lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Sat, 1 Aug 2009 17:26:16 -0400
From:	Theodore Tso <tytso@....edu>
To:	linux-kernel@...r.kernel.org
Cc:	avi@...hat.com
Subject: Problems with CONFIG_KVM_GUEST?

Using the XFS QA regression test suites to test ext4, I reliably get
lock-ups and OOPS's with I run a kernel using KVM with
CONFIG_KVM_GUEST configured.  This is with 2.6.31-rc3 and 2.6.31-rc4.  

The problems disappear if I turn off CONFIG_KVM_GUEST; the XFS tests
run without problem to completion once I turn this configuration
option off.  That's what I'll do for now, but if someone could look
into this, I'd appreciate it.

The KVM command-line which I am using is:

/usr/local/bin/qemu-system-x86_64 /kbuild/root_fs.img -net nic,model=ne2k_pci -net tap \
	-hdb /dev/closure/test-4k -hdc /dev/closure/scratch \
	-hdd /dev/closure/test-1k -serial telnet::4444,server -smp 2 -m 512 \
	--kernel /kbuild/ext4/arch/x86/boot/bzImage \
	--append "root=0800 console=ttyS0,115200 console=tty0"

... and here's a typical soft lockup report

[ 2666.103359] BUG: soft lockup - CPU#1 stuck for 61s! [sh:21485]
[ 2666.103359] Modules linked in:
[ 2666.112563] irq event stamp: 183767754
[ 2666.112563] hardirqs last  enabled at (183767753): [<c011ce56>] restore_all_notrace+0x0/0x18
[ 2666.112563] hardirqs last disabled at (183767754): [<c011d774>] apic_timer_interrupt+0x28/0x34
[ 2666.112563] softirqs last  enabled at (183758120): [<c01515c8>] __do_softirq+0x162/0x16a
[ 2666.112563] softirqs last disabled at (183758115): [<c011ed17>] do_softirq+0x68/0xc1
[ 2666.112563] 
[ 2666.112563] Pid: 21485, comm: sh Not tainted (2.6.31-rc3 #270) 
[ 2666.112563] EIP: 0060:[<c01bb04f>] EFLAGS: 00010282 CPU: 1
[ 2666.112563] EIP is at handle_mm_fault+0x102/0x82e
[ 2666.112563] EAX: d5028110 EBX: 00000000 ECX: 00000110 EDX: d5028110
[ 2666.112563] ESI: 00000007 EDI: c11a6000 EBP: d51d7f2c ESP: d51d7ed8
[ 2666.112563]  DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
[ 2666.112563] CR0: 8005003b CR2: d5028110 CR3: 1f93d000 CR4: 000006f0
[ 2666.112563] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[ 2666.112563] DR6: ffff0ff0 DR7: 00000400
[ 2666.112563] Call Trace:
[ 2666.112563]  [<c0161f7e>] ? down_read_trylock+0x39/0x43
[ 2666.112563]  [<c0625252>] do_page_fault+0x307/0x31d
[ 2666.112563]  [<c0624f4b>] ? do_page_fault+0x0/0x31d
[ 2666.112563]  [<c06235bb>] error_code+0x6b/0x70
[ 2666.112563]  [<c0624f4b>] ? do_page_fault+0x0/0x31d
[ 2666.112563]  [<c0345ca5>] ? __put_user_4+0x11/0x18
[ 2666.112563]  [<c014610a>] ? schedule_tail+0x4f/0x52
[ 2666.112563]  [<c011cc46>] ret_from_fork+0x6/0x1c

							- Ted
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ