On Tue, May 31, 2016 at 11:56 AM, Paolo Bonzini wrote:
>
>
> On 15/02/2016 14:30, Dmitry Vyukov wrote:
>> *(uint32_t*)0x2000a6b9 = (uint32_t)0x3e;
>> *(uint16_t*)0x2000a6bd = (uint16_t)0x8;
>> *(uint8_t*)0x2000a6bf = (uint8_t)0x8d4;
>> *(uint8_t*)0x2000a6c0 = (uint8_t)0xfff
On 15/02/2016 14:30, Dmitry Vyukov wrote:
> *(uint32_t*)0x2000a6b9 = (uint32_t)0x3e;
> *(uint16_t*)0x2000a6bd = (uint16_t)0x8;
> *(uint8_t*)0x2000a6bf = (uint8_t)0x8d4;
> *(uint8_t*)0x2000a6c0 = (uint8_t)0x5fe9;
> *(uint8_t*)0x2000a6c1 = (uint8_t)0x8001;
>
Hello,
The following program triggers GPF in kvm_irq_map_gsi:
general protection fault: [#49] SMP DEBUG_PAGEALLOC KASAN
Modules linked in:
CPU: 0 PID: 5314 Comm: kvm-pit/4950 Tainted: G D 4.5.0-rc3+ #326
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/201
3 matches
Mail list logo