Re: Guest crash with 2.6.27-rc6 (a different one)

2008-09-24 Thread Avi Kivity

Dan Smith wrote:

Hi,

After hitting the pvclock-related issue, I recompiled my 2.6.27-rc6
kernel without CONFIG_KVM_CLOCK.  It stays up far longer, but I see
the following guest crash when I stress it (with a source build):

  


Are you using 4K stacks?  If so, please try with 8K stacks and report.


--
error compiling committee.c: too many arguments to function

--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Guest crash with 2.6.27-rc6 (a different one)

2008-09-23 Thread Dan Smith
Hi,

After hitting the pvclock-related issue, I recompiled my 2.6.27-rc6
kernel without CONFIG_KVM_CLOCK.  It stays up far longer, but I see
the following guest crash when I stress it (with a source build):

  BUG: unable to handle kernel paging request at d97b8000
  IP: [c0496f64] __slab_alloc+0x1cd/0x3a1
  Oops: 0002 [#1] SMP DEBUG_PAGEALLOC
  Modules linked in: ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 
ipt_REJECT iptable_filter ip_tables bridge stp ib_iser rdma_cm ib_cm iw_cm 
ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi scsi_transport_iscsi nfs lockd 
nfs_acl sunrpc ip6t_REJECT xt_tcpudp nf_conntrack_ipv6 xt_state nf_conntrack 
ip6table_filter ip6_tables x_tables ipv6 dm_mirror dm_log dm_multipath dm_mod 
virtio_net floppy pcspkr virtio_pci i2c_piix4 i2c_core sr_mod cdrom ata_piix 
pata_acpi ata_generic ext3 jbd mbcache [last unloaded: microcode]
  
  Pid: 3020, comm: sed Not tainted (2.6.27-rc6 #1)
  EIP: 0060:[c0496f64] EFLAGS: 00210006 CPU: 0
  EIP is at __slab_alloc+0x1cd/0x3a1
  EAX: 5a5a5a5a EBX: 0009 ECX: 0800 EDX: 2000
  ESI: c15f9f20 EDI: d97b8000 EBP: c096ed0c ESP: c096ece0
   DS: 007b ES: 007b FS: 00d8 GS:  SS: 0068
  Process sed (pid: 3020, ti=c096e000 task=d93d14e0 task.ti=d9024000)
  Stack: d97b8000 c096ecec  0020 df83cbe0  d93d14e0 
0020 
 00200292 00b8  c096ed3c c049738d c06196a1 c18abd58 
 
 c06196a1 0020 df83cbe0 00200286 05fa 0020 d8ed4700 
c096ed60 
  Call Trace:
   [c049738d] ? kmem_cache_alloc+0x63/0xd1
   [c06196a1] ? __alloc_skb+0x2e/0x10c
   [c06196a1] ? __alloc_skb+0x2e/0x10c
   [c06196a1] ? __alloc_skb+0x2e/0x10c
   [c061979b] ? __netdev_alloc_skb+0x1c/0x39
   [e08572ac] ? try_fill_recv+0x37/0x153 [virtio_net]
   [c044ab9a] ? lock_release_holdtime+0x43/0x48
   [e08579b4] ? virtnet_poll+0x239/0x2f7 [virtio_net]
   [c06209a5] ? net_rx_action+0xde/0x204
   [c0432f93] ? __do_softirq+0x89/0xf1
   [c0432f0a] ? __do_softirq+0x0/0xf1
   [c0406e51] ? do_softirq+0x7e/0xdf
   [c046b8e2] ? handle_fasteoi_irq+0x0/0xbd
   [c0432e6c] ? irq_exit+0x4c/0x8b
   [c0406f57] ? do_IRQ+0xa5/0xbe
   [c040558c] ? common_interrupt+0x28/0x30
   [c0499b45] ? css_put+0x20/0x23
   [c0499bfa] ? __mem_cgroup_uncharge_common+0xb2/0xce
   [c0499d4d] ? mem_cgroup_uncharge_page+0x12/0x14
   [c048aa06] ? page_remove_rmap+0xe4/0xfd
   [c0484a8b] ? unmap_vmas+0x36d/0x50d
   [c0487d23] ? exit_mmap+0x57/0xa2
   [c042c60f] ? mmput+0x3f/0x90
   [c043012d] ? exit_mm+0xed/0xf5
   [c0431375] ? do_exit+0x1cc/0x734
   [c044354b] ? up_read+0x1b/0x2e
   [c0431963] ? sys_exit_group+0x0/0x16
   [c0431977] ? sys_exit_group+0x14/0x16
   [c0404b96] ? syscall_call+0x7/0xb
   ===
  Code: fe ff 89 45 d4 8b 45 e4 f6 40 01 08 74 2c 89 f0 e8 54 e5 ff ff ba 00 10 
00 00 8b 7d d4 89 c1 b8 5a 5a 5a 5a d3 e2 89 d1 c1 e9 02 f3 ab f6 c2 02 74 02 
66 ab f6 c2 01 74 01 aa 8b 5d d4 89 5d f0 
  EIP: [c0496f64] __slab_alloc+0x1cd/0x3a1 SS:ESP 0068:c096ece0
  Kernel panic - not syncing: Fatal exception in interrupt
  [ cut here ]
  WARNING: at kernel/smp.c:332 smp_call_function_mask+0x38/0x18a()
  Modules linked in: ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 
ipt_REJECT iptable_filter ip_tables bridge stp ib_iser rdma_cm ib_cm iw_cm 
ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi scsi_transport_iscsi nfs lockd 
nfs_acl sunrpc ip6t_REJECT xt_tcpudp nf_conntrack_ipv6 xt_state nf_conntrack 
ip6table_filter ip6_tables x_tables ipv6 dm_mirror dm_log dm_multipath dm_mod 
virtio_net floppy pcspkr virtio_pci i2c_piix4 i2c_core sr_mod cdrom ata_piix 
pata_acpi ata_generic ext3 jbd mbcache [last unloaded: microcode]
  Pid: 3020, comm: sed Tainted: G  D   2.6.27-rc6 #1
   [c042e716] warn_on_slowpath+0x46/0x6a
   [c0518b58] ? __delay+0xe/0x10
   [c04757e0] ? time_hardirqs_off+0xe/0x1f
   [c044b056] ? trace_hardirqs_off_caller+0x15/0x97
   [c044b0e3] ? trace_hardirqs_off+0xb/0xd
   [c04757e0] ? time_hardirqs_off+0xe/0x1f
   [c04757e0] ? time_hardirqs_off+0xe/0x1f
   [c044b056] ? trace_hardirqs_off_caller+0x15/0x97
   [c044b0e3] ? trace_hardirqs_off+0xb/0xd
   [c042ecff] ? release_console_sem+0x1be/0x1c6
   [c0451826] smp_call_function_mask+0x38/0x18a
   [c041512a] ? stop_this_cpu+0x0/0x4f
   [c04757e0] ? time_hardirqs_off+0xe/0x1f
   [c044b056] ? trace_hardirqs_off_caller+0x15/0x97
   [c044b0e3] ? trace_hardirqs_off+0xb/0xd
   [c0692018] ? _spin_unlock_irqrestore+0x3e/0x55
   [c04152d2] ? native_smp_send_stop+0x4/0x6e
   [c04714f1] ? ftrace_record_ip+0x1b3/0x1cc
   [c0692018] ? _spin_unlock_irqrestore+0x3e/0x55
   [c045198f] smp_call_function+0x17/0x19
   [c04152ee] native_smp_send_stop+0x20/0x6e
   [c042e62f] panic+0x53/0xf4
   [c06924e1] oops_end+0x87/0x9b
   [c040608e] die+0x5c/0x64
   [c0693ec9] do_page_fault+0x4f5/0x5af
   [c06939d4] ? do_page_fault+0x0/0x5af
   [c06922b2] error_code+0x72/0x78
   [c048007b] ? shrink_page_list+0x3ba/0x560
   [c0496f64] ? __slab_alloc+0x1cd/0x3a1
   [c049738d] 

Re: Guest crash with 2.6.27-rc6 (a different one)

2008-09-23 Thread Glauber Costa
On Tue, Sep 23, 2008 at 4:44 PM, Dan Smith [EMAIL PROTECTED] wrote:
 Hi,

 After hitting the pvclock-related issue, I recompiled my 2.6.27-rc6
 kernel without CONFIG_KVM_CLOCK.  It stays up far longer, but I see
 the following guest crash when I stress it (with a source build):

  BUG: unable to handle kernel paging request at d97b8000
  IP: [c0496f64] __slab_alloc+0x1cd/0x3a1
  Oops: 0002 [#1] SMP DEBUG_PAGEALLOC
It seems to be the same kind of oops, so maybe it's a plain kernel bug ?

Have you tested this on baremetal ?

  Modules linked in: ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 
 ipt_REJECT iptable_filter ip_tables bridge stp ib_iser rdma_cm ib_cm iw_cm 
 ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi scsi_transport_iscsi nfs 
 lockd nfs_acl sunrpc ip6t_REJECT xt_tcpudp nf_conntrack_ipv6 xt_state 
 nf_conntrack ip6table_filter ip6_tables x_tables ipv6 dm_mirror dm_log 
 dm_multipath dm_mod virtio_net floppy pcspkr virtio_pci i2c_piix4 i2c_core 
 sr_mod cdrom ata_piix pata_acpi ata_generic ext3 jbd mbcache [last unloaded: 
 microcode]
  Pid: 3020, comm: sed Not tainted (2.6.27-rc6 #1)
  EIP: 0060:[c0496f64] EFLAGS: 00210006 CPU: 0
  EIP is at __slab_alloc+0x1cd/0x3a1
  EAX: 5a5a5a5a EBX: 0009 ECX: 0800 EDX: 2000
  ESI: c15f9f20 EDI: d97b8000 EBP: c096ed0c ESP: c096ece0
   DS: 007b ES: 007b FS: 00d8 GS:  SS: 0068
  Process sed (pid: 3020, ti=c096e000 task=d93d14e0 task.ti=d9024000)
  Stack: d97b8000 c096ecec  0020 df83cbe0  d93d14e0 
 0020
 00200292 00b8  c096ed3c c049738d c06196a1 c18abd58 
 
 c06196a1 0020 df83cbe0 00200286 05fa 0020 d8ed4700 
 c096ed60
  Call Trace:
   [c049738d] ? kmem_cache_alloc+0x63/0xd1
   [c06196a1] ? __alloc_skb+0x2e/0x10c
   [c06196a1] ? __alloc_skb+0x2e/0x10c
   [c06196a1] ? __alloc_skb+0x2e/0x10c
   [c061979b] ? __netdev_alloc_skb+0x1c/0x39
   [e08572ac] ? try_fill_recv+0x37/0x153 [virtio_net]
   [c044ab9a] ? lock_release_holdtime+0x43/0x48
   [e08579b4] ? virtnet_poll+0x239/0x2f7 [virtio_net]
   [c06209a5] ? net_rx_action+0xde/0x204
   [c0432f93] ? __do_softirq+0x89/0xf1
   [c0432f0a] ? __do_softirq+0x0/0xf1
   [c0406e51] ? do_softirq+0x7e/0xdf
   [c046b8e2] ? handle_fasteoi_irq+0x0/0xbd
   [c0432e6c] ? irq_exit+0x4c/0x8b
   [c0406f57] ? do_IRQ+0xa5/0xbe
   [c040558c] ? common_interrupt+0x28/0x30
   [c0499b45] ? css_put+0x20/0x23
   [c0499bfa] ? __mem_cgroup_uncharge_common+0xb2/0xce
   [c0499d4d] ? mem_cgroup_uncharge_page+0x12/0x14
   [c048aa06] ? page_remove_rmap+0xe4/0xfd
   [c0484a8b] ? unmap_vmas+0x36d/0x50d
   [c0487d23] ? exit_mmap+0x57/0xa2
   [c042c60f] ? mmput+0x3f/0x90
   [c043012d] ? exit_mm+0xed/0xf5
   [c0431375] ? do_exit+0x1cc/0x734
   [c044354b] ? up_read+0x1b/0x2e
   [c0431963] ? sys_exit_group+0x0/0x16
   [c0431977] ? sys_exit_group+0x14/0x16
   [c0404b96] ? syscall_call+0x7/0xb
   ===
  Code: fe ff 89 45 d4 8b 45 e4 f6 40 01 08 74 2c 89 f0 e8 54 e5 ff ff ba 00 
 10 00 00 8b 7d d4 89 c1 b8 5a 5a 5a 5a d3 e2 89 d1 c1 e9 02 f3 ab f6 c2 02 
 74 02 66 ab f6 c2 01 74 01 aa 8b 5d d4 89 5d f0
  EIP: [c0496f64] __slab_alloc+0x1cd/0x3a1 SS:ESP 0068:c096ece0
  Kernel panic - not syncing: Fatal exception in interrupt
  [ cut here ]
  WARNING: at kernel/smp.c:332 smp_call_function_mask+0x38/0x18a()
  Modules linked in: ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 
 ipt_REJECT iptable_filter ip_tables bridge stp ib_iser rdma_cm ib_cm iw_cm 
 ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi scsi_transport_iscsi nfs 
 lockd nfs_acl sunrpc ip6t_REJECT xt_tcpudp nf_conntrack_ipv6 xt_state 
 nf_conntrack ip6table_filter ip6_tables x_tables ipv6 dm_mirror dm_log 
 dm_multipath dm_mod virtio_net floppy pcspkr virtio_pci i2c_piix4 i2c_core 
 sr_mod cdrom ata_piix pata_acpi ata_generic ext3 jbd mbcache [last unloaded: 
 microcode]
  Pid: 3020, comm: sed Tainted: G  D   2.6.27-rc6 #1
   [c042e716] warn_on_slowpath+0x46/0x6a
   [c0518b58] ? __delay+0xe/0x10
   [c04757e0] ? time_hardirqs_off+0xe/0x1f
   [c044b056] ? trace_hardirqs_off_caller+0x15/0x97
   [c044b0e3] ? trace_hardirqs_off+0xb/0xd
   [c04757e0] ? time_hardirqs_off+0xe/0x1f
   [c04757e0] ? time_hardirqs_off+0xe/0x1f
   [c044b056] ? trace_hardirqs_off_caller+0x15/0x97
   [c044b0e3] ? trace_hardirqs_off+0xb/0xd
   [c042ecff] ? release_console_sem+0x1be/0x1c6
   [c0451826] smp_call_function_mask+0x38/0x18a
   [c041512a] ? stop_this_cpu+0x0/0x4f
   [c04757e0] ? time_hardirqs_off+0xe/0x1f
   [c044b056] ? trace_hardirqs_off_caller+0x15/0x97
   [c044b0e3] ? trace_hardirqs_off+0xb/0xd
   [c0692018] ? _spin_unlock_irqrestore+0x3e/0x55
   [c04152d2] ? native_smp_send_stop+0x4/0x6e
   [c04714f1] ? ftrace_record_ip+0x1b3/0x1cc
   [c0692018] ? _spin_unlock_irqrestore+0x3e/0x55
   [c045198f] smp_call_function+0x17/0x19
   [c04152ee] native_smp_send_stop+0x20/0x6e
   [c042e62f] panic+0x53/0xf4
   [c06924e1] oops_end+0x87/0x9b
   [c040608e] die+0x5c/0x64
   [c0693ec9]