Re: [BUG] Guest kernel divide error in kvm_unlock_kick

2014-09-22 Thread Chris Webb
Paolo Bonzini pbonz...@redhat.com wrote: Il 11/09/2014 19:03, Chris Webb ha scritto: Paolo Bonzini pbonz...@redhat.com wrote: This is a hypercall that should have kicked VCPU 3 (see rcx). Can you please apply this patch and gather a trace of the host (using trace-cmd -e kvm qemu-kvm

Re: [BUG] Guest kernel divide error in kvm_unlock_kick

2014-09-11 Thread Chris Webb
Paolo Bonzini pbonz...@redhat.com wrote: This is a hypercall that should have kicked VCPU 3 (see rcx). Can you please apply this patch and gather a trace of the host (using trace-cmd -e kvm qemu-kvm arguments)? Sure, no problem. I've built the trace-cmd tool against udis86 (I hope) and have

[BUG] Guest kernel divide error in kvm_unlock_kick

2014-09-08 Thread Chris Webb
I've reported this bug before, which reliably crashes a guest kernel shortly after boot, but have just reconfirmed that it is still present with Linux 3.16.2 guest and host kernels and Qemu 2.1. Running a 3.16.2 x86-64 SMP guest kernel on qemu-2.1, with kvm enabled and -cpu host on a 3.16.2 AMD

Re: Divide error in kvm_unlock_kick()

2014-06-17 Thread Chris Webb
I see kernel 3.15 is now out, so I retested with 3.15 guest and host. I'm still getting exactly the same guest kernel panic: a divide error in kvm_unlock_kick with -cpu host, but not with -cpu qemu64: divide error: [#1] PREEMPT SMP Modules linked in: CPU: 1 PID: 781 Comm: mkdir Not tainted

Re: Divide error in kvm_unlock_kick()

2014-06-01 Thread Chris Webb
I realised my original bug report was for a guest kernel compiled without frame pointers which might be unhelpful, so I enabled CONFIG_DEBUG_INFO and CONFIG_FRAME_POINTER, but I don't think this has made the backtrace any more detailed. Is there anything more I can do to pinpoint what might be

Re: Divide error in kvm_unlock_kick()

2014-05-29 Thread Chris Webb
Chris Webb ch...@arachsys.com wrote: My CPU flags inside the crashing guest look like this: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx mmxext fxsr_opt pdpe1gb lm rep_good nopl extd_apicid pni pclmulqdq ssse3 fma cx16

Re: Divide error in kvm_unlock_kick()

2014-05-29 Thread Chris Webb
Paolo Bonzini pbonz...@redhat.com wrote: Il 29/05/2014 19:45, Chris Webb ha scritto: Chris Webb ch...@arachsys.com wrote: My CPU flags inside the crashing guest look like this: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall

Divide error in kvm_unlock_kick()

2014-05-28 Thread Chris Webb
Running a 3.14.4 x86-64 SMP guest kernel on qemu-2.0, with kvm enabled and -cpu host on a 3.14.4 AMD Opteron host, I'm seeing a reliable kernel panic from the guest shortly after boot. I think is happening in kvm_unlock_kick() in the paravirt_ops code: divide error: [#1] PREEMPT SMP Modules

qemu-kvm guest which won't 'cont' (emulation failure?)

2011-10-24 Thread Chris Webb
I have a qemu-kvm guest (apparently a Ubuntu 11.04 x86-64 install) which has stopped and refuses to continue: (qemu) info status VM status: paused (qemu) cont (qemu) info status VM status: paused The host is running linux 2.6.39.2 with qemu-kvm 0.14.1 on 24-core Opteron 6176 box, and

Re: [Qemu-devel] qemu-kvm guest which won't 'cont' (emulation failure?)

2011-10-24 Thread Chris Webb
Kevin Wolf kw...@redhat.com writes: Am 24.10.2011 12:00, schrieb Chris Webb: I have qemu monitor access and can even strace the relevant qemu process if necessary: is it possible to use this to diagnose what's caused this guest to stop, e.g. the unsupported instruction if it's an emulation

Re: [Qemu-devel] qemu-kvm guest which won't 'cont' (emulation failure?)

2011-10-24 Thread Chris Webb
Kevin Wolf kw...@redhat.com writes: In qemu 1.0 we'll have an extended 'info status' that includes the stop reason, but 0.14 doesn't have this yet (was committed to git master only recently). Right, okay. I might take a look at cherry-picking and back-porting that to our version of qemu-kvm

Re: [Qemu-devel] qemu-kvm guest which won't 'cont' (emulation failure?)

2011-10-24 Thread Chris Webb
Kevin Wolf kw...@redhat.com writes: Good point... The only other thing that I can think of would be attaching gdb and setting a breakpoint in vm_stop() or something. Perfect, that seems to identified what's going on very nicely: (gdb) break vm_stop Breakpoint 1 at 0x407d10: file

Re: Host where KSM appears to save a negative amount of memory

2011-08-22 Thread Chris Webb
Hugh Dickins hu...@google.com writes: KSM chooses to show the numbers pages_shared and pages_sharing as exclusive counts: pages_sharing indicates the saving being made. So it would be perfectly reasonable to add those two numbers together to get the total number of pages sharing, the number

Host where KSM appears to save a negative amount of memory

2011-08-21 Thread Chris Webb
We're running KSM on kernel 2.6.39.2 with hosts running a number qemu-kvm virtual machines, and it has consistently been saving us a useful amount of RAM. To monitor the effective amount of memory saved, I've been looking at the difference between /sys/kernel/mm/ksm/pages_sharing and

High CPU use of -usbdevice tablet (was Re: KVM usability)

2010-04-04 Thread Chris Webb
Avi Kivity a...@redhat.com writes: On 03/02/2010 11:34 AM, Jernej Simončič wrote: On Tuesday, March 2, 2010, 9:21:18, Chris Webb wrote: I remember about a year ago, someone asserting on the list that -usbdevice tablet was very CPU intensive even when not in use, and should be avoided

Re: [PATCH][RF C/T/D] Unmapped page cache control - via boot parameter

2010-03-22 Thread Chris Webb
Chris Webb ch...@arachsys.com writes: Okay. What I was driving at in describing these systems as 'already broken' is that they will already lose data (in this sense) if they're run on bare metal with normal commodity SATA disks with their 32MB write caches on. That configuration surely

Re: [PATCH][RF C/T/D] Unmapped page cache control - via boot parameter

2010-03-22 Thread Chris Webb
Avi Kivity a...@redhat.com writes: On 03/22/2010 11:04 PM, Chris Webb wrote: Unless I'm missing something, the risk to guest OSes in this configuration should therefore be exactly the same as the risk from running on normal commodity hardware with such drives and no expensive battery-backed

Re: [PATCH][RF C/T/D] Unmapped page cache control - via boot parameter

2010-03-17 Thread Chris Webb
Anthony Liguori anth...@codemonkey.ws writes: This really gets down to your definition of safe behaviour. As it stands, if you suffer a power outage, it may lead to guest corruption. While we are correct in advertising a write-cache, write-caches are volatile and should a drive lose

Re: [PATCH][RF C/T/D] Unmapped page cache control - via boot parameter

2010-03-17 Thread Chris Webb
Avi Kivity a...@redhat.com writes: On 03/15/2010 10:23 PM, Chris Webb wrote: Wasteful duplication of page cache between guest and host notwithstanding, turning on cache=writeback is a spectacular performance win for our guests. Is this with qcow2, raw file, or direct volume access

Re: [PATCH][RF C/T/D] Unmapped page cache control - via boot parameter

2010-03-17 Thread Chris Webb
Anthony Liguori anth...@codemonkey.ws writes: On 03/17/2010 10:14 AM, Chris Webb wrote: (c) installations that are already broken and lose data with a physical drive with a write-cache can lose much more in this case because the write cache is much bigger

Re: [PATCH][RF C/T/D] Unmapped page cache control - via boot parameter

2010-03-17 Thread Chris Webb
Avi Kivity a...@redhat.com writes: Chris, can you carry out an experiment? Write a program that pwrite()s a byte to a file at the same location repeatedly, with the file opened using O_SYNC. Measure the write rate, and run blktrace on the host to see what the disk (/dev/sda, not the volume)

Re: [PATCH][RF C/T/D] Unmapped page cache control - via boot parameter

2010-03-17 Thread Chris Webb
Vivek Goyal vgo...@redhat.com writes: Are you using CFQ in the host? What is the host kernel version? I am not sure what is the problem here but you might want to play with IO controller and put these guests in individual cgroups and see if you get better throughput even with

Re: [PATCH][RF C/T/D] Unmapped page cache control - via boot parameter

2010-03-15 Thread Chris Webb
Avi Kivity a...@redhat.com writes: On 03/15/2010 10:07 AM, Balbir Singh wrote: Yes, it is a virtio call away, but is the cost of paying twice in terms of memory acceptable? Usually, it isn't, which is why I recommend cache=off. Hi Avi. One observation about your recommendation for

Re: [Qemu-devel] [PATCH] Fix SIGFPE for vnc display of width/height = 1

2010-03-08 Thread Chris Webb
Chris Webb ch...@arachsys.com writes: During boot, the screen gets resized to height 1 and a mouse click at this point will cause a division by zero when calculating the absolute pointer position from the pixel (x, y). Return a click in the middle of the screen instead in this case. I think

Re: [Qemu-devel] Re: Another VNC crash, qemu-kvm-0.12.3

2010-03-06 Thread Chris Webb
Alexander Graf ag...@suse.de writes: On 05.03.2010, at 17:52, Chris Webb wrote: Of course, if the screen width or height is 1, it doesn't really matter what the value of the mouse position for the click is, so something as simple as diff --git a/vnc.c b/vnc.c --- a/vnc.c +++ b

Re: Another VNC crash, qemu-kvm-0.12.3

2010-03-05 Thread Chris Webb
Anthony Liguori anth...@codemonkey.ws writes: On 03/01/2010 12:14 PM, Chris Webb wrote: We've just seen another VNC related qemu-kvm crash, this time an arithmetic exception at vnc.c:1424 in the newly release qemu-kvm 0.12.3. [...] 1423 if (vs-absolute) { 1424

Re: KVM usability

2010-03-02 Thread Chris Webb
Dustin Kirkland kirkl...@canonical.com writes: On Mon, 2010-03-01 at 15:59 -0600, Anthony Liguori wrote: Defaulting usb to on and defaulting to a usb tablet is a reasonable thing to do IMHO. \o/ Definitely a better user experience. I remember about a year ago, someone asserting on

Re: KVM usability

2010-03-02 Thread Chris Webb
Ingo Molnar mi...@elte.hu writes: Yes, you are quite correct: udev has been argued to be a prime candidate for tools/. (and some other kernel utilities as well) A small, static set of userspace like klibc (only 5M unpacked!) with enough tools for rolling up in a standard initramfs would be

Another VNC crash, qemu-kvm-0.12.3

2010-03-01 Thread Chris Webb
We've just seen another VNC related qemu-kvm crash, this time an arithmetic exception at vnc.c:1424 in the newly release qemu-kvm 0.12.3. [...] 1423 if (vs-absolute) { 1424 kbd_mouse_event(x * 0x7FFF / (ds_get_width(vs-ds) - 1), 1425 y * 0x7FFF /

Re: [Qemu-devel] Re: qemu-kvm 0.12.2 VNC segfault

2010-02-22 Thread Chris Webb
Avi Kivity a...@redhat.com writes: On 02/21/2010 07:23 PM, Chris Webb wrote: Some sort of race where a client disconnects and is removed from the client list while the vnc_refresh() loop is iterating over it, maybe? Looks like c727a05459, and high time for 0.12.3. Anthony? Ah yes, looks

qemu-kvm 0.12.2 VNC segfault

2010-02-21 Thread Chris Webb
I've just had a segfault from one of the qemu-kvm virtual machines we run. This is qemu-kvm 0.12.2 running with the in-kernel kvm modules on linux 2.6.32.7 on a dual quad-core Xeon E5420 machine, with ksm enabled. The backtrace looks like #0 vnc_update_client (vs=0x83f0, has_dirty=18) at

Re: [ANNOUNCE] Sheepdog: Distributed Storage System for KVM

2009-10-23 Thread Chris Webb
MORITA Kazutaka morita.kazut...@lab.ntt.co.jp writes: We use JGroups (Java library) for reliable multicast communication in our cluster manager daemon. We don't worry about the performance much since the cluster manager daemon is not involved in the I/O path. We might think about moving to

Re: [ANNOUNCE] Sheepdog: Distributed Storage System for KVM

2009-10-23 Thread Chris Webb
Chris Webb ch...@arachsys.com writes: MORITA Kazutaka morita.kazut...@lab.ntt.co.jp writes: We use JGroups (Java library) for reliable multicast communication in our cluster manager daemon. We don't worry about the performance much since the cluster manager daemon is not involved

Re: [Qemu-devel] Re: [ANNOUNCE] Sheepdog: Distributed Storage System for KVM

2009-10-23 Thread Chris Webb
Javier Guerra jav...@guerrag.com writes: i'd just want to add my '+1 votes' on both getting rid of JVM dependency and using block devices (usually LVM) instead of ext3/btrfs If the chunks into which the virtual drives are split are quite small (say the 64MB used by Hadoop), LVM may be a less

Re: qemu-kvm segfaults in qemu_del_timer (0.10.5 and 0.10.6)

2009-08-24 Thread Chris Webb
Chris Webb ch...@arachsys.com writes: With the following applied, VNC connections and disconnections still work correctly, so it doesn't horribly break anything, but I can't immediately confirm whether it will cure the rare segfaults as I haven't yet found a rapid way of reproducing

Re: qemu-kvm segfaults in qemu_del_timer (0.10.5 and 0.10.6)

2009-08-19 Thread Chris Webb
Avi Kivity a...@redhat.com writes: master branch has a patch that fixes a use-after-free when disconnecting. Unfortunately it doesn't port cleanly to stable-0.10. I've collected quite a few more core dumps from segfaults of client virtual machines now, all of which are VNC related and could

Re: qemu-kvm segfaults in qemu_del_timer (0.10.5 and 0.10.6)

2009-08-13 Thread Chris Webb
Chris Webb ch...@arachsys.com writes: Avi Kivity a...@redhat.com writes: I understand it's hard, but it's nearly impossible to work out the problem from so little data, so please do make the effort to obtain dumps. We're trying for this at the moment, but since we can't change

Re: qemu-kvm segfaults in qemu_del_timer (0.10.5 and 0.10.6)

2009-08-13 Thread Chris Webb
Chris Webb ch...@arachsys.com writes: The segfault appears to be a null pointer dereference. ts-clock is NULL and line 1161 uses ts-clock-type: (gdb) p ts $4 = (QEMUTimer *) 0x30d1f30 (gdb) p ts-clock $5 = (QEMUClock *) 0x0 Sorry, meant to paste this too: (gdb) p *ts $1

Re: qemu-kvm segfaults in qemu_del_timer (0.10.5 and 0.10.6)

2009-08-13 Thread Chris Webb
Avi Kivity a...@redhat.com writes: csock looks corrupted, should be -1 or an fd. Was a vnc client connected? Was the guest playing with the display resolution? Yes, I think in this case there was a vncviewer connected, and the guest had started booting up into windows, which changes the

Re: qemu-kvm segfaults in qemu_del_timer (0.10.5 and 0.10.6)

2009-08-13 Thread Chris Webb
Chris Webb ch...@arachsys.com writes: Avi Kivity a...@redhat.com writes: csock looks corrupted, should be -1 or an fd. Was a vnc client connected? Was the guest playing with the display resolution? Yes, I think in this case there was a vncviewer connected, and the guest had started

qemu-kvm segfaults in qemu_del_timer (0.10.5 and 0.10.6)

2009-08-12 Thread Chris Webb
I have a couple of clusters hosting qemu-kvm virtual machines. One of these clusters consists of dual quad-core Xeon E5420s (vmx), the other consists of dual quad-core Barcelona Opterons (svm), and both are running x86-64 Linux 2.6.30.4 with the kvm modules included with the upstream kernel

Re: Trouble understanding net config options

2009-07-15 Thread Chris Webb
Michael Jinks michael.ji...@gmail.com writes: How do I make a guest use a specific tap? Quoting from my initial post, my -net options are: -net nic -net tap,name=tap11 -net nic -net tap,name=tap12 You want -net nic,vlan=0 -net tap,vlan=0,ifname=tap11 -net nic,vlan=1 -net

Two VNC patches

2008-12-08 Thread Chris Webb
. The other site where monitor_readline reads a password (in vl.c) passes the buffer length correctly. Signed-off-by: Chris Webb [EMAIL PROTECTED] --- monitor.c |3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/monitor.c b/monitor.c index 22360fc..a252838 100644 --- a/monitor.c

[RESEND] [PATCH v2] Accept password as an argument to 'change vnc password'

2008-12-08 Thread Chris Webb
Accept password as an argument to 'change vnc password' monitor command This allows easier use of the change vnc password monitor command from management scripts, without having to implement expect(1)-like behaviour. Signed-off-by: Chris Webb [EMAIL PROTECTED] --- monitor.c | 14

Re: [Qemu-devel] [PATCH] Fix off-by-one bug limiting VNC passwords to 7 chars

2008-11-25 Thread Chris Webb
Thiemo Seufer [EMAIL PROTECTED] writes: Chris Webb wrote: [...] - monitor_readline(Password: , 1, password, sizeof(password)-1); + monitor_readline(Password: , 1, password, sizeof(password)); password[sizeof(password)-1] = '\0'; The next line can go as well, the string

[PATCH v2] Accept password as an argument to 'change vnc password'

2008-11-25 Thread Chris Webb
Accept password as an argument to 'change vnc password' monitor command This allows easier use of the change vnc password monitor command from management scripts, without having to implement expect(1)-like behaviour. Signed-off-by: Chris Webb [EMAIL PROTECTED] --- monitor.c | 14

[PATCH] Fix off-by-one bug limiting VNC passwords to 7 chars

2008-11-23 Thread Chris Webb
. Signed-off-by: Chris Webb [EMAIL PROTECTED] --- monitor.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/monitor.c b/monitor.c index 22360fc..6ae5729 100644 --- a/monitor.c +++ b/monitor.c @@ -433,7 +433,7 @@ static void do_change_vnc(const char *target) if (strcmp

[PATCH] Accept password as an argument to 'change vnc password'

2008-11-23 Thread Chris Webb
Accept password as an argument to 'change vnc password' monitor command This allows easier use of the change vnc password monitor command from management scripts, without having to implement expect(1)-like behaviour. Signed-off-by: Chris Webb [EMAIL PROTECTED] --- monitor.c | 13

Unsupported delivery mode 7

2008-11-19 Thread Chris Webb
We're running kvm-78 in production on Linux 2.6.27 x86_64 on dual quad-core Opteron 'Barcelona' machines. Our kvm modules are built from the kvm-78 sources rather than the older version bundled with the kernel, and we're using the NPT features of the processors. For the most part, everything is

Re: qemu-send.c (was Re: Since we're sharing, here's my kvmctl script)

2008-06-12 Thread Chris Webb
Javier Guerra Giraldez [EMAIL PROTECTED] writes: On Wednesday 11 June 2008, Chris Webb wrote: Hi. I have a small 'qemu-send' utility for talking to a running qemu/kvm process whose monitor console listens on a filesystem socket, which I think might be a useful building block when extending