Public bug reported: Got the following errors (listed below) when trying to enter a KVM Guest running Ubuntu desktop 11.04 on top of a KVM Host running Ubuntu server 11.04 install. This was done from a virt-manager running on a 11.04 desktop using ssh over to the server. The "entering" mentioned was merely to move the mouse to within the VM viewer.
I could still login to the KVM guest with ssh, though. I tried shutting down the KVM guest from within using 'shutdown -h NOW', but while this took down the OS, it apparently didn't properly shut down the actual VM instance. When trying to use virt-manager (remotely, as mentioned) to forcefully shut it down, this didn't work out either - just hanging the GUI for a little while, then stating that the operation timed out. When using virsh when logged into the Host, I get: virsh # destroy Store error: Failed to destroy domain Store error: Timed out during operation: cannot acquire state change lock Then, after following some ideas from.. https://bugzilla.redhat.com/show_bug.cgi?id=676205 .. I now have a situation where virsh list doesn't even return: endre@SixCore:~$ virsh Welcome to virsh, the virtualization interactive terminal. .. virsh # list Id Name State ---------------------------------- 17 NewDisk running [.. hanging .. "Store" should have been printed here ..] Today (the next day), I tried virsh list again, and this time it worked out, with Store listed as "running". I then tried connecting via virt-manager, but when trying to go into the machine (virt-viewer?) I get "Connecting to to graphical console for Guest", just hanging. I then tried to forcefully kill the VM again ("Force off" in virt- manager), but this yields the following traceback. Notice the "libvirtError: Timed out during operation: cannot acquire state change lock". Traceback (most recent call last): File "/usr/share/virt-manager/virtManager/engine.py", line 908, in _do_destroy_domain vm.destroy() File "/usr/share/virt-manager/virtManager/domain.py", line 1087, in destroy self._backend.destroy() File "/usr/lib/python2.7/dist-packages/libvirt.py", line 346, in destroy if ret == -1: raise libvirtError ('virDomainDestroy() failed', dom=self) libvirtError: Timed out during operation: cannot acquire state change lock Aug 27 11:10:36 Store kernel: [36104.328903] general protection fault: 0000 [#2] SMP Aug 27 11:10:36 Store kernel: [36104.328915] last sysfs file: /sys/devices/system/cpu/cpu5/cache/index2/shared_cpu_map Aug 27 11:10:36 Store kernel: [36104.328923] CPU 1 Aug 27 11:10:36 Store kernel: [36104.328926] Modules linked in: binfmt_misc parport_pc ppdev vesafb joydev psmouse virtio_balloon seri o_raw i2c_piix4 lp parport usbhid hid virtio_net virtio_blk floppy virtio_pci virtio_ring virtio Aug 27 11:10:36 Store kernel: [36104.328965] Aug 27 11:10:36 Store kernel: [36104.328972] Pid: 873, comm: Xorg Tainted: G D 2.6.38-11-generic #48-Ubuntu Bochs Bochs Aug 27 11:10:36 Store kernel: [36104.328983] RIP: 0010:[<ffffffff8104ba86>] [<ffffffff8104ba86>] __wake_up_common+0x56/0x90 Aug 27 11:10:36 Store kernel: [36104.329002] RSP: 0018:ffff880078701b08 EFLAGS: 00010096 Aug 27 11:10:36 Store kernel: [36104.329008] RAX: ffff880053cf1c18 RBX: d4d5281e29fedeed RCX: 00000000000000c3 Aug 27 11:10:36 Store kernel: [36104.329014] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff880053cf1c18 Aug 27 11:10:36 Store kernel: [36104.329020] RBP: ffff880078701b48 R08: 00000000000000c3 R09: 0000000000000246 Aug 27 11:10:36 Store kernel: [36104.329025] R10: ffff88007d00c800 R11: 0000000000000000 R12: 00000000627812c6 Aug 27 11:10:36 Store kernel: [36104.329031] R13: ffff880054826148 R14: 00000000000000c3 R15: 0000000000000001 Aug 27 11:10:36 Store kernel: [36104.329052] FS: 00007f55818758a0(0000) GS:ffff88007fc40000(0000) knlGS:00000000f69a4880 Aug 27 11:10:36 Store kernel: [36104.329058] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Aug 27 11:10:36 Store kernel: [36104.329064] CR2: 00007f5b0ad2aa30 CR3: 000000007844d000 CR4: 00000000000006e0 Aug 27 11:10:36 Store kernel: [36104.329085] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 Aug 27 11:10:36 Store kernel: [36104.329105] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Aug 27 11:10:36 Store kernel: [36104.329113] Process Xorg (pid: 873, threadinfo ffff880078700000, task ffff8800792cadc0) Aug 27 11:10:36 Store kernel: [36104.329118] Stack: Aug 27 11:10:36 Store kernel: [36104.329121] ffff880017e39f00 0000000100000001 ffff880078701b28 ffff880054826140 Aug 27 11:10:36 Store kernel: [36104.329130] 0000000000000001 0000000000000282 0000000000000001 00000000000000c3 Aug 27 11:10:36 Store kernel: [36104.329140] ffff880078701b88 ffffffff8104e373 ffff880078701b78 ffff880054bc49c0 Aug 27 11:10:36 Store kernel: [36104.329148] Call Trace: Aug 27 11:10:36 Store kernel: [36104.329160] [<ffffffff8104e373>] __wake_up_sync_key+0x53/0x80 Aug 27 11:10:36 Store kernel: [36104.329172] [<ffffffff814c15fe>] sock_def_readable+0x3e/0x70 Aug 27 11:10:36 Store kernel: [36104.329254] [<ffffffff8155e32c>] unix_stream_sendmsg+0x2cc/0x470 Aug 27 11:10:36 Store kernel: [36104.329265] [<ffffffff814bafee>] sock_aio_write+0x14e/0x160 Aug 27 11:10:36 Store kernel: [36104.329274] [<ffffffff814baea0>] ? sock_aio_write+0x0/0x160 Aug 27 11:10:36 Store kernel: [36104.329284] [<ffffffff811653d3>] do_sync_readv_writev+0xd3/0x110 Aug 27 11:10:36 Store kernel: [36104.329319] [<ffffffff812ae958>] ? apparmor_file_permission+0x18/0x20 Aug 27 11:10:36 Store kernel: [36104.329331] [<ffffffff81279c8c>] ? security_file_permission+0x2c/0xb0 Aug 27 11:10:36 Store kernel: [36104.329339] [<ffffffff81164b01>] ? rw_verify_area+0x61/0xf0 Aug 27 11:10:36 Store kernel: [36104.329347] [<ffffffff811656a4>] do_readv_writev+0xd4/0x1e0 Aug 27 11:10:36 Store kernel: [36104.329356] [<ffffffff81279cf3>] ? security_file_permission+0x93/0xb0 Aug 27 11:10:36 Store kernel: [36104.329364] [<ffffffff81164b01>] ? rw_verify_area+0x61/0xf0 Aug 27 11:10:36 Store kernel: [36104.329372] [<ffffffff811657f8>] vfs_writev+0x48/0x60 Aug 27 11:10:36 Store kernel: [36104.329379] [<ffffffff81165981>] sys_writev+0x51/0xc0 Aug 27 11:10:36 Store kernel: [36104.329387] [<ffffffff81086251>] ? posix_ktime_get_ts+0x11/0x20 Aug 27 11:10:36 Store kernel: [36104.329396] [<ffffffff8100c002>] system_call_fastpath+0x16/0x1b Aug 27 11:10:36 Store kernel: [36104.329401] Code: 39 d5 48 8d 42 e8 48 8b 1a 74 40 48 83 eb 18 eb 0b 0f 1f 40 00 48 89 d8 48 8d 5a e8 44 8b 20 4c 89 f1 44 89 fa 8b 75 cc 48 89 c7 <ff> 50 10 85 c0 74 0c 41 83 e4 01 74 06 83 6d c8 01 74 0d 48 8d Aug 27 11:10:36 Store kernel: [36104.329468] RIP [<ffffffff8104ba86>] __wake_up_common+0x56/0x90 Aug 27 11:10:36 Store kernel: [36104.329478] RSP <ffff880078701b08> Aug 27 11:10:36 Store kernel: [36104.329486] ---[ end trace 6a7ca2093395d464 ]--- Aug 27 11:10:37 Store kernel: [36104.872159] general protection fault: 0000 [#3] SMP Aug 27 11:10:37 Store kernel: [36104.872173] last sysfs file: /sys/devices/system/cpu/cpu5/cache/index2/shared_cpu_map Aug 27 11:10:37 Store kernel: [36104.872182] CPU 0 Aug 27 11:10:37 Store kernel: [36104.872187] Modules linked in: binfmt_misc parport_pc ppdev vesafb joydev psmouse virtio_balloon serio_raw i2c_piix4 lp parport usbhid hid virtio_net virtio_blk floppy virtio_pci virtio_ring virtio Aug 27 11:10:37 Store kernel: [36104.872223] Aug 27 11:10:37 Store kernel: [36104.872230] Pid: 873, comm: Xorg Tainted: G D 2.6.38-11-generic #48-Ubuntu Bochs Bochs Aug 27 11:10:37 Store kernel: [36104.872280] RIP: 0010:[<ffffffff814c017c>] [<ffffffff814c017c>] sock_def_wakeup+0x1c/0x40 Aug 27 11:10:37 Store kernel: [36104.872301] RSP: 0000:ffff880078701798 EFLAGS: 00010286 Aug 27 11:10:37 Store kernel: [36104.872307] RAX: fffb880054826508 RBX: ffff880054bc5040 RCX: 0000000000000000 Aug 27 11:10:37 Store kernel: [36104.872313] RDX: ffff880054bc42c8 RSI: 0000000000000286 RDI: fffb880054826500 Aug 27 11:10:37 Store kernel: [36104.872319] RBP: ffff880078701798 R08: 0000000000000000 R09: 0000000000000000 Aug 27 11:10:37 Store kernel: [36104.872324] R10: ffff880078265c10 R11: 0000000000000008 R12: ffff880054bc50b0 Aug 27 11:10:37 Store kernel: [36104.872330] R13: 0000000000000001 R14: ffff880054bc4000 R15: 0000000000000000 Aug 27 11:10:37 Store kernel: [36104.872348] FS: 00007f55818758a0(0000) GS:ffff88007fc00000(0000) knlGS:00000000f69a4880 Aug 27 11:10:37 Store kernel: [36104.872355] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Aug 27 11:10:37 Store kernel: [36104.872361] CR2: 00000000004002a8 CR3: 0000000079ad4000 CR4: 00000000000006f0 Aug 27 11:10:37 Store kernel: [36104.872382] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 Aug 27 11:10:37 Store kernel: [36104.872403] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Aug 27 11:10:37 Store kernel: [36104.872411] Process Xorg (pid: 873, threadinfo ffff880078700000, task ffff8800792cadc0) Aug 27 11:10:37 Store kernel: [36104.872416] Stack: Aug 27 11:10:37 Store kernel: [36104.872420] ffff880078701808 ffffffff8155bf78 ffff8800787017c8 ffffffff81178d3f Aug 27 11:10:37 Store kernel: [36104.872429] ffff8800390d1600 ffff880054bc42c8 00000000787017e8 0000000000000000 Aug 27 11:10:37 Store kernel: [36104.872439] ffff880078265c10 ffff8800626a9e40 0000000000000000 ffff88004b7d2180 Aug 27 11:10:37 Store kernel: [36104.872448] Call Trace: Aug 27 11:10:37 Store kernel: [36104.872462] [<ffffffff8155bf78>] unix_release_sock+0x208/0x250 Aug 27 11:10:37 Store kernel: [36104.872474] [<ffffffff81178d3f>] ? __d_free+0x4f/0x70 Aug 27 11:10:37 Store kernel: [36104.872484] [<ffffffff8155bfe6>] unix_release+0x26/0x30 Aug 27 11:10:37 Store kernel: [36104.872492] [<ffffffff814bb8d9>] sock_release+0x29/0x90 Aug 27 11:10:37 Store kernel: [36104.872499] [<ffffffff814bb957>] sock_close+0x17/0x30 Aug 27 11:10:37 Store kernel: [36104.872508] [<ffffffff811661fe>] __fput+0xbe/0x200 Aug 27 11:10:37 Store kernel: [36104.872515] [<ffffffff81166365>] fput+0x25/0x30 Aug 27 11:10:37 Store kernel: [36104.872523] [<ffffffff81162c40>] filp_close+0x60/0x90 Aug 27 11:10:37 Store kernel: [36104.872534] [<ffffffff81069e08>] put_files_struct+0x88/0xf0 Aug 27 11:10:37 Store kernel: [36104.872542] [<ffffffff81069f34>] exit_files+0x54/0x70 Aug 27 11:10:37 Store kernel: [36104.872576] [<ffffffff8106a425>] do_exit+0x175/0x410 Aug 27 11:10:37 Store kernel: [36104.872588] [<ffffffff815c484f>] oops_end+0xaf/0xf0 Aug 27 11:10:37 Store kernel: [36104.872597] [<ffffffff810100eb>] die+0x5b/0x90 Aug 27 11:10:37 Store kernel: [36104.872605] [<ffffffff815c4342>] do_general_protection+0x162/0x170 Aug 27 11:10:37 Store kernel: [36104.872613] [<ffffffff815c3b65>] general_protection+0x25/0x30 Aug 27 11:10:37 Store kernel: [36104.872624] [<ffffffff8104ba86>] ? __wake_up_common+0x56/0x90 Aug 27 11:10:37 Store kernel: [36104.872633] [<ffffffff8104ba89>] ? __wake_up_common+0x59/0x90 Aug 27 11:10:37 Store kernel: [36104.872642] [<ffffffff8104e373>] __wake_up_sync_key+0x53/0x80 Aug 27 11:10:37 Store kernel: [36104.872651] [<ffffffff814c15fe>] sock_def_readable+0x3e/0x70 Aug 27 11:10:37 Store kernel: [36104.872661] [<ffffffff8155e32c>] unix_stream_sendmsg+0x2cc/0x470 Aug 27 11:10:37 Store kernel: [36104.872670] [<ffffffff814bafee>] sock_aio_write+0x14e/0x160 Aug 27 11:10:37 Store kernel: [36104.872679] [<ffffffff814baea0>] ? sock_aio_write+0x0/0x160 Aug 27 11:10:37 Store kernel: [36104.872687] [<ffffffff811653d3>] do_sync_readv_writev+0xd3/0x110 Aug 27 11:10:37 Store kernel: [36104.872700] [<ffffffff812ae958>] ? apparmor_file_permission+0x18/0x20 Aug 27 11:10:37 Store kernel: [36104.872710] [<ffffffff81279c8c>] ? security_file_permission+0x2c/0xb0 Aug 27 11:10:37 Store kernel: [36104.872719] [<ffffffff81164b01>] ? rw_verify_area+0x61/0xf0 Aug 27 11:10:37 Store kernel: [36104.872727] [<ffffffff811656a4>] do_readv_writev+0xd4/0x1e0 Aug 27 11:10:37 Store kernel: [36104.872736] [<ffffffff81279cf3>] ? security_file_permission+0x93/0xb0 Aug 27 11:10:37 Store kernel: [36104.872744] [<ffffffff81164b01>] ? rw_verify_area+0x61/0xf0 Aug 27 11:10:37 Store kernel: [36104.872752] [<ffffffff811657f8>] vfs_writev+0x48/0x60 Aug 27 11:10:37 Store kernel: [36104.872759] [<ffffffff81165981>] sys_writev+0x51/0xc0 Aug 27 11:10:37 Store kernel: [36104.872767] [<ffffffff81086251>] ? posix_ktime_get_ts+0x11/0x20 Aug 27 11:10:37 Store kernel: [36104.872775] [<ffffffff8100c002>] system_call_fastpath+0x16/0x1b Aug 27 11:10:37 Store kernel: [36104.872780] Code: 5c 41 5d c9 c3 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 66 66 66 66 90 48 8b bf b8 00 00 00 0f ae f0 48 85 ff 74 18 48 8d 47 08 <48> 39 47 08 74 0e 31 c9 31 d2 be 01 00 00 00 e8 30 e2 b8 ff c9 Aug 27 11:10:37 Store kernel: [36104.872848] RIP [<ffffffff814c017c>] sock_def_wakeup+0x1c/0x40 Aug 27 11:10:37 Store kernel: [36104.872857] RSP <ffff880078701798> Aug 27 11:10:37 Store kernel: [36104.872866] ---[ end trace 6a7ca2093395d465 ]--- Aug 27 11:10:37 Store kernel: [36104.872872] Fixing recursive fault but reboot is needed! ** Affects: kvm (Ubuntu) Importance: Undecided Status: New ** Tags: gpf kvm virt-viewer virtsh -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to kvm in Ubuntu. https://bugs.launchpad.net/bugs/836119 Title: KVM Guest gets general protection fault on two CPUs To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/836119/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs