Re: [Bug 358836] [NEW] kvm general protection fault on jaunty
Hello, If you find that you can reproduce this issue, please try it again after installing the kvm-source package, which will update the kvm module in the kernel. Note that you should reboot after installing that package. :-Dustin -- kvm general protection fault on jaunty https://bugs.launchpad.net/bugs/358836 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 358836] [NEW] kvm general protection fault on jaunty
Public bug reported: Binary package hint: kvm Today I tried to install solaris 10 on a fresh jaunty in kvm and this has triggered a general protection fault. Next week I'll try to install solaris 10 again to see if this is reproduceable. versions : # dpkg -l | grep kvm ii kvm 1:84+dfsg-0ubuntu10 Full virtualization on i386 and amd64 hardwa ii kvm-pxe 5.4.3+dfsg-0.2ubuntu1 PXE ROM's for KVM # uname -a Linux 2.6.28-11-server #41-Ubuntu SMP Wed Apr 8 05:29:01 UTC 2009 x86_64 GNU/Linux panic : [ 2943.731058] general protection fault: [#1] SMP [ 2943.731092] last sysfs file: /sys/devices/virtual/net/vnet0/flags [ 2943.731127] Dumping ftrace buffer: [ 2943.731153](ftrace buffer empty) [ 2943.731176] CPU 6 [ 2943.731197] Modules linked in: tun ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack ipt_REJECT xt_tcpudp iptable_filter ip_tables x_tables kvm_intel kvm 8021q garp bridge stp lp parport iTCO_wdt iTCO_vendor_support ipmi_si psmouse ipmi_msghandler i5000_edac edac_core pcspkr serio_raw shpchp hpilo usbhid bnx2 cciss fbcon tileblit font bitblit softcursor [ 2943.731402] Pid: 4200, comm: kvm Not tainted 2.6.28-11-server #41-Ubuntu [ 2943.731431] RIP: 0010:[] [] paging64_shadow_invlpg_entry+0x40/0x80 [kvm] [ 2943.731494] RSP: 0018:880306cb3c08 EFLAGS: 00010246 [ 2943.731519] RAX: 0085 RBX: 000588000428 RCX: 000588000428 [ 2943.731548] RDX: 880306c31f60 RSI: 880306c31f60 RDI: 880306cb3c68 [ 2943.731577] RBP: 880306cb3c18 R08: R09: [ 2943.731606] R10: 8802ee41b000 R11: R12: 000588000428 [ 2943.731635] R13: 000c R14: 0e485000 R15: 880306c31f60 [ 2943.731665] FS: 7f762da91950() GS:88032ef9f780() knlGS: [ 2943.731709] CS: 0010 DS: 002b ES: 002b CR0: 8005003b [ 2943.731736] CR2: ceb27788 CR3: 000321458000 CR4: 26a0 [ 2943.731765] DR0: DR1: DR2: [ 2943.731794] DR3: DR6: 0ff0 DR7: 0400 [ 2943.731824] Process kvm (pid: 4200, threadinfo 880306cb2000, task 88032cd75980) [ 2943.731868] Stack: [ 2943.731888] 880306cb3c24 0001 880306cb3c58 a0151d9e [ 2943.731922] 880306cb3c68 880306c31f60 0e485000 880306c31f60 [ 2943.731973] 000e 000e 880306cb3ca8 a0151e63 [ 2943.732040] Call Trace: [ 2943.732061] [] walk_shadow+0x8e/0xe0 [kvm] [ 2943.732096] [] paging64_invlpg+0x33/0x40 [kvm] [ 2943.732131] [] ? paging64_shadow_invlpg_entry+0x0/0x80 [kvm] [ 2943.732186] [] ? _spin_lock+0x9/0x10 [ 2943.732220] [] kvm_mmu_invlpg+0x2f/0x60 [kvm] [ 2943.732255] [] handle_invlpg+0x1c/0x30 [kvm_intel] [ 2943.732288] [] kvm_handle_exit+0xb5/0x1d0 [kvm_intel] [ 2943.732319] [] ? __down_read+0xc3/0xce [ 2943.732349] [] vcpu_enter_guest+0x1f8/0x400 [kvm] [ 2943.732384] [] ? autoremove_wake_function+0x0/0x40 [ 2943.732417] [] __vcpu_run+0x69/0x2d0 [kvm] [ 2943.732451] [] kvm_arch_vcpu_ioctl_run+0x8a/0x1f0 [kvm] [ 2943.732487] [] kvm_vcpu_ioctl+0x2e2/0x5a0 [kvm] [ 2943.732522] [] ? futex_requeue+0xfd/0x2e0 [ 2943.732551] [] vfs_ioctl+0x31/0xa0 [ 2943.732580] [] do_vfs_ioctl+0x75/0x230 [ 2943.732608] [] sys_ioctl+0x99/0xa0 [ 2943.732635] [] ? sys_read+0x88/0x90 [ 2943.732664] [] system_call_fastpath+0x16/0x1b [ 2943.732693] Code: 48 8b 11 48 3b 15 19 bf 01 00 b8 01 00 00 00 74 0c 31 c0 48 3b 15 11 bf 01 00 0f 94 c0 48 83 c4 08 5b c9 c3 0f 1f 80 00 00 00 00 <48> 8b 01 48 3b 05 ee be 01 00 74 14 48 3b 05 ed be 01 00 74 0b [ 2943.732889] RIP [] paging64_shadow_invlpg_entry+0x40/0x80 [kvm] [ 2943.732940] RSP [ 2943.733197] ---[ end trace f8ca068ee8691eb3 ]--- ** Affects: kvm (Ubuntu) Importance: Undecided Status: New -- kvm general protection fault on jaunty https://bugs.launchpad.net/bugs/358836 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs