From mboxrd@z Thu Jan 1 00:00:00 1970 From: Teck Choon Giam Subject: Re: BUG at xen4.1/kernel 2.6.32.35 at a CentOS 5.5 when starting a VM Date: Fri, 8 Apr 2011 23:44:35 +0800 Message-ID: References: <4D933ADB.8060106@alog.com.br> <4D9F247C.6030801@alog.com.br> Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="===============0473057243==" Return-path: In-Reply-To: <4D9F247C.6030801@alog.com.br> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xensource.com Errors-To: xen-devel-bounces@lists.xensource.com To: Gerd Jakobovitsch Cc: xen-devel@lists.xensource.com List-Id: xen-devel@lists.xenproject.org --===============0473057243== Content-Type: multipart/alternative; boundary=bcaec5171ebf5858c004a06a1ad9 --bcaec5171ebf5858c004a06a1ad9 Content-Type: text/plain; charset=ISO-8859-1 On Fri, Apr 8, 2011 at 11:06 PM, Gerd Jakobovitsch wrote: > On 03/30/2011 11:44 PM, Teck Choon Giam wrote: > > On Wed, Mar 30, 2011 at 10:14 PM, Gerd Jakobovitsch wrote: > > Hello all, > > I used to run xen4.0 kernel 2.6.32.24 over CentOS 5.5, with a relative success, but the bug at mmu.c appeared once at a while. Therefore, I'm looking for a more stable option. > I compiled and ran the newly released xen 4.1, with kernel PVOPS 2.6.32.35 over CentOS 5.5. When trying to start a VM, the following bugs appeared at dmesg. After that, xl and xm commands do not longer respond: > > [ 145.749573] alloc irq_desc for 2209 on node -1 > [ 145.749581] alloc kstat_irqs on node -1 > [ 145.883515] block tda: sector-size: 512 capacity: 262144 > [ 145.889952] general protection fault: 0000 [#1] SMP > [ 145.890109] last sysfs file: /sys/block/tda/removable > [ 145.890164] CPU 7 > [ 145.890252] Modules linked in: bridge stp nfs fscache nfs_acl auth_rpcgss arptable_filter arp_tables xt_esp ipt_ah xt_physdev xt_multiport lockd sunrpc bonding dm_multipath bnx2 megaraid_sas > [ 145.891125] Pid: 5179, comm: tapdisk2 Not tainted 2.6.32.35 #1 PowerEdge M610 > [ 145.891184] RIP: e030:[] [] blktap_device_end_request+0x4e/0x63 > [ 145.891296] RSP: e02b:ffff880064061cd8 EFLAGS: 00010046 > [ 145.891351] RAX: 6b6b6b6b6b6b6b6b RBX: ffff88007d264690 RCX: 0000000000000028 > [ 145.891410] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 > [ 145.891469] RBP: ffff880064061cf8 R08: 0000000064061c98 R09: ffff88007da42948 > [ 145.891528] R10: ffffea0000000008 R11: 0000000001f60080 R12: ffff88007da427f8 > [ 145.891587] R13: ffff88007c75f398 R14: 0000000000000000 R15: ffff88007c75f3a8 > [ 145.891651] FS: 00007ff33d9a4730(0000) GS:ffff8800189e5000(0000) knlGS:0000000000000000 > [ 145.891714] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b > [ 145.891771] CR2: 0000000002594cc8 CR3: 000000007be61000 CR4: 0000000000002660 > [ 145.891830] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > [ 145.891890] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 > [ 145.892171] Process tapdisk2 (pid: 5179, threadinfo ffff880064060000, task ffff88007c272d60) > [ 145.892669] Stack: > [ 145.892934] ffff88007c272d60 0000000000000000 0000000000000000 0000000000000000 > [ 145.893334] <0> ffff880064061e88 ffffffff812815ae ffff880064061e58 ffffffff811d234f > [ 145.894035] <0> ffff88007e9bbfc0 ffff88007c75f398 00000001ffffffff 0000000000000000 > [ 145.895015] Call Trace: > [ 145.895286] [] blktap_ring_ioctl+0x183/0x2d8 > [ 145.895566] [] ? inode_has_perm+0x77/0x89 > [ 145.895844] [] ? inode_has_perm+0x77/0x89 > [ 145.896124] [] ? _raw_spin_lock+0x77/0x12f > [ 145.896403] [] ? _raw_spin_unlock+0xab/0xb2 > [ 145.896682] [] ? _spin_unlock+0x9/0xb > [ 145.896958] [] ? _raw_spin_lock+0x77/0x12f > [ 145.897234] [] ? file_has_perm+0xb4/0xc6 > [ 145.897513] [] vfs_ioctl+0x5e/0x77 > [ 145.897786] [] do_vfs_ioctl+0x484/0x4d5 > [ 145.898060] [] sys_ioctl+0x57/0x7a > [ 145.898338] [] system_call_fastpath+0x16/0x1b > [ 145.898614] Code: e8 5f f4 ff ff 49 8b 44 24 40 48 8b b8 80 03 00 00 e8 64 75 2a 00 41 8b 54 24 60 44 89 f6 4c 89 e7 e8 b5 89 f7 ff 49 8b 44 24 40 <48> 8b b8 80 03 00 00 e8 23 74 2a 00 5b 41 5c 41 5d 41 5e c9 c3 > [ 145.902008] RIP [] blktap_device_end_request+0x4e/0x63 > [ 145.902321] RSP > [ 145.902585] ---[ end trace 2800cfa5aa85ca0a ]--- > [ 262.100689] BUG: spinlock lockup on CPU#4, vol_id/5181, ffff88007c75f520 > [ 262.100965] Pid: 5181, comm: vol_id Tainted: G D 2.6.32.35 #1 > [ 262.101232] Call Trace: > [ 262.101497] [] _raw_spin_lock+0x101/0x12f > [ 262.101762] [] _spin_lock_irq+0x1e/0x20 > [ 262.102028] [] __make_request+0x5e/0x402 > [ 262.102294] [] ? xen_restore_fl_direct_end+0x0/0x1 > [ 262.102563] [] generic_make_request+0x258/0x2f4 > [ 262.102832] [] ? bio_init+0x18/0x32 > [ 262.103099] [] submit_bio+0xd0/0xd9 > [ 262.103366] [] submit_bh+0xf7/0x11a > [ 262.103631] [] block_read_full_page+0x246/0x264 > [ 262.103898] [] ? blkdev_get_block+0x0/0x4d > [ 262.104165] [] ? _spin_unlock_irq+0x1e/0x20 > [ 262.104433] [] ? add_to_page_cache_locked+0xa0/0xca > [ 262.104702] [] blkdev_readpage+0x13/0x15 > [ 262.104972] [] __do_page_cache_readahead+0x144/0x177 > [ 262.105240] [] ondemand_readahead+0x126/0x18e > [ 262.105507] [] page_cache_sync_readahead+0x38/0x3a > [ 262.105778] [] generic_file_aio_read+0x24c/0x5c1 > [ 262.106045] [] do_sync_read+0xe2/0x126 > [ 262.106315] [] ? autoremove_wake_function+0x0/0x38 > [ 262.106584] [] ? selinux_file_permission+0x5c/0x10e > [ 262.106854] [] ? security_file_permission+0x11/0x13 > [ 262.107120] [] vfs_read+0xab/0x167 > [ 262.107385] [] sys_read+0x47/0x70 > [ 262.107652] [] system_call_fastpath+0x16/0x1b > [ 262.107918] sending NMI to all CPUs: > [ 262.108189] BUG: unable to handle kernel paging request at ffffffffff5fb310 > [ 262.108526] IP: [] flat_send_IPI_mask+0x6a/0xc0 > [ 262.108832] PGD 1003067 PUD 1004067 PMD 18b7067 PTE 0 > [ 262.109235] Oops: 0002 [#2] SMP > [ 262.109565] last sysfs file: /sys/class/blktap2/blktap1/dev > [ 262.109830] CPU 4 > [ 262.110121] Modules linked in: bridge stp nfs fscache nfs_acl auth_rpcgss arptable_filter arp_tables xt_esp ipt_ah xt_physdev xt_multiport lockd sunrpc bonding dm_multipath bnx2 megaraid_sas > [ 262.111520] Pid: 5181, comm: vol_id Tainted: G D 2.6.32.35 #1 PowerEdge M610 > [ 262.112008] RIP: e030:[] [] flat_send_IPI_mask+0x6a/0xc0 > [ 262.112535] RSP: e02b:ffff88006778f968 EFLAGS: 00010086 > [ 262.112800] RAX: 00000000ff000000 RBX: ffffffff81790060 RCX: 00000000000160a0 > [ 262.113068] RDX: ffff88001898e000 RSI: 0000000000000002 RDI: ffffffff81816020 > [ 262.113337] RBP: ffff88006778f988 R08: 0000000000000000 R09: 0000000000000004 > [ 262.113605] R10: 0000000000000002 R11: 0000000000000004 R12: 0000000000000002 > [ 262.113877] R13: 0000000000000800 R14: 00000000000000ff R15: 0000000000000000 > [ 262.114149] FS: 00007fa78bcc5710(0063) GS:ffff88001898e000(0000) knlGS:0000000000000000 > [ 262.114636] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b > [ 262.114902] CR2: ffffffffff5fb310 CR3: 00000000641b4000 CR4: 0000000000002660 > [ 262.115171] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > [ 262.115438] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 > [ 262.115707] Process vol_id (pid: 5181, threadinfo ffff88006778e000, task ffff88007db86250) > [ 262.116194] Stack: > [ 262.116451] 0000000000000000 0000000076e9ecd0 0000000000000000 0000000076e9ecd0 > [ 262.116825] <0> ffff88006778f998 ffffffff8102c841 ffff88006778f9b8 ffffffff81029f0d > [ 262.117485] <0> ffff88007c75f520 ffff88007c75f520 ffff88006778f9f8 ffffffff81219eb3 > [ 262.118396] Call Trace: > [ 262.118657] [] flat_send_IPI_all+0x1a/0x56 > [ 262.118925] [] arch_trigger_all_cpu_backtrace+0x45/0x66 > [ 262.119195] [] _raw_spin_lock+0x106/0x12f > [ 262.119463] [] _spin_lock_irq+0x1e/0x20 > [ 262.119730] [] __make_request+0x5e/0x402 > [ 262.119996] [] ? xen_restore_fl_direct_end+0x0/0x1 > [ 262.120264] [] generic_make_request+0x258/0x2f4 > [ 262.120532] [] ? bio_init+0x18/0x32 > [ 262.120799] [] submit_bio+0xd0/0xd9 > [ 262.121066] [] submit_bh+0xf7/0x11a > [ 262.121333] [] block_read_full_page+0x246/0x264 > [ 262.121602] [] ? blkdev_get_block+0x0/0x4d > [ 262.121870] [] ? _spin_unlock_irq+0x1e/0x20 > [ 262.122137] [] ? add_to_page_cache_locked+0xa0/0xca > [ 262.127766] [] blkdev_readpage+0x13/0x15 > [ 262.128025] [] __do_page_cache_readahead+0x144/0x177 > [ 262.128288] [] ondemand_readahead+0x126/0x18e > [ 262.128548] [] page_cache_sync_readahead+0x38/0x3a > [ 262.128810] [] generic_file_aio_read+0x24c/0x5c1 > [ 262.129070] [] do_sync_read+0xe2/0x126 > [ 262.129329] [] ? autoremove_wake_function+0x0/0x38 > [ 262.129590] [] ? selinux_file_permission+0x5c/0x10e > [ 262.129851] [] ? security_file_permission+0x11/0x13 > [ 262.130110] [] vfs_read+0xab/0x167 > [ 262.130368] [] sys_read+0x47/0x70 > [ 262.130624] [] system_call_fastpath+0x16/0x1b > [ 262.130883] Code: 8b 05 b4 95 7e 00 83 fe 02 44 8b 68 34 75 0a ff 90 58 01 00 00 eb 0e f3 90 8b 04 25 00 b3 5f ff f6 c4 10 75 f2 44 89 f0 c1 e0 18 <89> 04 25 10 b3 5f ff 41 83 fc 02 74 08 44 89 e0 44 09 e8 eb 06 > [ 262.133866] RIP [] flat_send_IPI_mask+0x6a/0xc0 > [ 262.134164] RSP > [ 262.134419] CR2: ffffffffff5fb310 > [ 262.134673] ---[ end trace 2800cfa5aa85ca0b ]--- > > > Can you try to recompile your PVOPS kernel with CONFIG_DEBUG_PAGEALLOC=y? > > You can read more about this BUG athttp://lists.xensource.com/archives/html/xen-devel/2011-03/msg01756.html > > I initially hit this BUG sometime Dec 2010... ...http://lists.xensource.com/archives/html/xen-devel/2010-12/msg01501.html > > Thanks. > > Kindest regards, > Giam Teck Choon > > Sorry for the delayed answer. The problem I'm facing now is not related to > the mmu bug - that one I still am seeing at systems with xen 4.0.2 / kernel > 2.6.32.24. Newer kernels have new bugs, much more troublesome, since I can > not run a single VM instance. > > Adding DEBUG_PAGEALLOC, the main difference is that the system is rebooting > shortly after trying to start up a VM: > Ok. Sorry, didn't see your log message carefully previously. > > Apr 8 12:00:43 r2b16ch2x28p2 tapdisk2[15563]: I/O queue driver: lio > Apr 8 12:00:43 r2b16ch2x28p2 tapdisk2[15563]: received 'attach' message > (uuid = 0) > Apr 8 12:00:43 r2b16ch2x28p2 tapdisk2[15563]: sending 'attach response' > message (uuid = 0) > Apr 8 12:00:43 r2b16ch2x28p2 tapdisk2[15563]: received 'open' message > (uuid = 0) > Apr 8 12:00:43 r2b16ch2x28p2 tapdisk2[15563]: block-aio > open('/storage5/linux-centos-5-64b-base-7253/hda') > Apr 8 12:00:43 r2b16ch2x28p2 tapdisk2[15563]: > open(/storage5/linux-centos-5-64b-base-7253/hda) with O_DIRECT > Apr 8 12:00:43 r2b16ch2x28p2 tapdisk2[15563]: Image size: pre > sector_shift [134217728] post sector_shift [262144] > Apr 8 12:00:43 r2b16ch2x28p2 tapdisk2[15563]: opened image > /storage5/linux-centos-5-64b-base-rip/hda (1 users, state: 0x00000001, type: > 0) > Apr 8 12:00:43 r2b16ch2x28p2 tapdisk2[15563]: VBD CHAIN: > Apr 8 12:00:43 r2b16ch2x28p2 tapdisk2[15563]: > /storage5/linux-centos-5-64b-base/hda: 0 > Apr 8 12:00:43 r2b16ch2x28p2 tapdisk2[15563]: sending 'open response' > message (uuid = 0) > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.644887] block tda: > sector-size: 512 capacity: 262144 > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.657328] general protection > fault: 0000 [#1] SMP DEBUG_PAGEALLOC > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.657379] last sysfs file: > /sys/block/tda/removable > Just curious... ... what type of storage you are using for your VMs? Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.657400] CPU 0 > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.657421] Modules linked in: nfs > fscache nfs_acl auth_rpcgss bridge stp ocfs2 ocfs2_dlmfs ocfs2_stack_o2cb > ocfs2_dlm ocfs2_nodemanager ocfs2_stackglue configfs arptable_filter > arp_tables xt_esp ipt_ah xt_physdev xt_multiport dm_round_robin lockd sunrpc > crc32c bonding iscsi_tcp libiscsi_tcp bnx2i libiscsi scsi_transport_iscsi > cnic uio dm_multipath bnx2 megaraid_sas > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.657736] Pid: 15566, comm: > tapdisk2 Not tainted 2.6.32.36 #4 PowerEdge M610 > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.657763] RIP: > e030:[] [] > blktap_device_end_request+0x4e/0x63 > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.657808] RSP: > e02b:ffff88006da5dcd8 EFLAGS: 00010046 > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.657833] RAX: 6b6b6b6b6b6b6b6b > RBX: ffff88006566c000 RCX: 0000000000000000 > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.657860] RDX: 0000000000000000 > RSI: 0000000000000000 RDI: ffff88006d8c7980 > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.657887] RBP: ffff88006da5dcf8 > R08: ffffffff817e66a0 R09: ffff88007d775790 > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.658136] R10: ffffffff810ccfe4 > R11: ffff8800280d8f60 R12: ffff88006720e7f8 > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.658384] R13: ffff88006d8c77e0 > R14: 0000000000000000 R15: ffff88006d8c77f0 > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.658635] FS: > 00007f86d75a3730(0000) GS:ffff8800280c7000(0000) knlGS:0000000000000000 > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.659107] CS: e033 DS: 0000 ES: > 0000 CR0: 000000008005003b > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.659351] CR2: 0000000045614ed8 > CR3: 000000006d911000 CR4: 0000000000002660 > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.659600] DR0: 0000000000000000 > DR1: 0000000000000000 DR2: 0000000000000000 > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.659847] DR3: 0000000000000000 > DR6: 00000000ffff0ff0 DR7: 0000000000000400 > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.660100] Process tapdisk2 (pid: > 15566, threadinfo ffff88006da5c000, task ffff88007d7750f0) > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.660574] Stack: > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.660807] ffff88007d7750f0 > 0000000000000000 0000000000000000 0000000000000000 > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.661074] <0> ffff88006da5de88 > ffffffff8129f2c0 ffffffff8100fedd 000000016da5ddc8 > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.661574] <0> 00000000ffffffff > ffff88006d8c77e0 00000001816fab27 0000000000000000 > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.662287] Call Trace: > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.662522] [] > blktap_ring_ioctl+0x183/0x2d8 > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.662767] [] > ? xen_force_evtchn_callback+0xd/0xf > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.663012] [] > ? inode_has_perm+0xa1/0xb3 > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.663260] [] > ? xen_restore_fl_direct_end+0x0/0x1 > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.663509] [] > ? lock_release+0x1b8/0x1c3 > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.663756] [] > ? _raw_spin_unlock+0xab/0xb2 > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.663999] [] > ? _spin_unlock+0x26/0x2a > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.664248] [] > ? aio_read_evt+0x87/0x13a > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.664493] [] > ? aio_read_evt+0x11c/0x13a > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.664740] [] > ? _raw_spin_lock+0x77/0x12f > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.664986] [] > ? file_has_perm+0xb4/0xc6 > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.665237] [] > vfs_ioctl+0x5e/0x77 > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.665480] [] > do_vfs_ioctl+0x484/0x4d5 > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.665726] [] > sys_ioctl+0x57/0x7a > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.665970] [] > system_call_fastpath+0x16/0x1b > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.666214] Code: e8 61 f4 ff ff > 49 8b 44 24 40 48 8b b8 70 04 00 00 e8 79 67 2b 00 41 8b 54 24 60 44 89 f6 > 4c 89 e7 e8 76 3b f7 ff 49 8b 44 24 40 <48> 8b b8 70 04 00 00 e8 1d 65 2b 00 > 5b 41 5c 41 5d 41 5e c9 c3 > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.667320] RIP > [] blktap_device_end_request+0x4e/0x63 > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.667577] RSP > > Apr 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.668069] ---[ end trace > da218b929afc63f7 ]--- > Apr 8 12:00:43 r2b16ch2x28p2 tapdisk2[15584]: I/O queue driver: lio > Apr 8 12:00:48 r2b16ch2x28p2 tap-ctl: tap-err:tap_ctl_read_message: > failure reading message > Apr 8 12:00:48 r2b16ch2x28p2 tap-ctl: tap-err:tap_ctl_send_and_receive: > failed to receive 'unknown' message > > Looks like it is related to blktap/blktap2 drivers related issue to me... so you are right... ... this is different BUG from what I encountered as the logs are different. Sorry, didn't read your log carefully before replying previously. Have you try to use normal LVM for your VM to reproduce the BUG as I guess you are using different storage? Thanks. Kindest regards, Giam Teck Choon --bcaec5171ebf5858c004a06a1ad9 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable

On Fri, Apr 8, 2011 at 11:06 PM, Gerd Ja= kobovitsch <gerd@a= log.com.br> wrote:
=20 =20 =20
On 03/30/2011 11:44 PM, Teck Choon Giam wrote:
On Wed, Mar 30, 2011 at 10:14 PM, Gerd Jakobovitsch <gerd@alog.com.br> wrot=
e:
Hello all,

I used to run xen4.0 kernel 2.6.32.24 over CentOS 5.5, with a relative succ=
ess, but the bug at mmu.c appeared once at a while. Therefore, I'm look=
ing for a more stable option.
I compiled and ran the newly released xen 4.1, with kernel PVOPS 2.6.32.35 =
over CentOS 5.5. When trying to start a VM, the following bugs appeared at =
dmesg. After that, xl and xm commands do not longer respond:

[=A0 145.749573]=A0=A0 alloc irq_desc for 2209 on node -1
[=A0 145.749581]=A0=A0 alloc kstat_irqs on node -1
[=A0 145.883515] block tda: sector-size: 512 capacity: 262144
[=A0 145.889952] general protection fault: 0000 [#1] SMP
[=A0 145.890109] last sysfs file: /sys/block/tda/removable
[=A0 145.890164] CPU 7
[=A0 145.890252] Modules linked in: bridge stp nfs fscache nfs_acl auth_rpc=
gss arptable_filter arp_tables xt_esp ipt_ah xt_physdev xt_multiport lockd =
sunrpc bonding dm_multipath bnx2 megaraid_sas
[=A0 145.891125] Pid: 5179, comm: tapdisk2 Not tainted 2.6.32.35 #1 PowerEd=
ge M610
[=A0 145.891184] RIP: e030:[<ffffffff81281e79>]=A0 [<ffffffff81281=
e79>] blktap_device_end_request+0x4e/0x63
[=A0 145.891296] RSP: e02b:ffff880064061cd8=A0 EFLAGS: 00010046
[=A0 145.891351] RAX: 6b6b6b6b6b6b6b6b RBX: ffff88007d264690 RCX: 000000000=
0000028
[=A0 145.891410] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000=
0000000
[=A0 145.891469] RBP: ffff880064061cf8 R08: 0000000064061c98 R09: ffff88007=
da42948
[=A0 145.891528] R10: ffffea0000000008 R11: 0000000001f60080 R12: ffff88007=
da427f8
[=A0 145.891587] R13: ffff88007c75f398 R14: 0000000000000000 R15: ffff88007=
c75f3a8
[=A0 145.891651] FS:=A0 00007ff33d9a4730(0000) GS:ffff8800189e5000(0000) kn=
lGS:0000000000000000
[=A0 145.891714] CS:=A0 e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[=A0 145.891771] CR2: 0000000002594cc8 CR3: 000000007be61000 CR4: 000000000=
0002660
[=A0 145.891830] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 000000000=
0000000
[=A0 145.891890] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 000000000=
0000400
[=A0 145.892171] Process tapdisk2 (pid: 5179, threadinfo ffff880064060000, =
task ffff88007c272d60)
[=A0 145.892669] Stack:
[=A0 145.892934]=A0 ffff88007c272d60 0000000000000000 0000000000000000 0000=
000000000000
[=A0 145.893334] <0> ffff880064061e88 ffffffff812815ae ffff880064061e=
58 ffffffff811d234f
[=A0 145.894035] <0> ffff88007e9bbfc0 ffff88007c75f398 00000001ffffff=
ff 0000000000000000
[=A0 145.895015] Call Trace:
[=A0 145.895286]=A0 [<ffffffff812815ae>] blktap_ring_ioctl+0x183/0x2d=
8
[=A0 145.895566]=A0 [<ffffffff811d234f>] ? inode_has_perm+0x77/0x89
[=A0 145.895844]=A0 [<ffffffff811d234f>] ? inode_has_perm+0x77/0x89
[=A0 145.896124]=A0 [<ffffffff81219e24>] ? _raw_spin_lock+0x77/0x12f
[=A0 145.896403]=A0 [<ffffffff81219d28>] ? _raw_spin_unlock+0xab/0xb2
[=A0 145.896682]=A0 [<ffffffff81529311>] ? _spin_unlock+0x9/0xb
[=A0 145.896958]=A0 [<ffffffff81219e24>] ? _raw_spin_lock+0x77/0x12f
[=A0 145.897234]=A0 [<ffffffff811d2415>] ? file_has_perm+0xb4/0xc6
[=A0 145.897513]=A0 [<ffffffff810fe868>] vfs_ioctl+0x5e/0x77
[=A0 145.897786]=A0 [<ffffffff810fed7d>] do_vfs_ioctl+0x484/0x4d5
[=A0 145.898060]=A0 [<ffffffff810fee25>] sys_ioctl+0x57/0x7a
[=A0 145.898338]=A0 [<ffffffff81013d02>] system_call_fastpath+0x16/0x=
1b
[=A0 145.898614] Code: e8 5f f4 ff ff 49 8b 44 24 40 48 8b b8 80 03 00 00 e=
8 64 75 2a 00 41 8b 54 24 60 44 89 f6 4c 89 e7 e8 b5 89 f7 ff 49 8b 44 24 4=
0 <48> 8b b8 80 03 00 00 e8 23 74 2a 00 5b 41 5c 41 5d 41 5e c9 c3
[=A0 145.902008] RIP=A0 [<ffffffff81281e79>] blktap_device_end_reques=
t+0x4e/0x63
[=A0 145.902321]=A0 RSP <ffff880064061cd8>
[=A0 145.902585] ---[ end trace 2800cfa5aa85ca0a ]---
[=A0 262.100689] BUG: spinlock lockup on CPU#4, vol_id/5181, ffff88007c75f5=
20
[=A0 262.100965] Pid: 5181, comm: vol_id Tainted: G=A0=A0=A0=A0=A0 D=A0=A0=
=A0 2.6.32.35 #1
[=A0 262.101232] Call Trace:
[=A0 262.101497]=A0 [<ffffffff81219eae>] _raw_spin_lock+0x101/0x12f
[=A0 262.101762]=A0 [<ffffffff815293e6>] _spin_lock_irq+0x1e/0x20
[=A0 262.102028]=A0 [<ffffffff811fcc14>] __make_request+0x5e/0x402
[=A0 262.102294]=A0 [<ffffffff8101019f>] ? xen_restore_fl_direct_end+=
0x0/0x1
[=A0 262.102563]=A0 [<ffffffff811fa171>] generic_make_request+0x258/0=
x2f4
[=A0 262.102832]=A0 [<ffffffff811156d8>] ? bio_init+0x18/0x32
[=A0 262.103099]=A0 [<ffffffff811fbec8>] submit_bio+0xd0/0xd9
[=A0 262.103366]=A0 [<ffffffff81111574>] submit_bh+0xf7/0x11a
[=A0 262.103631]=A0 [<ffffffff8111448f>] block_read_full_page+0x246/0=
x264
[=A0 262.103898]=A0 [<ffffffff81117c13>] ? blkdev_get_block+0x0/0x4d
[=A0 262.104165]=A0 [<ffffffff815292c6>] ? _spin_unlock_irq+0x1e/0x20
[=A0 262.104433]=A0 [<ffffffff810ba73d>] ? add_to_page_cache_locked+0=
xa0/0xca
[=A0 262.104702]=A0 [<ffffffff81116ef9>] blkdev_readpage+0x13/0x15
[=A0 262.104972]=A0 [<ffffffff810c1d36>] __do_page_cache_readahead+0x=
144/0x177
[=A0 262.105240]=A0 [<ffffffff810c1f8f>] ondemand_readahead+0x126/0x1=
8e
[=A0 262.105507]=A0 [<ffffffff810c20d7>] page_cache_sync_readahead+0x=
38/0x3a
[=A0 262.105778]=A0 [<ffffffff810bb833>] generic_file_aio_read+0x24c/=
0x5c1
[=A0 262.106045]=A0 [<ffffffff810f1808>] do_sync_read+0xe2/0x126
[=A0 262.106315]=A0 [<ffffffff81068a02>] ? autoremove_wake_function+0=
x0/0x38
[=A0 262.106584]=A0 [<ffffffff811d701c>] ? selinux_file_permission+0x=
5c/0x10e
[=A0 262.106854]=A0 [<ffffffff811ce9c4>] ? security_file_permission+0=
x11/0x13
[=A0 262.107120]=A0 [<ffffffff810f1f7b>] vfs_read+0xab/0x167
[=A0 262.107385]=A0 [<ffffffff810f2374>] sys_read+0x47/0x70
[=A0 262.107652]=A0 [<ffffffff81013d02>] system_call_fastpath+0x16/0x=
1b
[=A0 262.107918] sending NMI to all CPUs:
[=A0 262.108189] BUG: unable to handle kernel paging request at ffffffffff5=
fb310
[=A0 262.108526] IP: [<ffffffff8102c7d1>] flat_send_IPI_mask+0x6a/0xc=
0
[=A0 262.108832] PGD 1003067 PUD 1004067 PMD 18b7067 PTE 0
[=A0 262.109235] Oops: 0002 [#2] SMP
[=A0 262.109565] last sysfs file: /sys/class/blktap2/blktap1/dev
[=A0 262.109830] CPU 4
[=A0 262.110121] Modules linked in: bridge stp nfs fscache nfs_acl auth_rpc=
gss arptable_filter arp_tables xt_esp ipt_ah xt_physdev xt_multiport lockd =
sunrpc bonding dm_multipath bnx2 megaraid_sas
[=A0 262.111520] Pid: 5181, comm: vol_id Tainted: G=A0=A0=A0=A0=A0 D=A0=A0=
=A0 2.6.32.35 #1 PowerEdge M610
[=A0 262.112008] RIP: e030:[<ffffffff8102c7d1>]=A0 [<ffffffff8102c=
7d1>] flat_send_IPI_mask+0x6a/0xc0
[=A0 262.112535] RSP: e02b:ffff88006778f968=A0 EFLAGS: 00010086
[=A0 262.112800] RAX: 00000000ff000000 RBX: ffffffff81790060 RCX: 000000000=
00160a0
[=A0 262.113068] RDX: ffff88001898e000 RSI: 0000000000000002 RDI: ffffffff8=
1816020
[=A0 262.113337] RBP: ffff88006778f988 R08: 0000000000000000 R09: 000000000=
0000004
[=A0 262.113605] R10: 0000000000000002 R11: 0000000000000004 R12: 000000000=
0000002
[=A0 262.113877] R13: 0000000000000800 R14: 00000000000000ff R15: 000000000=
0000000
[=A0 262.114149] FS:=A0 00007fa78bcc5710(0063) GS:ffff88001898e000(0000) kn=
lGS:0000000000000000
[=A0 262.114636] CS:=A0 e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[=A0 262.114902] CR2: ffffffffff5fb310 CR3: 00000000641b4000 CR4: 000000000=
0002660
[=A0 262.115171] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 000000000=
0000000
[=A0 262.115438] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 000000000=
0000400
[=A0 262.115707] Process vol_id (pid: 5181, threadinfo ffff88006778e000, ta=
sk ffff88007db86250)
[=A0 262.116194] Stack:
[=A0 262.116451]=A0 0000000000000000 0000000076e9ecd0 0000000000000000 0000=
000076e9ecd0
[=A0 262.116825] <0> ffff88006778f998 ffffffff8102c841 ffff88006778f9=
b8 ffffffff81029f0d
[=A0 262.117485] <0> ffff88007c75f520 ffff88007c75f520 ffff88006778f9=
f8 ffffffff81219eb3
[=A0 262.118396] Call Trace:
[=A0 262.118657]=A0 [<ffffffff8102c841>] flat_send_IPI_all+0x1a/0x56
[=A0 262.118925]=A0 [<ffffffff81029f0d>] arch_trigger_all_cpu_backtra=
ce+0x45/0x66
[=A0 262.119195]=A0 [<ffffffff81219eb3>] _raw_spin_lock+0x106/0x12f
[=A0 262.119463]=A0 [<ffffffff815293e6>] _spin_lock_irq+0x1e/0x20
[=A0 262.119730]=A0 [<ffffffff811fcc14>] __make_request+0x5e/0x402
[=A0 262.119996]=A0 [<ffffffff8101019f>] ? xen_restore_fl_direct_end+=
0x0/0x1
[=A0 262.120264]=A0 [<ffffffff811fa171>] generic_make_request+0x258/0=
x2f4
[=A0 262.120532]=A0 [<ffffffff811156d8>] ? bio_init+0x18/0x32
[=A0 262.120799]=A0 [<ffffffff811fbec8>] submit_bio+0xd0/0xd9
[=A0 262.121066]=A0 [<ffffffff81111574>] submit_bh+0xf7/0x11a
[=A0 262.121333]=A0 [<ffffffff8111448f>] block_read_full_page+0x246/0=
x264
[=A0 262.121602]=A0 [<ffffffff81117c13>] ? blkdev_get_block+0x0/0x4d
[=A0 262.121870]=A0 [<ffffffff815292c6>] ? _spin_unlock_irq+0x1e/0x20
[=A0 262.122137]=A0 [<ffffffff810ba73d>] ? add_to_page_cache_locked+0=
xa0/0xca
[=A0 262.127766]=A0 [<ffffffff81116ef9>] blkdev_readpage+0x13/0x15
[=A0 262.128025]=A0 [<ffffffff810c1d36>] __do_page_cache_readahead+0x=
144/0x177
[=A0 262.128288]=A0 [<ffffffff810c1f8f>] ondemand_readahead+0x126/0x1=
8e
[=A0 262.128548]=A0 [<ffffffff810c20d7>] page_cache_sync_readahead+0x=
38/0x3a
[=A0 262.128810]=A0 [<ffffffff810bb833>] generic_file_aio_read+0x24c/=
0x5c1
[=A0 262.129070]=A0 [<ffffffff810f1808>] do_sync_read+0xe2/0x126
[=A0 262.129329]=A0 [<ffffffff81068a02>] ? autoremove_wake_function+0=
x0/0x38
[=A0 262.129590]=A0 [<ffffffff811d701c>] ? selinux_file_permission+0x=
5c/0x10e
[=A0 262.129851]=A0 [<ffffffff811ce9c4>] ? security_file_permission+0=
x11/0x13
[=A0 262.130110]=A0 [<ffffffff810f1f7b>] vfs_read+0xab/0x167
[=A0 262.130368]=A0 [<ffffffff810f2374>] sys_read+0x47/0x70
[=A0 262.130624]=A0 [<ffffffff81013d02>] system_call_fastpath+0x16/0x=
1b
[=A0 262.130883] Code: 8b 05 b4 95 7e 00 83 fe 02 44 8b 68 34 75 0a ff 90 5=
8 01 00 00 eb 0e f3 90 8b 04 25 00 b3 5f ff f6 c4 10 75 f2 44 89 f0 c1 e0 1=
8 <89> 04 25 10 b3 5f ff 41 83 fc 02 74 08 44 89 e0 44 09 e8 eb 06
[=A0 262.133866] RIP=A0 [<ffffffff8102c7d1>] flat_send_IPI_mask+0x6a/=
0xc0
[=A0 262.134164]=A0 RSP <ffff88006778f968>
[=A0 262.134419] CR2: ffffffffff5fb310
[=A0 262.134673] ---[ end trace 2800cfa5aa85ca0b ]---

Can you try to recompile your PVOPS kernel with CONFIG_DEBUG_PAG=
EALLOC=3Dy?

You can read more about this BUG at
http://lists.xensource.com/archives/html/xen-de=
vel/2011-03/msg01756.html

I initially hit this BUG sometime Dec 2010... ...
http://lists.xensource.com/archives/html/xen-de=
vel/2010-12/msg01501.html

Thanks.

Kindest regards,
Giam Teck Choon
Sorry for the delayed answer. The problem I'm facing now is not related to the mmu bug - that one I still am seeing at systems with xen 4.0.2 / kernel 2.6.32.24. Newer kernels have new bugs, much more troublesome, since I can not run a single VM instance.

Adding DEBUG_PAGEALLOC, the main difference is that the system is rebooting shortly after trying to start up a VM:
=

Ok.=A0 Sorry, didn't see your log message carefully previously= .
=A0

Apr=A0 8 12:00:43 r2b16ch2x28p2 tapdisk2[15563]: I/O queue driver: lio
Apr=A0 8 12:00:43 r2b16ch2x28p2 tapdisk2[15563]: received 'attach&#= 39; message (uuid =3D 0)
Apr=A0 8 12:00:43 r2b16ch2x28p2 tapdisk2[15563]: sending 'attach response' message (uuid =3D 0)
Apr=A0 8 12:00:43 r2b16ch2x28p2 tapdisk2[15563]: received 'open'= ; message (uuid =3D 0)
Apr=A0 8 12:00:43 r2b16ch2x28p2 tapdisk2[15563]: block-aio open('/storage5/linux-centos-5-64b-base-7253/hda')
Apr=A0 8 12:00:43 r2b16ch2x28p2 tapdisk2[15563]: open(/storage5/linux-centos-5-64b-base-7253/hda) with O_DIRECT
Apr=A0 8 12:00:43 r2b16ch2x28p2 tapdisk2[15563]: Image size:=A0 =A0=A0= =A0 pre sector_shift=A0 [134217728] =A0=A0=A0 post sector_shift [262144]
Apr=A0 8 12:00:43 r2b16ch2x28p2 tapdisk2[15563]: opened image /storage5/linux-centos-5-64b-base-rip/hda (1 users, state: 0x00000001, type: 0)
Apr=A0 8 12:00:43 r2b16ch2x28p2 tapdisk2[15563]: VBD CHAIN:
Apr=A0 8 12:00:43 r2b16ch2x28p2 tapdisk2[15563]: /storage5/linux-centos-5-64b-base/hda: 0
Apr=A0 8 12:00:43 r2b16ch2x28p2 tapdisk2[15563]: sending 'open response' message (uuid =3D 0)
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.644887] block tda: sector-size: 512 capacity: 262144
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.657328] general protection fault: 0000 [#1] SMP DEBUG_PAGEALLOC
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.657379] last sysfs file: /sys/block/tda/removable

Just curi= ous... ... what type of storage you are using for your VMs?
=A0

<= /div>
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.657400] CPU 0
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.657421] Modules linked in: nfs fscache nfs_acl auth_rpcgss bridge stp ocfs2 ocfs2_dlmfs ocfs2_stack_o2cb ocfs2_dlm ocfs2_nodemanager ocfs2_stackglue configfs arptable_filter arp_tables xt_esp ipt_ah xt_physdev xt_multiport dm_round_robin lockd sunrpc crc32c bonding iscsi_tcp libiscsi_tcp bnx2i libiscsi scsi_transport_iscsi cnic uio dm_multipath bnx2 megaraid_sas
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.657736] Pid: 15566, comm: tapdisk2 Not tainted 2.6.32.36 #4 PowerEdge M610
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.657763] RIP: e030:[<ffffffff8129fb89>]=A0 [<ffffffff8129fb89>] blktap_device_end_request+0x4e/0x63
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.657808] RSP: e02b:ffff88006da5dcd8=A0 EFLAGS: 00010046
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.657833] RAX: 6b6b6b6b6b6b6b6b RBX: ffff88006566c000 RCX: 0000000000000000
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.657860] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88006d8c7980
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.657887] RBP: ffff88006da5dcf8 R08: ffffffff817e66a0 R09: ffff88007d775790
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.658136] R10: ffffffff810ccfe4 R11: ffff8800280d8f60 R12: ffff88006720e7f8
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.658384] R13: ffff88006d8c77e0 R14: 0000000000000000 R15: ffff88006d8c77f0
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.658635] FS:=A0 00007f86d75a3730(0000) GS:ffff8800280c7000(0000) knlGS:0000000000000000
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.659107] CS:=A0 e033 DS: 0000 ES: 0000 CR0: 000000008005003b
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.659351] CR2: 0000000045614ed8 CR3: 000000006d911000 CR4: 0000000000002660
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.659600] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.659847] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.660100] Process tapdisk2 (pid: 15566, threadinfo ffff88006da5c000, task ffff88007d7750f0)
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.660574] Stack:
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.660807]=A0 ffff88007d7750f0 0000000000000000 0000000000000000 0000000000000000
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.661074] <0> ffff88006da5de88 ffffffff8129f2c0 ffffffff8100fedd 000000016da5ddc8
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.661574] <0> 00000000ffffffff ffff88006d8c77e0 00000001816fab27 0000000000000000
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.662287] Call Trace:
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.662522]=A0 [<ffffffff8129f2c0>] blktap_ring_ioctl+0x183/0x2d8
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.662767]=A0 [<ffffffff8100fedd>] ? xen_force_evtchn_callback+0xd/0xf
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.663012]=A0 [<ffffffff811ebe9b>] ? inode_has_perm+0xa1/0xb3
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.663260]=A0 [<ffffffff8101064f>] ? xen_restore_fl_direct_end+0x0/0x1
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.663509]=A0 [<ffffffff81081d84>] ? lock_release+0x1b8/0x1c3
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.663756]=A0 [<ffffffff81233d2c>] ? _raw_spin_unlock+0xab/0xb2
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.663999]=A0 [<ffffffff8155618d>] ? _spin_unlock+0x26/0x2a
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.664248]=A0 [<ffffffff81134aa1>] ? aio_read_evt+0x87/0x13a
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.664493]=A0 [<ffffffff81134b36>] ? aio_read_evt+0x11c/0x13a
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.664740]=A0 [<ffffffff81233ecc>] ? _raw_spin_lock+0x77/0x12f
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.664986]=A0 [<ffffffff811ec054>] ? file_has_perm+0xb4/0xc6
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.665237]=A0 [<ffffffff81112444>] vfs_ioctl+0x5e/0x77
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.665480]=A0 [<ffffffff81112959>] do_vfs_ioctl+0x484/0x4d5
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.665726]=A0 [<ffffffff81112a01>] sys_ioctl+0x57/0x7a
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.665970]=A0 [<ffffffff81013d42>] system_call_fastpath+0x16/0x1b
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.666214] Code: e8 61 f4 ff ff 49 8b 44 24 40 48 8b b8 70 04 00 00 e8 79 67 2b 00 41 8b 54 24 60 44 89 f6 4c 89 e7 e8 76 3b f7 ff 49 8b 44 24 40 <48> 8b b8 70 04 00 00 e8 1d 65 2b 00 5b 41 5c 41 5d 41 5e c9 c3
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.667320] RIP=A0 [<ffffffff8129fb89>] blktap_device_end_request+0x4e/0x63
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.667577]=A0 RSP <ffff88006da5dcd8>
Apr=A0 8 12:00:43 r2b16ch2x28p2 kernel: [ 8879.668069] ---[ end trace da218b929afc63f7 ]---
Apr=A0 8 12:00:43 r2b16ch2x28p2 tapdisk2[15584]: I/O queue driver: lio
Apr=A0 8 12:00:48 r2b16ch2x28p2 tap-ctl: tap-err:tap_ctl_read_message: failure reading message
Apr=A0 8 12:00:48 r2b16ch2x28p2 tap-ctl: tap-err:tap_ctl_send_and_receive: failed to receive 'unknown' message


Looks like it is related to blkta= p/blktap2 drivers related issue to me... so you are right... ... this is di= fferent BUG from what I encountered as the logs are different.=A0 Sorry, di= dn't read your log carefully before replying previously.=A0 Have you tr= y to use normal LVM for your VM to reproduce the BUG as I guess you are usi= ng different storage?

Thanks.

Kindest regards,
Giam Teck Choon
--bcaec5171ebf5858c004a06a1ad9-- --===============0473057243== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel --===============0473057243==--