public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
* guest patched with pax causes "set_cr0: 0xffff88000[...] #GP, reserved bits 0x8004003?" flood on host
@ 2010-03-10 16:17 Antoine Martin
  2010-03-11  6:44 ` Avi Kivity
  0 siblings, 1 reply; 5+ messages in thread
From: Antoine Martin @ 2010-03-10 16:17 UTC (permalink / raw)
  To: kvm, Avi Kivity, pageexec

Hi,

I've updated my host kernel headers to 2.6.33, rebuilt glibc (and the 
base system), rebuilt kvm.
... and now I get hundreds of those in dmesg on the host when I start a 
guest kernel that worked fine before. (2.6.33 + pax patch v5)
  set_cr0: 0xffff88000ec29d58 #GP, reserved bits 0x80040033
  set_cr0: 0xffff88000f3cdb38 #GP, reserved bits 0x8004003b
  set_cr0: 0xffff88000f3dbc88 #GP, reserved bits 0x80040033
  set_cr0: 0xffff88000f83b958 #GP, reserved bits 0x8004003b
(hundreds of all 4)
And the VM just reboots shortly after starting init.
Funnily enough, I've got some VMs still running that kernel just fine! 
(as I started them before the headers+glibc+qemu-kvm rebuild)

Now, you might just say that I shouldn't use out of tree patches like 
pax, but I just want to know one thing: should the guest kernel still be 
able to flood dmesg on the host like this?

Thanks
Antoine

PS: Avi, are you still interested in seeing if this rebuild fixes the 
pread/glibc bug?

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: guest patched with pax causes "set_cr0: 0xffff88000[...] #GP, reserved bits 0x8004003?" flood on host
  2010-03-10 16:17 guest patched with pax causes "set_cr0: 0xffff88000[...] #GP, reserved bits 0x8004003?" flood on host Antoine Martin
@ 2010-03-11  6:44 ` Avi Kivity
  2010-03-11  9:31   ` pageexec
  2010-03-11 11:10   ` pageexec
  0 siblings, 2 replies; 5+ messages in thread
From: Avi Kivity @ 2010-03-11  6:44 UTC (permalink / raw)
  To: Antoine Martin; +Cc: kvm, pageexec

On 03/10/2010 06:17 PM, Antoine Martin wrote:
> Hi,
>
> I've updated my host kernel headers to 2.6.33, rebuilt glibc (and the 
> base system), rebuilt kvm.
> ... and now I get hundreds of those in dmesg on the host when I start 
> a guest kernel that worked fine before. (2.6.33 + pax patch v5)
>  set_cr0: 0xffff88000ec29d58 #GP, reserved bits 0x80040033
>  set_cr0: 0xffff88000f3cdb38 #GP, reserved bits 0x8004003b
>  set_cr0: 0xffff88000f3dbc88 #GP, reserved bits 0x80040033
>  set_cr0: 0xffff88000f83b958 #GP, reserved bits 0x8004003b

The guest is clearly confused.  Can you bisect kvm to find out what 
introduced this problem?

> (hundreds of all 4)
> And the VM just reboots shortly after starting init.
> Funnily enough, I've got some VMs still running that kernel just fine! 
> (as I started them before the headers+glibc+qemu-kvm rebuild)
>
> Now, you might just say that I shouldn't use out of tree patches like 
> pax, 

You can run anything you like in a guest.

> but I just want to know one thing: should the guest kernel still be 
> able to flood dmesg on the host like this?

No, these are debug messages.

>
> Thanks
> Antoine
>
> PS: Avi, are you still interested in seeing if this rebuild fixes the 
> pread/glibc bug?

I think we figured it out, but a confirmation would be nice.

-- 
error compiling committee.c: too many arguments to function


^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: guest patched with pax causes "set_cr0: 0xffff88000[...] #GP, reserved bits 0x8004003?" flood on host
  2010-03-11  6:44 ` Avi Kivity
@ 2010-03-11  9:31   ` pageexec
  2010-03-11 11:05     ` Antoine Martin
  2010-03-11 11:10   ` pageexec
  1 sibling, 1 reply; 5+ messages in thread
From: pageexec @ 2010-03-11  9:31 UTC (permalink / raw)
  To: Antoine Martin, Avi Kivity; +Cc: kvm

On 11 Mar 2010 at 8:44, Avi Kivity wrote:

> On 03/10/2010 06:17 PM, Antoine Martin wrote:
> > Hi,
> >
> > I've updated my host kernel headers to 2.6.33, rebuilt glibc (and the 
> > base system), rebuilt kvm.
> > ... and now I get hundreds of those in dmesg on the host when I start 
> > a guest kernel that worked fine before. (2.6.33 + pax patch v5)
> >  set_cr0: 0xffff88000ec29d58 #GP, reserved bits 0x80040033
> >  set_cr0: 0xffff88000f3cdb38 #GP, reserved bits 0x8004003b
> >  set_cr0: 0xffff88000f3dbc88 #GP, reserved bits 0x80040033
> >  set_cr0: 0xffff88000f83b958 #GP, reserved bits 0x8004003b
> 
> The guest is clearly confused.  Can you bisect kvm to find out what 
> introduced this problem?

the guest is calling pax_{open,close}_kernel that flip cr0.wp off/on,
respectively. Antoine, can you decode some of those rip values please
(or better, send me the corresponding vmlinux and all logs)?


^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: guest patched with pax causes "set_cr0: 0xffff88000[...] #GP, reserved bits 0x8004003?" flood on host
  2010-03-11  9:31   ` pageexec
@ 2010-03-11 11:05     ` Antoine Martin
  0 siblings, 0 replies; 5+ messages in thread
From: Antoine Martin @ 2010-03-11 11:05 UTC (permalink / raw)
  To: pageexec; +Cc: Avi Kivity, kvm

On 03/11/2010 04:31 PM, pageexec@freemail.hu wrote:
> On 11 Mar 2010 at 8:44, Avi Kivity wrote:
>
>    
>> On 03/10/2010 06:17 PM, Antoine Martin wrote:
>>      
>>> Hi,
>>>
>>> I've updated my host kernel headers to 2.6.33, rebuilt glibc (and the
>>> base system), rebuilt kvm.
>>> ... and now I get hundreds of those in dmesg on the host when I start
>>> a guest kernel that worked fine before. (2.6.33 + pax patch v5)
>>>   set_cr0: 0xffff88000ec29d58 #GP, reserved bits 0x80040033
>>>   set_cr0: 0xffff88000f3cdb38 #GP, reserved bits 0x8004003b
>>>   set_cr0: 0xffff88000f3dbc88 #GP, reserved bits 0x80040033
>>>   set_cr0: 0xffff88000f83b958 #GP, reserved bits 0x8004003b
>>>        
>> The guest is clearly confused.  Can you bisect kvm to find out what
>> introduced this problem?
>>      
OK, will try to find the time.
> the guest is calling pax_{open,close}_kernel that flip cr0.wp off/on,
> respectively. Antoine, can you decode some of those rip values please
> (or better, send me the corresponding vmlinux and all logs)
I've dumped everything here (.config, vmlinuz and log):
http://users.nagafix.co.uk/~antoine/KVM/

Antoine

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: guest patched with pax causes "set_cr0: 0xffff88000[...] #GP, reserved bits 0x8004003?" flood on host
  2010-03-11  6:44 ` Avi Kivity
  2010-03-11  9:31   ` pageexec
@ 2010-03-11 11:10   ` pageexec
  1 sibling, 0 replies; 5+ messages in thread
From: pageexec @ 2010-03-11 11:10 UTC (permalink / raw)
  To: Antoine Martin, Avi Kivity; +Cc: kvm

On 11 Mar 2010 at 8:44, Avi Kivity wrote:

> On 03/10/2010 06:17 PM, Antoine Martin wrote:
> > Hi,
> >
> > I've updated my host kernel headers to 2.6.33, rebuilt glibc (and the 
> > base system), rebuilt kvm.
> > ... and now I get hundreds of those in dmesg on the host when I start 
> > a guest kernel that worked fine before. (2.6.33 + pax patch v5)
> >  set_cr0: 0xffff88000ec29d58 #GP, reserved bits 0x80040033
> >  set_cr0: 0xffff88000f3cdb38 #GP, reserved bits 0x8004003b
> >  set_cr0: 0xffff88000f3dbc88 #GP, reserved bits 0x80040033
> >  set_cr0: 0xffff88000f83b958 #GP, reserved bits 0x8004003b
> 
> The guest is clearly confused.  Can you bisect kvm to find out what 
> introduced this problem?

i screwed up the paravirt register clobbers, don't worry about it.


^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2010-03-11 12:11 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-03-10 16:17 guest patched with pax causes "set_cr0: 0xffff88000[...] #GP, reserved bits 0x8004003?" flood on host Antoine Martin
2010-03-11  6:44 ` Avi Kivity
2010-03-11  9:31   ` pageexec
2010-03-11 11:05     ` Antoine Martin
2010-03-11 11:10   ` pageexec

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox