Bug#650722: linux-image-2.6.32-5-amd64: kernel BUG at mm/hugetlb.c:1986 while doing virsh save of a KVM guest
Hi, Am 05.12.2011 03:13, schrieb Ben Hutchings: On Fri, 2011-12-02 at 11:50 +0100, Arnd Hannemann wrote: Package: linux-2.6 Version: 2.6.32-38 Severity: normal I'm using hugetlb memory for my KVM guests. When trying to save a guest state to a file with virsh save I hit the below kernel bug: [...] Did this occur only once, or is it reproducible? Unfortunately I couldn't reproduce it, I just tried it a dozen times, and it worked. Unfortunately, I can't find an upstream bug fix that's obviously related to this. (There has been a fix for a bug that caused the same assertion to fail, but that bug was only introduced after Linux 2.6.32.) Ok, thanks for investigating. I think then you can close this bug, I migh reopen it, if I have a test case which is reproducible. Best regards Arnd -- Arnd Hannemann Tel.: +49 (0) 2161 / 4643 - 134 credativ GmbH, HRB Mönchengladbach 12080 Hohenzollernstr. 133, 41061 Mönchengladbach Geschäftsführung: Dr. Michael Meskes, Jörg Folz signature.asc Description: OpenPGP digital signature
Bug#650722: linux-image-2.6.32-5-amd64: kernel BUG at mm/hugetlb.c:1986 while doing virsh save of a KVM guest
On Fri, 2011-12-02 at 11:50 +0100, Arnd Hannemann wrote: Package: linux-2.6 Version: 2.6.32-38 Severity: normal I'm using hugetlb memory for my KVM guests. When trying to save a guest state to a file with virsh save I hit the below kernel bug: [...] Did this occur only once, or is it reproducible? Unfortunately, I can't find an upstream bug fix that's obviously related to this. (There has been a fix for a bug that caused the same assertion to fail, but that bug was only introduced after Linux 2.6.32.) Ben. -- Ben Hutchings Absolutum obsoletum. (If it works, it's out of date.) - Stafford Beer signature.asc Description: This is a digitally signed message part
Bug#650722: linux-image-2.6.32-5-amd64: kernel BUG at mm/hugetlb.c:1986 while doing virsh save of a KVM guest
Package: linux-2.6 Version: 2.6.32-38 Severity: normal I'm using hugetlb memory for my KVM guests. When trying to save a guest state to a file with virsh save I hit the below kernel bug: 1893301.600800] [ cut here ] [1893301.600808] kernel BUG at /build/buildd-linux-2.6_2.6.32-38-amd64-bk66e4/linux-2.6-2.6.32/debian/build/source_amd64_none/mm/hugetlb.c:1986! [1893301.600814] invalid opcode: [#1] SMP [1893301.600819] last sysfs file: /sys/devices/system/cpu/cpu1/topology/thread_siblings [1893301.600823] CPU 0 [1893301.600825] Modules linked in: tun authenc ccm ecb sha512_generic xfrm_user ah6 ah4 esp6 esp4 xfrm4_mode_beet xfrm4_tunnel tunnel4 xfrm4_mode_tunnel xfrm4_mode_transport xfrm6_mode_transport xfrm6_mode_ro xfrm6_mode_beet xfrm6_mode_tunnel ipcomp ipcomp6 xfrm_ipcomp xfrm6_tunnel tunnel6 rng_core nls_cp437 vfat fat isofs udf crc_itu_t usb_storage nls_utf8 cifs ip6table_filter ip6_tables ebtable_nat ebtables ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack powernow_k8 cpufreq_userspace cpufreq_conservative ipt_REJECT cpufreq_stats cpufreq_powersave xt_tcpudp iptable_filter ip_tables x_tables parport_pc ppdev lp parport sco bnep l2cap bluetooth rfkill kvm_amd binfmt_misc kvm uinput deflate zlib_deflate ctr twofish twofish_common camellia serpent blowfish cast5 des_generic cbc aes_x86_64 aes_generic xcbc rmd160 sha256_generic sha1_generic hmac crypto_null af_key fuse nfsd exportfs nfs lockd fscache nfs_acl auth_rpcgss sunrpc bridge stp ext4 jbd2 crc16 dm_snapshot loop dm_crypt snd_hda_codec_atihdmi snd_hda_codec_realtek snd_hda_intel snd_hda_codec snd_hwdep snd_pcm snd_seq snd_timer radeon snd_seq_device ttm drm_kms_helper snd drm i2c_nforce2 i2c_algo_bit soundcore pcspkr i2c_core k8temp edac_core hid_belkin snd_page_alloc evdev edac_mce_amd button processor serio_raw ext3 jbd mbcache dm_mod sg sr_mod sd_mod cdrom crc_t10dif usbhid hid ata_generic ohci_hcd fan thermal sata_nv ehci_hcd libata thermal_sys 3c59x mii scsi_mod forcedeth usbcore nls_base [last unloaded: scsi_wait_scan] [1893301.600964] Pid: 26316, comm: kvm Not tainted 2.6.32-5-amd64 #1 HP Compaq dx2450 Microtower [1893301.600968] RIP: 0010:[810de4d1] [810de4d1] hugetlb_cow+0x1f8/0x37d [1893301.600978] RSP: 0018:88005f0ad878 EFLAGS: 00010202 [1893301.600982] RAX: 0001 RBX: RCX: 88008f4cca58 [1893301.600986] RDX: 0001 RSI: 88005f0ad840 RDI: 88005f0ad8d8 [1893301.600990] RBP: ea0002f86000 R08: 88005f0ad838 R09: 88005f0ad838 [1893301.600994] R10: 88008f4cca10 R11: 88005f0adb68 R12: 7fdb6920 [1893301.600998] R13: 0001 R14: 8165a8c0 R15: 88008f4cca10 [1893301.601002] FS: 7f7472039720() GS:88000540() knlGS: [1893301.601006] CS: 0010 DS: ES: CR0: 80050033 [1893301.601010] CR2: 7fbfa0fa7738 CR3: 5fdce000 CR4: 06f0 [1893301.601014] DR0: DR1: DR2: [1893301.601018] DR3: DR6: 0ff0 DR7: 0400 [1893301.601023] Process kvm (pid: 26316, threadinfo 88005f0ac000, task 8800d72ee2e0) [1893301.601026] Stack: [1893301.601028] 0004 000e 0129 8800604ecc60 [1893301.601033] 0 002b 8000d94000e5 8800d7382a48 [1893301.601039] 0 7fdb6920 8800d55a3b80 8165a8c0 8801010f [1893301.601045] Call Trace: [1893301.601053] [810b41cb] ? find_get_page+0x1a/0x77 [1893301.601058] [810deab9] ? hugetlb_fault+0x463/0x503 [1893301.601063] [810dec7f] ? follow_hugetlb_page+0x126/0x28b [1893301.601071] [810cd494] ? __get_user_pages+0x307/0x451 [1893301.601078] [810364c6] ? get_user_pages_fast+0x13b/0x16d [1893301.601097] [a056dd5c] ? gfn_to_pfn+0x44/0x129 [kvm] [1893301.601112] [a05828db] ? paging64_page_fault+0xf7/0x4ae [kvm] [1893301.601125] [a05814ce] ? paging64_walk_addr+0x175/0x41c [kvm] [1893301.601139] [a05817b4] ? paging64_gva_to_gpa+0x3f/0x7b [kvm] [1893301.601153] [a0571938] ? kvm_mmu_gva_to_gpa_read+0x1b/0x3e [kvm] [1893301.601167] [a0583138] ? kvm_mmu_page_fault+0x19/0x88 [kvm] [1893301.601181] [a057a1d1] ? kvm_arch_vcpu_ioctl_run+0x88c/0xae3 [kvm] [1893301.601189] [8118deec] ? cpumask_any_but+0x28/0x34 [1893301.601196] [812fca35] ? page_fault+0x25/0x30 [1893301.601209] [a056c9d1] ? kvm_vcpu_ioctl+0xf1/0x4e6 [kvm] [1893301.601215] [810cd128] ? handle_mm_fault+0x7aa/0x80f [1893301.601221] [810fab66] ? vfs_ioctl+0x21/0x6c [1893301.601225] [810fb0b4] ? do_vfs_ioctl+0x48d/0x4cb [1893301.601231] [812feb96] ? do_page_fault+0x2e0/0x2fc [1893301.601236] [810fb143] ? sys_ioctl+0x51/0x70