Bug 1147354
Summary: | Qemu core dump when boot up a guest on a non-existent hugepage path | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | CongLi <coli> |
Component: | qemu-kvm-rhev | Assignee: | Luiz Capitulino <lcapitulino> |
Status: | CLOSED ERRATA | QA Contact: | Virtualization Bugs <virt-bugs> |
Severity: | high | Docs Contact: | |
Priority: | medium | ||
Version: | 7.1 | CC: | hhuang, huding, juzhang, lcapitulino, virt-maint, xfu |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | qemu-kvm-rhev-2.1.2-8.el7 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2015-03-05 09:56:15 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
CongLi
2014-09-29 05:51:16 UTC
*** Bug 1158793 has been marked as a duplicate of this bug. *** *** Bug 1162989 has been marked as a duplicate of this bug. *** Fix included in qemu-kvm-rhev-2.1.2-8.el7 Reproduce this bug using the following version: kernel-3.10.0-205.el7.x86_64 qemu-kvm-rhev-2.1.2-6.el7.x86_64 Steps to Reroduce: 1. mount hugetlbfs mount -t hugetlbfs none /mnt/kvm_hugepage 2. boot up the guest on a non-existent path with option '-mem-path'. #/usr/libexec/qemu-kvm -S -name 'virt-tests-vm1' -sandbox off -M pc -nodefaults -vga qxl -global qxl-vga.vram_size=33554432 -device intel-hda,bus=pci.0,addr=03 -device hda-duplex -chardev socket,id=qmp_id_qmpmonitor1,path=/tmp/monitor-qmpmonitor1-20140928-172700-4g3PfMTp,server,nowait -mon chardev=qmp_id_qmpmonitor1,mode=control -chardev socket,id=serial_id_serial0,path=/tmp/serial-serial0-20140928-172700-4g3PfMTp,server,nowait -device isa-serial,chardev=serial_id_serial0 -device virtio-serial-pci,id=virtio_serial_pci0,bus=pci.0,addr=04 -chardev socket,id=devvs,path=/tmp/virtio_port-vs-20140928-172700-4g3PfMTp,server,nowait -device virtserialport,chardev=devvs,name=vs,id=vs,bus=virtio_serial_pci0.0 -chardev socket,id=seabioslog_id_20140928-172700-4g3PfMTp,path=/tmp/seabios-20140928-172700-4g3PfMTp,server,nowait -device isa-debugcon,chardev=seabioslog_id_20140928-172700-4g3PfMTp,iobase=0x402 -device nec-usb-xhci,id=usb1,bus=pci.0,addr=05 -drive id=drive_image1,if=none,cache=none,snapshot=off,aio=native,file=/home/rhel7_1_1029.qcow2 -device virtio-blk-pci,id=image1,drive=drive_image1,bootindex=0,bus=pci.0,addr=06 -device virtio-net-pci,mac=9a:eb:ec:ed:ee:ef,id=idcejB0N,vectors=4,netdev=idkbmGLy,bus=pci.0,addr=07 -netdev tap,id=idkbmGLy,vhost=on -m 2048 -mem-path /mnt/kvm_hugepag -smp 8,cores=4,threads=1,sockets=2 -cpu 'SandyBridge',+kvm_pv_unhalt -device usb-tablet,id=usb-tablet1,bus=usb1.0,port=1 -rtc base=utc,clock=host,driftfix=slew -boot order=cdn,once=c,menu=off -no-kvm-pit-reinjection -enable-kvm -monitor stdio -vnc :0 Result: after step2, qemu-kvm core dump: (gdb) #0 0x00007ffff1a085d7 in raise () from /lib64/libc.so.6 #1 0x00007ffff1a09cc8 in abort () from /lib64/libc.so.6 #2 0x00007ffff1a01546 in __assert_fail_base () from /lib64/libc.so.6 #3 0x00007ffff1a015f2 in __assert_fail () from /lib64/libc.so.6 #4 0x00005555556248a9 in qemu_ram_set_idstr (addr=<optimized out>, name=<optimized out>, dev=dev@entry=0x0) at /usr/src/debug/qemu-2.1.2/exec.c:1220 #5 0x000055555565cdd3 in vmstate_register_ram (mr=mr@entry=0x55555632a570, dev=dev@entry=0x0) at /usr/src/debug/qemu-2.1.2/savevm.c:1407 #6 0x000055555565ce07 in vmstate_register_ram_global (mr=mr@entry=0x55555632a570) at /usr/src/debug/qemu-2.1.2/savevm.c:1418 #7 0x0000555555650f29 in allocate_system_memory_nonnuma (ram_size=2147483648, name=0x55555589cb36 "pc.ram", owner=0x0, mr=0x55555632a570) at /usr/src/debug/qemu-2.1.2/numa.c:275 #8 memory_region_allocate_system_memory (mr=mr@entry=0x55555632a570, owner=owner@entry=0x0, name=name@entry=0x55555589cb36 "pc.ram", ram_size=2147483648) at /usr/src/debug/qemu-2.1.2/numa.c:286 #9 0x000055555568957e in pc_memory_init (machine=machine@entry=0x5555561862e0, system_memory=system_memory@entry=0x5555561871f0, below_4g_mem_size=2147483648, above_4g_mem_size=0, rom_memory=rom_memory@entry=0x555556191790, ram_memory=ram_memory@entry=0x7fffffffd9c0, guest_info=guest_info@entry=0x555556191340) at /usr/src/debug/qemu-2.1.2/hw/i386/pc.c:1225 #10 0x000055555568ada6 in pc_init1 (machine=0x5555561862e0, kvmclock_enabled=1, pci_enabled=1) at /usr/src/debug/qemu-2.1.2/hw/i386/pc_piix.c:181 #11 0x000055555561d8c3 in main (argc=<optimized out>, argv=<optimized out>, envp=<optimized out>) at vl.c:4434 Test this issue using the following version: kernel-3.10.0-205.el7.x86_64 qemu-kvm-rhev-2.1.2-8.el7.x86_64 Test the same steps of comment 7, after step2, the guest can boot normally and qemu-kvm does not core dump. Based on the above result, I think this issue has been fixed. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHSA-2015-0624.html |