On 10/12/2015 17:53, Borislav Petkov wrote:
> Just did, there it splats even when booting the guest, without even
> injecting NMIs:
>
> [ 113.233992] ===
> [ 113.238192] [ INFO: suspicious RCU usage. ]
> [ 113.242393] 4.4.0-rc4+ #1 Not tainted
> [ 113.246056]
On Thu, Dec 10, 2015 at 05:49:10PM +0100, Paolo Bonzini wrote:
> Can you try it on Intel?
Just did, there it splats even when booting the guest, without even
injecting NMIs:
[ 113.233992] ===
[ 113.238192] [ INFO: suspicious RCU usage. ]
[ 113.242393] 4.4.0-rc4+ #1
On 10/12/2015 17:44, Borislav Petkov wrote:
> Yap,
>
> this is clearly a qemu/kvm issue. Lemme remove ext4 folks from CC. So
> here's what happens:
>
> I boot a kvm guest, connect to its monitor (qemu is started with
> "-monitor pty") and on the monitor I issue a couple of times the "nmi"
> com
Yap,
this is clearly a qemu/kvm issue. Lemme remove ext4 folks from CC. So
here's what happens:
I boot a kvm guest, connect to its monitor (qemu is started with
"-monitor pty") and on the monitor I issue a couple of times the "nmi"
command. It doesn't explode immediately but it happens pretty oft