https://bugzilla.kernel.org/show_bug.cgi?id=218792 Bug ID: 218792 Summary: Guest call trace with mwait enabled Product: Virtualization Version: unspecified Hardware: Intel OS: Linux Status: NEW Severity: normal Priority: P3 Component: kvm Assignee: virtualization_kvm@xxxxxxxxxxxxxxxxxxxx Reporter: farrah.chen@xxxxxxxxx Regression: No Environment: host/guest kernel: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master e67572cd220(v6.9-rc6) QEMU: https://gitlab.com/qemu-project/qemu.git master 5c6528dce86d Host/Guest OS: Centos stream9/Ubuntu24.04 Bug detail description: Boot Guest with mwait enabled(-overcommit cpu-pm=on), guest call trace "unchecked MSR access error" Reproduce steps: img=centos9.qcow2 qemu-system-x86_64 \ -name legacy,debug-threads=on \ -overcommit cpu-pm=on \ -accel kvm -smp 8 -m 8G -cpu host \ -drive file=${img},if=none,id=virtio-disk0 \ -device virtio-blk-pci,drive=virtio-disk0 \ -device virtio-net-pci,netdev=nic0 -netdev user,id=nic0,hostfwd=tcp::10023-:22 \ -vnc :1 -serial stdio Guest boot with call trace: [ 0.475344] unchecked MSR access error: RDMSR from 0xe2 at rIP: 0xffffffffb5a966b8 (native_read_msr+0x8/0x40) [ 0.476465] Call Trace: [ 0.476763] <TASK> [ 0.477027] ? ex_handler_msr+0x128/0x140 [ 0.477460] ? fixup_exception+0x166/0x3c0 [ 0.477934] ? exc_general_protection+0xdc/0x3c0 [ 0.478481] ? asm_exc_general_protection+0x26/0x30 [ 0.479052] ? __pfx_intel_idle_init+0x10/0x10 [ 0.479587] ? native_read_msr+0x8/0x40 [ 0.480057] intel_idle_init_cstates_icpu.constprop.0+0x5e/0x560 [ 0.480747] ? __pfx_intel_idle_init+0x10/0x10 [ 0.481275] intel_idle_init+0x161/0x360 [ 0.481742] do_one_initcall+0x45/0x220 [ 0.482209] do_initcalls+0xac/0x130 [ 0.482643] kernel_init_freeable+0x134/0x1e0 [ 0.483159] ? __pfx_kernel_init+0x10/0x10 [ 0.483648] kernel_init+0x1a/0x1c0 [ 0.484087] ret_from_fork+0x31/0x50 [ 0.484541] ? __pfx_kernel_init+0x10/0x10 [ 0.485030] ret_from_fork_asm+0x1a/0x30 [ 0.485462] </TASK> -- You may reply to this email to add a comment. You are receiving this mail because: You are watching the assignee of the bug.