From: Alexander Graf <agraf@suse.de>
To: Avi Kivity <avi@redhat.com>
Cc: "kvm@vger.kernel.org" <kvm@vger.kernel.org>,
Marcelo Tosatti <mtosatti@redhat.com>,
Joerg Roedel <joerg.roedel@amd.com>,
Sheng Yang <sheng@linux.intel.com>
Subject: Re: KVM guest crashes
Date: Wed, 21 Jan 2009 11:44:31 +0100 [thread overview]
Message-ID: <4976FC8F.10002@suse.de> (raw)
In-Reply-To: <4976EC92.4010109@redhat.com>
Avi Kivity wrote:
> Avi Kivity wrote:
>>
>> I suggest checking if you have the latest BIOS update applied. I've
>> had bad experiences with un-updated processors.
>>
>
> FWIW, I have an 8-way F9 guest (2.6.27.5-blah) running on an 2x4
> Barcelona host, happily make -j16ing an allmodconfig kernel.
Strange. I started the tests again with an updated BIOS now, installing
an Intel machine to test on in parallel.
old:
# ./rdmsr /dev/cpu/0/msr $(( 0x0000008b ))
0x1000065
new:
# ./rdmsr /dev/cpu/0/msr $(( 0x0000008b ))
0x1000083
But I already got one guest crashing:
int3: 0000 [1] SMP
last sysfs file: /sys/kernel/uevent_seqnum
CPU 2
Modules linked in: nls_utf8 cifs(X) af_packet virtio_net virtio_pci
virtio_ring virtio edd ext3 mbcache jbd fan ide_pci_generic ide_core
ata_generic sata_nv libata scsi_mod dock thermal processor thermal_sys
hwmon
Supported: Yes, External
Pid: 0, comm: swapper Tainted: G S 2.6.27.7-9-default #1
RIP: 0010:[<ffffffff80a500f1>] [<ffffffff80a500f1>]
per_cpu__cpu_state+0x1/0x4
RSP: 0018:ffff88007a493fa8 EFLAGS: 00000083
RAX: ffffffff806f5fa0 RBX: ffffffff80a500f0 RCX: 0000000000000000
RDX: ffff880001033200 RSI: 0000000000000000 RDI: ffffffffff5fc0b0
RBP: ffff88007a48beb0 R08: 0000000000000000 R09: ffff880001039638
R10: 00000000ffffffff R11: ffffffff8021c5d9 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
FS: 00007fe3252e4950(0000) GS:ffff88007a461f40(0000) knlGS:0000000000000000
CS: 0010 DS: 0018 ES: 0018 CR0: 000000008005003b
CR2: 000000000062d000 CR3: 000000007c10a000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process swapper (pid: 0, threadinfo ffff88007a48a000, task ffff88007a488280)
Stack: ffff88007a48beb0 ffffffff8020ca2e ffff88007a48beb0 <EOI>
0000007dd83ce327
0000000000000086 ffff8800010396d0 0000000002625a00 0000000000000002
000000010000eadc 0000007dd83ce327 0000000000000292 0000000000000292
Call Trace:
Inexact backtrace:
<IRQ> [<ffffffff8020ca2e>] ? ret_from_intr+0x0/0x29
<EOI> [<ffffffff804a6992>] ? notifier_call_chain+0x29/0x4c
[<ffffffff80213465>] ? default_idle+0x38/0x54
[<ffffffff8020b34a>] ? cpu_idle+0xa9/0xf1
Code: cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc
cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc <cc> cc
cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc
RIP [<ffffffff80a500f1>] per_cpu__cpu_state+0x1/0x4
RSP <ffff88007a493fa8>
---[ end trace 17313f34f216af07 ]---
Kernel panic - not syncing: Attempted to kill the idle task!
------------[ cut here ]------------
WARNING: at kernel/smp.c:331 smp_call_function_mask+0x38/0x1f2()
Modules linked in: nls_utf8 cifs(X) af_packet virtio_net virtio_pci
virtio_ring virtio edd ext3 mbcache jbd fan ide_pci_generic ide_core
ata_generic sata_nv libata scsi_mod dock thermal processor thermal_sys
hwmon
Supported: Yes, External
Pid: 0, comm: swapper Tainted: G S D 2.6.27.7-9-default #1
Call Trace:
[<ffffffff8020e42e>] show_trace_log_lvl+0x41/0x58
[<ffffffff804a1e97>] dump_stack+0x69/0x6f
[<ffffffff80240eb2>] warn_on_slowpath+0x51/0x77
[<ffffffff80261fef>] smp_call_function_mask+0x38/0x1f2
[<ffffffff802621d2>] smp_call_function+0x29/0x2e
[<ffffffff8021ba16>] native_smp_send_stop+0x1a/0x3f
[<ffffffff804a1f59>] panic+0xbc/0x170
[<ffffffff802449e2>] do_exit+0x6b/0x334
[<ffffffff804a4b9b>] oops_begin+0x0/0x9e
[<ffffffff804a524a>] do_int3+0x7d/0xa1
[<ffffffff804a46e6>] int3+0xb6/0xf0
[<ffffffff80a500f1>] per_cpu__cpu_state+0x1/0x4
DWARF2 unwinder stuck at per_cpu__cpu_state+0x1/0x4
Leftover inexact backtrace:
<IRQ> [<ffffffff8020ca2e>] ret_from_intr+0x0/0x29
<EOI> [<ffffffff804a6992>] notifier_call_chain+0x29/0x4c
[<ffffffff80213465>] default_idle+0x38/0x54
[<ffffffff8020b34a>] cpu_idle+0xa9/0xf1
---[ end trace 17313f34f216af07 ]---
The UP guests seemed to work fine - will start them again now.
Alex
next prev parent reply other threads:[~2009-01-21 10:44 UTC|newest]
Thread overview: 18+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-01-20 15:49 KVM guest crashes Alexander Graf
2009-01-20 20:07 ` Avi Kivity
2009-01-20 20:20 ` Alexander Graf
2009-01-21 8:14 ` Alexander Graf
2009-01-21 9:05 ` Avi Kivity
2009-01-21 9:36 ` Avi Kivity
2009-01-21 10:44 ` Alexander Graf [this message]
2009-01-22 20:29 ` Alexander Graf
2009-01-22 20:36 ` Alexander Graf
2009-01-22 20:55 ` Alexander Graf
2009-01-23 16:36 ` Alexander Graf
2009-01-23 22:36 ` Marcelo Tosatti
2009-01-24 7:42 ` Alexander Graf
2009-01-24 13:06 ` Marcelo Tosatti
2009-01-24 14:30 ` Alexander Graf
2009-01-26 15:53 ` Alexander Graf
2009-01-26 16:21 ` Marcelo Tosatti
2009-01-26 16:33 ` Alexander Graf
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4976FC8F.10002@suse.de \
--to=agraf@suse.de \
--cc=avi@redhat.com \
--cc=joerg.roedel@amd.com \
--cc=kvm@vger.kernel.org \
--cc=mtosatti@redhat.com \
--cc=sheng@linux.intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.