Avi Kivity wrote:
> Avi Kivity wrote:
>> Michal Ludvig wrote:
>>> Hi,
>>>
>>> I've experienced a kernel Oops on 2.6.24 with kvm 66 on AMD in 64bit 
>>> mode while starting up WinXP:
>>>
>>> The host is still alive but the XP guest is locked up in a boot screen.

Hi again, just wanted to let you know that I still get this Oops with 
kvm-68. It comes a bit later, not during the boot but after the XP 
desktop comes up. As there were some changes in kernel/x86_emulate.c the 
patch you provided for kvm-66 can't be applied anymore.

loaded kvm module (kvm-68)
kvm: emulating exchange as write
Unable to handle kernel NULL pointer dereference at 0000000000000000 RIP:
  [<ffffffff88373b4a>] :kvm:x86_emulate_insn+0x3fa/0x4240
PGD 3145e067 PUD 409b9067 PMD 0
Oops: 0002 [1] SMP
CPU 0
Modules linked in: kvm_amd kvm reiserfs tun bridge llc nfsd lockd 
nfs_acl auth_rpcgss sunrpc exportfs iptable_filter ip_tables autofs4 
snd_pcm_oss snd_mixer_oss w83627ehf snd_seq snd_seq_device hwmon_vid 
ip6table_filter ip6_tables x_tables af_packet ipv6 fuse ext2 loop 
snd_hda_intel snd_pcm snd_timer snd soundcore snd_page_alloc sr_mod 
k8temp hwmon i2c_nforce2 button i2c_core cdrom forcedeth sg floppy 
linear ehci_hcd ohci_hcd sd_mod usbcore dm_snapshot edd dm_mod fan 
sata_nv pata_amd libata scsi_mod thermal processor
Pid: 14776, comm: qemu-system-x86 Not tainted 2.6.24-mludvig #1
RIP: 0010:[<ffffffff88373b4a>]  [<ffffffff88373b4a>] 
:kvm:x86_emulate_insn+0x3fa/0x4240
RSP: 0018:ffff81007d52fc18  EFLAGS: 00010246
RAX: 000000008001003b RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff810079c5c000
RBP: ffff810079c5d320 R08: ffff810079c5d3c0 R09: 0000000000000006
R10: 0000000000000002 R11: 0000000000000000 R12: ffff810079c5d368
R13: ffff810079c5d3c0 R14: ffffffff8838ab20 R15: 00000000019d1353
FS:  0000000040800950(0063) GS:ffffffff8053e000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 0000000000000000 CR3: 000000007985a000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process qemu-system-x86 (pid: 14776, threadinfo ffff81007d52e000, task 
ffff81003f4e6780)
Stack:  000000007d52fc74 0000000011fda618 000000000f399068 ffff810079c5d3c0
  ffff81007d52fc94 ffffffff88368ae0 0000000000000000 ffff810079c5c000
  ffff810079c5d320 0000000000000000 0000000000000000 0000000000000000
Call Trace:
  [<ffffffff88368ae0>] :kvm:seg_desct_to_kvm_desct+0x40/0xb0
  [<ffffffff88369dff>] :kvm:emulate_instruction+0x1bf/0x340
  [<ffffffff883d99e2>] :kvm_amd:emulate_on_interception+0x12/0x60
  [<ffffffff8836d2b9>] :kvm:kvm_arch_vcpu_ioctl_run+0x169/0x6d0
  [<ffffffff883681fc>] :kvm:kvm_vcpu_ioctl+0x41c/0x440
  [<ffffffff802305f3>] __wake_up+0x43/0x70
  [<ffffffff803374c1>] __up_read+0x21/0xb0
  [<ffffffff802586ec>] futex_wake+0xcc/0xf0
  [<ffffffff80259559>] do_futex+0x129/0xbb0
  [<ffffffff8022e7bd>] __dequeue_entity+0x3d/0x50
  [<ffffffff883679c5>] :kvm:kvm_vm_ioctl+0x85/0x200
  [<ffffffff8044357f>] thread_return+0x3a/0x62b
  [<ffffffff8027a620>] do_writepages+0x20/0x40
  [<ffffffff802ab10f>] do_ioctl+0x2f/0xa0
  [<ffffffff802ab3a0>] vfs_ioctl+0x220/0x2d0
  [<ffffffff802ab4e1>] sys_ioctl+0x91/0xb0
  [<ffffffff8020bcae>] system_call+0x7e/0x83


Code: 66 89 02 e9 ee fc ff ff 48 8b 95 88 00 00 00 48 8b 45 78 88
RIP  [<ffffffff88373b4a>] :kvm:x86_emulate_insn+0x3fa/0x4240
  RSP <ffff81007d52fc18>
CR2: 0000000000000000
---[ end trace d485159bd8f95a33 ]---

Michal

-------------------------------------------------------------------------
This SF.net email is sponsored by the 2008 JavaOne(SM) Conference 
Don't miss this year's exciting event. There's still time to save $100. 
Use priority code J8TL2D2. 
http://ad.doubleclick.net/clk;198757673;13503038;p?http://java.sun.com/javaone
_______________________________________________
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel

Reply via email to