Re: Linux x86 guest panics in skb_copy_bits

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, May 6, 2009 at 5:16 PM, Marcelo Tosatti <mtosatti@xxxxxxxxxx> wrote:
> Justin,
[snip]
> OK, so you're original report contains a different bug. You can disable
> CONFIG_KVM_GUEST in the meantime as a workaround, until the bug is
> fixed.
>

Disabling CONFIG_KVM_GUEST gives me a new panic.  I'm going to try
disabling SMP.

[   71.470022] ------------[ cut here ]------------
[   71.470022] WARNING: at kernel/smp.c:333 smp_call_function_mask+0x33/0x185()
[   71.470022] Modules linked in:
[   71.470022] Pid: 4618, comm: ruby18 Tainted: G      D    2.6.28-gentoo-r4 #3
[   71.470022] Call Trace:
[   71.470022]  [<c022735a>] warn_on_slowpath+0x41/0x5b
[   71.470022]  [<c03ada5e>] ? __delay+0x9/0xb
[   71.470022]  [<c0405af6>] ? serial8250_console_write+0xd6/0xea
[   71.470022]  [<c03b12f7>] ? _raw_spin_unlock+0x8e/0x92
[   71.470022]  [<c0586f9c>] ? _spin_unlock+0x1d/0x20
[   71.470022]  [<c03b1457>] ? _raw_spin_lock+0x60/0xf5
[   71.470022]  [<c023af8e>] ? up+0x2b/0x2f
[   71.470022]  [<c03b12f7>] ? _raw_spin_unlock+0x8e/0x92
[   71.470022]  [<c022797f>] ? release_console_sem+0x185/0x198
[   71.470022]  [<c03b12f7>] ? _raw_spin_unlock+0x8e/0x92
[   71.470022]  [<c022798a>] ? release_console_sem+0x190/0x198
[   71.470022]  [<c0246630>] smp_call_function_mask+0x33/0x185
[   71.470022]  [<c02100e4>] ? stop_this_cpu+0x0/0x50
[   71.470022]  [<c0585ca3>] ? mutex_unlock+0x8/0xa
[   71.470022]  [<c0585ca3>] ? mutex_unlock+0x8/0xa
[   71.470022]  [<c024f4cd>] ? crash_kexec+0x9f/0xa7
[   71.470022]  [<c0585ca3>] ? mutex_unlock+0x8/0xa
[   71.470022]  [<c024f4cd>] ? crash_kexec+0x9f/0xa7
[   71.470022]  [<c0246794>] smp_call_function+0x12/0x14
[   71.470022]  [<c0210183>] native_smp_send_stop+0x1b/0x45
[   71.470022]  [<c02273d0>] panic+0x4e/0xef
[   71.470022]  [<c0587e2e>] oops_end+0x8f/0xa3
[   71.470022]  [<c0205c87>] die+0x57/0x5f
[   71.470022]  [<c0589477>] do_page_fault+0x63e/0x6fa
[   71.470022]  [<c0268c84>] ? __alloc_pages_internal+0xad/0x33a
[   71.470022]  [<c0588e39>] ? do_page_fault+0x0/0x6fa
[   71.470022]  [<c05874fa>] error_code+0x72/0x78
[   71.470022]  [<c02856a9>] ? __slab_alloc+0x217/0x42f
[   71.470022]  [<c02867a5>] __kmalloc_track_caller+0x89/0xda
[   71.470022]  [<c04b6782>] ? __netdev_alloc_skb+0x17/0x34
[   71.470022]  [<c04b6782>] ? __netdev_alloc_skb+0x17/0x34
[   71.470022]  [<c04b5948>] __alloc_skb+0x4f/0xfb
[   71.470022]  [<c04b6782>] __netdev_alloc_skb+0x17/0x34
[   71.470022]  [<c0452583>] try_fill_recv+0x30/0x177
[   71.470022]  [<c0221a45>] ? try_to_wake_up+0x200/0x20b
[   71.470022]  [<c0453237>] virtnet_poll+0x25c/0x309
[   71.470022]  [<c04bc32e>] net_rx_action+0xbd/0x1ea
[   71.470022]  [<c022b2ed>] __do_softirq+0x83/0x12e
[   71.470022]  [<c022b3e0>] do_softirq+0x48/0x57
[   71.470022]  [<c022b6fa>] irq_exit+0x38/0x6d
[   71.470022]  [<c0205868>] do_IRQ+0x96/0xae
[   71.470022]  [<c020471b>] common_interrupt+0x23/0x28
[   71.470022]  [<c03b00d8>] ? sg_miter_start+0x14/0x3b
[   71.470022]  [<c02681a1>] ? free_hot_cold_page+0x12f/0x1ef
[   71.470022]  [<c0268298>] free_hot_page+0xa/0xc
[   71.470022]  [<c026b6ef>] put_page+0xd2/0xd7
[   71.470022]  [<c027bd56>] free_page_and_swap_cache+0x32/0x38
[   71.470022]  [<c0271dfc>] unmap_vmas+0x3fd/0x698
[   71.470022]  [<c03b1457>] ? _raw_spin_lock+0x60/0xf5
[   71.470022]  [<c02758f4>] unmap_region+0x8e/0xf5
[   71.470022]  [<c02762ad>] do_munmap+0x188/0x1de
[   71.470022]  [<c02771b5>] sys_munmap+0x30/0x3f
[   71.470022]  [<c0203bd2>] syscall_call+0x7/0xb
[   71.470022] ---[ end trace 7e1609da76631ce2 ]---


-- 
Justin Dossey
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux