* Kernel Oops with kvm 66 running WinXP
@ 2008-04-26 12:12 Michal Ludvig
2008-04-27 12:53 ` Avi Kivity
0 siblings, 1 reply; 14+ messages in thread
From: Michal Ludvig @ 2008-04-26 12:12 UTC (permalink / raw)
To: kvm-devel
Hi,
I've experienced a kernel Oops on 2.6.24 with kvm 66 on AMD in 64bit
mode while starting up WinXP:
kvm: emulating exchange as write
Unable to handle kernel NULL pointer dereference at 0000000000000000 RIP:
[<ffffffff883a7a5a>] :kvm:x86_emulate_insn+0x3fa/0x4240
PGD 7658d067 PUD 242a6067 PMD 0
Oops: 0002 [1] SMP
CPU 0
Modules linked in: bridge llc reiserfs tun kvm_amd kvm nfs nfsd lockd
nfs_acl auth_rpcgss sunrpc exportfs w83627ehf hwmon_vid autofs4
snd_pcm_oss snd_mixer_oss snd_seq snd_seq_device iptable_filter
ip_tables ip6table_filter ip6_tables x_tables af_packet ipv6 fuse ext2
loop snd_hda_intel snd_pcm snd_timer k8temp i2c_nforce2 i2c_core hwmon
sr_mod button cdrom snd soundcore snd_page_alloc forcedeth sg floppy
linear sd_mod ehci_hcd ohci_hcd usbcore dm_snapshot edd dm_mod fan
sata_nv pata_amd libata scsi_mod thermal processor
Pid: 3139, comm: qemu-system-x86 Not tainted 2.6.24-mludvig #1
RIP: 0010:[<ffffffff883a7a5a>] [<ffffffff883a7a5a>]
:kvm:x86_emulate_insn+0x3fa/0x4240
RSP: 0018:ffff8100609fdc18 EFLAGS: 00010246
RAX: 000000008001003b RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8100609fe000
RBP: ffff8100609ff320 R08: ffff8100609ff3c0 R09: 0000000000000006
R10: 0000000000000002 R11: 0000000000000000 R12: ffff8100609ff368
R13: ffff8100609ff3c0 R14: ffffffff883be600 R15: 0000000001971353
FS: 0000000040804950(0063) GS:ffffffff8053e000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 0000000000000000 CR3: 000000006bb74000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process qemu-system-x86 (pid: 3139, threadinfo ffff8100609fc000, task
ffff8100794d5680)
Stack: 00000000609fdc74 0000000012187318 000000000ea5f068 ffff8100609ff3c0
ffff8100609fdc94 ffffffff8839c9e0 0000000000000000 ffff8100609fe000
ffff8100609ff320 0000000000000000 0000000000000000 0000000000000000
Call Trace:
[<ffffffff8839c9e0>] :kvm:kvm_get_cs_db_l_bits+0x20/0x40
[<ffffffff8839dd2f>] :kvm:emulate_instruction+0x1bf/0x340
[<ffffffff883c1a22>] :kvm_amd:emulate_on_interception+0x12/0x60
[<ffffffff883a11d9>] :kvm:kvm_arch_vcpu_ioctl_run+0x169/0x6d0
[<ffffffff8839c14c>] :kvm:kvm_vcpu_ioctl+0x41c/0x440
[<ffffffff802305f3>] __wake_up+0x43/0x70
[<ffffffff803374c1>] __up_read+0x21/0xb0
[<ffffffff802586ec>] futex_wake+0xcc/0xf0
[<ffffffff80259559>] do_futex+0x129/0xbb0
[<ffffffff8022e7bd>] __dequeue_entity+0x3d/0x50
[<ffffffff8839b925>] :kvm:kvm_vm_ioctl+0x85/0x200
[<ffffffff802ab10f>] do_ioctl+0x2f/0xa0
[<ffffffff802ab3a0>] vfs_ioctl+0x220/0x2d0
[<ffffffff802ab4e1>] sys_ioctl+0x91/0xb0
[<ffffffff8020bcae>] system_call+0x7e/0x83
Code: 66 89 02 e9 ee fc ff ff 48 8b 95 88 00 00 00 48 8b 45 78 88
RIP [<ffffffff883a7a5a>] :kvm:x86_emulate_insn+0x3fa/0x4240
RSP <ffff8100609fdc18>
CR2: 0000000000000000
---[ end trace d358bab3f035112e ]---
The host is still alive but the XP guest is locked up in a boot screen.
Michal
-------------------------------------------------------------------------
This SF.net email is sponsored by the 2008 JavaOne(SM) Conference
Don't miss this year's exciting event. There's still time to save $100.
Use priority code J8TL2D2.
http://ad.doubleclick.net/clk;198757673;13503038;p?http://java.sun.com/javaone
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Kernel Oops with kvm 66 running WinXP
2008-04-26 12:12 Kernel Oops with kvm 66 running WinXP Michal Ludvig
@ 2008-04-27 12:53 ` Avi Kivity
2008-04-27 13:45 ` Avi Kivity
0 siblings, 1 reply; 14+ messages in thread
From: Avi Kivity @ 2008-04-27 12:53 UTC (permalink / raw)
To: Michal Ludvig; +Cc: kvm-devel
Michal Ludvig wrote:
> Hi,
>
> I've experienced a kernel Oops on 2.6.24 with kvm 66 on AMD in 64bit
> mode while starting up WinXP:
>
> kvm: emulating exchange as write
> Unable to handle kernel NULL pointer dereference at 0000000000000000 RIP:
> [<ffffffff883a7a5a>] :kvm:x86_emulate_insn+0x3fa/0x4240
> PGD 7658d067 PUD 242a6067 PMD 0
> Oops: 0002 [1] SMP
> CPU 0
> Modules linked in: bridge llc reiserfs tun kvm_amd kvm nfs nfsd lockd
> nfs_acl auth_rpcgss sunrpc exportfs w83627ehf hwmon_vid autofs4
> snd_pcm_oss snd_mixer_oss snd_seq snd_seq_device iptable_filter
> ip_tables ip6table_filter ip6_tables x_tables af_packet ipv6 fuse ext2
> loop snd_hda_intel snd_pcm snd_timer k8temp i2c_nforce2 i2c_core hwmon
> sr_mod button cdrom snd soundcore snd_page_alloc forcedeth sg floppy
> linear sd_mod ehci_hcd ohci_hcd usbcore dm_snapshot edd dm_mod fan
> sata_nv pata_amd libata scsi_mod thermal processor
> Pid: 3139, comm: qemu-system-x86 Not tainted 2.6.24-mludvig #1
> RIP: 0010:[<ffffffff883a7a5a>] [<ffffffff883a7a5a>]
> :kvm:x86_emulate_insn+0x3fa/0x4240
> RSP: 0018:ffff8100609fdc18 EFLAGS: 00010246
> RAX: 000000008001003b RBX: 0000000000000000 RCX: 0000000000000000
> RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8100609fe000
> RBP: ffff8100609ff320 R08: ffff8100609ff3c0 R09: 0000000000000006
> R10: 0000000000000002 R11: 0000000000000000 R12: ffff8100609ff368
> R13: ffff8100609ff3c0 R14: ffffffff883be600 R15: 0000000001971353
> FS: 0000000040804950(0063) GS:ffffffff8053e000(0000) knlGS:0000000000000000
> CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
> CR2: 0000000000000000 CR3: 000000006bb74000 CR4: 00000000000006e0
> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
> Process qemu-system-x86 (pid: 3139, threadinfo ffff8100609fc000, task
> ffff8100794d5680)
> Stack: 00000000609fdc74 0000000012187318 000000000ea5f068 ffff8100609ff3c0
> ffff8100609fdc94 ffffffff8839c9e0 0000000000000000 ffff8100609fe000
> ffff8100609ff320 0000000000000000 0000000000000000 0000000000000000
> Call Trace:
> [<ffffffff8839c9e0>] :kvm:kvm_get_cs_db_l_bits+0x20/0x40
> [<ffffffff8839dd2f>] :kvm:emulate_instruction+0x1bf/0x340
> [<ffffffff883c1a22>] :kvm_amd:emulate_on_interception+0x12/0x60
> [<ffffffff883a11d9>] :kvm:kvm_arch_vcpu_ioctl_run+0x169/0x6d0
> [<ffffffff8839c14c>] :kvm:kvm_vcpu_ioctl+0x41c/0x440
> [<ffffffff802305f3>] __wake_up+0x43/0x70
> [<ffffffff803374c1>] __up_read+0x21/0xb0
> [<ffffffff802586ec>] futex_wake+0xcc/0xf0
> [<ffffffff80259559>] do_futex+0x129/0xbb0
> [<ffffffff8022e7bd>] __dequeue_entity+0x3d/0x50
> [<ffffffff8839b925>] :kvm:kvm_vm_ioctl+0x85/0x200
> [<ffffffff802ab10f>] do_ioctl+0x2f/0xa0
> [<ffffffff802ab3a0>] vfs_ioctl+0x220/0x2d0
> [<ffffffff802ab4e1>] sys_ioctl+0x91/0xb0
> [<ffffffff8020bcae>] system_call+0x7e/0x83
>
>
> Code: 66 89 02 e9 ee fc ff ff 48 8b 95 88 00 00 00 48 8b 45 78 88
> RIP [<ffffffff883a7a5a>] :kvm:x86_emulate_insn+0x3fa/0x4240
> RSP <ffff8100609fdc18>
> CR2: 0000000000000000
> ---[ end trace d358bab3f035112e ]---
>
> The host is still alive but the XP guest is locked up in a boot screen.
>
>
Please mail me (privately) an 'objdump -Sr x86_emulate.o' from the
kernel directory, so we can see where this happened.
--
error compiling committee.c: too many arguments to function
-------------------------------------------------------------------------
This SF.net email is sponsored by the 2008 JavaOne(SM) Conference
Don't miss this year's exciting event. There's still time to save $100.
Use priority code J8TL2D2.
http://ad.doubleclick.net/clk;198757673;13503038;p?http://java.sun.com/javaone
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Kernel Oops with kvm 66 running WinXP
2008-04-27 12:53 ` Avi Kivity
@ 2008-04-27 13:45 ` Avi Kivity
2008-04-28 1:43 ` Michal Ludvig
2008-05-04 23:02 ` Michal Ludvig
0 siblings, 2 replies; 14+ messages in thread
From: Avi Kivity @ 2008-04-27 13:45 UTC (permalink / raw)
To: Michal Ludvig; +Cc: kvm-devel
[-- Attachment #1: Type: text/plain, Size: 3649 bytes --]
Avi Kivity wrote:
> Michal Ludvig wrote:
>> Hi,
>>
>> I've experienced a kernel Oops on 2.6.24 with kvm 66 on AMD in 64bit
>> mode while starting up WinXP:
>>
>> kvm: emulating exchange as write
>> Unable to handle kernel NULL pointer dereference at 0000000000000000
>> RIP:
>> [<ffffffff883a7a5a>] :kvm:x86_emulate_insn+0x3fa/0x4240
>> PGD 7658d067 PUD 242a6067 PMD 0
>> Oops: 0002 [1] SMP
>> CPU 0
>> Modules linked in: bridge llc reiserfs tun kvm_amd kvm nfs nfsd lockd
>> nfs_acl auth_rpcgss sunrpc exportfs w83627ehf hwmon_vid autofs4
>> snd_pcm_oss snd_mixer_oss snd_seq snd_seq_device iptable_filter
>> ip_tables ip6table_filter ip6_tables x_tables af_packet ipv6 fuse
>> ext2 loop snd_hda_intel snd_pcm snd_timer k8temp i2c_nforce2 i2c_core
>> hwmon sr_mod button cdrom snd soundcore snd_page_alloc forcedeth sg
>> floppy linear sd_mod ehci_hcd ohci_hcd usbcore dm_snapshot edd dm_mod
>> fan sata_nv pata_amd libata scsi_mod thermal processor
>> Pid: 3139, comm: qemu-system-x86 Not tainted 2.6.24-mludvig #1
>> RIP: 0010:[<ffffffff883a7a5a>] [<ffffffff883a7a5a>]
>> :kvm:x86_emulate_insn+0x3fa/0x4240
>> RSP: 0018:ffff8100609fdc18 EFLAGS: 00010246
>> RAX: 000000008001003b RBX: 0000000000000000 RCX: 0000000000000000
>> RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8100609fe000
>> RBP: ffff8100609ff320 R08: ffff8100609ff3c0 R09: 0000000000000006
>> R10: 0000000000000002 R11: 0000000000000000 R12: ffff8100609ff368
>> R13: ffff8100609ff3c0 R14: ffffffff883be600 R15: 0000000001971353
>> FS: 0000000040804950(0063) GS:ffffffff8053e000(0000)
>> knlGS:0000000000000000
>> CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
>> CR2: 0000000000000000 CR3: 000000006bb74000 CR4: 00000000000006e0
>> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
>> DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
>> Process qemu-system-x86 (pid: 3139, threadinfo ffff8100609fc000, task
>> ffff8100794d5680)
>> Stack: 00000000609fdc74 0000000012187318 000000000ea5f068
>> ffff8100609ff3c0
>> ffff8100609fdc94 ffffffff8839c9e0 0000000000000000 ffff8100609fe000
>> ffff8100609ff320 0000000000000000 0000000000000000 0000000000000000
>> Call Trace:
>> [<ffffffff8839c9e0>] :kvm:kvm_get_cs_db_l_bits+0x20/0x40
>> [<ffffffff8839dd2f>] :kvm:emulate_instruction+0x1bf/0x340
>> [<ffffffff883c1a22>] :kvm_amd:emulate_on_interception+0x12/0x60
>> [<ffffffff883a11d9>] :kvm:kvm_arch_vcpu_ioctl_run+0x169/0x6d0
>> [<ffffffff8839c14c>] :kvm:kvm_vcpu_ioctl+0x41c/0x440
>> [<ffffffff802305f3>] __wake_up+0x43/0x70
>> [<ffffffff803374c1>] __up_read+0x21/0xb0
>> [<ffffffff802586ec>] futex_wake+0xcc/0xf0
>> [<ffffffff80259559>] do_futex+0x129/0xbb0
>> [<ffffffff8022e7bd>] __dequeue_entity+0x3d/0x50
>> [<ffffffff8839b925>] :kvm:kvm_vm_ioctl+0x85/0x200
>> [<ffffffff802ab10f>] do_ioctl+0x2f/0xa0
>> [<ffffffff802ab3a0>] vfs_ioctl+0x220/0x2d0
>> [<ffffffff802ab4e1>] sys_ioctl+0x91/0xb0
>> [<ffffffff8020bcae>] system_call+0x7e/0x83
>>
>>
>> Code: 66 89 02 e9 ee fc ff ff 48 8b 95 88 00 00 00 48 8b 45 78 88
>> RIP [<ffffffff883a7a5a>] :kvm:x86_emulate_insn+0x3fa/0x4240
>> RSP <ffff8100609fdc18>
>> CR2: 0000000000000000
>> ---[ end trace d358bab3f035112e ]---
>>
>> The host is still alive but the XP guest is locked up in a boot screen.
>>
>>
>
> Please mail me (privately) an 'objdump -Sr x86_emulate.o' from the
> kernel directory, so we can see where this happened.
>
Ok. Please try with the attached patch and let us know. Also repeat
without the patch, so we can be sure it is easily reproducible.
--
error compiling committee.c: too many arguments to function
[-- Attachment #2: revert-smsw-fix.patch --]
[-- Type: text/x-patch, Size: 2116 bytes --]
diff --git a/kernel/x86_emulate.c b/kernel/x86_emulate.c
index 46ef78f..8e1b32f 100644
--- a/kernel/x86_emulate.c
+++ b/kernel/x86_emulate.c
@@ -275,15 +275,12 @@ static u16 group_table[] = {
SrcMem | ModRM, 0, SrcMem | ModRM | Stack, 0,
[Group7*8] =
0, 0, ModRM | SrcMem, ModRM | SrcMem,
- SrcNone | ModRM | DstMem | Mov, 0,
- SrcMem16 | ModRM | Mov, SrcMem | ModRM | ByteOp,
+ SrcNone | ModRM | DstMem, 0, SrcMem | ModRM, SrcMem | ModRM | ByteOp,
};
static u16 group2_table[] = {
[Group7*8] =
- SrcNone | ModRM, 0, 0, 0,
- SrcNone | ModRM | DstMem | Mov, 0,
- SrcMem16 | ModRM | Mov, 0,
+ SrcNone | ModRM, 0, 0, 0, SrcNone | ModRM | DstMem, 0, SrcMem | ModRM, 0,
};
/* EFLAGS bit definitions. */
@@ -1725,8 +1722,6 @@ twobyte_insn:
goto done;
kvm_emulate_hypercall(ctxt->vcpu);
- /* Disable writeback. */
- c->dst.type = OP_NONE;
break;
case 2: /* lgdt */
rc = read_descriptor(ctxt, ops, c->src.ptr,
@@ -1734,8 +1729,6 @@ twobyte_insn:
if (rc)
goto done;
realmode_lgdt(ctxt->vcpu, size, address);
- /* Disable writeback. */
- c->dst.type = OP_NONE;
break;
case 3: /* lidt/vmmcall */
if (c->modrm_mod == 3 && c->modrm_rm == 1) {
@@ -1751,25 +1744,27 @@ twobyte_insn:
goto done;
realmode_lidt(ctxt->vcpu, size, address);
}
- /* Disable writeback. */
- c->dst.type = OP_NONE;
break;
case 4: /* smsw */
- c->dst.bytes = 2;
- c->dst.val = realmode_get_cr(ctxt->vcpu, 0);
+ if (c->modrm_mod != 3)
+ goto cannot_emulate;
+ *(u16 *)&c->regs[c->modrm_rm]
+ = realmode_get_cr(ctxt->vcpu, 0);
break;
case 6: /* lmsw */
- realmode_lmsw(ctxt->vcpu, (u16)c->src.val,
- &ctxt->eflags);
+ if (c->modrm_mod != 3)
+ goto cannot_emulate;
+ realmode_lmsw(ctxt->vcpu, (u16)c->modrm_val,
+ &ctxt->eflags);
break;
case 7: /* invlpg*/
emulate_invlpg(ctxt->vcpu, memop);
- /* Disable writeback. */
- c->dst.type = OP_NONE;
break;
default:
goto cannot_emulate;
}
+ /* Disable writeback. */
+ c->dst.type = OP_NONE;
break;
case 0x06:
emulate_clts(ctxt->vcpu);
[-- Attachment #3: Type: text/plain, Size: 320 bytes --]
-------------------------------------------------------------------------
This SF.net email is sponsored by the 2008 JavaOne(SM) Conference
Don't miss this year's exciting event. There's still time to save $100.
Use priority code J8TL2D2.
http://ad.doubleclick.net/clk;198757673;13503038;p?http://java.sun.com/javaone
[-- Attachment #4: Type: text/plain, Size: 158 bytes --]
_______________________________________________
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel
^ permalink raw reply related [flat|nested] 14+ messages in thread
* Re: Kernel Oops with kvm 66 running WinXP
2008-04-27 13:45 ` Avi Kivity
@ 2008-04-28 1:43 ` Michal Ludvig
2008-05-04 23:02 ` Michal Ludvig
1 sibling, 0 replies; 14+ messages in thread
From: Michal Ludvig @ 2008-04-28 1:43 UTC (permalink / raw)
To: Avi Kivity; +Cc: kvm-devel
Avi Kivity wrote:
> Avi Kivity wrote:
>> Michal Ludvig wrote:
>>> Hi,
>>>
>>> I've experienced a kernel Oops on 2.6.24 with kvm 66 on AMD in 64bit
>>> mode while starting up WinXP:
>>>
>>> kvm: emulating exchange as write
>>> Unable to handle kernel NULL pointer dereference at 0000000000000000
>>> RIP:
>>> [<ffffffff883a7a5a>] :kvm:x86_emulate_insn+0x3fa/0x4240
>>> PGD 7658d067 PUD 242a6067 PMD 0
>>> Oops: 0002 [1] SMP
>>> [...]
>>> The host is still alive but the XP guest is locked up in a boot screen.
>>>
>>>
>>
>> Please mail me (privately) an 'objdump -Sr x86_emulate.o' from the
>> kernel directory, so we can see where this happened.
>>
>
> Ok. Please try with the attached patch and let us know. Also repeat
> without the patch, so we can be sure it is easily reproducible.
Hi, the patch fixed the problem, thanks. It was 100% reproducible (Oops
in 3 out of 3 attempts) and now it booted up.
Michal
-------------------------------------------------------------------------
This SF.net email is sponsored by the 2008 JavaOne(SM) Conference
Don't miss this year's exciting event. There's still time to save $100.
Use priority code J8TL2D2.
http://ad.doubleclick.net/clk;198757673;13503038;p?http://java.sun.com/javaone
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Kernel Oops with kvm 66 running WinXP
2008-04-27 13:45 ` Avi Kivity
2008-04-28 1:43 ` Michal Ludvig
@ 2008-05-04 23:02 ` Michal Ludvig
2008-05-05 6:46 ` Izik Eidus
2008-05-05 7:11 ` Avi Kivity
1 sibling, 2 replies; 14+ messages in thread
From: Michal Ludvig @ 2008-05-04 23:02 UTC (permalink / raw)
To: Avi Kivity; +Cc: kvm-devel
Avi Kivity wrote:
> Avi Kivity wrote:
>> Michal Ludvig wrote:
>>> Hi,
>>>
>>> I've experienced a kernel Oops on 2.6.24 with kvm 66 on AMD in 64bit
>>> mode while starting up WinXP:
>>>
>>> The host is still alive but the XP guest is locked up in a boot screen.
Hi again, just wanted to let you know that I still get this Oops with
kvm-68. It comes a bit later, not during the boot but after the XP
desktop comes up. As there were some changes in kernel/x86_emulate.c the
patch you provided for kvm-66 can't be applied anymore.
loaded kvm module (kvm-68)
kvm: emulating exchange as write
Unable to handle kernel NULL pointer dereference at 0000000000000000 RIP:
[<ffffffff88373b4a>] :kvm:x86_emulate_insn+0x3fa/0x4240
PGD 3145e067 PUD 409b9067 PMD 0
Oops: 0002 [1] SMP
CPU 0
Modules linked in: kvm_amd kvm reiserfs tun bridge llc nfsd lockd
nfs_acl auth_rpcgss sunrpc exportfs iptable_filter ip_tables autofs4
snd_pcm_oss snd_mixer_oss w83627ehf snd_seq snd_seq_device hwmon_vid
ip6table_filter ip6_tables x_tables af_packet ipv6 fuse ext2 loop
snd_hda_intel snd_pcm snd_timer snd soundcore snd_page_alloc sr_mod
k8temp hwmon i2c_nforce2 button i2c_core cdrom forcedeth sg floppy
linear ehci_hcd ohci_hcd sd_mod usbcore dm_snapshot edd dm_mod fan
sata_nv pata_amd libata scsi_mod thermal processor
Pid: 14776, comm: qemu-system-x86 Not tainted 2.6.24-mludvig #1
RIP: 0010:[<ffffffff88373b4a>] [<ffffffff88373b4a>]
:kvm:x86_emulate_insn+0x3fa/0x4240
RSP: 0018:ffff81007d52fc18 EFLAGS: 00010246
RAX: 000000008001003b RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff810079c5c000
RBP: ffff810079c5d320 R08: ffff810079c5d3c0 R09: 0000000000000006
R10: 0000000000000002 R11: 0000000000000000 R12: ffff810079c5d368
R13: ffff810079c5d3c0 R14: ffffffff8838ab20 R15: 00000000019d1353
FS: 0000000040800950(0063) GS:ffffffff8053e000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 0000000000000000 CR3: 000000007985a000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process qemu-system-x86 (pid: 14776, threadinfo ffff81007d52e000, task
ffff81003f4e6780)
Stack: 000000007d52fc74 0000000011fda618 000000000f399068 ffff810079c5d3c0
ffff81007d52fc94 ffffffff88368ae0 0000000000000000 ffff810079c5c000
ffff810079c5d320 0000000000000000 0000000000000000 0000000000000000
Call Trace:
[<ffffffff88368ae0>] :kvm:seg_desct_to_kvm_desct+0x40/0xb0
[<ffffffff88369dff>] :kvm:emulate_instruction+0x1bf/0x340
[<ffffffff883d99e2>] :kvm_amd:emulate_on_interception+0x12/0x60
[<ffffffff8836d2b9>] :kvm:kvm_arch_vcpu_ioctl_run+0x169/0x6d0
[<ffffffff883681fc>] :kvm:kvm_vcpu_ioctl+0x41c/0x440
[<ffffffff802305f3>] __wake_up+0x43/0x70
[<ffffffff803374c1>] __up_read+0x21/0xb0
[<ffffffff802586ec>] futex_wake+0xcc/0xf0
[<ffffffff80259559>] do_futex+0x129/0xbb0
[<ffffffff8022e7bd>] __dequeue_entity+0x3d/0x50
[<ffffffff883679c5>] :kvm:kvm_vm_ioctl+0x85/0x200
[<ffffffff8044357f>] thread_return+0x3a/0x62b
[<ffffffff8027a620>] do_writepages+0x20/0x40
[<ffffffff802ab10f>] do_ioctl+0x2f/0xa0
[<ffffffff802ab3a0>] vfs_ioctl+0x220/0x2d0
[<ffffffff802ab4e1>] sys_ioctl+0x91/0xb0
[<ffffffff8020bcae>] system_call+0x7e/0x83
Code: 66 89 02 e9 ee fc ff ff 48 8b 95 88 00 00 00 48 8b 45 78 88
RIP [<ffffffff88373b4a>] :kvm:x86_emulate_insn+0x3fa/0x4240
RSP <ffff81007d52fc18>
CR2: 0000000000000000
---[ end trace d485159bd8f95a33 ]---
Michal
-------------------------------------------------------------------------
This SF.net email is sponsored by the 2008 JavaOne(SM) Conference
Don't miss this year's exciting event. There's still time to save $100.
Use priority code J8TL2D2.
http://ad.doubleclick.net/clk;198757673;13503038;p?http://java.sun.com/javaone
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Kernel Oops with kvm 66 running WinXP
2008-05-04 23:02 ` Michal Ludvig
@ 2008-05-05 6:46 ` Izik Eidus
2008-05-05 6:59 ` Avi Kivity
2008-05-05 7:11 ` Avi Kivity
1 sibling, 1 reply; 14+ messages in thread
From: Izik Eidus @ 2008-05-05 6:46 UTC (permalink / raw)
To: Michal Ludvig; +Cc: kvm-devel, Avi Kivity
Michal Ludvig wrote:
> Avi Kivity wrote:
>> Avi Kivity wrote:
>>> Michal Ludvig wrote:
>>>> Hi,
>>>>
>>>> I've experienced a kernel Oops on 2.6.24 with kvm 66 on AMD in 64bit
>>>> mode while starting up WinXP:
>>>>
>>>> The host is still alive but the XP guest is locked up in a boot screen.
>
> Hi again, just wanted to let you know that I still get this Oops with
> kvm-68. It comes a bit later, not during the boot but after the XP
> desktop comes up. As there were some changes in kernel/x86_emulate.c the
> patch you provided for kvm-66 can't be applied anymore.
>
> loaded kvm module (kvm-68)
> kvm: emulating exchange as write
> Unable to handle kernel NULL pointer dereference at 0000000000000000 RIP:
> [<ffffffff88373b4a>] :kvm:x86_emulate_insn+0x3fa/0x4240
> PGD 3145e067 PUD 409b9067 PMD 0
> Oops: 0002 [1] SMP
> CPU 0
> Modules linked in: kvm_amd kvm reiserfs tun bridge llc nfsd lockd
> nfs_acl auth_rpcgss sunrpc exportfs iptable_filter ip_tables autofs4
> snd_pcm_oss snd_mixer_oss w83627ehf snd_seq snd_seq_device hwmon_vid
> ip6table_filter ip6_tables x_tables af_packet ipv6 fuse ext2 loop
> snd_hda_intel snd_pcm snd_timer snd soundcore snd_page_alloc sr_mod
> k8temp hwmon i2c_nforce2 button i2c_core cdrom forcedeth sg floppy
> linear ehci_hcd ohci_hcd sd_mod usbcore dm_snapshot edd dm_mod fan
> sata_nv pata_amd libata scsi_mod thermal processor
> Pid: 14776, comm: qemu-system-x86 Not tainted 2.6.24-mludvig #1
> RIP: 0010:[<ffffffff88373b4a>] [<ffffffff88373b4a>]
> :kvm:x86_emulate_insn+0x3fa/0x4240
> RSP: 0018:ffff81007d52fc18 EFLAGS: 00010246
> RAX: 000000008001003b RBX: 0000000000000000 RCX: 0000000000000000
> RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff810079c5c000
> RBP: ffff810079c5d320 R08: ffff810079c5d3c0 R09: 0000000000000006
> R10: 0000000000000002 R11: 0000000000000000 R12: ffff810079c5d368
> R13: ffff810079c5d3c0 R14: ffffffff8838ab20 R15: 00000000019d1353
> FS: 0000000040800950(0063) GS:ffffffff8053e000(0000) knlGS:0000000000000000
> CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
> CR2: 0000000000000000 CR3: 000000007985a000 CR4: 00000000000006e0
> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
> Process qemu-system-x86 (pid: 14776, threadinfo ffff81007d52e000, task
> ffff81003f4e6780)
> Stack: 000000007d52fc74 0000000011fda618 000000000f399068 ffff810079c5d3c0
> ffff81007d52fc94 ffffffff88368ae0 0000000000000000 ffff810079c5c000
> ffff810079c5d320 0000000000000000 0000000000000000 0000000000000000
> Call Trace:
> [<ffffffff88368ae0>] :kvm:seg_desct_to_kvm_desct+0x40/0xb0
ok, if we are here it mean windows did task switch,
and if windows did task switch it mean something was probably wrong before.
> [<ffffffff88369dff>] :kvm:emulate_instruction+0x1bf/0x340
> [<ffffffff883d99e2>] :kvm_amd:emulate_on_interception+0x12/0x60
> [<ffffffff8836d2b9>] :kvm:kvm_arch_vcpu_ioctl_run+0x169/0x6d0
> [<ffffffff883681fc>] :kvm:kvm_vcpu_ioctl+0x41c/0x440
> [<ffffffff802305f3>] __wake_up+0x43/0x70
> [<ffffffff803374c1>] __up_read+0x21/0xb0
> [<ffffffff802586ec>] futex_wake+0xcc/0xf0
> [<ffffffff80259559>] do_futex+0x129/0xbb0
> [<ffffffff8022e7bd>] __dequeue_entity+0x3d/0x50
> [<ffffffff883679c5>] :kvm:kvm_vm_ioctl+0x85/0x200
> [<ffffffff8044357f>] thread_return+0x3a/0x62b
> [<ffffffff8027a620>] do_writepages+0x20/0x40
> [<ffffffff802ab10f>] do_ioctl+0x2f/0xa0
> [<ffffffff802ab3a0>] vfs_ioctl+0x220/0x2d0
> [<ffffffff802ab4e1>] sys_ioctl+0x91/0xb0
> [<ffffffff8020bcae>] system_call+0x7e/0x83
>
>
> Code: 66 89 02 e9 ee fc ff ff 48 8b 95 88 00 00 00 48 8b 45 78 88
> RIP [<ffffffff88373b4a>] :kvm:x86_emulate_insn+0x3fa/0x4240
> RSP <ffff81007d52fc18>
> CR2: 0000000000000000
> ---[ end trace d485159bd8f95a33 ]---
>
> Michal
>
> -------------------------------------------------------------------------
> This SF.net email is sponsored by the 2008 JavaOne(SM) Conference
> Don't miss this year's exciting event. There's still time to save $100.
> Use priority code J8TL2D2.
> http://ad.doubleclick.net/clk;198757673;13503038;p?http://java.sun.com/javaone
> _______________________________________________
> kvm-devel mailing list
> kvm-devel@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/kvm-devel
--
woof.
-------------------------------------------------------------------------
This SF.net email is sponsored by the 2008 JavaOne(SM) Conference
Don't miss this year's exciting event. There's still time to save $100.
Use priority code J8TL2D2.
http://ad.doubleclick.net/clk;198757673;13503038;p?http://java.sun.com/javaone
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Kernel Oops with kvm 66 running WinXP
2008-05-05 6:46 ` Izik Eidus
@ 2008-05-05 6:59 ` Avi Kivity
2008-05-05 7:01 ` Izik Eidus
2008-05-05 7:02 ` Avi Kivity
0 siblings, 2 replies; 14+ messages in thread
From: Avi Kivity @ 2008-05-05 6:59 UTC (permalink / raw)
To: Izik Eidus; +Cc: kvm-devel, Michal Ludvig
Izik Eidus wrote:
> Michal Ludvig wrote:
>
>> Avi Kivity wrote:
>>
>>> Avi Kivity wrote:
>>>
>>>> Michal Ludvig wrote:
>>>>
>>>>> Hi,
>>>>>
>>>>> I've experienced a kernel Oops on 2.6.24 with kvm 66 on AMD in 64bit
>>>>> mode while starting up WinXP:
>>>>>
>>>>> The host is still alive but the XP guest is locked up in a boot screen.
>>>>>
>> Hi again, just wanted to let you know that I still get this Oops with
>> kvm-68. It comes a bit later, not during the boot but after the XP
>> desktop comes up. As there were some changes in kernel/x86_emulate.c the
>> patch you provided for kvm-66 can't be applied anymore.
>>
>> loaded kvm module (kvm-68)
>> kvm: emulating exchange as write
>> Unable to handle kernel NULL pointer dereference at 0000000000000000 RIP:
>> [<ffffffff88373b4a>] :kvm:x86_emulate_insn+0x3fa/0x4240
>> PGD 3145e067 PUD 409b9067 PMD 0
>> Oops: 0002 [1] SMP
>> CPU 0
>> Modules linked in: kvm_amd kvm reiserfs tun bridge llc nfsd lockd
>> nfs_acl auth_rpcgss sunrpc exportfs iptable_filter ip_tables autofs4
>> snd_pcm_oss snd_mixer_oss w83627ehf snd_seq snd_seq_device hwmon_vid
>> ip6table_filter ip6_tables x_tables af_packet ipv6 fuse ext2 loop
>> snd_hda_intel snd_pcm snd_timer snd soundcore snd_page_alloc sr_mod
>> k8temp hwmon i2c_nforce2 button i2c_core cdrom forcedeth sg floppy
>> linear ehci_hcd ohci_hcd sd_mod usbcore dm_snapshot edd dm_mod fan
>> sata_nv pata_amd libata scsi_mod thermal processor
>> Pid: 14776, comm: qemu-system-x86 Not tainted 2.6.24-mludvig #1
>> RIP: 0010:[<ffffffff88373b4a>] [<ffffffff88373b4a>]
>> :kvm:x86_emulate_insn+0x3fa/0x4240
>> RSP: 0018:ffff81007d52fc18 EFLAGS: 00010246
>> RAX: 000000008001003b RBX: 0000000000000000 RCX: 0000000000000000
>> RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff810079c5c000
>> RBP: ffff810079c5d320 R08: ffff810079c5d3c0 R09: 0000000000000006
>> R10: 0000000000000002 R11: 0000000000000000 R12: ffff810079c5d368
>> R13: ffff810079c5d3c0 R14: ffffffff8838ab20 R15: 00000000019d1353
>> FS: 0000000040800950(0063) GS:ffffffff8053e000(0000) knlGS:0000000000000000
>> CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
>> CR2: 0000000000000000 CR3: 000000007985a000 CR4: 00000000000006e0
>> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
>> DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
>> Process qemu-system-x86 (pid: 14776, threadinfo ffff81007d52e000, task
>> ffff81003f4e6780)
>> Stack: 000000007d52fc74 0000000011fda618 000000000f399068 ffff810079c5d3c0
>> ffff81007d52fc94 ffffffff88368ae0 0000000000000000 ffff810079c5c000
>> ffff810079c5d320 0000000000000000 0000000000000000 0000000000000000
>> Call Trace:
>> [<ffffffff88368ae0>] :kvm:seg_desct_to_kvm_desct+0x40/0xb0
>>
>
> ok, if we are here it mean windows did task switch,
> and if windows did task switch it mean something was probably wrong before.
>
>
We need to fix the oops regardless.
--
error compiling committee.c: too many arguments to function
-------------------------------------------------------------------------
This SF.net email is sponsored by the 2008 JavaOne(SM) Conference
Don't miss this year's exciting event. There's still time to save $100.
Use priority code J8TL2D2.
http://ad.doubleclick.net/clk;198757673;13503038;p?http://java.sun.com/javaone
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Kernel Oops with kvm 66 running WinXP
2008-05-05 6:59 ` Avi Kivity
@ 2008-05-05 7:01 ` Izik Eidus
2008-05-05 7:02 ` Avi Kivity
1 sibling, 0 replies; 14+ messages in thread
From: Izik Eidus @ 2008-05-05 7:01 UTC (permalink / raw)
To: Avi Kivity; +Cc: kvm-devel, Michal Ludvig
Avi Kivity wrote:
> Izik Eidus wrote:
>> Michal Ludvig wrote:
>>
>>> Avi Kivity wrote:
>>>
>>>> Avi Kivity wrote:
>>>>
>>>>> Michal Ludvig wrote:
>>>>>
>>>>>> Hi,
>>>>>>
>>>>>> I've experienced a kernel Oops on 2.6.24 with kvm 66 on AMD in
>>>>>> 64bit mode while starting up WinXP:
>>>>>>
>>>>>> The host is still alive but the XP guest is locked up in a boot
>>>>>> screen.
>>>>>>
>>> Hi again, just wanted to let you know that I still get this Oops with
>>> kvm-68. It comes a bit later, not during the boot but after the XP
>>> desktop comes up. As there were some changes in kernel/x86_emulate.c
>>> the patch you provided for kvm-66 can't be applied anymore.
>>>
>>> loaded kvm module (kvm-68)
>>> kvm: emulating exchange as write
>>> Unable to handle kernel NULL pointer dereference at 0000000000000000
>>> RIP:
>>> [<ffffffff88373b4a>] :kvm:x86_emulate_insn+0x3fa/0x4240
>>> PGD 3145e067 PUD 409b9067 PMD 0
>>> Oops: 0002 [1] SMP
>>> CPU 0
>>> Modules linked in: kvm_amd kvm reiserfs tun bridge llc nfsd lockd
>>> nfs_acl auth_rpcgss sunrpc exportfs iptable_filter ip_tables autofs4
>>> snd_pcm_oss snd_mixer_oss w83627ehf snd_seq snd_seq_device hwmon_vid
>>> ip6table_filter ip6_tables x_tables af_packet ipv6 fuse ext2 loop
>>> snd_hda_intel snd_pcm snd_timer snd soundcore snd_page_alloc sr_mod
>>> k8temp hwmon i2c_nforce2 button i2c_core cdrom forcedeth sg floppy
>>> linear ehci_hcd ohci_hcd sd_mod usbcore dm_snapshot edd dm_mod fan
>>> sata_nv pata_amd libata scsi_mod thermal processor
>>> Pid: 14776, comm: qemu-system-x86 Not tainted 2.6.24-mludvig #1
>>> RIP: 0010:[<ffffffff88373b4a>] [<ffffffff88373b4a>]
>>> :kvm:x86_emulate_insn+0x3fa/0x4240
>>> RSP: 0018:ffff81007d52fc18 EFLAGS: 00010246
>>> RAX: 000000008001003b RBX: 0000000000000000 RCX: 0000000000000000
>>> RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff810079c5c000
>>> RBP: ffff810079c5d320 R08: ffff810079c5d3c0 R09: 0000000000000006
>>> R10: 0000000000000002 R11: 0000000000000000 R12: ffff810079c5d368
>>> R13: ffff810079c5d3c0 R14: ffffffff8838ab20 R15: 00000000019d1353
>>> FS: 0000000040800950(0063) GS:ffffffff8053e000(0000)
>>> knlGS:0000000000000000
>>> CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
>>> CR2: 0000000000000000 CR3: 000000007985a000 CR4: 00000000000006e0
>>> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
>>> DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
>>> Process qemu-system-x86 (pid: 14776, threadinfo ffff81007d52e000,
>>> task ffff81003f4e6780)
>>> Stack: 000000007d52fc74 0000000011fda618 000000000f399068
>>> ffff810079c5d3c0
>>> ffff81007d52fc94 ffffffff88368ae0 0000000000000000 ffff810079c5c000
>>> ffff810079c5d320 0000000000000000 0000000000000000 0000000000000000
>>> Call Trace:
>>> [<ffffffff88368ae0>] :kvm:seg_desct_to_kvm_desct+0x40/0xb0
>>>
>>
>> ok, if we are here it mean windows did task switch,
>> and if windows did task switch it mean something was probably wrong
>> before.
>>
>>
>
> We need to fix the oops regardless.
>
>
i know..., it was just an hint...
--
woof.
-------------------------------------------------------------------------
This SF.net email is sponsored by the 2008 JavaOne(SM) Conference
Don't miss this year's exciting event. There's still time to save $100.
Use priority code J8TL2D2.
http://ad.doubleclick.net/clk;198757673;13503038;p?http://java.sun.com/javaone
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Kernel Oops with kvm 66 running WinXP
2008-05-05 6:59 ` Avi Kivity
2008-05-05 7:01 ` Izik Eidus
@ 2008-05-05 7:02 ` Avi Kivity
2008-05-05 7:04 ` Izik Eidus
1 sibling, 1 reply; 14+ messages in thread
From: Avi Kivity @ 2008-05-05 7:02 UTC (permalink / raw)
To: Izik Eidus; +Cc: kvm-devel, Michal Ludvig
Avi Kivity wrote:
> Izik Eidus wrote:
>> Michal Ludvig wrote:
>>
>>> Avi Kivity wrote:
>>>
>>>> Avi Kivity wrote:
>>>>
>>>>> Michal Ludvig wrote:
>>>>>
>>>>>> Hi,
>>>>>>
>>>>>> I've experienced a kernel Oops on 2.6.24 with kvm 66 on AMD in
>>>>>> 64bit mode while starting up WinXP:
>>>>>>
>>>>>> The host is still alive but the XP guest is locked up in a boot
>>>>>> screen.
>>>>>>
>>> Hi again, just wanted to let you know that I still get this Oops
>>> with kvm-68. It comes a bit later, not during the boot but after the
>>> XP desktop comes up. As there were some changes in
>>> kernel/x86_emulate.c the patch you provided for kvm-66 can't be
>>> applied anymore.
>>>
>>> loaded kvm module (kvm-68)
>>> kvm: emulating exchange as write
>>> Unable to handle kernel NULL pointer dereference at 0000000000000000
>>> RIP:
>>> [<ffffffff88373b4a>] :kvm:x86_emulate_insn+0x3fa/0x4240
>>> PGD 3145e067 PUD 409b9067 PMD 0
>>> Oops: 0002 [1] SMP
>>> CPU 0
>>> Modules linked in: kvm_amd kvm reiserfs tun bridge llc nfsd lockd
>>> nfs_acl auth_rpcgss sunrpc exportfs iptable_filter ip_tables autofs4
>>> snd_pcm_oss snd_mixer_oss w83627ehf snd_seq snd_seq_device hwmon_vid
>>> ip6table_filter ip6_tables x_tables af_packet ipv6 fuse ext2 loop
>>> snd_hda_intel snd_pcm snd_timer snd soundcore snd_page_alloc sr_mod
>>> k8temp hwmon i2c_nforce2 button i2c_core cdrom forcedeth sg floppy
>>> linear ehci_hcd ohci_hcd sd_mod usbcore dm_snapshot edd dm_mod fan
>>> sata_nv pata_amd libata scsi_mod thermal processor
>>> Pid: 14776, comm: qemu-system-x86 Not tainted 2.6.24-mludvig #1
>>> RIP: 0010:[<ffffffff88373b4a>] [<ffffffff88373b4a>]
>>> :kvm:x86_emulate_insn+0x3fa/0x4240
>>> RSP: 0018:ffff81007d52fc18 EFLAGS: 00010246
>>> RAX: 000000008001003b RBX: 0000000000000000 RCX: 0000000000000000
>>> RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff810079c5c000
>>> RBP: ffff810079c5d320 R08: ffff810079c5d3c0 R09: 0000000000000006
>>> R10: 0000000000000002 R11: 0000000000000000 R12: ffff810079c5d368
>>> R13: ffff810079c5d3c0 R14: ffffffff8838ab20 R15: 00000000019d1353
>>> FS: 0000000040800950(0063) GS:ffffffff8053e000(0000)
>>> knlGS:0000000000000000
>>> CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
>>> CR2: 0000000000000000 CR3: 000000007985a000 CR4: 00000000000006e0
>>> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
>>> DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
>>> Process qemu-system-x86 (pid: 14776, threadinfo ffff81007d52e000,
>>> task ffff81003f4e6780)
>>> Stack: 000000007d52fc74 0000000011fda618 000000000f399068
>>> ffff810079c5d3c0
>>> ffff81007d52fc94 ffffffff88368ae0 0000000000000000 ffff810079c5c000
>>> ffff810079c5d320 0000000000000000 0000000000000000 0000000000000000
>>> Call Trace:
>>> [<ffffffff88368ae0>] :kvm:seg_desct_to_kvm_desct+0x40/0xb0
>>>
>>
>> ok, if we are here it mean windows did task switch,
>> and if windows did task switch it mean something was probably wrong
>> before.
>>
>>
>
> We need to fix the oops regardless.
>
>
Oh, I think that's just garbage on the stack. Actual oops is in
x86_emulate_insn.
--
error compiling committee.c: too many arguments to function
-------------------------------------------------------------------------
This SF.net email is sponsored by the 2008 JavaOne(SM) Conference
Don't miss this year's exciting event. There's still time to save $100.
Use priority code J8TL2D2.
http://ad.doubleclick.net/clk;198757673;13503038;p?http://java.sun.com/javaone
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Kernel Oops with kvm 66 running WinXP
2008-05-05 7:02 ` Avi Kivity
@ 2008-05-05 7:04 ` Izik Eidus
0 siblings, 0 replies; 14+ messages in thread
From: Izik Eidus @ 2008-05-05 7:04 UTC (permalink / raw)
To: Avi Kivity; +Cc: kvm-devel, Michal Ludvig
Avi Kivity wrote:
> Avi Kivity wrote:
>> Izik Eidus wrote:
>>> Michal Ludvig wrote:
>>>
>>>> Avi Kivity wrote:
>>>>
>>>>> Avi Kivity wrote:
>>>>>
>>>>>> Michal Ludvig wrote:
>>>>>>
>>>>>>> Hi,
>>>>>>>
>>>>>>> I've experienced a kernel Oops on 2.6.24 with kvm 66 on AMD in
>>>>>>> 64bit mode while starting up WinXP:
>>>>>>>
>>>>>>> The host is still alive but the XP guest is locked up in a boot
>>>>>>> screen.
>>>>>>>
>>>> Hi again, just wanted to let you know that I still get this Oops
>>>> with kvm-68. It comes a bit later, not during the boot but after the
>>>> XP desktop comes up. As there were some changes in
>>>> kernel/x86_emulate.c the patch you provided for kvm-66 can't be
>>>> applied anymore.
>>>>
>>>> loaded kvm module (kvm-68)
>>>> kvm: emulating exchange as write
>>>> Unable to handle kernel NULL pointer dereference at 0000000000000000
>>>> RIP:
>>>> [<ffffffff88373b4a>] :kvm:x86_emulate_insn+0x3fa/0x4240
>>>> PGD 3145e067 PUD 409b9067 PMD 0
>>>> Oops: 0002 [1] SMP
>>>> CPU 0
>>>> Modules linked in: kvm_amd kvm reiserfs tun bridge llc nfsd lockd
>>>> nfs_acl auth_rpcgss sunrpc exportfs iptable_filter ip_tables autofs4
>>>> snd_pcm_oss snd_mixer_oss w83627ehf snd_seq snd_seq_device hwmon_vid
>>>> ip6table_filter ip6_tables x_tables af_packet ipv6 fuse ext2 loop
>>>> snd_hda_intel snd_pcm snd_timer snd soundcore snd_page_alloc sr_mod
>>>> k8temp hwmon i2c_nforce2 button i2c_core cdrom forcedeth sg floppy
>>>> linear ehci_hcd ohci_hcd sd_mod usbcore dm_snapshot edd dm_mod fan
>>>> sata_nv pata_amd libata scsi_mod thermal processor
>>>> Pid: 14776, comm: qemu-system-x86 Not tainted 2.6.24-mludvig #1
>>>> RIP: 0010:[<ffffffff88373b4a>] [<ffffffff88373b4a>]
>>>> :kvm:x86_emulate_insn+0x3fa/0x4240
>>>> RSP: 0018:ffff81007d52fc18 EFLAGS: 00010246
>>>> RAX: 000000008001003b RBX: 0000000000000000 RCX: 0000000000000000
>>>> RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff810079c5c000
>>>> RBP: ffff810079c5d320 R08: ffff810079c5d3c0 R09: 0000000000000006
>>>> R10: 0000000000000002 R11: 0000000000000000 R12: ffff810079c5d368
>>>> R13: ffff810079c5d3c0 R14: ffffffff8838ab20 R15: 00000000019d1353
>>>> FS: 0000000040800950(0063) GS:ffffffff8053e000(0000)
>>>> knlGS:0000000000000000
>>>> CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
>>>> CR2: 0000000000000000 CR3: 000000007985a000 CR4: 00000000000006e0
>>>> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
>>>> DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
>>>> Process qemu-system-x86 (pid: 14776, threadinfo ffff81007d52e000,
>>>> task ffff81003f4e6780)
>>>> Stack: 000000007d52fc74 0000000011fda618 000000000f399068
>>>> ffff810079c5d3c0
>>>> ffff81007d52fc94 ffffffff88368ae0 0000000000000000 ffff810079c5c000
>>>> ffff810079c5d320 0000000000000000 0000000000000000 0000000000000000
>>>> Call Trace:
>>>> [<ffffffff88368ae0>] :kvm:seg_desct_to_kvm_desct+0x40/0xb0
>>>>
>>>
>>> ok, if we are here it mean windows did task switch,
>>> and if windows did task switch it mean something was probably wrong
>>> before.
>>>
>>>
>>
>> We need to fix the oops regardless.
>>
>>
>
> Oh, I think that's just garbage on the stack. Actual oops is in
> x86_emulate_insn.
>
i saw that the opss was in x86_emulate_insn, you think that seg_desct_to_kvm_desct never got called?
(i would expect to see more traces before this function such as task_switch()...
--
woof.
-------------------------------------------------------------------------
This SF.net email is sponsored by the 2008 JavaOne(SM) Conference
Don't miss this year's exciting event. There's still time to save $100.
Use priority code J8TL2D2.
http://ad.doubleclick.net/clk;198757673;13503038;p?http://java.sun.com/javaone
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Kernel Oops with kvm 66 running WinXP
2008-05-04 23:02 ` Michal Ludvig
2008-05-05 6:46 ` Izik Eidus
@ 2008-05-05 7:11 ` Avi Kivity
2008-05-05 11:11 ` Michal Ludvig
1 sibling, 1 reply; 14+ messages in thread
From: Avi Kivity @ 2008-05-05 7:11 UTC (permalink / raw)
To: Michal Ludvig; +Cc: kvm-devel
[-- Attachment #1: Type: text/plain, Size: 637 bytes --]
Michal Ludvig wrote:
>
> Hi again, just wanted to let you know that I still get this Oops with
> kvm-68. It comes a bit later, not during the boot but after the XP
> desktop comes up. As there were some changes in kernel/x86_emulate.c
> the patch you provided for kvm-66 can't be applied anymore.
>
> loaded kvm module (kvm-68)
> kvm: emulating exchange as write
> Unable to handle kernel NULL pointer dereference at 0000000000000000 RIP:
> [<ffffffff88373b4a>] :kvm:x86_emulate_insn+0x3fa/0x4240
Please apply the attached patch, and post 'dmesg | grep writeback'.
--
error compiling committee.c: too many arguments to function
[-- Attachment #2: debug-writeback-oops.patch --]
[-- Type: text/x-patch, Size: 463 bytes --]
diff --git a/kernel/x86_emulate.c b/kernel/x86_emulate.c
index f2a696d..7f5a99f 100644
--- a/kernel/x86_emulate.c
+++ b/kernel/x86_emulate.c
@@ -1202,6 +1202,13 @@ static inline int writeback(struct x86_emulate_ctxt *ctxt,
switch (c->dst.type) {
case OP_REG:
+
+ if (!c->dst.ptr) {
+ printk("writeback: b %02x mordm %02x\n",
+ c->b, c->modrm);
+ return 0;
+ }
+
/* The 4-byte case *is* correct:
* in 64-bit mode we zero-extend.
*/
[-- Attachment #3: Type: text/plain, Size: 320 bytes --]
-------------------------------------------------------------------------
This SF.net email is sponsored by the 2008 JavaOne(SM) Conference
Don't miss this year's exciting event. There's still time to save $100.
Use priority code J8TL2D2.
http://ad.doubleclick.net/clk;198757673;13503038;p?http://java.sun.com/javaone
[-- Attachment #4: Type: text/plain, Size: 158 bytes --]
_______________________________________________
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel
^ permalink raw reply related [flat|nested] 14+ messages in thread
* Re: Kernel Oops with kvm 66 running WinXP
2008-05-05 7:11 ` Avi Kivity
@ 2008-05-05 11:11 ` Michal Ludvig
2008-05-05 12:00 ` Avi Kivity
0 siblings, 1 reply; 14+ messages in thread
From: Michal Ludvig @ 2008-05-05 11:11 UTC (permalink / raw)
To: Avi Kivity; +Cc: kvm-devel
Avi Kivity wrote:
> Michal Ludvig wrote:
>>
>> Hi again, just wanted to let you know that I still get this Oops with
>> kvm-68. It comes a bit later, not during the boot but after the XP
>> desktop comes up. As there were some changes in kernel/x86_emulate.c
>> the patch you provided for kvm-66 can't be applied anymore.
>>
>> loaded kvm module (kvm-68)
>> kvm: emulating exchange as write
>> Unable to handle kernel NULL pointer dereference at 0000000000000000 RIP:
>> [<ffffffff88373b4a>] :kvm:x86_emulate_insn+0x3fa/0x4240
>
> Please apply the attached patch, and post 'dmesg | grep writeback'.
writeback: b 01 mordm e0
M.
-------------------------------------------------------------------------
This SF.net email is sponsored by the 2008 JavaOne(SM) Conference
Don't miss this year's exciting event. There's still time to save $100.
Use priority code J8TL2D2.
http://ad.doubleclick.net/clk;198757673;13503038;p?http://java.sun.com/javaone
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Kernel Oops with kvm 66 running WinXP
2008-05-05 11:11 ` Michal Ludvig
@ 2008-05-05 12:00 ` Avi Kivity
2008-05-05 12:15 ` Michal Ludvig
0 siblings, 1 reply; 14+ messages in thread
From: Avi Kivity @ 2008-05-05 12:00 UTC (permalink / raw)
To: Michal Ludvig; +Cc: kvm-devel
[-- Attachment #1: Type: text/plain, Size: 500 bytes --]
Michal Ludvig wrote:
>>>
>>> loaded kvm module (kvm-68)
>>> kvm: emulating exchange as write
>>> Unable to handle kernel NULL pointer dereference at 0000000000000000
>>> RIP:
>>> [<ffffffff88373b4a>] :kvm:x86_emulate_insn+0x3fa/0x4240
>>
>> Please apply the attached patch, and post 'dmesg | grep writeback'.
>
> writeback: b 01 mordm e0
>
Ah, it only affects pre-npt, so my testing was worthless. The attached
patch should fix.
--
error compiling committee.c: too many arguments to function
[-- Attachment #2: smsw-fix.patch --]
[-- Type: text/x-patch, Size: 1347 bytes --]
diff --git a/kernel/x86_emulate.c b/kernel/x86_emulate.c
index f2a696d..8a96320 100644
--- a/kernel/x86_emulate.c
+++ b/kernel/x86_emulate.c
@@ -677,8 +677,9 @@ static int decode_modrm(struct x86_emulate_ctxt *ctxt,
c->use_modrm_ea = 1;
if (c->modrm_mod == 3) {
- c->modrm_val = *(unsigned long *)
- decode_register(c->modrm_rm, c->regs, c->d & ByteOp);
+ c->modrm_ptr = decode_register(c->modrm_rm,
+ c->regs, c->d & ByteOp);
+ c->modrm_val = *(unsigned long *)c->modrm_ptr;
return rc;
}
@@ -1005,6 +1006,7 @@ done_prefixes:
if ((c->d & ModRM) && c->modrm_mod == 3) {
c->src.type = OP_REG;
c->src.val = c->modrm_val;
+ c->src.ptr = c->modrm_ptr;
break;
}
c->src.type = OP_MEM;
@@ -1049,6 +1051,7 @@ done_prefixes:
if ((c->d & ModRM) && c->modrm_mod == 3) {
c->dst.type = OP_REG;
c->dst.val = c->dst.orig_val = c->modrm_val;
+ c->dst.ptr = c->modrm_ptr;
break;
}
c->dst.type = OP_MEM;
diff --git a/include/asm-x86/kvm_x86_emulate.h b/include/asm-x86/kvm_x86_emulate.h
index d6337f9..b877bbd 100644
--- a/kernel/include/asm-x86/kvm_x86_emulate.h
+++ b/kernel/include/asm-x86/kvm_x86_emulate.h
@@ -135,6 +135,7 @@ struct decode_cache {
u8 modrm_rm;
u8 use_modrm_ea;
unsigned long modrm_ea;
+ void *modrm_ptr;
unsigned long modrm_val;
struct fetch_cache fetch;
};
[-- Attachment #3: Type: text/plain, Size: 320 bytes --]
-------------------------------------------------------------------------
This SF.net email is sponsored by the 2008 JavaOne(SM) Conference
Don't miss this year's exciting event. There's still time to save $100.
Use priority code J8TL2D2.
http://ad.doubleclick.net/clk;198757673;13503038;p?http://java.sun.com/javaone
[-- Attachment #4: Type: text/plain, Size: 158 bytes --]
_______________________________________________
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel
^ permalink raw reply related [flat|nested] 14+ messages in thread
* Re: Kernel Oops with kvm 66 running WinXP
2008-05-05 12:00 ` Avi Kivity
@ 2008-05-05 12:15 ` Michal Ludvig
0 siblings, 0 replies; 14+ messages in thread
From: Michal Ludvig @ 2008-05-05 12:15 UTC (permalink / raw)
To: Avi Kivity; +Cc: kvm-devel
Avi Kivity wrote:
> Michal Ludvig wrote:
>>>>
>>>> loaded kvm module (kvm-68)
>>>> kvm: emulating exchange as write
>>>> Unable to handle kernel NULL pointer dereference at 0000000000000000
>>>> RIP:
>>>> [<ffffffff88373b4a>] :kvm:x86_emulate_insn+0x3fa/0x4240
>>>
>>> Please apply the attached patch, and post 'dmesg | grep writeback'.
>>
>> writeback: b 01 mordm e0
>>
>
> Ah, it only affects pre-npt, so my testing was worthless. The attached
> patch should fix.
Ack. It runs fine now. Thanks. M.
-------------------------------------------------------------------------
This SF.net email is sponsored by the 2008 JavaOne(SM) Conference
Don't miss this year's exciting event. There's still time to save $100.
Use priority code J8TL2D2.
http://ad.doubleclick.net/clk;198757673;13503038;p?http://java.sun.com/javaone
^ permalink raw reply [flat|nested] 14+ messages in thread
end of thread, other threads:[~2008-05-05 12:15 UTC | newest]
Thread overview: 14+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2008-04-26 12:12 Kernel Oops with kvm 66 running WinXP Michal Ludvig
2008-04-27 12:53 ` Avi Kivity
2008-04-27 13:45 ` Avi Kivity
2008-04-28 1:43 ` Michal Ludvig
2008-05-04 23:02 ` Michal Ludvig
2008-05-05 6:46 ` Izik Eidus
2008-05-05 6:59 ` Avi Kivity
2008-05-05 7:01 ` Izik Eidus
2008-05-05 7:02 ` Avi Kivity
2008-05-05 7:04 ` Izik Eidus
2008-05-05 7:11 ` Avi Kivity
2008-05-05 11:11 ` Michal Ludvig
2008-05-05 12:00 ` Avi Kivity
2008-05-05 12:15 ` Michal Ludvig
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox