public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* include/linux/kvm_host.h:488 suspicious rcu_dereference_check() usage!
@ 2015-09-20 16:48 Borislav Petkov
  2015-09-21  5:48 ` Paolo Bonzini
  2015-09-21 15:10 ` Paolo Bonzini
  0 siblings, 2 replies; 5+ messages in thread
From: Borislav Petkov @ 2015-09-20 16:48 UTC (permalink / raw)
  To: Paolo Bonzini; +Cc: kvm ML, lkml

Hey Paolo,

just triggered this on rc1+tip with a 32-bit guest:

[26421.303750] ===============================
[26421.307952] [ INFO: suspicious RCU usage. ]
[26421.312161] 4.3.0-rc1+ #1 Not tainted
[26421.312161] -------------------------------
[26421.312162] include/linux/kvm_host.h:488 suspicious rcu_dereference_check() usage!
[26421.312163] 
other info that might help us debug this:

[26421.312164] 
rcu_scheduler_active = 1, debug_locks = 0
[26421.312165] 1 lock held by qemu-system-i38/17000:
[26421.312189]  #0:  (&(&kvm->mmu_lock)->rlock){+.+...}, at: [<ffffffffa02d6ab4>] kvm_zap_gfn_range+0x24/0x1a0 [kvm]
[26421.312189] 
stack backtrace:
[26421.312191] CPU: 3 PID: 17000 Comm: qemu-system-i38 Not tainted 4.3.0-rc1+ #1
[26421.312192] Hardware name: To be filled by O.E.M. To be filled by O.E.M./M5A97 EVO R2.0, BIOS 1503 01/16/2013
[26421.312195]  0000000000000001 ffff880386c0fc90 ffffffff812c8c2a ffff880423f0c740
[26421.312197]  ffff880386c0fcc0 ffffffff8109e60d ffff880429ff8000 ffffffffffffffff
[26421.312199]  ffff880386844000 ffff880000000000 ffff880386c0fd30 ffffffffa02d6c18
[26421.312199] Call Trace:
[26421.312205]  [<ffffffff812c8c2a>] dump_stack+0x4e/0x84
[26421.312208]  [<ffffffff8109e60d>] lockdep_rcu_suspicious+0xfd/0x130
[26421.312223]  [<ffffffffa02d6c18>] kvm_zap_gfn_range+0x188/0x1a0 [kvm]
[26421.312235]  [<ffffffffa02bac7e>] kvm_set_cr0+0xde/0x1e0 [kvm]
[26421.312244]  [<ffffffffa0359e30>] init_vmcb+0x760/0xad0 [kvm_amd]
[26421.312246]  [<ffffffffa035a417>] svm_create_vcpu+0x197/0x250 [kvm_amd]
[26421.312259]  [<ffffffffa02c59c7>] kvm_arch_vcpu_create+0x47/0x70 [kvm]
[26421.312268]  [<ffffffffa02aff72>] kvm_vm_ioctl+0x302/0x7e0 [kvm]
[26421.312271]  [<ffffffff810a0ae1>] ? __lock_is_held+0x51/0x70
[26421.312273]  [<ffffffff811a0711>] ? __fget+0x101/0x210
[26421.312276]  [<ffffffff81194a54>] do_vfs_ioctl+0x2f4/0x560
[26421.312277]  [<ffffffff811a0889>] ? __fget_light+0x29/0x90
[26421.312279]  [<ffffffff81194d0c>] SyS_ioctl+0x4c/0x90
[26421.312282]  [<ffffffff816c495b>] entry_SYSCALL_64_fastpath+0x16/0x73
[26421.584526] walk_shadow_page_get_mmio_spte: detect reserved bits on spte, addr 0xb8000, dump hierarchy:
[26421.593927] ------ spte 0x3e5a22027 level 4.
[26421.598228] ------ spte 0x38a00b027 level 3.
[26421.602505] ------ spte 0x387334027 level 2.
[26421.602506] ------ spte 0xffff0000000b8f67 level 1.
[26421.602506] ------------[ cut here ]------------
[26421.602530] WARNING: CPU: 2 PID: 17000 at arch/x86/kvm/mmu.c:3385 handle_mmio_page_fault.part.93+0x1a/0x20 [kvm]()
[26421.602550] Modules linked in: tun sha256_ssse3 sha256_generic drbg binfmt_misc ipv6 vfat fat fuse dm_crypt dm_mod kvm_amd kvm crc32_pclmul aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd fam15h_power amd64_edac_mod k10temp edac_core amdkfd amd_iommu_v2 radeon acpi_cpufreq
[26421.602552] CPU: 2 PID: 17000 Comm: qemu-system-i38 Not tainted 4.3.0-rc1+ #1
[26421.602553] Hardware name: To be filled by O.E.M. To be filled by O.E.M./M5A97 EVO R2.0, BIOS 1503 01/16/2013
[26421.602555]  ffffffffa02fc7d2 ffff880386c0fb80 ffffffff812c8c2a 0000000000000000
[26421.602556]  ffff880386c0fbb8 ffffffff81053e55 ffff880429ff8000 000000000000000f
[26421.602558]  00000000000b8000 0000000000000000 00000000ffffffff ffff880386c0fbc8
[26421.602558] Call Trace:
[26421.602564]  [<ffffffff812c8c2a>] dump_stack+0x4e/0x84
[26421.602566]  [<ffffffff81053e55>] warn_slowpath_common+0x95/0xe0
[26421.602567]  [<ffffffff81053f5a>] warn_slowpath_null+0x1a/0x20
[26421.602577]  [<ffffffffa02cf73a>] handle_mmio_page_fault.part.93+0x1a/0x20 [kvm]
[26421.602587]  [<ffffffffa02d5ff1>] tdp_page_fault+0x231/0x290 [kvm]
[26421.602596]  [<ffffffffa02bf32e>] ? emulator_pio_in_out+0x6e/0xf0 [kvm]
[26421.602606]  [<ffffffffa02d1676>] kvm_mmu_page_fault+0x36/0x240 [kvm]
[26421.602609]  [<ffffffffa0357a25>] ? svm_set_cr0+0x95/0xc0 [kvm_amd]
[26421.602610]  [<ffffffffa035671e>] pf_interception+0xde/0x1d0 [kvm_amd]
[26421.602613]  [<ffffffffa0358cb1>] handle_exit+0x181/0xa70 [kvm_amd]
[26421.602622]  [<ffffffffa02c748b>] ? kvm_arch_vcpu_ioctl_run+0x68b/0x1730 [kvm]
[26421.602631]  [<ffffffffa02c74f6>] kvm_arch_vcpu_ioctl_run+0x6f6/0x1730 [kvm]
[26421.602640]  [<ffffffffa02c748b>] ? kvm_arch_vcpu_ioctl_run+0x68b/0x1730 [kvm]
[26421.602642]  [<ffffffff81082afb>] ? preempt_count_sub+0x9b/0xf0
[26421.602644]  [<ffffffff816c144f>] ? mutex_lock_killable_nested+0x26f/0x490
[26421.602645]  [<ffffffff81082afb>] ? preempt_count_sub+0x9b/0xf0
[26421.602651]  [<ffffffffa02ae7e8>] kvm_vcpu_ioctl+0x358/0x710 [kvm]
[26421.602654]  [<ffffffff811a0615>] ? __fget+0x5/0x210
[26421.602655]  [<ffffffff811a0711>] ? __fget+0x101/0x210
[26421.602657]  [<ffffffff81194a54>] do_vfs_ioctl+0x2f4/0x560
[26421.602658]  [<ffffffff811a0889>] ? __fget_light+0x29/0x90
[26421.602660]  [<ffffffff81194d0c>] SyS_ioctl+0x4c/0x90
[26421.602661]  [<ffffffff816c495b>] entry_SYSCALL_64_fastpath+0x16/0x73
[26421.602663] ---[ end trace 37901c8686d84de6 ]---

Any ideas?

Thanks.

-- 
Regards/Gruss,
    Boris.

ECO tip #101: Trim your mails when you reply.

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: include/linux/kvm_host.h:488 suspicious rcu_dereference_check() usage!
  2015-09-20 16:48 include/linux/kvm_host.h:488 suspicious rcu_dereference_check() usage! Borislav Petkov
@ 2015-09-21  5:48 ` Paolo Bonzini
  2015-09-21 15:10 ` Paolo Bonzini
  1 sibling, 0 replies; 5+ messages in thread
From: Paolo Bonzini @ 2015-09-21  5:48 UTC (permalink / raw)
  To: Borislav Petkov; +Cc: kvm ML, lkml



On 20/09/2015 18:48, Borislav Petkov wrote:
> [26421.584526] walk_shadow_page_get_mmio_spte: detect reserved bits on spte, addr 0xb8000, dump hierarchy:
> [26421.593927] ------ spte 0x3e5a22027 level 4.
> [26421.598228] ------ spte 0x38a00b027 level 3.
> [26421.602505] ------ spte 0x387334027 level 2.
> [26421.602506] ------ spte 0xffff0000000b8f67 level 1.
> [26421.602506] ------------[ cut here ]------------
> [26421.602530] WARNING: CPU: 2 PID: 17000 at arch/x86/kvm/mmu.c:3385 handle_mmio_page_fault.part.93+0x1a/0x20 [kvm]()
> [26421.602550] Modules linked in: tun sha256_ssse3 sha256_generic drbg binfmt_misc ipv6 vfat fat fuse dm_crypt dm_mod kvm_amd kvm crc32_pclmul aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd fam15h_power amd64_edac_mod k10temp edac_core amdkfd amd_iommu_v2 radeon acpi_cpufreq
> [26421.602552] CPU: 2 PID: 17000 Comm: qemu-system-i38 Not tainted 4.3.0-rc1+ #1
> [26421.602553] Hardware name: To be filled by O.E.M. To be filled by O.E.M./M5A97 EVO R2.0, BIOS 1503 01/16/2013
> [26421.602555]  ffffffffa02fc7d2 ffff880386c0fb80 ffffffff812c8c2a 0000000000000000
> [26421.602556]  ffff880386c0fbb8 ffffffff81053e55 ffff880429ff8000 000000000000000f
> [26421.602558]  00000000000b8000 0000000000000000 00000000ffffffff ffff880386c0fbc8
> [26421.602558] Call Trace:
> [26421.602564]  [<ffffffff812c8c2a>] dump_stack+0x4e/0x84
> [26421.602566]  [<ffffffff81053e55>] warn_slowpath_common+0x95/0xe0
> [26421.602567]  [<ffffffff81053f5a>] warn_slowpath_null+0x1a/0x20
> [26421.602577]  [<ffffffffa02cf73a>] handle_mmio_page_fault.part.93+0x1a/0x20 [kvm]
> [26421.602587]  [<ffffffffa02d5ff1>] tdp_page_fault+0x231/0x290 [kvm]
> [26421.602596]  [<ffffffffa02bf32e>] ? emulator_pio_in_out+0x6e/0xf0 [kvm]
> [26421.602606]  [<ffffffffa02d1676>] kvm_mmu_page_fault+0x36/0x240 [kvm]
> [26421.602609]  [<ffffffffa0357a25>] ? svm_set_cr0+0x95/0xc0 [kvm_amd]
> [26421.602610]  [<ffffffffa035671e>] pf_interception+0xde/0x1d0 [kvm_amd]
> [26421.602613]  [<ffffffffa0358cb1>] handle_exit+0x181/0xa70 [kvm_amd]
> [26421.602622]  [<ffffffffa02c748b>] ? kvm_arch_vcpu_ioctl_run+0x68b/0x1730 [kvm]
> [26421.602631]  [<ffffffffa02c74f6>] kvm_arch_vcpu_ioctl_run+0x6f6/0x1730 [kvm]
> [26421.602640]  [<ffffffffa02c748b>] ? kvm_arch_vcpu_ioctl_run+0x68b/0x1730 [kvm]
> [26421.602642]  [<ffffffff81082afb>] ? preempt_count_sub+0x9b/0xf0
> [26421.602644]  [<ffffffff816c144f>] ? mutex_lock_killable_nested+0x26f/0x490
> [26421.602645]  [<ffffffff81082afb>] ? preempt_count_sub+0x9b/0xf0
> [26421.602651]  [<ffffffffa02ae7e8>] kvm_vcpu_ioctl+0x358/0x710 [kvm]
> [26421.602654]  [<ffffffff811a0615>] ? __fget+0x5/0x210
> [26421.602655]  [<ffffffff811a0711>] ? __fget+0x101/0x210
> [26421.602657]  [<ffffffff81194a54>] do_vfs_ioctl+0x2f4/0x560
> [26421.602658]  [<ffffffff811a0889>] ? __fget_light+0x29/0x90
> [26421.602660]  [<ffffffff81194d0c>] SyS_ioctl+0x4c/0x90
> [26421.602661]  [<ffffffff816c495b>] entry_SYSCALL_64_fastpath+0x16/0x73
> [26421.602663] ---[ end trace 37901c8686d84de6 ]---
> 
> Any ideas?

I am sending a patch for the RCU splat, for this I'll take a look later
this week.

Paolo

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: include/linux/kvm_host.h:488 suspicious rcu_dereference_check() usage!
  2015-09-20 16:48 include/linux/kvm_host.h:488 suspicious rcu_dereference_check() usage! Borislav Petkov
  2015-09-21  5:48 ` Paolo Bonzini
@ 2015-09-21 15:10 ` Paolo Bonzini
  2015-09-21 15:19   ` Paolo Bonzini
  1 sibling, 1 reply; 5+ messages in thread
From: Paolo Bonzini @ 2015-09-21 15:10 UTC (permalink / raw)
  To: Borislav Petkov; +Cc: kvm ML, lkml, Xiao Guangrong



On 20/09/2015 18:48, Borislav Petkov wrote:
> [26421.593927] ------ spte 0x3e5a22027 level 4.
> [26421.598228] ------ spte 0x38a00b027 level 3.
> [26421.602505] ------ spte 0x387334027 level 2.
> [26421.602506] ------ spte 0xffff0000000b8f67 level 1.
> [26421.602506] ------------[ cut here ]------------
> [26421.602530] WARNING: CPU: 2 PID: 17000 at arch/x86/kvm/mmu.c:3385 handle_mmio_page_fault.part.93+0x1a/0x20 [kvm]()
> [26421.602550] Modules linked in: tun sha256_ssse3 sha256_generic drbg binfmt_misc ipv6 vfat fat fuse dm_crypt dm_mod kvm_amd kvm crc32_pclmul aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd fam15h_power amd64_edac_mod k10temp edac_core amdkfd amd_iommu_v2 radeon acpi_cpufreq
> [26421.602552] CPU: 2 PID: 17000 Comm: qemu-system-i38 Not tainted 4.3.0-rc1+ #1
> [26421.602553] Hardware name: To be filled by O.E.M. To be filled by O.E.M./M5A97 EVO R2.0, BIOS 1503 01/16/2013
> [26421.602555]  ffffffffa02fc7d2 ffff880386c0fb80 ffffffff812c8c2a 0000000000000000
> [26421.602556]  ffff880386c0fbb8 ffffffff81053e55 ffff880429ff8000 000000000000000f
> [26421.602558]  00000000000b8000 0000000000000000 00000000ffffffff ffff880386c0fbc8
> [26421.602558] Call Trace:
> [26421.602564]  [<ffffffff812c8c2a>] dump_stack+0x4e/0x84
> [26421.602566]  [<ffffffff81053e55>] warn_slowpath_common+0x95/0xe0
> [26421.602567]  [<ffffffff81053f5a>] warn_slowpath_null+0x1a/0x20
> [26421.602577]  [<ffffffffa02cf73a>] handle_mmio_page_fault.part.93+0x1a/0x20 [kvm]

Can you test this patch for this second call trace?

diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index fb16a8ea3dee..10c281ec9a25 100644
--- a/arch/x86/kvm/mmu.c
+++ b/arch/x86/kvm/mmu.c
@@ -3320,6 +3320,9 @@ walk_shadow_page_get_mmio_spte(struct kvm_vcpu *vcpu, u64 addr, u64 *sptep)
 		if (!is_shadow_present_pte(spte))
 			break;
 
+		if (leaf == 1 && is_mmio_spte(spte))
+			break;
+
 		reserved |= is_shadow_zero_bits_set(&vcpu->arch.mmu, spte,
 						    leaf);
 	}

Thanks,

Paolo

^ permalink raw reply related	[flat|nested] 5+ messages in thread

* Re: include/linux/kvm_host.h:488 suspicious rcu_dereference_check() usage!
  2015-09-21 15:10 ` Paolo Bonzini
@ 2015-09-21 15:19   ` Paolo Bonzini
  2015-09-21 15:44     ` Borislav Petkov
  0 siblings, 1 reply; 5+ messages in thread
From: Paolo Bonzini @ 2015-09-21 15:19 UTC (permalink / raw)
  To: Borislav Petkov; +Cc: kvm ML, lkml, Xiao Guangrong



On 21/09/2015 17:10, Paolo Bonzini wrote:
> 
> 
> On 20/09/2015 18:48, Borislav Petkov wrote:
>> [26421.593927] ------ spte 0x3e5a22027 level 4.
>> [26421.598228] ------ spte 0x38a00b027 level 3.
>> [26421.602505] ------ spte 0x387334027 level 2.
>> [26421.602506] ------ spte 0xffff0000000b8f67 level 1.
>> [26421.602506] ------------[ cut here ]------------
>> [26421.602530] WARNING: CPU: 2 PID: 17000 at arch/x86/kvm/mmu.c:3385 handle_mmio_page_fault.part.93+0x1a/0x20 [kvm]()
>> [26421.602550] Modules linked in: tun sha256_ssse3 sha256_generic drbg binfmt_misc ipv6 vfat fat fuse dm_crypt dm_mod kvm_amd kvm crc32_pclmul aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd fam15h_power amd64_edac_mod k10temp edac_core amdkfd amd_iommu_v2 radeon acpi_cpufreq
>> [26421.602552] CPU: 2 PID: 17000 Comm: qemu-system-i38 Not tainted 4.3.0-rc1+ #1
>> [26421.602553] Hardware name: To be filled by O.E.M. To be filled by O.E.M./M5A97 EVO R2.0, BIOS 1503 01/16/2013
>> [26421.602555]  ffffffffa02fc7d2 ffff880386c0fb80 ffffffff812c8c2a 0000000000000000
>> [26421.602556]  ffff880386c0fbb8 ffffffff81053e55 ffff880429ff8000 000000000000000f
>> [26421.602558]  00000000000b8000 0000000000000000 00000000ffffffff ffff880386c0fbc8
>> [26421.602558] Call Trace:
>> [26421.602564]  [<ffffffff812c8c2a>] dump_stack+0x4e/0x84
>> [26421.602566]  [<ffffffff81053e55>] warn_slowpath_common+0x95/0xe0
>> [26421.602567]  [<ffffffff81053f5a>] warn_slowpath_null+0x1a/0x20
>> [26421.602577]  [<ffffffffa02cf73a>] handle_mmio_page_fault.part.93+0x1a/0x20 [kvm]
> 
> Can you test this patch for this second call trace?
> 
> diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
> index fb16a8ea3dee..10c281ec9a25 100644
> --- a/arch/x86/kvm/mmu.c
> +++ b/arch/x86/kvm/mmu.c
> @@ -3320,6 +3320,9 @@ walk_shadow_page_get_mmio_spte(struct kvm_vcpu *vcpu, u64 addr, u64 *sptep)
>  		if (!is_shadow_present_pte(spte))
>  			break;
>  
> +		if (leaf == 1 && is_mmio_spte(spte))
> +			break;
> +
>  		reserved |= is_shadow_zero_bits_set(&vcpu->arch.mmu, spte,
>  						    leaf);
>  	}

And of course I need a v2 of this one too. :(

First, the leaf test would have to be == 0, because I prepared the
patch on the first 4.3 pull request instead of the latest Linus
tree.  However even this would not be a good change, because

is_shadow_present_pte(spte) == !(pte & PT_PRESENT_MASK) || is_mmio_spte(pte)

and thus is_shadow_present_pte implies the "if" I'm adding above.

So can you instead please add this debugging printk?

diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index fb16a8ea3dee..90e8ef264861 100644
--- a/arch/x86/kvm/mmu.c
+++ b/arch/x86/kvm/mmu.c
@@ -3334,6 +3334,7 @@ walk_shadow_page_get_mmio_spte(struct kvm_vcpu *vcpu, u64 addr, u64 *sptep)
 			       sptes[root - 1], root);
 			root--;
 		}
+		pr_err("shadow_mmio_mask: %lx\n", shadow_mmio_mask);
 	}
 exit:
 	*sptep = spte;

Paolo

^ permalink raw reply related	[flat|nested] 5+ messages in thread

* Re: include/linux/kvm_host.h:488 suspicious rcu_dereference_check() usage!
  2015-09-21 15:19   ` Paolo Bonzini
@ 2015-09-21 15:44     ` Borislav Petkov
  0 siblings, 0 replies; 5+ messages in thread
From: Borislav Petkov @ 2015-09-21 15:44 UTC (permalink / raw)
  To: Paolo Bonzini; +Cc: kvm ML, lkml, Xiao Guangrong

On Mon, Sep 21, 2015 at 05:19:57PM +0200, Paolo Bonzini wrote:
> First, the leaf test would have to be == 0, because I prepared the
> patch on the first 4.3 pull request instead of the latest Linus
> tree.  However even this would not be a good change, because
> 
> is_shadow_present_pte(spte) == !(pte & PT_PRESENT_MASK) || is_mmio_spte(pte)
> 
> and thus is_shadow_present_pte implies the "if" I'm adding above.
> 
> So can you instead please add this debugging printk?
> 
> diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
> index fb16a8ea3dee..90e8ef264861 100644
> --- a/arch/x86/kvm/mmu.c
> +++ b/arch/x86/kvm/mmu.c
> @@ -3334,6 +3334,7 @@ walk_shadow_page_get_mmio_spte(struct kvm_vcpu *vcpu, u64 addr, u64 *sptep)
>  			       sptes[root - 1], root);
>  			root--;
>  		}
> +		pr_err("shadow_mmio_mask: %lx\n", shadow_mmio_mask);
>  	}
>  exit:
>  	*sptep = spte;

Ok, here's with this ontop. Fixed it up to:

Index: b/arch/x86/kvm/mmu.c
===================================================================
--- a/arch/x86/kvm/mmu.c	2015-09-21 17:26:25.213434565 +0200
+++ b/arch/x86/kvm/mmu.c	2015-09-21 17:27:14.333435968 +0200
@@ -3335,6 +3335,7 @@ walk_shadow_page_get_mmio_spte(struct kv
 			       sptes[root - 1], root);
 			root--;
 		}
+		pr_err("shadow_mmio_mask: 0x%llx\n", shadow_mmio_mask);
 	}
 exit:
 	*sptep = spte;

---

as shadow_mmio_mask is u64.

[   62.765446] walk_shadow_page_get_mmio_spte: detect reserved bits on spte, addr 0xb8000, dump hierarchy:
[   62.774903] ------ spte 0x4173d3027 level 4.
[   62.779209] ------ spte 0x4173d1027 level 3.
[   62.783558] ------ spte 0x4173c8027 level 2.
[   62.783561] ------ spte 0xffff0000000b8f67 level 1.
[   62.783562] shadow_mmio_mask: 0xc00f000000000001
[   62.783564] ------------[ cut here ]------------
[   62.783604] WARNING: CPU: 2 PID: 3531 at arch/x86/kvm/mmu.c:3386 handle_mmio_page_fault.part.93+0x1a/0x20 [kvm]()
[   62.783642] Modules linked in: tun sha256_ssse3 sha256_generic drbg binfmt_misc ipv6 vfat fat fuse dm_crypt dm_mod kvm_amd kvm crc32_pclmul aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd amd64_edac_mod k10temp fam15h_power edac_core amdkfd amd_iommu_v2 radeon acpi_cpufreq
[   62.783646] CPU: 2 PID: 3531 Comm: qemu-system-x86 Not tainted 4.3.0-rc2+ #1
[   62.783648] Hardware name: To be filled by O.E.M. To be filled by O.E.M./M5A97 EVO R2.0, BIOS 1503 01/16/2013
[   62.783654]  ffffffffa0401892 ffff880416eafb80 ffffffff812c8c2a 0000000000000000
[   62.783665]  ffff880416eafbb8 ffffffff81053e55 ffff8804172d8000 000000000000000f
[   62.783666]  00000000000b8000 0000000000000000 00000000ffffffff ffff880416eafbc8
[   62.783667] Call Trace:
[   62.783671]  [<ffffffff812c8c2a>] dump_stack+0x4e/0x84
[   62.783673]  [<ffffffff81053e55>] warn_slowpath_common+0x95/0xe0
[   62.783674]  [<ffffffff81053f5a>] warn_slowpath_null+0x1a/0x20
[   62.783684]  [<ffffffffa03d47ba>] handle_mmio_page_fault.part.93+0x1a/0x20 [kvm]
[   62.783694]  [<ffffffffa03db081>] tdp_page_fault+0x231/0x290 [kvm]
[   62.783697]  [<ffffffff810a24bd>] ? __lock_acquire+0x62d/0x19e0
[   62.783705]  [<ffffffffa03c432e>] ? emulator_pio_in_out+0x6e/0xf0 [kvm]
[   62.783715]  [<ffffffffa03d66f6>] kvm_mmu_page_fault+0x36/0x240 [kvm]
[   62.783718]  [<ffffffffa045c71e>] pf_interception+0xde/0x1d0 [kvm_amd]
[   62.783720]  [<ffffffffa045ecb1>] handle_exit+0x181/0xa70 [kvm_amd]
[   62.783729]  [<ffffffffa03cc50b>] ? kvm_arch_vcpu_ioctl_run+0x68b/0x1730 [kvm]
[   62.783738]  [<ffffffffa03cc576>] kvm_arch_vcpu_ioctl_run+0x6f6/0x1730 [kvm]
[   62.783748]  [<ffffffffa03cc50b>] ? kvm_arch_vcpu_ioctl_run+0x68b/0x1730 [kvm]
[   62.783749]  [<ffffffff81082afb>] ? preempt_count_sub+0x9b/0xf0
[   62.783751]  [<ffffffff816c144f>] ? mutex_lock_killable_nested+0x26f/0x490
[   62.783753]  [<ffffffff81082afb>] ? preempt_count_sub+0x9b/0xf0
[   62.783759]  [<ffffffffa03b37e8>] kvm_vcpu_ioctl+0x358/0x710 [kvm]
[   62.783761]  [<ffffffff810a0ae1>] ? __lock_is_held+0x51/0x70
[   62.783762]  [<ffffffff811a0711>] ? __fget+0x101/0x210
[   62.783764]  [<ffffffff81194a54>] do_vfs_ioctl+0x2f4/0x560
[   62.783766]  [<ffffffff811a0889>] ? __fget_light+0x29/0x90
[   62.783767]  [<ffffffff81194d0c>] SyS_ioctl+0x4c/0x90
[   62.783769]  [<ffffffff816c495b>] entry_SYSCALL_64_fastpath+0x16/0x73
[   62.783770] ---[ end trace 8fe1d7df0fb72e0c ]---

-- 
Regards/Gruss,
    Boris.

ECO tip #101: Trim your mails when you reply.

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2015-09-21 15:44 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-09-20 16:48 include/linux/kvm_host.h:488 suspicious rcu_dereference_check() usage! Borislav Petkov
2015-09-21  5:48 ` Paolo Bonzini
2015-09-21 15:10 ` Paolo Bonzini
2015-09-21 15:19   ` Paolo Bonzini
2015-09-21 15:44     ` Borislav Petkov

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox