Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp1796510ybb; Thu, 2 Apr 2020 07:32:51 -0700 (PDT) X-Google-Smtp-Source: APiQypKZmXZwxK6JYhpW6sMA1q33+CE7La7x68N6SRwwLnxLqWzY7+Utb9NAKxTNBpNyd+zmd+5u X-Received: by 2002:aca:b602:: with SMTP id g2mr2387000oif.82.1585837971725; Thu, 02 Apr 2020 07:32:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585837971; cv=none; d=google.com; s=arc-20160816; b=ypsC4VSXLm7keUGQx43NJyVaYTl8RC5cIVN6wO+j05ku3m3I9VB4r1Yq6hgPy3br19 V6Ok9wvNl6EQDzV8OQog6ESKAPyjOWuLFVnFAqka8UH28xQiZQhxEanhenBDuEoaOEXT +pf/z86V0d/87wQ6SYdk9c+T0KbRobjUHrccuovakZf3Mu07C0ul/mul/fCDtqdGQ+HJ zfWJqO4pE/WuP6DwUEKaJBmw0H2HMJXgQWCE8SPipQwGtLlU8xGA74EUfHatTNz/cx4g Jopaqs9cJohqYbpn5MP7YnzeaEsx19CiN0PbpTSxFEbs/6y0eVgDVYB6B4zqltIuiYYN hCvA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from; bh=wEEEXdffI9EuwIO3e/BRkELFjV709CHCZctfr4QTl54=; b=g/vHOq+hEF6roPyPSmCvRMz48hgnG3/B4qan6LC/poLLCNukCKSzD/P+IizcI2vtn2 J1pzzZhc5jdvqekO02rW9FfnBTS7bucQmmB5zurg85RD3A7qUn+4RnqXrxR005LeUJsb L+dTSS/D8q0pbt2OJrLz6/C9BxFPT2VrKIpBScpMkMaM3RPvbTqVjnIZSmPrMbB9JMPK BULlECBUYr3aY71Vq3iA9QEoDGOQtC6TCoDzebbwWTVLiBziW/Vzy9z4sOaco1DxhXEC jZW5S2+K8inpskU1hBZJSJyrC6uN3PGSNeAWDPWyHIGKOSJjcbfVWZDEVO1w7NNPauzA VxDQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k66si2480879oif.29.2020.04.02.07.32.38; Thu, 02 Apr 2020 07:32:51 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388242AbgDBOcO (ORCPT + 99 others); Thu, 2 Apr 2020 10:32:14 -0400 Received: from Galois.linutronix.de ([193.142.43.55]:38040 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387680AbgDBOcL (ORCPT ); Thu, 2 Apr 2020 10:32:11 -0400 Received: from p5de0bf0b.dip0.t-ipconnect.de ([93.224.191.11] helo=nanos.tec.linutronix.de) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1jK0sz-0005jW-9X; Thu, 02 Apr 2020 16:32:01 +0200 Received: by nanos.tec.linutronix.de (Postfix, from userid 1000) id BE60A100D52; Thu, 2 Apr 2020 16:31:59 +0200 (CEST) From: Thomas Gleixner To: Dongli Zhang , Corentin Labbe , qemu-discuss@nongnu.org, mingo@redhat.com, bp@alien8.de, hpa@zytor.com, x86@kernel.org Cc: linux-kernel@vger.kernel.org Subject: Re: qemu-x86: kernel panic when host is loaded In-Reply-To: <18354be1-8dba-84f1-bdf5-6821a5013d78@oracle.com> References: <20200402093132.GA15839@Red> <87eet6nra7.fsf@nanos.tec.linutronix.de> <18354be1-8dba-84f1-bdf5-6821a5013d78@oracle.com> Date: Thu, 02 Apr 2020 16:31:59 +0200 Message-ID: <878sjenelc.fsf@nanos.tec.linutronix.de> MIME-Version: 1.0 Content-Type: text/plain X-Linutronix-Spam-Score: -1.0 X-Linutronix-Spam-Level: - X-Linutronix-Spam-Status: No , -1.0 points, 5.0 required, ALL_TRUSTED=-1,SHORTCIRCUIT=-0.0001 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Dongli Zhang writes: > On 4/2/20 2:57 AM, Thomas Gleixner wrote: >> Corentin Labbe writes: >>> On our kernelci lab, each qemu worker pass an healtcheck job each day and after each job failure, so it is heavily used. >>> The healtcheck job is a Linux boot with a stable release. >>> >>> Since we upgraded our worker to buster, the qemu x86_64 healthcheck randomly panic with: >>> <0>[ 0.009000] Kernel panic - not syncing: IO-APIC + timer doesn't work! Boot with apic=debug and send a report. Then try booting with the 'noapic' option. >>> >>> After some test I found the source of this kernel panic, the host is >>> loaded and qemu run "slower". Simply renicing all qemu removed this >>> behavour. >>> >>> So now what can I do ? >>> Appart renicing qemu process, does something could be done ? >> >> As the qemu timer/ioapic routing is actually sane, you might try to add >> "no_timer_check" to the kernel command line. >> > > The no_timer_check is already permanently disabled in below commit? > > commit a90ede7b17d1 ("KVM: x86: paravirt skip pit-through-ioapic boot check") Which only helps if the guest kernel has CONFIG_KVM_GUEST enabled... As Corentin showed that it dies in the timer check this is clearly not the case. So adding it to the kernel command line for this case should work around the problem. Thanks, tglx