[Qemu-devel] [BUG] qemu-x86_64 crash when running bntest (was: [PATCH] Porting TCG to alpha platform)
Laurent Desnogues schrieb: > On Sat, Jan 30, 2010 at 12:04 AM, Stefan Weil > wrote: > [...] >> that was a good suggestion. bntest raises a segmentation fault >> (NULL pointer, p == 0, see below) with qemu-x86_64 on a x86_64 host. > > Compile bntest statically and it should work. > > x86_64 user mode is completely broken for dynamically > linked programs. > > > Laurent > A statically linked bntest results in a crash, too. Stefan $ ldd bntest not a dynamic executable $ x86/x86_64-linux-user/qemu-x86_64 ./bntest ERROR: ioctl(SNDCTL_DSP_MAPINBUF): target=0x80085013 host=0x80105013 ERROR: ioctl(SNDCTL_DSP_MAPOUTBUF): target=0x80085014 host=0x80105014 obase=16 ibase=16 test BN_add print "test BN_add\n" qemu: uncaught target signal 11 (Segmentation fault) - core dumped
Re: [Qemu-devel] [BUG] qemu-x86_64 crash when running bntest (was: [PATCH] Porting TCG to alpha platform)
On Sat, Jan 30, 2010 at 10:30 AM, Stefan Weil wrote: > Laurent Desnogues schrieb: >> On Sat, Jan 30, 2010 at 12:04 AM, Stefan Weil >> wrote: >> [...] >>> that was a good suggestion. bntest raises a segmentation fault >>> (NULL pointer, p == 0, see below) with qemu-x86_64 on a x86_64 host. >> >> Compile bntest statically and it should work. >> >> x86_64 user mode is completely broken for dynamically >> linked programs. >> >> >> Laurent >> > > A statically linked bntest results in a crash, too. > > Stefan > > > $ ldd bntest > not a dynamic executable > $ x86/x86_64-linux-user/qemu-x86_64 ./bntest > ERROR: ioctl(SNDCTL_DSP_MAPINBUF): target=0x80085013 host=0x80105013 > ERROR: ioctl(SNDCTL_DSP_MAPOUTBUF): target=0x80085014 host=0x80105014 > obase=16 > ibase=16 > test BN_add > print "test BN_add\n" > qemu: uncaught target signal 11 (Segmentation fault) - core dumped That worked for me. Could show us the last translated TB? Laurent
Re: [Qemu-devel] [BUG] qemu-x86_64 crash when running bntest (was: [PATCH] Porting TCG to alpha platform)
On Sat, Jan 30, 2010 at 10:30 AM, Stefan Weil wrote: > Laurent Desnogues schrieb: >> On Sat, Jan 30, 2010 at 12:04 AM, Stefan Weil >> wrote: >> [...] >>> that was a good suggestion. bntest raises a segmentation fault >>> (NULL pointer, p == 0, see below) with qemu-x86_64 on a x86_64 host. >> >> Compile bntest statically and it should work. >> >> x86_64 user mode is completely broken for dynamically >> linked programs. >> >> >> Laurent >> > > A statically linked bntest results in a crash, too. OK, I found the issue. It's vsyscall. You should use the patch I sent to this list a few months ago. Laurent
Re: [Qemu-devel] Merge qemu android
On Fri, Jan 29, 2010 at 3:41 AM, David Turner wrote: > On Thu, Jan 28, 2010 at 2:44 AM, Bastien ROUCARIES < > roucaries.bast...@gmail.com> wrote: > >> They use also craps like sdl :S >> >> > That's totally orthogonal to upstream QEMU. The code for our SDL-supported > interface is totally separate from the rest > of QEMU changes (or so I hope), and also different from mainline's sdl.c > > >> I think a total rewritte will be better . >> >> > >> How can incremently add a new arch to qemu or a new plateform ? >> >> Depends on what your goal is. If all you want is to be able to run Android > system images in an upstream qemu executable, > you will need essentially the following: > > - the content of hw/goldfish_.c in the Android codebase, > corresponding to the emulated hardware > - hw/android_arm.c to be ported to upstream too > - a few changes to the slirp code to setup the default network redirections > - a few changes to vl.c for setup. > It is exactly that I asked. Thank you :) > that should be it, though I cannot guarantee success at this point. Also > you will miss many features of the emulator, but > as I already said, this should not be a concern for upstream maintainers at > all. > > > >> Bastien >> >> Regards, >>> >>> Anthony Liguori >>> >>> Regards Bastien >>> >>> >> >> >
[Qemu-devel] Network shutdown under load
There's been some discussion of this already in the kvm list, but I want to summarize what I've found and also include the qemu-devel list in an effort to find a solution to this problem. Running a netperf test between two kvm guests results in the guest's network interface shutting down. I originally found this using kvm guests on two different machines that were connected via a 10GbE link. However, I found this problem can be easily reproduced using two guests on the same machine. I am running the 2.6.32 level of the kvm.git tree and the 0.12.1.2 level of the qemu-kvm.git tree. The setup includes two bridges, br0 and br1. The commands used to start the guests are as follows: usr/local/bin/qemu-system-x86_64 -name cape-vm001 -m 1024 -drive file=/autobench/var/tmp/cape-vm001- raw.img,if=virtio,index=0,media=disk,boot=on -net nic,model=virtio,vlan=0,macaddr=00:16:3E:00:62:51,netdev=cape-vm001-eth0 - netdev tap,id=cape-vm001-eth0,script=/autobench/var/tmp/ifup-kvm- br0,downscript=/autobench/var/tmp/ifdown-kvm-br0 -net nic,model=virtio,vlan=1,macaddr=00:16:3E:00:62:D1,netdev=cape-vm001-eth1 - netdev tap,id=cape-vm001-eth1,script=/autobench/var/tmp/ifup-kvm- br1,downscript=/autobench/var/tmp/ifdown-kvm-br1 -vnc :1 -monitor telnet::5701,server,nowait -snapshot -daemonize usr/local/bin/qemu-system-x86_64 -name cape-vm002 -m 1024 -drive file=/autobench/var/tmp/cape-vm002- raw.img,if=virtio,index=0,media=disk,boot=on -net nic,model=virtio,vlan=0,macaddr=00:16:3E:00:62:61,netdev=cape-vm002-eth0 - netdev tap,id=cape-vm002-eth0,script=/autobench/var/tmp/ifup-kvm- br0,downscript=/autobench/var/tmp/ifdown-kvm-br0 -net nic,model=virtio,vlan=1,macaddr=00:16:3E:00:62:E1,netdev=cape-vm002-eth1 - netdev tap,id=cape-vm002-eth1,script=/autobench/var/tmp/ifup-kvm- br1,downscript=/autobench/var/tmp/ifdown-kvm-br1 -vnc :2 -monitor telnet::5702,server,nowait -snapshot -daemonize The ifup-kvm-br0 script takes the (first) qemu created tap device and brings it up and adds it to bridge br0. The ifup-kvm-br1 script take the (second) qemu created tap device and brings it up and adds it to bridge br1. Each ethernet device within a guest is on it's own subnet. For example: guest 1 eth0 has addr 192.168.100.32 and eth1 has addr 192.168.101.32 guest 2 eth0 has addr 192.168.100.64 and eth1 has addr 192.168.101.64 On one of the guests run netserver: netserver -L 192.168.101.32 -p 12000 On the other guest run netperf: netperf -L 192.168.101.64 -H 192.168.101.32 -p 12000 -t TCP_STREAM -l 60 -c -C -- -m 16K -M 16K It may take more than one netperf run (I find that my second run almost always causes the shutdown) but the network on the eth1 links will stop working. I did some debugging and found that in qemu on the guest running netserver: - the receive_disabled variable is set and never gets reset - the read_poll event handler for the eth1 tap device is disabled and never re-enabled These conditions result in no packets being read from the tap device and sent to the guest - effectively shutting down the network. Network connectivity can be restored by shutting down the guest interfaces, unloading the virtio_net module, re-loading the virtio_net module and re-starting the guest interfaces. I'm continuing to work on debugging this, but would appreciate if some folks with more qemu network experience could try to recreate and debug this. If my kernel config matters, I can provide that. Thanks, Tom
[Qemu-devel] qemu without an X?
Hello all, Can Qemu running on Linux without an X server run windows operation system? is the virtualization can be directly with the hardware without Qemu/Linux interruption? Thanks.
[Qemu-devel] Re: qemu without an X?
Opps... sent to this list by mistake :-( On Sat, Jan 30, 2010 at 10:17 PM, jonatan perry wrote: > Hello all, > > Can Qemu running on Linux without an X server run windows operation system? > is the virtualization can be directly with the hardware without Qemu/Linux > interruption? > > Thanks. >
[Qemu-devel] sparc32 don't mark page dirty when failing
if the access check fails, the page can not be modified and shouldn't be marked dirty. The patch fixes the "hsfs_putpage: dirty HSFS page" error in Solaris guests. Signed-off-by: Artyom Tarasenko --- diff --git a/target-sparc/helper.c b/target-sparc/helper.c index b5b4e7c..ffe93e3 100644 --- a/target-sparc/helper.c +++ b/target-sparc/helper.c @@ -185,6 +185,12 @@ static int get_physical_address(CPUState *env, target_phys_addr_t *physical, } } +/* check access */ +access_perms = (pde & PTE_ACCESS_MASK) >> PTE_ACCESS_SHIFT; +error_code = access_table[*access_index][access_perms]; +if (error_code && !((env->mmuregs[0] & MMU_NF) && is_user)) +return error_code; + /* update page modified and dirty bits */ is_dirty = (rw & 1) && !(pde & PG_MODIFIED_MASK); if (!(pde & PG_ACCESSED_MASK) || is_dirty) { @@ -193,11 +199,6 @@ static int get_physical_address(CPUState *env, target_phys_addr_t *physical, pde |= PG_MODIFIED_MASK; stl_phys_notdirty(pde_ptr, pde); } -/* check access */ -access_perms = (pde & PTE_ACCESS_MASK) >> PTE_ACCESS_SHIFT; -error_code = access_table[*access_index][access_perms]; -if (error_code && !((env->mmuregs[0] & MMU_NF) && is_user)) -return error_code; /* the page can be put in the TLB */ *prot = perm_table[is_user][access_perms];
Re: [Qemu-devel] Re: [PATCH 6/6] fix audio_bug related failures
On Wed, 27 Jan 2010, Anthony Liguori wrote: > On 01/27/2010 05:56 AM, Paolo Bonzini wrote: > > On 01/27/2010 03:10 AM, Anthony Liguori wrote: > > > What did clang complain about? It's not obvious to me. > > > > It doesn't see that audio_bug returns cond, and gives quite a few false > > positive in its callers. > > Ah, this is a clang issue. I'll have to defer to malc on this one. > I'm against it. -- mailto:av1...@comtv.ru