From mboxrd@z Thu Jan 1 00:00:00 1970 From: Avi Kivity Subject: Re: race between kvm-kmod-3.0 and kvm-kmod-3.3 // was: race condition in qemu-kvm-1.0.1 Date: Mon, 02 Jul 2012 18:05:10 +0300 Message-ID: <4FF1B8A6.2020101@redhat.com> References: <4FEB2945.1030607@dlhnet.de> <4FEB3AC6.6010206@web.de> <4FEC1FC9.7050103@dlhnet.de> <4FEC2210.1030005@siemens.com> <4FEC2475.4030202@dlhnet.de> <4FEC2626.90402@dlhnet.de> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Cc: Jan Kiszka , qemu-devel@nongnu.org, kvm@vger.kernel.org, Gleb Natapov To: Peter Lieven Return-path: Received: from mx1.redhat.com ([209.132.183.28]:41601 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751278Ab2GBPFR (ORCPT ); Mon, 2 Jul 2012 11:05:17 -0400 In-Reply-To: <4FEC2626.90402@dlhnet.de> Sender: kvm-owner@vger.kernel.org List-ID: On 06/28/2012 12:38 PM, Peter Lieven wrote: > does anyone know whats that here in handle_mmio? > > /* hack: Red Hat 7.1 generates these weird accesses. */ > if ((addr > 0xa0000-4 && addr <= 0xa0000) && kvm_run->mmio.len == 3) > return 0; > Just what it says. There is a 4-byte access to address 0x9ffff. The first byte lies in RAM, the next three bytes are in mmio. qemu is geared to power-of-two accesses even though x86 can generate accesses to any number of bytes between 1 and 8. It appears that this has happened with your guest. It's not impossible that it's genuine. -- error compiling committee.c: too many arguments to function