[PATCH] kvm: testsuite: test apic self ipi

2008-11-22 Thread Avi Kivity
From: Avi Kivity [EMAIL PROTECTED]

Signed-off-by: Avi Kivity [EMAIL PROTECTED]

diff --git a/user/test/x86/apic.c b/user/test/x86/apic.c
index 0047243..99bd511 100644
--- a/user/test/x86/apic.c
+++ b/user/test/x86/apic.c
@@ -7,6 +7,96 @@ static void *g_apic;
 typedef unsigned char u8;
 typedef unsigned short u16;
 typedef unsigned u32;
+typedef unsigned long ulong;
+
+typedef struct {
+unsigned short offset0;
+unsigned short selector;
+unsigned short ist : 3;
+unsigned short : 5;
+unsigned short type : 4;
+unsigned short : 1;
+unsigned short dpl : 2;
+unsigned short p : 1;
+unsigned short offset1;
+#ifdef __x86_64__
+unsigned offset2;
+unsigned reserved;
+#endif
+} idt_entry_t;
+
+typedef struct {
+ulong rflags;
+ulong cs;
+ulong rip;
+ulong func;
+ulong regs[sizeof(ulong)*2];
+} isr_regs_t;
+
+#ifdef __x86_64__
+#  define R r
+#else
+#  define R e
+#endif
+
+extern char isr_entry_point[];
+
+asm (
+isr_entry_point: \n
+#ifdef __x86_64__
+push %r15 \n\t
+push %r14 \n\t
+push %r13 \n\t
+push %r12 \n\t
+push %r11 \n\t
+push %r10 \n\t
+push %r9  \n\t
+push %r8  \n\t
+#endif
+push %Rdi \n\t
+push %Rsi \n\t
+push %Rbp \n\t
+push %Rsp \n\t
+push %Rbx \n\t
+push %Rdx \n\t
+push %Rcx \n\t
+push %Rax \n\t
+#ifdef __x86_64__
+mov %rsp, %rdi \n\t
+callq *8*16(%rsp) \n\t
+#else
+push %esp \n\t
+calll *4+4*8(%esp) \n\t
+add $4, %esp \n\t
+#endif
+pop %Rax \n\t
+pop %Rcx \n\t
+pop %Rdx \n\t
+pop %Rbx \n\t
+pop %Rbp \n\t
+pop %Rbp \n\t
+pop %Rsi \n\t
+pop %Rdi \n\t
+#ifdef __x86_64__
+pop %r8  \n\t
+pop %r9  \n\t
+pop %r10 \n\t
+pop %r11 \n\t
+pop %r12 \n\t
+pop %r13 \n\t
+pop %r14 \n\t
+pop %r15 \n\t
+#endif
+#ifdef __x86_64__
+add $8, %rsp \n\t
+iretq \n\t
+#else
+add $4, %esp \n\t
+iretl \n\t
+#endif
+);
+
+static idt_entry_t idt[256];
 
 static int g_fail;
 static int g_tests;
@@ -38,6 +128,95 @@ static void test_lapic_existence(void)
 report(apic existence, (u16)lvr == 0x14);
 }
 
+static u16 read_cs(void)
+{
+u16 v;
+
+asm(mov %%cs, %0 : =rm(v));
+return v;
+}
+
+static void init_idt(void)
+{
+struct {
+u16 limit;
+ulong idt;
+} __attribute__((packed)) idt_ptr = {
+sizeof(idt_entry_t) * 256 - 1,
+(ulong)idt,
+};
+
+asm volatile(lidt %0 : : m(idt_ptr));
+}
+
+static void set_idt_entry(unsigned vec, void (*func)(isr_regs_t *regs))
+{
+u8 *thunk = vmalloc(50);
+ulong ptr = (ulong)thunk;
+idt_entry_t ent = {
+.offset0 = ptr,
+.selector = read_cs(),
+.ist = 0,
+.type = 14,
+.dpl = 0,
+.p = 1,
+.offset1 = ptr  16,
+#ifdef __x86_64__
+.offset2 = ptr  32,
+#endif
+};
+#ifdef __x86_64__
+/* sub $8, %rsp */
+*thunk++ = 0x48; *thunk++ = 0x83; *thunk++ = 0xec; *thunk++ = 0x08;
+/* mov $func_low, %(rsp) */
+*thunk++ = 0xc7; *thunk++ = 0x04; *thunk++ = 0x24;
+*(u32 *)thunk = (ulong)func; thunk += 4;
+/* mov $func_high, %(rsp+4) */
+*thunk++ = 0xc7; *thunk++ = 0x44; *thunk++ = 0x24; *thunk++ = 0x04;
+*(u32 *)thunk = (ulong)func  32; thunk += 4;
+/* jmp isr_entry_point */
+*thunk ++ = 0xe9;
+*(u32 *)thunk = (ulong)isr_entry_point - (ulong)(thunk + 4);
+#else
+/* push $func */
+*thunk++ = 0x68;
+*(u32 *)thunk = (ulong)func;
+/* jmp isr_entry_point */
+*thunk ++ = 0xe9;
+*(u32 *)thunk = (ulong)isr_entry_point - (ulong)(thunk + 4);
+#endif
+idt[vec] = ent;
+}
+
+static void irq_enable(void)
+{
+asm volatile(sti);
+}
+
+static int ipi_count;
+
+static void self_ipi_isr(isr_regs_t *regs)
+{
+++ipi_count;
+}
+
+static void test_self_ipi(void)
+{
+int vec = 0xf1;
+
+set_idt_entry(vec, self_ipi_isr);
+irq_enable();
+apic_write(APIC_ICR,
+   APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_FIXED | vec);
+asm volatile (nop);
+report(self ipi, ipi_count == 1);
+}
+
+static void enable_apic(void)
+{
+apic_write(0xf0, 0x1ff); /* spurious vector register */
+}
+
 int main()
 {
 setup_vm();
@@ -46,6 +225,11 @@ int main()
 
 test_lapic_existence();
 
+enable_apic();
+init_idt();
+
+test_self_ipi();
+
 printf(\nsummary: %d tests, %d failures\n, g_tests, g_fail);
 
 return g_fail != 0;
--
To unsubscribe from this list: send the line unsubscribe kvm-commits in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[PATCH] kvm: testsuite: add apic tests

2008-11-22 Thread Avi Kivity
From: Avi Kivity [EMAIL PROTECTED]

Signed-off-by: Avi Kivity [EMAIL PROTECTED]

diff --git a/user/config-x86-common.mak b/user/config-x86-common.mak
index b0337c9..edbf6e4 100644
--- a/user/config-x86-common.mak
+++ b/user/config-x86-common.mak
@@ -51,6 +51,9 @@ $(TEST_DIR)/port80.flat: $(cstart.o) $(TEST_DIR)/port80.o
 
 $(TEST_DIR)/tsc.flat: $(cstart.o) $(TEST_DIR)/tsc.o
 
+$(TEST_DIR)/apic.flat: $(cstart.o) $(TEST_DIR)/apic.o $(TEST_DIR)/vm.o \
+  $(TEST_DIR)/print.o 
+
 $(TEST_DIR)/realmode.flat: $(TEST_DIR)/realmode.o
$(CC) -m32 -nostdlib -o $@ -Wl,-T,$(TEST_DIR)/realmode.lds $^
 
diff --git a/user/config-x86_64.mak b/user/config-x86_64.mak
index 237f3c7..b50b540 100644
--- a/user/config-x86_64.mak
+++ b/user/config-x86_64.mak
@@ -8,6 +8,6 @@ CFLAGS += -I $(KERNELDIR)/include
 tests = $(TEST_DIR)/access.flat $(TEST_DIR)/irq.flat $(TEST_DIR)/sieve.flat \
   $(TEST_DIR)/simple.flat $(TEST_DIR)/stringio.flat \
   $(TEST_DIR)/memtest1.flat $(TEST_DIR)/emulator.flat \
-  $(TEST_DIR)/hypercall.flat
+  $(TEST_DIR)/hypercall.flat $(TEST_DIR)/apic.flat
 
 include config-x86-common.mak
diff --git a/user/test/x86/apic.c b/user/test/x86/apic.c
new file mode 100644
index 000..0047243
--- /dev/null
+++ b/user/test/x86/apic.c
@@ -0,0 +1,52 @@
+#include libcflat.h
+#include apic.h
+#include vm.h
+
+static void *g_apic;
+
+typedef unsigned char u8;
+typedef unsigned short u16;
+typedef unsigned u32;
+
+static int g_fail;
+static int g_tests;
+
+static void report(const char *msg, int pass)
+{
+++g_tests;
+printf(%s: %s\n, msg, (pass ? PASS : FAIL));
+if (!pass)
+++g_fail;
+}
+
+static u32 apic_read(unsigned reg)
+{
+return *(volatile u32 *)(g_apic + reg);
+}
+
+static void apic_write(unsigned reg, u32 val)
+{
+*(volatile u32 *)(g_apic + reg) = val;
+}
+
+static void test_lapic_existence(void)
+{
+u32 lvr;
+
+lvr = apic_read(APIC_LVR);
+printf(apic version: %x\n, lvr);
+report(apic existence, (u16)lvr == 0x14);
+}
+
+int main()
+{
+setup_vm();
+
+g_apic = vmap(0xfee0, 0x1000);
+
+test_lapic_existence();
+
+printf(\nsummary: %d tests, %d failures\n, g_tests, g_fail);
+
+return g_fail != 0;
+}
diff --git a/user/test/x86/apic.h b/user/test/x86/apic.h
new file mode 100644
index 000..c061e3d
--- /dev/null
+++ b/user/test/x86/apic.h
@@ -0,0 +1,133 @@
+#ifndef _ASM_X86_APICDEF_H
+#define _ASM_X86_APICDEF_H
+
+/*
+ * Constants for various Intel APICs. (local APIC, IOAPIC, etc.)
+ *
+ * Alan Cox [EMAIL PROTECTED], 1995.
+ * Ingo Molnar [EMAIL PROTECTED], 1999, 2000
+ */
+
+#defineAPIC_DEFAULT_PHYS_BASE  0xfee0
+
+#defineAPIC_ID 0x20
+
+#defineAPIC_LVR0x30
+#defineAPIC_LVR_MASK   0xFF00FF
+#defineGET_APIC_VERSION(x) ((x)  0xFFu)
+#defineGET_APIC_MAXLVT(x)  (((x)  16)  0xFFu)
+#ifdef CONFIG_X86_32
+#  define  APIC_INTEGRATED(x)  ((x)  0xF0u)
+#else
+#  define  APIC_INTEGRATED(x)  (1)
+#endif
+#defineAPIC_XAPIC(x)   ((x) = 0x14)
+#defineAPIC_TASKPRI0x80
+#defineAPIC_TPRI_MASK  0xFFu
+#defineAPIC_ARBPRI 0x90
+#defineAPIC_ARBPRI_MASK0xFFu
+#defineAPIC_PROCPRI0xA0
+#defineAPIC_EOI0xB0
+#defineAPIC_EIO_ACK0x0
+#defineAPIC_RRR0xC0
+#defineAPIC_LDR0xD0
+#defineAPIC_LDR_MASK   (0xFFu  24)
+#defineGET_APIC_LOGICAL_ID(x)  (((x)  24)  0xFFu)
+#defineSET_APIC_LOGICAL_ID(x)  (((x)  24))
+#defineAPIC_ALL_CPUS   0xFFu
+#defineAPIC_DFR0xE0
+#defineAPIC_DFR_CLUSTER0x0FFFul
+#defineAPIC_DFR_FLAT   0xul
+#defineAPIC_SPIV   0xF0
+#defineAPIC_SPIV_FOCUS_DISABLED(1  9)
+#defineAPIC_SPIV_APIC_ENABLED  (1  8)
+#defineAPIC_ISR0x100
+#defineAPIC_ISR_NR 0x8 /* Number of 32 bit ISR registers. */
+#defineAPIC_TMR0x180
+#defineAPIC_IRR0x200
+#defineAPIC_ESR0x280
+#defineAPIC_ESR_SEND_CS0x1
+#defineAPIC_ESR_RECV_CS0x2
+#defineAPIC_ESR_SEND_ACC   0x4
+#defineAPIC_ESR_RECV_ACC   0x8
+#defineAPIC_ESR_SENDILL0x00020
+#defineAPIC_ESR_RECVILL0x00040
+#defineAPIC_ESR_ILLREGA0x00080
+#defineAPIC_ICR0x300
+#defineAPIC_DEST_SELF  0x4
+#defineAPIC_DEST_ALLINC0x8
+#defineAPIC_DEST_ALLBUT0xC
+#defineAPIC_ICR_RR_MASK0x3
+#define

[PATCH] kvm: testsuite: add ioapic test

2008-11-22 Thread Avi Kivity
From: Avi Kivity [EMAIL PROTECTED]

Signed-off-by: Avi Kivity [EMAIL PROTECTED]

diff --git a/user/test/x86/apic.c b/user/test/x86/apic.c
index 6686d94..6b55e77 100644
--- a/user/test/x86/apic.c
+++ b/user/test/x86/apic.c
@@ -3,6 +3,7 @@
 #include vm.h
 
 static void *g_apic;
+static void *g_ioapic;
 
 typedef unsigned char u8;
 typedef unsigned short u16;
@@ -218,6 +219,71 @@ static void test_self_ipi(void)
 report(self ipi, ipi_count == 1);
 }
 
+static void ioapic_write_reg(unsigned reg, u32 value)
+{
+*(volatile u32 *)g_ioapic = reg;
+*(volatile u32 *)(g_ioapic + 0x10) = value;
+}
+
+typedef struct {
+u8 vector;
+u8 delivery_mode:3;
+u8 dest_mode:1;
+u8 delivery_status:1;
+u8 polarity:1;
+u8 remote_irr:1;
+u8 trig_mode:1;
+u8 mask:1;
+u8 reserve:7;
+u8 reserved[4];
+u8 dest_id;
+} ioapic_redir_entry_t;
+
+static void ioapic_write_redir(unsigned line, ioapic_redir_entry_t e)
+{
+ioapic_write_reg(0x10 + line * 2 + 0, ((u32 *)e)[0]);
+ioapic_write_reg(0x10 + line * 2 + 1, ((u32 *)e)[1]);
+}
+
+static void set_ioapic_redir(unsigned line, unsigned vec)
+{
+ioapic_redir_entry_t e = {
+.vector = vec,
+.delivery_mode = 0,
+.trig_mode = 0,
+};
+
+ioapic_write_redir(line, e);
+}
+
+static void set_irq_line(unsigned line, int val)
+{
+asm volatile(out %0, %1 : : a((u8)val), d((u16)(0x2000 + line)));
+}
+
+static void toggle_irq_line(unsigned line)
+{
+set_irq_line(line, 1);
+set_irq_line(line, 0);
+}
+
+static int g_isr_77;
+
+static void ioapic_isr_77(isr_regs_t *regs)
+{
+++g_isr_77;
+eoi();
+}
+
+static void test_ioapic_intr(void)
+{
+set_idt_entry(0x77, ioapic_isr_77);
+set_ioapic_redir(0x10, 0x77);
+toggle_irq_line(0x10);
+asm volatile (nop);
+report(ioapic interrupt, g_isr_77 == 1);
+}
+
 static void enable_apic(void)
 {
 apic_write(0xf0, 0x1ff); /* spurious vector register */
@@ -228,6 +294,7 @@ int main()
 setup_vm();
 
 g_apic = vmap(0xfee0, 0x1000);
+g_ioapic = vmap(0xfec0, 0x1000);
 
 test_lapic_existence();
 
@@ -236,6 +303,8 @@ int main()
 
 test_self_ipi();
 
+test_ioapic_intr();
+
 printf(\nsummary: %d tests, %d failures\n, g_tests, g_fail);
 
 return g_fail != 0;
--
To unsubscribe from this list: send the line unsubscribe kvm-commits in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [PATCH] KVM: VMX: Fix race between pending IRQ and NMI

2008-11-22 Thread Avi Kivity

Jan Kiszka wrote:

But I think I see a bigger issue - if we inject an regular interrupt
while another is pending, then we will encounter this problem.  Looks
like we have to enable the interrupt window after injecting an interrupt
if there are still pending interrupts.



Yeah, probably. I'm just wondering now if we can set
exit-on-interrupt-window while the vcpu state is interruptible (ie.
_before_ the injection). There is some entry check like this for NMIs,
but maybe no for interrupts. Need to check.
  


Turns out it's not necessary, since the guest eoi will cause an exit and 
allow the code to request an interrupt window.


I've added an apic test program so we can track these issues 
(user/test/x86/apic.c).


--
I have a truly marvellous patch that fixes the bug which this
signature is too narrow to contain.

--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: virtio_net hang

2008-11-22 Thread Emmanuel Lacour
On Fri, Nov 21, 2008 at 09:38:23AM +0100, Emmanuel Lacour wrote:
 
 I continue to have this problem with this setup:
 
 - host 2.6.27.4, kvm-78, intel, debian etch 64bits
 - guest 2.6.27.6, debian sarge 32 bits, e1000, 2 vcpus
 
 up/down of interface is enough to recover.
 


Today I had a trace on this problem (first time), maybe this can help:

Nov 21 14:34:42 foo kernel: [58345.000104] [ cut here ]
Nov 21 14:34:42 foo kernel: [58345.000617] WARNING: at 
net/sched/sch_generic.c:219 dev_watchdog+0x164/0x1fd()
Nov 21 14:34:42 foo kernel: [58345.001374] NETDEV WATCHDOG: eth0 (e1000): 
transmit timed out
Nov 21 14:34:42 foo kernel: [58345.001825] Modules linked in: nfsd auth_rpcgss 
exportfs ac battery ipv6 nfs lockd nfs_acl sunrpc nf_nat_ftp nf_conntrack_ftp 
xt_tcpudp iptable_mangle iptable_nat nf_nat ipt_REJECT xt_limit 
nf_conntrack_ipv4 xt_state nf_conntrack ipt_LOG ipt_ULOG iptable_filter 
ip_tables x_tables dm_mod sd_mod snd_pcsp virtio_balloon snd_pcm snd_timer snd 
soundcore floppy snd_page_alloc psmouse serio_raw virtio_pci i2c_piix4 button 
i2c_core evdev ext3 jbd mbcache ide_cd_mod cdrom ide_disk ata_generic ata_piix 
libata scsi_mod dock piix ide_core uhci_hcd e1000 usbcore thermal processor fan 
thermal_sys
Nov 21 14:34:42 foo kernel: [58345.022597] Pid: 0, comm: swapper Not tainted 
2.6.27.6 #1
Nov 21 14:34:42 foo kernel: [58345.023027]  [c0126295] warn_slowpath+0x58/0x70
Nov 21 14:34:42 foo kernel: [58345.023470]  [c028e96b] ip_output+0x8e/0x90
Nov 21 14:34:42 foo kernel: [58345.029292]  [c028e3ab] ip_local_out+0x15/0x17
Nov 21 14:34:42 foo kernel: [58345.030231]  [c028ec1d] 
ip_queue_xmit+0x2b0/0x2f7
Nov 21 14:34:42 foo kernel: [58345.030684]  [c01169c7] 
pvclock_get_nsec_offset+0xb/0x59
Nov 21 14:34:42 foo kernel: [58345.031163]  [c0116a79] 
pvclock_clocksource_read+0x1a/0x2d
Nov 21 14:34:42 foo kernel: [58345.031642]  [c01169c7] 
pvclock_get_nsec_offset+0xb/0x59
Nov 21 14:34:42 foo kernel: [58345.032130]  [c0116a79] 
pvclock_clocksource_read+0x1a/0x2d
Nov 21 14:34:42 foo kernel: [58345.032608]  [c01169c7] 
pvclock_get_nsec_offset+0xb/0x59
Nov 21 14:34:42 foo kernel: [58345.033080]  [c01169c7] 
pvclock_get_nsec_offset+0xb/0x59
Nov 21 14:34:42 foo kernel: [58345.033570]  [c01169c7] 
pvclock_get_nsec_offset+0xb/0x59
Nov 21 14:34:42 foo kernel: [58345.034036]  [c0116a79] 
pvclock_clocksource_read+0x1a/0x2d
Nov 21 14:34:42 foo kernel: [58345.034506]  [c027e572] 
dev_watchdog+0x164/0x1fd
Nov 21 14:34:42 foo kernel: [58345.034951]  [c0139cf7] 
__atomic_notifier_call_chain+0x10/0x13
Nov 21 14:34:42 foo kernel: [58345.035455]  [c02d4c73] _spin_lock_bh+0xf/0x12
Nov 21 14:34:42 foo kernel: [58345.035898]  [c012d9a4] 
timer_stats_account_timer+0x22/0x27
Nov 21 14:34:42 foo kernel: [58345.036384]  [c012dfcf] 
run_timer_softirq+0x11f/0x183
Nov 21 14:34:42 foo kernel: [58345.036840]  [c027e40e] dev_watchdog+0x0/0x1fd
Nov 21 14:34:42 foo kernel: [58345.037278]  [c01390dc] 
hrtimer_interrupt+0x136/0x15e
Nov 21 14:34:42 foo kernel: [58345.037736]  [c012a53f] __do_softirq+0x69/0xd3
Nov 21 14:34:42 foo kernel: [58345.038172]  [c012a5ed] do_softirq+0x44/0x52
Nov 21 14:34:42 foo kernel: [58345.038608]  [c012a67e] irq_exit+0x38/0x6c
Nov 21 14:34:42 foo kernel: [58345.039035]  [c01106f1] 
smp_apic_timer_interrupt+0x2a/0x33
Nov 21 14:34:42 foo kernel: [58345.039518]  [c0104434] 
apic_timer_interrupt+0x28/0x30
Nov 21 14:34:42 foo kernel: [58345.039980]  [c0116560] 
native_safe_halt+0x2/0x3
Nov 21 14:34:42 foo kernel: [58345.040443]  [c0109196] default_idle+0x2e/0x54
Nov 21 14:34:42 foo kernel: [58345.040886]  [c01020ff] cpu_idle+0xc4/0xf7
Nov 21 14:34:42 foo kernel: [58345.041310]  ===
Nov 21 14:34:42 foo kernel: [58345.041692] ---[ end trace 934a9cb836d2434b ]---
Nov 21 14:34:42 foo kernel: [58345.080575] e1000: eth0: e1000_watchdog: NIC 
Link is Up 1000 Mbps Full Duplex, Flow Control: None
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[ kvm-Bugs-2327497 ] NFS copy makes guest network unstable

2008-11-22 Thread SourceForge.net
Bugs item #2327497, was opened at 2008-11-22 07:53
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting: 
https://sourceforge.net/tracker/?func=detailatid=893831aid=2327497group_id=180599

Please note that this message will contain a full copy of the comment thread,
including the initial issue submission, for this request,
not just the latest update.
Category: None
Group: None
Status: Open
Resolution: None
Priority: 5
Private: No
Submitted By: Jiajun Xu (jiajun)
Assigned to: Nobody/Anonymous (nobody)
Summary: NFS copy makes guest network unstable

Initial Comment:
The NFS network of KVM guest is very unstable. When we copy a 600M file to the 
guest by NFS mount. The guest's network will down after finishing at about 500M 
size. 
Then, guest's network is down. Host also can not use ping or scp. And 
sometimes, host also complains: ping: sendmsg: No buffer space available. I see 
memory by 'free', there is only 69MB free (While totally 8GB on the machine!).

Using scp to copy file can not reproduce it. This issue is very easy to be 
reproduced (50%). 


Reproduce steps:

1. Create a guest and config NFS sharing folder on it
2. Mount the nfs folder to local folder --- /media
3. cp xxx /media
4. After some time, guest network is down


--

You can respond by visiting: 
https://sourceforge.net/tracker/?func=detailatid=893831aid=2327497group_id=180599
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Weekly KVM Test report, kernel 30d95f ... userspace fc94d1 ...

2008-11-22 Thread Xu, Jiajun
Hi All,

This is our Weekly KVM Testing Report against lastest kvm.git
30d95f352f0f7da8788016894db3b2a7efdd3674 and kvm-userspace.git
fc94d163d1e3424199166cf50449e03447400579.
There is no big new issue found this week. One Guest network issue is found in 
our testing.

One New issue:

1. NFS copy makes guest network unstable
https://sourceforge.net/tracker/index.php?func=detailaid=2327497group_id=180599atid=893831


Five Old Issues:

1. 32bits Rhel5/FC6 guest may fail to reboot after installation
https://sourceforge.net/tracker/?func=detailatid=893831aid=1991647group_id=180599

2. failure to migrate guests with more than 4GB of RAM
https://sourceforge.net/tracker/index.php?func=detailaid=1971512group_id=180599atid=893831

3. OpenSuse10.2 can not be installed
http://sourceforge.net/tracker/index.php?func=detailaid=2088475group_id=180599atid=893831

4. Fail to Save Restore Guest
https://sourceforge.net/tracker/?func=detailatid=893831aid=2175042group_id=180599

5. SMP IA32e RHEL5.1 guest can not boot up
https://sourceforge.net/tracker/index.php?func=detailaid=2215532group_id=180599atid=893831


Test environment

Platform  A
Stoakley/Clovertown
CPU 4
Memory size 8G'

Report Summary on IA32-pae
   Summary Test Report of Last Session
=
Total   PassFailNoResult   Crash
=
control_panel   8   7   1 00
gtest   16  15  1 00
=
control_panel   8   7   1 00
 :KVM_256M_guest_PAE_gPAE   1   1   0 00
 :KVM_linux_win_PAE_gPAE1   1   0 00
 :KVM_two_winxp_PAE_gPAE1   1   0 00
 :KVM_four_sguest_PAE_gPA   1   1   0 00
 :KVM_1500M_guest_PAE_gPA   1   1   0 00
 :KVM_LM_Continuity_PAE_g   1   1   0 00
 :KVM_LM_SMP_PAE_gPAE   1   1   0 00
 :KVM_SR_Continuity_PAE_g   1   0   1 00
gtest   16  15  1 00
 :ltp_nightly_PAE_gPAE  1   1   0 00
 :boot_up_acpi_PAE_gPAE 1   1   0 00
 :boot_up_acpi_xp_PAE_gPA   1   1   0 00
 :boot_up_vista_PAE_gPAE1   1   0 00
 :reboot_xp_PAE_gPAE1   1   0 00
 :boot_base_kernel_PAE_gP   1   1   0 00
 :boot_up_acpi_win2k3_PAE   1   1   0 00
 :boot_smp_acpi_win2k3_PA   1   1   0 00
 :boot_smp_acpi_win2k_PAE   1   1   0 00
 :boot_up_win2008_PAE_gPA   1   1   0 00
 :boot_up_acpi_win2k_PAE_   1   1   0 00
 :boot_smp_acpi_xp_PAE_gP   1   1   0 00
 :boot_up_noacpi_win2k_PA   1   1   0 00
 :boot_smp_vista_PAE_gPAE   1   1   0 00
 :boot_smp_win2008_PAE_gP   1   0   1 00
 :kb_nightly_PAE_gPAE   1   1   0 00
=
Total   24  22  2 00

Report Summary on IA32e
   Summary Test Report of Last Session
=
Total   PassFailNoResult   Crash
=
control_panel   17  13  4 00
gtest   23  21  2 00
=
control_panel   17  13  4 00
 :KVM_4G_guest_64_g32e  1   1   0 00
 :KVM_four_sguest_64_gPAE   1   1   0 00
 :KVM_LM_SMP_64_g32e1   0   1 00
 :KVM_linux_win_64_gPAE 1   1   0 00
 :KVM_LM_SMP_64_gPAE1   1   0 00
 :KVM_SR_Continuity_64_gP   1   0   1 00
 :KVM_four_sguest_64_g32e   1   1   0 00
 :KVM_four_dguest_64_gPAE   1   1   0 00
 :KVM_SR_SMP_64_gPAE1   0   1 00
 :KVM_LM_Continuity_64_g3   1   1   0 00
 :KVM_1500M_guest_64_gPAE   1   1   0 00
 :KVM_LM_Continuity_64_gP   1   1   0 00
 

kvm kernel backtrace 2.6.27.3 using kvm 78 userspace

2008-11-22 Thread Kasper Sandberg
Hello.

I just noticed that my dmesg had been flooded with backtraces, appearing
to be of KVM origin. I realize that my kernel is tainted, and slightly
outdated, however, i just wanted to drop the log here in case it might
be useful, but feel free to completely ignore it :)

i am not subscribed to the kvm list, so please cc me in case you need
further info..

my entire dmesg was flooded with backtraces looking practically
identical to this one, so i will only paste a few of them, however,
should you want more(though from a quick look they appear identical), i
can put online the complete log

kvm_handle_exit: unexpected, valid vectoring info and exit reason is 0x9
[ cut here ]
WARNING: at arch/x86/kvm/x86.c:185 kvm_queue_exception_e+0x63/0x70
[kvm]()
Modules linked in: tun ext3 jbd mbcache usb_storage cryptomgr cbc
aes_x86_64 aes_generic dm_crypt dm_mod crypto_blkcipher sha256_generic
crypto_algapi coretemp it87 hwmon_vid hwmon snd_seq kvm_intel kvm fuse
nvidia(P) snd_usb_audio snd_hda_intel snd_usb_lib snd_rawmidi
snd_seq_device snd_pcm snd_timer snd_hwdep psmouse thermal ehci_hcd rtc
snd ohci1394 ieee1394 soundcore i2c_core processor snd_page_alloc r8169
button
Pid: 20168, comm: kvm Tainted: PW 2.6.27.3 #1

Call Trace:
 [80235c84] warn_on_slowpath+0x64/0xb0
 [a0899c01] paging64_gva_to_gpa+0x21/0x50 [kvm]
 [a088cc09] gfn_to_hva+0x9/0x70 [kvm]
 [a088ccd1] kvm_read_guest_page+0x61/0x70 [kvm]
 [a088cd28] kvm_read_guest+0x48/0x80 [kvm]
 [a08931ae] load_guest_segment_descriptor+0x6e/0xb0 [kvm]
 [a0893133] kvm_queue_exception_e+0x63/0x70 [kvm]
 [a08941de] kvm_task_switch+0x2ee/0x9f0 [kvm]
 [a088ed4c] ioapic_service+0x1ec/0x340 [kvm]
 [804b2af7] __down_read+0x17/0xa6
 [a0893566] kvm_arch_vcpu_ioctl_run+0x266/0x6f0 [kvm]
 [a088c502] kvm_vcpu_ioctl+0x2b2/0x480 [kvm]
 [8022ee76] try_to_wake_up+0xf6/0x1b0
 [8022ba4a] __wake_up_common+0x5a/0x90
 [8022bea3] __wake_up+0x43/0x70
 [802556ff] wake_futex+0x1f/0x30
 [80257961] do_futex+0x881/0xa70
 [a08b2ca0] handle_io+0x0/0x60 [kvm_intel]
 [802a0f46] vfs_ioctl+0x36/0xb0
 [802a0f3f] vfs_ioctl+0x2f/0xb0
 [802a124b] do_vfs_ioctl+0x28b/0x2f0
 [802a1351] sys_ioctl+0xa1/0xb0
 [8020bacb] system_call_fastpath+0x16/0x1b

---[ end trace dc61957677c4cb77 ]---
kvm_handle_exit: unexpected, valid vectoring info and exit reason is 0x9
[ cut here ]
WARNING: at arch/x86/kvm/x86.c:185 kvm_queue_exception_e+0x63/0x70
[kvm]()
Modules linked in: tun ext3 jbd mbcache usb_storage cryptomgr cbc
aes_x86_64 aes_generic dm_crypt dm_mod crypto_blkcipher sha256_generic
crypto_algapi coretemp it87 hwmon_vid hwmon snd_seq kvm_intel kvm fuse
nvidia(P) snd_usb_audio snd_hda_intel snd_usb_lib snd_rawmidi
snd_seq_device snd_pcm snd_timer snd_hwdep psmouse thermal ehci_hcd rtc
snd ohci1394 ieee1394 soundcore i2c_core processor snd_page_alloc r8169
button
Pid: 20168, comm: kvm Tainted: PW 2.6.27.3 #1

Call Trace:
 [80235c84] warn_on_slowpath+0x64/0xb0
 [a0899c01] paging64_gva_to_gpa+0x21/0x50 [kvm]
 [a088cc09] gfn_to_hva+0x9/0x70 [kvm]
 [a088ccd1] kvm_read_guest_page+0x61/0x70 [kvm]
 [a088cd28] kvm_read_guest+0x48/0x80 [kvm]
 [a08931ae] load_guest_segment_descriptor+0x6e/0xb0 [kvm]
 [a0893133] kvm_queue_exception_e+0x63/0x70 [kvm]
 [a08941de] kvm_task_switch+0x2ee/0x9f0 [kvm]
 [a088ed4c] ioapic_service+0x1ec/0x340 [kvm]
 [804b2af7] __down_read+0x17/0xa6
 [a0893566] kvm_arch_vcpu_ioctl_run+0x266/0x6f0 [kvm]
 [a088c502] kvm_vcpu_ioctl+0x2b2/0x480 [kvm]
 [8022ee76] try_to_wake_up+0xf6/0x1b0
 [8022ba4a] __wake_up_common+0x5a/0x90
 [8022bea3] __wake_up+0x43/0x70
 [802556ff] wake_futex+0x1f/0x30
 [80257961] do_futex+0x881/0xa70
 [a08b2ca0] handle_io+0x0/0x60 [kvm_intel]
 [802a0f46] vfs_ioctl+0x36/0xb0
 [802a0f3f] vfs_ioctl+0x2f/0xb0
 [802a124b] do_vfs_ioctl+0x28b/0x2f0
 [802a1351] sys_ioctl+0xa1/0xb0
 [8020bacb] system_call_fastpath+0x16/0x1b

---[ end trace dc61957677c4cb77 ]---
kvm_handle_exit: unexpected, valid vectoring info and exit reason is 0x9
[ cut here ]
WARNING: at arch/x86/kvm/x86.c:185 kvm_queue_exception_e+0x63/0x70
[kvm]()
Modules linked in: tun ext3 jbd mbcache usb_storage cryptomgr cbc
aes_x86_64 aes_generic dm_crypt dm_mod crypto_blkcipher sha256_generic
crypto_algapi coretemp it87 hwmon_vid hwmon snd_seq kvm_intel kvm fuse
nvidia(P) snd_usb_audio snd_hda_intel snd_usb_lib snd_rawmidi
snd_seq_device snd_pcm snd_timer snd_hwdep psmouse thermal ehci_hcd rtc
snd ohci1394 ieee1394 soundcore i2c_core processor snd_page_alloc r8169
button
Pid: 20168, comm: kvm Tainted: PW 2.6.27.3 #1

Call Trace:
 [80235c84] warn_on_slowpath+0x64/0xb0
 

[PATCH 0 of 2] libcflat test for PowerPC

2008-11-22 Thread Deepa Srinivasan
Add Hello world test for libcflat. Also, fix CFLAGS issue in 
config-powerpc.mak.
--
To unsubscribe from this list: send the line unsubscribe kvm-ppc in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[PATCH 2 of 2] kvm-userspace: ppc: Move the -ffreestanding option to the right location

2008-11-22 Thread Deepa Srinivasan
# HG changeset patch
# User Deepa Srinivasan [EMAIL PROTECTED]
# Date 1227381016 21600
# Node ID 285f7f7d0b0b574edcde943e43a0218e477e50bb
# Parent  47c2e401b8e2c995da56dad4a167f6f59352f94e
kvm-userspace: ppc: Move the -ffreestanding option to the right location.

From: Deepa Srinivasan [EMAIL PROTECTED]

Move the -ffreestanding compiler option (to avoid any checks for built-in 
functions)
to the correct place in the make file.

Signed-off-by: Deepa Srinivasan [EMAIL PROTECTED]
---

[diffstat]
 config-powerpc.mak |2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

[diff]

diff -r 47c2e401b8e2 -r 285f7f7d0b0b user/config-powerpc.mak
--- a/user/config-powerpc.mak   Sat Nov 22 13:10:16 2008 -0600
+++ b/user/config-powerpc.mak   Sat Nov 22 13:10:16 2008 -0600
@@ -1,5 +1,6 @@
 CFLAGS += -I $(KERNELDIR)/include
 CFLAGS += -Wa,-mregnames -I test/lib
+CFLAGS += -ffreestanding
 
 cstart := test/powerpc/cstart.o
 
@@ -7,7 +8,6 @@
test/lib/powerpc/io.o
 
 $(libcflat): LDFLAGS += -nostdlib
-$(libcflat): CFLAGS += -ffreestanding
 
 # these tests do not use libcflat
 simpletests := \
--
To unsubscribe from this list: send the line unsubscribe kvm-ppc in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html