* [Bug 216737] New: Call trace happens on guest after running pt vmx tool
@ 2022-11-24 7:24 bugzilla-daemon
2022-11-24 7:30 ` [Bug 216737] " bugzilla-daemon
2022-11-24 7:37 ` bugzilla-daemon
0 siblings, 2 replies; 3+ messages in thread
From: bugzilla-daemon @ 2022-11-24 7:24 UTC (permalink / raw)
To: kvm
https://bugzilla.kernel.org/show_bug.cgi?id=216737
Bug ID: 216737
Summary: Call trace happens on guest after running pt vmx tool
Product: Virtualization
Version: unspecified
Kernel Version: 6.1.0-rc4
Hardware: Intel
OS: Linux
Tree: Mainline
Status: NEW
Severity: normal
Priority: P1
Component: kvm
Assignee: virtualization_kvm@kernel-bugs.osdl.org
Reporter: lixiao.yang@intel.com
Regression: No
Created attachment 303284
--> https://bugzilla.kernel.org/attachment.cgi?id=303284&action=edit
Guest dmesg log
Environment:
CPU Architecture: x86_64
Host OS: Red Hat Enterprise Linux 8.4 (Ootpa)
Host kernel: 6.1.0-rc4
Guest OS: Red Hat Enterprise Linux 8.3 (Ootpa)
Guest kernel:5.19.0-rc8
gcc: gcc version 8.4.1
Host kernel source: https://git.kernel.org/pub/scm/virt/kvm/kvm.git
Branch: next
Commit: d72cf8ff
Qemu source: https://git.qemu.org/git/qemu.git
Branch: master
Commit: 6d71357a
Bug Detailed Description:
There are call traces on guest after running pt vmx tool on guest.
Reproducing Steps:
1. Create a guest:
qemu-system-x86_64 -accel kvm -m 4096 -smp 4 -drive
file=/share/xvs/var/tmp-img_kvm_ptvmx_snapshot_1653283173,if=none,id=virtio-disk0
-device virtio-blk-pci,drive=virtio-disk0,bootindex=0 -cpu host -device
virtio-net-pci,netdev=nic0,mac=00:98:31:f3:d3:59 -netdev
tap,id=nic0,br=virbr0,helper=/usr/local/libexec/qemu-bridge-helper,vhost=on
-monitor pty -daemonize -vnc :11024
2.Log into the guest and run pt_vmx_tool
./pt_vmx_tool/BAT-ipt
Actual Result:
Call trace happens on guest.
Expected Result:
No call trace happens on guest.
Call trace log:
[ 54.937709] Call Trace:
[ 54.938287] <TASK>
[ 54.938796] intel_pmu_enable_bts+0x5c/0x70
[ 54.939443] bts_event_add+0x7b/0xa0
[ 54.940036] event_sched_in.isra.133.part.134+0x7a/0x1b0
[ 54.940744] ? sysvec_apic_timer_interrupt+0xab/0xc0
[ 54.941428] merge_sched_in+0x27e/0x4e0
[ 54.942029] visit_groups_merge.constprop.144+0x137/0x460
[ 54.942739] ctx_sched_in+0xcf/0x1e0
[ 54.943315] ctx_resched+0x54/0x90
[ 54.943878] event_function+0x95/0xe0
[ 54.944454] ? perf_duration_warn+0x30/0x30
[ 54.945065] remote_function+0x4a/0x60
[ 54.945649] generic_exec_single+0x64/0xa0
[ 54.946244] smp_call_function_single+0xbd/0x180
[ 54.946883] ? perf_duration_warn+0x30/0x30
[ 54.947472] ? visit_groups_merge.constprop.144+0x164/0x460
[ 54.949322] ? perf_mux_hrtimer_handler+0x330/0x330
[ 54.949961] ? perf_duration_warn+0x30/0x30
[ 54.950545] task_function_call+0x55/0x90
[ 54.951109] ? perf_swevent_get_recursion_context+0x70/0x70
[ 54.951781] event_function_call+0x96/0x120
[ 54.952350] ? perf_mux_hrtimer_handler+0x330/0x330
[ 54.952975] ? __perf_event_task_sched_in+0x5c/0x1d0
[ 54.953638] ? _perf_event_disable+0x50/0x50
[ 54.954215] ? _perf_event_disable+0x50/0x50
[ 54.954788] perf_event_for_each_child+0x37/0x80
[ 54.955379] ? _perf_event_disable+0x50/0x50
[ 54.955944] _perf_ioctl+0x1a6/0x840
[ 54.956447] ? __schedule+0x3fc/0x980
[ 54.956960] ? preempt_count_add+0x70/0xa0
[ 54.957495] ? _raw_spin_lock_irq+0x19/0x40
[ 54.958035] ? ptrace_stop+0x200/0x2a0
[ 54.958543] ? ptrace_do_notify+0x92/0xc0
[ 54.959057] perf_ioctl+0x43/0x70
[ 54.959532] __x64_sys_ioctl+0x89/0xc0
...
Please refer to the attached file for the complete dmesg information.
--
You may reply to this email to add a comment.
You are receiving this mail because:
You are watching the assignee of the bug.
^ permalink raw reply [flat|nested] 3+ messages in thread
* [Bug 216737] Call trace happens on guest after running pt vmx tool
2022-11-24 7:24 [Bug 216737] New: Call trace happens on guest after running pt vmx tool bugzilla-daemon
@ 2022-11-24 7:30 ` bugzilla-daemon
2022-11-24 7:37 ` bugzilla-daemon
1 sibling, 0 replies; 3+ messages in thread
From: bugzilla-daemon @ 2022-11-24 7:30 UTC (permalink / raw)
To: kvm
https://bugzilla.kernel.org/show_bug.cgi?id=216737
--- Comment #1 from Yang Lixiao (lixiao.yang@intel.com) ---
Created attachment 303285
--> https://bugzilla.kernel.org/attachment.cgi?id=303285&action=edit
strace log when executing the pt vmx binary tool
--
You may reply to this email to add a comment.
You are receiving this mail because:
You are watching the assignee of the bug.
^ permalink raw reply [flat|nested] 3+ messages in thread
* [Bug 216737] Call trace happens on guest after running pt vmx tool
2022-11-24 7:24 [Bug 216737] New: Call trace happens on guest after running pt vmx tool bugzilla-daemon
2022-11-24 7:30 ` [Bug 216737] " bugzilla-daemon
@ 2022-11-24 7:37 ` bugzilla-daemon
1 sibling, 0 replies; 3+ messages in thread
From: bugzilla-daemon @ 2022-11-24 7:37 UTC (permalink / raw)
To: kvm
https://bugzilla.kernel.org/show_bug.cgi?id=216737
--- Comment #2 from Yang Lixiao (lixiao.yang@intel.com) ---
This were some discussions about this bug before
https://www.mail-archive.com/qemu-devel@nongnu.org/msg900222.html.
--
You may reply to this email to add a comment.
You are receiving this mail because:
You are watching the assignee of the bug.
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2022-11-24 7:37 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2022-11-24 7:24 [Bug 216737] New: Call trace happens on guest after running pt vmx tool bugzilla-daemon
2022-11-24 7:30 ` [Bug 216737] " bugzilla-daemon
2022-11-24 7:37 ` bugzilla-daemon
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).