From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.0 required=3.0 tests=MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3B899C33CB1 for ; Thu, 16 Jan 2020 15:38:59 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 07A85207FF for ; Thu, 16 Jan 2020 15:38:59 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726867AbgAPPi6 convert rfc822-to-8bit (ORCPT ); Thu, 16 Jan 2020 10:38:58 -0500 Received: from mail.kernel.org ([198.145.29.99]:46676 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726160AbgAPPi5 (ORCPT ); Thu, 16 Jan 2020 10:38:57 -0500 From: bugzilla-daemon@bugzilla.kernel.org To: kvm@vger.kernel.org Subject: [Bug 206215] QEMU guest crash due to random 'general protection fault' since kernel 5.2.5 on i7-3517UE Date: Thu, 16 Jan 2020 15:38:56 +0000 X-Bugzilla-Reason: None X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: AssignedTo virtualization_kvm@kernel-bugs.osdl.org X-Bugzilla-Product: Virtualization X-Bugzilla-Component: kvm X-Bugzilla-Version: unspecified X-Bugzilla-Keywords: X-Bugzilla-Severity: blocking X-Bugzilla-Who: sean.j.christopherson@intel.com X-Bugzilla-Status: NEW X-Bugzilla-Resolution: X-Bugzilla-Priority: P1 X-Bugzilla-Assigned-To: virtualization_kvm@kernel-bugs.osdl.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8BIT X-Bugzilla-URL: https://bugzilla.kernel.org/ Auto-Submitted: auto-generated MIME-Version: 1.0 Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org https://bugzilla.kernel.org/show_bug.cgi?id=206215 --- Comment #5 from Sean Christopherson (sean.j.christopherson@intel.com) --- On Wed, Jan 15, 2020 at 08:08:32PM -0500, Derek Yerger wrote: > On 1/15/20 4:52 PM, Sean Christopherson wrote: > >+cc Derek, who is hitting the same thing. > > > >On Wed, Jan 15, 2020 at 09:18:56PM +0000, > bugzilla-daemon@bugzilla.kernel.org wrote: > >>https://bugzilla.kernel.org/show_bug.cgi?id=206215 > >*snip* > >that's a big smoking gun pointing at commit ca7e6b286333 ("KVM: X86: Fix > >fpu state crash in kvm guest"), which is commit e751732486eb upstream. > > > >1. Can you verify reverting ca7e6b286333 (or e751732486eb in upstream) > > solves the issue? > > > >2. Assuming the answer is yes, on a buggy kernel, can you run with the > > attached patch to try get debug info? > I did these out of order since I had 5.3.11 built with the patch, ready to > go for weeks now, waiting for an opportunity to test. > > Win10 guest immediately BSOD'ed with: > > WARNING: CPU: 2 PID: 9296 at include/linux/thread_info.h:55 > kernel_fpu_begin+0x6b/0xc0 Can you provide the full stack trace of the WARN? I'm hoping that will provide a hint as to what's going wrong. > Then stashed the patch, reverted ca7e6b286333, compile, reboot. > > Guest is running stable now on 5.3.11. Did test my CAD under the guest, did > not experience the crashes that had me stuck at 5.1. -- You are receiving this mail because: You are watching the assignee of the bug.