[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#602935: xen-linux-system-2.6.32-5-xen-amd64: domU stack trace error when migrating with xen kernel 2.6.32-27



Package: xen-linux-system-2.6.32-5-xen-amd64
Version: 2.6.32-27
Severity: normal
Tags: sid



-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.32-5-xen-amd64 (SMP w/2 CPU cores)
Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages xen-linux-system-2.6.32-5-xen-amd64 depends on:
ii  linux-image-2.6.32-5-xen-amd6 2.6.32-27  Linux 2.6.32 for 64-bit PCs, Xen d
ii  xen-hypervisor-4.0-amd64 [xen 4.0.1-1    The Xen Hypervisor on AMD64

xen-linux-system-2.6.32-5-xen-amd64 recommends no packages.

xen-linux-system-2.6.32-5-xen-amd64 suggests no packages.

-- no debconf information



Hello there, this is related to bug #600992 (now closed).
After the fix to that bug this kernel allows migration but as the live migration completes (without error on 
the dom0) the domU spits the following stack trace:


[157949.641828] BUG: unable to handle kernel paging request at 
00007f11dc370180
[157949.641828] IP: [<ffffffff810327d2>] fill_pmd+0xe/0xec
[157949.641828] PGD 0
[157949.641828] Oops: 0000 [#1] SMP
[157949.641828] last sysfs file: /sys/module/parport/initstate
[157949.641828] CPU 0
[157949.641828] Modules linked in: ppdev lp parport evdev ext3 jbd 
mbcache dm_mod raid1 md_mod xen_netfront xen_blkfront
[157949.641828] Pid: 2936, comm: kstop/0 Not tainted 2.6.32-5-xen-amd64 #1
[157949.641828] RIP: e030:[<ffffffff810327d2>]  [<ffffffff810327d2>] 
fill_pmd+0xe/0xec
[157949.641828] RSP: e02b:ffff88000f203d40  EFLAGS: 00010082
[157949.641828] RAX: 0000000000000ff8 RBX: ffffffffff57b000 RCX: 
ffffffffff57b000
[157949.641828] RDX: 800000008ac55063 RSI: ffffffffff57b000 RDI: 
ffffc7fffffffff8
[157949.641828] RBP: ffffc7fffffffff8 R08: 0000000000000000 R09: 
7fffffffffffffff
[157949.641828] R10: ffffffff8100e5b5 R11: ffffc90000082000 R12: 
ffffffffff57b000
[157949.641828] R13: ffff8800033f5ee0 R14: ffff88000ee82a60 R15: 
ffff88000ee82a60
[157949.641828] FS:  00007fb68931e700(0000) GS:ffff8800033d8000(0000) 
knlGS:0000000000000000
[157949.641828] CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[157949.641828] CR2: 00007f11dc370180 CR3: 000000000fecb000 CR4: 
0000000000002660
[157949.641828] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 
0000000000000000
[157949.641828] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 
0000000000000400
[157949.641828] Process kstop/0 (pid: 2936, threadinfo ffff88000f202000, 
task ffff88000ee82a60)
[157949.641828] Stack:
[157949.641828]  ffffc90000082000 ffffffff8100c287 ffffffffff57b000 
0000000000000884
[157949.641828] <0> 800000008ac55063 ffffffff810328d1 00000000899d8067 
800000008ac55063
[157949.641828] <0> ffffffff81001000 800000008ac55063 ffff8800033f5ed8 
ffffffff810369db
[157949.641828] Call Trace:
[157949.641828]  [<ffffffff8100c287>] ? 
__raw_callee_save_xen_pgd_val+0x11/0x1e
[157949.641828]  [<ffffffff810328d1>] ? set_pte_vaddr_pud+0x21/0x4b
[157949.641828]  [<ffffffff810369db>] ? __native_set_fixmap+0x24/0x2c
[157949.641828]  [<ffffffff8100d009>] ? xen_set_fixmap+0xcc/0xfb
[157949.641828]  [<ffffffff8100c39e>] ? pfn_to_mfn+0xe/0x22
[157949.641828]  [<ffffffff8100bedf>] ? xen_setup_shared_info+0x2d/0x56
[157949.641828]  [<ffffffff8100ef5d>] ? xen_post_suspend+0x11/0x90
[157949.641828]  [<ffffffff811f3083>] ? xen_suspend+0x9a/0xc4
[157949.641828]  [<ffffffff8108ba3e>] ? stop_cpu+0x83/0xc6
[157949.641828]  [<ffffffff810625ff>] ? worker_thread+0x188/0x21d
[157949.641828]  [<ffffffff8108b9bb>] ? stop_cpu+0x0/0xc6
[157949.641828]  [<ffffffff81065c2a>] ? autoremove_wake_function+0x0/0x2e
[157949.641828]  [<ffffffff81062477>] ? worker_thread+0x0/0x21d
[157949.641828]  [<ffffffff8106595d>] ? kthread+0x79/0x81
[157949.641828]  [<ffffffff81012baa>] ? child_rip+0xa/0x20
[157949.641828]  [<ffffffff81011d61>] ? int_ret_from_sys_call+0x7/0x1b
[157949.641828]  [<ffffffff8101251d>] ? retint_restore_args+0x5/0x6
[157949.641828]  [<ffffffff81012ba0>] ? child_rip+0x0/0x20
[157949.641828] Code: 00 00 48 ba 00 f0 ff ff ff 3f 00 00 41 5a 49 8d 04 
04 48 21 d1 5b 5d 48 01 c8 41 5c c3 41 54 49 89 f4 55 48 89 fd 53 48 83 
ec 10 <48> 83 3f 00 0f 85 95 00 00 00 e8 23 57 2c 00 48 89 c7 48 89 c3
[157949.641828] RIP  [<ffffffff810327d2>] fill_pmd+0xe/0xec
[157949.641828]  RSP <ffff88000f203d40>
[157949.641828] CR2: 00007f11dc370180
[157949.641828] ---[ end trace 728cde46d51bd637 ]---
[157949.641828] ------------[ cut here ]------------
[157949.641828] WARNING: at 
/build/mattems-linux-2.6_2.6.32-27-amd64-IsDpkI/linux-2.6-2.6.32/debian/build/source_amd64_xen/kernel/time/timekeeping.c:249 
ktime_get+0x22/0xb7()
[157949.641828] Modules linked in: ppdev lp parport evdev ext3 jbd 
mbcache dm_mod raid1 md_mod xen_netfront xen_blkfront
[157949.641828] Pid: 0, comm: swapper Tainted: G      D    
2.6.32-5-xen-amd64 #1
[157949.641828] Call Trace:
[157949.641828]  [<ffffffff8106d1ab>] ? ktime_get+0x22/0xb7
[157949.641828]  [<ffffffff8106d1ab>] ? ktime_get+0x22/0xb7
[157949.641828]  [<ffffffff8104edac>] ? warn_slowpath_common+0x77/0xa3
[157949.641828]  [<ffffffff8106d1ab>] ? ktime_get+0x22/0xb7
[157949.641828]  [<ffffffff810716b1>] ? tick_nohz_stop_sched_tick+0x6f/0x335
[157949.641828]  [<ffffffff81010e82>] ? cpu_idle+0x73/0xda
[157949.641828]  [<ffffffff81506cd1>] ? start_kernel+0x3dc/0x3e8
[157949.641828]  [<ffffffff81508c7d>] ? xen_start_kernel+0x57c/0x581
[157949.641828] ---[ end trace 728cde46d51bd638 ]---

if there is anything else we can provide let us know
regards



Reply to: