|
|
|
|
|
|
|
|
|
|
xen-bugs
[Xen-bugs] [Bug 1626] New: 2.6.32 Dom0 crashes after lv* commands
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1626
Summary: 2.6.32 Dom0 crashes after lv* commands
Product: Xen
Version: unstable
Platform: x86-64
OS/Version: Linux-2.6
Status: NEW
Severity: critical
Priority: P2
Component: Linux-pv_ops dom0
AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
ReportedBy: pasztor.janos@xxxxxxxxxxx
Hello,
we have been experiencing multiple Dom0 crashes, each after a lvcreate or
lvdisplay command. The physical machine is an Intel SSR212MC2 storage server
with an Areca ARC-1680 RAID controller. This error has occured on two distinct
machines of the same type. Captured stack trace is the following:
[577776.408640] BUG: unable to handle kernel paging request at ffff8804a0941010
[577776.409011] IP: [<ffffffff8100e77c>] xen_set_pmd+0x16/0x2b
[577776.409011] PGD 1002067 PUD 6daa067 PMD 6eaf067 PTE 80100004a0941065
[577776.409011] Oops: 0003 [#1] SMP
[577776.409011] last sysfs file: /sys/devices/virtual/block/dm-23/uevent
[577776.409902] CPU 0
[577776.409902] Pid: 20567, comm: udevd Not tainted 2.6.32.15-dotroll #5
S5000PSL
[577776.409902] RIP: e030:[<ffffffff8100e77c>] [<ffffffff8100e77c>]
xen_set_pmd+0x16/0x2b
[577776.409902] RSP: e02b:ffff8805e55d1ad8 EFLAGS: 00010246
[577776.409902] RAX: 0000000000000000 RBX: ffff8804a0941010 RCX:
ffff880000000000
[577776.409902] RDX: ffffea0000000000 RSI: 0000000000000000 RDI:
ffff8804a0941010
[577776.409902] RBP: ffff8805e55d1ae8 R08: 0000000001380000 R09:
dead000000200200
[577776.409902] R10: dead000000100100 R11: 00000000e9f88af7 R12:
0000000000000000
[577776.409902] R13: 000000000061e000 R14: 0000000000400000 R15:
ffff8804a0941010
[577776.409902] FS: 00007f65e70086f0(0000) GS:ffff880028038000(0000)
knlGS:0000000000000000
[577776.409902] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[577776.409902] CR2: ffff8804a0941010 CR3: 0000000532baa000 CR4:
0000000000002660
[577776.409902] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000
[577776.409902] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7:
0000000000000400
[577776.409902] Process udevd (pid: 20567, threadinfo ffff8805e55d0000, task
ffff8805e5055fe0)
[577776.409902] Stack:
[577776.409902] 0000000000600000 0000000000400000 ffff8805e55d1ba8
ffffffff810aebba
[577776.409902] <0> 00000005e3478067 ffff8805e55d1b78 0000000000000000
0000000000000000
[577776.409902] <0> 000000000061dfff 000000000061dfff 0000000001200000
0000000000000000
[577776.409902] Call Trace:
[577776.409902] [<ffffffff810aebba>] free_pgd_range+0x221/0x3bb
[577776.409902] [<ffffffff810aeddf>] free_pgtables+0x8b/0xa8
[577776.409902] [<ffffffff810b0812>] exit_mmap+0x102/0x15c
[577776.409902] [<ffffffff8103ff3b>] mmput+0x2b/0xba
[577776.409902] [<ffffffff810c8bf3>] flush_old_exec+0x469/0x553
[577776.409902] [<ffffffff810c4715>] ? vfs_read+0xcd/0x102
[577776.409902] [<ffffffff810fd1a3>] load_elf_binary+0x38a/0x1927
[577776.409902] [<ffffffff810abc7d>] ? follow_page+0x209/0x258
[577776.409902] [<ffffffff810ad5b3>] ? __get_user_pages+0x379/0x3fa
[577776.409902] [<ffffffff810faa59>] ? load_misc_binary+0x61/0x336
[577776.409902] [<ffffffff810ad6be>] ? get_user_pages+0x44/0x46
[577776.409902] [<ffffffff810c802d>] ? get_arg_page+0x50/0xa9
[577776.409902] [<ffffffff810c83fc>] search_binary_handler+0x9a/0x1bc
[577776.409902] [<ffffffff810c9877>] do_execve+0x243/0x326
[577776.409902] [<ffffffff810ce67e>] ? getname+0x148/0x1ad
[577776.409902] [<ffffffff8101051e>] sys_execve+0x3e/0x58
[577776.409902] [<ffffffff81011fda>] stub_execve+0x6a/0xc0
[577776.409902] Code: d9 9a 01 00 bf 01 00 00 00 e8 8d e8 ff ff 48 83 c4 18 5b
c9 c3 55 48 89 e5 41 54 49 89 f4 53 48 89 fb e8 f6 e5 ff ff 84 c0 75 05 <4c> 89
23 eb 0b 4c 89 e6 48 89 df e8 7d ff ff ff 5b 41 5c c9 c3
[577776.409902] RIP [<ffffffff8100e77c>] xen_set_pmd+0x16/0x2b
[577776.409902] RSP <ffff8805e55d1ad8>
[577776.409902] CR2: ffff8804a0941010
[577776.409902] ---[ end trace 514df97cbf024ab5 ]---
[577776.432476] ------------[ cut here ]------------
[577776.432755] kernel BUG at arch/x86/xen/mmu.c:1648!
[577776.433007] invalid opcode: 0000 [#2] SMP
[577776.433007] last sysfs file: /sys/devices/virtual/block/dm-29/uevent
[577776.433007] CPU 4
[577776.433007] Pid: 20583, comm: udevd Tainted: G D 2.6.32.15-dotroll
#5 S5000PSL
[577776.433007] RIP: e030:[<ffffffff8100c94a>] [<ffffffff8100c94a>]
pin_pagetable_pfn+0x31/0x37
[577776.433007] RSP: e02b:ffff88058f807db8 EFLAGS: 00010282
[577776.433007] RAX: 00000000ffffffea RBX: 00000000005e378b RCX:
0000000000000001
[577776.433007] RDX: 0000000000000000 RSI: 0000000000000001 RDI:
ffff88058f807db8
[577776.433007] RBP: ffff88058f807dd8 R08: 0000000000000c58 R09:
00003ffffffff000
[577776.433007] R10: 0000000000007ff0 R11: 0000000000000002 R12:
0000000000000003
[577776.433007] R13: ffff880567ab9010 R14: ffff88058f807f58 R15:
ffff8805e3a002a0
[577776.433007] FS: 00007f65e70086f0(0000) GS:ffff8800280a0000(0000)
knlGS:0000000000000000
[577776.433007] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[577776.433007] CR2: 0000000000413944 CR3: 0000000551c21000 CR4:
0000000000002660
[577776.433007] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000
[577776.433007] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7:
0000000000000400
[577776.433007] Process udevd (pid: 20583, threadinfo ffff88058f806000, task
ffff8805530224e0)
[577776.433007] Stack:
[577776.433007] 0000000000000000 000000000000b4ff 000000018188f948
00000000005e378b
[577776.433007] <0> ffff88058f807df8 ffffffff8100e507 00000000005e378b
ffff8805e3fd7500
[577776.433007] <0> ffff88058f807e08 ffffffff8100e53a ffff88058f807e48
ffffffff810acadc
[577776.433007] Call Trace:
[577776.433007] [<ffffffff8100e507>] xen_alloc_ptpage+0x6a/0x6f
[577776.433007] [<ffffffff8100e53a>] xen_alloc_pte+0xe/0x10
[577776.433007] [<ffffffff810acadc>] __pte_alloc+0x72/0xd0
[577776.433007] [<ffffffff810acbd8>] handle_mm_fault+0x9e/0x700
[577776.433007] [<ffffffff815ab1f5>] ? page_fault+0x25/0x30
[577776.433007] [<ffffffff8102b9ed>] do_page_fault+0x1e0/0x1f7
[577776.433007] [<ffffffff812c1b6d>] ? __put_user_4+0x1d/0x30
[577776.433007] [<ffffffff815ab1f5>] page_fault+0x25/0x30
[577776.433007] Code: ec 20 89 7d e0 48 89 f7 e8 47 fd ff ff 48 8d 7d e0 48 89
45 e8 be 01 00 00 00 31 d2 41 ba f0 7f 00 00 e8 fa c9 ff ff 85 c0 74 04 <0f> 0b
eb fe c9 c3 55 49 89 ca 48 89 e5 40 88 f1 41 54 4c 89 d0
[577776.433007] RIP [<ffffffff8100c94a>] pin_pagetable_pfn+0x31/0x37
[577776.433007] RSP <ffff88058f807db8>
[577776.433007] ---[ end trace 514df97cbf024ab6 ]---
--
Configure bugmail:
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs
|
<Prev in Thread] |
Current Thread |
[Next in Thread> |
- [Xen-bugs] [Bug 1626] New: 2.6.32 Dom0 crashes after lv* commands,
bugzilla-daemon <=
|
|
|
|
|