Hi, contrary to my comment 38 in #526983 the issue seems not to be fixed with latest kernel.
In fact, r8169 transmit timeout on host occurs the same time as soft lockup in kvm guest occurs. from this time on the kvm process runs at 100% on the host and programs such as top can't be started anymore in kvm guest; shutdown of kvm guest doesn't work eighter, only destroy works. seems to be triggered when kvm guest has some more traffic than normal. host: lenny 64bit, linux-image-2.6.26-2-amd64 2.6.26-21 with kvm-72+dfsg-5~lenny4 kvm guest: lenny 32bit, linux-image-2.6.26-2-686 2.6.26-21 kvm guest started via /usr/bin/kvm -S -M pc -m 2048 -smp 1 -name foobar -monitor pty -boot cd -drive file=/dev/vgdom/foobar,if=virtio,index=0,boot=on -drive file=/var/lib/libvirt/iso/grml-medium_2009.10.iso,if=virtio,media=cdrom,index=2 -net nic,macaddr=54:52:00:00:74:01,vlan=0,model=virtio -net tap,fd=22,script=,vlan=0,ifname=vnet4 -serial pty -parallel none -usb -vnc 127.0.0.1:74 -k de Any ideas? host systems /var/log/messages Jan 31 23:42:00 wtf kernel: [977284.375745] NETDEV WATCHDOG: eth0: transmit timed out Jan 31 23:42:00 wtf kernel: [977284.375745] ------------[ cut here ]------------ Jan 31 23:42:00 wtf kernel: [977284.375745] WARNING: at net/sched/sch_generic.c:222 dev_watchdog+0xa6/0xfb() Jan 31 23:42:00 wtf kernel: [977284.375745] Modules linked in: iptable_nat nf_nat xt_multiport xt_limit xt_tcpudp nf_conntrack_ipv4 xt_state nf_conntrack ipt_REJECT iptable_filter ip_tables x_tables tun sha256_generic aes_x86_64 aes_generic cbc dm_crypt crypto_blkcipher kvm_intel kvm bridge ext2 f71882fg ext3 jbd mbcache dm_mirror dm_log dm_snapshot dm_mod raid1 md_mod sd_mod ahci libata scsi_mod dock r8169 processor thermal_sys [last unloaded: scsi_wait_scan] Jan 31 23:42:00 wtf kernel: [977284.375745] Pid: 0, comm: swapper Not tainted 2.6.26-2-amd64 #1 Jan 31 23:42:00 wtf kernel: [977284.375745] Jan 31 23:42:00 wtf kernel: [977284.375745] Call Trace: Jan 31 23:42:00 wtf kernel: [977284.375745] <IRQ> [<ffffffff80234a0c>] warn_on_slowpath+0x51/0x7a Jan 31 23:42:00 wtf kernel: [977284.375745] [<ffffffff803cc8f6>] dev_watchdog+0x0/0xfb Jan 31 23:42:00 wtf kernel: [977284.375745] [<ffffffff802354a7>] printk+0x4e/0x56 Jan 31 23:42:00 wtf kernel: [977284.375745] [<ffffffff8023cfbd>] lock_timer_base+0x26/0x4b Jan 31 23:42:00 wtf kernel: [977284.375745] [<ffffffff8023d14c>] __mod_timer+0xbd/0xcc Jan 31 23:42:00 wtf kernel: [977284.375745] [<ffffffff802438ef>] queue_delayed_work_on+0xb8/0xc8 Jan 31 23:42:00 wtf kernel: [977284.375745] [<ffffffff803cc8f6>] dev_watchdog+0x0/0xfb Jan 31 23:42:00 wtf kernel: [977284.375745] [<ffffffff803cc99c>] dev_watchdog+0xa6/0xfb Jan 31 23:42:00 wtf kernel: [977284.375745] [<ffffffff803cc8f6>] dev_watchdog+0x0/0xfb Jan 31 23:42:00 wtf kernel: [977284.375745] [<ffffffff8023ca7d>] run_timer_softirq+0x16a/0x1e2 Jan 31 23:42:00 wtf kernel: [977284.375745] [<ffffffff80239449>] __do_softirq+0x5c/0xd1 Jan 31 23:42:00 wtf kernel: [977284.375745] [<ffffffff8020d2cc>] call_softirq+0x1c/0x28 Jan 31 23:42:00 wtf kernel: [977284.375745] [<ffffffff8020f3d8>] do_softirq+0x3c/0x81 Jan 31 23:42:00 wtf kernel: [977284.375745] [<ffffffff802393a7>] irq_exit+0x3f/0x85 Jan 31 23:42:00 wtf kernel: [977284.375745] [<ffffffff8021aa6b>] smp_apic_timer_interrupt+0x8c/0xa4 Jan 31 23:42:00 wtf kernel: [977284.375745] [<ffffffff8020ccf2>] apic_timer_interrupt+0x72/0x80 Jan 31 23:42:00 wtf kernel: [977284.375745] <EOI> [<ffffffff8021a817>] lapic_next_event+0x0/0x13 Jan 31 23:42:00 wtf kernel: [977284.375745] [<ffffffff8021a826>] lapic_next_event+0xf/0x13 Jan 31 23:42:00 wtf kernel: [977284.375745] [<ffffffff8042a54d>] _spin_unlock_irqrestore+0x7/0xe Jan 31 23:42:00 wtf kernel: [977284.375745] [<ffffffff8024d814>] tick_notify+0x1e9/0x33b Jan 31 23:42:00 wtf kernel: [977284.375745] [<ffffffff802498fc>] notifier_call_chain+0x29/0x4c Jan 31 23:42:00 wtf kernel: [977284.375745] [<ffffffff8024d2ce>] clockevents_notify+0x24/0x6d Jan 31 23:42:00 wtf kernel: [977284.375745] [<ffffffffa000828f>] :processor:acpi_idle_enter_bm+0x2d5/0x327 Jan 31 23:42:00 wtf kernel: [977284.375745] [<ffffffff803aa804>] cpuidle_idle_call+0x7a/0xb2 Jan 31 23:42:00 wtf kernel: [977284.375745] [<ffffffff803aa78a>] cpuidle_idle_call+0x0/0xb2 Jan 31 23:42:00 wtf kernel: [977284.375745] [<ffffffff8020ac7e>] cpu_idle+0x8e/0xb8 Jan 31 23:42:00 wtf kernel: [977284.375745] Jan 31 23:42:00 wtf kernel: [977284.375745] ---[ end trace c2e0b14640bc17c0 ]--- Jan 31 23:42:00 wtf kernel: [977284.417786] r8169: eth0: link up kvm guest dmesg (nothing in logs): [1267143826.640016] BUG: soft lockup - CPU#0 stuck for 1179869831s! [pure-ftpd:4742] [1267143826.640016] Modules linked in: xfs ext2 virtio_net button ext3 jbd mbcache dm_mirror dm_log dm_snapshot dm_mod virtio_blk ide_cd_mod cdrom ata_generic libata scsi_mod dock ide_pci_generic virtio_pci piix ide_core [last unloaded: scsi_wait_scan] [1267143826.640016] [1267143826.640016] Pid: 4742, comm: pure-ftpd Not tainted (2.6.26-2-686 #1) [1267143826.640016] EIP: 0073:[<b7e4fa2d>] EFLAGS: 00200202 CPU: 0 [1267143826.640016] EIP is at 0xb7e4fa2d [1267143826.640016] EAX: a05abd7a EBX: b7f1c124 ECX: 09b3cc00 EDX: 09b40198 [1267143826.640016] ESI: 0000000e EDI: 00000010 EBP: bfc708e8 ESP: bfc708c0 [1267143826.640016] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b [1267143826.640016] CR0: 80050033 CR2: 09b3f000 CR3: 379f8000 CR4: 000006d0 [1267143826.640016] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000 [1267143826.640016] DR6: ffff0ff0 DR7: 00000400 [1267143826.640016] ======================= -- Registrierter Linux User #307343 -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org