Re: [patch 4/4] KVM-trace port to tracepoints

2008-07-23 Thread Peter Zijlstra
On Tue, 2008-07-22 at 21:46 +0300, Avi Kivity wrote:
 Jan Kiszka wrote:
  That's true - as long as you don't have to add/remove/modify
  tracepoints. I had to do this job in the past (not for KVM). Having 1
  spot in 1 file (based on generic probes) would be handier in that case
  than 5 spots in 3 files. But if the KVM tracepoints are considered
  stable in their number and structure, that shouldn't be an issue here.
 

 
 Tracepoints aren't stable; they are artefacts of the implementation.

Which IMHO makes it unsuitable for trace_mark() as that will be exported
to user-space, and every time you change your tracepoints you'll change
user visible things - not nice.

--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [patch 4/4] KVM-trace port to tracepoints

2008-07-23 Thread Avi Kivity

Peter Zijlstra wrote:

On Tue, 2008-07-22 at 21:46 +0300, Avi Kivity wrote:
  

Jan Kiszka wrote:


That's true - as long as you don't have to add/remove/modify
tracepoints. I had to do this job in the past (not for KVM). Having 1
spot in 1 file (based on generic probes) would be handier in that case
than 5 spots in 3 files. But if the KVM tracepoints are considered
stable in their number and structure, that shouldn't be an issue here.

  
  

Tracepoints aren't stable; they are artefacts of the implementation.



Which IMHO makes it unsuitable for trace_mark() as that will be exported
to user-space, and every time you change your tracepoints you'll change
user visible things - not nice.
  


They are used for debugging (mostly performance related), so changes are 
expected.


What uses of trace_mark() depend on a stable interface? blktrace?


--
error compiling committee.c: too many arguments to function

--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[ kvm-Bugs-2025527 ] kvm-71 crash (oops) in kvm_mmu_slot_remove_write_access

2008-07-23 Thread SourceForge.net
Bugs item #2025527, was opened at 2008-07-23 16:39
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting: 
https://sourceforge.net/tracker/?func=detailatid=893831aid=2025527group_id=180599

Please note that this message will contain a full copy of the comment thread,
including the initial issue submission, for this request,
not just the latest update.
Category: kernel
Group: None
Status: Open
Resolution: None
Priority: 5
Private: No
Submitted By: Daniel van Vugt (danv)
Assigned to: Nobody/Anonymous (nobody)
Summary: kvm-71 crash (oops) in kvm_mmu_slot_remove_write_access

Initial Comment:
This seems to be happening regularly with kvm-71 so I have downgraded to 
kvm-70. So far so good...

I'm running Ubuntu 8.04.1 desktop amd64 2.6.24-19-generic #1 SMP.

[84184.614760] Unable to handle kernel paging request at 00100100 RIP: 
[84184.614765]  [88c67545] 
:kvm:kvm_mmu_slot_remove_write_access+0x55/0x70
[84184.614784] PGD 3b98d067 PUD 5da31067 PMD 0 
[84184.614788] Oops:  [1] SMP 
[84184.614790] CPU 2 
[84184.614792] Modules linked in: nls_iso8859_1 nls_cp437 vfat fat kvm_intel 
kvm binfmt_misc rfcomm l2cap bluetooth ppdev acpi_cpufreq cpufreq_userspace 
cpufreq_ondemand cpufreq_stats cpufreq_conservative freq_table 
cpufreq_powersave dock video output container sbs sbshc battery ipv6 xt_limit 
xt_tcpudp ipt_LOG ipt_MASQUERADE ipt_TOS ipt_REJECT nf_conntrack_irc 
nf_conntrack_ftp ac xt_state lp snd_hda_intel snd_pcm_oss snd_mixer_oss snd_pcm 
snd_page_alloc snd_hwdep snd_seq_dummy snd_seq_oss snd_seq_midi snd_rawmidi 
nvidia(P) usb_storage snd_seq_midi_event libusual sky2 i2c_core iTCO_wdt 
snd_seq iTCO_vendor_support snd_timer snd_seq_device parport_pc snd parport 
shpchp evdev pcspkr intel_agp pci_hotplug button soundcore iptable_nat nf_nat 
nf_conntrack_ipv4 nf_conntrack iptable_mangle iptable_filter ip_tables x_tables 
usbhid hid ext3 jbd mbcache sg sr_mod sd_mod cdrom pata_acpi ehci_hcd uhci_hcd 
ata_piix ata_generic libata scsi_mod usbcore thermal processor fan fbcon 
tileblit font bitblit softcursor fuse
[84184.614855] Pid: 6868, comm: qemu Tainted: P2.6.24-19-generic #1
[84184.614857] RIP: 0010:[88c67545]  [88c67545] 
:kvm:kvm_mmu_slot_remove_write_access+0x55/0x70
[84184.614867] RSP: 0018:81003bbefe20  EFLAGS: 00010246
[84184.614869] RAX:  RBX: 81001addc000 RCX: 
[84184.614871] RDX: 00100100 RSI: 0005 RDI: 81001addeaf0
[84184.614873] RBP: 81003bbefe88 R08: ec8fdb30 R09: 00100100
[84184.614875] R10:  R11: 0001 R12: 
[84184.614877] R13: 81001addc020 R14: 4010ae42 R15: 
[84184.614879] FS:  7f80e48e56e0() GS:81007dc01a00() 
knlGS:
[84184.614882] CS:  0010 DS:  ES:  CR0: 8005003b
[84184.614884] CR2: 00100100 CR3: 3bad3000 CR4: 26e0
[84184.614885] DR0:  DR1:  DR2: 
[84184.614888] DR3:  DR6: 0ff0 DR7: 0400
[84184.614890] Process qemu (pid: 6868, threadinfo 81003bbee000, task 
81005d910fc0)
[84184.614892] Stack:  88c630f2 000e 0001fffe 
0001
[84184.614897]  81001addc000 81003bbefe88 4010ae42 
0005
[84184.614900]  88c60771 810001022598 8062b540 
0082
[84184.614904] Call Trace:
[84184.614912]  [88c630f2] :kvm:kvm_vm_ioctl_get_dirty_log+0x82/0xc0
[84184.614926]  [88c60771] :kvm:kvm_vm_ioctl+0xd1/0x200
[84184.614934]  [80256e0e] hrtimer_start+0xee/0x170
[84184.614941]  [80233e20] default_wake_function+0x0/0x10
[84184.614948]  [802c070f] do_ioctl+0x2f/0xa0
[84184.614953]  [802c09a0] vfs_ioctl+0x220/0x2c0
[84184.614957]  [802b32fd] vfs_read+0xed/0x190
[84184.614963]  [802c0ad1] sys_ioctl+0x91/0xb0
[84184.614971]  [8020c37e] system_call+0x7e/0x83
[84184.614981] 
[84184.614982] 
[84184.614982] Code: 49 8b 11 49 39 f9 0f 18 0a 75 b9 f3 c3 66 66 66 66 66 2e 
0f 
[84184.614991] RIP  [88c67545] 
:kvm:kvm_mmu_slot_remove_write_access+0x55/0x70
[84184.615000]  RSP 81003bbefe20
[84184.615002] CR2: 00100100
[84184.615005] ---[ end trace dbc91eb222360215 ]---

--

You can respond by visiting: 
https://sourceforge.net/tracker/?func=detailatid=893831aid=2025527group_id=180599
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[ kvm-Bugs-2025527 ] kvm-71 crash (oops) in kvm_mmu_slot_remove_write_access

2008-07-23 Thread SourceForge.net
Bugs item #2025527, was opened at 2008-07-23 16:39
Message generated for change (Settings changed) made by danv
You can respond by visiting: 
https://sourceforge.net/tracker/?func=detailatid=893831aid=2025527group_id=180599

Please note that this message will contain a full copy of the comment thread,
including the initial issue submission, for this request,
not just the latest update.
Category: kernel
Group: None
Status: Open
Resolution: None
Priority: 7
Private: No
Submitted By: Daniel van Vugt (danv)
Assigned to: Nobody/Anonymous (nobody)
Summary: kvm-71 crash (oops) in kvm_mmu_slot_remove_write_access

Initial Comment:
This seems to be happening regularly with kvm-71 so I have downgraded to 
kvm-70. So far so good...

I'm running Ubuntu 8.04.1 desktop amd64 2.6.24-19-generic #1 SMP.

[84184.614760] Unable to handle kernel paging request at 00100100 RIP: 
[84184.614765]  [88c67545] 
:kvm:kvm_mmu_slot_remove_write_access+0x55/0x70
[84184.614784] PGD 3b98d067 PUD 5da31067 PMD 0 
[84184.614788] Oops:  [1] SMP 
[84184.614790] CPU 2 
[84184.614792] Modules linked in: nls_iso8859_1 nls_cp437 vfat fat kvm_intel 
kvm binfmt_misc rfcomm l2cap bluetooth ppdev acpi_cpufreq cpufreq_userspace 
cpufreq_ondemand cpufreq_stats cpufreq_conservative freq_table 
cpufreq_powersave dock video output container sbs sbshc battery ipv6 xt_limit 
xt_tcpudp ipt_LOG ipt_MASQUERADE ipt_TOS ipt_REJECT nf_conntrack_irc 
nf_conntrack_ftp ac xt_state lp snd_hda_intel snd_pcm_oss snd_mixer_oss snd_pcm 
snd_page_alloc snd_hwdep snd_seq_dummy snd_seq_oss snd_seq_midi snd_rawmidi 
nvidia(P) usb_storage snd_seq_midi_event libusual sky2 i2c_core iTCO_wdt 
snd_seq iTCO_vendor_support snd_timer snd_seq_device parport_pc snd parport 
shpchp evdev pcspkr intel_agp pci_hotplug button soundcore iptable_nat nf_nat 
nf_conntrack_ipv4 nf_conntrack iptable_mangle iptable_filter ip_tables x_tables 
usbhid hid ext3 jbd mbcache sg sr_mod sd_mod cdrom pata_acpi ehci_hcd uhci_hcd 
ata_piix ata_generic libata scsi_mod usbcore thermal processor fan fbcon 
tileblit font bitblit softcursor fuse
[84184.614855] Pid: 6868, comm: qemu Tainted: P2.6.24-19-generic #1
[84184.614857] RIP: 0010:[88c67545]  [88c67545] 
:kvm:kvm_mmu_slot_remove_write_access+0x55/0x70
[84184.614867] RSP: 0018:81003bbefe20  EFLAGS: 00010246
[84184.614869] RAX:  RBX: 81001addc000 RCX: 
[84184.614871] RDX: 00100100 RSI: 0005 RDI: 81001addeaf0
[84184.614873] RBP: 81003bbefe88 R08: ec8fdb30 R09: 00100100
[84184.614875] R10:  R11: 0001 R12: 
[84184.614877] R13: 81001addc020 R14: 4010ae42 R15: 
[84184.614879] FS:  7f80e48e56e0() GS:81007dc01a00() 
knlGS:
[84184.614882] CS:  0010 DS:  ES:  CR0: 8005003b
[84184.614884] CR2: 00100100 CR3: 3bad3000 CR4: 26e0
[84184.614885] DR0:  DR1:  DR2: 
[84184.614888] DR3:  DR6: 0ff0 DR7: 0400
[84184.614890] Process qemu (pid: 6868, threadinfo 81003bbee000, task 
81005d910fc0)
[84184.614892] Stack:  88c630f2 000e 0001fffe 
0001
[84184.614897]  81001addc000 81003bbefe88 4010ae42 
0005
[84184.614900]  88c60771 810001022598 8062b540 
0082
[84184.614904] Call Trace:
[84184.614912]  [88c630f2] :kvm:kvm_vm_ioctl_get_dirty_log+0x82/0xc0
[84184.614926]  [88c60771] :kvm:kvm_vm_ioctl+0xd1/0x200
[84184.614934]  [80256e0e] hrtimer_start+0xee/0x170
[84184.614941]  [80233e20] default_wake_function+0x0/0x10
[84184.614948]  [802c070f] do_ioctl+0x2f/0xa0
[84184.614953]  [802c09a0] vfs_ioctl+0x220/0x2c0
[84184.614957]  [802b32fd] vfs_read+0xed/0x190
[84184.614963]  [802c0ad1] sys_ioctl+0x91/0xb0
[84184.614971]  [8020c37e] system_call+0x7e/0x83
[84184.614981] 
[84184.614982] 
[84184.614982] Code: 49 8b 11 49 39 f9 0f 18 0a 75 b9 f3 c3 66 66 66 66 66 2e 
0f 
[84184.614991] RIP  [88c67545] 
:kvm:kvm_mmu_slot_remove_write_access+0x55/0x70
[84184.615000]  RSP 81003bbefe20
[84184.615002] CR2: 00100100
[84184.615005] ---[ end trace dbc91eb222360215 ]---

--

You can respond by visiting: 
https://sourceforge.net/tracker/?func=detailatid=893831aid=2025527group_id=180599
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[ kvm-Bugs-2025534 ] gettimeofday goes backward

2008-07-23 Thread SourceForge.net
Bugs item #2025534, was opened at 2008-07-23 10:45
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting: 
https://sourceforge.net/tracker/?func=detailatid=893831aid=2025534group_id=180599

Please note that this message will contain a full copy of the comment thread,
including the initial issue submission, for this request,
not just the latest update.
Category: intel
Group: None
Status: Open
Resolution: None
Priority: 5
Private: No
Submitted By: Rafal Wijata (ravpl)
Assigned to: Nobody/Anonymous (nobody)
Summary: gettimeofday goes backward

Initial Comment:
kvm version: 71
host: rhel51 2.6.18-92.1.6.el5 64bit 16G RAM, 8CPU
guest: rhel51 2.6.18-92.1.6.el5 64bit, 3.5G ram, 2 CPU
guest run as: qemu-system-x86_64 $DEVICES -m $MEM -smp $CPUS -net 
nic,macaddr=$MAC,model=e1000 -net tap,script=./ifup -nographic -daemonize

in the guest executed two consecutive gettimeofday (boost::ptime in fact), the 
latter returned time smaller than first
(2008-Jul-22 16:34:15.477000, 2008-Jul-22 16:34:15.47)

I'm sure no time change was made(like rdate or ntpdate) on neither host or 
guest. No time-releated options were passed to kernel(host or guest)

Any workaround?

--

You can respond by visiting: 
https://sourceforge.net/tracker/?func=detailatid=893831aid=2025534group_id=180599
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[ kvm-Bugs-2017966 ] Booting Vista Guest may crash host

2008-07-23 Thread SourceForge.net
Bugs item #2017966, was opened at 2008-07-14 06:30
Message generated for change (Comment added) made by jiajun
You can respond by visiting: 
https://sourceforge.net/tracker/?func=detailatid=893831aid=2017966group_id=180599

Please note that this message will contain a full copy of the comment thread,
including the initial issue submission, for this request,
not just the latest update.
Category: None
Group: None
Status: Open
Resolution: None
Priority: 5
Private: No
Submitted By: Jiajun Xu (jiajun)
Assigned to: Nobody/Anonymous (nobody)
Summary: Booting Vista Guest may crash host

Initial Comment:
Booting Vista Guest may cause host hang on latest commit.
kvm.git a10cfebe86cf85a1d2ab02fccbc1e8c2b3eb92b5 and 
userspace.git fbd8c32b77751236b35397e05c0bc84c48833d97.

The issue does not happen every time, but booting Vista Guest for more than 10 
times can reproduce the bug. 

Serial output is attached.

--

Comment By: Jiajun Xu (jiajun)
Date: 2008-07-23 01:45

Message:
Logged In: YES 
user_id=2142959
Originator: YES

I verified on latest commit kvm.git
aa2ed2c1b5f020beace44ab7745d290d64cd6c89. The issue does not appear now.

--

Comment By: Marcelo Tosatti (mtosatti)
Date: 2008-07-22 13:42

Message:
Logged In: YES 
user_id=2022487
Originator: NO

Jiajun,

Can you try to reproduce that with current git as of today? I was
experiencing 
all sorts of host crashes this week, but since
ea8b7f0542e0420240d057f7954808c65c4d13fc
its back to normal.

Tested approx. 1h of continuous reboot on Vista 32 Business without
problems.


--

Comment By: Jiajun Xu (jiajun)
Date: 2008-07-14 07:08

Message:
Logged In: YES 
user_id=2142959
Originator: YES

It's Vista x86.

--

Comment By: Avi Kivity (avik)
Date: 2008-07-14 06:59

Message:
Logged In: YES 
user_id=539971
Originator: NO

Is this Vista x86 or Vista x64?

--

You can respond by visiting: 
https://sourceforge.net/tracker/?func=detailatid=893831aid=2017966group_id=180599
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [patch 4/4] KVM-trace port to tracepoints

2008-07-23 Thread Peter Zijlstra
On Wed, 2008-07-23 at 11:08 +0300, Avi Kivity wrote:
 Peter Zijlstra wrote:
  On Tue, 2008-07-22 at 21:46 +0300, Avi Kivity wrote:

  Jan Kiszka wrote:
  
  That's true - as long as you don't have to add/remove/modify
  tracepoints. I had to do this job in the past (not for KVM). Having 1
  spot in 1 file (based on generic probes) would be handier in that case
  than 5 spots in 3 files. But if the KVM tracepoints are considered
  stable in their number and structure, that shouldn't be an issue here.
 


  Tracepoints aren't stable; they are artefacts of the implementation.
  
 
  Which IMHO makes it unsuitable for trace_mark() as that will be exported
  to user-space, and every time you change your tracepoints you'll change
  user visible things - not nice.

 
 They are used for debugging (mostly performance related), so changes are 
 expected.
 
 What uses of trace_mark() depend on a stable interface? blktrace?

There are currently no trace_mark() sites in the kernel that I'm aware
of (except for the scheduler :-/, and those should be converted to
tracepoints ASAP).

Andrew raised the whole point about trace_mark() generating an
user-visible interface and thus it should be stable, and I agree with
that.

What that means is that trace_mark() can only be used for really stable
points.

This in turn means we might as well use trace points.

Which allows for the conclusion that trace_mark() is not needed and
could be removed from the kernel.

However - it might be handy for ad-hoc debugging purposes that never see
the light of day (linus' git tree in this case). So on those grounds one
could argue against removing trace_mark.




--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [patch 4/4] KVM-trace port to tracepoints

2008-07-23 Thread Avi Kivity

Peter Zijlstra wrote:

There are currently no trace_mark() sites in the kernel that I'm aware
of (except for the scheduler :-/, and those should be converted to
tracepoints ASAP).

Andrew raised the whole point about trace_mark() generating an
user-visible interface and thus it should be stable, and I agree with
that.

What that means is that trace_mark() can only be used for really stable
points.

This in turn means we might as well use trace points.

Which allows for the conclusion that trace_mark() is not needed and
could be removed from the kernel.

However - it might be handy for ad-hoc debugging purposes that never see
the light of day (linus' git tree in this case). So on those grounds one
could argue against removing trace_mark


But trace_mark() is so wonderful.  Can't we just declare the tracemarks 
as a non-stable interface?


Perhaps add an unstable_trace_mark() to make it clear.

--
error compiling committee.c: too many arguments to function

--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [patch 4/4] KVM-trace port to tracepoints

2008-07-23 Thread Avi Kivity

Christoph Hellwig wrote:

On Wed, Jul 23, 2008 at 10:55:03AM +0200, Peter Zijlstra wrote:
  

Andrew raised the whole point about trace_mark() generating an
user-visible interface and thus it should be stable, and I agree with
that.



I'm not sure why this comes up again and again, but it's utter bullshit.
trace_mark does not generate any kind of user interface, just purely
a kernel internal interface.
  


trace_mark() is implement kvmtrace, which is propagated to userspace.  
So while trace_mark() itself is not a userspace interface, one of its 
users is.


It's an unstable interface.  But so is dmesg; that's the nature of tracing.

--
error compiling committee.c: too many arguments to function

--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [patch 4/4] KVM-trace port to tracepoints

2008-07-23 Thread Christoph Hellwig
On Wed, Jul 23, 2008 at 01:08:41PM +0300, Avi Kivity wrote:
 trace_mark() is implement kvmtrace, which is propagated to userspace.   
 So while trace_mark() itself is not a userspace interface, one of its  
 users is.

 It's an unstable interface.  But so is dmesg; that's the nature of tracing.

Trace_mark is as stable as any other kernel interface, and
the data you pass through it is as stable as you want it to.  In most
cases like kvmtrace or my spu scheduler tracing code the trace data
is directly forwarded through a userspace interface, and that is as
stable as any freeform interface, e.g. as like printk mentioned above.

--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [patch 4/4] KVM-trace port to tracepoints

2008-07-23 Thread Mathieu Desnoyers
* Peter Zijlstra ([EMAIL PROTECTED]) wrote:
 On Wed, 2008-07-23 at 12:32 +0300, Avi Kivity wrote:
  Peter Zijlstra wrote:
   There are currently no trace_mark() sites in the kernel that I'm aware
   of (except for the scheduler :-/, and those should be converted to
   tracepoints ASAP).
  
   Andrew raised the whole point about trace_mark() generating an
   user-visible interface and thus it should be stable, and I agree with
   that.
  
   What that means is that trace_mark() can only be used for really stable
   points.
  
   This in turn means we might as well use trace points.
  
   Which allows for the conclusion that trace_mark() is not needed and
   could be removed from the kernel.
  
   However - it might be handy for ad-hoc debugging purposes that never see
   the light of day (linus' git tree in this case). So on those grounds one
   could argue against removing trace_mark
  
  But trace_mark() is so wonderful.
 
 I guess tastes differ...
 
Can't we just declare the tracemarks 
  as a non-stable interface?
  
  Perhaps add an unstable_trace_mark() to make it clear.
 
 At the very least it would need its own output channel. But I'm afraid
 this will be KS material.
 

Hi Peter,

Currently what I have in LTTng includes this output channel. It works
for me, but if I can make it work for others that would be great.

- Tracepoints in kernel code to instrument the kernel.
- LTTng probes connect on those relatively stable tracepoints. They
  format the data so it's meaningful to userspace (e.g. extracts the pid
  of the prev and next process at sched_switch).
- The LTTng serializer is connected on those markers. It parses the
  format string to dynamically reserve space in the relay buffer, write
  a timestamp and event ID (one event ID is pre-assigned to a marker
  name) and copy the arguments from the stack to the event record (which
  has a variable size).

Event IDs and timestamps are added by LTTng, thus not required by
markers. However, one can think of this flow as an efficient and compact
binary data export mechanism to userspace.

Headers exports data type sizes and endianness, a special data channel
exports the mappings between { marker name, ID, format string } so
events are self-described. Therefore, one can add any event he likes and
it will be automatically understood by the tracing toolchain.

If an event is removed or filtered out or modified (by changing its
field name), the userspace trace analyser will detect it and the
specific probe which expects this event will fail to load, leading to
missing analyses, but nothing more than that.

So currently what we would have is, more or less : trace_marks located
within LTTng are kept in sync with userland, but the whole chain also
allows to add debug-style trace_marks directly in the kernel code
(this is really useful when trying to perform a low-impact printk-like
runtime bissection of a bug in the kernel code.

I actually see the trace_marks/LTTng combination as a printk which would
extract information in its binary form instead of using text-formatting.
The actual formatting can then be done later, in userland, if ever
needed (many analyses use the raw binary format directly). I guess KS
would be a good opportunity to discuss this interface topic.

Mathieu


-- 
Mathieu Desnoyers
OpenPGP key fingerprint: 8CD5 52C3 8E3C 4140 715F  BA06 3F25 A8FE 3BAE 9A68
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [patch 4/4] KVM-trace port to tracepoints

2008-07-23 Thread Mathieu Desnoyers
* Avi Kivity ([EMAIL PROTECTED]) wrote:
 Peter Zijlstra wrote:
 On Tue, 2008-07-22 at 21:46 +0300, Avi Kivity wrote:
   
 Jan Kiszka wrote:
 
 That's true - as long as you don't have to add/remove/modify
 tracepoints. I had to do this job in the past (not for KVM). Having 1
 spot in 1 file (based on generic probes) would be handier in that case
 than 5 spots in 3 files. But if the KVM tracepoints are considered
 stable in their number and structure, that shouldn't be an issue here.

 
 Tracepoints aren't stable; they are artefacts of the implementation.
 

 Which IMHO makes it unsuitable for trace_mark() as that will be exported
 to user-space, and every time you change your tracepoints you'll change
 user visible things - not nice.
   

 They are used for debugging (mostly performance related), so changes are 
 expected.

 What uses of trace_mark() depend on a stable interface? blktrace?


Actually, LTTng likes to have the { marker name, field name } pairs
unchanged for the markers it looks for, but that's about it. If a
userspace analysis plugin fails to see a marker (because it is disabled
or changed), it just does not apply its particular analysis on the
trace.

Since the markers and marker types are self-described in the trace,
userspace can detect any change the the present markers, so there is no
need to rely on version numbers because we are able to proceed to a
complete marker list verification (names, field names, types) before
starting the trace analysis.

Mathieu

-- 
Mathieu Desnoyers
OpenPGP key fingerprint: 8CD5 52C3 8E3C 4140 715F  BA06 3F25 A8FE 3BAE 9A68
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [PATCH 0/2] Paravirt loops per jiffy calculation

2008-07-23 Thread Glauber Costa
On Wed, Jul 23, 2008 at 7:07 AM, Gerd Hoffmann [EMAIL PROTECTED] wrote:
  Hi,

 Turns out that only implementing a pv get_tsc_khz is not enough, since
 it will only do the right thing for cpu0, which is not what we desire.

 So we set preset_lpj. Recall this code is run before arch parameter setup,
 so if we pass lpj=xx in the command line, it'll still work.

 Hmm, why kvm needs the preset_lpj thing and xen doesn't?

I asked myself the same question. But from the snippet in calibrate.c:

if (preset_lpj) {
loops_per_jiffy = preset_lpj;
printk(KERN_INFO
Calibrating delay loop (skipped) preset value.. );
} else if ((smp_processor_id() == 0)  lpj_fine) {
loops_per_jiffy = lpj_fine;
printk(KERN_INFO
Calibrating delay loop (skipped), 
value calculated using timer frequency.. );
} else if ((loops_per_jiffy = calibrate_delay_direct()) != 0) {
printk(KERN_INFO
Calibrating delay using timer specific routine.. );


The third one is the one we want to skip. The second one, runs only for CPU0.
calibrate_delay_loop() itself, is called very early from smp_callin,
and tsc calibration only sets lpj_fine. So I don't see too much of an
option here.


 cheers,
  Gerd

 --
 http://kraxel.fedorapeople.org/xenner/
 --
 To unsubscribe from this list: send the line unsubscribe kvm in
 the body of a message to [EMAIL PROTECTED]
 More majordomo info at  http://vger.kernel.org/majordomo-info.html




-- 
Glauber Costa.
Free as in Freedom
http://glommer.net

The less confident you are, the more serious you have to act.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [PATCH 4/8] KVM: PCIPT: fix interrupt handling

2008-07-23 Thread Amit Shah
* On Wednesday 16 Jul 2008 18:47:01 Ben-Ami Yassour wrote:
 This patch fixes a few problems with the interrupt handling for
 passthrough devices.

 1. Pass the interrupt handler the pointer to the device, so we do not
 need to lock the pcipt lock in the interrupt handler.

 2. Remove the pt_irq_handled bitmap - it is no longer needed.

 3. Split kvm_pci_pt_work_fn into two functions, one for interrupt
 injection and another for the ack - is much simpler code this way.

 4. Change the passthrough initialization order - add the device
 structure to the list, before registering the interrupt handler.

 5. On passthrough destruction path, free the interrupt handler before
 cleaning queued work.

 Signed-off-by: Ben-Ami Yassour [EMAIL PROTECTED]
 ---

   if (irqchip_in_kernel(kvm)) {
 + match-pt_dev.guest.irq = pci_pt_dev-guest.irq;
 + match-pt_dev.host.irq = dev-irq;
 + if (kvm-arch.vioapic)
 + kvm-arch.vioapic-ack_notifier = kvm_pci_pt_ack_irq;
 + if (kvm-arch.vpic)
 + kvm-arch.vpic-ack_notifier = kvm_pci_pt_ack_irq;
 +

We shouldn't register this notifier unless we get the irq below to avoid 
unneeded function calls and checks.
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[ kvm-Bugs-2017966 ] Booting Vista Guest may crash host

2008-07-23 Thread SourceForge.net
Bugs item #2017966, was opened at 2008-07-14 09:30
Message generated for change (Settings changed) made by mtosatti
You can respond by visiting: 
https://sourceforge.net/tracker/?func=detailatid=893831aid=2017966group_id=180599

Please note that this message will contain a full copy of the comment thread,
including the initial issue submission, for this request,
not just the latest update.
Category: None
Group: None
Status: Closed
Resolution: None
Priority: 5
Private: No
Submitted By: Jiajun Xu (jiajun)
Assigned to: Nobody/Anonymous (nobody)
Summary: Booting Vista Guest may crash host

Initial Comment:
Booting Vista Guest may cause host hang on latest commit.
kvm.git a10cfebe86cf85a1d2ab02fccbc1e8c2b3eb92b5 and 
userspace.git fbd8c32b77751236b35397e05c0bc84c48833d97.

The issue does not happen every time, but booting Vista Guest for more than 10 
times can reproduce the bug. 

Serial output is attached.

--

Comment By: Jiajun Xu (jiajun)
Date: 2008-07-23 04:45

Message:
Logged In: YES 
user_id=2142959
Originator: YES

I verified on latest commit kvm.git
aa2ed2c1b5f020beace44ab7745d290d64cd6c89. The issue does not appear now.

--

Comment By: Marcelo Tosatti (mtosatti)
Date: 2008-07-22 16:42

Message:
Logged In: YES 
user_id=2022487
Originator: NO

Jiajun,

Can you try to reproduce that with current git as of today? I was
experiencing 
all sorts of host crashes this week, but since
ea8b7f0542e0420240d057f7954808c65c4d13fc
its back to normal.

Tested approx. 1h of continuous reboot on Vista 32 Business without
problems.


--

Comment By: Jiajun Xu (jiajun)
Date: 2008-07-14 10:08

Message:
Logged In: YES 
user_id=2142959
Originator: YES

It's Vista x86.

--

Comment By: Avi Kivity (avik)
Date: 2008-07-14 09:59

Message:
Logged In: YES 
user_id=539971
Originator: NO

Is this Vista x86 or Vista x64?

--

You can respond by visiting: 
https://sourceforge.net/tracker/?func=detailatid=893831aid=2017966group_id=180599
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


scsi broken 4GB RAM

2008-07-23 Thread Henrik Holst
I do not know if this is a bug in qemu or the linux kernel sym53c8xx
module (I haven't had the opportunity to test with anything other than
Linux at the moment) but if one starts an qemu instance with -m 4096
and larger the scsi emulated disk fails in the Linux guest.

If booting any install cd the /dev/sda is seen as only 512B in size
and if booting an ubuntu 8.04-amd64 with the secondary drive as scsi
it is seen with the correct size but one cannot read not write the
partition table.

Is there anyone out there that could test say a Windows image on scsi
with 4GB or more of RAM and see if it works or not? If so it could be
the linux driver that is faulty.

/Henrik Holst
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[ kvm-Bugs-2026321 ] -smp 2 has no effect and reduces stability

2008-07-23 Thread SourceForge.net
Bugs item #2026321, was opened at 2008-07-24 10:32
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting: 
https://sourceforge.net/tracker/?func=detailatid=893831aid=2026321group_id=180599

Please note that this message will contain a full copy of the comment thread,
including the initial issue submission, for this request,
not just the latest update.
Category: None
Group: None
Status: Open
Resolution: None
Priority: 5
Private: No
Submitted By: Daniel van Vugt (danv)
Assigned to: Nobody/Anonymous (nobody)
Summary: -smp 2 has no effect and reduces stability

Initial Comment:
CPU: Intel Core 2 Quad Q6600
Dist: Ubuntu 8.04.1 amd64 desktop
Kernel: 2.6.24-19-generic #1 SMP Fri Jul 11 21:01:46 UTC 2008 x86_64 GNU/Linux

Running KVM-70 or KVM-71 with -smp 2 seems to have no effect on the guest 
(tested both RHEL 4.0 and WinXP guests). The guest fails to see more than one 
CPU, and typing info cpus in the monitor makes KVM crash instantly (though if 
you're quick you can see it output info about 2 VCPUs before crashing).

--

You can respond by visiting: 
https://sourceforge.net/tracker/?func=detailatid=893831aid=2026321group_id=180599
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[ kvm-Bugs-2026321 ] -smp 2 has no effect and reduces stability

2008-07-23 Thread SourceForge.net
Bugs item #2026321, was opened at 2008-07-23 21:32
Message generated for change (Comment added) made by iggy_cav
You can respond by visiting: 
https://sourceforge.net/tracker/?func=detailatid=893831aid=2026321group_id=180599

Please note that this message will contain a full copy of the comment thread,
including the initial issue submission, for this request,
not just the latest update.
Category: None
Group: None
Status: Open
Resolution: None
Priority: 5
Private: No
Submitted By: Daniel van Vugt (danv)
Assigned to: Nobody/Anonymous (nobody)
Summary: -smp 2 has no effect and reduces stability

Initial Comment:
CPU: Intel Core 2 Quad Q6600
Dist: Ubuntu 8.04.1 amd64 desktop
Kernel: 2.6.24-19-generic #1 SMP Fri Jul 11 21:01:46 UTC 2008 x86_64 GNU/Linux

Running KVM-70 or KVM-71 with -smp 2 seems to have no effect on the guest 
(tested both RHEL 4.0 and WinXP guests). The guest fails to see more than one 
CPU, and typing info cpus in the monitor makes KVM crash instantly (though if 
you're quick you can see it output info about 2 VCPUs before crashing).

--

Comment By: Brian Jackson (iggy_cav)
Date: 2008-07-23 22:03

Message:
Logged In: YES 
user_id=611130
Originator: NO

I don't know about RHEL 4, but if you installed XP without -smp 1 then it
installs a uniprocessor HAL, which will never see more than one cpu.

I also tried info cpus and it worked fine.

I'm running kvm.git from 20080720 (tagged kvm-72rc1).

--

You can respond by visiting: 
https://sourceforge.net/tracker/?func=detailatid=893831aid=2026321group_id=180599
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: Simple way of putting a VM on a LAN

2008-07-23 Thread Bill Davidsen

Javier Guerra wrote:

On Wed, Jul 9, 2008 at 11:28 AM, Bill Davidsen [EMAIL PROTECTED] wrote:
  

A bit of the original problem seems to have been clipped before you read it,
or I stated it poorly.



i think you're very confused.  maybe you got it working the hard way,
but it's really simple to do the easy way.
  


Your easy way seems to mean using Debian, other distributions don't have 
some of the scripts, or they are in different places or do different 
things. Other thoughts below.

first, you have to do some small preparations on the host machine, but
nothing difficult.  this is what i do on my workstation (kubuntu) so
that i can fire up a test VM at any moment's whim:

- setup a bridge, and use it as main interface
- add a /etc/qemu-ifup script
- kvm kernel module
- make sure /dev/kvm and /dev/net/tun have the correct privilege access.

for the first one, in debian-like systems just use the following in
/dev/network/interfaces:
  


That's Debian thing.

# The loopback network interface
auto lo
iface lo inet loopback

# The primary network interface
auto br0
iface br0 inet static
address 172.18.13.66
netmask 255.255.0.0
network 172.18.0.0
broadcast 172.18.255.255
gateway 172.18.0.1
bridge_ports eth0

that makes br0 my main interface, and adds eth0 to it. when i'm not
running any VM, it doesn't interfere in any way, except for any
utilities that default to eth0... if that were a problem, i could
simply rename eth0=peth0 and br0=eth0 (i think the Xen scripts do
similar tricks)
  


That's an interesting trick. I don't know of any problems I'm having 
which require it, but a useful thing to consider.

when that's set, /etc/qemu-ifup just have to setup the tun/tap
interface and add to the bridge:
#!/bin/sh
ifconfig $1 0.0.0.0 promisc up
brctl addif br0 $1

and that's it!  no need to meddle with iptables.  note that i don't
even set the IP, the VM is connected to the LAN, and it setups it's
own IP from inside
  


Not being a trusting person I find that a bridge is an ineffective 
firewall, but with a bit of trickery that could live on the VM, to the 
extent it's needed. Now the sets up its own IP is a mystery, since 
there's no place I have told it what the IP of the machine it replaces 
might be. I did take the obvious step of setting the macadrs of the tap 
to that of the NIC in the original machine, but here I find a problem, 
at boot DHCP is not being used, or perhaps the issue is that some 
internal kvm DHCP service is being used instead of sending the requests 
out and letting my server provide the IP (and gateway, and nameservice, 
and etc). Setting up the IP and routing by hand does result in a working 
configuration, however, so other than the lack of control from using 
iptables to forward packets, it works well.


If the DHCP worked as expected it would really be easy.

hope that helps
  


I thank you for sharing your info, it was a good starting point even 
though some of the steps were not portable.


Well, it provides an easier way to get things working, there's one case 
where the iptables is still desirable, but that is a corner case for 
sure. Modulo the DHCP issue it works well, so I can say it did help, 
although not in the way you expected, I suspect.


I'm going to write it up while I can remember what I did and understand 
my notes. I have a bunch of tcpdump files from the physical NIC (eth0) 
and the bridge (br0), and wireshark, so I may get some idea of why DHCP 
isn't working, that would finish the job in most cases. Even if I have 
to do a bit of manual setup, it's faster than setting up iptables, and 
acceptably secure as long as the kvm host is at least as secure as the 
original.


--
Bill Davidsen [EMAIL PROTECTED]
 Woe unto the statesman who makes war without a reason that will still
 be valid when the war is over... Otto von Bismark 



--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[ kvm-Bugs-2026321 ] info cpus crashes KVM with -smp 2+

2008-07-23 Thread SourceForge.net
Bugs item #2026321, was opened at 2008-07-24 10:32
Message generated for change (Comment added) made by danv
You can respond by visiting: 
https://sourceforge.net/tracker/?func=detailatid=893831aid=2026321group_id=180599

Please note that this message will contain a full copy of the comment thread,
including the initial issue submission, for this request,
not just the latest update.
Category: None
Group: None
Status: Open
Resolution: None
Priority: 5
Private: No
Submitted By: Daniel van Vugt (danv)
Assigned to: Nobody/Anonymous (nobody)
Summary: info cpus crashes KVM with -smp 2+

Initial Comment:
CPU: Intel Core 2 Quad Q6600
Dist: Ubuntu 8.04.1 amd64 desktop
Kernel: 2.6.24-19-generic #1 SMP Fri Jul 11 21:01:46 UTC 2008 x86_64 GNU/Linux

Running KVM-70 or KVM-71 with -smp 2 seems to have no effect on the guest 
(tested both RHEL 4.0 and WinXP guests). The guest fails to see more than one 
CPU, and typing info cpus in the monitor makes KVM crash instantly (though if 
you're quick you can see it output info about 2 VCPUs before crashing).

--

Comment By: Daniel van Vugt (danv)
Date: 2008-07-24 13:10

Message:
Logged In: YES 
user_id=566150
Originator: YES

Yes, OK. I got it working with another guest: Ubuntu 6.06.1 server with
-smp 2. So I blame the first two guest OS's for not seeing the second CPU.

Now the only problem is the crash, so I've updated the summary.

--

Comment By: Brian Jackson (iggy_cav)
Date: 2008-07-24 11:03

Message:
Logged In: YES 
user_id=611130
Originator: NO

I don't know about RHEL 4, but if you installed XP without -smp 1 then it
installs a uniprocessor HAL, which will never see more than one cpu.

I also tried info cpus and it worked fine.

I'm running kvm.git from 20080720 (tagged kvm-72rc1).

--

You can respond by visiting: 
https://sourceforge.net/tracker/?func=detailatid=893831aid=2026321group_id=180599
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[ kvm-Bugs-2026321 ] info cpus crashes KVM with -smp 2+

2008-07-23 Thread SourceForge.net
Bugs item #2026321, was opened at 2008-07-24 10:32
Message generated for change (Comment added) made by danv
You can respond by visiting: 
https://sourceforge.net/tracker/?func=detailatid=893831aid=2026321group_id=180599

Please note that this message will contain a full copy of the comment thread,
including the initial issue submission, for this request,
not just the latest update.
Category: None
Group: None
Status: Open
Resolution: None
Priority: 5
Private: No
Submitted By: Daniel van Vugt (danv)
Assigned to: Nobody/Anonymous (nobody)
Summary: info cpus crashes KVM with -smp 2+

Initial Comment:
CPU: Intel Core 2 Quad Q6600
Dist: Ubuntu 8.04.1 amd64 desktop
Kernel: 2.6.24-19-generic #1 SMP Fri Jul 11 21:01:46 UTC 2008 x86_64 GNU/Linux

Running KVM-70 or KVM-71 with -smp 2 seems to have no effect on the guest 
(tested both RHEL 4.0 and WinXP guests). The guest fails to see more than one 
CPU, and typing info cpus in the monitor makes KVM crash instantly (though if 
you're quick you can see it output info about 2 VCPUs before crashing).

--

Comment By: Daniel van Vugt (danv)
Date: 2008-07-24 13:11

Message:
Logged In: YES 
user_id=566150
Originator: YES

Note also that the crash does not happen with -no-kvm.

--

Comment By: Daniel van Vugt (danv)
Date: 2008-07-24 13:10

Message:
Logged In: YES 
user_id=566150
Originator: YES

Yes, OK. I got it working with another guest: Ubuntu 6.06.1 server with
-smp 2. So I blame the first two guest OS's for not seeing the second CPU.

Now the only problem is the crash, so I've updated the summary.

--

Comment By: Brian Jackson (iggy_cav)
Date: 2008-07-24 11:03

Message:
Logged In: YES 
user_id=611130
Originator: NO

I don't know about RHEL 4, but if you installed XP without -smp 1 then it
installs a uniprocessor HAL, which will never see more than one cpu.

I also tried info cpus and it worked fine.

I'm running kvm.git from 20080720 (tagged kvm-72rc1).

--

You can respond by visiting: 
https://sourceforge.net/tracker/?func=detailatid=893831aid=2026321group_id=180599
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[ kvm-Bugs-2019053 ] tbench fails on guest when AMD NPT enabled

2008-07-23 Thread SourceForge.net
Bugs item #2019053, was opened at 2008-07-16 00:10
Message generated for change (Comment added) made by awwy
You can respond by visiting: 
https://sourceforge.net/tracker/?func=detailatid=893831aid=2019053group_id=180599

Please note that this message will contain a full copy of the comment thread,
including the initial issue submission, for this request,
not just the latest update.
Category: amd
Group: None
Status: Open
Resolution: None
Priority: 5
Private: No
Submitted By: Alex Williamson (alex_williamson)
Assigned to: Nobody/Anonymous (nobody)
Summary: tbench fails on guest when AMD NPT enabled

Initial Comment:
Running on a dual-socket system with AMD 2356 quad-core processors (8 total 
cores), 32GB RAM, Ubuntu Hardy 2.6.24-19-generic (64bit) with kvm-71 userspace 
and kernel modules.  With no module options, dmesg confirms: kvm: Nested Paging 
enabled

Start guest with:

/usr/local/kvm/bin/qemu-system-x86_64 -hda /dev/VM/Ubuntu64 -m 1024 -net 
nic,model=e1000,mac=de:ad:be:ef:00:01 -net tap,script=/root/bin/br0-ifup -smp 8 
-vnc :0

Guest VM is also Ubuntu Hardy 64bit.  On the guest run 'tbench 16 tbench 
server'.  System running tbench_srv is a different system in my case.

The tbench client will fail randomly, often quietly with Child failed with 
status 1, but sometimes more harshly with a glibc double free error.

If I unload the modules and reload w/o npt:

modprobe -r kvm-amd
modprobe -r kvm
modprobe kvm-amd npt=0

dmesg confirms: kvm: Nested Paging disabled

The tbench test now runs over and over successfully.  The test also runs fine 
on an Intel E5450 (no EPT).

--

Comment By: Alexander Graf (awwy)
Date: 2008-07-24 05:45

Message:
Logged In: YES 
user_id=376328
Originator: NO

I'm seeing random segfaults when using NPT on a host kernel = 2.6.23. So
far I have not been able to reproduce my test case breakages with an
openSUSE 10.3 kernel though, so could you please test that and verify if
tbench works for you on openSUSE 10.3? It does break with 11.0.

I have the feeling that we're seeing the same problem here.

--

Comment By: Alex Williamson (alex_williamson)
Date: 2008-07-16 15:18

Message:
Logged In: YES 
user_id=333914
Originator: YES

No, I added mlockall(MCL_CURRENT | MCL_FUTURE) to qemu/vl.c:main() and it
makes no difference.  I'm only starting a 1G guest on an otherwise idle 32G
host, so host memory pressure is pretty light.

--

Comment By: Avi Kivity (avik)
Date: 2008-07-16 14:19

Message:
Logged In: YES 
user_id=539971
Originator: NO

Strange.  If you add an mlockall() to qemu startup, does the test pass?

--

You can respond by visiting: 
https://sourceforge.net/tracker/?func=detailatid=893831aid=2019053group_id=180599
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[ kvm-Bugs-2019608 ] Ubuntu 8.04.1 (IA32 x86_64) - cannot install bootloader

2008-07-23 Thread SourceForge.net
Bugs item #2019608, was opened at 2008-07-16 15:03
Message generated for change (Comment added) made by awwy
You can respond by visiting: 
https://sourceforge.net/tracker/?func=detailatid=893831aid=2019608group_id=180599

Please note that this message will contain a full copy of the comment thread,
including the initial issue submission, for this request,
not just the latest update.
Category: intel
Group: None
Status: Open
Resolution: None
Priority: 5
Private: No
Submitted By: Johannes Truschnigg (c0l0)
Assigned to: Nobody/Anonymous (nobody)
Summary: Ubuntu 8.04.1 (IA32  x86_64) - cannot install bootloader

Initial Comment:
CPU: Intel Core 2 Quad Q6600 (4 cores)
Distro, kernel: Gentoo GNU/Linux ~amd64, Kernel 2.6.25-r6
Bitness, compiler: x86_64, GCC 4.3.1
KVM versions: kvm-70, kvm-71

When trying to install Ubuntu) either 32bit or 64bit) in a KVM guest, 
grub-install croaks with. The guest kernel debug ringbuffer shows the following 
messages:

(Please see http://pasted.at/9d7e95f873.html or the attached file!)

Windows XP also hangs at installing, actually before anthing substantial other 
than copying installation files gets done. The first phase of the install 
completes, however - the graphical installer that's started after the first 
reboot hangs indefinitely.

Worked fine with version = kvm-69 with the very same settings.

I'm happy to provide additional information upon request.

--

Comment By: Alexander Graf (awwy)
Date: 2008-07-24 05:56

Message:
Logged In: YES 
user_id=376328
Originator: NO

I am getting exactly the same error on SLES10 SP2. Running a 32-bit binary
in an x86_64 SLES10SP2 guest generates a #DF on a RIP, that looks like a
32-bit mangled kernel space address (80228ca0 vs.
80228ca0). Apparently something truncates it - I'll try to bisect.

--

You can respond by visiting: 
https://sourceforge.net/tracker/?func=detailatid=893831aid=2019608group_id=180599
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html