Bug 873659
Summary: | virt: Clocksource tsc unstable (delta = 474712882 ns). Enable clocksource failover by adding clocksource_failover kernel parameter. | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 6 | Reporter: | Bart Verwilst <bart> |
Component: | kernel | Assignee: | Marcelo Tosatti <mtosatti> |
Status: | CLOSED ERRATA | QA Contact: | Virtualization Bugs <virt-bugs> |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | 6.6 | CC: | amascari, areis, dvacek, fdanapfe, jcpunk, jentrena, joey, juzhang, linux, michele, michen, mtosatti, pep, qzhang, rjones, scui, zhzhang |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | x86_64 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | kernel-2.6.32-403.el6 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2013-11-21 13:49:20 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 1300182 |
Description
Bart Verwilst
2012-11-06 12:57:33 UTC
Hi Bart. Thanks for taking the time to enter a bug report with us. We appreciate the feedback and look to use reports such as this to guide our efforts at improving our products. That being said, we're not able to guarantee the timeliness or suitability of a resolution for issues entered here because this is not a mechanism for requesting support. If this issue is critical or in any way time sensitive, please raise a ticket through your regular Red Hat support channels to make certain it receives the proper attention and prioritization to assure a timely resolution. For information on how to contact the Red Hat production support team, please visit: https://www.redhat.com/support/process/production/#howto Hi, Marcelo Actually we met this message before in bug 855245. And in the old bug 855245 there's other critical issue except the dmesg and finally the critical issue got fixed. And in the bug 855245#c2 you said it's harmless about the dmesg. Could you help check this bug again, whether we need to fix this? Thanks! Qunfang Qunfang Zhang, the message is harmless as kvmclock is able to handle the TSC frequency change. Bart Verwilst, a patch has been submitted to print the warning message once. This request was evaluated by Red Hat Product Management for inclusion in a Red Hat Enterprise Linux release. Product Management has requested further review of this request by Red Hat Engineering, for potential inclusion in a Red Hat Enterprise Linux release for currently deployed products. This request is not yet committed for inclusion in a release. Patch(es) available on kernel-2.6.32-403.el6 reproduce this issue with kernel version(2.6.32-379.el6.x86_64 : src and des rhel6.5 host) hostA: model name: Intel(R) Core(TM)2 Quad CPU Q9400 @ 2.66GHz hostB: model name: Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz guest version: rhel6.3 && rhel6.4 Steps to Reproduce: 1. boot src guest on hostA: /usr/libexec/qemu-kvm -M pc -cpu SandyBridge -enable-kvm -m 4G -smp 2,sockets=1,cores=2,threads=2 -name scalability-test -rtc base=localtime,clock=host,driftfix=slew -k en-us -boot menu=on -spice disable-ticketing,port=5931 -vga cirrus -monitor stdio -device virtio-balloon-pci,id=ballooning -qmp tcp:0:7777,server,nowait -usb -device usb-tablet -drive file=/mnt/RHEL-Server-6.3-64.qcow2,if=none,id=drive-system-disk,media=disk,format=qcow2,aio=native,werror=stop,rerror=stop -device virtio-blk-pci,scsi=on,bus=pci.0,drive=drive-system-disk,id=system-disk,bootindex=1,addr=0x5 -netdev tap,id=hostnet0,vhost=on,script=/etc/qemu-ifup -device virtio-net-pci,netdev=hostnet0,id=virtio-net-pci0,mac=00:22:15:27:54:9d,bus=pci.0,addr=0x9 2. listening on hostB: /usr/libexec/qemu-kvm -M pc -cpu SandyBridge -enable-kvm -m 4G -smp 2,sockets=1,cores=2,threads=2 -name scalability-test -rtc base=localtime,clock=host,driftfix=slew -k en-us -boot menu=on -spice disable-ticketing,port=5931 -vga cirrus -monitor stdio -device virtio-balloon-pci,id=ballooning -qmp tcp:0:7777,server,nowait -usb -device usb-tablet -drive file=/mnt/RHEL-Server-6.3-64.qcow2,if=none,id=drive-system-disk,media=disk,format=qcow2,aio=native,werror=stop,rerror=stop -device virtio-blk-pci,scsi=on,bus=pci.0,drive=drive-system-disk,id=system-disk,bootindex=1,addr=0x5 -netdev tap,id=hostnet0,vhost=on,script=/etc/qemu-ifup -device virtio-net-pci,netdev=hostnet0,id=virtio-net-pci0,mac=00:22:15:27:54:9d,bus=pci.0,addr=0x9 -incoming tcp:0:5888 3. migrate from src to des migrate -d tcp:$des_host_ip:5888 4. tail /var/log/messages Actual results: after migration, the des guest logs start to get flooded ( 2 lines every second ) with lines like this: Aug 2 05:44:27 localhost kernel: Clocksource tsc unstable (delta = 137649824 ns). Enable clocksource failover by adding clocksource_failover kernel parameter. Aug 2 05:44:28 localhost kernel: Clocksource tsc unstable (delta = 137654743 ns). Enable clocksource failover by adding clocksource_failover kernel parameter. Aug 2 05:44:28 localhost kernel: Clocksource tsc unstable (delta = 137655477 ns). Enable clocksource failover by adding clocksource_failover kernel parameter. Aug 2 05:44:29 localhost kernel: Clocksource tsc unstable (delta = 137708230 ns). Enable clocksource failover by adding clocksource_failover kernel parameter. Aug 2 05:44:29 localhost kernel: Clocksource tsc unstable (delta = 137601539 ns). Enable clocksource failover by adding clocksource_failover kernel parameter. Expected results: Only show one information. Verify this issue with guest kernel version (2.6.32-403.el6.x86_64 ) host kernel: 2.6.32-403.el6.x86_64 && 2.6.32-379.el6.x86_64 Steps as above. Actual results: only show one information(tail /var/log/messages) Based on above information, so I think this bug has benn fixed. is there an eta for the new kernel to be released? Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHSA-2013-1645.html |