* guest patched with pax causes "set_cr0: 0xffff88000[...] #GP, reserved bits 0x8004003?" flood on host
@ 2010-03-10 16:17 Antoine Martin
2010-03-11 6:44 ` Avi Kivity
0 siblings, 1 reply; 5+ messages in thread
From: Antoine Martin @ 2010-03-10 16:17 UTC (permalink / raw)
To: kvm, Avi Kivity, pageexec
Hi,
I've updated my host kernel headers to 2.6.33, rebuilt glibc (and the
base system), rebuilt kvm.
... and now I get hundreds of those in dmesg on the host when I start a
guest kernel that worked fine before. (2.6.33 + pax patch v5)
set_cr0: 0xffff88000ec29d58 #GP, reserved bits 0x80040033
set_cr0: 0xffff88000f3cdb38 #GP, reserved bits 0x8004003b
set_cr0: 0xffff88000f3dbc88 #GP, reserved bits 0x80040033
set_cr0: 0xffff88000f83b958 #GP, reserved bits 0x8004003b
(hundreds of all 4)
And the VM just reboots shortly after starting init.
Funnily enough, I've got some VMs still running that kernel just fine!
(as I started them before the headers+glibc+qemu-kvm rebuild)
Now, you might just say that I shouldn't use out of tree patches like
pax, but I just want to know one thing: should the guest kernel still be
able to flood dmesg on the host like this?
Thanks
Antoine
PS: Avi, are you still interested in seeing if this rebuild fixes the
pread/glibc bug?
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: guest patched with pax causes "set_cr0: 0xffff88000[...] #GP, reserved bits 0x8004003?" flood on host
2010-03-10 16:17 guest patched with pax causes "set_cr0: 0xffff88000[...] #GP, reserved bits 0x8004003?" flood on host Antoine Martin
@ 2010-03-11 6:44 ` Avi Kivity
2010-03-11 9:31 ` pageexec
2010-03-11 11:10 ` pageexec
0 siblings, 2 replies; 5+ messages in thread
From: Avi Kivity @ 2010-03-11 6:44 UTC (permalink / raw)
To: Antoine Martin; +Cc: kvm, pageexec
On 03/10/2010 06:17 PM, Antoine Martin wrote:
> Hi,
>
> I've updated my host kernel headers to 2.6.33, rebuilt glibc (and the
> base system), rebuilt kvm.
> ... and now I get hundreds of those in dmesg on the host when I start
> a guest kernel that worked fine before. (2.6.33 + pax patch v5)
> set_cr0: 0xffff88000ec29d58 #GP, reserved bits 0x80040033
> set_cr0: 0xffff88000f3cdb38 #GP, reserved bits 0x8004003b
> set_cr0: 0xffff88000f3dbc88 #GP, reserved bits 0x80040033
> set_cr0: 0xffff88000f83b958 #GP, reserved bits 0x8004003b
The guest is clearly confused. Can you bisect kvm to find out what
introduced this problem?
> (hundreds of all 4)
> And the VM just reboots shortly after starting init.
> Funnily enough, I've got some VMs still running that kernel just fine!
> (as I started them before the headers+glibc+qemu-kvm rebuild)
>
> Now, you might just say that I shouldn't use out of tree patches like
> pax,
You can run anything you like in a guest.
> but I just want to know one thing: should the guest kernel still be
> able to flood dmesg on the host like this?
No, these are debug messages.
>
> Thanks
> Antoine
>
> PS: Avi, are you still interested in seeing if this rebuild fixes the
> pread/glibc bug?
I think we figured it out, but a confirmation would be nice.
--
error compiling committee.c: too many arguments to function
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: guest patched with pax causes "set_cr0: 0xffff88000[...] #GP, reserved bits 0x8004003?" flood on host
2010-03-11 6:44 ` Avi Kivity
@ 2010-03-11 9:31 ` pageexec
2010-03-11 11:05 ` Antoine Martin
2010-03-11 11:10 ` pageexec
1 sibling, 1 reply; 5+ messages in thread
From: pageexec @ 2010-03-11 9:31 UTC (permalink / raw)
To: Antoine Martin, Avi Kivity; +Cc: kvm
On 11 Mar 2010 at 8:44, Avi Kivity wrote:
> On 03/10/2010 06:17 PM, Antoine Martin wrote:
> > Hi,
> >
> > I've updated my host kernel headers to 2.6.33, rebuilt glibc (and the
> > base system), rebuilt kvm.
> > ... and now I get hundreds of those in dmesg on the host when I start
> > a guest kernel that worked fine before. (2.6.33 + pax patch v5)
> > set_cr0: 0xffff88000ec29d58 #GP, reserved bits 0x80040033
> > set_cr0: 0xffff88000f3cdb38 #GP, reserved bits 0x8004003b
> > set_cr0: 0xffff88000f3dbc88 #GP, reserved bits 0x80040033
> > set_cr0: 0xffff88000f83b958 #GP, reserved bits 0x8004003b
>
> The guest is clearly confused. Can you bisect kvm to find out what
> introduced this problem?
the guest is calling pax_{open,close}_kernel that flip cr0.wp off/on,
respectively. Antoine, can you decode some of those rip values please
(or better, send me the corresponding vmlinux and all logs)?
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: guest patched with pax causes "set_cr0: 0xffff88000[...] #GP, reserved bits 0x8004003?" flood on host
2010-03-11 9:31 ` pageexec
@ 2010-03-11 11:05 ` Antoine Martin
0 siblings, 0 replies; 5+ messages in thread
From: Antoine Martin @ 2010-03-11 11:05 UTC (permalink / raw)
To: pageexec; +Cc: Avi Kivity, kvm
On 03/11/2010 04:31 PM, pageexec@freemail.hu wrote:
> On 11 Mar 2010 at 8:44, Avi Kivity wrote:
>
>
>> On 03/10/2010 06:17 PM, Antoine Martin wrote:
>>
>>> Hi,
>>>
>>> I've updated my host kernel headers to 2.6.33, rebuilt glibc (and the
>>> base system), rebuilt kvm.
>>> ... and now I get hundreds of those in dmesg on the host when I start
>>> a guest kernel that worked fine before. (2.6.33 + pax patch v5)
>>> set_cr0: 0xffff88000ec29d58 #GP, reserved bits 0x80040033
>>> set_cr0: 0xffff88000f3cdb38 #GP, reserved bits 0x8004003b
>>> set_cr0: 0xffff88000f3dbc88 #GP, reserved bits 0x80040033
>>> set_cr0: 0xffff88000f83b958 #GP, reserved bits 0x8004003b
>>>
>> The guest is clearly confused. Can you bisect kvm to find out what
>> introduced this problem?
>>
OK, will try to find the time.
> the guest is calling pax_{open,close}_kernel that flip cr0.wp off/on,
> respectively. Antoine, can you decode some of those rip values please
> (or better, send me the corresponding vmlinux and all logs)
I've dumped everything here (.config, vmlinuz and log):
http://users.nagafix.co.uk/~antoine/KVM/
Antoine
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: guest patched with pax causes "set_cr0: 0xffff88000[...] #GP, reserved bits 0x8004003?" flood on host
2010-03-11 6:44 ` Avi Kivity
2010-03-11 9:31 ` pageexec
@ 2010-03-11 11:10 ` pageexec
1 sibling, 0 replies; 5+ messages in thread
From: pageexec @ 2010-03-11 11:10 UTC (permalink / raw)
To: Antoine Martin, Avi Kivity; +Cc: kvm
On 11 Mar 2010 at 8:44, Avi Kivity wrote:
> On 03/10/2010 06:17 PM, Antoine Martin wrote:
> > Hi,
> >
> > I've updated my host kernel headers to 2.6.33, rebuilt glibc (and the
> > base system), rebuilt kvm.
> > ... and now I get hundreds of those in dmesg on the host when I start
> > a guest kernel that worked fine before. (2.6.33 + pax patch v5)
> > set_cr0: 0xffff88000ec29d58 #GP, reserved bits 0x80040033
> > set_cr0: 0xffff88000f3cdb38 #GP, reserved bits 0x8004003b
> > set_cr0: 0xffff88000f3dbc88 #GP, reserved bits 0x80040033
> > set_cr0: 0xffff88000f83b958 #GP, reserved bits 0x8004003b
>
> The guest is clearly confused. Can you bisect kvm to find out what
> introduced this problem?
i screwed up the paravirt register clobbers, don't worry about it.
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2010-03-11 12:11 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-03-10 16:17 guest patched with pax causes "set_cr0: 0xffff88000[...] #GP, reserved bits 0x8004003?" flood on host Antoine Martin
2010-03-11 6:44 ` Avi Kivity
2010-03-11 9:31 ` pageexec
2010-03-11 11:05 ` Antoine Martin
2010-03-11 11:10 ` pageexec
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox