Warning with vhost_net kref.h:42 handle_tx

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi!

I've just built server to use it with KVM. Almost immediately I got this 
warning with one of my virtual servers (two currently).

Apr  7 04:44:02 base kernel: ------------[ cut here ]------------
Apr  7 04:44:02 base kernel: WARNING: at include/linux/kref.h:42 
handle_tx+0x613/0x680 [vhost_net]()
Apr  7 04:44:02 base kernel: Hardware name: System Product Name
Apr  7 04:44:02 base kernel: Modules linked in: tcm_qla2xxx tcm_fc libfc 
tcm_loop target_core_mod configfs ebtable_nat ebtables ipt_MASQUERADE 
iptable_nat nf_nat_ipv4 nf_nat xt_CHECKSUM iptable_mangle bridge stp llc 
autofs4 sunrpc cpufreq_ondemand ipt_REJECT nf_conntrack_ipv4 
nf_defrag_ipv4 iptable_filter ip_tables ip6t_REJECT nf_conntrack_ipv6 
nf_defrag_ipv6 xt_state nf_conntrack ip6table_filter ip6_tables ipv6 
vhost_net macvtap macvlan tun iTCO_wdt iTCO_vendor_support e1000 
acpi_cpufreq freq_table mperf coretemp kvm_intel kvm crc32c_intel 
ghash_clmulni_intel microcode i2c_i801 raid456 async_raid6_recov async_pq 
lpc_ich mfd_core raid6_pq async_xor xor async_memcpy async_tx e1000e 
xhci_hcd sg wmi ext4(F) mbcache(F) jbd2(F) firewire_ohci(F) 
firewire_core(F) crc_itu_t(F) sd_mod(F) crc_t10dif(F) aesni_intel(F) 
ablk_helper(F) cryptd(F) lrw(F) aes_x86_64(F) xts(F) gf128mul(F) ahci(F) 
libahci(F) qla2xxx(F) scsi_transport_fc(F) scsi_tgt(F) mvsas(F) libsas(F) 
scsi_transport_sas(F) i915(F) drm_kms_helper(F) drm(F) i2c_
Apr  7 04:44:02 base kernel: algo_bit(F) i2c_core(F) video(F) dm_mirror(F) 
dm_region_hash(F) dm_log(F) dm_mod(F) [last unloaded: i2c_dev]
Apr  7 04:44:02 base kernel: Pid: 17583, comm: vhost-17562 Tainted: GF       
W    3.8.5 #4
Apr  7 04:44:02 base kernel: Call Trace:
Apr  7 04:44:02 base kernel: [<ffffffff8105643f>] 
warn_slowpath_common+0x7f/0xc0
Apr  7 04:44:02 base kernel: [<ffffffff8105649a>] 
warn_slowpath_null+0x1a/0x20
Apr  7 04:44:02 base kernel: [<ffffffffa03121c3>] handle_tx+0x613/0x680 
[vhost_net]
Apr  7 04:44:02 base kernel: [<ffffffffa0311bb1>] ? handle_tx+0x1/0x680 
[vhost_net]
Apr  7 04:44:02 base kernel: [<ffffffffa0312265>] handle_tx_kick+0x15/0x20 
[vhost_net]
Apr  7 04:44:02 base kernel: [<ffffffffa030fdfc>] vhost_worker+0x10c/0x1c0 
[vhost_net]
Apr  7 04:44:02 base kernel: [<ffffffffa030fcf0>] ? 
vhost_attach_cgroups_work+0x30/0x30 [vhost_net]
Apr  7 04:44:02 base kernel: [<ffffffffa030fcf0>] ? 
vhost_attach_cgroups_work+0x30/0x30 [vhost_net]
Apr  7 04:44:02 base kernel: [<ffffffff8107a70e>] kthread+0xce/0xe0
Apr  7 04:44:02 base kernel: [<ffffffff8107a640>] ? 
kthread_freezable_should_stop+0x70/0x70
Apr  7 04:44:02 base kernel: [<ffffffff8159b86c>] ret_from_fork+0x7c/0xb0
Apr  7 04:44:02 base kernel: [<ffffffff8107a640>] ? 
kthread_freezable_should_stop+0x70/0x70
Apr  7 04:44:02 base kernel: ---[ end trace b9b0bac0c9fdebba ]---

This kept filling my logs until I noticed these. This also prevented 
virtual machine & host shutdown. I had to reset the server by force. I 
think these are related to that:

Apr  7 23:46:55 base kernel: INFO: task qemu-kvm:17562 blocked for more 
than 120 seconds.
Apr  7 23:46:55 base kernel: "echo 0 > 
/proc/sys/kernel/hung_task_timeout_secs" disables this message.
Apr  7 23:46:55 base kernel: qemu-kvm        D ffffffff816105e0     0 
17562      1 0x00000084
Apr  7 23:46:55 base kernel: ffff88040d6d5d88 0000000000000086 
ffff88040d6d5fd8 0000000000013a80
Apr  7 23:46:55 base kernel: ffff88040d6d4010 0000000000013a80 
0000000000013a80 0000000000013a80
Apr  7 23:46:55 base kernel: ffff88040d6d5fd8 0000000000013a80 
ffffffff81a14420 ffff88040c878b40
Apr  7 23:46:55 base kernel: Call Trace:
Apr  7 23:46:55 base kernel: [<ffffffff815921f9>] schedule+0x29/0x70
Apr  7 23:46:55 base kernel: [<ffffffffa03104a5>] 
vhost_ubuf_put_and_wait+0x65/0xa0 [vhost_net]
Apr  7 23:46:55 base kernel: [<ffffffff8107af90>] ? wake_up_bit+0x40/0x40
Apr  7 23:46:55 base kernel: [<ffffffffa0312595>] 
vhost_net_set_backend+0x1b5/0x280 [vhost_net]
Apr  7 23:46:55 base kernel: [<ffffffffa03129a9>] 
vhost_net_ioctl+0x149/0x1a0 [vhost_net]
Apr  7 23:46:55 base kernel: [<ffffffff8118e59c>] do_vfs_ioctl+0x8c/0x340
Apr  7 23:46:55 base kernel: [<ffffffff8117cca5>] ? vfs_write+0xc5/0x130
Apr  7 23:46:55 base kernel: [<ffffffff810b5b3b>] ? sys_futex+0x7b/0x180
Apr  7 23:46:55 base kernel: [<ffffffff8118e8f1>] sys_ioctl+0xa1/0xb0
Apr  7 23:46:55 base kernel: [<ffffffff8159b919>] 
system_call_fastpath+0x16/0x1b


Is there anything that I can do to help to further debug these? That is if 
I can get them to occur again. Machine has been running for without 
incident since last reboot (18 hours).

I noticed that there is taint flag but I can't figure out how that 
happened. I tried to check licenses with modinfo put can't see any modules 
without GPL or related license. There shouldn't be any tainted modules 
since I compiled kernel from vanilla 3.8.5

Thanks,
Juhani
-- 
Juhani Rautiainen				jrauti@xxxxxx
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux