http://bugzilla.opensuse.org/show_bug.cgi?id=967617 Bug ID: 967617 Summary: GPF in vmx_get_segment_register+0x14e/0x450 Classification: openSUSE Product: openSUSE Distribution Version: Leap 42.1 Hardware: x86-64 OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Xen Assignee: xen-bugs@suse.de Reporter: jblunck@opensuse.org QA Contact: qa-bugs@suse.de Found By: --- Blocker: --- This is a nested Xen under KVM. (d1) HVM Loader (d1) Detected Xen v4.5.2_04-9 (d1) Xenbus rings @0xfeffc000, event channel 1 (d1) System requested SeaBIOS (d1) CPU speed is 1800 MHz (d1) Relocating guest memory for lowmem MMIO space disabled (XEN) irq.c:270: Dom1 PCI link 0 changed 0 -> 5 (d1) PCI-ISA link 0 routed to IRQ5 (XEN) irq.c:270: Dom1 PCI link 1 changed 0 -> 10 (d1) PCI-ISA link 1 routed to IRQ10 (XEN) irq.c:270: Dom1 PCI link 2 changed 0 -> 11 (d1) PCI-ISA link 2 routed to IRQ11 (XEN) irq.c:270: Dom1 PCI link 3 changed 0 -> 5 (d1) PCI-ISA link 3 routed to IRQ5 (d1) pci dev 01:2 INTD->IRQ5 (d1) pci dev 01:3 INTA->IRQ10 (d1) pci dev 02:0 INTA->IRQ11 (d1) pci dev 04:0 INTA->IRQ5 (d1) No RAM in high memory; setting high_mem resource base to 100000000 (d1) pci dev 03:0 bar 10 size 002000000: 0f0000008 (d1) pci dev 02:0 bar 14 size 001000000: 0f2000008 (d1) pci dev 04:0 bar 30 size 000040000: 0f3000000 (d1) pci dev 03:0 bar 30 size 000010000: 0f3040000 (d1) pci dev 03:0 bar 14 size 000001000: 0f3050000 (d1) pci dev 02:0 bar 10 size 000000100: 00000c001 (d1) pci dev 04:0 bar 10 size 000000100: 00000c101 (d1) pci dev 04:0 bar 14 size 000000100: 0f3051000 (d1) pci dev 01:2 bar 20 size 000000020: 00000c201 (d1) pci dev 01:1 bar 20 size 000000010: 00000c221 (d1) Multiprocessor initialisation: (d1) - CPU0 ... 40-bit phys ... fixed MTRRs ... var MTRRs [1/8] ... done. (d1) - CPU1 ... 40-bit phys ... fixed MTRRs ... var MTRRs [1/8] ... done. (d1) Testing HVM environment: (XEN) ----[ Xen-4.5.2_04-9 x86_64 debug=n Not tainted ]---- (XEN) CPU: 1 (XEN) RIP: e008:[<ffff82d0801dd07e>] vmx_get_segment_register+0x14e/0x450 (XEN) RFLAGS: 0000000000010202 CONTEXT: hypervisor (d1v0) (XEN) rax: ffff82d0801dd068 rbx: ffff830234717c44 rcx: fffffffffffa8aa8 (XEN) rdx: 0000000000000000 rsi: 0000000000000000 rdi: ffff8300bfc95000 (XEN) rbp: ffff8300bfc95000 rsp: ffff830234717b80 r8: 0000000000000003 (XEN) r9: 0000000000000000 r10: 0000000b8d703227 r11: 0000000000000004 (XEN) r12: 0000000000000000 r13: ffff830234710000 r14: 0000000000004802 (XEN) r15: 0000000000000018 cr0: 0000000080050033 cr4: 00000000003526f0 (XEN) cr3: 0000000239b37000 cr2: 0000000000000000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: e008 (XEN) Xen stack trace from rsp=ffff830234717b80: (XEN) ffff830234717f18 ffff82d080275b80 0000000000000001 ffff830234717c44 (XEN) ffff830234717f18 ffff830239c26250 ffff830234710000 ffff83013ace6e00 (XEN) ffff8301c09bc000 ffff82d0801b5dd5 ffff830234717c08 ffff82d0801b5e2f (XEN) ffff830234717c10 ffff830234717c08 ffff8300bfc95000 ffff82d0801c3c0e (XEN) ffff82d0801c3c4b ffff830234717f18 ffff830234717f18 0000002000000001 (XEN) 0000000080218901 0000000000000000 00bfd989c2896cf3 0ffc6cf3fd006010 (XEN) 0000000000104d65 0c9b001800000010 00000000ffffffff 0c93002000000000 (XEN) 00000000ffffffff 0000000000000000 0000000080000011 0c93002000000000 (XEN) 00000000ffffffff 0000000100000000 0000000000000000 ffff82d08011f0b6 (XEN) 0000000000000000 0000000000000001 000000000000001e ffff8300bfc95000 (XEN) 0000000000000000 0000000080000011 0000000000000000 ffff8300bfc95000 (XEN) 0000000000000000 0000000000000001 0000000000000000 0000000000000000 (XEN) ffff82d08012ad00 0000000000000020 0000000000000001 ffff82d000000000 (XEN) ffff82d08011f6d6 ffff8300bfc95000 ffff8301c09bc000 ffff82d0801c3efa (XEN) ffff8300bfc95000 ffff83013ace6eb0 ffff8300bfc95000 ffff82d0801badee (XEN) 0000000000000002 ffff8300bfc95000 ffff8300bfafd000 0000000000000001 (XEN) ffff82d080387820 0000000000000001 ffff82d080387820 ffff82d0801dc2bf (XEN) ffff8300bfc95000 ffff82d080164382 0000000000000002 0000000000000000 (XEN) ffff82d0801704b5 0000000000000206 ffff82d0801283af ffff82d08012ad49 (XEN) ffff82d08012d57b ffff83023471e080 ffff82d080387820 0000000000000206 (XEN) Xen call trace: (XEN) [<ffff82d0801dd07e>] vmx_get_segment_register+0x14e/0x450 (XEN) [<ffff82d0801b5dd5>] hvmemul_get_seg_reg+0x55/0x60 (XEN) [<ffff82d0801b5e2f>] hvm_emulate_prepare+0x4f/0x70 (XEN) [<ffff82d0801c3c0e>] handle_mmio+0x2e/0xd0 (XEN) [<ffff82d0801c3c4b>] handle_mmio+0x6b/0xd0 (XEN) [<ffff82d08011f0b6>] csched_vcpu_wake+0x2f6/0x470 (XEN) [<ffff82d08012ad00>] _spin_lock+0x20/0x50 (XEN) [<ffff82d08011f6d6>] csched_schedule+0x4a6/0x890 (XEN) [<ffff82d0801c3efa>] hvm_io_assist+0xca/0xe0 (XEN) [<ffff82d0801badee>] hvm_do_resume+0xee/0x200 (XEN) [<ffff82d0801dc2bf>] vmx_do_resume+0xaf/0x160 (XEN) [<ffff82d080164382>] context_switch+0x152/0xf20 (XEN) [<ffff82d0801704b5>] do_IRQ+0x295/0x680 (XEN) [<ffff82d0801283af>] vcpu_wake+0x10f/0x380 (XEN) [<ffff82d08012ad49>] _spin_lock_irqsave+0x9/0x10 (XEN) [<ffff82d08012d57b>] add_entry+0x4b/0xb0 (XEN) [<ffff82d0801269ae>] vcpu_periodic_timer_work+0xe/0x80 (XEN) [<ffff82d08012726a>] schedule+0x24a/0x590 (XEN) [<ffff82d08012a50b>] __do_softirq+0x5b/0x90 (XEN) [<ffff82d080160eb5>] idle_loop+0x25/0x50 (XEN) (XEN) (XEN) **************************************** (XEN) Panic on CPU 1: (XEN) GENERAL PROTECTION FAULT (XEN) [error_code=0000] (XEN) **************************************** (XEN) (XEN) Reboot in five seconds... -- You are receiving this mail because: You are on the CC list for the bug.