[prev in list] [next in list] [prev in thread] [next in thread] 

List:       xen-bugs
Subject:    [Xen-bugs] [Bug 1626] New: 2.6.32 Dom0 crashes after lv* commands
From:       bugzilla-daemon () lists ! xensource ! com
Date:       2010-06-14 8:33:04
Message-ID: bug-1626-3 () http ! bugzilla ! xensource ! com/bugzilla/
[Download RAW message or body]

http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1626

           Summary: 2.6.32 Dom0 crashes after lv* commands
           Product: Xen
           Version: unstable
          Platform: x86-64
        OS/Version: Linux-2.6
            Status: NEW
          Severity: critical
          Priority: P2
         Component: Linux-pv_ops dom0
        AssignedTo: xen-bugs@lists.xensource.com
        ReportedBy: pasztor.janos@dotroll.com


Hello,

we have been experiencing multiple Dom0 crashes, each after a lvcreate or
lvdisplay command. The physical machine is an Intel SSR212MC2 storage server
with an Areca ARC-1680 RAID controller. This error has occured on two distinct
machines of the same type. Captured stack trace is the following:

[577776.408640] BUG: unable to handle kernel paging request at ffff8804a0941010
[577776.409011] IP: [<ffffffff8100e77c>] xen_set_pmd+0x16/0x2b
[577776.409011] PGD 1002067 PUD 6daa067 PMD 6eaf067 PTE 80100004a0941065
[577776.409011] Oops: 0003 [#1] SMP 
[577776.409011] last sysfs file: /sys/devices/virtual/block/dm-23/uevent
[577776.409902] CPU 0 
[577776.409902] Pid: 20567, comm: udevd Not tainted 2.6.32.15-dotroll #5
S5000PSL
[577776.409902] RIP: e030:[<ffffffff8100e77c>]  [<ffffffff8100e77c>]
xen_set_pmd+0x16/0x2b
[577776.409902] RSP: e02b:ffff8805e55d1ad8  EFLAGS: 00010246
[577776.409902] RAX: 0000000000000000 RBX: ffff8804a0941010 RCX:
ffff880000000000
[577776.409902] RDX: ffffea0000000000 RSI: 0000000000000000 RDI:
ffff8804a0941010
[577776.409902] RBP: ffff8805e55d1ae8 R08: 0000000001380000 R09:
dead000000200200
[577776.409902] R10: dead000000100100 R11: 00000000e9f88af7 R12:
0000000000000000
[577776.409902] R13: 000000000061e000 R14: 0000000000400000 R15:
ffff8804a0941010
[577776.409902] FS:  00007f65e70086f0(0000) GS:ffff880028038000(0000)
knlGS:0000000000000000
[577776.409902] CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[577776.409902] CR2: ffff8804a0941010 CR3: 0000000532baa000 CR4:
0000000000002660
[577776.409902] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000
[577776.409902] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7:
0000000000000400
[577776.409902] Process udevd (pid: 20567, threadinfo ffff8805e55d0000, task
ffff8805e5055fe0)
[577776.409902] Stack:
[577776.409902]  0000000000600000 0000000000400000 ffff8805e55d1ba8
ffffffff810aebba
[577776.409902] <0> 00000005e3478067 ffff8805e55d1b78 0000000000000000
0000000000000000
[577776.409902] <0> 000000000061dfff 000000000061dfff 0000000001200000
0000000000000000
[577776.409902] Call Trace:
[577776.409902]  [<ffffffff810aebba>] free_pgd_range+0x221/0x3bb
[577776.409902]  [<ffffffff810aeddf>] free_pgtables+0x8b/0xa8
[577776.409902]  [<ffffffff810b0812>] exit_mmap+0x102/0x15c
[577776.409902]  [<ffffffff8103ff3b>] mmput+0x2b/0xba
[577776.409902]  [<ffffffff810c8bf3>] flush_old_exec+0x469/0x553
[577776.409902]  [<ffffffff810c4715>] ? vfs_read+0xcd/0x102
[577776.409902]  [<ffffffff810fd1a3>] load_elf_binary+0x38a/0x1927
[577776.409902]  [<ffffffff810abc7d>] ? follow_page+0x209/0x258
[577776.409902]  [<ffffffff810ad5b3>] ? __get_user_pages+0x379/0x3fa
[577776.409902]  [<ffffffff810faa59>] ? load_misc_binary+0x61/0x336
[577776.409902]  [<ffffffff810ad6be>] ? get_user_pages+0x44/0x46
[577776.409902]  [<ffffffff810c802d>] ? get_arg_page+0x50/0xa9
[577776.409902]  [<ffffffff810c83fc>] search_binary_handler+0x9a/0x1bc
[577776.409902]  [<ffffffff810c9877>] do_execve+0x243/0x326
[577776.409902]  [<ffffffff810ce67e>] ? getname+0x148/0x1ad
[577776.409902]  [<ffffffff8101051e>] sys_execve+0x3e/0x58
[577776.409902]  [<ffffffff81011fda>] stub_execve+0x6a/0xc0
[577776.409902] Code: d9 9a 01 00 bf 01 00 00 00 e8 8d e8 ff ff 48 83 c4 18 5b
c9 c3 55 48 89 e5 41 54 49 89 f4 53 48 89 fb e8 f6 e5 ff ff 84 c0 75 05 <4c> 89
23 eb 0b 4c 89 e6 48 89 df e8 7d ff ff ff 5b 41 5c c9 c3 
[577776.409902] RIP  [<ffffffff8100e77c>] xen_set_pmd+0x16/0x2b
[577776.409902]  RSP <ffff8805e55d1ad8>
[577776.409902] CR2: ffff8804a0941010
[577776.409902] ---[ end trace 514df97cbf024ab5 ]---
[577776.432476] ------------[ cut here ]------------
[577776.432755] kernel BUG at arch/x86/xen/mmu.c:1648!
[577776.433007] invalid opcode: 0000 [#2] SMP 
[577776.433007] last sysfs file: /sys/devices/virtual/block/dm-29/uevent
[577776.433007] CPU 4 
[577776.433007] Pid: 20583, comm: udevd Tainted: G      D    2.6.32.15-dotroll
#5 S5000PSL
[577776.433007] RIP: e030:[<ffffffff8100c94a>]  [<ffffffff8100c94a>]
pin_pagetable_pfn+0x31/0x37
[577776.433007] RSP: e02b:ffff88058f807db8  EFLAGS: 00010282
[577776.433007] RAX: 00000000ffffffea RBX: 00000000005e378b RCX:
0000000000000001
[577776.433007] RDX: 0000000000000000 RSI: 0000000000000001 RDI:
ffff88058f807db8
[577776.433007] RBP: ffff88058f807dd8 R08: 0000000000000c58 R09:
00003ffffffff000
[577776.433007] R10: 0000000000007ff0 R11: 0000000000000002 R12:
0000000000000003
[577776.433007] R13: ffff880567ab9010 R14: ffff88058f807f58 R15:
ffff8805e3a002a0
[577776.433007] FS:  00007f65e70086f0(0000) GS:ffff8800280a0000(0000)
knlGS:0000000000000000
[577776.433007] CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[577776.433007] CR2: 0000000000413944 CR3: 0000000551c21000 CR4:
0000000000002660
[577776.433007] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000
[577776.433007] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7:
0000000000000400
[577776.433007] Process udevd (pid: 20583, threadinfo ffff88058f806000, task
ffff8805530224e0)
[577776.433007] Stack:
[577776.433007]  0000000000000000 000000000000b4ff 000000018188f948
00000000005e378b
[577776.433007] <0> ffff88058f807df8 ffffffff8100e507 00000000005e378b
ffff8805e3fd7500
[577776.433007] <0> ffff88058f807e08 ffffffff8100e53a ffff88058f807e48
ffffffff810acadc
[577776.433007] Call Trace:
[577776.433007]  [<ffffffff8100e507>] xen_alloc_ptpage+0x6a/0x6f
[577776.433007]  [<ffffffff8100e53a>] xen_alloc_pte+0xe/0x10
[577776.433007]  [<ffffffff810acadc>] __pte_alloc+0x72/0xd0
[577776.433007]  [<ffffffff810acbd8>] handle_mm_fault+0x9e/0x700
[577776.433007]  [<ffffffff815ab1f5>] ? page_fault+0x25/0x30
[577776.433007]  [<ffffffff8102b9ed>] do_page_fault+0x1e0/0x1f7
[577776.433007]  [<ffffffff812c1b6d>] ? __put_user_4+0x1d/0x30
[577776.433007]  [<ffffffff815ab1f5>] page_fault+0x25/0x30
[577776.433007] Code: ec 20 89 7d e0 48 89 f7 e8 47 fd ff ff 48 8d 7d e0 48 89
45 e8 be 01 00 00 00 31 d2 41 ba f0 7f 00 00 e8 fa c9 ff ff 85 c0 74 04 <0f> 0b
eb fe c9 c3 55 49 89 ca 48 89 e5 40 88 f1 41 54 4c 89 d0 
[577776.433007] RIP  [<ffffffff8100c94a>] pin_pagetable_pfn+0x31/0x37
[577776.433007]  RSP <ffff88058f807db8>
[577776.433007] ---[ end trace 514df97cbf024ab6 ]---


-- 
Configure bugmail: http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@lists.xensource.com
http://lists.xensource.com/xen-bugs
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic