Note: This is a public test instance of Red Hat Bugzilla. The data contained within is a snapshot of the live data so any changes you make will not be reflected in the production Bugzilla. Email is disabled so feel free to test any aspect of the site that you want. File any problems you find or give feedback at bugzilla.redhat.com.
Bug 1447590
Summary: | qemu curl driver hangs in a particular libguestfs file download | ||||||||
---|---|---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | kuwei <kuwei> | ||||||
Component: | qemu-kvm-rhev | Assignee: | Paolo Bonzini <pbonzini> | ||||||
Status: | CLOSED ERRATA | QA Contact: | Suqin Huang <shuang> | ||||||
Severity: | medium | Docs Contact: | |||||||
Priority: | medium | ||||||||
Version: | 7.4 | CC: | chayang, coli, juzhang, juzhou, knoel, michen, mrezanin, mxie, mzhan, pbonzini, ptoscano, rjones, tzheng, virt-maint, xiaodwan | ||||||
Target Milestone: | rc | Keywords: | Regression | ||||||
Target Release: | --- | ||||||||
Hardware: | x86_64 | ||||||||
OS: | Linux | ||||||||
Whiteboard: | V2V | ||||||||
Fixed In Version: | qemu-kvm-rhev-2.9.0-6.el7 | Doc Type: | If docs needed, set a value | ||||||
Doc Text: | Story Points: | --- | |||||||
Clone Of: | Environment: | ||||||||
Last Closed: | 2017-08-02 04:38:29 UTC | Type: | Bug | ||||||
Regression: | --- | Mount Type: | --- | ||||||
Documentation: | --- | CRM: | |||||||
Verified Versions: | Category: | --- | |||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||
Embargoed: | |||||||||
Bug Depends On: | |||||||||
Bug Blocks: | 910269, 1437393 | ||||||||
Attachments: |
|
Description
kuwei@redhat.com
2017-05-03 09:23:21 UTC
Created attachment 1275872 [details]
v2v.log for one hour
I am able to reproduce this with: * qemu-kvm-rhev-2.9.0-2.el7.x86_64 * Upstream qemu (e619b14746e5d) Does NOT reproduce with: * qemu-kvm-rhev-2.8.0-6.el7.x86_64 Also (as kuwei also reported to me on IRC) the file is stuck at 8K in the download. So it's an actual bug in upstream qemu. I'm going to bisect this to see if I can isolate a particular commit. ba3186c4e473963ba83b5792f3d02d4ac0a76ba5 is the first bad commit commit ba3186c4e473963ba83b5792f3d02d4ac0a76ba5 Author: Paolo Bonzini <pbonzini> Date: Wed Feb 22 19:07:23 2017 +0100 curl: do not use aio_context_acquire/release Now that all bottom halves and callbacks take care of taking the AioContext lock, we can migrate some users away from it and to a specific QemuMutex or CoMutex. Protect BDRVCURLState access with a QemuMutex. Reviewed-by: Stefan Hajnoczi <stefanha> Signed-off-by: Paolo Bonzini <pbonzini> Message-id: 20170222180725.28611-2-pbonzini Signed-off-by: Stefan Hajnoczi <stefanha> :040000 040000 1a66f1866953d188bdd51318f470c43f6aedf06e d0f24bf0226fa8cc5d8311d74c5542fa225638ea M block Reverting this commit fixes the problem. Started a discussion upstream: https://lists.nongnu.org/archive/html/qemu-devel/2017-05/msg00580.html As this is a clear regression, I'm marking it as such. Paolo posted a fix which worked for me: https://lists.nongnu.org/archive/html/qemu-devel/2017-05/msg00596.html There have been several iterations of this patch. The latest I am testing is: http://lists.nongnu.org/archive/html/qemu-devel/2017-05/msg02432.html Patches posted: [PATCH v2 0/7] curl: locking cleanups/fixes, coroutine conversion, remove aio_poll Message-Id: <20170510143205.32013-1-pbonzini> Result: Pass # virt-v2v -ic vpx://root.75.182/data/10.73.3.19/?no_verify=1 esx5.5-rhel7.3-x86_64 --password-file /tmp/passwd -on shuang [ 0.0] Opening the source -i libvirt -ic vpx://root.75.182/data/10.73.3.19/?no_verify=1 esx5.5-rhel7.3-x86_64 [ 1.2] Creating an overlay to protect the source from being modified [ 1.6] Initializing the target -o libvirt -os default [ 1.6] Opening the overlay [ 26.6] Inspecting the overlay [ 179.2] Checking for sufficient free disk space in the guest [ 179.2] Estimating space required on target for each disk [ 179.2] Converting Red Hat Enterprise Linux Server 7.3 (Maipo) to run on KVM virt-v2v: This guest has virtio drivers installed. [1615.0] Mapping filesystem data to avoid copying unused and blank areas [1641.0] Closing the overlay [1641.2] Checking if the guest needs BIOS or UEFI to boot [1641.2] Assigning disks to buses [1641.2] Copying disk 1/1 to /var/lib/libvirt/images/shuang-sda (raw) (100.00/100%) [2316.9] Creating output metadata Pool default refreshed Domain shuang defined from /tmp/v2vlibvirt7f19ad.xml Package: qemu-img-rhev-2.9.0-8.el7.x86_64.rpm According to comment14, update bug status to VERIFIED Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2017:2392 |