From patchwork Tue Feb 25 03:29:37 2014 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Luiz Capitulino X-Patchwork-Id: 3712661 Return-Path: X-Original-To: patchwork-kvm@patchwork.kernel.org Delivered-To: patchwork-parsemail@patchwork1.web.kernel.org Received: from mail.kernel.org (mail.kernel.org [198.145.19.201]) by patchwork1.web.kernel.org (Postfix) with ESMTP id 3791D9F2ED for ; Tue, 25 Feb 2014 03:44:18 +0000 (UTC) Received: from mail.kernel.org (localhost [127.0.0.1]) by mail.kernel.org (Postfix) with ESMTP id 19F122013D for ; Tue, 25 Feb 2014 03:44:17 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 2432720103 for ; Tue, 25 Feb 2014 03:44:16 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752780AbaBYDoM (ORCPT ); Mon, 24 Feb 2014 22:44:12 -0500 Received: from mx1.redhat.com ([209.132.183.28]:34237 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752210AbaBYDoM (ORCPT ); Mon, 24 Feb 2014 22:44:12 -0500 Received: from int-mx12.intmail.prod.int.phx2.redhat.com (int-mx12.intmail.prod.int.phx2.redhat.com [10.5.11.25]) by mx1.redhat.com (8.14.4/8.14.4) with ESMTP id s1P3iBmA019755 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK) for ; Mon, 24 Feb 2014 22:44:11 -0500 Received: from localhost ([10.3.113.2]) by int-mx12.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id s1P3iAtY003129; Mon, 24 Feb 2014 22:44:10 -0500 Date: Mon, 24 Feb 2014 22:29:37 -0500 From: Luiz Capitulino To: kvm@vger.kernel.org Cc: Paolo Bonzini Subject: [PATCH] README: add information about memory usage Message-ID: <20140224222937.46a1b511@redhat.com> Organization: Red Hat Mime-Version: 1.0 X-Scanned-By: MIMEDefang 2.68 on 10.5.11.25 Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org X-Spam-Status: No, score=-6.9 required=5.0 tests=BAYES_00, RCVD_IN_DNSWL_HI, RP_MATCHES_RCVD, UNPARSEABLE_RELAY autolearn=unavailable version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on mail.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP I got a report of someone trying to run tests with a large amount of RAM (4GB), which broke the guest as free_memory() function (called by setup_vm()) will override the PCI hole. Let's document memory constraints so that people don't do that. Signed-off-by: Luiz Capitulino --- README | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/README b/README index db525e3..0f5d810 100644 --- a/README +++ b/README @@ -18,6 +18,10 @@ This invocation runs the msr test case. The test outputs to stdio. Using qemu (supported since qemu 1.3): qemu-system-x86_64 -enable-kvm -device pc-testdev -serial stdio -device isa-debug-exit,iobase=0xf4,iosize=0x4 -kernel ./x86/msr.flat +Note that it's not necessary to specify the "-m" option to qemu. The default +memory size is enough. Actually, the tests infrastructure doesn't support too +much RAM anyway, so specifying a large amount of RAM may break it. + Or use a runner script to detect the correct invocation: ./x86-run ./x86/msr.flat To select a specific qemu binary, specify the QEMU= environment: