On Fri, May 26, 2023 at 09:43:17AM +0200, Fabio Coatti wrote: > Hi all, > I'm using vanilla kernels on a gentoo-based laptop and since 6.3.2 I'm > getting the kernel log below when using kvm VM on my box. > I know, kernel is tainted but avoiding to load nvidia driver could > make things complicated on my side; if needed for debug I can try to > avoid it. > > Not sure which other infos can be relevant in this context; if you > need more details just let me know, happy to provide them. > > [Fri May 26 09:16:35 2023] ------------[ cut here ]------------ > [Fri May 26 09:16:35 2023] WARNING: CPU: 5 PID: 4684 at > kvm_nx_huge_page_recovery_worker+0x38c/0x3d0 [kvm] > [Fri May 26 09:16:35 2023] Modules linked in: vhost_net vhost > vhost_iotlb tap tun tls rfcomm snd_hrtimer snd_seq xt_CHECKSUM > algif_skcipher xt_MASQUERADE xt_conntrack ipt_REJECT nf_reject_ipv4 > ip6table_mangle ip6table_nat ip6table_filter ip6_tables iptable_mangle > iptable_nat nf_nat iptable_filter ip_tables bpfilter bridge stp llc > rmi_smbus rmi_core bnep squashfs sch_fq_codel nvidia_drm(POE) > intel_rapl_msr vboxnetadp(OE) vboxnetflt(OE) nvidia_modeset(POE) > mei_pxp mei_hdcp rtsx_pci_sdmmc vboxdrv(OE) mmc_core intel_rapl_common > intel_pmc_core_pltdrv intel_pmc_core snd_ctl_led intel_tcc_cooling > snd_hda_codec_realtek snd_hda_codec_generic x86_pkg_temp_thermal > intel_powerclamp btusb btrtl snd_usb_audio btbcm btmtk kvm_intel > btintel snd_hda_intel snd_intel_dspcfg snd_usbmidi_lib snd_hda_codec > snd_rawmidi snd_hwdep bluetooth snd_hda_core snd_seq_device kvm > snd_pcm thinkpad_acpi iwlmvm mousedev ledtrig_audio uvcvideo snd_timer > ecdh_generic irqbypass crct10dif_pclmul crc32_pclmul polyval_clmulni > snd think_lmi joydev mei_me ecc uvc > [Fri May 26 09:16:35 2023] polyval_generic rtsx_pci iwlwifi > firmware_attributes_class psmouse wmi_bmof soundcore intel_pch_thermal > mei platform_profile input_leds evdev nvidia(POE) coretemp hwmon > akvcam(OE) videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 videodev > videobuf2_common mc loop nfsd auth_rpcgss nfs_acl efivarfs dmi_sysfs > dm_zero dm_thin_pool dm_persistent_data dm_bio_prison dm_service_time > dm_round_robin dm_queue_length dm_multipath dm_delay virtio_pci > virtio_pci_legacy_dev virtio_pci_modern_dev virtio_blk virtio_console > virtio_balloon vxlan ip6_udp_tunnel udp_tunnel macvlan virtio_net > net_failover failover virtio_ring virtio fuse overlay nfs lockd grace > sunrpc linear raid10 raid1 raid0 dm_raid raid456 async_raid6_recov > async_memcpy async_pq async_xor async_tx md_mod dm_snapshot dm_bufio > dm_crypt trusted asn1_encoder tpm rng_core dm_mirror dm_region_hash > dm_log firewire_core crc_itu_t hid_apple usb_storage ehci_pci ehci_hcd > sr_mod cdrom ahci libahci libata > [Fri May 26 09:16:35 2023] CPU: 5 PID: 4684 Comm: kvm-nx-lpage-re > Tainted: P U OE 6.3.4-cova #1 > [Fri May 26 09:16:35 2023] Hardware name: LENOVO > 20EQS58500/20EQS58500, BIOS N1EET98W (1.71 ) 12/06/2022 > [Fri May 26 09:16:35 2023] RIP: > 0010:kvm_nx_huge_page_recovery_worker+0x38c/0x3d0 [kvm] > [Fri May 26 09:16:35 2023] Code: 48 8b 44 24 30 4c 39 e0 0f 85 1b fe > ff ff 48 89 df e8 2e ab fb ff e9 23 fe ff ff 49 bc ff ff ff ff ff ff > ff 7f e9 fb fc ff ff <0f> 0b e9 1b ff ff ff 48 8b 44 24 40 65 48 2b 04 > 25 28 00 00 00 75 > [Fri May 26 09:16:35 2023] RSP: 0018:ffff8e1a4403fe68 EFLAGS: 00010246 > [Fri May 26 09:16:35 2023] RAX: 0000000000000000 RBX: ffff8e1a42bbd000 > RCX: 0000000000000000 > [Fri May 26 09:16:35 2023] RDX: 0000000000000000 RSI: 0000000000000000 > RDI: 0000000000000000 > [Fri May 26 09:16:35 2023] RBP: ffff8b4e9a56d930 R08: 0000000000000000 > R09: ffff8b4e9a56d8a0 > [Fri May 26 09:16:35 2023] R10: 0000000000000000 R11: 0000000000000001 > R12: ffff8e1a4403fe98 > [Fri May 26 09:16:35 2023] R13: 0000000000000001 R14: ffff8b4d9c432e80 > R15: 0000000000000010 > [Fri May 26 09:16:35 2023] FS: 0000000000000000(0000) > GS:ffff8b5cdf740000(0000) knlGS:0000000000000000 > [Fri May 26 09:16:35 2023] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > [Fri May 26 09:16:35 2023] CR2: 00007efeac53d000 CR3: 0000000978c2c003 > CR4: 00000000003726e0 > [Fri May 26 09:16:35 2023] Call Trace: > [Fri May 26 09:16:35 2023] <TASK> > [Fri May 26 09:16:35 2023] ? > __pfx_kvm_nx_huge_page_recovery_worker+0x10/0x10 [kvm] > [Fri May 26 09:16:35 2023] kvm_vm_worker_thread+0x106/0x1c0 [kvm] > [Fri May 26 09:16:35 2023] ? __pfx_kvm_vm_worker_thread+0x10/0x10 [kvm] > [Fri May 26 09:16:35 2023] kthread+0xd9/0x100 > [Fri May 26 09:16:35 2023] ? __pfx_kthread+0x10/0x10 > [Fri May 26 09:16:35 2023] ret_from_fork+0x2c/0x50 > [Fri May 26 09:16:35 2023] </TASK> > [Fri May 26 09:16:35 2023] ---[ end trace 0000000000000000 ]--- Thanks for the regression report. I'm adding it to regzbot: #regzbot ^introduced: v6.3.1..v6.3.2 #regzbot title: WARNING trace at kvm_nx_huge_page_recovery_worker when opening a new tab in Chrome Fabio, can you also check the mainline (on guest)? -- An old man doll... just what I always wanted! - Clara
Attachment:
signature.asc
Description: PGP signature