From 3e4c5a6261770bced301b5e74233e7866166ea5b Mon Sep 17 00:00:00 2001 From: Christian Krinitsin Date: Sun, 1 Jun 2025 21:35:14 +0200 Subject: clean up repository --- .../target_i386/host_missing/accel_KVM/1004 | 9 - .../target_i386/host_missing/accel_KVM/1008 | 20 - .../target_i386/host_missing/accel_KVM/1021 | 9 - .../target_i386/host_missing/accel_KVM/1045 | 26 - .../target_i386/host_missing/accel_KVM/1068 | 11 - .../target_i386/host_missing/accel_KVM/1069 | 13 - .../target_i386/host_missing/accel_KVM/1133 | 10 - .../target_i386/host_missing/accel_KVM/1198 | 53 - .../target_i386/host_missing/accel_KVM/1217 | 130 -- .../target_i386/host_missing/accel_KVM/1306 | 159 --- .../target_i386/host_missing/accel_KVM/131 | 1 - .../target_i386/host_missing/accel_KVM/1484 | 29 - .../target_i386/host_missing/accel_KVM/180 | 1 - .../target_i386/host_missing/accel_KVM/1966 | 8 - .../target_i386/host_missing/accel_KVM/2003 | 15 - .../target_i386/host_missing/accel_KVM/2007 | 29 - .../target_i386/host_missing/accel_KVM/2037 | 15 - .../target_i386/host_missing/accel_KVM/217 | 1 - .../target_i386/host_missing/accel_KVM/2325 | 11 - .../target_i386/host_missing/accel_KVM/2361 | 13 - .../target_i386/host_missing/accel_KVM/2394 | 29 - .../target_i386/host_missing/accel_KVM/2429 | 29 - .../target_i386/host_missing/accel_KVM/2502 | 13 - .../target_i386/host_missing/accel_KVM/2571 | 66 - .../target_i386/host_missing/accel_KVM/2572 | 30 - .../target_i386/host_missing/accel_KVM/2582 | 23 - .../target_i386/host_missing/accel_KVM/2612 | 82 -- .../target_i386/host_missing/accel_KVM/2622 | 267 ----- .../target_i386/host_missing/accel_KVM/2669 | 18 - .../target_i386/host_missing/accel_KVM/2731 | 344 ------ .../target_i386/host_missing/accel_KVM/2956 | 214 ---- .../target_i386/host_missing/accel_KVM/352 | 1 - .../target_i386/host_missing/accel_KVM/353 | 1 - .../target_i386/host_missing/accel_KVM/361 | 1 - .../target_i386/host_missing/accel_KVM/466 | 1 - .../target_i386/host_missing/accel_KVM/530 | 43 - .../target_i386/host_missing/accel_KVM/674 | 14 - .../target_i386/host_missing/accel_KVM/742 | 44 - .../target_i386/host_missing/accel_KVM/755 | 59 - .../target_i386/host_missing/accel_KVM/772 | 12 - .../target_i386/host_missing/accel_KVM/777 | 9 - .../target_i386/host_missing/accel_KVM/916 | 11 - .../target_i386/host_missing/accel_KVM/954 | 1257 -------------------- 43 files changed, 3131 deletions(-) delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/1004 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/1008 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/1021 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/1045 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/1068 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/1069 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/1133 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/1198 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/1217 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/1306 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/131 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/1484 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/180 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/1966 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/2003 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/2007 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/2037 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/217 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/2325 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/2361 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/2394 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/2429 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/2502 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/2571 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/2572 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/2582 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/2612 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/2622 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/2669 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/2731 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/2956 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/352 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/353 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/361 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/466 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/530 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/674 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/742 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/755 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/772 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/777 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/916 delete mode 100644 gitlab/issues_text/target_i386/host_missing/accel_KVM/954 (limited to 'gitlab/issues_text/target_i386/host_missing/accel_KVM') diff --git a/gitlab/issues_text/target_i386/host_missing/accel_KVM/1004 b/gitlab/issues_text/target_i386/host_missing/accel_KVM/1004 deleted file mode 100644 index ce7f2089e..000000000 --- a/gitlab/issues_text/target_i386/host_missing/accel_KVM/1004 +++ /dev/null @@ -1,9 +0,0 @@ -qemu-system-i386 peggs 100% host CPU -Description of problem: -Before the guest OS even starts up, the host CPU eggs at 100%. -Steps to reproduce: -1. Start any VM using qemu-system-i386 -2. On Ubuntu use Virt Manager or command line. -3. On macOS use UTM. -Additional information: - diff --git a/gitlab/issues_text/target_i386/host_missing/accel_KVM/1008 b/gitlab/issues_text/target_i386/host_missing/accel_KVM/1008 deleted file mode 100644 index 1bf267959..000000000 --- a/gitlab/issues_text/target_i386/host_missing/accel_KVM/1008 +++ /dev/null @@ -1,20 +0,0 @@ -nested virtualisation with old host kernel, qemu 7.0.0 broken -Description of problem: -``` -$ qemu-system-x86_64 -enable-kvm -nographic -qemu-system-x86_64: error: failed to set MSR 0xc0000104 to 0x100000000 -qemu-system-x86_64: ../target/i386/kvm/kvm.c:2996: kvm_buf_set_msrs: Assertion `ret == cpu->kvm_msr_buf->nmsrs' failed. -Aborted (core dumped) - -$ -``` -Steps to reproduce: -1. (hardware) Host 1 running kernel 5.10 with nested kvm enabled -2. (virtual) Host 2, with qemu 7.0.0 installed -3. In the inner/virtual host, run: `qemu-system-x86 -enable-kvm -nographic` -Additional information: -It is fixed by using either a more up-to-date kernel version on the hardware/outer host (5.17.x for example), or by reverting to qemu 6.2.0 in the virtual/inner host. - -I have also reproduced this with latest qemu master, commit 731340813fdb4cb8339edb8630e3f923b7d987ec. - -**Reverting commit 3e4546d5bd38a1e98d4bd2de48631abf0398a3a2 also fixes the issue.** diff --git a/gitlab/issues_text/target_i386/host_missing/accel_KVM/1021 b/gitlab/issues_text/target_i386/host_missing/accel_KVM/1021 deleted file mode 100644 index 9410805b1..000000000 --- a/gitlab/issues_text/target_i386/host_missing/accel_KVM/1021 +++ /dev/null @@ -1,9 +0,0 @@ -nVMX: QEMU does not clear nVMX state through KVM(L0) when guest(L2) trigger a reboot event through I/O-Port(0xCF9) -Description of problem: -# -Steps to reproduce: -Guest(L2) write 0xCF9 to trigger a platform reboot. - -# -Additional information: - diff --git a/gitlab/issues_text/target_i386/host_missing/accel_KVM/1045 b/gitlab/issues_text/target_i386/host_missing/accel_KVM/1045 deleted file mode 100644 index cfb4524a4..000000000 --- a/gitlab/issues_text/target_i386/host_missing/accel_KVM/1045 +++ /dev/null @@ -1,26 +0,0 @@ -When a break point is set, nested virtualization sees "kvm_queue_exception: Assertion `!env->exception_has_payload' failed." -Description of problem: -I am debugging XMHF and LHV using QEMU + KVM. I found that if I set a break point using GDB, QEMU will crash when LHV is booting. The message is -``` -qemu-system-i386: ../../../target/i386/kvm/kvm.c:678: kvm_queue_exception: Assertion `!env->exception_has_payload' failed. -``` - -The address of the break point is arbitrary. The break point does not need to hit. So I chose 0 as the address in this bug report. -Steps to reproduce: -1. Start QEMU using `qemu-system-i386 -m 512M -gdb tcp::1234 -smp 2 -cpu Haswell,vmx=yes -enable-kvm -serial stdio -drive media=disk,file=1.img,index=1 -drive media=disk,file=2.img,index=2 -S` -2. In another shell, start GDB using `gdb --ex 'target remote :::1234' --ex 'hb *0' --ex c` -3. See many serial output lines. The tail of the output is - ``` - CPU #0: vcpu_vaddr_ptr=0x01e06080, esp=0x01e11000 - CPU #1: vcpu_vaddr_ptr=0x01e06540, esp=0x01e15000 - BSP(0x00): Rallying APs... - BSP(0x00): APs ready, doing DRTM... - LAPIC base and status=0xfee00900 - Sending INIT IPI to all APs... - ``` -4. See assertion error in QEMU - ``` - qemu-system-i386: ../target/i386/kvm/kvm.c:645: kvm_queue_exception: Assertion `!env->exception_has_payload' failed. - ``` -Additional information: -This bug was first incorrectly filed in KVM's bug tracker at . diff --git a/gitlab/issues_text/target_i386/host_missing/accel_KVM/1068 b/gitlab/issues_text/target_i386/host_missing/accel_KVM/1068 deleted file mode 100644 index 6a6af675a..000000000 --- a/gitlab/issues_text/target_i386/host_missing/accel_KVM/1068 +++ /dev/null @@ -1,11 +0,0 @@ -VMs stuck loading Kernel "Freeing unused Kernel image (initmem) memory" with host running Vanilla Kernel >= 5.18.0 -Description of problem: -The VMs are stuck after "Freeing unused Kernel image (initmem) memory" -See attached screen recording. -Rebooting the host with Kernel 5.17.13 solves the problem. -Steps to reproduce: -1. Boot host with Kernel >= 5.18.0 -2. Start VM -Additional information: -[bug.log](/uploads/faa14ac0bf84a21beb2ffeeb650df4b9/bug.log) -[qemu-libvirt-host-kernel-5.18.2.mkv](/uploads/87a064f171833e9fb3d46fd3ece32152/qemu-libvirt-host-kernel-5.18.2.mkv) diff --git a/gitlab/issues_text/target_i386/host_missing/accel_KVM/1069 b/gitlab/issues_text/target_i386/host_missing/accel_KVM/1069 deleted file mode 100644 index 0634db6c4..000000000 --- a/gitlab/issues_text/target_i386/host_missing/accel_KVM/1069 +++ /dev/null @@ -1,13 +0,0 @@ -Qemu triggers the split lock detection of the Linux kernel -Description of problem: -Windows displays a "blue screen of death" and the Linux kernel logs this error message: - -``` -[ 180.886150] x86/split lock detection: #AC: qemu-system-x86/10167 took a split_lock trap at address: 0x3ff2624d -[ 180.946151] x86/split lock detection: #AC: qemu-system-x86/10168 took a split_lock trap at address: 0x3ff2624d -``` -Steps to reproduce: -1. Start the guest OS -2. Do some stuff in the Windows guest (for instance OS updates) -Additional information: -Is this a bug in Windows or in Qemu ? diff --git a/gitlab/issues_text/target_i386/host_missing/accel_KVM/1133 b/gitlab/issues_text/target_i386/host_missing/accel_KVM/1133 deleted file mode 100644 index 8fe0446b2..000000000 --- a/gitlab/issues_text/target_i386/host_missing/accel_KVM/1133 +++ /dev/null @@ -1,10 +0,0 @@ -unused memory filled with 0x00 instead of 0xFF -Description of problem: -Qemu, ever since it was made (so, since 2003), has this problem in DOS (either PC-DOS or MS-DOS and partly Windows 9x) not recognizing the memory available when the memory is filled with 0x00 but when it is filled with 0xFF it gets recognized properly, where should I patch qemu to solve this memory problem? - -Refer to -https://bugs.launchpad.net/qemu/+bug/1180923 -Steps to reproduce: -1. -2. -3. diff --git a/gitlab/issues_text/target_i386/host_missing/accel_KVM/1198 b/gitlab/issues_text/target_i386/host_missing/accel_KVM/1198 deleted file mode 100644 index bb52ed618..000000000 --- a/gitlab/issues_text/target_i386/host_missing/accel_KVM/1198 +++ /dev/null @@ -1,53 +0,0 @@ -Windows 11 Guest keeps crashing with abort in cpu_asidx_from_attrs -Steps to reproduce: -1. Create Windows 11 guest, SWTPM, SECBOOT (haven't tested without since this is not an option for installing Windows 11) -2. Use OS -3. Will eventually crash. Have tried across multiple kernels 5.17, 5.18, 5.19 -Additional information: -``` - - Stack trace of thread 76223: - #0 0x00007f24072d44dc n/a (libc.so.6 + 0x884dc) - #1 0x00007f2407284998 raise (libc.so.6 + 0x38998) - #2 0x00007f240726e53d abort (libc.so.6 + 0x2253d) - #3 0x00007f240726e45c n/a (libc.so.6 + 0x2245c) - #4 0x00007f240727d4c6 __assert_fail (libc.so.6 + 0x314c6) - #5 0x0000555681a35101 cpu_asidx_from_attrs (qemu-system-x86_64 + 0x572101) - #6 0x0000555681c6531e cpu_memory_rw_debug (qemu-system-x86_64 + 0x7a231e) - #7 0x0000555681bfb54a x86_cpu_dump_state (qemu-system-x86_64 + 0x73854a) - #8 0x0000555681d84a65 kvm_cpu_exec (qemu-system-x86_64 + 0x8c1a65) - #9 0x0000555681d85e48 kvm_vcpu_thread_fn (qemu-system-x86_64 + 0x8c2e48) - #10 0x0000555681fed0a8 qemu_thread_start (qemu-system-x86_64 + 0xb2a0a8) - #11 0x00007f24072d278d n/a (libc.so.6 + 0x8678d) - #12 0x00007f24073538e4 __clone (libc.so.6 + 0x1078e4) -``` - - -``` -KVM: entry failed, hardware error 0x80000021 - -If you're running a guest on an Intel machine without unrestricted mode -support, the failure can be most likely due to the guest entering an invalid -state for Intel VT. For example, the guest maybe running in big real mode -which is not supported on less recent Intel processors. - -EAX=00000000 EBX=00000000 ECX=00000000 EDX=04c6d3e0 -ESI=12af7eb0 EDI=9e55d420 EBP=821b5aa0 ESP=10db0fb0 -EIP=00008000 EFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=1 HLT=0 -ES =0000 00000000 ffffffff 00809300 -CS =b500 7ffb5000 ffffffff 00809300 -SS =0000 00000000 ffffffff 00809300 -DS =0000 00000000 ffffffff 00809300 -FS =0000 00000000 ffffffff 00809300 -GS =0000 00000000 ffffffff 00809300 -LDT=0000 00000000 000fffff 00000000 -TR =0040 10d97000 00000067 00008b00 -GDT= 10d98fb0 00000057 -IDT= 00000000 00000000 -CR0=00050032 CR2=f80ff80c CR3=e47e7000 CR4=00000000 -DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 -DR6=00000000ffff0ff0 DR7=0000000000000400 -EFER=0000000000000000 -Code=qemu-system-x86_64: ../qemu-7.0.0/hw/core/cpu-sysemu.c:77: cpu_asidx_from_attrs: Assertion `ret < cpu->num_ases && ret >= 0' failed. -2022-09-06 14:48:15.392+0000: shutting down, reason=crashed -``` diff --git a/gitlab/issues_text/target_i386/host_missing/accel_KVM/1217 b/gitlab/issues_text/target_i386/host_missing/accel_KVM/1217 deleted file mode 100644 index 961b02991..000000000 --- a/gitlab/issues_text/target_i386/host_missing/accel_KVM/1217 +++ /dev/null @@ -1,130 +0,0 @@ -QEMU 6.2.0: Random segfaults when access register eax using qemu-system-x86_64 -Description of problem: -coredump info: -``` -(gdb) bt -#0 0x0000152016187387 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:55 -#1 0x0000152016188a78 in __GI_abort () at abort.c:90 -#2 0x00001520159f2439 in os::abort (dump_core=) - at /usr/src/debug/java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.x86_64/openjdk/hotspot/src/os/linux/vm/os_linux.cpp:1572 -#3 0x0000152015c0e64a in VMError::report_and_die (this=this@entry=0x151fe009c4d0) - at /usr/src/debug/java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.x86_64/openjdk/hotspot/src/share/vm/utilities/vmError.cpp:1112 -#4 0x00001520159fc5e5 in JVM_handle_linux_signal (sig=11, info=0x151fe009c770, ucVoid=0x151fe009c640, - abort_if_unrecognized=) - at /usr/src/debug/java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.x86_64/openjdk/hotspot/src/os_cpu/linux_x86/vm/os_linux_x86.cpp:541 -#5 0x00001520159ef5f8 in signalHandler (sig=11, info=0x151fe009c770, uc=0x151fe009c640) - at /usr/src/debug/java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.x86_64/openjdk/hotspot/src/os/linux/vm/os_linux.cpp:4591 -#6 -#7 do_clone (pd=pd@entry=0x151fc7cfe700, attr=attr@entry=0x151fe009d410, stackaddr=, - stopped=, fct=0x152016b4fde0 , clone_flags=4001536) - at ../nptl/sysdeps/pthread/createthread.c:77 -#8 0x0000152016b5056a in create_thread (stackaddr=, attr=0x151fe009d410, pd=0x151fc7cfe700) - at ../nptl/sysdeps/pthread/createthread.c:244 -#9 __pthread_create_2_1 (newthread=, attr=, start_routine=, - arg=) at pthread_create.c:553 -#10 0x00001520159fb9b8 in os::create_thread (thread=0x561592f7f000, thr_type=, ----Type to continue, or q to quit---f 7 - stack_size=) - at /usr/src/debug/java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.x86_64/openjdk/hotspot/src/os/linux/vm/os_linux.cpp:921 -#11 0x00001520157eea78 in JVM_StartThread (env=, jthread=0x151fe009d4d0) - at /usr/src/debug/java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.x86_64/openjdk/hotspot/src/share/vm/prims/jvm.cpp:3128 -#12 0x0000152001ef0c26 in ?? () -#13 0x00000006e100f538 in ?? () -#14 0x00000000de00bfff in ?? () -#15 0x0000151fe009d530 in ?? () -#16 0x0000152001915328 in ?? () -#17 0x00000006e100f538 in ?? () -#18 0x0000152010062550 in ?? () -#19 0x00000006f1450200 in ?? () -#20 0x00001520de280104 in ?? () -#21 0x0000000000000000 in ?? () -(gdb) f 7 -#7 do_clone (pd=pd@entry=0x151fc7cfe700, attr=attr@entry=0x151fe009d410, stackaddr=, - stopped=, fct=0x152016b4fde0 , clone_flags=4001536) - at ../nptl/sysdeps/pthread/createthread.c:77 -77 if (__builtin_expect (rc == -1, 0)) -(gdb) disas -Dump of assembler code for function do_clone: - 0x0000152016b4f010 <+0>: push %r12 - 0x0000152016b4f012 <+2>: xor %r12d,%r12d - 0x0000152016b4f015 <+5>: mov %rdx,%r10 - 0x0000152016b4f018 <+8>: push %rbp - 0x0000152016b4f019 <+9>: mov %rsi,%rbp - 0x0000152016b4f01c <+12>: push %rbx - 0x0000152016b4f01d <+13>: mov %rdi,%rbx - 0x0000152016b4f020 <+16>: sub $0x10,%rsp - 0x0000152016b4f024 <+20>: test %ecx,%ecx - 0x0000152016b4f026 <+22>: setne %r12b - 0x0000152016b4f02a <+26>: jne 0x152016b4f07f - 0x0000152016b4f02c <+28>: lock incl 0x21022d(%rip) # 0x152016d5f260 <__nptl_nthreads> - 0x0000152016b4f033 <+35>: lea 0x2d0(%rbx),%r8 - 0x0000152016b4f03a <+42>: lea 0xd9f(%rip),%rdi # 0x152016b4fde0 - 0x0000152016b4f041 <+49>: xor %eax,%eax - 0x0000152016b4f043 <+51>: mov %rbx,%r9 - 0x0000152016b4f046 <+54>: mov %rbx,%rcx - 0x0000152016b4f049 <+57>: mov $0x3d0f00,%edx - 0x0000152016b4f04e <+62>: mov %r8,(%rsp) - 0x0000152016b4f052 <+66>: mov %r10,%rsi - 0x0000152016b4f055 <+69>: callq 0x152016b4d470 <__clone@plt> -=> 0x0000152016b4f05a <+74>: cmp $0xffffffff,%eax - 0x0000152016b4f05d <+77>: je 0x152016b4f118 ----Type to continue, or q to quit---q -Quit -(gdb) p rc -$1 = 223935 -(gdb) i r rax -rax 0x36abf 223935 -(gdb) i r eax -eax 0x0 0 -(gdb) l -72 atomic_increment (&__nptl_nthreads); -73 -74 int rc = ARCH_CLONE (fct, STACK_VARIABLES_ARGS, clone_flags, -75 pd, &pd->tid, TLS_VALUE, &pd->tid); -76 -77 if (__builtin_expect (rc == -1, 0)) -78 { -79 atomic_decrement (&__nptl_nthreads); /* Oops, we lied for a second. */ -80 -81 /* Perhaps a thread wants to change the IDs and if waiting -(gdb) -``` -Additional information: -``` -# cat test.c -#include - -int main() { - int rc = test1(); - if(__builtin_expect (rc == -1, 0)) { - return rc; - } - - return 0; -} -# cat test_asm.s -global test1 -section .text -test1: - mov rax, 223935 - ret - -(gdb) disas main -Dump of assembler code for function main: - 0x00000000004004f6 <+0>: sub $0x8,%rsp - 0x00000000004004fa <+4>: mov $0x0,%eax - 0x00000000004004ff <+9>: callq 0x4004f0 - 0x0000000000400504 <+14>: cmp $0xffffffff,%eax - 0x0000000000400507 <+17>: sete %al - 0x000000000040050a <+20>: movzbl %al,%eax - 0x000000000040050d <+23>: neg %eax - 0x000000000040050f <+25>: add $0x8,%rsp - 0x0000000000400513 <+29>: retq -End of assembler dump. -... -# set breakpoint at 0x0000000000400504 -(gdb) i r eax -eax 0x36abf 223935 -(gdb) i r rax -rax 0x36abf 223935 -``` diff --git a/gitlab/issues_text/target_i386/host_missing/accel_KVM/1306 b/gitlab/issues_text/target_i386/host_missing/accel_KVM/1306 deleted file mode 100644 index 2bcf220a5..000000000 --- a/gitlab/issues_text/target_i386/host_missing/accel_KVM/1306 +++ /dev/null @@ -1,159 +0,0 @@ -OpenIndiana fails with "BAD TRAP" & "Page fault" in guest with SATA optical drive -Additional information: -I am not experienced in QEMU, and have not been able to isolate with a simple command line. However, I will attempt any test cases provided by the community. - -The problem in the domain reproduced below resolves by removing the SATA optical drive (even if the SATA controller remains). - -The working case may be derived through the following patch: - -``` -1c1 -< ---- -> -18a19 -> -42c43 -< ---- -> -46d46 -< -48,54d47 -<
-< -< -< -< -< -< -``` - -For consistency, the boot media is installed on an IDE optical drive, which appears not to cause problems. The problem was originally discovered attempting to boot from a SATA optical drive, following the intended layout of the guest system. - ---- - -``` - - openindiana-clone - 7a0550ec-ff03-4894-80b8-affe0dfd8177 - - - - - - 2097152 - 2097152 - 4 - - /machine - - - hvm - /usr/share/OVMF/OVMF_CODE_4M.fd - /var/lib/libvirt/qemu/nvram/openindiana-clone_VARS.fd - - - - - - - - - - - - - destroy - restart - destroy - - - - - - /usr/bin/qemu-system-x86_64 - - - - - - - - -
- - - - - - -
- - - -
- - - - -
- - - - -
- - - - -
- - - - - - -
- - - -
- - - - - - - - - - - - -