http://bugzilla.opensuse.org/show_bug.cgi?id=1207318 Bug ID: 1207318 Summary: Fail to create a paravirt domain with virt-install due to fatal xen kernel call trace at arch/x86/xen/multicalls.c Classification: openSUSE Product: openSUSE Tumbleweed Version: Current Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Xen Assignee: xen-bugs@suse.de Reporter: jcao@suse.com QA Contact: qa-bugs@suse.de Found By: --- Blocker: --- Created attachment 864244 --> http://bugzilla.opensuse.org/attachment.cgi?id=864244&action=edit tw_pv_kernel_call_trace ## Summary When installing a TW guest on a TW XEN host with virt-install, it failed at once and call trace was output. FV guest can be installed successfully. ## Reproduce steps 1. virt-install --paravirt --name tw-pv-20230118 --location http://download.opensuse.org/tumbleweed/repo/oss --disk path=/var/lib/libvirt/images/tw-pv-20230118.qcow2,size=20,format=qcow2 --vcpus 1 --memory 4096 --extra-args "console=hvc0,115200n8" --network=bridge=br123 --vnc --extra-args "textmode=1" --autoconsole text --debug 2. The entire serial log from guest is attached. [ 4.737449][ T1] ------------[ cut here ]------------ [ 4.737844][ T1] WARNING: CPU: 0 PID: 1 at arch/x86/xen/multicalls.c:102 xen_mc_flush+0x1ae/0x1f0 [ 4.738453][ T1] Modules linked in: iscsi_ibft iscsi_boot_sysfs sunrpc crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic gf128mul ghash_clmulni_intel sha512_ssse3 joydev xen_kbdfront aesni_intel xen_netfront xen_fbfront xen_blkfront crypto_simd cryptd pcspkr scsi_dh_rdac scsi_dh_emc scsi_dh_alua squashfs loop ext4 mbcache jbd2 zram [ 4.739687][ T1] CPU: 0 PID: 1 Comm: init Not tainted 6.1.6-1-default #1 openSUSE Tumbleweed 959c5df2a923a5b5173b76f0e1bbaa419fcea273 [ 4.740311][ T1] RIP: e030:xen_mc_flush+0x1ae/0x1f0 [ 4.740622][ T1] Code: c6 48 39 d3 75 ed 85 f6 0f 84 05 ff ff ff eb 1a e8 57 43 b2 00 90 f6 c4 02 0f 84 8a fe ff ff 0f 0b 44 8b 4d 00 be 01 00 00 00 <0f> 0b 48 c7 c7 50 43 43 82 44 89 ca 31 db 65 8b 0d 05 f8 fe 7e e8 [ 4.741577][ T1] RSP: e02b:ffffc9004000bb38 EFLAGS: 00010082 [ 4.741912][ T1] RAX: ffffffffffffffea RBX: ffff8880fac20300 RCX: 0000000000000000 [ 4.742247][ T1] RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff8880fac20b10 [ 4.742595][ T1] RBP: ffff8880fac20300 R08: 0000000000000000 R09: 0000000000000001 [ 4.742951][ T1] R10: 0000000000007ff0 R11: 0000000000000001 R12: 0000000080000202 [ 4.743297][ T1] R13: ffffea0000460268 R14: 00007efef09a0000 R15: 8000000000000035 [ 4.743666][ T1] FS: 00007efeef8578c0(0000) GS:ffff8880fac00000(0000) knlGS:0000000000000000 [ 4.744020][ T1] CS: 10000e030 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 4.744367][ T1] CR2: 00007efeef818e00 CR3: 00000000108ec000 CR4: 0000000000050660 [ 4.744736][ T1] Call Trace: [ 4.745087][ T1] <TASK> [ 4.745420][ T1] xen_leave_lazy_mmu+0x11/0x30 [ 4.745762][ T1] remap_pfn_range_notrack+0x431/0x5b0 [ 4.746097][ T1] remap_pfn_range+0x5a/0xa0 [ 4.746425][ T1] mmap_mem+0xef/0x110 [ 4.746755][ T1] mmap_region+0x227/0x7f0 [ 4.747077][ T1] do_mmap+0x3a0/0x5b0 [ 4.747406][ T1] ? security_mmap_file+0x7b/0xf0 [ 4.747725][ T1] vm_mmap_pgoff+0xda/0x180 [ 4.748052][ T1] ksys_mmap_pgoff+0x181/0x1f0 [ 4.748360][ T1] do_syscall_64+0x5b/0x80 [ 4.748690][ T1] ? do_syscall_64+0x67/0x80 [ 4.749012][ T1] ? handle_mm_fault+0xdb/0x2d0 [ 4.749329][ T1] ? do_user_addr_fault+0x1ba/0x690 [ 4.749636][ T1] ? syscall_exit_to_user_mode+0x17/0x40 [ 4.749944][ T1] ? do_syscall_64+0x67/0x80 [ 4.750237][ T1] ? exc_page_fault+0x6b/0x150 [ 4.750523][ T1] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 4.750807][ T1] RIP: 0033:0x7efef0400c47 [ 4.751086][ T1] Code: 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 90 90 41 89 ca 41 f7 c1 ff 0f 00 00 75 10 b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 21 c3 48 8b 05 99 81 0d 00 64 c7 00 16 00 00 [ 4.751943][ T1] RSP: 002b:00007ffe3bcb3778 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 4.752255][ T1] RAX: ffffffffffffffda RBX: 00007efef065c1fb RCX: 00007efef0400c47 [ 4.752552][ T1] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 0000000000000000 [ 4.752838][ T1] RBP: 0000000000000400 R08: 0000000000000005 R09: 0000000000000000 [ 4.753123][ T1] R10: 0000000000000002 R11: 0000000000000246 R12: 000055ec8f89cdd0 [ 4.753413][ T1] R13: 000055ec8f8b0870 R14: 0000000000000005 R15: 0000000000000100 [ 4.753694][ T1] </TASK> [ 4.753958][ T1] ---[ end trace 0000000000000000 ]--- ## Reproducibility 100% ## Last good build The failure was first spot in snapshot 20230109, not sure ealier snapshots, because we did not test it before that date. ## Environment kernel-default-6.1.6-1.1.x86_64 libvirt-daemon-8.10.0-2.1.x86_64 xen-4.17.0_02-2.1.x86_64 qemu-7.1.0-8.1.x86_64 ## Logs(suppportconfig should be private) more logs can be found in https://openqa.opensuse.org/tests/3051913#downloads ## Workaround not -- You are receiving this mail because: You are on the CC list for the bug.