|
From: | yezengruan |
Subject: | [Qemu-arm] panic in virtio_gpu in guest centos7.5 |
Date: | Tue, 20 Nov 2018 12:50:41 +0000 |
Hi, all When I run qemu (2.8.1 or 3.0.0) with guest os centos 7.5(kernel 4.14.0-49.el7a.aarch64), I got panic in virtio_gpu. My test steps are as
follows: 1) Start the centos 7.5 virtual machine. 2) Enter a bunch of commands in VNC. 3) After enter 'top' command in VNC, continuously enter shift + page up or page down several times. I got this kernel panic almost every time: [ 99.874515] Unable to handle kernel paging request at virtual address ffff00000eae0960 [ 99.874517] Mem abort info: [ 99.874518] Exception class = DABT (current EL), IL = 32 bits [ 99.874519] SET = 0, FnV = 0 [ 99.874520] EA = 0, S1PTW = 0 [ 99.874521] Data abort info: [ 99.874522] ISV = 0, ISS = 0x00000047 [ 99.874522] CM = 0, WnR = 1 [ 99.874525] swapper pgtable: 64k pages, 48-bit VAs, pgd = ffff000009660000 [ 99.874526] [ffff00000eae0960] *pgd=00000000bffe0003, *pud=00000000bffe0003, *pmd=00000000bffd0003, *pte=0000000000000000 [ 99.874532] Internal error: Oops: 96000047 [#1] SMP [ 99.874535] Modules linked in: vfat fat crc32_ce ghash_ce sha2_ce sha256_arm64 sha1_ce virtio_net sg virtio_balloon ip_tables ext4 mbcache jbd2 virtio_gpu
drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm virtio_scsi i2c_core virtio_pci virtio_mmio virtio_ring virtio [ 99.874560] CPU: 0 PID: 1062 Comm: top Not tainted 4.14.0-49.el7a.aarch64 #1 [ 99.874561] Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 [ 99.874562] task: ffff800033841100 task.stack: ffff00000f6c0000 [ 99.874567] PC is at sys_imageblit+0x40c/0x10000 [sysimgblt] [ 99.874589] LR is at drm_fb_helper_sys_imageblit+0x28/0x4c [drm_kms_helper] [ 99.874590] pc : [<ffff00000171040c>] lr : [<ffff000001872e74>] pstate: 00000005 [ 99.874591] sp : ffff00000f6cf7f0 [ 99.874592] x29: ffff00000f6cf7f0 x28: 00000000000001ff
[ 99.874594] x27: ffff80002133c400 x26: 0000000000000001
[ 99.874596] x25: 00000000000001a8 x24: 0000000000000018
[ 99.874598] x23: 0000000000000000 x22: ffff00000f6cf978
[ 99.874600] x21: ffff00000eae0960 x20: 0000000000000000
[ 99.874602] x19: ffff80002a20e800 x18: 0000ffffcad019c0
[ 99.874603] x17: 0000000000000000 x16: 0000000000000000
[ 99.874605] x15: 0000000000000008 x14: 2033302e30303a30
[ 99.874607] x13: 00000000000001a8 x12: 0000000000000035
[ 99.874608] x11: 000000000000000f x10: ffff80002762e7c0
[ 99.874610] x9 : 0000000000aaaaaa x8 : 0000000000000001
[ 99.874612] x7 : ffff000001720090 x6 : 0000000000000001
[ 99.874613] x5 : 0000000000000000 x4 : 0000000000000000
[ 99.874615] x3 : ffff80002762e7c0 x2 : ffff00000eae0960
[ 99.874617] x1 : 00000000000001a7 x0 : 0000000000000007
[ 99.874619] Process top (pid: 1062, stack limit = 0xffff00000f6c0000) [ 99.874620] Call trace: [ 99.874622] Exception stack(0xffff00000f6cf6b0 to 0xffff00000f6cf7f0) [ 99.874624] f6a0: 0000000000000007 00000000000001a7 [ 99.874625] f6c0: ffff00000eae0960 ffff80002762e7c0 0000000000000000 0000000000000000 [ 99.874627] f6e0: 0000000000000001 ffff000001720090 0000000000000001 0000000000aaaaaa [ 99.874628] f700: ffff80002762e7c0 000000000000000f 0000000000000035 00000000000001a8 [ 99.874629] f720: 2033302e30303a30 0000000000000008 0000000000000000 0000000000000000 [ 99.874631] f740: 0000ffffcad019c0 ffff80002a20e800 0000000000000000 ffff00000eae0960 [ 99.874632] f760: ffff00000f6cf978 0000000000000000 0000000000000018 00000000000001a8 [ 99.874633] f780: 0000000000000001 ffff80002133c400 00000000000001ff ffff00000f6cf7f0 [ 99.874635] f7a0: ffff000001872e74 ffff00000f6cf7f0 ffff00000171040c 0000000000000005 [ 99.874636] f7c0: ffff80002b23ed08 ffff0000019110e8 0001000000000000 0000000000000000 [ 99.874637] f7e0: ffff00000f6cf7f0 ffff00000171040c [ 99.874639] [<ffff00000171040c>] sys_imageblit+0x40c/0x10000 [sysimgblt] [ 99.874659] [<ffff000001872e74>] drm_fb_helper_sys_imageblit+0x28/0x4c [drm_kms_helper] [ 99.874668] [<ffff0000019112dc>] virtio_gpu_3d_imageblit+0x2c/0x78 [virtio_gpu] [ 99.874674] [<ffff00000847f458>] bit_putcs+0x288/0x49c [ 99.874675] [<ffff00000847ad24>] fbcon_putcs+0x114/0x148 [ 99.874678] [<ffff0000084fe92c>] do_update_region+0x118/0x19c [ 99.874680] [<ffff00000850413c>] do_con_trol+0x114c/0x1314 [ 99.874682] [<ffff0000085044dc>] do_con_write.part.22+0x1d8/0x890 [ 99.874684] [<ffff000008504c88>] con_write+0x84/0x8c [ 99.874686] [<ffff0000084ec7f0>] n_tty_write+0x19c/0x408 [ 99.874688] [<ffff0000084e9120>] tty_write+0x150/0x270 [ 99.874691] [<ffff00000829d558>] __vfs_write+0x58/0x180 [ 99.874693] [<ffff00000829d880>] vfs_write+0xa8/0x1a0 [ 99.874695] [<ffff00000829db40>] SyS_write+0x60/0xc0 [ 99.874696] Exception stack(0xffff00000f6cfec0 to 0xffff00000f6d0000) [ 99.874697] fec0: 0000000000000001 0000000000457958 0000000000000800 0000000000000000 [ 99.874699] fee0: 00000000fbad2885 0000000000000bd0 0000ffff9b66add4 0000000000000000 [ 99.874700] ff00: 0000000000000040 0000000000000000 0000000000434a88 0000000000000012 [ 99.874702] ff20: 0000000100000000 0000ffffcad01840 0000000000414b60 0000000000000008 [ 99.874703] ff40: 0000000000000000 0000ffff9b693b1c 0000ffffcad019c0 0000000000000800 [ 99.874704] ff60: 0000000000457958 0000ffff9b7a1158 0000000000000800 0000ffff9b820000 [ 99.874706] ff80: 0000000000000000 0000ffff9b7f604c 0000000000000000 0000000000436000 [ 99.874707] ffa0: 000000003b239440 0000ffffcad02270 0000ffff9b6965f4 0000ffffcad02270 [ 99.874708] ffc0: 0000ffff9b6f12c8 0000000020000000 0000000000000001 0000000000000040 [ 99.874710] ffe0: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 [ 99.874713] [<ffff00000808359c>] __sys_trace_return+0x0/0x4 [ 99.874716] Code: 0a080084 b86478e4 0a040124 4a050084 (b9000044)
[ 99.874720] ---[ end trace 84740cdbe2a06801 ]--- [ 99.874722] Kernel panic - not syncing: Fatal exception [ 99.874726] Kernel Offset: disabled [ 99.874728] CPU features: 0x1802008 [ 99.874729] Memory Limit: none [ 100.024516] ---[ end Kernel panic - not syncing: Fatal exception
欧拉五部 叶增软 00379943
address@hidden
华为技术有限公司
Huawei Technologies Co., Ltd. 本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁 |
[Prev in Thread] | Current Thread | [Next in Thread] |