Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S964853Ab2KWH3q (ORCPT ); Fri, 23 Nov 2012 02:29:46 -0500 Received: from mail-bk0-f46.google.com ([209.85.214.46]:54646 "EHLO mail-bk0-f46.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932714Ab2KWH3o (ORCPT ); Fri, 23 Nov 2012 02:29:44 -0500 Date: Fri, 23 Nov 2012 08:29:41 +0100 From: Stefan Hajnoczi To: Vincent Li Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: KVM Disk i/o or VM activities causes soft lockup? Message-ID: <20121123072941.GH22787@stefanha-thinkpad.hitronhub.home> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 4047 Lines: 76 On Wed, Nov 21, 2012 at 03:36:50PM -0800, Vincent Li wrote: > We have users running on redhat based distro (Kernel > 2.6.32-131.21.1.el6.x86_64 ) with kvm, when customer made cron job > script to copy large files between kvm guest or some other user space > program leads to disk i/o or VM activities, users get following soft > lockup message from console: > > Nov 17 13:44:46 slot1/luipaard100a err kernel: BUG: soft lockup - > CPU#4 stuck for 61s! [qemu-kvm:6795] > Nov 17 13:44:46 slot1/luipaard100a warning kernel: Modules linked in: > ebt_vlan nls_utf8 isofs ebtable_filter ebtables 8021q garp bridge stp > llc ipt_REJECT iptable_filter xt_NOTRACK nf_conntrack iptable_raw > ip_tables loop ext2 binfmt_misc hed womdict(U) vnic(U) parport_pc lp > parport predis(U) lasthop(U) ipv6 toggler vhost_net tun kvm_intel kvm > jiffies(U) sysstats hrsleep i2c_dev datastor(U) linux_user_bde(P)(U) > linux_kernel_bde(P)(U) tg3 libphy serio_raw i2c_i801 i2c_core ehci_hcd > raid1 raid0 virtio_pci virtio_blk virtio virtio_ring mvsas libsas > scsi_transport_sas mptspi mptscsih mptbase scsi_transport_spi 3w_9xxx > sata_svw(U) ahci serverworks sata_sil ata_piix libata sd_mod > crc_t10dif amd74xx piix ide_gd_mod ide_core dm_snapshot dm_mirror > dm_region_hash dm_log dm_mod ext3 jbd mbcache > Nov 17 13:44:46 slot1/luipaard100a warning kernel: Pid: 6795, comm: > qemu-kvm Tainted: P ---------------- > 2.6.32-131.21.1.el6.f5.x86_64 #1 > Nov 17 13:44:46 slot1/luipaard100a warning kernel: Call Trace: > Nov 17 13:44:46 slot1/luipaard100a warning kernel: > [] ? get_timestamp+0x9/0xf > Nov 17 13:44:46 slot1/luipaard100a warning kernel: > [] ? watchdog_timer_fn+0x130/0x178 > Nov 17 13:44:46 slot1/luipaard100a warning kernel: > [] ? __run_hrtimer+0xa3/0xff > Nov 17 13:44:46 slot1/luipaard100a warning kernel: > [] ? hrtimer_interrupt+0xe6/0x190 > Nov 17 13:44:46 slot1/luipaard100a warning kernel: > [] ? hrtimer_interrupt+0xa9/0x190 > Nov 17 13:44:46 slot1/luipaard100a warning kernel: > [] ? hpet_interrupt_handler+0x26/0x2d > Nov 17 13:44:46 slot1/luipaard100a warning kernel: > [] ? hrtimer_peek_ahead_timers+0x9/0xd > Nov 17 13:44:46 slot1/luipaard100a warning kernel: > [] ? __do_softirq+0xc5/0x17a > Nov 17 13:44:46 slot1/luipaard100a warning kernel: > [] ? call_softirq+0x1c/0x28 > Nov 17 13:44:46 slot1/luipaard100a warning kernel: > [] ? do_softirq+0x31/0x66 > Nov 17 13:44:46 slot1/luipaard100a warning kernel: > [] ? call_function_interrupt+0x13/0x20 > Nov 17 13:44:46 slot1/luipaard100a warning kernel: > [] ? vmx_get_msr+0x0/0x123 [kvm_intel] > Nov 17 13:44:46 slot1/luipaard100a warning kernel: > [] ? kvm_arch_vcpu_ioctl_run+0x80e/0xaf1 [kvm] > Nov 17 13:44:46 slot1/luipaard100a warning kernel: > [] ? kvm_arch_vcpu_ioctl_run+0x802/0xaf1 [kvm] > Nov 17 13:44:46 slot1/luipaard100a warning kernel: > [] ? inode_has_perm+0x65/0x72 > Nov 17 13:44:46 slot1/luipaard100a warning kernel: > [] ? kvm_vcpu_ioctl+0xf2/0x5ba [kvm] > Nov 17 13:44:46 slot1/luipaard100a warning kernel: > [] ? file_has_perm+0x9a/0xac > Nov 17 13:44:46 slot1/luipaard100a warning kernel: > [] ? vfs_ioctl+0x21/0x6b > Nov 17 13:44:46 slot1/luipaard100a warning kernel: > [] ? do_vfs_ioctl+0x487/0x4da > Nov 17 13:44:46 slot1/luipaard100a warning kernel: > [] ? sys_ioctl+0x51/0x70 > Nov 17 13:44:46 slot1/luipaard100a warning kernel: > [] ? system_call_fastpath+0x3c/0x41 This soft lockup is report on the host? Stefan -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/