Re: XIVE VFIO kernel resample failure in INTx mode under heavy load

2024-04-15 Thread Timothy Pearson
- Original Message - > From: "Cédric Le Goater" > To: "Alexey Kardashevskiy" , "Alex Williamson" > , "Timothy Pearson" > > Cc: "l...@suse.de:PowerPC" , "qemu-devel" > , "Frederic Barrat" >

Re: XIVE VFIO kernel resample failure in INTx mode under heavy load

2022-03-11 Thread Timothy Pearson
Correction -- the desynchronization appears to be on the DisINTx line. Host: Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr+ Stepping- SERR+ FastB2B- DisINTx+ Status: Cap- 66MHz- UDF- FastB2B- ParErr- DEVSEL=slow >TAbort- SERR- TAbort- SERR- From: "

XIVE VFIO kernel resample failure in INTx mode under heavy load

2022-03-11 Thread Timothy Pearson
All, I've been struggling for some time with what is looking like a potential bug in QEMU/KVM on the POWER9 platform. It appears that in XIVE mode, when the in-kernel IRQ chip is enabled, an external device that rapidly asserts IRQs via the legacy INTx level mechanism will only receive one

[Qemu-devel] [Bug 1809684] [NEW] amdgpu passthrough on POWER9 (ppc64el) not working

2018-12-24 Thread Timothy Pearson
Public bug reported: When attempting to pass a Vega 56 GPU to a virtualized guest using QEMU 3.1 on ppc64el (POWER9), the guest is unable to initialize the GPU. Further digging reveals the driver attempting to allocate a large BAR, which then fails: [6.058544] [drm] PCI I/O BAR is not found.

[Qemu-devel] [Bug 1738691] Re: Guest kernel crashes with kvm_pr on POWER8

2017-12-19 Thread Timothy Pearson
Is this the correct place to file kvm-pr bug reports? -- You received this bug notification because you are a member of qemu- devel-ml, which is subscribed to QEMU. https://bugs.launchpad.net/bugs/1738691 Title: Guest kernel crashes with kvm_pr on POWER8 Status in QEMU: New Bug

[Qemu-devel] [Bug 1738691] [NEW] Guest kernel crashes with kvm_pr on POWER8

2017-12-17 Thread Timothy Pearson
Public bug reported: When attempting to use the kvm_pr module with QEMU 2.10 on a POWER8 host, Debian and Ubuntu guests hang and show crashes. Host kernel is 4.14. Issue is observed with host kernels 4.9 and 4.13 as well; no other host kernels were tested. Is this the correct place to report a

[Qemu-devel] [Bug 1735049] [NEW] Need MTTCG support for x86 guests

2017-11-28 Thread Timothy Pearson
Public bug reported: MTTCG support is notably absent for x86_64 guests. The last Wiki update on MTTCG was back in 2015, and I am having some difficulty determining the current status of the underlying requirements to enable this feature on x86 hosts. For instance, has support for strong-on-weak

[Qemu-devel] [Bug 1591611] Re: chroot using qemu-x86_64-static fails on ppc64el

2017-11-27 Thread Timothy Pearson
Nope, looks good here. As a note to other commenters, this won't work unless you are using a kernel compiled with the 4k page size -- default for PPC64 is 64k. -- You received this bug notification because you are a member of qemu- devel-ml, which is subscribed to QEMU.

[Qemu-devel] [Bug 1734792] [NEW] qemu-x86_64 fails with unsupported syscall 319

2017-11-27 Thread Timothy Pearson
Public bug reported: qemu-x86_66 GIT HEAD fails on a userspace application that requires memfd_create with: "qemu: Unsupported syscall: 319". memfd_create support needs to be implemented in QEMU. ** Affects: qemu Importance: Undecided Status: New -- You received this bug

Re: [Qemu-devel] [PATCH v6 00/26] tcg: generic vector operations

2017-11-27 Thread Timothy Pearson
| 148 +++ > 43 files changed, 7107 insertions(+), 776 deletions(-) > create mode 100644 tcg/aarch64/tcg-target.opc.h > create mode 100644 tcg/i386/tcg-target.opc.h > create mode 100644 tcg/tcg-gvec-desc.h > create mode 100644 tcg/tcg-op-gvec.h > create mode 100644 accel/tcg/tcg-runtime-gvec.c > create mode 100644 tcg/tcg-op-gvec.c > create mode 100644 tcg/tcg-op-vec.c > -- Timothy Pearson Raptor Engineering +1 (415) 727-8645 (direct line) +1 (512) 690-0200 (switchboard) https://www.raptorengineering.com

[Qemu-devel] [Bug 1706825] [NEW] qemu-user fails to run wineserver on ppc64el host

2017-07-26 Thread Timothy Pearson
Public bug reported: When attempting to run wineserver on a 64-bit ppc64el host via QEMU's user-mode i386 emulation, a file locking operation fails. Command line: qemu-i386-static /usr/lib/wine-development/wineserver32 Output: wineserver: fcntl /tmp/.wine-0/server-17-14d21bf/lock: Invalid

[Qemu-devel] [Bug 1629618] Re: QEMU causes host hang / reset on PPC64EL

2016-11-07 Thread Timothy Pearson
Still seeing this issue. Only seems to happen with 4K pages on the host. Any further debugging I could try? -- You received this bug notification because you are a member of qemu- devel-ml, which is subscribed to QEMU. https://bugs.launchpad.net/bugs/1629618 Title: QEMU causes host hang /

[Qemu-devel] [Bug 1629618] Re: QEMU causes host hang / reset on PPC64EL

2016-11-01 Thread Timothy Pearson
Unfortunately, the machine just crashed again. It seems related to the use of 4K pages instead of the more typical 64K pages; the machine is rock solid with 64K pages. ** Changed in: qemu Status: Fix Released => New -- You received this bug notification because you are a member of qemu-

[Qemu-devel] [Bug 1629618] Re: QEMU causes host hang / reset on PPC64EL

2016-10-31 Thread Timothy Pearson
After running 4.8 for the past week or so I think I can state the problem is resolved at this point. The machine has not hard reset once since the update, even after numerous host and VM reboots. ** Changed in: qemu Status: New => Fix Released -- You received this bug notification

[Qemu-devel] [Bug 1629618] Re: QEMU causes host hang / reset on PPC64EL

2016-10-01 Thread Timothy Pearson
Host QEMU version: 1:2.6+dfsg-3.1 Host kernel version: 4.6.0 ** Description changed: QEMU causes a host hang / reset on PPC64EL when used in KVM + HV mode (kvm_hv module). After a random amount of uptime, starting new QEMU virtual machines will cause the host to experience a soft CPU

[Qemu-devel] [Bug 1629618] [NEW] QEMU causes host hang / reset on PPC64EL

2016-10-01 Thread Timothy Pearson
Public bug reported: QEMU causes a host hang / reset on PPC64EL when used in KVM + HV mode (kvm_hv module). After a random amount of uptime, starting new QEMU virtual machines will cause the host to experience a soft CPU lockup. Depending on configuration and other random factors the host will

[Qemu-devel] [Bug 1546680] Re: Incorrect display colors when running big endian guest on POWER8 little endian host

2016-07-26 Thread Timothy Pearson
** Attachment added: "Screenshot showing problem is also present in kernel framebuffer mode" https://bugs.launchpad.net/qemu/+bug/1546680/+attachment/4707706/+files/centos-big-endian-display-color-problem-kernel-framebuffer-fedora-24.png -- You received this bug notification because you are

[Qemu-devel] [Bug 1546680] Re: Incorrect display colors when running big endian guest on POWER8 little endian host

2016-07-26 Thread Timothy Pearson
QEMU emulator version 2.6.0 (Debian 1:2.6+dfsg-3), Copyright (c) 2003-2008 Fabrice Bellard qemu-system-ppc64 --enable-kvm -M pseries -cpu host -m 3G -cdrom Fedora- Server-dvd-ppc64-24-1.2.iso Fedora 24 Server -- You received this bug notification because you are a member of qemu- devel-ml,

[Qemu-devel] [Bug 1594394] Re: Using setreuid / setegid crashes x86_64 user-mode target

2016-06-20 Thread Timothy Pearson
Sounds very relevant, yes. Thanks for the link! -- You received this bug notification because you are a member of qemu- devel-ml, which is subscribed to QEMU. https://bugs.launchpad.net/bugs/1594394 Title: Using setreuid / setegid crashes x86_64 user-mode target Status in QEMU: New Bug

[Qemu-devel] [Bug 1594069] Re: SIMD instructions translated to scalar host instructions

2016-06-20 Thread Timothy Pearson
I mostly filed the bug report since I was seeing multiple different attempts to implement this, and even a proper patch series on the mailing list, but no movement at all toward integrating this feature into mainline qemu. What would be needed to e.g. make the patch series on the mailing list

[Qemu-devel] [Bug 1594394] [NEW] Using setreuid / setegid crashes x86_64 user-mode target

2016-06-20 Thread Timothy Pearson
Public bug reported: When setreuid() or setegid() are called from x86_64 target code in user mode, qemu crashes inside the NPTL signal handlers. x86 targets do not directly use a syscall to handle setreuid() / setegid(); instead the x86 NPTL implementation sets up a temporary data region in

[Qemu-devel] [Bug 1594069] [NEW] SIMD instructions translated to scalar host instructions

2016-06-18 Thread Timothy Pearson
Public bug reported: SIMD instructions inside the guest (NEON, MMX, SSE, SSE2, AVX) are translated to scalar instructions on the host instead of SIMD instructions. It appears that there have been a few efforts to rectify this [1], and even a submitted patch series, but all discussion has

[Qemu-devel] [PATCH 4/7] This patch adds initial user-virtualization support for the DRM (type 'd') IOCTLs in linux. With it and a corresponding architecture chroot (say aarch64), I am able to success

2016-06-18 Thread Timothy Pearson
1. It will only work with open drivers as their IOCTLs are documented. 2. i965+ is only supported. That is any haswell, ivybridge, etc. GPU will work. 3. X doesn't start yet, though this patch eliminates all the visible unsupported DRM IOCTL calls as observed by setting QEMU_STRACE=1. 4. Intel

[Qemu-devel] [PATCH 1/7] Add initial x86_64 signal handlers

2016-06-18 Thread Timothy Pearson
Note that x86_64 systems only offer the _rt signal handler variants, so the legacy signal handlers remain unimplemented on this platform. Signed-off-by: Timothy Pearson <tpear...@raptorengineering.com> --- linux-user/signal.c | 302 +++-

[Qemu-devel] [Bug 1591611] Re: chroot using qemu-x86_64-static fails on ppc64el

2016-06-18 Thread Timothy Pearson
Patch series sent to mailing list here: http://lists.nongnu.org/archive/html/qemu-devel/2016-06/msg05334.html In particular, this patch handles the original signal handler problem: http://lists.nongnu.org/archive/html/qemu-devel/2016-06/msg05335.html ** Changed in: qemu Status: New => In

[Qemu-devel] [PATCH 3/7] Pass select() arguments directly to do_select() on x86 platforms

2016-06-18 Thread Timothy Pearson
This matches the calling conventions in the Linux kernel and resolves select() hangs on i386/x86_64 guests. Signed-off-by: Timothy Pearson <tpear...@raptorengineering.com> --- linux-user/syscall.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/linux-user/syscall.c b

[Qemu-devel] [PATCH 7/7] Add ALSA ioctls

2016-06-18 Thread Timothy Pearson
Tested with ExtremeTuxRacer in guest with HDMI audio sink on host Signed-off-by: Timothy Pearson <tpear...@raptorengineering.com> --- linux-user/ioctls.h| 72 linux-user/syscall.c | 1 + linux-user/syscall_defs.h | 73 linux-user/syscall_types.h

[Qemu-devel] [PATCH 7/7] Add ALSA ioctls

2016-06-18 Thread Timothy Pearson
Tested with ExtremeTuxRacer in guest with HDMI audio sink on host Signed-off-by: Timothy Pearson <tpear...@raptorengineering.com> --- linux-user/ioctls.h| 72 linux-user/syscall.c | 1 + linux-user/syscall_defs.h | 73 linux-user/syscall_types.h

[Qemu-devel] [PATCH 6/7] Add radeon DRM interface ioctls

2016-06-18 Thread Timothy Pearson
Tested on a Radeon R290X with multiple 3D applications. Signed-off-by: Timothy Pearson <tpear...@raptorengineering.com> --- linux-user/ioctls.h| 45 +- linux-user/syscall.c | 15 linux-user/syscall_defs.h | 45 +- linux-user/syscall_types.h

[Qemu-devel] [PATCH 2/7] QEMU does not currently support host pages that are larger than guest pages, likely due to glibc using fixed mmap requests.

2016-06-18 Thread Timothy Pearson
size if applicable. Signed-off-by: Timothy Pearson <tpear...@raptorengineering.com> --- linux-user/syscall.c | 27 +-- 1 file changed, 21 insertions(+), 6 deletions(-) diff --git a/linux-user/syscall.c b/linux-user/syscall.c index 1c17b74..2968b57 100644 --- a/linu

[Qemu-devel] [PATCH 6/7] Add radeon DRM interface ioctls

2016-06-18 Thread Timothy Pearson
Tested on a Radeon R290X with multiple 3D applications. Signed-off-by: Timothy Pearson <tpear...@raptorengineering.com> --- linux-user/ioctls.h| 45 +- linux-user/syscall.c | 15 linux-user/syscall_defs.h | 45 +- linux-user/syscall_types.h

[Qemu-devel] RE-SEND: [PATCH 0/7] Enable multimedia applications on x86_64 guests

2016-06-18 Thread Timothy Pearson
'd') IOCTLs in linux. With it and a corresponding architecture chroot (say aarch64), I am able to successfully run a few 2D and 3D applications with native graphics acceleration. Some notes/caveats are: Timothy Pearson (6): Add initial x86_64 signal handlers QEMU

[Qemu-devel] [PATCH 4/7] This patch adds initial user-virtualization support for the DRM (type 'd') IOCTLs in linux. With it and a corresponding architecture chroot (say aarch64), I am able to success

2016-06-18 Thread Timothy Pearson
1. It will only work with open drivers as their IOCTLs are documented. 2. i965+ is only supported. That is any haswell, ivybridge, etc. GPU will work. 3. X doesn't start yet, though this patch eliminates all the visible unsupported DRM IOCTL calls as observed by setting QEMU_STRACE=1. 4. Intel

[Qemu-devel] [PATCH 5/7] TIOCGPTN and related terminal control ioctls were not converted to the guest ioctl format on x86_64 targets. Convert these ioctls to enable terminal functionality on x86_64 gu

2016-06-18 Thread Timothy Pearson
Signed-off-by: Timothy Pearson <tpear...@raptorengineering.com> --- linux-user/x86_64/termbits.h | 12 ++-- 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/linux-user/x86_64/termbits.h b/linux-user/x86_64/termbits.h index 1c3445c..5fc4639 100644 --- a/linux-user/

[Qemu-devel] [PATCH 5/7] TIOCGPTN and related terminal control ioctls were not converted to the guest ioctl format on x86_64 targets. Convert these ioctls to enable terminal functionality on x86_64 gu

2016-06-18 Thread Timothy Pearson
Signed-off-by: Timothy Pearson <tpear...@raptorengineering.com> --- linux-user/x86_64/termbits.h | 12 ++-- 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/linux-user/x86_64/termbits.h b/linux-user/x86_64/termbits.h index 1c3445c..5fc4639 100644 --- a/linux-user/

[Qemu-devel] [PATCH 3/7] Pass select() arguments directly to do_select() on x86 platforms

2016-06-18 Thread Timothy Pearson
This matches the calling conventions in the Linux kernel and resolves select() hangs on i386/x86_64 guests. Signed-off-by: Timothy Pearson <tpear...@raptorengineering.com> --- linux-user/syscall.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/linux-user/syscall.c b

[Qemu-devel] [PATCH 2/7] QEMU does not currently support host pages that are larger than guest pages, likely due to glibc using fixed mmap requests.

2016-06-18 Thread Timothy Pearson
size if applicable. Signed-off-by: Timothy Pearson <tpear...@raptorengineering.com> --- linux-user/syscall.c | 27 +-- 1 file changed, 21 insertions(+), 6 deletions(-) diff --git a/linux-user/syscall.c b/linux-user/syscall.c index 1c17b74..2968b57 100644 --- a/linu

[Qemu-devel] [PATCH 1/7] Add initial x86_64 signal handlers

2016-06-18 Thread Timothy Pearson
Note that x86_64 systems only offer the _rt signal handler variants, so the legacy signal handlers remain unimplemented on this platform. Signed-off-by: Timothy Pearson <tpear...@raptorengineering.com> --- linux-user/signal.c | 302 +++-

[Qemu-devel] [PATCH 0/7] Enable multimedia applications on x86_64 guests

2016-06-18 Thread Timothy Pearson
acceleration. Some notes/caveats are: Timothy Pearson (6): Add initial x86_64 signal handlers QEMU does not currently support host pages that are larger than guest pages, likely due to glibc using fixed mmap requests. Pass select() arguments directly to do_select() on x86 platforms

[Qemu-devel] [Bug 1591611] Re: chroot using qemu-x86_64-static fails on ppc64el

2016-06-18 Thread Timothy Pearson
Finally figured it out! It's the page size. qemu user mode does NOT support a host page that is greater than 4k on x86/x86_64 systems, despite some claims to the contrary on older documentation pages. I'll be updating the patch to print a clear warning on failure instead of allowing corrupt

[Qemu-devel] [Bug 1591611] Re: chroot using qemu-x86_64-static fails on ppc64el

2016-06-17 Thread Timothy Pearson
So after some further debugging effort it turns out while the page allocator is unaware of the mapping (looks like the x86_64 NPTL implementation never maps the thread ID memory?), g2h() does work on the address, and in this case they map to the same value. I'll probably submit a patch using g2h

[Qemu-devel] [Bug 1591611] Re: chroot using qemu-x86_64-static fails on ppc64el

2016-06-17 Thread Timothy Pearson
qemu can locate the guest page with that address but it has a flags field of all zero (no access, invalid). Any ideas? -- You received this bug notification because you are a member of qemu- devel-ml, which is subscribed to QEMU. https://bugs.launchpad.net/bugs/1591611 Title: chroot using

[Qemu-devel] [Bug 1591611] Re: chroot using qemu-x86_64-static fails on ppc64el

2016-06-16 Thread Timothy Pearson
On closer inspection maybe it's not that odd...the parent and child tid pointers are in abi, not target, space. I'm going to assume direct assignment is correct (using __put_user()) and proceed from there. -- You received this bug notification because you are a member of qemu- devel-ml, which

[Qemu-devel] [Bug 1591611] Re: chroot using qemu-x86_64-static fails on ppc64el

2016-06-16 Thread Timothy Pearson
OK, the fundamental problem is that do_fork() uses put_user_u32() on child_tidptr, but child_tidptr appears to be a host pointer. Treating it as a host pointer (direct assignment) allows fork to proceed, but this seems a bit odd to say the least. Still investigating. -- You received this bug

[Qemu-devel] [Bug 1591611] Re: chroot using qemu-x86_64-static fails on ppc64el

2016-06-16 Thread Timothy Pearson
Yes, I saw that -- implementing the signal handlers fixed the hang and a few other problems, but the assertion and subsequent SIGABORT/SIGSEGV are still present. Currently attempting to track down the fork() issues. -- You received this bug notification because you are a member of qemu-

[Qemu-devel] [Bug 1591611] Re: chroot using qemu-x86_64-static fails on ppc64el

2016-06-16 Thread Timothy Pearson
** Changed in: qemu Assignee: (unassigned) => Timothy Pearson (kb9vqf) -- You received this bug notification because you are a member of qemu- devel-ml, which is subscribed to QEMU. https://bugs.launchpad.net/bugs/1591611 Title: chroot using qemu-x86_64-static fails on ppc64el Sta

[Qemu-devel] [Bug 1591611] Re: chroot using qemu-x86_64-static fails on ppc64el

2016-06-13 Thread Timothy Pearson
Can you point me to the correct location in the codebase / any available resources on these handlers? I might be able to tackle this at a later date, but am not currently familiar with qemu's codebase. -- You received this bug notification because you are a member of qemu- devel-ml, which is

[Qemu-devel] [Bug 1591611] Re: chroot using qemu-x86_64-static fails on ppc64el

2016-06-12 Thread Timothy Pearson
Are there any plans to implement these signal handlers? -- You received this bug notification because you are a member of qemu- devel-ml, which is subscribed to QEMU. https://bugs.launchpad.net/bugs/1591611 Title: chroot using qemu-x86_64-static fails on ppc64el Status in QEMU: New Bug

[Qemu-devel] [Bug 1591611] [NEW] chroot using qemu-x86_64-static fails on ppc64el

2016-06-12 Thread Timothy Pearson
Public bug reported: When attempting to use qemu-x86_64-static from qemu 2.5.0 on a ppc64el host to chroot into an amd64 environment, all commands fail with an assertion error. /usr/bin/qemu-x86_64-static from the host was copied into the chroot /usr/bin, and the host has multiformat support in

[Qemu-devel] [Bug 1546680] Re: Incorrect display colors when running big endian guest on POWER8 little endian host

2016-02-19 Thread Timothy Pearson
** Tags added: power8 ** Tags removed: power8 ** Tags added: ppc qemu vga -- You received this bug notification because you are a member of qemu- devel-ml, which is subscribed to QEMU. https://bugs.launchpad.net/bugs/1546680 Title: Incorrect display colors when running big endian guest on

[Qemu-devel] [Bug 1546680] [NEW] Incorrect display colors when running big endian guest on POWER8 little endian host

2016-02-17 Thread Timothy Pearson
Public bug reported: When running a big endian CentOS guest on a little endian host system the display shows severe color issues, probably due to endianness not being properly detected / switched in the emulated display hardware. Little endian guests show no display issues on the same host