Bugs item #1842160, was opened at 2007-11-30 23:12
Message generated for change (Comment added) made by iggy_cav
You can respond by visiting: 
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1842160&group_id=180599

Please note that this message will contain a full copy of the comment thread,
including the initial issue submission, for this request,
not just the latest update.
Category: intel
Group: None
>Status: Closed
Resolution: Fixed
Priority: 5
Private: No
Submitted By: Carlo Marcelo Arenas Belon (carenas)
Assigned to: Amit Shah (amitshah)
Summary: Solaris 10 8/07 (AKA update 4) x86 guest can't boot 64 bit

Initial Comment:
Host CPU: Intel(R) Core(TM)2 CPU 6320
KVM: 54 + ide patches and set_cr3 patch pre-kvm-55
Host OS: Gentoo 2007.0 with kernel 2.6.22-gentoo-r9
Host ARCH: amd64 (64bit)
Guest OS: Solaris 10 8/07 x86 Generic 120012-14
VM parameters: -m 512

problem only happens when running kvm's CPU emulation (doesn't happen with 
-no-kvm) and triggers a GP as shown by :

set_cr4: #GP, clearing PAE while in long mode
inject_general_protection: rip 0x100ee24.

it might be related to the GP reported as part of the discussion for bug 
1699695 which apparently has a patch available (but not yet committed) which I 
hadn't been able to track down to test

----------------------------------------------------------------------

>Comment By: Brian Jackson (iggy_cav)
Date: 2010-02-08 14:34

Message:
nvm

----------------------------------------------------------------------

Comment By: Brian Jackson (iggy_cav)
Date: 2010-02-08 14:33

Message:
Does still occur with the latest kvm kernel module and userspace?

----------------------------------------------------------------------

Comment By: Carlo Marcelo Arenas Belon (carenas)
Date: 2008-07-13 01:18

Message:
Logged In: YES 
user_id=36771
Originator: YES

This still affects the last update (u5) of Solaris 10 (5/08) but
interestingly enough does not affect OpenSolaris versions based in nevada
b85 (OpenSolaris 2008.05 or Nexenta Core 2.0 alpha 1)

----------------------------------------------------------------------

Comment By: Amit Shah (amitshah)
Date: 2008-03-04 06:08

Message:
Logged In: YES 
user_id=201894
Originator: NO

Looks like we'll have to wait more. windows 64-bit doesn't like this
change.

----------------------------------------------------------------------

Comment By: Amit Shah (amitshah)
Date: 2008-03-04 00:13

Message:
Logged In: YES 
user_id=201894
Originator: NO

Fix is in kvm-git. Will be part of kvm-63.

----------------------------------------------------------------------

Comment By: Carlo Marcelo Arenas Belon (carenas)
Date: 2007-12-01 03:02

Message:
Logged In: YES 
user_id=36771
Originator: YES

there was a bug in the way I disabled the GP for set_cr4 which triggered
the set_cr0, so that is not a real issue.

the suggested patch fixes the problem (using an Intel Host as well as it
does most likely for AMD hosts as reported in the thread).  
will leave bug open for now, to help for follow up into committing this
patch and release

----------------------------------------------------------------------

Comment By: Amit Shah (amitshah)
Date: 2007-12-01 02:12

Message:
Logged In: YES 
user_id=201894
Originator: NO

Use the patch in
http://www.mail-archive.com/kvm-devel%40lists.sourceforge.net/msg08947.html
to resolve the #gp

----------------------------------------------------------------------

Comment By: Carlo Marcelo Arenas Belon (carenas)
Date: 2007-12-01 01:20

Message:
Logged In: YES 
user_id=36771
Originator: YES

if LME/LMA handling is considered buggy as reported in BUG 1699695 and the
GP commented out, another GP is generated after as shown by :

BUG: set_cr4: #GP, clearing PAE while in long mode
set_cr0: #GP, pdptrs reserved bits
inject_general_protection: rip 0x100ee49


----------------------------------------------------------------------

You can respond by visiting: 
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=1842160&group_id=180599
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to