Bug 885497
Summary: | kvm: spte pointer is 0xffff87fffffffffff in __direct_map | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Ferry Huberts <mailings> | ||||||||
Component: | kernel | Assignee: | Marcelo Tosatti <mtosatti> | ||||||||
Status: | CLOSED INSUFFICIENT_DATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> | ||||||||
Severity: | high | Docs Contact: | |||||||||
Priority: | unspecified | ||||||||||
Version: | 17 | CC: | gansalmon, itamar, jonathan, kernel-maint, madhu.chinakonda | ||||||||
Target Milestone: | --- | ||||||||||
Target Release: | --- | ||||||||||
Hardware: | x86_64 | ||||||||||
OS: | Linux | ||||||||||
Whiteboard: | |||||||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||||||
Doc Text: | Story Points: | --- | |||||||||
Clone Of: | Environment: | ||||||||||
Last Closed: | 2013-03-10 21:38:53 UTC | Type: | Bug | ||||||||
Regression: | --- | Mount Type: | --- | ||||||||
Documentation: | --- | CRM: | |||||||||
Verified Versions: | Category: | --- | |||||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||||
Embargoed: | |||||||||||
Attachments: |
|
Description
Ferry Huberts
2012-12-09 21:00:54 UTC
Created attachment 660425 [details]
backtrace photo 2
Created attachment 660426 [details]
backtrace photo 1
Marcelo, any thoughts on this one? To confirm, the hypervisor (level 1 guest) and also level 2 guest are 64 bit? yes Hi Ferry, Two questions: 1) Is the problem reproducible? Can you attempt to reproduce it, please? 2) Can you have an overnight memtest86 run to verify memory? Thanks Marcello, sorry but I really have no time this week to try to reproduce it. I thought it way reasonably reproducible for the setup I described. Maybe next week, then I have some time in the evenings Ferry, can you at least run memtest86, please? (its quite easy to do that, no need for setup VMs or anything). The error is access to invalid shadow page table pointer at 0xffff87ffffffffff. This is -1 with bits 43-46 cleared. Either the hardware or software are corrupting memory. In fact it has to be memory corruption because its not possible for KVM to setup an spte pointer with 0xffff87ffffffffff. It could be a driver, or hardware. You can try slub_debug=ZFPU kernel option to track software induced memory corruption. Created attachment 694984 [details] memtest overnight run In reply to comment 8: I finally ran memtest overnight, see the attachment. No errors, so it's probably not a hardware problem Ok, can add the following to your kernel boot options slub_debug=ZFPU And attempt to reproduce? Hopefully that will catch the corruptor. note: that slub_debug option will only take effect if you install the kernel-debug package. The regular kernel build doesn't have that enabled. Closing bug as insufficient data as this is provably not a KVM bug but memory corruption (see comment #8), corruption caused either by software or hardware. Please reopen the bug if output from slub_debug enabled kernel-debug kernel package is available for the crash. |