Today I wrote some patches (for libguestfs) which add an experimental
UML backend:

  https://www.redhat.com/archives/libguestfs/2013-August/msg00005.html

There are some observations from this.

* 'ubd<N>=cow,original' is not parsed correctly.  This was reported a
while back and I'm seeing the same thing with the latest kernel from
git:

  http://thread.gmane.org/gmane.linux.uml.devel/13556

If I have some time I'll have a go at fixing this since it seems like
a simple regression.

* I'm trying to use a serial port to communicate between guest and
host, using ssl3=fd:<N>.  This causes the Linux process to crash soon
(but not immediately) after the guest has opened /dev/ttyS3:

  spurious interrupt in ubd_handler, err = -4

I've put the full call trace at the end of the email because it's
quite long[1].  This was also reported before, although the suggested
patch did not fix it:

  http://marc.info/?l=linux-kernel&m=123242364211797&w=2

I wonder if anyone has used the fd:<N> option in anger?  I will try
using a Unix domain socket and see if it makes a difference.

* UML is pretty fast!  It's certainly faster (by a factor of > 5) than
spinning up a lightweight KVM VM.

Rich.

[1] Call trace

spurious interrupt in ubd_handler, err = -4

Modules linked in:
Pid: 1614169860, comm:  Not tainted 3.11.0-rc4-00103-g6c2580c
RIP: 0033:[<000000006001db74>]
RSP: 0000000080ca9f98  EFLAGS: 00010206
RAX: 0000000000000008 RBX: 0000000000000008 RCX: 0000003f2cae6970
RDX: 0000000000000000 RSI: 0000000080ca9fb0 RDI: 0000000000000005
RBP: 0000000080ca9fe8 R08: 0000000080ca9ed8 R09: 0000000080ca9e40
R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000001000
R13: 0000000080e867c4 R14: 0000000000000001 R15: 68c00000000080ea
Call Trace: 
80ca9538:  [<600151ac>]------------[ cut here ]------------
WARNING: CPU: 0 PID: 6 at block/blk.h:210 
generic_make_request_checks+0x1aa/0x234()
BUG: recent printk recursion!
80ca9648:  [<60022207>] sig_handler_common+0x8c/0xa2
80ca96d0:  [<6001db74>] io_thread+0x63/0x243
80ca9988:  [<600222c2>] sig_handler+0x2e/0x39
80ca99a8:  [<60021f33>] hard_handler+0x83/0xab
80ca9aa8:  [<6001db74>] io_thread+0x63/0x243
80ca9d88:  [<60021eb0>] hard_handler+0x0/0xab
80ca9f70:  [<60020308>] os_seek_file+0x11/0x27
80ca9f80:  [<6002032a>] os_read_file+0xc/0x1f
80ca9f90:  [<6001db3b>] io_thread+0x2a/0x243

Kernel panic - not syncing: Segfault with no mm
CPU: 0 PID: 1614169860 Comm:  Not tainted 3.11.0-rc4-00103-g6c2580c #3

Modules linked in:
Pid: 1614169860, comm:  Not tainted 3.11.0-rc4-00103-g6c2580c
RIP: 0033:[<0000000060026715>]
RSP: 0000000080ca9328  EFLAGS: 00010246
RAX: 0000000080ca9398 RBX: 00000000602d2460 RCX: 0000000080ca8000
RDX: 0000000000000008 RSI: 636f6c6e6f6e5f88 RDI: 0000000080ca9398
RBP: 0000000080ca9350 R08: 636f6c6e6f6e5f70 R09: 636f6c6e6f6e5f70
R10: 0000003f2ca892da R11: 0000003f2ca892da R12: 000000006026b27c
R13: 000000006001db74 R14: 0000000000000004 R15: 0000000000000000
Call Trace: 
80ca88b8:  [<600151ac>] segv+0x66/0x241
80ca8988:  [<600153e9>] segv_handler+0x62/0x6c
80ca89c8:  [<60022207>] sig_handler_common+0x8c/0xa2
80ca89e0:  [<6001db74>] io_thread+0x63/0x243
80ca8a50:  [<60026715>] memcpy+0xb5/0x140
80ca8d08:  [<600222c2>] sig_handler+0x2e/0x39
80ca8d28:  [<60021f33>] hard_handler+0x83/0xab
80ca8d58:  [<6001db74>] io_thread+0x63/0x243
80ca8dd0:  [<6001db74>] io_thread+0x63/0x243
80ca8e28:  [<60026715>] memcpy+0xb5/0x140
80ca90e8:  [<60017226>] generic_write+0xf/0x38
80ca9108:  [<600172f9>] generic_console_write+0x3e/0x165
80ca9288:  [<6004c396>] vprintk_emit+0x2dd/0x2ee
80ca92d8:  [<6001db74>] io_thread+0x63/0x243
80ca92f8:  [<601edf38>] printk+0x97/0x99
80ca9308:  [<60015eff>] copy_from_user+0x36/0x8a
80ca9328:  [<60015eff>] copy_from_user+0x36/0x8a
80ca9358:  [<600699d4>] __probe_kernel_read+0x3c/0x6d
80ca9368:  [<6003f2ac>] probe_kthread_data+0x29/0x2f
80ca9388:  [<6003becc>] print_worker_info+0x66/0x124
80ca93f8:  [<6004d204>] dump_stack_print_info+0xa6/0xaf
80ca9428:  [<601efbeb>] dump_stack+0xe/0x19
80ca9438:  [<601ed8b7>] panic+0xf7/0x1e4
80ca9490:  [<60056982>] __module_text_address+0xd/0x4d
80ca94a8:  [<6005a007>] is_module_text_address+0x9/0x11
80ca94b8:  [<6003cd40>] __kernel_text_address+0x26/0x49
80ca94d8:  [<60014146>] show_trace+0x8e/0x95
80ca9508:  [<60026491>] show_regs+0x27/0x2a
80ca9520:  [<6001db74>] io_thread+0x63/0x243
80ca9538:  [<6001524f>] segv+0x109/0x241
80ca9608:  [<600153e9>] segv_handler+0x62/0x6c
80ca9628:  [<60022169>] unblock_signals+0x4a/0x5c
80ca9648:  [<60022207>] sig_handler_common+0x8c/0xa2
80ca96d0:  [<6001db74>] io_thread+0x63/0x243
80ca9988:  [<600222c2>] sig_handler+0x2e/0x39
80ca99a8:  [<60021f33>] hard_handler+0x83/0xab
80ca9aa8:  [<6001db74>] io_thread+0x63/0x243
80ca9d88:  [<60021eb0>] hard_handler+0x0/0xab
80ca9f70:  [<60020308>] os_seek_file+0x11/0x27
80ca9f80:  [<6002032a>] os_read_file+0xc/0x1f
80ca9f90:  [<6001db3b>] io_thread+0x2a/0x243

Kernel panic - not syncing: Segfault with no mm

Modules linked in:
Pid: 1614169860, comm:  Not tainted 3.11.0-rc4-00103-g6c2580c
RIP: 0000:[<000001a400000004>]
RSP: 0000000000000000  EFLAGS: 6002e720
RAX: 000000006002e770 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000602706ae
RBP: 0000000000000000 R08: 0000000000000000 R09: 000001a400000004
R10: 00000000602d04ac R11: 000000006027069b R12: 0000000000000000
R13: 000000006002e720 R14: 0000000000000000 R15: 000001a400000004
Call Trace: 
80ca8748:  [<6001564c>] panic_exit+0x2b/0x41
80ca8758:  [<6015a3ac>] vsnprintf+0xd0/0x431
80ca8768:  [<600427c7>] notifier_call_chain+0x39/0x5c
80ca8790:  [<60026715>] memcpy+0xb5/0x140
80ca87a8:  [<60042804>] atomic_notifier_call_chain+0xf/0x11
80ca87b8:  [<601ed8d2>] panic+0x112/0x1e4
80ca8810:  [<60056982>] __module_text_address+0xd/0x4d
80ca8828:  [<6005a007>] is_module_text_address+0x9/0x11
80ca8838:  [<6003cd40>] __kernel_text_address+0x26/0x49
80ca8858:  [<60014146>] show_trace+0x8e/0x95
80ca8888:  [<60026491>] show_regs+0x27/0x2a
80ca88a0:  [<60026715>] memcpy+0xb5/0x140
80ca88b8:  [<6001524f>] segv+0x109/0x241
80ca8988:  [<600153e9>] segv_handler+0x62/0x6c
80ca89c8:  [<60022207>] sig_handler_common+0x8c/0xa2
80ca89e0:  [<6001db74>] io_thread+0x63/0x243

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
virt-p2v converts physical machines to virtual machines.  Boot with a
live CD or over the network (PXE) and turn machines into KVM guests.
http://libguestfs.org/virt-v2v

------------------------------------------------------------------------------
Get 100% visibility into Java/.NET code with AppDynamics Lite!
It's a free troubleshooting tool designed for production.
Get down to code-level detail for bottlenecks, with <2% overhead. 
Download for free and get started troubleshooting in minutes. 
http://pubads.g.doubleclick.net/gampad/clk?id=48897031&iu=/4140/ostg.clktrk
_______________________________________________
User-mode-linux-devel mailing list
User-mode-linux-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/user-mode-linux-devel

Reply via email to