summaryrefslogtreecommitdiffstats
path: root/results/classifier/016/KVM
diff options
context:
space:
mode:
authorChristian Krinitsin <mail@krinitsin.com>2025-06-10 17:04:21 +0000
committerChristian Krinitsin <mail@krinitsin.com>2025-06-10 17:04:21 +0000
commit7b681b9f9eedaad2f081ae11a32f459f5a1312ff (patch)
tree447529eab427f2cb024d33933794a27f30369c4d /results/classifier/016/KVM
parentd804cb5b8f55b5e32c217e728fe02f6e53ecdf78 (diff)
downloademulator-bug-study-7b681b9f9eedaad2f081ae11a32f459f5a1312ff.tar.gz
emulator-bug-study-7b681b9f9eedaad2f081ae11a32f459f5a1312ff.zip
add 17th version of the classifier, including results
Diffstat (limited to 'results/classifier/016/KVM')
-rw-r--r--results/classifier/016/KVM/25842545229
-rw-r--r--results/classifier/016/KVM/26095107185
-rw-r--r--results/classifier/016/KVM/5596133466
3 files changed, 480 insertions, 0 deletions
diff --git a/results/classifier/016/KVM/25842545 b/results/classifier/016/KVM/25842545
new file mode 100644
index 00000000..6228f8d3
--- /dev/null
+++ b/results/classifier/016/KVM/25842545
@@ -0,0 +1,229 @@
+KVM: 0.983
+debug: 0.931
+hypervisor: 0.924
+virtual: 0.913
+socket: 0.682
+x86: 0.566
+register: 0.248
+TCG: 0.136
+operating system: 0.125
+kernel: 0.073
+PID: 0.068
+device: 0.047
+files: 0.047
+performance: 0.045
+assembly: 0.018
+i386: 0.012
+network: 0.012
+semantic: 0.011
+VMM: 0.009
+peripherals: 0.008
+user-level: 0.008
+boot: 0.008
+architecture: 0.007
+risc-v: 0.006
+ppc: 0.006
+permissions: 0.004
+alpha: 0.004
+graphic: 0.003
+vnc: 0.003
+arm: 0.001
+mistranslation: 0.001
+
+[Qemu-devel] [Bug?] Guest pause because VMPTRLD failed in KVM
+
+Hello,
+
+ We encountered a problem that a guest paused because the KMOD report VMPTRLD
+failed.
+
+The related information is as follows:
+
+1) Qemu command:
+ /usr/bin/qemu-kvm -name omu1 -S -machine pc-i440fx-2.3,accel=kvm,usb=off -cpu
+host -m 15625 -realtime mlock=off -smp 8,sockets=1,cores=8,threads=1 -uuid
+a2aacfff-6583-48b4-b6a4-e6830e519931 -no-user-config -nodefaults -chardev
+socket,id=charmonitor,path=/var/lib/libvirt/qemu/omu1.monitor,server,nowait
+-mon chardev=charmonitor,id=monitor,mode=control -rtc base=utc -no-shutdown
+-boot strict=on -device piix3-usb-uhci,id=usb,bus=pci.0,addr=0x1.0x2 -device
+virtio-serial-pci,id=virtio-serial0,bus=pci.0,addr=0x5 -drive
+file=/home/env/guest1.qcow2,if=none,id=drive-virtio-disk0,format=qcow2,cache=none,aio=native
+ -device
+virtio-blk-pci,scsi=off,bus=pci.0,addr=0x6,drive=drive-virtio-disk0,id=virtio-disk0
+ -drive
+file=/home/env/guest_300G.img,if=none,id=drive-virtio-disk1,format=raw,cache=none,aio=native
+ -device
+virtio-blk-pci,scsi=off,bus=pci.0,addr=0x7,drive=drive-virtio-disk1,id=virtio-disk1
+ -netdev tap,fd=25,id=hostnet0,vhost=on,vhostfd=26 -device
+virtio-net-pci,netdev=hostnet0,id=net0,mac=00:00:80:05:00:00,bus=pci.0,addr=0x3
+-netdev tap,fd=27,id=hostnet1,vhost=on,vhostfd=28 -device
+virtio-net-pci,netdev=hostnet1,id=net1,mac=00:00:80:05:00:01,bus=pci.0,addr=0x4
+-chardev pty,id=charserial0 -device isa-serial,chardev=charserial0,id=serial0
+-device usb-tablet,id=input0 -vnc 0.0.0.0:0 -device
+cirrus-vga,id=video0,vgamem_mb=16,bus=pci.0,addr=0x2 -device
+virtio-balloon-pci,id=balloon0,bus=pci.0,addr=0x8 -msg timestamp=on
+
+ 2) Qemu log:
+ KVM: entry failed, hardware error 0x4
+ RAX=00000000ffffffed RBX=ffff8803fa2d7fd8 RCX=0100000000000000
+RDX=0000000000000000
+ RSI=0000000000000000 RDI=0000000000000046 RBP=ffff8803fa2d7e90
+RSP=ffff8803fa2efe90
+ R8 =0000000000000000 R9 =0000000000000000 R10=0000000000000000
+R11=000000000000b69a
+ R12=0000000000000001 R13=ffffffff81a25b40 R14=0000000000000000
+R15=ffff8803fa2d7fd8
+ RIP=ffffffff81053e16 RFL=00000286 [--S--P-] CPL=0 II=0 A20=1 SMM=0 HLT=0
+ ES =0000 0000000000000000 ffffffff 00c00000
+ CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
+ SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA]
+ DS =0000 0000000000000000 ffffffff 00c00000
+ FS =0000 0000000000000000 ffffffff 00c00000
+ GS =0000 ffff88040f540000 ffffffff 00c00000
+ LDT=0000 0000000000000000 ffffffff 00c00000
+ TR =0040 ffff88040f550a40 00002087 00008b00 DPL=0 TSS64-busy
+ GDT= ffff88040f549000 0000007f
+ IDT= ffffffffff529000 00000fff
+ CR0=80050033 CR2=00007f81ca0c5000 CR3=00000003f5081000 CR4=000407e0
+ DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000
+DR3=0000000000000000
+ DR6=00000000ffff0ff0 DR7=0000000000000400
+ EFER=0000000000000d01
+ Code=?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? <??> ?? ??
+?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ??
+
+ 3) Demsg
+ [347315.028339] kvm: vmptrld ffff8817ec5f0000/17ec5f0000 failed
+ klogd 1.4.1, ---------- state change ----------
+ [347315.039506] kvm: vmptrld ffff8817ec5f0000/17ec5f0000 failed
+ [347315.051728] kvm: vmptrld ffff8817ec5f0000/17ec5f0000 failed
+ [347315.057472] vmwrite error: reg 6c0a value ffff88307e66e480 (err
+2120672384)
+ [347315.064567] Pid: 69523, comm: qemu-kvm Tainted: GF X
+3.0.93-0.8-default #1
+ [347315.064569] Call Trace:
+ [347315.064587] [<ffffffff810049d5>] dump_trace+0x75/0x300
+ [347315.064595] [<ffffffff8145e3e3>] dump_stack+0x69/0x6f
+ [347315.064617] [<ffffffffa03738de>] vmx_vcpu_load+0x11e/0x1d0 [kvm_intel]
+ [347315.064647] [<ffffffffa029a204>] kvm_arch_vcpu_load+0x44/0x1d0 [kvm]
+ [347315.064669] [<ffffffff81054ee1>] finish_task_switch+0x81/0xe0
+ [347315.064676] [<ffffffff8145f0b4>] thread_return+0x3b/0x2a7
+ [347315.064687] [<ffffffffa028d9b5>] kvm_vcpu_block+0x65/0xa0 [kvm]
+ [347315.064703] [<ffffffffa02a16d1>] __vcpu_run+0xd1/0x260 [kvm]
+ [347315.064732] [<ffffffffa02a2418>] kvm_arch_vcpu_ioctl_run+0x68/0x1a0
+[kvm]
+ [347315.064759] [<ffffffffa028ecee>] kvm_vcpu_ioctl+0x38e/0x580 [kvm]
+ [347315.064771] [<ffffffff8116bdfb>] do_vfs_ioctl+0x8b/0x3b0
+ [347315.064776] [<ffffffff8116c1c1>] sys_ioctl+0xa1/0xb0
+ [347315.064783] [<ffffffff81469272>] system_call_fastpath+0x16/0x1b
+ [347315.064797] [<00007fee51969ce7>] 0x7fee51969ce6
+ [347315.064799] vmwrite error: reg 6c0c value ffff88307e664000 (err
+2120630272)
+ [347315.064802] Pid: 69523, comm: qemu-kvm Tainted: GF X
+3.0.93-0.8-default #1
+ [347315.064803] Call Trace:
+ [347315.064807] [<ffffffff810049d5>] dump_trace+0x75/0x300
+ [347315.064811] [<ffffffff8145e3e3>] dump_stack+0x69/0x6f
+ [347315.064817] [<ffffffffa03738ec>] vmx_vcpu_load+0x12c/0x1d0 [kvm_intel]
+ [347315.064832] [<ffffffffa029a204>] kvm_arch_vcpu_load+0x44/0x1d0 [kvm]
+ [347315.064851] [<ffffffff81054ee1>] finish_task_switch+0x81/0xe0
+ [347315.064855] [<ffffffff8145f0b4>] thread_return+0x3b/0x2a7
+ [347315.064865] [<ffffffffa028d9b5>] kvm_vcpu_block+0x65/0xa0 [kvm]
+ [347315.064880] [<ffffffffa02a16d1>] __vcpu_run+0xd1/0x260 [kvm]
+ [347315.064907] [<ffffffffa02a2418>] kvm_arch_vcpu_ioctl_run+0x68/0x1a0
+[kvm]
+ [347315.064933] [<ffffffffa028ecee>] kvm_vcpu_ioctl+0x38e/0x580 [kvm]
+ [347315.064943] [<ffffffff8116bdfb>] do_vfs_ioctl+0x8b/0x3b0
+ [347315.064947] [<ffffffff8116c1c1>] sys_ioctl+0xa1/0xb0
+ [347315.064951] [<ffffffff81469272>] system_call_fastpath+0x16/0x1b
+ [347315.064957] [<00007fee51969ce7>] 0x7fee51969ce6
+ [347315.064959] vmwrite error: reg 6c10 value 0 (err 0)
+
+ 4) The isssue can't be reporduced. I search the Intel VMX sepc about reaseons
+of vmptrld failure:
+ The instruction fails if its operand is not properly aligned, sets
+unsupported physical-address bits, or is equal to the VMXON
+ pointer. In addition, the instruction fails if the 32 bits in memory
+referenced by the operand do not match the VMCS
+ revision identifier supported by this processor.
+
+ But I can't find any cues from the KVM source code. It seems each
+ error conditions is impossible in theory. :(
+
+Any suggestions will be appreciated! Paolo?
+
+--
+Regards,
+-Gonglei
+
+On 10/11/2016 15:10, gong lei wrote:
+>
+4) The isssue can't be reporduced. I search the Intel VMX sepc about
+>
+reaseons
+>
+of vmptrld failure:
+>
+The instruction fails if its operand is not properly aligned, sets
+>
+unsupported physical-address bits, or is equal to the VMXON
+>
+pointer. In addition, the instruction fails if the 32 bits in memory
+>
+referenced by the operand do not match the VMCS
+>
+revision identifier supported by this processor.
+>
+>
+But I can't find any cues from the KVM source code. It seems each
+>
+error conditions is impossible in theory. :(
+Yes, it should not happen. :(
+
+If it's not reproducible, it's really hard to say what it was, except a
+random memory corruption elsewhere or even a bit flip (!).
+
+Paolo
+
+On 2016/11/17 20:39, Paolo Bonzini wrote:
+>
+>
+On 10/11/2016 15:10, gong lei wrote:
+>
+> 4) The isssue can't be reporduced. I search the Intel VMX sepc about
+>
+> reaseons
+>
+> of vmptrld failure:
+>
+> The instruction fails if its operand is not properly aligned, sets
+>
+> unsupported physical-address bits, or is equal to the VMXON
+>
+> pointer. In addition, the instruction fails if the 32 bits in memory
+>
+> referenced by the operand do not match the VMCS
+>
+> revision identifier supported by this processor.
+>
+>
+>
+> But I can't find any cues from the KVM source code. It seems each
+>
+> error conditions is impossible in theory. :(
+>
+Yes, it should not happen. :(
+>
+>
+If it's not reproducible, it's really hard to say what it was, except a
+>
+random memory corruption elsewhere or even a bit flip (!).
+>
+>
+Paolo
+Thanks for your reply, Paolo :)
+
+--
+Regards,
+-Gonglei
+
diff --git a/results/classifier/016/KVM/26095107 b/results/classifier/016/KVM/26095107
new file mode 100644
index 00000000..90f47e7b
--- /dev/null
+++ b/results/classifier/016/KVM/26095107
@@ -0,0 +1,185 @@
+KVM: 0.987
+debug: 0.905
+x86: 0.855
+hypervisor: 0.806
+virtual: 0.770
+register: 0.560
+assembly: 0.451
+user-level: 0.387
+operating system: 0.082
+VMM: 0.081
+PID: 0.046
+kernel: 0.039
+i386: 0.032
+files: 0.026
+device: 0.022
+socket: 0.014
+TCG: 0.013
+semantic: 0.012
+performance: 0.012
+network: 0.010
+architecture: 0.008
+peripherals: 0.003
+risc-v: 0.003
+alpha: 0.003
+graphic: 0.003
+boot: 0.003
+vnc: 0.002
+ppc: 0.002
+permissions: 0.002
+arm: 0.001
+mistranslation: 0.001
+
+[Qemu-devel] [Bug Report] vm paused after succeeding to migrate
+
+Hi, all
+I encounterd a bug when I try to migrate a windows vm.
+
+Enviroment information:
+host A: cpu E5620(model WestmereEP without flag xsave)
+host B: cpu E5-2643(model SandyBridgeEP with xsave)
+
+The reproduce steps is :
+1. Start a windows 2008 vm with -cpu host(which means host-passthrough).
+2. Migrate the vm to host B when cr4.OSXSAVE=0 (successfully).
+3. Vm runs on host B for a while so that cr4.OSXSAVE changes to 1.
+4. Then migrate the vm to host A (successfully), but vm was paused, and qemu
+printed log as followed:
+
+KVM: entry failed, hardware error 0x80000021
+
+If you're running a guest on an Intel machine without unrestricted mode
+support, the failure can be most likely due to the guest entering an invalid
+state for Intel VT. For example, the guest maybe running in big real mode
+which is not supported on less recent Intel processors.
+
+EAX=019b3bb0 EBX=01a3ae80 ECX=01a61ce8 EDX=00000000
+ESI=01a62000 EDI=00000000 EBP=00000000 ESP=01718b20
+EIP=0185d982 EFL=00000286 [--S--P-] CPL=0 II=0 A20=1 SMM=0 HLT=0
+ES =0000 00000000 0000ffff 00009300
+CS =f000 ffff0000 0000ffff 00009b00
+SS =0000 00000000 0000ffff 00009300
+DS =0000 00000000 0000ffff 00009300
+FS =0000 00000000 0000ffff 00009300
+GS =0000 00000000 0000ffff 00009300
+LDT=0000 00000000 0000ffff 00008200
+TR =0000 00000000 0000ffff 00008b00
+GDT= 00000000 0000ffff
+IDT= 00000000 0000ffff
+CR0=60000010 CR2=00000000 CR3=00000000 CR4=00000000
+DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000
+DR3=0000000000000000
+DR6=00000000ffff0ff0 DR7=0000000000000400
+EFER=0000000000000000
+Code=00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00
+00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
+
+I have found that problem happened when kvm_put_sregs returns err -22(called by
+kvm_arch_put_registers(qemu)).
+Because kvm_arch_vcpu_ioctl_set_sregs(kvm-mod) checked that guest_cpuid_has no
+X86_FEATURE_XSAVE but cr4.OSXSAVE=1.
+So should we cancel migration when kvm_arch_put_registers returns error?
+
+* linzhecheng (address@hidden) wrote:
+>
+Hi, all
+>
+I encounterd a bug when I try to migrate a windows vm.
+>
+>
+Enviroment information:
+>
+host A: cpu E5620(model WestmereEP without flag xsave)
+>
+host B: cpu E5-2643(model SandyBridgeEP with xsave)
+>
+>
+The reproduce steps is :
+>
+1. Start a windows 2008 vm with -cpu host(which means host-passthrough).
+>
+2. Migrate the vm to host B when cr4.OSXSAVE=0 (successfully).
+>
+3. Vm runs on host B for a while so that cr4.OSXSAVE changes to 1.
+>
+4. Then migrate the vm to host A (successfully), but vm was paused, and qemu
+>
+printed log as followed:
+Remember that migrating using -cpu host across different CPU models is NOT
+expected to work.
+
+>
+KVM: entry failed, hardware error 0x80000021
+>
+>
+If you're running a guest on an Intel machine without unrestricted mode
+>
+support, the failure can be most likely due to the guest entering an invalid
+>
+state for Intel VT. For example, the guest maybe running in big real mode
+>
+which is not supported on less recent Intel processors.
+>
+>
+EAX=019b3bb0 EBX=01a3ae80 ECX=01a61ce8 EDX=00000000
+>
+ESI=01a62000 EDI=00000000 EBP=00000000 ESP=01718b20
+>
+EIP=0185d982 EFL=00000286 [--S--P-] CPL=0 II=0 A20=1 SMM=0 HLT=0
+>
+ES =0000 00000000 0000ffff 00009300
+>
+CS =f000 ffff0000 0000ffff 00009b00
+>
+SS =0000 00000000 0000ffff 00009300
+>
+DS =0000 00000000 0000ffff 00009300
+>
+FS =0000 00000000 0000ffff 00009300
+>
+GS =0000 00000000 0000ffff 00009300
+>
+LDT=0000 00000000 0000ffff 00008200
+>
+TR =0000 00000000 0000ffff 00008b00
+>
+GDT= 00000000 0000ffff
+>
+IDT= 00000000 0000ffff
+>
+CR0=60000010 CR2=00000000 CR3=00000000 CR4=00000000
+>
+DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000
+>
+DR3=0000000000000000
+>
+DR6=00000000ffff0ff0 DR7=0000000000000400
+>
+EFER=0000000000000000
+>
+Code=00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00
+>
+00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
+>
+00
+>
+>
+I have found that problem happened when kvm_put_sregs returns err -22(called
+>
+by kvm_arch_put_registers(qemu)).
+>
+Because kvm_arch_vcpu_ioctl_set_sregs(kvm-mod) checked that guest_cpuid_has
+>
+no X86_FEATURE_XSAVE but cr4.OSXSAVE=1.
+>
+So should we cancel migration when kvm_arch_put_registers returns error?
+It would seem good if we can make the migration fail there rather than
+hitting that KVM error.
+It looks like we need to do a bit of plumbing to convert the places that
+call it to return a bool rather than void.
+
+Dave
+
+--
+Dr. David Alan Gilbert / address@hidden / Manchester, UK
+
diff --git a/results/classifier/016/KVM/55961334 b/results/classifier/016/KVM/55961334
new file mode 100644
index 00000000..ede09a18
--- /dev/null
+++ b/results/classifier/016/KVM/55961334
@@ -0,0 +1,66 @@
+KVM: 0.924
+x86: 0.885
+debug: 0.797
+virtual: 0.715
+operating system: 0.649
+hypervisor: 0.394
+TCG: 0.049
+register: 0.039
+network: 0.028
+kernel: 0.021
+PID: 0.016
+performance: 0.016
+user-level: 0.014
+files: 0.011
+architecture: 0.009
+socket: 0.007
+ppc: 0.004
+assembly: 0.004
+semantic: 0.003
+alpha: 0.003
+device: 0.003
+VMM: 0.003
+risc-v: 0.002
+vnc: 0.002
+boot: 0.001
+permissions: 0.001
+peripherals: 0.001
+graphic: 0.000
+arm: 0.000
+mistranslation: 0.000
+i386: 0.000
+
+[Bug] "-ht" flag ignored under KVM - guest still reports HT
+
+Hi Community,
+We have observed that the 'ht' feature bit cannot be disabled when QEMU runs
+with KVM acceleration.
+qemu-system-x86_64 \
+ --enable-kvm \
+ -machine q35 \
+ -cpu host,-ht \
+ -smp 4 \
+ -m 4G \
+ -drive file=rootfs.img,format=raw \
+ -nographic \
+ -append 'console=ttyS0 root=/dev/sda rw'
+Because '-ht' is specified, the guest should expose no HT capability
+(cpuid.1.edx[28] = 0), and /proc/cpuinfo shouldn't show HT feature, but we still
+saw ht in linux guest when run 'cat /proc/cpuinfo'.
+XiaoYao mentioned that:
+
+It has been the behavior of QEMU since
+
+ commit 400281af34e5ee6aa9f5496b53d8f82c6fef9319
+ Author: Andre Przywara <andre.przywara@amd.com>
+ Date: Wed Aug 19 15:42:42 2009 +0200
+
+ set CPUID bits to present cores and threads topology
+
+that we cannot remove HT CPUID bit from guest via "-cpu xxx,-ht" if the
+VM has >= 2 vcpus.
+I'd like to know whether there's a plan to address this issue, or if the current
+behaviour is considered acceptable.
+Best regards,
+Ewan.
+