[Bug 69361] New: Host call trace and guest hang after create guest.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



https://bugzilla.kernel.org/show_bug.cgi?id=69361

            Bug ID: 69361
           Summary: Host call trace and guest hang after create guest.
           Product: Virtualization
           Version: unspecified
    Kernel Version: 3.13.0
          Hardware: All
                OS: Linux
              Tree: Mainline
            Status: NEW
          Severity: normal
          Priority: P1
         Component: kvm
          Assignee: virtualization_kvm@xxxxxxxxxxxxxxxxxxxx
          Reporter: chao.zhou@xxxxxxxxx
        Regression: No

Environment:
------------
Host OS (ia32/ia32e/IA64):ia32e
Guest OS (ia32/ia32e/IA64):ia32e
Guest OS Type (Linux/Windows):Linux
kvm.git Commit:c760f5e29d92adf5184589f1e616a4be146fb57c
qemu.git Commit:732c66ce641c69702a7e7fdb73b68f0c1b583ab5
Host Kernel Version:3.13.0
Hardware:Ivytown_EP, Romley_EP



Bug detailed description:
--------------------------
when create a guest, the host will call trace and guest will hang/

note:
1.this should be a kernel bug
kvm      + qemu     = result
7650b687 + 732c66ce = good
c760f5e2 + 732c66ce = bad
2.I create guest 3 times, the bug will reproduce one time.

Reproduce steps:
----------------
1.start guest:
qemu-system-x86_64 -enable-kvm -m 2048 -smp 2 -net none rhel6u4.img

Current result:
----------------
guest hang, host call trace

Expected result:
----------------
guest and host work fine

Basic root-causing log:
----------------------
INFO: rcu_sched self-detected stall on CPUINFO: rcu_sched detected stalls on
CPUs/tasks: { 0} (detected by 27, t=21004 jiffies, g=5092, c=5091, q=637)
sending NMI to all CPUs:
NMI backtrace for cpu 0
CPU: 0 PID: 10728 Comm: qemu-system-x86 Not tainted 3.13.0 #2
Hardware name: Intel Corporation S2600CP/S2600CP, BIOS
SE5C600.86B.99.99.x056.071020121508 07/10/2012
task: ffff88043d192d20 ti: ffff880433ac2000 task.ti: ffff880433ac2000
RIP: 0010:[<ffffffff812427e5>]  [<ffffffff812427e5>] delay_tsc+0x28/0x4b
RSP: 0018:ffff8800bd003b88  EFLAGS: 00000097
RAX: 0000000028ee59d7 RBX: ffffffff81cae4d0 RCX: 0000000028ee58e7
RDX: 00000000000000f0 RSI: 0000000000000000 RDI: 0000000000000a86
RBP: ffff8800bd003b88 R08: 0000000000000000 R09: ffffffff81a91888
R10: 0000000000000001 R11: 0000000000000000 R12: 00000000000026de
R13: 0000000000000060 R14: 0000000000000001 R15: 000000000000002a
FS:  00007fb28ca2f700(0000) GS:ffff8800bd000000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 000000043d4e2000 CR4: 00000000000427e0
Stack:
 ffff8800bd003b98 ffffffff81242856 ffff8800bd003bc8 ffffffff812d252d
 ffffffff81cae4d0 0000000000000000 ffffffff81cae4d0 0000000000000006
 ffff8800bd003c18 ffffffff812d4511 ffffffff81bc3f80 00000005812405f4
Call Trace:
 <IRQ>  [<ffffffff81242856>] __const_udelay+0x28/0x2a
 [<ffffffff812d252d>] wait_for_xmitr+0x46/0x8e
 [<ffffffff812d4511>] serial8250_console_write+0xbc/0xfc
 [<ffffffff8107c772>] call_console_drivers.clone.1+0xb4/0xc6
 [<ffffffff8107c881>] console_cont_flush.clone.0+0xfd/0x114
 [<ffffffff8107c8cf>] console_unlock+0x37/0x217
 [<ffffffff8107cfbe>] vprintk_emit+0x3c3/0x3ec
 [<ffffffff8147d93d>] printk+0x48/0x4a
 [<ffffffff81084db9>] print_cpu_stall+0x25/0x129
 [<ffffffff8108514c>] __rcu_pending+0x9f/0x1cc
 [<ffffffff8108533c>] rcu_check_callbacks+0xc3/0x144
 [<ffffffff81047c86>] update_process_times+0x3c/0x65
 [<ffffffff8108d975>] tick_sched_handle+0x45/0x54
 [<ffffffff8108db36>] tick_sched_timer+0x58/0x77
 [<ffffffff8105ad82>] __run_hrtimer+0xd6/0x161
 [<ffffffff8108dade>] ? tick_nohz_handler+0xab/0xab
 [<ffffffff8105b16b>] hrtimer_interrupt+0xd0/0x1bc
 [<ffffffff810283c5>] local_apic_timer_interrupt+0x53/0x58
 [<ffffffff81029035>] smp_apic_timer_interrupt+0x3e/0x51
 [<ffffffff8148884a>] apic_timer_interrupt+0x6a/0x70
 <EOI>  [<ffffffff81082627>] ? __srcu_read_unlock+0xa/0x18
 [<ffffffffa022b498>] vcpu_enter_guest+0x46f/0x696 [kvm]
 [<ffffffff8108260d>] ? __srcu_read_lock+0x39/0x49
 [<ffffffffa022b726>] __vcpu_run+0x67/0x1bb [kvm]
 [<ffffffffa022f3e4>] kvm_arch_vcpu_ioctl_run+0xef/0x1ac [kvm]
 [<ffffffffa021d3e2>] kvm_vcpu_ioctl+0x121/0x4b5 [kvm]
 [<ffffffff8104a884>] ? do_sigtimedwait+0x8e/0x19f
 [<ffffffff81134125>] do_vfs_ioctl+0x2a2/0x2be
 [<ffffffff81091735>] ? SyS_futex+0x103/0x13d
 [<ffffffff8113419a>] SyS_ioctl+0x59/0x7d
 [<ffffffff81487ca2>] system_call_fastpath+0x16/0x1b
Code: 00 c9 c3 55 48 89 e5 65 8b 34 25 70 b0 00 00 66 66 90 0f ae e8 0f 31 89
c1 66 66 90 0f ae e8 0f 31 89 c2 29 ca 39 fa 73 23 f3 90 <65> 44 8b 04 25 70 b0
00 00 44 39 c6 74 e0 29 c1 01 cf 66 66 90
NMI backtrace for cpu 1
CPU: 1 PID: 10727 Comm: qemu-system-x86 Not tainted 3.13.0 #2
Hardware name: Intel Corporation S2600CP/S2600CP, BIOS
SE5C600.86B.99.99.x056.071020121508 07/10/2012
task: ffff8804310612b0 ti: ffff88043418c000 task.ti: ffff88043418c000
RIP: 0010:[<ffffffffa02a055a>]  [<ffffffffa02a055a>] vmx_vcpu_run+0x3f3/0x4c3
[kvm_intel]
RSP: 0018:ffff88043418dcb8  EFLAGS: 00000046
RAX: 0000000080000202 RBX: 0000000000000200 RCX: ffff8808377d00c0
RDX: 0000000000004404 RSI: 0000000000000002 RDI: ffff8808377d00c0
RBP: ffff88043418dd08 R08: ffffffff81c07720 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000004 R15: 0000000000000000
FS:  00007fb28d230700(0000) GS:ffff8800bd020000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 000000043d4e2000 CR4: 00000000000427e0
Stack:
 0000000000000000 ffff8808377d00c0 ffff8808377d00c0 00000002377d00c0
 ffff88043418dd08 ffff8808377d00c0 0000000000000000 ffff8808377d00f0
 0000000000000000 0000000000000000 ffff88043418dd98 ffffffffa022b594
Call Trace:
 [<ffffffffa022b594>] vcpu_enter_guest+0x56b/0x696 [kvm]
 [<ffffffffa0243252>] ? __apic_accept_irq+0x130/0x1ea [kvm]
 [<ffffffffa0243362>] ? kvm_apic_local_deliver+0x56/0x5c [kvm]
 [<ffffffffa022b726>] __vcpu_run+0x67/0x1bb [kvm]
 [<ffffffffa022f3e4>] kvm_arch_vcpu_ioctl_run+0xef/0x1ac [kvm]
 [<ffffffffa021d3e2>] kvm_vcpu_ioctl+0x121/0x4b5 [kvm]
 [<ffffffff81134125>] do_vfs_ioctl+0x2a2/0x2be
 [<ffffffffa022937a>] ? kvm_on_user_return+0x4f/0x51 [kvm]
 [<ffffffff8113419a>] SyS_ioctl+0x59/0x7d
 [<ffffffff81487ca2>] system_call_fastpath+0x16/0x1b
Code: 00 80 3d 12 03 00 80 75 05 e8 01 e2 ff ff 85 db 79 22 81 e3 00 07 00 00
81 fb 00 02 00 00 75 14 48 8b 7d b8 e8 d3 23 f8 ff cd 02 <48> 8b 7d b8 e8 d7 23
f8 ff f6 05 52 5d 01 00 20 48 8b 45 b8 8b

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux