kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [Bug 217688] New: Guest call trace during boot
@ 2023-07-20  3:09 bugzilla-daemon
  2023-07-20  3:31 ` [Bug 217688] " bugzilla-daemon
                   ` (3 more replies)
  0 siblings, 4 replies; 5+ messages in thread
From: bugzilla-daemon @ 2023-07-20  3:09 UTC (permalink / raw)
  To: kvm

https://bugzilla.kernel.org/show_bug.cgi?id=217688

            Bug ID: 217688
           Summary: Guest call trace during boot
           Product: Virtualization
           Version: unspecified
          Hardware: Intel
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P3
         Component: kvm
          Assignee: virtualization_kvm@kernel-bugs.osdl.org
          Reporter: farrah.chen@intel.com
        Regression: No

Environment:

Host/guest kernel:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
fdf0eaf11452d72945af3 6.5.0-rc2
Qemu: https://gitlab.com/qemu-project/qemu.git master 361d5397
Host/Guest OS: CentOS Stream 9
Platform: SPR/CLX

Bug detail description: 

Create VM:
qemu-system-x86_64 -accel kvm -smp 8 -m 8192 -cpu host -machine q35 -drive
file=centos9.qcow2,if=none,id=virtio-disk0 -device
virtio-blk-pci,drive=virtio-disk0,bootindex=0 -daemonize -vnc :3 -device
virtio-net-pci,netdev=nic0,mac=00:b9:f9:b2:90:72 -netdev
tap,id=nic0,br=virbr0,helper=/usr/local/libexec/qemu-bridge-helper,vhost=on

When VM boot, we can see below Call trace:

[    0.387684] Key type asymmetric registered
[    0.388161] Asymmetric key parser 'x509' registered
[    0.388717] Block layer SCSI generic (bsg) driver version 0.4 loaded (major
246)
[    0.389580] io scheduler mq-deadline registered
[    0.390097] io scheduler kyber registered
[    0.391265] atomic64_test: passed for x86-64 platform with CX8 and with SSE
[    0.392143] unchecked MSR access error: RDMSR from 0xe2 at rIP:
0xffffffffab090378 (native_read_msr+0x8/0x40)
[    0.393213] Call Trace:
[    0.393539]  <TASK>
[    0.393824]  ? ex_handler_msr+0x128/0x140
[    0.394327]  ? fixup_exception+0x89/0x340
[    0.394798]  ? exc_general_protection+0xdc/0x3d0
[    0.395325]  ? asm_exc_general_protection+0x26/0x30
[    0.395873]  ? __pfx_intel_idle_init+0x10/0x10
[    0.396384]  ? native_read_msr+0x8/0x40
[    0.396834]  intel_idle_init_cstates_icpu.constprop.0+0x5e/0x560
[    0.397492]  ? __pfx_intel_idle_init+0x10/0x10
[    0.397997]  intel_idle_vminit.isra.0+0xee/0x1d0
[    0.398517]  do_one_initcall+0x45/0x220
[    0.398971]  do_initcalls+0xac/0x130
[    0.399400]  kernel_init_freeable+0x128/0x1e0
[    0.399896]  ? __pfx_kernel_init+0x10/0x10
[    0.400374]  kernel_init+0x1a/0x1c0
[    0.400790]  ret_from_fork+0x31/0x50
[    0.401219]  ? __pfx_kernel_init+0x10/0x10
[    0.401692]  ret_from_fork_asm+0x1b/0x30
[    0.402151] RIP: 0000:0x0
[    0.402492] Code: Unable to access opcode bytes at 0xffffffffffffffd6.
[    0.403190] RSP: 0000:0000000000000000 EFLAGS: 00000000 ORIG_RAX:
0000000000000000
[    0.404035] RAX: 0000000000000000 RBX: 0000000000000000 RCX:
0000000000000000
[    0.404891] RDX: 0000000000000000 RSI: 0000000000000000 RDI:
0000000000000000
[    0.405680] RBP: 0000000000000000 R08: 0000000000000000 R09:
0000000000000000
[    0.406440] R10: 0000000000000000 R11: 0000000000000000 R12:
0000000000000000
[    0.407193] R13: 0000000000000000 R14: 0000000000000000 R15:
0000000000000000
[    0.407950]  </TASK>
[    0.408755] input: Power Button as
/devices/LNXSYSTM:00/LNXPWRBN:00/input/input0
[    0.409622] ACPI: button: Power Button [PWRF]
[    0.410369] Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
[    0.411138] 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a
16550A
[    0.412241] Non-volatile memory driver v1.3
[    0.412727] Linux agpgart interface v0.103
......

Can be reproduced on latest commit bfa3037d828050 of this mainline linux.git.
And no such issue on host.

-- 
You may reply to this email to add a comment.

You are receiving this mail because:
You are watching the assignee of the bug.

^ permalink raw reply	[flat|nested] 5+ messages in thread

* [Bug 217688] Guest call trace during boot
  2023-07-20  3:09 [Bug 217688] New: Guest call trace during boot bugzilla-daemon
@ 2023-07-20  3:31 ` bugzilla-daemon
  2023-07-20 14:48 ` bugzilla-daemon
                   ` (2 subsequent siblings)
  3 siblings, 0 replies; 5+ messages in thread
From: bugzilla-daemon @ 2023-07-20  3:31 UTC (permalink / raw)
  To: kvm

https://bugzilla.kernel.org/show_bug.cgi?id=217688

Chao Gao (chao.gao@intel.com) changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |chao.gao@intel.com

--- Comment #1 from Chao Gao (chao.gao@intel.com) ---
this is a known issue. Xiaoyao reported this issue earlier, see
https://lore.kernel.org/all/CAJZ5v0gaZHpAri7LRcfpS2TyK_Bsjuxkw9cZUm_uGZAgiub4Jw@mail.gmail.com/

-- 
You may reply to this email to add a comment.

You are receiving this mail because:
You are watching the assignee of the bug.

^ permalink raw reply	[flat|nested] 5+ messages in thread

* [Bug 217688] Guest call trace during boot
  2023-07-20  3:09 [Bug 217688] New: Guest call trace during boot bugzilla-daemon
  2023-07-20  3:31 ` [Bug 217688] " bugzilla-daemon
@ 2023-07-20 14:48 ` bugzilla-daemon
  2023-07-28  2:30 ` bugzilla-daemon
  2023-07-28  2:30 ` bugzilla-daemon
  3 siblings, 0 replies; 5+ messages in thread
From: bugzilla-daemon @ 2023-07-20 14:48 UTC (permalink / raw)
  To: kvm

https://bugzilla.kernel.org/show_bug.cgi?id=217688

Sean Christopherson (seanjc@google.com) changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |seanjc@google.com

--- Comment #2 from Sean Christopherson (seanjc@google.com) ---
Ya, and
ttps://lkml.kernel.org/r/CA%2BQYu4qSBdhEgFURu%2BouAf2d_JNPbZgCSUaxCLoGzMqDQOLWsQ%40mail.gmail.com

-- 
You may reply to this email to add a comment.

You are receiving this mail because:
You are watching the assignee of the bug.

^ permalink raw reply	[flat|nested] 5+ messages in thread

* [Bug 217688] Guest call trace during boot
  2023-07-20  3:09 [Bug 217688] New: Guest call trace during boot bugzilla-daemon
  2023-07-20  3:31 ` [Bug 217688] " bugzilla-daemon
  2023-07-20 14:48 ` bugzilla-daemon
@ 2023-07-28  2:30 ` bugzilla-daemon
  2023-07-28  2:30 ` bugzilla-daemon
  3 siblings, 0 replies; 5+ messages in thread
From: bugzilla-daemon @ 2023-07-28  2:30 UTC (permalink / raw)
  To: kvm

https://bugzilla.kernel.org/show_bug.cgi?id=217688

--- Comment #3 from Chen, Fan (farrah.chen@intel.com) ---
Thanks all, cannot be reproduced on 6.5-rc3.

-- 
You may reply to this email to add a comment.

You are receiving this mail because:
You are watching the assignee of the bug.

^ permalink raw reply	[flat|nested] 5+ messages in thread

* [Bug 217688] Guest call trace during boot
  2023-07-20  3:09 [Bug 217688] New: Guest call trace during boot bugzilla-daemon
                   ` (2 preceding siblings ...)
  2023-07-28  2:30 ` bugzilla-daemon
@ 2023-07-28  2:30 ` bugzilla-daemon
  3 siblings, 0 replies; 5+ messages in thread
From: bugzilla-daemon @ 2023-07-28  2:30 UTC (permalink / raw)
  To: kvm

https://bugzilla.kernel.org/show_bug.cgi?id=217688

Chen, Fan (farrah.chen@intel.com) changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|---                         |CODE_FIX

-- 
You may reply to this email to add a comment.

You are receiving this mail because:
You are watching the assignee of the bug.

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2023-07-28  2:30 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2023-07-20  3:09 [Bug 217688] New: Guest call trace during boot bugzilla-daemon
2023-07-20  3:31 ` [Bug 217688] " bugzilla-daemon
2023-07-20 14:48 ` bugzilla-daemon
2023-07-28  2:30 ` bugzilla-daemon
2023-07-28  2:30 ` bugzilla-daemon

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).