[PATCH] kvm: testsuite: test apic self ipi
From: Avi Kivity [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] diff --git a/user/test/x86/apic.c b/user/test/x86/apic.c index 0047243..99bd511 100644 --- a/user/test/x86/apic.c +++ b/user/test/x86/apic.c @@ -7,6 +7,96 @@ static void *g_apic; typedef unsigned char u8; typedef unsigned short u16; typedef unsigned u32; +typedef unsigned long ulong; + +typedef struct { +unsigned short offset0; +unsigned short selector; +unsigned short ist : 3; +unsigned short : 5; +unsigned short type : 4; +unsigned short : 1; +unsigned short dpl : 2; +unsigned short p : 1; +unsigned short offset1; +#ifdef __x86_64__ +unsigned offset2; +unsigned reserved; +#endif +} idt_entry_t; + +typedef struct { +ulong rflags; +ulong cs; +ulong rip; +ulong func; +ulong regs[sizeof(ulong)*2]; +} isr_regs_t; + +#ifdef __x86_64__ +# define R r +#else +# define R e +#endif + +extern char isr_entry_point[]; + +asm ( +isr_entry_point: \n +#ifdef __x86_64__ +push %r15 \n\t +push %r14 \n\t +push %r13 \n\t +push %r12 \n\t +push %r11 \n\t +push %r10 \n\t +push %r9 \n\t +push %r8 \n\t +#endif +push %Rdi \n\t +push %Rsi \n\t +push %Rbp \n\t +push %Rsp \n\t +push %Rbx \n\t +push %Rdx \n\t +push %Rcx \n\t +push %Rax \n\t +#ifdef __x86_64__ +mov %rsp, %rdi \n\t +callq *8*16(%rsp) \n\t +#else +push %esp \n\t +calll *4+4*8(%esp) \n\t +add $4, %esp \n\t +#endif +pop %Rax \n\t +pop %Rcx \n\t +pop %Rdx \n\t +pop %Rbx \n\t +pop %Rbp \n\t +pop %Rbp \n\t +pop %Rsi \n\t +pop %Rdi \n\t +#ifdef __x86_64__ +pop %r8 \n\t +pop %r9 \n\t +pop %r10 \n\t +pop %r11 \n\t +pop %r12 \n\t +pop %r13 \n\t +pop %r14 \n\t +pop %r15 \n\t +#endif +#ifdef __x86_64__ +add $8, %rsp \n\t +iretq \n\t +#else +add $4, %esp \n\t +iretl \n\t +#endif +); + +static idt_entry_t idt[256]; static int g_fail; static int g_tests; @@ -38,6 +128,95 @@ static void test_lapic_existence(void) report(apic existence, (u16)lvr == 0x14); } +static u16 read_cs(void) +{ +u16 v; + +asm(mov %%cs, %0 : =rm(v)); +return v; +} + +static void init_idt(void) +{ +struct { +u16 limit; +ulong idt; +} __attribute__((packed)) idt_ptr = { +sizeof(idt_entry_t) * 256 - 1, +(ulong)idt, +}; + +asm volatile(lidt %0 : : m(idt_ptr)); +} + +static void set_idt_entry(unsigned vec, void (*func)(isr_regs_t *regs)) +{ +u8 *thunk = vmalloc(50); +ulong ptr = (ulong)thunk; +idt_entry_t ent = { +.offset0 = ptr, +.selector = read_cs(), +.ist = 0, +.type = 14, +.dpl = 0, +.p = 1, +.offset1 = ptr 16, +#ifdef __x86_64__ +.offset2 = ptr 32, +#endif +}; +#ifdef __x86_64__ +/* sub $8, %rsp */ +*thunk++ = 0x48; *thunk++ = 0x83; *thunk++ = 0xec; *thunk++ = 0x08; +/* mov $func_low, %(rsp) */ +*thunk++ = 0xc7; *thunk++ = 0x04; *thunk++ = 0x24; +*(u32 *)thunk = (ulong)func; thunk += 4; +/* mov $func_high, %(rsp+4) */ +*thunk++ = 0xc7; *thunk++ = 0x44; *thunk++ = 0x24; *thunk++ = 0x04; +*(u32 *)thunk = (ulong)func 32; thunk += 4; +/* jmp isr_entry_point */ +*thunk ++ = 0xe9; +*(u32 *)thunk = (ulong)isr_entry_point - (ulong)(thunk + 4); +#else +/* push $func */ +*thunk++ = 0x68; +*(u32 *)thunk = (ulong)func; +/* jmp isr_entry_point */ +*thunk ++ = 0xe9; +*(u32 *)thunk = (ulong)isr_entry_point - (ulong)(thunk + 4); +#endif +idt[vec] = ent; +} + +static void irq_enable(void) +{ +asm volatile(sti); +} + +static int ipi_count; + +static void self_ipi_isr(isr_regs_t *regs) +{ +++ipi_count; +} + +static void test_self_ipi(void) +{ +int vec = 0xf1; + +set_idt_entry(vec, self_ipi_isr); +irq_enable(); +apic_write(APIC_ICR, + APIC_DEST_SELF | APIC_DEST_PHYSICAL | APIC_DM_FIXED | vec); +asm volatile (nop); +report(self ipi, ipi_count == 1); +} + +static void enable_apic(void) +{ +apic_write(0xf0, 0x1ff); /* spurious vector register */ +} + int main() { setup_vm(); @@ -46,6 +225,11 @@ int main() test_lapic_existence(); +enable_apic(); +init_idt(); + +test_self_ipi(); + printf(\nsummary: %d tests, %d failures\n, g_tests, g_fail); return g_fail != 0; -- To unsubscribe from this list: send the line unsubscribe kvm-commits in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html
[PATCH] kvm: testsuite: add apic tests
From: Avi Kivity [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] diff --git a/user/config-x86-common.mak b/user/config-x86-common.mak index b0337c9..edbf6e4 100644 --- a/user/config-x86-common.mak +++ b/user/config-x86-common.mak @@ -51,6 +51,9 @@ $(TEST_DIR)/port80.flat: $(cstart.o) $(TEST_DIR)/port80.o $(TEST_DIR)/tsc.flat: $(cstart.o) $(TEST_DIR)/tsc.o +$(TEST_DIR)/apic.flat: $(cstart.o) $(TEST_DIR)/apic.o $(TEST_DIR)/vm.o \ + $(TEST_DIR)/print.o + $(TEST_DIR)/realmode.flat: $(TEST_DIR)/realmode.o $(CC) -m32 -nostdlib -o $@ -Wl,-T,$(TEST_DIR)/realmode.lds $^ diff --git a/user/config-x86_64.mak b/user/config-x86_64.mak index 237f3c7..b50b540 100644 --- a/user/config-x86_64.mak +++ b/user/config-x86_64.mak @@ -8,6 +8,6 @@ CFLAGS += -I $(KERNELDIR)/include tests = $(TEST_DIR)/access.flat $(TEST_DIR)/irq.flat $(TEST_DIR)/sieve.flat \ $(TEST_DIR)/simple.flat $(TEST_DIR)/stringio.flat \ $(TEST_DIR)/memtest1.flat $(TEST_DIR)/emulator.flat \ - $(TEST_DIR)/hypercall.flat + $(TEST_DIR)/hypercall.flat $(TEST_DIR)/apic.flat include config-x86-common.mak diff --git a/user/test/x86/apic.c b/user/test/x86/apic.c new file mode 100644 index 000..0047243 --- /dev/null +++ b/user/test/x86/apic.c @@ -0,0 +1,52 @@ +#include libcflat.h +#include apic.h +#include vm.h + +static void *g_apic; + +typedef unsigned char u8; +typedef unsigned short u16; +typedef unsigned u32; + +static int g_fail; +static int g_tests; + +static void report(const char *msg, int pass) +{ +++g_tests; +printf(%s: %s\n, msg, (pass ? PASS : FAIL)); +if (!pass) +++g_fail; +} + +static u32 apic_read(unsigned reg) +{ +return *(volatile u32 *)(g_apic + reg); +} + +static void apic_write(unsigned reg, u32 val) +{ +*(volatile u32 *)(g_apic + reg) = val; +} + +static void test_lapic_existence(void) +{ +u32 lvr; + +lvr = apic_read(APIC_LVR); +printf(apic version: %x\n, lvr); +report(apic existence, (u16)lvr == 0x14); +} + +int main() +{ +setup_vm(); + +g_apic = vmap(0xfee0, 0x1000); + +test_lapic_existence(); + +printf(\nsummary: %d tests, %d failures\n, g_tests, g_fail); + +return g_fail != 0; +} diff --git a/user/test/x86/apic.h b/user/test/x86/apic.h new file mode 100644 index 000..c061e3d --- /dev/null +++ b/user/test/x86/apic.h @@ -0,0 +1,133 @@ +#ifndef _ASM_X86_APICDEF_H +#define _ASM_X86_APICDEF_H + +/* + * Constants for various Intel APICs. (local APIC, IOAPIC, etc.) + * + * Alan Cox [EMAIL PROTECTED], 1995. + * Ingo Molnar [EMAIL PROTECTED], 1999, 2000 + */ + +#defineAPIC_DEFAULT_PHYS_BASE 0xfee0 + +#defineAPIC_ID 0x20 + +#defineAPIC_LVR0x30 +#defineAPIC_LVR_MASK 0xFF00FF +#defineGET_APIC_VERSION(x) ((x) 0xFFu) +#defineGET_APIC_MAXLVT(x) (((x) 16) 0xFFu) +#ifdef CONFIG_X86_32 +# define APIC_INTEGRATED(x) ((x) 0xF0u) +#else +# define APIC_INTEGRATED(x) (1) +#endif +#defineAPIC_XAPIC(x) ((x) = 0x14) +#defineAPIC_TASKPRI0x80 +#defineAPIC_TPRI_MASK 0xFFu +#defineAPIC_ARBPRI 0x90 +#defineAPIC_ARBPRI_MASK0xFFu +#defineAPIC_PROCPRI0xA0 +#defineAPIC_EOI0xB0 +#defineAPIC_EIO_ACK0x0 +#defineAPIC_RRR0xC0 +#defineAPIC_LDR0xD0 +#defineAPIC_LDR_MASK (0xFFu 24) +#defineGET_APIC_LOGICAL_ID(x) (((x) 24) 0xFFu) +#defineSET_APIC_LOGICAL_ID(x) (((x) 24)) +#defineAPIC_ALL_CPUS 0xFFu +#defineAPIC_DFR0xE0 +#defineAPIC_DFR_CLUSTER0x0FFFul +#defineAPIC_DFR_FLAT 0xul +#defineAPIC_SPIV 0xF0 +#defineAPIC_SPIV_FOCUS_DISABLED(1 9) +#defineAPIC_SPIV_APIC_ENABLED (1 8) +#defineAPIC_ISR0x100 +#defineAPIC_ISR_NR 0x8 /* Number of 32 bit ISR registers. */ +#defineAPIC_TMR0x180 +#defineAPIC_IRR0x200 +#defineAPIC_ESR0x280 +#defineAPIC_ESR_SEND_CS0x1 +#defineAPIC_ESR_RECV_CS0x2 +#defineAPIC_ESR_SEND_ACC 0x4 +#defineAPIC_ESR_RECV_ACC 0x8 +#defineAPIC_ESR_SENDILL0x00020 +#defineAPIC_ESR_RECVILL0x00040 +#defineAPIC_ESR_ILLREGA0x00080 +#defineAPIC_ICR0x300 +#defineAPIC_DEST_SELF 0x4 +#defineAPIC_DEST_ALLINC0x8 +#defineAPIC_DEST_ALLBUT0xC +#defineAPIC_ICR_RR_MASK0x3 +#define
[PATCH] kvm: testsuite: add ioapic test
From: Avi Kivity [EMAIL PROTECTED] Signed-off-by: Avi Kivity [EMAIL PROTECTED] diff --git a/user/test/x86/apic.c b/user/test/x86/apic.c index 6686d94..6b55e77 100644 --- a/user/test/x86/apic.c +++ b/user/test/x86/apic.c @@ -3,6 +3,7 @@ #include vm.h static void *g_apic; +static void *g_ioapic; typedef unsigned char u8; typedef unsigned short u16; @@ -218,6 +219,71 @@ static void test_self_ipi(void) report(self ipi, ipi_count == 1); } +static void ioapic_write_reg(unsigned reg, u32 value) +{ +*(volatile u32 *)g_ioapic = reg; +*(volatile u32 *)(g_ioapic + 0x10) = value; +} + +typedef struct { +u8 vector; +u8 delivery_mode:3; +u8 dest_mode:1; +u8 delivery_status:1; +u8 polarity:1; +u8 remote_irr:1; +u8 trig_mode:1; +u8 mask:1; +u8 reserve:7; +u8 reserved[4]; +u8 dest_id; +} ioapic_redir_entry_t; + +static void ioapic_write_redir(unsigned line, ioapic_redir_entry_t e) +{ +ioapic_write_reg(0x10 + line * 2 + 0, ((u32 *)e)[0]); +ioapic_write_reg(0x10 + line * 2 + 1, ((u32 *)e)[1]); +} + +static void set_ioapic_redir(unsigned line, unsigned vec) +{ +ioapic_redir_entry_t e = { +.vector = vec, +.delivery_mode = 0, +.trig_mode = 0, +}; + +ioapic_write_redir(line, e); +} + +static void set_irq_line(unsigned line, int val) +{ +asm volatile(out %0, %1 : : a((u8)val), d((u16)(0x2000 + line))); +} + +static void toggle_irq_line(unsigned line) +{ +set_irq_line(line, 1); +set_irq_line(line, 0); +} + +static int g_isr_77; + +static void ioapic_isr_77(isr_regs_t *regs) +{ +++g_isr_77; +eoi(); +} + +static void test_ioapic_intr(void) +{ +set_idt_entry(0x77, ioapic_isr_77); +set_ioapic_redir(0x10, 0x77); +toggle_irq_line(0x10); +asm volatile (nop); +report(ioapic interrupt, g_isr_77 == 1); +} + static void enable_apic(void) { apic_write(0xf0, 0x1ff); /* spurious vector register */ @@ -228,6 +294,7 @@ int main() setup_vm(); g_apic = vmap(0xfee0, 0x1000); +g_ioapic = vmap(0xfec0, 0x1000); test_lapic_existence(); @@ -236,6 +303,8 @@ int main() test_self_ipi(); +test_ioapic_intr(); + printf(\nsummary: %d tests, %d failures\n, g_tests, g_fail); return g_fail != 0; -- To unsubscribe from this list: send the line unsubscribe kvm-commits in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html
Re: [PATCH] KVM: VMX: Fix race between pending IRQ and NMI
Jan Kiszka wrote: But I think I see a bigger issue - if we inject an regular interrupt while another is pending, then we will encounter this problem. Looks like we have to enable the interrupt window after injecting an interrupt if there are still pending interrupts. Yeah, probably. I'm just wondering now if we can set exit-on-interrupt-window while the vcpu state is interruptible (ie. _before_ the injection). There is some entry check like this for NMIs, but maybe no for interrupts. Need to check. Turns out it's not necessary, since the guest eoi will cause an exit and allow the code to request an interrupt window. I've added an apic test program so we can track these issues (user/test/x86/apic.c). -- I have a truly marvellous patch that fixes the bug which this signature is too narrow to contain. -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html
Re: virtio_net hang
On Fri, Nov 21, 2008 at 09:38:23AM +0100, Emmanuel Lacour wrote: I continue to have this problem with this setup: - host 2.6.27.4, kvm-78, intel, debian etch 64bits - guest 2.6.27.6, debian sarge 32 bits, e1000, 2 vcpus up/down of interface is enough to recover. Today I had a trace on this problem (first time), maybe this can help: Nov 21 14:34:42 foo kernel: [58345.000104] [ cut here ] Nov 21 14:34:42 foo kernel: [58345.000617] WARNING: at net/sched/sch_generic.c:219 dev_watchdog+0x164/0x1fd() Nov 21 14:34:42 foo kernel: [58345.001374] NETDEV WATCHDOG: eth0 (e1000): transmit timed out Nov 21 14:34:42 foo kernel: [58345.001825] Modules linked in: nfsd auth_rpcgss exportfs ac battery ipv6 nfs lockd nfs_acl sunrpc nf_nat_ftp nf_conntrack_ftp xt_tcpudp iptable_mangle iptable_nat nf_nat ipt_REJECT xt_limit nf_conntrack_ipv4 xt_state nf_conntrack ipt_LOG ipt_ULOG iptable_filter ip_tables x_tables dm_mod sd_mod snd_pcsp virtio_balloon snd_pcm snd_timer snd soundcore floppy snd_page_alloc psmouse serio_raw virtio_pci i2c_piix4 button i2c_core evdev ext3 jbd mbcache ide_cd_mod cdrom ide_disk ata_generic ata_piix libata scsi_mod dock piix ide_core uhci_hcd e1000 usbcore thermal processor fan thermal_sys Nov 21 14:34:42 foo kernel: [58345.022597] Pid: 0, comm: swapper Not tainted 2.6.27.6 #1 Nov 21 14:34:42 foo kernel: [58345.023027] [c0126295] warn_slowpath+0x58/0x70 Nov 21 14:34:42 foo kernel: [58345.023470] [c028e96b] ip_output+0x8e/0x90 Nov 21 14:34:42 foo kernel: [58345.029292] [c028e3ab] ip_local_out+0x15/0x17 Nov 21 14:34:42 foo kernel: [58345.030231] [c028ec1d] ip_queue_xmit+0x2b0/0x2f7 Nov 21 14:34:42 foo kernel: [58345.030684] [c01169c7] pvclock_get_nsec_offset+0xb/0x59 Nov 21 14:34:42 foo kernel: [58345.031163] [c0116a79] pvclock_clocksource_read+0x1a/0x2d Nov 21 14:34:42 foo kernel: [58345.031642] [c01169c7] pvclock_get_nsec_offset+0xb/0x59 Nov 21 14:34:42 foo kernel: [58345.032130] [c0116a79] pvclock_clocksource_read+0x1a/0x2d Nov 21 14:34:42 foo kernel: [58345.032608] [c01169c7] pvclock_get_nsec_offset+0xb/0x59 Nov 21 14:34:42 foo kernel: [58345.033080] [c01169c7] pvclock_get_nsec_offset+0xb/0x59 Nov 21 14:34:42 foo kernel: [58345.033570] [c01169c7] pvclock_get_nsec_offset+0xb/0x59 Nov 21 14:34:42 foo kernel: [58345.034036] [c0116a79] pvclock_clocksource_read+0x1a/0x2d Nov 21 14:34:42 foo kernel: [58345.034506] [c027e572] dev_watchdog+0x164/0x1fd Nov 21 14:34:42 foo kernel: [58345.034951] [c0139cf7] __atomic_notifier_call_chain+0x10/0x13 Nov 21 14:34:42 foo kernel: [58345.035455] [c02d4c73] _spin_lock_bh+0xf/0x12 Nov 21 14:34:42 foo kernel: [58345.035898] [c012d9a4] timer_stats_account_timer+0x22/0x27 Nov 21 14:34:42 foo kernel: [58345.036384] [c012dfcf] run_timer_softirq+0x11f/0x183 Nov 21 14:34:42 foo kernel: [58345.036840] [c027e40e] dev_watchdog+0x0/0x1fd Nov 21 14:34:42 foo kernel: [58345.037278] [c01390dc] hrtimer_interrupt+0x136/0x15e Nov 21 14:34:42 foo kernel: [58345.037736] [c012a53f] __do_softirq+0x69/0xd3 Nov 21 14:34:42 foo kernel: [58345.038172] [c012a5ed] do_softirq+0x44/0x52 Nov 21 14:34:42 foo kernel: [58345.038608] [c012a67e] irq_exit+0x38/0x6c Nov 21 14:34:42 foo kernel: [58345.039035] [c01106f1] smp_apic_timer_interrupt+0x2a/0x33 Nov 21 14:34:42 foo kernel: [58345.039518] [c0104434] apic_timer_interrupt+0x28/0x30 Nov 21 14:34:42 foo kernel: [58345.039980] [c0116560] native_safe_halt+0x2/0x3 Nov 21 14:34:42 foo kernel: [58345.040443] [c0109196] default_idle+0x2e/0x54 Nov 21 14:34:42 foo kernel: [58345.040886] [c01020ff] cpu_idle+0xc4/0xf7 Nov 21 14:34:42 foo kernel: [58345.041310] === Nov 21 14:34:42 foo kernel: [58345.041692] ---[ end trace 934a9cb836d2434b ]--- Nov 21 14:34:42 foo kernel: [58345.080575] e1000: eth0: e1000_watchdog: NIC Link is Up 1000 Mbps Full Duplex, Flow Control: None -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html
[ kvm-Bugs-2327497 ] NFS copy makes guest network unstable
Bugs item #2327497, was opened at 2008-11-22 07:53 Message generated for change (Tracker Item Submitted) made by Item Submitter You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2327497group_id=180599 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: None Group: None Status: Open Resolution: None Priority: 5 Private: No Submitted By: Jiajun Xu (jiajun) Assigned to: Nobody/Anonymous (nobody) Summary: NFS copy makes guest network unstable Initial Comment: The NFS network of KVM guest is very unstable. When we copy a 600M file to the guest by NFS mount. The guest's network will down after finishing at about 500M size. Then, guest's network is down. Host also can not use ping or scp. And sometimes, host also complains: ping: sendmsg: No buffer space available. I see memory by 'free', there is only 69MB free (While totally 8GB on the machine!). Using scp to copy file can not reproduce it. This issue is very easy to be reproduced (50%). Reproduce steps: 1. Create a guest and config NFS sharing folder on it 2. Mount the nfs folder to local folder --- /media 3. cp xxx /media 4. After some time, guest network is down -- You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=2327497group_id=180599 -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html
Weekly KVM Test report, kernel 30d95f ... userspace fc94d1 ...
Hi All, This is our Weekly KVM Testing Report against lastest kvm.git 30d95f352f0f7da8788016894db3b2a7efdd3674 and kvm-userspace.git fc94d163d1e3424199166cf50449e03447400579. There is no big new issue found this week. One Guest network issue is found in our testing. One New issue: 1. NFS copy makes guest network unstable https://sourceforge.net/tracker/index.php?func=detailaid=2327497group_id=180599atid=893831 Five Old Issues: 1. 32bits Rhel5/FC6 guest may fail to reboot after installation https://sourceforge.net/tracker/?func=detailatid=893831aid=1991647group_id=180599 2. failure to migrate guests with more than 4GB of RAM https://sourceforge.net/tracker/index.php?func=detailaid=1971512group_id=180599atid=893831 3. OpenSuse10.2 can not be installed http://sourceforge.net/tracker/index.php?func=detailaid=2088475group_id=180599atid=893831 4. Fail to Save Restore Guest https://sourceforge.net/tracker/?func=detailatid=893831aid=2175042group_id=180599 5. SMP IA32e RHEL5.1 guest can not boot up https://sourceforge.net/tracker/index.php?func=detailaid=2215532group_id=180599atid=893831 Test environment Platform A Stoakley/Clovertown CPU 4 Memory size 8G' Report Summary on IA32-pae Summary Test Report of Last Session = Total PassFailNoResult Crash = control_panel 8 7 1 00 gtest 16 15 1 00 = control_panel 8 7 1 00 :KVM_256M_guest_PAE_gPAE 1 1 0 00 :KVM_linux_win_PAE_gPAE1 1 0 00 :KVM_two_winxp_PAE_gPAE1 1 0 00 :KVM_four_sguest_PAE_gPA 1 1 0 00 :KVM_1500M_guest_PAE_gPA 1 1 0 00 :KVM_LM_Continuity_PAE_g 1 1 0 00 :KVM_LM_SMP_PAE_gPAE 1 1 0 00 :KVM_SR_Continuity_PAE_g 1 0 1 00 gtest 16 15 1 00 :ltp_nightly_PAE_gPAE 1 1 0 00 :boot_up_acpi_PAE_gPAE 1 1 0 00 :boot_up_acpi_xp_PAE_gPA 1 1 0 00 :boot_up_vista_PAE_gPAE1 1 0 00 :reboot_xp_PAE_gPAE1 1 0 00 :boot_base_kernel_PAE_gP 1 1 0 00 :boot_up_acpi_win2k3_PAE 1 1 0 00 :boot_smp_acpi_win2k3_PA 1 1 0 00 :boot_smp_acpi_win2k_PAE 1 1 0 00 :boot_up_win2008_PAE_gPA 1 1 0 00 :boot_up_acpi_win2k_PAE_ 1 1 0 00 :boot_smp_acpi_xp_PAE_gP 1 1 0 00 :boot_up_noacpi_win2k_PA 1 1 0 00 :boot_smp_vista_PAE_gPAE 1 1 0 00 :boot_smp_win2008_PAE_gP 1 0 1 00 :kb_nightly_PAE_gPAE 1 1 0 00 = Total 24 22 2 00 Report Summary on IA32e Summary Test Report of Last Session = Total PassFailNoResult Crash = control_panel 17 13 4 00 gtest 23 21 2 00 = control_panel 17 13 4 00 :KVM_4G_guest_64_g32e 1 1 0 00 :KVM_four_sguest_64_gPAE 1 1 0 00 :KVM_LM_SMP_64_g32e1 0 1 00 :KVM_linux_win_64_gPAE 1 1 0 00 :KVM_LM_SMP_64_gPAE1 1 0 00 :KVM_SR_Continuity_64_gP 1 0 1 00 :KVM_four_sguest_64_g32e 1 1 0 00 :KVM_four_dguest_64_gPAE 1 1 0 00 :KVM_SR_SMP_64_gPAE1 0 1 00 :KVM_LM_Continuity_64_g3 1 1 0 00 :KVM_1500M_guest_64_gPAE 1 1 0 00 :KVM_LM_Continuity_64_gP 1 1 0 00
kvm kernel backtrace 2.6.27.3 using kvm 78 userspace
Hello. I just noticed that my dmesg had been flooded with backtraces, appearing to be of KVM origin. I realize that my kernel is tainted, and slightly outdated, however, i just wanted to drop the log here in case it might be useful, but feel free to completely ignore it :) i am not subscribed to the kvm list, so please cc me in case you need further info.. my entire dmesg was flooded with backtraces looking practically identical to this one, so i will only paste a few of them, however, should you want more(though from a quick look they appear identical), i can put online the complete log kvm_handle_exit: unexpected, valid vectoring info and exit reason is 0x9 [ cut here ] WARNING: at arch/x86/kvm/x86.c:185 kvm_queue_exception_e+0x63/0x70 [kvm]() Modules linked in: tun ext3 jbd mbcache usb_storage cryptomgr cbc aes_x86_64 aes_generic dm_crypt dm_mod crypto_blkcipher sha256_generic crypto_algapi coretemp it87 hwmon_vid hwmon snd_seq kvm_intel kvm fuse nvidia(P) snd_usb_audio snd_hda_intel snd_usb_lib snd_rawmidi snd_seq_device snd_pcm snd_timer snd_hwdep psmouse thermal ehci_hcd rtc snd ohci1394 ieee1394 soundcore i2c_core processor snd_page_alloc r8169 button Pid: 20168, comm: kvm Tainted: PW 2.6.27.3 #1 Call Trace: [80235c84] warn_on_slowpath+0x64/0xb0 [a0899c01] paging64_gva_to_gpa+0x21/0x50 [kvm] [a088cc09] gfn_to_hva+0x9/0x70 [kvm] [a088ccd1] kvm_read_guest_page+0x61/0x70 [kvm] [a088cd28] kvm_read_guest+0x48/0x80 [kvm] [a08931ae] load_guest_segment_descriptor+0x6e/0xb0 [kvm] [a0893133] kvm_queue_exception_e+0x63/0x70 [kvm] [a08941de] kvm_task_switch+0x2ee/0x9f0 [kvm] [a088ed4c] ioapic_service+0x1ec/0x340 [kvm] [804b2af7] __down_read+0x17/0xa6 [a0893566] kvm_arch_vcpu_ioctl_run+0x266/0x6f0 [kvm] [a088c502] kvm_vcpu_ioctl+0x2b2/0x480 [kvm] [8022ee76] try_to_wake_up+0xf6/0x1b0 [8022ba4a] __wake_up_common+0x5a/0x90 [8022bea3] __wake_up+0x43/0x70 [802556ff] wake_futex+0x1f/0x30 [80257961] do_futex+0x881/0xa70 [a08b2ca0] handle_io+0x0/0x60 [kvm_intel] [802a0f46] vfs_ioctl+0x36/0xb0 [802a0f3f] vfs_ioctl+0x2f/0xb0 [802a124b] do_vfs_ioctl+0x28b/0x2f0 [802a1351] sys_ioctl+0xa1/0xb0 [8020bacb] system_call_fastpath+0x16/0x1b ---[ end trace dc61957677c4cb77 ]--- kvm_handle_exit: unexpected, valid vectoring info and exit reason is 0x9 [ cut here ] WARNING: at arch/x86/kvm/x86.c:185 kvm_queue_exception_e+0x63/0x70 [kvm]() Modules linked in: tun ext3 jbd mbcache usb_storage cryptomgr cbc aes_x86_64 aes_generic dm_crypt dm_mod crypto_blkcipher sha256_generic crypto_algapi coretemp it87 hwmon_vid hwmon snd_seq kvm_intel kvm fuse nvidia(P) snd_usb_audio snd_hda_intel snd_usb_lib snd_rawmidi snd_seq_device snd_pcm snd_timer snd_hwdep psmouse thermal ehci_hcd rtc snd ohci1394 ieee1394 soundcore i2c_core processor snd_page_alloc r8169 button Pid: 20168, comm: kvm Tainted: PW 2.6.27.3 #1 Call Trace: [80235c84] warn_on_slowpath+0x64/0xb0 [a0899c01] paging64_gva_to_gpa+0x21/0x50 [kvm] [a088cc09] gfn_to_hva+0x9/0x70 [kvm] [a088ccd1] kvm_read_guest_page+0x61/0x70 [kvm] [a088cd28] kvm_read_guest+0x48/0x80 [kvm] [a08931ae] load_guest_segment_descriptor+0x6e/0xb0 [kvm] [a0893133] kvm_queue_exception_e+0x63/0x70 [kvm] [a08941de] kvm_task_switch+0x2ee/0x9f0 [kvm] [a088ed4c] ioapic_service+0x1ec/0x340 [kvm] [804b2af7] __down_read+0x17/0xa6 [a0893566] kvm_arch_vcpu_ioctl_run+0x266/0x6f0 [kvm] [a088c502] kvm_vcpu_ioctl+0x2b2/0x480 [kvm] [8022ee76] try_to_wake_up+0xf6/0x1b0 [8022ba4a] __wake_up_common+0x5a/0x90 [8022bea3] __wake_up+0x43/0x70 [802556ff] wake_futex+0x1f/0x30 [80257961] do_futex+0x881/0xa70 [a08b2ca0] handle_io+0x0/0x60 [kvm_intel] [802a0f46] vfs_ioctl+0x36/0xb0 [802a0f3f] vfs_ioctl+0x2f/0xb0 [802a124b] do_vfs_ioctl+0x28b/0x2f0 [802a1351] sys_ioctl+0xa1/0xb0 [8020bacb] system_call_fastpath+0x16/0x1b ---[ end trace dc61957677c4cb77 ]--- kvm_handle_exit: unexpected, valid vectoring info and exit reason is 0x9 [ cut here ] WARNING: at arch/x86/kvm/x86.c:185 kvm_queue_exception_e+0x63/0x70 [kvm]() Modules linked in: tun ext3 jbd mbcache usb_storage cryptomgr cbc aes_x86_64 aes_generic dm_crypt dm_mod crypto_blkcipher sha256_generic crypto_algapi coretemp it87 hwmon_vid hwmon snd_seq kvm_intel kvm fuse nvidia(P) snd_usb_audio snd_hda_intel snd_usb_lib snd_rawmidi snd_seq_device snd_pcm snd_timer snd_hwdep psmouse thermal ehci_hcd rtc snd ohci1394 ieee1394 soundcore i2c_core processor snd_page_alloc r8169 button Pid: 20168, comm: kvm Tainted: PW 2.6.27.3 #1 Call Trace: [80235c84] warn_on_slowpath+0x64/0xb0
[PATCH 0 of 2] libcflat test for PowerPC
Add Hello world test for libcflat. Also, fix CFLAGS issue in config-powerpc.mak. -- To unsubscribe from this list: send the line unsubscribe kvm-ppc in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html
[PATCH 2 of 2] kvm-userspace: ppc: Move the -ffreestanding option to the right location
# HG changeset patch # User Deepa Srinivasan [EMAIL PROTECTED] # Date 1227381016 21600 # Node ID 285f7f7d0b0b574edcde943e43a0218e477e50bb # Parent 47c2e401b8e2c995da56dad4a167f6f59352f94e kvm-userspace: ppc: Move the -ffreestanding option to the right location. From: Deepa Srinivasan [EMAIL PROTECTED] Move the -ffreestanding compiler option (to avoid any checks for built-in functions) to the correct place in the make file. Signed-off-by: Deepa Srinivasan [EMAIL PROTECTED] --- [diffstat] config-powerpc.mak |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) [diff] diff -r 47c2e401b8e2 -r 285f7f7d0b0b user/config-powerpc.mak --- a/user/config-powerpc.mak Sat Nov 22 13:10:16 2008 -0600 +++ b/user/config-powerpc.mak Sat Nov 22 13:10:16 2008 -0600 @@ -1,5 +1,6 @@ CFLAGS += -I $(KERNELDIR)/include CFLAGS += -Wa,-mregnames -I test/lib +CFLAGS += -ffreestanding cstart := test/powerpc/cstart.o @@ -7,7 +8,6 @@ test/lib/powerpc/io.o $(libcflat): LDFLAGS += -nostdlib -$(libcflat): CFLAGS += -ffreestanding # these tests do not use libcflat simpletests := \ -- To unsubscribe from this list: send the line unsubscribe kvm-ppc in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html