Public bug reported:

Got the following errors (listed below) when trying to enter a KVM Guest 
running Ubuntu desktop 11.04 on top of a KVM Host running Ubuntu server 11.04 
install.
This was done from a virt-manager running on a 11.04 desktop using ssh over to 
the server.
The "entering" mentioned was merely to move the mouse to within the VM viewer.

I could still login to the KVM guest with ssh, though.

I tried shutting down the KVM guest from within using 'shutdown -h NOW',
but while this took down the OS, it apparently didn't properly shut down
the actual VM instance.

When trying to use virt-manager (remotely, as mentioned) to forcefully
shut it down, this didn't work out either - just hanging the GUI for a
little while, then stating that the operation timed out.

When using virsh when logged into the Host, I get:
  virsh # destroy Store
  error: Failed to destroy domain Store
  error: Timed out during operation: cannot acquire state change lock

Then, after following some ideas from..
  https://bugzilla.redhat.com/show_bug.cgi?id=676205
.. I now have a situation where virsh list doesn't even return:

endre@SixCore:~$ virsh
Welcome to virsh, the virtualization interactive terminal.
  ..
virsh # list
 Id Name                 State
----------------------------------
 17 NewDisk              running
[.. hanging .. "Store" should have been printed here ..]


Today (the next day), I tried virsh list again, and this time it worked out, 
with Store listed as "running". I then tried connecting via virt-manager, but 
when trying to go into the machine (virt-viewer?) I get "Connecting to to 
graphical console for Guest", just hanging.

I then tried to forcefully kill the VM again ("Force off" in virt-
manager), but this yields the following traceback. Notice the
"libvirtError: Timed out during operation: cannot acquire state change
lock".

Traceback (most recent call last):
  File "/usr/share/virt-manager/virtManager/engine.py", line 908, in 
_do_destroy_domain
    vm.destroy()
  File "/usr/share/virt-manager/virtManager/domain.py", line 1087, in destroy
    self._backend.destroy()
  File "/usr/lib/python2.7/dist-packages/libvirt.py", line 346, in destroy
    if ret == -1: raise libvirtError ('virDomainDestroy() failed', dom=self)
libvirtError: Timed out during operation: cannot acquire state change lock


Aug 27 11:10:36 Store kernel: [36104.328903] general protection fault: 0000 
[#2] SMP 
Aug 27 11:10:36 Store kernel: [36104.328915] last sysfs file: 
/sys/devices/system/cpu/cpu5/cache/index2/shared_cpu_map
Aug 27 11:10:36 Store kernel: [36104.328923] CPU 1 
Aug 27 11:10:36 Store kernel: [36104.328926] Modules linked in: binfmt_misc 
parport_pc ppdev vesafb joydev psmouse virtio_balloon seri
o_raw i2c_piix4 lp parport usbhid hid virtio_net virtio_blk floppy virtio_pci 
virtio_ring virtio
Aug 27 11:10:36 Store kernel: [36104.328965] 
Aug 27 11:10:36 Store kernel: [36104.328972] Pid: 873, comm: Xorg Tainted: G    
  D     2.6.38-11-generic #48-Ubuntu Bochs Bochs
Aug 27 11:10:36 Store kernel: [36104.328983] RIP: 0010:[<ffffffff8104ba86>]  
[<ffffffff8104ba86>] __wake_up_common+0x56/0x90
Aug 27 11:10:36 Store kernel: [36104.329002] RSP: 0018:ffff880078701b08  
EFLAGS: 00010096
Aug 27 11:10:36 Store kernel: [36104.329008] RAX: ffff880053cf1c18 RBX: 
d4d5281e29fedeed RCX: 00000000000000c3
Aug 27 11:10:36 Store kernel: [36104.329014] RDX: 0000000000000001 RSI: 
0000000000000001 RDI: ffff880053cf1c18
Aug 27 11:10:36 Store kernel: [36104.329020] RBP: ffff880078701b48 R08: 
00000000000000c3 R09: 0000000000000246
Aug 27 11:10:36 Store kernel: [36104.329025] R10: ffff88007d00c800 R11: 
0000000000000000 R12: 00000000627812c6
Aug 27 11:10:36 Store kernel: [36104.329031] R13: ffff880054826148 R14: 
00000000000000c3 R15: 0000000000000001
Aug 27 11:10:36 Store kernel: [36104.329052] FS:  00007f55818758a0(0000) 
GS:ffff88007fc40000(0000) knlGS:00000000f69a4880
Aug 27 11:10:36 Store kernel: [36104.329058] CS:  0010 DS: 0000 ES: 0000 CR0: 
0000000080050033
Aug 27 11:10:36 Store kernel: [36104.329064] CR2: 00007f5b0ad2aa30 CR3: 
000000007844d000 CR4: 00000000000006e0
Aug 27 11:10:36 Store kernel: [36104.329085] DR0: 0000000000000000 DR1: 
0000000000000000 DR2: 0000000000000000
Aug 27 11:10:36 Store kernel: [36104.329105] DR3: 0000000000000000 DR6: 
00000000ffff0ff0 DR7: 0000000000000400
Aug 27 11:10:36 Store kernel: [36104.329113] Process Xorg (pid: 873, threadinfo 
ffff880078700000, task ffff8800792cadc0)
Aug 27 11:10:36 Store kernel: [36104.329118] Stack:
Aug 27 11:10:36 Store kernel: [36104.329121]  ffff880017e39f00 0000000100000001 
ffff880078701b28 ffff880054826140
Aug 27 11:10:36 Store kernel: [36104.329130]  0000000000000001 0000000000000282 
0000000000000001 00000000000000c3
Aug 27 11:10:36 Store kernel: [36104.329140]  ffff880078701b88 ffffffff8104e373 
ffff880078701b78 ffff880054bc49c0
Aug 27 11:10:36 Store kernel: [36104.329148] Call Trace:
Aug 27 11:10:36 Store kernel: [36104.329160]  [<ffffffff8104e373>] 
__wake_up_sync_key+0x53/0x80
Aug 27 11:10:36 Store kernel: [36104.329172]  [<ffffffff814c15fe>] 
sock_def_readable+0x3e/0x70
Aug 27 11:10:36 Store kernel: [36104.329254]  [<ffffffff8155e32c>] 
unix_stream_sendmsg+0x2cc/0x470
Aug 27 11:10:36 Store kernel: [36104.329265]  [<ffffffff814bafee>] 
sock_aio_write+0x14e/0x160
Aug 27 11:10:36 Store kernel: [36104.329274]  [<ffffffff814baea0>] ? 
sock_aio_write+0x0/0x160
Aug 27 11:10:36 Store kernel: [36104.329284]  [<ffffffff811653d3>] 
do_sync_readv_writev+0xd3/0x110
Aug 27 11:10:36 Store kernel: [36104.329319]  [<ffffffff812ae958>] ? 
apparmor_file_permission+0x18/0x20
Aug 27 11:10:36 Store kernel: [36104.329331]  [<ffffffff81279c8c>] ? 
security_file_permission+0x2c/0xb0
Aug 27 11:10:36 Store kernel: [36104.329339]  [<ffffffff81164b01>] ? 
rw_verify_area+0x61/0xf0
Aug 27 11:10:36 Store kernel: [36104.329347]  [<ffffffff811656a4>] 
do_readv_writev+0xd4/0x1e0
Aug 27 11:10:36 Store kernel: [36104.329356]  [<ffffffff81279cf3>] ? 
security_file_permission+0x93/0xb0
Aug 27 11:10:36 Store kernel: [36104.329364]  [<ffffffff81164b01>] ? 
rw_verify_area+0x61/0xf0
Aug 27 11:10:36 Store kernel: [36104.329372]  [<ffffffff811657f8>] 
vfs_writev+0x48/0x60
Aug 27 11:10:36 Store kernel: [36104.329379]  [<ffffffff81165981>] 
sys_writev+0x51/0xc0
Aug 27 11:10:36 Store kernel: [36104.329387]  [<ffffffff81086251>] ? 
posix_ktime_get_ts+0x11/0x20
Aug 27 11:10:36 Store kernel: [36104.329396]  [<ffffffff8100c002>] 
system_call_fastpath+0x16/0x1b
Aug 27 11:10:36 Store kernel: [36104.329401] Code: 39 d5 48 8d 42 e8 48 8b 1a 
74 40 48 83 eb 18 eb 0b 0f 1f 40 00 48 89 d8 48 8d 5a e8 44 8b 20 4c 89 f1 44 
89 fa 8b 75 cc 48 89 c7 <ff> 50 10 85 c0 74 0c 41 83 e4 01 74 06 83 6d c8 01 74 
0d 48 8d 
Aug 27 11:10:36 Store kernel: [36104.329468] RIP  [<ffffffff8104ba86>] 
__wake_up_common+0x56/0x90
Aug 27 11:10:36 Store kernel: [36104.329478]  RSP <ffff880078701b08>
Aug 27 11:10:36 Store kernel: [36104.329486] ---[ end trace 6a7ca2093395d464 
]---
Aug 27 11:10:37 Store kernel: [36104.872159] general protection fault: 0000 
[#3] SMP 
Aug 27 11:10:37 Store kernel: [36104.872173] last sysfs file: 
/sys/devices/system/cpu/cpu5/cache/index2/shared_cpu_map
Aug 27 11:10:37 Store kernel: [36104.872182] CPU 0 
Aug 27 11:10:37 Store kernel: [36104.872187] Modules linked in: binfmt_misc 
parport_pc ppdev vesafb joydev psmouse virtio_balloon serio_raw i2c_piix4 lp 
parport usbhid hid virtio_net virtio_blk floppy virtio_pci virtio_ring virtio
Aug 27 11:10:37 Store kernel: [36104.872223] 
Aug 27 11:10:37 Store kernel: [36104.872230] Pid: 873, comm: Xorg Tainted: G    
  D     2.6.38-11-generic #48-Ubuntu Bochs Bochs
Aug 27 11:10:37 Store kernel: [36104.872280] RIP: 0010:[<ffffffff814c017c>]  
[<ffffffff814c017c>] sock_def_wakeup+0x1c/0x40
Aug 27 11:10:37 Store kernel: [36104.872301] RSP: 0000:ffff880078701798  
EFLAGS: 00010286
Aug 27 11:10:37 Store kernel: [36104.872307] RAX: fffb880054826508 RBX: 
ffff880054bc5040 RCX: 0000000000000000
Aug 27 11:10:37 Store kernel: [36104.872313] RDX: ffff880054bc42c8 RSI: 
0000000000000286 RDI: fffb880054826500
Aug 27 11:10:37 Store kernel: [36104.872319] RBP: ffff880078701798 R08: 
0000000000000000 R09: 0000000000000000
Aug 27 11:10:37 Store kernel: [36104.872324] R10: ffff880078265c10 R11: 
0000000000000008 R12: ffff880054bc50b0
Aug 27 11:10:37 Store kernel: [36104.872330] R13: 0000000000000001 R14: 
ffff880054bc4000 R15: 0000000000000000
Aug 27 11:10:37 Store kernel: [36104.872348] FS:  00007f55818758a0(0000) 
GS:ffff88007fc00000(0000) knlGS:00000000f69a4880
Aug 27 11:10:37 Store kernel: [36104.872355] CS:  0010 DS: 0000 ES: 0000 CR0: 
0000000080050033
Aug 27 11:10:37 Store kernel: [36104.872361] CR2: 00000000004002a8 CR3: 
0000000079ad4000 CR4: 00000000000006f0
Aug 27 11:10:37 Store kernel: [36104.872382] DR0: 0000000000000000 DR1: 
0000000000000000 DR2: 0000000000000000
Aug 27 11:10:37 Store kernel: [36104.872403] DR3: 0000000000000000 DR6: 
00000000ffff0ff0 DR7: 0000000000000400
Aug 27 11:10:37 Store kernel: [36104.872411] Process Xorg (pid: 873, threadinfo 
ffff880078700000, task ffff8800792cadc0)
Aug 27 11:10:37 Store kernel: [36104.872416] Stack:
Aug 27 11:10:37 Store kernel: [36104.872420]  ffff880078701808 ffffffff8155bf78 
ffff8800787017c8 ffffffff81178d3f
Aug 27 11:10:37 Store kernel: [36104.872429]  ffff8800390d1600 ffff880054bc42c8 
00000000787017e8 0000000000000000
Aug 27 11:10:37 Store kernel: [36104.872439]  ffff880078265c10 ffff8800626a9e40 
0000000000000000 ffff88004b7d2180
Aug 27 11:10:37 Store kernel: [36104.872448] Call Trace:
Aug 27 11:10:37 Store kernel: [36104.872462]  [<ffffffff8155bf78>] 
unix_release_sock+0x208/0x250
Aug 27 11:10:37 Store kernel: [36104.872474]  [<ffffffff81178d3f>] ? 
__d_free+0x4f/0x70
Aug 27 11:10:37 Store kernel: [36104.872484]  [<ffffffff8155bfe6>] 
unix_release+0x26/0x30
Aug 27 11:10:37 Store kernel: [36104.872492]  [<ffffffff814bb8d9>] 
sock_release+0x29/0x90
Aug 27 11:10:37 Store kernel: [36104.872499]  [<ffffffff814bb957>] 
sock_close+0x17/0x30
Aug 27 11:10:37 Store kernel: [36104.872508]  [<ffffffff811661fe>] 
__fput+0xbe/0x200
Aug 27 11:10:37 Store kernel: [36104.872515]  [<ffffffff81166365>] 
fput+0x25/0x30
Aug 27 11:10:37 Store kernel: [36104.872523]  [<ffffffff81162c40>] 
filp_close+0x60/0x90
Aug 27 11:10:37 Store kernel: [36104.872534]  [<ffffffff81069e08>] 
put_files_struct+0x88/0xf0
Aug 27 11:10:37 Store kernel: [36104.872542]  [<ffffffff81069f34>] 
exit_files+0x54/0x70
Aug 27 11:10:37 Store kernel: [36104.872576]  [<ffffffff8106a425>] 
do_exit+0x175/0x410
Aug 27 11:10:37 Store kernel: [36104.872588]  [<ffffffff815c484f>] 
oops_end+0xaf/0xf0
Aug 27 11:10:37 Store kernel: [36104.872597]  [<ffffffff810100eb>] die+0x5b/0x90
Aug 27 11:10:37 Store kernel: [36104.872605]  [<ffffffff815c4342>] 
do_general_protection+0x162/0x170
Aug 27 11:10:37 Store kernel: [36104.872613]  [<ffffffff815c3b65>] 
general_protection+0x25/0x30
Aug 27 11:10:37 Store kernel: [36104.872624]  [<ffffffff8104ba86>] ? 
__wake_up_common+0x56/0x90
Aug 27 11:10:37 Store kernel: [36104.872633]  [<ffffffff8104ba89>] ? 
__wake_up_common+0x59/0x90
Aug 27 11:10:37 Store kernel: [36104.872642]  [<ffffffff8104e373>] 
__wake_up_sync_key+0x53/0x80
Aug 27 11:10:37 Store kernel: [36104.872651]  [<ffffffff814c15fe>] 
sock_def_readable+0x3e/0x70
Aug 27 11:10:37 Store kernel: [36104.872661]  [<ffffffff8155e32c>] 
unix_stream_sendmsg+0x2cc/0x470
Aug 27 11:10:37 Store kernel: [36104.872670]  [<ffffffff814bafee>] 
sock_aio_write+0x14e/0x160
Aug 27 11:10:37 Store kernel: [36104.872679]  [<ffffffff814baea0>] ? 
sock_aio_write+0x0/0x160
Aug 27 11:10:37 Store kernel: [36104.872687]  [<ffffffff811653d3>] 
do_sync_readv_writev+0xd3/0x110
Aug 27 11:10:37 Store kernel: [36104.872700]  [<ffffffff812ae958>] ? 
apparmor_file_permission+0x18/0x20
Aug 27 11:10:37 Store kernel: [36104.872710]  [<ffffffff81279c8c>] ? 
security_file_permission+0x2c/0xb0
Aug 27 11:10:37 Store kernel: [36104.872719]  [<ffffffff81164b01>] ? 
rw_verify_area+0x61/0xf0
Aug 27 11:10:37 Store kernel: [36104.872727]  [<ffffffff811656a4>] 
do_readv_writev+0xd4/0x1e0
Aug 27 11:10:37 Store kernel: [36104.872736]  [<ffffffff81279cf3>] ? 
security_file_permission+0x93/0xb0
Aug 27 11:10:37 Store kernel: [36104.872744]  [<ffffffff81164b01>] ? 
rw_verify_area+0x61/0xf0
Aug 27 11:10:37 Store kernel: [36104.872752]  [<ffffffff811657f8>] 
vfs_writev+0x48/0x60
Aug 27 11:10:37 Store kernel: [36104.872759]  [<ffffffff81165981>] 
sys_writev+0x51/0xc0
Aug 27 11:10:37 Store kernel: [36104.872767]  [<ffffffff81086251>] ? 
posix_ktime_get_ts+0x11/0x20
Aug 27 11:10:37 Store kernel: [36104.872775]  [<ffffffff8100c002>] 
system_call_fastpath+0x16/0x1b
Aug 27 11:10:37 Store kernel: [36104.872780] Code: 5c 41 5d c9 c3 66 2e 0f 1f 
84 00 00 00 00 00 55 48 89 e5 66 66 66 66 90 48 8b bf b8 00 00 00 0f ae f0 48 
85 ff 74 18 48 8d 47 08 <48> 39 47 08 74 0e 31 c9 31 d2 be 01 00 00 00 e8 30 e2 
b8 ff c9 
Aug 27 11:10:37 Store kernel: [36104.872848] RIP  [<ffffffff814c017c>] 
sock_def_wakeup+0x1c/0x40
Aug 27 11:10:37 Store kernel: [36104.872857]  RSP <ffff880078701798>
Aug 27 11:10:37 Store kernel: [36104.872866] ---[ end trace 6a7ca2093395d465 
]---
Aug 27 11:10:37 Store kernel: [36104.872872] Fixing recursive fault but reboot 
is needed!

** Affects: kvm (Ubuntu)
     Importance: Undecided
         Status: New


** Tags: gpf kvm virt-viewer virtsh

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to kvm in Ubuntu.
https://bugs.launchpad.net/bugs/836119

Title:
  KVM Guest gets general protection fault on two CPUs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/836119/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs

Reply via email to