[Bug 836119] [NEW] KVM Guest gets general protection fault on two CPUs
Endre Stølsvik
online at stolsvik.com
Sun Aug 28 16:10:13 UTC 2011
Public bug reported:
Got the following errors (listed below) when trying to enter a KVM Guest running Ubuntu desktop 11.04 on top of a KVM Host running Ubuntu server 11.04 install.
This was done from a virt-manager running on a 11.04 desktop using ssh over to the server.
The "entering" mentioned was merely to move the mouse to within the VM viewer.
I could still login to the KVM guest with ssh, though.
I tried shutting down the KVM guest from within using 'shutdown -h NOW',
but while this took down the OS, it apparently didn't properly shut down
the actual VM instance.
When trying to use virt-manager (remotely, as mentioned) to forcefully
shut it down, this didn't work out either - just hanging the GUI for a
little while, then stating that the operation timed out.
When using virsh when logged into the Host, I get:
virsh # destroy Store
error: Failed to destroy domain Store
error: Timed out during operation: cannot acquire state change lock
Then, after following some ideas from..
https://bugzilla.redhat.com/show_bug.cgi?id=676205
.. I now have a situation where virsh list doesn't even return:
endre at SixCore:~$ virsh
Welcome to virsh, the virtualization interactive terminal.
..
virsh # list
Id Name State
----------------------------------
17 NewDisk running
[.. hanging .. "Store" should have been printed here ..]
Today (the next day), I tried virsh list again, and this time it worked out, with Store listed as "running". I then tried connecting via virt-manager, but when trying to go into the machine (virt-viewer?) I get "Connecting to to graphical console for Guest", just hanging.
I then tried to forcefully kill the VM again ("Force off" in virt-
manager), but this yields the following traceback. Notice the
"libvirtError: Timed out during operation: cannot acquire state change
lock".
Traceback (most recent call last):
File "/usr/share/virt-manager/virtManager/engine.py", line 908, in _do_destroy_domain
vm.destroy()
File "/usr/share/virt-manager/virtManager/domain.py", line 1087, in destroy
self._backend.destroy()
File "/usr/lib/python2.7/dist-packages/libvirt.py", line 346, in destroy
if ret == -1: raise libvirtError ('virDomainDestroy() failed', dom=self)
libvirtError: Timed out during operation: cannot acquire state change lock
Aug 27 11:10:36 Store kernel: [36104.328903] general protection fault: 0000 [#2] SMP
Aug 27 11:10:36 Store kernel: [36104.328915] last sysfs file: /sys/devices/system/cpu/cpu5/cache/index2/shared_cpu_map
Aug 27 11:10:36 Store kernel: [36104.328923] CPU 1
Aug 27 11:10:36 Store kernel: [36104.328926] Modules linked in: binfmt_misc parport_pc ppdev vesafb joydev psmouse virtio_balloon seri
o_raw i2c_piix4 lp parport usbhid hid virtio_net virtio_blk floppy virtio_pci virtio_ring virtio
Aug 27 11:10:36 Store kernel: [36104.328965]
Aug 27 11:10:36 Store kernel: [36104.328972] Pid: 873, comm: Xorg Tainted: G D 2.6.38-11-generic #48-Ubuntu Bochs Bochs
Aug 27 11:10:36 Store kernel: [36104.328983] RIP: 0010:[<ffffffff8104ba86>] [<ffffffff8104ba86>] __wake_up_common+0x56/0x90
Aug 27 11:10:36 Store kernel: [36104.329002] RSP: 0018:ffff880078701b08 EFLAGS: 00010096
Aug 27 11:10:36 Store kernel: [36104.329008] RAX: ffff880053cf1c18 RBX: d4d5281e29fedeed RCX: 00000000000000c3
Aug 27 11:10:36 Store kernel: [36104.329014] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff880053cf1c18
Aug 27 11:10:36 Store kernel: [36104.329020] RBP: ffff880078701b48 R08: 00000000000000c3 R09: 0000000000000246
Aug 27 11:10:36 Store kernel: [36104.329025] R10: ffff88007d00c800 R11: 0000000000000000 R12: 00000000627812c6
Aug 27 11:10:36 Store kernel: [36104.329031] R13: ffff880054826148 R14: 00000000000000c3 R15: 0000000000000001
Aug 27 11:10:36 Store kernel: [36104.329052] FS: 00007f55818758a0(0000) GS:ffff88007fc40000(0000) knlGS:00000000f69a4880
Aug 27 11:10:36 Store kernel: [36104.329058] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Aug 27 11:10:36 Store kernel: [36104.329064] CR2: 00007f5b0ad2aa30 CR3: 000000007844d000 CR4: 00000000000006e0
Aug 27 11:10:36 Store kernel: [36104.329085] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
Aug 27 11:10:36 Store kernel: [36104.329105] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Aug 27 11:10:36 Store kernel: [36104.329113] Process Xorg (pid: 873, threadinfo ffff880078700000, task ffff8800792cadc0)
Aug 27 11:10:36 Store kernel: [36104.329118] Stack:
Aug 27 11:10:36 Store kernel: [36104.329121] ffff880017e39f00 0000000100000001 ffff880078701b28 ffff880054826140
Aug 27 11:10:36 Store kernel: [36104.329130] 0000000000000001 0000000000000282 0000000000000001 00000000000000c3
Aug 27 11:10:36 Store kernel: [36104.329140] ffff880078701b88 ffffffff8104e373 ffff880078701b78 ffff880054bc49c0
Aug 27 11:10:36 Store kernel: [36104.329148] Call Trace:
Aug 27 11:10:36 Store kernel: [36104.329160] [<ffffffff8104e373>] __wake_up_sync_key+0x53/0x80
Aug 27 11:10:36 Store kernel: [36104.329172] [<ffffffff814c15fe>] sock_def_readable+0x3e/0x70
Aug 27 11:10:36 Store kernel: [36104.329254] [<ffffffff8155e32c>] unix_stream_sendmsg+0x2cc/0x470
Aug 27 11:10:36 Store kernel: [36104.329265] [<ffffffff814bafee>] sock_aio_write+0x14e/0x160
Aug 27 11:10:36 Store kernel: [36104.329274] [<ffffffff814baea0>] ? sock_aio_write+0x0/0x160
Aug 27 11:10:36 Store kernel: [36104.329284] [<ffffffff811653d3>] do_sync_readv_writev+0xd3/0x110
Aug 27 11:10:36 Store kernel: [36104.329319] [<ffffffff812ae958>] ? apparmor_file_permission+0x18/0x20
Aug 27 11:10:36 Store kernel: [36104.329331] [<ffffffff81279c8c>] ? security_file_permission+0x2c/0xb0
Aug 27 11:10:36 Store kernel: [36104.329339] [<ffffffff81164b01>] ? rw_verify_area+0x61/0xf0
Aug 27 11:10:36 Store kernel: [36104.329347] [<ffffffff811656a4>] do_readv_writev+0xd4/0x1e0
Aug 27 11:10:36 Store kernel: [36104.329356] [<ffffffff81279cf3>] ? security_file_permission+0x93/0xb0
Aug 27 11:10:36 Store kernel: [36104.329364] [<ffffffff81164b01>] ? rw_verify_area+0x61/0xf0
Aug 27 11:10:36 Store kernel: [36104.329372] [<ffffffff811657f8>] vfs_writev+0x48/0x60
Aug 27 11:10:36 Store kernel: [36104.329379] [<ffffffff81165981>] sys_writev+0x51/0xc0
Aug 27 11:10:36 Store kernel: [36104.329387] [<ffffffff81086251>] ? posix_ktime_get_ts+0x11/0x20
Aug 27 11:10:36 Store kernel: [36104.329396] [<ffffffff8100c002>] system_call_fastpath+0x16/0x1b
Aug 27 11:10:36 Store kernel: [36104.329401] Code: 39 d5 48 8d 42 e8 48 8b 1a 74 40 48 83 eb 18 eb 0b 0f 1f 40 00 48 89 d8 48 8d 5a e8 44 8b 20 4c 89 f1 44 89 fa 8b 75 cc 48 89 c7 <ff> 50 10 85 c0 74 0c 41 83 e4 01 74 06 83 6d c8 01 74 0d 48 8d
Aug 27 11:10:36 Store kernel: [36104.329468] RIP [<ffffffff8104ba86>] __wake_up_common+0x56/0x90
Aug 27 11:10:36 Store kernel: [36104.329478] RSP <ffff880078701b08>
Aug 27 11:10:36 Store kernel: [36104.329486] ---[ end trace 6a7ca2093395d464 ]---
Aug 27 11:10:37 Store kernel: [36104.872159] general protection fault: 0000 [#3] SMP
Aug 27 11:10:37 Store kernel: [36104.872173] last sysfs file: /sys/devices/system/cpu/cpu5/cache/index2/shared_cpu_map
Aug 27 11:10:37 Store kernel: [36104.872182] CPU 0
Aug 27 11:10:37 Store kernel: [36104.872187] Modules linked in: binfmt_misc parport_pc ppdev vesafb joydev psmouse virtio_balloon serio_raw i2c_piix4 lp parport usbhid hid virtio_net virtio_blk floppy virtio_pci virtio_ring virtio
Aug 27 11:10:37 Store kernel: [36104.872223]
Aug 27 11:10:37 Store kernel: [36104.872230] Pid: 873, comm: Xorg Tainted: G D 2.6.38-11-generic #48-Ubuntu Bochs Bochs
Aug 27 11:10:37 Store kernel: [36104.872280] RIP: 0010:[<ffffffff814c017c>] [<ffffffff814c017c>] sock_def_wakeup+0x1c/0x40
Aug 27 11:10:37 Store kernel: [36104.872301] RSP: 0000:ffff880078701798 EFLAGS: 00010286
Aug 27 11:10:37 Store kernel: [36104.872307] RAX: fffb880054826508 RBX: ffff880054bc5040 RCX: 0000000000000000
Aug 27 11:10:37 Store kernel: [36104.872313] RDX: ffff880054bc42c8 RSI: 0000000000000286 RDI: fffb880054826500
Aug 27 11:10:37 Store kernel: [36104.872319] RBP: ffff880078701798 R08: 0000000000000000 R09: 0000000000000000
Aug 27 11:10:37 Store kernel: [36104.872324] R10: ffff880078265c10 R11: 0000000000000008 R12: ffff880054bc50b0
Aug 27 11:10:37 Store kernel: [36104.872330] R13: 0000000000000001 R14: ffff880054bc4000 R15: 0000000000000000
Aug 27 11:10:37 Store kernel: [36104.872348] FS: 00007f55818758a0(0000) GS:ffff88007fc00000(0000) knlGS:00000000f69a4880
Aug 27 11:10:37 Store kernel: [36104.872355] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Aug 27 11:10:37 Store kernel: [36104.872361] CR2: 00000000004002a8 CR3: 0000000079ad4000 CR4: 00000000000006f0
Aug 27 11:10:37 Store kernel: [36104.872382] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
Aug 27 11:10:37 Store kernel: [36104.872403] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Aug 27 11:10:37 Store kernel: [36104.872411] Process Xorg (pid: 873, threadinfo ffff880078700000, task ffff8800792cadc0)
Aug 27 11:10:37 Store kernel: [36104.872416] Stack:
Aug 27 11:10:37 Store kernel: [36104.872420] ffff880078701808 ffffffff8155bf78 ffff8800787017c8 ffffffff81178d3f
Aug 27 11:10:37 Store kernel: [36104.872429] ffff8800390d1600 ffff880054bc42c8 00000000787017e8 0000000000000000
Aug 27 11:10:37 Store kernel: [36104.872439] ffff880078265c10 ffff8800626a9e40 0000000000000000 ffff88004b7d2180
Aug 27 11:10:37 Store kernel: [36104.872448] Call Trace:
Aug 27 11:10:37 Store kernel: [36104.872462] [<ffffffff8155bf78>] unix_release_sock+0x208/0x250
Aug 27 11:10:37 Store kernel: [36104.872474] [<ffffffff81178d3f>] ? __d_free+0x4f/0x70
Aug 27 11:10:37 Store kernel: [36104.872484] [<ffffffff8155bfe6>] unix_release+0x26/0x30
Aug 27 11:10:37 Store kernel: [36104.872492] [<ffffffff814bb8d9>] sock_release+0x29/0x90
Aug 27 11:10:37 Store kernel: [36104.872499] [<ffffffff814bb957>] sock_close+0x17/0x30
Aug 27 11:10:37 Store kernel: [36104.872508] [<ffffffff811661fe>] __fput+0xbe/0x200
Aug 27 11:10:37 Store kernel: [36104.872515] [<ffffffff81166365>] fput+0x25/0x30
Aug 27 11:10:37 Store kernel: [36104.872523] [<ffffffff81162c40>] filp_close+0x60/0x90
Aug 27 11:10:37 Store kernel: [36104.872534] [<ffffffff81069e08>] put_files_struct+0x88/0xf0
Aug 27 11:10:37 Store kernel: [36104.872542] [<ffffffff81069f34>] exit_files+0x54/0x70
Aug 27 11:10:37 Store kernel: [36104.872576] [<ffffffff8106a425>] do_exit+0x175/0x410
Aug 27 11:10:37 Store kernel: [36104.872588] [<ffffffff815c484f>] oops_end+0xaf/0xf0
Aug 27 11:10:37 Store kernel: [36104.872597] [<ffffffff810100eb>] die+0x5b/0x90
Aug 27 11:10:37 Store kernel: [36104.872605] [<ffffffff815c4342>] do_general_protection+0x162/0x170
Aug 27 11:10:37 Store kernel: [36104.872613] [<ffffffff815c3b65>] general_protection+0x25/0x30
Aug 27 11:10:37 Store kernel: [36104.872624] [<ffffffff8104ba86>] ? __wake_up_common+0x56/0x90
Aug 27 11:10:37 Store kernel: [36104.872633] [<ffffffff8104ba89>] ? __wake_up_common+0x59/0x90
Aug 27 11:10:37 Store kernel: [36104.872642] [<ffffffff8104e373>] __wake_up_sync_key+0x53/0x80
Aug 27 11:10:37 Store kernel: [36104.872651] [<ffffffff814c15fe>] sock_def_readable+0x3e/0x70
Aug 27 11:10:37 Store kernel: [36104.872661] [<ffffffff8155e32c>] unix_stream_sendmsg+0x2cc/0x470
Aug 27 11:10:37 Store kernel: [36104.872670] [<ffffffff814bafee>] sock_aio_write+0x14e/0x160
Aug 27 11:10:37 Store kernel: [36104.872679] [<ffffffff814baea0>] ? sock_aio_write+0x0/0x160
Aug 27 11:10:37 Store kernel: [36104.872687] [<ffffffff811653d3>] do_sync_readv_writev+0xd3/0x110
Aug 27 11:10:37 Store kernel: [36104.872700] [<ffffffff812ae958>] ? apparmor_file_permission+0x18/0x20
Aug 27 11:10:37 Store kernel: [36104.872710] [<ffffffff81279c8c>] ? security_file_permission+0x2c/0xb0
Aug 27 11:10:37 Store kernel: [36104.872719] [<ffffffff81164b01>] ? rw_verify_area+0x61/0xf0
Aug 27 11:10:37 Store kernel: [36104.872727] [<ffffffff811656a4>] do_readv_writev+0xd4/0x1e0
Aug 27 11:10:37 Store kernel: [36104.872736] [<ffffffff81279cf3>] ? security_file_permission+0x93/0xb0
Aug 27 11:10:37 Store kernel: [36104.872744] [<ffffffff81164b01>] ? rw_verify_area+0x61/0xf0
Aug 27 11:10:37 Store kernel: [36104.872752] [<ffffffff811657f8>] vfs_writev+0x48/0x60
Aug 27 11:10:37 Store kernel: [36104.872759] [<ffffffff81165981>] sys_writev+0x51/0xc0
Aug 27 11:10:37 Store kernel: [36104.872767] [<ffffffff81086251>] ? posix_ktime_get_ts+0x11/0x20
Aug 27 11:10:37 Store kernel: [36104.872775] [<ffffffff8100c002>] system_call_fastpath+0x16/0x1b
Aug 27 11:10:37 Store kernel: [36104.872780] Code: 5c 41 5d c9 c3 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 66 66 66 66 90 48 8b bf b8 00 00 00 0f ae f0 48 85 ff 74 18 48 8d 47 08 <48> 39 47 08 74 0e 31 c9 31 d2 be 01 00 00 00 e8 30 e2 b8 ff c9
Aug 27 11:10:37 Store kernel: [36104.872848] RIP [<ffffffff814c017c>] sock_def_wakeup+0x1c/0x40
Aug 27 11:10:37 Store kernel: [36104.872857] RSP <ffff880078701798>
Aug 27 11:10:37 Store kernel: [36104.872866] ---[ end trace 6a7ca2093395d465 ]---
Aug 27 11:10:37 Store kernel: [36104.872872] Fixing recursive fault but reboot is needed!
** Affects: kvm (Ubuntu)
Importance: Undecided
Status: New
** Tags: gpf kvm virt-viewer virtsh
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to kvm in Ubuntu.
https://bugs.launchpad.net/bugs/836119
Title:
KVM Guest gets general protection fault on two CPUs
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/836119/+subscriptions
More information about the Ubuntu-server-bugs
mailing list