[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#512538: marked as done (kernel BUG at arch/x86/kvm/mmu.c:553)



Your message dated Fri, 19 Feb 2010 00:17:34 +0100
with message-id <20100218231734.GA8339@galadriel.inutil.org>
and subject line Re: kernel BUG at arch/x86/kvm/mmu.c:553
has caused the Debian Bug report #512538,
regarding kernel BUG at arch/x86/kvm/mmu.c:553
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
512538: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512538
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: linux-image-2.6.26-1-686
Version: 2.6.26-13
Severity: normal

I encountered the following bug while normally using kvm:

kvm: guest NX capability removed
kvm: guest NX capability removed
apic write: bad size=1 fee00030
Ignoring de-assert INIT to vcpu 0
Ignoring de-assert INIT to vcpu 0
kvm: emulating exchange as write
rmap_remove:  f2acd6f8 1ffe6067 1->BUG
------------[ cut here ]------------
kernel BUG at arch/x86/kvm/mmu.c:553!
invalid opcode: 0000 [#1] SMP Modules linked in: snd_seq_dummy arc4 ecb crypto_blkcipher zd1211rw mac80211 cfg80211 tun ipx p8023 kvm_amd kvm binfmt_misc ipt_REJECT xt_tcpudp xt_state iptable_filter iptable_nat nf_nat nf_conntrack_ipv4 nf_conntrack nvidiafb ip_tables fb_ddc vgastate x_tables fuse tuner_simple tuner_types tuner tvaudio bttv videodev v4l1_compat ir_common compat_ioctl32 i2c_algo_bit acx v4l2_common videobuf_dma_sg videobuf_core btcx_risc firmware_class tveeprom snd_hda_intel snd_pcm snd_seq snd_timer snd_seq_device snd soundcore psmouse snd_page_alloc k8temp serio_raw button evdev parport_pc parport i2c_nforce2 i2c_core ext3 jbd mbcache ide_disk ide_cd_mod cdrom ide_pci_generic amd74xx ide_core floppy ata_generic forcedeth libata scsi_mod dock ehci_hcd ohci_hcd usbcore thermal processor fan thermal_sys

Pid: 3817, comm: kvm Not tainted (2.6.26-1-686 #1)
EIP: 0060:[<f9b87d45>] EFLAGS: 00010292 CPU: 1
EIP is at rmap_remove+0xf5/0x17d [kvm]
EAX: 00000039 EBX: c4142394 ECX: 00000000 EDX: 00000086
ESI: fbcda808 EDI: c4324000 EBP: f2acd6f8 ESP: c41e9be4
 DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
Process kvm (pid: 3817, ti=c41e8000 task=c3ec2280 task.ti=c41e8000)
Stack: f9b92021 f2acd6f8 1ffe6067 00000000 c4324000 c4142394 f2acd6f8 c4142394 c4324000 000000df f9b87e7f 00000000 00000380 00000004 00000004 00000004 f9b89465 00000004 321f6380 00000000 c4336020 00000003 000321f6 c4142394 Call Trace:
 [<f9b87e7f>] kvm_mmu_zap_page+0x92/0x24c [kvm]
 [<f9b89465>] kvm_mmu_pte_write+0x2c7/0x783 [kvm]
 [<f9b81622>] mark_page_dirty+0x14/0x33 [kvm]
 [<f9b8169e>] kvm_write_guest_page+0x31/0x3e [kvm]
 [<f9b83e78>] emulator_write_phys+0x32/0x40 [kvm]
 [<f9b84f77>] emulator_write_emulated_onepage+0x69/0x10b [kvm]
 [<f9b8e204>] x86_emulate_insn+0x2b95/0x3495 [kvm]
 [<f9b8ac21>] do_insn_fetch+0x55/0x8b [kvm]
 [<f9b8ad9b>] decode_register_operand+0x6a/0x9b [kvm]
 [<f9b8b4b8>] x86_decode_insn+0x6ec/0x8a3 [kvm]
 [<f9b8313a>] get_segment+0xa/0xc [kvm]
 [<f9b8314e>] kvm_get_cs_db_l_bits+0x12/0x26 [kvm]
 [<f9b83d1c>] emulate_instruction+0x172/0x29c [kvm]
 [<f9b89168>] kvm_mmu_page_fault+0x38/0x6e [kvm]
 [<f8b5351c>] handle_exit+0x18f/0x196 [kvm_amd]
 [<f9b86a65>] kvm_arch_vcpu_ioctl_run+0x3fe/0x589 [kvm]
 [<f9b822a5>] kvm_vcpu_ioctl+0xe4/0x34c [kvm]
 [<c010296e>] __switch_to+0xa5/0x125
 [<c011d3bd>] hrtick_set+0x7a/0xd8
 [<c02b831f>] schedule+0x63d/0x66f
 [<c013604c>] getnstimeofday+0x37/0xbc
 [<c01344c2>] ktime_get_ts+0x22/0x49
 [<c010f91b>] apic_wait_icr_idle+0xe/0x15
 [<c0118ff8>] __resched_task+0x5c/0x5f
 [<c011b679>] try_to_wake_up+0xe8/0xf1
 [<c011845d>] __wake_up_common+0x2e/0x58
 [<c011a641>] __wake_up+0x29/0x39
 [<c013a976>] wake_futex+0x1c/0x26
 [<c013ac12>] futex_wake+0x9f/0xcd
 [<c013b695>] do_futex+0x8a/0x6ff
 [<f9b81fc0>] kvm_vm_ioctl+0x163/0x174 [kvm]
 [<c01344f6>] ktime_get+0xd/0x21
 [<c010296e>] __switch_to+0xa5/0x125
 [<c011d3bd>] hrtick_set+0x7a/0xd8
 [<f9b821c1>] kvm_vcpu_ioctl+0x0/0x34c [kvm]
 [<c017e3f0>] vfs_ioctl+0x1c/0x5d
 [<c017e67b>] do_vfs_ioctl+0x24a/0x261
 [<c017e6d3>] sys_ioctl+0x41/0x5a
 [<c0103853>] sysenter_past_esp+0x78/0xb1
 =======================
Code: 55 68 01 20 b9 f9 e8 6e b1 59 c6 0f 0b 83 c4 10 eb fe a8 01 75 24 39 e8 74 18 ff 75 04 ff 75 00 55 68 21 20 b9 f9 e8 4e b1 59 c6 <0f> 0b 83 c4 10 eb fe c7 06 00 00 00 00 eb 72 89 c2 31 ff 83 e2 EIP: [<f9b87d45>] rmap_remove+0xf5/0x17d [kvm] SS:ESP 0068:c41e9be4
---[ end trace 6823534350d8585a ]---

-- System Information:
Debian Release: 5.0
  APT prefers unstable
  APT policy: (900, 'unstable'), (500, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-1-686 (SMP w/2 CPU cores)
Locale: LANG=C, LC_CTYPE=pl_PL.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages linux-image-2.6.26-1-686 depends on:
ii  debconf [debconf-2.0]         1.5.24     Debian configuration management sy
ii  initramfs-tools [linux-initra 0.92o      tools for generating an initramfs
ii  module-init-tools             3.4-1      tools for managing Linux kernel mo

Versions of packages linux-image-2.6.26-1-686 recommends:
ii  libc6-i686                    2.7-18     GNU C Library: Shared libraries [i

Versions of packages linux-image-2.6.26-1-686 suggests:
ii  lilo                          1:22.8-7   LInux LOader - The Classic OS load
pn  linux-doc-2.6.26              <none>     (no description available)

-- debconf information excluded

--
Jakub Wilk



--- End Message ---
--- Begin Message ---
On Fri, Feb 19, 2010 at 12:15:41AM +0100, Jakub Wilk wrote:
> submitter 512538 !
> thanks
> 
> * Moritz Muehlenhoff <jmm@inutil.org>, 2010-02-18, 23:47:
> >>Package: linux-image-2.6.26-1-686
> >>Version: 2.6.26-13
> >>Severity: normal
> >>
> >>I encountered the following bug while normally using kvm:
> >
> >For Lenny you could try the separate kvm source package, maybe
> >it doesn' expose the bug.
> >
> >Is this still reproducible with 2.6.32?
> 
> I've never seen this bug triggering after the original report.

Ok, let's close it, then.

Cheers,
        Moritz


--- End Message ---

Reply to: