From mboxrd@z Thu Jan 1 00:00:00 1970 From: Avi Kivity Subject: Re: Kernel GPF in vmx_save_host_state() Date: Wed, 18 Mar 2009 10:55:30 +0200 Message-ID: <49C0B702.1060807@redhat.com> References: <49C0313C.5010906@cs.cmu.edu> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: kvm@vger.kernel.org To: Benjamin Gilbert Return-path: Received: from mx1.redhat.com ([66.187.233.31]:32907 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752947AbZCRIzj (ORCPT ); Wed, 18 Mar 2009 04:55:39 -0400 In-Reply-To: <49C0313C.5010906@cs.cmu.edu> Sender: kvm-owner@vger.kernel.org List-ID: Benjamin Gilbert wrote: > I accidentally tried to run a 64-bit guest on a 32-bit host. Even > though this isn't supported, it shouldn't crash my kernel. :-) > > CPU: Intel Core 2 Quad > KVM: kernel kvm-84-640-g967f619, userspace kvm-84-304-g2ced1d8. Also > occurs with vanilla kvm-84. > Host kernel: Vanilla 2.6.28 > Host arch: i386 > Guest: Debian Etch x86_64, distributor 2.6.18 kernel > Commandline: qemu-system-x86_64 -hda debian-etch-x86_64 -m 512 > Occurs with: -no-kvm-irqchip, -no-kvm-pit > Does not occur with: -no-kvm > > As soon as the guest kernel starts, the host produces: > > general protection fault: 0000 [#1] PREEMPT SMP > last sysfs file: /sys/kernel/uevent_seqnum > Dumping ftrace buffer: > (ftrace buffer empty) > Modules linked in: kvm_intel kvm > > > Pid: 6570, comm: qemu-system-x86 Not tainted (2.6.28-686 #4) Precision > WorkStat > EIP: 0060:[] EFLAGS: 00010246 CPU: 2 > EIP is at vmx_save_host_state+0x193/0x1a6 [kvm_intel] > EAX: 00000100 EBX: 00000000 ECX: c0000080 EDX: 00000000 > From ECX, it looks like it's trying to access EFER and enable LM. Please provide your /proc/cpuinfo. > Code: ec 81 e1 01 08 00 00 31 db 89 f2 09 ca 89 55 e0 89 f8 09 d8 89 > 45 e4 be 8 And this line, in full. -- error compiling committee.c: too many arguments to function