* qemu-kvm loops after kernel udpate
@ 2012-09-11 18:11 Jiri Slaby
2012-09-11 19:03 ` Marcelo Tosatti
0 siblings, 1 reply; 16+ messages in thread
From: Jiri Slaby @ 2012-09-11 18:11 UTC (permalink / raw)
To: Avi Kivity, Marcelo Tosatti, kvm, LKML, Jiri Slaby
Hi,
it looks like an update from next-20120824 to next-20120910 makes kvm
defunct. When I try to run qemu, it loops forever without printing
anything on the monitor.
-no-kvm makes it indeed work.
Cmdline I use:
qemu-kvm -k en-us -usbdevice tablet -balloon virtio -hda IMAGE -smp 2 -m
1000M -net user -net nic,model=e1000 -usb -serial pty
Before I start investigating further, like biscection, is this a known
issue already and fix available somewhere?
thanks,
--
js
suse labs
^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: qemu-kvm loops after kernel udpate
2012-09-11 18:11 qemu-kvm loops after kernel udpate Jiri Slaby
@ 2012-09-11 19:03 ` Marcelo Tosatti
2012-09-11 19:41 ` Jiri Slaby
0 siblings, 1 reply; 16+ messages in thread
From: Marcelo Tosatti @ 2012-09-11 19:03 UTC (permalink / raw)
To: Jiri Slaby; +Cc: Avi Kivity, kvm, LKML, Jiri Slaby
On Tue, Sep 11, 2012 at 08:11:36PM +0200, Jiri Slaby wrote:
> Hi,
>
> it looks like an update from next-20120824 to next-20120910 makes kvm
> defunct. When I try to run qemu, it loops forever without printing
> anything on the monitor.
>
> -no-kvm makes it indeed work.
>
> Cmdline I use:
> qemu-kvm -k en-us -usbdevice tablet -balloon virtio -hda IMAGE -smp 2 -m
> 1000M -net user -net nic,model=e1000 -usb -serial pty
>
> Before I start investigating further, like biscection, is this a known
> issue already and fix available somewhere?
>
> thanks,
Its not a known issue. 'info registers' (for both vcpus) and
'x /20i $eip' might help track it down.
^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: qemu-kvm loops after kernel udpate
2012-09-11 19:03 ` Marcelo Tosatti
@ 2012-09-11 19:41 ` Jiri Slaby
2012-09-12 8:06 ` Avi Kivity
0 siblings, 1 reply; 16+ messages in thread
From: Jiri Slaby @ 2012-09-11 19:41 UTC (permalink / raw)
To: Marcelo Tosatti; +Cc: Avi Kivity, kvm, LKML, Jiri Slaby
On 09/11/2012 09:03 PM, Marcelo Tosatti wrote:
> On Tue, Sep 11, 2012 at 08:11:36PM +0200, Jiri Slaby wrote:
>> Hi,
>>
>> it looks like an update from next-20120824 to next-20120910 makes kvm
>> defunct. When I try to run qemu, it loops forever without printing
>> anything on the monitor.
>>
>> -no-kvm makes it indeed work.
>>
>> Cmdline I use:
>> qemu-kvm -k en-us -usbdevice tablet -balloon virtio -hda IMAGE -smp 2 -m
>> 1000M -net user -net nic,model=e1000 -usb -serial pty
>>
>> Before I start investigating further, like biscection, is this a known
>> issue already and fix available somewhere?
>
> Its not a known issue. 'info registers' (for both vcpus) and
> 'x /20i $eip' might help track it down.
I don't think it's in a state with something loaded.
(qemu) cpu 0
(qemu) info registers
EAX=00000000 EBX=00000000 ECX=00000000 EDX=00000623
ESI=00000000 EDI=00000000 EBP=00000000 ESP=00000000
EIP=0000fff0 EFL=00010002 [-------] CPL=3 II=0 A20=1 SMM=0 HLT=0
ES =0000 00000000 0000ffff 00009300
CS =f000 000f0000 0000ffff 0000f300
SS =0000 00000000 0000ffff 0000f300
DS =0000 00000000 0000ffff 00009300
FS =0000 00000000 0000ffff 00009300
GS =0000 00000000 0000ffff 00009300
LDT=0000 00000000 0000ffff 00008200
TR =0000 00000000 0000ffff 00008b00
GDT= 00000000 0000ffff
IDT= 00000000 0000ffff
CR0=60000010 CR2=00000000 CR3=00000000 CR4=00000000
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000
DR3=0000000000000000
DR6=00000000ffff0ff0 DR7=0000000000000400
EFER=0000000000000000
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
XMM00=00000000000000000000000000000000
XMM01=00000000000000000000000000000000
XMM02=00000000000000000000000000000000
XMM03=00000000000000000000000000000000
XMM04=00000000000000000000000000000000
XMM05=00000000000000000000000000000000
XMM06=00000000000000000000000000000000
XMM07=00000000000000000000000000000000
(qemu) cpu 1
(qemu) info registers
EAX=00000000 EBX=00000000 ECX=00000000 EDX=00000623
ESI=00000000 EDI=00000000 EBP=00000000 ESP=00000000
EIP=0000fff0 EFL=00000002 [-------] CPL=3 II=0 A20=1 SMM=0 HLT=0
ES =0000 00000000 0000ffff 00009300
CS =f000 000f0000 0000ffff 0000f300
SS =0000 00000000 0000ffff 0000f300
DS =0000 00000000 0000ffff 00009300
FS =0000 00000000 0000ffff 00009300
GS =0000 00000000 0000ffff 00009300
LDT=0000 00000000 0000ffff 00008200
TR =0000 00000000 0000ffff 00008b00
GDT= 00000000 0000ffff
IDT= 00000000 0000ffff
CR0=60000010 CR2=00000000 CR3=00000000 CR4=00000000
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000
DR3=0000000000000000
DR6=00000000ffff0ff0 DR7=0000000000000400
EFER=0000000000000000
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
XMM00=00000000000000000000000000000000
XMM01=00000000000000000000000000000000
XMM02=00000000000000000000000000000000
XMM03=00000000000000000000000000000000
XMM04=00000000000000000000000000000000
XMM05=00000000000000000000000000000000
XMM06=00000000000000000000000000000000
XMM07=00000000000000000000000000000000
(qemu) x /20i $eip
0x000000000000fff0: add %al,(%bx,%si)
0x000000000000fff2: add %al,(%bx,%si)
0x000000000000fff4: add %al,(%bx,%si)
0x000000000000fff6: add %al,(%bx,%si)
0x000000000000fff8: add %al,(%bx,%si)
0x000000000000fffa: add %al,(%bx,%si)
0x000000000000fffc: add %al,(%bx,%si)
0x000000000000fffe: add %al,(%bx,%si)
0x0000000000010000: add %al,(%bx,%si)
0x0000000000010002: add %al,(%bx,%si)
0x0000000000010004: add %al,(%bx,%si)
0x0000000000010006: add %al,(%bx,%si)
0x0000000000010008: add %al,(%bx,%si)
0x000000000001000a: add %al,(%bx,%si)
0x000000000001000c: add %al,(%bx,%si)
0x000000000001000e: add %al,(%bx,%si)
0x0000000000010010: add %al,(%bx,%si)
0x0000000000010012: add %al,(%bx,%si)
0x0000000000010014: add %al,(%bx,%si)
0x0000000000010016: add %al,(%bx,%si)
thanks,
--
js
suse labs
^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: qemu-kvm loops after kernel udpate
2012-09-11 19:41 ` Jiri Slaby
@ 2012-09-12 8:06 ` Avi Kivity
2012-09-12 8:13 ` Jiri Slaby
0 siblings, 1 reply; 16+ messages in thread
From: Avi Kivity @ 2012-09-12 8:06 UTC (permalink / raw)
To: Jiri Slaby; +Cc: Marcelo Tosatti, kvm, LKML, Jiri Slaby
On 09/11/2012 10:41 PM, Jiri Slaby wrote:
> On 09/11/2012 09:03 PM, Marcelo Tosatti wrote:
>> On Tue, Sep 11, 2012 at 08:11:36PM +0200, Jiri Slaby wrote:
>>> Hi,
>>>
>>> it looks like an update from next-20120824 to next-20120910 makes kvm
>>> defunct. When I try to run qemu, it loops forever without printing
>>> anything on the monitor.
>>>
>>> -no-kvm makes it indeed work.
>>>
>>> Cmdline I use:
>>> qemu-kvm -k en-us -usbdevice tablet -balloon virtio -hda IMAGE -smp 2 -m
>>> 1000M -net user -net nic,model=e1000 -usb -serial pty
>>>
>>> Before I start investigating further, like biscection, is this a known
>>> issue already and fix available somewhere?
>>
>> Its not a known issue. 'info registers' (for both vcpus) and
>> 'x /20i $eip' might help track it down.
>
> I don't think it's in a state with something loaded.
>
> (qemu) cpu 0
> (qemu) info registers
> EAX=00000000 EBX=00000000 ECX=00000000 EDX=00000623
> ESI=00000000 EDI=00000000 EBP=00000000 ESP=00000000
> EIP=0000fff0 EFL=00010002 [-------] CPL=3 II=0 A20=1 SMM=0 HLT=0
> ES =0000 00000000 0000ffff 00009300
> CS =f000 000f0000 0000ffff 0000f300
This is before the first instruction is executed.
You're on an Intel host, yes? Please provide the output of vmxcap
(http://goo.gl/c5lUO), and a snapshot of kvm_stat while the guest is hung.
--
error compiling committee.c: too many arguments to function
^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: qemu-kvm loops after kernel udpate
2012-09-12 8:06 ` Avi Kivity
@ 2012-09-12 8:13 ` Jiri Slaby
2012-09-12 8:18 ` Avi Kivity
0 siblings, 1 reply; 16+ messages in thread
From: Jiri Slaby @ 2012-09-12 8:13 UTC (permalink / raw)
To: Avi Kivity; +Cc: Jiri Slaby, Marcelo Tosatti, kvm, LKML
On 09/12/2012 10:06 AM, Avi Kivity wrote:
> On 09/11/2012 10:41 PM, Jiri Slaby wrote:
>> On 09/11/2012 09:03 PM, Marcelo Tosatti wrote:
>>> On Tue, Sep 11, 2012 at 08:11:36PM +0200, Jiri Slaby wrote:
>>>> Hi,
>>>>
>>>> it looks like an update from next-20120824 to next-20120910 makes kvm
>>>> defunct. When I try to run qemu, it loops forever without printing
>>>> anything on the monitor.
>>>>
>>>> -no-kvm makes it indeed work.
>>>>
>>>> Cmdline I use:
>>>> qemu-kvm -k en-us -usbdevice tablet -balloon virtio -hda IMAGE -smp 2 -m
>>>> 1000M -net user -net nic,model=e1000 -usb -serial pty
>>>>
>>>> Before I start investigating further, like biscection, is this a known
>>>> issue already and fix available somewhere?
>>>
>>> Its not a known issue. 'info registers' (for both vcpus) and
>>> 'x /20i $eip' might help track it down.
>>
>> I don't think it's in a state with something loaded.
>>
>> (qemu) cpu 0
>> (qemu) info registers
>> EAX=00000000 EBX=00000000 ECX=00000000 EDX=00000623
>> ESI=00000000 EDI=00000000 EBP=00000000 ESP=00000000
>> EIP=0000fff0 EFL=00010002 [-------] CPL=3 II=0 A20=1 SMM=0 HLT=0
>> ES =0000 00000000 0000ffff 00009300
>> CS =f000 000f0000 0000ffff 0000f300
>
> This is before the first instruction is executed.
>
> You're on an Intel host, yes?
Yes.
processor : 1
vendor_id : GenuineIntel
cpu family : 6
model : 15
model name : Intel(R) Core(TM)2 Duo CPU E6850 @ 3.00GHz
stepping : 11
microcode : 0xba
...
flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge
mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe
syscall nx lm constant_tsc arch_perfmon pebs bts nopl aperfmperf pni
dtes64 monitor ds_cpl vmx smx est tm2 ssse3 cx16 xtpr pdcm lahf_lm
dtherm tpr_shadow vnmi flexpriority
> Please provide the output of vmxcap
> (http://goo.gl/c5lUO),
pin-based controls
External interrupt exiting yes
NMI exiting yes
Virtual NMIs yes
Activate VMX-preemption timer no
primary processor-based controls
Interrupt window exiting yes
Use TSC offsetting yes
HLT exiting yes
INVLPG exiting yes
MWAIT exiting yes
RDPMC exiting yes
RDTSC exiting yes
CR3-load exiting forced
CR3-store exiting forced
CR8-load exiting yes
CR8-store exiting yes
Use TPR shadow yes
NMI-window exiting yes
MOV-DR exiting yes
Unconditional I/O exiting yes
Use I/O bitmaps yes
Monitor trap flag no
Use MSR bitmaps yes
MONITOR exiting yes
PAUSE exiting yes
Activate secondary control yes
secondary processor-based controls
Virtualize APIC accesses yes
Enable EPT no
Descriptor-table exiting no
Virtualize x2APIC mode no
Enable VPID no
WBINVD exiting no
Unrestricted guest no
PAUSE-loop exiting no
RDRAND exiting no
Enable INVPCID no
Enable VM functions no
VM-Exit controls
Save debug controls forced
Host address-space size yes
Load IA32_PERF_GLOBAL_CTRL no
Acknowledge interrupt on exit yes
Save IA32_PAT no
Load IA32_PAT no
Save IA32_EFER no
Load IA32_EFER no
Save VMX-preemption timer value no
VM-Entry controls
Load debug controls forced
IA-64 mode guest yes
Entry to SMM yes
Deactivate dual-monitor treatment yes
Load IA32_PERF_GLOBAL_CTRL no
Load IA32_PAT no
Load IA32_EFER no
Miscellaneous data
VMX-preemption timer scale (log2) 0
Store EFER.LMA into IA-32e mode guest control no
HLT activity state yes
Shutdown activity state yes
Wait-for-SIPI activity state yes
Number of CR3-target values 4
MSR-load/store count recommenation 0
IA32_SMM_MONITOR_CTL[2] can be set to 1 no
MSEG revision identifier 0
VPID and EPT capabilities
Execute-only EPT translations no
Page-walk length 4 no
Paging-structure memory type UC no
Paging-structure memory type WB no
2MB EPT pages no
1GB EPT pages no
INVEPT supported no
EPT accessed and dirty flags no
Single-context INVEPT no
All-context INVEPT no
INVVPID supported no
Individual-address INVVPID no
Single-context INVVPID no
All-context INVVPID no
Single-context-retaining-globals INVVPID no
VM Functions
EPTP Switching no
> and a snapshot of kvm_stat while the guest is hung.
kvm statistics
exits 6778198 615942
host_state_reload 1988 187
irq_exits 1523 138
mmu_cache_miss 4 0
fpu_reload 1 0
thanks,
--
js
suse labs
^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: qemu-kvm loops after kernel udpate
2012-09-12 8:13 ` Jiri Slaby
@ 2012-09-12 8:18 ` Avi Kivity
2012-09-12 8:20 ` Jiri Slaby
2012-09-12 18:11 ` Jiri Slaby
0 siblings, 2 replies; 16+ messages in thread
From: Avi Kivity @ 2012-09-12 8:18 UTC (permalink / raw)
To: Jiri Slaby; +Cc: Jiri Slaby, Marcelo Tosatti, kvm, LKML
On 09/12/2012 11:13 AM, Jiri Slaby wrote:
>
>> Please provide the output of vmxcap
>> (http://goo.gl/c5lUO),
>
> Unrestricted guest no
The big real mode fixes.
>
>> and a snapshot of kvm_stat while the guest is hung.
>
> kvm statistics
>
> exits 6778198 615942
> host_state_reload 1988 187
> irq_exits 1523 138
> mmu_cache_miss 4 0
> fpu_reload 1 0
Please run this as root so we get the tracepoint based output; and press
'x' when it's running so we get more detailed output.
--
error compiling committee.c: too many arguments to function
^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: qemu-kvm loops after kernel udpate
2012-09-12 8:18 ` Avi Kivity
@ 2012-09-12 8:20 ` Jiri Slaby
2012-09-12 18:11 ` Jiri Slaby
1 sibling, 0 replies; 16+ messages in thread
From: Jiri Slaby @ 2012-09-12 8:20 UTC (permalink / raw)
To: Avi Kivity; +Cc: Jiri Slaby, Marcelo Tosatti, kvm, LKML
On 09/12/2012 10:18 AM, Avi Kivity wrote:
> On 09/12/2012 11:13 AM, Jiri Slaby wrote:
>> kvm statistics
>>
>> exits 6778198 615942
>> host_state_reload 1988 187
>> irq_exits 1523 138
>> mmu_cache_miss 4 0
>> fpu_reload 1 0
>
> Please run this as root so we get the tracepoint based output; and press
> 'x' when it's running so we get more detailed output.
I need to build a kernel with trace points enabled first... I will
return later today.
thanks,
--
js
suse labs
^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: qemu-kvm loops after kernel udpate
2012-09-12 8:18 ` Avi Kivity
2012-09-12 8:20 ` Jiri Slaby
@ 2012-09-12 18:11 ` Jiri Slaby
2012-09-13 9:59 ` Avi Kivity
1 sibling, 1 reply; 16+ messages in thread
From: Jiri Slaby @ 2012-09-12 18:11 UTC (permalink / raw)
To: Avi Kivity; +Cc: Jiri Slaby, Marcelo Tosatti, kvm, LKML
On 09/12/2012 10:18 AM, Avi Kivity wrote:
> On 09/12/2012 11:13 AM, Jiri Slaby wrote:
>>
>>> Please provide the output of vmxcap
>>> (http://goo.gl/c5lUO),
>>
>> Unrestricted guest no
>
> The big real mode fixes.
>
>
>>
>>> and a snapshot of kvm_stat while the guest is hung.
>>
>> kvm statistics
>>
>> exits 6778198 615942
>> host_state_reload 1988 187
>> irq_exits 1523 138
>> mmu_cache_miss 4 0
>> fpu_reload 1 0
>
> Please run this as root so we get the tracepoint based output; and press
> 'x' when it's running so we get more detailed output.
kvm statistics
kvm_exit 13798699 330708
kvm_entry 13799110 330708
kvm_page_fault 13793650 330604
kvm_exit(EXCEPTION_NMI) 6188458 330604
kvm_exit(EXTERNAL_INTERRUPT) 2169 105
kvm_exit(TPR_BELOW_THRESHOLD) 82 0
kvm_exit(IO_INSTRUCTION) 6 0
kvm_exit(PAUSE_INSTRUCTION) 5 0
kvm_exit(MCE_DURING_VMENTRY) 5 0
kvm_exit(DR_ACCESS) 5 0
kvm_exit(VMPTRLD) 5 0
kvm_exit(VMLAUNCH) 5 0
kvm_exit(INVLPG) 5 0
kvm_exit(VMCALL) 5 0
kvm_exit(WBINVD) 5 0
kvm_exit(MONITOR_INSTRUCTION) 5 0
kvm_exit(MWAIT_INSTRUCTION) 4 0
kvm_exit(NMI_WINDOW) 4 0
kvm_exit(VMREAD) 4 0
kvm_exit(XSETBV) 4 0
kvm_exit(RDPMC) 4 0
kvm_exit(CPUID) 4 0
kvm_exit(VMCLEAR) 4 0
kvm_exit(PENDING_INTERRUPT) 4 0
kvm_exit(VMRESUME) 4 0
kvm_exit(APIC_ACCESS) 4 0
kvm_exit(INVALID_STATE) 4 0
kvm_exit(MSR_READ) 4 0
kvm_exit(VMOFF) 4 0
kvm_exit(RDTSC) 4 0
kvm_exit(MSR_WRITE) 4 0
kvm_exit(VMPTRST) 4 0
kvm_exit(VMWRITE) 4 0
kvm_exit(HLT) 3 0
kvm_exit(EPT_VIOLATION) 3 0
kvm_exit(TASK_SWITCH) 3 0
kvm_exit(CR_ACCESS) 3 0
kvm_exit(TRIPLE_FAULT) 3 0
kvm_exit(VMON) 3 0
kvm_exit(EPT_MISCONFIG) 3 0
thanks,
--
js
suse labs
^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: qemu-kvm loops after kernel udpate
2012-09-12 18:11 ` Jiri Slaby
@ 2012-09-13 9:59 ` Avi Kivity
2012-09-13 18:32 ` Jiri Slaby
2012-09-18 19:40 ` Jiri Slaby
0 siblings, 2 replies; 16+ messages in thread
From: Avi Kivity @ 2012-09-13 9:59 UTC (permalink / raw)
To: Jiri Slaby; +Cc: Jiri Slaby, Marcelo Tosatti, kvm, LKML
On 09/12/2012 09:11 PM, Jiri Slaby wrote:
> On 09/12/2012 10:18 AM, Avi Kivity wrote:
>> On 09/12/2012 11:13 AM, Jiri Slaby wrote:
>>>
>>>> Please provide the output of vmxcap
>>>> (http://goo.gl/c5lUO),
>>>
>>> Unrestricted guest no
>>
>> The big real mode fixes.
>>
>>
>>>
>>>> and a snapshot of kvm_stat while the guest is hung.
>>>
>>> kvm statistics
>>>
>>> exits 6778198 615942
>>> host_state_reload 1988 187
>>> irq_exits 1523 138
>>> mmu_cache_miss 4 0
>>> fpu_reload 1 0
>>
>> Please run this as root so we get the tracepoint based output; and press
>> 'x' when it's running so we get more detailed output.
>
> kvm statistics
>
> kvm_exit 13798699 330708
> kvm_entry 13799110 330708
> kvm_page_fault 13793650 330604
> kvm_exit(EXCEPTION_NMI) 6188458 330604
> kvm_exit(EXTERNAL_INTERRUPT) 2169 105
> kvm_exit(TPR_BELOW_THRESHOLD) 82 0
> kvm_exit(IO_INSTRUCTION) 6 0
Strange, it's unable to fault in the very first page.
Please provide a trace as per http://www.linux-kvm.org/page/Tracing (but
append -e kvmmmu to the command line).
--
error compiling committee.c: too many arguments to function
^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: qemu-kvm loops after kernel udpate
2012-09-13 9:59 ` Avi Kivity
@ 2012-09-13 18:32 ` Jiri Slaby
2012-09-18 19:40 ` Jiri Slaby
1 sibling, 0 replies; 16+ messages in thread
From: Jiri Slaby @ 2012-09-13 18:32 UTC (permalink / raw)
To: Avi Kivity; +Cc: Jiri Slaby, Marcelo Tosatti, kvm, LKML
[-- Attachment #1: Type: text/plain, Size: 1702 bytes --]
On 09/13/2012 11:59 AM, Avi Kivity wrote:
> On 09/12/2012 09:11 PM, Jiri Slaby wrote:
>> On 09/12/2012 10:18 AM, Avi Kivity wrote:
>>> On 09/12/2012 11:13 AM, Jiri Slaby wrote:
>>>>
>>>>> Please provide the output of vmxcap
>>>>> (http://goo.gl/c5lUO),
>>>>
>>>> Unrestricted guest no
>>>
>>> The big real mode fixes.
>>>
>>>
>>>>
>>>>> and a snapshot of kvm_stat while the guest is hung.
>>>>
>>>> kvm statistics
>>>>
>>>> exits 6778198 615942
>>>> host_state_reload 1988 187
>>>> irq_exits 1523 138
>>>> mmu_cache_miss 4 0
>>>> fpu_reload 1 0
>>>
>>> Please run this as root so we get the tracepoint based output; and press
>>> 'x' when it's running so we get more detailed output.
>>
>> kvm statistics
>>
>> kvm_exit 13798699 330708
>> kvm_entry 13799110 330708
>> kvm_page_fault 13793650 330604
>> kvm_exit(EXCEPTION_NMI) 6188458 330604
>> kvm_exit(EXTERNAL_INTERRUPT) 2169 105
>> kvm_exit(TPR_BELOW_THRESHOLD) 82 0
>> kvm_exit(IO_INSTRUCTION) 6 0
>
> Strange, it's unable to fault in the very first page.
>
> Please provide a trace as per http://www.linux-kvm.org/page/Tracing (but
> append -e kvmmmu to the command line).
Attached. Does it make sense? It wrote things like:
failed to read event print fmt for kvm_mmu_unsync_page
to the stderr.
thanks,
--
js
suse labs
[-- Attachment #2: report --]
[-- Type: text/plain, Size: 1627 bytes --]
version = 6
CPU 0 is empty
cpus=2
qemu-kvm-6170 [001] 457.811896: kvm_mmu_get_page: [FAILED TO PARSE] gfn=0 role=122882 root_count=0 unsync=0 created=1
qemu-kvm-6170 [001] 457.811899: kvm_mmu_get_page: [FAILED TO PARSE] gfn=262144 role=122882 root_count=0 unsync=0 created=1
qemu-kvm-6170 [001] 457.811900: kvm_mmu_get_page: [FAILED TO PARSE] gfn=524288 role=122882 root_count=0 unsync=0 created=1
qemu-kvm-6170 [001] 457.811902: kvm_mmu_get_page: [FAILED TO PARSE] gfn=786432 role=122882 root_count=0 unsync=0 created=1
qemu-kvm-6171 [001] 462.416705: kvm_mmu_prepare_zap_page: [FAILED TO PARSE] gfn=786432 role=122882 root_count=1 unsync=0
qemu-kvm-6171 [001] 462.416712: kvm_mmu_prepare_zap_page: [FAILED TO PARSE] gfn=524288 role=122882 root_count=1 unsync=0
qemu-kvm-6171 [001] 462.416715: kvm_mmu_prepare_zap_page: [FAILED TO PARSE] gfn=262144 role=122882 root_count=1 unsync=0
qemu-kvm-6171 [001] 462.416717: kvm_mmu_prepare_zap_page: [FAILED TO PARSE] gfn=0 role=122882 root_count=1 unsync=0
qemu-kvm-6171 [001] 462.485197: kvm_mmu_prepare_zap_page: [FAILED TO PARSE] gfn=0 role=253954 root_count=0 unsync=0
qemu-kvm-6171 [001] 462.485202: kvm_mmu_prepare_zap_page: [FAILED TO PARSE] gfn=262144 role=253954 root_count=0 unsync=0
qemu-kvm-6171 [001] 462.485205: kvm_mmu_prepare_zap_page: [FAILED TO PARSE] gfn=524288 role=253954 root_count=0 unsync=0
qemu-kvm-6171 [001] 462.485209: kvm_mmu_prepare_zap_page: [FAILED TO PARSE] gfn=786432 role=253954 root_count=0 unsync=0
^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: qemu-kvm loops after kernel udpate
2012-09-13 9:59 ` Avi Kivity
2012-09-13 18:32 ` Jiri Slaby
@ 2012-09-18 19:40 ` Jiri Slaby
2012-09-18 19:46 ` Andrew Morton
2012-09-19 14:18 ` [PATCH] mm: call invalidate_range_end in do_wp_page even for zero pages Haggai Eran
1 sibling, 2 replies; 16+ messages in thread
From: Jiri Slaby @ 2012-09-18 19:40 UTC (permalink / raw)
To: Avi Kivity
Cc: Jiri Slaby, Marcelo Tosatti, kvm, LKML, Haggai Eran,
Andrew Morton, linux-mm
On 09/13/2012 11:59 AM, Avi Kivity wrote:
> On 09/12/2012 09:11 PM, Jiri Slaby wrote:
>> On 09/12/2012 10:18 AM, Avi Kivity wrote:
>>> On 09/12/2012 11:13 AM, Jiri Slaby wrote:
>>>>
>>>>> Please provide the output of vmxcap
>>>>> (http://goo.gl/c5lUO),
>>>>
>>>> Unrestricted guest no
>>>
>>> The big real mode fixes.
>>>
>>>
>>>>
>>>>> and a snapshot of kvm_stat while the guest is hung.
>>>>
>>>> kvm statistics
>>>>
>>>> exits 6778198 615942
>>>> host_state_reload 1988 187
>>>> irq_exits 1523 138
>>>> mmu_cache_miss 4 0
>>>> fpu_reload 1 0
>>>
>>> Please run this as root so we get the tracepoint based output; and press
>>> 'x' when it's running so we get more detailed output.
>>
>> kvm statistics
>>
>> kvm_exit 13798699 330708
>> kvm_entry 13799110 330708
>> kvm_page_fault 13793650 330604
>> kvm_exit(EXCEPTION_NMI) 6188458 330604
>> kvm_exit(EXTERNAL_INTERRUPT) 2169 105
>> kvm_exit(TPR_BELOW_THRESHOLD) 82 0
>> kvm_exit(IO_INSTRUCTION) 6 0
>
> Strange, it's unable to fault in the very first page.
I bisected that. Note the bisection log. I have never seen something
like that :D:
git bisect start
git bisect bad 3de9d1a1500472bc80478bd75e33fa9c1eba1422
git bisect good fea7a08acb13524b47711625eebea40a0ede69a0
git bisect good 95a2fe4baa1ad444df5f94bfc9416fc6b4b34cef
git bisect good f42c0d57a5a60da03c705bdea9fbba381112dd60
git bisect good 31a2e241a9e37a133278959044960c229acc5714
git bisect good f15fb01c5593fa1b58cc7a8a9c59913e2625bf2e
git bisect good 16d21ff46f5d50e311d07406c31f96916e5e8e1a
git bisect good 0b84592f458b4e8567aa7d803aff382c1d3b64fd
git bisect bad b955428e7f14cd29fe9d8059efa3ea4be679c83d
git bisect bad 20c4da4f68fcade05eda9c9b7dbad0a78cc5efe8
git bisect bad 31b90ed2a90f80fb528ac55ee357a815e1dedc36
git bisect bad b273fe14ee5b38cecc7bce94f7777f35a0bf9ee4
git bisect bad de426dbe9a60706b91b40397f69f819a39a06b6b
git bisect bad 6b998094ec50248e72b9f251d0607b58b18dba38
git bisect bad cf9b81d47a89f5d404a0cd8013b461617751e520
=== 8< ===
Reverting cf9b81d47a89 (mm: wrap calls to set_pte_at_notify with
invalidate_range_start and invalidate_range_end) on the top of today's
-next fixes the issue.
thanks,
--
js
suse labs
^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: qemu-kvm loops after kernel udpate
2012-09-18 19:40 ` Jiri Slaby
@ 2012-09-18 19:46 ` Andrew Morton
2012-09-19 0:00 ` Stephen Rothwell
2012-09-19 14:18 ` [PATCH] mm: call invalidate_range_end in do_wp_page even for zero pages Haggai Eran
1 sibling, 1 reply; 16+ messages in thread
From: Andrew Morton @ 2012-09-18 19:46 UTC (permalink / raw)
To: Jiri Slaby
Cc: Avi Kivity, Jiri Slaby, Marcelo Tosatti, kvm, LKML, Haggai Eran,
linux-mm, Sagi Grimberg, Shachar Raindel, Liran Liss
On Tue, 18 Sep 2012 21:40:31 +0200
Jiri Slaby <jslaby@suse.cz> wrote:
> On 09/13/2012 11:59 AM, Avi Kivity wrote:
> > On 09/12/2012 09:11 PM, Jiri Slaby wrote:
> >> On 09/12/2012 10:18 AM, Avi Kivity wrote:
> >>> On 09/12/2012 11:13 AM, Jiri Slaby wrote:
> >>>>
> >>>>> Please provide the output of vmxcap
> >>>>> (http://goo.gl/c5lUO),
> >>>>
> >>>> Unrestricted guest no
> >>>
> >>> The big real mode fixes.
> >>>
> >>>
> >>>>
> >>>>> and a snapshot of kvm_stat while the guest is hung.
> >>>>
> >>>> kvm statistics
> >>>>
> >>>> exits 6778198 615942
> >>>> host_state_reload 1988 187
> >>>> irq_exits 1523 138
> >>>> mmu_cache_miss 4 0
> >>>> fpu_reload 1 0
> >>>
> >>> Please run this as root so we get the tracepoint based output; and press
> >>> 'x' when it's running so we get more detailed output.
> >>
> >> kvm statistics
> >>
> >> kvm_exit 13798699 330708
> >> kvm_entry 13799110 330708
> >> kvm_page_fault 13793650 330604
> >> kvm_exit(EXCEPTION_NMI) 6188458 330604
> >> kvm_exit(EXTERNAL_INTERRUPT) 2169 105
> >> kvm_exit(TPR_BELOW_THRESHOLD) 82 0
> >> kvm_exit(IO_INSTRUCTION) 6 0
> >
> > Strange, it's unable to fault in the very first page.
>
> I bisected that. Note the bisection log. I have never seen something
> like that :D:
> git bisect start
> git bisect bad 3de9d1a1500472bc80478bd75e33fa9c1eba1422
> git bisect good fea7a08acb13524b47711625eebea40a0ede69a0
> git bisect good 95a2fe4baa1ad444df5f94bfc9416fc6b4b34cef
> git bisect good f42c0d57a5a60da03c705bdea9fbba381112dd60
> git bisect good 31a2e241a9e37a133278959044960c229acc5714
> git bisect good f15fb01c5593fa1b58cc7a8a9c59913e2625bf2e
> git bisect good 16d21ff46f5d50e311d07406c31f96916e5e8e1a
> git bisect good 0b84592f458b4e8567aa7d803aff382c1d3b64fd
> git bisect bad b955428e7f14cd29fe9d8059efa3ea4be679c83d
> git bisect bad 20c4da4f68fcade05eda9c9b7dbad0a78cc5efe8
> git bisect bad 31b90ed2a90f80fb528ac55ee357a815e1dedc36
> git bisect bad b273fe14ee5b38cecc7bce94f7777f35a0bf9ee4
> git bisect bad de426dbe9a60706b91b40397f69f819a39a06b6b
> git bisect bad 6b998094ec50248e72b9f251d0607b58b18dba38
> git bisect bad cf9b81d47a89f5d404a0cd8013b461617751e520
>
> === 8< ===
>
> Reverting cf9b81d47a89 (mm: wrap calls to set_pte_at_notify with
> invalidate_range_start and invalidate_range_end) on the top of today's
> -next fixes the issue.
hm, thanks. This will probably take some time to resolve so I think
I'll drop
mm-move-all-mmu-notifier-invocations-to-be-done-outside-the-pt-lock.patch
mm-move-all-mmu-notifier-invocations-to-be-done-outside-the-pt-lock-fix.patch
mm-move-all-mmu-notifier-invocations-to-be-done-outside-the-pt-lock-fix-fix.patch
mm-wrap-calls-to-set_pte_at_notify-with-invalidate_range_start-and-invalidate_range_end.patch
^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: qemu-kvm loops after kernel udpate
2012-09-18 19:46 ` Andrew Morton
@ 2012-09-19 0:00 ` Stephen Rothwell
2012-09-19 0:20 ` Andrew Morton
0 siblings, 1 reply; 16+ messages in thread
From: Stephen Rothwell @ 2012-09-19 0:00 UTC (permalink / raw)
To: Andrew Morton
Cc: Jiri Slaby, Avi Kivity, Jiri Slaby, Marcelo Tosatti, kvm, LKML,
Haggai Eran, linux-mm, Sagi Grimberg, Shachar Raindel,
Liran Liss
[-- Attachment #1: Type: text/plain, Size: 721 bytes --]
Hi Andrew,
On Tue, 18 Sep 2012 12:46:46 -0700 Andrew Morton <akpm@linux-foundation.org> wrote:
>
> hm, thanks. This will probably take some time to resolve so I think
> I'll drop
>
> mm-move-all-mmu-notifier-invocations-to-be-done-outside-the-pt-lock.patch
> mm-move-all-mmu-notifier-invocations-to-be-done-outside-the-pt-lock-fix.patch
> mm-move-all-mmu-notifier-invocations-to-be-done-outside-the-pt-lock-fix-fix.patch
> mm-wrap-calls-to-set_pte_at_notify-with-invalidate_range_start-and-invalidate_range_end.patch
Should I attempt to remove these from the akpm tree in linux-next today?
Or should I just wait for a new mmotm?
--
Cheers,
Stephen Rothwell sfr@canb.auug.org.au
[-- Attachment #2: Type: application/pgp-signature, Size: 836 bytes --]
^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: qemu-kvm loops after kernel udpate
2012-09-19 0:00 ` Stephen Rothwell
@ 2012-09-19 0:20 ` Andrew Morton
2012-09-19 1:36 ` Stephen Rothwell
0 siblings, 1 reply; 16+ messages in thread
From: Andrew Morton @ 2012-09-19 0:20 UTC (permalink / raw)
To: Stephen Rothwell
Cc: Jiri Slaby, Avi Kivity, Jiri Slaby, Marcelo Tosatti, kvm, LKML,
Haggai Eran, linux-mm, Sagi Grimberg, Shachar Raindel,
Liran Liss
On Wed, 19 Sep 2012 10:00:34 +1000 Stephen Rothwell <sfr@canb.auug.org.au> wrote:
> Hi Andrew,
>
> On Tue, 18 Sep 2012 12:46:46 -0700 Andrew Morton <akpm@linux-foundation.org> wrote:
> >
> > hm, thanks. This will probably take some time to resolve so I think
> > I'll drop
> >
> > mm-move-all-mmu-notifier-invocations-to-be-done-outside-the-pt-lock.patch
> > mm-move-all-mmu-notifier-invocations-to-be-done-outside-the-pt-lock-fix.patch
> > mm-move-all-mmu-notifier-invocations-to-be-done-outside-the-pt-lock-fix-fix.patch
> > mm-wrap-calls-to-set_pte_at_notify-with-invalidate_range_start-and-invalidate_range_end.patch
>
> Should I attempt to remove these from the akpm tree in linux-next today?
That would be best - there's no point in having people test (and debug)
dead stuff.
> Or should I just wait for a new mmotm?
You could be brave and test http://ozlabs.org/~akpm/mmots/ for me :)
^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: qemu-kvm loops after kernel udpate
2012-09-19 0:20 ` Andrew Morton
@ 2012-09-19 1:36 ` Stephen Rothwell
0 siblings, 0 replies; 16+ messages in thread
From: Stephen Rothwell @ 2012-09-19 1:36 UTC (permalink / raw)
To: Andrew Morton
Cc: Jiri Slaby, Avi Kivity, Jiri Slaby, Marcelo Tosatti, kvm, LKML,
Haggai Eran, linux-mm, Sagi Grimberg, Shachar Raindel,
Liran Liss
[-- Attachment #1: Type: text/plain, Size: 1174 bytes --]
Hi Andrew,
On Tue, 18 Sep 2012 17:20:29 -0700 Andrew Morton <akpm@linux-foundation.org> wrote:
>
> On Wed, 19 Sep 2012 10:00:34 +1000 Stephen Rothwell <sfr@canb.auug.org.au> wrote:
>
> > On Tue, 18 Sep 2012 12:46:46 -0700 Andrew Morton <akpm@linux-foundation.org> wrote:
> > >
> > > hm, thanks. This will probably take some time to resolve so I think
> > > I'll drop
> > >
> > > mm-move-all-mmu-notifier-invocations-to-be-done-outside-the-pt-lock.patch
> > > mm-move-all-mmu-notifier-invocations-to-be-done-outside-the-pt-lock-fix.patch
> > > mm-move-all-mmu-notifier-invocations-to-be-done-outside-the-pt-lock-fix-fix.patch
> > > mm-wrap-calls-to-set_pte_at_notify-with-invalidate_range_start-and-invalidate_range_end.patch
> >
> > Should I attempt to remove these from the akpm tree in linux-next today?
>
> That would be best - there's no point in having people test (and debug)
> dead stuff.
OK, I removed them.
> > Or should I just wait for a new mmotm?
>
> You could be brave and test http://ozlabs.org/~akpm/mmots/ for me :)
Brave? maybe. Stupid? no :-)
--
Cheers,
Stephen Rothwell sfr@canb.auug.org.au
[-- Attachment #2: Type: application/pgp-signature, Size: 836 bytes --]
^ permalink raw reply [flat|nested] 16+ messages in thread
* [PATCH] mm: call invalidate_range_end in do_wp_page even for zero pages
2012-09-18 19:40 ` Jiri Slaby
2012-09-18 19:46 ` Andrew Morton
@ 2012-09-19 14:18 ` Haggai Eran
1 sibling, 0 replies; 16+ messages in thread
From: Haggai Eran @ 2012-09-19 14:18 UTC (permalink / raw)
To: Jiri Slaby
Cc: linux-kernel, kvm, linux-mm, Shachar Raindel, Haggai Eran,
Avi Kivity, Andrew Morton
The previous patch "mm: wrap calls to set_pte_at_notify with
invalidate_range_start and invalidate_range_end" only called the
invalidate_range_end mmu notifier function in do_wp_page when the new_page
variable wasn't NULL. This was done in order to only call invalidate_range_end
after invalidate_range_start was called. Unfortunately, there are situations
where new_page is NULL and invalidate_range_start is called. This caused
invalidate_range_start to be called without a matching invalidate_range_end,
causing kvm to loop indefinitely on the first page fault.
This patch adds a flag variable to do_wp_page that marks whether the
invalidate_range_start notifier was called. invalidate_range_end is then
called if the flag is true.
Reported-by: Jiri Slaby <jslaby@suse.cz>
Cc: Avi Kivity <avi@redhat.com>
Cc: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Haggai Eran <haggaie@mellanox.com>
---
I tested this patch against yesterday's linux-next (next-20120918), and it
seems to solve the problem with kvm. I used the same command line you reported:
qemu-kvm -k en-us -usbdevice tablet -balloon virtio -hda IMAGE -smp 2 \
-m 1000M -net user -net nic,model=e1000 -usb -serial pty
I was hoping you could also test it yourself, and see that it also works for
you, if you don't mind.
mm/memory.c | 9 +++++----
1 file changed, 5 insertions(+), 4 deletions(-)
diff --git a/mm/memory.c b/mm/memory.c
index 1a92d87..76ec199 100644
--- a/mm/memory.c
+++ b/mm/memory.c
@@ -2529,6 +2529,7 @@ static int do_wp_page(struct mm_struct *mm, struct vm_area_struct *vma,
struct page *dirty_page = NULL;
unsigned long mmun_start; /* For mmu_notifiers */
unsigned long mmun_end; /* For mmu_notifiers */
+ bool mmun_called = false; /* For mmu_notifiers */
old_page = vm_normal_page(vma, address, orig_pte);
if (!old_page) {
@@ -2706,8 +2707,9 @@ gotten:
if (mem_cgroup_newpage_charge(new_page, mm, GFP_KERNEL))
goto oom_free_new;
- mmun_start = address & PAGE_MASK;
- mmun_end = (address & PAGE_MASK) + PAGE_SIZE;
+ mmun_start = address & PAGE_MASK;
+ mmun_end = (address & PAGE_MASK) + PAGE_SIZE;
+ mmun_called = true;
mmu_notifier_invalidate_range_start(mm, mmun_start, mmun_end);
/*
@@ -2776,8 +2778,7 @@ gotten:
page_cache_release(new_page);
unlock:
pte_unmap_unlock(page_table, ptl);
- if (new_page)
- /* Only call the end notifier if the begin was called. */
+ if (mmun_called)
mmu_notifier_invalidate_range_end(mm, mmun_start, mmun_end);
if (old_page) {
/*
--
1.7.11.2
^ permalink raw reply related [flat|nested] 16+ messages in thread
end of thread, other threads:[~2012-09-19 14:19 UTC | newest]
Thread overview: 16+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2012-09-11 18:11 qemu-kvm loops after kernel udpate Jiri Slaby
2012-09-11 19:03 ` Marcelo Tosatti
2012-09-11 19:41 ` Jiri Slaby
2012-09-12 8:06 ` Avi Kivity
2012-09-12 8:13 ` Jiri Slaby
2012-09-12 8:18 ` Avi Kivity
2012-09-12 8:20 ` Jiri Slaby
2012-09-12 18:11 ` Jiri Slaby
2012-09-13 9:59 ` Avi Kivity
2012-09-13 18:32 ` Jiri Slaby
2012-09-18 19:40 ` Jiri Slaby
2012-09-18 19:46 ` Andrew Morton
2012-09-19 0:00 ` Stephen Rothwell
2012-09-19 0:20 ` Andrew Morton
2012-09-19 1:36 ` Stephen Rothwell
2012-09-19 14:18 ` [PATCH] mm: call invalidate_range_end in do_wp_page even for zero pages Haggai Eran
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).