[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] broken live migration in xen 4.3 (release)
2014-03-17 19:45 GMT+04:00 Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>: > If you say > ssh ib-xen12 echo hi > does it print anything except just "hi" ? > No. hi displayed and nothing more. > If so then that is the problem. > >> My vague guess is that the unexpected data will say something like >> "Segmentation Fault". > > That would go to stderr. > >> > libxl: error: libxl_utils.c:393:libxl_read_exactly: file/stream >> > truncated reading GO message from migration stream >> > migration target: Failure, destroying our copy. >> > migration child [20864] not exiting, no longer waiting (exit status >> > will be unreported) >> > Migration failed, resuming at sender. >> > >> > Guest domain kernel panics (timekeeping errors). >> > What can i check? Live migration to localhost also fails. > > That the abortive migration breaks the guest is probably a bug in the > guest. No, this error i'm already see in 4.0.1 (exactly) and it not reproduced in xm toolstack. And this domU kernels works fine on 4.1.2. Guest panics via: [ 1621.056898] kernel BUG at drivers/xen/events.c:1281! [ 1621.056898] invalid opcode: 0000 [#1] SMP [ 1621.056898] last sysfs file: /sys/devices/virtual/vc/vcsa4/uevent [ 1621.056898] CPU 0 [ 1621.056898] Modules linked in: [ 1621.056898] Pid: 2601, comm: kstop/0 Not tainted 2.6.32.26 #1 [ 1621.056898] RIP: e030:[<ffffffff812ea748>] [<ffffffff812ea748>] xen_irq_resume+0xc8/0x284 [ 1621.056898] RSP: e02b:ffff88001e38fde0 EFLAGS: 00010082 [ 1621.056898] RAX: ffffffffffffffef RBX: 000000000000022f RCX: 0000000000000001 [ 1621.056898] RDX: 0000000000000000 RSI: ffff88001e38fdf0 RDI: 0000000000000001 [ 1621.056898] RBP: ffff88001e38fe30 R08: 0000000000000040 R09: ffffffff81595ab8 [ 1621.056898] R10: 0000000000000000 R11: ffff88001e38fdf0 R12: ffff88001fde9e6c [ 1621.056898] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1621.056898] FS: 00007f81c364c700(0000) GS:ffff880003ce6000(0000) knlGS:0000000000000000 [ 1621.056898] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b [ 1621.056898] CR2: 00007f3ded29efa0 CR3: 000000001cfb3000 CR4: 0000000000002660 [ 1621.056898] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1621.056898] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 1621.056898] Process kstop/0 (pid: 2601, threadinfo ffff88001e38e000, task ffff88001f74a170) [ 1621.056898] Stack: [ 1621.056898] ffffffff812e89a3 0000000000000000 0000000000000000 ffffffff8100e89f [ 1621.056898] <0> ffffffff813e3931 0000000000000000 ffff88001fde9e6c ffff880003d00a80 [ 1621.056898] <0> ffffffff810790bb 0000000000000000 ffff88001e38fe50 ffffffff812eb62d [ 1621.056898] Call Trace: [ 1621.056898] [<ffffffff812e89a3>] ? __max_nr_grant_frames+0x21/0x38 [ 1621.056898] [<ffffffff8100e89f>] ? xen_restore_fl_direct_end+0x0/0x1 [ 1621.056898] [<ffffffff813e3931>] ? _spin_unlock_irqrestore+0x19/0x1c [ 1621.056898] [<ffffffff810790bb>] ? stop_cpu+0x0/0xcd [ 1621.056898] [<ffffffff812eb62d>] xen_suspend+0xb8/0xce [ 1621.056898] [<ffffffff81079142>] stop_cpu+0x87/0xcd [ 1621.056898] [<ffffffff8105425b>] worker_thread+0x120/0x1c6 [ 1621.056898] [<ffffffff81056eff>] ? autoremove_wake_function+0x0/0x38 [ 1621.056898] [<ffffffff8105413b>] ? worker_thread+0x0/0x1c6 [ 1621.056898] [<ffffffff81056b35>] kthread+0x69/0x71 [ 1621.056898] [<ffffffff8101228a>] child_rip+0xa/0x20 [ 1621.056898] [<ffffffff81011461>] ? int_ret_from_sys_call+0x7/0x1b [ 1621.056898] [<ffffffff81011c1d>] ? retint_restore_args+0x5/0x6 [ 1621.056898] [<ffffffff81012280>] ? child_rip+0x0/0x20 [ 1621.056898] Code: e8 73 f0 ff ff 41 89 c6 44 39 f8 74 04 0f 0b eb fe 44 89 7d c0 44 89 6d c4 48 8d 75 c0 bf 01 00 00 00 e8 f2 f0 ff ff 85 c0 74 04 <0f> 0b eb fe 44 8b 65 c8 44 89 f6 41 0f b7 fc 49 63 c4 48 c1 e0 -- Vasiliy Tolstov, e-mail: v.tolstov@xxxxxxxxx jabber: vase@xxxxxxxxx _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |