[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-bugs] [Bug 1626] New: 2.6.32 Dom0 crashes after lv* commands
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1626 Summary: 2.6.32 Dom0 crashes after lv* commands Product: Xen Version: unstable Platform: x86-64 OS/Version: Linux-2.6 Status: NEW Severity: critical Priority: P2 Component: Linux-pv_ops dom0 AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx ReportedBy: pasztor.janos@xxxxxxxxxxx Hello, we have been experiencing multiple Dom0 crashes, each after a lvcreate or lvdisplay command. The physical machine is an Intel SSR212MC2 storage server with an Areca ARC-1680 RAID controller. This error has occured on two distinct machines of the same type. Captured stack trace is the following: [577776.408640] BUG: unable to handle kernel paging request at ffff8804a0941010 [577776.409011] IP: [<ffffffff8100e77c>] xen_set_pmd+0x16/0x2b [577776.409011] PGD 1002067 PUD 6daa067 PMD 6eaf067 PTE 80100004a0941065 [577776.409011] Oops: 0003 [#1] SMP [577776.409011] last sysfs file: /sys/devices/virtual/block/dm-23/uevent [577776.409902] CPU 0 [577776.409902] Pid: 20567, comm: udevd Not tainted 2.6.32.15-dotroll #5 S5000PSL [577776.409902] RIP: e030:[<ffffffff8100e77c>] [<ffffffff8100e77c>] xen_set_pmd+0x16/0x2b [577776.409902] RSP: e02b:ffff8805e55d1ad8 EFLAGS: 00010246 [577776.409902] RAX: 0000000000000000 RBX: ffff8804a0941010 RCX: ffff880000000000 [577776.409902] RDX: ffffea0000000000 RSI: 0000000000000000 RDI: ffff8804a0941010 [577776.409902] RBP: ffff8805e55d1ae8 R08: 0000000001380000 R09: dead000000200200 [577776.409902] R10: dead000000100100 R11: 00000000e9f88af7 R12: 0000000000000000 [577776.409902] R13: 000000000061e000 R14: 0000000000400000 R15: ffff8804a0941010 [577776.409902] FS: 00007f65e70086f0(0000) GS:ffff880028038000(0000) knlGS:0000000000000000 [577776.409902] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b [577776.409902] CR2: ffff8804a0941010 CR3: 0000000532baa000 CR4: 0000000000002660 [577776.409902] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [577776.409902] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [577776.409902] Process udevd (pid: 20567, threadinfo ffff8805e55d0000, task ffff8805e5055fe0) [577776.409902] Stack: [577776.409902] 0000000000600000 0000000000400000 ffff8805e55d1ba8 ffffffff810aebba [577776.409902] <0> 00000005e3478067 ffff8805e55d1b78 0000000000000000 0000000000000000 [577776.409902] <0> 000000000061dfff 000000000061dfff 0000000001200000 0000000000000000 [577776.409902] Call Trace: [577776.409902] [<ffffffff810aebba>] free_pgd_range+0x221/0x3bb [577776.409902] [<ffffffff810aeddf>] free_pgtables+0x8b/0xa8 [577776.409902] [<ffffffff810b0812>] exit_mmap+0x102/0x15c [577776.409902] [<ffffffff8103ff3b>] mmput+0x2b/0xba [577776.409902] [<ffffffff810c8bf3>] flush_old_exec+0x469/0x553 [577776.409902] [<ffffffff810c4715>] ? vfs_read+0xcd/0x102 [577776.409902] [<ffffffff810fd1a3>] load_elf_binary+0x38a/0x1927 [577776.409902] [<ffffffff810abc7d>] ? follow_page+0x209/0x258 [577776.409902] [<ffffffff810ad5b3>] ? __get_user_pages+0x379/0x3fa [577776.409902] [<ffffffff810faa59>] ? load_misc_binary+0x61/0x336 [577776.409902] [<ffffffff810ad6be>] ? get_user_pages+0x44/0x46 [577776.409902] [<ffffffff810c802d>] ? get_arg_page+0x50/0xa9 [577776.409902] [<ffffffff810c83fc>] search_binary_handler+0x9a/0x1bc [577776.409902] [<ffffffff810c9877>] do_execve+0x243/0x326 [577776.409902] [<ffffffff810ce67e>] ? getname+0x148/0x1ad [577776.409902] [<ffffffff8101051e>] sys_execve+0x3e/0x58 [577776.409902] [<ffffffff81011fda>] stub_execve+0x6a/0xc0 [577776.409902] Code: d9 9a 01 00 bf 01 00 00 00 e8 8d e8 ff ff 48 83 c4 18 5b c9 c3 55 48 89 e5 41 54 49 89 f4 53 48 89 fb e8 f6 e5 ff ff 84 c0 75 05 <4c> 89 23 eb 0b 4c 89 e6 48 89 df e8 7d ff ff ff 5b 41 5c c9 c3 [577776.409902] RIP [<ffffffff8100e77c>] xen_set_pmd+0x16/0x2b [577776.409902] RSP <ffff8805e55d1ad8> [577776.409902] CR2: ffff8804a0941010 [577776.409902] ---[ end trace 514df97cbf024ab5 ]--- [577776.432476] ------------[ cut here ]------------ [577776.432755] kernel BUG at arch/x86/xen/mmu.c:1648! [577776.433007] invalid opcode: 0000 [#2] SMP [577776.433007] last sysfs file: /sys/devices/virtual/block/dm-29/uevent [577776.433007] CPU 4 [577776.433007] Pid: 20583, comm: udevd Tainted: G D 2.6.32.15-dotroll #5 S5000PSL [577776.433007] RIP: e030:[<ffffffff8100c94a>] [<ffffffff8100c94a>] pin_pagetable_pfn+0x31/0x37 [577776.433007] RSP: e02b:ffff88058f807db8 EFLAGS: 00010282 [577776.433007] RAX: 00000000ffffffea RBX: 00000000005e378b RCX: 0000000000000001 [577776.433007] RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff88058f807db8 [577776.433007] RBP: ffff88058f807dd8 R08: 0000000000000c58 R09: 00003ffffffff000 [577776.433007] R10: 0000000000007ff0 R11: 0000000000000002 R12: 0000000000000003 [577776.433007] R13: ffff880567ab9010 R14: ffff88058f807f58 R15: ffff8805e3a002a0 [577776.433007] FS: 00007f65e70086f0(0000) GS:ffff8800280a0000(0000) knlGS:0000000000000000 [577776.433007] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b [577776.433007] CR2: 0000000000413944 CR3: 0000000551c21000 CR4: 0000000000002660 [577776.433007] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [577776.433007] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [577776.433007] Process udevd (pid: 20583, threadinfo ffff88058f806000, task ffff8805530224e0) [577776.433007] Stack: [577776.433007] 0000000000000000 000000000000b4ff 000000018188f948 00000000005e378b [577776.433007] <0> ffff88058f807df8 ffffffff8100e507 00000000005e378b ffff8805e3fd7500 [577776.433007] <0> ffff88058f807e08 ffffffff8100e53a ffff88058f807e48 ffffffff810acadc [577776.433007] Call Trace: [577776.433007] [<ffffffff8100e507>] xen_alloc_ptpage+0x6a/0x6f [577776.433007] [<ffffffff8100e53a>] xen_alloc_pte+0xe/0x10 [577776.433007] [<ffffffff810acadc>] __pte_alloc+0x72/0xd0 [577776.433007] [<ffffffff810acbd8>] handle_mm_fault+0x9e/0x700 [577776.433007] [<ffffffff815ab1f5>] ? page_fault+0x25/0x30 [577776.433007] [<ffffffff8102b9ed>] do_page_fault+0x1e0/0x1f7 [577776.433007] [<ffffffff812c1b6d>] ? __put_user_4+0x1d/0x30 [577776.433007] [<ffffffff815ab1f5>] page_fault+0x25/0x30 [577776.433007] Code: ec 20 89 7d e0 48 89 f7 e8 47 fd ff ff 48 8d 7d e0 48 89 45 e8 be 01 00 00 00 31 d2 41 ba f0 7f 00 00 e8 fa c9 ff ff 85 c0 74 04 <0f> 0b eb fe c9 c3 55 49 89 ca 48 89 e5 40 88 f1 41 54 4c 89 d0 [577776.433007] RIP [<ffffffff8100c94a>] pin_pagetable_pfn+0x31/0x37 [577776.433007] RSP <ffff88058f807db8> [577776.433007] ---[ end trace 514df97cbf024ab6 ]--- -- Configure bugmail: http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. _______________________________________________ Xen-bugs mailing list Xen-bugs@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-bugs
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |