[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] kernel BUG at arch/x86/xen/mmu.c:1860!



> This is just an update from my testing.
> 
> I tried with latest xen/next-2.6.32.x and same bug still there:

Grrrrrrrr..

Let me setup a machine to reproduce this. Is the distro you are using
still CentOS 5?

> 
> Feb 23 22:56:56 xen06 kernel: ------------[ cut here ]------------
> Feb 23 22:56:56 xen06 kernel: kernel BUG at arch/x86/xen/mmu.c:1872!
> Feb 23 22:56:56 xen06 kernel: invalid opcode: 0000 [#1] SMP
> Feb 23 22:56:56 xen06 kernel: last sysfs file:
> /sys/devices/system/cpu/cpu3/cache/index2/shared_cpu_map
> Feb 23 22:56:56 xen06 kernel: CPU 0
> Feb 23 22:56:56 xen06 kernel: Modules linked in: dlm configfs xt_physdev
> iptable_filter ip_tables x_tables bridge stp be2iscsi iscsi_tcp bnx2i cnic
> uio ipv6 cxgb3i cxgb3 mdio libiscsi_tcp libiscsi scsi_transport_iscsi
> dm_multipath scsi_dh video backlight output sbs sbshc power_meter hwmon
> battery acpi_memhotplug xen_acpi_memhotplug ac parport_pc lp parport sg
> ide_cd_mod cdrom serio_raw tg3 libphy button tpm_tis tpm tpm_bios iTCO_wdt
> i2c_i801 i2c_core pcspkr shpchp dm_snapshot dm_zero dm_mirror dm_region_hash
> dm_log dm_mod ata_piix libata sd_mod scsi_mod raid1 ext3 jbd uhci_hcd
> ohci_hcd ehci_hcd [last unloaded: microcode]
> Feb 23 22:56:56 xen06 kernel: Pid: 15222, comm: mpath_wait Not tainted
> 2.6.32.28-2.xen.pvops.choon.centos5 #1 PowerEdge 860
> Feb 23 22:56:56 xen06 kernel: RIP: e030:[<ffffffff8100cb5b>]
> [<ffffffff8100cb5b>] pin_pagetable_pfn+0x53/0x59
> Feb 23 22:56:56 xen06 kernel: RSP: e02b:ffff8800265b9dc8  EFLAGS: 00010282
> Feb 23 22:56:56 xen06 kernel: RAX: 00000000ffffffea RBX: 00000000000306d7
> RCX: 0000000000000183
> Feb 23 22:56:56 xen06 kernel: RDX: 00000000deadbeef RSI: 00000000deadbeef
> RDI: 00000000deadbeef
> Feb 23 22:56:56 xen06 kernel: RBP: ffff8800265b9de8 R08: 00000000000006b8
> R09: ffff880000000000
> Feb 23 22:56:56 xen06 kernel: R10: 00000000deadbeef R11: 0000000000000246
> R12: 0000000000000003
> Feb 23 22:56:56 xen06 kernel: R13: 00000000000306d7 R14: ffff88003b940200
> R15: 00007f7655df6258
> Feb 23 22:56:56 xen06 kernel: FS:  00007f76560016e0(0000)
> GS:ffff88002804f000(0000) knlGS:0000000000000000
> Feb 23 22:56:56 xen06 kernel: CS:  e033 DS: 0000 ES: 0000 CR0:
> 000000008005003b
> Feb 23 22:56:56 xen06 kernel: CR2: 00007f7655df6258 CR3: 000000002559b000
> CR4: 0000000000002660
> Feb 23 22:56:56 xen06 lvm[3984]: Monitoring snapshot
> XenGroup-testcrash1--snapshot
> Feb 23 22:56:56 xen06 kernel: DR0: 0000000000000000 DR1: 0000000000000000
> DR2: 0000000000000000
> Feb 23 22:56:56 xen06 kernel: DR3: 0000000000000000 DR6: 00000000ffff0ff0
> DR7: 0000000000000400
> Feb 23 22:56:56 xen06 kernel: Process mpath_wait (pid: 15222, threadinfo
> ffff8800265b8000, task ffff88003b940200)
> Feb 23 22:56:56 xen06 kernel: Stack:
> Feb 23 22:56:56 xen06 kernel:  0000000000000000 0000000000202bff
> 000000013f009e18 00000000000306d7
> Feb 23 22:56:56 xen06 kernel: <0> ffff8800265b9e08 ffffffff8100e07c
> ffff8800267bdac0 ffff88002679f570
> Feb 23 22:56:56 xen06 kernel: <0> ffff8800265b9e18 ffffffff8100e0af
> ffff8800265b9e58 ffffffff810a408b
> Feb 23 22:56:56 xen06 kernel: Call Trace:
> Feb 23 22:56:56 xen06 kernel:  [<ffffffff8100e07c>]
> xen_alloc_ptpage+0x64/0x69
> Feb 23 22:56:56 xen06 kernel:  [<ffffffff8100e0af>] xen_alloc_pte+0xe/0x10
> Feb 23 22:56:56 xen06 kernel:  [<ffffffff810a408b>] __pte_alloc+0x70/0xce
> Feb 23 22:56:56 xen06 kernel:  [<ffffffff810a4229>]
> handle_mm_fault+0x140/0x8b9
> Feb 23 22:56:56 xen06 kernel:  [<ffffffff8131be2d>]
> do_page_fault+0x252/0x2e2
> Feb 23 22:56:56 xen06 kernel:  [<ffffffff81319db5>] page_fault+0x25/0x30
> Feb 23 22:56:56 xen06 kernel: Code: 48 b8 ff ff ff ff ff ff ff 7f 48 21 c2
> 48 89 55 e8 48 8d 7d e0 be 01 00 00 00 31 d2 41 ba f0 7f 00 00 e8 e9 c7 ff
> ff 85 c0 74 04 <0f> 0b eb fe c9 c3 55 40 f6 c7 01 48 89 e5 53 48 89 fb 74 5b
> 48
> Feb 23 22:56:56 xen06 kernel: RIP  [<ffffffff8100cb5b>]
> pin_pagetable_pfn+0x53/0x59
> Feb 23 22:56:56 xen06 kernel:  RSP <ffff8800265b9dc8>
> Feb 23 22:56:56 xen06 kernel: ---[ end trace fd2f141edfc37649 ]---
> Feb 23 22:56:56 xen06 kernel: kjournald starting.  Commit interval 5 seconds
> Feb 23 22:56:56 xen06 kernel: EXT3 FS on dm-11, internal journal
> Feb 23 22:56:56 xen06 kernel: EXT3-fs: mounted filesystem with ordered data
> mode.
> Feb 23 23:00:01 xen06 syslogd 1.4.1: restart.
> Feb 23 23:00:01 xen06 kernel: klogd 1.4.1, log source = /proc/kmsg started.
> Feb 23 23:00:01 xen06 kernel: Linux version
> 2.6.32.28-2.xen.pvops.choon.centos5 (mockbuild@xxxxxxxxxxxxxxxxxx) (gcc
> version 4.1.2 20080704 (Red Hat 4.1.2-48)) #1 SMP Wed Feb 23 22:29:39 SGT
> 2011
> Feb 23 23:00:01 xen06 kernel: Command line: ro root=/dev/md1 panic=5
> panic_timeout=5
> Feb 23 23:00:01 xen06 kernel: KERNEL supported cpus:
> Feb 23 23:00:01 xen06 kernel:   Intel GenuineIntel
> Feb 23 23:00:01 xen06 kernel:   AMD AuthenticAMD
> Feb 23 23:00:01 xen06 kernel:   Centaur CentaurHauls
> Feb 23 23:00:01 xen06 kernel: released 0 pages of unused memory
> Feb 23 23:00:01 xen06 kernel: BIOS-provided physical RAM map:
> Feb 23 23:00:01 xen06 kernel:  Xen: 0000000000000000 - 00000000000a0000
> (usable)
> Feb 23 23:00:01 xen06 kernel:  Xen: 00000000000a0000 - 0000000000100000
> (reserved)
> Feb 23 23:00:01 xen06 kernel:  Xen: 0000000000100000 - 0000000040000000
> (usable)
> Feb 23 23:00:01 xen06 kernel:  Xen: 00000000dffc0000 - 00000000dffcfc00
> (ACPI data)
> Feb 23 23:00:01 xen06 kernel:  Xen: 00000000dffcfc00 - 00000000dffff000
> (reserved)
> Feb 23 23:00:01 xen06 kernel:  Xen: 00000000f0000000 - 00000000f4000000
> (reserved)
> Feb 23 23:00:01 xen06 kernel:  Xen: 00000000fec00000 - 00000000fed00400
> (reserved)
> Feb 23 23:00:01 xen06 kernel:  Xen: 00000000fed13000 - 00000000feda0000
> (reserved)
> Feb 23 23:00:01 xen06 kernel:  Xen: 00000000fee00000 - 00000000fee10000
> (reserved)
> Feb 23 23:00:01 xen06 kernel:  Xen: 00000000ffb00000 - 0000000100000000
> (reserved)
> Feb 23 23:00:01 xen06 kernel:  Xen: 00000001ffffe000 - 0000000200000000
> (reserved)
> Feb 23 23:00:01 xen06 kernel:  Xen: 0000000200000000 - 00000003bffbe000
> (usable)
> 
> Even I patch with latest 2.6.32.29:
> 
> Feb 24 01:03:17 xen06 kernel: ------------[ cut here ]------------
> Feb 24 01:03:17 xen06 kernel: kernel BUG at arch/x86/xen/mmu.c:1872!
> Feb 24 01:03:17 xen06 kernel: invalid opcode: 0000 [#2] SMP
> Feb 24 01:03:17 xen06 kernel: last sysfs file: /sys/block/dm-13/dev
> Feb 24 01:03:17 xen06 kernel: CPU 2
> Feb 24 01:03:17 xen06 kernel: Modules linked in: dlm configfs xt_physdev
> iptable_filter ip_tables x_tables bridge stp be2iscsi iscsi_tcp bnx2i cnic
> uio ipv6 cxgb3i cxgb3 mdio libiscsi_tcp libiscsi scsi_transport_iscsi
> dm_multipath scsi_dh video backlight output sbs sbshc power_meter hwmon
> battery acpi_memhotplug xen_acpi_memhotplug ac parport_pc lp parport sg
> ide_cd_mod cdrom tg3 serio_raw libphy button tpm_tis tpm tpm_bios pcspkr
> shpchp i2c_i801 i2c_core iTCO_wdt dm_snapshot dm_zero dm_mirror
> dm_region_hash dm_log dm_mod ata_piix libata sd_mod scsi_mod raid1 ext3 jbd
> uhci_hcd ohci_hcd ehci_hcd [last unloaded: microcode]
> Feb 24 01:03:17 xen06 kernel: Pid: 509, comm: dmsetup Tainted: G      D
> 2.6.32.29-0.xen.pvops.choon.centos5 #1 PowerEdge 860
> Feb 24 01:03:17 xen06 kernel: RIP: e030:[<ffffffff8100cb5b>]
> [<ffffffff8100cb5b>] pin_pagetable_pfn+0x53/0x59
> Feb 24 01:03:17 xen06 kernel: RSP: e02b:ffff88003ced5dc8  EFLAGS: 00010282
> Feb 24 01:03:17 xen06 kernel: RAX: 00000000ffffffea RBX: 0000000000030395
> RCX: 0000000000000181
> Feb 24 01:03:17 xen06 kernel: RDX: 00000000deadbeef RSI: 00000000deadbeef
> RDI: 00000000deadbeef
> Feb 24 01:03:17 xen06 kernel: RBP: ffff88003ced5de8 R08: 0000000000000ca8
> R09: ffff880000000000
> Feb 24 01:03:17 xen06 kernel: R10: 00000000deadbeef R11: 0000000000000246
> R12: 0000000000000003
> Feb 24 01:03:17 xen06 kernel: R13: 0000000000030395 R14: ffff88003025c4c0
> R15: 00000033e1e00258
> Feb 24 01:03:17 xen06 kernel: FS:  00007ff20eb366e0(0000)
> GS:ffff880028089000(0000) knlGS:0000000000000000
> Feb 24 01:03:17 xen06 kernel: CS:  e033 DS: 0000 ES: 0000 CR0:
> 000000008005003b
> Feb 24 01:03:17 xen06 kernel: CR2: 00000033e1e00258 CR3: 000000003b57b000
> CR4: 0000000000002660
> Feb 24 01:03:17 xen06 kernel: DR0: 0000000000000000 DR1: 0000000000000000
> DR2: 0000000000000000
> Feb 24 01:03:17 xen06 kernel: DR3: 0000000000000000 DR6: 00000000ffff0ff0
> DR7: 0000000000000400
> Feb 24 01:03:17 xen06 kernel: Process dmsetup (pid: 509, threadinfo
> ffff88003ced4000, task ffff88003025c4c0)
> Feb 24 01:03:17 xen06 kernel: Stack:
> Feb 24 01:03:17 xen06 kernel:  0000000000000000 0000000000202741
> 000000013e6e5a18 0000000000030395
> Feb 24 01:03:17 xen06 kernel: <0> ffff88003ced5e08 ffffffff8100e07c
> ffff88003000aac0 ffff880036bb1878
> Feb 24 01:03:17 xen06 kernel: <0> ffff88003ced5e18 ffffffff8100e0af
> ffff88003ced5e58 ffffffff810a4309
> Feb 24 01:03:17 xen06 kernel: Call Trace:
> Feb 24 01:03:17 xen06 kernel:  [<ffffffff8100e07c>]
> xen_alloc_ptpage+0x64/0x69
> Feb 24 01:03:17 xen06 kernel:  [<ffffffff8100e0af>] xen_alloc_pte+0xe/0x10
> Feb 24 01:03:17 xen06 kernel:  [<ffffffff810a4309>] __pte_alloc+0x70/0xce
> Feb 24 01:03:17 xen06 kernel:  [<ffffffff810a44a7>]
> handle_mm_fault+0x140/0x8b9
> Feb 24 01:03:17 xen06 kernel:  [<ffffffff8131c1fd>]
> do_page_fault+0x252/0x2e2
> Feb 24 01:03:17 xen06 kernel:  [<ffffffff8131a185>] page_fault+0x25/0x30
> Feb 24 01:03:18 xen06 kernel: Code: 48 b8 ff ff ff ff ff ff ff 7f 48 21 c2
> 48 89 55 e8 48 8d 7d e0 be 01 00 00 00 31 d2 41 ba f0 7f 00 00 e8 e9 c7 ff
> ff 85 c0 74 04 <0f> 0b eb fe c9 c3 55 40 f6 c7 01 48 89 e5 53 48 89 fb 74 5b
> 48
> Feb 24 01:03:18 xen06 kernel: RIP  [<ffffffff8100cb5b>]
> pin_pagetable_pfn+0x53/0x59
> Feb 24 01:03:18 xen06 kernel:  RSP <ffff88003ced5dc8>
> Feb 24 01:03:18 xen06 kernel: ---[ end trace 5ea31e622470b519 ]---
> Feb 24 01:06:21 xen06 syslogd 1.4.1: restart.
> Feb 24 01:06:21 xen06 kernel: klogd 1.4.1, log source = /proc/kmsg started.
> Feb 24 01:06:21 xen06 kernel: Linux version
> 2.6.32.29-0.xen.pvops.choon.centos5 (mockbuild@xxxxxxxxxxxxxxxxxx) (gcc
> version 4.1.2 20080704 (Red Hat 4.1.2-48)) #1 SMP Thu Feb 24 00:21:24 SGT
> 2011
> Feb 24 01:06:21 xen06 kernel: Command line: ro root=/dev/md1 panic=5
> panic_timeout=5
> Feb 24 01:06:21 xen06 kernel: KERNEL supported cpus:
> Feb 24 01:06:21 xen06 kernel:   Intel GenuineIntel
> Feb 24 01:06:21 xen06 kernel:   AMD AuthenticAMD
> Feb 24 01:06:21 xen06 kernel:   Centaur CentaurHauls
> Feb 24 01:06:21 xen06 kernel: released 0 pages of unused memory
> Feb 24 01:06:21 xen06 kernel: BIOS-provided physical RAM map:
> Feb 24 01:06:21 xen06 kernel:  Xen: 0000000000000000 - 00000000000a0000
> (usable)
> Feb 24 01:06:21 xen06 kernel:  Xen: 00000000000a0000 - 0000000000100000
> (reserved)
> Feb 24 01:06:21 xen06 kernel:  Xen: 0000000000100000 - 0000000040000000
> (usable)
> Feb 24 01:06:21 xen06 kernel:  Xen: 00000000dffc0000 - 00000000dffcfc00
> (ACPI data)
> Feb 24 01:06:21 xen06 kernel:  Xen: 00000000dffcfc00 - 00000000dffff000
> (reserved)
> Feb 24 01:06:21 xen06 kernel:  Xen: 00000000f0000000 - 00000000f4000000
> (reserved)
> Feb 24 01:06:21 xen06 kernel:  Xen: 00000000fec00000 - 00000000fed00400
> (reserved)
> Feb 24 01:06:21 xen06 kernel:  Xen: 00000000fed13000 - 00000000feda0000
> (reserved)
> Feb 24 01:06:21 xen06 kernel:  Xen: 00000000fee00000 - 00000000fee10000
> (reserved)
> Feb 24 01:06:21 xen06 kernel:  Xen: 00000000ffb00000 - 0000000100000000
> (reserved)
> Feb 24 01:06:21 xen06 kernel:  Xen: 00000001ffffe000 - 0000000200000000
> (reserved)
> Feb 24 01:06:21 xen06 kernel:  Xen: 0000000200000000 - 00000003bffbe000
> (usable)
> Feb 24 01:06:21 xen06 kernel: DMI 2.4 present.
> Feb 24 01:06:21 xen06 kernel: last_pfn = 0x3bffbe max_arch_pfn = 0x400000000
> Feb 24 01:06:21 xen06 kernel: x86 PAT enabled: cpu 0, old 0x50100070406, new
> 0x7010600070106
> Feb 24 01:06:21 xen06 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000
> 
> Thanks.
> 
> Kindest regards,
> Giam Teck Choon

> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxxxxxxxx
> http://lists.xensource.com/xen-devel


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.