* kvm kernel backtrace 2.6.27.3 using kvm 78 userspace
@ 2008-11-22 20:49 Kasper Sandberg
2008-11-23 8:49 ` Avi Kivity
0 siblings, 1 reply; 5+ messages in thread
From: Kasper Sandberg @ 2008-11-22 20:49 UTC (permalink / raw)
To: kvm
Hello.
I just noticed that my dmesg had been flooded with backtraces, appearing
to be of KVM origin. I realize that my kernel is tainted, and slightly
outdated, however, i just wanted to drop the log here in case it might
be useful, but feel free to completely ignore it :)
i am not subscribed to the kvm list, so please cc me in case you need
further info..
my entire dmesg was flooded with backtraces looking practically
identical to this one, so i will only paste a few of them, however,
should you want more(though from a quick look they appear identical), i
can put online the complete log
kvm_handle_exit: unexpected, valid vectoring info and exit reason is 0x9
------------[ cut here ]------------
WARNING: at arch/x86/kvm/x86.c:185 kvm_queue_exception_e+0x63/0x70
[kvm]()
Modules linked in: tun ext3 jbd mbcache usb_storage cryptomgr cbc
aes_x86_64 aes_generic dm_crypt dm_mod crypto_blkcipher sha256_generic
crypto_algapi coretemp it87 hwmon_vid hwmon snd_seq kvm_intel kvm fuse
nvidia(P) snd_usb_audio snd_hda_intel snd_usb_lib snd_rawmidi
snd_seq_device snd_pcm snd_timer snd_hwdep psmouse thermal ehci_hcd rtc
snd ohci1394 ieee1394 soundcore i2c_core processor snd_page_alloc r8169
button
Pid: 20168, comm: kvm Tainted: P W 2.6.27.3 #1
Call Trace:
[<ffffffff80235c84>] warn_on_slowpath+0x64/0xb0
[<ffffffffa0899c01>] paging64_gva_to_gpa+0x21/0x50 [kvm]
[<ffffffffa088cc09>] gfn_to_hva+0x9/0x70 [kvm]
[<ffffffffa088ccd1>] kvm_read_guest_page+0x61/0x70 [kvm]
[<ffffffffa088cd28>] kvm_read_guest+0x48/0x80 [kvm]
[<ffffffffa08931ae>] load_guest_segment_descriptor+0x6e/0xb0 [kvm]
[<ffffffffa0893133>] kvm_queue_exception_e+0x63/0x70 [kvm]
[<ffffffffa08941de>] kvm_task_switch+0x2ee/0x9f0 [kvm]
[<ffffffffa088ed4c>] ioapic_service+0x1ec/0x340 [kvm]
[<ffffffff804b2af7>] __down_read+0x17/0xa6
[<ffffffffa0893566>] kvm_arch_vcpu_ioctl_run+0x266/0x6f0 [kvm]
[<ffffffffa088c502>] kvm_vcpu_ioctl+0x2b2/0x480 [kvm]
[<ffffffff8022ee76>] try_to_wake_up+0xf6/0x1b0
[<ffffffff8022ba4a>] __wake_up_common+0x5a/0x90
[<ffffffff8022bea3>] __wake_up+0x43/0x70
[<ffffffff802556ff>] wake_futex+0x1f/0x30
[<ffffffff80257961>] do_futex+0x881/0xa70
[<ffffffffa08b2ca0>] handle_io+0x0/0x60 [kvm_intel]
[<ffffffff802a0f46>] vfs_ioctl+0x36/0xb0
[<ffffffff802a0f3f>] vfs_ioctl+0x2f/0xb0
[<ffffffff802a124b>] do_vfs_ioctl+0x28b/0x2f0
[<ffffffff802a1351>] sys_ioctl+0xa1/0xb0
[<ffffffff8020bacb>] system_call_fastpath+0x16/0x1b
---[ end trace dc61957677c4cb77 ]---
kvm_handle_exit: unexpected, valid vectoring info and exit reason is 0x9
------------[ cut here ]------------
WARNING: at arch/x86/kvm/x86.c:185 kvm_queue_exception_e+0x63/0x70
[kvm]()
Modules linked in: tun ext3 jbd mbcache usb_storage cryptomgr cbc
aes_x86_64 aes_generic dm_crypt dm_mod crypto_blkcipher sha256_generic
crypto_algapi coretemp it87 hwmon_vid hwmon snd_seq kvm_intel kvm fuse
nvidia(P) snd_usb_audio snd_hda_intel snd_usb_lib snd_rawmidi
snd_seq_device snd_pcm snd_timer snd_hwdep psmouse thermal ehci_hcd rtc
snd ohci1394 ieee1394 soundcore i2c_core processor snd_page_alloc r8169
button
Pid: 20168, comm: kvm Tainted: P W 2.6.27.3 #1
Call Trace:
[<ffffffff80235c84>] warn_on_slowpath+0x64/0xb0
[<ffffffffa0899c01>] paging64_gva_to_gpa+0x21/0x50 [kvm]
[<ffffffffa088cc09>] gfn_to_hva+0x9/0x70 [kvm]
[<ffffffffa088ccd1>] kvm_read_guest_page+0x61/0x70 [kvm]
[<ffffffffa088cd28>] kvm_read_guest+0x48/0x80 [kvm]
[<ffffffffa08931ae>] load_guest_segment_descriptor+0x6e/0xb0 [kvm]
[<ffffffffa0893133>] kvm_queue_exception_e+0x63/0x70 [kvm]
[<ffffffffa08941de>] kvm_task_switch+0x2ee/0x9f0 [kvm]
[<ffffffffa088ed4c>] ioapic_service+0x1ec/0x340 [kvm]
[<ffffffff804b2af7>] __down_read+0x17/0xa6
[<ffffffffa0893566>] kvm_arch_vcpu_ioctl_run+0x266/0x6f0 [kvm]
[<ffffffffa088c502>] kvm_vcpu_ioctl+0x2b2/0x480 [kvm]
[<ffffffff8022ee76>] try_to_wake_up+0xf6/0x1b0
[<ffffffff8022ba4a>] __wake_up_common+0x5a/0x90
[<ffffffff8022bea3>] __wake_up+0x43/0x70
[<ffffffff802556ff>] wake_futex+0x1f/0x30
[<ffffffff80257961>] do_futex+0x881/0xa70
[<ffffffffa08b2ca0>] handle_io+0x0/0x60 [kvm_intel]
[<ffffffff802a0f46>] vfs_ioctl+0x36/0xb0
[<ffffffff802a0f3f>] vfs_ioctl+0x2f/0xb0
[<ffffffff802a124b>] do_vfs_ioctl+0x28b/0x2f0
[<ffffffff802a1351>] sys_ioctl+0xa1/0xb0
[<ffffffff8020bacb>] system_call_fastpath+0x16/0x1b
---[ end trace dc61957677c4cb77 ]---
kvm_handle_exit: unexpected, valid vectoring info and exit reason is 0x9
------------[ cut here ]------------
WARNING: at arch/x86/kvm/x86.c:185 kvm_queue_exception_e+0x63/0x70
[kvm]()
Modules linked in: tun ext3 jbd mbcache usb_storage cryptomgr cbc
aes_x86_64 aes_generic dm_crypt dm_mod crypto_blkcipher sha256_generic
crypto_algapi coretemp it87 hwmon_vid hwmon snd_seq kvm_intel kvm fuse
nvidia(P) snd_usb_audio snd_hda_intel snd_usb_lib snd_rawmidi
snd_seq_device snd_pcm snd_timer snd_hwdep psmouse thermal ehci_hcd rtc
snd ohci1394 ieee1394 soundcore i2c_core processor snd_page_alloc r8169
button
Pid: 20168, comm: kvm Tainted: P W 2.6.27.3 #1
Call Trace:
[<ffffffff80235c84>] warn_on_slowpath+0x64/0xb0
[<ffffffffa0899c01>] paging64_gva_to_gpa+0x21/0x50 [kvm]
[<ffffffffa088cc09>] gfn_to_hva+0x9/0x70 [kvm]
[<ffffffffa088ccd1>] kvm_read_guest_page+0x61/0x70 [kvm]
[<ffffffffa088cd28>] kvm_read_guest+0x48/0x80 [kvm]
[<ffffffffa08931ae>] load_guest_segment_descriptor+0x6e/0xb0 [kvm]
[<ffffffffa0893133>] kvm_queue_exception_e+0x63/0x70 [kvm]
[<ffffffffa08941de>] kvm_task_switch+0x2ee/0x9f0 [kvm]
[<ffffffffa088ed4c>] ioapic_service+0x1ec/0x340 [kvm]
[<ffffffff804b2af7>] __down_read+0x17/0xa6
[<ffffffffa0893566>] kvm_arch_vcpu_ioctl_run+0x266/0x6f0 [kvm]
[<ffffffffa088c502>] kvm_vcpu_ioctl+0x2b2/0x480 [kvm]
[<ffffffff8022ee76>] try_to_wake_up+0xf6/0x1b0
[<ffffffff8022ba4a>] __wake_up_common+0x5a/0x90
[<ffffffff8022bea3>] __wake_up+0x43/0x70
[<ffffffff802556ff>] wake_futex+0x1f/0x30
[<ffffffff80257961>] do_futex+0x881/0xa70
[<ffffffffa08b2ca0>] handle_io+0x0/0x60 [kvm_intel]
[<ffffffff802a0f46>] vfs_ioctl+0x36/0xb0
[<ffffffff802a0f3f>] vfs_ioctl+0x2f/0xb0
[<ffffffff802a124b>] do_vfs_ioctl+0x28b/0x2f0
[<ffffffff802a1351>] sys_ioctl+0xa1/0xb0
[<ffffffff8020bacb>] system_call_fastpath+0x16/0x1b
---[ end trace dc61957677c4cb77 ]---
mvh.
Kasper Sandberg
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: kvm kernel backtrace 2.6.27.3 using kvm 78 userspace
2008-11-22 20:49 kvm kernel backtrace 2.6.27.3 using kvm 78 userspace Kasper Sandberg
@ 2008-11-23 8:49 ` Avi Kivity
2008-11-23 14:23 ` Kasper Sandberg
0 siblings, 1 reply; 5+ messages in thread
From: Avi Kivity @ 2008-11-23 8:49 UTC (permalink / raw)
To: Kasper Sandberg; +Cc: kvm
Kasper Sandberg wrote:
> Hello.
>
> I just noticed that my dmesg had been flooded with backtraces, appearing
> to be of KVM origin. I realize that my kernel is tainted, and slightly
> outdated, however, i just wanted to drop the log here in case it might
> be useful, but feel free to completely ignore it :)
>
> i am not subscribed to the kvm list, so please cc me in case you need
> further info..
>
> my entire dmesg was flooded with backtraces looking practically
> identical to this one, so i will only paste a few of them, however,
> should you want more(though from a quick look they appear identical), i
> can put online the complete log
>
What guest are you running?
--
I have a truly marvellous patch that fixes the bug which this
signature is too narrow to contain.
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: kvm kernel backtrace 2.6.27.3 using kvm 78 userspace
2008-11-23 8:49 ` Avi Kivity
@ 2008-11-23 14:23 ` Kasper Sandberg
2008-11-23 14:27 ` Avi Kivity
0 siblings, 1 reply; 5+ messages in thread
From: Kasper Sandberg @ 2008-11-23 14:23 UTC (permalink / raw)
To: Avi Kivity; +Cc: kvm
On Sun, 2008-11-23 at 10:49 +0200, Avi Kivity wrote:
> Kasper Sandberg wrote:
> > Hello.
> >
> > I just noticed that my dmesg had been flooded with backtraces, appearing
> > to be of KVM origin. I realize that my kernel is tainted, and slightly
> > outdated, however, i just wanted to drop the log here in case it might
> > be useful, but feel free to completely ignore it :)
> >
> > i am not subscribed to the kvm list, so please cc me in case you need
> > further info..
> >
> > my entire dmesg was flooded with backtraces looking practically
> > identical to this one, so i will only paste a few of them, however,
> > should you want more(though from a quick look they appear identical), i
> > can put online the complete log
> >
>
> What guest are you running?
Yeah sorry, i was gonna include that in the mail, i apparently forgot.
I have been running debian, both 32 and 64bit inside it, .18, .24
and .26 kernels, and ubuntu 8.10 .27 kernels, ATLEAST 32bit, i do not
remember if i have run 64bit ubuntu 8.10
I can however give some information that _MIGHT_ (i have no clue myself)
be relevant
on one of the debian guests i had xrandr crash the X server while trying
to change resolution, i did this a few times. Using -vga std.
also, on the ubuntu 32bit guest, i ran qemu with debian stable, where X
crashed during start inside the qemu on the ubuntu guest. This happened
only once.
im quite certain my ram and that is fine, no errors when doing memory
testing etc.
but as said, the kernel is tainted, i dont know if that affects the
results or not, i just wanted to inform in case this can help someone.
That being said, the box has NOT been rebooted since, and i can confirm
that kvm works excellently, i have spawned several VMs and used a tad,
since i wrote the mail.
>
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: kvm kernel backtrace 2.6.27.3 using kvm 78 userspace
2008-11-23 14:23 ` Kasper Sandberg
@ 2008-11-23 14:27 ` Avi Kivity
2008-11-23 16:16 ` Kasper Sandberg
0 siblings, 1 reply; 5+ messages in thread
From: Avi Kivity @ 2008-11-23 14:27 UTC (permalink / raw)
To: Kasper Sandberg; +Cc: kvm
Kasper Sandberg wrote:
>> What guest are you running?
>>
>
> Yeah sorry, i was gonna include that in the mail, i apparently forgot.
>
> I have been running debian, both 32 and 64bit inside it, .18, .24
> and .26 kernels, and ubuntu 8.10 .27 kernels, ATLEAST 32bit, i do not
> remember if i have run 64bit ubuntu 8.10
>
> I can however give some information that _MIGHT_ (i have no clue myself)
> be relevant
>
> on one of the debian guests i had xrandr crash the X server while trying
> to change resolution, i did this a few times. Using -vga std.
>
> also, on the ubuntu 32bit guest, i ran qemu with debian stable, where X
> crashed during start inside the qemu on the ubuntu guest. This happened
> only once.
>
> im quite certain my ram and that is fine, no errors when doing memory
> testing etc.
>
>
> but as said, the kernel is tainted, i dont know if that affects the
> results or not, i just wanted to inform in case this can help someone.
> That being said, the box has NOT been rebooted since, and i can confirm
> that kvm works excellently, i have spawned several VMs and used a tad,
> since i wrote the mail
Well, if you can find a recipe that reliably reproduces the problems, we
want to hear of it.
--
error compiling committee.c: too many arguments to function
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: kvm kernel backtrace 2.6.27.3 using kvm 78 userspace
2008-11-23 14:27 ` Avi Kivity
@ 2008-11-23 16:16 ` Kasper Sandberg
0 siblings, 0 replies; 5+ messages in thread
From: Kasper Sandberg @ 2008-11-23 16:16 UTC (permalink / raw)
To: Avi Kivity; +Cc: kvm
On Sun, 2008-11-23 at 16:27 +0200, Avi Kivity wrote:
> Kasper Sandberg wrote:
> >> What guest are you running?
> >>
> >
> > Yeah sorry, i was gonna include that in the mail, i apparently forgot.
> >
> > I have been running debian, both 32 and 64bit inside it, .18, .24
> > and .26 kernels, and ubuntu 8.10 .27 kernels, ATLEAST 32bit, i do not
> > remember if i have run 64bit ubuntu 8.10
> >
> > I can however give some information that _MIGHT_ (i have no clue myself)
> > be relevant
> >
> > on one of the debian guests i had xrandr crash the X server while trying
> > to change resolution, i did this a few times. Using -vga std.
> >
> > also, on the ubuntu 32bit guest, i ran qemu with debian stable, where X
> > crashed during start inside the qemu on the ubuntu guest. This happened
> > only once.
> >
> > im quite certain my ram and that is fine, no errors when doing memory
> > testing etc.
> >
> >
> > but as said, the kernel is tainted, i dont know if that affects the
> > results or not, i just wanted to inform in case this can help someone.
> > That being said, the box has NOT been rebooted since, and i can confirm
> > that kvm works excellently, i have spawned several VMs and used a tad,
> > since i wrote the mail
>
> Well, if you can find a recipe that reliably reproduces the problems, we
> want to hear of it.
Within the coming week i will try to find the time to update to latest
kernel/kvm, and then do all the things i remember doing in the VMs, to
try and reproduce
>
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2008-11-23 16:16 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2008-11-22 20:49 kvm kernel backtrace 2.6.27.3 using kvm 78 userspace Kasper Sandberg
2008-11-23 8:49 ` Avi Kivity
2008-11-23 14:23 ` Kasper Sandberg
2008-11-23 14:27 ` Avi Kivity
2008-11-23 16:16 ` Kasper Sandberg
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox