Bug#650722: linux-image-2.6.32-5-amd64: kernel BUG at mm/hugetlb.c:1986 while doing virsh save of a KVM guest

2011-12-05 Thread Arnd Hannemann
Hi,

Am 05.12.2011 03:13, schrieb Ben Hutchings:
 On Fri, 2011-12-02 at 11:50 +0100, Arnd Hannemann wrote:
   
 Package: linux-2.6
 Version: 2.6.32-38
 Severity: normal


 I'm using hugetlb memory for my KVM guests.
 When trying to save a guest state to a file with virsh save I hit the 
 below kernel bug:
 
 [...]

 Did this occur only once, or is it reproducible?
   

Unfortunately I couldn't reproduce it, I just tried it a dozen times,
and it worked.

 Unfortunately, I can't find an upstream bug fix that's obviously related
 to this.  (There has been a fix for a bug that caused the same assertion
 to fail, but that bug was only introduced after Linux 2.6.32.)
   

Ok, thanks for investigating. I think then you can close this bug,
I migh reopen it, if I have a test case which is reproducible.

Best regards
Arnd

-- 
Arnd Hannemann
Tel.: +49 (0) 2161 / 4643 - 134

credativ GmbH, HRB Mönchengladbach 12080
Hohenzollernstr. 133, 41061 Mönchengladbach
Geschäftsführung: Dr. Michael Meskes, Jörg Folz




signature.asc
Description: OpenPGP digital signature


Bug#650722: linux-image-2.6.32-5-amd64: kernel BUG at mm/hugetlb.c:1986 while doing virsh save of a KVM guest

2011-12-04 Thread Ben Hutchings
On Fri, 2011-12-02 at 11:50 +0100, Arnd Hannemann wrote:
 Package: linux-2.6
 Version: 2.6.32-38
 Severity: normal
 
 
 I'm using hugetlb memory for my KVM guests.
 When trying to save a guest state to a file with virsh save I hit the below 
 kernel bug:
[...]

Did this occur only once, or is it reproducible?

Unfortunately, I can't find an upstream bug fix that's obviously related
to this.  (There has been a fix for a bug that caused the same assertion
to fail, but that bug was only introduced after Linux 2.6.32.)

Ben.

-- 
Ben Hutchings
Absolutum obsoletum. (If it works, it's out of date.) - Stafford Beer


signature.asc
Description: This is a digitally signed message part


Bug#650722: linux-image-2.6.32-5-amd64: kernel BUG at mm/hugetlb.c:1986 while doing virsh save of a KVM guest

2011-12-02 Thread Arnd Hannemann
Package: linux-2.6
Version: 2.6.32-38
Severity: normal


I'm using hugetlb memory for my KVM guests.
When trying to save a guest state to a file with virsh save I hit the below 
kernel bug:

1893301.600800] [ cut here ]
[1893301.600808] kernel BUG at 
/build/buildd-linux-2.6_2.6.32-38-amd64-bk66e4/linux-2.6-2.6.32/debian/build/source_amd64_none/mm/hugetlb.c:1986!
[1893301.600814] invalid opcode:  [#1] SMP 
[1893301.600819] last sysfs file: 
/sys/devices/system/cpu/cpu1/topology/thread_siblings
[1893301.600823] CPU 0 
[1893301.600825] Modules linked in: tun authenc ccm ecb sha512_generic 
xfrm_user ah6 ah4 esp6 esp4 xfrm4_mode_beet xfrm4_tunnel tunnel4 
xfrm4_mode_tunnel xfrm4_mode_transport xfrm6_mode_transport xfrm6_mode_ro 
xfrm6_mode_beet xfrm6_mode_tunnel ipcomp ipcomp6 xfrm_ipcomp xfrm6_tunnel 
tunnel6 rng_core nls_cp437 vfat fat isofs udf crc_itu_t usb_storage nls_utf8 
cifs ip6table_filter ip6_tables ebtable_nat ebtables ipt_MASQUERADE iptable_nat 
nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack powernow_k8 
cpufreq_userspace cpufreq_conservative ipt_REJECT cpufreq_stats 
cpufreq_powersave xt_tcpudp iptable_filter ip_tables x_tables parport_pc ppdev 
lp parport sco bnep l2cap bluetooth rfkill kvm_amd binfmt_misc kvm uinput 
deflate zlib_deflate ctr twofish twofish_common camellia serpent blowfish cast5 
des_generic cbc aes_x86_64 aes_generic xcbc rmd160 sha256_generic sha1_generic 
hmac crypto_null af_key fuse nfsd exportfs nfs lockd fscache nfs_acl 
auth_rpcgss sunrpc bridge stp 
 ext4 jbd2 crc16 dm_snapshot loop dm_crypt snd_hda_codec_atihdmi 
snd_hda_codec_realtek snd_hda_intel snd_hda_codec snd_hwdep snd_pcm snd_seq 
snd_timer radeon snd_seq_device ttm drm_kms_helper snd drm i2c_nforce2 
i2c_algo_bit soundcore pcspkr i2c_core k8temp edac_core hid_belkin 
snd_page_alloc evdev edac_mce_amd button processor serio_raw ext3 jbd mbcache 
dm_mod sg sr_mod sd_mod cdrom crc_t10dif usbhid hid ata_generic ohci_hcd fan 
thermal sata_nv ehci_hcd libata thermal_sys 3c59x mii scsi_mod forcedeth 
usbcore nls_base [last unloaded: scsi_wait_scan]
[1893301.600964] Pid: 26316, comm: kvm Not tainted 2.6.32-5-amd64 #1 HP Compaq 
dx2450 Microtower
[1893301.600968] RIP: 0010:[810de4d1]  [810de4d1] 
hugetlb_cow+0x1f8/0x37d
[1893301.600978] RSP: 0018:88005f0ad878  EFLAGS: 00010202
[1893301.600982] RAX: 0001 RBX:  RCX: 
88008f4cca58
[1893301.600986] RDX: 0001 RSI: 88005f0ad840 RDI: 
88005f0ad8d8
[1893301.600990] RBP: ea0002f86000 R08: 88005f0ad838 R09: 
88005f0ad838
[1893301.600994] R10: 88008f4cca10 R11: 88005f0adb68 R12: 
7fdb6920
[1893301.600998] R13: 0001 R14: 8165a8c0 R15: 
88008f4cca10
[1893301.601002] FS:  7f7472039720() GS:88000540() 
knlGS:
[1893301.601006] CS:  0010 DS:  ES:  CR0: 80050033
[1893301.601010] CR2: 7fbfa0fa7738 CR3: 5fdce000 CR4: 
06f0
[1893301.601014] DR0:  DR1:  DR2: 

[1893301.601018] DR3:  DR6: 0ff0 DR7: 
0400
[1893301.601023] Process kvm (pid: 26316, threadinfo 88005f0ac000, task 
8800d72ee2e0)
[1893301.601026] Stack:
[1893301.601028]  0004 000e 0129 
8800604ecc60
[1893301.601033] 0 002b  8000d94000e5 
8800d7382a48
[1893301.601039] 0 7fdb6920 8800d55a3b80 8165a8c0 
8801010f
[1893301.601045] Call Trace:
[1893301.601053]  [810b41cb] ? find_get_page+0x1a/0x77
[1893301.601058]  [810deab9] ? hugetlb_fault+0x463/0x503
[1893301.601063]  [810dec7f] ? follow_hugetlb_page+0x126/0x28b
[1893301.601071]  [810cd494] ? __get_user_pages+0x307/0x451
[1893301.601078]  [810364c6] ? get_user_pages_fast+0x13b/0x16d
[1893301.601097]  [a056dd5c] ? gfn_to_pfn+0x44/0x129 [kvm]
[1893301.601112]  [a05828db] ? paging64_page_fault+0xf7/0x4ae [kvm]
[1893301.601125]  [a05814ce] ? paging64_walk_addr+0x175/0x41c [kvm]
[1893301.601139]  [a05817b4] ? paging64_gva_to_gpa+0x3f/0x7b [kvm]
[1893301.601153]  [a0571938] ? kvm_mmu_gva_to_gpa_read+0x1b/0x3e [kvm]
[1893301.601167]  [a0583138] ? kvm_mmu_page_fault+0x19/0x88 [kvm]
[1893301.601181]  [a057a1d1] ? kvm_arch_vcpu_ioctl_run+0x88c/0xae3 
[kvm]
[1893301.601189]  [8118deec] ? cpumask_any_but+0x28/0x34
[1893301.601196]  [812fca35] ? page_fault+0x25/0x30
[1893301.601209]  [a056c9d1] ? kvm_vcpu_ioctl+0xf1/0x4e6 [kvm]
[1893301.601215]  [810cd128] ? handle_mm_fault+0x7aa/0x80f
[1893301.601221]  [810fab66] ? vfs_ioctl+0x21/0x6c
[1893301.601225]  [810fb0b4] ? do_vfs_ioctl+0x48d/0x4cb
[1893301.601231]  [812feb96] ? do_page_fault+0x2e0/0x2fc
[1893301.601236]  [810fb143] ? sys_ioctl+0x51/0x70