On Sat, Dec 22, 2007 at 09:59:43PM +0200, Avi Kivity wrote:
> Guido Guenther wrote:
> > Hi,
> > I got the Oops below on an Dual CPU Dual-Core AMD Opteron(tm) Processor
> > 2220 running a 32bit kernel. Kernel is 2.6.23.11, kvm version 57.
> > Doesn't happen all the time but usually right at VM startup. Seems to be
> > easier to trigger when starting up several VMs in row. 
> 
> What guest are you running?  smp or uni?
Uniprocessor Linux, standard etch 2.6.18 kernel.

kvm commandline was:

-M pc -m 512 -smp 1 -monitor pty -boot c -hda /dev/mapper/foo -hdb
/dev/mapper/bar -net nic,macaddr=54:52:00:1b:9b:10,vlan=0 -net
tap,fd=11,script=,vlan=0 -usb -usbdevice tablet -vnc 127.0.0.1:0


> > Call Trace: 
> >  [<f8d498d8>] pic_update_irq+0x68/0x80 [kvm] 
> >  [<f8d49f8e>] kvm_pic_read_irq+0x6e/0xe0 [kvm] 
> >   
> 
> Please do
> 
>   gdb /path/to/kvm.ko
>   disassemble pic_update_irq
> 
> and post the results.  If you recompiled the module since getting the
> oops, please generate a fresh oops.

(gdb) disassemble pic_update_irq
Dump of assembler code for function pic_update_irq:
0x0000d870 <pic_update_irq+0>:  push   %ebx
0x0000d871 <pic_update_irq+1>:  mov    %eax,%ebx
0x0000d873 <pic_update_irq+3>:  lea    0x14(%eax),%eax
0x0000d876 <pic_update_irq+6>:  call   0xd7a0 <pic_get_irq>
0x0000d87b <pic_update_irq+11>: test   %eax,%eax
0x0000d87d <pic_update_irq+13>: js     0xd899 <pic_update_irq+41>
0x0000d87f <pic_update_irq+15>: testb  $0x4,0xe(%ebx)
0x0000d883 <pic_update_irq+19>: je     0xd8b1 <pic_update_irq+65>
0x0000d885 <pic_update_irq+21>: orb    $0x4,0x1(%ebx)
0x0000d889 <pic_update_irq+25>: orb    $0x4,(%ebx)
0x0000d88c <pic_update_irq+28>: testb  $0x4,0xe(%ebx)
0x0000d890 <pic_update_irq+32>: je     0xd8c2 <pic_update_irq+82>
0x0000d892 <pic_update_irq+34>: andb   $0xfb,0x1(%ebx)
0x0000d896 <pic_update_irq+38>: andb   $0xfb,(%ebx)
0x0000d899 <pic_update_irq+41>: mov    %ebx,%eax
0x0000d89b <pic_update_irq+43>: call   0xd7a0 <pic_get_irq>
0x0000d8a0 <pic_update_irq+48>: test   %eax,%eax
0x0000d8a2 <pic_update_irq+50>: js     0xd8d0 <pic_update_irq+96>
0x0000d8a4 <pic_update_irq+52>: mov    0x2c(%ebx),%eax
0x0000d8a7 <pic_update_irq+55>: mov    $0x1,%edx
0x0000d8ac <pic_update_irq+60>: call   *0x28(%ebx)
0x0000d8af <pic_update_irq+63>: pop    %ebx
0x0000d8b0 <pic_update_irq+64>: ret
0x0000d8b1 <pic_update_irq+65>: testb  $0x4,(%ebx)
0x0000d8b4 <pic_update_irq+68>: je     0xd8e0 <pic_update_irq+112>
0x0000d8b6 <pic_update_irq+70>: orb    $0x4,(%ebx)
0x0000d8b9 <pic_update_irq+73>: testb  $0x4,0xe(%ebx)
0x0000d8bd <pic_update_irq+77>: lea    0x0(%esi),%esi
0x0000d8c0 <pic_update_irq+80>: jne    0xd892 <pic_update_irq+34>
0x0000d8c2 <pic_update_irq+82>: andb   $0xfb,(%ebx)
0x0000d8c5 <pic_update_irq+85>: mov    %ebx,%eax
0x0000d8c7 <pic_update_irq+87>: call   0xd7a0 <pic_get_irq>
0x0000d8cc <pic_update_irq+92>: test   %eax,%eax
0x0000d8ce <pic_update_irq+94>: jns    0xd8a4 <pic_update_irq+52>
0x0000d8d0 <pic_update_irq+96>: mov    0x2c(%ebx),%eax
0x0000d8d3 <pic_update_irq+99>: xor    %edx,%edx
0x0000d8d5 <pic_update_irq+101>:        call   *0x28(%ebx)
0x0000d8d8 <pic_update_irq+104>:        pop    %ebx
0x0000d8d9 <pic_update_irq+105>:        ret
0x0000d8da <pic_update_irq+106>:        lea    0x0(%esi),%esi
0x0000d8e0 <pic_update_irq+112>:        orb    $0x4,0x1(%ebx)
0x0000d8e4 <pic_update_irq+116>:        orb    $0x4,(%ebx)
0x0000d8e7 <pic_update_irq+119>:        jmp    0xd8b9 <pic_update_irq+73>
0x0000d8e9 <pic_update_irq+121>:        lea    0x0(%esi),%esi
End of assembler dump.

Cheers,
 -- Guido

-------------------------------------------------------------------------
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2005.
http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/
_______________________________________________
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel

Reply via email to