[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#526983: Soft Lockups in KVM guest related to r8169 transmit timeouts?



Hi,

contrary to my comment 38 in #526983 the issue seems not to be fixed
with latest kernel.

In fact, r8169 transmit timeout on host occurs the same time
as soft lockup in kvm guest occurs. from this time on the kvm
process runs at 100% on the host and programs such as top can't
be started anymore in kvm guest; shutdown of kvm guest doesn't
work eighter, only destroy works.

seems to be triggered when kvm guest has some more traffic than normal.

host:      lenny 64bit, linux-image-2.6.26-2-amd64  2.6.26-21 with kvm-72+dfsg-5~lenny4
kvm guest: lenny 32bit, linux-image-2.6.26-2-686    2.6.26-21

kvm guest started via

/usr/bin/kvm -S -M pc -m 2048 -smp 1 -name foobar -monitor pty -boot cd
             -drive file=/dev/vgdom/foobar,if=virtio,index=0,boot=on
             -drive file=/var/lib/libvirt/iso/grml-medium_2009.10.iso,if=virtio,media=cdrom,index=2
             -net nic,macaddr=54:52:00:00:74:01,vlan=0,model=virtio
             -net tap,fd=22,script=,vlan=0,ifname=vnet4
             -serial pty -parallel none -usb
             -vnc 127.0.0.1:74 -k de

Any ideas?

host systems /var/log/messages

Jan 31 23:42:00 wtf kernel: [977284.375745] NETDEV WATCHDOG: eth0: transmit timed out
Jan 31 23:42:00 wtf kernel: [977284.375745] ------------[ cut here ]------------
Jan 31 23:42:00 wtf kernel: [977284.375745] WARNING: at net/sched/sch_generic.c:222 dev_watchdog+0xa6/0xfb()
Jan 31 23:42:00 wtf kernel: [977284.375745] Modules linked in: iptable_nat nf_nat xt_multiport xt_limit xt_tcpudp nf_conntrack_ipv4 xt_state nf_conntrack ipt_REJECT iptable_filter ip_tables x_tables tun sha256_generic aes_x86_64 aes_generic cbc dm_crypt crypto_blkcipher kvm_intel kvm bridge ext2 f71882fg ext3 jbd mbcache dm_mirror dm_log dm_snapshot dm_mod raid1 md_mod sd_mod ahci libata scsi_mod dock r8169 processor thermal_sys [last unloaded: scsi_wait_scan]
Jan 31 23:42:00 wtf kernel: [977284.375745] Pid: 0, comm: swapper Not tainted 2.6.26-2-amd64 #1
Jan 31 23:42:00 wtf kernel: [977284.375745] 
Jan 31 23:42:00 wtf kernel: [977284.375745] Call Trace:
Jan 31 23:42:00 wtf kernel: [977284.375745]  <IRQ>  [<ffffffff80234a0c>] warn_on_slowpath+0x51/0x7a
Jan 31 23:42:00 wtf kernel: [977284.375745]  [<ffffffff803cc8f6>] dev_watchdog+0x0/0xfb
Jan 31 23:42:00 wtf kernel: [977284.375745]  [<ffffffff802354a7>] printk+0x4e/0x56
Jan 31 23:42:00 wtf kernel: [977284.375745]  [<ffffffff8023cfbd>] lock_timer_base+0x26/0x4b
Jan 31 23:42:00 wtf kernel: [977284.375745]  [<ffffffff8023d14c>] __mod_timer+0xbd/0xcc
Jan 31 23:42:00 wtf kernel: [977284.375745]  [<ffffffff802438ef>] queue_delayed_work_on+0xb8/0xc8
Jan 31 23:42:00 wtf kernel: [977284.375745]  [<ffffffff803cc8f6>] dev_watchdog+0x0/0xfb
Jan 31 23:42:00 wtf kernel: [977284.375745]  [<ffffffff803cc99c>] dev_watchdog+0xa6/0xfb
Jan 31 23:42:00 wtf kernel: [977284.375745]  [<ffffffff803cc8f6>] dev_watchdog+0x0/0xfb
Jan 31 23:42:00 wtf kernel: [977284.375745]  [<ffffffff8023ca7d>] run_timer_softirq+0x16a/0x1e2
Jan 31 23:42:00 wtf kernel: [977284.375745]  [<ffffffff80239449>] __do_softirq+0x5c/0xd1
Jan 31 23:42:00 wtf kernel: [977284.375745]  [<ffffffff8020d2cc>] call_softirq+0x1c/0x28
Jan 31 23:42:00 wtf kernel: [977284.375745]  [<ffffffff8020f3d8>] do_softirq+0x3c/0x81
Jan 31 23:42:00 wtf kernel: [977284.375745]  [<ffffffff802393a7>] irq_exit+0x3f/0x85
Jan 31 23:42:00 wtf kernel: [977284.375745]  [<ffffffff8021aa6b>] smp_apic_timer_interrupt+0x8c/0xa4
Jan 31 23:42:00 wtf kernel: [977284.375745]  [<ffffffff8020ccf2>] apic_timer_interrupt+0x72/0x80
Jan 31 23:42:00 wtf kernel: [977284.375745]  <EOI>  [<ffffffff8021a817>] lapic_next_event+0x0/0x13
Jan 31 23:42:00 wtf kernel: [977284.375745]  [<ffffffff8021a826>] lapic_next_event+0xf/0x13
Jan 31 23:42:00 wtf kernel: [977284.375745]  [<ffffffff8042a54d>] _spin_unlock_irqrestore+0x7/0xe
Jan 31 23:42:00 wtf kernel: [977284.375745]  [<ffffffff8024d814>] tick_notify+0x1e9/0x33b
Jan 31 23:42:00 wtf kernel: [977284.375745]  [<ffffffff802498fc>] notifier_call_chain+0x29/0x4c
Jan 31 23:42:00 wtf kernel: [977284.375745]  [<ffffffff8024d2ce>] clockevents_notify+0x24/0x6d
Jan 31 23:42:00 wtf kernel: [977284.375745]  [<ffffffffa000828f>] :processor:acpi_idle_enter_bm+0x2d5/0x327
Jan 31 23:42:00 wtf kernel: [977284.375745]  [<ffffffff803aa804>] cpuidle_idle_call+0x7a/0xb2
Jan 31 23:42:00 wtf kernel: [977284.375745]  [<ffffffff803aa78a>] cpuidle_idle_call+0x0/0xb2
Jan 31 23:42:00 wtf kernel: [977284.375745]  [<ffffffff8020ac7e>] cpu_idle+0x8e/0xb8
Jan 31 23:42:00 wtf kernel: [977284.375745] 
Jan 31 23:42:00 wtf kernel: [977284.375745] ---[ end trace c2e0b14640bc17c0 ]---
Jan 31 23:42:00 wtf kernel: [977284.417786] r8169: eth0: link up

kvm guest dmesg (nothing in logs):

[1267143826.640016] BUG: soft lockup - CPU#0 stuck for 1179869831s! [pure-ftpd:4742]
[1267143826.640016] Modules linked in: xfs ext2 virtio_net button ext3 jbd mbcache dm_mirror dm_log dm_snapshot dm_mod virtio_blk ide_cd_mod cdrom ata_generic libata scsi_mod dock ide_pci_generic virtio_pci piix ide_core [last unloaded: scsi_wait_scan]
[1267143826.640016] 
[1267143826.640016] Pid: 4742, comm: pure-ftpd Not tainted (2.6.26-2-686 #1)
[1267143826.640016] EIP: 0073:[<b7e4fa2d>] EFLAGS: 00200202 CPU: 0
[1267143826.640016] EIP is at 0xb7e4fa2d
[1267143826.640016] EAX: a05abd7a EBX: b7f1c124 ECX: 09b3cc00 EDX: 09b40198
[1267143826.640016] ESI: 0000000e EDI: 00000010 EBP: bfc708e8 ESP: bfc708c0
[1267143826.640016]  DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b
[1267143826.640016] CR0: 80050033 CR2: 09b3f000 CR3: 379f8000 CR4: 000006d0
[1267143826.640016] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[1267143826.640016] DR6: ffff0ff0 DR7: 00000400
[1267143826.640016]  =======================

-- 
Registrierter Linux User #307343



Reply to: