[ kvm-Bugs-2763707 ] Soft lockup after migration in 64 bit SMP RHEL 5.3 guest

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Bugs item #2763707, was opened at 2009-04-15 00:53
Message generated for change (Comment added) made by subhraveti
You can respond by visiting: 
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=2763707&group_id=180599

Please note that this message will contain a full copy of the comment thread,
including the initial issue submission, for this request,
not just the latest update.
Category: None
Group: None
Status: Open
Resolution: None
Priority: 5
Private: No
Submitted By: Dinesh K Subhraveti (subhraveti)
Assigned to: Nobody/Anonymous (nobody)
Summary: Soft lockup after migration in 64 bit SMP RHEL 5.3 guest

Initial Comment:
kvm: kvm-84-6607-ga317a1e
kvm-userspace: kvm-84-519-ge97260d

modinfo kvm:

filename:       /lib/modules/2.6.27.11-1-default/extra/kvm.ko
license:        GPL
author:         Qumranet
version:        kvm-84-6607-ga317a1e
srcversion:     71C29061F9E400B2E7EE646
depends:
vermagic:       2.6.27.11-1-default SMP mod_unload modversions
parm:           oos_shadow:bool

modinfo kvm-intel:

filename:       /lib/modules/2.6.27.11-1-default/extra/kvm-intel.ko
license:        GPL
author:         Qumranet
version:        kvm-84-6607-ga317a1e
srcversion:     4406015C2969CA7636B2C95
depends:        kvm
vermagic:       2.6.27.11-1-default SMP mod_unload modversions
parm:           bypass_guest_pf:bool
parm:           vpid:bool
parm:           flexpriority:bool
parm:           ept:bool
parm:           emulate_invalid_guest_state:bool

Cmdline: qemu-system-x86_64 -m 1024 -drive file=/scratch/images/RHEL5.3-Server-x86_64.raw -net tap -net nic,model=e1000,macaddr=00:FF:FE:00:00:03 -vnc :21 -boot cd -monitor stdio -smp 4 -incoming tcp:0:10000



----------------------------------------------------------------------

>Comment By: Dinesh K Subhraveti (subhraveti)
Date: 2009-04-16 01:27

Message:
Please see the attachment containing the guest printks:

hda: dma_timer_expiry: dma status == 0x24
hda: DMA interrupt recovery
hda: lost interrupt
hda: dma_timer_expiry: dma status == 0x24
hda: DMA interrupt recovery
hda: lost interrupt
hda: dma_timer_expiry: dma status == 0x24
hda: DMA interrupt recovery
hda: lost interrupt
BUG: soft lockup - CPU#0 stuck for 10s! [events/0:14]
CPU 0:
Modules linked in: autofs4 hidp rfcomm l2cap bluetooth sunrpc
ip_conntrack_netbios_ns ipt_REJECT xt_state ip_conntrack nfnetlink
iptable_filter ip_tables ip6t_REJECT xt_tcpudp ip6table_filter ip6_tables
x_tables ipv6 xfrm_nalgo crypto_api dm_multipath scsi_dh video hwmon
backlight sbs i2c_ec button battery asus_acpi acpi_memhotplug ac lp floppy
ide_cd cdrom parport_pc i2c_piix4 parport e1000 i2c_core virtio_pci pcspkr
virtio_ring virtio serio_raw dm_raid45 dm_message dm_region_hash
dm_mem_cache dm_snapshot dm_zero dm_mirror dm_log dm_mod ata_piix libata
sd_mod scsi_mod ext3 jbd uhci_hcd ohci_hcd ehci_hcd
Pid: 14, comm: events/0 Not tainted 2.6.18-128.el5 #1
RIP: 0010:[<ffffffff800759f3>]  [<ffffffff800759f3>]
__smp_call_function+0x66/0x8b
RSP: 0018:ffff810037f39d90  EFLAGS: 00000293
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 00000000000000ff RSI: 00000000000000bf RDI: 00000000000000c0
RBP: 0000000000000000 R08: 0000000000000004 R09: 000000000000003c
R10: ffff810037f39cf0 R11: ffff810036b2cc80 R12: 0000000000000000
R13: 0000000000000000 R14: 000000000000000e R15: 0000000000000286
FS:  0000000000000000(0000) GS:ffffffff803ac000(0000)
knlGS:0000000000000000
CS:  0010 DS: 0018 ES: 0018 CR0: 000000008005003b
CR2: 00002adc9d793000 CR3: 0000000034094000 CR4: 00000000000006e0

Call Trace:
 [<ffffffff800721dc>] mcheck_check_cpu+0x0/0x2f
 [<ffffffff80075b25>] smp_call_function+0x32/0x47
 [<ffffffff800721dc>] mcheck_check_cpu+0x0/0x2f
 [<ffffffff80091aa2>] on_each_cpu+0x10/0x22
 [<ffffffff8007151e>] mcheck_timer+0x1c/0x6c
 [<ffffffff8004d139>] run_workqueue+0x94/0xe4
 [<ffffffff800499ba>] worker_thread+0x0/0x122
 [<ffffffff80049aaa>] worker_thread+0xf0/0x122
 [<ffffffff8008a461>] default_wake_function+0x0/0xe
 [<ffffffff80032360>] kthread+0xfe/0x132
 [<ffffffff8005dfb1>] child_rip+0xa/0x11
 [<ffffffff80032262>] kthread+0x0/0x132
 [<ffffffff8005dfa7>] child_rip+0x0/0x11

hda: dma_timer_expiry: dma status == 0x24
BUG: soft lockup - CPU#0 stuck for 10s! [events/0:14]
CPU 0:
Modules linked in: autofs4 hidp rfcomm l2cap bluetooth sunrpc
ip_conntrack_netbios_ns ipt_REJECT xt_state ip_conntrack nfnetlink
iptable_filter ip_tables ip6t_REJECT xt_tcpudp ip6table_filter ip6_tables
x_tables ipv6 xfrm_nalgo crypto_api dm_multipath scsi_dh video hwmon
backlight sbs i2c_ec button battery asus_acpi acpi_memhotplug ac lp floppy
ide_cd cdrom parport_pc i2c_piix4 parport e1000 i2c_core virtio_pci pcspkr
virtio_ring virtio serio_raw dm_raid45 dm_message dm_region_hash
dm_mem_cache dm_snapshot dm_zero dm_mirror dm_log dm_mod ata_piix libata
sd_mod scsi_mod ext3 jbd uhci_hcd ohci_hcd ehci_hcd
Pid: 14, comm: events/0 Not tainted 2.6.18-128.el5 #1
RIP: 0010:[<ffffffff800759fa>]  [<ffffffff800759fa>]
__smp_call_function+0x6d/0x8b
RSP: 0018:ffff810037f39d90  EFLAGS: 00000293
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 00000000000000ff RSI: 00000000000000bf RDI: 00000000000000c0
RBP: 0000000000000000 R08: 0000000000000004 R09: 000000000000003c
R10: ffff810037f39cf0 R11: ffff810036b2cc80 R12: 0000000000000000
R13: 0000000000000000 R14: 000000000000000e R15: 0000000000000286
FS:  0000000000000000(0000) GS:ffffffff803ac000(0000)
knlGS:0000000000000000
CS:  0010 DS: 0018 ES: 0018 CR0: 000000008005003b
CR2: 00002adc9d793000 CR3: 0000000034094000 CR4: 00000000000006e0

Call Trace:
 [<ffffffff800721dc>] mcheck_check_cpu+0x0/0x2f
 [<ffffffff80075b25>] smp_call_function+0x32/0x47
 [<ffffffff800721dc>] mcheck_check_cpu+0x0/0x2f
 [<ffffffff80091aa2>] on_each_cpu+0x1BUG: soft lockup - CPU#0 stuck for
10s! [swapper:0]
CPU 0:
Modules linked in: autofs4 hidp rfcomm l2cap bluetooth sunrpc
ip_conntrack_netbios_ns ipt_REJECT xt_state ip_conntrack nfnetlink
iptable_filter ip_tables ip6t_REJECT xt_tcpudp ip6table_filter ip6_tables
x_tables ipv6 xfrm_nalgo crypto_api dm_multipath scsi_dh video hwmon
backlight sbs i2c_ec button battery asus_acpi acpi_memhotplug ac lp floppy
ide_cd cdrom parport_pc i2c_piix4 parport e1000 i2c_core virtio_pci pcspkr
virtio_ring virtio serio_raw dm_raid45 dm_message dm_region_hash
dm_mem_cache dm_snapshot dm_zero dm_mirror dm_log dm_mod ata_piix libata
sd_mod scsi_mod ext3 jbd uhci_hcd ohci_hcd ehci_hcd
Pid: 0, comm: swapper Not tainted 2.6.18-128.el5 #1
RIP: 0010:[<ffffffff80010a37>]  [<ffffffff80010a37>]
handle_IRQ_event+0x42/0xa6
RSP: 0018:ffffffff80425d28  EFLAGS: 00000246
RAX: 0000000000010000 RBX: ffff81003f105740 RCX: 000000000000000e
RDX: ffff81003f105740 RSI: ffffffff80425d98 RDI: 000000000000000e
RBP: ffffffff80425ca0 R08: 0000000000000001 R09: 000000000000003c
R10: ffff81003ff5c098 R11: 0000000000000282 R12: ffffffff8005dc8e
R13: ffffffff803c5180 R14: ffffffff800774da R15: ffffffff80425ca0
FS:  0000000000000000(0000) GS:ffffffff803ac000(0000)
knlGS:0000000000000000
CS:  0010 DS: 0018 ES: 0018 CR0: 000000008005003b
CR2: 00002adc9d793000 CR3: 000000002ea91000 CR4: 00000000000006e0

Call Trace:
 <IRQ>  [<ffffffff800b7ade>] __do_IRQ+0xa4/0x103
 [<ffffffff8006c95d>] do_IRQ+0xe7/0xf5
 [<ffffffff8005d615>] ret_from_intr+0x0/0xa
 [<ffffffff80010a37>] handle_IRQ_event+0x42/0xa6
 [<ffffffff800b7ade>] __do_IRQ+0xa4/0x103
 [<ffffffff8006c95d>] do_IRQ+0xe7/0xf5
 [<ffffffff8005d615>] ret_from_intr+0x0/0xa
 [<ffffffff80011f84>] __do_softirq+0x51/0x133
 [<ffffffff8005e2fc>] call_softirq+0x1c/0x28
 [<ffffffff8006cada>] do_softirq+0x2c/0x85
 [<ffffffff8006b287>] default_idle+0x0/0x50
 [<ffffffff8005dc8e>] apic_timer_interrupt+0x66/0x6c
 <EOI>  [<ffffffff8006b2b0>] default_idle+0x29/0x50
 [<ffffffff80048d19>] cpu_idle+0x95/0xb8
 [<ffffffff803e7801>] start_kernel+0x220/0x225
 [<ffffffff803e722f>] _sinittext+0x22f/0x236


----------------------------------------------------------------------

You can respond by visiting: 
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=2763707&group_id=180599
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux