WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-bugs

[Xen-bugs] [Bug 1626] New: 2.6.32 Dom0 crashes after lv* commands

To: xen-bugs@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-bugs] [Bug 1626] New: 2.6.32 Dom0 crashes after lv* commands
From: bugzilla-daemon@xxxxxxxxxxxxxxxxxxx
Date: Mon, 14 Jun 2010 01:33:04 -0700
Delivery-date: Mon, 14 Jun 2010 01:33:12 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-bugs-request@lists.xensource.com?subject=help>
List-id: Xen Bugzilla <xen-bugs.lists.xensource.com>
List-post: <mailto:xen-bugs@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=unsubscribe>
Reply-to: bugs@xxxxxxxxxxxxxxxxxx
Sender: xen-bugs-bounces@xxxxxxxxxxxxxxxxxxx
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1626

           Summary: 2.6.32 Dom0 crashes after lv* commands
           Product: Xen
           Version: unstable
          Platform: x86-64
        OS/Version: Linux-2.6
            Status: NEW
          Severity: critical
          Priority: P2
         Component: Linux-pv_ops dom0
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: pasztor.janos@xxxxxxxxxxx


Hello,

we have been experiencing multiple Dom0 crashes, each after a lvcreate or
lvdisplay command. The physical machine is an Intel SSR212MC2 storage server
with an Areca ARC-1680 RAID controller. This error has occured on two distinct
machines of the same type. Captured stack trace is the following:

[577776.408640] BUG: unable to handle kernel paging request at ffff8804a0941010
[577776.409011] IP: [<ffffffff8100e77c>] xen_set_pmd+0x16/0x2b
[577776.409011] PGD 1002067 PUD 6daa067 PMD 6eaf067 PTE 80100004a0941065
[577776.409011] Oops: 0003 [#1] SMP 
[577776.409011] last sysfs file: /sys/devices/virtual/block/dm-23/uevent
[577776.409902] CPU 0 
[577776.409902] Pid: 20567, comm: udevd Not tainted 2.6.32.15-dotroll #5
S5000PSL
[577776.409902] RIP: e030:[<ffffffff8100e77c>]  [<ffffffff8100e77c>]
xen_set_pmd+0x16/0x2b
[577776.409902] RSP: e02b:ffff8805e55d1ad8  EFLAGS: 00010246
[577776.409902] RAX: 0000000000000000 RBX: ffff8804a0941010 RCX:
ffff880000000000
[577776.409902] RDX: ffffea0000000000 RSI: 0000000000000000 RDI:
ffff8804a0941010
[577776.409902] RBP: ffff8805e55d1ae8 R08: 0000000001380000 R09:
dead000000200200
[577776.409902] R10: dead000000100100 R11: 00000000e9f88af7 R12:
0000000000000000
[577776.409902] R13: 000000000061e000 R14: 0000000000400000 R15:
ffff8804a0941010
[577776.409902] FS:  00007f65e70086f0(0000) GS:ffff880028038000(0000)
knlGS:0000000000000000
[577776.409902] CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[577776.409902] CR2: ffff8804a0941010 CR3: 0000000532baa000 CR4:
0000000000002660
[577776.409902] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000
[577776.409902] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7:
0000000000000400
[577776.409902] Process udevd (pid: 20567, threadinfo ffff8805e55d0000, task
ffff8805e5055fe0)
[577776.409902] Stack:
[577776.409902]  0000000000600000 0000000000400000 ffff8805e55d1ba8
ffffffff810aebba
[577776.409902] <0> 00000005e3478067 ffff8805e55d1b78 0000000000000000
0000000000000000
[577776.409902] <0> 000000000061dfff 000000000061dfff 0000000001200000
0000000000000000
[577776.409902] Call Trace:
[577776.409902]  [<ffffffff810aebba>] free_pgd_range+0x221/0x3bb
[577776.409902]  [<ffffffff810aeddf>] free_pgtables+0x8b/0xa8
[577776.409902]  [<ffffffff810b0812>] exit_mmap+0x102/0x15c
[577776.409902]  [<ffffffff8103ff3b>] mmput+0x2b/0xba
[577776.409902]  [<ffffffff810c8bf3>] flush_old_exec+0x469/0x553
[577776.409902]  [<ffffffff810c4715>] ? vfs_read+0xcd/0x102
[577776.409902]  [<ffffffff810fd1a3>] load_elf_binary+0x38a/0x1927
[577776.409902]  [<ffffffff810abc7d>] ? follow_page+0x209/0x258
[577776.409902]  [<ffffffff810ad5b3>] ? __get_user_pages+0x379/0x3fa
[577776.409902]  [<ffffffff810faa59>] ? load_misc_binary+0x61/0x336
[577776.409902]  [<ffffffff810ad6be>] ? get_user_pages+0x44/0x46
[577776.409902]  [<ffffffff810c802d>] ? get_arg_page+0x50/0xa9
[577776.409902]  [<ffffffff810c83fc>] search_binary_handler+0x9a/0x1bc
[577776.409902]  [<ffffffff810c9877>] do_execve+0x243/0x326
[577776.409902]  [<ffffffff810ce67e>] ? getname+0x148/0x1ad
[577776.409902]  [<ffffffff8101051e>] sys_execve+0x3e/0x58
[577776.409902]  [<ffffffff81011fda>] stub_execve+0x6a/0xc0
[577776.409902] Code: d9 9a 01 00 bf 01 00 00 00 e8 8d e8 ff ff 48 83 c4 18 5b
c9 c3 55 48 89 e5 41 54 49 89 f4 53 48 89 fb e8 f6 e5 ff ff 84 c0 75 05 <4c> 89
23 eb 0b 4c 89 e6 48 89 df e8 7d ff ff ff 5b 41 5c c9 c3 
[577776.409902] RIP  [<ffffffff8100e77c>] xen_set_pmd+0x16/0x2b
[577776.409902]  RSP <ffff8805e55d1ad8>
[577776.409902] CR2: ffff8804a0941010
[577776.409902] ---[ end trace 514df97cbf024ab5 ]---
[577776.432476] ------------[ cut here ]------------
[577776.432755] kernel BUG at arch/x86/xen/mmu.c:1648!
[577776.433007] invalid opcode: 0000 [#2] SMP 
[577776.433007] last sysfs file: /sys/devices/virtual/block/dm-29/uevent
[577776.433007] CPU 4 
[577776.433007] Pid: 20583, comm: udevd Tainted: G      D    2.6.32.15-dotroll
#5 S5000PSL
[577776.433007] RIP: e030:[<ffffffff8100c94a>]  [<ffffffff8100c94a>]
pin_pagetable_pfn+0x31/0x37
[577776.433007] RSP: e02b:ffff88058f807db8  EFLAGS: 00010282
[577776.433007] RAX: 00000000ffffffea RBX: 00000000005e378b RCX:
0000000000000001
[577776.433007] RDX: 0000000000000000 RSI: 0000000000000001 RDI:
ffff88058f807db8
[577776.433007] RBP: ffff88058f807dd8 R08: 0000000000000c58 R09:
00003ffffffff000
[577776.433007] R10: 0000000000007ff0 R11: 0000000000000002 R12:
0000000000000003
[577776.433007] R13: ffff880567ab9010 R14: ffff88058f807f58 R15:
ffff8805e3a002a0
[577776.433007] FS:  00007f65e70086f0(0000) GS:ffff8800280a0000(0000)
knlGS:0000000000000000
[577776.433007] CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[577776.433007] CR2: 0000000000413944 CR3: 0000000551c21000 CR4:
0000000000002660
[577776.433007] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000
[577776.433007] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7:
0000000000000400
[577776.433007] Process udevd (pid: 20583, threadinfo ffff88058f806000, task
ffff8805530224e0)
[577776.433007] Stack:
[577776.433007]  0000000000000000 000000000000b4ff 000000018188f948
00000000005e378b
[577776.433007] <0> ffff88058f807df8 ffffffff8100e507 00000000005e378b
ffff8805e3fd7500
[577776.433007] <0> ffff88058f807e08 ffffffff8100e53a ffff88058f807e48
ffffffff810acadc
[577776.433007] Call Trace:
[577776.433007]  [<ffffffff8100e507>] xen_alloc_ptpage+0x6a/0x6f
[577776.433007]  [<ffffffff8100e53a>] xen_alloc_pte+0xe/0x10
[577776.433007]  [<ffffffff810acadc>] __pte_alloc+0x72/0xd0
[577776.433007]  [<ffffffff810acbd8>] handle_mm_fault+0x9e/0x700
[577776.433007]  [<ffffffff815ab1f5>] ? page_fault+0x25/0x30
[577776.433007]  [<ffffffff8102b9ed>] do_page_fault+0x1e0/0x1f7
[577776.433007]  [<ffffffff812c1b6d>] ? __put_user_4+0x1d/0x30
[577776.433007]  [<ffffffff815ab1f5>] page_fault+0x25/0x30
[577776.433007] Code: ec 20 89 7d e0 48 89 f7 e8 47 fd ff ff 48 8d 7d e0 48 89
45 e8 be 01 00 00 00 31 d2 41 ba f0 7f 00 00 e8 fa c9 ff ff 85 c0 74 04 <0f> 0b
eb fe c9 c3 55 49 89 ca 48 89 e5 40 88 f1 41 54 4c 89 d0 
[577776.433007] RIP  [<ffffffff8100c94a>] pin_pagetable_pfn+0x31/0x37
[577776.433007]  RSP <ffff88058f807db8>
[577776.433007] ---[ end trace 514df97cbf024ab6 ]---


-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs

<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-bugs] [Bug 1626] New: 2.6.32 Dom0 crashes after lv* commands, bugzilla-daemon <=