bridge (this is handled in
virDomainPCIAddressSetGrow() - if there's a request to add a
pci-bridge we'll check if there is a suitable bus to plug it into;
if not, we first add a dmi-to-pci-bridge).
2) Once there is already a single dmi-to-pci-bridge on the system,
there won't be a need for any more, even if it's full, as long as
there is a pci-bridge with an open slot - you can also plug
pci-bridges into existing pci-bridges. So we have to make sure we
don't add a dmi-to-pci-bridge unless there aren't any
dmi-to-pci-bridges *or* any pci-bridges.
3) Although it is strongly discouraged, it is legal for a pci-bridge
to be directly plugged into pcie-root, and we don't want to
auto-add a dmi-to-pci-bridge if there is already a pci-bridge
that's been forced directly into pcie-root.
Although libvirt will now automatically create a dmi-to-pci-bridge
when it's needed, the code still remains for now that forces a
dmi-to-pci-bridge on all domains with pcie-root (in
qemuDomainDefAddDefaultDevices()). That will be removed in a future
patch.
For now, the pcie-root-ports are added one to a slot, which is a bit
wasteful and means it will fail after 31 total PCIe devices (30 if
there are also some PCI devices), but helps keep the changeset down
for this patch. A future patch will have 8 pcie-root-ports sharing the
functions on a single slot.
2016-09-19 18:38:47 +00:00
|
|
|
QEMU_CAPS_VIRTIO_MOUSE,
|
|
|
|
QEMU_CAPS_VIRTIO_TABLET,
|
|
|
|
QEMU_CAPS_VIRTIO_INPUT_HOST,
|
|
|
|
QEMU_CAPS_VIRTIO_SCSI,
|
|
|
|
QEMU_CAPS_DEVICE_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_DMI_TO_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_IOH3420,
|
|
|
|
QEMU_CAPS_ICH9_AHCI,
|
|
|
|
QEMU_CAPS_ICH9_USB_EHCI1,
|
|
|
|
QEMU_CAPS_NEC_USB_XHCI,
|
2017-01-10 05:20:11 +00:00
|
|
|
QEMU_CAPS_DEVICE_VIDEO_PRIMARY);
|
|
|
|
DO_TEST("q35-multifunction",
|
|
|
|
QEMU_CAPS_VIRTIO_PCI_DISABLE_LEGACY,
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_RNG,
|
|
|
|
QEMU_CAPS_OBJECT_RNG_RANDOM,
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_NET,
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_GPU,
|
|
|
|
QEMU_CAPS_VIRTIO_GPU_VIRGL,
|
|
|
|
QEMU_CAPS_VIRTIO_KEYBOARD,
|
|
|
|
QEMU_CAPS_VIRTIO_MOUSE,
|
|
|
|
QEMU_CAPS_VIRTIO_TABLET,
|
|
|
|
QEMU_CAPS_VIRTIO_INPUT_HOST,
|
|
|
|
QEMU_CAPS_VIRTIO_SCSI,
|
|
|
|
QEMU_CAPS_DEVICE_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_DMI_TO_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_IOH3420,
|
|
|
|
QEMU_CAPS_ICH9_AHCI,
|
|
|
|
QEMU_CAPS_ICH9_USB_EHCI1,
|
|
|
|
QEMU_CAPS_NEC_USB_XHCI,
|
qemu: auto-add pcie-root-port/dmi-to-pci-bridge controllers as needed
Previously libvirt would only add pci-bridge devices automatically
when an address was requested for a device that required a legacy PCI
slot and none was available. This patch expands that support to
dmi-to-pci-bridge (which is needed in order to add a pci-bridge on a
machine with a pcie-root), and pcie-root-port (which is needed to add
a hotpluggable PCIe device). It does *not* automatically add
pcie-switch-upstream-ports or pcie-switch-downstream-ports (and
currently there are no plans for that).
Given the existing code to auto-add pci-bridge devices, automatically
adding pcie-root-ports is fairly straightforward. The
dmi-to-pci-bridge support is a bit tricky though, for a few reasons:
1) Although the only reason to add a dmi-to-pci-bridge is so that
there is a reasonable place to plug in a pci-bridge controller,
most of the time it's not the presence of a pci-bridge *in the
config* that triggers the requirement to add a dmi-to-pci-bridge.
Rather, it is the presence of a legacy-PCI device in the config,
which triggers auto-add of a pci-bridge, which triggers auto-add of
a dmi-to-pci-bridge (this is handled in
virDomainPCIAddressSetGrow() - if there's a request to add a
pci-bridge we'll check if there is a suitable bus to plug it into;
if not, we first add a dmi-to-pci-bridge).
2) Once there is already a single dmi-to-pci-bridge on the system,
there won't be a need for any more, even if it's full, as long as
there is a pci-bridge with an open slot - you can also plug
pci-bridges into existing pci-bridges. So we have to make sure we
don't add a dmi-to-pci-bridge unless there aren't any
dmi-to-pci-bridges *or* any pci-bridges.
3) Although it is strongly discouraged, it is legal for a pci-bridge
to be directly plugged into pcie-root, and we don't want to
auto-add a dmi-to-pci-bridge if there is already a pci-bridge
that's been forced directly into pcie-root.
Although libvirt will now automatically create a dmi-to-pci-bridge
when it's needed, the code still remains for now that forces a
dmi-to-pci-bridge on all domains with pcie-root (in
qemuDomainDefAddDefaultDevices()). That will be removed in a future
patch.
For now, the pcie-root-ports are added one to a slot, which is a bit
wasteful and means it will fail after 31 total PCIe devices (30 if
there are also some PCI devices), but helps keep the changeset down
for this patch. A future patch will have 8 pcie-root-ports sharing the
functions on a single slot.
2016-09-19 18:38:47 +00:00
|
|
|
QEMU_CAPS_DEVICE_VIDEO_PRIMARY);
|
2016-09-20 17:12:55 +00:00
|
|
|
DO_TEST("q35-virt-manager-basic",
|
2017-02-23 17:47:36 +00:00
|
|
|
QEMU_CAPS_KVM,
|
|
|
|
QEMU_CAPS_ICH9_DISABLE_S3,
|
|
|
|
QEMU_CAPS_ICH9_DISABLE_S4,
|
2016-09-20 17:12:55 +00:00
|
|
|
QEMU_CAPS_VIRTIO_PCI_DISABLE_LEGACY,
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_RNG,
|
|
|
|
QEMU_CAPS_OBJECT_RNG_RANDOM,
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_NET,
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_GPU,
|
|
|
|
QEMU_CAPS_VIRTIO_GPU_VIRGL,
|
|
|
|
QEMU_CAPS_VIRTIO_KEYBOARD,
|
|
|
|
QEMU_CAPS_VIRTIO_MOUSE,
|
|
|
|
QEMU_CAPS_VIRTIO_TABLET,
|
|
|
|
QEMU_CAPS_VIRTIO_INPUT_HOST,
|
|
|
|
QEMU_CAPS_VIRTIO_SCSI,
|
|
|
|
QEMU_CAPS_DEVICE_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_DMI_TO_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_IOH3420,
|
|
|
|
QEMU_CAPS_ICH9_AHCI,
|
|
|
|
QEMU_CAPS_ICH9_USB_EHCI1,
|
|
|
|
QEMU_CAPS_NEC_USB_XHCI,
|
|
|
|
QEMU_CAPS_DEVICE_ICH9_INTEL_HDA,
|
2017-02-23 17:47:36 +00:00
|
|
|
QEMU_CAPS_DEVICE_VIDEO_PRIMARY,
|
|
|
|
QEMU_CAPS_SPICE,
|
|
|
|
QEMU_CAPS_DEVICE_QXL,
|
|
|
|
QEMU_CAPS_HDA_DUPLEX,
|
2019-12-09 23:15:08 +00:00
|
|
|
QEMU_CAPS_USB_REDIR,
|
|
|
|
QEMU_CAPS_MACHINE_VMPORT_OPT);
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("pcie-root",
|
2017-02-23 17:47:36 +00:00
|
|
|
QEMU_CAPS_DEVICE_IOH3420,
|
|
|
|
QEMU_CAPS_ICH9_AHCI,
|
2016-10-11 15:46:39 +00:00
|
|
|
QEMU_CAPS_DEVICE_VIDEO_PRIMARY,
|
2016-10-11 15:42:37 +00:00
|
|
|
QEMU_CAPS_DEVICE_QXL);
|
2017-03-16 16:41:21 +00:00
|
|
|
|
|
|
|
/* Test automatic and manual setting of pcie-root-port attributes */
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("pcie-root-port",
|
2017-02-23 17:47:36 +00:00
|
|
|
QEMU_CAPS_DEVICE_IOH3420,
|
|
|
|
QEMU_CAPS_ICH9_AHCI,
|
2016-10-11 15:46:39 +00:00
|
|
|
QEMU_CAPS_DEVICE_VIDEO_PRIMARY,
|
2016-10-11 15:42:37 +00:00
|
|
|
QEMU_CAPS_DEVICE_QXL);
|
2017-03-16 16:41:21 +00:00
|
|
|
|
|
|
|
/* Make sure the default model for PCIe Root Ports is picked correctly
|
|
|
|
* based on QEMU binary capabilities. We use x86/q35 for the test, but
|
|
|
|
* any PCIe machine type (such as aarch64/virt) will behave the same */
|
|
|
|
DO_TEST("pcie-root-port-model-generic",
|
|
|
|
QEMU_CAPS_DEVICE_PCIE_ROOT_PORT,
|
2018-03-28 21:20:45 +00:00
|
|
|
QEMU_CAPS_DEVICE_IOH3420);
|
2017-03-16 16:41:21 +00:00
|
|
|
DO_TEST("pcie-root-port-model-ioh3420",
|
2018-03-28 21:20:45 +00:00
|
|
|
QEMU_CAPS_DEVICE_IOH3420);
|
2020-03-03 17:23:52 +00:00
|
|
|
DO_TEST_CAPS_LATEST("pcie-root-port-nohotplug");
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("pcie-switch-upstream-port",
|
2017-02-23 17:47:36 +00:00
|
|
|
QEMU_CAPS_DEVICE_IOH3420,
|
|
|
|
QEMU_CAPS_DEVICE_X3130_UPSTREAM,
|
|
|
|
QEMU_CAPS_ICH9_AHCI,
|
2016-10-11 15:46:39 +00:00
|
|
|
QEMU_CAPS_DEVICE_VIDEO_PRIMARY,
|
2016-10-11 15:42:37 +00:00
|
|
|
QEMU_CAPS_DEVICE_QXL);
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("pcie-switch-downstream-port",
|
2017-02-23 17:47:36 +00:00
|
|
|
QEMU_CAPS_DEVICE_IOH3420,
|
|
|
|
QEMU_CAPS_DEVICE_X3130_UPSTREAM,
|
|
|
|
QEMU_CAPS_DEVICE_XIO3130_DOWNSTREAM,
|
|
|
|
QEMU_CAPS_ICH9_AHCI,
|
2016-10-11 15:46:39 +00:00
|
|
|
QEMU_CAPS_DEVICE_VIDEO_PRIMARY,
|
2016-10-11 15:42:37 +00:00
|
|
|
QEMU_CAPS_DEVICE_QXL);
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("pci-expander-bus",
|
2017-02-23 17:47:36 +00:00
|
|
|
QEMU_CAPS_DEVICE_PXB);
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("pcie-expander-bus",
|
2017-02-23 17:47:36 +00:00
|
|
|
QEMU_CAPS_DEVICE_IOH3420,
|
|
|
|
QEMU_CAPS_DEVICE_X3130_UPSTREAM,
|
|
|
|
QEMU_CAPS_DEVICE_XIO3130_DOWNSTREAM,
|
|
|
|
QEMU_CAPS_DEVICE_PXB_PCIE);
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("autoindex",
|
2017-02-23 17:47:36 +00:00
|
|
|
QEMU_CAPS_DEVICE_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_DMI_TO_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_IOH3420,
|
|
|
|
QEMU_CAPS_DEVICE_X3130_UPSTREAM,
|
|
|
|
QEMU_CAPS_DEVICE_XIO3130_DOWNSTREAM,
|
|
|
|
QEMU_CAPS_ICH9_AHCI,
|
|
|
|
QEMU_CAPS_ICH9_USB_EHCI1,
|
2016-07-29 13:27:03 +00:00
|
|
|
QEMU_CAPS_NEC_USB_XHCI);
|
2016-10-12 15:02:37 +00:00
|
|
|
/* Make sure the user can always override libvirt's default device
|
|
|
|
* placement policy by providing an explicit PCI address */
|
|
|
|
DO_TEST("q35-pci-force-address",
|
|
|
|
QEMU_CAPS_DEVICE_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_DMI_TO_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_IOH3420,
|
|
|
|
QEMU_CAPS_HDA_DUPLEX);
|
2016-07-29 13:27:03 +00:00
|
|
|
|
2016-11-22 03:58:20 +00:00
|
|
|
DO_TEST("hostdev-scsi-vhost-scsi-ccw",
|
|
|
|
QEMU_CAPS_VIRTIO_SCSI, QEMU_CAPS_DEVICE_VHOST_SCSI,
|
2018-09-18 10:29:10 +00:00
|
|
|
QEMU_CAPS_CCW);
|
2016-11-22 03:58:20 +00:00
|
|
|
DO_TEST("hostdev-scsi-vhost-scsi-pci",
|
2018-09-18 10:29:10 +00:00
|
|
|
QEMU_CAPS_VIRTIO_SCSI,
|
|
|
|
QEMU_CAPS_DEVICE_VHOST_SCSI);
|
qemu: assign correct type of PCI address for vhost-scsi when using pcie-root
Commit 10c73bf1 fixed a bug that I had introduced back in commit
70249927 - if a vhost-scsi device had no manually assigned PCI
address, one wouldn't be assigned automatically. There was a slight
problem with the logic of the fix though - in the case of domains with
pcie-root (e.g. those with a q35 machinetype),
qemuDomainDeviceCalculatePCIConnectFlags() will attempt to determine
if the host-side PCI device is Express or legacy by examining sysfs
based on the host-side PCI address stored in
hostdev->source.subsys.u.pci.addr, but that part of the union is only
valid for PCI hostdevs, *not* for SCSI hostdevs. So we end up trying
to read sysfs for some probably-non-existent device, which fails, and
the function virPCIDeviceIsPCIExpress() returns failure (-1).
By coincidence, the return value is being examined as a boolean, and
since -1 is true, we still end up assigning the vhost-scsi device to
an Express slot, but that is just by chance (and could fail in the
case that the gibberish in the "hostside PCI address" was the address
of a real device that happened to be legacy PCI).
Since (according to Paolo Bonzini) vhost-scsi devices appear just like
virtio-scsi devices in the guest, they should follow the same rules as
virtio devices when deciding whether they should be placed in an
Express or a legacy slot. That's accomplished in this patch by
returning early with virtioFlags, rather than erroneously using
hostdev->source.subsys.u.pci.addr. It also adds a test case for PCIe
to assure it doesn't get broken in the future.
2017-12-15 16:42:35 +00:00
|
|
|
DO_TEST("hostdev-scsi-vhost-scsi-pcie",
|
|
|
|
QEMU_CAPS_KVM,
|
|
|
|
QEMU_CAPS_VIRTIO_SCSI, QEMU_CAPS_DEVICE_VHOST_SCSI,
|
|
|
|
QEMU_CAPS_DEVICE_PCIE_ROOT_PORT,
|
|
|
|
QEMU_CAPS_VIRTIO_PCI_DISABLE_LEGACY);
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("hostdev-scsi-lsi",
|
2018-09-18 10:29:10 +00:00
|
|
|
QEMU_CAPS_VIRTIO_SCSI,
|
|
|
|
QEMU_CAPS_SCSI_LSI);
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("hostdev-scsi-virtio-scsi",
|
2018-09-18 10:29:10 +00:00
|
|
|
QEMU_CAPS_VIRTIO_SCSI,
|
|
|
|
QEMU_CAPS_SCSI_LSI);
|
2016-07-29 13:27:03 +00:00
|
|
|
|
|
|
|
DO_TEST("hostdev-scsi-shareable",
|
2018-09-18 10:29:10 +00:00
|
|
|
QEMU_CAPS_VIRTIO_SCSI,
|
|
|
|
QEMU_CAPS_SCSI_LSI);
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("hostdev-scsi-sgio",
|
2018-09-18 10:29:10 +00:00
|
|
|
QEMU_CAPS_VIRTIO_SCSI,
|
|
|
|
QEMU_CAPS_SCSI_LSI);
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("hostdev-scsi-rawio",
|
2018-09-18 10:29:10 +00:00
|
|
|
QEMU_CAPS_VIRTIO_SCSI,
|
|
|
|
QEMU_CAPS_SCSI_LSI);
|
2016-07-29 13:27:03 +00:00
|
|
|
|
|
|
|
DO_TEST("hostdev-scsi-autogen-address",
|
2018-09-18 10:29:10 +00:00
|
|
|
QEMU_CAPS_VIRTIO_SCSI,
|
|
|
|
QEMU_CAPS_SCSI_LSI);
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("hostdev-scsi-large-unit",
|
2018-09-18 10:29:10 +00:00
|
|
|
QEMU_CAPS_VIRTIO_SCSI,
|
|
|
|
QEMU_CAPS_SCSI_LSI);
|
2016-07-29 13:27:03 +00:00
|
|
|
|
2018-05-07 14:41:14 +00:00
|
|
|
DO_TEST("hostdev-subsys-mdev-vfio-ccw",
|
|
|
|
QEMU_CAPS_CCW,
|
|
|
|
QEMU_CAPS_CCW_CSSID_UNRESTRICTED,
|
|
|
|
QEMU_CAPS_DEVICE_VFIO_CCW);
|
2019-08-27 14:19:23 +00:00
|
|
|
DO_TEST_CAPS_ARCH_LATEST("hostdev-subsys-mdev-vfio-ccw-boot",
|
|
|
|
"s390x");
|
2019-08-27 14:19:18 +00:00
|
|
|
DO_TEST("hostdev-subsys-mdev-vfio-ap",
|
|
|
|
QEMU_CAPS_CCW,
|
|
|
|
QEMU_CAPS_CCW_CSSID_UNRESTRICTED,
|
|
|
|
QEMU_CAPS_DEVICE_VFIO_AP);
|
2018-05-07 14:41:14 +00:00
|
|
|
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("s390-defaultconsole",
|
2018-05-07 14:41:11 +00:00
|
|
|
QEMU_CAPS_CCW, QEMU_CAPS_VIRTIO_S390);
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("s390-panic",
|
2018-05-07 14:41:11 +00:00
|
|
|
QEMU_CAPS_CCW, QEMU_CAPS_VIRTIO_S390);
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("s390-panic-missing",
|
2018-05-07 14:41:11 +00:00
|
|
|
QEMU_CAPS_CCW, QEMU_CAPS_VIRTIO_S390);
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("s390-panic-no-address",
|
2018-05-07 14:41:11 +00:00
|
|
|
QEMU_CAPS_CCW, QEMU_CAPS_VIRTIO_S390);
|
2017-11-14 15:27:04 +00:00
|
|
|
DO_TEST("s390-serial",
|
2018-05-07 14:41:11 +00:00
|
|
|
QEMU_CAPS_CCW, QEMU_CAPS_VIRTIO_S390);
|
2017-11-14 15:27:04 +00:00
|
|
|
DO_TEST("s390-serial-2",
|
2018-05-07 14:41:11 +00:00
|
|
|
QEMU_CAPS_CCW, QEMU_CAPS_VIRTIO_S390);
|
2017-11-14 15:27:04 +00:00
|
|
|
DO_TEST("s390-serial-console",
|
2018-05-07 14:41:11 +00:00
|
|
|
QEMU_CAPS_CCW, QEMU_CAPS_VIRTIO_S390);
|
2013-06-17 14:17:36 +00:00
|
|
|
|
2019-12-09 23:15:24 +00:00
|
|
|
DO_TEST("pcihole64", QEMU_CAPS_I440FX_PCI_HOLE64_SIZE);
|
|
|
|
DO_TEST("pcihole64-gib", QEMU_CAPS_I440FX_PCI_HOLE64_SIZE);
|
|
|
|
DO_TEST("pcihole64-none", QEMU_CAPS_I440FX_PCI_HOLE64_SIZE);
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("pcihole64-q35",
|
qemu: initially reserve one open pcie-root-port for hotplug
For machinetypes with a pci-root bus (all legacy PCI), libvirt will
make a "fake" reservation for one extra slot prior to assigning
addresses to unaddressed PCI endpoint devices in the domain. This will
trigger auto-adding of a pci-bridge for the final device to be
assigned an address *if that device would have otherwise instead been
the last device on the last available pci-bridge*; thus it assures
that there will always be at least one slot left open in the domain's
bus topology for expansion (which is important both for hotplug (since
a new pci-bridge can't be added while the guest is running) as well as
for offline additions to the config (since adding a new device might
otherwise in some cases require re-addressing existing devices, which
we want to avoid)).
It's important to note that for the above case (legacy PCI), we must
check for the special case of all slots on all buses being occupied
*prior to assigning any addresses*, and avoid attempting to reserve
the extra address in that case, because there is no free address in
the existing topology, so no place to auto-add a pci-bridge for
expansion (i.e. it would always fail anyway). Since that condition can
only be reached by manual intervention, this is acceptable.
For machinetypes with pcie-root (Q35, aarch64 virt), libvirt's
methodology for automatically expanding the bus topology is different
- pcie-root-ports are plugged into slots (soon to be functions) of
pcie-root as needed, and the new endpoint devices are assigned to the
single slot in each pcie-root-port. This is done so that the devices
are, by default, hotpluggable (the slots of pcie-root don't support
hotplug, but the single slot of the pcie-root-port does). Since
pcie-root-ports can only be plugged into pcie-root, and we don't
auto-assign endpoint devices to the pcie-root slots, this means
topology expansion doesn't compete with endpoint devices for slots, so
we don't need to worry about checking for all "useful" slots being
free *prior* to assigning addresses to new endpoint devices - as a
matter of fact, if we attempt to reserve the open slots before the
used slots, it can lead to errors.
Instead this patch just reserves one slot for a "future potential"
PCIe device after doing the assignment for actual devices, but only
if the only PCI controller defined prior to starting address
assignment was pcie-root, and only if we auto-added at least one PCI
controller during address assignment. This assures two things:
1) that reserving the open slots will only be done when the domain is
initially defined, never at any time after, and
2) that if the user understands enough about PCI controllers that they
are adding them manually, that we don't mess up their plan by
adding extras - if they know enough to add one pcie-root-port, or
to manually assign addresses such that no pcie-root-ports are
needed, they know enough to add extra pcie-root-ports if they want
them (this could be called the "libguestfs clause", since
libguestfs needs to be able to create domains with as few
devices/controllers as possible).
This is set to reserve a single free port for now, but could be
increased in the future if public sentiment goes in that direction
(it's easy to increase later, but essentially impossible to decrease)
2016-09-28 00:37:30 +00:00
|
|
|
QEMU_CAPS_DEVICE_IOH3420,
|
2017-02-23 17:47:36 +00:00
|
|
|
QEMU_CAPS_ICH9_AHCI,
|
|
|
|
QEMU_CAPS_DEVICE_VIDEO_PRIMARY,
|
2016-10-11 15:42:37 +00:00
|
|
|
QEMU_CAPS_DEVICE_QXL,
|
2016-07-29 13:27:03 +00:00
|
|
|
QEMU_CAPS_Q35_PCI_HOLE64_SIZE);
|
2013-08-12 11:39:04 +00:00
|
|
|
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("panic", NONE);
|
|
|
|
DO_TEST("panic-isa", NONE);
|
2018-02-21 09:18:19 +00:00
|
|
|
DO_TEST("panic-pseries",
|
|
|
|
QEMU_CAPS_DEVICE_SPAPR_PCI_HOST_BRIDGE);
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("panic-double", NONE);
|
|
|
|
DO_TEST("panic-no-address", NONE);
|
2013-12-09 09:11:15 +00:00
|
|
|
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("disk-backing-chains", NONE);
|
2018-06-19 11:16:54 +00:00
|
|
|
DO_TEST("disk-backing-chains-index", NONE);
|
|
|
|
DO_TEST("disk-backing-chains-noindex", NONE);
|
2014-04-17 13:37:51 +00:00
|
|
|
|
2020-03-25 15:18:50 +00:00
|
|
|
DO_TEST_CAPS_LATEST("disk-network-http");
|
|
|
|
|
2019-01-22 19:02:27 +00:00
|
|
|
DO_TEST("chardev-label",
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_RNG);
|
2014-05-16 12:31:28 +00:00
|
|
|
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("cpu-numa1", NONE);
|
|
|
|
DO_TEST("cpu-numa2", NONE);
|
|
|
|
DO_TEST("cpu-numa-no-memory-element", NONE);
|
|
|
|
DO_TEST("cpu-numa-disordered", NONE);
|
2019-12-09 23:15:12 +00:00
|
|
|
DO_TEST("cpu-numa-disjoint", QEMU_CAPS_NUMA);
|
|
|
|
DO_TEST("cpu-numa-memshared", QEMU_CAPS_OBJECT_MEMORY_FILE);
|
2014-05-22 07:13:05 +00:00
|
|
|
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("numatune-auto-prefer", NONE);
|
2019-12-09 23:15:12 +00:00
|
|
|
DO_TEST("numatune-memnode", QEMU_CAPS_NUMA, QEMU_CAPS_OBJECT_MEMORY_FILE);
|
|
|
|
DO_TEST("numatune-memnode-no-memory", QEMU_CAPS_OBJECT_MEMORY_FILE);
|
2020-05-27 12:24:56 +00:00
|
|
|
DO_TEST("numatune-distances", QEMU_CAPS_NUMA, QEMU_CAPS_NUMA_DIST);
|
2020-05-27 11:42:22 +00:00
|
|
|
DO_TEST("numatune-no-vcpu", QEMU_CAPS_NUMA);
|
2020-07-08 09:28:37 +00:00
|
|
|
DO_TEST("numatune-hmat", QEMU_CAPS_NUMA_HMAT);
|
2014-06-09 13:00:22 +00:00
|
|
|
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("bios-nvram", NONE);
|
|
|
|
DO_TEST("bios-nvram-os-interleave", NONE);
|
2014-08-06 11:18:53 +00:00
|
|
|
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("tap-vhost", NONE);
|
|
|
|
DO_TEST("tap-vhost-incorrect", NONE);
|
|
|
|
DO_TEST("shmem", NONE);
|
2016-08-19 12:58:35 +00:00
|
|
|
DO_TEST("shmem-plain-doorbell", NONE);
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("smbios", NONE);
|
|
|
|
DO_TEST("smbios-multiple-type2", NONE);
|
2020-06-04 12:15:40 +00:00
|
|
|
DO_TEST("smbios-type-fwcfg", NONE);
|
2014-09-11 15:11:28 +00:00
|
|
|
|
2019-04-15 22:51:11 +00:00
|
|
|
DO_TEST_CAPS_LATEST("os-firmware-bios");
|
|
|
|
DO_TEST_CAPS_LATEST("os-firmware-efi");
|
|
|
|
DO_TEST_CAPS_LATEST("os-firmware-efi-secboot");
|
2019-02-25 13:15:28 +00:00
|
|
|
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("aarch64-aavmf-virtio-mmio",
|
2016-01-27 22:47:14 +00:00
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_MMIO,
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_RNG, QEMU_CAPS_OBJECT_RNG_RANDOM);
|
2019-04-15 22:53:55 +00:00
|
|
|
DO_TEST_CAPS_ARCH_LATEST("aarch64-os-firmware-efi", "aarch64");
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("aarch64-virtio-pci-default",
|
2016-10-21 09:50:15 +00:00
|
|
|
QEMU_CAPS_VIRTIO_PCI_DISABLE_LEGACY,
|
2016-01-27 22:47:14 +00:00
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_MMIO,
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_RNG, QEMU_CAPS_OBJECT_RNG_RANDOM,
|
|
|
|
QEMU_CAPS_OBJECT_GPEX, QEMU_CAPS_DEVICE_PCI_BRIDGE,
|
qemu: initially reserve one open pcie-root-port for hotplug
For machinetypes with a pci-root bus (all legacy PCI), libvirt will
make a "fake" reservation for one extra slot prior to assigning
addresses to unaddressed PCI endpoint devices in the domain. This will
trigger auto-adding of a pci-bridge for the final device to be
assigned an address *if that device would have otherwise instead been
the last device on the last available pci-bridge*; thus it assures
that there will always be at least one slot left open in the domain's
bus topology for expansion (which is important both for hotplug (since
a new pci-bridge can't be added while the guest is running) as well as
for offline additions to the config (since adding a new device might
otherwise in some cases require re-addressing existing devices, which
we want to avoid)).
It's important to note that for the above case (legacy PCI), we must
check for the special case of all slots on all buses being occupied
*prior to assigning any addresses*, and avoid attempting to reserve
the extra address in that case, because there is no free address in
the existing topology, so no place to auto-add a pci-bridge for
expansion (i.e. it would always fail anyway). Since that condition can
only be reached by manual intervention, this is acceptable.
For machinetypes with pcie-root (Q35, aarch64 virt), libvirt's
methodology for automatically expanding the bus topology is different
- pcie-root-ports are plugged into slots (soon to be functions) of
pcie-root as needed, and the new endpoint devices are assigned to the
single slot in each pcie-root-port. This is done so that the devices
are, by default, hotpluggable (the slots of pcie-root don't support
hotplug, but the single slot of the pcie-root-port does). Since
pcie-root-ports can only be plugged into pcie-root, and we don't
auto-assign endpoint devices to the pcie-root slots, this means
topology expansion doesn't compete with endpoint devices for slots, so
we don't need to worry about checking for all "useful" slots being
free *prior* to assigning addresses to new endpoint devices - as a
matter of fact, if we attempt to reserve the open slots before the
used slots, it can lead to errors.
Instead this patch just reserves one slot for a "future potential"
PCIe device after doing the assignment for actual devices, but only
if the only PCI controller defined prior to starting address
assignment was pcie-root, and only if we auto-added at least one PCI
controller during address assignment. This assures two things:
1) that reserving the open slots will only be done when the domain is
initially defined, never at any time after, and
2) that if the user understands enough about PCI controllers that they
are adding them manually, that we don't mess up their plan by
adding extras - if they know enough to add one pcie-root-port, or
to manually assign addresses such that no pcie-root-ports are
needed, they know enough to add extra pcie-root-ports if they want
them (this could be called the "libguestfs clause", since
libguestfs needs to be able to create domains with as few
devices/controllers as possible).
This is set to reserve a single free port for now, but could be
increased in the future if public sentiment goes in that direction
(it's easy to increase later, but essentially impossible to decrease)
2016-09-28 00:37:30 +00:00
|
|
|
QEMU_CAPS_DEVICE_DMI_TO_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_IOH3420,
|
|
|
|
QEMU_CAPS_VIRTIO_SCSI);
|
2016-07-29 13:27:03 +00:00
|
|
|
DO_TEST("aarch64-virtio-pci-manual-addresses",
|
2016-01-27 22:47:14 +00:00
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_MMIO,
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_RNG, QEMU_CAPS_OBJECT_RNG_RANDOM,
|
|
|
|
QEMU_CAPS_OBJECT_GPEX, QEMU_CAPS_DEVICE_PCI_BRIDGE,
|
qemu: initially reserve one open pcie-root-port for hotplug
For machinetypes with a pci-root bus (all legacy PCI), libvirt will
make a "fake" reservation for one extra slot prior to assigning
addresses to unaddressed PCI endpoint devices in the domain. This will
trigger auto-adding of a pci-bridge for the final device to be
assigned an address *if that device would have otherwise instead been
the last device on the last available pci-bridge*; thus it assures
that there will always be at least one slot left open in the domain's
bus topology for expansion (which is important both for hotplug (since
a new pci-bridge can't be added while the guest is running) as well as
for offline additions to the config (since adding a new device might
otherwise in some cases require re-addressing existing devices, which
we want to avoid)).
It's important to note that for the above case (legacy PCI), we must
check for the special case of all slots on all buses being occupied
*prior to assigning any addresses*, and avoid attempting to reserve
the extra address in that case, because there is no free address in
the existing topology, so no place to auto-add a pci-bridge for
expansion (i.e. it would always fail anyway). Since that condition can
only be reached by manual intervention, this is acceptable.
For machinetypes with pcie-root (Q35, aarch64 virt), libvirt's
methodology for automatically expanding the bus topology is different
- pcie-root-ports are plugged into slots (soon to be functions) of
pcie-root as needed, and the new endpoint devices are assigned to the
single slot in each pcie-root-port. This is done so that the devices
are, by default, hotpluggable (the slots of pcie-root don't support
hotplug, but the single slot of the pcie-root-port does). Since
pcie-root-ports can only be plugged into pcie-root, and we don't
auto-assign endpoint devices to the pcie-root slots, this means
topology expansion doesn't compete with endpoint devices for slots, so
we don't need to worry about checking for all "useful" slots being
free *prior* to assigning addresses to new endpoint devices - as a
matter of fact, if we attempt to reserve the open slots before the
used slots, it can lead to errors.
Instead this patch just reserves one slot for a "future potential"
PCIe device after doing the assignment for actual devices, but only
if the only PCI controller defined prior to starting address
assignment was pcie-root, and only if we auto-added at least one PCI
controller during address assignment. This assures two things:
1) that reserving the open slots will only be done when the domain is
initially defined, never at any time after, and
2) that if the user understands enough about PCI controllers that they
are adding them manually, that we don't mess up their plan by
adding extras - if they know enough to add one pcie-root-port, or
to manually assign addresses such that no pcie-root-ports are
needed, they know enough to add extra pcie-root-ports if they want
them (this could be called the "libguestfs clause", since
libguestfs needs to be able to create domains with as few
devices/controllers as possible).
This is set to reserve a single free port for now, but could be
increased in the future if public sentiment goes in that direction
(it's easy to increase later, but essentially impossible to decrease)
2016-09-28 00:37:30 +00:00
|
|
|
QEMU_CAPS_DEVICE_DMI_TO_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_IOH3420,
|
|
|
|
QEMU_CAPS_VIRTIO_SCSI);
|
qemu: map "virtio" video model to "virt" machtype correctly (arm/aarch64)
Most of QEMU's PCI display device models, such as:
libvirt video/model/@type QEMU -device
------------------------- ------------
cirrus cirrus-vga
vga VGA
qxl qxl-vga
virtio virtio-vga
come with a linear framebuffer (sometimes called "VGA compatibility
framebuffer"). This linear framebuffer lives in one of the PCI device's
MMIO BARs, and allows guest code (primarily: firmware drivers, and
non-accelerated OS drivers) to display graphics with direct memory access.
Due to architectural reasons on aarch64/KVM hosts, this kind of
framebuffer doesn't / can't work in
qemu-system-(arm|aarch64) -M virt
machines. Cache coherency issues guarantee a corrupted / unusable display.
The problem has been researched by several people, including kvm-arm
maintainers, and it's been decided that the best way (practically the only
way) to have boot time graphics for such guests is to consolidate on
QEMU's "virtio-gpu-pci" device.
>From <https://bugzilla.redhat.com/show_bug.cgi?id=1195176>, libvirt
supports
<devices>
<video>
<model type='virtio'/>
</video>
</devices>
but libvirt unconditionally maps @type='virtio' to QEMU's "virtio-vga"
device model. (See the qemuBuildDeviceVideoStr() function and the
"qemuDeviceVideo" enum impl.)
According to the above, this is not right for the "virt" machine type; the
qemu-system-(arm|aarch64) binaries don't even recognize the "virtio-vga"
device model (justifiedly). Whereas "virtio-gpu-pci", which is a pure
virtio device without a compatibility framebuffer, is available, and works
fine.
(The ArmVirtQemu ("AAVMF") platform of edk2 -- that is, the UEFI firmware
for "virt" -- supports "virtio-gpu-pci", as of upstream commit
3ef3209d3028. See
<https://tianocore.acgmultimedia.com/show_bug.cgi?id=66>.)
Override the default mapping of "virtio", from "virtio-vga" to
"virtio-gpu-pci", if qemuDomainMachineIsVirt() evaluates to true.
Cc: Andrea Bolognani <abologna@redhat.com>
Cc: Drew Jones <drjones@redhat.com>
Cc: Marc-André Lureau <marcandre.lureau@redhat.com>
Cc: Martin Kletzander <mkletzan@redhat.com>
Suggested-by: Marc-André Lureau <marcandre.lureau@redhat.com>
Resolves: https://bugzilla.redhat.com/show_bug.cgi?id=1372901
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Acked-by: Martin Kletzander <mkletzan@redhat.com>
2016-09-16 07:30:23 +00:00
|
|
|
DO_TEST("aarch64-video-virtio-gpu-pci",
|
2018-03-29 10:51:55 +00:00
|
|
|
QEMU_CAPS_OBJECT_GPEX,
|
qemu: map "virtio" video model to "virt" machtype correctly (arm/aarch64)
Most of QEMU's PCI display device models, such as:
libvirt video/model/@type QEMU -device
------------------------- ------------
cirrus cirrus-vga
vga VGA
qxl qxl-vga
virtio virtio-vga
come with a linear framebuffer (sometimes called "VGA compatibility
framebuffer"). This linear framebuffer lives in one of the PCI device's
MMIO BARs, and allows guest code (primarily: firmware drivers, and
non-accelerated OS drivers) to display graphics with direct memory access.
Due to architectural reasons on aarch64/KVM hosts, this kind of
framebuffer doesn't / can't work in
qemu-system-(arm|aarch64) -M virt
machines. Cache coherency issues guarantee a corrupted / unusable display.
The problem has been researched by several people, including kvm-arm
maintainers, and it's been decided that the best way (practically the only
way) to have boot time graphics for such guests is to consolidate on
QEMU's "virtio-gpu-pci" device.
>From <https://bugzilla.redhat.com/show_bug.cgi?id=1195176>, libvirt
supports
<devices>
<video>
<model type='virtio'/>
</video>
</devices>
but libvirt unconditionally maps @type='virtio' to QEMU's "virtio-vga"
device model. (See the qemuBuildDeviceVideoStr() function and the
"qemuDeviceVideo" enum impl.)
According to the above, this is not right for the "virt" machine type; the
qemu-system-(arm|aarch64) binaries don't even recognize the "virtio-vga"
device model (justifiedly). Whereas "virtio-gpu-pci", which is a pure
virtio device without a compatibility framebuffer, is available, and works
fine.
(The ArmVirtQemu ("AAVMF") platform of edk2 -- that is, the UEFI firmware
for "virt" -- supports "virtio-gpu-pci", as of upstream commit
3ef3209d3028. See
<https://tianocore.acgmultimedia.com/show_bug.cgi?id=66>.)
Override the default mapping of "virtio", from "virtio-vga" to
"virtio-gpu-pci", if qemuDomainMachineIsVirt() evaluates to true.
Cc: Andrea Bolognani <abologna@redhat.com>
Cc: Drew Jones <drjones@redhat.com>
Cc: Marc-André Lureau <marcandre.lureau@redhat.com>
Cc: Martin Kletzander <mkletzan@redhat.com>
Suggested-by: Marc-André Lureau <marcandre.lureau@redhat.com>
Resolves: https://bugzilla.redhat.com/show_bug.cgi?id=1372901
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Acked-by: Martin Kletzander <mkletzan@redhat.com>
2016-09-16 07:30:23 +00:00
|
|
|
QEMU_CAPS_DEVICE_PCI_BRIDGE, QEMU_CAPS_DEVICE_IOH3420,
|
2018-03-28 21:20:45 +00:00
|
|
|
QEMU_CAPS_DEVICE_VIDEO_PRIMARY,
|
2018-08-09 11:26:17 +00:00
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_GPU);
|
2017-06-26 16:10:49 +00:00
|
|
|
DO_TEST("aarch64-pci-serial",
|
|
|
|
QEMU_CAPS_DEVICE_PCI_SERIAL,
|
|
|
|
QEMU_CAPS_CHARDEV_LOGFILE,
|
|
|
|
QEMU_CAPS_OBJECT_GPEX,
|
|
|
|
QEMU_CAPS_DEVICE_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_DMI_TO_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_PCIE_ROOT_PORT);
|
2018-01-09 17:42:51 +00:00
|
|
|
DO_TEST("aarch64-traditional-pci",
|
|
|
|
QEMU_CAPS_OBJECT_GPEX,
|
|
|
|
QEMU_CAPS_DEVICE_PCIE_ROOT_PORT,
|
|
|
|
QEMU_CAPS_DEVICE_DMI_TO_PCI_BRIDGE,
|
2018-03-28 10:48:38 +00:00
|
|
|
QEMU_CAPS_DEVICE_PCIE_PCI_BRIDGE,
|
2018-01-09 17:42:51 +00:00
|
|
|
QEMU_CAPS_DEVICE_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_PCI_SERIAL);
|
2017-08-27 15:04:42 +00:00
|
|
|
DO_TEST("aarch64-video-default",
|
|
|
|
QEMU_CAPS_OBJECT_GPEX,
|
|
|
|
QEMU_CAPS_DEVICE_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_IOH3420,
|
|
|
|
QEMU_CAPS_DEVICE_VIDEO_PRIMARY,
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_GPU,
|
|
|
|
QEMU_CAPS_DEVICE_DMI_TO_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_VNC);
|
2016-02-03 13:35:41 +00:00
|
|
|
|
2019-03-31 19:28:55 +00:00
|
|
|
DO_TEST_FULL("aarch64-gic-none", WHEN_BOTH,
|
|
|
|
ARG_GIC, GIC_NONE,
|
|
|
|
ARG_QEMU_CAPS, NONE);
|
|
|
|
DO_TEST_FULL("aarch64-gic-none-v2", WHEN_BOTH,
|
|
|
|
ARG_GIC, GIC_V2,
|
|
|
|
ARG_QEMU_CAPS, NONE);
|
|
|
|
DO_TEST_FULL("aarch64-gic-none-v3", WHEN_BOTH,
|
|
|
|
ARG_GIC, GIC_V3,
|
|
|
|
ARG_QEMU_CAPS, NONE);
|
|
|
|
DO_TEST_FULL("aarch64-gic-none-both", WHEN_BOTH,
|
|
|
|
ARG_GIC, GIC_BOTH,
|
|
|
|
ARG_QEMU_CAPS, NONE);
|
|
|
|
DO_TEST_FULL("aarch64-gic-none-tcg", WHEN_BOTH,
|
|
|
|
ARG_GIC, GIC_BOTH,
|
|
|
|
ARG_QEMU_CAPS, NONE);
|
|
|
|
DO_TEST_FULL("aarch64-gic-default", WHEN_BOTH,
|
|
|
|
ARG_GIC, GIC_NONE,
|
|
|
|
ARG_QEMU_CAPS, NONE);
|
|
|
|
DO_TEST_FULL("aarch64-gic-default-v2", WHEN_BOTH,
|
|
|
|
ARG_GIC, GIC_V2,
|
|
|
|
ARG_QEMU_CAPS, NONE);
|
|
|
|
DO_TEST_FULL("aarch64-gic-default-v3", WHEN_BOTH,
|
|
|
|
ARG_GIC, GIC_V3,
|
|
|
|
ARG_QEMU_CAPS, NONE);
|
|
|
|
DO_TEST_FULL("aarch64-gic-default-both", WHEN_BOTH,
|
|
|
|
ARG_GIC, GIC_BOTH,
|
|
|
|
ARG_QEMU_CAPS, NONE);
|
|
|
|
DO_TEST_FULL("aarch64-gic-v2", WHEN_BOTH,
|
|
|
|
ARG_GIC, GIC_NONE,
|
|
|
|
ARG_QEMU_CAPS, NONE);
|
|
|
|
DO_TEST_FULL("aarch64-gic-v2", WHEN_BOTH,
|
|
|
|
ARG_GIC, GIC_V2,
|
|
|
|
ARG_QEMU_CAPS, NONE);
|
|
|
|
DO_TEST_FULL("aarch64-gic-v2", WHEN_BOTH,
|
|
|
|
ARG_GIC, GIC_V3,
|
|
|
|
ARG_QEMU_CAPS, NONE);
|
|
|
|
DO_TEST_FULL("aarch64-gic-v2", WHEN_BOTH,
|
|
|
|
ARG_GIC, GIC_BOTH,
|
|
|
|
ARG_QEMU_CAPS, NONE);
|
|
|
|
DO_TEST_FULL("aarch64-gic-v3", WHEN_BOTH,
|
|
|
|
ARG_GIC, GIC_NONE,
|
|
|
|
ARG_QEMU_CAPS, NONE);
|
|
|
|
DO_TEST_FULL("aarch64-gic-v3", WHEN_BOTH,
|
|
|
|
ARG_GIC, GIC_V2,
|
|
|
|
ARG_QEMU_CAPS, NONE);
|
|
|
|
DO_TEST_FULL("aarch64-gic-v3", WHEN_BOTH,
|
|
|
|
ARG_GIC, GIC_V3,
|
|
|
|
ARG_QEMU_CAPS, NONE);
|
|
|
|
DO_TEST_FULL("aarch64-gic-v3", WHEN_BOTH,
|
|
|
|
ARG_GIC, GIC_BOTH,
|
|
|
|
ARG_QEMU_CAPS, NONE);
|
|
|
|
DO_TEST_FULL("aarch64-gic-host", WHEN_BOTH,
|
|
|
|
ARG_GIC, GIC_NONE,
|
|
|
|
ARG_QEMU_CAPS, NONE);
|
|
|
|
DO_TEST_FULL("aarch64-gic-host", WHEN_BOTH,
|
|
|
|
ARG_GIC, GIC_V2,
|
|
|
|
ARG_QEMU_CAPS, NONE);
|
|
|
|
DO_TEST_FULL("aarch64-gic-host", WHEN_BOTH,
|
|
|
|
ARG_GIC, GIC_V3,
|
|
|
|
ARG_QEMU_CAPS, NONE);
|
|
|
|
DO_TEST_FULL("aarch64-gic-host", WHEN_BOTH,
|
|
|
|
ARG_GIC, GIC_BOTH,
|
|
|
|
ARG_QEMU_CAPS, NONE);
|
2015-09-30 14:36:24 +00:00
|
|
|
|
2019-06-24 13:22:24 +00:00
|
|
|
/* SVE aarch64 CPU features work on modern QEMU */
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST("aarch64-features-sve", "aarch64");
|
|
|
|
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("memory-hotplug", NONE);
|
|
|
|
DO_TEST("memory-hotplug-nonuma", NONE);
|
|
|
|
DO_TEST("memory-hotplug-dimm", NONE);
|
2019-12-18 00:36:00 +00:00
|
|
|
DO_TEST("memory-hotplug-nvdimm", QEMU_CAPS_DEVICE_NVDIMM);
|
|
|
|
DO_TEST("memory-hotplug-nvdimm-access", QEMU_CAPS_DEVICE_NVDIMM);
|
|
|
|
DO_TEST("memory-hotplug-nvdimm-label", QEMU_CAPS_DEVICE_NVDIMM);
|
|
|
|
DO_TEST("memory-hotplug-nvdimm-align", QEMU_CAPS_DEVICE_NVDIMM);
|
|
|
|
DO_TEST("memory-hotplug-nvdimm-pmem", QEMU_CAPS_DEVICE_NVDIMM);
|
|
|
|
DO_TEST("memory-hotplug-nvdimm-readonly", QEMU_CAPS_DEVICE_NVDIMM);
|
2020-03-23 19:40:47 +00:00
|
|
|
DO_TEST("memory-hotplug-nvdimm-ppc64", QEMU_CAPS_DEVICE_SPAPR_PCI_HOST_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_NVDIMM);
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("net-udp", NONE);
|
2014-10-06 12:18:37 +00:00
|
|
|
|
2019-10-18 15:30:11 +00:00
|
|
|
DO_TEST("video-virtio-gpu-device", QEMU_CAPS_DEVICE_VIRTIO_GPU);
|
|
|
|
DO_TEST("video-virtio-gpu-virgl",
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_GPU,
|
|
|
|
QEMU_CAPS_VIRTIO_GPU_VIRGL);
|
|
|
|
DO_TEST("video-virtio-gpu-spice-gl",
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_GPU,
|
2019-12-09 23:15:27 +00:00
|
|
|
QEMU_CAPS_VIRTIO_GPU_VIRGL,
|
|
|
|
QEMU_CAPS_SPICE,
|
|
|
|
QEMU_CAPS_SPICE_FILE_XFER_DISABLE,
|
|
|
|
QEMU_CAPS_SPICE_GL,
|
|
|
|
QEMU_CAPS_SPICE_RENDERNODE);
|
2019-10-18 15:30:11 +00:00
|
|
|
DO_TEST("video-virtio-gpu-sdl-gl",
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_GPU,
|
2019-12-09 23:15:25 +00:00
|
|
|
QEMU_CAPS_VIRTIO_GPU_VIRGL,
|
|
|
|
QEMU_CAPS_SDL_GL);
|
2018-09-05 15:51:24 +00:00
|
|
|
|
|
|
|
DO_TEST("virtio-input",
|
|
|
|
QEMU_CAPS_VIRTIO_KEYBOARD,
|
|
|
|
QEMU_CAPS_VIRTIO_MOUSE,
|
|
|
|
QEMU_CAPS_VIRTIO_TABLET);
|
|
|
|
DO_TEST("virtio-input-passthrough",
|
|
|
|
QEMU_CAPS_VIRTIO_INPUT_HOST);
|
2015-11-25 08:42:32 +00:00
|
|
|
|
2017-02-02 13:27:32 +00:00
|
|
|
DO_TEST("memorybacking-set", NONE);
|
|
|
|
DO_TEST("memorybacking-unset", NONE);
|
2018-09-05 15:51:24 +00:00
|
|
|
|
2020-04-23 13:15:06 +00:00
|
|
|
DO_TEST_CAPS_LATEST("virtio-options");
|
2017-02-02 13:27:32 +00:00
|
|
|
|
2019-03-29 15:58:23 +00:00
|
|
|
DO_TEST("fd-memory-numa-topology", QEMU_CAPS_OBJECT_MEMORY_FILE,
|
|
|
|
QEMU_CAPS_KVM);
|
|
|
|
DO_TEST("fd-memory-numa-topology2", QEMU_CAPS_OBJECT_MEMORY_FILE,
|
|
|
|
QEMU_CAPS_KVM);
|
|
|
|
DO_TEST("fd-memory-numa-topology3", QEMU_CAPS_OBJECT_MEMORY_FILE,
|
|
|
|
QEMU_CAPS_KVM);
|
|
|
|
|
|
|
|
DO_TEST("fd-memory-no-numa-topology", QEMU_CAPS_OBJECT_MEMORY_FILE,
|
|
|
|
QEMU_CAPS_KVM);
|
|
|
|
|
|
|
|
DO_TEST("memfd-memory-numa",
|
|
|
|
QEMU_CAPS_OBJECT_MEMORY_MEMFD,
|
2019-12-09 23:15:12 +00:00
|
|
|
QEMU_CAPS_OBJECT_MEMORY_MEMFD_HUGETLB,
|
|
|
|
QEMU_CAPS_OBJECT_MEMORY_FILE);
|
2019-03-29 15:21:28 +00:00
|
|
|
DO_TEST("memfd-memory-default-hugepage",
|
|
|
|
QEMU_CAPS_OBJECT_MEMORY_MEMFD,
|
2019-12-09 23:15:12 +00:00
|
|
|
QEMU_CAPS_OBJECT_MEMORY_MEMFD_HUGETLB,
|
|
|
|
QEMU_CAPS_OBJECT_MEMORY_FILE);
|
2019-03-29 15:58:23 +00:00
|
|
|
|
2016-07-29 13:13:56 +00:00
|
|
|
DO_TEST("acpi-table", NONE);
|
2016-04-18 15:13:02 +00:00
|
|
|
|
2017-02-23 17:47:36 +00:00
|
|
|
DO_TEST("video-device-pciaddr-default",
|
|
|
|
QEMU_CAPS_KVM,
|
|
|
|
QEMU_CAPS_VNC,
|
|
|
|
QEMU_CAPS_DEVICE_VIDEO_PRIMARY,
|
|
|
|
QEMU_CAPS_DEVICE_QXL);
|
2019-10-18 15:30:11 +00:00
|
|
|
DO_TEST("video-qxl-heads", QEMU_CAPS_DEVICE_QXL);
|
|
|
|
DO_TEST("video-qxl-noheads", QEMU_CAPS_DEVICE_QXL);
|
|
|
|
DO_TEST("video-qxl-resolution", QEMU_CAPS_DEVICE_QXL);
|
|
|
|
DO_TEST("video-virtio-gpu-secondary", QEMU_CAPS_DEVICE_VIRTIO_GPU);
|
2018-03-23 17:22:38 +00:00
|
|
|
DO_TEST("video-virtio-gpu-ccw",
|
2018-05-07 14:41:11 +00:00
|
|
|
QEMU_CAPS_CCW,
|
2018-03-23 17:22:38 +00:00
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_GPU,
|
|
|
|
QEMU_CAPS_DEVICE_VIDEO_PRIMARY,
|
|
|
|
QEMU_CAPS_VIRTIO_GPU_MAX_OUTPUTS,
|
|
|
|
QEMU_CAPS_VNC,
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_GPU_CCW);
|
2018-03-23 17:22:40 +00:00
|
|
|
DO_TEST("video-virtio-gpu-ccw-auto",
|
2018-05-07 14:41:11 +00:00
|
|
|
QEMU_CAPS_CCW,
|
2018-03-23 17:22:40 +00:00
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_GPU,
|
|
|
|
QEMU_CAPS_DEVICE_VIDEO_PRIMARY,
|
|
|
|
QEMU_CAPS_VIRTIO_GPU_MAX_OUTPUTS,
|
|
|
|
QEMU_CAPS_VNC,
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_GPU_CCW);
|
2019-12-09 23:15:26 +00:00
|
|
|
DO_TEST("video-none-device", QEMU_CAPS_VNC);
|
2015-12-11 13:43:10 +00:00
|
|
|
|
2019-05-17 12:45:36 +00:00
|
|
|
DO_TEST_CAPS_LATEST("intel-iommu");
|
|
|
|
DO_TEST_CAPS_VER("intel-iommu", "2.6.0");
|
|
|
|
DO_TEST_CAPS_LATEST("intel-iommu-caching-mode");
|
|
|
|
DO_TEST_CAPS_LATEST("intel-iommu-eim");
|
|
|
|
DO_TEST_CAPS_LATEST("intel-iommu-device-iotlb");
|
2020-06-04 07:42:42 +00:00
|
|
|
DO_TEST_CAPS_LATEST("intel-iommu-aw-bits");
|
2019-05-17 11:23:16 +00:00
|
|
|
DO_TEST_CAPS_ARCH_LATEST("iommu-smmuv3", "aarch64");
|
2016-06-22 14:28:22 +00:00
|
|
|
|
2017-03-01 15:12:07 +00:00
|
|
|
DO_TEST("cpu-check-none", NONE);
|
|
|
|
DO_TEST("cpu-check-partial", NONE);
|
|
|
|
DO_TEST("cpu-check-full", NONE);
|
|
|
|
DO_TEST("cpu-check-default-none", NONE);
|
|
|
|
DO_TEST("cpu-check-default-none2", NONE);
|
|
|
|
DO_TEST("cpu-check-default-partial", NONE);
|
|
|
|
DO_TEST("cpu-check-default-partial2", NONE);
|
2019-12-18 00:36:03 +00:00
|
|
|
DO_TEST("vmcoreinfo", QEMU_CAPS_DEVICE_VMCOREINFO);
|
2017-03-01 15:12:07 +00:00
|
|
|
|
2019-12-18 00:36:02 +00:00
|
|
|
DO_TEST("smartcard-host", QEMU_CAPS_CCID_EMULATED);
|
|
|
|
DO_TEST("smartcard-host-certificates", QEMU_CAPS_CCID_EMULATED);
|
|
|
|
DO_TEST("smartcard-host-certificates-database",
|
|
|
|
QEMU_CAPS_CCID_EMULATED);
|
|
|
|
DO_TEST("smartcard-passthrough-tcp", QEMU_CAPS_CCID_PASSTHRU);
|
|
|
|
DO_TEST("smartcard-passthrough-spicevmc", QEMU_CAPS_CCID_PASSTHRU);
|
|
|
|
DO_TEST("smartcard-controller", QEMU_CAPS_CCID_EMULATED);
|
2017-08-03 12:26:47 +00:00
|
|
|
|
2018-02-21 09:18:19 +00:00
|
|
|
DO_TEST("pseries-cpu-compat-power9",
|
|
|
|
QEMU_CAPS_DEVICE_SPAPR_PCI_HOST_BRIDGE);
|
|
|
|
DO_TEST("pseries-cpu-compat",
|
|
|
|
QEMU_CAPS_DEVICE_SPAPR_PCI_HOST_BRIDGE);
|
|
|
|
DO_TEST("pseries-cpu-exact",
|
|
|
|
QEMU_CAPS_DEVICE_SPAPR_PCI_HOST_BRIDGE);
|
2017-09-18 07:59:18 +00:00
|
|
|
|
2019-10-18 15:30:11 +00:00
|
|
|
DO_TEST("user-aliases",
|
|
|
|
QEMU_CAPS_DEVICE_CIRRUS_VGA,
|
2019-12-09 23:15:12 +00:00
|
|
|
QEMU_CAPS_QCOW2_LUKS,
|
2019-12-09 23:15:22 +00:00
|
|
|
QEMU_CAPS_OBJECT_MEMORY_FILE,
|
|
|
|
QEMU_CAPS_PIIX_DISABLE_S3,
|
2019-12-09 23:15:26 +00:00
|
|
|
QEMU_CAPS_PIIX_DISABLE_S4,
|
2019-12-18 00:36:02 +00:00
|
|
|
QEMU_CAPS_VNC,
|
|
|
|
QEMU_CAPS_CCID_EMULATED);
|
2018-03-23 17:22:42 +00:00
|
|
|
DO_TEST("input-virtio-ccw",
|
2018-05-07 14:41:11 +00:00
|
|
|
QEMU_CAPS_CCW,
|
2018-03-23 17:22:42 +00:00
|
|
|
QEMU_CAPS_VIRTIO_KEYBOARD,
|
|
|
|
QEMU_CAPS_VIRTIO_MOUSE,
|
|
|
|
QEMU_CAPS_VIRTIO_TABLET,
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_KEYBOARD_CCW,
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_MOUSE_CCW,
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_TABLET_CCW);
|
2017-10-20 14:48:14 +00:00
|
|
|
|
2018-05-10 21:37:18 +00:00
|
|
|
DO_TEST("tseg-explicit-size",
|
|
|
|
QEMU_CAPS_DEVICE_DMI_TO_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_PCI_BRIDGE,
|
|
|
|
QEMU_CAPS_DEVICE_IOH3420,
|
|
|
|
QEMU_CAPS_ICH9_AHCI,
|
|
|
|
QEMU_CAPS_MACHINE_SMM_OPT,
|
|
|
|
QEMU_CAPS_VIRTIO_SCSI,
|
|
|
|
QEMU_CAPS_MCH_EXTENDED_TSEG_MBYTES);
|
|
|
|
|
2019-04-15 22:19:19 +00:00
|
|
|
# define DO_TEST_STATUS(_name) \
|
2018-03-02 15:47:32 +00:00
|
|
|
do { \
|
2019-04-15 22:19:19 +00:00
|
|
|
static struct testQemuInfo info = { \
|
|
|
|
.name = _name, \
|
|
|
|
}; \
|
2019-03-31 20:44:25 +00:00
|
|
|
if (testQemuInfoSetArgs(&info, capslatest, \
|
|
|
|
ARG_QEMU_CAPS, QEMU_CAPS_LAST, \
|
|
|
|
ARG_END) < 0 || \
|
2019-10-22 13:26:14 +00:00
|
|
|
qemuTestCapsCacheInsert(driver.qemuCapsCache, info.qemuCaps) < 0) { \
|
2019-04-15 22:19:19 +00:00
|
|
|
VIR_TEST_DEBUG("Failed to generate status test data for '%s'", _name); \
|
2018-03-02 15:47:32 +00:00
|
|
|
return -1; \
|
|
|
|
} \
|
2019-10-22 13:26:14 +00:00
|
|
|
testInfoSetStatusPaths(&info); \
|
2018-03-02 15:47:32 +00:00
|
|
|
\
|
2019-04-15 22:19:19 +00:00
|
|
|
if (virTestRun("QEMU status XML-2-XML " _name, \
|
2018-03-02 15:47:32 +00:00
|
|
|
testCompareStatusXMLToXMLFiles, &info) < 0) \
|
|
|
|
ret = -1; \
|
|
|
|
\
|
2019-03-31 16:36:27 +00:00
|
|
|
testQemuInfoClear(&info); \
|
2018-03-02 15:47:32 +00:00
|
|
|
} while (0)
|
|
|
|
|
|
|
|
|
|
|
|
DO_TEST_STATUS("blockjob-mirror");
|
|
|
|
DO_TEST_STATUS("vcpus-multi");
|
2018-03-02 16:36:46 +00:00
|
|
|
DO_TEST_STATUS("modern");
|
2018-03-02 16:45:31 +00:00
|
|
|
DO_TEST_STATUS("migration-out-nbd");
|
2018-03-19 13:57:09 +00:00
|
|
|
DO_TEST_STATUS("migration-in-params");
|
|
|
|
DO_TEST_STATUS("migration-out-params");
|
2018-03-12 15:36:24 +00:00
|
|
|
DO_TEST_STATUS("migration-out-nbd-tls");
|
2018-05-28 08:02:54 +00:00
|
|
|
DO_TEST_STATUS("disk-secinfo-upgrade");
|
2018-03-02 15:47:32 +00:00
|
|
|
|
2018-11-30 16:40:40 +00:00
|
|
|
DO_TEST_STATUS("blockjob-blockdev");
|
|
|
|
|
2019-09-18 10:45:31 +00:00
|
|
|
DO_TEST_STATUS("backup-pull");
|
|
|
|
|
2018-06-04 17:37:20 +00:00
|
|
|
DO_TEST("vhost-vsock", QEMU_CAPS_DEVICE_VHOST_VSOCK);
|
|
|
|
DO_TEST("vhost-vsock-auto", QEMU_CAPS_DEVICE_VHOST_VSOCK);
|
2018-08-06 15:41:07 +00:00
|
|
|
DO_TEST("vhost-vsock-ccw", QEMU_CAPS_DEVICE_VHOST_VSOCK,
|
|
|
|
QEMU_CAPS_CCW);
|
|
|
|
DO_TEST("vhost-vsock-ccw-auto", QEMU_CAPS_DEVICE_VHOST_VSOCK,
|
|
|
|
QEMU_CAPS_CCW);
|
|
|
|
|
2019-07-16 05:01:30 +00:00
|
|
|
DO_TEST_CAPS_LATEST("vhost-user-fs-fd-memory");
|
|
|
|
DO_TEST_CAPS_LATEST("vhost-user-fs-hugepages");
|
|
|
|
|
2018-08-22 09:15:27 +00:00
|
|
|
DO_TEST("riscv64-virt",
|
|
|
|
QEMU_CAPS_DEVICE_VIRTIO_MMIO);
|
2019-01-31 13:54:11 +00:00
|
|
|
DO_TEST("riscv64-virt-pci",
|
|
|
|
QEMU_CAPS_OBJECT_GPEX);
|
2018-05-22 09:21:15 +00:00
|
|
|
|
2019-04-15 22:46:44 +00:00
|
|
|
DO_TEST_CAPS_LATEST("virtio-transitional");
|
|
|
|
DO_TEST_CAPS_LATEST("virtio-non-transitional");
|
2019-01-11 20:06:05 +00:00
|
|
|
|
2019-06-12 10:25:28 +00:00
|
|
|
/* Simple headless guests for various architectures */
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST("aarch64-virt-headless", "aarch64");
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST("ppc64-pseries-headless", "ppc64");
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST("riscv64-virt-headless", "riscv64");
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST("s390x-ccw-headless", "s390x");
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST("x86_64-pc-headless", "x86_64");
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST("x86_64-q35-headless", "x86_64");
|
|
|
|
|
|
|
|
/* Simple guests with graphics for various architectures */
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST("aarch64-virt-graphics", "aarch64");
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST("ppc64-pseries-graphics", "ppc64");
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST("riscv64-virt-graphics", "riscv64");
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST("s390x-ccw-graphics", "s390x");
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST("x86_64-pc-graphics", "x86_64");
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST("x86_64-q35-graphics", "x86_64");
|
|
|
|
|
2019-10-18 14:14:23 +00:00
|
|
|
DO_TEST_CAPS_VER("cpu-Icelake-Server-pconfig", "3.1.0");
|
|
|
|
DO_TEST_CAPS_LATEST("cpu-Icelake-Server-pconfig");
|
|
|
|
|
2019-10-11 18:15:03 +00:00
|
|
|
DO_TEST_CAPS_ARCH_LATEST("aarch64-default-cpu-kvm-virt-4.2", "aarch64");
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST("aarch64-default-cpu-tcg-virt-4.2", "aarch64");
|
2019-10-11 18:15:03 +00:00
|
|
|
DO_TEST_CAPS_ARCH_LATEST("ppc64-default-cpu-kvm-pseries-2.7", "ppc64");
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST("ppc64-default-cpu-tcg-pseries-2.7", "ppc64");
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST("ppc64-default-cpu-kvm-pseries-3.1", "ppc64");
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST("ppc64-default-cpu-tcg-pseries-3.1", "ppc64");
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST("ppc64-default-cpu-kvm-pseries-4.2", "ppc64");
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST("ppc64-default-cpu-tcg-pseries-4.2", "ppc64");
|
2020-02-06 09:18:49 +00:00
|
|
|
DO_TEST_CAPS_ARCH_LATEST("s390-default-cpu-kvm-ccw-virtio-2.7", "s390x");
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST("s390-default-cpu-tcg-ccw-virtio-2.7", "s390x");
|
2019-10-11 18:15:03 +00:00
|
|
|
DO_TEST_CAPS_ARCH_LATEST("s390-default-cpu-kvm-ccw-virtio-4.2", "s390x");
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST("s390-default-cpu-tcg-ccw-virtio-4.2", "s390x");
|
2019-10-11 18:15:03 +00:00
|
|
|
DO_TEST_CAPS_ARCH_LATEST("x86_64-default-cpu-kvm-pc-4.2", "x86_64");
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST("x86_64-default-cpu-tcg-pc-4.2", "x86_64");
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST("x86_64-default-cpu-kvm-q35-4.2", "x86_64");
|
|
|
|
DO_TEST_CAPS_ARCH_LATEST("x86_64-default-cpu-tcg-q35-4.2", "x86_64");
|
2019-10-11 18:15:03 +00:00
|
|
|
|
2020-03-30 18:05:33 +00:00
|
|
|
DO_TEST_CAPS_LATEST("virtio-9p-multidevs");
|
2020-05-26 00:41:00 +00:00
|
|
|
DO_TEST("downscript", NONE);
|
2020-03-30 18:05:33 +00:00
|
|
|
|
2020-06-25 14:34:30 +00:00
|
|
|
cleanup:
|
2020-05-07 20:31:04 +00:00
|
|
|
if (getenv("LIBVIRT_SKIP_CLEANUP") == NULL)
|
|
|
|
virFileDeleteTree(fakerootdir);
|
|
|
|
|
2015-09-15 06:16:02 +00:00
|
|
|
qemuTestDriverFree(&driver);
|
2019-08-12 15:06:22 +00:00
|
|
|
virFileWrapperClearPrefixes();
|
2007-07-18 21:34:22 +00:00
|
|
|
|
2014-03-17 09:38:38 +00:00
|
|
|
return ret == 0 ? EXIT_SUCCESS : EXIT_FAILURE;
|
2007-07-18 21:34:22 +00:00
|
|
|
}
|
|
|
|
|
2017-06-01 16:48:52 +00:00
|
|
|
VIR_TEST_MAIN_PRELOAD(mymain,
|
2019-08-21 16:13:16 +00:00
|
|
|
VIR_TEST_MOCK("virpci"),
|
|
|
|
VIR_TEST_MOCK("virrandom"),
|
2019-11-15 10:56:46 +00:00
|
|
|
VIR_TEST_MOCK("domaincaps"),
|
2019-08-21 16:13:16 +00:00
|
|
|
VIR_TEST_MOCK("virdeterministichash"))
|
2008-05-29 15:31:49 +00:00
|
|
|
|
2007-11-26 12:03:34 +00:00
|
|
|
#else
|
|
|
|
|
2011-07-28 15:48:12 +00:00
|
|
|
int
|
|
|
|
main(void)
|
|
|
|
{
|
|
|
|
return EXIT_AM_SKIP;
|
|
|
|
}
|
2007-11-26 12:03:34 +00:00
|
|
|
|
|
|
|
#endif /* WITH_QEMU */
|