[Pkg-xen-devel] Bug#602378: xen-hypervisor-4.0-amd64: Live migration of Guests crashes and reboots
Andreas.Balg at sf.tv
Andreas.Balg at sf.tv
Thu Nov 4 11:01:40 UTC 2010
Package: xen-hypervisor-4.0-amd64
Version: 4.0.1-1
Severity: grave
Tags: squeeze sid
Justification: causes non-serious data loss
Live migration of a guest (running CentOS 5.5, Paravirtualized) crashes the target-host
(Hardware: Dell R610, 2x Xeon 5620, 16Gb RAM, Perc/700-Raid)
(XEN) ----[ Xen-4.0.1 x86_64 debug=n Not tainted ]----
(XEN) CPU: 9
(XEN) RIP: e008:[<ffff82c4801151f6>] free_heap_pages+0x366/0x4b0
(XEN) RFLAGS: 0000000000010286 CONTEXT: hypervisor
(XEN) rax: ffff8301000017c0 rbx: ffff82f602e4b080 rcx: ffff8315ffffffe0
(XEN) rdx: ffff8315ffffffe0 rsi: 00000000ffffffff rdi: 0000000000172585
(XEN) rbp: 0000000000000000 rsp: ffff8304265c7888 r8: 0000000000000020
(XEN) r9: 0000000000000001 r10: 0200000000000000 r11: 0080000000000000
(XEN) r12: ffff82f602e4b0a0 r13: 00007d0a00000000 r14: 0180000000000000
(XEN) r15: 000000000000017c cr0: 0000000080050033 cr4: 00000000000026f0
(XEN) cr3: 000000019fc73000 cr2: ffff8315ffffffe4
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e010 cs: e008
(XEN) Xen stack trace from rsp=ffff8304265c7888:
(XEN) 0000000000000001 ffff82c48037a4c0 000000000000017c 000000000000001
(XEN) ffff8301725870b0 ffff830203200000 ffff82f602e4b080 000000000000000
(XEN) 0000000000000001 000000000007f43a 0000000000000000 ffff82c48011548
(XEN) 0000000000000206 ffff82f602e4b080 ffff83021fa470d8 ffff83020320000
(XEN) ffff83021fa470d8 ffff83021fa48000 0000000000000000 ffff83020320000
(XEN) 007fffffffffffff ffff82c48015f618 000000000000e510 ffff83042655000
(XEN) 00000000003fb288 80000003fb288167 ffff830426550000 140000000000001
(XEN) ffff82f6043f48e0 1400000000000001 ffff8304265c7f28 ffff82f6043f480
(XEN) 007fffffffffffff ffff82c48015fa1c 8000000150b3e167 000000000000000
(XEN) 000000000016d754 ffff82c400800167 0000000000000002 ffff8300cf66800
(XEN) 80000004248a8767 ffff82c48015d179 0000000000800165 ffff82f6043f480
(XEN) 00000000000001e6 ffff83021116e000 0000000000000067 00000000002111e
(XEN) ffff830203200000 ffff82c48015f277 2100000000000001 ffff82f604222d0
(XEN) 00000000000001e6 ffff83021116e000 0000000000000001 ffff82c48015f6e
(XEN) 000000000000004d ffff82c48014605a ffff8304265c7f28 ffff880227cbdd8
(XEN) 0000000000000004 2100000000000001 ffff82f604222dc0 210000000000001
(XEN) ffff8304265c7f28 ffff82f604222dd0 007fffffffffffff ffff82c48015fac
(XEN) 0000000000171d3c ffff830171d3c740 0000000000000001 000000000000000
(XEN) 00000000000000e8 ffff82f602e3a780 0500000000000000 ffff82c48037a90
(XEN) f000000000000000 ffff82f604222dc0 0000000000000001 00000000fffffff
(XEN) Xen call trace:
(XEN) [<ffff82c4801151f6>] free_heap_pages+0x366/0x4b0
(XEN) [<ffff82c480115488>] free_domheap_pages+0x148/0x380
(XEN) [<ffff82c48015f618>] free_page_type+0x388/0x650
(XEN) [<ffff82c48015fa1c>] __put_page_type+0x13c/0x2d0
(XEN) [<ffff82c48015d179>] is_iomem_page+0x9/0x90
(XEN) [<ffff82c48015f277>] put_page_from_l2e+0xf7/0x110
(XEN) [<ffff82c48015f6ee>] free_page_type+0x45e/0x650
(XEN) [<ffff82c48014605a>] event_check_interrupt+0x2a/0x30
(XEN) [<ffff82c48015fa1c>] __put_page_type+0x13c/0x2d0
(XEN) [<ffff82c4801601a9>] put_page_from_l3e+0x79/0x140
(XEN) [<ffff82c48015f573>] free_page_type+0x2e3/0x650
(XEN) [<ffff82c48015fa1c>] __put_page_type+0x13c/0x2d0
(XEN) [<ffff82c480146541>] smp_apic_timer_interrupt+0x51/0x90
(XEN) [<ffff82c480146541>] smp_apic_timer_interrupt+0x51/0x90
(XEN) [<ffff82c4801c8595>] sh_remove_shadows+0xa5/0xb60
(XEN) [<ffff82c4801602c7>] put_page_from_l4e+0x57/0xd0
(XEN) [<ffff82c48015f477>] free_page_type+0x1e7/0x650
(XEN) [<ffff82c48015fa1c>] __put_page_type+0x13c/0x2d0
(XEN) [<ffff82c48015d7b8>] get_page+0x28/0xf0
(XEN) [<ffff82c48014f338>] relinquish_memory+0x278/0x450
(XEN) [<ffff82c48014f989>] domain_relinquish_resources+0x1d9/0x270
(XEN) [<ffff82c48010611b>] domain_kill+0x7b/0x100
(XEN) [<ffff82c480103f54>] domctl_lock_acquire+0x44/0x70
(XEN) [<ffff82c48010465e>] do_domctl+0x4ae/0x1050
(XEN) [<ffff82c48014ab4d>] vcpu_kick+0x1d/0x80
(XEN) [<ffff82c48015d7b8>] get_page+0x28/0xf0
(XEN) [<ffff82c4801e9169>] syscall_enter+0xa9/0xae
(XEN)
(XEN) Pagetable walk from ffff8315ffffffe4:
(XEN) L4[0x106] = 00000000cf56d027 5555555555555555
(XEN) L3[0x057] = 0000000000000000 ffffffffffffffff
(XEN)
(XEN) ****************************************
(XEN) Panic on CPU 9:
(XEN) FATAL PAGE FAULT
(XEN) [error_code=0002]
(XEN) Faulting linear address: ffff8315ffffffe4
(XEN) ****************************************
(XEN)
(XEN) Reboot in five seconds...
-- System Information:
Debian Release: squeeze/sid
APT prefers testing
APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.32-5-xen-amd64 (SMP w/16 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
xen-hypervisor-4.0-amd64 depends on no packages.
Versions of packages xen-hypervisor-4.0-amd64 recommends:
ii xen-utils-4.0 4.0.1-1 XEN administrative tools
Versions of packages xen-hypervisor-4.0-amd64 suggests:
pn xen-docs-4.0 <none> (no description available)
-- no debconf information
More information about the Pkg-xen-devel
mailing list