public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
* guest patched with pax causes "set_cr0: 0xffff88000[...] #GP, reserved bits 0x8004003?" flood on host
@ 2010-03-10 16:17 Antoine Martin
  2010-03-11  6:44 ` Avi Kivity
  0 siblings, 1 reply; 5+ messages in thread
From: Antoine Martin @ 2010-03-10 16:17 UTC (permalink / raw)
  To: kvm, Avi Kivity, pageexec

Hi,

I've updated my host kernel headers to 2.6.33, rebuilt glibc (and the 
base system), rebuilt kvm.
... and now I get hundreds of those in dmesg on the host when I start a 
guest kernel that worked fine before. (2.6.33 + pax patch v5)
  set_cr0: 0xffff88000ec29d58 #GP, reserved bits 0x80040033
  set_cr0: 0xffff88000f3cdb38 #GP, reserved bits 0x8004003b
  set_cr0: 0xffff88000f3dbc88 #GP, reserved bits 0x80040033
  set_cr0: 0xffff88000f83b958 #GP, reserved bits 0x8004003b
(hundreds of all 4)
And the VM just reboots shortly after starting init.
Funnily enough, I've got some VMs still running that kernel just fine! 
(as I started them before the headers+glibc+qemu-kvm rebuild)

Now, you might just say that I shouldn't use out of tree patches like 
pax, but I just want to know one thing: should the guest kernel still be 
able to flood dmesg on the host like this?

Thanks
Antoine

PS: Avi, are you still interested in seeing if this rebuild fixes the 
pread/glibc bug?

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2010-03-11 12:11 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-03-10 16:17 guest patched with pax causes "set_cr0: 0xffff88000[...] #GP, reserved bits 0x8004003?" flood on host Antoine Martin
2010-03-11  6:44 ` Avi Kivity
2010-03-11  9:31   ` pageexec
2010-03-11 11:05     ` Antoine Martin
2010-03-11 11:10   ` pageexec

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox