[Bug 72381] New: [Nested] L1 call trace when create windows 7 guest as L2 guest.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



https://bugzilla.kernel.org/show_bug.cgi?id=72381

            Bug ID: 72381
           Summary: [Nested] L1 call trace when create windows 7 guest as
                    L2 guest.
           Product: Virtualization
           Version: unspecified
    Kernel Version: 3.14.0-rc3
          Hardware: All
                OS: Linux
              Tree: Mainline
            Status: NEW
          Severity: normal
          Priority: P1
         Component: kvm
          Assignee: virtualization_kvm@xxxxxxxxxxxxxxxxxxxx
          Reporter: Robert.Hu@xxxxxxxxx
        Regression: No

Created attachment 129911
  --> https://bugzilla.kernel.org/attachment.cgi?id=129911&action=edit
L1 serial

Environment:
------------
Host OS (ia32/ia32e/IA64):ia32e
Guest OS (ia32/ia32e/IA64):ia32e
Guest OS Type (Linux/Windows):linux
kvm.git Commit:94b3ffcd41a90d2cb0b32ca23aa58a01111d5dc0
qemu.git Commit:087edb503afebf184f07078900efc26c73035e98
Host Kernel Version:3.14.0-rc3
Hardware:Romley_EP


Bug detailed description:
--------------------------
when create a windows 7 guest as L2 guest,L2 guest boot up fail, L1 guest will
call trace. ping L1 guest pass, but ssh L1 guest fail

note:
when create a rhel6u4 guest as L2 guest, L1 guest and L2 guest work fine

Reproduce steps:
----------------
1.1.create L1 guest:
qemu-system-x86_64 -enable-kvm -m 6G -smp 4 -net nic,macaddr=00:12:52:13:46:67
-net tap,script=/etc/kvm/qemu-ifup ia32e_nested_kvm.img -cpu host,level=9
2.create L2 guest:
qemu-system-x86_64 -enable-kvm -m 1G -smp 2 -net none ia32e_win7.img

Current result:
----------------
L1 call trace

Expected result:
----------------
L1 and L2 guest boot up fine.

Basic root-causing log:
----------------------
sending NMI to all CPUs:
NMI backtrace for cpu 3
CPU: 3 PID: 4186 Comm: qemu-system-x86 Not tainted 3.12.0-rc5 #2
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011
task: ffff8801b890c040 ti: ffff8801b77b8000 task.ti: ffff8801b77b8000
RIP: 0010:[<ffffffff8145dac4>]  [<ffffffff8145dac4>] _raw_spin_lock+0x20/0x24
RSP: 0018:ffff8801b77b9bc8  EFLAGS: 00000293
RAX: 0000000000006e6b RBX: ffff8801b8170080 RCX: 000000000018a337
RDX: 000000000000006e RSI: 0000000000000000 RDI: ffff8801b77dc000
RBP: ffff8801b77b9bc8 R08: 0000000000000007 R09: ffff8801b77b9c20
R10: 0000000000002900 R11: 0000000000002931 R12: 0000000000000000
R13: 000000001278f000 R14: 0000000000000000 R15: 0000000000000000
FS:  00007ff63bfff700(0000) GS:ffff8801bfd80000(0000) knlGS:fffff880009e6000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffff8a0000e7000 CR3: 00000000b1e6d000 CR4: 00000000000026e0
Stack:
 ffff8801b77b9c58 ffffffffa01c8cb3 ffff8801b77b9c27 0000000000000001
 ffff8801b77b9bf8 00ffffffa022d1bf 0000000000001b66 00000002a01b481b
 000000000001278f 000000000018a337 00000001b77b9c88 01ffffff00000000
Call Trace:
 [<ffffffffa01c8cb3>] tdp_page_fault+0x146/0x1dc [kvm]
 [<ffffffffa01c9024>] kvm_mmu_page_fault+0x22/0xc5 [kvm]
 [<ffffffffa022f10c>] handle_ept_violation+0x13d/0x149 [kvm_intel]
 [<ffffffffa02314c9>] vmx_handle_exit+0x171/0x193 [kvm_intel]
 [<ffffffffa022b14e>] ? vmx_invpcid_supported+0x18/0x18 [kvm_intel]
 [<ffffffffa01bc5ea>] vcpu_enter_guest+0x65a/0x696 [kvm]
 [<ffffffff81064030>] ? __cond_resched+0x25/0x30
 [<ffffffffa01bc6cb>] __vcpu_run+0xa5/0x262 [kvm]
 [<ffffffffa01c015c>] kvm_arch_vcpu_ioctl_run+0xef/0x1ac [kvm]
 [<ffffffffa01af04f>] kvm_vcpu_ioctl+0x121/0x4b1 [kvm]
 [<ffffffff81085b3d>] ? futex_wake+0xeb/0xfd
 [<ffffffff81464530>] ? ret_from_fork+0xb0/0xb0
 [<ffffffff8112a5a1>] do_vfs_ioctl+0x2ad/0x2c9
 [<ffffffffa01ba29b>] ? kvm_on_user_return+0x4f/0x51 [kvm]
 [<ffffffff8112a616>] SyS_ioctl+0x59/0x7d
 [<ffffffff814645a2>] system_call_fastpath+0x16/0x1b
Code: 07 38 d0 74 04 f3 90 eb f6 c9 c3 55 48 89 e5 b8 00 01 00 00 f0 66 0f c1
07 89 c2 66 c1 ea 08 38 c2 74 0a 8a 07 38 d0 74 04 f3 90 <eb> f6 c9 c3 55 48 89
e5 9c 58 fa ba 00 01 00 00 f0 66 0f c1 17

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux