Bug 2035185

Summary: Qemu core dump when start guest with nbd node or do block jobs to nbd node
Product: Red Hat Enterprise Linux 8 Reporter: aihua liang <aliang>
Component: qemu-kvmAssignee: Hanna Czenczek <hreitz>
qemu-kvm sub component: NBD QA Contact: aihua liang <aliang>
Status: CLOSED ERRATA Docs Contact:
Severity: high    
Priority: urgent CC: coli, eblake, hreitz, jinzhao, jmaloy, juzhang, kkiwi, timao, virt-maint
Version: 8.6Keywords: Regression, Triaged
Target Milestone: rc   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: qemu-kvm-6.2.0-8.module+el8.6.0+14324+050a5215 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: 2033626 Environment:
Last Closed: 2022-05-10 13:24:21 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2033626    
Bug Blocks:    

Comment 1 aihua liang 2021-12-23 08:20:20 UTC
gdb info in RHEL8.6-qemu6.2:
  (gdb) bt
#0  __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50
#1  0x00007f0cf2f52db5 in __GI_abort () at abort.c:79
#2  0x00007f0cf2f52c89 in __assert_fail_base (fmt=0x7f0cf30bb7b8 "%s%s%s:%u: %s%sAssertion `%s' failed.\n%n", assertion=0x5637951d8818 "qemu_get_current_aio_context() == qemu_coroutine_get_aio_context(co)", 
    file=0x5637951d8919 "../io/channel.c", line=484, function=<optimized out>) at assert.c:92
#3  0x00007f0cf2f783a6 in __GI___assert_fail (assertion=assertion@entry=0x5637951d8818 "qemu_get_current_aio_context() == qemu_coroutine_get_aio_context(co)", file=file@entry=0x5637951d8919 "../io/channel.c", 
    line=line@entry=484, function=function@entry=0x5637951d8990 <__PRETTY_FUNCTION__.18719> "qio_channel_restart_read") at assert.c:101
#4  0x0000563794fad9d0 in qio_channel_restart_read (opaque=<optimized out>) at ../io/channel.c:483
#5  qio_channel_restart_read (opaque=<optimized out>) at ../io/channel.c:477
#6  0x00005637950bcdd9 in aio_dispatch_handler (ctx=ctx@entry=0x563795fbec80, node=0x7f0ce00087a0) at ../util/aio-posix.c:329
#7  0x00005637950bd64c in aio_dispatch_handlers (ctx=0x563795fbec80) at ../util/aio-posix.c:372
#8  aio_dispatch (ctx=0x563795fbec80) at ../util/aio-posix.c:382
#9  0x00005637950cf192 in aio_ctx_dispatch (source=<optimized out>, callback=<optimized out>, user_data=<optimized out>) at ../util/async.c:311
#10 0x00007f0cf401e95d in g_main_dispatch (context=0x563795fb8700) at gmain.c:3193
#11 g_main_context_dispatch (context=context@entry=0x563795fb8700) at gmain.c:3873
#12 0x00005637950d9e30 in glib_pollfds_poll () at ../util/main-loop.c:232
#13 os_host_main_loop_wait (timeout=<optimized out>) at ../util/main-loop.c:255
#14 main_loop_wait (nonblocking=nonblocking@entry=0) at ../util/main-loop.c:531
#15 0x0000563794ed4769 in qemu_main_loop () at ../softmmu/runstate.c:726
#16 0x0000563794d085d2 in main (argc=<optimized out>, argv=<optimized out>, envp=<optimized out>) at ../softmmu/main.c:50

Comment 3 aihua liang 2021-12-24 05:39:20 UTC
When test without iothread, not hit this issue.

Comment 8 aihua liang 2022-02-24 07:13:37 UTC
Test with qemu-kvm-6.2.0-8.module+el8.6.0+14324+050a5215, not hit this issue any more
(1/3) Host_RHEL.m8.u6.product_rhel.qcow2.virtio_scsi.up.virtio_net.Guest.RHEL.8.6.0.x86_64.io-github-autotest-qemu.blockdev_stream_remote_server_down.q35: PASS
(2/3)Host_RHEL.m8.u6.product_rhel.qcow2.virtio_scsi.up.virtio_net.Guest.RHEL.8.6.0.x86_64.io-github-autotest-qemu.blockdev_mirror_remote_server_down.q35: PASS (123.53 s)
(3/3) Host_RHEL.m8.u6.product_rhel.qcow2.virtio_scsi.up.virtio_net.Guest.RHEL.8.6.0.x86_64.io-github-autotest-qemu.blockdev_commit_firewall.q35: PASS (168.70 s)

Comment 9 Yanan Fu 2022-02-24 10:09:38 UTC
QE bot(pre verify): Set 'Verified:Tested,SanityOnly' as gating/tier1 test pass.

Comment 11 errata-xmlrpc 2022-05-10 13:24:21 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2022:1759